Abstract:
Methods and systems for predicting content consumption are provided herein. An application log of a user, comprising a user's application data, and a viewing log of the user, comprising the user's viewing data (e.g., television programs watched by the user), may be evaluated over a time period to construct a model. The model may comprise a correlation between the viewing log and the application log during the time period (e.g., what applications the user interacts with while watching a program). Second application data, regarding application usage of a second user, may be extracted. The model may be applied to the second application data to identify an expected viewing action of the second user (e.g., what program the second user is likely to watch during the time period based upon applications used by the second user). The second user may be provided with content related to the expected viewing action.
Abstract:
One or more systems and/or methods for storing personal information within a first device and/or for providing personal information from the first device to the second device are provided. The first device (e.g., a smartphone) may identify a user interface (e.g., a movie streaming website) populated with user specified data (e.g., a password). The user specified data may be evaluated to identify personal information of the user (e.g., a movie streaming website password). The personal information may be stored within the first device. Responsive to determining that a second device (e.g., a smart television) displays a personal information input field (e.g., a movie streaming website password input field), an input event comprising the personal information may be provided from the first device to the second device. The input event may invoke the second device to input the movie streaming website password into the movie streaming website password input field.
Abstract:
Disclosed is a system and method for obtaining ad-hoc the spatial layout and setup of installed radio-based indoor tracking systems at particular locations. The systems and methods can be implemented via an installed or web-based application that performs the ad-hoc detection of indoor beacons, which includes detecting the signal strength of all beacons at a location while the user performs a previously configured gesture. From the trajectory of the gesture and the recorded signal strengths, the disclosed systems and methods derive the distance and direction of all beacons, which are laid out in a 2D map. Thus, the present disclosure can implicitly calibrate signal strengths to high-accuracy distances, thereby producing the spatially accurate 2D setup of the previously unknown space, in addition to indoor tracking on a decimeter level, which is efficient and increasingly cost effective for device tracking and advertising purposes.
Abstract:
Disclosed is a system, method, and non-transitory computer readable storage medium for creating personalized instantiations of an app. User input is accepted to create, by a computing device, a personalized instantiation of an app, the app comprising a home screen, the creating of the personalized instantiation occurring by generating a deep linked shortcut on the home screen of the app that links into the app with parameters to configure the app into the personalized instantiation of the app. A display is generated for displaying, on the computing device, the personalized instantiation of the app so that the personalized instantiation of the app can be launched as configured with the parameters.
Abstract:
An authentication approach simplifies the process of authentication across devices, while increasing security. An authentication code is supplied through non-traditional channels, such as audio and visual channels, allowing more complex codes to pass between two devices for authentication with increased security, while reducing user interaction.
Abstract:
Disclosed is a system and method for obtaining ad-hoc the spatial layout and setup of installed radio-based indoor tracking systems at particular locations. The systems and methods can be implemented via an installed or web-based application that performs the ad-hoc detection of indoor beacons, which includes detecting the signal strength of all beacons at a location while the user performs a previously configured gesture. From the trajectory of the gesture and the recorded signal strengths, the disclosed systems and methods derive the distance and direction of all beacons, which are laid out in a 2D map. Thus, the present disclosure can implicitly calibrate signal strengths to high-accuracy distances, thereby producing the spatially accurate 2D setup of the previously unknown space, in addition to indoor tracking on a decimeter level, which is efficient and increasingly cost effective for device tracking and advertising purposes.
Abstract:
Disclosed is a system and method for calibrating BLE signal strengths to high-accuracy/precise distances. The present disclosure involves auto-calibrating BLE-based tracking systems, such as, for example, those used indoors using acoustic signals. The present disclosure enables BLE-based distance estimation to be accurate to decimeters and centimeters. The disclosed systems and methods utilize signals communicated to and from roaming devices in order to determine the distance(s) between the roaming device and installed BLE units. A signal-strength to distance map can then be constructed for reuse on any device with a Bluetooth component.
Abstract:
Disclosed is a three-dimensional ad-hoc tracking system and method between two or more devices at a location. The disclosed systems and methods can be implemented on commodity mobile devices with no added components and require no cross-device calibration, in order to track surrounding devices. Such tracking can be achieved by fusing three types of signals: 1) the strength of Bluetooth low energy signals reveals the presence and rough distance between devices; 2) a series of inaudible acoustic signals and the difference in their arrival times produces a set of accurate distances between devices, from which 3D offsets between the devices can be derived; and 3) the integration of dead reckoning from the orientation and acceleration sensors of all devices at a location to refine the estimate and to support quick interactions between devices. The disclosed systems and methods can be implemented by cross-device applications on mobile devices.
Abstract:
One or more systems and/or methods for storing personal information within a first device and/or for providing personal information from the first device to the second device are provided. The first device (e.g., a smartphone) may identify a user interface (e.g., a movie streaming website) populated with user specified data (e.g., a password). The user specified data may be evaluated to identify personal information of the user (e.g., a movie streaming website password). The personal information may be stored within the first device. Responsive to determining that a second device (e.g., a smart television) displays a personal information input field (e.g., a movie streaming website password input field), an input event comprising the personal information may be provided from the first device to the second device. The input event may invoke the second device to input the movie streaming website password into the movie streaming website password input field.
Abstract:
Disclosed are systems and methods for improving interactions with and between computers in an authentication system supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data across platforms, which data can be used to improve the quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods enable users to access web-based resources on a first device by authenticating themselves on a second device. A user can provide identifying information to a web-based resource on a first device, and as a result, the user receives a message at his/her already registered second device. The user then authenticates himself/herself on the second device by reusing the means of authentication that exist on the user's second device, which results in the user being granted entry to the web-based resource on the first device.