Patent application number | Description | Published |
20130272676 | METHODS AND APPARATUS FOR KEYWORD-BASED, NON-LINEAR NAVIGATION OF VIDEO STREAMS AND OTHER CONTENT - In one example embodiment, a program navigation system involves a television (TV) set (or other audio/visual presentation device) and a mobile device. While the TV set is playing an audio/visual program, a keyword recognition module may extract keywords from textual data associated with the program. The textual data may include textual words that match words spoken in the program. Time markers for the keywords may also be saved. A time marker may indicate a play time within the program for the corresponding keyword. The TV set may automatically transmit the keywords to the mobile device, and the mobile device may automatically display the keywords in a user interface. A user may then select one of the keywords. In response, the mobile device may automatically cause the TV set to jump to a portion of the program containing the selected keyword. Other embodiments are described and claimed. | 10-17-2013 |
20140088856 | LOCATION METADATA BASED ON PEOPLE VISITING THE LOCATIONS - Methods and systems for a location metadata system are disclosed. A data storage subsystem stores collected data associated with locations and users. A network interface is coupled to the data storage subsystem. The network interface manages communication with devices of users to collect data associated with the locations and users. A data analysis system includes a processor adapted for obtaining the collected data from the data storage subsystem and for analyzing the collected data to create a first location identity associated with interaction of users with a first location. | 03-27-2014 |
20140091900 | PROVIDING LIMITED ACCESS TO A SERVICE DEVICE VIA AN INTERMEDIARY - Systems and methods may provide for brokering limited access to a service device via an intermediary. In one example, the method may include receiving a request communication at a control device including a request for limited access to a service device, wherein the request is received from an intermediary device on behalf of a request device, and transmitting an access communication to the intermediary device, wherein the access communication includes an access ticket to be used by the request device to gain the limited access of the service device. | 04-03-2014 |
20140091903 | MOBILE DEVICE AND KEY FOB PAIRING FOR MULTI-FACTOR SECURITY - Systems and methods may provide for determining a first proximity status of a first mobile device with respect to a vehicle, and determining a second proximity status of a second mobile device with respect to the vehicle. Additionally, an accessibility of one or more functions of the vehicle may be configured based at least in part on the first proximity status and the second proximity status. In one example, a policy associated with one or more of the first mobile device and the second mobile device may be identified, wherein the accessibility is configured further based on the policy. | 04-03-2014 |
20140134972 | Embedding Service Provider Information In A Wireless Call - In one embodiment, a method includes receiving, in a mobile station of a terminating party, an incoming call and an identifier of a service provider of an initiating party of the incoming call, and displaying information corresponding to the initiating party service provider on a display of the mobile station. Other embodiments are described and claimed. | 05-15-2014 |
20140200025 | LOCATION DISCREPANCY CORRECTIONS BASED ON COMMUNITY CORRECTIONS AND TRAJECTORY DETECTION - Generally, this disclosure describes location discrepancy fixes using a community of users. A method may include correcting a location of a mobile device when a location signal is lost based on a last known location and a trajectory, wherein a corrected location corresponds to an actual location provided by at least one user of a community of users and stored in a list of corrected locations, and the actual location is related to the last known location and the trajectory. | 07-17-2014 |
20140282679 | DYNAMICALLY IMPLEMENTING AN IMAGE PROTECTION POLICY - Technologies for dynamically implementing an image protection policy include a camera device with a camera to capture an image of at least one person. The camera device determines a location in the image of at least one person in the image, determines a location of at least one personal computing device, and maps the personal computing devices to the persons captured in the image based on the determined device and image locations. The camera device may broadcast an announcement of the creation of the image to the personal computing devices, negotiate an image protection policy with each of the personal computing devices, and implement the negotiated image protection policy. | 09-18-2014 |
20150109099 | MOBILE DEVICE AND KEY FOB PAIRING FOR MULTI-FACTOR SECURITY - Systems and methods may provide for determining a first proximity status of a first mobile device with respect to a vehicle, and determining a second proximity status of a second mobile device with respect to the vehicle. Additionally, an accessibility of one or more functions of the vehicle may be configured based at least in part on the first proximity status and the second proximity status. In one example, a policy associated with one or more of the first mobile device and the second mobile device may be identified, wherein the accessibility is configured further based on the policy. | 04-23-2015 |