Interacting with a television program includes beginning playback of the program for perception by a user, analyzing the program to detect a cue within the program, automatically pausing playback of the program when the cue is detected, accepting user input data in response to the cue, resuming playback of the program when the user input data is received, and comparing the user input data to a non-user response. Interactivity provided by the program analysis, pausing playback, accepting user input data, resuming playback, and comparing operations supports execution of at least one of an entertainment application and an educational application at a user's site without requiring modification of the television program by a program provider.
Real-Time Interactive Personal Video Recorder Interface
Interacting with a television program includes beginning playback of the program for perception by a user, analyzing the program to detect a cue within the program, automatically pausing playback of the program when the cue is detected, accepting user input data in response to the cue, resuming playback of the program when the user input data is received, and comparing the user input data to a non-user response. Interactivity provided by the program analysis, pausing playback, accepting user input data, resuming playback, and comparing operations supports execution of at least one of an entertainment application and an educational application at a user's site without requiring modification of the television program by a program provider.
Mojtaba Mojy Mirashrafi - Portland OR, US Jason M. Fung - Portland OR, US Jiphun Satapathy - Portland OR, US Sachin B. Godse - Portland OR, US Mrudula Yelamanchi - Portland OR, US Dave Paul Singh - Portland OR, US
International Classification:
H04L 29/06 H04W 76/02 G06N 99/00 H04W 12/10
Abstract:
Disclosed in some examples are methods, systems, and machine readable mediums which provide a security rating to an STA for a WLAN AP. Prior to connecting to an AP, the STA employs pre-connection logic in the STA to identify likely safe and likely unsafe APs. Once the user connects to an AP, the STA connects first in an untrusted mode. In the untrusted mode, the STA uses the network connectivity provided by the AP to establish a secure connection to a network-based WLAN trust service for post-connection security checks. If the AP passes the post-connection security checks, the STA may allow other applications to access the network connection provided by the AP.
- Santa Clara CA, US Dave Paul Singh - Portland OR, US Michael Solomon Richmond - Beaverton OR, US James Jin-koo Kim - Portland OR, US
International Classification:
G06K 9/00 G06F 21/32
Abstract:
Various systems and methods for authenticating users via image manipulation are described herein. In various embodiments, an initial image associated with a stored profile of the user is presented on a display device. Input including a manipulation of the initial image to transform the initial image to a manipulated initial image is received on an input device. The user is authenticated in response to the manipulated initial image sufficiently matching a target manipulated image associated with the stored profile of the user. In various embodiments, prior to presenting the initial image, a facial image of the user is captured. The user is identified by applying a facial recognition technique to the captured facial image of the user. The display device is arranged to present the initial image in response to identifying the user as having a stored profile.
Methods, Systems And Apparatus To Manage An Authentication Sequence
Lichun Jia - Beaverton OR, US Craig T. Owen - Folsom CA, US Kevin C. Cheng - Elk Grove CA, US Ned M. Smith - Beaverton OR, US Dave P. Singh - Portland OR, US
International Classification:
H04L 29/06
Abstract:
Methods, apparatus, systems and articles of manufacture are disclosed to manage an authentication sequence. An example disclosed apparatus includes a verification engine to verify whether a platform policy sequence is authorized for the platform, when the platform policy sequence is authorized, a policy sequence engine to extract an ordered sequence of credential types from the platform policy sequence, in response to a platform log in request, a platform instruction engine to transmit an instruction for a first one of the credential types associated with a first sequence position of the platform policy sequence, to determine whether a response to the instruction contains a value indicative of the first credential type, and when the response contains the value indicative of the first credential type, comparing the value to a first threshold confidence value, and a platform authorization engine to unlock platform functionality when the value indicative of the first credential type satisfies the first threshold confidence value.
Various systems and methods for authenticating users via image manipulation are described herein. In various embodiments, an initial image associated with a stored profile of the user is presented on a display device. Input including a manipulation of the initial image to transform the initial image to a manipulated initial image is received on an input device. The user is authenticated in response to the manipulated initial image sufficiently matching a target manipulated image associated with the stored profile of the user. In various embodiments, prior to presenting the initial image, a facial image of the user is captured. The user is identified by applying a facial recognition technique to the captured facial image of the user. The display device is arranged to present the initial image in response to identifying the user as having a stored profile.
Tobias Kohlenberg - Portland OR, US Dave Paul Singh - Portland OR, US Dominic Fulginiti - Beaverton OR, US Mahendra Tadi Tadikonda - Portland OR, US
International Classification:
B60R 25/32 B60R 25/33 B60R 25/102
US Classification:
34042636
Abstract:
Various systems and methods for vehicle theft detection are described herein. In an embodiment, a driver of the vehicle is identified with an onboard system. The onboard system then determines whether the driver is an authorized operator of the vehicle, where the determination based on sensor data collected from a sensor installed in the vehicle. When the driver is not an authorized operator of the vehicle, a security recovery process is performed.
Dave Paul Singh - Portland OR, US Dominic Fulginti - Beaverton OR, US Mahendra Tadi Tadikonda - Portland OR, US Tobias Kohlenberg - Portland OR, US
International Classification:
G10L 17/02 G10L 17/22 G11B 20/10 G10L 15/26
US Classification:
704249
Abstract:
Disclosed in some examples are systems, methods, devices, and machine readable mediums which may produce an audio recording with included verification from the individuals in the recording that the recording is accurate. In some examples, the system may also provide rights management control to those individuals. This may ensure that individuals participating in audio events that are to be recorded are assured that their words are not changed, taken out of context, or otherwise altered and that they retain control over the use of their words even after the physical file has left their control.
Derrydown Public School Toronto Morocco 1992-1995, Marvin Heights Public School Mississauga Morocco 1996-1999, Lancaster Senior Public School Mississauga Morocco 1999-2000, Morning Star Middle School Mississauga Morocco 2000-2002
Dave Singh (1992-1995), Paul Anlauf (1979-1986), Cheryl Rutter (1965-1970), Donald Hedrik (1970-1973), Jessica Cheng (1991-1995), David Deckert (1987-1991)