Abstract:
A method, apparatus and non-transitory computer readable storage medium, in one embodiment, associating at least one wireless device and at least one user, requesting audio information from at least one remote source by the at least one wireless device, receiving the audio information from the remote source, broadcasting an audio identifier to the at least one wireless device, using the audio information, authenticating the association between the at least one wireless device and at least one transport, based on the audio information, determining at least one characteristic of the at least one user based on at least one of at least one user search history and at least one user preference selection and determining at least one probable route of the at least one transport based on the at least one characteristic and at least one of at least one route history and at least one input destination.
Abstract:
Wireless device application interaction via external control detection comprises identifying a first position of a wireless device and identifying a first change in the wireless device's position. The method may also provide calculating a first distance vector. The method may also perform comparing the first distance vector to a first threshold distance and calculating a second distance vector based on a distance between the second position and a third position and comparing the second distance vector to a second threshold distance, and changing a current operating state of the wireless device to a different operating state if the first distance vector exceeds the first minimum distance and the second distance vector does not exceed the first maximum distance.
Abstract:
Wireless device application interaction via external control detection comprises identifying a first position of a wireless device and identifying a first change in the wireless device's position. The method may also provide calculating a first distance vector. The method may also perform comparing the first distance vector to a first threshold distance and calculating a second distance vector based on a distance between the second position and a third position and comparing the second distance vector to a second threshold distance, and changing a current operating state of the wireless device to a different operating state if the first distance vector exceeds the first minimum distance and the second distance vector does not exceed the first maximum distance.
Abstract:
A method, apparatus and non-transitory computer readable storage medium, in one embodiment, associating at least one wireless device and at least one user, requesting audio information from at least one remote source by said at least one wireless device, receiving said audio information from said remote source, broadcasting an audio identifier to said at least one wireless device, using said audio information, authenticating said association between said at least one wireless device and at least one transport, based on said audio information, determining at least one characteristic of said at least one user based on at least one of at least one user search history and at least one user preference selection and determining at least one probable route of said at least one transport based on said at least one characteristic and at least one of at least one route history and at least one input destination.
Abstract:
An example operation may include a method comprising one or more of sending, by a device, a notification message to a server, when a threat is determined on a device, developing a simulation to spread awareness of a situation in response to the sending, requesting, by the server, a permission to present the simulation to the device, sending, by the device, a response message in response to the requesting, and executing the simulation, by the server, when permission is granted on the device.
Abstract:
An example operation includes one or more of initiating a transaction of a blockchain by a contributing member of a group to assign a digital data based document to itself or to at least one other member of the group, validating a block of the blockchain associated with the transaction by the contributing member or the at least one other member that are verified, sending an ephemeral location of the document to the contributing member or the at least one other member that are verified, and modifying the document in the ephemeral location by the contributing member or the at least one other member that is verified.
Abstract:
A method, apparatus and non-transitory computer readable storage medium, in one embodiment, associating at least one autonomous transport and at least one user, determining at least one characteristic of said at least one user based on at least one of at least one user search history and at least one user preference selection, determining at least one user location of said at least one autonomous transport and querying at least one adjacent entity based at least on said determined at least one characteristic within a predetermined range of said at least one user location.
Abstract:
At least one processor that performs at least one of determine at least two audio signals, determine at least one directionality of at least one audio source from the at least two audio signals, determine at least one timing of the at least one audio source from the at least two audio signals, generate at least one context for the at least two audio signals based on the at least one directionality and the at least one timing of the at least two audio signals, and provide at least one user interface based on the generated at least one context.
Abstract:
An apparatus, process, and computer program to prevent inappropriate messages originated from a client device is provided. A validation message that includes a message composed by a user may be received from a client device. A determination is made as to whether the composed message comprises data that matches with one or more inappropriate terms, phrases, and/or objects. A notification is sent to the client device when the composed message comprises data that matches with one or more inappropriate terms, phrases, and/or objects.
Abstract:
An example operation may include a system, comprising a processor and a memory on which are stored machine readable instructions that when executed by the processor causing the processor to one or more of obtain a first caller name of an first received call, display a notification on the device, wherein the notification includes a first button and a first document, wherein the first document is associated with the first caller name, display a list on the device of at least one name of a second document when the first button is pressed, wherein the at least one second document is associated with the first caller name and replace the first document with the second document when the at least one second document name is selected from the list.