Abstract:
An electronic device and corresponding method includes capturing, with one or more sensors, at least one authentication input from a person in the environment of the electronic device. One or more processors of the electronic device can then compare the captured authentication input with one or more authentication references to determine whether the person is an authorized user of the electronic device. Where the person is, the one or more processors can grant limited operational access to the electronic device. Thereafter, when additional authentication inputs are captured and sufficiently match additional authentication references, additional operation access can be granted.
Abstract:
An electronic device includes an imager and one or more processors operable with the imager. The imager captures at least one image of a plurality of persons. The one or more processors blur depictions of one or more persons of the plurality of persons until a reveal permission instruction is detected.
Abstract:
A method includes, responsive to a trigger event, establishing a session between a first device and a set of second devices. Session data is exchanged with the second devices in the session. The session data includes identity data and position data. A relative position of each of the second devices in the session relative to the first device is determined based on the position data. Event data and data including the relative position associated with the session are logged. A selected one of the set of second devices is removed from the session responsive to a termination event and the exchanging of the session data with the selected one of the second devices is terminated.
Abstract:
An electronic device and corresponding method includes capturing, with one or more sensors, at least one authentication input from a person in the environment of the electronic device. One or more processors of the electronic device can then compare the captured authentication input with one or more authentication references to determine whether the person is an authorized user of the electronic device. Where the person is, the one or more processors can grant limited operational access to the electronic device. Thereafter, when additional authentication inputs are captured and sufficiently match additional authentication references, additional operation access can be granted.
Abstract:
A method includes, responsive to a trigger event, establishing a session between a first device and a set of second devices. Session data is exchanged with the second devices in the session. The session data includes identity data and position data. A relative position of each of the second devices in the session relative to the first device is determined based on the position data. Event data and data including the relative position associated with the session are logged. A selected one of the set of second devices is removed from the session responsive to a termination event and the exchanging of the session data with the selected one of the second devices is terminated.
Abstract:
An electronic device includes one or more sensors having at least an audio sensor and one or more processors. The one or more sensors detect multiple persons within an environment about the electronic device and identify at least one person as an authorized user of the electronic device. The audio sensor receives audio input from the environment, and the one or more processors filter the audio input into authorized user generated audio input and other audio input, record audio signals representing the authorized user generated audio input, and preclude the recording of other audio signals representing to the other audio input.
Abstract:
A method, and corresponding electronic device, receives, at a user interface of the electronic device, a command to capture one or more images. An imager of the electronic device initiates capturing the one or more images. One or more sensors of the electronic device, optionally in conjunction with one or more processors, identify a source of the command to capture the one or more images. The one or more processors can then apply a digital data identifier to the one or more images, the digital data identifier identifying the source of the command to capture the one or more images.
Abstract:
An electronic device includes at least one biometric sensor, at least one additional sensor, and a user interface. One or more processors are operable with a memory, carried by the electronic device and storing private data as encrypted private data. When a request to expose the private data is received, the one or more processors identify a requestor as a predetermined user by obtaining at least one biometric authentication factor and at least one second authentication factor. The one or more processors confirm the at least one biometric authentication factor and the at least one second authentication factor each match a predefined criterion. Where they do, the one or more processors expose the private data locally on the electronic device.
Abstract:
The present disclosure sets forth a method for tracking path loss in which a monitoring device issues a series of power step commands and transmit power requests to a reporting device, receives transmit power data in response to the transmit power requests, and creates a data structure (e.g., a table) that maps the number of steps (e.g., number of steps increased or decreased) of the power step commands with the reported transmit powers. This process is performed during the initial connection between the monitoring device and the reporting device.
Abstract:
A method in an electronic device includes identifying an authorized user of the electronic device being present within an environment of the electronic device. The method also includes identifying at least one other person also being present within the environment of the electronic device. The method then includes selecting, with one or more processors of the electronic device, content previously partially consumed by the authorized user and the at least one other person and presenting, with the one or more processors, the content on a user interface of the electronic device.