Patent application number | Description | Published |
20090296983 | SIGNAL PROCESSING UTILIZING HOST CARRIER INFORMATION - The present invention generally relates to processing audio, video and images. One claim recites a method including: obtaining media signal comprising a steganographic signal hidden therein; utilizing a programmed electronic processor, selecting portions of the media signal for steganographic signal detection, wherein the subset of the media signal is selected based on at least one or more predetermined probability factors, in which a probability factor comprises a selection criteria or rule to identify portions of the media signal which have a higher likelihood of including a steganographic signal relative to other portions of the media signal; and utilizing a programmed electronic processor, analyzing selected portions of the media signal to obtain the steganographic signal. Of course, other claims and combinations are provided as well. | 12-03-2009 |
20100009714 | Decoding Information to Allow Access to Computerized Systems - The presently claimed invention relates generally to gaining access to secure systems. One claim recites an apparatus including: an image or video sensor for capturing image or video data; and a multi-purpose computer processor configured to: decode machine-readable information encoded in captured image or video data representing a plurality of physical objects, each instance of machine-readable information includes identifying information; determine an order in which the physical objects are presented to the image or video sensor for evaluation via the identifying information; and comparing the order to a predetermined sequence to determine whether to allow access to a remotely located computerized system. The apparatus may be housed, e.g., in a cell phone. Other combinations and claims are provided as well. | 01-14-2010 |
20100202653 | Watermarking Systems and Methods - Various improvements and applications for digital watermarking technology are detailed. One concerns techniques for making watermarks resistant to malicious attacks. Another involves using digital watermarking with ID cards and credentials, such as a watermarked driver's license conveying a user's cryptographic PKI. Still another uses digital watermarks in connection with automated compliance audits for corporate users of electronic content. A variety of other technologies are also detailed. | 08-12-2010 |
20110069861 | Distributed Decoding of Digitally Encoded Media Signals - Digital data is decoded from media signals (e.g., audio, images, video, etc.) using a distributed processing in which a first device receives and pre-processes the signal, and transmits it to a remote device for further decoding. One method pre-filters the media signal, leaving a residual from which digital data is decoded. Other arrangements progressively send portions of the signal for decoding operations. | 03-24-2011 |
20120070078 | Histogram Methods and Systems for Object Recognition - A multidimensional histogram is used to characterize an image (or object), and is used to identify candidate matches with one or more reference images (or objects). An exemplary implementation employs hue information for two of the dimensions, and a second derivative function based on luminance for a third dimension. The simplicity and speed of the detailed arrangements make them well suited for use with cell phones and other mobile devices, which can use the technology for image/object recognition, e.g., in visual search applications. | 03-22-2012 |
20120076435 | Signal Processors and Methods for Estimating Transformations Between Signals with Phase Deviation - A phase deviation method determines translation between a reference and suspect signal by analyzing a phase deviation surface created by computing a deviation metric for phase shift estimates and then analyzing a surface formed from the deviation metrics for an array of translation offsets. The phase deviation method analyzes the deviation surface to determine a translation offset that minimizes phase deviation. This method is applied at increasing levels of detail to refine the translation offset. | 03-29-2012 |
20120078989 | Signal Processors and Methods for Estimating Transformations Between Signals with Least Squares - Signal processing devices and methods estimate transforms between signals using a least squares technique. From a seed set of transform candidates, a direct least squares method applies a seed transform candidate to a reference signal and then measures correlation between the transformed reference signal and a suspect signal. For each candidate, update coordinates of reference signal features are identified in the suspect signal and provided as input to a least squares method to compute an update to the transform candidate. The method iterates so long as the update of the transform provides a better correlation. At the end of the process, the method identifies a transform or set of top transforms based on a further analysis of correlation, as well as other results. | 03-29-2012 |
20120126017 | Hiding Auxiliary Data with Line Structure Modification - The present disclosure relates generally to information hiding and digital watermarking. One claim recites a method of hiding auxiliary data in an image. The image includes line structures. The method include: receiving an image including line structures; identifying a frequency associated with the line structures; using a programmed processor modulating the frequency associated with the line structures to convey auxiliary data in the image, in which the presence of the auxiliary data is hidden from a human observer of the image, but the auxiliary data is machine-detectable. Other claims, implementations and embodiments are provided as well. | 05-24-2012 |
20130064419 | COMBINED WATERMARKING AND FINGERPRINTING - Content fingerprints and watermarks are combined in various ways for content identification applications. Fingerprints are used to identify content generally while watermarks provide more detailed localization of parts within the content, and vice versa. Fingerprint techniques are further used for signal synchronization and other pre-processing steps to assist in digital watermark decoding. A variety of fingerprint/watermark techniques identify characteristics of the channel of content from content samples. | 03-14-2013 |
20130308818 | CONTENT RECOGNITION AND SYNCHRONIZATION USING LOCAL CACHING - A content fingerprint based recognition system employs local caching of portions of a fingerprint database to manage network services for identifying which programs a user's mobile device is exposed to and the timing of events within the program. The system enables background recognition and synchronization of network services in a way that consumes less device power and bandwidth. | 11-21-2013 |
20140023226 | COMBINED WATERMARKING AND FINGERPRINTING - Content fingerprints and watermarks are combined in various ways for content identification applications. Fingerprints are used to identify content generally while watermarks provide more detailed localization of parts within the content, and vice versa. Fingerprint techniques are further used for signal synchronization and other pre-processing steps to assist in digital watermark decoding. A variety of fingerprint/watermark techniques identify characteristics of the channel of content from content samples. | 01-23-2014 |
20140037129 | REDUCING WATERMARK PERCEPTIBILITY AND EXTENDING DETECTION DISTORTION TOLERANCES - The present disclosures relates generally to digital watermarking and data hiding. One claim recites a smartphone comprising: a camera to capture video of a display that is rendering video, in which the video comprises a first watermark signal embedded in a first portion of the data, a second watermark signal embedded in a second portion of the data, and a third watermark signal embedded in a third portion of the data, in which at least two of the first watermark signal, second watermark signal and third watermark signal are inversely related to one another; electronic memory for buffering data representing captured video; one or more electronic processors programmed for: applying a first perspective distortion to the data representing the captured video to yield first perspective distorted video; and analyzing the first perspective distorted video to detect digital watermarking, in which a second perspective distortion is applied to the data representing the captured video to yield second perspective distorted video when the analyzing does not detect digital watermarking, and then performing analyzing the second perspective distorted video to detect digital watermarking. Of course, other claims are provided too. | 02-06-2014 |
20140037131 | STEGANOGRAPHIC ENCODING AND DECODING - This patent document relates generally to steganography and digital watermarking. One claim recites, in a watermark encoder, a method of encoding auxiliary information in an image or video comprising: using a programmed electronic processor, computing a change in an attribute of an image or video sample to encode auxiliary information in the image or video; and changing color values of the image or video sample to effect the change in the attribute, in which changes to color values are determined based at least in part on both: i) visibility of the changes, and ii) anticipated watermark detection. Of course, other claims are provided too. | 02-06-2014 |
20140093120 | DIGITAL WATERMARKING METHODS, APPARATUS AND SYSTEMS - The present invention relate generally to digital watermarking and data hiding. One claim recites a method including: obtaining first data and second color data, the first color data and the second color data represent data from a color image signal or color video signal; obtaining a digital watermark pattern, the pattern aiding detection of a watermark message; separating the digital watermark pattern into first frequency components and second frequency components; utilizing a programmed electronic processor or electronic processing circuitry, modifying the first color data by hiding the first frequency components therein; and utilizing a programmed electronic processor or electronic processing circuitry, modifying the second color data by hiding the second frequency components therein. Of course, other combinations and claims are provided too. | 04-03-2014 |
20140108020 | MULTI-MODE AUDIO RECOGNITION AND AUXILIARY DATA ENCODING AND DECODING - Audio signal processing enhances audio watermark embedding and detecting processes. Audio signal processes include audio classification and adapting watermark embedding and detecting based on classification. Advances in audio watermark design include adaptive watermark signal structure data protocols, perceptual models, and insertion methods. Perceptual and robustness evaluation is integrated into audio watermark embedding to optimize audio quality relative the original signal, and to optimize robustness or data capacity. These methods are applied to audio segments in audio embedder and detector configurations to support real time operation. Feature extraction and matching are also used to adapt audio watermark embedding and detecting. | 04-17-2014 |
20140142958 | MULTI-MODE AUDIO RECOGNITION AND AUXILIARY DATA ENCODING AND DECODING - Audio signal processing enhances audio watermark embedding and detecting processes. Audio signal processes include audio classification and adapting watermark embedding and detecting based on classification. Advances in audio watermark design include adaptive watermark signal structure data protocols, perceptual models, and insertion methods. Perceptual and robustness evaluation is integrated into audio watermark embedding to optimize audio quality relative the original signal, and to optimize robustness or data capacity. These methods are applied to audio segments in audio embedder and detector configurations to support real time operation. Feature extraction and matching are also used to adapt audio watermark embedding and detecting. | 05-22-2014 |
20140244514 | METHODS AND ARRANGEMENTS FOR SMARTPHONE PAYMENTS AND TRANSACTIONS - The disclosure relates to a smartphone-based virtual wallet, that manages payment options available to a user. One claim recites portable device comprising: a touch screen display; a video camera; a microphone for capturing ambient audio; memory for storing an image, and for storing components of a virtual wallet; and one or more processors. The one or more processors are configured for: controlling the video camera to capture imagery corresponding to a checkout terminal's display, the display displaying imagery including digital watermarking information hidden therein, the information including transaction information; processing captured imagery to decode the digital watermarking to obtain the transaction information; receiving user input corresponding to payment information included in a component of the virtual wallet; controlling communication with a remotely located third party, so that the transaction information and payment information are provided to the third party; outputting a request for user confirmation based on a request received from the third party; and controlling communication with the remotely located third party so that a user confirmation is provided to the third party. A great variety of other features, arrangements and claims are also detailed. | 08-28-2014 |
20140342773 | DISTRIBUTED COMPUTING FOR PORTABLE COMPUTING DEVICES - This disclosure describes a distributed reader architecture for a mobile computing device such as cellular telephone handset. One claim recites a method for identifying a content item from a host signal captured on a mobile telephone handset, comprising: from the handset, receiving filtered data from the host signal for use in identifying the content item; processing the filtered data to compute a content fingerprints; using the content fingerprints to determine an action associated with the content item, in which said determining utilizes information pertaining to an operating system associated with the mobile telephone handset; and communicating information associated with the action to the mobile telephone handset. Of course, other claims and combinations are provided as well. | 11-20-2014 |
20140343931 | ROBUST SIGNATURES DERIVED FROM LOCAL NONLINEAR FILTERS - Content signal recognition is based on a multi-axis filtering of the content signal. The signatures are calculated, formed into data structures and organized in a database for quick searching and matching operations used in content recognition. For content recognition, signals are sampled and transformed into signatures using the multi axis filter. The database is searched to recognize the signals as part of a content item in the database. Using the content identification, content metadata is retrieved and provided for a variety of applications. In one application, the metadata is provided in response to a content identification request. | 11-20-2014 |
20140378810 | PHYSIOLOGIC DATA ACQUISITION AND ANALYSIS - The availability of high quality imagers on smartphones and other portable devices facilitates creation of a large, crowd-sourced, image reference library that depicts skin rashes and other dermatological conditions. Some of the images are uploaded with, or later annotated with, associated diagnoses or other information (e.g., “this rash went away when I stopped drinking milk”). A user uploads a new image of an unknown skin condition to the library. Image analysis techniques are employed to identify salient similarities between features of the uploaded image, and features of images in this reference library. Given the large dataset, statistically relevant correlations emerge that identify to the user certain diagnoses that may be considered, other diagnoses that may likely be ruled-out, and/or anecdotal information about similar skin conditions from other users. Similar arrangements can employ audio and/or other physiologically-derived signals. A great variety of other features and arrangements are also detailed. | 12-25-2014 |
20150016712 | METHODS FOR OBJECT RECOGNITION AND RELATED ARRANGEMENTS - Methods and arrangements involving portable user devices such smartphones and wearable electronic devices are disclosed, as well as other devices and sensors distributed within an ambient environment. Some arrangements enable a user to perform an object recognition process in a computationally- and time-efficient manner. Other arrangements enable users and other entities to, either individually or cooperatively, register or enroll physical objects into one or more object registries on which an object recognition process can be performed. Still other arrangements enable users and other entities to, either individually or cooperatively, associate registered or enrolled objects with one or more items of metadata. A great variety of other features and arrangements are also detailed. | 01-15-2015 |
20150071565 | SIGNAL PROCESSORS AND METHODS FOR ESTIMATING TRANSFORMATIONS BETWEEN SIGNALS WITH PHASE DEVIATION - A phase deviation method determines an offset between a reference and suspect signal by analyzing a phase deviation surface created by computing a deviation metric for phase shift and then analyzing a surface formed from the deviation metrics for an array of offsets. The phase deviation method analyzes the deviation surface to determine an offset that minimizes phase deviation. This method is applied at increasing levels of detail to refine the determination of the offset. | 03-12-2015 |
20150156368 | STEGANOGRAPHIC ENCODING AND DECODING - This patent document relates generally to steganography and digital watermarking. One claim recites an apparatus comprising: electronic memory for buffering samples corresponding to imagery; and a programmed processor. The processor is programmed for: analyzing the samples corresponding to the imagery to determine whether a color value comprises color saturation; adjusting the samples to adjust the color saturation into a linear region, the adjusting yielding adjusted samples; encoding the auxiliary information in the adjusted samples, said encoding adapted to an anticipated watermark detection. Of course, other claims and combinations are provided too. | 06-04-2015 |
20150162013 | COMBINED WATERMARKING AND FINGERPRINTING - Content fingerprints and watermarks are combined in various ways for content identification applications. Fingerprints are used to identify content generally while watermarks provide more detailed localization of parts within the content, and vice versa. Fingerprint techniques are further used for signal synchronization and other pre-processing steps to assist in digital watermark decoding. A variety of fingerprint/watermark techniques identify characteristics of the channel of content from content samples. | 06-11-2015 |
20150206268 | DIGITAL WATERMARKING METHODS, APPARATUS AND SYSTEMS - The present invention relate generally to digital watermarking and data hiding. One claim recites a method including: obtaining first data and second color data, the first color data and the second color data represent data from a color image signal or color video signal; obtaining a digital watermark pattern, the pattern aiding detection of a watermark message; separating the digital watermark pattern into first frequency components and second frequency components; utilizing a programmed electronic processor or electronic processing circuitry, modifying the first color data by hiding the first frequency components therein; and utilizing a programmed electronic processor or electronic processing circuitry, modifying the second color data by hiding the second frequency components therein. Of course, other combinations and claims are provided too. | 07-23-2015 |
20150242981 | Extending Watermark Detection Distortion Tolerances - The present disclosures relates generally to digital watermarking and data hiding. One claim recites a smartphone comprising: a camera to capture video of a display that is rendering video, in which the video comprises a first watermark signal embedded in a first portion of the data, a second watermark signal embedded in a second portion of the data, and a third watermark signal embedded in a third portion of the data, in which at least two of the first watermark signal, second watermark signal and third watermark signal are inversely related to one another; electronic memory for buffering data representing captured video; one or more electronic processors programmed for: applying a first perspective distortion to the data representing the captured video to yield first perspective distorted video; and analyzing the first perspective distorted video to detect digital watermarking, in which a second perspective distortion is applied to the data representing the captured video to yield second perspective distorted video when the analyzing does not detect digital watermarking, and then performing analyzing the second perspective distorted video to detect digital watermarking. Of course, other claims are provided too. | 08-27-2015 |
20150302543 | METHODS FOR ENCODING, DECODING AND INTERPRETING AUXILIARY DATA IN MEDIA SIGNALS - The disclosure relates to digital watermarking, steganography, and specifically to message coding protocols used in conjunction with digital watermarking and steganographic encoding/decoding and payload interpretation methods. One claim recites a method for interpreting a data structure having fixed and variable message portions, the method comprising: processing the fixed message portion to determine a version of the variable message portion; decoding the entire payload field of the variable message portion according to the determined version; and interpreting only a portion of the decoded payload field according to the determined version. Of course, other features and claims are provided too. | 10-22-2015 |
Patent application number | Description | Published |
20110148770 | MULTI-FEATURE INTERACTIVE TOUCH USER INTERFACE - Briefly, a feature rich touch subsystem is disclosed. The feature rich touch subsystem includes one or more novel user input capabilities that enhance the user experience. | 06-23-2011 |
20110246214 | TECHNIQUES TO IDENTIFY IN-MARKET PURCHASING INTERESTS - An embodiment of the present invention provides a method, comprising identifying in-market purchasing interests and representing them as a user goal to determine when a user is in-market for a specific product and to determine general shopping preferences and habits of the user, and wherein the goal has a timeline, and goal satisfaction can be identified via a variety of contextual inputs selected from the group consisting of: location; traces from online shopping activity; credit card bills; or a pay-by-phone transactions. | 10-06-2011 |
20110246300 | TECHNIQUES TO DETERME WHEN AN INTERNET USER IS IN-MARKET FOR A SPECIFIC PRODUCT AND DETERMINING GENERAL SHOPPING PREFERENCES AND HABITS OF INTERNET USERS - An embodiment of the present invention provides a method of determining when a user is in-market for a specific product and knowing general shopping preferences and habits of users, comprising using web browsing behavior to determine the products the user is interested in purchasing and how the user typically likes to shop and wherein the web browsing behavior is determined by watching some or all web pages loaded and analyzing at least a URL, page text, and cookies associated with each loaded web page. | 10-06-2011 |
20110246469 | TECHNIQUES TO CAPTURE CONTEXT AND LOCATION INFORMATION AND UTILIZE HEURISTICS TO TURN LOCATION TRACKED OVER TIME AND CONTEXT INFORMATION INTO SEMANTIC LOCATION INFORMATION - An embodiment of the present invention provides a method, comprising capturing context information of a user and using heuristics based on a common knowledge database to turn location tracked over time combined with the context information into semantic location information. Embodiments of the present invention may further provide creating and identifying said heuristics and wherein trace data of GPS coordinates are obtained continuously throughout the user's day and first clustered to identify interesting locations, then up-leveled to a street address or business name and then semantically interpreted in one of several categories. | 10-06-2011 |
20110251918 | RECOMMENDATION-GUIDED INTERNET PURCHASES UTLIZING CONTEXT DERIVED FROM A CONSTELLATION OF DEVICES - An embodiment of the present invention provides an Internet access device, comprising a processor adapted to provide recommendation-guided Internet purchases by identifying purchasing opportunities that would be directly relevant to a user of said Internet access device, wherein the Internet access device would utilize context received from the user's constellation of devices to develop a profile of the user's purchasing behavior, and automatically offer purchasing opportunities that are most likely to be of interest to the user. | 10-13-2011 |
20110251990 | TECHNIQUES FOR TEMPLATE-BASED PREDICTIONS AND RECOMMENDATIONS - An embodiment of the present invention provides a method of template-based prediction and recommendation, comprising utilizing templates that consist of a sequence of activities or locations to characterize a user's day by a personal device, wherein as the user goes about a day, the personal device attempts to match pre-existing templates to the user's location and activities, assigning a probability to each template; and using the matching templates to predict what the user will do next and thus narrow down a set of logical recommendations. | 10-13-2011 |
20110254772 | TECHNIQUES FOR RECOGNIZING MOVEMENT OF ONE OR MORE TOUCHES ACROSS A LOCATION ON A KEYBOARD GRID ON A TOUCH PANEL INTERFACE - Briefly, a method and apparatus for recognizing movement of one or more touches across a location on a keyboard grid on a touch panel interface is disclosed. The method may receiving user input with a touch panel interface, recognizing movement of one or more touches across a location on a keyboard grid on the touch panel interface, and performing an action associated with the movement of one or more touches across the location on the keyboard grid on the touch panel interface. | 10-20-2011 |
20110254796 | TECHNIQUES FOR RECOGNIZING TEMPORAL TAPPING PATTERNS INPUT TO A TOUCH PANEL INTERFACE - Briefly, a method and apparatus for recognizing temporal tapping patterns input to a touch panel interface is disclosed. The method may include receiving user input with a touch panel interface, recognizing a temporal tapping pattern in the user input, and performing an action associated with the temporal tapping pattern. | 10-20-2011 |
20110254797 | TECHNIQUES FOR RECOGNIZING MULTI-SHAPE, MULTI-TOUCH GESTURES INCLUDING FINGER AND NON-FINGER TOUCHES INPUT TO A TOUCH PANEL INTERFACE - Briefly, a method and apparatus for recognizing multi-shape, multi-touch gestures including finger and non-finger touches input to a touch panel interface is disclosed. The method may include receiving user input with a touch panel interface, recognizing a multi-shape, multi-touch gesture including finger and non-finger touches in the user input, and performing an action associated with the multi-touch gesture including finger and non-finger touches. | 10-20-2011 |
20110254798 | TECHNIQUES FOR RECOGNIZING A SERIES OF TOUCHES WITH VARYING INTENSITY OR ANGLE OF DESCENDING ON A TOUCH PANEL INTERFACE - Briefly, a method and apparatus for recognizing a series of touches with varying intensity or angle of descending on a touch panel interface is disclosed. The method comprises receiving user input with a touch panel interface, recognizing a series of touches with varying intensity or angle of descending on the touch panel interface, and performing an action associated with the series of touches with varying intensity or angle of descending on the touch panel interface. | 10-20-2011 |
20110264553 | SYSTEMS, APPARATUS AND METHODS CAPABLE OF DELIVERING PURCHASE RECOMMENDATIONS BASED ON AN INTERACTIVE MOBILE SHOPPING APPLICATIONS - An embodiment of the present invention provides a mobile device, comprising a processor adapted to deliver purchase recommendations to a user of the mobile device based on an interactive mobile shopping application by interacting by the user with the mobile device, and on which the interactive mobile shopping application resides, to refine the user's interests and obtain recommendations for alternative products that may better fit the user's needs, and wherein the mobile device is further adapted to collect information about the user's in-market interests and overall shopping patterns thereby allowing opportunities for targeted advertising. | 10-27-2011 |
20110264613 | METHODS, APPARATUS AND SYSTEMS USING PROBABILISTIC TECHNIQUES IN TRENDING AND PROFILING - An embodiment of the present invention provides a mobile device, comprising a processor adapted to use probabilistic techniques in trending and profiling of a user of the mobile device's behavior in order to offer recommendations by detecting patterns in the user behavior over time and thereby enabling said mobile device to predict what the user is likely to do on a given day or what the user intends to accomplish in an action that has begun. | 10-27-2011 |
20120246000 | TECHNIQUES TO CAPTURE CONTEXT AND LOCATION INFORMATION AND UTILIZE HEURISTICS TO TURN LOCATION TRACKED OVER TIME AND CONTEXT INFORMATION INTO SEMANTIC LOCATION INFORMATION - An embodiment of the present invention provides a method, comprising, capturing context information of a user and using heuristics based on a common knowledge database to turn location tracked over time combined with the context information into semantic location information. | 09-27-2012 |
20120246684 | SYSTEMS, APPARATUS AND METHODS USING PROBABILISTIC TECHNIQUES IN TRENDING AND PROFILING AND TEMPLATE-BASED PREDICTIONS OF USER BEHAVIOR IN ORDER TO OFFER RECOMMENDATIONS - An embodiment of the present invention provides a method of using probabilistic techniques in trending and profiling of user behavior in order to offer recommendations, comprising detecting patterns in user behavior over time thereby enabling a personal device associated with said user to predict what the user is likely to do on a given day or what the user intends to accomplish in an action that has begun. | 09-27-2012 |
20130265269 | MOBILE DEVICE REJECTION OF UNINTENTIONAL TOUCH SENSOR CONTACT - Mobile device rejection of unintentional sensor contact. An embodiment of a mobile device includes a first touch sensor to detect contact by a user of the mobile device for input of gestures by the user, a memory to store indicators of unintentional contact to the first touch sensor, and a processor to evaluate contact to the first touch sensor. The processor compares a contact with the first touch sensor to the indicators of unintentional contact to determine if the contact is unintentional, and the mobile device rejects the contact as an input to the mobile device if the contact is determined to be unintentional and accepts the contact as an input to the mobile device if the contact is determined to be intentional. | 10-10-2013 |
20130271419 | TRANSFORMING MOBILE DEVICE SENSOR INTERACTION TO REPRESENT USER INTENT AND PERCEPTION - Transforming mobile device sensor interaction to represent user intent and perception. An embodiment of a mobile device includes a display screen for the display of data and images and a touch sensor to detect a motion of a gesture made by a thumb or other finger of a user of the device. The mobile device further includes a module to transform the motion detected by the touch sensor to generate a modified motion to reflect a perception of the user, where the modified motion is to be applied as an input relating to the display screen. | 10-17-2013 |
20130293505 | MULTI-DIMENSIONAL INTERACTION INTERFACE FOR MOBILE DEVICES - Method and apparatus for multi-dimensional interaction interface for mobile devices. An embodiment of a mobile device includes a touch screen to provide a display and to generate a touch screen signal upon contact to the touch screen, a touch sensor to generate a touch sensor signal upon contact to the touch sensor, and a module to provide for cooperative operation of the touch screen signal and the touch sensor signal in providing input to the mobile device upon determining that an input to the touch screen indicates a multipoint input. | 11-07-2013 |
20130307769 | MOBILE DEVICE ACTIVATION BY USER GRASP - Method and apparatus for mobile device activation by user grasp. An embodiment of a mobile device includes a cover, the cover including at least a first side and a least a first corner, the first corner adjoining the first side, with a concave indentation in the cover, the concave indentation being located at the first corner of the mobile device. The mobile device further includes a first touch sensor located in the concave indentation, the first touch sensor to generate a signal upon physical contact or proximity with a user of the mobile device, and an activation module, the activation module to transition the mobile device from a deactivated state to an activated state upon receiving at least the first signal from the first touch sensor. | 11-21-2013 |
20130335319 | MOBILE DEVICE OPERATION USING GRIP INTENSITY - Mobile device operation using grip intensity. An embodiment of a mobile device includes a touch sensor to detect contact or proximity by a user of the mobile device; a memory to store indicators of grip intensity in relation to the touch sensor; and a processor to evaluate contact to the touch sensor. The processor is to compare a contact with the touch sensor to the indicators of grip shape and firmness to determine grip intensity, and the mobile device is to receive an input for a function of the mobile device based at least in part on determined grip intensity for the mobile device. | 12-19-2013 |
20140002338 | TECHNIQUES FOR POSE ESTIMATION AND FALSE POSITIVE FILTERING FOR GESTURE RECOGNITION | 01-02-2014 |
20140006954 | TECHNIQUES FOR DEVICE CONNECTIONS USING TOUCH GESTURES | 01-02-2014 |
20140172990 | SYSTEMS AND METHODS FOR USER DEVICE INTERACTION - Systems and methods for receiving a communication on one or more user devices within a vehicle and redirecting the communications based at least in part on one or more user profiles associated with occupants of the vehicle is disclosed. The redirection of the communication may further be based at least in part on one or more sensor signals or a drive characteristic associated with the vehicle. | 06-19-2014 |
20140176436 | TECHNIQUES FOR GESTURE-BASED DEVICE CONNECTIONS - Techniques for gesture-based device connections are described. For example, a method may comprise receiving video data corresponding to motion of a first computing device, receiving sensor data corresponding to motion of the first computing device, comparing, by a processor, the video data and the sensor data to one or more gesture models, and initiating establishment of a wireless connection between the first computing device and a second computing device if the video data and sensor data correspond to gesture models for the same gesture. Other embodiments are described and claimed. | 06-26-2014 |
20140188920 | SYSTEMS AND METHODS FOR CUSTOMIZED CONTENT - Systems and methods to receive content and generate a playlist of content based at least in part on content interests and/or preferences of occupants of a vehicle is disclosed. The playlist may further be generated based on user interests and/or preferences of multiple occupants of the vehicle. In addition, a drive context of the vehicle may be used in the selection of content for receiving and/or rendering. | 07-03-2014 |
20140245230 | FULL 3D INTERACTION ON MOBILE DEVICES - Systems and methods may provide for displaying a three-dimensional (3D) environment on a screen of a mobile device, and identifying a user interaction with an area behind the mobile device. In addition, the 3D environment can be modified based at least in part on the first user interaction. Moreover, the 3D environment may be modified based on movements of the mobile device as well as user interactions with the mobile device, allowing the user to navigate through the virtual 3D environment by moving the mobile/handheld device. | 08-28-2014 |
20150095678 | MOVEMENT-BASED STATE MODIFICATION - Techniques for modifying a power state of a device are described herein. The techniques include receiving data from a sensor indicating movement of the device, and determining whether the device movement is associated with a predetermined device movement. Based on the determination, the techniques include modifying a power state of the device from either a first power state to a second power state, or from the second power state to the first power state, wherein the device consumes more power in the first power state than in the second power state. | 04-02-2015 |