U.S. patent application number 15/583140 was filed with the patent office on 2017-08-17 for interface selection in navigation guidance systems.
The applicant listed for this patent is Cellepathy Inc.. Invention is credited to Dan Abramson, Sean Ir.
Application Number | 20170234691 15/583140 |
Document ID | / |
Family ID | 56497501 |
Filed Date | 2017-08-17 |
United States Patent
Application |
20170234691 |
Kind Code |
A1 |
Abramson; Dan ; et
al. |
August 17, 2017 |
INTERFACE SELECTION IN NAVIGATION GUIDANCE SYSTEMS
Abstract
Systems, methods, and related technologies are provided for
enhanced navigation instruction. In one implementation, a
likelihood of non-compliance by a user with the navigation
instruction can be determined with respect to a navigation
instruction, based on the likelihood of non-compliance by the user
with the navigation instruction. One or more interfaces at which to
provide a notification that corresponds to the navigation
instruction can be selected. The notification can be provided via
the selected interface(s). Various other technologies are also
disclosed.
Inventors: |
Abramson; Dan; (New York,
NY) ; Ir; Sean; (Tel Aviv, IL) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
Cellepathy Inc. |
Sammamish |
WA |
US |
|
|
Family ID: |
56497501 |
Appl. No.: |
15/583140 |
Filed: |
May 1, 2017 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
15089186 |
Apr 1, 2016 |
9638537 |
|
|
15583140 |
|
|
|
|
PCT/US2015/047054 |
Aug 26, 2015 |
|
|
|
15089186 |
|
|
|
|
14540932 |
Nov 13, 2014 |
|
|
|
15089186 |
|
|
|
|
PCT/US2014/052583 |
Aug 25, 2014 |
|
|
|
14540932 |
|
|
|
|
14540936 |
Nov 13, 2014 |
|
|
|
15089186 |
|
|
|
|
PCT/US2014/052583 |
Aug 25, 2014 |
|
|
|
14540936 |
|
|
|
|
14410082 |
Dec 21, 2014 |
|
|
|
PCT/IB2013/001582 |
Jun 21, 2013 |
|
|
|
15089186 |
|
|
|
|
14540954 |
Nov 13, 2014 |
|
|
|
15089186 |
|
|
|
|
PCT/US2014/052583 |
Aug 25, 2014 |
|
|
|
14540954 |
|
|
|
|
62042244 |
Aug 26, 2014 |
|
|
|
62047649 |
Sep 9, 2014 |
|
|
|
62042244 |
Aug 26, 2014 |
|
|
|
62047649 |
Sep 9, 2014 |
|
|
|
62063152 |
Oct 13, 2014 |
|
|
|
62066378 |
Oct 21, 2014 |
|
|
|
61869548 |
Aug 23, 2013 |
|
|
|
61875100 |
Sep 8, 2013 |
|
|
|
61896398 |
Oct 28, 2013 |
|
|
|
61949713 |
Mar 7, 2014 |
|
|
|
61951478 |
Mar 11, 2014 |
|
|
|
61973278 |
Apr 1, 2014 |
|
|
|
62042244 |
Aug 26, 2014 |
|
|
|
62047649 |
Sep 9, 2014 |
|
|
|
62063152 |
Oct 13, 2014 |
|
|
|
62066378 |
Oct 21, 2014 |
|
|
|
61869548 |
Aug 23, 2013 |
|
|
|
61875100 |
Sep 8, 2013 |
|
|
|
61896398 |
Oct 28, 2013 |
|
|
|
61949713 |
Mar 7, 2014 |
|
|
|
61951478 |
Mar 11, 2014 |
|
|
|
61973278 |
Apr 1, 2014 |
|
|
|
61662659 |
Jun 21, 2012 |
|
|
|
61676704 |
Jul 27, 2012 |
|
|
|
61694172 |
Aug 28, 2012 |
|
|
|
61694180 |
Aug 28, 2012 |
|
|
|
61704113 |
Sep 21, 2012 |
|
|
|
61731394 |
Nov 29, 2012 |
|
|
|
61732693 |
Dec 3, 2012 |
|
|
|
61793633 |
Mar 15, 2013 |
|
|
|
61815998 |
Apr 25, 2013 |
|
|
|
61825034 |
May 19, 2013 |
|
|
|
61825358 |
May 20, 2013 |
|
|
|
61829967 |
May 31, 2013 |
|
|
|
62063152 |
Oct 13, 2014 |
|
|
|
62066378 |
Oct 21, 2014 |
|
|
|
62042244 |
Aug 26, 2014 |
|
|
|
62047649 |
Sep 9, 2014 |
|
|
|
62063152 |
Oct 13, 2014 |
|
|
|
62066378 |
Oct 21, 2014 |
|
|
|
61869548 |
Aug 23, 2013 |
|
|
|
61875100 |
Sep 8, 2013 |
|
|
|
61896398 |
Oct 28, 2013 |
|
|
|
61949713 |
Mar 7, 2014 |
|
|
|
61951478 |
Mar 11, 2014 |
|
|
|
61973278 |
Apr 1, 2014 |
|
|
|
62092929 |
Dec 17, 2014 |
|
|
|
62128002 |
Mar 4, 2015 |
|
|
|
62194761 |
Jul 20, 2015 |
|
|
|
62265805 |
Dec 10, 2015 |
|
|
|
62291990 |
Feb 5, 2016 |
|
|
|
62303381 |
Mar 4, 2016 |
|
|
|
Current U.S.
Class: |
701/442 |
Current CPC
Class: |
G01C 21/3655 20130101;
G01C 21/3484 20130101; G01C 21/3641 20130101; G01C 21/3423
20130101; G01C 21/3453 20130101; G01C 21/343 20130101; G01C 21/3617
20130101; G01C 21/3629 20130101; G01C 21/3652 20130101; G08G
1/096844 20130101; G01C 21/3626 20130101 |
International
Class: |
G01C 21/36 20060101
G01C021/36; G01C 21/34 20060101 G01C021/34 |
Claims
1. (canceled)
2. A system comprising: a processing device; and a memory coupled
to the processing device and storing instructions that, when
executed by the processing device, cause the system to perform
operations comprising: receiving one or more routes previously
traveled by a user, each of the one or more routes comprising one
or more navigation instructions; comparing the one or more routes
previously traveled by the user with a navigation instruction
included in a route currently being traveled by the user; based on
a comparison of the one or more routes previously traveled by the
user with the navigation instruction included in the route
currently being traveled by the user, computing a likelihood of
non-compliance by the user with the navigation instruction; based
on a determination that the likelihood of non-compliance by the
user with the navigation instruction exceeds a defined threshold,
selecting at least one of: (i) a notification that corresponds to
the navigation instruction, or (ii) one or more interfaces at which
to provide the notification; and providing the notification based
on the selecting.
3. The system of claim 2, wherein receiving one or more routes
previously traveled by the user comprises receiving one or more
routes with respect to which the user was determined to be a
driver.
4. The system of claim 2, wherein receiving one or more routes
previously traveled by the user comprises receiving one or more
routes associated with a location that is within a defined
proximity to the current route's destination.
5. The system of claim 2, wherein receiving the one or more routes
previously traveled by the user comprises receiving one or more
routes previously traveled by the user using a vehicle type that
the user is determined to be using in the route currently being
traveled by the user.
6. The system of claim 2, wherein receiving one or more routes
previously traveled by the user comprises receiving one or more
routes previously traveled by the user that began at a time of day
that is within a defined time interval of a current time.
7. The system of claim 2, wherein computing a likelihood of
non-compliance comprises: determining a vehicle type in which the
user is currently traveling; and comparing the navigation
instruction with one or more actions performed by the user while
present at a location associated with the navigation instruction
while previously traveling via the determined vehicle type.
8. The system of claim 2, wherein computing a likelihood of
non-compliance comprises computing the likelihood of non-compliance
based on at least one of (a) a geographic location, (b) a speed, or
(c) a device state of a device associated with the user.
9. The system of claim 2, wherein computing a likelihood of
non-compliance comprises computing the likelihood of non-compliance
based on a device state of a device associated with the user.
10. The system of claim 2, wherein computing the likelihood of
non-compliance comprises: determining an in-vehicle role currently
associated with the user, the in-vehicle role comprising a driver
or passenger; and computing the likelihood of non-compliance based
on the in-vehicle role of the user in the one or more routes
previously traveled.
11. The system of claim 2, wherein computing the likelihood of
non-compliance comprises computing the likelihood of non-compliance
based on a chronological interval since one or more prior instances
of the user being present at a location associated with the
navigation instruction.
12. The system of claim 2, wherein the one or more routes
previously traveled by the user comprises one or more routes
previously traveled by the user during at least one of (a) a time
of day during which the user is currently traveling or (b) a day of
week during which the user is currently traveling.
13. The system of claim 2, wherein the memory further stores
instructions for causing the system to perform operations
comprising determining a cost to the user associated with
non-compliance with the navigation instruction, wherein the
selecting comprises selecting at least one of (i) the notification
or (ii) the one or more interfaces based on (a) the cost to the
user associated with non-compliance with the navigation instruction
and (b) the likelihood of non-compliance by the user with the
navigation instruction.
14. The system of claim 2, wherein computing the likelihood of
non-compliance comprises computing the likelihood of non-compliance
by the user with the navigation instruction based on (a) one or
more actions performed by one or more other users while present at
a location associated with the navigation instruction and (b) on
one or more actions performed by the user while present at a
location associated with the navigation instruction.
15. The system of claim 2, wherein the selecting comprises
selecting at least one of: (a) the content, (b) the voice, (c) the
volume, (d) the speed of speech, (e) the color, (f) the brightness,
(g) the visual design, or (h) the level of vibration of the
notification.
16. The system of claim 2, wherein the selecting comprises
suppressing the notification from being provided via at least one
of the one or more interfaces.
17. The system of claim 2, wherein the one or more interfaces
comprise at least one of: a display interface, an audio interface,
an illumination interface, or a haptic interface.
18. A method comprising: comparing a route previously traveled by a
user with a navigation instruction included in a route currently
being traveled by the user; based on a comparison of the route
previously traveled by the user with the navigation instruction
included in the route currently being traveled by the user,
computing a likelihood of non-compliance by the user with the
navigation instruction included in the route currently being
traveled by the user; based on a determination that the likelihood
of non-compliance by the user with the navigation instruction
included in the route currently being traveled by the user exceeds
a defined threshold, selecting an interface at which to provide a
notification; and providing the notification via the selected
interface.
19. The method of claim 18, wherein the route previously traveled
by the user comprises a navigation instruction previously provided
to the user.
20. The method of claim 19, wherein comparing the route previously
traveled by the user with the navigation instruction included in
the route currently being traveled by the user comprises comparing
the navigation instruction previously provided to the user with the
navigation instruction included in the route currently being
traveled by the user.
21. The method of claim 18, wherein the route previously traveled
by the user comprises an action performed by the user while present
at a location associated with the navigation instruction included
in the route currently being traveled by the user.
22. The method of claim 21, wherein comparing the route previously
traveled by the user with the navigation instruction included in
the route currently being traveled by the user comprises comparing
(a) the action performed by the user while present at the location
associated with the navigation instruction included in the route
currently being traveled by the user with (b) the navigation
instruction included in the route currently being traveled by the
user.
23. The method of claim 18, wherein computing the likelihood of
non-compliance comprises computing the likelihood of non-compliance
by the user with the navigation instruction included in the route
currently being traveled by the user based on an action performed
by another user with respect to a location associated with the
navigation instruction included in the route currently being
traveled by the user.
24. A non-transitory computer readable medium having instructions
stored thereon that, when executed by a processing device, cause
the processing device to perform operations comprising: comparing a
navigation instruction included in a route currently being traveled
by a first user with an action performed by a second user with
respect to a location associated with the navigation instruction;
based on a comparison of the navigation instruction with the action
performed by the second user with respect to the location
associated with the navigation instruction, computing a likelihood
of non-compliance by the first user with the navigation
instruction; based on a determination that the likelihood of
non-compliance by the first user with the navigation instruction
exceeds a defined threshold, selecting an interface at which to
provide a notification; and providing the notification via the
selected interface.
25. The computer-readable medium of claim 24, wherein the user has
at least one of (i) not performed the navigation instruction, (ii)
not been presented with the navigation instruction, or (iii) not
been present within a defined proximity of the location associated
with the navigation instruction, more than a defined number of
times within a defined chronological period.
26. The computer-readable medium of claim 24, wherein each of the
one or more other users are users that have at least one of (i) not
performed the navigation instruction, (ii) not been presented with
the navigation instruction, or (iii) not been present within a
defined proximity of the location associated with the navigation
instruction, more than a defined number of times within a defined
chronological period.
27. The computer-readable medium of claim 24, wherein at least a
defined percentage of the one or more other users did not comply
with the navigation instruction at the location.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation-in-part of International
Patent Application No. PCT/US2015/047054, filed Aug. 26, 2015.
[0002] International Patent Application No. PCT/US2015/047054 is
related to and claims the benefit of [0003] U.S. Patent Application
No. 62/042,244 filed Aug. 26, 2014; [0004] U.S. Patent Application
No. 62/047,649 filed Sep. 9, 2014; [0005] U.S. patent application
Ser. No. 14/540,932 filed Nov. 13, 2014 which claims the benefit of
U.S. Patent Application No. 62/042,244 filed Aug. 26, 2014, U.S.
Patent Application No. 62/047,649 filed Sep. 9, 2014, U.S. Patent
Application No. 62/063,152 filed Oct. 13, 2014 and U.S. Patent
Application No. 62/066,378 filed Oct. 21, 2014 and is a
continuation-in-part of International Patent Application No.
PCT/US2014/052583 filed Aug. 25, 2014, which claims the benefit of
U.S. Patent Application No. 61/869,548, filed Aug. 23, 2013, U.S.
Patent Application No. 61/875,100 filed Sep. 8, 2013, U.S. Patent
Application No. 61/896,398 filed Oct. 28, 2013, U.S. Patent
Application No. 61/949,713 filed Mar. 7, 2014, U.S. Patent
Application No. 61/951,478 filed Mar. 11, 2014, and U.S. Patent
Application No. 61/973,278 filed Apr. 1, 2014; [0006] U.S. patent
application Ser. No. 14/540,936 filed Nov. 13, 2014 which claims
the benefit of U.S. Patent Application No. 62/042,244 filed Aug.
26, 2014, U.S. Patent Application No. 62/047,649 filed Sep. 9,
2014, U.S. Patent Application No. 62/063,152 filed Oct. 13, 2014,
U.S. Patent Application No. 62/066,378 filed Oct. 21, 2014 and is a
continuation-in-part of International Patent Application No.
PCT/US2014/052583 filed Aug. 25, 2014, which claims the benefit of:
U.S. Patent Application No. 61/869,548 filed Aug. 23, 2013, U.S.
Patent Application No. 61/875,100 filed Sep. 8, 2013, U.S. Patent
Application No. 61/896,398 filed Oct. 28, 2013, U.S. Patent
Application No. 61/949,713 filed Mar. 7, 2014, U.S. Patent
Application No. 61/951,478 filed Mar. 11, 2014, and U.S. Patent
Application No. 61/973,278 filed Apr. 1, 2014; U.S. patent
application Ser. No. 14/706,954, filed May 7, 2015 (now U.S. Pat.
No. 9,175,967) which is a continuation of U.S. patent application
Ser. No. 14/540,951 filed Nov. 13, 2014, which claims the benefit
of U.S. Patent Application No. 62/042,244 filed Aug. 26, 2014, U.S.
Patent Application No. 62/047,649 filed Sep. 9, 2014, U.S. Patent
Application No. 62/063,152 filed Oct. 13, 2014 and U.S. Patent
Application No. 62/066,378 filed Oct. 21, 2014 and is also a
continuation-in-part of International Patent Application No.
PCT/IB2013/001582 filed Jun. 21, 2013, which claims the benefit of
U.S. Patent Application No. 61/662,659 filed Jun. 21, 2012, U.S.
Patent Application No. 61/676,704 filed Jul. 27, 2012, U.S. Patent
Application No. 61/694,172 filed Aug. 28, 2012, U.S. Patent
Application No. 61/694,180 filed Aug. 28, 2012, U.S. Patent
Application No. 61/704,113 filed Sep. 21, 2012, U.S. Patent
Application No. 61/731,394 filed Nov. 29, 2012, U.S. Patent
Application No. 61/732,693 filed Dec. 3, 2012, U.S. Patent
Application No. 61/793,633 filed Mar. 15, 2013, U.S. Patent
Application No. 61/815,998 filed Apr. 25, 2013, U.S. Patent
Application No. 61/825,034 filed May 19, 2013, U.S. Patent
Application No. 61/825,358 filed May 20, 2013, and U.S. Patent
Application No. 61/829,967 filed May 31, 2013, and is also a
continuation-in-part of International Patent Application No.
PCT/US2014/052583 filed Aug. 25, 2014, which claims the benefit of:
U.S. Patent Application No. 61/869,548 filed Aug. 23, 2013, U.S.
Patent Application No. 61/875,100 filed Sep. 8, 2013, U.S. Patent
Application No. 61/896,398 filed Oct. 28, 2013, U.S. Patent
Application No. 61/949,713 filed Mar. 7, 2014, U.S. Patent
Application No. 61/951,478 filed Mar. 11, 2014, and U.S. Patent
Application No. 61/973,278 filed Apr. 1, 2014; [0007] U.S. Patent
Application No. 62/063,152 filed Oct. 13, 2014; [0008] U.S. Patent
Application No. 62/066,378 filed Oct. 21, 2014; [0009] U.S. patent
application Ser. No. 14/540,951 filed Nov. 13, 2014 which claims
the benefit of U.S. Patent Application No. 62/042,244 filed Aug.
26, 2014, U.S. Patent Application No. 62/047,649 filed Sep. 9,
2014, U.S. Patent Application No. 62/063,152 filed Oct. 13, 2014
and U.S. Patent Application No. 62/066,378 filed Oct. 21, 2014 and
is also a continuation-in-part of International Patent Application
No. PCT/US2014/052583 filed Aug. 25, 2014, which claims the benefit
of: U.S. Patent Application No. 61/869,548, filed Aug. 23, 2013,
U.S. Patent Application No. 61/875,100 filed Sep. 8, 2013, U.S.
Patent Application No. 61/896,398 filed Oct. 28, 2013, U.S. Patent
Application No. 61/949,713 filed Mar. 7, 2014, U.S. Patent
Application No. 61/951,478 filed Mar. 11, 2014, and U.S. Patent
Application No. 61/973,278 filed Apr. 1, 2014; [0010] U.S. Patent
Application No. 62/092,929 filed Dec. 17, 2014; [0011] U.S. Patent
Application No. 62/128,002 filed Mar. 4, 2015; and [0012] U.S.
Patent Application No. 62/194,761 filed Jul. 20, 2015,
[0013] each of which is incorporated herein by reference in their
respective entireties.
[0014] This application is also related to and claims the benefit
of U.S. Patent Application No. 62/265,805, filed Dec. 10, 2015,
U.S. Patent Application No. 62/291,990, filed Feb. 5, 2016, and
U.S. Patent Application No. 62/303,381, filed Mar. 4, 2016, each of
which is incorporated herein by reference in their respective
entireties.
TECHNICAL FIELD
[0015] This disclosure relates generally to the field of mobile
device identification, and, in particular, to computer-implemented
systems and methods for enhanced navigation instruction.
BACKGROUND
[0016] There are approximately 4.6 billion cellular phone
subscriptions in the world over which it is estimated that more
than 2 trillion text (SMS) messages are sent annually. There are
also over 800 million transportation vehicles in the world. The
magnitude of these statistics indicates that cellular phone use in
vehicles is inevitable and is likely to remain quite common, unless
preventative measures are taken.
[0017] Drivers using a hand-held cellular phone or smartphone for
talking, text messaging, and/or for executing other applications or
`apps` while driving has become a problem of near-epidemic
proportions. Studies on distracted driving have shown that by
talking on a cell phone, a driver increases his/her risk of a crash
by a factor of four. Even worse, sending text messages increases a
driver's crash risk 23-fold. Additionally, studies have shown that
the temptation to use a cellular phone for texting, talking, and
other activities while operating a vehicle is not limited to
younger drivers adult drivers have been shown to text more often
than younger ones.
[0018] In response to this growing concern and danger, numerous
regulatory actions have been put in place to attempt to mitigate
such phone-based distractions to drivers. For example, in the
United States, thirty states have banned drivers of vehicles from
texting, and many have subsequently increased the penalties for
such violations. Driving-while-texting has also been banned
throughout Europe and many other countries around the world.
Additionally, talking on a hand-held cellular phone while driving a
vehicle has been banned in eight US states, and such cell phone use
has been banned in all of Europe and in many other countries.
[0019] The effectiveness of these laws alone, without an effective
means of enforcement, is questionable. Being that cellular phones
are generally small and discreet and drivers are frequently in
motion, it is often difficult for law enforcement personnel to
effectively police for such violations. Indeed, statistics show
that crashes arising from cellular phone-based distractions are
increasing as the popularity of such devices increases.
[0020] Given the easy accessibility of cell phones to drivers, many
drivers' apparent desire to operate their cellular phones while
driving, and the difficulties attendant with enforcing laws
prohibiting cellular phone use, it is likely that drivers will
continue to use cellular phones for texting, talking, and/or other
activities (e.g., playing games or running applications), for the
foreseeable future.
[0021] Moreover, it can be appreciated that the usage of mobile
devices in various locations and/or settings can be detrimental on
a number of levels. For instance, anecdotal evidence suggests that
the proliferation of mobile devices such as smartphones has
resulted in an increase of mobile device usage by students during
classes/lectures, serving to distract such students from properly
absorbing the material being taught. Additionally, many students
have become adept at using such devices discreetly, resulting in
many instances of cheating being facilitated through the use of
mobile devices.
[0022] It is with respect to these and other considerations that
the disclosure made herein is presented.
SUMMARY
[0023] Technologies are presented herein in support of systems and
methods, such as those directed to enhanced navigation instruction.
According to one aspect, a likelihood of non-compliance by a user
with the navigation instruction can be determined with respect to a
navigation instruction, based on the likelihood of non-compliance
by the user with the navigation instruction, one or more interfaces
at which to provide a notification that corresponds to the
navigation instruction can be selected, and provide the
notification via the selected interface. Various other technologies
are also disclosed.
[0024] These and other aspects, features, and advantages can be
appreciated from the accompanying description of certain
embodiments and the accompanying drawing figures.
BRIEF DESCRIPTION OF THE DRAWINGS
[0025] FIG. 1 is a high-level diagram illustrating an exemplary
configuration of an in-vehicle determination system;
[0026] FIGS. 2A-2C are flow diagrams showing routines that
illustrate broad aspects of methods for determining an in-vehicle
role of a user and/or an in-vehicle location of a mobile device in
accordance with various exemplary embodiments disclosed herein;
[0027] FIG. 3 is a flow diagram showing a routing that illustrates
a broad aspect of a method for enabling, disabling and/or modifying
at least a feature of a mobile device in accordance with at least
one exemplary embodiment disclosed herein;
[0028] FIG. 4 is a flow diagram showing a routine that illustrates
a broad aspect of a method for determining an in-vehicle role of a
user of a mobile device and/or a handheld state of a mobile device
and/or a vehicle class of a vehicle containing the first mobile
device using a central machine in accordance with at least one
exemplary embodiment disclosed herein;
[0029] FIG. 5 is a flow diagram showing a routine that illustrates
a broad aspect of a method for determining a vehicle class of a
vehicle using a mobile device in accordance with at least one
exemplary embodiment disclosed herein;
[0030] FIG. 6 is a flow diagram showing a routine that illustrates
a broad aspect of a method of determining a handheld state a mobile
device in accordance with at least one embodiment disclosed
herein;
[0031] FIG. 7 is a flow diagram showing a routine that illustrates
a broad aspect of a method of restricting operation of a mobile
device in accordance with at least one embodiment disclosed
herein;
[0032] FIG. 8 is a flow diagram showing a routine that illustrates
a broad aspect of another method of restricting operation of a
mobile device in accordance with at least one embodiment disclosed
herein;
[0033] FIG. 9A is a diagram depicting an exemplary relative
coordinate system of a mobile device;
[0034] FIG. 9B is a diagram depicting exemplary relative
accelerations and gyroscopic rotations of a mobile device:
[0035] FIG. 9C is a diagram depicting an exemplary gyroscopic sign
convention, as used herein;
[0036] FIG. 10 is a diagram depicting an exemplary coordinate
system used in relation to a vehicle:
[0037] FIGS. 11A-B are diagrams depicting a mobile device and its
respective exemplary coordinate system in various orientations in
relation to a car and its exemplary respective coordinate
system;
[0038] FIG. 12 is a flow diagram showing a routine that illustrates
a broad aspect of another method of restricting operation of a
mobile device in accordance with at least one embodiment disclosed
herein:
[0039] FIG. 13 is a flow diagram showing a routine that illustrates
a broad aspect of another method of restricting operation of a
mobile device in accordance with at least one embodiment disclosed
herein;
[0040] FIG. 14 is a flow diagram showing a routine that illustrates
a broad aspect of a method for orienting a coordinate system of a
mobile device in accordance with at least one embodiment disclosed
herein;
[0041] FIG. 15 is a flow diagram is described showing a routine
that illustrates a broad aspect of a method for selectively
restricting an operation of a mobile device in accordance with at
least one embodiment disclosed herein;
[0042] FIG. 15A is an exemplary lock screen, in accordance with at
least one embodiment disclosed herein;
[0043] FIG. 15B is an exemplary visual capture that can be
processed to identify a presence of a fastened seatbelt, in
accordance with at least one embodiment disclosed herein;
[0044] FIG. 15C depicts the "required orientation" of a mobile
device, in accordance with at least one embodiment disclosed
herein;
[0045] FIG. 15D depicts an exemplary screenshot showing visual
feedback that can be provided to a user during authentication in
accordance with at least one embodiment disclosed herein;
[0046] FIG. 15E depicts an exemplary screenshot showing visual
feedback that can be provided to a user during authentication in
accordance with at least one embodiment disclosed herein;
[0047] FIG. 15F depicts a mobile device, and specifically the
locations of the forward-facing and rear-facing cameras of the
mobile device, in accordance with at least one embodiment disclosed
herein;
[0048] FIG. 15G is an illustration depicting a 90 degree angle of
incidence between the user's eyes/gaze/face/smile etc, and a mobile
device, in accordance with at least one embodiment disclosed
herein;
[0049] FIGS. 15H-T depict exemplary aspects of an authentication
sequence in accordance with at least one embodiment disclosed
herein;
[0050] FIG. 16 is a flow diagram showing a routine that illustrates
a broad aspect of a method for selectively restricting operation of
a mobile device in accordance with at least one embodiment
disclosed herein:
[0051] FIG. 17 is a flow diagram showing a routine that illustrates
a broad aspect of a method for authenticating an in vehicle role of
a user of a mobile device and/or modifying a restriction of a
mobile device in accordance with at least one embodiment disclosed
herein;
[0052] FIG. 17A is a flow diagram showing particular aspects of the
validation step of FIG. 17, in accordance with at least one
embodiment disclosed herein;
[0053] FIG. 17B is an illustration depicting an orientation of a
mobile device in relation to a typical line of sight of the driver
in a moving car, in accordance with at least one embodiment
disclosed herein,
[0054] FIG. 18 is a flow diagram is described showing a routine
that illustrates a broad aspect of a method for selectively
restricting an operation of and/or selectively modifying a
restriction employed at mobile device, in accordance with at least
one embodiment disclosed herein;
[0055] FIG. 19 depicts an exemplary determination of orientation of
a device based on visual capture(s) in accordance with at least one
embodiment disclosed herein;
[0056] FIG. 20 depicts the orientation and/or location of mobile
device in order to provide the requisite stability described
herein, in accordance with at least one embodiment disclosed
herein;
[0057] FIG. 21 is a flow diagram showing a routine that illustrates
a broad aspect of a method for selectively restricting a mobile
device, in accordance with at least one embodiment disclosed
herein;
[0058] FIG. 22 is a flow diagram showing a routine that illustrates
a broad aspect of a method for eliciting an authentication at a
mobile device, in accordance with at least one embodiment disclosed
herein;
[0059] FIG. 23 is a flow diagram showing a routine that illustrates
a broad aspect of a method for eliciting an authentication at a
mobile device, in accordance with at least one embodiment disclosed
herein;
[0060] FIG. 24 is a flow diagram showing a routine that illustrates
a broad aspect of a method for selectively modifying a restriction
employed at a mobile device, in accordance with at least one
embodiment disclosed herein;
[0061] FIG. 25 is a flow diagram showing a routine that illustrates
a broad aspect of a method for selectively projecting outputs at a
mobile device, in accordance with at least one embodiment disclosed
herein;
[0062] FIG. 26 is a flow diagram showing a routine that illustrates
a broad aspect of a method for selectively configuring overt
operation of a mobile device, in accordance with at least one
embodiment disclosed herein;
[0063] FIG. 27 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0064] FIG. 28 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein:
[0065] FIG. 29 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0066] FIG. 30 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0067] FIG. 31 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0068] FIG. 32 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein:
[0069] FIG. 33 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein:
[0070] FIG. 34 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0071] FIG. 35 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0072] FIG. 36 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein:
[0073] FIG. 37 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein:
[0074] FIG. 38 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein:
[0075] FIG. 39 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0076] FIG. 40 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0077] FIG. 41 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0078] FIG. 42 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0079] FIG. 43 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0080] FIG. 44 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0081] FIG. 45 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0082] FIG. 46 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0083] FIG. 47 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0084] FIG. 48 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0085] FIG. 49 depicts an exemplary implementation of one or more
aspects described herein;
[0086] FIG. 50 depicts an exemplary implementation of one or more
aspects described herein;
[0087] FIG. 51 depicts an exemplary implementation of one or more
aspects described herein;
[0088] FIG. 52 depicts an exemplary implementation of one or more
aspects described herein;
[0089] FIG. 53 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0090] FIG. 54 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0091] FIG. 55 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0092] FIG. 56 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0093] FIG. 57 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0094] FIG. 58 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0095] FIG. 59 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0096] FIG. 60 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0097] FIG. 61 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0098] FIG. 62 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0099] FIG. 63 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein: FIG. 64 is a flow
diagram showing a routine that illustrates aspects of one or more
methods, such as those described in relation to one or more
embodiments described herein;
[0100] FIG. 65 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0101] FIG. 66 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0102] FIG. 67 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0103] FIG. 68 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0104] FIG. 69 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0105] FIG. 70 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0106] FIG. 71 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0107] FIG. 72 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0108] FIG. 73 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0109] FIG. 74 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0110] FIG. 75 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0111] FIG. 76 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0112] FIG. 77 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein;
[0113] FIG. 78 depicts an exemplary implementation of one or more
aspects described herein;
[0114] FIG. 79 depicts an exemplary implementation of one or more
aspects described herein;
[0115] FIG. 80 depicts an exemplary implementation of one or more
aspects described herein;
[0116] FIG. 81 depicts an exemplary implementation of one or more
aspects described herein;
[0117] FIG. 82 depicts an exemplary implementation of one or more
aspects described herein;
[0118] FIG. 83 depicts an exemplary implementation of one or more
aspects described herein;
[0119] FIG. 84 depicts an exemplary implementation of one or more
aspects described herein;
[0120] FIG. 85 depicts an exemplary implementation of one or more
aspects described herein;
[0121] FIGS. 86A-C depict exemplary implementations of one or more
aspects described herein;
[0122] FIGS. 87A-E depict exemplary implementations of one or more
aspects described herein:
[0123] FIGS. 88A-E depict exemplary implementations of one or more
aspects described herein:
[0124] FIGS. 89A-C depict exemplary implementations of one or more
aspects described herein:
[0125] FIGS. 90A-E depict exemplary implementations of one or more
aspects described herein;
[0126] FIGS. 91A-C depict exemplary implementations of one or more
aspects described herein;
[0127] FIGS. 92A-E depict exemplary implementations of one or more
aspects described herein;
[0128] FIGS. 93A-D depict exemplary implementations of one or more
aspects described herein:
[0129] FIGS. 94A-D depict exemplary implementations of one or more
aspects described herein;
[0130] FIGS. 95A-C depict exemplary implementations of one or more
aspects described herein;
[0131] FIGS. 96A-C depict exemplary implementations of one or more
aspects described herein;
[0132] FIG. 97 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein:
[0133] FIG. 98 is a flow diagram showing a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein:
[0134] FIGS. 99A-B depict exemplary implementations of one or more
aspects described herein;
[0135] FIGS. 100A-B depict exemplary implementations of one or more
aspects described herein;
[0136] FIG. 101 depicts exemplary implementations of one or more
aspects described herein:
[0137] FIGS. 102A-B depict exemplary implementations of one or more
aspects described herein;
[0138] FIGS. 103A-B depict exemplary implementations of one or more
aspects described herein;
[0139] FIGS. 104-129 are respective flow diagrams showing routines,
each of which illustrates respective aspects of one or more
methods, such as those described in relation to one or more
embodiments described herein; and
[0140] FIGS. 130-133 depict exemplary implementations of one or
more aspects described herein.
DETAILED DESCRIPTION OF CERTAIN EMBODIMENTS
[0141] By way of overview and introduction, the present disclosure
details systems and methods for determining various user roles and
actions as they relate to the operation of a mobile device within a
vehicle such as a car. Being that the usage of mobile devices while
driving has been identified as a significant cause of car crashes,
in addition to laws that have been enacted preventing certain use
of mobile phones while driving, various systems and methods are
provided herein which serve to identify the user of a particular
mobile device (for instance, with respect to their role as a driver
or passenger in the car), to identify various aspects of the usage
of the device itself (for instance that the device is executing a
text messaging application), and to identify instances when a
mobile device deviates from its expected or regular operation.
[0142] As will be described in detail herein, many of these
identifications and/or determinations are made possible through
various sensors, components, and elements that are integrated
within and/or accessible to a mobile device. As is well known to
those of ordinary skill in the art, contemporary smartphones
incorporate a plethora of sensors, including accelerometers, GPS
receivers, and gyroscopes. Various inputs and/or notifications can
be received from these sensors, components, and elements, and can
further be processed in a number of ways in order to arrive at
various conclusions regarding, among others, the user of the mobile
device (such as whether the user is a driver or passenger in a car)
and/or the status of the mobile device itself, and various
probabilities can be ascribed to the conclusions. The operation of
the mobile device can further be adjusted based on such
conclusions, for example, disabling or limiting the operation of a
mobile device upon reaching a likely conclusion that the device is
being operated by a user who is driving a car.
[0143] It will also be appreciated that the systems and methods
disclosed herein can be arranged and/or deployed across a number of
scenarios. In one scenario, the systems and methods can be
principally employed at a mobile device itself, such as in the form
of a mobile application or `app` executing on the mobile device. In
other scenarios, a central machine such as a server in
communication with a mobile device can employ the present systems
and methods. Such a centralized architecture can enable efficient
processing and use of a larger database of user determination
characteristics, eliminates power constraints and enables third
parties, such as law-enforcement agencies and/or insurance
companies, to easily monitor and/or adjust the operation of various
mobile devices.
[0144] Moreover, it can be appreciated that today, over 70% of
teenagers in the developed world own mobile devices, and most bring
those devices to school every day. The ability to use these devices
clandestinely in class results in student distraction, cheating on
tests, and frequent disruptions of the learning environment. The
inappropriate use of mobile devices in class has become one of the
major problems in western educational systems today, affecting many
millions of students and teachers in a very direct way.
[0145] The systems and methods described herein define a solution
that renders the surreptitious use of mobile devices in school
impossible, directly improving student attention and learning, and
empowering educators to decide how (if at all) they may be used in
classrooms. In doing so, the present systems and methods can limit
distraction without interfering with legitimate device use, which
until now has been a major barrier to the adoption of other
proposed solutions.
[0146] The following detailed description is directed to systems
and methods for determining an in-vehicle role of a user of a
mobile device, selectively restricting a mobile device, and/or
configuring various operations of a mobile device. The referenced
systems and methods are now described more fully with reference to
the accompanying drawings, in which one or more illustrated
embodiments and/or arrangements of the systems and methods are
shown. The systems and methods are not limited in any way to the
illustrated embodiments and/or arrangements as the illustrated
embodiments and/or arrangements described below are merely
exemplary of the systems and methods, which can be embodied in
various forms, as appreciated by one skilled in the art. Therefore,
it is to be understood that any structural and functional details
disclosed herein are not to be interpreted as limiting the systems
and methods, but rather are provided as a representative embodiment
and/or arrangement for teaching one skilled in the art one or more
ways to implement the systems and methods. Accordingly, aspects of
the present systems and methods can take the form of an entirely
hardware embodiment, an entirely software embodiment (including
firmware, resident software, micro-code, etc.) or an embodiment
combining software and hardware. One of skill in the art can
appreciate that a software process can be transformed into an
equivalent hardware structure, and a hardware structure can itself
be transformed into an equivalent software process. Thus, the
selection of a hardware implementation versus a software
implementation is one of design choice and left to the implementer.
Furthermore, the terms and phrases used herein are not intended to
be limiting, but rather are to provide an understandable
description of the systems and methods.
[0147] The terms "determining," "determine," and "determination" as
used herein are intended to encompass the determination,
identification, computation, calculation, and/or selection, with
any degree of certainty or precision, and/or any other such
operation, function, or action as it relates to the determination,
identification, and/or selection of a user of a device such as a
mobile device, an in-vehicle role of a user of a device such as a
mobile device, a vehicle or vehicle model/type/class, a device or
device model/type/class (e.g., handheld or wired), an operation
and/or operation state of a device, and/or any other such similar
or related operation, function, or action.
[0148] The terms "identifying event" and "identifying events" as
used herein are intended to encompass one or more occurrences or
instances of events, stimuli, or phenomena, including explicitly
the perceived coordinated or correlated occurrence or instance of
two or more such events, stimuli, and/or phenomena, such as those
originating at one or more devices. It should be understood that
the referenced occurrences or instances of events, stimuli, or
phenomena include single/singular events, stimuli, or phenomena as
well as a set or series of multiple events, stimuli, or phenomena
over a period of time. In addition the referenced occurrences or
instances of events, stimuli, or phenomena should also be
understood to include one or more coordinations or correlations of
the occurrence or instance of any number of such events, stimuli,
and/or phenomena over any period of time.
[0149] The terms "user interface" and "user interfaces" as used
herein are intended to encompass one or more input devices,
software modules executing in conjunction with one or more
operating systems and/or input devices, or any other such similar
or related device, accessory, apparatus, and/or software
application or module that enable or facilitate input and/or
interaction with a computing device.
[0150] The terms "detect," "detected," "detects." "detecting,"
"detection." and "detections" as used herein are intended to
encompass the detection, measurement, and/or receipt, with any
degree of certainty or precision, one or more occurrences or
instances of events, stimuli, phenomena, or any other such similar
or related inputs that are detectable through one or more devices,
implements or apparatuses.
[0151] The term "processing" as used herein is intended to
encompass comparing, analyzing, weighing, correlating and/or
computing one or more data items, elements, or structures,
individually or in conjunction with one another, using a digital
processor in conjunction with one or more software modules and/or
applications.
[0152] The term "communicatively coordinated" as used herein is
intended to encompass direct or indirect communication between two
or more devices, accessories, and/or apparatuses, expressly
including communications between a first device and a central
machine, wherein the central machine is in turn in communication at
some interval with a second device. In such a scenario, though the
first device and the second device are not, necessarily, in direct
or indirect communication with one another, it can be said that
they are communicatively coordinated with one another by virtue of
their mutual connection to the referenced central machine.
[0153] The terms "feature" and "features" as used herein are
intended to encompass operations, functions, activities, or any
other such similar or related actions, whether automated/automatic
or user-initiated, that occur at or in conjunction with one or more
devices, machines, applications, and/or apparatuses.
[0154] The terms "notification" and "notifications" as used herein
are intended to encompass one or more messages, transmissions,
and/or data packets, such as electronic messages, which contain one
or more data elements (such as inputs) related or relevant to one
or more of the steps, operations, and/or processes disclosed
herein. An illustration of one such notification can be one or more
electronic messages which contain information or data reflecting a
first input from an accelerometer, a gyroscope, and/or a GPS
receiver at a mobile device. Such inputs can be grouped together
into one or more notifications, and these notifications can in turn
be transmitted to and/or received by other devices (such as a
central machine) where they can be further processed.
[0155] The terms "vehicle class" and "vehicle classes" as used
herein are intended to encompass one or more types, categories,
and/or models of vehicle. By way of example, airplanes, trains,
automobiles, motorcycles, and boats can all be said to be different
vehicle classes. By way of further example, sub-categories within a
given vehicle class can also be understood to be different vehicle
classes. Thus, the automobile vehicle class can be further
sub-divided into further vehicle classes such as sedans, vans,
sport utility vehicles (SUVs), and convertibles. These
sub-categories can also be said to be vehicle classes within the
meaning of the term as used herein.
[0156] The terms "operation state" and "operation states" as used
herein are intended to encompass the states of a device, including
any and all operations, functions, capacities, and/or capabilities,
including, explicitly, a set and/or series of any number of
operations, functions, capacities, and/or capabilities, that can be
achieved by and/or in conjunction with a device, such as a mobile
device. Examples of an operation state include, but are not limited
to: an execution of an application (such as an internet browser
application) at a mobile device, a transmission of a notification
(such as sending a text message or email message), a capacity to
receive text messages, and a capability to type text using a
keyboard. Accordingly, the various transformations, adjustments,
and/or modifications disclosed herein that relate to an operation
state and/or operation states should be understood to refer to such
transformations, adjustments, and/or modifications that pertain to
practically any and all operations, functions, capacities, and/or
capabilities that can be achieved by and/or in conjunction with a
device, such as a mobile device.
[0157] The terms "handheld state" and "handheld states" as used
herein are intended to encompass one or more states of a mobile
device with respect to whether or not a user is in direct or
indirect physical contact with the device. For example, the
handheld state of a device in instances where a user holds the
device in his/her hand, carries the device in his/her pocket,
and/or balances the device on his/her knee can all be said to be
"handheld." By way of further example, the handheld state of a
device in instances where the device is positioned in a dock or
cradle, and/or is otherwise not in direct or indirect contact with
a user can be said to be "non-handheld."
[0158] The terms "operational capacity" and "operational
capacities" as used herein are intended to encompass one or more
operation states of a mobile device, particularly with respect to a
central machine such as a server. By way of example, an operational
capacity of a mobile device can be a voice or data connection that
is provided to a mobile device through a central machine, such as
that of a voice/data service provider. Accordingly, it can be
appreciated that a transformation, modification, and/or adjustment
of such an operational capacity preferably entails such a
transformation, modification, and/or adjustment that is initiated
and/or effected by a central machine, preferably in relation to a
mobile device. For example, a central machine can transmit an
instruction and/or notification to a mobile device, such
instruction/notification directing the transformation,
modification, and/or adjustment be implemented at the mobile
device. By way of further example, a central machine can implement
a transformation, modification, and/or adjustment at the central
machine itself, wherein such a transformation, modification, and/or
adjustment--such as the stopping of voice and/or data connections
to a mobile device--ultimately effect the functionality of the
device itself. In both such cases it can be said that the central
machine has transformed, modified, and/or adjusted the operational
capacity of the mobile device.
[0159] The terms "user" and "users" as used herein are intended to
encompass one or more individuals, persons, and/or entities whose
presence a device or machine can preferably be directly or
indirectly aware. It should be understood that while in certain
scenarios a user can interact with a device, in other scenarios a
particular individual, person, and/or entity can be said to be a
"user" within the context of the present disclosure, despite not
interacting with a particular device.
[0160] The terms "tactile sensor" and "tactile sensor(s)" as used
herein are intended to encompass one or more buttons, touchscreens,
and/or components that enable a user to interact with a device in a
tactile fashion. Examples of such tactile sensors include, but are
not limited to, buttons (such as those that comprise a keyboard),
switches, as well as touch screen displays (such as capacitive and
resistive displays) which both display information and allow the
tactile interaction with such information. It should be further
understood that such tactile sensors are preferably further capable
of perceiving a plurality of simultaneous tactile interactions.
Examples of such functionality include multitouch technologies, as
are known to those of ordinary skill in the art.
[0161] The terms "visual capture" and "visual captures" as used
herein are intended to encompass one or more operations, functions,
and/or actions that relate to the optical perception and/or
documentation of one or more visual items, elements, and/or
phenomena.
[0162] Examples of such visual captures include, but are not
limited to, photographs, images, videos, and/or any other such
method of visual perception and/or documentation. Accordingly, it
can be appreciated that certain visual captures correspond to a
single instance (such as a photograph) while other visual captures
correspond to multiple instances (such as a series of photographs
and/or a video).
[0163] The term "in-vehicle role indicator" as used herein is
intended to encompass one or more items, elements, and/or
indicators that relate to one or more aspects associated with
and/or corresponding to the in-vehicle role of a user in a vehicle
(e.g., whether a user is or is not a driver, is or is not a
passenger, etc.). For example, one such in-vehicle role indicator
is identifying in a picture of two hands of a driver grasping the
steering wheel of a vehicle. Using one or more optical recognition
methods, such as those known to one of ordinary skill in the art,
one or more images and/or videos can be processed in order to
identify the presence of two hands grasping a steering wheel, thus
indicating that a particular vehicle is being operated by a driver
using two hands and therefore it can be reasonable concluded that
the user who took such an image is not the driver. By way of
further example, another such in-vehicle role indicator can be
capturing a picture that can be processed to identify that a
seatbelt extends from the right shoulder to left thigh of the
wearer. Such an identification also reasonably suggests that the
wearer is not a driver (as the seatbelt of a driver traditionally
extends from the left shoulder to the right thigh).
[0164] It should be further understood that while the various
computing devices and machines referenced herein, including but not
limited to the first mobile device, the second mobile device, the
central machine, or any other such similar or related devices or
machines are referred to herein in a as individual/single devices
and/or machines, in certain arrangements the referenced devices and
machines, and their associated and/or accompanying operations,
features, and/or functionalities can be arranged or otherwise
employed across any number of devices and/or machines, such as over
a network connection, as is known to those of skill in the art.
[0165] In addition, it should be understood that while the term
"input" is used herein in the singular form, this is merely for the
sake of clarity and convention. However, the referenced terms
should be understood to encompass both singular inputs as well as a
plurality (two or more) inputs, such as a set of inputs.
[0166] It should be understood that the terms "lateral
acceleration," "x-acceleration," and "x-axis acceleration" as used
herein are used interchangeably, and should thus be understood to
possess the same meaning and connotation. Additionally, the terms
"forward acceleration," "y-acceleration," and "y-axis acceleration"
as used herein are used interchangeably and should thus be
understood to possess the same meaning and connotation. In
addition, the terms "upward acceleration," "z-axis acceleration,"
"z-acceleration" as used herein are used interchangeably and should
thus be understood to possess the same meaning and connotation.
[0167] It should also be understood that the terms "yaw."
"gyroscopic yaw," "angular velocity around the z-axis," and
"rotation around the z-axis" as used herein are used
interchangeably, and should thus be understood to possess the same
meaning and connotation. In addition, the terms "roll," "gyroscopic
roll," "angular velocity around the y-axis," and "rotation around
the y-axis," as used herein are used interchangeably, and should
thus be understood to possess the same meaning and connotation.
Additionally, the terms "pitch." "gyroscopic pitch," "angular
velocity around the x-axis," and "rotation around the x-axis" as
used herein are used interchangeably, and should thus be understood
to possess the same meaning and connotation.
[0168] An exemplary computer system is shown as a block diagram in
FIG. 1 which is a high-level diagram illustrating an exemplary
configuration of a determination system 100. In one arrangement,
mobile device 105 can be a portable computing device such as a
mobile phone, smartphone, or PDA. In other arrangements, mobile
device 105 can be a tablet computer, a laptop computer, a personal
computer, or an in-vehicle computer (e.g., ECU/OBD) though it
should be understood that mobile device 105 of determination system
100 can be practically any computing device capable of embodying
the systems and/or methods described herein.
[0169] Mobile device 105 of determination system 100 includes a
control circuit 140 which is operatively connected to various
hardware and software components that serve to enable operation of
the determination system 100. The control circuit 140 is
operatively connected to a processor 110 and a memory 120.
Processor 110 serves to execute instructions for software that can
be loaded into memory 120. Processor 110 can be a number of
processors, a multi-processor core, or some other type of
processor, depending on the particular implementation. Further,
processor 110 can be implemented using a number of heterogeneous
processor systems in which a main processor is present with
secondary processors on a single chip. As another illustrative
example, processor 110 can be a symmetric multi-processor system
containing multiple processors of the same type.
[0170] Preferably, memory 120 and/or storage 190 are accessible by
processor 110, thereby enabling processor 110 to receive and
execute instructions stored on memory 120 and/or on storage 190.
Memory 120 can be, for example, a random access memory (RAM) or any
other suitable volatile or non-volatile computer readable storage
medium. In addition, memory 120 can be fixed or removable. Storage
190 can take various forms, depending on the particular
implementation. For example, storage 190 can contain one or more
components or devices. For example, storage 190 can be a hard
drive, a flash memory, a rewritable optical disk, a rewritable
magnetic tape, or some combination of the above. Storage 190 also
can be fixed or removable.
[0171] One or more software modules 130 are encoded in storage 190
and/or in memory 120. The software modules 130 can comprise one or
more software programs or applications having computer program code
or a set of instructions executed in processor 110. Such computer
program code or instructions for carrying out operations for
aspects of the systems and methods disclosed herein can be written
in any combination of one or more programming languages, including
an object oriented programming language such as Java, Smalltalk,
C++ or the like and conventional procedural programming languages,
such as the "C" programming language or similar programming
languages. The program code can execute entirely on the mobile
device 105, partly on mobile device 105, as a stand-alone software
package, partly on mobile device 105 and partly on a remote
computer/device or entirely on the remote computer/device or
server. In the latter scenario, the remote computer can be
connected to mobile device 105 through any type of network,
including a local area network (LAN) or a wide area network (WAN),
or the connection can be made to an external computer (for example,
through the Internet using an Internet Service Provider).
[0172] Software modules 130, including program code/instructions,
are located in a functional form on one or more computer readable
storage devices (such as memory 120 and/or storage 190) that can be
selectively removable. The software modules 130 can be loaded onto
or transferred to mobile 105 for execution by processor 110. It can
also be said that the program code of software modules 130 and one
or more computer readable storage devices (such as memory 120
and/or storage 190) form a computer program product.
[0173] It should be understood that in some illustrative
embodiments, one or more of software modules 130 can be downloaded
over a network to storage 190 from another device or system via
communication interface 150 for use within determination system
100. For instance, program code stored in a computer readable
storage device in a server can be downloaded over a network from
the server to determination system 100.
[0174] Preferably, included among the software modules 130 is a
determination module 170 that is executed by processor 110.
[0175] During execution of the software modules 130, and
specifically the determination module 170, the processor 110
configures the control circuit 140 to determine an in-vehicle role
of a user of the mobile device 105, as will be described in greater
detail below. It should be understood that while software modules
130 and/or determination module 170 can be embodied in any number
of computer executable formats, preferably software modules 130
and/or determination module 170 comprise one or more applications
or `apps` that are configured to be executed at mobile device 105
and/or in relation to mobile device 105. In other arrangements,
software modules 130 and/or determination module 170 are
incorporated and/or integrated within operating system 176.
Furthermore, in certain arrangements, software modules 130 and/or
determination module 170 can be configured to execute at the
request or selection of a user of mobile device 105 (or any other
such user having the ability to execute a program in relation to
mobile device 105, such as a network administrator), while in other
arrangements mobile device 105 can be configured to automatically
execute software modules 130 and/or determination module 170,
without requiring an affirmative request to execute. The advantages
of such an automatic arrangement can be appreciated in context of a
regulatory scheme that mandates or recommends that software modules
130 and/or determination module 170 be executed by a mobile device
105 some or all of the time, in furtherance of a campaign to
improve driver safety. It should also be noted that while FIG. 1
depicts memory 120 oriented on control circuit 140, in an alternate
arrangement, memory 120 can be operatively connected to the control
circuit 140. In addition, it should be noted that other software
modules (such as user interface 172 and operating system 176) and
other information and/or data relevant to the operation of the
present systems and methods (such as database 174) can also be
stored on storage 190, as will be discussed in greater detail
below.
[0176] A communication interface 150 is also operatively connected
to control circuit 140. Communication interface 150 can be any
interface that enables communication between the mobile device 105
and external devices, machines and/or elements. Preferably,
communication interface 150 includes, but is not limited to, a
modem, a Network Interface Card (NIC), an integrated network
interface, a radio frequency transmitter/receiver (e.g., Bluetooth,
cellular, NFC), a satellite communication transmitter/receiver, an
infrared port, a USB connection, or any other such interfaces for
connecting mobile device 105 to other computing devices and/or
communication networks such as the Internet. Such connections can
include a wired connection or a wireless connection (e.g. 802.11)
though it should be understood that communication interface 150 can
be practically any interface that enables communication to/from the
control circuit 140.
[0177] At various points during the operation of determination
system 100, mobile device 105 can communicate with one or more
mobile devices 160A-N (collectively mobile devices 160). The mobile
devices 160 transmit and/or receive data to/from the mobile device
105, thereby preferably enhancing the operation of the
determination system 100, as will be described in greater detail
below. It should be understood that mobile devices 160 can be in
direct communication with mobile device 105, indirect communication
with mobile device 105, and/or can be communicatively coordinated
with mobile device 105, as will be described in greater detail
below. While mobile device 160 can be practically any device
capable of communication with mobile machine 105, in the preferred
embodiment mobile device 160 is a handheld/portable computer,
smartphone, personal digital assistant (PDA), tablet computer,
and/or any portable device that is capable of transmitting and
receiving data to/from mobile device 105. It should also be
appreciated that in many arrangements, mobile device 160 will be
substantially identical, from a structural and functional
perspective, to mobile device 105.
[0178] It should be noted that while the FIG. 1 depicts the
determination system 100 with respect to mobile device 160A and
mobile device 160N, it should be understood that any number of
mobile devices 160 can interact with determination system 100 in
the manner described herein.
[0179] Also preferably connected to and/or in communication with
control circuit 140 are one or more sensors 145A-145N (generically
sensors 145). Generally, sensors 145 are various components,
devices, and/or receivers that are preferably incorporated within
and/or in communication with mobile device 105. Sensors 145
preferably detect one or more stimuli, phenomena, or any other such
inputs, as will be described in greater detail below. Examples of
such sensors 145 include, but are not limited to, an accelerometer
145A, a gyroscope 145B, a GPS receiver 145C, a microphone 145D, a
magnetometer 145E, a camera 145F, a light sensor 145G, a
temperature sensor 145H, an altitude sensor 145I, a pressure sensor
145J, a proximity sensor 145K, a near-field communication (NFC)
device 145L, a compass 145M, and a tactile sensor 145N. As will be
described in greater detail below, mobile device 105 can preferably
receive one or more inputs from one or more sensors 145 in order to
determine an in-vehicle role of a user of mobile device 105 and/or
to selectively restrict the operation of the mobile device.
[0180] In certain arrangements, one or more external databases
and/or servers 162 are also in communication with mobile device
105. As will be described in greater detail below, database/server
162 is preferably a computing and/or storage device, and/or a
plurality of computing and/or storage devices, that contain(s)
information, such as determination characteristics, that can be
relevant to the determination of an in-vehicle role of a user of
mobile device 105.
[0181] Additionally, in certain arrangements a vehicle data system
164, such as an on board diagnostic (OBD) computer or computing
device (e.g., OBD-I, OBD-II), an engine control unit (ECU), a roll
system, an airbag system, a seat-weight sensor system, a seat-belt
sensor system, and/or an anti-lock braking system (ABS) can also be
in communication with mobile device 105. Vehicle data system 164
preferably provides data and/or information from the vehicle itself
that can also be relevant to various determinations disclosed
herein, such as the determination of an in-vehicle role of a user
of mobile device 105, as will be described in greater detail
below.
[0182] At this juncture it should be noted that in certain
arrangements, such as the one depicted in FIG. 1, mobile devices
160, database/server 162, and/or vehicle data system 164 can be in
periodic or ongoing communication with mobile device 105 thorough a
computer network such as the Internet 166. Although not depicted in
FIG. 1, it should be understood that in certain other arrangements,
mobile devices 160, database/server 162, and/or vehicle data system
164 can be in periodic or ongoing direct communication with mobile
device 105, such as through communications interface 150, thus not
requiring the presence of a network (such as the Internet 166) in
order to initiate and maintain communications.
[0183] In the description that follows, certain embodiments and/or
arrangements are described with reference to acts and symbolic
representations of operations that are performed by one or more
devices, such as the determination system 100 of FIG. 1. As such,
it will be understood that such acts and operations, which are at
times referred to as being computer-executed, include the
manipulation by the processor of the computer of electrical signals
representing data in a structured form. This manipulation
transforms the data and/or maintains them at locations in the
memory system of the computer, which reconfigures and/or otherwise
alters the operation of the computer in a manner understood by
those skilled in the art. The data structures in which data is
maintained are physical locations of the memory that have
particular properties defined by the format of the data. However,
while an embodiment is being described in the foregoing context, it
is not meant to provide architectural limitations to the manner in
which different embodiments can be implemented. The different
illustrative embodiments can be implemented in a system including
components in addition to or in place of those illustrated for the
determination system 100. Other components shown in FIG. 1 can be
varied from the illustrative examples shown. The different
embodiments can be implemented using any hardware device or system
capable of running program code. In another illustrative example,
determination system 100 can take the form of a hardware unit that
has circuits that are manufactured or configured for a particular
use. This type of hardware can perform operations without needing
program code to be loaded into a memory from a computer readable
storage device to be configured to perform the operations.
[0184] For example, mobile device 105 can take the form of a
circuit system, an application specific integrated circuit (ASIC),
a programmable logic device, or some other suitable type of
hardware configured to perform a number of operations. With a
programmable logic device, the device is configured to perform any
number of operations. The device can be reconfigured at a later
time or can be permanently configured to perform any number of
operations. Examples of programmable logic devices include, for
example, a programmable logic array, programmable array logic, a
field programmable logic array, a field programmable gate array,
and other suitable hardware devices. With this type of
implementation, software modules 130 can be omitted because the
processes for the different embodiments are implemented in a
hardware unit.
[0185] In still another illustrative example, determination system
100 and/or mobile device 105 can be implemented using a combination
of processors found in computers and hardware units. Processor 110
can have a number of hardware units and a number of processors that
are configured to execute software modules 130. In this example,
some of the processors can be implemented in the number of hardware
units, while other processors can be implemented in the number of
processors.
[0186] In another example, a bus system can be implemented and can
be comprised of one or more buses, such as a system bus or an
input/output bus. Of course, the bus system may be implemented
using any suitable type of architecture that provides for a
transfer of data between different components or devices attached
to the bus system. Additionally, communications interface 150 can
include one or more devices used to transmit and receive data, such
as a modem or a network adapter.
[0187] Embodiments and/or arrangements can be described in a
general context of computer-executable instructions, such as
program modules, being executed by a computer. Generally, program
modules include routines, programs, objects, components, data
structures, etc., that perform particular tasks or implement
particular abstract data types.
[0188] The operation of the determination system 100 and the
various elements and components described above will be further
appreciated with reference to the method for determining an
in-vehicle role of a user of a mobile device as described below, in
conjunction with FIGS. 2A-2C.
[0189] Turning now to FIG. 2A, a flow diagram is described showing
a routine 201 that illustrates a broad aspect of a method for
determining an in-vehicle role of a user of a mobile device 105 in
accordance with at least one embodiment disclosed herein. It should
be appreciated that several of the logical operations described
herein are implemented (1) as a sequence of computer implemented
acts or program modules running on determination system 100 and/or
(2) as interconnected machine logic circuits or circuit modules
within the determination system 100. The implementation is a matter
of choice dependent on the requirements of the device (e.g., size,
energy, consumption, performance, etc.). Accordingly, the logical
operations described herein are referred to variously as
operations, structural devices, acts, or modules. Various of these
operations, structural devices, acts and modules can be implemented
in software, in firmware, in special purpose digital logic, and any
combination thereof. It should also be appreciated that more or
fewer operations can be performed than shown in the figures and
described herein. These operations can also be performed in a
different order than those described herein.
[0190] The process begins at step 210 where processor 110 executing
one or more of software modules 130, including, preferably,
determination module 170, receives a first input, such as from one
or more of sensors 145, software modules 130, user interface 172,
operating system 176, and/or communication interface 150.
Preferably, the first input originates from one or more identifying
events that are perceptible to at least one of sensors 145, user
interface 172, operating system 176, and/or communication interface
150. Examples of such an input include, but are not limited to, an
acceleration input that originates from an acceleration event
(e.g., the speeding up or slowing down of a car) that is perceived
by accelerometer 145A, a change in geographic location input that
originates from a location changing event (e.g., the movement from
one place to another) that is perceived by GPS receiver 145C,
and/or one or more instances or user interaction (e.g., typing)
that are detected by user interface 172.
[0191] Then, at step 220, processor 110 executing one or more of
software modules 130, including, preferably, determination module
170, analyzes at least the first input, such as to identify one or
more determination characteristics within the first input,
including but not limited to user determination characteristics. As
will be described in greater detail below, user determination
characteristics are one or more aspects originating at and/or
derived from an input that provide insight regarding the in-vehicle
role and/or identity of the user that is exerting control over
and/or otherwise associated with a mobile device, such as mobile
device 105. For example, where the first input (received at step
210) is the typing of one or more letters into user interface 172
(such as to compose a SMS message), determination module 170 can
analyze the typing to identify one or more user determination
characteristics (that is, characteristics that contribute to a
determination of the identity of the particular user that is
associated with mobile device 105, as will be described below). In
this case, determination module 170 can analyze the typing patterns
within the first input (such as the time interval in between the
typing of individual letters in the SMS message, the average time
interval in between the typing of individual letters in the SMS
message, and/or the variability among one or more time intervals
between the typing of individual letters in the SMS message). If
there are substantial time intervals in between the typing of
various letters, and/or if the time intervals in between typed
letters vary widely, these factors can indicate that the user of
mobile device 105 is likely distracted and thus unable to type
consistently. Additional examples of analyzing an input to identify
one or more determination characteristics are provided below in
EXAMPLE 1.
[0192] Upon identifying one or more determination characteristics,
such as user determination characteristics, based on the analysis
of an input, at step 230 the processor 110 executing one or more of
software modules 130, including, preferably, determination module
170, computes one or more determination factors (that is, factors
that reflect and/or suggest one or more determinations that can be
arrived at with respect to one or more of the mobile device, its
location, the user, and/or the vehicle). By way of example, a
probability can be computed, based on the user determination
characteristics, that the in-vehicle role of the user of mobile
device 105 is a driver and/or that the in-vehicle role of the user
of the mobile device 105 is a passenger. That is, in certain
arrangements the user determination characteristics identified at
step 220 can provide varying degrees of certitude as to the
identity or role of a user. So, continuing the example provided
with regard to step 220, while, on the one hand, significant time
intervals between typed letters can indicate that the in-vehicle
role of the user is a driver, on the other hand if the time
intervals in between the various letters are, on average,
consistent and/or substantially similar this can indicate that the
user is not necessarily distracted (due to being a driver), but
rather is a passenger and is simply not adept at typing.
Accordingly, in such a case, in one arrangement the computed
probability for such user determination characteristic(s) is
preferably a lesser degree of certainty that the user is a driver
(and/or a passenger), accounting for the potentially conflicting
indications from the various user determination characteristics. By
way of further example, when the user determination characteristics
indicate that a lesser degree of typing inconsistency and/or
shorter intra-character time intervals exists, processor 110
executing software modules 130 preferably computes a probability
that the in-vehicle role of the user of mobile device 105 is a
passenger. Similarly, when a greater degree of typing inconsistency
and/or longer intra-character time intervals exists, processor 110
executing software modules 130 preferably computes a probability
that the in-vehicle role of the user of mobile device 105 is a
driver (being that the user determination characteristics appear
consistent with the activity of a driver within a vehicle). It
should be appreciated that because ranges exist for a particular
user determination characteristic (such as typing consistency), a
probability of an in-vehicle role is preferably computed,
reflecting a degree of certainty that the user of mobile device is
a driver and/or that the user of mobile device is a passenger.
[0193] Then, at step 240, the processor 110 executing one or more
of software modules 130, including, preferably, determination
module 170, transforms an operation state of the mobile device 105
based on the determination factors (such as the probability
computed at step 230), and/or outputs at least one operation state
based on the at least one determination factor, and/or outputs at
least one in-vehicle role of the user based on at least one
determination factor, and/or outputs at least one in-vehicle
location of the mobile device 105 based on at least one
determination factor, and/or outputs at least one result based on
the at least one determination factor. Various of these operations
will be described in greater detail herein. For example, if the
computed probability indicates that the in-vehicle role of a user
of mobile device 105 is likely to be a driver, processor 110 can
coordinate the disabling of one or more features of the mobile
device 105, such as the disabling of any and/or all features that
enable the entry of text into mobile device 105. In doing so,
existing safety risks can be reduced by preventing a user who has
been determined to be likely to be a driver of a vehicle from using
various regular functions of mobile device 105 that are likely to
distract the user and increase safety risks while driving and/or
are restricted and/or prohibited based on the vehicle's current (or
most recently known) location, as preferably determined in
conjunction with GPS 145C. In other arrangements, one or more other
transformations to the operation state of mobile device can be
similarly applied based on the computed probability. For example,
notifications (such as warning notifications) can be provided at
the mobile device 105, notifications can be transmitted to third
parties (notifying a third party, such as a law enforcement agency,
of the in-vehicle role of the user of mobile device 105 and/or of
the particular operation of the mobile device 105, such as that
typing is being performed upon mobile device 105), instructions can
be provided to third parties (such as a cellular service provider)
to change an operation state of mobile device 105 (such as
temporarily disabling the communication ability of mobile device
105), and/or one or more applications executing or executable on
mobile device 105 can be disabled (such as a text messaging
application).
[0194] At this juncture, it can be appreciated that the operations
corresponding to transforming step 240 can be customized and/or
configured in relation to various probabilities computed at step
230. That is, certain transformations of the operation state of
mobile device 105 (for example, notifying law enforcement
authorities) may only be appropriate when there is a high
probability (such as greater than 90%) that the in-vehicle role of
a user of mobile device 105 is a driver (and further that the
driver is interacting with mobile device 105 in an illegal manner
while diving), while other transformations may be appropriate even
for lower degrees of probability (for example, it may be
appropriate to provide a warning notification at mobile device 105
even for a 60% probability that the user is a driver). Yet other
transformations can be employed preemptively, wherein the
transformation is applied even before a prohibited interaction
(e.g., typing into an SMS program) occurs, thereby avoiding
restricted or prohibited interaction with mobile device 105, even
at the first instance. Furthermore, as referenced above, in certain
arrangements the user can configure how (that is, the type of
transformation) and when (that is, the probability threshold that
must be met in order to trigger the transformation) the operation
of mobile device 105 is to be transformed. In other arrangements, a
third party can establish such configurations. For example, a
regulatory agency can dictate that one or more transformations be
employed on some or all mobile devices when a particular
probability threshold that a user of the device is a driver is met.
By way of further example, a car insurance provider can provide
incentives to its customers who utilize one or more transformations
and/or probability thresholds suggested and/or dictated by the
insurance company.
[0195] Turning now to FIG. 2B, a flow diagram is described showing
a routine 202 that illustrates a further aspect of a method for
determining an in-vehicle role of a user of a mobile device 105 in
accordance with at least one embodiment disclosed herein. Though
already noted above, it should be particularly appreciated with
reference to FIG. 2B that more or fewer operations can be performed
than shown in the figures and described herein, and that these
operations can be performed in a different order than those
described herein. Thus, in certain arrangements certain of the
operations of FIG. 2B can be performed while others are not, and
further that in certain arrangements can be performed in a sequence
other than that depicted in FIG. 2B.
[0196] The process begins at step 210 where a first input of a
first device 105 is received, and proceeds to step 220 where the
first input is analyzed. Steps 210 and 220 have already been
described above with reference to FIG. 2A and thus will not be
further elaborated upon here as their operation is substantially
identical to steps 210 and 220 described above.
[0197] Then, at step 221, processor 110 executing one or more of
software modules 130, including, preferably, determination module
170, receives a second input from one or more of sensors 145,
software modules 130, user interface 172, operating system 176,
and/or communication interface 150. As described above with
reference to step 210, examples of such an input include, but are
not limited to, an input corresponding to an acceleration perceived
by accelerometer 145A, and/or an input corresponding to a change in
geographic location as perceived by GPS receiver 145C.
[0198] At step 222, the second input is analyzed by processor 110
executing determination module 170, in a manner substantially
similar to that described above with reference to step 220, in
order to identify one or more determination characteristics such as
user determination characteristics within the second input. For
example, where the second input (received at step 221) comprises
one or more accelerations detected by accelerometer 145A,
determination module 170 can analyze the accelerations to identify
one or more user determination characteristics within the second
input. Here, determination module 170 can analyze various patterns
within the second input (such as the time and duration of
acceleration and deceleration). Certain patterns, such as frequent
periods of sustained forward acceleration interspersed with
periodic intervals of rapid and/or brief forward deceleration can
indicate that the user of mobile device 105 is likely traveling in,
if not operating, a car which often follows such an
acceleration/deceleration pattern. As described in detail herein,
by identifying one or more user determination characteristics (such
as identifying that the user of mobile device 105 is likely
traveling in a car, as described above), the context and
significance of one or more other user determination
characteristics can be better evaluated and/or quantified. For
example, the typing patterns of a user determined to be traveling
in a moving car are, on average, of greater significance in
determining whether the user of the device is a driver/passenger.
On the other hand, the typing patterns of a user of a mobile device
105 that has been determined not to be traveling in a moving car
can be understood to be, on average, of lesser significance in
determining whether the user of the device is a
driver/passenger.
[0199] Then, at step 223, the processor 110 executing one or more
of software modules 130, including, preferably, determination
module 170, can compare the determination characteristics such as
user determination characteristics identified within the first
input (such as those identified at step 220) with the determination
characteristics such as user determination characteristics
identified within the second input (such as those identified at
step 222). In doing so, one or more patterns, correlations and/or
relationships can be identified between the user determinations
characteristics of the first input and the user determination
characteristics of the second input. By way of illustration,
referring to the examples discussed above, the typing patterns
identified at step 220 can be compared with the
acceleration/deceleration patterns identified at step 222. In doing
so, patterns, correlations, and/or relationships between the typing
patterns and acceleration/deceleration patterns can be identified.
For example, if time intervals between typed characters and/or
typing inconsistencies increase at the same time as substantial
and/or sudden forward and/or lateral acceleration and/or
deceleration, this can further indicate that the user of a mobile
device 105 is a driver. Being that for a driver to engage in a
maneuver with sudden acceleration and/or deceleration the driver is
expected to have temporarily stopped typing due to the increased
attention a driver must pay to his driving activities, if such
accelerations correlate closely with inconsistent typing speeds
and/or slower typing speed and/or such accelerations are just prior
to typing delays, this can be a strong indication that the user of
mobile device 105 is a driver.
[0200] Additional illustrations of scenarios and/or arrangements
wherein multiple inputs are analyzed, compared, correlated, and/or
processed in order to determine various aspects of the roles of one
or more users of a mobile device 105, are provided throughout the
present disclosure.
[0201] At step 224, the processor 110 executing one or more of
software modules 130, including, preferably, determination module
170, compares determination characteristics such as user
determination characteristics (including, but not limited to, the
user determination characteristics from the first input, as
identified at step 220, and/or the user determination
characteristics from the second input, as identified at step 222)
with stored determination characteristics such as user
determination characteristics, such as those stored at one or more
databases, such as database 174 (that is local to mobile device
105) and/or database/server 162 (that is external to mobile device
105). Stored user determination characteristics can be archived
user determination characteristics that have been retained from
previous user determinations that have been performed, can be
generated based on statistical analyses of previous user
determinations, and/or can be defined or established independent of
any particular previous user determination. In comparing user
determination characteristics (such as those identified at step 220
and/or step 222) with stored user determination characteristics
(such as stored user determination characteristics that have
historically demonstrated a high degree of prediction accuracy in
determining an in-vehicle role of a user), the processor 110 can
more accurately compute the probability that the in-vehicle role of
the user of mobile device 105 is a driver or that the in-vehicle
role of the user of mobile device 105 is a passenger. For instance,
following the example referenced above with regard to typing
inconsistencies, if certain typing patterns have historically been
demonstrated as very reliable in determining the in-vehicle role,
of the user, various identified user determination characteristics
(such as those identified at step 220 and/or step 222) can be
compared to such stored determination characteristics (e.g., highly
predictive typing patterns). If the identified determination
characteristics closely correlate to highly reliable/predictive
stored determination characteristics, the identified determination
characteristics can be similarly considered highly reliable and
this correlation can further enhance the reliability of the
computation of a probability regarding the in-vehicle role of a
particular user. Additional examples and illustrations of such
comparisons are provided below at EXAMPLE 1.
[0202] At step 225, processor 110 executing one or more of software
modules 130, including, preferably, determination module 170,
receives an input from another device, such as one of mobile
devices 160. It should be understood that the input received from
mobile device 160 is preferably from among the various types of
inputs referenced above at steps 210 and 221 (for example, an
acceleration input that originates from an acceleration event that
is perceived by accelerometer 145A, and/or a change in geographic
location input that originates from a location changing event that
is perceived by GPS receiver 145C), and thus will not be described
at length here. However, it should be appreciated that this input
originates at mobile device 160 (that is, a device external to
mobile device 105), and thus the input from mobile device 160 is
preferably received by mobile device 105 through communication
interface 150.
[0203] Then, at step 226, processor 110 executing one or more of
software modules 130, including, preferably, determination module
170, processes an input of mobile device 105 against an input of
one or more mobile devices 160. In doing so, one or more
determination characteristics such as user determination
characteristics can be identified within the input of the first
mobile device 105.
[0204] By way of example, various typing patterns and/or tendencies
(referenced above) of mobile device 160 can be processed against
similar typing patterns/tendencies of mobile device 105 (or,
alternatively, various typing patterns and/or tendencies of mobile
device 105 can be processed against similar typing
patterns/tendencies of mobile device 160). In doing so, processor
110 can analyze and/or identify the degree to which the input from
mobile device 105 deviates from the input received from mobile
device(s) 160, in a manner similar to the comparison discussed
above at step 224 (except that here the input of mobile device 105
is being processed against an input received from another mobile
device 160, as opposed to comparing one user determination
characteristic with stored characteristics). Thus, continuing with
the provided example, in a case where the typing tendencies of
mobile device 105 are relatively inconsistent, if, when processing
the typing tendencies received from mobile device(s) 160 against
those of mobile device 105 it is revealed that the typing across
many or all of the devices 105 and 160 is similarly inconsistent,
this can indicate that it there is not necessarily a high
probability that the user of mobile device 105 is a driver, despite
the inconsistent typing inputs received at the device 105 (rather,
such inconsistent typing may be the result of the various devices
105 and 160 traveling along an off-road or bumpy road, which would
make consistent typing difficult, even for passengers in a
vehicle). Additionally, if the typing tendencies of mobile device
105 are relatively consistent, however when processing such
input(s) against inputs from mobile device(s) 160 it is revealed
that the typing tendencies of the user of mobile device 105 are
actually relatively inconsistent, this can indicate a higher
probability that the user of mobile device 105 is a driver of a
vehicle (even though the input from mobile device 105,
in-and-of-itself, may not have generated the same conclusion).
[0205] It should be noted that various limitations and/or filters
can be imposed upon the receiving at step 225 and/or the processing
at step 226, to ensure the most accurate results possible. That is,
while in certain arrangements it can be beneficial to receive
inputs from practically any mobile device 160 that is capable of
communication with mobile device 105, in other arrangements it can
be preferably to limit the number of devices and/or inputs that are
received by mobile device 105 on the basis of one or more factors
to ensure that the inputs being received by mobile device 105 from
such external devices 160 are those that can be expected to be of
greatest relevance. Examples of factors that can be considered in
imposing such limitations and/or filters include proximity to
mobile device 105 and/or similarity/compatibility with mobile
device 105. To illustrate, in processing the typing tendencies of
device 105 against those of another device 160, it can be
preferable to ensure that device 160 is in close proximity to
mobile device 105 (such as through a comparison of the location
coordinates obtained from their respective GPS receivers or by
causing one or more of the mobile devices to emit one or more tones
and/or signals (e.g., an audio tone) that can then be received on
other mobile devices that are in close proximity, as described in
detail in EXAMPLE 2), thereby establishing a high likelihood that
mobile device 105 and mobile device 160 are operating within the
same vehicle (and are thus subjected to substantially identical
conditions). To further illustrate, being that various mobile
devices such as smartphones utilize different user interfaces and
button configurations, it can be advantageous in certain
arrangements to compare inputs from one mobile device 105 with
those of another mobile device 160 that is either identical to or
at least highly compatible with mobile device 105 (such as a device
using the same operating system). Due to differences across various
mobile devices and operating systems, ensuring that mobile device
105 and mobile device(s) 160 are similar (if not identical) ensures
that the inputs received from each can be assumed to be highly
comparable.
[0206] Additional examples of processing inputs from one device
105, 160 against those of one or more other devices to identify one
or more determination characteristics are provided below in EXAMPLE
2.
[0207] In addition, in certain arrangements it is preferable that
the inputs from mobile device 105 and those of mobile device 160
that are to be processed against one another/compared are
substantially synchronized from a chronological standpoint. That
is, it is preferable that each of the various inputs be associated
with a particular time (and that the source of such time be a
central clock, such as a server, which can synchronize the various
devices, though it should be understood that in other arrangements
one or more of devices 105, 160 can broadcast timing data that
enables the calibration of the various devices), thereby enabling
the processing of inputs from mobile device 105 with inputs from
mobile device 160 that correspond to the same point in time. Doing
so ensures that the various inputs being processed/compared are
highly comparable, in that they reflect the operations of the
various devices 105 and 160 in response to the same events (e.g.,
accelerating/decelerating over the course of a driver). Additional
examples and illustrations of such further processing operations
are provided below in EXAMPLE 3.
[0208] At step 227, processor 110 executing one or more of software
modules 130, including, preferably, determination module 170,
receives an input from vehicle data system 164, such as an on board
diagnostic (OBD) computer or computing device (e.g., OBD-I. OBD-II,
ECU, roll system, airbag system, and/or an ABS), preferably through
communication interface 150. As noted above, vehicle data system
164 preferably provides data and/or information originating at the
vehicle itself. For example, vehicle data system 164 can provide
one or more inputs that reflect various actions or events, such as
a car's acceleration and/or deceleration, steering, braking, and/or
any other such car-related operations. Such inputs can provide
further insight into determining the in-vehicle role of a user of
mobile device 105, as will be described below.
[0209] Then, at step 228, processor 110 executing one or more of
software modules 130, including, preferably, determination module
170, processes an input of mobile device 105 against an input of
vehicle data system 164, in a manner similar to that described
above with respect to step 226. However, here an input of mobile
device 105, such as various typing tendencies (as illustrated
above) is processed against an input from vehicle data system 164
that preferably pertains to an operation of a car (e.g., the car
accelerating, braking, and/or swerving) and which is qualitatively
different than the input of mobile device 105 because vehicle data
system 164 cannot necessarily detect the various stimuli
perceptible to mobile device 105, owing in part to the fact that
mobile device 105 is preferably not fixed relative to the car's
coordinate system. As such, the various inputs (that is, the inputs
from mobile device 105 and those from vehicle data system 164) are
compared and/or synchronized from a chronological standpoint,
substantially in the manner described above with respect to step
226. In doing so, inputs from mobile device 105 can be processed
against inputs from vehicle data system 164 (which, in turn,
originate at the car itself), thereby enabling the association of
various inputs from mobile device 105 with events such as the
accelerating, braking, and/or swerving of the car. Thus, following
the typing tendencies example provided, if certain highly erratic
typing tendencies perceived at mobile device 160, occur just prior
and/or closely correlate to various driving operations (reflected
in the inputs from vehicle data system 164) such as accelerating,
braking, and/or swerving, one or more user determination
characteristics can be identified with regard to the input(s) from
mobile device 105, indicating that there is a high likelihood that
the in-vehicle role of the user of mobile device 105 is a
driver.
[0210] At this juncture, it can be appreciated that although
several sections of the forgoing disclosure have referenced the
processing and/or comparison of various inputs against one another
in context of inputs that are qualitatively comparable (such as at
steps 224 and 226, above, referring to the comparison of typing
tendencies from various sources), in other arrangements various
inputs that are not necessarily qualitatively comparable (or, at
least, do not appear to be qualitatively comparable). For example,
in a manner similar to that described above with respect to step
223, an input of typing tendencies from one source (such as mobile
device 105) can be compared with/analyzed against an input of
accelerations/decelerations originating at mobile device 160. The
respective inputs preferably have a timestamp to enable the
chronological comparison between the inputs, as described in
greater detail above with respect to step 226.
[0211] At step 230, processor 110 executing one or more of software
modules 130, including, preferably, determination module 170,
computes one or more determination factors, such as a probability,
based on the various determination characteristics, that the
in-vehicle role of the user of mobile device 105 is a driver and/or
a probability that the in-vehicle role of the user of the mobile
device 105 is a passenger, substantially in the manner described in
detail above with regard to step 230. Then, at step 240, the
processor 110 executing one or more of software modules 130,
including, preferably, determination module 170, transforms an
operation state of the mobile device 105 and/or outputs at least
one operation state based on the at least one determination factor,
and/or outputs at least one in-vehicle role of the user based on at
least one determination factor, and/or outputs at least one
in-vehicle location of the mobile device 105 based on at least one
determination factor, and/or outputs at least one result based on
the at least one determination factor, as also described in detail
above.
[0212] Turning now to FIG. 2C, a flow diagram is described showing
a routine 203 that illustrates a further aspect of a method for
determining an in-vehicle role of a user of a mobile device 105 in
accordance with at least one embodiment disclosed herein. The
process begins at step 210 where an input is received from mobile
device 105, and proceeds to step 220 where the first input is
analyzed. At step 230, a determination factor such as a probability
is computed, based on the various determination characteristics, as
referenced above. Steps 210, 220, and 230 have already been
described above with reference to FIG. 2A and thus will not be
further elaborated upon here as their operation is substantially
identical to steps 210, 220, and 230 described above.
[0213] Then, at step 250, processor 110 executing one or more of
software modules 130, including, preferably, determination module
170, outputs one or more results based on the determination
factor(s) computed at step 230. Such results can include, but are
not limited to, one or more files, notifications, and/or
communications that contain and/or reflect operations of the mobile
device 105, and/or one or more operation states of the first mobile
device 105, and the outputting of such results can be dependent
upon a certain probability threshold, as described in detail
herein. For example, in a scenario where mobile device 105 is
configured to output results (such as that the in-vehicle role of a
user is a driver/passenger) when the probability (that is, the
reliability) of such results are greater than 75%, when mobile
device 105 determines with a probability of 80% that the in-vehicle
role of a user of mobile device 105 is a driver, a corresponding
notification can be outputted reflecting such results. Thus, it can
be appreciated that the referenced results can be output based on
the calculated probability that the user of mobile device 105 is a
driver or that the user of mobile device 105 is a passenger. It
should be understood that the outputting referenced at this step
can be employed in a number of ways depending on the particular
arrangement. For example, in certain arrangements the referenced
results can be transmitted to an external device or third-party,
such as a law enforcement agency, insurance company, and/or other
device 160 (for example, a parent receiving results from a child's
device 105), via communication interface 150. It can be appreciated
that, as referenced above with regard to step 240, the outputting
of such results to a law enforcement agency, insurance company,
and/or another device 160 can ensure that such entities are
notified of the various operations and/or operation states of a
particular mobile device 105, especially when it has been
determined that it is highly probable that device 105 is being
operated by a driver of a car. In another arrangement, such results
can be outputted to mobile device 105 itself in any number of ways,
such as by logging the operations and/or operation state(s) of
mobile device 105 at times/intervals when it has been determined,
for instance, that there is a high probability that the user of
mobile device 105 is a driver. Irrespective of whether the results
are output to a third-party or to the device 105 itself, it should
be appreciated that the outputting of such results can provide
insight regarding the operations of the mobile device 105 at a
particular moment and/or interval, which can be utilized later,
such as in investigating car crashes. For example, if a car crash
occurs, a law-enforcement agency can review such outputted results
to determine whether the driver was engaged in various distracting
activities during and/or near the time of the crash (e.g., mobile
device 105 was being used by driver with 93% certainty, was being
used in a hand-held state with 94% certainty, and was being used
for texting with 100% certainty at least 30 seconds prior to the
crash). As such, it can be further appreciated in certain
arrangements the various referenced results can be outputted across
any and/or all degrees of probability, thereby ensuring a
comprehensive log of a user results, reflecting the various
operations and/or operation states throughout the course of
operation of the mobile device 105.
[0214] In certain implementations, a device can be determined to be
operated by a driver or a passenger based on one or more
applications running at the device (and/or that are installed on
the device but not necessarily running). FIG. 43 is a flow diagram
of a routine that illustrates aspects of one or more methods, such
as those described in relation to one or more embodiments described
herein. In various implementations, one or more aspects of the
referenced method can be performed by one or more hardware
devices/components (such as those depicted in FIG. 1), one or more
software elements/components (such as those depicted in FIG. 1),
and/or a combination of both. At 4305 one or more operational
aspects of a user device can be identified. In certain
implementations the one or more operational aspects can include one
or more applications executing at the mobile device. Moreover, in
certain implementations the one or more operational aspects can
include one or more resources being utilized at the mobile device.
At 4310 the one or more operational aspects can be processed, such
as in order to determine one or more characteristics of a user of
the user device. At 4315, one or more operations can be initiated,
such as based on the one or more characteristics.
[0215] For example, a device determined to be within a moving
vehicle that is running a `SatNav` application can be determined to
be relatively more likely to be operated by a driver than by a
passenger. Moreover, based on the resources that the device is
using (e.g., whether Bluetooth is paired on the device), it can be
determined that it is more likely that a driver is operating the
device, while if a headset is plugged into the device's headset
jack and music is playing while the device is determined to be
within a moving vehicle, it is more likely that a passenger is
operating the device.
[0216] By way of further example, having determined that an
application was recently utilized to unlock (e.g., open, activate,
etc.), it can be further determined that the device is likely to be
about to start a trip. Such a determination can be further
accounted for in determining the in-vehicle role of a user
associated with such a device, for example, based upon the
in-vehicle role that that user or a group of users can be
determined to be likely to play after using such application.
[0217] Turning now to FIG. 3, a flow diagram is described showing a
routine 300 that illustrates an aspect of a method for enabling,
disabling and/or modifying at least a feature of a mobile device
105 in accordance with at least one embodiment disclosed
herein.
[0218] The process begins at step 310 where processor 110 executing
one or more of software modules 130, including, preferably,
determination module 170, monitors one or more inputs from one or
more of sensors 145, software modules 130, user interface 172,
operating system 176, and/or communication interface 150. As
described in detail above with reference to step 210, examples of
such inputs include, but are not limited to, an acceleration input,
a geographic location input, and/or one or more instances or user
interaction (e.g., typing).
[0219] Then, at step 320, processor 110 executing one or more of
software modules 130, including, preferably, determination module
170 defines an operation signature based on the inputs monitored at
step 310. The defined operation signature preferably reflects a
normal operation state and/or a range of normal operation states of
the mobile device 105. That is, based on the various inputs
monitored at mobile device 105, over a defined time interval (for
example, a day, a week, and/or a month) an operation signature or
profile can be defined that reflects one or more values or ranges
of values that have been identified as the normal or regular
operation of the device 105, the normal or regular usage of the
device 105 by a particular user, and/or the normal or regular usage
of device 105 and/or a series or class of such devices by a
particular user and/or a series or range of users. For example,
after monitoring inputs from the accelerometer 145A of mobile
device 105 for a period of time, a range of normal acceleration
inputs of the device 105 can be determined. Similarly, upon
monitoring inputs from the user interface 172 of mobile device 105,
a range of normal typing tendencies (e.g., typing speeds, typing
consistency, etc., as described herein) can be determined. These
various inputs can be used to define an operation signature for the
mobile device 105 that reflects the normal operation and/or
operating range of the device 105. It should be appreciated that
the referenced operation signature is not limited to a single input
or type of input, but rather in certain arrangements can be made up
of signatures of two or more types of inputs. For example, in one
arrangement a normal operation signature can be made up of a range
normal accelerometer inputs together with a range of normal typing
tendencies.
[0220] At step 330, processor 110 executing one or more of software
modules 130, including, preferably, determination module 170,
further monitors one or more second inputs from one or more of
sensors 145, software modules 130, user interface 172, operating
system 176, and/or communication interface 150, substantially in
the manner described above with respect to step 310.
[0221] Then, at step 340, processor 110 executing one or more of
software modules 130, including, preferably, determination module
170, processes one or more of the second input(s) (monitored at
step 330) against one or more of the operation signature(s)
(defined at step 320). In doing so, processor 110 executing one or
more of software modules 130, including, preferably, determination
module 170, can identify a degree of deviation and/or a degree of
correlation between the second input(s) and the operation
signature(s). By way of example, various typing patterns and/or
tendencies (referenced above) of mobile device 105 can be processed
against an operation signature reflecting a range of normal typing
tendencies of mobile device 105, as referenced above with respect
to step 320 and described in detail herein. In doing so, processor
110 can analyze and/or identify the degree to which the one or more
second input(s) (monitored at step 330) deviate from the operation
signature of mobile device 105 (defined at step 320). Thus,
continuing with the provided example, even in a case where the
monitored typing tendencies of mobile device 105 are not
necessarily highly inconsistent, from an objective standpoint, upon
processing such inputs against an operation signature (such as an
operation signature reflecting that the typing tendencies of the
user of mobile device 105 are generally highly
consistent/accurate), it can be revealed that the monitored typing
tendencies/inputs actually deviate substantially from the mobile
device's 105 operation signature. In this example, such a deviation
from the operation signature (which reflects the normal and/or
expected operation of mobile device 105) can indicate that the
mobile device 105 is being operated under conditions that distract
the user from interacting normally with the device 105, such as
during driving. Similarly, in an alternative example, in a case
where the monitored typing tendencies of mobile device 105 are
relatively inconsistent, from an objective standpoint, upon
processing such inputs against an operation signature (such as an
operation signature reflecting that the typing tendencies of the
user of mobile device 105 are also generally inconsistent, such as
in the case of a new user who is not adept at typing), it can be
revealed that the monitored typing tendencies/inputs (which
otherwise reflect significantly inconsistent typing tendencies)
actually correlate substantially with the mobile device's 105
operation signature. In such an example, the correlation with the
operation signature (which reflects the normal and/or expected
operation of mobile device 105) can indicate that the mobile device
105 is actually being operated under relatively normal/consistent
conditions, and thus should not be assumed to be operated under
distracting conditions, such as driving, as may have otherwise been
concluded based on the inconsistent typing tendencies alone.
[0222] At this juncture, it should be noted that steps 310 and 320
can be repeated on a periodic and/or constant basis, in order to
further refine the operation signature defined at step 320. That
is, it can be appreciated that in certain scenarios a user's
interaction with mobile device 105 can change and/or improve over
time (such as in the case of a new user whose typing skills
gradually improve with repeated use of device 105), and thus the
operation signature of mobile device 105 should be adjusted,
modified, and/or refined accordingly. It can be appreciated that
this process can be achieved in any number of ways. In one
arrangement, mobile device 105 can be configured to periodically
reset its operation signature (such as every month), such that only
recent operations are accounted for in defining the operation
signature. In other arrangements, further inputs that are monitored
can be factored into and/or averaged with previously monitored
inputs, thereby updating an existing operation signature. In yet
other arrangements, further inputs can be factored into and/or
averaged with previously monitored inputs, and the more recent
inputs can be weighted to place greater emphasis upon them, thereby
updating an existing operation signature while accounting for the
fact that more recent inputs are of greater value in defining an
accurate operation signature of a mobile device 105.
[0223] At step 350, processor 110 executing one or more of software
modules 130, including, preferably, determination module 170,
adjusts one or more operations of mobile device 105. Preferably,
this adjustment corresponds to the degree of deviation and/or the
degree of correlation between one or more monitored inputs (such as
the input monitored at step 330) and one or more operation
signature(s) of mobile device 105 (such as the operation signature
defined at step 320). It should be understood that in certain
arrangements, this adjustment is similar to the transformation of
the operation state of mobile device 105 discussed in detail above
with respect to step 240, and/or the outputting of one or more
results discussed in detail above with respect to step 250. For
example, in certain arrangements, processor 110 can coordinate the
disabling of one or more features of the mobile device 105, such as
the disabling of any and/or all features that enable the entry of
text into mobile device 105, while in other arrangements
notifications (such as warning notifications) can be provided at or
transmitted to mobile device 105. Various other examples of
adjustments to one or more operations of mobile device 105 are
described in greater detail above with reference to steps 240 and
250.
[0224] As also described in detail above with respect to step 240,
it should be noted that various of the adjustments employed at step
350 can be customized and/or configured in relation to various
degrees of correlation and/or deviation identified at step 340.
Thus, it can be appreciated that certain adjustments of the
operation of mobile device 105 (for example, notifying law
enforcement authorities) may only be appropriate when a high degree
of deviation from a normal operation state (that is, from the
operation signature) is identified (and, preferably, further that
such a deviation is indicative of restricted or prohibited activity
on the part of the user of mobile device 105). Other adjustments,
such as providing a notification at mobile device 105, may be
appropriate even for lower degrees of correlation/deviation, as
described in detail above.
[0225] In certain implementations, information regarding whether
and how a device user uses his/her device, such as when in a moving
vehicle, can be measured and/or recorded, whether or not the device
user is determined to be the driver (or irrespective of a
likelihood that the device user is the driver). Such
technologies/techniques can be used, among other things, to log and
analyze how large a "distracted driving" problem the device user
has, i.e., based on how much and in what ways the device's usage
deviates from a particular device usage policy (e.g., a state or
federal law, a company policy, a parental policy, etc.) in
conjunction with various determinations pertaining to the identity
of the user (e.g., as a driver of a vehicle).
[0226] In certain implementations, such technologies can utilize
information obtained directly from the device (e.g., information
about calls made or received, texts made or received, applications
used, URLs visited, intermediate or final sources or destinations
of data transmissions, device movement information, location
information, network connectivity or visibility information, GPS,
accelerometer, etc.) and/or information obtained from third parties
(e.g., mobile server providers, telematics, etc.).
[0227] The referenced information can also be saved to the device
and/or to a remote server.
[0228] In certain implementations, the frequency or quantity (e.g.,
number of screen touches, number of key presses, time with screen
on, CPU activity, application switches, number of human or device
spoken words) of device use is used as an indicator to determine
vehicle role. Such frequency can be measured in various ways (e.g.,
(i) relative to others; (ii) relative to self (e.g., same device);
(iii) relative to self as driver; and (iv) relative to self as
passenger) to make such determination. For example, if a device
user uses her device, on average, at least once every five (5)
minutes (during waking hours) throughout the day and, for a period
in which the device was in a vehicle, she doesn't use it for 60
minutes, there is a relatively greater likelihood that her
in-vehicle role was that of a driver. Similarly, if a device user
has, on average, 5 device interactions (e.g., key presses) per
minute (during waking hours) throughout the day and, for a period
in which the device was in a vehicle, the quantity of key presses
was 400 over 60 minutes, there is a relatively greater likelihood
that her in-vehicle role was that of a passenger.
[0229] Turning now to FIG. 4, a flow diagram is described showing a
routine 400 that illustrates an aspect of a method of determining
at least one of an in-vehicle role of a user of a first mobile
device and/or a handheld state of the first mobile device and/or a
vehicle class of a vehicle containing the first mobile device using
a central machine in accordance with at least one embodiment
disclosed herein. As will be described in greater detail below,
various of the steps and operations that make up routine 400 share
substantial similarities to those described above in connection
with FIGS. 2A-C and 3. However, it should be understood that while
FIGS. 2A-C and 3 principally concern determinations occurring at
mobile device 105, routine 400 is primarily directed to
determinations performed at central machine 168, as will be
described in greater detail below. It should be further noted that,
as described in greater detail below, while any one of the
particular steps, operations, and/or functions are described
throughout the present disclosure as being performed at and/or upon
a particular machine or device (such as mobile device 105, mobile
device 160, and/or central machine 168), such description should be
understood as being exemplary and/or illustrative and not limiting.
Accordingly, it can be appreciated that any and all steps,
operations, and/or functions described herein with regard to a
particular device and/or machine (such as central machine 168)
should be similarly understood to be similarly capably of
employment at another device and/or machine (such as mobile device
105), substantially in the manner described herein, without
departing from the scope of the present disclosure.
[0230] The process begins at step 410 where processor 4110 of
central machine 168 (depicted in FIG. 1) executing one or more of
software modules 4130, including, preferably, determination module
4170, receives (preferably through communication interface 4150) a
first notification from mobile device 105, the first notification
preferably corresponding to an input originating from one or more
of sensors 145, software modules 130, user interface 172, operating
system 176, and/or communication interface 150 of mobile device
105. As described in detail above with respect to step 210, the
first input originates from one or more identifying events that are
perceptible to at least one of sensors 145, user interface 172,
operating system 176, and/or communication interface 150 of mobile
device 105, such as an acceleration input perceived by
accelerometer 145A, a change in geographic location input perceived
by GPS receiver 145C, and/or one or more instances or user
interaction (e.g., typing) detected by user interface 172. A
notification, such as a computer readable file containing
information that reflects the input itself as well as information
that is pertinent to the input (such as the time, date, and a
unique identifier such as a MAC address of mobile device 105) is
preferably generated by mobile device 105 based on the input, and
is transmitted by communication interface 150 of mobile device 105
to central machine 168, preferably via communications network 166.
As noted above, it should be recognized that while FIG. 1 depicts
central machine 168 communicating with mobile device 105 via
network/Internet 166, it should be understood that in other
arrangements central machine 168 communicates with mobile device
105 directly, such as through a direct Bluetooth pairing and/or
through an ad-hoc wireless network.
[0231] Then, at step 420, processor 4110 of central machine 168
executing one or more of software modules 4130, including,
preferably, determination module 4170, analyzes at least the first
notification to identify one or more determination characteristics,
such as one or more of user determination characteristics and/or
one or more handheld state characteristics and/or one or more
vehicle determination characteristics within the notification. As
described in detail above with respect to step 220, user
determination characteristics are one or more aspects originating
at and/or derived from one or more input(s) and/or notification(s)
that provide insight regarding the in-vehicle role, and/or identity
of the user that is exerting control over and/or otherwise
associated with a mobile device, such as mobile device 105.
Similarly, handheld state characteristics are one or more aspects
originating at and/or derived from one or more input(s) and/or
notification(s) that provide insight regarding the handheld state
of a mobile device, such as mobile device 105, such as whether
mobile device 105 is being operated by a user in a handheld or
non-handheld state (for example, various angles and/or sudden
changes perceived by gyroscope 145B can indicate that mobile device
105 is being operated in a handheld state by a user). It can thus
be appreciated that while the underlying analysis performed at the
present step 420 and at step 220, as described above, are
substantially similar, here the analysis is performed by central
machine 168 based on notifications received from mobile device 105,
while at step 220 the analysis is preferably performed by mobile
device 105 itself. Having this analysis performed at central
machine 168 (as opposed to at mobile device 105, from which the
notification analyzed at this step originates) provides several
advantages in certain scenarios over having the analysis performed
at mobile device 105, as described at step 220. For example, the
analysis performed at the present step can be quite resource
intensive, and shifting this analysis to central machine 168
ensures that the system resources of mobile device 105 remain
relatively free. Additionally, in certain arrangements central
machine 168 can be operated by a law enforcement agency, and, as
such, a centralized approach, such as the one described with
respect to FIG. 4, can provide such an agency with the ability to
monitor and/or adjust the operational capacity of mobile device 105
as necessary, as will be described in greater detail below.
Moreover, in certain scenarios this centralized approach can be
easier to implement with respect to regulatory compliance and
preventing tampering. It is expected that both regulatory
authorities who are interested in implementing a solution such as
that described with reference to FIG. 4 are more likely to succeed
in obtaining compliance from mobile device manufacturers and/or
mobile communications providers when requiring a solution that
primarily only requires, from the standpoint of the mobile device
105, periodic notification transmissions from mobile device 105 to
central machine 168. In addition, such a solution can be more
difficult for users to manipulate, modify, and/or `hack,` given
that the primary analysis is performed by central machine 168, as
opposed to mobile device 105.
[0232] At step 430, processor 4110 of central machine 168 executing
one or more of software modules 4130, including, preferably,
determination module 4170, computes one or more determination
factor(s), such as probabilities, based on the determination
characteristics identified at step 420. It should be understood
that, for instance, based on the particular inputs upon which a
notification (which is analyzed at step 420) is based, various user
determination characteristics and/or handheld state characteristics
are generated. For example, as referenced above, in certain
arrangements user determination characteristics are identified
(such as typing tendencies, as referenced above), while in other
arrangements handheld state characteristics (such as one or more
angles detected by mobile device 105, as referenced above) can be
identified, while in yet other arrangements both user determination
characteristics and handheld state characteristics can be
identified. In any event, at step 430, one or more probabilities
are computed by central machine 168, reflecting a probability that
the in-vehicle role of the user of mobile device 105 is a driver, a
probability that the in-vehicle role of the user of the mobile
device 105 is a passenger, a probability that the handheld state of
the mobile device 105 is handheld, and/or a probability that the
handheld state of the mobile device 105 is non-handheld, all in a
manner substantially similar to that described in detail above with
respect to step 230. It should be understood that, as described in
detail above, in certain arrangements the user determination
characteristics and/or handheld state characteristics identified at
step 420 can provide varying degrees of certitude as to the
identity/role of a user and/or the handheld state of mobile device
105. Accordingly, it should be appreciated that because ranges
exist across the spectrum of a particular user determination and/or
handheld state characteristic (such as typing consistency and/or
device angle), a probability that an in-vehicle role of the user of
mobile device 105 is a driver/passenger and/or a probability that a
handheld state of mobile device 105 is handheld/non-handheld
preferably reflects a degree of certainty across such a probability
spectrum, as described in detail above.
[0233] Then, at step 440, processor 4110 of central machine 168
executing one or more of software modules 4130, including,
preferably, determination module 4170, adjusts an operational
capacity of mobile device 105 based on the one or more
determination factor(s), such as at least one of the probabilities
computed at step 430, substantially in the manner described in
detail above with respect to step 240. However, it should again be
understood that while the description pertaining to step 240 above
relates to adjustments and transformations initiated by mobile
device 105 upon itself, here the adjustments to the operation of
mobile device 105 are initiated by central machine 168. For
example, in certain arrangements central machine 168 can transmit
an operation command, such as a command in the form of one or more
notifications, messages, and/or instructions that reflect various
adjustments that are to be made to the operational capacity of
mobile device 105, and such adjustments can then be applied to
mobile device 105 upon its receipt of the transmitted operation
command(s), and/or their application/execution, effecting similar
and/or identical results as those described in detail above with
respect to step 240 (e.g., providing notifications at mobile device
105, restricting operation of mobile device 105, and/or
transmitting notifications from mobile device 105 to third
parties). In other arrangements, central machine 168 can adjust the
operational capacity of mobile device 105 based primarily and/or
exclusively on adjustments made at and/or by central machine 168
which, in turn, preferably effect or otherwise adjust the
operational capacity of mobile device 105. For instance, in an
arrangement where central machine 168 is controlled by a mobile
communications provider such as a cellular communications provider,
an adjustment can be implemented at central machine 168 whereby one
or more of the services provided by mobile communications provider
to mobile device 105 (such as phone, SMS, and/or data services) can
be interrupted and/or otherwise adjusted or modified, thereby
effecting the operation of mobile device 105 through an adjustment
occurring at central machine 168 based on the probability computed
at step 430. It should be noted that in other arrangements,
substantially similar adjustments can be implemented upon and/or
through one or more service providers that provide one or more
services, whether directly or indirectly, to mobile device 105. By
way of illustration, various voice over IP (VoIP) providers, such
as Skype, enable users to achieve voice communications (akin to
telephone calls) over data connections (such as an internet
connection). By way of further illustrations, the `Viber` app
enables similar SMS capabilities over an internet connection. In
any event, it should be understood that the methods and systems
disclosed herein can be configured such that any necessary
adjustment can be implemented upon and/or through the requisite
service provider (for example, by limiting the calling capabilities
of Skype and/or the SMS capabilities of Viber) substantially in the
manner described in detail above.
[0234] At step 450, processor 4110 of central machine 168 executing
one or more of software modules 4130, including, preferably,
determination module 4170, outputs one or more results and/or
operation states of mobile device 105 based on the one or more
determination factor(s), such as the probability or probabilities
computed at step 430, substantially in the same manner as described
in detail above with respect to step 250. But again, as noted
above, it should be understood that while the description provided
above with respect to step 250 pertains to one or more operations
performed at mobile device 105, step 450 primarily pertains to
operations initiated and/or performed by central machine 168.
Accordingly, it can be appreciated that the one or more operation
state(s) outputted by central machine 168 reflect the operation
state(s) of mobile device 105 (for example, that the device is
being used in a handheld state and/or that the device is being used
by a driver). As noted in detail above with respect to step 250,
the outputting of the operation state(s) can be further based upon
one or more determination factor(s), such as one or more
probabilities computed at step 430, which reflects the likelihood
or degree of certainty that a user of mobile device 105 is a
driver/passenger and/or that mobile device 105 is being used in a
handheld/non-handheld state. As also noted in detail above, in
certain arrangements the operation state of mobile device 105 can
be outputted by central machine 168 to an external device or
third-party, such as a law enforcement agency, insurance company,
and/or other device 160, via communication interface 4150. Such
functionality can be advantageous in jurisdictions where
administrative regulations recommend and/or require that entities
such as mobile communications providers provide information to law
enforcement agencies that reflects the unauthorized usage of mobile
devices such as mobile device 105 while the user of the device is
driving. Similarly, such functionality can be advantageous to
insurance companies when processing an insurance claim. Even in
situations where the user of a mobile device, such as mobile device
105, is uncooperative in providing information to the insurance
company, and/or in situations where the mobile device associated
with an involved party is no longer available or has been
destroyed, central machine 168 (which receives and retains the
various pertinent notifications/inputs provided by the various
devices such as mobile device 105) can output the necessary data,
such as the operation state of mobile device 105, thereby assisting
the insurance company to make necessary decisions regarding the
validity of a particular insurance claim.
[0235] Turning now to FIG. 5, a flow diagram is described showing a
routine 500 that illustrates an aspect of a method of determining a
vehicle class of a vehicle using a first mobile device in
accordance with at least one embodiment disclosed herein. As will
be described in greater detail below, determining the vehicle class
of a particular vehicle can provide further insight and accuracy in
the determination of an in-vehicle role of a user of a mobile
device. In addition, it should be understood that the various steps
and/or operations that make up routine 500 share substantial
similarities to those described above in connection with FIGS. 2A-C
and 3-4.
[0236] The process begins at step 510 where processor 110 executing
one or more of software modules 130, including, preferably,
determination module 170, receives a first input from one or more
of sensors 145, software modules 130, user interface 172, operating
system 176, and/or communication interface 150.
[0237] Then, at step 520, processor 110 executing one or more of
software modules 130, including, preferably, determination module
170, analyzes at least the first input to identify one or more
vehicle determination characteristics within the first input. As
will be described in greater detail below, vehicle determination
characteristics are one or more aspects originating at and/or
derived from an input that provide insight regarding the vehicle
class within or upon which and/or in relation to mobile device 105
is traveling.
[0238] Upon identifying one or more vehicle determination
characteristics based on the analysis of an input, at step 530
processor 110 executing one or more of software modules 130,
including, preferably, determination module 170, computes at least
one determination factor based on the vehicle determination
characteristic(s), such as a probability that the vehicle
corresponds to a particular vehicle class.
[0239] Then, at step 550, processor 110 executing one or more of
software modules 130, including, preferably, determination module
170, outputs a vehicle class based on the one or more determination
factor(s), such as the probability or probabilities computed at
step 530.
[0240] It should also be noted that, in certain arrangements, the
processor 110 executing one or more of software modules 130,
including, preferably, determination module 170, can transform an
operation state of mobile device 105 based in whole or in part on
the determination factor(s), such as the probability computed at
step 530. This operation can be further appreciated when employed
in conjunction with a determination of an in-vehicle role of a user
of mobile device 105, such as that depicted in FIGS. 2A-C and
described in detail above. For example, in certain arrangements,
upon determining (preferably to a certain minimum probability) that
a mobile device 105 is traveling within a certain class of vehicle,
there can be little need to further determine the in-vehicle role
of the user of the device 105 (e.g., if the vehicle is an airplane,
all device usage can be prohibited, irrespective of a particular
user's in-vehicle role). By way of further example, in other
arrangements, a transformation (substantially similar to that
described in detail above with respect to step 240) can be employed
based upon both the computed probability that mobile device 105 is
traveling in a car, together with the computed probability (such as
that described in detail above with respect to step 230) that the
in-vehicle role of a user of mobile device 105 is a driver. In such
a scenario, processor 110 can coordinate various transformations
and/or adjustments to the operation(s) of mobile device 105, as
described in detail above with respect to step 240. As also noted
above, in certain arrangements various of the referenced
transformations can be employed only when either one or both of the
probabilities pertaining to the vehicle class within which mobile
device 105 is traveling and/or the in-vehicle role of the user of
mobile device 105 is a driver meet and/or exceed a certain minimum
threshold.
[0241] It can be appreciated that the physical properties of the
interiors of vehicles of different vehicle classes tend to be
different from those of other vehicle classes. Accordingly, in
certain implementations, various physical properties (e.g.,
interior height, width, volume, varying signal absorption and
reflections at different frequencies, etc.) of different vehicle
classes (e.g., bus vs. car, train vs. car) can be
processed/compared to determine the vehicle class that a mobile
device is present within, together with and/or without various
other vehicle class determination techniques, such as those
described herein and/or known to those of ordinary skill in the
art.
[0242] For example, one or more of a device's speakers can be used
to emit one or more sounds (e.g., having a certain frequency,
length, volume, etc.) (and/or signals at other frequencies, e.g.,
RF) and one or more of the device's microphones can be used to
hear/perceive such sounds and/or the echoes thereof as the sounds
emitted reflect off the objects and structure inside the vehicle
(and whose flight time can be longer than the time it takes to
travel from the device speaker to the device microphone).
[0243] For example, the time it takes for an echoed sound emitted
by a device's speakers to be perceived by the device's microphones
is relatively smaller for cars (generally having a shorter distance
to sides and ceiling) than for buses (generally having a longer
distance to sides and ceilings) or the total energy of the echoes
returned to the device will tend to be larger for cars than for
trains because of their smaller volume. In another example, the
sounds emitted are chosen to be ones that tend to reflect better
(or worse) off car interiors than off train interiors so that by
measuring the time and/or energy of the echoes returned, the
vehicle class can be more accurately identified.
[0244] In another embodiment, the sound echoing technique described
herein can also be used to better determine whether a device is
present within a vehicle or whether a device (and/or its user) is
present outside a vehicle and/or engaged in another form of
activity (with or without the use of various other trip detection
and/or activity recognition techniques, such as those described
herein or known to those of ordinary skill in the art).
[0245] In certain implementations, inputs originating from one or
more motion sensors (e.g., accelerometer, gyroscope, etc.) of a
device can be processed to determine the class of the vehicle
within which the device is located (e.g., car, bus, train, etc.)
and, based upon the determined vehicle class, one or more
restrictions (and/or no restrictions) can be employed at/in
relation to the device. For example, based on the difference
between the rates and lengths of acceleration of different vehicle
classes, it can be determined whether the pattern of acceleration
that can be perceived based on various inputs originating from
and/or determined with respect/in relation to a device (e.g.,
accelerometer. GPS, cellular, WiFi) reflects that the device is
present within a train (e.g., the forward acceleration of a train
is an order of magnitude lower than the forward acceleration of a
car, while the length of sustained acceleration of a train is
longer than that of a car), a policy of no restrictions is applied
to the device on the premise that it is a passenger device (while
different policies can be applied to those few devices of users who
are train conductors, bus drivers etc.).
[0246] Turning now to FIG. 6, a flow diagram is described showing a
routine 600 that illustrates an aspect of a method of determining a
handheld state a mobile device in accordance with at least one
embodiment disclosed herein. As will be described in greater detail
below, various of the steps and operations that make up routine 600
share substantial similarities to those described above in
connection with FIGS. 2A-C, 3, 4, and 5. However, it should be
understood that while at least FIG. 4 principally concerns
determinations occurring at central machine 168, routine 600 is
primarily directed to determinations performed at mobile device
105, as will be described in greater detail below.
[0247] The process begins at step 610 where processor 110 executing
one or more of software modules 130, including, preferably,
determination module 170, receives a first input from one or more
of sensors 145, software modules 130, user interface 172, operating
system 176, and/or communication interface 150. Preferably, the
first input originates from one or more identifying events that are
perceptible to at least one of sensors 145, user interface 172,
operating system 176, and/or communication interface 150. As
described in detail above with respect to step 210, the first input
originates from one or more identifying events that are perceptible
to at least one of sensors 145, user interface 172, operating
system 176, and/or communication interface 150 of mobile device
105, such as an acceleration input perceived by accelerometer 145A
and/or a change in orientation input perceived by gyroscope 145B.
It should be noted that in certain arrangements a series of inputs
(such as a number of acceleration inputs over a certain period of
time) and/or a combination of inputs (such as a number of
acceleration inputs and orientation inputs over a period of time)
are received, such as one or more inputs that reflect the incidence
of shaking or vibration at mobile device 105.
[0248] Then, at step 620, processor 110 executing one or more of
software modules 130, including, preferably, determination module
170, analyzes at least the first input to identify one or more
handheld state characteristics within the notification. As
described in detail above with respect to step 420, handheld state
characteristics are one or more aspects originating at and/or
derived from one or more input(s) that provide insight regarding
the handheld state of a mobile device, such as mobile device 105,
such as whether mobile device 105 is being operated by a user in a
handheld or non-handheld state. For example, various orientations
and/or sudden changes perceived by gyroscope 145B (preferably, in
certain scenarios, in combination with one or more inputs from
various other sensors 145 such as accelerometer 145A, GPS 145C,
and/or magnetometer 145E) can indicate that mobile device 105 is
being operated in a handheld state by a user. By way of further
example, a relatively constant pattern of inputs from accelerometer
145A and/or gyroscope 145B can indicate that mobile device 105 is
positioned in a relatively stable manner, thus indicating that it
is being operated in a non-handheld state.
[0249] At step 630, processor 110 executing one or more of software
modules 130, including, preferably, determination module 170,
computes one or more determination factor(s), based on the handheld
state determination characteristic(s), such as a probability that
that the handheld state of mobile device 105 is handheld, or that
the handheld state of mobile device 105 is non-handheld. By way of
example, based on a series of accelerometer 145A and gyroscope 145B
inputs, the pattern of which indicates ongoing vibration and/or
movement, it can be computed that there is a high probability
(e.g., greater than 90%) that mobile device 105 is being operated
in a handheld state. This is because a user of handheld mobile
device 105--and particularly a driver who is further distracted by
his/her driving responsibilities is liable to produce far more
vibration/shaking that is perceptible by mobile device 105,
especially as compared to a non-handheld device that is stationed
in a dock, for instance. In any event, at step 630, such
probabilities are computed, reflecting a probability that the
handheld state of the mobile device 105 is handheld, and/or a
probability that the handheld state of the mobile device 105 is
non-handheld, in a manner substantially similar to that described
in detail above with respect to steps 230 and 430. It should be
understood that, as described in detail above, in certain
arrangements the handheld state characteristics identified at step
620 can provide varying degrees of certitude as to the handheld
state of mobile device 105. Accordingly, it should be appreciated
that because ranges exist of a particular handheld state
characteristic (such as device shake patterns), a probability that
a handheld state of mobile device 105 is handheld/non-handheld
preferably reflects a degree of certainty across such a probability
spectrum, as described in detail above.
[0250] At step 650, processor 110 executing one or more of software
modules 130, including, preferably, determination module 170,
outputs one or more handheld states of mobile device 105 based on
the one or more determination factor(s), such as the probability or
probabilities computed at step 630, substantially in the same
manner as described in detail above with respect to steps 250, 450,
and 550. For example, if, at step 630, it is computed that it is
90% likely that mobile device 105 is being operated in a handheld
state, at step 650 a notification can be provided at mobile device
105 indicating that it has been determined that the device is being
so operated. In certain arrangements such a notification can
further include a suggestion/instruction that the user of the
device 105 refrain from further use of the device, in deference to
regulatory guidelines. In other arrangements, the handheld state of
mobile device 105 can be output to a third-party, such as a law
enforcement agency, under appropriate circumstances. Additionally,
as noted in detail above with respect to step 250, such outputting
can, in certain arrangements, be contingent upon a certain minimum
probability being computed (e.g., a 90% or greater probability that
a mobile device 105 is operating in a handheld state), while in
other arrangements the handheld state can be outputted across any
and/or all degrees of probability.
[0251] Described herein in various implementations are techniques
(including methods, systems, etc.) that are operative to improve
the accuracy of various determinations, including determinations
pertaining to whether a device is in a particular context (or not)
and/or reducing the power consumed/expended (such as by the device)
in order to make such determination(s). Such techniques can be
advantageous, for example, in situations in which such
determinations are to be made repeatedly over extended periods of
time. It should be understood that, in certain situations,
particular sources of information that may otherwise be
considered/analyzed in order to make certain context-based
determinations/decisions may not be available. For example, in
various urban locations or in certain climatic conditions (e.g.,
during cloudy/stormy weather) GPS information may not be available,
and such inputs are thus unavailable to be used in determining
movement and/or speed by/in relation to a device. It can also be
appreciated that usage of such sensors can consume substantial
amounts of power at the device. As such, it can be advantageous
(such as in circumstances in which one or more sensors/inputs are
unavailable or unreliable) to employ determination techniques that
use different/alternative sources of information (such as other
sensors) in order to determine a context of the device.
[0252] FIG. 27 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 2705, one or more power charging aspects can be determined, such
as in relation to a user device. At 2710, the one or more power
charging aspects can be processed. In doing so, a context of the
user device can be determined. At 2715 one or more operations can
be initiated. In certain implementations, such operations can be
initiated based on the context. Moreover, in certain
implementations, such operations can be initiated in relation to
the user device.
[0253] FIG. 28 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 2805, one or more indications can be received. In certain
implementations each of the one or more indications can correspond
to a perception of one or more access points. Moreover, in certain
implementations each of the one or more indications can be
associated with an operational context of a device. At 2810, the
one or more indications can be processed. In certain
implementations, such indications can be processed in order to
determine one or more characteristics associated with one or more
respective perceptions of at least one of the one or more access
points. At 2815, the one or more characteristics can be associated
with one or more operational contexts. At 2820, one or more
operations can be initiated. In certain implementations, such
operations can be initiated based on a determination of at least
one of the one or more characteristics in relation to a user
device. Moreover, in certain implementations such operations can be
initiated in relation to the user device based on at least one of
the one or more operational contexts.
[0254] FIG. 29 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 2905, one or more operational characteristics of a device can be
identified. At 2910, one or more contextual determination methods
can be selectively employed, such as in relation to the device. In
certain implementations, such determinations can be employed based
on the operational characteristics. At 2915, an inapplicability of
at least one of the one or more contextual determination methods
can be determined, such as in relation to the device. In certain
implementations such an inapplicability can be determined based on
at least one of the operational characteristics.
[0255] FIG. 30 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 3005 one or more indications can be received. In certain
implementations, each of the one or more indications can correspond
to a perception of one or more access points, such as in relation
to a user device. In certain implementations, at least one of the
one or more indications can include one or more locations, such as
those corresponding to the at least one of the one or more access
points. At 3010, the one or more indications can be processed, such
as in relation to one or more access point records. In doing so,
one or more characteristics of at least one of the one or more
access points can be determined. In certain implementations, the
one or more characteristics can include (a) nomadic or (b)
stationary. In certain implementations, the one or more locations
can be processed, such as in order to determine a locational
variability, such as with respect to the at least one of the one or
more access points. In certain implementations, the locational
variability can include a difference between (a) a location
associated with a connection to the at least one of the one or more
access points and (b) a location associated with a disconnection
from the at least one of the one or more access points. At 3015, a
context of the user device can be determined. In certain
implementations, such a context can be determined based on the one
or more characteristics. In certain implementations, the context
can include at least one of: (a) within a vehicle, (b) not within a
vehicle, (c) within a trip, or (d) not within a trip. In certain
implementations, it can be determined that the user device is at
least one of (a) not within a vehicle or (b) not within a trip,
such as based on a determination that the user device perceived a
stationary access point throughout a chronological period. In
certain implementations, a context of the user device can be
determined, such as based on the locational variability.
[0256] FIG. 31 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 3105 one or more indications can be received. In certain
implementations, each of the one or more indications can correspond
to a perception of one or more access points, such as in relation
to a user device. At 3110, the one or more indications can be
processed, such as in order to determine a variability with respect
to the one or more indications. In certain implementations, the
variability can include a quantity of distinct access points
perceived during a chronological period. At 3115, a context of the
user device can be determined, such as based on the
variability.
[0257] FIG. 32 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 3205 one or more indications can be received. In certain
implementations, each of the one or more indications can correspond
to a perception of one or more access points, such as in relation
to a user device. At 3210, the one or more indications can be
processed, such as in order to determine a quantity of access
points perceptible to the user device. At 3215, a context of the
user device can be determined, such as based on the quantity. In
certain implementations, the context can include (a) an urban
location or (b) a rural location. At 3220, a trip determination
threshold can be selected, such as with respect to the user device.
In certain implementations, the trip determination threshold can be
selected based on the context.
[0258] FIG. 44 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 4405 one or more indications can be received, each of the one or
more indications corresponding to a perception of one or more
access points in relation to a user device. At 4410, the one or
more indications can be processed, such as to determine one or more
characteristics of at least one of the one or more access points.
At 4415, a context of the user device can be determined, such as
based on the one or more characteristics. At 4420, one or more
characteristics can be associated with one or more operational
contexts. At 4425, one or more operations can be initiated, such as
based on a determination of at least one of the one or more
characteristics in relation to a user device. In certain
implementations, the one or more operations can be initiated in
relation to the user device based on at least one of the one or
more operational contexts. At 4430, a trip determination threshold
can be selected with respect to the user device, such as based on a
context.
[0259] FIG. 45 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 4505 one or more inputs associated with a user device can be
processed, such as to determine one or more mobility
characteristics of the user device. At 4510, a context of the user
device can be determined, such as based on a determination that the
one or more mobility characteristics comprise mobile operation and
do not comprise operation consistent with walking.
[0260] FIG. 46 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 4605 an indication can be received, corresponding to a
perception of a nomadic access point in relation to a user device.
At 4610, a quantity of devices with respect to which the nomadic
access point is perceptible can be determined. At 4615, a context
of the user device can be determining, such as based on the
quantity.
[0261] By way of illustration, various techniques described herein
can pertain to determinations as to whether or not a device is
present/operational `within a vehicle` (e.g., a moving vehicle)
and/or `within a trip` (e.g., a trip within a moving vehicle) (it
should be noted that such terms can be used interchangeably). In
doing so, various aspects of the power consumed/expended by a
device (such as in order to make one or more of the referenced
determinations) can be reduced. Moreover, one or more of the
referenced techniques can also be implemented to determine or
otherwise detect other contexts while consuming/expending
relatively less power, e.g., determining the in-vehicle role of a
user of a particular device, whether or not a device is present
within a class or on school grounds, what mode/class of
transportation/vehicle the device is present within (e.g., car,
train, bus, bicycle, walking, etc.), whether or not the user is a
vulnerable road user, and more.
[0262] In one implementation, information related to one or more
aspects of the battery and/or the power consumption of a device
(e.g., whether the device is connected to power, the voltage across
the battery of the device, the charge level and/or the battery
temperature level of the battery of the device) and/or changes
thereto over time (e.g., variability), can be used to determine
whether the device is in a vehicle.
[0263] For example, being that device batteries are likely to
charge relatively less quickly when connected to power within a
vehicle than such batteries charge when plugged into a wall outlet
(in light of the generally lower amperage of car chargers as
compared to wall chargers), a determination that the charge level
of a battery that is connected to power is increasing relatively
slowly can indicated an increased likelihood that the device is
present within a vehicle.
[0264] Moreover, in certain implementations the referenced
technique(s) can also incorporate aspects relating to the power
being consumed by the device (e.g., in order to operate). For
example, with respect to a device that is connected to a power
source and whose battery level is increasing relatively slowly and
is not consuming/expending significant amounts of power (that might
otherwise account for such a relatively slow battery level
increase, such as applications running, screen state. GPS,
Bluetooth, WiFi etc., sensors sampled), it can be determined that
such a device is relatively likely to be present within a vehicle
(rather than being connected to a wall outlet). In yet further
implementations, such technique(s) can further incorporate various
comparisons and/or machine learning techniques with respect to
characteristics pertaining to the battery of a device (e.g., in
relation to the performance/operation of the specific battery
and/or the specific device and/or across a population of identical
and/or similar/comparable model batteries and/or devices over
time).
[0265] In certain implementations a variability in the rate at
which a battery charges can be used to determine a context in which
a device is operating (e.g., within a vehicle). Such determinations
can be made based on the variability in the rate at which the
battery of a device charges, as a device that is connected to a car
charger is relatively more likely to display a relatively more
variable battery charge rate than a device connected to a wall
outlet.
[0266] In another implementation, one or more aspects of a context
within which a device is present/operating can be determined based
on the voltage across a battery of the device and/or changes
thereto. Such determinations can be made, for example, based on the
fact that the voltage across a battery of a device that is
connected to a car charger is likely to exhibit relatively more
variability than that of a device connected to a wall outlet. In
another example, various determinations can be performed in order
to identify/distinguish between various types of power charge
sources such as solar battery chargers and fixed wall chargers,
based on the variability of the power from such sources (e.g., a
power source providing a relatively smaller current, a relatively
more variable current, and/or a current having a relatively more
variable voltage, can be determined to be relatively more likely to
be present within a vehicle, and vice versa) that they are able to
provide to the device battery.
[0267] In another implementation, various determinations pertaining
to the context within which a device is present/operating (e.g.,
within a vehicle) can be achieved based on the temperature of a
battery of the device. Moreover, and changes in such temperature(s)
can be used to determine one or more contexts of the device (e.g.,
whether the device is within a vehicle). Such determination(s) can
be made, for example, in light of the fact that the temperature of
a device that is connected to a car charger is likely to exhibit
different characteristics (e.g., more extreme temperatures) than
those exhibited by/observed in relation to a device connected to a
wall outlet.
[0268] Moreover, in certain implementations one or more
determinations pertaining to a hands-free state of a device (e.g.,
where the device is positioned/held within a vehicle) can be made
based on one or more aspects of the power connection status of the
device. For example, it can be appreciated that a device that is
connected to a power source is relatively more likely to be
operated by a driver than by a passenger (in light of the fact
that, for example, a vehicle is relatively more likely to have one
or more a power connections that are compatible with a device
operated by a driver, and the locations such power sources, such as
a cradle/dock having a power connection, is relatively more likely
to be positioned in closer proximity to a driver than a passenger,
etc.).
[0269] In certain implementations, various factors, aspects,
metrics, etc., including but not limited to: (i) whether a device
was connected to power at any point during a trip, (ii) the time
into the trip at which it was so connected, (iii) the length of
time for which it was connected, (iv) the battery level at the time
at which it was connected, (v) the magnitude of the electric
current at which it charged and (vi) the charging port to which it
was connected (e.g., as reported by the vehicle to the device or as
learned by one or more devices over time), can all assist/be
factored in determining if the device is a driver device or a
passenger device.
[0270] It can be appreciated that drivers may tend to connect to
power more frequently than passengers because drivers are often
more familiar, tend the have chargers appropriate for their
devices, and often have only one charger available. Accordingly, if
a device is determined to have been connected to power during a
trip, it is more likely to be a driver device than a passenger
device. The earlier in a trip a device was connected to power (the
driver connecting by force of habit, the driver connecting because
she knew how to do so, etc.), the more likely it is to be a driver
device. The more battery remaining in a device when it is connected
to power, the more likely it is to be a driver device (because, for
example, a passenger is less likely to impose on a driver unless
there is a greater battery problem on their device). In vehicles
that have multiple charging ports, the role of a device user that
connects to power can be determined from the port that she connects
her device to. For example, a driver is less likely to connect her
device to a passenger charging port.
[0271] In certain implementations, when a device is connected to a
power source and its context (e.g., within a vehicle vs. outside of
a vehicle, within school grounds vs. outside of school grounds,
etc.) has been identified and/or can be determined, one or more
further determinations can be made with respect to the ongoing
state/status of such a device. For example, it can be determined
that such a device is relatively likely to remain within or
otherwise maintain the same/comparable context at least until the
device is no longer connected to a power source. Accordingly, in
certain implementations, having determined that a device is
connected to a power source, one or more instance(s) (e.g., a
"short burst") of additional determination techniques (e.g.,
contextual determinations, such as those described herein), such as
those that may entail higher or additional power consumption, can
be initiated or otherwise employed. In doing so, a determination of
the context within which a device is present/operating can be
achieved initially (i.e., upon connecting the device to a power
source) such that, having identified/determined such a context,
various aspects of the power consumption of the device can be
reduced (e.g., over the medium and long terms). For example, having
determined that a particular device is connected to a power source,
one or more sensors of the device (e.g., GPS, WiFi radio, cellular
radio, Bluetooth radio, accelerometer, gyroscope, etc.) can be
turned on/activated, such as for a period of time, in order to
obtain/receive one or more inputs based upon which it can be
determined whether the device is (or is not) present/operating
within a vehicle. Based on a determination that the device is not
present/operating within a vehicle, it can be further determined
that the device is subsequently not present/operating within a
vehicle as long as and/or at least until such time as the device is
determined to no longer be connected to a power source (and/or
connected to the power source with respect to which the device was
initially connected). Based on a determination that the device is
present/operating within a vehicle, it can be further determined
that such a state/status is likely continue, and thus that that the
device is to continue to be present/operating within the vehicle,
at least until such time as is the device is determined to no
longer be connected to a power source (and/or connected to the
power source with respect to which the device was initially
connected).
[0272] In certain implementations, the manner in which one or more
determinations are made, such as with respect to the context of a
device within a vehicle (e.g., trip start, trip end, vehicle class,
in-vehicle role, in-vehicle location, etc., such as are described
herein) can be further configured, modified, adjusted, etc., based
on/with respect to whether or not the device can be determined to
be (or has or has not recently been) connected to power (e.g., the
various techniques that are used to compute the referenced
determinations can be adjusted or changed based on whether a device
is and/or isn't connected to power). For example, when a mobile
device is connected to power, it may use its GPS radio more
intensively (without depleting the device's battery), either
directly and/or indirectly (e.g., by leveraging other OS processes
or user processes that may do so), to help determine one or more
contexts in which the mobile device is in (e.g., trip start, trip
end, vehicle class, in-vehicle role, in-vehicle location,
etc.).
[0273] It can be appreciated that one or more of the techniques
described herein operate based on the assumption that power sources
(with respect to which the various determinations are computed) are
non-nomadic (i.e., that such power sources/supplies are fixed in a
particular location). Accordingly, while in certain situations
nomadic power sources/supplies can also be implemented (e.g.,
external batteries, portable power sources, etc.), the use of such
nomadic power sources can be determined/detected and/or otherwise
accounted for in a number of ways. For example, the usage of such
nomadic power sources can be determined based on the level of
current or voltage identified at the device/batter (and/or changes
thereto), and/or via the magnetometer of the device (and/or changes
thereto), and/or based on one or more movement patterns that can be
identified as being consistent with the use of a heavier device, as
can be determined based on one or more inputs originating from
various motion sensors of the device (e.g., accelerometer,
gyroscope). Additionally, such nomadic power sources are relatively
less common and/or can entail various barriers to user adoption
(e.g., cost, size, weight, being cumbersome, etc.). Moreover, one
or more of the referenced determinations can be
accumulated/maintained over time, such as with respect to a
particular device, a user/user account associated with a device,
etc. As such, a device and/or a user/user account that has been
determined (such as on an ongoing basis) to utilize a nomadic power
supply, the referenced techniques (which, for example, determine a
context of a device based upon a power connection state/status of
the device) can be utilized relatively more selectively and/or not
at all with respect to such devices.
[0274] In certain implementations, based on a determination that a
device is connected to a power source, a scan of WiFi access points
that are perceptible to the device can be initiated or otherwise
performed, such as at one or more intervals. In doing so, the
number/quantity of and/or identities (e.g., service set identifiers
or `SSIDs`) associated with WiFi access points that are
subsequently perceptible at the device can be compared to an
initial/previous number/quantity of and/or identities associated
with WiFi access points perceptible at the device. In doing so, a
determination can be made with respect to whether or not (and/or
when) the device is moving, such as is described in greater detail
herein. For example, in a scenario where access points A, B and C
are perceptible at a device, and at a subsequent time only access
points D, E and F are visible, it can be determined that it is
relatively likely that the device has moved (on account of the
changing identities of the access points perceptible at the
device).
[0275] Moreover, scenarios can anise whereby, at one time/interval
there were no (or relatively fewer) access points perceptible, and
at a later interval there are one (or relatively few
new/additional) access points visible. It can be appreciated that,
in such scenarios, determinations pertaining to whether the device
has moved may be relatively less accurate (in light of the fact
that a single newly perceived access point may have just been
turned on despite the fact that the device remains stationary).
Accordingly, in certain implementations one or more timestamp(s)
contained/embedded within the access point beacon can be used to
determine an uptime of the access point. Based on a determination
that the uptime of the access point is relatively low, it can be
further determined that the access point is likely to have been
turned on relatively recently and the referenced change(s) with
respect to the perception of various access point(s) under such
circumstances may thus not provide accurate determinations with
respect to the movement of the device. However, based on a
determination that the uptime of the access point is relatively
high, the referenced change(s) with respect to the perception of
various access point(s) can provide relatively accurate
determinations with respect to movement of the device, as described
herein.
[0276] In certain implementations, the context within which a
device is present/operating (e.g., within a car vs, at an office
vs, at home) can be determined in relation to various aspects of
the power connectivity/connection associated with the device, by
using one or more machine learning techniques (as are known to
those of ordinary skill in the art) to identify, such as over time,
one or more patterns, properties, and/or characteristics associated
with various power sources/chargers that the device connects to
and/or associating such patterns, properties, and/or
characteristics with one or more contexts. That is, it can be
appreciated that many users can utilize different power
sources/chargers in different locations (e.g., a USB charger at
work, a cigarette lighter charger in the car and a wall charger at
home). Such power sources can have different electrical properties
(current, voltage, etc.) that can be perceived at/in relation to
the device (e.g., USB charger in the office may charge the battery
of a particular device at 240 mAh, thereby charging the battery at
a rate of 0.2% minute, while a car charger may charge the battery
at 600 mAh, thereby charging the battery at a rate of 0.5%/minute,
and an AC wall charger at home may charge the battery at 1200 mAh,
thereby charging the battery at a rate of at 1%/minute.
Accordingly, for example, based on one (or more determinations)
that the battery of the device is being charged at a rate of
0.5%/minute concurrent with or otherwise chronologically proximate
to a time with respect to which such a device can also be
determined to be present/operating within a vehicle (such as a
moving vehicle), it can be further determined, with respect to the
connection of such a device to a power source and charging of the
battery of the device at a rate of 0.5%/min, that such
characteristics/aspects indicate that it is relatively likely that
the device is present/operating within a vehicle.
[0277] In certain implementations, one or more connectivity
state(s) of the device can be used to determine whether or not the
device is present/operating within a vehicle. For example, based on
a determination that the device is connected to a WiFi access
point, the performance of various power consuming operations (that
might otherwise be performed by/in relation the device, such as
using the GPS of the device to determine whether the device is
moving) can be avoided and/or limited (such as by performing such
operations less frequently). Moreover, the device can continue to
operate in such a fashion (i.e., avoiding/limiting the use of such
operations) until the referenced WiFi connection is terminated
(and/or shortly thereafter). It can be appreciated that, in light
of the fact that relatively few vehicles have WiFi access points,
an ongoing connection to a WiFi access point can indicate that the
device is relatively unlikely to be in a vehicle. Moreover, in
certain implementations, based on a determination that a device
is/is not connected to a Wifi AP, it can be determined that such a
device is not/is present within a vehicle (such as a moving
vehicle). Moreover, in certain implementations, one or more
operations can be initiated, such as with respect to the device
(e.g., employing, modifying, removing various restrictions that are
employed with respect to the operation of the device).
[0278] Moreover, in certain implementations one or more of the
technologies described herein can incorporate one or more machine
learning techniques, such as with respect to the WiFi access points
that are perceptible to a particular device. In doing so, one or
more determinations can be made, such as with respect to whether
(a) an access point is static/stationary (e.g., within a home,
office, etc.), as can be determined, for example, based on one or
more perceptions of such WiFi access points by the device
concurrent with and/or in chronological proximity to one or more
determinations that indicate that the device is unlikely to be
moving, or (b) an access point is dynamic/mobile (e.g., within or
on a car, train, bus, etc.) based on one or more perceptions of
such WiFi access points by the device concurrent with and/or in
chronological proximity to one or more determinations that indicate
that the device is likely to be moving. The referenced
determinations can be made, for example, by measuring the one or
more aspects of the motion(s) that can be perceived by/in relation
to the device (based on one or more inputs that can originate, for
example, from information/sources such as GPS, cellular IDs,
cellular RSSI, WiFi Ids, Wifi RSSI, accelerometer, gyroscope, etc.)
concurrent with and/or in relatively close proximity to one or more
determinations that the device is connected to (or is otherwise
able to perceive or "hear" without necessarily being connected to)
a WiFi access point (or through the use of a third-party database
of Wifi access points, such as Skyhook, based upon which and/or in
relation to which such determinations can be made).
[0279] Moreover, the context within/in relation to which a device
is present/operating (e.g., whether a trip, such as in a vehicle,
has commenced, whether the device is within a moving vehicle,
whether the device is with a user walking, the vehicle class of a
vehicle, etc.) can be determined based on various
determinations/identifications. For example, in certain
implementations, based on (a) a determination that a device is
connected to a power source, and (b) a determination that one or
more wireless (WiFi). Bluetooth, cellular, etc., signals (such as
those originating from a WiFi access point) and/or one or more
inputs originating at one or more sensors (e.g., accelerometer,
gyroscope, magnetometer, proximity, pressure, light, camera,
microphone, etc.), are changing (e.g., changing above a certain
threshold/degree of change) (e.g., different WiFi access point
BSSIDs are determined to be coming into/out of view, cell tower
signal strengths are determined to be changing more than a certain
amount, etc.), it can be determined that the device is likely to be
within a moving vehicle. Moreover, it can be determined that the
device is relatively less likely to be in certain types of moving
vehicles (e.g., bicycle, elevator) because devices are relatively
less likely to be connected to power in such situations. In
addition, upon determining that a device is connected to a power
source, one or more of the various determination techniques
described herein (such as those pertaining to aspects of the power
connectivity and/or power consumption of a device) can be employed.
In doing so, such determinations with respect to the context of the
device can be utilized to conserve power (e.g., by deactivating,
utilizing relatively less frequently and/or in a different way,
and/or not utilizing at all, one or more sensors, functions, and/or
operations of the device, such as those that consume power, based
on the determined context of the device). Such functionality can be
advantageous even when a device is connected to a power source
(e.g., an AC outlet) because a user may only have a limited amount
of time to charge his/her device and utilizing relatively less
power can enable the battery to charge more quickly.
[0280] Additionally, in certain implementations (including in
scenarios where a device may or may not be connected to power),
based on (a) a determination that one or more wireless (WiFi),
Bluetooth, cellular, etc., signals (such as those originating from
a WiFi access point) are changing (e.g., changing above a certain
threshold/degree of change) (e.g., different SSIDs are determined
to be coming into/out of view, signal strengths are determined to
be changing more than a certain amount, etc.), and (b) a
determination that the device is not moving in a manner consistent
with one or more activity types and/or vehicle classes (e.g. the
device is determined to be moving in a manner consistent with a
user walking, a user bicycling, a user riding an elevator, etc.)
and/or in the absence of a determination that the device is moving
in a manner consistent with such one or more activity types and/or
vehicle classes (as can be determined, for example, in the case of
user walking, using various pedometric determination techniques, as
are known to those of ordinary skill in the art, or in the case of
a user in an elevator, for example, using a pressure sensor on the
device to determine a relatively significant change in pressure
over a relatively short time and/or distance), it can be determined
that the device is likely to be present in conjunction with certain
activity types and/or within certain vehicles classes types. In
making such determinations based on the referenced factors (e.g.,
changes pertaining to WiFi access points), a determination that a
device is, for example, present within a moving vehicle, can be
made even without the use of the device's GPS (which can otherwise
entail considerable battery discharge).
[0281] It should be noted that the utilization of techniques that
enable the determination of the activity being performed and/or the
vehicle class being used by eliminating (or otherwise determining a
relatively low likelihood of) certain types of activities or
vehicles (i.e., via a `process of elimination`) can, in certain
scenarios, enable relatively more effective and/or efficient
determination as to which activity is being performed and/or
vehicle class is being used than afforded through the use of
`positive` or affirmative activity or vehicle class
identification/determination techniques. As in the above example,
it can be relatively easier/efficient, more accurate, require less
power, and/or faster to determine that it is relatively likely that
a device is in a moving vehicle by determining that the device is
not present with a user walking, than by affirmatively determining
that the device is relatively likely to be present within a moving
vehicle (e.g., based on a determination that its spectral frequency
is within a certain range, etc., as described herein). For example,
based on a determination a device is connected to a power source,
it can be further determined (even without having to use any
additional battery power) that the device is relatively unlikely to
be with a user who is walking or cycling. For example, determining
that the device is not present with a user who is walking can be
achieved by sampling an accelerometer and/or gyroscope for
signs/indications/patterns of walking, which can be done at a
relatively lower sampling rate (thereby consuming less battery
power) than otherwise required to determine that the device is
present within a moving vehicle.
[0282] In certain implementations, based on a determination that a
user/device has moved more than a certain distance (e.g., more than
a distance that could otherwise be attributed to GPS `noise,` even
if not moving), such as within a certain period of time, and
further based on a determination that the device has not been
operating in a manner that can be determined to be sufficiently
consistent to walking (such as within the referenced period), the
user/device can be determined to be present within a moving
vehicle.
[0283] It should be noted that the various techniques described
herein (including the referenced `negative` or `reverse`
determinations that are based on one or more determinations of
context(s) that a device is not present with respect to) can be
employed in order to make any number of determinations, including
but not limited to: activity determination(s), vehicle movement
determination(s), and/or vehicle class determination(s). In doing
so, such determinations can be achieved even in
scenarios/situations where determination-related `blind spots`
might otherwise be present, such as in scenarios where GPS signals
are not available or otherwise reliable (e.g., in tunnels,
underground garages, cities with tall buildings, indoors, inclement
weather, etc.).
[0284] A vehicular trip can be determined based on inputs
originating from a device's motion sensors by perceiving
centripetal forces with magnitudes within certain ranges (e.g., 0.1
g to 1 g), and for certain lengths of time (e.g., more than 1
second). The accuracy/correctness of such a trip determination can
be quickly verified by determining the device locations and whether
it recently traversed a turn in the direction and with a radius
consistent with what was perceived by the motion sensors on the
device.
[0285] A vehicular trip can also be determined based on forward
acceleration of sufficient magnitude and length. For example, a
device that perceives significant acceleration (or change in
acceleration) along an axis for sufficiently long (e.g., more than
1 second) is likely to be in a trip.
[0286] The described techniques can be applied in an
orientation-variant way, e.g., the device orientation is resolved
using the device sensors (e.g., acceleration, gyroscope,
magnetometer, GPS) or in an orientation-invariant way, i.e.,
acceleration across any/all axes is used to make such
determination.
[0287] It should also be noted that the various techniques
described herein can also enable the identification/determination
of vehicles moving at practically any speed (in contrast to
otherwise waiting for the vehicle to reach a speed at which it can
be determined that an unaided human cannot reasonably travel in
order to affirmatively determine that a device is present within a
moving vehicle). In employing such techniques, it can be determined
that a device is present within a moving vehicle even in a scenario
where the vehicle is moving at a relatively slow speed.
[0288] Additionally, upon identifying/determining that a device is
present within a moving vehicle, it can be further determined that
such a device is no longer present within a moving vehicle upon
identifying/determining that the device is present in conjunction
with `walking.` (It should be noted that the terms `walking.` `user
walking,` etc., as used herein are intended to encompass any and/or
all forms of unaided human movement, such as walking, running
skipping, etc.) Accordingly, it can be appreciated that employing
one or more of the referenced techniques can enable
determination(s) of one or more activities, operations, presence of
a device within a moving vehicle, vehicle class(es), etc., without
the use of GPS. In addition, in various implementations, the GPS of
a device can, for example, be utilized only when other signals are
not sufficiently strong, clear, accurate, etc., and/or to confirm
the accuracy of such other determinations.
[0289] It should be further noted that, in certain implementations,
one or more determinations can be made with respect to vehicle
class based on the perception/identification of one or more RF
devices (e.g., WiFi APs, BT devices, etc.) that are in proximity
of/present within the vehicle. In order to do so, for example, the
identity (e.g., BSSID, SSID, MAC address, etc.) of the RF device
can be used to determine a likelihood of a particular vehicle class
(with respect to which the device is present). In doing so, it can
be detected/determined that the device is present within a moving
vehicle (such as in the manner described herein). An identity of
one or more related/comparable/similar RF devices can be
identified/determined, such as based on/in relation to a database
that can maintain identities of various RF devices and their
respective associated vehicle classes (as determined, for example,
based on inputs originating at one or more sensors of various
devices, such as in the manner described herein). Moreover, one or
more determinations (e.g., of a vehicle class) can be made based on
similar, related, and/or comparable (even if not identical) RF
device identity information, such as that stored/maintained in such
a database. For example, in a scenario where a first BSSID of a
WiFi AP is close/similar/comparable/related to another BSSID of
another WiFi AP that is identified/has been determined to be in a
public bus, the first BSSID can be determined to be likely to be
operating in relation to a bus, too (in light of the fact that bus
corporations tend to purchase in bulk and are relatively likely to
receive successively/closely numbered devices). For example, if a
data value of an RF device, like a WiFi AP's SSID, is an SSID
identified/determined to be used in a public train (e.g.,
"AmtrakConnect"), then it can be determined, with respect to
another RF device having the same SSID or a similar/comparable SSID
(e.g., "AmtrakConnect2") that such a device with the
same/comparable SSID is also on a public train. It should be noted
that potential errors in such determinations that may arise can be
corrected by using one or more techniques (such as those described
herein) to validate the determined vehicle class in relation to
such RF devices. Additionally, the RF devices operating in relation
to vehicles in certain vehicles classes (e.g., buses, trains) are
relatively likely to be perceived by multiple mobile devices
simultaneously and over time than, for example, in a car. As such,
one or more determinations as to the class of a vehicle can be made
based on the relative quantity of devices that perceive such an RF
device simultaneously and/or over time. Thus, the greater the
number of devices determined to simultaneously and/or over time
perceive a particular RF device, the relatively more likely it is
that such devices are present within certain types of "mass"
vehicle classes (e.g., train, bus, etc.). Moreover, such RF
device(s) can be associated with a particular vehicle class on that
basis, and/or using one or more techniques such as those described
herein.
[0290] The accuracy of such determinations can be further improved
over time. For example, observing the same and/or similar changes
with regard to certain access points--such as during a
trip--multiple times, can further confirnn that subsequent
comparable observations can also be determined to be occurring
during a trip. It should also be noted that the accuracy of the
referenced determinations can be further improved based on a
determination that the referenced signals (e.g., those originating
from WiFi access points, etc.) originate from a nomadic and/or
non-nomadic source, as determined, for example, using one or more
of the techniques described/referenced herein. Moreover, in
scenarios where the various wireless, etc., signals are not
available (or cannot otherwise be relied upon), the GPS can be
utilized, alone or in conjunction with other signals and/or
sensors), to determine whether the device is present within a
moving vehicle, etc. It should also be noted that one or more
additional determinations can be made (e.g., upon determining that
a device is within a moving vehicle), such as with regard to the
type of vehicle that the device is in (e.g., car, boat, train, bus,
etc.), such as in the manner described herein.
[0291] In addition, in certain implementations one or more
determinations can be made with respect to the characterization
and/or classification of various WiFi access points (such as
stationary/static/fixed/non-nomadic or mobile/dynamic/nomadic).
Such determinations can be made, for example, based on (a)
information accumulated/stored by/in relation to a device (such as
over time), (b) information accumulated by/in relation to multiple
devices (i.e., `crowd-sourced`) (such as over time), (c) based on
information contained/identified within various WiFi broadcasts
(reflecting, for example, the manufacturer, model, etc., of an
access point), as can be identified, for example, based on one or
more comparisons with one or more databases (as can be stored on
the device and/or remotely) that contain data pertaining to which
manufacturers, models, etc, are likely to be utilized in
stationary/static/fixed/non-nomadic or mobile/dynamic/nomadic
contexts, and/or (d) in conjunction with third party services.
[0292] In another implementation, one or more of the contextual
determinations described herein can be further configured to
operate based on/in relation to a premise/default/assumption that a
device is not present/operating within a vehicle based on a
determination that such a device is connected to an access point
that can be determined to be non-nomadic access point (i.e., an
access point that can be determined to have a relatively fixed
location and/or whose location is not determined to change
relatively regularly). Examples of such a non-nomadic/stationary
access point can include a WiFi access point in an office network
(in contrast to an in-vehicle WiFi access point or a mobile device
that can serve as a WiFi access point, a such devices can be
determined to be mobile).
[0293] It should be noted that, in certain implementations, the
manner in which a particular access point, such as a WiFi access
point, can be determined to be non-nomadic/stationary can be
achieved in a number of ways. For example, in certain
implementations the nomadicity (that is, the nomadic/non-nomadic
state/status) of an access point can be determined based on/in
relation to a database (local or remote) that can maintain
information pertaining to various access points, and/or that
contains respective classifications of such access points, such as
in relation to the nomadic/stationary and/or non-nomadic/mobile
characteristics/properties of such access points (e.g., BSSIDs).
Such a database can be built/compiled, for example, based on the
results of various nomadic/non-nomadic determinations that can be
performed with respect to various access points, such as is
described herein (with respect to individual devices and/or
accumulated across devices, such as via `crowd-sourcing,` and/or
utilizing a third party database of WiFi access points, such as
Skyhook, that can provide the referenced nomadic/non-nomadic
information/determinations, or, based on a determination that, by
virtue of the method with respect to which information pertaining
to such WiFi access points was collected/gathered, that the
referenced WiFi access point records/entries pertain to non-nomadic
access points.
[0294] Moreover, in certain implementations the nomadicity of a an
access point can be determined by querying/looking up the
referenced access point within a database (local or remote) that
maintains associations of the context within which the device is
present/operating with an identifier of the WiFi access point
(e.g., a BSSID) that is the device is/was connected to. Such a
database can be generated based on the results of one or more
determinations that pertain to the context within which a device is
present/operating in relation to the access point to which the
device is connected, as described herein (both with respect to
individual devices and/or accumulated across devices, such as via
`crowd-sourcing,` and/or may be a third party database of access
points that provides such information. For example, based on a
determination that on multiple instances a device was connected to
a particular WiFi access point and was also determined not to be
present/operating within a vehicle, then upon subsequently
determining that the device is again connected to the same WiFi
access point, it can be determined that the device is again
relatively likely t not to be present/operating within a
vehicle.
[0295] Additionally, in certain implementations, one or more of the
referenced determinations can also incorporate and/or otherwise
consider aspects pertaining to BSSID, Beacon, and/or WPS
transmissions. For example, based on one or more of such items the
identity of the manufacturer of the WiFi access point to which the
device is connected can be identified. By way of illustration, a
BSSID of an access point can be used to identify the manufacturer.
And, having identified the manufacturer, such an identity can be
used to further increase the accuracy of the referenced
determination(s). For example, in a scenario where the BSSID of the
WiFi access point to which a device is connected is that of a
manufacturer that makes mobile phones, it can be determined that
there is a relatively greater likelihood that such an access point
is nomadic. Moreover, based on such a determination the context of
such a device can be further analyzed/checked (i.e., rather than
solely relying on the connection of the device to the referenced
access point in order to determine the context of the device). For
example, a WiFi access point having a BSSID prefix of 40:A6:D9 is
assigned to WiFi access points made by Apple and can thus be
determined to be relatively likely to be an iPhone 4.
[0296] It should be noted that a database can also be utilized in
cases/scenarios where a manufacturer produces both nomadic and
non-nomadic devices, in light of the fact that such devices often
have multiple prefixes and different prefixes can pertain to
different devices. Moreover, with respect to a given BSSID prefix,
the value of the BSSID suffix (i.e., the last 6 characters of the
12-character BSSID and which are generally assigned contiguously to
similar/comparable devices), can be compared to such a database in
order to further determine the nomadicity of such an access
point.
[0297] Moreover, in certain implementations additional information
(e.g., device type, model name, model number, etc.) pertaining to
an access point can be obtained, such as from WPS (WiFi Protected
Set-Up) information of the access point, and such information can
be used with respect to determining the context and/or nomadicity
of the access point. For example, with respect to manufacturer the
produces both nomadic and non-nomadic WiFi access point under the
same BSSID prefix, the model number of model name of the device
(e.g. "Automotive WiFi Hot Spot" or "Enterprise AP with 1 GB
bandwidth") can be used in order to identify/determine whether the
as access point is nomadic or non-nomadic and/or otherwise
determine the context within which the device is
present/operating.
[0298] Additionally, in certain implementations the nomadicity of
an access point can be determined based on whether the device can
be determined to be moving at the time it is also determined to be
connected to the access point (such movement can be determined, for
example, based on one or more inputs/sources such as GPS, cellular
IDs, cellular RSSI, WiFi IDs. Wifi RSSI, accelerometer, gyroscope,
etc., such as are described herein). In doing so, an access point
can be characterized/classified as being nomadic based on a
determination that the connected device was moving concurrent with
and/or in relatively close chronological proximity to being
connected to the referenced access point, while being
characterized/classified as non-nomadic based on a determination
that the device was not moving concurrent with and/or in close
chronological proximity to being connected to the referenced access
point. Moreover, as described herein, the context of the device
(e.g., being mobile or stationary while connected to the access
point) can be recorded in relation to the access point.
[0299] In other implementations, in addition to determining that a
device is not present/operating within a vehicle based on a
determination that the device is connected to an access point
determined to be non-nomadic, a device can be
positively/affirmatively determined to be present/operating within
a vehicle based on a determination that the device is connected to
an access point determined to be nomadic.
[0300] Moreover, with respect to access points having relatively
higher power transmissions (and therefore cover larger geographic
ranges), it can be appreciated that the connection of a device to
such access point(s) can be relatively less indicative of the fact
that the connected device is not present/operating within a vehicle
(as opposed to access points having a relatively shorter
transmission range). In such case(s)/scenario(s), one or more
techniques (such as the RSSI technique) described herein can be
utilized in order to make a determination regarding the nomadicity
of the access point.
[0301] In certain implementations, one or more of the access points
that are perceptible to the device (e.g., other than an access
point that the device is connected to), such as while scanning with
the WiFi radio of the device, can be analyzed to determine the
context of the device. Moreover, in certain implementations the
access point to which the device is connected (if it is so
connected) can be classified as nomadic/non-nomadic and saved
(locally and/or remotely) for future use (such as by this device
and/or with other devices), such as using one or more techniques,
such as those described herein. For example, in certain
implementations an access point perceived by a device can be
characterized/classified as nomadic/non-nomadic based on a
query/identification of a database containing a record of such an
access point (and/or a comparable access point based upon which
such determination can be made) and/or by making such determination
dynamically, such as based on information received/derived from the
BSSIDs (e.g., manufacturer, model) and/or WPS information (e.g.,
model) of an access point Thus, if a device can perceive one or
more access points that are known or have been determined to be
non-nomadic access points (such as over some period of time, in
order to account for nomadic access points that may be perceptible
to a moving device for relatively short periods of time), such a
device can be further determined to be stationary/not in motion.
Moreover, if the device can perceive one or more access points
determined to be nomadic (such as over some defined period of
time), such a device can be determined to be in motion.
[0302] By way of further example, in certain implementations one or
more contexts associated with one or more of the access points that
are perceptible to a device can be used to determine, with a
certain degree of likelihood, the current context of the device.
For example, in a scenario where, upon perceiving a particular
access point (such as an access point located in the vehicle of
another user, such as when such a user parks in a company parking
lot), it can be determined that the device is not present/operating
within a vehicle, upon subsequently perceiving the same access
point, it can be further determined that the device is, again, not
present/operating within a vehicle.
[0303] By way of yet further example, in certain implementations
one or more other access points (e.g., those access points other
than the one that the device is connected to) that are perceptible
to the device can be analyzed, such as across
successive/intermittent scans of the WiFi radio of the device, such
as even in scenarios where the nomadic/non-nomadic
characterization/classification of such access points may not yet
be determined. Based on a determination that one or more of (e.g.,
the collection of) perceived access points across
multiple/successive scans is substantially similar (and there are a
relatively sufficient quantity of access points that are
perceptible in such scans), then it can be further determined that
the device is not moving. However, based on a determination that
the collection of such perceived access points across
multiple/successive scans is relatively dissimilar, it can be
determined that the device is moving. Moreover, the accuracy of
determinations achieved using such technique(s) can be
increased/improved by analyzing the RSSIs of the perceived access
points in the collection (as opposed to looking at the presence or
lack thereof of each access point across multiple/successive scans.
For example, in a scenario where multiple/successive scans are
relatively close in time to one another and/or the device is moving
relatively slowly, multiple/successive scans of perceptible access
points using the WiFi radio of the device may demonstrate a
substantially similar collection of access points, but if some of
the referenced RSSI values have changed substantially, it can
nevertheless be determined that the device is likely in motion.
[0304] In certain implementations, the speed at which a device is
moving can be determined/estimated based on a determination of the
distance between (a) the location of the device at the time that
the WiFi radio of the device is used to perform a first access
point scan (e.g., as determined from the known/determined locations
of one or more of the BSSIDs, such as from a 3.sup.rd party
database such as Skyhook, and further using error minimization
techniques to calculate the location of the device, such as based
on the respective locations of each of the access points that are
perceptible to the device with or without using the RSSIs of such
access points as described herein, and (b) the location of the
device at the time that the WiFi radio of the device is used to
perform another access point scan, relative to the amount of time
that elapsed between the two scans. It should be noted that such a
technique can be implemented with more than two access point scans
as well.
[0305] Moreover, in certain implementations the speed at which a
device is moving can still be determined/estimated even without
location information regarding (non-nomadic) WiFi access points.
Such determination(s) can be achieved, for example, based on
changes in the RSSI of the WiFi access points across
multiple/successive scans. For example, an access point whose RSSI
on a device changes from -30 dB to -90 dB over the course of a
relatively short period of time (e.g., 1 second) can be determined
to be relatively likely to be present/operating within a vehicle
because, given the transmission range of WiFi access points, it is
relatively unlikely that the device would be capable of moving at
such a rate of speed without being present within a vehicle.
However, with respect to an access point whose RSSI on a device
changes from -30 dB to -31 dB over the course of a comparable time
period can be determined to be unlikely to be present within a
moving vehicle because, given the transmission range of (most) WiFi
access points, a moving vehicle is relatively likely to experience
a relatively larger change in the strength of the signal received
than 1 dB, even over a relatively short period of time.
[0306] Moreover, in certain implementations, one or more techniques
similar to those described herein with respect to access points
such as WiFi access points can be employed with respect to
determining a context within which a device is present/operating
based on the Bluetooth (BT) connectivity state/status of such a
device. For example, based on a determination that the device is
connected to a nomadic BT device (e.g., a hands-free car
loudspeaker), it can be determined that the device is
present/operating within a vehicle.
[0307] Moreover, based on a determination that the device is
connected to a non-nomadic BT device (e.g., a desktop computer), it
can be determined that the device is not present/operating within a
vehicle. As described herein with respect to access points, a BT
device (to which a device is connected) can be
characterized/classified as nomadic/non-nomadic in a number of
ways. For example, in certain implementations the nomadicity of a
BT device can be determined based on/in relation to a database
(local or remote) that can maintain information pertaining to
various BT devices, and/or that contains respective classifications
and/or characterizations of the nomadic/non-nomadic properties of
various BT devices (BSSIDs). Such database can be built/compiled,
for example, based on the results of one or more of the
nomadic/non-nomadic determinations described herein, both with
respect to individual devices and/or accumulated across devices
(`crowd-sourcing`) and/or may be a third party database of BT
devices that provides such nomadic/non-nomadic information.
[0308] Moreover, in certain implementations the nomadicity of a BT
device can be determined by querying/looking up the referenced BT
device within a database (local or remote) that maintains
associations of the context within which the device is operating in
relation to an identifier of the BT device (BSSIDs) that is the
device was/is connected to. Such database can be generated/built
based on the results of one or more determinations that pertain to
the context within which a device is present/operating in relation
to the BT device to which the device is connected, as described
herein (both with respect to individual devices and/or accumulated
across devices, e.g., via `crowd-sourcing,` and/or may be a third
party database of BT devices that provides such information. For
example, based on a determination that on multiple instances a
device was connected to a particular BT device and it was also
determined not to be present/operating within a vehicle, then upon
subsequently determining that the device is again connected to the
same BT device, it can be determined that the device is again
relatively likely not to be present/operating within a vehicle.
[0309] Additionally, in certain implementations, one or more of the
referenced determinations can also incorporate and/or otherwise
consider aspects pertaining to BSSIDs. For example, the identity of
the manufacturer of the BT device to which the device is connected
can be identified, such as is described herein. For example, the
BSSID of a BT device can be used to identify its manufacturer. And,
having identified the manufacturer, such an identity can be used to
further increase the accuracy of the referenced determination(s).
For example, in a scenario where the BSSID of the BT device to
which the device is connected is determined to be that of a
manufacturer that produces hands-free car loudspeakers, it can be
determined that there is a relatively greater likelihood that the
BT device is nomadic, whereas based on a determination that the
BSSID of the BT device to which the device is connected is that of
a manufacturer that produces desktop computers, it can be
determined that there is a relatively greater likelihood that the
BT device is non-nomadic.
[0310] It should be noted that a database can also be utilized in
case(s)/scenario(s) where a manufacturer produces both nomadic and
non-nomadic devices, in light of the fact that such devices often
have multiple prefixes and different prefixes relate to different
devices. Moreover, with respect to a given BSSID prefix, the value
of the BSSID suffix (i.e., the last 6 characters of the
12-character BSSID and which are generally assigned contiguously to
similar/comparable devices), can be compared to such a database in
order to determine the nomadicity of such a BT device.
[0311] Moreover, in certain implementations one or more of the
referenced determinations can also incorporate and/or otherwise
consider aspects pertaining to beacon transmission(s) pertaining to
various BT devices, such as by querying/looking up the device
class(es) (major and minor) and/or services class(es) of a
particular BT device. For example, if a device (e.g., a mobile
device such as a smartphone) is connected to a hands-free BT device
(having a BT major class of `Audio Video` and a BT minor class of
`Hands-Free`), it can be determined that the device (that is, the
mobile device) is relatively likely to be present/operating within
a vehicle. Based on such a determination, one or more power
consuming operations (that may have otherwise be performed, such as
in order to determine the context of the device, e.g., using the
GPS to determine if the device is moving) need not be performed (or
can be performed relatively less often) until the BT connection is
determined to have been terminated (and/or relatively shortly
thereafter). Alternatively, based on a determination that a device
is connected via BT to a desktop computer (having a BT major class
of `Computer` and a BT minor class of `Desktop`), the device can be
determined to be relatively unlikely to be present/operating within
a vehicle. Based on such a determination, one or more power
consuming operations (that may have otherwise be performed, such as
in order to determine the context of the device, e.g., by using the
GPS to determine if the device is moving) need not be performed (or
can be performed relatively less often) until the BT connection is
determined to have been terminated (and/or relatively shortly
thereafter).
[0312] Moreover, one or more of the referenced determinations can
be made based on a determination that a device was moving at the
time it is connected to the BT device (as determined, for example,
based on GPS, Cell IDs, Cell RSSI, WiFi IDs, Wifi RSSI,
accelerometer, gyroscope, etc., as described herein), and a
characterization/classification of the BT device to which the
device is connected as nomadic based on a determination that the
device was moving while it was connected to the BT device (and
non-nomadic if the device was determined not to be moving while it
was connected to the BT device), and/or by recording or associating
the determined context of the device with the BT device.
[0313] In another implementation, the BT device(s) that are
perceptible to a device (such as a mobile device such as a
smartphone) when scanning with its BT radio (other than the BT
device that the device is connected to), can be used to determine
the context of within which the device is present/operating (it
should be understood that the referenced scans for BT devices can
be made for discoverable and/or paired BT devices). Moreover, in
certain implementations the BT device to which a device is
connected (if it is so connected) can be characterized/classified
as nomadic/non-nomadic, and such characterization/classification
can be saved (locally or remotely) for future use (such as by the
referenced device and/or by other devices). It should be understood
that such determinations can be made in a number of ways. For
example, in certain implementations the nomadicity of a device
(such as a mobile device such as a smartphone) can be determined
based on/in relation to the nomadic/non-nomadic
characterization(s)/classification(s) of the BT devices it
perceives (such as by identifying records/information corresponding
to such BT devices within a database) and/or making such
determinations dynamically based on one or more determinations with
respect to one or more combinations of information corresponding to
the manufacturers, major and minor classes and services of such BT
devices. In doing so, based on a determination that a device
perceives, for a relatively/sufficiently long period of time (e.g.,
in order to filter out/account for non-nomadic devices that a
moving device may perceive for relatively short periods of time)
one or more BT devices that have been determined to be nomadic, the
referenced device can be determined to be in motion, whereas if the
device perceives, for a sufficiently/relatively long period of
time, one or more BT devices that have been determined to be
non-nomadic, the device can be determined not to be in motion.
[0314] Moreover, in certain implementations the nomadicity of a
device can be determined based on/in relation to how one or more of
the BT devices that are perceptible to the device has/have been
previously associated, such as with a particular context. In doing
so, one or more determinations can be made with respect to the
present context of the device. For example, based on one or more
instances with respect to which a device perceives a particular BT
device (e.g., the BT earpiece of another user) and also determines
that the device is not present/operating within a vehicle, upon a
subsequent perception by the device of the same BT device, it can
be further determined that the device is (again) not
present/operating within a vehicle (i.e., even without making such
a determination affirmatively).
[0315] Moreover, in certain implementations the nomadicity of a
device can be determined based on/in relation to an analysis of the
collection of other BT devices (i.e., those BT Devices other than
the one that the device is connected to) that the device
perceives/"hears." such as across successive scans of its BT radio,
even if the nomadic/non-nomadic classification of such BT devices
is not yet known. If the collection of BT devices across successive
scans is determined to be substantially similar (and there are
sufficiently many BT devices that are perceptible in such scans),
then the device can be determined not to be moving. If, however,
the collection of BT devices across successive scans is determined
to be substantially dissimilar, then the device can be determined
to be moving.
[0316] The accuracy of such a technique can be increased/improved
based on an analysis of the RSSIs of the BT devices in the
collection (e.g., rather than solely/primarily considering the
Boolean existence/non-existence of each BT device in successive
scans).
[0317] For example, in a scenario where multiple/successive scans
are sufficiently close in time and/or the device is moving
relatively slowly, multiple/successive scans of BT devices using
the device's BT radio may be determined to demonstrate a
substantially similar collection of BT devices, however if some of
the RSSI values can be determined to have changed substantially,
the device can be determined to be likely to be in motion (i.e.,
relative to the BT devices).
[0318] In another implementation, the speed at which the device is
moving can be determined/estimated by determining the distance
between (a) the location of the device at the time that its BT
radio is used to perform a first BT device scan (e.g., as
determined based on the known locations of each of the (presumably
non-nomadic) BSSIDs, such as from a third-party database, and using
an error minimization technique to calculate the location of the
device based on the respective locations of each of the BT devices
perceived/"heard" with or without using the RSSIs of such devices,
and (b) the location of the device at the time that its BT radio is
used to perform a second or subsequent BT device scan, relative to
the amount of time that elapsed between the two scans. It should be
noted that this technique can be implemented with more than two BT
device scans as well.
[0319] Moreover, even without location information regarding
(non-nomadic) BT devices, the speed at which the device is moving
can still be determined/estimated, such as based on the changes
identified in the RSSI of the BT devices in multiple/successive
scans. For example, a BT Device whose RSSI perceived on a device
changes from -30 dB to -90 dB over the course of a short period of
time (e.g., 100 milliseconds) can be determined to be likely to be
in a vehicle because, given the transmission range of BT Devices, a
human is generally unable to move the distance required to change
the signal so much in such a short period of time, whereas a BT
device whose RSSI on a device is determined to have changed from
-30 dB to -31 dB over the course of the same time is relatively
unlikely to be in a moving vehicle because, again, given the
transmission range of (most) BT devices, a moving vehicle is likely
to experience a much larger change in the strength of the signal
received than 1 dB, even over a short period of time.
[0320] It can be appreciated that most, if not virtually all cell
towers are non-nomadic. However, given that their transmission
range is generally greater than that of WiFi access points, the
fact that a device is connected to a cellular tower may provide
relatively less specific context information than a device being
connected to a WiFi access point. Nonetheless, information
regarding the cell tower to which a device is connected can still
be utilized to provide valuable information regarding the context
of the device.
[0321] For example, if a device is determined to be connected to a
cell tower that has been previously associated with a particular
context, it can be determined, with a certain degree of likelihood,
that the device is present within such context again. For example,
it can be determined that a particular device will tend to be
connected to a certain cell tower when the device is in the user's
home and, generally, a different cell tower when the device is in
the user's place of work. Accordingly, if a device is connected to
either of these cell towers its context can be determined not to be
within a vehicle and thus, if a device is presently connected to
either one of them, it can be determined that the device is not
present within a vehicle.
[0322] The accuracy of this technique can be improved/enhanced by
`learning` (such as via machine learning techniques as are known to
those of ordinary skill in the art) the RSSIs of cell towers for
different contexts of the device (e.g., not within a vehicle,
within a vehicle, etc.), so that, for example, determinations such
as (for example): if a device is determined to be connected to Cell
Tower 12345 in LAC 123 at an RSSI of between -90 DB and -80 DB, the
device can be determined to be likely not to be in a vehicle, can
be achieved.
[0323] In another implementation the cell towers that can be
perceived/"heard" by the device when scanning with its cellular
radio (other than the one that the device is connected to) can be
used to determine the context of the device. For example, based on
a determination that a device can perceive/hear one or more cell
towers that have been previously associated with a particular
context, it can be determined, with at least a certain degree of
likelihood, that the device is present in such context again. For
example, it can be determined that a particular device will tend to
be connected to a certain cell tower when the device is present in
the user's home and, generally, a different cell tower when the
device is present in the user's place of work. Accordingly, based
on a determination that a device is connected to either of these
cell towers, the context of the device can be determined not to be
within a vehicle, and thus, based on a determination that a device
is presently connected to either one of them, it can be determined
that the device is not present within a vehicle.
[0324] Moreover, in certain implementations a context of the device
can be determined based on an analysis of the collection/set of
other cell towers (i.e., those cell towers other than the one that
the device is connected to) that are perceptible to the device,
such as across multiple/successive scans of its cellular radio.
Based on a determination that the collection/set of cell towers
that are perceptible to the device across multiple/successive scans
is substantially similar (and there are sufficiently many cell
towers that appear in such scans), then the device can be
determined not to be moving. If, however, the collection/set of
cell towers that that are perceptible to the device across
multiple/successive scans is substantially dissimilar, the device
can be determined to be moving.
[0325] The accuracy/resolution of such a technique can be
improved/increased, for example, based on an analysis of the RSSIs
of the cell towers in the set/collection (rather than only looking
at the Boolean existence/non-existence of each cell tower in
multiple/successive scans). For example, based on a determination
that the successive scans are sufficiently close in time and/or the
device is moving slowly, successive scans of cell towers (such as
using the device's cellular radio) may show a substantially similar
collection of cell towers, but if some of the RSSI values have
changed substantially the device can be determined to be likely to
be in motion.
[0326] In another implementation, the speed at which the device is
moving can be determined/estimated by determining the distance
between (a) the location of the device at the time that its
cellular radio is used to perform a first cell tower scan (e.g., as
determined from the known/identified/determined locations of each
of the cell tower IDs, such as from a third party database, e.g.,
Skyhook, and using an error minimization technique to calculate the
location of the device based on the respective locations of each of
the cell towers perceived with or without using the RSSIs of such
cell towers), and (b) the location of the device at the time that
its cellular radio is used to perform a second cell tower scan,
relative to the amount of time that elapsed between the two scans.
It should be noted that such a technique can be implemented with
more than two cell tower scans as well.
[0327] Even without location information regarding cell towers, the
speed at which the device is moving can still be
determined/estimated, such as based on the changes in the RSSI of
the cell towers in successive scans. For example, a cell tower
whose RSSI on a device changes from -30 dB to -90 dB over the
course of a short period of time (e.g., 1 second) can be determined
to be relatively likely to be present within a vehicle because,
given the transmission range of cell towers, a human is not able to
move the distance required to change the signal so much in such a
short period of time, whereas a cell tower whose RSSI on a device
changes from -30 dB to -31 dB over the course of the same time is
relatively unlikely to be present within a moving vehicle because,
given the transmission range of (most) cell towers, a device
present within a moving vehicle is likely to perceive a relatively
much larger change in the strength of the signal received than 1
dB, even over a relatively short period of time.
[0328] It should be noted that accuracy of the referenced
in-vehicle/not-in-vehicle determination(s) can be further improved
when performed in conjunction with other connectivity/"network
visibility" information/determinations (e.g., in relation to BT
devices, cellular IDs, cellular RSSIs, etc.) and/or from other
sensors as described herein.
[0329] In another implementation, the conditions pursuant to which
a device can be determined to be present within a moving vehicle
can be dynamically determined, such as based on the device's
environment, such as can be measured/determined by its sensors. For
example, if many different WiFi access points (e.g., having
different BSSIDs), many cell tower IDs (CIDs), and/or many
Bluetooth devices are perceptible to a device, and/or if a GPS so
indicates, it can be determined that the device is relatively
likely to be present in an urban area, whereas if relatively few
(or none) of the referenced wireless signals are perceptible,
and/or if a GPS reading so indicates, it can be determined that the
device is likely to be in a rural area, and, because vehicles
generally move slower in urban areas than they do in rural areas, a
threshold speed (or other conditions) at which a trip can be
determined to have started (as described herein) can be
set/adjusted to be relatively lower in such an urban setting as
compared to a rural setting, thereby enabling more accurately
determinations in relation to contexts where/when devices are
present within vehicles.
[0330] Not only can it be determined that, if a device is connected
to a non-nomadic AP (e.g., for more than a relatively short time),
it can be determined not to be moving, but further determinations
can also be performed. In doing so, for example, based on a
determination that a device is connected to a nomadic AP it can be
further determined that it is relatively more likely the device is
moving than if it were (a) connected to a non-nomadic AP, (b)
connected to an AP of unknown nomadicity; and/or (c) not connected
to an AP. In certain implementations, such determinations can be
premised based on an assumption/default that if a device is
determined to be connected to a nomadic AP, it can be determined to
be is moving. Moreover, in certain implementations, power/resources
can be invested to determine, by way of one or more other sensors
(e.g., GPS, accelerometer, gyroscope, cellular radio, etc.) whether
or not the device is moving.
[0331] Moreover, in certain implementations, a device determined
not to be in substantially the same location (e.g., as determined
by GPS, WiFi APs, cell tower IDs, Bluetooth devices, IP address)
(i) at or about the time it connected to an AP as it is determined
to be (ii) at or about the time that the device disconnected from
the same AP, can be determined to be connected to a nomadic AP.
Moreover, in certain implementations, irrespective of whether or
not a device is determined to be at substantially the same location
(i) at the time it connected to an AP as it was (ii) at the time
that it disconnected from the same AP, the nomadicity of such an AP
can be determined, for example, via GPS, such as by comparing (i)
the GPS coordinates of the referenced device's location at or about
the time that the device connected to the WiFi AP with (ii) the GPS
coordinates of the device's location at or about the time of the
device's disconnection from the same WiFi AP. By way of further
example, the nomadicity of such an AP can be determined, for
example via WiFi, such as by comparing (i) one or more of the WiFi
APs perceptible at the device at or about the time of the device's
connection to one of the WiFi APs with (ii) one or more of the WiFi
APs perceptible at the device at or about the time of the device's
disconnection from the same WiFi AP. By way of further example, the
nomadicity of such an AP can be determined, for example via Cell
Tower ID, such as by comparing (i) the cell tower to which the
device is connected (or more or more of the visible cell towers) at
or about the time of the device's connection to the WiFi AP with
(ii) the connected cell tower (or one or more sets of the
perceptible cell towers) at or about the time of the device's
disconnection from the same WiFi AP. By way of further example, the
nomadicity of such an AP can be determined, for example via
Bluetooth, such as by comparing (i) one or more of perceptible
Bluetooth devices at or about the time of the device's connection
to the WiFi AP with (ii) one or more of the visible Bluetooth
devices at or about the time of the device's disconnection from the
same WiFi AP. By way of further example, the nomadicity of such an
AP can be determined, for example via IP address, such as by
comparing (i) the IP address of the device shortly before the time
of the device's connection to the WiFi AP with (ii) the IP address
of the device shortly after/about the time of the device's
disconnection from the same WiFi AP.
[0332] In addition to, or instead of, the previously described
technique(s) (which encompass techniques for determining nomadic
WiFi APs), a WiFi AP can be determined to be non-nomadic based on a
determination that the location of the connected device at the time
it was connected to the AP is substantially the same as its
location at the time that it disconnected from the same AP.
[0333] In addition, the longer (shorter) the period of time between
the connection and the disconnection (or the length of time that
the device remains connected without disconnecting), such as in the
above referenced scenarios, the greater the likelihood that the AP
that the device was connected to was non-nomadic (nomadic). For
example, a device determined to be continuously connected to an AP
for 10 hours can be determined, on average, to be relatively more
likely to be connected to a non-nomadic AP than a device determined
to be connected to an AP for only 10 seconds.
[0334] It should be noted that the notion/concept/aspect of a
`substantially same` location (as referenced herein) can be
determined, for example, relative to the transmission range of an
AP. For example, it can be appreciated that certain APs can have a
relatively wide transmission range (e.g., a WiMax AP), and in such
a case it is possible that, even though the location at the time of
connection and the location at the time of disconnection may be
determined to be relatively far apart, the AP is actually
non-nomadic. As such, in one implementation, the techniques
described herein can be further configured to account for the AP's
transmission range(s), as can be identified/determined, for
example, from/based on the BSSID, manufacturer, etc., of the AP,
and/or as can be determined from repetitive crowd-sourced
connection/disconnection locations, such as using one or more of
the techniques described herein. Using such techniques. WiFi APs
can be determined to be nomadic or non-nomadic using
"crowd-sourcing" techniques. For example, message(s) can be sent
from user devices to a server indicating (a) time, (b) conditions
(pertaining to GPS. WiFi, cellular. Bluetooth. IP addresses, etc.)
at or near the time of connection to the WiFi AP, and (c)
conditions at or near the time of disconnection from the WiFi AP.
It should be noted that, in certain implementations, devices can
also maintain and update nomadic/non-nomadic AP information
locally.
[0335] It should be noted that similar/related techniques can be
employed in order to determine whether other transmitters (e.g.,
Bluetooth devices, cellular stations, etc., and others currently
existing or to be introduced in the future) are nomadic or
non-nomadic.
[0336] In certain implementations, the state of the device's
display screen, keyboard and/or the presence of a device user (as
determined, for example, based on an absence/removal of a
key-guard/lock on the interface of the device, proximity sensed,
etc.) can be used to determine whether and/or how intensively
(e.g., based on sampling rate, duty cycle, how much power can be
consumed, etc.) device resources should be used to determine the
context of the device (e.g., to determine if the device is present
within a moving vehicle, determine the in-vehicle role of its user,
etc.), and/or to provide other functionality, with or without
taking into account the device's battery level, rate of battery
level depletion, etc.
[0337] For example, if the device display screen is determined to
be off (and/or applications with which the user can interact or
receive information from even when the device screen is off (e.g.,
an already connected call) can be determined not to be running or
are restricting the application from providing such functionality),
the power consumption of the device can be reduced (in light of the
fact that the device, in its current state, cannot serve as a
distraction to a driver) by reducing or eliminating some or all of
its energy intensive operations (e.g., GPS calls) such as those
used to make context determinations (e.g., in-trip determinations,
in-vehicle role determinations), as described herein. For example,
upon determining that the screen is off, the GPS can be queried
once every 5 seconds (or not at all), while when the screen is on,
the GPS can be queried once per second.
[0338] In one implementation, the device can be configured to
maintain itself in a low power consumption state in which much of,
or substantially all of, the device's context information gathering
can be suspended for as long as the screen is off. Such techniques
can be advantageous in scenarios where the context of the device
can be promptly determined when the screen is turned on (or a user
is present). For example, one manner in which this can be done is
by turning the GPS on upon determining that the screen is turned
on.
[0339] The latency associated with such a technique can be reduced
by not turning the GPS radio fully off when the screen turns off,
or by maintaining/"remembering" certain information that can that
reduce the TFF (time to first fix) of the GPS radio when it is next
turned on, such as is known to those of ordinary skill in the
art.
[0340] By way of further example, successive scans of
available/perceptible networks/devices (WiFi, BT. Cell, etc.) can
be performed (e.g. periodically) and the results
maintained/recorded. Upon determining that the screen is turned on,
the scan results just prior to and just after the device screen is
turned on can be processed/used to determine whether or not the
device is in motion (and can also be processed/used to
determine/estimate the speed at which the device is moving).
Moreover, the accuracy of the referenced technique can be improved
by monitoring (e.g., with a relatively low power consumption, such
as at a low duty cycle) and thereby determining in advance which of
the various techniques are likely to be useful/effective/accurate,
in light of the determined context of the device. For example, the
device can test/determined, at various intervals while the screen
is determined to be off, whether the described Wifi scan technique
is likely to be applicable/accurate within the area in which the
device is present (e.g., rural vs. urban). If it is determined that
the referenced Wifi scan technique is not likely to be
effective/available, it can be determined that another technique
(e.g., one entailing higher energy expenditure) may be required in
order to accurately determine the context of the device (and can be
employed, for example, when the screen is turned on), or it may
choose to suspend the use of determinations based on screen state
altogether, e.g., until WiFi scans can provide relevant/accurate
information again.
[0341] In another implementation, a determination that a device is
connected to a power source can further indicate the hands-free
state and/or in-vehicle location of the device. For example, in a
scenario where a passenger is present in a car, a device determined
to be connected to a power source can be determined to (a) be
relatively more likely to be operated by a driver than by a
passenger (because a vehicle is more likely to have a power
connection that is compatible with respect to device operated by a
driver than a device operated by a passenger, and (b) is relatively
more likely to be positioned in close proximity to a driver than a
passenger (in light of the near-driver location of some power
sources, e.g., a device cradle/dock having a power connection).
[0342] In another implementation, based on a determination that a
device is continuously (or substantially continuously) connected to
a power source since before (or sufficiently soon after) it was
last disconnected from a WiFi connection/AP (nomadic or
non-nomadic), the device can be determined to be in the same
location/context (e.g., within a vehicle, not within a vehicle,
etc.) in which it was in when it was last connected to Wifi. In
certain implementations, the accuracy of such techniques can be
improved so that the device's current location and/or context can
be determined based on the location and/or context determined at
the time that the last WiFi access point disconnected, based upon
whether the WiFi access point is nomadic or non-nomadic. For
example, in a scenario where the last WiFi access point to which
the device was connected was determined to be a non-nomadic access
point the location of the device and its context (e.g., barring
other factors/information) can be determined to be unchanged,
whereas upon determining that the last WiFi access point to which
the device was connected was a nomadic access point, then, (barring
other factors/information), its context (e.g., within vehicle) can
be determined to be unchanged, while its location cannot. In
certain implementations, the accuracy of this technique can be
further improved by providing for/requiring that the device has be
determined to be continuously (or substantially continuously)
connected to a power source at least a certain amount of time
before it was last disconnected from a WiFi connection (in doing
so, a use case where a user left his home and got into his car in
the driveway while still within range of her home WiFi and
connected the device to a power source in the car before losing
connection with the home Wifi can be addressed).
[0343] In the implementation described it is noted that a given
wireless ID that the mobile device connects to may "fool" the
detection system at most once in most cases. Once the mobile device
connects to a wireless device (e.g., WiFi AP, Bluetooth
speakerphone) in one location and disconnects from such device in a
substantially different location, the wireless device will be
marked as nomadic and future connections to it will not be
understood to indicate that the mobile device is stationary (or
even be used to determine that it is not stationary).
[0344] Applicants further note that the notion of checking the
location of a mobile device when it is connected and subsequently
disconnected from a wireless device is not the only method of
classifying wireless devices as nomadic or non-nomadic. The mobile
device's current location can be queried actively to aid in
classifying the wireless device as nomadic or non-nomadic or, to
save power, changes to the mobile device's "last know location" can
be used to accomplish the same, i.e., if the mobile device's last
know location changes sufficiently (not sufficiently) while the
mobile device is connected to a wireless device, then the wireless
device is classified as nomadic (non-nonmadic).
[0345] In another implementation, the presence of nomadic wireless
devices (e.g., nomadic WiFi APs, nomadic Bluetooth devices) can be
used to detect that a mobile device is in a trip more effectively,
both (i) if the mobile device is connected to one or more nomadic
wireless devices: and/or (ii) if the mobile device sees one or more
nomadic wireless devices (or even certain types of nomadic wireless
devices as further classified by their manufacturer and/or their BT
major/minor class) without being connected to them.
[0346] For example, if a mobile device connects to one or more
nomadic wireless devices (e.g., as determined from comparing with a
database on the device or on a remote server), the mobile device
may be assumed to be in a trip and apply whatever changes to the
mobile device are appropriate for a trip and/or the mobile device
may choose to invest additional power to seek additional
confirmation as to whether it is in a trip more quickly that it
would ordinarily do so.
[0347] In another example, if the analysis of the results of a
wireless scan on a mobile device shows the presence of, but not
connection to, one or more nomadic wireless devices (e.g., as
determined from comparing with a database on the device or on a
remote server), the mobile device may choose to invest additional
power to determine whether it is in a trip more quickly that it
would ordinarily do so.
[0348] It can be appreciated that, in certain implementations,
based on a determination that a device is in one location at the
time it connects to an access point and in a substantially
different/distant location when it disconnects from the access
point, then, in addition to determining that the referenced access
point is nomadic (such as in a manner described herein), it can
also be determined that the external IP address to which the access
point was/is connected or otherwise associated is also nomadic.
Accordingly even in a scenario in which another access point or
device is connected to such an external IP address, it can be
determined that such an access point/device is nomadic (e.g., even
without determining/identify movement/traveling with respect to
that device/access point).
[0349] In another implementation, if a device is determined to be
connected to a power source during the time that it has been
determined to be in a trip, then, for as long as the device remains
connected to such power source (or an alternative power source,
provided, for example, that the device is not unplugged from power
for more than a certain period of time, e.g., the time it might
take someone to switch between a vehicle power source and an office
or home power source), it can be determined that the device is
highly likely to still be within a trip. In so determining, many of
the power expensive/intensive operations that may otherwise be
utilized by the device to determine the context of the device can
be curtailed/suspended (e.g., checking GPS to see if the device is
still present within a trip).
[0350] To the extent that the characteristics of the power source
can be determined pursuant to the techniques described herein (or
elsewhere), the determination as to whether the device is still
connected to power in a vehicle can be made relatively more
easily/efficiently.
[0351] In addition, when a device is determined to be connected to
power, and it is nonetheless determined that it should periodically
re-detect whether the device is in a trip or not, the efficiency of
such re-detection can also be improved (and can consume less power)
because differentiation between moving in a vehicle and certain
other states (e.g., walking) which are highly unlikely when the
device is connected to power, may no longer be necessary.
[0352] In another implementation, upon determining that a device is
present within a trip and connected to a power source, it can be
advantageous to determine that a trip has ended so that, upon
determining that a trip has ended, the device can be used by a user
(i.e., without restriction) without having to disconnect the device
from the power source (e.g., in a scenario where the vehicle is
parked in a parking lot at the end of a trip with the device still
being connected to power, and the user may want to send a text).
This can be achieved, for example, by sampling one or more of a
number of sensors and/or inputs (e.g. GPS, accelerometer, WiFi
BSSIDs and/or RSSI, Cell Tower IDs and/or RSSI. BT BSSID and/or
RSSIs) to determine if the device is in motion. In certain
implementations, such sensors/inputs can be sampled at sampling
rates relatively lower than would be used if the power connection
was not available and/or used to make contextual determinations
(thereby reducing power consumption). Further, the sensors/inputs
can also be sampled at duty cycles relatively lower than those that
would be used if the power connection was not available and/or used
to make contextual determinations, thereby reducing power
consumption.
[0353] It should be noted that the techniques described herein with
respect to reducing power consumption are still applicable in
scenarios in which the device is connected to a power source
because, for example, if a device battery is not near full and the
time the device is present within a vehicle is the only time a user
has to charge the device, then being able to give the battery the
best charge possible (i.e., by reducing power consuming activities)
can be advantageous.
[0354] In certain implementations, if the device perceives a
WiFi-enabled device (e.g., an access point) that, over time, has
been perceived, by one or more devices, at different locations
(e.g., as determined by GPS, cell tower ID, WiFi AP fingerprint,
etc.), such as those that vary sufficiently (e.g., the standard
deviation of the location from its mean is greater than a threshold
value), such WiFi-enabled device can be determined to be likely to
be a nomadic device. In other implementations, if the device
perceives a WiFi-enabled device (e.g., an access point) that, over
time, has been perceived by one or more devices, such as those at
different locations (e.g., as determined by GPS, cell tower ID,
WiFi AP fingerprint, etc.) that vary little, (and, in certain
implementations, based on how many such observations there are and
how they are distributed across observing devices and time), such
WiFi-enabled device can be determined to be likely to be a
non-nomadic device.
[0355] FIG. 111 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0356] At 11110, a first device with respect to which a location is
to be determined can be selected/identified from among one or more
devices. In certain implementations, the first device can be
selected/identified based on various factors including but not
limited to: a power connected state of the first device, a power
connected state of the first device relative to respective power
connected states of one or more of the one or more devices, a
battery capacity of the first device, a battery capacity the first
device relative to respective battery capacities of one or more of
the one or more devices, a power consumption rate of the first
device, a power consumption rate of the first device relative to
respective power consumption rates of one or more of the one or
more devices, a location determination accuracy of the first
device, and/or a location determination accuracy of the first
device relative to respective location determination accuracies of
one or more of the one or more devices, a battery level (e.g., a
current battery level) of the first device, or a battery level the
first device relative to respective battery levels of one or more
of the one or more devices. Moreover, in certain implementations a
first device with respect to which a location is to be determined
during a first time interval can be selected/identified.
Additionally, in certain implementations, a first device with
respect to which a location is to be determined can be identified,
such as from among one or more devices, based on a determination
that at least one of the one or more devices is present on a
mass-transit vehicle. Additionally, in certain implementations a
first device with respect to which a location is to be determined
can be identified, from among one or more devices, based on a
determination that at least one of the one or more devices are
likely to be in a context in which its location changes.
[0357] At 11120, the location can be determined, such as with
respect to a first device. Moreover, in certain implementations the
location can be determined with respect to the first device during
the first time interval.
[0358] At 11130, the location, as determined with respect to the
first device, can be associated with each device from the one or
more devices that is proximate to the first device. In certain
implementations, the location as determined with respect to the
first device can be associated, during the first time interval,
with various devices from the one or more devices that are
proximate to the first device.
[0359] At 11140, a second device can be selected, such as a device
with respect to which the location is to be determined during a
second time interval. In certain implementations, such a second
device can be selected based on factors including but not limited
to: (a) respective battery levels of one or more devices that have
received location information from the first device, (b) respective
battery capacities of one or more devices that have received
location information from the first device, (c) respective battery
times remaining with respect to one or more devices that have
received location information from the first device, (d) respective
lengths of time that one or more of devices have received
information from the first device, (e) a quantity of updates that
one or more devices have received from the first device, and/or (f)
a location accuracy of one or more devices.
[0360] Moreover, in certain implementations a timing associated
with a selection of second device can be determined based on at
least one of: (a) a length of time that the first device provided
location information to one or more other devices, (b) a quantity
of location updates that the first device provided to one or more
other devices, (c) a quantity of devices that receive location
information from the first device, (d) a length of time that one or
more other devices provided location information to other devices,
and/or (e) a quantity of location updates that one or more such
devices provided to other devices, such as in a manner described
herein.
[0361] At 11150, the location can be determined with respect to the
second device during the second time interval.
[0362] At 11160, during the second time interval, the location as
determined with respect to the second device can be associated with
each device from the one or more devices that is proximate to the
second device.
[0363] By way of further illustration, in certain implementations
(e.g., when the device's location is changing and there are
multiple devices proximate to one another, like when on mass
transportation), it can be advantageous (e.g., for power
efficiency) for one device (or an access point) to serve as a
`location provider` for one or more other devices. For example, the
`location provider` device can acquire partial or full location
information (e.g., via GPS, etc.) and distribute such location
information to other nearby devices (e.g., via WiFi, Bluetooth),
thereby enabling the other devices to conserve power while
remaining updated with respect to their location.
[0364] In certain implementations, different devices can be
selected/designated to be the referenced `location provider` for
other proximate devices so as to distribute the power consumption
burden (associated with location determination) among multiple
devices.
[0365] The order in which and the length of time for which a device
assumes the role of a location provider can depends on one or more
factors such as its power state (e.g., connected, not connected,
battery level, battery remaining, rate of battery usage (current,
usual, predicted)) and/or its reception quality (TTFF, GPS accuracy
etc.) and/or the states of other nearby devices. For example, a
device that is connected to a power source and has a fully charged
battery may remain as the `location provider` for a longer time (as
compared to a device that is not).
[0366] In certain implementations, a full protocol for sharing such
information between nearby devices can be established in which the
devices can dynamically request, discover, communicate and/or
negotiate with one another to provide "battery friendly" location
information.
[0367] FIG. 69 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0368] At 6910, one or more devices can be identified. In certain
implementations, such devices (e.g., mobile devices, wireless
access points, etc.) that are identified are those that are
perceptible to a device (e.g., a smartphone, mobile device, etc.).
Moreover, in certain implementations the referenced devices (e.g.,
those that are identified) may be being associated with a vehicle
(e.g., determined to be and/or otherwise identified as being
embedded, installed, or otherwise present with a vehicle).
Moreover, in certain implementations the referenced device may be
determined to be and/or otherwise associated with an operator of
the vehicle (e.g., a driver).
[0369] At 6920, a restriction can be employed. In certain
implementations, such a restriction can be employed with respect to
the device (e.g., the device that perceived the various other
devices/access points, such as at 6910). Moreover, in certain
implementations such a restriction can be employed based on a
perception of the one or more devices. Moreover, in certain
implementations such a restriction may be employed upon determining
or otherwise identifying that the device (e.g., the device that
perceived the various other devices/access points, such as at 6910)
is moving in a manner that is consistent with the manner in which a
vehicle moves, such as in a manner described herein. Moreover, in
certain implementations, upon determining that the vehicle is not
moving in such a manner, the referenced restrictions can be
adjusted, relaxed, removed, etc.
[0370] By way of further illustration, it can be appreciated that
distracted driving in mass transportation contexts (such as by the
driver/operator of a bus, train, etc.) can be incredibly dangerous
because an error in driver judgment can kill or injure many people.
Accordingly, in certain implementations and as described herein,
the mobile device associated with/determined to be operated by a
mass transportation driver can be configured to go into `driver
mode` (such as is described herein) based on a perception of one or
more signals (e.g., RF signals such as WiFi access points a
Bluetooth BSSIDs, etc.) in a set of signals. For example, the
mobile device of a bus drivers can be configured to go into `driver
mode` upon perceiving the MAC address(es)/BSSID(s) of the WiFi
access points or Bluetooth devices that are associated with the
bus(es) that they drive, and, in some cases, when additional
conditions (e.g., movement consistent with driving) are also
determined to be met. Doing so can provide various advantages,
improvements and efficiencies, such as with respect to the
accuracy, latency and power consumption of applications/modules
that are directed to identifying/preventing distracted driving
(whether executing the device itself and/or externally to the
device, such as on a remote server). In addition, such techniques
enable the restriction of the mobile devices of mass transportation
drivers while they are working (e.g., driving a bus), while also
not restricting the same devices in scenarios in which the bus
driver is not currently driving (it should be understood that such
techniques can be further enhanced as more and more vehicles have
unique wireless electronic IDs) and without having to integrate
with the bus company's employee time scheduling systems.
[0371] FIG. 68 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0372] At 6810, a positioning of a device (e.g., a mobile device,
smartphone, etc.) can be determined. In certain implementations,
the referenced positioning can include an orientation of the device
(e.g., the angle at which the device is oriented, such as is
describe herein) and/or a docking or connectivity status of the
device (e.g., whether or not the device is connected to a dock or
charger, whether or not the device is connected or linked to an
in-vehicle `infotainment` system, etc.). Moreover, in certain
implementations it can be determined that the referenced device is
present within a vehicle (and/or a moving vehicle) and/or within a
trip, such as using one or more of the techniques described
herein.
[0373] At 6820, one or more restricted functions can be enabled. In
certain implementations, such functions can be enabled at/in
relation to the device. Moreover, in certain implementations such
restricted functions can be enabled based on a determination that
the positioning (such as that determined at 6810) is consistent
with one or more positioning parameters. Examples of such
positioning parameters can be one or more parameters (and/or ranges
thereof) that can be defined, such as with respect to the
orientation of the device, the docking connectivity of the device,
etc. Moreover, in certain implementations the referenced restricted
functions can include one or more applications and/or one or more
interfaces.
[0374] At 6830, the referenced restricted functions can be
restricted at/in relation to the device. In certain implementations
such restricted functions can be restricted based on a
determination that the positioning of the device is not consistent
with the one or more positioning parameters (such as in a manner
described herein).
[0375] By way of further illustration, in certain implementations
certain device functionality (e.g., the ability to make utilize, or
otherwise interact with calls, texts, applications etc.), such as
on a device determined to be associated with a driver of a vehicle
can be restricted in a manner that such functionality is only
permitted when various conditions can be determined to be met. For
example, certain functionality (e.g., the initialization/use of a
navigation application) may only be allowed when the device is
determined to be positioned in a cradle (as can be determined, for
example, based on inputs originating from one or more sensors, such
as accelerometer, compass/magnetometer. GPS, camera, orientation
envelope, correlation between z-axis acceleration and GPS
acceleration, etc., such as is described herein, and/or based on
inputs/information received from a device cradle (e.g. power
connection identifier, NFC, etc.) which may be used to confirm that
the device is in it, such as in a manner described herein. By way
of further example, one or more other functionalities (e.g., the
use of a music application) may also be restricted such that the
use of the are permitted when the device can be determined to be
connected to a vehicle's infotainment system (as can be determined
based on the wired or wireless connection between the device and
the vehicle's infotainment system, such as in a manner described
herein).
[0376] Moreover, in certain implementations one or more of the
interfaces that may be used to control various functionalities of
the device (e.g., a touch interface, etc.) can be selectively (or
fully) restricted. For example, a device determined to be operated
by/associated with a driver of a vehicle (such as in a manner
described herein) may be restricted such that a particular
interface of the device (e.g., touch/touchscreen interface) may not
be allowed and/or that such an interface may be restricted with
respect to a particular application (e.g., the driver may not be
allowed to input a destination in a navigation application using
the touch interface), while one or more other interface(s) (e.g., a
voice recognition/command interface) may still be available for the
driver to use (or vice versa).
[0377] Once the device is determined to no longer be connected to a
power source for a sufficiently long period of time, the techniques
described herein can be employed to determine if the device is
still within a trip or not.
[0378] In additional implementations, the techniques described
herein can account for whether the device is connected to a powers
source, the device's current battery level and/or rate of battery
level depletion, etc., in selecting which contextual determination
techniques to use and/or how to use them (e.g., in relation to
sampling rate, duty cycle, etc.). For example, upon determining
that a device battery is fully or mostly charged, sensors can be
sampled more liberally, whereas upon determining that the device
battery is low, sensors can be sampled on a more limited basis/more
frugally. For example, when a device is determined to be connected
to a power source, its GPS can be sampled more frequently; whereas
upon determining that the device is not connected to a power
source, its GPS can be sampled relatively less frequently (or not
at all). Such techniques can also be employed/extended to other
sensor(s), e.g., accelerometer, WiFi scans. Cell tower scans
etc.
[0379] In certain cases, it may be advantageous to use some
combination of the techniques described herein to improve the
context determination accuracy and/or the associated power
consumption.
[0380] Many of the context determinations described herein that
employ techniques to use information in or related to network
signals (e.g., WiFi access points. BT Device and cell towers) can
be improved with better/more accurate information as to the
magnitude of the power transmission of such signals. For example,
for the power transmission level at which a WiFi access point, a BT
device or a cell tower emitted a signal can be used to
determine/estimate speed more accurately. Based on the fact that,
for example, the RSSI of a BT device that transmits at 2.5 mw
(Class 2) has changed from -90 dB to -80 DB in 1 sec., it can be
determined that the device is moving more slowly (relative to the
BT device) than if the BT device transmits at 100 mw (Class 1).
[0381] FIG. 113 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0382] At 11310, one or more signals associated with a second
device can be perceived, e.g., by a first device, such as in a
manner described herein.
[0383] At 11320, one or more characteristics of the one or more
signals can be identified. In certain implementations, such
characteristics can include: an SSID of the second device, a BSSID
of the second device, an organizationally unique identifier (OUI)
of the BSSID, a determination that a BSSID of the second device is
locally administered, one or more capabilities of the second device
(e.g., an extended service set (ESS), an open network, a network
not requiring a passcode, an authentication type, an encryption
type), a quantity of unique devices that have observers perceived
of the second device, a quantity of unique devices that have
perceived the second device over a time period, a quantity of
unique authenticators with respect to the second device, a quantity
of unique devices associated with the second device, and/or a
quantity of devices that perceive the second device for at least a
defined period of time.
[0384] At 11330, one or more aspects of a vehicle within which at
least one of the first device or the second device is present can
be determined, such as based on the one or more characteristics.
For example, a determination can be made as to whether the vehicle
within which the at least one of the first device or the second
device is present is a mass transit vehicle or a non-mass transit
vehicle. Moreover, in certain implementations a determination can
be made that the vehicle is a mass transit vehicle based on a
determination that a manufacturer associated with the OUI produces
more devices associated with mass transit than devices associated
with non-mass transit. Additionally, in certain implementations a
determination can be made that the vehicle is a non-mass transit
vehicle based on a determination that a manufacturer associated
with the OUI produces more devices associated with non-mass transit
than devices associated with mass transit.
[0385] In certain implementations, a determination as to whether
the vehicle within which the at least one of the first device or
the second device is present is a mass transit vehicle or a
non-mass transit vehicle can be based on: a corresponding
determination associated with another device associated with a
BSSID that is similar to the BSSID of the second device, a
determination associated with another device associated with a
BSSID that is similar to the BSSID of the second device, an
independent determination associated with another device associated
with a BSSID that is similar to the BSSID of the second device, a
corresponding determination associated with another device
associated with a BSSID that is sequential to the BSSID of the
second device, a determination associated with another device
associated with a BSSID that is sequential to the BSSID of the
second device, an independent determination associated with another
device associated with a BSSID that is sequential to the BSSID of
the second device, and/or a ratio of mass transit utilization to
non-mass transit utilization in a location at which the at least
one of the first device or the second device is present.
[0386] At 11340, one or more actions can be initiated, such as
based on the one or more aspects of a vehicle within which at least
one of the first device or the second device is present.
[0387] FIG. 114 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0388] At 11410, one or more signals, such as one or more probe
requests (which may include one or more SSIDs, for example) and/or
one or more probe responses, can be perceived by a first device,
such as in a manner described herein.
[0389] At 11420, the one or more signals can be processed. In doing
so, a quantity of network enabled devices perceptible to the first
device can be determined.
[0390] At 11430, one or more aspects of a vehicle within which the
first device is present can be determined, such as based on the
quantity of network enabled devices perceptible to the first
device.
[0391] By way of further illustration, in some implementations, the
vehicle in which a mobile device is present can be determined to be
a mass transportation or a non-mass transportation vehicle (and in
certain implementations and/or in certain situations the exact
vehicle class, e.g., train, bus, can be determined) based on one or
more wireless signals perceived by the device (alone or in
conjunction with one or more other signals and/or techniques
described or referenced herein). Doing so can be advantageous, for
example (a) in estimating vehicle emissions where different mass
transportation vehicles (e.g., trains, buses) have emission more
similar to one another than to non-mass transportation vehicles
(e.g., cars, light trucks); (b) in distracted driving prevention
where devices on non-mass transportation can be assumed to be
driver devices subject to one or more restrictions, unless
determined otherwise, while devices on mass transportation vehicles
might be assumed to be passenger devices and subjected to fewer or
no restrictions, unless determined otherwise; (c) in usage-based
insurance where trips in mass transportation vehicles are not a
reflection of, and therefore should not be used to compute, a
policyholder's driving score; or (d) in navigation where trips in
mass transportation vehicles may be weighted less heavily in
determining a user's navigational familiarity with a location.
[0392] Additionally, in certain implementations, it can be
determined whether a device is on a mass or non-mass transportation
vehicle by analyzing one or more of the wireless signals it
perceives (e.g., WiFi including WiFi Direct. Bluetooth, Cellular,
RFID, NFC. WPAN) and, in certain cases, in conjunction with one or
more non-wireless sensor inputs that were received by the same
device or one or more other devices, prior to or at substantially
the same tune. An exemplary collection of techniques for making
such determination with WiFi signals is described herein, though it
should be understood that similar methods (with natural variation
based upon the varying protocols and physical characteristics of
the various types of wireless signal), may be applied to one or
more other forms of wireless signals as well.
[0393] For example, using one or more of the described techniques,
together or separately, based upon the WiFi signals perceived by a
mobile device, it can be determined that is the device is present
in a vehicle (or a moving vehicle). Moreover, in certain
implementations such a determination can be made in conjunction
with one or more non-wireless sensor inputs that were received by
the same device or one or more other devices, prior to or at
substantially the same time. Additionally, in certain
implementations such a determination can be made in conjunction
with the device and/or one or more other devices which, over time,
perceived WiFi signals and/or one or more signals from non-wireless
sensors, whether such vehicle is on a mass or non-mass
transportation vehicle.
[0394] In certain implementations, if the device perceives a WiFi
enabled device (e.g., an access point) with an SSID that contains
(or starts with, or is exactly, with or without case sensitivity) a
particular string of characters indicative of its being a mass
transportation vehicle, which may vary depending on the location
(e.g., country, state, city) in which the device is in, as
perceived (e.g., by the GPS, cell tower or WiFi signals), e.g.,
"Amtrak" or "Greyhound" (and, for example, also requiring that the
device be in the U.S.), the device can be determined to be on a
mass transportation vehicle (in the case of "Amtrak", it is likely
a train and in the case of "Greyhound", it is likely a bus).
Alternatively, if the device perceives an SSID that contains a
string of characters indicative of its being a non-mass
transportation vehicle, e.g., "Sync" (which is often indicative of
a Ford Sync infotainment system, which system is more likely to
reside (if not exclusively reside) in a non-mass transportation
vehicle (e.g., car, light truck), than in a mass transportation
vehicle), the device can be determined to be on a non-mass
transportation vehicle.
[0395] In other implementations, if the device perceives a WiFi
enabled device (e.g., an access point) with a BSSID/MAC that
contains an OUI (the first six (6) hex characters of the BSSID)
indicative of a manufacturer that produces sufficiently more WiFi
enabled devices that are used on non-mass transportation vehicles
than are used on mass transportation vehicles (e.g., "00-26-B4",
the OUI for The Ford Motor Company, a manufacturer whose WiFi
enabled devices are much more likely to be used on non-mass
transportation vehicles than on mass transportation vehicles), the
device can be determined to be on a non-mass transportation
vehicle. Alternatively, if the device perceives a WiFi enabled
device with a BSSID that contains an OUI indicative of a
manufacturer that produces sufficiently more WiFi enabled devices
that are used on mass transportation vehicles than on non-mass
transportation vehicles, the device can be determined to be on a
mass transportation vehicle.
[0396] In certain implementations, the described techniques can be
applied to more than the first 6 characters of the BSSID. For
example, the first 8 or 10 characters of the BSSID, to leverage the
fact that manufacturers typically manufacture WiFi enabled devices
in homogenous model batches and assign them a block of consecutive
BSSIDs. As a result, WiFi enabled devices with BSSIDs that are
close to one another will tend to be of the same model.
Accordingly, if sufficiently more WiFi enabled devices of a
particular model are used on mass transportation vehicles than are
used in non-mass transportation vehicles, whereupon, if the device
perceives a WiFi enabled device with a BSSID corresponding to a
model that is used sufficiently more on mass transportation
vehicles than on non-mass transportation vehicles, the device can
be determined to be on a mass transportation vehicle. Moreover, if
sufficiently more WiFi enabled devices of this model are used on
non-mass transportation vehicles than are used on mass
transportation vehicles, whereupon, if the device perceives a WiFi
enabled device with a BSSID corresponding to a model that is used
sufficiently more on non-mass transportation vehicles than on mass
transportation vehicles, the device can be determined to be on a
non-mass transportation vehicle.
[0397] In scenarios in which a manufacturer produces different
model WiFi enabled devices, some models of which are used more
often in mass transportation vehicles and other models of which are
used more often in non-mass transportation vehicles, when a
particular model of WiFi enabled device (e.g., as expressed by one
or more blocks of consecutive BSSIDs) is used sufficiently more in
mass transportation vehicles or sufficiently more in non-mass
transportation vehicles, its 7-12 digit BSSID "prefix" (e.g., the
first 7, first 8, first 9, first 10, first 11, first 12 hex
characters of the BSSID), can be used in determining whether the
vehicle it is in is a mass transportation vehicle or a non-mass
transportation vehicle. For example, if WiFi enabled devices with
BSSID 34-12-56-78-90-AE and BSSID 34-12-56-78-90-B0 are known to be
of the same model, with such model being used sufficiently more on
mass transportation vehicles than on non-mass transportation
vehicles, then a WiFi enabled device with a BSSID of
34-12-56-78-90-AF (which bears the same 10-digit prefix as the
other two) can be determined to be likely to be of the same model
and, if perceived by the device, the device can be determined to be
on a mass transportation vehicle (or, in certain implementations,
not on a non-mass transportation vehicle). Alternatively, if a WiFi
enabled device with a BSSID prefix indicative of model that is used
sufficiently more on non-mass transportation vehicles than on mass
transportation vehicles is perceived, the device can be determined
to be on a non-mass transportation vehicle (or, in certain
implementations, not on a mass transportation vehicle).
[0398] Additionally, with respect to a WiFi enabled device model
produced by a manufacturer in one or more blocks of consecutive
BSSIDs that is sufficiently likely to be used in both mass and
non-mass transportation vehicles, the WiFi enabled device's BSSID
prefix can be used in determining whether or not a device that
perceives such WiFi enabled device's BSSID is on a mass or non-mass
transportation vehicle, for example because companies tend to
purchase WiFi enabled devices in bulk from their manufacturers and
are likely to use them for a largely homogenous purpose (e.g., mass
transportation, non-mass transportation, non-transportation). For
example, a company that distributes buses and bus parts that orders
1,000 WiFi enabled devices will likely receive such WiFi enabled
devices with substantially consecutive BSSIDs and will likely
distribute them and/or install them in buses (i.e., not cars or
light trucks). Accordingly, if WiFi enabled devices with BSSID
34-21-56-78-90-AE and BSSID 34-21-56-78-90-80 are known to be of
the same model and are in use on a mass transportation vehicle, if
a WiFi enabled device with a BSSID of 34-21-56-78-90-AF (which
bears the same 10-digit prefix as the other two) is perceived by
the device, the device can be determined to be on a mass
transportation vehicle. Alternatively, if WiFi enabled devices with
BSSID 34-21-56-78-90-AE and BSSID 34-21-56-78-90-B0 are known to be
of the same model and are used sufficiently more on non-mass
transportation vehicles that on mass transportation vehicles, if a
WiFi enabled device with a BSSID of 34-21-56-78-90-AF (which bears
the same 10-digit prefix as the other two) is perceived by the
device, the device can be determined to be on a non-mass
transportation vehicle.
[0399] It should be understood that, as described herein, the BSSID
"neighbors" of a particular WiFi enabled device can be used in
determining whether a device that perceives such particular WiFi
enabled device is likely to be on a mass transportation vehicle or
a non-mass transportation vehicle. Additionally, in certain
implementations, how relatively closer a neighbor of the BSSID of
the particular WiFi enabled device is to the BSSID of one or more
WiFi enabled devices (which is known to be on a mass transportation
vehicle or a non-mass transportation vehicle), the greater the
likelihood that the particular WiFi enabled device perceived by the
device (and hence the device itself) is on the same type of vehicle
(i.e., mass or non-mass) as its WiFi enabled neighbor.
[0400] Moreover, in certain implementations, if the device
perceives (and/or authenticates with and/or associates with) a WiFi
enabled device that is an access point (`AP`) and whose BSSID is
locally administered (e.g., the 2nd bit of the 2nd hex character of
the BSSID is on), which, in this in-vehicle setting, reflects that
such WiFi enabled device is likely to be a mobile device (as
distinct from an in-vehicle device), and the device is in a
location (e.g., country, state, city, road) and/or at a day/time
where there are more people that use mass transportation than use
non-mass transportation, the device can be determined to be more
likely to be on a mass transportation vehicle than on a non-mass
transportation vehicle. Additionally, the more such WiFi enabled AP
devices whose BSSID is locally administered are perceived by the
device, the higher the likelihood that the device is on a mass
transportation vehicle. Alternatively, if the device is in a
location and/or at a day/time where there are fewer people that use
mass transportation than use non-mass transportation, the device
can be determined to be less likely to be on a mass transportation
vehicle than on a non-mass transportation vehicle. Additionally,
the more such WiFi enabled AP devices whose BSSID is locally
administered are perceived by the device, the higher the likelihood
that the device is on a non-mass transportation vehicle.
[0401] In certain implementations, if the device perceives a WiFi
enabled device (e.g., an access point), with a particular
capability (e.g., as included in a 802.11 beacon frame), (e.g., ESS
only, an open network, no passcode required, weak authentication,
weak or no encryption), the device can be determined to be likely
in many cases (which may be dependent on the relative popularity of
mass transportation vs. no-mass transportation and the relative
popularity of open vs. closed WiFi enabled devices on mass
transportation vs. non-mass transportation, in the device's
location (e.g., country, state, city, road) and/or at a day/time),
to be on a mass transportation vehicle, on which occupants are
frequently given open access to WiFi services. Alternatively, if
the device perceives a WiFi enabled device (e.g., an access point)
with a different set of capabilities (e.g., a closed network, a
passcode required, strong authentication, strong encryption), the
device can be determined to be likely, in many cases to be on a
non-mass transportation vehicle where occupants are less frequently
given open access to WiFi services than on a mass transportation
vehicle.
[0402] Moreover, in certain implementations, if the device
perceives a WiFi enabled device (e.g., an access point), which,
over time, has been perceived by sufficiently many unique mobile
devices while on a vehicle, the device can be determined to be on a
mass transportation vehicle. Alternatively, if the device perceives
a WiFi enabled device (e.g., an access point), which, over time,
has been perceived by sufficiently few unique mobile devices while
on a vehicle, the device can be determined to be on a non-mass
transportation vehicle. For example, if the device perceives a WiFi
enabled device with BSSID 34-21-56-78-90-AB, which is an AP that
has been observed (e.g., in beacon frames) by 5,000 unique mobile
devices over the past 6 weeks (which unique mobile devices have,
for example, passed such information to a remote database), the
device can be determined to be in a mass transportation vehicle
(for example, because it is not likely that an AP in a non-mass
transportation vehicle would have been perceived by so many unique
devices), in certain implementations, if the device perceives a
WiFi enabled device (e.g., an access point), which, over time, has
been authenticated with and/or associated with (e.g., as per IEEE
802.11 standard) sufficiently many unique mobile devices (and/or
has done so for a sufficiently long period of time and/or with
sufficiently high signal strength and/or (d) with sufficiently low
time of flight of signals traveling from the device to the AP or
vice versa as can be determined with, for example, the 802.11 TM or
FTM capabilities) while on a vehicle, the device can be determined
to be on a mass transportation vehicle. Alternatively, if the
device perceives a WiFi enabled device (e.g., an access point),
which, over time, has been authenticated with and/or associated
with sufficiently few unique mobile devices (and/or has done so for
a sufficiently long period of time and/or with sufficiently high
signal strength and/or (d) with sufficiently low time of flight of
signals traveling from the device to the AP or vice versa as can be
determined with, for example, the 802.11 TM or FTM capabilities)
while on a vehicle, the device can be determined to be on a
non-mass transportation vehicle. For example, if the device
perceives a WiFi enabled device with BSSID 34-21-56-78-90-AB, which
is an AP associated with by 2,000 unique mobile devices over the
past 5 weeks (which unique mobile devices have, for example,
provided such information to a remote database), the device can be
determined to be on a mass transportation vehicle. This is so
because, for example, it is relatively unlikely that an AP on a
non-mass transportation vehicle would have associated with so many
unique mobile devices in this time fame (or ever).
[0403] In certain implementations, if the device perceives a WiFi
enabled device (e.g., an access point), which, over time, has been
perceived by sufficiently many unique mobile devices for a
sufficiently long period of time (and/or with sufficiently high
signal strength and/or while moving in a vehicle (e.g., as
determined by GPS, WiFi APs, cell towers, inertial sensors) and/or
over a sufficiently long distance (e.g., as perceived by GPS. WiFi
APs, cell towers etc.) and/or (d) with sufficiently low time of
flight of signals traveling from the device to the AP or vice versa
as can be determined with, for example, the 802.11 TM or FTM
capabilities), the device can be determined to be on a mass
transportation vehicle. Alternatively, if the device perceives a
WiFi enabled device (e.g., an access point), which, over time, has
been perceived by sufficiently few unique mobile devices for a
sufficiently long period of time (and/or with sufficiently high
signal strength and/or while moving in a vehicle (e.g., as
determined by GPS. WiFi APs, cell towers, inertial sensors) and/or
over a sufficiently long distance (e.g., as perceived by GPS, WiFi
APs, cell towers etc.) and/or (d) with sufficiently low time of
flight of signals traveling from the device to the AP or vice versa
as can be determined with, for example, the 802.11 TM or FTM
capabilities), the device can be determined to be on a non-mass
transportation vehicle. For example, if the device perceives a WiFi
enabled device with BSSID 34-21-56-78-90-AB, which is an AP that
has been perceived (e.g., in beacon frames) over the course of more
than five (5) consecutive minutes (or while moving above 20 km/h,
or for 2 miles) by 5,000 unique mobile devices over the past 5
weeks (which unique mobile devices have, for example, provided such
information to a remote database), the device can be determined to
be on a mass transportation vehicle. This is so because, for
example, it is not likely that an AP in a non-mass transportation
vehicle would have been perceived by so many unique devices over
such long periods of time.
[0404] In certain implementations, if the device perceives a WiFi
enabled device (e.g., an access point), it can use the TIM field
transmitted by tie WiFi enabled device (e.g., in one or more
closely spaced beacon frames) to determine how many of the devices
(i.e., non-AP stations) associated with such WiFi enabled device
currently have traffic being buffered by the WiFi enabled device
(e.g., by looking at the TIM Partial Virtual Bitmap or the length
of the TIM). If the TIM shows sufficiently many traffic-buffered
devices (e.g., as perceived by the device), it can be determined
that the device is on a mass transportation vehicle. Alternatively,
if the TIM shows sufficiently few traffic-buffered devices (e.g.,
as perceived by the device), it can be determined that the device
is on a non-mass transportation vehicle. For example, if the device
perceives a TIM in two successive beacon frames that, together,
show that, on the AP which transmitted such TIMs, there are
currently 17 devices with buffered traffic, it can be determined
that the device is relatively more likely to be on a mass
transportation vehicle (which may well have 17 or more WiFi enabled
devices aboard) than on a non-mass transportation vehicle (which is
not likely to have 17 WiFi enabled devices aboard).
[0405] In certain implementations, the number of traffic-buffered
devices associated with an AP can be utilized to compute other
determinations as well. For example, a device (e.g., a non-AP
station (`STA`)) can receive beacon frames from two different APs
(AP 1, AP 2) and it is able to associate with both. For example,
one STA may be associated with AP 1 while ten STAs are associated
with AP 2 (though this may not be known/accessible to the device),
with no other APs in the vicinity. The two APs may be on different
channels and may be the same in every other way (e.g., on the same
band, support the same version protocol, transmission rates,
services and are received by the STA with the same signal
strength). Given that all those factors are equal, in order to
improve performance, it may be more effective for the STA to
connect to AP 1 rather than AP 2, because it has fewer STAs
currently associated with it (even, for example, if AP 1 has worse
signal strength than AP 2, in light of the larger number of devices
associated with AP 2 and the commensurate reduction in resources
(e.g., bandwidth) that are available to allocate to each device).
The device can make that determination, for example, based on the
fact that, over some time period, AP 1 had fewer traffic-buffered
STAs than AP 2 did and therefore can be determined to (a) be more
likely to have fewer associated STAs; and, therefore (b) be more
likely to have better performance. This technique can be used by
devices (e.g., non-AP STAs), automatically or manually (i.e., by
user) to decide with which AP(s) to associate at any point in
time.
[0406] In certain implementations, if the device perceives a WiFi
enabled device (e.g., an access point), it can use the Station
Count field (and/or the Channel Utilization field) in the BSS Load
element which is present in various frames (e.g., beacon frames,
probe responses), sent from (or to) such WiFi enabled device to
determine how many devices (i.e., non-AP STAs) are associated with
such WiFi enabled device. The higher the number of associated
devices, the more likely the device is in a mass vehicle. The lower
the number of associated devices, the less likely the device is in
a mass vehicle. In some implementations the device may only be able
to access this information if it is associated with the WiFi
enabled device, which in the event that the device is on a mass
transportation vehicle may be possible given that the WiFi enabled
devices in many mass transportation vehicles are open.
[0407] In certain implementations, if the device perceives
sufficiently many WiFi-enabled devices, e.g., by detecting and
examining probe requests and/or probe responses from such WiFi
enabled devices, (in certain cases for a sufficiently long period
of time and/or with sufficiently high signal strength and/or (d)
with sufficiently low time of flight of signals traveling from the
device to the AP or vice versa as can be determined with, for
example, the 802.11 TM or FTM capabilities), the device can be
determined to be on a mass transportation vehicle. This is so, for
example, because there are likely more people and, therefore, more
WiFi-enabled devices on mass transportation vehicles.
Alternatively, if the device perceives sufficiently few
WiFi-enabled devices, e.g., by detecting and examining probe
requests and/or probe responses from such WiFi enabled devices, (in
certain cases for a sufficiently long period of time and/or with
sufficiently high signal strength and/or (d) with sufficiently low
time of flight of signals traveling from the device to the AP or
vice versa as can be determined with, for example, the 802.11 TM or
FTM capabilities), the device can be determined to be on a non-mass
transportation vehicle. This is so, for example, because there are
likely fewer people and, therefore, fewer WiFi-enabled devices on
non-mass transportation vehicles.
[0408] The described techniques can also incorporate analyzing the
transmissions of the WiFi enabled devices to determine how many of
them are mobile devices, e.g., as distinct from in-vehicle devices
(e.g., based on the number, content and/or signal strength of the
probe requests and/or probe responses made by or sent to such WiFi
enabled devices). This is so, for example, because such mobile
WiFi-enabled devices may be effective indicators of whether the
device is on a mass transportation vehicle or a non-mass
transportation vehicle because, for example, mobile devices are
more closely associated with people in vehicles than non-mobile
devices are. For example, if the device perceives a WiFi enabled
device that issues a probe request (a) to sufficiently many SSIDs
(e.g., directed probe requests), it is more likely to be a mobile
device; (b) and such issuing device has a BSSID that contains an
OUT of a known mobile device maker (e.g., Apple. Samsung), it is
more likely to be a mobile device; (c) and such issuing device has
an SSID that contains a string of characters indicative of its
being a mobile device (e.g., "Android", "Galaxy S 4"), it is more
likely to be a mobile device; (d) and such issuing device has a
locally administered BSSID (i.e., the 2nd bit of the 2nd hex
character of the BSSID is on), it is more likely to be a mobile
device; and (e) in which the power management field is turned on,
indicating power save mode, the issuing device is more likely to be
a mobile device (mobile devices are more power constrained than
non-mobile devices and are more likely to use power save mode
aggressively).
[0409] The techniques described herein can be applied in part or in
whole not only to probe requests and probe responses, but to other
frames (e.g., any management, data and/or control frame).
[0410] It should be understood that the term `mobile device` as
used herein may refer to a WiFi enabled mobile device (e.g., as
distinct from a WiFi enabled in-vehicle device).
[0411] In certain implementations, the described techniques can
also include (e.g., to help determine if the device and a WiFi
enabled device are likely to be on the same vehicle) a
determination that one or more the wireless signals is perceived by
the device (a) for a sufficiently long period of time (e.g.,
sufficiently many management, control and/or data frames spaced
sufficiently close in time): and/or (b) with a sufficiently high
signal strength: and/or (c) with sufficiently low signal strength
variability and/or (d) with sufficiently low time of flight of
signals traveling from the device to the AP or vice versa as can be
determined with, for example, the 802.11 TM or FTM
capabilities.
[0412] It should also be understood that the techniques and
examples described herein are based on WiFi wireless signals.
Similar techniques can also be applied to one or more other types
of wireless signals perceivable by the device (e.g., Bluetooth.
Cellular, NFC, V2V, V2I) either alone or combined with WiFi.
[0413] Additionally, while some of the described techniques pertain
to differentiating between mass transportation and non-mass
transportation vehicles, in certain implementations such techniques
can also be applied/extended to identify the exact vehicle classes
or transportation mode, e.g., train, bus, plane (e.g., if on a mass
transportation vehicle).
[0414] It should also be noted that the efficacy of the described
techniques is likely to increase with the increased proliferation
of wireless devices in transportation (e.g., in vehicles and in
transportation infrastructure).
[0415] Some of the described techniques may be more effectively
employed after the device is associated with an AP.
[0416] In scenarios in which a user may be likely to carry more
than one wireless device at most times (e.g., on account of
wearable devices, IOT, etc.), in order to estimate the number of
people in a location (e.g. in a vehicle) in scenarios in which the
number of wireless devices that a person carries is higher and
varies much more, additional factors may be accounted for. For
example, many of such wireless devices may be secondary or
dependent devices, e.g., devices that receive services from a
primary device (e.g., a watch may be dependent on a smartphone and
communicate with it via BLE). In many cases the secondary devices
may be co-located with the primary devices, but in other cases they
may remote (e.g., a secondary device communicates with its primary
device over the Internet). Various techniques can be used to
estimate the number of people in a location based upon one or more
wireless signals perceived by a device, whether with people
carrying many secondary devices or people carrying multiple primary
devices. For example, by analyzing the air traffic (e.g., 802.11
association frames as well as other 802.11 management, control and
data frames and analogous or similar information from other
wireless protocols, e.g., Bluetooth).
[0417] For example, a device can detect those devices (e.g.,
secondary devices) that are nearby and in communication with (e.g.,
association frames, control frames, data frames) and/or attempting
communication with (e.g., probe requests/responses) other devices
(e.g., primary devices) which are also nearby, whereupon the first
devices can be determined to be secondary devices and thus not
counted for the purpose of determining the number of people
present.
[0418] By way of further example, a device can detect that multiple
primary devices belong to the same person, for example, based upon
sufficient commonalties in the SSIDs of their preferred network
lists as seen in probe requests. For example, if two devices send
(directed) probe requests to the same list of eight (8) SSIDs, they
can be determined to be likely to belong to the same person,
whereupon the multiple devices can be understood to belong to one
user and so counted, e.g., for the purpose of determining the
number of people present.
[0419] By way of further example, a device can detect the BSSIDs of
those devices nearby (e.g., using probe requests) and based upon
their manufacturers and/or model types and/or BSSID range (e.g., as
described herein, such as for differentiating between mass and
non-mass transportation vehicles), determine which device(s) are
likely to be secondary devices and adjust the count of people
present in accordance.
[0420] By way of further example, A device can detect the SSIDs
(and/or Bluetooth major and minor classes) of those devices nearby
that recognize those likely to be secondary devices (e.g., "BT
Earpiece", as described herein for differentiating between mass and
non-mass transportation vehicles) and adjust the count of people
present in accordance.
[0421] In certain implementations, in addition to using one or more
wireless signals that a device perceives to determine if such
device is on a mass or non-mass transportation vehicle, such
signals can also be used, for example, to determine (alone or in
conjunction with other signals and/or techniques, such as those
described herein) whether the device is in a vehicle (or in a
moving vehicle) and whether the device is a passenger device or a
driver device.
[0422] In certain implementations wireless signals can be used
(e.g., using one or more of the signals and/or techniques described
herein), alone or in conjunction with other techniques (such as
those described herein), to determine whether a device is a
passenger device or a driver device. As described herein, such
techniques may be based on WiFi signals, but should also be
understood (with the appropriate changes for the relevant signals
and protocols as known to those of ordinary skill in the art) to be
applicable to other types of wireless signals as well (or
combinations thereof).
[0423] In certain implementations, a device in a vehicle can be
used to (a) determine (or estimate) the number of occupants present
in a vehicle (as estimated using one or more of the signals and/or
techniques described herein); and/or (b) determine the composition
(e.g., mobile devices, fixed in-vehicle devices) of the WiFi
enabled devices present/perceived in the vehicle (e.g., using one
or more of the signals and/or techniques described herein); and/or
(c) determine whether the vehicle is a mass transportation vehicle
or a non-mass transportation vehicle (as estimated using one or
more of the signals and/or techniques described herein). Based on
such information/determinations, it can be further determined (or
estimated) whether or not the device user is a driver or a
passenger, whereupon certain actions can be taken to, for example,
(a) place one or more restrictions on the user's device until the
user verifies as a passenger (e.g. using one or more of the
techniques described herein); and/or (b) to include the data from
the current trip in the calculation of a UBI driver score.
[0424] For example, in a vehicle (a) on which one (1) occupant is
detected: and/or (b) on which no WiFi enabled mobile devices are
detected; and/or (c) that is determined to be a non-mass
transportation vehicle, a user can be required to verify as a
passenger and/or the driving data collected during the trip can be
used in the user's UBI driving score (and, in certain
implementations, if no sufficiently strong information indicative
of the user being a passenger is received).
[0425] By way of further example, in a vehicle (a) on which 23
occupants are detected; and/or (b) on which 3 WiFi enabled
non-mobile devices and 27 WiFi enabled mobile devices are detected;
and/or (c) that is determined to be a mass transportation vehicle,
a particular user can be determined to be a passenger (e.g.,
without the need to verify as such) and/or the associated trip data
is not used in the user's UBI driving score (and, in certain
implementations, only if no sufficiently indicative information of
the user being a driver is received).
[0426] In certain implementations, by comparing the wireless
signals perceived by a device in a vehicle with the patterns of one
or more wireless signals (e.g., wireless signal fingerprint, signal
strength fingerprint, length of time perceivable, time of day and
day of week, passenger or driver, mass or non-mass transportation
vehicle, location), such as those perceived by one or more devices
of one or more device types (e.g., in-vehicle Wi-Fi enabled devices
that appear in substantially each trip the vehicle takes and for
substantially the entire trip, in-vehicle mobile devices which may
or may not appear in substantially each trip such vehicle takes and
may or may not appear for substantially the entire trip based on,
for example, how many different people drive the vehicle, and
ex-vehicle devices that may or may not appear in substantially each
trip the vehicles takes and are not likely to appear for
substantially the entire trip based on, for example, the
variability of the routes the vehicle takes), over time (e.g.,
using techniques know to those of ordinary skill in the art), the
in-vehicle role of the user of the device can be determined.
[0427] For example, if 97% of the times that a device perceived one
or more wireless signals transmitted by Device A, the device was in
a moving vehicle and was determined to be a driver's device, when
the device is then determined to be in a moving vehicle and
perceives one or more wireless signals from Device A, it can be
determined to be likely to be a driver device. For example, Device
A might be a WiFi AP at a gas station perceived by solo-commuter
Joan's device on her way to work, along which route Joan rarely
travels other than on her way to work.
[0428] By way of further example, if 98% of the time that a device
perceived one or more wireless signals transmitted by Device B for
more than 7 seconds, with a signal strength greater than -70 dBm,
where it was a weekday morning and where the trip start is at the
device user's home, the device was in a vehicle and was determined
to be a driver device, when the device then perceives one or more
wireless signals from Device B, with the same or sufficiently
similar criteria (e.g., in a vehicle/moving vehicle, signal type,
signal strength, length of reception, day of week, time of day,
trip start location, vehicle class etc.), it can be determined to
be likely to be a driver device. For example, Device B may be a
WiFi AP in the (non-mass transportation) vehicle that only Barbara
usually drives on weekdays (on weekends her husband usually drives
it).
[0429] By way of further example, if 96% of the time that one or
more devices perceived one or more wireless signals transmitted by
Device C for more than 12 seconds and with a signal strength
greater than -75 dBm, the one or more devices were in a moving mass
transportation vehicle and were determined to be passenger devices,
when one of the one or more devices (or perhaps any device) then
perceives one or more wireless signals from Device C, with the same
or sufficiently similar criteria (e.g., in a vehicle/moving
vehicle, signal type, signal strength, length of reception, day of
week, time of day, trip start location, vehicle class etc.), it can
be determined to be likely to be a passenger device. For example,
Device C may be a WiFi AP in a mass transportation vehicle.
[0430] By way of further example, if 95% of the time that a device
perceived one or more wireless signals transmitted by Device D for
more than 10 seconds and with a signal strength greater than -60
dBm, the device was determined to be in a moving vehicle and was
determined to be a passenger device, when the device then perceives
one or more wireless signals from Device D with the same or
sufficiently similar criteria (e.g., in a vehicle/moving vehicle,
signal type, signal strength, length of reception, day of week,
time of day, trip start location, vehicle class etc.), it can be
determined to be likely to be a passenger device. For example, the
device may belong to a wife who is almost always the passenger when
Device D, her husband's mobile device, is in the (non-mass
transportation) vehicle with her.
[0431] Combinations of wireless (or other) signals from one or more
devices of one or more device types are also possible. For example,
if 97% of the time that a device perceives one or more wireless
signals transmitted by Device B and Device D, for more than 7
seconds and with a signal strength greater than -70 dBm, the device
was determined to be in a vehicle and was determined to be a
passenger device, when a device then perceives one or more wireless
signals from Device B and Device D with the same or sufficiently
similar criteria (e.g., in a vehicle/moving vehicle, signal type,
signal strength, length of reception, day of week, time of day,
trip start location, vehicle class etc.), it can be determined to
be likely to be a passenger device. For example, Device B may be a
WiFi AP in Barbara's non-mass transportation vehicle, Device D is
her husband's mobile device and the device is Barbara's mobile
device, where Barbara usually commutes as a solo driver in the
vehicle, but on weekends, when her husband's Device D is perceived
in the vehicle he is almost always the driver.
[0432] In certain implementations wireless signals can also be
utilized (e.g., using one or more of the signals and/or techniques
described herein), alone or in conjunction with other techniques
(such as those described herein), to determine whether a device is
in a vehicle and/or in a moving vehicle. As described herein, the
described implementations illustrate techniques that utilize WiFi
signals, but should also be understood (with the appropriate
changes, e.g., for the relevant signal, as known to those of
ordinary skilled in the art) to be applicable to other types (or
combinations thereof) of wireless signal(s) as well.
[0433] In certain implementations, a device in a vehicle can be
used to (a) determine (or estimate) number of occupants present
nearby (as determined, for example, using one or more of the
signals and/or techniques described herein); and/or (b) determine
the composition (e.g., mobile devices, fixed in-vehicle devices) of
WiFi enabled devices present nearby (using one or more of the
signals and/or techniques, such as those described herein): and/or
(c) determine whether the device is moving (as determined using one
or more of the signals and/or techniques, such as those described
herein). Based on such information, it can be further determined
whether or not the device is in a vehicle (or in a moving vehicle),
whereupon certain actions should be taken to, for example, (a)
place or relax/remove one or more restrictions on the user's
device, e.g., until the user verifies themselves as a passenger
(e.g., using one or more of the techniques described herein):
and/or (b) to begin or cease collecting data from the current trip
with respect to a UBI driver score.
[0434] In certain implementations, by comparing the wireless
signals perceived by a device in a vehicle with the patterns of one
or more wireless signals (e.g., wireless signal fingerprint, signal
strength fingerprint, length of time perceivable, time of day and
day of week, passenger or driver, mass or non-mass transportation
vehicle, location), perceived by one or more devices of one or more
device types (e.g., in-vehicle Wi-Fi enabled devices that appear in
substantially each trip the vehicle takes and for substantially the
entire trip, in-vehicle mobile devices which may or may not appear
in substantially each trip such vehicle takes and may or may not
appear for substantially the entire trip based, among other things,
upon how many different people drive the vehicle, and ex-vehicle
devices that may or may not appear in substantially each trip the
vehicle takes and are not likely to appear for substantially the
entire trip based, among other things, on the variability of the
routes the vehicle takes), over time (e.g., using techniques know
to those of ordinary skill in the art), the device can be
determined to be in or not in a vehicle and/or in or not in a
moving vehicle.
[0435] For example, if 97% of the times that a device perceived one
or more wireless signals transmitted by Device A, the device was
determined to be in a moving vehicle, when the device then
perceives one or more wireless signals from Device A with the same
or sufficiently similar criteria (e.g., signal type, signal
strength, length of reception, day of week, time of day, trip start
location, vehicle class etc.), it can be determined to be likely to
be in a moving vehicle. For example, Device A might be a WiFi AP at
a gas station perceived by solo-commuter Joan's device on her way
to work, along which route Joan rarely travels other than on her
way to work.
[0436] By way of further example, if 98% of the time that a device
perceived one or more wireless signals transmitted by Device B for
more than 7 seconds, with a signal strength greater than -70 dBm,
where it was a weekday morning and where the trip start is at the
device user's home, the device was determined to be in a vehicle,
when the device then perceives one or more wireless signals from
Device B, with the same or sufficiently similar criteria (e.g., in
a vehicle/moving vehicle, signal type, signal strength, length of
reception, day of week, time of day, trip start location, vehicle
class etc.), it can be determined to be likely in a vehicle. For
example, Device B may be a WiFi AP in the (non-mass transportation)
vehicle that only Barbara usually drives on weekdays (on weekends
her husband usually drives it).
[0437] By way of further example. If 96% of the time that one or
more devices perceived one or more wireless signals transmitted by
Device C for more than 12 seconds and with a signal strength
greater than -75 dBm, the one or more devices were determined to be
in a moving mass transportation vehicle, when one of the one or
more devices (and/or any device) then perceives one or more
wireless signals from Device C, with the same or sufficiently
similar criteria (e.g., signal type, signal strength, length of
reception, day of week, time of day, trip start location, vehicle
class etc.), it can be determined to be likely to be in a moving
mass transportation vehicle. For example, Device C may be a WiFi AP
in a mass transportation vehicle.
[0438] The described techniques can also be employed with respect
to combinations of wireless (or other) signals from one or more
devices of one or more device types. For example, if 97% of the
time that a device perceives one or more wireless signals
transmitted by Device D and Device E, for more than 7 seconds and
with a signal strength greater than -70 dBm, the device was
determined to be in a vehicle, when a device then perceives one or
more wireless signals from Device D and Device E with the same or
sufficiently similar criteria (e.g., signal type, signal strength,
length of reception, day of week, time of day, trip start location,
vehicle class etc.), it can be determined to be likely to be in a
vehicle. For example, Device D is the mobile of one of Barbara's
colleagues with whom she carpools to work, Device E is the mobile
device of another person who does not work in the same company as
Barbara, but works a block away and commutes with them and the
device is Barbara's. While Barbara's device sees wireless signals
from Device D many times during a day while in a vehicle and also
while not in a vehicle (as they commute and work in the same
space), Barbara's device only perceives wireless signals from
Device D and Device E, at or near the same time, when it is in a
vehicle.
[0439] It should be noted that, in certain implementations, if the
referenced devices cannot be recognized easily, e.g., from the
BSSID, because such BSSID may be locally administered (i.e.,
randomized), the devices can still be recognized using other
techniques (e.g., the fingerprint of their directed probe requests,
their SSIDs).
[0440] Additionally, while various examples provided herein pertain
to determining/distinguishing between mass/non-mass transportation
vehicles, such illustrations are exemplary and it should be
understood that such techniques can also be applied with respect to
any number of other determinations (e.g.,
determining/differentiating between publicly accessible
transportation vehicles, such as taxis, limos, etc., and
non-public/private vehicles).
[0441] In certain implementations, a device can allow simultaneous
connection to one or more networks of the same and/or different
technologies. The techniques described herein can be adapted to
such settings (e.g., various voting techniques) using methods known
to those skilled in the art.
[0442] In any/all of the techniques described herein, it may be
advantageous to incorporate a "healing" mechanism whereby
periodically checks can be performed to determine/confirm that
erroneous determinations have not been made (and/or that the device
is operating in an incorrect state). For example, even when a
device is connected to a power source continuously since a
sufficiently long time before the last time it was last
disconnected to WiFi, the device can be periodically checked (e.g.,
at a lower sampling rate/duty cycle than it might otherwise be
checked at) to further determine that it is not in a trip.
[0443] One or more of the techniques described herein can be
implemented in an API that can be used by other applications
running on/in relation to the device to provide such applications
with accurate context information in a manner that is power
efficient for the device. For example, a navigation application
that wants to prevent a driver from the distraction of inputting a
destination while driving but wants to permit a passenger to do so,
can query such an API as to whether the device is (a) present
within a trip and/or (b) is being operated by a driver or a
passenger. By way of further example, using such an API, a
navigation application (e.g., Waze) can be configured to turn
itself on or off automatically (with or without giving the user a
chance to override), based on whether the device is determined to
be within a trip or not (and the device can expend relatively
little power to so determine). In another example, a telephony
application (native or otherwise, e.g., Viber, Skype, etc.) and/or
a texting application (native or otherwise, e.g., WhatsApp) running
on the device can determine whether or not to allow incoming and/or
outgoing calls based upon the in-trip and driver/passenger
information/determination(s), as can be provided by the referenced
API.
[0444] In certain implementations, one or more aspects of the
techniques/technologies described herein can be configured in
relation to a determination of a likelihood that a user associated
with a device is going to be in a trip. It should be understood
that such a likelihood can, for example be determined/estimated
based on one or more inputs, factors, data elements, etc. (e.g.,
time, location, calendar information, user history, user or
supervisor preference for tradeoff between latency, accuracy and
power, etc.), such as those that may pertain to all users in a
given population, pertain only to a segment of such users (e.g.,
sex, demographic, location), and/or or pertain to a particular
individual user (e.g., calendar information, historical user
behavior, etc.). For example, based one or more determinations
(such as those corresponding to a particular context, as computed,
for example, based on one or more on the referenced inputs,
factors, data elements, etc.) relatively more resources (e.g.,
battery power, processing power, sensors, etc.) can be employed,
activated, and/or otherwise dedicated towards one or more
determinations pertaining to whether a user is/was performing a
certain activity (e.g., present/traveling within a moving vehicle)
during or near rush hour (as determined based on data pertinent to
an entire population), during or near the time children are
driving/being driven/traveling to school within a certain
neighborhood (as determined based on data pertinent to a particular
population segment) and/or before a meeting scheduled within the
user's calendar (as determined based on data pertinent to the
individual user)--in order to determine/identify such activity more
accurately (by utilizing the additional resources referenced above)
and/or with less latency, with respect to one or more of the
referenced context(s). Moreover, a comparable configuration can
also be employed to enable the usage/expenditure of relatively
fewer resources in other context(s) to determine whether the same
user was performing such an activity at a time when (s)he can be
determined to be relatively less likely to do so, e.g., in a moving
vehicle in the middle of the night.
[0445] It should also be noted that, as noted above in detail with
respect to FIG. 5, in certain arrangements, the processor 110
executing one or more of software modules 130, including,
preferably, determination module 170, can transform an operation
state of mobile device 105 based in whole or in part on the one or
more determination factor(s), such as the probability computed at
step 630. This operation can be further appreciated when employed
in conjunction with a determination of an in-vehicle role of a user
of mobile device 105, such as that depicted in FIGS. 2A-C and
described in detail above. For example, in certain arrangements,
upon determining (preferably to a certain minimum probability) that
a mobile device 105 is under the control of a driver of a vehicle
(such as by processing the inputs from accelerometer 145A and
gyroscope 145B of mobile device 105 against those of other mobile
devices 160 within the same vehicle, thereby identifying the driver
of the vehicle, as described in detail herein), it can then be
further determined whether mobile device 105, which has been
determined to be under the control of a driver, is being operated
in a handheld state (generally prohibited in most places) or in a
non-handheld state (generally permitted). Accordingly, in such an
arrangement (where mobile device 105 has been determined to be
under the control of a driver and is being used in a handheld
state), a transformation (substantially similar to that described
in detail above with respect to step 240) can be employed. In such
a scenario, processor 110 can coordinate various transformations
and/or adjustments to the operation(s) of mobile device 105, as
described in detail above with respect to step 240. As also noted
above, in certain arrangements various of the referenced
transformations can be employed only when either one or both of the
probabilities pertaining to the user role of the user of mobile
device 105 is a driver and/or the handheld state of mobile device
105 is handheld meet and/or exceed a certain minimum threshold.
[0446] Moreover, in certain implementations, a mobile device 105
that is positioned in a cradle or dock (whether a `dumb` cradle
that simply holds a device or a `smart` cradle that provides power
and/or other connectivity to a device) that has not already been
authenticated to be operated by a user that is a passenger (such as
in the manner described in detail herein) can be configured to
employ a particular restriction and/or set of restrictions (such as
those described in detail herein) thereto, such restriction/set of
restrictions preferably being different than restrictions that are
employed at a device that has also not been authenticated as being
operated by a passenger but is not in a cradle. Being that
positioning a device in a cradle entails some degree of additional
safety in relation to operation of the device on the part of the
driver (being that the driver is not holding the device in his/her
hand), in addition to the fact that in certain jurisdictions it is
permitted to operate mobile devices in certain manners when
positioned in a cradle, it can be appreciated that in certain
implementations, it can be preferable to implement restrictions
that account for these factors. For example, in such a scenario a
cradled device can be employed with a restriction that still allows
the user to make and/or to receive calls in geographic locations
(e.g., a particular state or country) that allow the use of
hands-free devices for calling, whereas a comparable non-cradled
device can be restricted from even making such calls. It can be
further appreciated that in certain implementations, such
restriction(s) (and/or any of the other restrictions referenced
herein) can be employed, for example, on/at the mobile device, on
the SIM card, and/or by the cellular carrier (that is, in relation
to the mobile device).
[0447] In another implementation, the manner in which a device is
being held/oriented (e.g., placed in a dock/cradle, hand-held,
etc.) can be determined based on a spectral analysis of the
frequencies perceived/observed by the accelerometer and/or
gyroscope of a device, such as in a manner known to those of
ordinary skill in the art. For example, the spectral pattern
perceived by the sensors of a handheld device (i.e., a device being
held in the hand of a user) is likely to be identifiably different
from that perceived with respect to a device that is placed in a
dock/cradle, in that a handheld device will often perceive higher
values (e.g., in a range of 3-7 hz).
[0448] In another implementation, the manner in which a device is
being held/oriented (e.g., placed in a dock/cradle, hand-held,
etc.) can be determined based on the orientation of the device (for
example, as can be measured based on inputs originating at the
accelerometer, magnetometer, and/or GPS of the device, such as in
the manner described herein), in conjunction with a spectral
analysis of the observed/perceived frequencies (such as of the
accelerometer and/or gyroscope), as described herein.
[0449] It should also be noted that the referenced
processing/determining of an orientation of a device based on
inputs originating from the accelerometer of the device can
encounter noise/interference when such determinations occur within
a running or ignited vehicle (i.e., a vehicle having a running
engine), as, for example, a running vehicle can impart various
forces that are perceptible to the device and/or the sensors of the
device and which can cause an accelerometer-measured/determined
orientation to change, despite the fact that the actual orientation
of the device may not change. For example, a device that is
cradled/docked or otherwise held in an `upright` orientation will
generally demonstrate no acceleration on its X and Z axes, while
demonstrating an acceleration of 1 g on its Y axis, and the angle
of the device, as determined from the accelerometers of the device,
is 90 degrees. Accordingly, in a scenario where the vehicle
accelerates at 1 g, and the device is oriented such that such
accelerations are imparted on the Z-axis of the device, then the
acceleration perceived on the Y and Z axes are each 1 g and the
pitch angle of the device (as determined based on the trigonometric
relationship between the acceleration of its axis) is 45
degrees--whereas the actual pitch angle of the device is 90
degrees.
[0450] Accordingly, in certain implementations, one or more inputs
originating at one or more sensors of a device can be used to
filter out the noise introduced by vehicle acceleration events (as
opposed to device-specific acceleration events). In doing so, the
accuracy of the various determinations with respect to the
orientation of the device can be increased/improved. For example,
one or more acceleration events/instances can be
detected/identified, such as using one or more other sensors, such
as GPS, on-board car sensors, radio (e.g. Doppler, RSSI, cellular
towers, WiFi, etc.), server-side techniques (e.g., OAO, TDOA),
etc., which can be used to process the data originating from the
accelerometer and/or gyroscope of the device in an improved/more
accurate manner. By way of illustration. In the referenced example,
the GPS sensor of the device can measure/identify a change in speed
of the vehicle that can be consistent with the referenced 1 g
forward acceleration, and it can be determined that the 1 g
acceleration observed with respect to the Z-axis of the
accelerometer was present due to the acceleration of the vehicle
and not from a change in the actual orientation of the device, and,
as such, it can be further determined that the actual pitch angle
of the device remains 90 degrees (and not 45 degrees).
[0451] It should also be appreciated that in certain
implementations, one or more restrictions can be employed at/in
relation to a mobile device, based on a geographical determination,
as referenced above. That is, in light of differences in laws
regulating mobile device usage by drivers in difference
jurisdictions, one or more restrictions can be selectively employed
at a mobile device based on a determination of the location of the
device (e.g., based on inputs received from the GPS). Thus, in a
scenario where State A prohibits texting while driving, while State
B prohibits texting while driving and talking while driving, the
appropriate corresponding restriction (effectively
preventing/precluding the mobile device from performing the
prohibited operation) can be employed based on the location of the
mobile device (as determined by the GPS, cell towers and/or wifi
transceivers seen/detected, as is known to those of ordinary skill
in the art).
[0452] In certain implementations, a device can be determined to be
positioned in a cradle or dock based on the level of movement of
the device. For example, a device that is held in a cradle will
tend to move less than a device that is not held fixed in a cradle
as can be determined based on an analysis of inputs originating at
the accelerometer and/or gyroscope of the device, and, for example,
the tightness (e.g., standard deviation) of the distribution of
accelerometer readings or changes thereto, such as in a manner
described herein and known to those of ordinary skill in the
art.
[0453] In other implementations, the orientation of the device can
be used to determine if a device is in a cradle or not. For
example, a device that is in a cradle will have a fixed and known
orientation (e.g., generally the y-axis accelerometer, as shown in
FIG. 9A) will pick-up a large component of gravity and/or the
X-axis accelerometer will pick up a large component of gravity, as
can be appreciated by those of ordinary skill in the art.
[0454] In certain implementations, the presence/existence of
connections to the device (`smart` cradles supply power and/or
connectivity to the device) can be used to determine if a device is
in a cradle or not.
[0455] In yet other implementations, the orientation of a device
relative to the vehicle in which it is present can be used to
determine if the device is in a cradle or not. If such orientation
is fixed over some time period, then it can be determined that the
device is fixed (e.g., is positioned in a cradle/dock). If such
orientation is not fixed (e.g., the device is actually hand-held),
then it can be determined that the device is not in a cradle. For
example, the orientation of the device relative to the vehicle can
be determined at any point in time using (a) the device's GPS
bearing, which measures the direction of movement of the device
with respect to the Earth (denoted G), regardless of the
orientation of the device within the vehicle; and (b) the device's
magnetometer/compass, which measures the orientation of the device
with respect to the Earth's magnetic field (denoted f), which
depends on the orientation of the device in the vehicle and the
bearing of the vehicle. For a device whose orientation with respect
to the vehicle is fixed (e.g., a device in a cradle), a constant
rotation matrix, R, can be found/computed, such that G*R=M, such as
in a manner known to those of ordinary skill in the art. However,
for a device whose orientation with respect to the vehicle is not
fixed (e.g., a hand-held device), such rotation matrix is not
constant.
[0456] It should also be understood that the identification of a
device as being in a cradle/dock, as referred to herein, can be
configured/expanded to any device whose position relative to the
vehicle's is static and/or any device that is not hand-held.
[0457] Various of the referenced implementations and
functionalities relating to the cradle/dock status of the mobile
device are described in greater detail below, specifically with
respect to FIG. 24.
[0458] Turning now to FIG. 7, a flow diagram is described showing a
routine 700 that illustrates a broad aspect of a method restricting
operation of a mobile device 105 in accordance with at least one
embodiment disclosed herein. As will be described in greater detail
below, various of the steps and operations that make up routine 700
share substantial similarities to those described above in
connection with FIGS. 2A-C, 3, 4, 5, and 6. It should be noted at
the outset that while the following description of routing 700 will
be directed primarily to operations occurring at mobile device 105,
such description is exemplary and intended for the sake of clarity
and consistency. However, it should be understood that any and/or
all of the steps in routine 700 can be similarly employed at
another device/machine, such as at central machine 168, such as in
the manner described in detail above with respect to FIG. 4.
Furthermore, the same principle should be understood and
appreciated with respect to any and all of the various steps,
operations, and/or functions described throughout the present
disclosure. That is, while any one of the particular steps,
operations, and/or functions are described herein as being
performed at and/or upon a particular machine or device (such as
mobile device 105, mobile device 160, and/or central machine 168),
such description should be understood as being exemplary and/or
illustrative and not limiting. Accordingly, it can be appreciated
that any and all steps, operations, and/or functions described
herein with regard to a particular device and/or machine (such as
mobile device 105) should be similarly understood to be similarly
capably of employment at another device and/or machine (such as
central machine 168), substantially in the manner described herein,
without departing from the scope of the present disclosure.
[0459] At step 701, processor 110 executing one or more of software
modules 130, including, preferably, restriction module 171
determines whether mobile device 105 is present with a vehicle,
such as through one or more of the various determination methods
described in detail herein.
[0460] Upon determining the mobile device 105 is within a vehicle
(such as a car, a truck, a van, a motorcycle and a jeep.), at step
703, processor 110 executing one or more of software modules 130,
including, preferably, restriction module 171 determines whether
the vehicle is in motion, such as through one or more of the
various determination methods described in detail herein.
[0461] At step 705 where processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, employs a first restriction at mobile device 105 and/or in
relation to mobile device 105. As will be described in greater
detail herein, the first restriction is preferably one or more
instructions that dictate at least one operation state of the
mobile device. Examples of such restrictions include but are not
limited to: instructions that disable a particular feature or
functionality of a mobile device 105 (such as the ability to type
text), instructions that disable multiple features or
functionalities of a mobile device 105 (such as the ability to
launch certain applications and the ability to receive text
messages), and instructions that functionally "lock" mobile device
105 by effectively disabling many or all of the functionalities of
the device. It should be understood that in many arrangements, the
referenced first restriction is preferably a default restriction.
That is, in such arrangements the first restriction is employed by
default, such as upon powering on and/or activating mobile device
105. It should be appreciated that in certain arrangements such
restriction can be employed in relation to mobile device 105, such
as by a central machine 168, such as in the manner disclosed in
detail herein, for example with respect to FIG. 4. By way of
illustration, the referenced restriction can be imposed by a
communications provided (which preferably operates central machine
168) to present transmission of one or more communications (e.g.,
SMS messages) to a mobile device 105, until an
identification/determination is made, such as identifying that two
or more users are in a vehicle, such as in the manner disclosed in
detail herein.
[0462] It should be understood that in various arrangements,
including many of those described herein, the various restrictions
employed at mobile device 105 are directed towards configuring
mobile device 105 in such a manner that operation of and/or
interaction with the device is difficult, inconvenient, and/or
impossible (that is, it can be said that operation of mobile device
105 is impeded) for a user who is also simultaneously operating a
vehicle. At the same time, such restrictions are also preferably
configured to create minimal, if any, difficulty and/or
inconvenience when operated by and/or interacted with by a user who
is not simultaneously operating a vehicle. In other words, it can
be said that such restrictions preferably impede operation of the
mobile device by a user who is a driver moreso than they impede
operation of the mobile device by a user who is a passenger. As
such, it should be further understood that in certain arrangements
it can be preferably for mobile device 105 to initially determine
that the device is present within a vehicle (such as through one or
more of the various determination methods described in detail
herein) prior to employing such a first restriction. Accordingly,
it can be further appreciated that the various steps and operations
described herein with reference to FIGS. 7-8 can be further
implemented, in certain arrangements, in conjunction with one or
more of the various other methods and systems described in detail
herein, such as those described with reference to FIGS. 2A-6.
Furthermore, it should be recognized that any one or more of the
various steps, operations, routines, functions, and/or figures
disclosed herein can preferably employed in conjunction within any
one or more of the various steps, operations, routines, functions,
and/or figures disclosed herein. Thus, for example, the various
restrictions described in conjunction with FIG. 7 can be employed
in conjunction with the various determination operations described
above. By way of example, one or more of the referenced
restrictions can be employed before the occurrence of and/or in
response to one or more of the determinations described in detail
herein.
[0463] It should be understood that in various arrangements, at
least one of the one or more restrictions that dictate the at least
one operating state of mobile device 105 are determined based on
inputs originating at least one of the various sensors 145, etc.,
as described in greater detail herein.
[0464] At step 707, mobile device 105 preferably prompts one or
more users to initiate and/or provide one or more stimuli that can
be received as inputs at mobile device 105. By way of example,
mobile device 105 can prompt each of the one or more users in a
vehicle to repeat a particular word or series of words projected by
mobile device 105. It should be understood that in certain
arrangements such a prompt can request for the words to be repeated
sequentially while in other arrangements such a prompt can request
for the words to be repeated simultaneously, while in yet other
arrangements the timing of the repetition is of no consequence. It
should be appreciated that such prompting can request practically
any stimulus that can be received and/or analyzed as an input in
the manner described herein.
[0465] At step 710, processor 110 executing one or more of software
modules 130, including, preferably, restriction module 171 receives
at least a first input and a second input (e.g., the referenced
stimuli), in the manner disclosed in detail herein. As has already
been described in detail herein, each of the first input and the
second input preferably originate at one or more of sensors 145,
software modules 130, user interface 172, operating system 176,
and/or communication interface 150, though it should be understood
that the first input and the second input need not originate from
the same source.
[0466] It should be understood that, as referred to herein, such
inputs are referred to as originating at one or more of sensors
145, software modules 130, user interface 172, operating system
176, and/or communication interface 150 in the sense that such
inputs are initially perceived--from the perspective of mobile
device 105--at such components. However, it should be recognized,
as will be appreciated in connection with the following examples,
that in many arrangements and scenarios such inputs (and/or the
stimuli and/or phenomena that trigger them) can ultimately
originate at sources other than at various components of mobile
device 105. Accordingly, it should be appreciated that within the
context of the discussion of the subject matter encompassed by FIG.
7, various inputs are referred to as originating at a particular
component in the sense that they originate from such a component
with respect to mobile device 105. However, it is acknowledge that
such inputs can, in turn, have ultimate origins beyond mobile
device 105 itself, such as from the voice of a particular user
and/or from an external system or device, as illustrated below.
[0467] For example, a first input corresponding to the audio tones
of the voice of a first user can be received at microphone 145D,
and a second input corresponding to the audio tones of the voice of
a second user can also be received at microphone 145D. It should
also be understood that in certain arrangements, one or more of the
various inputs can be received at and/or originate from a source
external to mobile device 105, such as vehicle data system 164 and
or another mobile device 160. By way of example, vehicle data
system 164 can provide an input to mobile device 105 (preferably
received via communication interface 150) indicating the weight
measured on one or more seats of a vehicle, and/or the usage of
seat belts at one or more seats of a vehicle, etc.--which can in
turn, indicate that more than one user is within a vehicle. By way
of further example, a detection of mobile device 160 within a
vehicle (using one or more of the methods described herein) can
also indicate that more than one user is within a vehicle.
[0468] At this juncture, it should be noted that while the first
input and the second input have been described herein as being
discrete inputs, such description is merely exemplary and for the
sake of clarity and illustration. Accordingly, while in certain
arrangements the first input and the second input are separate
inputs in the conventional sense--that is, inputs that originate at
two independent sources, in other arrangements the first input and
the second input are actually aspects found within a single input.
For example, a single audio input (such as an audio recording) that
contains two distinct voices (such as the voices of a first user
and a second user) can be processed (in the manner described
herein) to identify such distinct voices within the single audio
input, which are understood to be a first input and a second input
within the context of the present disclosure.
[0469] Then, at step 720, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, analyzes the first input and the second input. In doing so,
the presence of at least one of two or more users and/or two or
more mobile devices can be determined, such as a determination of
the presence of a first user and the presence of a second user,
such as in the manner described in detail herein. By way of
illustration, continuing with the example referenced above at step
710, the first and second inputs (that is, the audio tones of the
voices of the first user and the second user) can be analyzed to
identify an audio signature for each of the respective inputs, in a
manner known to those of ordinary skill in the art, and such audio
signatures can then be compared to determine if they are
substantially similar and/or identical (indicating that both inputs
likely originate from the same source, i.e., the same user) or
substantially dissimilar (indicating that each of the inputs likely
originate from different users). Thus, upon identifying that first
input (here, the voice of the first user) is substantially distinct
from the second input (here, the voice of the second user), it can
be concluded at minimum that the device 105 is in the presence of
(if not in close proximity to) a first user and a second user.
Additional illustrations of such inputs to determine the presence
of at least one of two or more users and/or two or more mobile
devices are presented below at EXAMPLE 4.
[0470] Upon determining that mobile device 105 is in the presence
of at least one of (a) two or more users and/or (b) two or more
mobile devices, such as by determining the presence of at least a
first user and a second user, at step 742 processor 110 executing
one or more of software modules 130, including, preferably,
restriction module 171 modifies an employment of at least one
restriction such as the first restriction. That is, being that a
determination (at step 720) that the device is in the presence of
at least two users necessarily indicates that at least one of such
users is not a driver of a vehicle, this conclusion can preferably
trigger and/or initiate the modification of the first restriction.
In certain arrangements, such modification can include the
employment of a second restriction, strengthening of the first
restriction, and/or the easing of the first restriction. In one
arrangement, such a second restriction can include one or more
instructions that dictate one or more operational states of the
mobile device 105 with respect to one or more of the various
sensors 145 of the device. That is, as noted above, such a
restriction can configure mobile device 105 to operate in a manner
that is relatively difficult/inconvenient for a driver while being
relatively unobtrusive for a passenger. Put differently, it can be
said that such restrictions impeded operation of mobile device 105
by a user who is a driver moreso than the same restrictions impede
operation of a mobile device 105 by a user who is a passenger.
Examples of such restrictions include but are not limited to:
requiring that the device only operate in `landscape` mode (which
generally requires two hands for efficient
interaction/navigation--a demand that is relatively simple for a
passenger to comply with but relatively difficult for a driver, who
needs at least one hand to steer the vehicle, to comply with),
requiring that the device operate only at certain orientations (as
detected by one or more of sensors 145, such as gyroscope 145B,
accelerometer 145A, GPS 145C, and magnetometer 145E) such as a
completely upright orientation which is relatively simple for a
passenger to comply with but which is inconvenient for a driver who
will not find such an orientation as comfortable while driving and
who will generally wish to hold the device at alternate
orientations in order to obscure the device from the view of law
enforcement officials), and that the device not operate in a
manner/pattern that is consistent with that of a driver (such as
the various in-vehicle role determinations described in detail
herein). It should be noted that although such restrictions are
generally effective, on average, in impeding operation of a device
by a driver moreso than a passenger, it is recognized that certain
individual drivers may not find such restrictions particularly
inconvenient, while other passengers may find them highly
inconvenient. Nevertheless, on average, such restrictions impede
the operation of mobile device 105 by drivers moreso that they
impede such operation of mobile device by passengers.
[0471] In the event that the presence of at least one of (a) two or
more users and/or (b) two or more mobile devices, such as the
presence of a first user and a second user, are not determined
and/or one or more users not in the set of users known to be users
of the mobile device, is not determined (at step 720), at step 744
processor 110 executing one or more of software modules 130,
including, preferably, restriction module 171 maintains the
employment of the first restriction.
[0472] In certain implementations, upon detecting/determining that
a device is present/operating within a moving vehicle, one or more
input methods associated with such a device (e.g., keyboard, voice
commands, gesture inputs, etc.) can be modified or changed, such as
to different input method(s) that selectively restrict one or more
aspects of the functionality the device. For example, based on a
detection/determination that a device is present/operating within a
moving vehicle, an on-screen keyboard can be replaced (or altered)
such that the keyboard can only receive a single input/character
during a defined time period (e.g., every 15 seconds).
Alternatively, such input method(s) can be selectively altered or
replaced in relation to instances during which one or more
particular application(s), such as those identified as being
distracting (e.g., texting, e-mailing, web browsing, social
networking, etc.), are executing at the device.
[0473] In another implementation, a determination can be made as to
when the device is present/operating within a moving vehicle and,
based on such a determination, the device can initiate an operation
mode that can selectively restrict one or more functionalities of
the device ("Driver Mode"), such as in the manner described
herein.
[0474] In certain implementations, while a device or devices can be
determined to be present within a moving vehicle/trip, the voice(s)
of one or more user(s) perceived at one or more device(s), such as
while engaged in a telephone call or other such audio
communication, can be processed/analyzed to determine, for example,
whether a particular speaker is relatively likely to be a driver or
a passenger. Such determination(s) can be achieved, for example, by
comparing response time, pitch, tones, intonations, intensity,
volume and other speech characteristics between the speaker and a
reference population and/or between the speaker and one or more
references to the speaker himself (or herself) over time, such as
in one or more different situations (e.g., when not in a moving
vehicle, when in a moving vehicle when determined to be in
different roles, e.g., driver/passenger, etc.), where the context
of the situations may be known and/or unknown, etc. It should be
understood that one or more speech recognition, speaker
recognition, intonation analysis, non-verbal communication and/or
voice emotion detection including spectral analysis, waveform
analysis and neural networks techniques, as are known to those of
ordinary skill in the art, can be employed in achieving such
determinations. For example, one or more users can be determined to
possess/exhibit certain elements or characteristics in his (or her)
voice and intonations when the user is determined to be a driver
(for example, at times a driver may pause for a relatively longer
period of time before responding to a question), whereas such a
user's voice doesn't possess/exhibit these elements (or
possesses/exhibits them to a different extent or with a different
frequency) when the user is determined to be a passenger or outside
a vehicle.
[0475] Although some jurisdictions have legislated laws (and
entities have adopted policies) for total driver cellphone bans
(for some subset of drivers or all drivers), other jurisdictions
(and entities) allow hands-free or even handheld phone calls (while
possibly blocking other functions, like typing or reading emails).
Even with respect to those jurisdictions (and/or entities) who
allow their drivers to conduct phone calls while driving, it may be
advantageous to configure a mobile device to operate/react in one
or more ways when the driver/user can be determined to be
emotionally distressed. One example of such a reaction is to
configure the mobile device to give the driver an audible and/or
visual "calm down" message, another example is to end a call or
otherwise "harden" or strengthen the mobile device's Driver Mode
policy (e.g., by selectively implementing additional restrictions
in relation to the device), until, for example, the driver can be
determined to have calmed down.
[0476] FIG. 42 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 4205 a perception of one or more signals can be identified, such
as in relation to a first device. In certain implementations, the
one or more signals can originate at one or more other devices. At
4210, a performance of one or more authentication techniques can be
enabled, such as in relation to the first device. In certain
implementations, a performance of one or more authentication
techniques can be enabled based on an identification of the one or
more signals in relation to the first device.
[0477] When one device is in `Driver Mode,` one or more other
devices (such as those executing a comparable application capable
of selectively restriction a device) can project or otherwise emit
or provide a signal or notification (which, in various
implementations, may be audible, inaudible, via Bluetooth, etc.)
(referred to herein as a "Special Signal"). In certain
implementations, such "Special Signals" can be configured such that
they are perceptible only by other devices present within the same
vehicle (as can be achieved by providing such signals at a
relatively law power of transmission, such that, in most cases, the
signals are unlikely to be perceptible to devices outside of the
vehicle). Moreover, such signal(s) can be provided on a continuous
and/or periodic basis (whether static, e.g. once every 15 seconds,
or dynamic periodicity, e.g., at randomized intervals, at
randomized frequencies, and/or in conjunction with randomized
content generated by a remote server (such as in order to prevent
tampering,).
[0478] Having initiated `Driver Mode` with respect to a device
(and/or otherwise restricted such a device) the referenced device
can be configured (such as via the referenced `Driver Mode`) to
enable an adjustment of such a state, such as
changing/transitioning the device to another operational state such
as a passenger mode ("Passenger Mode") based on a determination
(and, in certain implementations, for as long as) that the device
is capable of perceiving a `Special Signal` emitted by driver
device (e.g., a device determined to be operated by a driver,
presumably originating from a device within the same vehicle).
[0479] In another implementation, a device operating in `Driver
Mode` can be transitioned to another state, such as to `Passenger
Mode` by successfully performing one or more passenger
authentication technique(s), such as those described herein.
[0480] It can be appreciated that, in light of the fact that most
vehicles have only one occupant in them, and such occupant is, by
definition, the driver, devices being operated by such solo drivers
can be configured to initiate `Driver Mode` (and remain in such a
state) because no `Special Signal` is perceptible to such
devices.
[0481] Moreover, in certain implementations, having initiated a
`Passenger Mode` with respect to a device (such as in the manner
described herein), such a device can be configured to cease to
emit/project the referenced `Special Signals.`
[0482] In certain implementations, information identifying the
device that was passenger authenticated (e.g., a device ID such as
IMEI), a SIM ID such as IMSI, UUID, telephone number, etc.) and/or
the device that enabled such authentication can be collected,
time-stamped. GPS-stamped, saved and/or analyzed. In addition,
information pertaining to when a passenger device ceased to receive
a Special Signal and, therefore, left Passenger Mode (e.g.,
corresponding to a trip stopping, the driver and passenger
separating, the driver turned off his/her device, etc.) can also be
stored.
[0483] In another implementation, one or more aspects of the
referenced information collected over time can be analyzed. In
doing so, instances in which one device is used to enable another
device to operate in `passenger mode,` and the device that enabled
such operation is then observed to operate in a relatively limited
manner (e.g., with respect to calls, texts, data sent/received,
contact present or changes thereto, applications run, etc.) outside
of emitting a Special Signal, can be identified. Identifying such
instances can be advantageous in order to identify drivers who may
procure one or more additional devices to "sacrifice" as driver
devices so that a second device can be authenticated as a passenger
device (such as in the manner described herein) and used freely
while driving.
[0484] In another implementation, a driver having a device that
does not have the software/application capable of configuring the
device to project/emit the referenced `Special Signal` may have the
option to (a) download or otherwise obtain a `lite` version of the
software that enables projection/emitting of such a Special Signal
(thereby enabling passengers within the vehicle to transition their
devices into Passenger Mode, such as in the manner described
herein), (b) go to a website that plays a Special Signal, and/or
(c) receive a Special Signal over a voice connection (e.g., by
calling a phone number that plays a Special Signal).
[0485] Moreover, in certain implementations device users can stop
the emission of a Special Signal from their devices. In so doing, a
passenger can prevent a driver from using his/her device in
Passenger Mode (or attempting to).
[0486] In public transportation settings/scenarios, the referenced
Special Signal can be emitted by and/or amplified by hardware
within the vehicle. Alternatively, other devices that perceive a
Special Signal can also relay (or "repeat") such Special Signal,
thereby increasing its effective range of transmission.
[0487] In another implementation, a passenger device can be
prompted to request for a driver device to emit a Special Signal,
rather than have all devices within a vehicle emitting a Special
Signal until they transition into Passenger Mode.
[0488] Turning now to FIG. 8, a flow diagram is described showing a
routine 800 that illustrates a broad aspect of a method restricting
operation of a mobile device 105 in accordance with at least one
embodiment disclosed herein. As will be described in greater detail
below, various of the steps and operations that make up routine 800
share substantial similarities to those described in detail
herein.
[0489] At step 801, processor 110 executing one or more of software
modules 130, including, preferably, restriction module 171
determines whether mobile device 105 is present with a vehicle,
such as through one or more of the various determination methods
described in detail herein.
[0490] Upon determining that mobile device 105 is within a vehicle
(such as a car, a truck, a van, a motorcycle and a jeep.), at step
803, processor 110 executing one or more of software modules 130,
including, preferably, restriction module 171 determines whether
the vehicle is in motion, such as through one or more of the
various determination methods described in detail herein.
[0491] At step 805, processor 110 executing one or more of software
modules 130, including, preferably, restriction module 171, employs
one or more restrictions at mobile device 105 and/or in relation to
mobile device 105, substantially in the manner described above with
respect to step 705. It should be understood that such
restriction(s) are preferably configured to impede operation of
mobile device 105 by a user that is a driver moreso than the
restriction(s) impede operation of mobile device 105 by a user that
is a passenger, as described in detail herein. Examples of
scenarios where the operations of routine 800 can be implemented
include teenage drivers (wherein a parent/guardian wishes to employ
such restrictions, which make it difficult to operate a mobile
device 105 while driver, at all times) and/or phones that are fixed
in vehicles, such as car phones (wherein it is always desirable to
implement such restrictions). It should be appreciated that in
certain arrangements such restriction can be employed in relation
to mobile device 105, such as by a central machine 168, such as in
the manner disclosed in detail herein, for example with respect to
FIG. 4. By way of illustration, the referenced restriction can be
imposed by a communications provided (which preferably operates
central machine 168) to prevent transmission of one or more
communications (e.g., SMS messages) to a mobile device 105, until
an identification/determination is made, such as identifying that
two or more users are in a vehicle, such as in the manner disclosed
in detail herein.
[0492] It should be further understood that in certain
arrangements, such restriction can be further configured to impede
operation of the mobile device, and/or be more likely to be applied
to a mobile device used by a driver than to a mobile device used by
a passenger. By way of example, consider a scenario where a
particular restriction is employed such that if the `shake`
perceived at mobile device 105 exceeds a certain threshold level,
SMS messages cannot be sent from the device. It can be appreciated
that employment of such a restriction does not impede drivers more
than passengers (being that, once employed, it will impede a driver
and a passenger equally), however such a restriction is more
likely, on average, to be employed for drivers than for passengers
(being that drivers, on average, shake their devices more than
passengers). Further such examples are provided at EXAMPLE 4.
[0493] It should be further understood that, as described in detail
above, such restriction(s) can be configured to be applied to a
mobile device as used by a first user moreso than such restrictions
are applied to a mobile device used by a second user. By way of
example, such restrictions can be configured to impede a user who
uses the mobile device in an unauthorized operation state moreso
than a user who uses the mobile device in an authorized operation
state. By way of illustration, one such example, which is
preferably directed to preventing students from using their mobile
devices while they are in a classroom setting, can impose a
restriction such that the mobile device is only operable and/or
functional if the device is held upright and/or at a certain
altitude (as can be determined based on one or more of sensors 145,
as described in detail herein). In doing so, students will
effectively have to hold their mobile devices upright and in a
certain conspicuous orientation, such that it will be very
difficult for such students to operate their mobile devices
inconspicuously during a class, such as underneath a desk.
Accordingly, it can be appreciated that such a restriction impedes
users (here, students) who use their mobile devices in an
unauthorized operation state (that is, for example, during class),
which such a restriction does not impede users who use their mobile
devices in an authorized operation state (that is, when not in
class) to the same degree. It should be further understood that the
referenced examples and illustrations are merely exemplary, and
that many other such restrictions within the scope of the present
disclosure are similarly possible.
[0494] Additionally, a device that is located in a vehicle can be
used to determine whether the vehicle's engine is on or off. One
manner in which this is useful, is when considering that a vehicle
that has recently stopped moving, but whose engine is still on, may
likely continue its present trip (e.g., stopped at a red light),
whereas a vehicle that has recently stopped moving and whose engine
is off has likely finished its present trip. Differentiating
between these two states in useful, among other reasons, in order
to know when usage restrictions on a driver's device should be
lifted, such as in the manner described herein.
[0495] In one implementation, the device's accelerometer and/or
gyroscope and/or magnetometer can be used to determine whether the
engine is running or not. For example, the accelerometer and/or
gyroscope and/or magnetometer show larger movements and/or movement
at different frequencies, when the engine is running as opposed to
not running.
[0496] In another implementation, the device's microphone(s) is
used to determine whether the engine is running or not. For
example, the microphones will show signals at different
frequencies, including harmonics of the base frequency which can be
more easily detected by the microphones used on popular devices,
when the engine is running than if the engine is not running.
[0497] In yet another implementation, the event of starting or
stopping the ignition can be captured by the accelerometer,
gyroscope and/or microphone. For example, the magnitude of the
acceleration at the time the ignition is started or stopped is
considerably larger than the previous and subsequent accelerations
in a stationary vehicle.
[0498] In yet another implementation that may be particularly
useful for electric vehicles, the event of starting or stopping the
ignition may be captured by the magnetometer because the magnetic
field created by an electric car will change when the car is turned
on or off.
[0499] It can be appreciated that in certain situations it may be
useful (a) to restrict driver devices in vehicles that are
temporarily stopped, for example at a stop light (i.e., not moving,
but that have been moving recently and whose engines are still on
and/or whose ignition hasn't been turned off), but (b) to not
restrict device's in vehicles that were just turned on, for
example, still in their parking spot (i.e., not moving, and were
not moving recently, but whose engines has been started
recently).
[0500] Additionally, it can be useful to measure the accelerometer
reading and/or magnetometer readings across the 3-axes using an
orientation-invariant, for example, using the RMS of the
accelerations on each of the 3 axes or other techniques known to
those of ordinary skill in the art of signal processing and
time-series analysis.
[0501] Additionally, it should be appreciated that various time
parameters can be associated with many of the above methods so as
to effectively differentiate between events or states that are
recent and ones that are not.
[0502] In certain implementations, one or more of the techniques
described herein can be configured to determine whether a device is
(or is likely to be) within a moving vehicle based on (a) signals
that are measured by the device itself (e.g., by the internal
accelerometer) or provided/imparted from external devices (e.g.,
cellular network, other terrestrial or non-terrestrial
infrastructure, the vehicle or other vehicles, WiFi networks, GPS
networks) and received at the device and/or (b) signals that are
provided/imparted from the device (e.g., RF cellular signals) and
picked up external to the device (e.g., the cellular network, other
infrastructure, the vehicle or other vehicles), such as is
described herein.
[0503] In certain implementations, one or more transmitters within
a vehicle can send a signal (e.g., BT. WiFi) when (and for as long
as) the vehicle is moving (or, optionally, in a lower state where
it also able to move, e.g., "On" or "Not in Park") (the "In-Vehicle
Signal"). Devices can be configured to `wake up` from time to time
to `listen for` the In-Vehicle Signal and, when such a signal is
perceived (e.g., for a long enough period of time), they can be
determined to be in a moving vehicle. The devices can be configured
to `listen` for this signal at somewhere in their architecture
stack (hardware, firmware, operating system, application, etc.) so
as to reduce the power needed and/or provide the option to allow
such to function without the user being able to control it (e.g.,
turn off or opt out).
[0504] Upon determining that a device is in a moving vehicle, the
in-vehicle role of the device user can be determined (e.g.,
identifying the user as a driver or passenger, and, optionally
further differentiate between passengers that are near to the
driver and whose device use might be distracting to her (e.g.,
front seat passengers) and passengers who are less near to the
driver (e.g., rear-seat passengers)). In doing so, the appropriate
usage rule set can be applied to such device. Such technique can
determine the device user's in-vehicle role and/or can, for
example, determine/infer the in-vehicle role of the device user
based on the in-vehicle location of the device. Such determination
can be performed one or more times per trip.
[0505] In certain implementations, one or more techniques for
determining the in-vehicle role of a device user and the in-vehicle
location of a device user, such as those described herein, can be
employed in conjunction with one or more in-vehicle transmitters
(e.g., transmitters employed within the vehicle), such as by
configuring the device to `listen` periodically for certain
signals. In doing so, the in-vehicle location of the device can be
determined such that an in-vehicle role of the device user can be
determined/inferred and an appropriate usage rule set can be
applied to the device.
[0506] In certain implementations, based upon a determination
of/data pertaining to the location of the in-vehicle transmitter,
the time that it takes a signal emitted from the transmitter (the
"Distance Signal", which could be part of the In-Vehicle Signal in
certain embodiments) to reach the mobile device can provide an
indication as to the in-vehicle location of the device, such as in
order to determine the in-vehicle role of the device user. For
example, if the time that it takes for the Distance Signal to
travel from the in-vehicle transmitter to the device (the "time of
flight") is below a certain threshold (which may depend, for
example, on the in-vehicle location of the transmitter, among other
things) and the in-vehicle transmitter is placed in the vehicle's
steering wheel, then the mobile device can be determined/inferred
to be the driver's.
[0507] In order to measure time of flight with a certain degree of
accuracy, in certain implementations (a) the clock on the mobile
device and the clock on the in-vehicle transmitter (or the clock in
the vehicle to which it may be connected) can be synchronized
(e.g., within a certain margin of error), and/or (b) the mobile
device can be configured to determine the time at which Distance
Signal is received with sufficient resolution (i.e., accuracy) to
sufficiently determine the distance between the transmitter and the
device, and/or (c) the device can be configured to differentiate
between the original Distance Signal transmitted and myriad
multipath signals that arrive at the device due to signal
reflection or other indirect routes.
[0508] In the event that both the device and the vehicle have
network access (and the transmitter is, for example, connected to
the vehicle's LAN or has independent access to the network) the
device and the transmitter can be synchronized using existing
protocols like NTP. In the event that one or both of the sides do
not have network access (e.g., because they are in a location that
does not have network connectivity or because, such connectivity is
not provided/available), the two devices can synchronize between
themselves, for example, by using a signal (the "Sync Signal",
which can be part of the In-Vehicle Signal in certain embodiments)
that can, for example, travel more quickly than the Distance Signal
(through which the distance between the device and the transmitter
will be measured). For example, the transmitter and the mobile
device can synchronize by having the transmitter send a Sync Signal
(e.g., an RF pulse via BT, WiFi etc.), once every 5 seconds, which
a device (at a distance of 70 cm) will receive approximately 2
nanoseconds later (assuming that the Sync Signal travels at the
speed of light, 300,000,000 m/s). The transmitter then sends the
Distance Signal (e.g., an inaudible sound pulse that can be
detected by the one or more microphones on the device), say, 3
seconds later and the device (at a distance of 70 cm) can receive
such signal about 2 milliseconds later (assuming that the Distance
Signal travels at the speed of sound, 340 m/s). (It is noted that
the order in which the Sync Signal and the Distance Signals are
discussed above is done for the ease of explanation, but, in
various implementations, these signals can be sent simultaneously
or the Distance Signal can be sent before the Sync Signal,
whereupon the in-vehicle location determination can be made after
the timing of the Sync Signal is determined/known). By transmitting
the Distance Signal as a pulse and using the first such signal
received on the device during any given transmission cycle, the
difficulties of multi-pathing can be avoided. For example, a rule
might state that, if a device receives the Distance Signal within 2
ms (e.g., 70 cm distance) of its being sent then it is determined
to be a driver device. Otherwise (i.e., if it does not receive the
Distance Signal within 2 ms), it is determined to be a passenger
device. Signals received after 2 ms and until the next Distance
Signal transmission (5 seconds later) can be disregarded.
[0509] Illustrative time line for example above:
##STR00001## [0510] t.sub.0=Sync Signal transmitted [0511]
t.sub.1=Distance Signal transmitted [0512] t.sub.2=Cutoff for
Distance Signal (t.sub.1+2 ms) [0513] t.sub.3=Next Sync Signal
transmitted
[0514] The Sync Signal and/or the Distance Signal can be
transmitted at the strengths and in the forms such that they can be
received by the mobile devices in the vehicle with sufficient
accuracy (e.g., in light of intra-vehicle or extra-vehicle noises
or interference), whereby, in certain situations, the strength or
the form (e.g., frequency, duration, encoding) of the signals may
be modulated to so ensure. If the vehicle is the power source of
the transmitter, then this is easy from a power standpoint, though
in some implementations, form modulations (e.g., changes to the
signal's frequency, duration or encoding) may be preferable).
[0515] In some cases, two (or more) vehicles may be sufficiently
close to one another such that one can `hear` the signals
transmitted by the other. This may be prevented or significantly
minimized in various ways know to those skilled in the art,
including time-slicing. For example, if Device A is in Vehicle A
and constantly receives Sync Signals from the transmitter in
Vehicle A approximately every 5 seconds and then Vehicle B, which
is traveling in close proximity to close to Vehicle A, transmits a
Sync Signal that Device A receives after, say 3 seconds, from the
last Sync Signal sent from Vehicle A, such a signal can be
disregarded as "crosstalk" because it was scheduled to receive its
next signal after 5 seconds and will restrict the acceptance of
signals to those that arrive in a light window around that at 5
seconds time (e.g., 5 seconds+/-3 ms), as legitimate Sync Signal
(the probability of a Sync Signal arriving from another vehicle
during such +/-3 ms window each 5 seconds is about 0.1%, assuming
that there is a vehicle in such proximity whose signal can pass
through from one vehicle to another). In another example, each
device can transmit a random "identity" element encoded within its
Sync Signal that can be received by the device and used to identify
if that Sync Signal should be used (i.e., if it was received from
the correct in-vehicle transmitter) or ignored. Finally, if a
device is moved from one vehicle to another (e.g., because the
device's user or only the device physically switches vehicles), the
Sync Signal from the original vehicle can cease to be received in
the expected time slot or with the expected identity (for one or
more times), whereupon it can be determined that the device is no
longer in its original vehicle. It will then begin to receive the
In-Vehicle Signal from the new vehicle it has entered and begin the
Sync Signal and Distance Signal processes in the new vehicle. Note
that in the example presented here there are no "crosstalk" issues
related the Distance Signal for similar reasons and/or they can be
prevented in similar ways. Moreover, in certain implementations the
probability of crosstalk between cars and devices can be further
reduced, for example, by using two (or more) successive Sync
Signals (or Distance Signals) to compute the distance between the
device and the transmitter where the length of time between the
Sync Signal (or Distance Signals) can be randomly varied on each
transmitters and conveyed to their devices (e.g., the next Sync
Signal will occur t seconds after the this Sync signal, where t is
randomly drawn over some interval (0,X|).
[0516] It is noted that the detection and the time-stamping of the
signals received can be done with sufficiently low latency and
sufficiently high resolution so that the in-vehicle location can be
determined with sufficient accuracy. In one embodiment this is
accomplished by moving the detection and time-stamping processes to
a location in the device's stack architecture (hardware, firmware,
operating system, application, etc.) that supports the requisite
latency and clock resolution.
[0517] It is also noted that the set of rules used to determine the
in-vehicle role of the device user can be adjusted in different
cases. For example, such rules can be adjusted based upon the
geometry of a car (e.g., larger cars have a higher distance
threshold) or the location of the in-vehicle transmitter. Such
information can, for example, be stored in-vehicle (or on a server
external to the vehicle) and communicated by the transmitter to the
device (for example, as part of the Sync Signal) and used to adjust
the in-vehicle role determination rules.
[0518] In another implementation, in order to save device power,
even when a device is determined/known to be in a moving vehicle,
the device can be configured not to process the Sync Signal and/or
the Distance Signal described above (or the vehicle can be
configured not to transmit such signals based on a determination
that there no other powered-on devices are present within the
vehicle), until a certain device-based event occurs (e.g., the
screen turns on, a phone call arrives, etc.), whereupon, before
giving control to the user, the device can determine its in-vehicle
location and determine/infer its user's in-vehicle role and apply
the usage rules, such as by using the methods described above. In
certain implementations the Sync Signal can be configured to be
sent more frequently than once every 5 seconds, or the device might
demand an immediate a Sync Signal from the vehicle (BT. WiFi,
server-side) or the transmitter (in which case it would be
transceiver, able to receive certain signals too).
[0519] In some implementations the vehicle and/or the device can be
configured such that one or more aspects of the functionality
described herein is (a) be pre-installed or silently or
conspicuously post-installed on devices; and/or (b) run
autonomously on devices, i.e., it will constantly function without
the user being able to turn it off, uninstall it or opt out except,
perhaps, by powering off a device and/or a vehicle. It can be
appreciated that such configurations can, for example, be dictated
or incentivized by regulation, legislation, policy or decision.
[0520] In other implementations, other methods (e.g., triangulation
methods), involving more than one in-vehicle transmitters in
different (or the same) locations can be employed, thereby
providing more robust (e.g., less noise, more accurate in-vehicle
location) than the example detailed above, but would also likely
cost more. It should be understood that the various illustrations
provided herein are merely exemplary and that such technologies can
be modified to provide any number of additional implementations, as
can be appreciated by one of ordinary skill in the art. Moreover,
it can be appreciated that various devices have multiple
microphones located in different known positions that can be used
to reduce noise and improve accuracy and provide sound localization
information.
[0521] It should be understood that the in-vehicle transmitters do
not have to be integrated into the vehicle, e.g., they could be
externally attached or installed for after-market purposes.
[0522] It may be advantageous to enable notifications to be
generated and provided to certain persons if the transmitters cease
to function properly, including being tampered with. This could be
done device-side or vehicle-side.
[0523] In certain implementations, the system described above could
be reversed, e.g., the mobile device can be the transmitter and
in-vehicle sensors can receive the signals (or a hybrid combination
thereof, i.e., some in-vehicle sensors receive while others
transmit).
[0524] It should also be noted that the techniques described above
can be implemented with respect to the classroom techniques
described herein, whereby the devices in a particular classroom can
be identified using the techniques described above where the
transmitter can be the teacher's mobile device (or a separate
in-class transmitter) and those mobile devices that receive the
Distance Signal within a certain threshold period of time are
determined to be in the teacher's class and can be controlled by
signals sent from the teacher's phone as described herein.
[0525] In another implementation, two or more transmitters that
emit signals (e.g., BT. WiFi, ultrasound, inaudible-sound, light,
etc.), such as those of the same type and/or with the same
transmission power, can be incorporated within one or more hardware
devices that can be installed within a vehicle. Such transmitters
can be designed/configured to transmit spherically and/or
directionally (e.g., in a three-dimensional range that is a subset
of a sphere, e.g., a hemisphere, through the use of appropriate
hardware as is known to those of ordinary skill in the art). Based
upon the strength (or differences thereto) at which a device can be
determined to receive the signals, one or more aspects pertaining
to the in-vehicle position of a mobile device can be determined.
For example, based on a determination that a mobile device is
present in the front left section of a vehicle, one or more
restrictions can be placed on/in relation to the device.
[0526] In another example, based on a determination that a mobile
device is present in the front right section of a vehicle, one or
more restrictions (e.g., those that were placed on the device when
it was determined to be in a vehicle) can be removed/relaxed
from/in relation to the device. It should be understood that in
locations where vehicles travel on the left side of the road (e.g.,
U.K.), such techniques can be reversed.
[0527] It can be appreciated that the strength of a signal emitted
by a nearby transmitter as perceived on a mobile device can vary
from device to device within the same location, orientation and
time (e.g., because of receiver hardware, antenna placement, etc.),
from device orientation to device orientation and from device
context to device context (e.g., in a bag, in a pocket, in a
cradle). Measuring the difference in strength of a signal from two
or more transmitters, transmitting with the same transmission
power, e.g., the difference in their RSSIs, and, optionally,
averaged over time, can provide more accurate location
information.
[0528] In another implementation, the system can be reversed so
that a mobile device emits one or more a signals that are received
by one or more hardware devices and, based upon the relative
strength (or differences thereto) at which the hardware devices can
be determined to receive such signals, one or more aspects
pertaining to the in-vehicle position of a mobile device can be
determined.
[0529] In one implementation, transmitters can encode information
about the direction in which they transmit (e.g., right front,
front right) within the transmission packets (e.g., SSID, payload)
and the receiver (and/or other devices) can use such information,
in addition to the signal strengths, to determine the in-vehicle
position/location of the device.
[0530] For example, a hardware device placed on the ceiling in the
approximate middle of a vehicle might have three directional
transmitters in it. One transmitter can emit signals pointed
downward at the front left of the vehicle (e.g., 1/8 of a sphere).
A second transmitter can emit signals pointed downward at the front
right of the vehicle (e.g., 1/8 of a sphere). A third transmitter
can emit signals pointed downward at the rear of the vehicle (e.g.
1/4 of a sphere). The SSIDs of the transmitter can contain the
suffix strings "FL", "FR", and "Rear", respectively (See FIG. 51).
Accordingly, in a scenario in which a mobile device within the
vehicle determines that the strongest signal that it receives (over
one or more samples) has "FL" in its SSID suffix, it can be
determined that the device is likely to be in the front left of the
vehicle. Moreover, by averaging the strengths of successive signals
closely spaced in time, the accuracy of such a technique can be
further improved. The accuracy can be further improved by requiring
that the difference between the strength of two or more signals
exceed one or more thresholds prior to determining its location.
For example, a device near the front of the vehicle (the device
might be determined to be in the front because the "FL" and "FR"
signals acquired are much stronger than the "Rear" signal), might
only be determined to be in the front right of the vehicle if the
difference in the strength between the FL signal and the FR signal
(e.g., RSSI.sub.FL,t-RSSI.sub.FR,t) was (a) greater than 0 on more
than 90% of 10 samples, each 500 ms apart; or (b) greater than 3
dbms, on average, over 10 seconds; or (c) had a mean that was more
than one standard deviation above zero, over 7 seconds.
[0531] In another implementation, the hardware unit described above
can be modified so that the "FL" 1/8-sphere is enlarged slightly
while the "FR" 1/8-sphere is minimized slightly and as soon as the
FR signal is determined to be stronger than the FL signal (i.e.,
without the need for any additional margins of error), the device
can be determined to be a passenger device (see FIG. 52)
[0532] In another implementation, the two or more transmitters can
be placed in two different units, for example, two in the front
window ("FL", "FR") and one in the rear window ("Rear"). Such
placement may be preferable in certain implementations because it
can utilize solar energy to power the transmitter(s).
[0533] In various implementations the physical structure of the
hardware unit (e.g., relative to the wavelength of signal) can be
designed or configured to prevent/minimize the RF signals from
spreading outside the polygonal/conal direction in which they are
directed/intended to be transmitted after they leave the hardware
unit, as is known to those of ordinary skill in the art.
[0534] In various implementations, the transmission units may be
installed as original equipment (OE) by the vehicle manufacturers
or their subcontractors, or in after-market by specialists or via
`do it yourself` kits.
[0535] In certain implementations, crosstalk can be minimized by
using unique identifiers (e.g., BSSID) for all the transmitters
within the same vehicle (in addition to the directional
information) and ignoring all signals but those that are determined
to be the strongest (collectively across all the transmitters in a
vehicle). Continuing the three (3) transmitter example above, the
BSSIDs of the transmitters in the same device are 123456000001,
123456000002, and 123456000003. When a device in the vehicle
receives vehicle-location signals with a prefix 123456 and 654321,
with strength of -20 dBm, -30 dBm, -40 dBm, -40 dBm. -50 dBm, -60
dBm for 123456FL, 123456FR, 123456Rear, 654321FL, 654321FL,
654321FL, it can compute the average signal strength from devices
with the prefix 123456 and prefix 654321, i.e., -30 dBm and -50
dBM, respectively, and can choose to ignore the signals from the
"crosstalking" signals, i.e., the signals with the 654321
prefix.
[0536] It should be noted that, in certain implementations, a
device can be restricted in a manner that reduces the danger likely
to result from noises emitted by device (e.g., when present within
a vehicle), such as noises that may negatively affect a driver's
abilities to perform his primary task. Upon determining, for
example, that a device is present within a moving vehicle,
applications that use sounds which, if played while in a vehicle
may be confusing, distracting, dangerous, etc. (e.g., a honking
sound, a siren, loud sounds), can be adjusted (e.g., by selecting
different/less confusing sounds, using another feedback technique,
e.g., haptic feedback, or by restricting the sounds entirely). In
certain implementations, such applications can ask (e.g. poll) a
trip detection module (e.g., on the mobile device) or receive a
notification (e.g., subscribe to a callback) from a trip detection
module when a trip starts and stops.
[0537] Turning now to FIG. 12, a flow diagram is described showing
a routine 1200 that illustrates a broad aspect of a method for
restricting operation of a mobile device 105 in accordance with at
least one embodiment disclosed herein. As will be described in
greater detail below, various of the steps and operations that make
up routine 1200 share substantial similarities to those described
in detail herein.
[0538] At step 1201, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
determines whether a first mobile device 105 is present within a
vehicle, and/or receives one or more first inputs from at least one
of a vehicle data system 164 and/or at least one of a second mobile
device 160, the one or more first inputs pertaining to a presence
of the first mobile device 105 within a vehicle, such as through
one or more of the various determination methods described in
detail herein.
[0539] Then, at step 1207, mobile device 105 preferably prompts one
or more users to initiate and/or provide one or more stimuli that
can be received as inputs at mobile device 105 and/or receives one
or more second inputs in response to the prompting, and/or receives
one or more third inputs from vehicle data system 164, and/or
receives one or more fourth inputs from at least one of the second
mobile device 160, all in the manner described in detail
herein.
[0540] At step 1220, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, analyzes at least one of the first inputs, the second inputs,
the third inputs, and the fourth inputs to determine a presence of
at least one of more than one user, more than one mobile device
105, 160, and/or one or more users not in the set of users known to
be users of the first mobile device, substantially in the manner
described in detail herein.
[0541] At step 1242, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
employs one or more restrictions at a mobile device 105,
substantially in the manner described in detail herein.
[0542] Turning now to FIG. 13, a flow diagram is described showing
a routine 1300 that illustrates a broad aspect of a method for
restricting operation of a mobile device 105 in accordance with at
least one embodiment disclosed herein. As will be described in
greater detail below, various of the steps and operations that make
up routine 1300 share substantial similarities to those described
in detail herein.
[0543] At step 1305, processor 110 executing one or more of
software modules 130, including preferably, restriction module 171,
employs one or more restrictions at mobile device 105,
substantially in the manner described above with respect to step
705.
[0544] In certain implementations, such a restriction can be
employed whereby the device can prompt/require the user is to
authenticate that s/he is a passenger in a vehicle (such as a
moving vehicle) by performing an action or a set of actions such as
a CAPTCHA, a game, a puzzle, lock screen etc., as described in
detail herein. It can be appreciated that such authentication can
be configured to require sufficient concentration/attention such
that the authentication can be difficult to perform by a driver of
a moving vehicle, who must concentrate on driving. This
authentication can be further strengthened by requiring that (a) in
order to complete the action the user must use both hands (for
example, by requiring multitouch input, as described in detail
herein and illustrated with respect to FIG. 15A), and/or (b)
configuring the restriction to require the user to tilt his/her
head and/or eyes down or up or right or left (for example, by
requiring that the device be held flat, placed in the user's lap or
on the seat between the user's legs, in the manners described
herein) thereby preventing the user from being able to see the road
ahead while performing the authentication, and/or by requiring that
the user look directly in to the device, as described in detail
herein.
[0545] At step 1310, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
receives one or more inputs, preferably from at least one of the
mobile device 105, a vehicle data system 164, and/or one or more
other mobile devices 160, substantially in the manner described
above with respect to step 710. By way of further illustration, in
certain implementations, such inputs correspond to one or more
inputs provided by the user to the device in response to an
authentication prompt (it should be understood that the term
"authentication prompt" as used herein is intended to encompass one
or more prompts, instructions, and/or directions that inform a user
in some manner as to the manner in which inputs should be provided
to a device, and/or that otherwise provide information to the user
relating to the authentication of such a device).
[0546] At step 1320, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, analyzes at least one of the inputs. It should be understood
that in certain implementations, such analysis can be performed in
order to determine a presence of one or more users that are not
known users of the first mobile device 105, substantially in the
manner described in detail herein. In other implementations, such
analysis can be performed in order to determine whether and/or to
what degree one or more inputs (such as those received at step
1310) successfully and/or unsuccessfully authenticated a mobile
device 105, as is also described in detail herein.
[0547] At step 1342, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, modifies an employment of one or more restrictions at a mobile
device 105, substantially in the manner described in detail
herein.
[0548] Turning now to FIG. 14, a flow diagram is described showing
a routine 1400 that illustrates a broad aspect of a method for
orienting a coordinate system of a mobile device 105 in accordance
with at least one embodiment disclosed herein. As will be described
in greater detail below, various of the steps and operations that
make up routine 1400 can share substantial similarities to those
described in detail herein. It should be understood that the
various steps of routine 1400 will be appreciated with reference to
EXAMPLE 3 below and FIGS. 9-11B, and their accompanying
descriptions.
[0549] At step 1410, processor 110 executing one or more of
software modules 130, including, preferably, determination module
170 receives one or more inputs, preferably from at least one of
(i) at least one of the user interface, the operating system, the
accelerometer, the gyroscope, the GPS receiver, the microphone, the
magnetometer, the camera, the light sensor, the temperature sensor,
the altitude sensor, the pressure sensor, the proximity sensor, the
NFC device, the compass, and the communications interface of the
mobile device 105 and (ii) a vehicle data system 164, substantially
in the manner described in detail herein.
[0550] At step 1430, processor 110 executing one or more of
software modules 130, including, preferably, determination module
170 computes, based on the one or more inputs, an orientation of
the mobile device 105 relative to a coordinate system of a vehicle,
such as a vehicle within which mobile device 105 is traveling.
[0551] At step 1440 based on the orientation, processor 110
executing one or more of software modules 130, including,
preferably, determination module 170 interprets one or more
subsequent inputs of the mobile device 105 in relation to the
coordinate system of the vehicle and/or transforms the one or more
subsequent inputs originating at the first device into values that
are comparable with the coordinate system of the vehicle. See, for
example, FIGS. 11A-B and EXAMPLE 3, below.
[0552] It should be understood that mobile device 105 is preferably
communicatively coordinated with the vehicle data system, that
vehicle data system is preferably configured (e.g., installed) with
the vehicle (e.g., within the vehicle such as a car) and/or that
mobile device is positioned within the vehicle, as described in
detail herein.
[0553] By way of illustration, consider that based on the x, y and
z accelerometers, the exact orientation of the device 105 can be
determined relative to the ground (e.g., based on the gravitational
force shown on the three accelerometers 145A, as is known to those
of skill in the art based on such disciplines as trigonometry).
When the device is within a moving car with additional forces, the
inputs can be averaged over time and/or inputs from the gyroscope
145B can further assist this computation.
[0554] The orientation of the mobile device 105 can be detected
relative to the car, for example, by using the angle between the
device's magnetic north (e.g., from the 3-axis compass sensor) and
the vehicle's GPS heading (as can be shown on the mobile
device).
[0555] Accordingly, it can be appreciated that in the case of a
moving car there are also additional forces (other than gravity).
These forces can be accounted for, for example, through averaging
over time and/or by using the mobile device's gyroscope 145B, as
described herein and using methods known to those of ordinary skill
in the art.
[0556] In the case that there are movements at the mobile device
105 that are unrelated to the car (say the user moved the device),
these can be accounted for through time averaging and/or using the
gyroscope 145B and or filtering out these higher frequency events,
as described herein and using methods known to those of ordinary
skill in the art.
[0557] By way of further illustration, consider that in a mobile
device on a flat table, the Z-accelerometer shows gravity and the
X-accelerometer and Y-accelerometer show 0.
[0558] If the mobile device is rolled or pitched (so that one side
or one corner of the device remains in contact with the table), the
value read by the z-accelerometer goes down (some of the gravity
that it felt in stage one is handed over to the other
accelerometers) and the X-accelerometer (for roll) and
Y-accelerometer (for pitch) go up. The total sum of squares of the
3-accelerometers is always gravity. So we know the exact
orientation of the device with regard to the ground.
[0559] To orient/align the device 105 with the coordinates of a
car, the device's 105 north (detected, e.g., via its compass
sensor) can be compared with the vehicle's GPS (such as from
vehicle data system 164) heading (as read on the device). For
example, (if the device screen is facing up, i.e., the device is
not upside down) and its compass sensor shows that magnetic north
is due north and the GPS heading sensor shows the vehicle is
traveling due west, then the device is rotated 90 degrees to the
right with regard to the car. Accordingly, the exact orientation of
the device with respect to the coordinates of the car, as disclosed
herein and described in greater detail at EXAMPLE 3 and with regard
to FIGS. 9-11B.
[0560] By way of further illustration, in the case of a 2.5 g
lateral acceleration detected at the mobile device 105, that could
be because the mobile device 105 was in a very tight turn (right or
left) or because there was very strong forward acceleration or
deceleration--or some combination thereof. We cannot know what the
car did (if anything) to cause this 2.5 g acceleration until we
understand the orientation of the device 105 within the car and can
transform the 2.5 g lateral acceleration fell on the phone into the
acceleration in the vehicle's coordinate system, which is achieved
through implementation of routine 1400.
[0561] It should be noted that, for the purpose of the simplicity
of the description and without any loss of generality, in one or
more of the examples below, it will be assumed that the various
mobile device(s) 105, 160 is (are) aligned with the vehicle within
which they are traveling, such as shown in FIG. 11A. That is, the
coordinate system of a particular mobile device 105, 160 should be
understood to be coincident with the vehicle's coordinate system,
as depicted in FIG. 11A and described in greater detail in EXAMPLE
3. It should be further recognized that in practice, such as in
various arrangements, such as that shown in FIG. 11B, mobile device
105, 160 is rotated with respect to the coordinate system of the
vehicle in up to three dimensions. In order to correctly analyze
the various inputs originating at sensors 145 of mobile device 145
within the context of the coordinate system of the vehicle, the
rotation of the particular mobile device 105, 160 relative to the
vehicle is preferably computed and the inputs originating at
sensors 145 of the particular mobile device 105, 160 are preferably
transformed into values for the coordinate system of the vehicle.
This may be achieved in various ways, examples of which are
provided below.
[0562] It should also be noted the several of the examples provided
herein are presented from an event-centric perspective for the
purpose of clarity. That is, various of the inputs originating at
sensors 145 of mobile device 105, 160 have been described as
corresponding to various real-world events such as turns, bumps,
and/or stops. Accordingly, it should be appreciated that such
event-centric descriptions are provided herein for the purposes of
illustration and clarity, and are not intended in any way to be
understood as limiting the scope of the present disclosure.
Additionally, is should be appreciated that the various
determinations described herein can also be performed from a
sensor-centric perspective, wherein the various inputs originating
at sensors 145 are considered, irrespective of a particular
real-world event to which they correspond. It should be understood
that the various approaches described herein can be employed in
both even-centric and sensor-centric perspectives.
[0563] It should be understood that the following examples
encompass further arrangements and embodiments of the systems and
methods disclosed herein.
Example 1
[0564] There are a number of inputs that can be utilized in various
arrangements in order to identify one or more user determination
characteristics, such as the location of a mobile device 105 and/or
if a mobile device 105 is being operated by the driver or by the
passenger of a car/truck/bus, such as:
[0565] As also noted above, various arrangements preferably
incorporate identification of one or more of the user determination
characteristics referenced above and herein. In certain
arrangements, each user determination characteristic (e.g. error
proportion, correlation of typing speed to acceleration etc.) can
be considered as a point in a K-dimensional space. Classification
algorithms based on supervised learning, as are well known to those
of ordinary skill in the art, can then be applied to the resulting
K-dimensional signature(s) to determine the probability that the
in-vehicle role of the user of mobile device 105 is a driver or a
passenger.
[0566] Text Reading/Screen Viewing--User determination
characteristic(s) can be identified based on patterns in the
reading of text messages (or any other such text item such as an
email or webpage, or any other such viewing of items on a display
screen, such as during the playing of a video game) on a mobile
device 105, thereby serving to distinguish between a driver and a
passenger. For example, drivers tend to change the orientation of
and/or move (e.g. rotate in his/her palm) mobile device 105 more
frequently when attempting to read a message of a given length (in
order to periodically glance back at the road), whereas a passenger
will read such a message in a comparatively more constant state.
This is especially true during road maneuvers that require more
driver concentration, such as turns and accelerations. This
phenomenon can be observed as a high degree of correlation between
vehicle accelerations and/or gyroscopic rotations as detected by
accelerometer 145A and gyroscope 145B, respectively, of mobile
device 105 and the changes in orientation of the mobile device 160
(unrelated to movements in the vehicle) as measured by one or more
of accelerometer 145A, gyroscope 145B, GPS 145C and magnetometer
145E and, in particular, the presence or absence of a (non-vehicle
related) mobile device movements just prior to vehicle movements.
Preferably, once this correlation reaches or exceeds a certain
threshold, the in-vehicle role of the user of mobile device 105 can
be determined to be a driver and/or once this correlation reaches
or exceeds another certain threshold, the in-vehicle role of the
user of mobile device 105 can be determined to be a passenger.
[0567] Driver-Specific Movements--Various movements and/or forces
can be detected by one or more of sensors 145 of mobile device 105
that can be determined to be unique to a driver. In the
alternative, a lack of perception of such unique forces, such as
"signature" forces at a mobile device 105 can indicate that the
user of such a device is not a driver and is thus a passenger. When
in contact with a device 105 (such as when holding it), a driver
influences the movement of a mobile device 105 through
driver-related actions that include pressing and releasing the
gas/brake/clutch pedals and by moving his/her foot from one pedal
to another over the course of driving. For example, prior to a
period of strong and prolonged acceleration perceived by
accelerometer 145A of mobile device 105 (which is typically due to
acceleration, braking, and/or wheel rotation), there is a smaller,
different acceleration and/or angular movement perceived slightly
(in the 100's of milliseconds) in advance, such as at one or more
of sensors 145, that originates at the driver's body maneuver (such
as the pressing of a gas pedal) that initiates the acceleration of
the vehicle. A driver also causes a mobile device 105 to move by
rotating the steering wheel. Thus, in a case where a mobile device
105 is in contact with a driver turning a steering wheel, various
of sensors 145, such as accelerometers 145A and/or gyroscope 145B
of mobile device 105 can detect certain accelerations and
rotations. Based on a retrospective analysis of such inputs--for
instance, analyzing inputs corresponding to acceleration of a car
with inputs perceived immediately prior--it can be determined
whether the user operating such a mobile device 105 is a driver or
a passenger. If such unique/signature forces are perceived in close
proximity (generally, immediately before) acceleration, etc., it
can be determined that the user is a driver. Conversely, if such
inputs are not detected immediately prior to acceleration, it can
be determined that the user is a passenger (provided that the user
is in physical contact or communication with mobile device
105).
[0568] By way of further illustration, prior to a period of strong
and prolonged lateral acceleration and/or gyroscopic yaw perceived
by accelerometer 145A and gyroscope 145B of mobile device 105 due
to turning, there is a smaller, different acceleration and/or
angular movement perceived slightly (in the 100's of milliseconds)
in advance that originates at the driver's body maneuver that
initiates the turning of the steering wheel and that is unlikely to
be that of a passenger.
[0569] This approach can be also applied to other driver movements
(e.g., looking in the mirrors, turning on the directional signal),
wherein the driver's movements will be detected on mobile device
105 that is in contact with the driver slightly before another
signal is detected (e.g., accelerometer 145A or gyroscope 145B for
looking in mirrors, microphone 145D for turning on directional), on
mobile device 105, whereas these serial relationships will not be
present if mobile device 105 is being operated by a passenger.
[0570] In certain implementations, a device determined to be
located within a vehicle can process various inputs, such as in
order to characterize/determine the nature of a particular movement
of the vehicle. For example, various inputs can be processed in
order to differentiate between a vehicle that has recently stopped
moving and is likely to continue its present trip (e.g., stopped at
a red light or stopped in traffic) from a vehicle that has recently
stopped moving and is relatively likely to have finished its
present trip. In doing so, it can be determined when
usage/operational restrictions (such as those described herein)
employed with respect to a device determined to be operated by a
driver of a vehicle should be lifted or otherwise modified/eased
(e.g., upon determining that the vehicle is relatively likely to
have finished its present trip, as opposed to only coming to a
temporary stop), such as in the manner described herein.
[0571] FIG. 35 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 3505 one or more inputs can be received, such as in relation to
a user device. At 3510, at least one of the one or more inputs can
be processed. In certain implementations, at least one of the one
or more inputs can be processed in order to determine one or more
mobility characteristics of the device. Moreover, in certain
implementations one of the one or more inputs can be processed
based on a determination of a mobility stoppage, such as in
relation to the user device. In certain implementations, one or
more inputs that are chronologically proximate to the mobility
stoppage can be processed, such as in order to determine one or
more mobility characteristics of the device. Moreover, in certain
implementations the one or more mobility characteristics can
include at least one of (a) a permanent stop or (b) a temporary
stop. Moreover, in certain implementations, at least one of the one
or more inputs can be processed in relation to one or more data
items, such as in order to determine one or more mobility
characteristics of the device. In certain implementations, the one
or more data items can include at least one of: map data, traffic
signal data, or traffic condition data. At 3515, one or more
restrictions can be selectively adjusted, such as in relation to
the user device. In certain implementations, one or more
restrictions can be selectively adjusted based on the one or more
mobility characteristics.
[0572] FIG. 36 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 3605 an indication of a completion of a trip can be received,
such as in relation to a user device. At 3610, one or more inputs
can be processed, such as in order to determine one or more
mobility characteristics of the user device. In certain
implementations, such one or more inputs can be processed based on
the indication. At 3615, the one or more mobility characteristics
can be processed, such as in order to determine a veracity of the
indication. In certain implementations, the one or more mobility
characteristics can be processed in relation to the indication. At
3620, one or more restrictions can be selectively adjusted, such as
in relation to the user device. In certain implementations, one or
more restrictions can be selectively adjusted based on the
veracity. In certain implementations, one or more restrictions can
be maintained, irrespective of a subsequent indication of a
completion of a trip.
[0573] In one implementation, one or more inputs that correspond to
the behavior or operation of a vehicle prior to its stop, such as
those originating at the accelerometer, GPS, magnetometer, and/or
gyroscope of the device can be processed, for example, in order to
determine whether the vehicle traveled in reverse one or more times
just before it stopped (indicating parallel parking), and/or
whether the vehicle performed a turn in the period of time just
preceding its stop (indicating entry into a parking lot or a
driveway).
[0574] In another implementation, the frequency and/or length of
stops (as determined based on a processing of one or more of the
inputs referenced herein) made in the time prior to the current
stop can be used to differentiate between these two states (i.e.,
between a temporary and a permanent stop). A vehicle determined to
have made stops (of various lengths) in the recent past and/or in
close proximity to the location of the current stop and/or is on a
travel route determined to be consistent with the previous stops,
can be determined to be relatively more likely to be stuck in
traffic than a vehicle that has not.
[0575] In another implementation one or more inputs originating at
a device's location sensitive sensor/radio (e.g., the GPS of the
device) can be processed to determine (a) whether the vehicle is
near a traffic light, (b) whether the acceleration/deceleration of
the vehicle (i.e., stopping and going) correlates with the changes
in the traffic lights (e.g., their green-yellow-red pattern) on the
route that the vehicle is determined to be traveling, and/or (c)
whether the vehicle is on a road that currently has heavy traffic
that could be the cause of the stops observed, as can be aided by
data originating at one or more traffic density services (e.g.,
Waze, DeCell, etc.).
[0576] FIG. 53 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0577] At 5310, one or more inputs can be received. In certain
implementations, such inputs can be received in relation to a
geographic location (e.g., one or more coordinates, a location on a
map, an address, etc.). Moreover, in certain implementations the
referenced inputs can correspond to an incidence of deceleration
(e.g., slowing down, stopping, etc., such as of a vehicle).
[0578] In certain implementations, the referenced geographic
location can include, incorporate, and/or otherwise be associated
with information, parameters, metadata, etc., such as may reflect
or otherwise pertain to a presence of a stop sign, traffic light, a
parking lot, parking spot, a non-temporary location such as an
office or home, etc. (and/or any other such status or indication
that may reflect a likelihood that a vehicle stopping there may be
likely to maintain such a stop for a relatively short time, such as
at a stop sign or traffic light, or a relatively longer time, such
as at a parking spot or parking lot) at the geographic location. As
described herein, the presence of such items at/in relation to the
location can be used/accounted for in determining whether the
incidence of deceleration (e.g., the stopping of a vehicle) is
likely to be maintained for a relatively shorter time duration
(e.g., in the case of a vehicle stopping at a stop sign) or a
relatively longer time duration (e.g., in the case of a vehicle
stopping in a parking lot or parking spot).
[0579] Moreover, in certain implementations the referenced
geographic location can include information pertaining to one or
more previous incidences of deceleration at the geographic
location. That is, as described herein, a history or log of
previous deceleration/stopping instances can be utilized/accounted
for in determining whether a deceleration instance (e.g., the
stopping of a vehicle) in a particular location is likely to be for
a relatively shorter time duration (e.g., temporary) or for a
relatively longer time duration. Thus, a location with respect to
which it can be observed or determined that several or many of the
previous deceleration instances were for a relatively shorter time
duration can be identified/classified as a short term stop
location, while a location with respect to which it can be observed
or determined that several or many of the previous deceleration
instances were for a relatively longer time duration can be
identified/classified as a longer term stop location. Additionally,
in certain implementations, such previous incidences of
deceleration (e.g., at the geographic location) can include one or
more previous incidences of deceleration at the geographic location
that are associated with a user that is associated with a device
(e.g., the device with respect to which a restriction is to be
modified, such as at 5330). That is, a user or driver's personal
history or log can be accounted for in determining whether a
location is a short or long term stopping location. For example,
with respect to a location that may otherwise be determined to be a
short term stopping location (e.g., near a stop sign), in a
scenario in which multiple long term stopping instances can be
observed/identified at such a location with respect to a particular
user (e.g., on account of the fact that the user's driveway is
nearby), such a location can be determined to be a long term
stopping location with respect to that user.
[0580] In certain implementations, the referenced inputs can be
received in relation to an approach towards the geographic location
(e.g., as described herein, when the referenced deceleration occurs
in relation to an approach towards the location, as opposed to a
departure from the location). In such a scenario, the referenced
geographic location can be determined to be a relatively shorter
term stopping location. In such a scenario (as well as in other
scenarios, such as are described herein), based on a determination
that the incidence of deceleration is relatively likely to be
maintained for a relatively shorter time duration (corresponding to
a temporary stop, such as at a stop sign), an implementation of a
restriction can be maintained at the device, such as is described
herein.
[0581] In certain implementations, the referenced inputs can be
received subsequent to a departure from the geographic location
(e.g., an incidence of deceleration/stopping after a vehicle passes
a stop sign or traffic light). As described herein, in such a
scenario, the referenced geographic location can be determined to
be a relatively longer term stopping location. Moreover, in such a
scenario, an implementation of a restriction at the referenced
device can be modified upon such a determination (e.g., a
determination that the incidence of deceleration occurred
subsequent to the departure from the geographic location).
[0582] In certain implementations, information pertaining to one or
more previous incidences of deceleration at a geographic location
that are associated with a user that is associated with a device
(e.g., a short/longer term stop history associated with a user) can
be received or otherwise identified or accounted for based on a
relative prevalence of other locations within a defined proximity
to the geographic location that are determined to be relatively
shorter term stopping locations. For example, as described herein,
upon determining that there are several other short term stopping
locations within a certain distance of a particular location, a
stopping history associated with a user can be utilized/accounted
for to determine if the particular location is (or is not) likely
to be a short term stopping location (e.g., with respect to the
user).
[0583] At 5320, the one or more inputs (such as those received at
5310) can be processed. In certain implementations, such inputs can
be processed in relation to a geographic location (such as a
geographic location in relation to which they were received). In
doing so, a relative likelihood that the incidence of deceleration
is to be maintained for a relatively shorter time duration and/or a
relatively longer time duration can be determined.
[0584] Moreover, in certain implementations the referenced inputs
(such as those received at 5310) can be processed in relation to
one or more signals that are perceptible to a device (e.g.,
wireless signals such as WiFi, Bluetooth, etc.). In doing so,
determine a relative likelihood that the incidence of deceleration
is to be maintained for a relatively shorter time duration and/or a
relatively longer time duration can be determined, such as is
described herein.
[0585] In certain implementations, the referenced inputs can be
processed in relation to a geographic location (such as the
location with respect to which the inputs were received) and/or a
relative prevalence of other locations within a defined proximity
to the geographic location that are determined to be relatively
shorter term stopping locations. In doing so, a relative likelihood
that the incidence of deceleration is relatively likely to be
maintained for a relatively shorter (or longer) time duration can
be determined.
[0586] In certain implementations, the referenced inputs can be
processed in relation to a geographic location and/or one or more
chronological characteristics (e.g., a time of day, a day of week,
or a day of month, reflecting, for example, that a particular
location may be a temporary stopping location at a certain
time/date e.g., during rush hour on weekdays but not at other
times/dates). In doing so, a relative likelihood that the incidence
of deceleration is relatively likely to be maintained for a
relatively shorter (or longer) time duration can be determined,
such as is described herein.
[0587] In certain implementations, the referenced inputs can be
processed in relation to one or more factors, characteristics,
aspects, etc., including but not limited to: the geographic
location, weather conditions, traffic conditions, date/time
conditions, etc. (as described herein, a particular location may be
a temporary stopping location when such factors are present, but a
longer term stopping location when they are absent). In doing so, a
relative likelihood that the incidence of deceleration is
relatively likely to be maintained for a relatively shorter (or
longer) time duration can be determined.
[0588] At 5330, an implementation or application of one or more
restriction(s) can be modified. In certain implementations, such
restriction(s) may be employed at, on, and/or in relation to a
device (e.g., a smartphone or any other such device). Moreover, in
certain implementations an implementation or application of such
restriction(s) can be modified based on a determination (such as at
5320) that the incidence of deceleration is relatively likely to be
maintained for a relatively longer time duration.
[0589] In certain implementations, a threshold can be adjusted.
Such a threshold may define a chronological interval upon
expiration of which the implementation of the restriction can be
modified (e.g., eased or removed/disabled), such as is described
herein.
[0590] In certain implementations, a notification can be provided
(e.g., at/in relation to the referenced device). Such a
notification can, for example, reflect a time duration (e.g., a
countdown timer) upon expiration of which an implementation of the
referenced restriction is to be modified. In certain
implementations, such a time duration can be defined based on a
relative likelihood that the incidence of deceleration is to be
maintained for a relatively shorter time duration (in which case a
relatively shorter time duration can be utilized and/or a
relatively longer time duration (in which case a relatively longer
time duration can be utilized).
[0591] In certain implementations, a selectable control can be
provided, e.g., at an interface of the device. When selected, such
a control can initiate a modification of the implementation of the
restriction, such as is described herein. In certain
implementations, as described herein, such a control can be
provided based on a determination that the referenced incidence of
deceleration is relatively likely to be maintained for a relatively
longer time duration as well a determination that the device is not
moving faster than a defined speed threshold, and/or a
determination that the perceptibility of one or more access points
(e.g., WiFi access points, etc.) does not change over a defined
chronological interval, such as is described herein.
[0592] By way of further illustration, it can be advantageous to
differentiate between incidences of relatively short or shorter
term/temporary deceleration/stopping (e.g., stops that are likely
to last for a relatively short period of time) from those that are
more likely to continue be for a relatively longer length of time
(as noted, the location where a trip has stopped as well as whether
it has stopped can be determined using one or more mobile device
sensors, including, but not limited to, GPS, cellular radio. WiFi
radio.
[0593] Bluetooth, accelerometers, gyroscopes, etc, as are known to
those of ordinary skill in the art and a trip that is likely to end
soon can be determined using one or more of such sensors, as well
as historical information about the locational behavior of the
device in question and/or other devices). In doing so, for example,
one or more applications (such as those operating on and/or in
relation to a device) can determine whether or not to continue
implementing one or more restrictions (e.g., in relation to a
device determined to be operated by a driver), such as during a
temporary/short stop, or whether to remove one or more restrictions
and/or to return full device access/operation (e.g., in relation to
a device determined to be operated by a driver), such as during a
relatively longer stop.
[0594] In one implementation, a determination as to which stops are
more likely to be temporary/short and which are more likely to be
longer can be achieved by associating various determinations of
acceleration, deceleration, and/or stopping/starting a trip (and
during the intervals between them) (e.g., using clustering,
grouping, characterizing, classifying (e.g. kNN) etc., techniques,
as are known to those of ordinary skill in the art) with the
respective characteristics of the location (e.g., geographic
location, one or more devices, e.g., RF/wireless devices, and/or
signals that are present/perceptible in a location) in which they
occur (e.g., as determined using one or more of GPS. WiFi,
cellular. BT on a mobile device and/or the vehicle in which the
device is traveling). It should be understood that such
determinations can be made by using data acquired from a single
device and/or multiple devices (e.g., via `crowdsourcing`). In
doing so, the locations of landmarks such as traffic lights, stop
signs (e.g., if a sufficiently high time frequency sampling is used
to identify stops of such length) and additional locations that may
be less apparent/obvious (e.g., those that pertain to traffic
patterns that cause temporary stops at locations other than traffic
lights and stop signs), all of which can cause various types of
`stops` during a trip, can be identified.
[0595] In one implementation in a scenario in which the referenced
input(s) (e.g., from one or more sensors on a device) can be
determined to indicate that there is an increased probability that
that the device has stopped moving (or, in some implementations
even without such an indication(s)), various characteristics of
previous stops (e.g., quantity, frequency, mean length, median
length, variability and other moments of such lengths, cumulative
length, days with stops, etc.) associated with the device (and/or
other devices), in a scenario in which it determined that it was
within, for example, a 100 m radius of the current location, can be
utilized or otherwise accounted for in determining whether the
location is a temporary stopping location (`TSL`), a long-term
stopping location (`LSL`) or neither (or, both). Alternatively
and/or in addition, in lieu of associating the geo-locations of the
device with TSLs and/or LSLs, the identity of various transmitters
(e.g. cell towers. WiFi access points, Bluetooth devices, etc.) can
be associated with TSLs and LSLs (e.g., if the last 25 times a
device perceived a WiFi AP having a MAC address of
12:34:56:78:9A:BC, the device was also determined to have stopped
for 1 hour, upon subsequently perceiving this address, it can be
determined that it is at an LSL).
[0596] In another implementation in addition to (or instead of) the
various techniques described herein, determining whether a
particular stop is likely to be temporary/short or longer can be
achieved by associating various incidences/determinations of
stopping/starting during a trip (and the intervals between them)
(e.g., using clustering, grouping, characterizing, etc.,
techniques, as are known to those of ordinary skill in the art)
with the respective signals (e.g., wireless signals, such as WiFi,
Bluetooth, etc.) that are perceptible to the device when they
occur. It should be understood that such determinations can be made
with respect to a single device and/or multiple devices
(`crowdsourcing`). When one or more wireless signals that has been
associated with stopping/starting is observed, a determination may
be made as to the likely length of the stop (e.g., short or long).
For example, if 14 of the last 15 times that (i) an input from one
or more sensors (such as those incorporated within the device)
indicated that the time for which the likelihood that the device
was stopped was sufficiently high (e.g., greater than a certain
threshold value); and (ii) the device was in the presence of or
could otherwise perceive a WiFi signal with BSSID 11:22:33:44:55:66
with a signal strength greater than -80 dbm, and the device now
perceives/is in the proximity of this BSSID address again (and its
signal strength is sufficiently high), the device can be determined
to be stopped.
[0597] In another implementation, a determination can be made
without even considering inputs from the referenced sensors so that
for example, if the 14 of the last 15 times that the device was in
the presence of BSSID 11:22:33:44:55:66 with a signal strength
greater than -80 dbm it was stopped and the device is now in the
proximity of this BSSID again (and its signal strength is
sufficiently high), it can be determined to be stopped.
[0598] Upon determining that a device is at a temporary stopping
location ("TSL"), it can be further determined/assumed that the
device is still within a trip (even though it is not currently
moving), such as for a longer period of time than if the device
were not at a TSL. Accordingly, upon determining that the device is
present in/at a TSL, a relatively higher stopping threshold can be
implemented before such a stop can be determined to be a long
(i.e., non-temporary) stop. It can be appreciated that such a
configuration can enable an application to account for stops
determined to be at TSLs differently than stops determined to have
occurred at other locations, thereby reducing the incidence of
incorrect, premature trip end determinations in scenarios where the
device is stopped at a TSL and/or reducing the latency at which
trip end determinations are made at locations that are not TSL. For
example, a restriction implemented in relation to a device while
the device is being operated by a driver and/or is present in a
trip, can be removed/modified relatively more quickly at the
non-temporary end of a trip (thereby improving the accuracy and
overall user experience of applications that account for such
stops), while also preventing unauthorized/unsafe operation of the
device in scenarios where a device has only stopped
temporarily.
[0599] Alternatively, or in addition, stopping locations in which
devices tend to stop for longer periods of time can be determined
by virtue of the fact that moving devices that reach this location
tend to stay there for more than a certain amount of time, e.g., a
parking lot, a driveway. When a device is at such a long stopping
location (`LSL`), it can be determined to have finished a trip
relatively faster (e.g., requiring a relatively shorter time
threshold to have passed during which traveling is not
perceived/determined) than would otherwise be assumed, such as in
another location (e.g., a location not determined to be an LSL). In
doing so, stops occurring in locations determined to be LSLs can be
accounted for differently than stops occurring at other locations
and, thereby enabling determinations of trip ends with lower
latency and reducing the likelihood of a false trip end
determination, such as when the device is stopped at a TSL. For
example, restrictions implemented at a device while driving/in a
trip can be removed/modified relatively more quickly upon
determining that the device has stopped at an LSL (in contrast to
other locations with respect to which a relatively higher
threshold, such as a time threshold, may be required before
removing/modifying comparable restrictions).
[0600] In certain implementations, TSL/LSL information that is
specific to a particular device can be accounted for in conjunction
with TSL/LSL information generated/associated with a larger
population of devices. For example, if a particular intersection is
identified as a TSL and a user happens to park in a parking lot
that is located very close to such intersection, the user would be
deemed to be at a TSL even though his (personal) stop was longer
than temporary. This might cause, for example, a less positive user
experience because, based on the device being stopped at a TSL, the
device may be configured to take relatively longer to lift
selective restrictions from the device (in light of being present
in a TSL, as described herein). But, if the
parking-lot-near-intersection location was one in which the device
frequented regularly (e.g., it was the parking lot for his company
that he visited most weekdays), such a location can be identified
as an LSL for that user, while still being identified as a TSL for
the general population, and the restrictions can be lifted/modified
relatively more quickly, thereby improving the experience for that
user.
[0601] In certain implementations, various configurations of the
technologies described herein can be implemented based upon the
TSL-density, the population density and/or some other density
metric, of the location the device is in. For example, in a dense
urban location, e.g., New York City, where there is a very dense
packing of TSLs (e.g., many traffic lights), a system using
TSLs/LSLs can be configured to place relatively less weight on
information derived from a population of devices and place more
weight on the information of a particular device than it otherwise
would (e.g., in other locations).
[0602] The techniques described herein can be configured to account
for the fact that TSLs (e.g., traffic lights, stop signs) and LSLs
(e.g., parking lots), often have more than one direction of
approach. For example, knowing the direction in which a vehicle
traveled past or approached a TSL can provide additional
information which can, among other things, be used to improve the
accuracy and latency of the trip-end determination, e.g., if a
device in a trip crosses a TSL, e.g., from south to north and then,
after 100 m, stops, it is more likely to be at an actual trip end
than a vehicle that approaches the TSL from the north, and stops
100 m north of the TSL but has not yet crossed it.
[0603] The described techniques can be further configured to
define/associate locations as TSLs (or non-TSLs) only under or
during specific conditions. For example a certain location may only
exhibit behavior as a TSL during certain times of days/days of week
(e.g., during weekday rush hour), during certain climatic
conditions (e.g., rain, snow) or during certain traffic conditions
(e.g., real-time traffic conditions as provided by various mobile
applications and/or road infrastructure).
[0604] For example, an application that does not account for
TSLs/LSLs, may be configured to lift/modify a selective restriction
(e.g., on driver devices) after the device has been determined not
to have been in a trip for 2 minutes. The result is that a driver
who has permanently ended his/her trip will continue to be
restricted from utilizing his/her device (e.g., in one or more ways
that pertain to such restrictions) until 2 minutes have elapsed (a
potentially frustrating result for many users) while a driver
stopped at a red traffic light for three minutes (i.e., for a
duration exceeding the referenced threshold) would be able to
access his/her devices during the latter part of the red traffic
light (and perhaps for some period of time point after the light
changes and driving resumes), despite still being present in an
active trip. However, in an application configured to
determine/account for TSL/LSLs, if the device is determined to have
stopped at an LSL, the selective restrictions implemented with
respect to the device can be lifted/modified faster, for example,
after one minute (resulting in a better experience for the user),
whereas if the device is determined to have stopped at a TSL, the
selective restrictions implemented with respect to the device can
be lifted/modified more slowly, for example, after 3 minutes
(resulting in a safer experience, both for the user and society).
In a scenario where the device is determined to have stopped at a
location that is determined/identified to be neither a TSL nor an
LSL (or cannot be determined to be a TSL or an LSL), a potentially
different waiting period, for example, 2 minutes can be
implemented.
[0605] Moreover, data originating from various sources (e.g., a
database of traffic lights locations or parking lots) can also be
utilized in determining/defining TLSs and LSLs, such as in
conjunction with the techniques described herein. It should be
noted that the level of detail of the information that is available
through such databases may not include things like the length of a
light for travelers in each direction at different date/times. The
speed at which new information is available may be higher with
"field-determined" TSLs/LSLs using mobile devices than will
numerous, possibly-governmental databases.
[0606] Moreover, the various techniques described herein can be
further configured to account for the fact that the locations of
TSLs and LSLs may change over time, e.g., new traffic lights are
installed, parking lots are built and destroyed etc, and the
corresponding locations/associations that pertain to such TSL/LSL
locations can be adjusted dynamically over time, such as in a
manner known to those of ordinary skill in the art.
[0607] The various trip-end detection techniques described herein
can be implemented with respect to parking assistance applications,
whereby a determination as to whether a stop has occurred at a TSL
(or an LSL) can enable a further determination as to whether a user
has parked (and, for example, record and/or dissemination such a
parked location [e.g., reflecting that one less space is available
in a parking lot] and/or initiate payment arrangement for such
parking) or whether such a user has just stopped temporarily in
which case one or more of such determinations/functions may not be
appropriate.
[0608] At 5340, content (e.g., sponsored content such as
advertisements), such as content pertaining to a geographic
location (e.g., the geographic location with respect to which the
inputs received at 5310 are associated) can be identified. In
certain implementations, such content can be identified based on a
determination (such as at 5320) that the incidence of deceleration
is relatively likely to be maintained for a relatively longer time
duration.
[0609] At 5350, content (such as the content identified at 5340)
can be provided. In certain implementations, such content can be
provided at, on, and/or in relation to a device (such as the device
with respect to which the inputs were received at 5310). Moreover,
in certain implementations such content can be provided based on a
determination (such as at 5320) that the incidence of deceleration
is relatively likely to be maintained for a relatively longer time
duration, such as is described herein.
[0610] By way of illustration, determining whether a stop has
occurred at a TSL (or an LSL) can enable the providing of more
appropriate/targeted advertisements (e.g., to the user). For
example, a user determined to have stopped permanently may be
relatively more interested in dining opportunities in the area in
which they stopped, whereas the same would be far less appropriate
(and perhaps even distracting and dangerous) for a user who has
only stopped temporarily.
[0611] In addition, long term trip ends can also be
determined/assumed to have occurred if the user initiates one or
more actions with respect to parking (e.g., user pays for parking
with app) or can be determined to be likely to soon occur (e.g.,
user looks for parking with app, user nears the location in which
she has reserved a spot), such as if the user engages a parking
application on the mobile device (e.g., launch, bring to
foreground, reserves a space) and/or depending upon what actions
that user takes in such application.
[0612] It should be noted that, in certain implementations. TSLs
and/or LSLs can have different degrees/magnitudes. For example, at
some TSLs (e.g., a long red light), the time that a device spends
at or near that location is relatively longer (e.g., 5 minutes),
whereas at other TSLs (e.g., a short red light) the time the device
spends at/ear that location is relatively shorter (e.g., 30
seconds).
[0613] Moreover, in certain implementations, in addition to (and/or
instead of) determining or `learning` the referenced TSLs and LSLs
(e.g., using machine learning techniques as are known to those of
ordinary skill in the art), the user (or another person
knowledgeable about the user's travel patterns, e.g., an employer)
can provide various input(s) as to one or more such locations at
which she often makes LSLs (e.g., home driveway, work parking lot,
etc.) or TSLs and device restrictions can be modified based upon
the presence of the device in or near such one or more locations
(e.g., as determined by GPS, WiFi access points or other signals)
and, in certain implementations, further in conjunction with other
inputs (e.g., speed, motion, etc.). For example, one or more
restrictions employed on a device that was previously determined to
be in a trip can be relaxed upon determining that the device is in
(or near) the work parking lot (where the work parking lot is
contained in the list of user input LSLs) and the device is moving
at less than 10 km/h for 15 seconds.
[0614] In certain implementations, a device can be determined to be
at an LSL when (or just before, or just after) it enters a region
that is known to be an LSL for that user and/or for a group of
users. By monitoring the location of the device relative to LSLs
and dynamically throttling/adjusting such monitoring (e.g.,
frequency, intensively, sensor(s)/radio(s) used) based upon the
distance that the device is from an LSL (and/or the likelihood that
the device will enter an LSL soon), the amount of power used to
enable the device to determine that it is entering (or is about to
enter or has just entered) an LSL just-in-time" can be greatly
reduced. For example, if a device is 10 kilometers from its nearest
known LSL, and the estimated time to reach the nearest LSL is 15
minutes, there is no need to check if the device is near the LSL
for, perhaps, 14 minutes. The check at 14 minutes can be done with
a low power sensor (e.g., cellular radio, WiFi scan) to see how the
device has progressed relative to the LSL. In certain
implementations, if the device is nearing the LSL, a more accurate,
higher power consuming sensor (e.g., GPS) can be turned on so that,
when the device stops and is in an LSL one or more device
restrictions can be modified immediately.
[0615] In certain implementations, an interface
indicator/notification can be made visible or otherwise enabled
when a one or more condition(s) have been met (e.g., the
device/vehicle is determined to be moving at a low speed, short
distance, with few/small WiFi changes, cell tower changes, etc.).
Such an indicator/notification can, for example, notify or inform
the user of the amount of time remaining until one or more
restrictions (such as those that were employed based on a
determination that the user was driving/the vehicle was moving)
will be relaxed, removed, etc. In certain implementations, such an
indicator/notification may not be visible or may be disabled when
one or more condition(s) are met (e.g., high speed, long distance,
many/large WiFi changes, cell tower changes, etc.).
[0616] It should also be noted that the methods contained above may
consist of the device also using information from vehicle data
system 164 (e.g., OBDII), e.g., the speed of the vehicle and/or the
gear in which the vehicle is engaged.
[0617] It can be appreciated that, in certain scenarios, one or
more `trade-off(s)` or compromise(s) may need to be made with
respect to how to process determinations pertaining to temporary
stops/slow-downs in movement in order to determine when a device is
in a moving vehicle and thereby selectively restricting
functionality of the device on that basis (i.e., should the trip be
determined to be over, in which case the selective restriction
should be removed, or is the vehicle stopped, such as at a red
light, in which case perhaps the selective restrictions should not
be lifted). It can be further appreciated that implementing a
`timeout` period (e.g., determining that a trip is over after a
determination that a device has not moved for X minutes) can entail
certain shortcomings. For example, drivers who have ended their
trip and want to use their devices prior to the end of X minutes
will be frustrated with such a restriction and drivers who are
still within their trip, and who are stopped/moving slowly for more
than X minutes (e.g., heavy traffic, long light) may nevertheless
be able to use their devices which is dangerous/illegal.
[0618] Accordingly, in certain implementations an "honor system"
can be employed, whereby drivers can self-declare their trips to
have ended by providing/inputting such a declaration/indication to
the device (e.g., via touch, voice, visual (e.g., gesture), shake
etc. input), based upon which one or more restrictions can be
modified, eased, or otherwise removed from the device without
having to wait until a determination is made that the device is
static/slow for a certain period of time.
[0619] If, however, a determination that the device is present
within a trip is made within a certain period of time after the
referenced self-declaration of a trip end is received, the user of
such as device and/or the device itself can be given/ascribed a
"strike." Upon accumulating more than a certain number of strikes,
the referenced self-declaration mechanism/technique can be disabled
or otherwise cease to work (or will be made to work less
effectively), such as with respect to the particular user and/or
the particular device. Moreover, in certain implementations the
referenced "strikes" may subsequently be canceled or otherwise
"evaporate" based on different events (e.g., the passage of a
certain amount of time, such as each strike expiring one week after
it is created, the traveling of a certain distance--each strike
expires 10 driving hours after it was created), etc.
[0620] In another implementation, a driver who has completed a trip
can self-declare a trip to be over (such as in the manner described
above), and such a self-declaration can cause an immediate (or
shortly thereafter) determination to be triggered by acquiring
sensor information and/or other information to determine, as soon
as possible, whether or not the trip has ended (i.e., sooner than
would otherwise be determined using various other techniques). Such
a feature can be advantageous, for example, in settings where, in
an attempt to save power, the various data acquired to determine
whether or not a trip has ended are acquired with latency (e.g.,
with delay, in duty cycles) and/or at less than the fastest
sampling rates possible. Accordingly, by acquiring one or more of
the referenced data items relatively more quickly (such as upon
receiving an indication, such as from a user, that the trip has
concluded) one or more of the determinations that can be made in
order to lift/remove the referenced selective restriction(s) can be
initiated relatively faster/sooner. Stated differently, such
technique(s) can enable ongoing power-saving techniques to be
applied more readily while reducing the degradation to the user
experience.
[0621] In another implementation, a similar technique can be used
to allow a user to cause the device to immediately (or relatively
more quickly that it would ordinarily have) re-check or re-query
whether or not it is in a trip. Such a technique can be
advantageous, for example, in situations in which the device was
determined to be present within a trip when, in actuality, it was
not (false positive) and/or in situations in which the device was
determined not to be present within a trip when, in actuality, it
was (false negatives).
[0622] Moreover, upon determining that a device is present within a
trip, it can be advantageous to apply different (or asymmetric)
methods to determine whether or not the trip has ended, such as
based upon whether the device is being operated by a driver or a
passenger. For example, the trip detection techniques (such as
those described herein) employed with respect to devices determined
to be operated by passengers can be eased relative to devices
determined to be operated by drivers. For example, power can be
saved by lowering the rate at which one or more sensors (e.g. GPS,
accelerometer, cellular, Wifi, BT radios, etc.) on a device
determined to be operated by a passenger are sampled in order to
determine whether a trip has ended. It can be appreciated that
adding a latency aspect to the detection of a trip end is not
generally painful to passengers who have so authenticated because
their devices do not have selective restrictions employed (or are
relatively less restricted than devices determined to be operated
by drivers).
[0623] In certain implementations, inputs originating from one or
more low power sensors (e.g., accelerometer, gyroscope, etc.) of a
device can be processed to determine an activity state of a device
(e.g., stationary, walking, in-vehicle, etc.), such as based on one
or more trends, patterns, etc., that can be identified within the
various input(s). To the extent that an activity can be recognized
with sufficiently high probability, one or more restrictions
associated with such activity can be applied to and/or in relation
to the device. To the extent that no activity can be recognized
with sufficiently high probability, and, in particular, if it
cannot be determined with sufficiently high probability whether or
not the device is present within a vehicle, one or more additional
sensors and/or radios and/or the same low power sensors sampling at
higher rates (e.g., WiFi radio. GPS radio, accelerometer at higher
sampling rate) can be activated, and inputs originating from and/or
determined with respect/in relation to such sensors, etc., can be
processed to determine whether the device is present within a
vehicle and, based upon such determination, one or more
restrictions associated with such activity can be applied.
[0624] It can be appreciated that, in many cases, inputs
originating from the referenced low power sensors are likely to be
sufficient to make such determination. However, in certain
scenarios such a determination cannot be made with sufficiently
high probability. For example, in a scenario in which a user is
sitting and holding the device in his hand, e.g., engaged in a
FaceTime conversation, it can be appreciated that the device is
unlikely to be determined to be stationary, as it is moving during
the conversation, and is also unlikely to be determined to be
engaged in walking, and even if it were in a vehicle, any
signals/inputs originating from the accelerometer indicating that
the device was in a vehicle are unlikely to be detectable over the
noise introduced by the user's movement of the device (low SNR). In
such a case, for example, inputs originating from the use of
additional sensors (e.g., WiFi radio. GPS radio, etc.) can provide
information to determine with higher probability whether the device
is present within a vehicle.
[0625] It should be noted that inputs originating from one or more
motion sensors (e.g., accelerometer, gyroscope, etc.) can be
processed to effectively identify trip starts (or trip stops)
because the length of time for which the device sustains
acceleration (or deceleration) during a vehicular trip start (or
trip stop) (which may be for 20 seconds or more, in some vehicle
classes), generally exceeds the length of time for which sustained
acceleration can occur in any human-powered activity.
[0626] In another approach, the mobile device of a driver will, on
average, display larger movements than that of a passenger
measurable by sensors 145 of mobile device 105 due to the fact that
the driver is likely to be holding the mobile device 105 in only
one hand, whereas a passenger is more likely to be using both hands
to hold a mobile device 105, or is capable of increased focus even
when using only one hand to operate mobile device 105. This can
preferably be done by taking the Fourier transform of a 3D
acceleration function and integrating it (squared, i.e. L2-norms)
over N disjoint frequency intervals, as is well known to those of
ordinary skill in the art. The resulting 3N numbers are preferably
a "signature". The signature corresponding to a driver can be
distinguished from that of a passenger using a classification
algorithm, such as SVM, which has preferably been trained on
sufficiently large pre-classified signature bank, as is also known
to those of ordinary skill in the art.
[0627] GPS--GPS 145C of mobile device 105 can be used, preferably,
in certain arrangements, in conjunction with other sensors, to
identify the in-vehicle position of mobile device 105. In certain
arrangements this is achieved in part based on knowledge of the
lane boundaries of the road on which the vehicle is driving (based
on map data or computation/observation), together with a
determination of mobile device's 105 location, using GPS 145C, to
be on the right or left side of such lane. If mobile device 105 is
in the left part of its current lane, then it can be determined to
be on the left side of the vehicle within which it is traveling,
while if it is in the right part of its current lane, then it is on
the right side of the vehicle. Such in-lane location calculations
can further be averaged over time to increase the accuracy of the
location of the mobile device 105 within its then current lane and,
as a result the accuracy of the determination of the location of
mobile device 105 inside the vehicle.
[0628] It should be understood that the term "turn" as used herein
can refer to a turn or any angle and/or curvature and/or any change
in lateral acceleration and/or gyroscopic yaw, no matter how large
or small and the comparisons described above can be applied
discretely or continuously. It should also be appreciated that such
inputs can be perceived at practically any time and/or interval,
even those that do not necessarily correspond to "turns" as
conventionally understood, and such inputs should be understood to
be within the meaning of the term "turns" as used herein.
[0629] It should be understood that the term "bump" as used herein
can refer to a change of any size in the upward acceleration,
irrespective of positive or negative change and irrespective of how
large or small and the comparisons and filtering described above
can be applied discretely or continuously at regular or irregular
sampling rates.
[0630] Magnetic Field--A vehicle's metallic and electrical parts
influence the magnetic field in the vicinity of and inside such
vehicle. A 3-axis magnetometer 145E of mobile device 105 can be
used to detect these influences by measuring such magnetic field(s)
at various times before and during a vehicle's operation (e.g., a
car that has not yet been started will have a different magnetic
signature than one in which the electric systems are operating) and
by comparing them with known magnetic signatures of different
in-vehicle locations in order to determine the in-vehicle location
of mobile device 105. Such signatures can be universal and/or can
depend on additional parameters such as vehicle model, vehicle
location, etc.
[0631] For example, the major metallic component in most vehicles
is the motor and in most vehicles (e.g., cars, buses), and it is
normally situated in the front part of the vehicle, near the
center. The magnetic field sensed by magnetometer 145E of mobile
device 105 can be compared with the magnetic field that is
otherwise present absent the magnetic disturbances thereby
indicating the direction of the motor. The lateral component of
that direction is preferably the opposite of the left-right in-car
location of mobile device 105.
[0632] User Baseline vs. Population Baseline--As described in
detail above, such as with respect to step 224, in the
identification of many of the user determination characteristics
described above, the values and signatures measured on and/or
computed with and/or in relation to mobile device 105 are compared
to baseline values (which are preferably stored in one or more
databases 174, 162) in order to determine if mobile device 105 is
that of a driver or a passenger. In certain arrangements, such
baseline values can be independent of the user (e.g., the standard
deviation of the time between keystrokes for all people in the
country using a particular model phone), while in other
arrangements such values can be user dependent (e.g., this mobile
device 105 (or this user of this mobile device 105, if such is
available) usually texts at 100 characters per minute, currently he
is texting at the rate of 10 characters per minute thus the person
holding it is likely driving).
[0633] In some implementations e.g., in circumstances where a
device's location cannot be accurately determined using
regular/default techniques/means (e.g., no GPS, no wireless
signals) or using augmentation (e.g., dead reckoning), a device's
location may be estimated by crowdsourcing the navigation routes
being traversed (or that were previously traversed) by the device
and other devices located in the same location/within a certain
proximity of the device, where the overlaps (or the cessation in
overlap) in such routes can provide an indication as to the
device's (and the devices') current location. The various
navigation routes can be communicated between the devices using
methods and/or protocols such as Bluetooth, WiFi, other RF
wireless, audio, etc. For example, if Device 1 is routed to travel
route ABCDE and Device 2 (which is currently is the same
approximate location as Device 1 and is directly or indirectly
communicative with it), is traveling route QBCRY--then it can be
determined that the devices are likely to be on the segment BC and
on the mode of transport (e.g., train, bus, car) and entity of
transport (e.g., Train 100, Bus 34A, car), associated with BC.
[0634] In certain implementations, additional information as to
location of a device can be obtained/determined, e.g., when a
second device that was located in the same location/within a
certain proximity of the first device is no longer located in the
same location/within a certain proximity of the device. For
example, if, after being able to communicate with Device 2 for some
time that was determined to be during the travel of segment BC.
Device 1 is determined to no longer be communicative with Device 2.
Device 1 can determine that it has likely passed point C. The
strength of this determination can be increased/weighted (and may
be estimated) based upon the communications behavior of additional
devices currently and/or previously located in the same
location/within a certain proximity (e.g., a new device located in
the same location/within a certain proximity of a certain device is
traveling MCDT, a device previously located in the same
location/within a certain proximity of the certain device is
traveling NBCS stops being communicative).
[0635] The described techniques can be effective, for example, in a
subway where GPS and other wireless signals are not
typically/consistently available. The described techniques can be
further enhanced using techniques that use motion sensors and/or
environmental sensors on (or in communication with) the device(s).
For example, during rush hour (i.e., many users with devices
traveling) and the motion sensors on a device sense a stop and the
population of devices and/or the routes they are traveling changes
substantially shortly after the motion stop is determined, it can
be further determined to be likely that the stop was at a station
where people go on and/or off the train, whereas if the population
of devices and/or the routes they are traveling doesn't change
substantially after the motion stop, it was likely a stop between
stations in which users do not typically enter and exit.
Example 2
[0636] As noted above, such as at steps 222 and 223, considering
multiple inputs can increase the accuracy of one or more of the
determinations described herein, such as the determination of an
in-vehicle role of a user of a mobile device 105, 160. This
advantage is further illustrated above at steps 225 and 226,
wherein inputs from multiple devices are considered in order to
compute such determinations. Further illustrations of such
inputs/determinations include, but are not limited to:
[0637] In-Vehicle Location--In the United States and in most other
countries in the world, drivers are the left-front most occupant in
a vehicle, relative to the front end of the vehicle. By identifying
whether a particular mobile device 105, 160 is or is not the
left-front most device within a vehicle, a determination can be
made that such device 105, 160 is or is not being operated by the
driver.
[0638] It should be understood that the referenced in-vehicle
identification/determination is preferably achieved in conjunction
with communication between mobile device 105 and one or more of
mobile devices 160, whether through direct communication or through
network 166. It should also be appreciated that in certain
arrangements such identification(s)/determination(s) can be
performed in a server-side configuration, while in other
arrangements such identification(s)/determination(s) can be
performed in a client-side configuration. In one such server-side
configuration, one or more software modules 130 are preferably
executing at the various mobile devices 105, 160. One or more of
the modules configure the each of the respective devices 105, 160
to transmit its absolute location coordinates (such as those
provided by GPS 145C and/or an inertial navigation system (INS)
and/or its relative location (e.g., 3 meters from WiFi device
#1234) to central machine 168. Central machine 168 can then process
the various locations coordinates and/or relative locations
received from the various devices 105, 160 in order to determine
which of the various devices 105, 160 are sufficiently close to one
another, over a period of time (e.g., 1 minute, 1 hour, etc.),
based on which it can be determined that such devices 105, 160 are
present within the same vehicle. In a client-side configuration,
the mobile devices 105, 160 communicate between one another (such
as through communication interface 150), exchanging absolute
location and/or relative location and determining which other
devices 105, 160 are in within the same vehicle, substantially in
the manner described above with regard to the server-side
configuration. By way of further example, in certain arrangements
one of devices 105, 160 can emit a lone and/or signal (such as an
audio tone), and only those devices 105, 160 that perceive the
emitted tone are determined to be within close proximity of the
device that emitted the tone.
[0639] In both server-side and client-side configurations, upon
determining which mobile devices 105, 160 are within a particular
vehicle, sensor data (that is, data originating at one or more of
sensors 145, such as location coordinates from GPS 145C, or lateral
accelerations during a turn) from the various devices 105, 160 can
be compared with one another to determine a relative in-vehicle
location of one or more of the devices 105, 160. Such relative
location can be subsequently filtered to generate a real-time
driver-passenger determination, providing increasing accuracy in
driver/passenger identification.
[0640] Driver-Anticipatory Movements--The driver of a vehicle is
generally better able to anticipate the movements of the vehicle
he/she is driving as compared to the passengers because the driver
is the initiator of many of the movements that the vehicle
undergoes, and can thus anticipate the forces that are created as a
result of the vehicle's movement. Such predictive actions can be
detected by one or more of sensors 145 of mobile devices 105, 160
(e.g., accelerometer 145A and/or gyroscope 145B), and can be
further processed to identify whether a particular mobile device
105, 160 is being used by a driver or a passenger. A driver
instinctively tenses and/or flexes certain of his/her muscles to
adjust for the vehicle movements that are about to occur on
average, more adroitly (less sudden with less corrective body
movement) and more quickly than a passenger does. By way of
illustration, a driver anticipates and compensates for the forces
experienced during a turn quicker and more accurately than a
passenger in the vehicle does. Similarly, a driver anticipates and
compensates for the forces experienced during sharp deceleration
(braking) more quickly and more accurately than a passenger. A
driver also anticipates and compensates for the forces of a lane
change more quickly and more accurately than a passenger. By way of
further illustration, the driver can be thought of as a dampening
system which performs better than a corresponding "passenger"
system, due to the driver's higher degree of consciousness,
awareness, and/or anticipation. In one arrangement, one or more of
the listed effects/phenomena can be detected/identified by
processing one or more inputs from one or more sensors 145, such as
by measuring the change in acceleration (i.e. the L2 norm of the
derivative of the acceleration) over the relevant time window. In
this case the acceleration is preferably further band-pass filtered
to focus only on frequencies relevant to this determination, and to
further exclude other driver-acceleration effects (e.g.,
hand-shaking, etc.) as discussed herein.
[0641] Magnetic Field: A vehicle's metallic and electrical parts
influence the magnetic field in the vicinity of and inside such
vehicle. Inputs originating at a 3-axis magnetometer 145E of a
mobile device 105, 160 can be used to detect and determine these
influences by processing such inputs to determine a magnetic field
at various times before and during such vehicle's operation (e.g.,
a car that has not yet been started will have a different magnetic
signature than one in which the electric systems are operating) and
by comparing them with known magnetic signatures of different
in-vehicle locations in order to determine the in-vehicle location
of such device 105, 160. The presence of two or more devices within
a single vehicle can influence each other's magnetic readings in a
way that can be determined based on their comparison. It should be
understood that in certain arrangements, such signatures are
universal while in other arrangements they depend on additional
parameters such as vehicle model, vehicle location, etc. In
addition, comparing the magnetometer 145E inputs from more than one
mobile device 105, 160 located within the same vehicle can enable a
more accurate determination of the in-vehicle location of one or
more of such devices.
Example 3
[0642] As noted above, the processing of the various inputs
discussed herein is preferably enhanced by incorporating various
additional processing operations which serve to further enhance the
accuracy of the determinations that are made. Examples of such
further processing operations include, but are not limited to:
[0643] Clock synchronization--As noted above, in arrangements where
inputs originating from multiple devices 105, 160 are processed
together (such as several of those referenced above in EXAMPLE 2),
it is preferable that simultaneous timing measurements originating
at the respective devices 105, 160 are compared as well. In one
arrangement, this can be effectively achieved by synchronizing the
internal clocks of the respective devices 105, 160. By way of
illustration, a relative displacement can be estimated, and this
estimate can be used to process all relevant inputs such that they
are synchronized to the same clock.
[0644] Examples of such synchronization methods include: (A)
processing time inputs from GPS 145C to compute a mean time
displacement between GPS clock and each the clock of each device
105, 160. The difference between those displacements can be
determined to be the displacement between the devices, (B)
Configuring one of the devices 105, 160 to emit a sound and
receiving the sound at a second device (such as at microphone
145D), and further noting the time the respective events occurred
at each device (that is, the time of the emitting of the sound and
the time of the receipt of the sound) and then repeating same
process in reverse. The noted times can then be subtracted from one
another, reflecting the time that it takes to the sound to travel,
and such values will cancel themselves out, leaving twice the
relevant time displacement remaining.
[0645] Orientation Detection--In discussing the processing of
various inputs, such as those of accelerometer 145A and other
sensors 145, it is preferably that various inputs be identified
and/or separated into elements such as "forward acceleration",
"lateral acceleration" and such. These terms are relative to the
car's coordinate system (e.g. "forward" is the direction of car's
movement) while the raw inputs from the various sensors 145 are
relative to the coordinate system of a mobile device 105, 160 (it
should be understood that while the present example is described
with respect to a car, substantially similar approaches can be
applied to other vehicles as well). In order to transition (rotate)
such inputs, the relative orientation of the mobile device 105, 160
within the coordinate system of the car is preferably established.
The following figures depict the various relative coordinates of
mobile device 105, 160, of a car, and of a mobile device 105, 160
within a car:
[0646] FIG. 9A depicts the relative coordinate system of mobile
device 105, as is known to those of ordinary skill in the art and
referenced herein.
[0647] FIG. 9B depicts the relative accelerations and gyroscopic
rotations of a mobile device, as is known to those of ordinary
skill in the art and referenced herein. It should be understood
that although mobile device 105 is not shown in FIG. 9B for the
sake of clarity, the various relative acceleration and rotations
shown in this figure are relative to a mobile device in the same
position as that shown in FIG. 9A.
[0648] FIG. 9C depicts the gyroscopic sign convention used herein,
as is known to those of ordinary skill in the art and reference
herein.
[0649] FIG. 10 depicts the coordinate system used in relation to a
vehicle (such as at vehicle data system 164) as is known to those
of ordinary skill in the art and reference herein.
[0650] FIGS. 11A-B depict mobile device 105 and its respective
coordinate system in relation to a car and its respective
coordinate system. For example, as will be described in greater
detail below, in certain arrangements the respective coordinate
systems can be transitioned, such that it is recognized, for
example, that the +Z coordinate of the car corresponds to the +Y
coordinate of the mobile device 105, and the +Y coordinate of the
can corresponds to the -Z coordinate of the mobile device 105, as
can be appreciated with reference to FIG. 11B.
[0651] Establishing the orientation of a mobile device 105, 160
within the coordinate system of a car can be accomplished in a
number of ways. By way of illustration, in a `static` approach,
wherein it is assumed that the relative orientation of device 105,
160 is constant (e.g., if the device is attached to a cradle or is
in the pocket of unmoving passenger), the mean acceleration vector
can be determined and be identified as the "down" axis. The
"forward" axis can be determined by comparing/processing inputs
from GPS 145C that correspond to direction angles with inputs from
magnetometer 145E that reflect `north.` The third axis can be
computed based on the first two determined axes using vector
multiplication as is known to those of ordinary skill in the art.
By way of further example, inputs from the accelerometer 145A, the
magnetometer 145E and the GPS 145C (e.g., heading data) can be
averaged, substantially in the manner described above.
[0652] In a dynamic arrangement, inputs originating at
accelerometer 145A, gyroscope 145B and/or other sensors 145 can be
processed to identify real-time changes in the orientation of a
device 105, 160. In addition, acceleration/magnetic/GPS figures can
be generated, preferably using "sensor fusion" algorithms, as is
known to those of ordinary skill in the art. In doing so, the
above-referenced "static" approach can be utilized to dynamically
determine the relative orientation of the device 105, 160.
[0653] It should be noted that the gyroscopic sign convention
adopted herein is preferably such that if an observer positioned on
the positive part of the axis of rotation sees the rotation as
counterclockwise, it is deemed to be positive.
[0654] Low-Pass filtering--The values derived and/or computed from
the various inputs originating at the various sensors 145 of mobile
device 105, 160 can be frequently compromised by the vibration(s)
present in car's environment (originating at the car's engine, road
bumps, imperfect wheels, wind blowing through the windows, or even
car audio sounds). Such vibrations can inject "noise" into the
inputs originating at the various sensors 145, and can adversely
affect the precision of the processing of the various algorithms
disclosed here, both in terms of efficiency and final accuracy.
[0655] There are various ways that this problem can be addressed.
In one arrangement one or more of devices 105, 160 within the
vehicle are attached to a dampening device. In certain arrangements
such a dampening device can include one or more weight(s) that can
be attached to the mobile device 105, 160 to effectively increase
its mass and thus make it more vibration resistant. Additionally,
dampening materials (e.g. sorbothane pads) can be attached to a
device 105, 160 to prevent high frequency vibrations from passing
to the mobile device 105, 160. In any event, the inputs can be
preferably processed with a bounded pass filter. On such example is
an FIR with 128 laps with Hamming windows.
[0656] Sensor Fusion--As has already been noted and illustrated
above, various determinations can be made by processing inputs from
several sensors 145 together (e.g. forward velocity inputs
originating at both the accelerometer 145A and GPS 145C).
Example 4
[0657] The following scenarios illustrate additional examples of
the analyzing of a first and second input and identifying the
presence of a first user and a second user (such as at step 720,
above):
[0658] Using one or more biometric authentication methods (as are
known to those of ordinary skill in the art) to identify the
presence of a first user and a second user. Such biometric
authentication methods include, but are not limited to, voice
recognition, fingerprint recognition, face recognition, DNA
identification, and retina identification.
[0659] The following are further examples of restrictions that can
be employed at a mobile device 105, such as in the manner described
in detail above with reference to FIG. 7. Various of these examples
impede operation of mobile device 105 by a driver moreso than they
impede operation of the device by a passenger: [0660] (a) If
talking, the device is restricted to being held on the left side
(right side for U.K.) of the head/face of the user and with an
upright orientation, so that driver usage cannot be hidden from
external observers. [0661] (b) If texting, mailing, browsing etc.,
mobile device 105 is restricted to operating when having straight
orientation (no yaw) (adjustment can be necessary, in certain
arrangements, for a vertical/horizontal keyboard) and at least
close to upright orientation (cannot be on knee or low down so that
driver cannot "hide" the device use from external observers).
[0662] (c) The device interface will only function horizontally
(more difficult for driver to use). [0663] (d) The device 105 is
restricted to operating in one or more ways only when camera 145F
perceives a frequently moving background (e.g., be held high, not
hidden low in the driver's lap or blocked by the steering wheel).
[0664] (e) The device 105 is restricted to operating in one or more
ways that can be determined to correspond to operation by a
passenger (and/or correspond to operation by a passenger of a
particular device), such as the various determinations described in
detail herein. By way of example, if no correlation (or,
alternatively, no negative correlation) is identified between
various typing tendencies and the speed, acceleration and/or
maneuvering of a traveling vehicle, and/or a certain typing
accuracy threshold it met and/or maintained over a period of time,
it can be concluded that the user is likely a passenger. [0665] (f)
The device 105 is restricted to operating only when it can be
determined based on one or more inputs that the device is under the
control of a passenger and/or under the control of a passenger
using this particular device, such as the various determinations
described in detail herein. By way of example, if relatively little
"shake" is perceived at mobile device 105 over a period of time, it
can be determined that the device is under the control of a
passenger, as a passenger has the ability to control "shake" by
using both hands to steady the device--an option not always
available to drivers who generally need their second hand to steer
the vehicle.
[0666] It should also be understood that the various restrictions
referenced herein can also be dependent upon the presence and/or
absence of certain of the determinations disclosed herein. Thus,
for example, various restrictions can be employed only when a
device cannot be definitively determined to be in the rear or on
the right side of a vehicle (thus suggesting that a driver can
potentially be operating the device).
Example 5
[0667] In determining vehicle class or type, in certain
arrangements a determination is made as to whether one or more
mobile devices 105, 160 is/are present and/or in use in a vehicle.
If such a determination is affirmatively made, a further
determination can then be made regarding the general type or class
of the vehicle (e.g., motorcycle, car, bus, train boat, plane,
etc.). This determination can then be used to further determine if
there are restrictions on the mobile device usage on the part of a
driver or the passenger in the vehicle. For example, if it is
determined through a signature analysis (that is, an analysis of
various patterns in various inputs) of an accelerometer 145A and/or
gyroscope 145B and/or GPS 145C of mobile devices 105 and/or 160
that there is a high-likelihood that a particular mobile device
105, 160 is located on a train, then that the mobile device 105,
160 can remain fully operational without any operation state
restrictions (assuming that no restrictions apply to anyone on the
train including the conductor). If however, it is determined that a
mobile device 105, 160 is being used within a car, restrictions can
be applied (e.g., no phone use at all or just no texting),
particularly if it is determined that the user of the mobile device
105, 160 is the driver of the car, and not a passenger.
[0668] As described in detail above, the type or class of vehicle
in which a mobile device 105, 160 is located can preferably be
identified and/or determined by using one or more of sensors 145 of
mobile device 105. In certain arrangements, this
identification/determination can be improved by using the onboard
sensors of other mobile devices 160 and/or the onboard sensors
(e.g., vehicle data system 164) of the vehicle in which mobile
device 105 is traveling. As noted above, being that different
vehicles operate in perceptibly different ways (which, in turn,
reflect different patterns that are perceptible to one or more of
sensors 145), the signature of one or more of sensors 145 of mobile
device 105 (and/or other mobile devices 160) present and/or used in
relation to each of the following vehicles is identifiable within a
certain degree of accuracy:
[0669] It should be understood that in certain implementations, a
device can be authenticated (e.g., determined to be likely to be
operated by a user who is a passenger) if it can be determined that
the user of the device is able to perform one or more actions (such
as providing certain inputs) and/or demonstrate/provide evidence of
certain situations (such as providing photographic/videographic
documentation of such situations) that a user who is simultaneously
driving a vehicle would not be reasonably capable of doing. As
described in detail herein, examples of such methods of
authentication include: if, while having determined that the
vehicle (within which the mobile device is present) is in motion,
the user of the device can be determined to be capable of (a)
performing an action in a different part of the vehicle (such as in
an area of the vehicle where the driver could not reasonably sit
and/or reach); (b) holding his/her look/gaze (i.e., maintain focus
of his/her eyes) in a direction (such as towards the mobile device)
that is not towards the road ahead, for a defined/sufficiently long
period of time: (c) using/interacting with the device with two
hands for a sufficiently long period of time/performing one or more
tactile gestures that require substantially simultaneous use of
both hands of the user (it should be noted that the terms "tactile
gesture" and "tactile gestures" as used herein are intended to
encompass inputs and/or interactions that are provided by a user in
a tactile manner, such as through physical interaction with one or
more media, elements, and/or components with one or more fingers or
hands of a user, examples of which including pressing buttons, and
performing gestures such as taps, swipes, and/or other such
interactions with a touchscreen or touchpad); (d) configuring the
device to record a visual capture (e.g., take a picture or video)
within which one or more indicators (that is, elements or aspects
that can be perceived within the visual capture) that would be
difficult/impossible for a driver to capture, are present (examples
of such indicators include: (i) the presence of a passenger's
seatbelt, as described herein, (ii) the presence of a steering
wheel with two hands on it, as described herein, (iii) the presence
of the eyes/face/smile etc. of the user, as captured from below,
above, and/or from the side (it can be appreciated that in
scenarios where there is little or no external light other than the
interior overhead lighting of the vehicle, such as at night, it can
be preferable to take a picture from above and/or from the side,
such that the overhead interior lighting within the vehicle does
not interfere considerably with the visual capture) wherein the
steering wheel of the vehicle is not present in the visual capture,
and/or (iv) the presence of the feet of the user in a position that
is difficult/impossible for a driver to achieve, etc.), etc.
[0670] As described herein, in certain implementations, the device
user can be prompted to provide one or more inputs in order to
authenticate that s/he is a passenger. Examples of such
authentication methods/approaches include performing an action or a
set of actions, such as providing one or more alphanumeric inputs
in response to a CAPTCHA prompt (as is known to those of ordinary
skill in the art), providing one or more inputs during the course
of interacting with a game, providing one or more inputs in
attempting to solve a puzzle, a lock screen, etc. It can be
appreciated that such authentication approaches/methods can be
configured to require a significant degree of concentration (and/or
prolonged concentration) on the part of the user, such that such
authentication approaches/methods are too difficult to be
successfully performed (and/or consistently successfully performed)
by a driver of a moving vehicle (who, presumably, must concentrate
on the road ahead). Such authentication approaches/methods can be
further improved by configuring them to require that (a) the
authentication can only be successfully completed (e.g.,
authenticating the user of the device as the passenger) when the
user uses both hands simultaneously (as described in detail
herein); and/or (b) the authentication can only be successfully
completed when the required inputs are provided such that the user
cannot simultaneously see the road ahead while performing the
authentication (such as by making the user tilt his/her head and/or
eyes down or up or right or left, e.g., by requiring that the
device be held flat and/or placed in the user's lap or on the seat
between the user's legs, as described herein, and/or by requiring
that the user look directly in to the device in the manners
described herein).
[0671] In another implementation, in order to provide the necessary
inputs in order to authenticate the mobile device (e.g., to
authenticate a user of the device as a passenger in a vehicle),
various restrictions can configure the mobile device to require
that the device be placed or held flat (such that the
z-accelerometer of the device indicates the approximate value of
gravity, e.g., when the device is positioned in the user's lap or
on the seat between the user's legs), and user tilts his/her head
so that the camera(s) of the device can detect the eyes, gaze,
face, and/or smile etc. of a person (not necessarily limited to a
particular person), preferably for a certain minimum period of time
(controlling, in certain implementations, for blinking and similar
effects). It can be appreciated that such authentications can be
achieved using a forward-facing camera (e.g., a camera on the side
of the device that the screen is on in contemporary devices, such
as the iPhone 4S produced by Apple of Cupertino. Calif., USA, and
as is depicted in FIG. 15F, wherein 145F.sub.1 corresponds to a
forward-facing camera and 145F.sub.2 corresponds to a rear-facing
camera) and/or a rear-facing camera (e.g., a camera on the side of
the device that the screen is not on in contemporary devices such
as the iPhone 4s produced by Apple of Cupertino, Calif., USA).
[0672] It should be understood that in certain implementations, the
authentication methods/approaches described herein can be
configured to authenticate a user of a mobile device as a passenger
upon determining the presence of the eyes/gaze/face/smile of the
user, such as from within a visual capture, only when such a visual
capture can be determined to have been recorded while the mobile
device was positioned in a manner/orientation that
precludes/prevents the user from simultaneously seeing/focusing on
the road ahead. (It can be appreciated that a driver operating the
mobile device would generally only be capable of positioning the
device in a manner/orientation whereby the device is able to
capture his/her eyes/gaze/face/smile etc, while the user is also
able to see some portion of the road ahead.) This can be determined
by (i) searching, such as with image processing techniques known to
those of ordinary skill in the art, for the eyes/gaze/face/smile
etc. of the user within a field of view that is smaller than the
camera's field of view: and/or (ii) by requiring the angle of
incidence between the user's eyes/gaze/face/smile etc, and the
device be as close to (or as far from) 90 degrees (indicating that
the user is directly facing the device) as desired, such as in the
manner depicted in FIG. 15G; and/or (iii) requiring that the ratio
of horizontal pixels to vertical pixels of the user's
eyes/gaze/face/smile etc. is consistent with the ratio present when
a user looks directly into the device (and/or that the number of
horizontal pixels and/or vertical pixels of the user's
eyes/gaze/face/smile etc. is consistent with the number present
when a user looks directly into the device), as is known to those
of ordinary skill in the art.
[0673] Moreover, in certain implementations, the authentication
methods/approaches described herein can be configured to
authenticate a user of a mobile device as a passenger only if the
user holds the device within a certain range of distance from her
eyes/gaze/face/smile etc. In doing so, it will be difficult, if not
impossible, for a driver to fraudulently authenticate him/herself
as a passenger by attempting to authenticate the device by holding
the device close to his/her head such that the resulting visual
capture recorded by the device does not contain any part of the
steering wheel (as described herein). The distance can be
determined, for example, based on the number of pixels in the
eyes/gaze/face/smile etc., relative to the resolution of the camera
and/or relative to the angle of incidence and/or using other
distance measurement techniques known to those of ordinary skill in
the art.
[0674] In certain implementations, the authentication
methods/approaches described herein can be configured to
authenticate a user of a mobile device as a passenger upon
determination that the user performed (and/or is capable of
performing) one or more actions/provided one or more inputs that
can be determined to require(s) the use of one or two hands (e.g.,
swipe gestures at a touchscreen, including one or more times) such
as in an implementation utilizing a forward-facing camera is used,
and/or requiring a user to press a touchscreen with one or more
fingers and/or touch one or more buttons on the device,
irrespective of whether the camera is rear-facing or
forward-facing), such as is described with reference to FIG.
15A.
[0675] It should also be noted that in certain implementations,
when performing the referenced authentication, it can be useful to
configure the device such that the user is required to (a) hold the
device at a certain orientation, e.g., in landscape orientation,
thereby making it more difficult for a driver trying to falsely
authenticate/unlock the device (which would otherwise allow the
driver to perform certain actions), and/or (b) to encourage the
user to hold the device in such orientation by having the device's
screen display in landscape mode (that is, displaying the user
interface in landscape mode, as described in detail herein),
regardless of whether the device is actually held in a landscape
orientation. It can be appreciated that such a configuration is
relatively less of a burden on a passenger, as described in detail
herein.
[0676] As referenced herein, in certain implementations, the
authentication methods/approaches described herein can be
configured to authenticate a user of a mobile device as a passenger
only if no part of a steering wheel is present in a visual capture,
such as a visual capture of a portion of the user.
[0677] It should also be noted that in certain implementations,
during the authentication process, the mobile device can be
configured to providing audio and/or vibrational/tactile feedback
to the user (such as in the case of a forward-facing or rear-facing
cameras, whereby the user can be directed/instructed as to how to
tilt/orient the device/camera in order to achieve the requisite
angle required by the particular authentication method, as
described in detail herein) and/or visual feedback (such as in the
case of a rear-facing cameras and/or a forward facing camera)
during the authentication process. In doing so, the user can be
provided with guidance/feedback, as needed, in order to enable the
user to achieve the requisite input (such as a particular visual
capture) in order to authenticate the device, as described herein.
FIGS. 15D and 15E depict various examples of visual feedback that
can be provided to a user during authentication.
[0678] By way of yet further example, in certain implementations,
upon determining that a device is in motion (or otherwise
determining that a trip has begun) (such as in any number of ways
described herein, and as depicted in FIGS. 15H and 151), a user can
be prompted or otherwise presented with an interface that can
enable the user to initiate an authentication process, such as by
interaction with a `slide to unlock` interface on a touchscreen, as
shown in FIG. 15J. Upon successfully completing the `slide to
unlock` gesture, another interface can be provided which
incorporates/implements any number of variable input techniques.
For example, a keypad (or keyboard, etc.) can be provided whose
position with respect to the touchscreen of the device can change
based on one or more inputs. By way of illustration. FIGS. 15K-15P
depict how the position of a keypad on a touchscreen can change
based on and/or in relation to the angle/orientation of the device
(as determined, for example, based on the accelerometer and/or
gyroscope of the device). As shown in FIGS. 15K-15P, the interface
can be configured such that the keypad is centered within the
touchscreen when the device is held in a `flat` orientation (as
shown in FIG. 15Q and described herein), while being positioned
elsewhere on the screen (for example, in a manner that precludes a
user from utilizing the entire keypad for input) when the device is
held in other orientations (as shown in FIGS. 15K-P). As shown in
FIG. 15Q, upon orienting the device in a `flat` orientation (and
thus centering the keypad), the user can be prompted to hold their
thumb (or another finger) in a specific region of the touchscreen,
such as in the manner described herein. Upon determining that the
user is doing so (that is, maintaining his/her thumb/finger on the
specified region), the user can be presented with a sequence of
several numbers which are to be input into the keypad in order to
authenticate the user to the device as a passenger, as shown in
FIGS. 15R-T. Upon successfully inputting the presented sequence,
the user can be authenticated as a passenger and various
aspects/functions of the device can be activated/unrestricted, as
described herein. It should be understood that, in certain
implementations, the sequence can allow for some degree of user
error (e.g., mistyping of the presented numeric sequence into the
keypad), while also preventing a user from authenticating in the
event that the quantity of errors exceeds a defined threshold (as
described herein). It should be understood that the described
authentication sequence is exemplary and that any number of
modifications or adjustments or omissions to the sequence can be
implemented and are within the scope of the present disclosure. For
example, instead of a keypad the user may be presented with a
keyboard and a sequence of letters to input.
[0679] Moreover, in certain implementations, in lieu of requiring a
substantially `flat` orientation (as shown, for example, in FIG.
15Q and described herein), the referenced technique(s) can be
employed in relation to an orientation whereby the device is
oriented, for example, such that the Y axis of the device (as shown
in FIGS. 9A-9B and described in detail herein) is substantially
aligned with the direction that the vehicle is traveling in, and
the X-axis (as shown in FIGS. 9A-9B) is aligned with the up/down of
the vehicle (as shown, for example, in FIG. 15C) or vice versa,
i.e., with the Y-axis is up/down and the X-axis is collinear with
the direction in which the vehicle is traveling. It can be
appreciated that in order to achieve such an orientation, a user of
the device will need to orient the device such that the user is
facing towards the middle of the vehicle, or towards the side
windows of the vehicle--but not towards the windshield (i.e., the
front) of the vehicle (thus preventing attempts by drivers to
circumvent such techniques by authenticating while diving). That
such an orientation is consistent with the direction in which the
vehicle is traveling can be confirmed, for example, based on a
correlation of the GPS heading and the magnetometer/compass
directional reading, as described herein. Moreover, that such
orientation is consistent with the X-axis up/down can be confirmed
based on one or more inputs from the device's accelerometer, such
as in the manner described herein. It should also be noted that
while in certain implementations the referenced techniques can be
employed relatively consistently with respect to the various users
(i.e., the same or a comparable orientation can be required of a
user irrespective of whether he/she can be determined to be a
driver or a passenger), in other implementations such an
orientation can be selected based on a determination as to whether
a particular user is likely to be a driver or a passenger (or a
determination as to whether such a user is positioned on the right
side or left side of the vehicle) as determined, for example, as
described herein. In such implementations, for example, the user
can be directed to orient the device in a particular way (e.g.,
such that the user must face towards the center of the vehicle in
order to continue the referenced authentication process). It should
also be noted that the referenced orientations are also exemplary
and that any other such orientation can be similarly
implemented.
[0680] In another implementation the referenced technique(s) can be
employed in relation to a substantially `flat` device orientation
(as determined, for example, as described herein) and an
orientation in which the Y-axis (or X-axis) of the device is
oriented substantially up/down and the X-axis (or Y-axis) is
substantially collinear with the direction in which the vehicle is
traveling.
[0681] FIG. 58 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0682] At 5810, a degree of correlation between one or more of (a)
an axis of a device and a direction with respect to which a vehicle
(within which the device can be determined to be present) is
determined to be traveling and/or (b) an axis of a device and a
direction with respect to the earth/ground can be determined.
[0683] At 5820, an authentication/verification option/task can be
enabled and/or an authentication attempt can be approved, such as
with respect to the mobile device. In certain implementations, such
an option can be enabled/attempt can be approved based on a
determination (e.g., at 5810) that the degree to which the one or
more axes and their respective direction correlate (e.g., with
respect to a direction that the vehicle is traveling and/or the
ground) meets or exceed one or more defined thresholds.
[0684] By way of illustration, in certain implementations, a
passenger authentication task may require that the orientation of
the device must be determined to be one in which its y-axis (or
x-axis) is within a certain range of the vehicle's heading (e.g.,
as measured by comparing the device's magnetometer with its GPS
heading). In addition, in certain implementations such an
authentication task may require that the device's x-axis (or
y-axis) be determined to be within a certain range of normal to the
ground/earth (with respect to its roll and yaw). For example, in
order to complete such an authentication task successfully, the
device's positive (or negative) y-axis must be determined to be
pointed within +/-20 degrees of the vehicle's heading and the
device's positive (or negative) x-axis must be determined to be
pointed up with +10 to -20 degrees of normal to the ground (roll)
and +/-5 degrees of normal to the ground (yaw), such as is shown in
FIG. 50 (angles ranges not shown).
[0685] It can be appreciated that a window whose forward-facing
edge is substantially vertical is indicative of a passenger window
in most cars and is also prevalent in trains and buses. Moreover,
the forward facing edges of windows of front seat occupants
(drivers or passengers) are not substantially vertical.
Accordingly, processing a visual capture provided by one or more
device camera(s) (whether captured actively by a user and/or
passively) together with the heading of the vehicle and the
orientation of the device (e.g., using GPS, compass, magnetometer,
accelerometer) can be used to identify the presence of window(s),
their forward facing edges, as well as the degree of verticality of
all or part of the forward facing edge (which, as noted, can be
used to determine whether or not the user is likely to be a
driver--or at least potentially a driver--or a passenger).
[0686] FIG. 47 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 4705 a first visual capture can be received such as from a first
camera of a user device. At 4710, a second visual capture can be
received, such as from a second camera of the user device. In
certain implementations, the second visual capture can be received
substantially concurrent with receipt of the first visual capture.
At 4715, the first visual capture can be processed, such as to
identify a presence of a face within the first visual capture. At
4720, the second visual capture can be processed, such as to
identify a presence of a face within the second visual capture. At
4725, one or more operations can be initiated, such as with respect
to the user device. In certain implementations, the one or more
operations can be initiated based on (a) an identification of a
face within the first visual capture and/or (b) an identification
of a face within the second visual capture. In certain
implementations, one or more restrictions employed with respect to
the user device can be modified. In certain implementations, a user
of the user device can be identified as a passenger.
[0687] It should be noted that the techniques described herein can
be employed in relation to and/or in conjunction with one or more
passenger authentication task(s) (including but not limited to
numeric input-related tasks and video capture-based tasks, such as
those described herein), including in scenarios where various other
elements/aspects/components (such as those described herein in
relation to various passenger authentication tasks such as
landscape orientation, thumb/multi-finger tasks etc.) are
included/incorporated.
[0688] In another implementation, an authentication task can be
employed such that the authenticator (e.g., a passenger) can be
prompted to use a camera of the device (such as a rear-facing
camera) to take a visual capture that can be processed to identify
the inclusion of the profile (or another angle shot) of another
vehicle occupant's face/head (for example, in lieu of a straight-on
shot of the authenticator's face as described herein). In addition,
the authenticator can be required to hold the device such that the
screen is substantially parallel to vehicle's side window(s) and/or
in an orientation where the device's touchscreen is facing the
passenger's window. It can be appreciated that in such an
orientation a driver is relatively unlikely to be able to take such
a picture. And, even in a scenario where the driver were so
capable, one or more inputs originating at the device
(corresponding to, for example, accelerometer movement, the
centering of the visual capture, etc.) can be processed to
determine that such input(s) indicate that a driver is likely to be
attempting such an authentication task (and the authentication
attempt can thus be denied). In addition, in certain
implementations the referenced authentication task can also
incorporate one or more of the other elements described herein
(e.g., landscape orientation, thumb/multi-finger tasks, number
input tasks, etc.), thereby further reducing the likelihood that
the referenced task(s) can be performed by a driver, while also
avoiding substantially increasing the difficulty for a passenger to
perform them.
[0689] In yet another implementation, an authentication task can be
employed such that the authenticating user (e.g., a passenger) can
be prompted to use the device's front-facing and rear-facing camera
simultaneously (or in sufficiently close chronological proximity to
one another and/or interleaved) to take two visual captures, each
of which can be processed to identify a presence of a human
face/head (e.g., a driver and a passenger) therein. In addition,
the authenticating user can be prompted to hold/orient the device
such that the screen of the device is substantially parallel to the
vehicle's side windows and is also positioned in an orientation
where the device's screen is facing the passenger's window. In such
a scenario, a driver is relatively unlikely to be able to take such
pictures. And, even in a scenario where the driver were so capable,
the one or more inputs originating at the device (corresponding to,
for example, accelerometer movement, the centering of the visual
capture, etc.) can be processed to determine that such input(s)
indicate that a driver is likely to be attempting such an
authentication task (and the authentication attempt can thus be
denied). In addition, in certain implementations the authenticating
user can also be prompted to perform one or more of the other
tasks, elements, etc. described herein (e.g., landscape
orientation, thumb/multi-finger use, numeric input tasks, etc.),
thereby further reducing the likelihood that the referenced task(s)
can be performed by a driver, while also avoiding substantially
increasing the difficulty for a passenger to perform them.
[0690] In yet another implementation, the authentication task can
be employed such that the authenticating user (e.g., a passenger),
can be prompted to use the device's front-facing and rear-facing
camera simultaneously (or in sufficiently close chronological
proximity to one another and/or interleaved) to take visual
captures, each of which can be processed to identify a presence of
a human face/head (e.g., a driver and a passenger) therein, whereby
the front-facing camera (e.g., the user's camera) provides a video
capture that includes a substantially straight-on face/head shot.
In addition the authenticating user can be prompted to
hold/maintain the position/orientation of the device such that that
the screen of the device is substantially parallel to vehicle's
side windows and is also positioned in an orientation where the
device's screen is facing the passenger's window. In such a
scenario, a driver is relatively unlikely to be able to take such
pictures. And, even in a scenario where a driver were so capable,
the one or more inputs originating at the device (corresponding to,
for example, accelerometer movement, the centering of the visual
capture, etc.) can be processed to determine that such input(s)
indicate that a driver is likely to be attempting such
authentication task (and the authentication attempt can thus be
denied). In addition, in certain implementations the authenticating
user can also be prompted to perform one or more of the other
tasks, elements, etc. described herein (e.g., landscape
orientation, thumb/multi-finger use, numeric input tasks, etc.),
further reducing the likelihood that the referenced task(s) can be
performed by a driver, while also avoiding substantially increasing
the difficulty for a passenger to perform them.
[0691] It should be noted that in scenarios that incorporate video
capture, similar imaging methods, and/or techniques can also be
employed in conjunction with one or more cameras that are in
communication with, but not (necessarily) physically connected to
the device (e.g., wearable cameras). It should be further noted
that the techniques described herein can be modified and/or
adjusted accordingly to account for such modifications to the
techniques described herein.
[0692] It should also be noted that, in certain implementations,
various aspects of the interface(s) depicted in FIGS. 15H-T can be
configured to operate (e.g., be presented on a touchscreen)
specifically/only in landscape mode/orientation. It can be
appreciated that such an orientation can be more difficult for
users who are drivers to interact with, while being relatively
easier for users who are passengers to interact with.
[0693] Moreover, in certain implementations one or more time limits
can be imposed on any/all of the elements/operations/steps in the
referenced authentication sequence(s). Additionally, in certain
implementations, any number of elements, operations, steps, or
aspects of the referenced sequence(s) can be configured to
determine that a user is likely to be a driver or a passenger at
varying/intermittent stages of the sequence. For example, a
sequence can be configured to terminate upon a determination that
the device is not being held with at least a certain degree of
stability (as can be determined as described herein, such as based
on inputs from an accelerometer and/or gyroscope). By way of
further example, a sequence can be configured to terminate upon a
determination that the sequence (or any number of the steps/aspects
of the sequence) is not completed within a defined timeframe.
[0694] It should also be noted that in certain implementations a
user of a mobile device can be authenticated as being a passenger
even if the vehicle within which the device is present is not
moving, e.g., by recording a visual capture within which the
driver's hand and the steering wheel can be determined to be
present, as described in detail herein.
[0695] In certain implementations, the authentication
tasks/techniques described herein can include one or more
oral/audio tasks (as can be prompted/instructed by the device)
which can be perceived/detected by one or more microphone(s) of the
device, optionally in conjunction with one or more other device
sensors, and which can be processed/analyzed in order to
authenticate a user of the device as a passenger, for example. For
example, the device can prompt/ask the user to hold his device with
two hands in a flat orientation (as if it were lying flat on a
table), in landscape mode, and speak a word that flashes/is
presented on the device screen at some time over a 5 second time
period. If the voice input provided by the user and perceived by
the microphone(s) can be recognized as being the correct word that
was presented (or within a defined margin of error from it), while
the accelerometer/gyroscope of the device also recognize that the
device was held flat/in the proper orientation, while the touch
screen recognizes that tactile contact was provided in one or areas
of the device (e.g., corners of the device screen) s as instructed
and in such a way that can be determined to be likely that the
device was being held with two hands, the user can be determined to
be (and authenticated as) a passenger.
[0696] FIG. 122 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0697] At 12210, an input can be received, such as in a manner
described herein. In certain implementations, such an input can be
a visual capture, such as a visual capture that includes a face of
the user, a fingerprint of the user, etc. In other implementations,
such an input can be a biometric input which can include, for
example, a biometric element of the user, a fingerprint input,
etc.
[0698] At 12220, the input can be processed. In doing so, an
in-vehicle role of a user can be determined and an identity of the
user can be authenticated. In certain implementations, the input
can be processed to determine an in-vehicle role of a user and/or
to authenticate an identity of the user, such as based on a motion
of the user.
[0699] At 12230, one or more actions can be initiated, such as with
respect to the user and/or the device. In certain implementations,
such actions can be initiated based on a determination that the
in-vehicle role of the user is a passenger and an authentication of
the identity of the user, in certain implementations, one or more
restrictions can be adjusted, such as with respect to the first
device. In certain implementations, it can be determined, in
relation to the user, which data to log with respect to a trip.
Moreover, in certain implementations data logged during a trip can
be associated with a navigation history associated with the
user.
[0700] By way of further illustration, in certain implementations
and situations, a lock screen (e.g., secure or insecure) and
"driver mode" (e.g., one or more restrictions) may be active at the
same time during a trip on a mobile device. Instead of requiring a
passenger to complete both tasks (and/or instead of automatically
suspending the lock screen task during a trip which may be a
security problem), in certain implementations the user can be
prompted to complete only one task to fulfill both requirements.
For example, this can be done by using a verification technique
which includes: (a) a visual capture of the user's face, which
visual capture can also be used to authenticate the user as an
authorized user of the device (e.g., using facial recognition);
and/or (b) there is a press of the user's finger, e.g., in a
particular location, which finger press can also be used to
authenticate the user as an authorized user of the device (e.g.,
fingerprint recognition), and or (c) one of more of the user's
motions (etc., signature of movement, timing, pressure) are used to
identify the user as an authorized user of the device.
[0701] In certain implementations, in order to prevent a driver
from moving to a passenger location in the vehicle in order to
successfully perform one or more of the verification/authentication
tasks described, it may advantageous that the task may only be
completed (or started) if the vehicle is moving (perhaps above a
certain threshold speed), as determined, with latency, for example,
using GPS, which requires time to get a first fix (TTFF). It may be
further advantageous to shorten the time required to make such
determination to allow passengers to verify/authenticate as such
more quickly, for example, by analyzing visual captures, e.g.,
comparing successive visual captures taken over the same period of
time as the verification/authentication tasks is performed, to
detect particular forms of movement in order to determine if the
vehicle is moving at or around the time that the task is started,
performed and/or completed.
[0702] Turning now to FIG. 15, a flow diagram is described showing
a routine 1500 that illustrates a broad aspect of a method for
selectively restricting operation of a mobile device 105 in
accordance with at least one embodiment disclosed herein. It should
be understood that in certain implementations, such selective
restriction of a mobile device can be employed in order to restrict
operation of the device by a user who is a driver of a vehicle,
while not restricting operation of the device (or, restricting
operation of the device relatively less) by a user who is a
passenger of a vehicle. Accordingly, it should be appreciated that
various of the determinations and identifications described herein
are directed towards one or more factors and/or aspects that are
indicative in various ways of whether the user of the particular
device is a drive or a passenger of the vehicle. Additionally, it
should be further understood that the referenced method is
preferably implemented in situations, scenarios, and/or settings
where mobile device 105 is present within a vehicle, such as a
moving vehicle. Various methods for determining a presence of the
device within a vehicle and/or a moving vehicle are described in
detail herein.
[0703] At step 1505, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, employs one or more restrictions at mobile device 105 and/or
in relation to mobile device 105, substantially in the manner
described above with respect to step 705. It should be understood
that in certain arrangements, such restriction(s) are preferably
configured, on average, to impede operation of mobile device 105 by
a user that is a driver moreso than the restriction(s) impede
operation of mobile device 105 by a user that is a passenger, as
described in detail herein. It should also be understood that a
single restriction can be understood and/or configured to be a
combination and/or composite of multiple restrictions. It should
also be understood that in certain implementations the methods
described herein can be applied to a device that is already
restricted, such as a device that is configured, by default, to
operate, in a restricted state.
[0704] At step 1510, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
receives one or more inputs, such as one or more visual captures
originating at mobile device 105 and/or mobile devices 160 (e.g.,
from camera 145F), such as an image, a series of images, and/or a
video, substantially in the manner described above with respect to
step 710.
[0705] Then, at step 1520, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, processes at least one of the visual captures (such as those
received at step 1510) to identify one or more indicators within
the visual capture. It should be understood that the terms
"indicator" and/or "indicators" as used in context of the
referenced visual capture(s) are intended to encompass one or more
items, elements, and/or aspects that can be distinguished,
determined, and or identified within a visual capture, as is known
to those of ordinary skill in the art. That is, it can be
appreciated that in processing the one or more visual capture(s),
the visual captures (e.g., images and/or videos) can be analyzed
using one or more image processing techniques, as are known to
those of ordinary skill in the art. In doing so, one or more
indicators can be identified within the visual capture, and such
indicators can preferably be further utilized to determine if/how
one or more restrictions are to be adjusted at/in relation to the
mobile device 105, as will be described in greater detail
below.
[0706] The following are exemplary and non-limiting illustrations
of various visual captures that can be received, and indicators
that can be identified within the respective visual capture:
[0707] In one implementation, a visual capture can include an image
of at least a portion of a face of a user, and such a visual
capture can be processed to identify one or more indicators that
reflect a steady gaze of the user. It can be appreciated that while
a vehicle is in motion, a passenger in a vehicle is more likely to
be able to maintain an ongoing steady gaze into a camera of a
mobile device than a driver who will necessarily divert his/her
gaze in order to see the road while driving.
[0708] In another implementation, a visual capture can include an
image of at least a portion of a face of a user, and such a visual
capture can be processed to identify an absence of a steering wheel
in the visual capture. It can be appreciated that a visual capture
that contains the presence of a steering wheel together with at
least a portion of a face of a user indicates that it is likely
that the user is in close proximity to the steering wheel, and is
thus more likely to be a driver of the vehicle. Thus, in visual
captures where the steering wheel has been determined to be absent,
it can be determine that the user of the device which captured such
a visual capture is likely to be a passenger.
[0709] In another implementation, a visual capture can include an
image of one or more feet of a user, and such a visual capture can
be processed to identify a position of the one or more feet. That
is, it can be appreciated that a visual capture of the feet of a
driver is likely to include one or more pedals (e.g., gas, brake,
and/or clutch), and/or the positioning of the feet of the driver,
either on or around such pedals. Conversely, the absence of such
pedals and/or the foot positioning that they entails, indicates
that the user of the device which captured the image capture is
likely to be a passenger.
[0710] In another implementation, a visual capture can include an
image of at least a portion of a body of a user, and such a visual
capture can be processed to identify a presence of a fastened
seatbelt in a passenger orientation, as depicted in FIG. 15B and as
will be described in greater detail below with respect to step
1720.
[0711] In another implementation, a visual capture can include an
image of an interior of a vehicle, and such a visual capture can be
processed to identify at least two hands and a steering wheel, as
will be described in greater detail below with respect to step
1542.
[0712] By way of further illustration in another implementation, a
video capture that reflects the scenery outside of a vehicle can be
processed, such as using image/video analysis, to determine the
orientation of the mobile device. In order to do so, indicators
such as the position of the sky and/or horizon can be identified
within the in the visual capture, such as using image processing
methods and approaches known to those of ordinary skill in the art.
It can be appreciated that various aspects of the visual capture
will necessarily change based on the orientation of device 105
and/or the relative location of the device within the vehicle. It
can thus be appreciated that in doing so, the orientation of mobile
device 105 and/or the relative location of the device within a
vehicle can be determined, as will be described in greater detail
below.
[0713] At step 1522, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
receives one or more inputs, preferably from at least one of the
sensors 145 of mobile device 105, a vehicle data system 164, and/or
one or more other mobile devices 160, substantially in the manner
described above with respect to step 710. It should also be
understood that various inputs can be received from multiple
sources (e.g., various sensors, devices, etc.). For example, inputs
from accelerometer 145A and/or gyroscope 145B can be received, such
inputs corresponding to an orientation of mobile device 105. By way
of further example, one or more input(s) from one or more tactile
sensor(s) 145N, such as the simultaneous depressing of one or more
buttons, and/or the simultaneous tactile interaction of multiple
points and/or locations on a touchscreen display.
[0714] At step 1524, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
processes the one or more inputs, such as those received at step
1522, to determine a presence of a passenger within a vehicle. By
way of example, inputs can be received from vehicle data system
164, such as those originating at various sensors deployed within a
vehicle, such as weight/heat sensors that are positioned within one
or more seats, and/or sensors that can detect whether one or more
seatbelts are/are not fastened. Such inputs can be processed in
order to determine a presence of, and/or the likelihood of the
presence of, one or more passengers within a vehicle.
[0715] At step 1526, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
processes the one or more inputs with the visual capture and/or the
indicators to determine a relationship between the inputs and the
visual capture and/or the indicators. That is, it can be
appreciated that the processing of inputs from one or more of
sensors 145 (and/or from other sources) together with the visual
capture/indicators can further enhance the accuracy of
determinations made and/or actions taken, such as the determination
of the orientation and/or location of device 105, as referenced
above. For example, inputs from accelerometer 145A and/or gyroscope
145B can be processed together with the referenced visual
capture/indicators in order to determine an orientation of the
device 105 and/or a relative location of the device with increased
accuracy. That is, it can be appreciated that if the visual
capture/indicators reflect scenery outside the vehicle, such visual
capture/indicators can be processed to determine the direction in
which the mobile device 105 is traveling. For instance, if a
stationary item (and/or an item moving at a speed slower than the
vehicle within which the user is traveling) identified in the
visual capture moves from left to right over the course of the
visual capture (such as the progression from Frame 1 to Frame 3 as
depicted in FIG. 19), it can be determined that such a visual
capture was taken with the mobile device 105 being oriented such
that the visual capture is taken from the right side of the
vehicle.
[0716] Accordingly, it can be reasonably concluded that the user
capturing such a visual capture is not the driver of the vehicle
(who would be seated on the left side of the vehicle). Similarly, a
stationary item identified in the visual capture moves from right
to left over the course of the visual capture (such as the
progression from Frame 1a to Frame 3a as depicted in FIG. 19), it
can be determined that such a visual capture was taken with the
mobile device 105 being oriented such that the visual capture is
taken from the left side of the vehicle, and thus it cannot be
determined with certainty that the user is not the driver of the
vehicle. It can be said that such determinations reflect a
relationship between the inputs and the visual
capture/indicators.
[0717] By way of further illustration, in one implementation, a
relationship can be determined wherein preferably while the vehicle
is in motion, the user presses the device against the vehicle's
right-side window with the device oriented so that the Y axis of
the device (as shown in FIGS. 9A-9B and described in detail herein)
is pointed in the forward direction that the car is traveling in,
the device is oriented so that the positive part of the X-axis (as
shown in FIGS. 9A-9B) is facing up and the rear-facing camera of
the device is facing out (together referred to as the "required
orientation", as shown in FIG. 15C)--something that in most
circumstances only a passenger can do (it can also be appreciated
that the "required orientation" can be configured to account for
cameras in other positions on the mobile device, such as a camera
on the front face of the device wherein it can be appreciated that
the negative side of the X-axis is to be facing up). Indicators can
be identified, such as by processing the one or more visual
captures originating from the camera of the device to determine if
the movement of pixels or blocks of pixels or features of interest
in one or more successive visual captures are consistent with the
device being on the right window (e.g., if pixels in successive
frame are moving from left-to-right as opposed to right-to-left if
the device were on the left window), as are known to those of
ordinary skill in the art. The referenced visual capture and/or
indicators can be processed with the one or more inputs to
determine a relationship therebetween.
[0718] At this juncture, it can be appreciated that while
implementations such as those where the processing of a visual
capture/indicators to identify the direction in which stationary
objects (and/or objects moving at a speed slower than the vehicle
within which the user is traveling) move over the course of several
frames (that is, left to right or right to left) can enable a
determination with a certain degree of certainty as to whether the
visual capture was taken from the right side of a moving vehicle
(indicating that the visual capture was taken by a passenger) or
the left side of a moving vehicle (indicating that the visual
capture was not necessarily taken by a passenger), in certain
situations further validation can be advantageous. This is because,
in certain scenarios, a driver, though seated on the left side of
the moving vehicle, can still take a visual capture that shows
stationary objects moving from left to right. Accordingly, it can
be appreciated that analyzing additional inputs and/or factors can
be advantageous in order to further determine that a driver is not
actually skewing the determinations referenced above.
[0719] By way of example, in certain implementations, one or more
inputs (e.g., inputs originating at an accelerometer, gyroscope,
magnetometer, camera, etc.) can also be processed (such as in the
manner described in detail herein) in order to determine a
stability of mobile device 105. It should be understood that any
number of inputs and/or combinations of inputs can be processed in
order to determine the stability of device 105. It can be
appreciated that the degree of stability of device 105 can be
indicative of whether a user of the mobile device is a driver or a
passenger in that in a scenario where a driver points device 105
towards the right-hand window of the vehicle, it is likely that the
mobile device 105 is supported only by the hand of the driver
within the interior of the vehicle (it should also be recognized
that given the fact that the driver must remain on the extreme
left-hand side of the vehicle in order to operate the vehicle whose
controls are situated on that side, it is exceedingly difficult, if
not impossible, for the driver to effectively operate the vehicle
while also reaching across the width of the car to the right-hand
window). Given this positioning, a mobile device 105 operated by a
driver of a vehicle is generally subject to considerable
instability, especially when the vehicle is moving. A passenger,
conversely, who can be seated on the right side of the vehicle,
generally has the ability to hold and/or position his/her mobile
device 105 against the window, wall panel, and/or door of the
vehicle. Doing so provides an additional measure of stability which
is generally unattainable by a driver, as discussed above. As such,
it can be appreciated that by determining the stability of mobile
device 105, and additionally, by identifying a relationship between
the one or more inputs and the visual capture/indicators, the
systems and methods disclosed herein can better identify and/or
account for operation of the device by drivers and/or
passengers.
[0720] As noted in the example above, any number of inputs (both
individually as wells as when processed in combination) can be
analyzed in order to determine the stability of mobile device 105.
By way of further illustration, the visual capture/indicators
themselves can be analyzed/processed in order to identify the
degree of "shake" present, in a manner known to those of ordinary
skill in the art. That is, it can be appreciated that multiple
indicators can be identified from a single visual capture. For
example, it can be appreciated that if an amount or degree of
"shake" can be detected in a visual capture (in addition to other
indicators that can be identified in the same visual capture, such
as those described in detail above). In determining such an
amount/degree of shake, it can be further determined that mobile
device 105 is likely positioned in an unstable manner (such as by
being held in a manner other than by being positioned against a
window of the vehicle), and thus has a significant likelihood of
being operated by a driver of the vehicle. Various other inputs,
such as inputs from the gyroscope 145B and/or the accelerometer
145A can also be processed/analyzed to determine the stability of
the mobile device 105.
[0721] By way of further illustration, in certain implementations,
in addition to identifying one or more indicators within a visual
capture, as describe in detail above, determinations (such as those
that can be computed based on the indicators, such as that the user
of the device is a driver or passenger of the vehicle) can be
further confirmed/verified by processing the visual
capture(s)/indicator(s) with one or more other inputs in order to
determine a relationship between them. For example, it can be
appreciated that a determination that the mobile device is pressed
against the window (as opposed to held by the user just looking out
of the window), in the required orientation, can be computed based
on inputs originating at the accelerometer and/or gyroscope and/or
other sensors. In doing so, any number of determinations can be
computed, in part in order to confirm that the device is being held
in a manner consistent with being pressed against a window. For
example, (i) if it can be determined that the device moves/shakes
relatively less than it would if it were held in a hand that is not
supported by a window and/or door, (ii) if the device vibrates
consistently with being held against a window; and/or (iii) if the
visual capture(s) of the mobile device do not contain pixel blocks
indicative of the device not being against window (e.g., near-fixed
pixels on the borders of the visual capture showing the door or the
roof or the window frame of the vehicle, etc.) in the
preferred/required orientation that is consistent with a user
pointing the rear-facing camera of the device out the window of a
vehicle (wherein the camera sees light, the camera sees moving
pixels, and/or the inward facing light sensor shows an amount of
light consistent with pointing inward in the required orientation,
as is known to those of ordinary skill in the art).
[0722] In certain implementations, the device being pressed against
the right-side window of the vehicle in the required orientation
(as described above) can be verified by processing one or more
inputs, such as those originating at the accelerometer, by tracking
the movement of the device immediately prior to its being pressed
against a window. If, before determining/validating that the device
is pressed against a window in the required orientation, and/or
after accounting for changes in the orientation of the device
during such period of movement, the device moved to the right
relative to the direction in which the vehicle is heading, then it
can be determined that the device has moved to the right-side
window. This determination can preferably be computed based on
inputs originating at the accelerometer, the gyroscope, the GPS
and/or the magnetometer, as is known to those of ordinary skill in
the art. It should be understood that such approaches can operate
independently and/or in conjunction with one or more of the various
implementations and approaches described in detail herein.
[0723] In certain implementations, the in-vehicle role of a device
user can be determined based on a processing of a visual capture
from the device to identify various objects, indicators, and/or
patterns and determine the in-vehicle location and/or in-vehicle
role of the user based on such objects, indicators, and/or
patterns. For example, identifying a gas pedal in the rear-facing
camera (or any other camera) on the device (e.g., within an image
captured by such camera) is relatively likely to indicate a driver
is operating such a device. By way of further example, identifying
a seat belt going over a left shoulder of a user (e.g., within an
image captured by such camera) is relatively likely to indicate
that a passenger is operating such a device (reverse for the UK and
other left side of road driving countries). By way of further
example, identifying a window in the front facing camera(s) (e.g.,
within an image captured by such camera) to the left of a user (as
perceived by the camera(s)) is relatively likely to indicate that a
passenger is operating such a device.
[0724] In certain implementations, one or more visual captures
captured using a front-facing camera(s) (or other device camera(s))
of a device can be processed to determine the head/face angle (that
is, the angle at which the head or face of the user is oriented,
such as with respect to a device/camera) and/or gaze angle (that
is, the angle at which the eye(s) of the user are oriented, such as
with respect to a device/camera, which may differ from the
head/face angle) of the user, such as in relation to the device
and, based on such angles and/or based upon the variability of such
angles over time, the in-vehicle role of the user of the device can
be determined. For example, passengers are likely to exhibit
certain head and/or gaze angles in relation to a device and/or in
relation to a vehicle that drivers are relatively less likely to be
able to. In addition, passengers are relatively likely to be able
to maintain certain head and/or gaze angles in relation to a mobile
device and/or in relation to a vehicle for longer lengths of time
and/or with less variability than drivers can (because, for
example, passengers are less likely to have to look at the road
ahead).
[0725] FIG. 57 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0726] At 5710, one or more visual captures (e.g., digital images,
videos, etc.) can be captured and/or received.
[0727] At 5720, the one or more visual captures (such as those
received at 5710) can be processed. In doing so, a head/face angle
and/or an eye gaze angle can be determined (e.g., using one or more
facial recognition and/or image analysis techniques such as are
known to those of ordinary skill in the art). In certain
implementations, such a head/face angle and/or an eye gaze angle
can be determined in relation to a device (e.g., a smartphone or
other mobile device, such as a device that was used to capture the
visual captures). Moreover, in certain implementations the
referenced visual captures can be processed to determine whether
the head angle and/or the eye gaze angle are maintained with
respect to the device (e.g., within a defined margin of error) for
at least a defined chronological interval (e.g., 10 seconds). Doing
so can ensure that a driver cannot simply momentarily orient
his/her head/face or eyes at a certain angle (e.g., looking `down`
towards a mobile device that is lying flat) and then change his/her
head/face/eye orientation.
[0728] Additionally, in certain implementations the referenced
visual captures can be processed to determine a head/face
orientation angle in relation to a device and an eye gaze angle in
relation to the head/face orientation (reflecting, for example,
whether the eye gaze angle of a user is or is not relatively
consistent with the head/face orientation angle). Doing so can be
advantageous in that it can enable the identification of scenarios
in which the head/face of a user is oriented at one angle but the
eye gaze of the user is oriented at a different angle--reflecting
that the user is looking away (e.g., in an attempt to authenticate
him/herself as a passenger while looking away with their eyes and
continuing to drive).
[0729] At 5730, the defined chronological interval (such as the
interval with respect to which the head/face and/or eye gaze angle
is to be maintained, such as at 5720) can be adjusted. In certain
implementations, such an interval can be adjusted based on a
determined speed (e.g., the speed at which the device and/or the
vehicle within which it is present, can be determined to be
traveling). By way of illustration, as noted the described
technique(s) can be configured to account for the speed of the
vehicle (as can be obtained, for example, through GPS or an
in-vehicle system). It can be advantageous to do so because the
abilities of passengers and drivers may become more and more
different as the vehicle speed increases because the driver is
likely to need to dedicate greater attention to driving and thus is
relatively less likely to be able to hold the referenced gaze, over
a period of time. For example, if a device and/or vehicle is
determined to be traveling below 40 miles per hour, the described
technologies may be configured to instruct/require the user to
maintain his/her head/face and/or eye gaze angle(s) for a 10 second
interval, while if the device and/or vehicle is determined to be
traveling above 40 miles per hour, the described technologies may
be configured to instruct/require the user to maintain his/her
head/face and/or eye gaze angle(s) for a 5 second interval.
[0730] At 5740, an orientation angle of the device relative to the
ground (or any other such surface) can be determined. In certain
implementations, such an orientation angle can be required to be a
substantially flat orientation (e.g., as depicted in FIG. 15G and
described in detail herein).
[0731] At 5750, the head/face angle and/or the eye gaze angle (such
as are determined at 5720) can be compared to the orientation angle
of the device (such as is determined at 5740). In doing so, a
relationship between the head/face angle and/or the eye gaze angle
and the orientation angle of the device can be determined.
[0732] At 5760, based on the head/face angle and/or the eye gaze
angle (such as are determined at 5720) and/or the relationship
between the head/face angle and/or the eye gaze angle and the
orientation angle of the device (such as is determined at 5750), a
relative likelihood that a user of the device is a driver or a
passenger can be computed.
[0733] Moreover, in certain implementations, a relative likelihood
that a user of the device is a driver or a passenger can be
computed based on (a) the head/face orientation angle in relation
to the device (such as are determined at 5720), (b) the eye gaze
angle in relation to the head orientation (such as is determined at
5720), and (c) an orientation angle of the device in relation to
the ground (such as is determined at 5740).
[0734] At 5770, an implementation of a restriction at a device can
be modified. In certain implementations, such an implementation of
a restriction can be modified based on the relative likelihood that
a user of the device is a driver or a passenger (e.g., as computed
at 5760).
[0735] By way of further illustration, it can be appreciated that,
in some cases, requiring certain orientations of a mobile device
when performing certain types of user authentication/verification
techniques can serve as a surrogate for requiring that the user's
face and/or eyes are directed in a certain manner (e.g., so that
the user cannot simultaneously look at the road and successfully
perform the authentication/verification task). As such, by
requiring that the direction, orientation, and/or angle of the
head/face of a user and/or the eye gaze of the user to be within
(or not within) one or more range(s), such verification techniques
and tasks can be even more difficult to falsely authenticate.
[0736] For example, in order to determine the head/face angle of a
user relative to the ground/earth (and, in certain implementations,
determine whether it is within one or more range(s)), (i) the angle
of the device (e.g., a smartphone) relative to the ground/earth can
be determined (e.g., based on inputs originating from the
accelerometer, compass, magnetometer, etc. of the device, such as
in a manner known to those of ordinary skill in the art) and (ii)
the angle of the head/face of the user relative to the device can
be determined (e.g., via image analysis of visual captures
originating at the camera of the device). It should be understood
that, in certain implementations, there may be no requirements on
(i) or (ii) individually, but on the combination of the result of
measurements (i) and (ii) together (note, in practice, in certain
implementations there may be some practical requirements on (i) and
(ii) individually, due to of factors like camera distortion).
[0737] Additionally, in order to determine the eye gaze angle of a
user relative to the ground/earth (and, in certain implementations,
require it to be within one or more range(s)), (i) the angle of the
orientation of the device relative to the ground/earth can be
determined (e.g., based on inputs originating from the
accelerometer, compass, magnetometer, etc. of the device, such as
in a manner known to those of ordinary skill in the art), (ii) the
angle of the head/face of the user relative to the device can be
determined (e.g., via image analysis of visual captures originating
at the camera of the device), and (iii) the angle of the eye gaze
of the user relative to his/her face can be determined. It should
be understood that, in certain implementations, there may be no
requirements on (i), (ii) or (iii) individually, though there may
be requirements on the combination of the results of (i) and (ii)
and (iii) together (note, in practice, in certain implementations
there may be some practical requirements on (i) and (ii) and (iii)
individually because of factors like camera distortion).
[0738] While visual capture(s) can be used to enable passengers to
actively authenticate themselves as such, such as is described
herein, such technologies can also be used to enable determination
of an in-vehicle role and/or in-vehicle location of the user of a
device and/or the likelihood thereof (e.g., in a passive manner).
For example, a visual capture (e.g., together with the orientation
of the capturing device relative to the earth and/or relative to
the vehicle) can be processed to match one or more pattern(s) that
can be identified within the visual capture to determine the
location of a mobile device within the vehicle and/or the
make/model of the vehicle that the device is present within. For
example, using a database of physical properties of vehicle
interiors (which may include, for example, visual captures of such
interiors, spacing information/specifications, object location,
colorings, consistencies, ceiling, floor and side markings as
provided, for example, by vehicle manufacturers and/or from
crowdsourcing), captured images, videos, etc., including views of
the vehicle from different device positions and/or orientations can
be utilized, e.g., to compare with various patterns (e.g., feature
extractions) within a visual capture originating from a device
(e.g., in addition to one or more other techniques described herein
or known to those of ordinary skill in the art) to determine the
in-vehicle location of the device.
[0739] In another implementation, various machine learning
techniques can be employed with respect to visual capture(s) using
supervised (and/or unsupervised) training sets to better determine
how to associate such captures with in-vehicle locations and/or
in-vehicle roles. Such techniques can be applied on a device by
device basis, for a larger population or for a combination of the
two. For example, a device can learn the ceiling of a car in which
a person commutes in regularly and, for example, after collecting
information over several trips, be able to identify the in-vehicle
location of a device in that car, and/or by matching visual
captures against a database of car ceilings/interiors.
[0740] It should be noted that such a database may also include
views (actual or generated) of the interior of a vehicle in
different lighting conditions (e.g., day vs. night) and/or the
ability to compare actual visual captures taken with
simulations/projections of what such interiors are likely to look
like and/or different lighting conditions (with or without ever
actually rendering them).
[0741] In another embodiment, comparable technique(s) can be
applied to determine the mode of transportation and/or vehicle
class that a device is present within (together with or without
various others vehicle class determination techniques described
herein or known to those of skill in the art). For example, it can
be appreciated that the patterns and/or physical properties of
interiors of different vehicles classes are likely to perceptibly
differ from one another. For example, a visual capture originating
from a device in a passenger car is likely to depict lower ceilings
and a narrower interior and smaller windows as compared to a
comparable visual capture originating from a device present within
a train or a bus. Here, too, in addition to determining the vehicle
class based upon such perceived distances within a visual capture,
the visual capture can be compared to a database of visual captures
to determine the class of vehicle that a device is in.
[0742] In certain implementations, a visual capture can be
processed using similar techniques to determine whether a user is
traveling on public transportation (e.g., bus or train), in which
case, most/all surrounding devices can be determined to be likely
to be passenger devices (and thus neither the in-vehicle location
nor in-vehicle role associated with such a device necessarily need
be determined) or non-public transportation (e.g., a car) in which
case such determinations can be performed. (It should be noted that
various techniques, such as those described herein, can be employed
to restrict the devices of public transportation drivers/operators
to ensure that their devices would not enjoy such a public
transportation exemption).
[0743] In yet another embodiment, a visual capture can also be
processed to improve (e.g., based on accuracy, power, latency,
etc.) the techniques described herein (or those of others) that
attempt to determine whether or not a device is present within a
vehicle or a device (and/or its user) is present outside of a
vehicle and/or engaged in another form of activity (with or without
various other trip detection and/or activity recognition techniques
described herein or known to those of ordinary skill in the art).
For example, a visual capture originating from a device present
outside a vehicle can be differentiated/distinguished from one
taken inside a vehicle. A visual capture that can be processed to
identify a pattern associated with a sidewalk (as captured from a
then downward-facing camera) or open sky (as captured from a then
upward-facing camera) can be determined to be likely to be outside
a vehicle. By way of further example, identifying a pattern that
shows a background consisting of office ceiling tiles with a
certain geometry (as captured from a then upward-facing camera) can
indicate that the device is present indoors (i.e., not within a
vehicle), while the presence of window patterns, headrests,
seatbelts, a steering wheel or gas pedals, etc, can be determined
to be likely be in a vehicle. Different levels of light (adjusted,
as needed for time of day, geography, weather conditions etc.), can
also be utilized to differentiate between devices inside vehicles
and those outside vehicles, and different levels of light between
multiple cameras on the same device can serve as a further
indication of the same, such as is described herein.
[0744] Moreover, in certain scenarios, multiple cameras can be used
"stereophonically" to more accurately determine the device's
in-vehicle location.
[0745] In a scenario in which one or more of the visual capture
mechanisms is in use by another application impeded,
malfunctioning, etc., a default setting can indicate the device as
belonging to a driver (or a passenger), e.g., until capture of the
visual capture is no longer impeded. This can be done with or
without given a warning notification to the user.
[0746] It should be understood that various techniques described
herein can be employed device-side, server-side, and/or a
combination of both.
[0747] It should also be noted that some of the techniques
described herein may involve identifying objects and/or features or
properties within a still image and/or analyzing changes in the
same or different aspects over more than one image and, in some
cases, in relation to other device sensors (for example, changes in
images as compared to changes perceived in a position and/or
orientation of a device, e.g., at the time the referenced images
are captured, such as in order to better measure distance. For
example, a device determined to have rotated two degrees and in
which an object within various visual captures can be determined to
have moved by 200 pixels, can be used to further determine the
distance between the device and the object which, as previously
described, can be different for different vehicle classes).
[0748] An accelerometer is used on many mobile devices (and/or in
many mobile operating systems) to determine the orientation in
which the device's screen should be displayed (e.g., portrait,
landscape, negative portrait or negative landscape). For example,
if the accelerometer perceives sufficient gravity is falling on its
y-axis, the screen displays in portrait (or negative portrait,
depending on the sign of the y-axis accelerometer value). If the
accelerometer perceives sufficient gravity is falling on the
x-axis, the screen displays in landscape (or negative landscape,
depending on the sign of the x-axis accelerometer value). However,
such techniques are not necessarily effective in scenarios in which
the accelerometer perceives relatively little gravity falling on
either the x-axis or the y-axis (e.g., the device is face up on a
table or being held upside down by someone using it while lying on
her back, where substantially all the gravity falls on the device's
z-axis). Many devices (and/or operating systems) simply continue to
use their last screen-display orientation until the accelerometer
next perceives that sufficient gravity is falling on the x-axis or
the y-axis, whereupon the screen-display orientation is rotated, as
needed, and if different from the last screen-display orientation.
As a result, when a user-device orientation changes (e.g., the user
rotates the device, the user moves his/her person) and the user
wants the screen-display orientation of a device whose device-earth
orientation is substantially flat (e.g., most of the gravity falls
on the z-axis) to adjust appropriately (e.g., to best-face the
user), the user may need to tilt the device to change the
device-earth orientation so that gravity is perceived on the
accelerometer's x-axis or y-axis, as the case may be, before the
screen-display orientation will rotate.
[0749] In order to improve such orientation changes, in one
implementation, one or more visual captures originating from the
device can be processed to identify/determine the orientation of
the user with respect to the device and, based on such user-device
orientation, the screen-display orientation can be rotated, as and
if necessary, to one that which is best facing the user. For
example, if the screen-display orientation is portrait, but the
visual captures can be processed to determine that the user's face
(or head or eyes etc.) is more perpendicular to the device than it
is parallel to it (e.g., the device's positive z-axis is pointed up
relative to earth and the positive y-axis of the user's face is
pointed north whereas the device's positive y-axis is pointed west
(or at least west of north-west or west of south-west)), the screen
display can be rotated to landscape (e.g. continuing this example,
by 90 degrees clockwise if it was rotated from the portrait
screen-display orientation). Or, for example, if the visual
captures can be processed to determine that the user's face (or
head or eyes) is largely parallel to the device but in the opposite
direction (e.g., the device's negative z-axis is pointed up
relative to earth and the positive y-axis of the user's face is
pointed north whereas the device's positive y-axis is pointed south
(or at least south of south-west or south of south-east)), the
screen display is rotated to negative portrait (i.e., to a
screen-display orientation that is 180 degrees from portrait).
[0750] In another implementation, the rotational motion of a device
perceived by its gyroscope can be accounted for in
determining/measuring changes to the user-device orientation of a
device that is in a substantially flat device-earth orientation.
Based on the inputs from the gyroscope (e.g., its yaw readings,
i.e., motion around the device's z-axis), the device's
screen-display orientation can be rotated, as and if needed, to be
the one best-facing the user. For example, if the device's current
screen-display orientation is portrait and the gyroscope's yaw
readings perceive that the device has undergone counter-clockwise
movement around it's z-axis (as observed by someone sitting on the
positive z-axis) whose magnitude and duration can be indicative of
a turn of the device with respect to its z-axis that is within some
range (e.g., between 45 degrees and 135 degrees), the device's
screen-display orientation can be rotated clockwise by 90 degrees
to better align with the user's face.
[0751] In another implementation, the device's magnetometer/compass
can be accounted for in determining/measuring changes to the
user-device orientation of a device that is in a substantially flat
device-earth orientation. Based on the inputs from the
magnetometer/compass (and changes thereto), the device's
screen-display orientation can be rotated, as and if needed, to be
the one best-facing the user. For example, in a scenario in which
the device's current screen-display orientation is portrait and
based on inputs from the device's magnetometer/compass it can be
determined that the device orientation has changed (e.g., with
regard to magnetic north), for example, is has rotated
counter-clockwise around its z-axis (as observed by someone sitting
on the positive z-axis) within some range (e.g., between 45 degrees
and 135 degrees), the device's screen-display orientation can be
rotated clockwise by 90 degrees to better align with the user's
face.
[0752] It should be understood that the described implementations
may be refined (e.g., to reduce power consumption, increase
responsiveness), for example, by computing the user-device
orientation or changes thereto upon determining that the
device-earth orientation is substantially flat and/or upon
determining that the screen is on and/or upon determining that
there has been some motion on the device (as perceived, for
example, by its accelerometer, gyroscope and/or
magnetometer/compass).
[0753] It should also be noted that the above techniques can be
used together, either substantially simultaneously or serially (in
either order) to improve provide results.
[0754] It should also be noted that the described techniques can be
adapted/configured to scenarios in which device screen-display
orientation may be less discrete (e.g., not limited to being at
right angles to the physical device).
[0755] In other implementations, the user can be required to
perform one or more simultaneous tactile interactions with the
device.
[0756] One or more inputs can be processed in order to determine
the number of instances of simultaneous tactile interaction. As
referenced above, examples of such tactile interactions include the
depressing of one or more buttons, and/or the simultaneous tactile
interaction of multiple points and/or locations on a touchscreen
display (commonly known as "multitouch"), as is known to those of
ordinary skill in the art. It can be appreciated that in certain
circumstances, in order to provide two (or more) such simultaneous
tactile interactions, a single user must use both of his/her hands.
In other implementations, in order to provide six (or more) such
simultaneous tactile interactions, a single user must use both of
his/her hands (assuming that a single hand is capable of at most
five simultaneous tactile interactions).
[0757] By way of further illustration, FIG. 15A depicts an
exemplary lock screen, in accordance with at least one embodiment
disclosed herein. It should be understood that while FIG. 15A is
exemplary, it illustrates various aspects of the various approaches
described in detail herein. For example, area 1560 depicts various
blocks where numbers are presented to the user (such as at random).
The user is prompted to input each respective number (e.g., `3`) as
the number is presented. In randomizing the numbers presented, the
user is effectively required to be attentive to the numbers being
presented (as opposed to repeatedly inputting the same user-defined
lock code). Area 1565 (depicting an image of a fingerprint)
corresponds to an area within which the user must maintain constant
contact throughout the authentication/unlock process with at least
one finger (as described in detail herein). In doing so, the user
effectively must dedicate one hand to such constant contact,
thereby necessitating that the other unlock procedures (e.g., the
inputting of the numbers, as referenced above) be performed with
the other hand of the user--thus effectively requiring the user of
both of the hands of a user (and thereby creating a situation
whereby such a procedure is difficult, if not impossible, for a
driver of a vehicle to achieve, especially while diving). Moreover,
a timer 1570 is employed, requiring that the user perform the
required authentication within a specified time period (as
described in detail herein). Moreover, an `Emergency Call` button
1575 enables the user to initiate emergency communications even
without authenticating/unlocking the device, as is also described
herein.
[0758] As referenced above, in certain implementations, various of
the referenced approaches can be employed in combination and/or in
parallel. Such arrangements entail the processing of multiple
inputs, and/or determining one or more characteristics associated
with the operation state of mobile device 105, including but not
limited to: an orientation of mobile device 105, the relative
location of mobile device 105 within the vehicle, a relative
movement of mobile device 105, a stability of mobile device 105,
and/or a number of simultaneous tactile interactions with mobile
device 105. More particularly, it can be appreciated that the
implementation of multiple approaches can further increase the
accuracy of the collective determinations above that of a single
determination, and ultimately ensuring that operation of mobile
device 105 by a driver of the vehicle is prevented and/or
restricted, while operation by a passenger is permitted. Moreover,
such inputs and/or determinations can be processed with other such
determinations, visual captures, and or indicators, in order to
identify relationships therebetween.
[0759] For example, a visual capture can be processed to identify
one or more indicators, and/or to determine the orientation of
mobile device 105 and/or the relative location of the device 105
within a vehicle (using the various image analysis techniques
described in detail above). The visual capture/indicators and/or
other inputs can be processed to determine the stability of device
105, as described in detail above (thus further ensuring that the
device is not being operated by a driver), while also determining a
number of instances of simultaneous tactile interaction, as also
described above. In particular, given that mobile device 105 will
generally need to be supported against a vehicle's window in order
to achieve both a) the proper orientation to obtain a suitable
visual capture that confirms the orientation and/or location of
mobile device 105, and b) the requisite stability (provided by
lodging and/or supporting mobile device 105 against the window,
wall panel, and/or door of the vehicle), it can be appreciated that
achieving even this degree of orientation/stability requires
substantial ongoing control of at least one of a user's hands, as
depicted in FIG. 20. Accordingly, it can be appreciated that a user
must generally use most, if not all of, the fingers from one of
their two hands to orient the device in such a way for any period
of time. Thus, it can be further appreciated that practically any
simultaneous tactile interactions with device 105 would be
exceedingly difficult for a driver of the vehicle who also needs at
least one hand to steer. As such, requiring further interaction
with device 105 (e.g., a multi-finger swipe motion in order to
unlock or otherwise unrestrict the device), in combination with the
above referenced determination(s), can further confirm that such a
device is being operated only by a passenger.
[0760] In certain implementations, a device can be verified to be
operated by a passenger by requiring the user to physically
interact with the device (e.g., perform a multi-touch or swipe)
while the user is pressing the device against a window of the
vehicle in the required orientation in a manner that is likely to
require the use of a second hand. It can be appreciated that a
driver of a moving vehicle cannot easily (if at all) press a device
against the window in the required orientation hold it stably and
interact with it. Let alone on the window on the opposite side of
the vehicle (s)he is driving.
[0761] Then, at step 1542, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, adjusts an implementation of one or more restrictions at/in
relation to mobile device 105. It should be understood that in
various scenarios, adjusting an implementation of a restriction can
entail employing one or more restrictions, modifying an
implementation of one or more previously employed restrictions,
and/or removing one or more previously employed restrictions. It
should be further understood that the adjusting, employing of,
modifying of, and/or removing of one or more restrictions at/in
relation to mobile device 105 is/are preferably effected based on
one or more of the visual captures, indicators, relationship(s),
and presences, and/or determinations referenced above. For example,
based on the identification of one or more indicators (e.g.,
identifying the presence/absence of a steering wheel in a visual
capture, such as a visual capture of the face of the user while the
device is held in a horizontal orientation), one or more
restrictions can be employed (e.g., if a steering wheel is present
in the visual capture, indicating that the user is likely a driver)
and/or removed (e.g., if no steering wheel is present, indicating
that the user is likely to be a passenger).
[0762] By way of further illustration, based on a determination
that device 105 is on the left (driver's) side of the vehicle, a
restriction can be employed whereby the mobile device is no longer
receptive to user inputs. By way of further example, based on a
determination that device 105 is facing out the right-hand window
of the vehicle and is relatively stable, one or more previously
employed restrictions of mobile device 105 can be removed.
[0763] At this juncture, it should be understood that in various
implementations, the accuracy and/or efficacy of certain of the
referenced inputs that are received and/or processed can be
compromised when the vehicle within which the mobile device is
present is engaged in a turn (as determined, for example, based on
inputs originating at accelerometer 145A, gyroscope 145B, or the
magnetometer 145E and/or compass 145M, and as described in greater
detail herein). This is in part due to the various forces that are
present in a turning vehicle that are perceptible by various
sensors such as an accelerometer (e.g., through the centripetal
force shown on its z-accelerometer) and/or gyroscope, which are not
present when the vehicle is traveling substantially straight. Thus,
in certain implementations, the various systems and methods
described herein can be configured such that various operations,
such as the receipt and/or processing of various inputs is
precluded (and/or the results of any processing or determination
that incorporated such results is discounted, discarded, and/or
ignored) when it can be determined that the referenced vehicle is
engaged in a turn, such as in a manner described in detail
herein.
[0764] It should be noted that in certain implementations it can be
useful to loosen one or more restrictions (e.g., have them appear
intermittently--either at random, at some fixed rate or dynamically
according to certain events) after the device user (who has already
passenger authenticated) has and/or continues to interact with the
device in a manner that further suggests that the user is the
passenger by, for example, (a) using the keyboard at a good speed:
(b) using the keyboard with low and/or consistent inter-key time
variations; (c) using the keyboard with a low level of
typographical mistakes: (d) exhibiting device movement that is
consistent with that of a passenger.
[0765] Moreover, in certain of the implementations described
herein, as long as a vehicle occupant does not successfully
authenticate as a passenger (and, optionally, even if the user
does), it can be useful to allow the user to operate and/or
interact with the device via voice (e.g., voice-to-text,
voice-to-command, text-to-voice). This feature can optionally be
limited to devices that are in a cradle and/or are being used in a
hands-free manner.
[0766] Turning now to FIG. 16, a flow diagram is described showing
a routine 1600 that illustrates a broad aspect of a method for
selectively restricting operation of a mobile device 105 in
accordance with at least one embodiment disclosed herein.
[0767] At step 1610, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
receives one or more visual captures, substantially in the manner
described above with respect to step 1510.
[0768] Then, at step 1620, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, processes at least one of the visual captures (such as those
received at step 1510) to identify one or more indicators within
the visual capture, substantially in the manner described above
with respect to step 1620.
[0769] At step 1622, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
receives one or more inputs, such as a directional heading of
mobile device 105 originating at from GPS receiver 145C,
substantially in the manner described above with respect to step
710.
[0770] At step 1623, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
receives one or more inputs, such as a directional input 105
originating at from magnetometer 145E and/or compass 145M,
substantially in the manner described above with respect to step
710.
[0771] At step 1623A, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, computes one or more determinations, such as determinations
reflecting orientation/position of mobile device 105. By way of
example, an input from the accelerometer can be received,
preferably reflecting the X-axis position, and such input can be
processed to confirm that the device is being held in the required
position with respect to the X-axis, such as in the manner
described herein. Moreover, in certain implementations various of
the methods described herein can be employed which determine the
degree of stability and/or the amount of "shake" present at the
mobile device, based on which it can be determined whether the
device is oriented against a door/window of a vehicle, such as in
the manner described above with respect to FIG. 15.
[0772] Then, at step 1624, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, processes the received inputs, including the directional
heading and the directional input, and such input can be processed
to confirm that the device is being held in the required
orientation with respect to its Y-axis. That is, it can be
appreciated that the directional heading originating at the GPS can
be correlated with the directional input(s) from the
magnetometer/compass in order determine the orientation of the
Y-axis of mobile device 105, as is known to those of ordinary skill
in the art.
[0773] At step 1626, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
further processes the relative orientation of a mobile device, such
as of a device held in the required orientation with respect to its
x-axis (such as that determined at step 1623A), with at least one
of the visual capture (such as that received at step 1610) and the
one or more indicators (such as those identified at step 1620) to
determine the device's relative orientation. It should be
understood that in certain implementations, in doing so, it can be
confirmed that the device is being held in the proper Y-axis
orientation, i.e., if the device's positive Y-axis is pointed in
the direction of the vehicle. It certain implementations, it may be
useful to compare the device's Y-axis orientation as determined in
step 1624 with the device's Y-axis orientation determined in this
step. Such would be particularly useful in correcting a situation
where the device was incorrectly placed on the left window of the
vehicle in the required X-axis orientation and with the rear facing
camera point out (i.e., to the left side), but which rear facing
camera was incorrectly identified from the visual capture to be
pointing to the right because a vehicle that was moving faster than
the vehicle in which the device is present was seen in the visual
capture. It should be further understood that in certain
implementations the required orientation of the rear-facing camera
of the device facing out against the window can be confirmed,
and/or can be confirmed/determined to not be held facing out of the
window based upon evidence in the visual capture originating at the
device (e.g., by determining whether or that one or more interior
components of the vehicle, e.g., the window pane, door, etc., are
present in the visual capture) and can be confirmed to be facing
out against the right window based upon the direction of movement
of objects as is described in detail herein. It should also be
understood that various additional confirmation approaches can be
employed, such as various multi-touch and/or 2.sup.nd camera
methods, such as those described in detail herein. It can be
further appreciated that computing such a correlation enables the
further determination of the relative location of device 105 within
the vehicle. In determining the orientation of device 105, such as
a mobile device held in the required orientation referenced above
(as determined based on the GPS and compass headings), the
perspective of the visual capture can be further appreciated,
thereby enabling the determination of where the user is/is not
seated within the vehicle, and thus to what degree of likelihood
the user is/is not the driver and/or passenger of the vehicle.
[0774] The required orientation consists of three parts: (1)
X-axis, (2) Y-axis, (3) pressed against (right) window,
(forward-facing camera pointing out).
[0775] Accordingly, it should be understood that the operations
described with respect to steps 1623A-1626 pertain to various
aspects of the "required orientation" as described herein. It
should be understood that the "required orientation" preferably
consists of/incorporates three parts/aspects/determinations: (1)
X-axis, (2) Y-axis, and (3) that the device is pressed against the
window of a vehicle, preferably with the rear-facing camera of the
device facing out.
[0776] Accordingly, it should be understood that inputs originating
at the X-axis accelerometer can be processed to confirm that the
device is being held in the required X-axis orientation, i.e.,
landscape orientation, as described herein. Moreover, inputs
originating at the camera (i.e., visual captures) can be processed,
wherein generally stationary/slower moving objects should move from
left to right, and/or GPS heading can be processed against the
magnetometer direction to confirm the required Y-axis orientation,
i.e., positive Y-axis in direction of vehicle's movement. It can be
appreciated that doing so also establishes that the camera (i.e.,
the rear facing camera) is pointing to the right. Moreover, the
degree of "shake" perceived/determined at the device (as it can be
appreciated that a device shakes relatively less when held against
a window than when held by hand) and/or aspects determined based on
the visual capture (being that a device held against window will
not show interior components of vehicle) can be processed to
confirm that the device is pressed against window. Based on the
combined processing of these elements, it can be determined that
the device is oriented at the right-hand side window of the
vehicle, as described herein.
[0777] By way of further illustrations, it should be understood
that one or more of the above referenced implementations (e.g., the
visual capture processing, the stability determination, etc.) can
be further enhanced (or, alternatively, the present implementation
can be employed independently, without connection to any other of
the implementations described herein) by verifying that the device
is pressed against the right window in the required orientation by
using the GPS sensor and the magnetometer and/or compass to verify
that the orientation of the mobile device is consistent with being
pressed against the right window of a vehicle in the correct
orientation (as described in detail above). For example, it can be
appreciated that in a scenario where a device is pressed against
the left-hand side window of a vehicle window in an attempt to
fraudulently authenticate the device in the manner described
herein, such a device would still provide a GPS heading that is
discernibly different than a device comparably positioned against
the right-hand window of the vehicle. Accordingly, even in a
scenario where other of the above-referenced implementations do not
accurately determine the identity of the use of the device (as a
driver or passenger), the present approach can provide an accurate
determination/authentication of the identity of the user of the
device as a driver or passenger.
[0778] Then, at step 1642, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, adjusts an implementation of one or more restrictions at/in
relation to mobile device 105 (that is, employs one or more
restrictions, modifies an implementation of one or more previously
employed restrictions, and/or removes one or more previously
employed restrictions) based on the correlation, substantially in
the manner described in detail above with respect to step 1542.
[0779] Turning now to FIG. 17, a flow diagram is described showing
a routine 1700 that illustrates a broad aspect of a method for
authenticating an in vehicle role of a user of a mobile device
and/or modifying a restriction of a mobile device 105 in accordance
with at least one embodiment disclosed herein.
[0780] It can be appreciated that in order for a user to utilize
the functionality of the integrated camera 145F of mobile device
105, such a user must grasp and/or come into contact with mobile
device 105 with at least one hand. As such, it can be further
appreciated that a visual capture taken by camera 145F that depicts
two hands of a driver can be determined to be likely to have been
taken by a user other than the driver of a vehicle, as will be
described in greater detail below.
[0781] At step 1705, processor 110 executing one or more of
software modules 130, including preferably, restriction module 171,
employs one or more restrictions at mobile device 105 and/or in
relation to mobile device 105, substantially in the manner
described above with respect to step 1505. By way of illustration,
in certain implementations such restrictions can configure the
mobile device 105 to operate only in landscape mode (that is,
depicting the content/user interface shown on the display of the
mobile device be depicted only in a landscape, i.e., lengthwise
fashion) and/or in landscape orientation (that is, requiring that
the X-axis of the mobile device must detect gravity, as is known to
those of ordinary skill in the art--e.g., when held lengthwise--an
orientation that generally requires two hands to effectively
navigate and/or provide inputs to), as is known to those of
ordinary skill in the art. By way of further illustration, in
certain implementations such restrictions can configure mobile
device 105 to receive various inputs only when the mobile device is
oriented at a defined orientation and/or within a defined range of
orientations (as can be determined using the accelerometer and/or
gyroscope of the device). It should also be noted that in certain
implementations, the various restrictions employed at/in relation
to the mobile device 105 do not preclude partial and/or full
operation of the device using voice commands, as is known to those
of ordinary skill in the art. Moreover, in certain implementations,
the restrictions do not preclude operation of the device for
emergency purposes, such as to call or text `911,` as is also known
to those of ordinary skill in the art.
[0782] It should be noted that in scenarios where a device is
oriented nearly flat (as if it were on a table) it can be difficult
to determine whether the device is being held in portrait or
landscape orientation, i.e., whether the Y-axis of the device is
pointed towards/away from the user (i.e., portrait orientation) or
whether it is perpendicular to the user (i.e., landscape
orientation) because the X and Y accelerometers, which are
generally used to determine such, have zero readings in this
orientation.
[0783] The portrait vs. landscape orientation of such devices can
nonetheless be determined in cases where the device is
held/oriented in such "flat on a table" or nearly "flat on a table"
positions based on observations as to how the values associated
with the accelerometer and/or gyroscopes of a device change over
time and how the "flatness" of the device fluctuates over time (as
users generally cannot hold the device perfectly still). For
example, a device that is determined to be nearly flat and in
portrait orientation (i.e., with its Y-axis pointed at the user)
will tend to have greater pitch than roll, whereas were the same
device positioned in landscape orientation (i.e., with its X-axis
pointed at the user), it would tend to have greater roll than
pitch. As such, devices that are held flat and that exhibit greater
pitch than roll can be determined to be in portrait orientation
and, based on such a determination, can be configured such that the
user interface presented on their screens is also in portrait mode,
whereas devices that exhibit greater roll than pitch can be
determined to be in landscape orientation and, based on such a
determination can be configured such that the user interface
presented on their screens is also in landscape mode, for
example.
[0784] At step 1707, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, prompts a user of the mobile device 105 to initiate and/or
provide one or more first inputs at mobile device 105,
substantially in the manner described above with respect to step
707. At this juncture, it should be noted that in certain
implementations, such prompting includes the presentation, display
and/or projection of prompts to the user in an obfuscated and/or
obscured manner. That is, such prompts are preferably presented,
displayed, and/or projected in one or more ways that require
increased concentration and/or attention in order for a user to
properly observe and comprehend/appreciate the prompting. Such
obscuring/obfuscating of the various prompts/prompting serves to
convey the information contained in the prompting (e.g., a word or
string that the user must type) in such a way that is relatively
more difficult for a driver to appreciate/understand (given that
the driver is likely to be distracted by and/or concentrating on
various ongoing driving-related tasks) than for a passenger to
appreciate/understand (given that the passenger is less likely to
be so distracted/concentrated).
[0785] By way of illustration, in certain implementations, such as
those in which at least some portion of the referenced prompting is
conveyed to the user visually (e.g., through the screen of the
device), it can be useful to have some or all of such information
presented, displayed, and/or projected in a manner that makes it
more difficult for someone that is less able to pay close attention
to the existence and/or content of such visual information that is
required to successfully complete the required action(s), thereby
increasing the difficulty for a user who is driving to successfully
complete the requested stimulus/input. For example, such visual
information can appear for only a short period of time and/or a
non-constant time interval (including intervals of time that
contain random components) so that a driver of a moving vehicle,
who is relatively less able to focus on such visual information, is
more likely to miss and/or not see it and/or not process such
prompting information (or at least not comprehend/understand it as
quickly as a passenger would, on average), thereby further
preventing a driver of a device from successfully unlocking such a
device (and/or fraudulently authenticating such a device as if the
user were a passenger). Moreover, in other implementations, such
prompting information can be displayed in a different manner (e.g.,
in a different location, orientation, color, font and/or shape),
consistently and/or periodically. In doing so, it can be
appreciated that the ongoing changing of the manner or manners in
which such prompts are presented, displayed, and/or projected
introduces greater unpredictability for the user viewing/expecting
the prompting, thereby increasing the difficulty to the driver in
anticipating/appreciating the prompting, as described.
[0786] At step 1710, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
receives at least a first input. Such inputs can include, but are
not limited to: alphanumeric inputs provided in response to a
prompt (such as a CAPTCHA prompt, as is known to those of ordinary
skill in the art), inputs provided during the course of an
interactive game, inputs provided in a lock screen, inputs provided
during the course of an interactive puzzle, one or more tactile
gestures (such as one or more swipe gestures) provided at a tactile
sensor such as a touchscreen of the mobile device 105, one or more
visual capture(s) and/or one or more inputs from one or more of an
accelerometer a gyroscope, a GPS receiver, a microphone, a
magnetometer, a camera, a light sensor, a temperature sensor, an
altitude sensor, a pressure sensor, a proximity sensor, a
near-field communication (NFC) device, a compass, user interface,
device buttons, a communications interface, and a vehicle data
system.
[0787] Then, at step 1720, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, processes the one or more first inputs (such as those received
at step 1710) to compute a first determination, the first
determination reflecting at least one in-vehicle role indicator
which relates to the in-vehicle role of the user of the device as
being either a driver or a passenger. This determination,
reflecting an in-vehicle role of the user as a driver/passenger,
preferably reflects an indication, such as one present in a
particular interaction with the mobile device 105, that the user of
mobile device 105 is/is not reflecting behavior that conforms with
that which can be determined to be associated with drivers and/or
passengers. As will be illustrated in greater detail below, it
should be understood that certain in-vehicle role indicators can
enable determinations regarding the role of a first user based on
inputs such as visual captures that reflect aspects of another user
(for example, if a first user takes a picture of a second user who
is driving a car, it can be determined, based on an identification
of the second user as a driver, that the first user is not a
driver, and thus is a passenger), while other in-vehicle role
indicators can enable determinations based on inputs such as visual
captures that reflect aspects of the user him/herself.
[0788] By way of example, in one arrangement a visual capture
(e.g., a digital image or video) can be processed, such as using
image recognition techniques known to those of ordinary skill in
the art, to identify, within the visual capture, two hands grasping
a steering wheel. It can be appreciated that a user grasping the
steering wheel of a vehicle can be determined to be likely to be
the driver of the vehicle. However, based on the identification of
two hands on the steering wheel, it can be further determined that
only a passenger in the vehicle is likely to be capable of
capturing such a picture using mobile device 105. (It should be
understood that in certain implementations, further advanced image
processing techniques can be employed, whereby the two hands
identified on the steering wheel can be analyzed to determine that
the two hands are substantially similar, and thus arc likely to
belong to the driver--as opposed to the driver placing one hand on
the wheel, and the passenger placing another or the angle of the
visual capture can be processed/analyzed to determine that the
device is not likely to have been in a cradle or to require that
the second camera of the device, if available, also record a visual
capture which can be processed to make sure there are no signs
therein indicating that the driver performed the visual capture,
such as in the manner described herein.) Thus, it can be
appreciated that in such implementations, while the visual capture
itself depicts the hands of a driver, based on such a visual
capture one or more determinations can be computed regarding the
likelihood that the identity of the user that captured the picture
(that is, the user of the mobile device 105) is a passenger.
[0789] By way of further example, in another implementation a
visual capture can be received and processed, such as by using
image recognition techniques known to those of ordinary skill in
the art, to identify, within the visual capture, the positioning
and/or orientation of a seat belt in relation to a user. For
instance, if the visual capture depicts a seatbelt as stretching
from the right shoulder of a user to the left thigh of a user, it
can be reasonably determined that the pictured user is a passenger
and not a driver.
[0790] By way of further example, in another implementation a user
may authenticate himself as a passenger by facilitating the
capture/receipt of a visual capture by the mobile device (e.g.,
from one or more of the device's cameras, such as a front-facing
camera) that can be determined (e.g., via one or more image
processing techniques) to include the following elements: (i) a
seat belt starting from the area of the user's right shoulder (or
left shoulder for certain countries like the U.K. which drive on
the left side of the road), (ii) the user's face, and/or (iii) the
window to the user's right. Such a visual capture can be analyzed
to determine whether or not it such elements can be determined to
be preset therein, such as by using image processing techniques
know to those of ordinary skill in the art.
[0791] By way of further example, such a technique may also be
implemented in a relatively `passive` manner, such as to make the
same or similar determinations based on visual capture(s) that are
captured/received in the same or similar manners, even without any
direct assistance, input, or activity on the part of the user
(e.g., by performing such analysis periodically and/or continuously
on visual captures that are captured/perceived by a camera of the
device).
[0792] Moreover, in certain implementations, in an effort to
prevent potential "spoofing" (that is, fraudulent
authentication/verification) by drivers in which a driver might
place a strip of material (e.g., affixed to her shirt) in a manner
appropriate to authenticate as a passenger, based on a
determination that a sound or tone that corresponds to a
notification/indication (e.g., by the vehicle) that an occupant's
seat belt is not fastened while the vehicle is in motion is (or
was) audible (e.g., as perceived by one or more of the device's
microphones), the authentication attempt can be terminated/ended in
failure.
[0793] By way of further example, in certain embodiments, an
in-vehicle role of a user can be determined if, the user can
configure the device to capture a visual capture that can be
processed to identify one or more indicators which, implicitly or
explicitly indicate that there is a passenger in the car. (It
should be understood that such visual capture(s) are preferably
captured while the vehicle is in motion, as described in detail
above). For example, as referenced above, if the user is able to
take a visual capture of two hands on the steering wheel, the user
of such device can be determined to be a passenger (as a driver
generally cannot both take a visual capture with the device and
hold the steering wheel with two hands). By way of further example,
if the user of the device takes a visual capture within which a
seatbelt going from the right shoulder of the user to left thigh of
the user can be identified, the user of such a device can be
determined to be a passenger (being that a visual capture that a
driver would take of him/herself is likely to show a seatbelt going
in the opposite direction).
[0794] At this juncture, it should be noted that in certain
implementations, various other inputs, including but not limited to
visual capture(s), can be received and/or processed in order to
determine an in-vehicle role of a user of mobile device 105. For
example, mobile device 105 can be positioned (such as in a dock)
such that visual capture(s) received by/at the mobile device relate
to a user's gaze (captured using a front-facing and/or rear-facing
camera of the mobile device, depending on the orientation of the
device, as can be appreciated by those of ordinary skill in the
art). That is, the visual capture can be analyzed/processed using
image processing techniques known to those of ordinary skill in the
art, to identify the movements of a user's eyes, preferably while
the vehicle is in motion (as can be determined based on various
inputs, such as the accelerometer 145A). By way of illustration, if
analysis of the visual capture reveals that the gaze of the eyes of
the user of the device constantly and quickly returns to the
direction of the windshield, it can be determined that the user is
likely the driver (as such a pattern would be typical of a driver
who needs to maintain ongoing view of the road while driving).
[0795] By way of further illustration, in certain implementations,
an in-vehicle role of a user of a mobile device can be determined
to be a passenger if, while the vehicle is in motion, the user is
able to configure the device to take a visual capture based upon
which it can be identified (such as through image processing
techniques as referenced herein) that the user is able to look
(i.e., focus his head and/or gaze/vision) in a manner that only a
passenger can and/or a driver cannot. For example, if it can be
determined, such as through the referenced image processing
analysis of the visual capture, that the user of the device is
capable of maintaining a substantially consistent/continuous
look/gaze in the direction of the device for a defined period or
certain periods of time, the in-vehicle role of such a user can be
determined to be a passenger.
[0796] At step 1725, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, validates one or more determinations, such as the
determinations computed at step 1720. That is, as referenced
herein, it can be appreciated that under certain circumstances
and/or scenarios, any number of determination approaches can be
susceptible to error and/or fraud. As such, it can be advantageous
to further validate such determinations, thereby increasing the
respective accuracy of each determination. The particulars of such
validations will be described with reference to FIG. 17A.
[0797] Turning now to FIG. 17A, at step 1726, processor 110
executing one or more of software modules 130, including,
preferably, restriction module 171, receives one or more second
inputs, substantially in the manner described in detail above with
respect to step 1710. In certain implementations, such second
inputs are preferably different inputs from those received at step
1710 (by virtue of the second inputs originating from a different
sensor and/or source, or by virtue of the second inputs being a
separate input instance from the first input). By way of example,
such second inputs can be received from the accelerometer and/or
the gyroscope of mobile device 105.
[0798] At step 1727, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, processes the second inputs (such as those received at step
1726) to compute a second determination, substantially in the
manner described in detail above with respect to step 1720. In
certain implementations (even those where the second input
originates from the same source as the first input) the second
determination is preferably independent of the first determination,
such as the determination computed at step 1720. By way of
illustration the second determination (computed based upon inputs
received from the gyroscope and/or accelerometer of the device) can
reflect an orientation of the device, such as an orientation of the
device with respect to the ground/earth. By way of further
illustration, the second determination (computed based upon inputs
received from the gyroscope, accelerometer, and/or GPS/magnetometer
of the device) can reflect an orientation of the device, such as an
orientation of the device with respect to the vehicle within which
the device is present, as described herein. By way of further
illustration, the second determination (computed based upon inputs
received from the gyroscope and/or accelerometer of the device) can
reflect a pattern or trend that reflects the manner in which the
vehicle within which the device is present is moving (e.g.,
reflecting acceleration, deceleration stability, etc.). By way of
further illustration, in an implementation where it can be
determined that the focus of the user's gaze towards the windshield
(as identified based on the processing of a visual capture, as
described herein) tends to increase during periods of acceleration,
fast speed, and/or other movements, this correlation can indicate
that the user is a driver (as a driver is likely to pay additional
attention to the road as such driving events occur). (It should be
noted that mobile devices 105 having dual cameras that is, cameras
on both their anterior and posterior sides, as are well known to
those of ordinary skill in the art, are well suited for the
referenced determinations, as they enable visual captures of both a
user's gaze as well as the scenery outside the vehicle's
windshield.) At step 1728, processor 110 executing one or more of
software modules 130, including preferably, restriction module 171,
determines a validity of at least one of the first determination
and/or the second determination. In certain implementations, the
validity is determined by comparing the determinations and/or
identifying correlations, relationships, patterns, correspondences,
and/or discrepancies between them. By way of further illustration,
in certain implementations, if it can be determined, such as
through the referenced image processing analysis of the visual
capture, that the user of the device is capable of maintaining a
substantially consistent/continuous look/gaze in the direction of
the device for a defined period or certain periods of time, while
the device is held in a certain manner, such as at a particular
orientation (as can be determined, for example, using the
accelerometer/gyroscope of the mobile device 105), the in-vehicle
role of such a user can be determined to be a passenger. It can be
appreciated that by requiring that the user maintain his/her
look/gaze towards the mobile device while the device is positioned
at a particular orientation, such as an orientation and/or a range
of orientations that entails the device being positioned
substantially horizontally, a user can effectively be prevented
from simultaneously looking at the device and also looking at the
road ahead. For example, in a scenario where the angle of the
device (as can be measured/determined, for example, using inputs
originating from the accelerometer and/or gyroscope of the device)
is oriented more than a defined threshold amount/number of degrees
(e.g., 10, 20, or 30 degrees) (upward/downward/rightward/leftward
or some combination thereof) from the typical line of sight of the
driver in a moving car, such as is depicted, for example, in FIG.
17B, the in-vehicle role of a user who is capable of maintaining a
substantially consistent look/gaze toward the mobile device (as
determined through an analysis of the visual capture, as described
above) while the device maintains such an orientation can be
determined to be a passenger (since it is highly unlikely that a
driver of a moving vehicle is capable of maintaining such a gaze
towards the mobile device while the mobile device is so oriented,
while also effectively driving a moving vehicle). It should be
understood that the referenced examples are merely exemplary, and
that numerous other implementations are also contemplated,
utilizing other inputs, as can be appreciated by those of ordinary
skill in the art.
[0799] At this juncture, it should be noted that in certain
implementations, the various visual capture(s) referenced herein
can be processed against one or more databases, such as databases
that maintain images/photographs, and such processing can be
further utilized in determining the in-vehicle role of a user of a
mobile device. For example, it can be appreciated that many
regulatory agencies (such as a department of motor vehicles)
maintain databases of images of all licensed drivers within a
particular jurisdiction. Moreover, it can be appreciated that
certain mobile device users, such as children, the visually
impaired, and/or the elderly, can frequently travel in vehicles
despite the fact that these individuals do not drive, by virtue of
the fact that they are not licensed to drive. Thus, in certain
implementations, the visual capture of the face of a user can be
processed against such a database that maintains photographs of
licensed drivers. Using image recognition techniques known to those
of ordinary skill in the art, if one (or more) photographs from the
licensed driver database are identified as substantially similar to
the image capture of the face of the user of the mobile device, it
can be determined that the user is more likely to be a driver (by
virtue of the fact that such a user is known to at least possibly
be a licensed driver, and thus can have a propensity to drive).
Conversely, if no photographs from such a database are identified
as being substantially similar y to the image capture of the face
of the user of the mobile device, it can be determined that the
user is more likely to be a passenger (by virtue of the fact that
such a user may not even possess a license to drive).
[0800] By way of further illustration, the above referenced
approach (identifying an in-vehicle role of a user based on the
degree to which the user can focus his/her look or gaze) can be
further implemented in conjunction with one or more of the other
approaches described herein. For example, in a scenario where
mobile device 105 is equipped with two cameras (e.g., a
forward-facing camera which faces the user when operating the
phone, and a rear-facing camera which faces away from the user like
most traditional cameras), by processing visual captures from a
first camera facing the user and visual captures from a second
camera facing away from the user (and preferably outside a vehicle
window). Based on the processing of such visual captures, a
determination that the device is on the right-side of the vehicle
can be computed (as described in detail above), and/or a
determination that the user is able to maintain a prolonged gaze
towards the device can be computed (as also described in detail
above). In such a scenario, it can be further determined that the
in-vehicle role of such a user of the device is not a driver, and
one or more restrictions of the device can be adjusted
accordingly.
[0801] Then, at step 1742, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, adjusts an implementation of one or more restrictions at/in
relation to mobile device 105 (that is, employs one or more
restrictions, modifies an implementation of one or more previously
employed restrictions, and/or removes one or more previously
employed restrictions) based on the determination and/or the
validation, substantially in the manner described in detail above
with respect to step 1642.
[0802] In certain implementations, in scenarios in which visual
captures (e.g., those described/referenced herein, such as for
passenger authentication, etc.), are performed under low light
conditions (e.g., night, rain, etc.), such as can be
detected/determined based on input(s) originating from one or more
sensors of a device and/or other data sources (e.g., light sensor,
cameras, time/date/location, weather report, etc.),
light/illumination originating from the device (e.g., screen,
camera flashes) can be used to improve the lighting conditions as
needed (e.g., illumination level, illumination direction, etc.),
such as in order to improve the quality of such visual captures
such that they can be processed more effectively, accurately,
efficiently, etc.
[0803] FIG. 104 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0804] At 10410, a first visual capture can be received, such as
from a first visual capture component of a device.
[0805] At 10420, a second visual capture can be received, such as
from a second visual capture component of the device. In certain
implementations the first visual capture and the second visual
capture can be captured simultaneously and/or sequentially, such as
is described herein.
[0806] At 10430, the first visual capture and the second visual
capture can be processed, such as in order to determine an
in-vehicle role of a user of the device.
[0807] FIG. 105 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0808] At 10510, a command can be provided, such as a command to
position a device at a defined orientation.
[0809] At 10520, it can be determined that the device is positioned
at a defined orientation (e.g., the orientation instructed at
10510). In various implementations, the referenced orientation can
include: a defined distance from a face of the user, a defined
orientation relative to a gravitational force, a defined
orientation relative to a direction of movement of the vehicle, a
defined orientation based on (a) a relative position of the
front-facing visual capture component with respect to the device
and/or (b) a relative position of the rear-facing visual capture
component with respect to the device, a defined orientation based
on a time of day, a defined orientation based on a time of year, a
defined orientation based on an illumination state perceptible to
the device, or a defined range of orientations.
[0810] At 10530, it can be determined that the front-facing visual
capture component (e.g., camera) and/or the rear-facing visual
capture component are capable of capturing visual captures based
upon which an in-vehicle role of a user of the device is likely to
be capable of being determined.
[0811] At 10540, one or more instances of illumination can be
initiated (e.g., a flash, etc.).
[0812] At 10550, one or more instructions can be provided. In
certain implementations, such instructions can include an
instruction to perform various actions (e.g., a facial expression
such as a smile, frown, wink, blink, etc.), e.g., while the first
visual capture is captured.
[0813] At 10560, a first visual capture can be received, such as
from a front-facing visual capture component of a device.
[0814] At 10570, a second visual capture can be received, such as
from a rear-facing visual capture component of the device. It
should be understood that in certain implementations, the first
visual capture and/or the second visual capture are captured based
on a determination that the device is positioned at the defined
orientation, such as is described herein.
[0815] At 10580, the first visual capture and/or the second visual
capture can be processed. In doing so, an in-vehicle role of a user
of the device can be determined. In certain implementations, the
first visual capture can be processed to determine a placement of a
seatbelt relative to the user. In certain implementations the first
visual capture can be processed to determine at least one of
placement, distance, or size of one or more windows of the vehicle
relative to the user. In certain implementations the second visual
capture can be processed to determine at least one of an angle at
which a rear-view mirror of a vehicle is positioned, a distance at
which the rear-view mirror of the vehicle is positioned, or a size
of the rear-view mirror of the vehicle. In certain implementations
the first visual capture can be processed to determine (a) a
placement of a seatbelt relative to the user and/or (b) a placement
of one or more windows of the vehicle relative to the user, and the
second visual capture can be processed to determine an angle at
which a rear-view mirror of a vehicle is positioned. In certain
implementations the second visual capture can be processed to
determine one or more of an angle of a hood of the vehicle, a
distance of a hood of the vehicle, or a size of a hood of the
vehicle. In certain implementations, the second visual capture can
be processed to determine a slope of a hood of the vehicle. In
certain implementations the second visual capture can be processed
to determine one or more of: an angle of a windshield wiper of the
vehicle, a distance of a windshield wiper of the vehicle, or a size
of a windshield wiper of the vehicle. In certain implementations,
the second visual capture can be processed to determine a slope of
a windshield wiper of the vehicle. In certain implementations, the
second visual capture can be processed to determine a pattern
associated with a windshield wiper of the vehicle. In certain
implementations the second visual capture can be processed to
determine an arc associated with a windshield wiper of the vehicle.
In certain implementations, the first visual capture can be
processed to determine (a) a placement of a seatbelt relative to
the user and (b) a placement of one or more windows of the vehicle
relative to the user, and the second visual capture can be
processed to determine a slope of a hood of the vehicle. In certain
implementations, the first visual capture to determine (a) a
placement of a seatbelt relative to the user and (b) a placement of
one or more windows of the vehicle relative to the user, and the
second visual capture can be processed to determine an angle of a
windshield wiper of the vehicle. In certain implementations, the
second visual capture can be processed to determine a direction in
which one or more objects are moving. In certain implementations,
the first visual capture can be processed to determine a relative
amount of light on one or more parts of a face of the user. In
certain implementations, the first visual capture can be processed
to determine a relative amount of light on one or more sides of a
face of the user in relation to at least one of (a) a time of day,
(b) a day of year, (c) a year, (d) a direction of travel, (e)
weather, or (f) a location. In certain implementations, the first
visual capture can be processed to determine an amount of light on
a left side of a face of the user relative to an amount of light on
a right side of a face of the user. In certain implementations, the
first visual capture can be processed to determine an amount of
light on a right side of a face of the user relative to an amount
of light on a left side of a face of the user. In certain
implementations, the first visual capture can be processed to
determine an amount of light in a first part of a face of the user
relative to an amount of light on a second part of a face of the
user. In certain implementations, the first visual capture can be
processed to determine an amount of light in a first part of a face
of the user relative to an amount of light on a second part of a
face of the user. In certain implementations the first visual
capture and/or the second visual capture can be processed to
determine at least one of: (a) a steering wheel, (b) a dashboard,
(c) one or more headrests, (d) a front hood, (e) a hood ornament,
(f) one or more windshield wipers, (g) a rear-view mirror, (h) one
or more sides of a windshield frame, (i) a side mirror, (j) one or
more heads, (k) one or more patterns on a windshield made by
windshield wipers, (l) one or more windshield wipers, or (m) one or
more body parts of one or more other users, or (n) windshield
stickers. In certain implementations, the first visual capture
and/or the second visual capture can be processed to determine at
least one of a face of the user, a head of the user, a face of
another user, a head of another user, a direction of a seatbelt, a
usage of a seat belt, a presence of one or more windows, a location
of one or more windows in relation to the user, a direction in
which one or more objects in a window that is oriented around the
user are moving, a relative amount of light on one part of a face
of the user relative to another part of the face of the user, a
relative amount of light on one part of a face of the user relative
to another part of the face of the user a user's face in relation
to at least one of: a time of day, a direction of travel, or a
location.
[0816] In certain implementations, the first visual capture and/or
the second visual capture can be processed to identify a presence
of the one or more instances of illumination (such as may be
initiated at 10540) within the at least one of the first visual
capture or the second visual capture.
[0817] In certain implementations, the first visual capture can be
processed to determine a performance of the one or more actions
(such as those provided in response to the instructions provide at
10550). In response to a determination of the performance of the
referenced actions, the first visual capture can be processed to
determine an in-vehicle role of a user of the device.
[0818] At 10590, one or more actions can be initiated, such as with
respect to the user and/or the device, such as in a manner
described herein. For example, one or more restrictions can be
adjusted, e.g., with respect to the device. In certain
implementations, such restrictions can be adjusted based on the
in-vehicle role of the user of the device. Additionally, in certain
implementations one or more restrictions can be adjusted with
respect to the device based on the presence of the one or more
instances of illumination (such as may be initiated at 10540)
within the at least one of the first visual capture or the second
visual capture. In certain implementations, one or more
restrictions can be adjusted with respect to the device based on an
absence of the one or more instances of illumination (such as may
be initiated at 10540) within the at least one of the first visual
capture or the second visual capture.
[0819] FIG. 106 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0820] At 10610, one or more interface elements of a first device
can be adjusted. For example, a placement of an interface control
that initiates the first visual capture (e.g., a `trigger` button
that, when selected, initiates the capture of a picture) can be
adjusted (e.g., moved to another location within a user
interface).
[0821] At 10620, it can be determined that the device is positioned
at a defined orientation. In various implementations, the
referenced orientation can include: a defined distance from a face
of the user, a defined orientation relative to a gravitational
force, a defined orientation relative to a direction of movement of
the vehicle, a defined orientation based on a relative position of
the visual capture component with respect to the device, a defined
orientation based on a time of day, a defined orientation based on
a time of year, a defined orientation based on an illumination
state perceptible to the device, or a defined range of
orientations.
[0822] At 10630, a first visual capture can be received, such as
from a first visual capture component (e.g., a camera) of a first
device. In certain implementations, the first visual capture
component can include a front-facing camera and/or a rear-facing
camera.
[0823] At 10640, one or more visual captures can be received, such
as from one or more second visual capture components.
[0824] At 10650, one or more characteristics of one or more objects
(e.g., objects that may appear in various visual captures, such as
is described herein) can be projected, such as with respect to one
or more in-vehicle locations.
[0825] At 10660, the first visual capture can be processed. In
doing so, a presence of one or more objects can be identified. As
described herein, in certain implementations the first visual
capture can be processed to identify one or more characteristics of
the one or more objects (e.g., a distance, a size, an orientation,
an angle, a shape, a color, a slope, a shape, a direction, a degree
of transparency, and/or a degree of cleanliness of the one or more
objects).
[0826] In certain implementations, a presence of the one or more
objects within the first visual capture can be compared with a
presence of the one or more objects within the second visual
capture, such as in a manner described herein. Moreover, in certain
implementations an in-vehicle location of the device can be
determined based on (a) the comparison of the presence of the one
or more objects within the first visual capture with the presence
of the one or more objects within the second visual capture and (b)
an in-vehicle location of the one or more second visual capture
components, such as in a manner described herein.
[0827] In certain implementations, the first visual capture can be
processed to determine a placement of a seatbelt relative to the
user.
[0828] In certain implementations the first visual capture can be
processed to determine at least one of placement, distance, or size
of one or more windows of the vehicle relative to the user. In
certain implementations the first visual capture can be processed
to determine at least one of an angle at which a rear-view mirror
of a vehicle is positioned, a distance at which the rear-view
mirror of the vehicle is positioned, or a size of the rear-view
mirror of the vehicle. In certain implementations the first visual
capture can be processed to determine (a) a placement of a seatbelt
relative to the user and/or (b) a placement of one or more windows
of the vehicle relative to the user, and to determine an angle at
which a rear-view mirror of a vehicle is positioned. In certain
implementations the first visual capture can be processed to
determine one or more of: an angle of a hood of the vehicle, a
distance of a hood of the vehicle, or a size of a hood of the
vehicle. In certain implementations, the first visual capture can
be processed to determine a slope of a hood of the vehicle. In
certain implementations the first visual capture can be processed
to determine one or more of: an angle of a windshield wiper of the
vehicle, a distance of a windshield wiper of the vehicle, or a size
of a windshield wiper of the vehicle. In certain implementations,
the first visual capture can be processed to determine a slope of a
windshield wiper of the vehicle. In certain implementations, the
first visual capture can be processed to determine a pattern
associated with a windshield wiper of the vehicle. In certain
implementations the first visual capture can be processed to
determine an arc associated with a windshield wiper of the vehicle.
In certain implementations, the first visual capture can be
processed to determine (a) a placement of a seatbelt relative to
the user and (b) a placement of one or more windows of the vehicle
relative to the user, and to determine a slope of a hood of the
vehicle. In certain implementations, the first visual capture to
determine (a) a placement of a seatbelt relative to the user and
(b) a placement of one or more windows of the vehicle relative to
the user, and to determine an angle of a windshield wiper of the
vehicle. In certain implementations, the first visual capture can
be processed to determine a direction in which one or more objects
are moving. In certain implementations, the first visual capture
can be processed to determine a relative amount of light on one or
more parts of a face of the user. In certain implementations, the
first visual capture can be processed to determine a relative
amount of light on one or more sides of a face of the user in
relation to at least one of (a) a time of day, (b) a day of year,
(c) a year, (d) a direction of travel, (e) weather, or (f) a
location. In certain implementations, the first visual capture can
be processed to determine an amount of light on a left side of a
face of the user relative to an amount of light on a right side of
a face of the user. In certain implementations, the first visual
capture can be processed to determine an amount of light on a right
side of a face of the user relative to an amount of light on a left
side of a face of the user. In certain implementations, the first
visual capture can be processed to determine an amount of light in
a first part of a face of the user relative to an amount of light
on a second part of a face of the user. In certain implementations,
the first visual capture can be processed to determine an amount of
light in a first part of a face of the user relative to an amount
of light on a second part of a face of the user. In certain
implementations the first visual capture can be processed to
determine at least one of: (a) a steering wheel, (b) a dashboard,
(c) one or more headrests, (d) a front hood, (e) a hood ornament,
(f) one or more windshield wipers, (g) a rear-view mirror, (h) one
or more sides of a windshield frame, (i) a side mirror, (j) one or
more heads, (k) one or more patterns on a windshield made by
windshield wipers, (l) one or more windshield wipers, or (m) one or
more body parts of one or more other users, or (n) windshield
stickers. In certain implementations, the first visual capture can
be processed to determine at least one of a face of the user, a
head of the user, a face of another user, a head of another user, a
direction of a seatbelt, a usage of a seat belt, a presence of one
or more windows, a location of one or more windows in relation to
the user, a direction in which one or more objects in a window that
is oriented around the user are moving, a relative amount of light
on one part of a face of the user relative to another part of the
face of the user, a relative amount of light on one part of a face
of the user relative to another part of the face of the user a
user's face in relation to at least one of: a time of day, a
direction of travel, or a location.
[0829] At 10670, an in-vehicle location of the device can be
determined. In certain implementations, such an in-vehicle location
of the device can be determined based on the presence of the one or
more objects e.g., as determined in a manner described herein).
Moreover, in certain implementations a relative in-vehicle location
of the device can be determined. Additionally, in certain
implementations an in-vehicle location of a user of the device can
be determined.
[0830] In certain implementations, an in-vehicle location of the
device can be determined based on the one or more characteristics
of the one or more objects (e.g., as identified at 10650).
[0831] In certain implementations, an in-vehicle location of the
device can be determined based on a comparison of the one or more
characteristics of the one or more objects with more projected
characteristics of the one or more objects (e.g., as projected at
10640).
[0832] In certain implementations, an in-vehicle location of the
user of the device relative to one or more other occupants of the
vehicle can be determined, such as in a manner described
herein.
[0833] At 10680, one or more actions can be initiated, such as with
respect to at least one of (a) the user or (b) the device. In
certain implementations, such actions can be initiated based on the
in-vehicle location of the user of the device. Additionally, in
certain implementations one or more restrictions can be adjusted
with respect to the device. Moreover, in certain implementations,
it can be determined, which data to log with respect to a trip
(e.g., in relation to the user, such as for UBI, etc.).
Additionally, in certain implementations data logged during a trip
can be associate with a navigation history associated with the user
(e.g., for use in navigation applications, such as in a manner
described herein).
[0834] FIG. 107 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0835] At 10710, a first visual capture can be received, such as
from a first visual capture component of a first device.
[0836] At 10720, the first visual capture can be processed. In
doing so, a distance between a face of a first occupant of a
vehicle and the first device can be determined.
[0837] At 10730, a second visual capture can be received, such as
from a second visual capture component of the first device.
[0838] At 10740, the second visual capture can be processed, such
as in order to identify a face of a second occupant of a
vehicle.
[0839] At 10750, an in-vehicle location of the first device can be
determined. In certain implementations, such an in-vehicle location
of the first device can be determined based on (a) an orientation
of the first device relative to Earth and (b) an orientation of the
first device relative to a direction of movement of the
vehicle.
[0840] At 10760, one or more actions can be initiated (e.g.,
adjusting one or more restrictions with respect to the first
device, determining, in relation to the user, which data to log
with respect to a trip, associating data logged during a trip with
a navigation history associated with the user, etc., such as are
described herein) such as with respect to the user and/or the first
device. In certain implementations, such actions can be initiated
based on the in-vehicle location of the first device, such as in a
manner described herein.
[0841] FIG. 108 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0842] At 10810, a first visual capture can be received, such as
from a first visual capture component of a first device.
[0843] At 10820, the first visual capture can be processed, such as
to determine a presence of an object. In various implementations,
such an object can include, but is not limited to one or more of:
(a) a steering wheel, (b) a dashboard, (c) one or more headrests,
(d) a front hood, (e) a hood ornament, (f) one or more windshield
wipers, (g) a rear-view mirror, (h) one or more sides of a
windshield frame, (i) a side mirror, (j) one or more heads, (k) one
or more patterns on a windshield made by windshield wipers, (l) one
or more windshield wipers, (m) one or more body parts of one or
more other users, or (n) windshield stickers.
[0844] At 10830, an in-vehicle role of a user of the device can be
determined. In certain implementations, such an in-vehicle role of
a user of the device can be determined based on a proportion of the
visual capture that corresponds to the object.
[0845] At 10840, one or more actions can be initiated with respect
to the user and/or the device. For example, one or more
restrictions can be adjusted with respect to the device. In certain
implementations, such restrictions can be adjusted based on the
in-vehicle role of the user of the device.
[0846] By way of further illustration, in certain implementations,
inputs (e.g., visual captures) originating from one or more front
facing cameras on the device can be used to determine the
in-vehicle role of the user (and the set of restrictions applied to
the device based upon the in-vehicle role) by detecting (or not
detecting) the presence and/or the characteristics (e.g., distance,
size, orientation, angle, shape, color, slope, right/left,
direction, in-image location, transparency, cleanliness) of one of
more objects in the input. For example, (a) a user's (or other
person's) face/head; (b) the direction (and use) of a seat belt
(i.e., over right shoulder or over left shoulder); (c) the presence
and location of windows around a user, (d) the shape of one or more
windows (e.g., the forward edge and the bottom (or top) edge of a
car's rear seat window are generally close to perpendicular,
whereas the forward edge and the bottom (or top) edge of a car's
front seat window are generally not perpendicular); (e) the
direction in which objects in a window around the user are moving
(e.g., right-to-left, left-to-right); and (f) the amount of light
on the right side and left sides of a user's face (relative to time
of day, direction of travel, location, etc.). In certain
implementations a value or measure of one or more of the
characteristics (e.g., size, orientation, color, shape) of one or
more of the one or more objects when captured by the one or more
front facing camera on a device located in different positions in
the vehicle (e.g., the positions associated with a driver, front
right passenger, rear right passenger, rear middle passenger, rear
left passenger) can be determined or otherwise projected or
defined. The value/measure of one or more of the actual
characteristics of one or more of the one or more objects in the
visual capture can be compared to the known values for different
vehicle occupants, based upon which the in-vehicle role of the user
can be determined and a set of restrictions can be applied to the
device based upon the in-vehicle role.
[0847] In certain implementations, the difference in the brightness
of the sides of the user's face can be used to determine (or help
determine) on which side of the vehicle she is sitting. For
example, if the right side of the face of a person in a vehicle is
determined to be brighter in a visual capture than the left side of
her face, she can be determined to be more likely to be sitting on
the right side of the vehicle (where the right side of her face is
closer to the window). And if the left side of the face of a person
in a vehicle is determined to be brighter in a visual capture than
the right side of her face, she can be determined to be more likely
to be sitting on the left side of the vehicle (where the left side
of her face is closer to the window).
[0848] In certain implementations, the accuracy of determining the
in-vehicle location of a user with this technique can be improved
by conditioning the probability that the user is on a certain side
of the vehicle based on the angle at which the sun is currently
positioned (at the current location, current date/time) relative to
the current direction of travel of the vehicle, where the sun's
position for a particular location, data and time may be calculated
or requested/received from an external source, e.g., a
website/service such as
http://www.esrl.noaa.gov/gmd/grad/solcalc/azel.html. For example,
if the sun's current position relative to the direction of travel
of the vehicle is such that direct sunlight could only enter the
vehicle from the left side, and yet the right side of the user's
face is determined to be brighter than her left side, the
probability that the user is a right-side passenger conditioned on
the sun's position is higher than the unconditional probability
that the user is a right-side passenger.
Prob(user side=right|right side of face brighter & sun
position)>Prob(user side=right|right side of face brighter)
[0849] In certain implementations, this technique can be improved
by conditioning the probability based on the current weather for
the vehicle's location and/or date/time using, for example
OpenWeatherMaps. For example, if based upon the current location,
direction of travel and time, the sun position can be determined to
be such that direct sunlight was to enter the vehicle from the
right side from the horizon (e.g., dawn sun) and the right side of
the user's face is brighter than her left side, it is less clear on
which side of the vehicle the user is sitting (i.e., the right side
of the user's face would likely be brighter no matter which side of
the vehicle she was sitting on). But, if as the result of the
weather (e.g., heavy clouds, rain), the "sun position" was
determined to be one in which direct sunlight was not shining on
her face, it can be determined to be relatively more likely that
she was seated on the right side of the vehicle.
[0850] In certain implementations, the described techniques can be
improved by conditioning the referenced probability based on how
the architectural elements (e.g., buildings) and/or environmental
elements (e.g., trees, mountains) at the current location, time and
with respect to the vehicle's orientation are likely to effect the
in-vehicle lighting conditions. For example, if based upon the
current location, direction of travel and time, the sun position
was such that direct sunlight was to enter the vehicle from the
right side from the horizon (e.g., dawn sun) and the right side of
the user's face is brighter than her left side, it is less clear on
which side of the vehicle the user is sitting (i.e., the right side
of the user's face would likely be brighter no matter which side of
the vehicle she was sitting on). But, if as a result of one or more
architectural and/or environmental elements the "sun position" was
understood to be one in which direct sunlight was not shining on
her face, it can be determined to be more likely that she was
seated on the right side of the vehicle.
[0851] In certain implementations, inputs from one or more
rear-facing cameras of the device can be used to determine the
in-vehicle role of the user (and the set of restrictions applied to
the device based upon the in-vehicle role) by detecting (or not
detecting) the presence and the characteristics (e.g., distance,
size, orientation, angle, shape, color, slope, right/left,
direction, in-image location, transparency, cleanliness) of one of
more objects that are present in the input (or not) and/or have
different physical characteristics when seen by the camera on a
device located in different positions in the vehicle. For example
(a) a steering wheel; (b) a vehicle dashboard: (c) the backs of
heads and/or head rests; (d) front hood; (e) the location of a hood
ornament; (f) one or more windshield wipers or patterns on the
windshield made by the windshield wipers: (g) a rear-view mirror,
(h) one or more sides of the windshield frame or the (resting)
windshield wipers; (i) a side mirror; (j) a user's (or other
person's) face/head.
[0852] In certain implementations the approximate value of one or
more of the characteristics (e.g., size, orientation, color, shape)
of one or more of the one or more objects when captured by the one
or more rear facing cameras on a device located in different
positions in the vehicle (e.g., the positions associated with a
driver, front right passenger, rear right passenger, rear middle
passenger, rear left passenger) can be determined or otherwise
projected or defined. The actual value of one or more of the
characteristics of one or more of the one or more objects in the
visual capture can be measured and compared to the known values for
different vehicle occupants, based upon which the in-vehicle role
of the user can be determined and a set of restrictions can be
applied to the device based upon the in-vehicle role.
[0853] In certain implementations the visual capture tasks
described herein can be made more difficult (e.g., to discourage
drivers) by introducing additional requirements in order to perform
the task (e.g., a button that the user must tap in order to
successfully perform the visual capture (which is placed on the
display of a device that a driver cannot see because she needs to
perform a capture with a rear camera), is in an random and changing
location on the display).
[0854] In certain implementations, the inputs described herein as
originating from one or more front-facing cameras could also
originate from one or more rear-facing cameras and/or the inputs
descried above as originating from one or more rear-facing cameras
could also originate from one or more front-facing cameras.
Additionally, the inputs could also come from one or more cameras
located in other positions on or in relation to the device.
[0855] In certain implementations, one or more of the front-camera
classifiers and one or more of the rear-camera classifiers
described herein can be used to make the in-vehicle role
determination. The visual captures used to make such determination
may be performed simultaneously (i.e., front and rear cameras
capturing at the same time), interwoven (i.e., front and rear
captures taken in turn, e.g., one front frame, one rear frame,
second front frame, second rear frame) or consecutively (i.e.,
front capture followed by rear capture, or vice versa). It should
be noted that the described techniques are also applicable to
cameras that are not front cameras or rear cameras, e.g., a cameras
on the side of the device, on the top or bottom on the device, a
camera that can capture images from more than one side at a time
(e.g., a panoramic camera, a fishbowl camera) or a camera that is
in communication with the device (e.g., on a wearable device).
[0856] In certain implementations, the user may be required to
position the device in a particular way for the in-vehicle role to
be determined (e.g., at a certain distance to her face, at a
certain orientation relative to earth (e.g. landscape, portrait),
at a certain orientation relative to the vehicle's direction of
movement).
[0857] In certain implementations, the device orientation required
may be based upon the type of device (e.g., camera position). For
example, when the device is a Nexus 5 where the camera is to the
left of center (when the device is held in portrait), the user must
hold the device in right landscape mode (so that the camera is
higher than in left landscape mode), whereas on a device whose
camera is right of center the user must fold the device in the left
landscape position. Unrelated to the heterogeneity of camera
positioning across devices, different positions may be required
under different conditions (e.g., time of day, day or year,
lighting).
[0858] In certain implementations, the above can happen actively
(e.g., the user who is a passenger initiates the process to release
driver mode) or passively.
[0859] For example, a user may be prompted to position a device in
portrait mode (e.g., as perceived by the accelerometer) at a
distance of 30 cm-40 cm away from her face (e.g., both the presence
of a face and the device's distance from face as perceived by the
front-facing camera), and pointing towards the rear view mirror
(e.g., as perceived by the rear-facing camera), as shown in FIG.
86A. Visual captures can then be captured or otherwise acquired
using both the front and rear-facing cameras of the device, such as
is described herein. The in-vehicle role of the user can then be
determined based upon (a) the angle of the rear view mirror in the
rear-facing camera's visual capture (such as is shown in FIG. 86B).
For example, in the scenario depicted in FIG. 87A (in which both a
driver and passenger are performing substantially the same
authentication task from their respective positions within the
vehicle), it can be appreciated that the plane of the mirror is
likely to be more parallel to the plane of a driver's face (as
reflected in FIG. 87B, showing the visual capture of the rearview
mirror as captured by the rear-facing camera of the device being
operated by a driver, and FIG. 87C, showing the corresponding
visual capture of the user as captured by the front-facing camera
of the device being operated by a driver) and less parallel to the
plane of a front-right passenger's face (as reflected in FIG. 87D,
showing the visual capture of the rearview mirror as captured by
the rear-facing camera of the device being operated by a passenger,
and FIG. 87E, showing the corresponding visual capture of the user
as captured by the front-facing camera of the device being operated
by a passenger). By way of further example, in the scenario
depicted in FIG. 88A (in which both a driver and passenger are
performing substantially the same authentication task from their
respective positions within the vehicle), it can be appreciated
that the size of the rear view mirror and/or the size of the rear
view mirror relative to the face, e.g., the size of the rear view
mirror and the ratio of the rear size minor size relative to the
face size will be much smaller for rear-seat occupants (as
reflected in FIG. 88D, showing the visual capture of the rearview
mirror as captured by the rear-facing camera of the device being
operated by a passenger, and FIG. 88E, showing the corresponding
visual capture of the user as captured by the front-facing camera
of the device being operated by a passenger) than for front seat
occupants (as reflected in FIG. 88B, showing the visual capture of
the rearview mirror as captured by the rear-facing camera of the
device being operated by a driver, and FIG. 88C, showing the
corresponding visual capture of the user as captured by the
front-facing camera of the device being operated by a driver). By
way of further example, the direction of the user's seat belt can
be determined based on the visual capture originating from the
front-facing camera (such as is show in FIG. 86C), e.g.,
identifying a seat belt over a user's right shoulder can indicate
that the user is more likely to be a passenger, while a seat belt
over left shoulder can indicate that the user is more likely to be
a passenger, as shown in FIGS. 87C and 87E. By way of further
example, an identification of the windows around the user can also
be an indicator of the user's role, e.g., a window on user's right
can indicate that the user is more likely to be a passenger, while
a window on user's left can indicate that the user is more likely
to be a driver, as shown in FIGS. 87C and 87E.
[0860] In another example, a user may be prompted to position a
device in right (or left) landscape mode (e.g., as perceived by the
accelerometer) at a distance of 30 cm-40 cm away from her face
(e.g., both the presence of a face and the device's distance from
face as perceived by the front-facing camera) and point the device
forward in the vehicle's direction of travel (e.g., as may be
perceived by the rear-facing camera, the GPS and/or the
compass/magnetometer), as shown in FIG. 89A. Visual captures can be
captured or otherwise acquired using the front-facing (as shown in
FIG. 89C) and rear-facing (as shown in FIG. 89B) cameras of the
device. The in-vehicle role of the user can then be determined, for
example (such as in the scenario depicted in FIG. 90A), based on
the angle of the hood/road border (which might be identified, for
example, as a part of the rear-facing image that doesn't change
significantly from frame to frame), e.g., a hood that has a
negative slope is more likely to have been captured by a passenger
device (such as is shown in FIG. 90D--it should be understood that
FIG. 90E represents the corresponding visual capture captured by
the front-facing camera of the device), while a hood with a
positive slope is more likely to have been captured by a driver
device (such as is shown in FIG. 90B--it should be understood that
FIG. 90C represents the corresponding visual capture captured by
the front-facing camera of the device). By way of further example,
the angle of the lower windshield frame or the windshield wiper,
e.g., a lower windshield frame or a windshield wiper that has a
negative slope (e.g., relative to the horizon or relative to the
hood-road border) can be determined to be more likely to have been
captured by a passenger device (as shown in FIG. 90D), while a
lower windshield frame or a windshield wiper that is determined to
have a positive slope can be determined to be more likely to have
been captured by a driver device (as shown in FIG. 90B). By way of
further example, in a scenario such as that depicted in FIG. 91A, a
pattern on the windshield resulting from the partial reach of the
windshield wipers across the windshield, e.g., a circular arc that
is fewer than a certain number of degrees can be determined to more
likely to have been captured by a passenger device (such as is
depicted in FIG. 91B--it should be understood that FIG. 91C depicts
a corresponding visual capture captured by a rear-facing camera of
the device). Moreover, in a scenario such as that depicted in FIG.
92A, upon determining that a circular arc in the visual capture
(such as that depicted in FIG. 92B--it should be understood that
FIG. 92C depicts a corresponding visual capture captured by a
rear-facing camera of the device) is more than a certain number of
degrees, it can be determined that the device that captured it is
more likely to be a driver device, while determining that the
referenced circular arc is fewer than a certain number of degrees
can be determined to indicate that the capturing device is likely
to be a passenger device (such as is depicted in FIG. 92B--it
should be understood that FIG. 92C depicts a corresponding visual
capture captured by a rear-facing camera of the device). By way of
further example, determining the direction of the user's seat belt
can be used to determine whether a user is a driver or a passenger,
e.g., seat belt over right shoulder can indicate that the user is
more likely to be a passenger (such as is depicted in FIG. 92E),
while a seat belt over left shoulder can indicate that the user is
more likely to be a passenger (such as is depicted in FIG. 92C). By
way of further example, the arrangement/placement of window(s)
around the user can be used to determine whether a user is a driver
or passenger, e.g., a window on user's right (such as is depicted
in FIG. 92E) can indicate that the user is more likely to be a
passenger, while a window on user's left (such as is depicted in
FIG. 92C) can indicate that the user is more likely to be a
driver.
[0861] For example, a user may be prompted to position a device at
a distance of 30 cm-40 cm away from her face (e.g., both the
presence of a face and the device's distance from face as perceived
by the front-facing camera), and point the device toward and
capture the face (or side of face or head) of another occupant
(e.g., as perceived by the rear-facing camera). For example, FIG.
95A depicts an exemplary scenario in which a passenger is
performing the referenced operations. FIG. 95B depicts an exemplary
visual capture captured by the rear-facing camera of such a device
and FIG. 95C depicts an exemplary visual capture by the
front-facing camera of such a device. By way of further example,
FIG. 96A depicts an exemplary scenario in which a driver is
performing the referenced operations, FIG. 96B depicts an exemplary
visual capture captured by the front-facing camera of such a device
and FIG. 95C depicts an exemplary visual capture captured by the
rear-facing camera of such a device. The in-vehicle role of the
user can be determined, for example, based on (a) the orientation
of the device relative to Earth, and (b) the orientation of the
device relative to the direction of the vehicle's movement (e.g.,
both as perceived by the accelerometer, gyroscope, magnetometer,
compass, GPS, camera(s)), etc., e.g., if the device is in being
held vertically (i.e., positive gravity on y-axis) and the x-axis
is in the direction of the vehicle's movement, then the front
facing camera is pointed to the right and the rear facing camera is
pointed to the left (with respect to the direction of the vehicle's
movement) and the device can be determined to be likely to be a
front-right passenger device (the difficulty of aligning both faces
at the appropriate distance(s) without being able to preview the
image is likely to be very difficult for a driver). A similar
determination can be for other two occupant combinations captured
in the visual captures while the device is held a particular
orientation.
[0862] By way of further example (such as the scenario depicted in
FIG. 93A), a user may be prompted to position a device in portrait
mode (e.g., gravity on y-axis as perceived by the accelerometer)
and use the rear camera to take a visual capture that includes an
entire steering wheel (or, a partial steering wheel from which it
can be determined (e.g., from the size of the partial steering
wheel captured) that had it not been for some form of blockage
(e.g., a drivers arm/hand, a seat), then the steering wheel would
likely have been captured in its entirety). The in-vehicle role of
the user can be determined from (a) the presence of an entire
steering wheel in the rear-camera's visual capture e.g., in many
cases a the steering wheel is too close and its image in the visual
capture too large to for a driver to fully capture it (such as is
depicted in FIG. 93B, showing an exemplary visual capture captured
by the rear-facing camera of a driver device, showing the steering
wheel taking up most of the visual capture and/or not being able to
be captured in its entirety). In contrast, in the scenario depicted
in FIG. 93C (in which the referenced visual capture is performed by
a passenger device), the visual capture captured by the passenger
device (such an exemplary visual capture is depicted in FIG. 93D)
can be determined to contain the entire steering wheel (e.g., the
steering wheel takes up only a portion of the entire visual capture
and/or the steering wheel can be identified as being at a distinct
angle). It should be noted that, in certain implementations, the
difficulty of performing such capture may be increased for a driver
by requiring that the device so capture while being held in a
particular orientation (e.g., portrait). By way of farther example,
the device can be determined to be operated by a driver or a
passenger based on the angle of the steering wheel in the
rear-camera's visual capture. By way of illustration, the plane of
a steering wheel is likely to be relatively more parallel to the
plane of a device held by a driver (such as is depicted in FIG.
93A) and relatively less parallel to the plane of a device held by
a front-right passenger (such as is depicted in FIG. 93C). By way
of further example, a determination as to whether the device is
being operated by a driver or passenger can be made based on the
size of the steering wheel (or a portion thereof, e.g., the radians
in the arc of a section of the perimeter of a steering wheel)
within a visual capture, e.g., the size of a steering wheel in the
visual capture will be much smaller for rear-seat occupants (such
as in the scenario depicted in FIG. 94C--it should be noted that
FIG. 94D depicts a corresponding visual capture captured by the
rear-facing camera of the device) than for front seat occupants
(such as in the scenario depicted in FIG. 94A--it should be noted
that FIG. 94B depicts a corresponding visual capture captured by
the rear-facing camera of the device).
[0863] In certain implementations, the described classifiers can be
applied to visual captures which are passively taken (i.e., without
the user's request) from one or both cameras at opportune times,
i.e., when it is determined that there is a higher likelihood of
capturing the images needed to determine the in-vehicle role of the
user. Among other reasons, this is important for reducing the
device's power consumption. For example, if the user is "present",
e.g., if the screen has just been turned on or if the user is
actively engaging with the device (e.g., touch, gesture, voice) or
the device is cradled (e.g., as perceived by the accelerometer,
gyroscope, proximity sensor, light sensor), the likelihood of
capturing images useful in determining the device user's in-vehicle
role is higher than if the user is not present (e.g., the device is
in a bag, pocket, on an unoccupied seat).
[0864] In certain implementations, once the in-vehicle role of the
user is determined with sufficient likelihood, the user (e.g., a
driver), can be prevented from attempting again for the remainder
of the trip. This will reduce attempts to `spoof` the techniques
described herein.
[0865] In certain implementations, attempts to `spoof` the
described techniques by showing the device artificial visual
captures (e.g., a two-dimensional image, a piece of hardware with
front and rear visual captures) can be circumvented by having the
device emit one or more flashes, e.g., at certain times, for
certain lengths, at certain colors, known to the device and which,
if not seen in the visual, is indicative of `spoofing.`
[0866] In certain implementations, the described techniques can be
further protected from driver `spoofing` (e.g., by providing
pre-recorded visual capture) by asking the user to perform one or
more actions that are visible to one or both of the cameras at a
certain time during the task. For example, prompting (e.g.,
audibly, visually) the user to make a certain facial expression
(e.g. smile, frown, wink), which, because they aren't known to a
spoofing device (e.g., in content or timing), will not be present
in the spoofed visual capture, and the user will not pass as a
passenger.
[0867] It should be noted that, in a scenario in which a user is in
a vehicle in which the rear view mirror can be rotated so that the
driver can visually capture the rear-view mirror at an angle that
is sufficiently close to the angle at which a passenger typically
captures it while still visually capturing his face in a second
device camera, the in-vehicle role of the user can be
disambiguated/determined based upon the orientation of the device,
e.g. the orientation of the device relative to the direction of
movement of the vehicle (e.g., as perceived by the accelerometer,
GPS, magnetometer, compass) is approximately 90 degrees different
in these two cases.
[0868] In certain implementations, a first visual capture (e.g.,
from a rear-facing camera) can be processed to determine (a)
whether or not the vehicle in which a device in present is in
motion and/or (b) the direction of motion of one or more objects
within the visual capture. For example, based on a determination
that a first visual capture contains part of a front window of a
vehicle (e.g., in a scenario in which the user is instructed to
perform a visual capture of the rear view mirror and in which
visual capture part of the front window is also visible), and one
or more objects (e.g., at least a certain number of objects, a
majority of objects, etc, to account for other moving objects that
may deviate from the described/referenced movement/progression)
(e.g., objects determined to be viewable within the windshield of
the moving vehicle) can be determined to be moving from right to
left (e.g., from frame to frame within the visual capture), the
device can be determined to be more likely to be on the right side
of the vehicle (i.e., a passenger device), as shown in FIG. 131
which depicts visual captures/observations generated from a device
positioned in the passenger side of a vehicle (in which it can be
appreciated that most objects, e.g., the house and tree move or
transition from the right side of the visual capture to the left,
e.g., in the progression from `frame 1` to `frame 2,` though it
should be noted that in certain scenarios some objects--e.g., the
depicted car which may be traveling quickly--may appear to move
from left to right across the referenced frames). In another
example, upon determining that one or more objects within the rear
view mirror (as captured in the referenced visual captures) are
moving/progressing from left to right (e.g., from frame to frame
within the visual capture), the device can also be determined to be
more likely to be on the right side of the vehicle (i.e., a
passenger device), as shown in FIG. 130 (in which part of the image
shown within the inside of the rear-view mirror shows the interior
of the car and thus does not move/change significantly across the
referenced frames, while moving objects, e.g., the depicted tree,
appear to travel from left to right across the captured
frames).
[0869] Additionally, as depicted in FIG. 133, upon determining that
one or more objects (e.g., objects determined to be viewable within
the windshield of the moving vehicle, e.g., the light pole and
mailbox, as shown, though it should be noted that in certain
scenarios some objects--e.g., the depicted car which may be
traveling quickly--may appear to move from right to left across the
referenced frames) in the front window can be determined to be
moving from left to right (e.g., from frame to frame within the
visual capture), the device can be determined to be more likely to
be on the left side of the vehicle (i.e., a driver device). In
another example, if sufficiently many objects identified within the
rear view mirror (in the referenced visual capture) that correspond
to the side window(s) of the vehicle can be determined to appear to
be moving from left to right (e.g., from frame to frame within the
visual capture) with respect to the left side rear-view window or
right to left with respect to the right side rear-view window (as
depicted in FIG. 132) and/or sufficiently many objects within the
rear view mirror (in the referenced visual capture) are not
determined to be moving sufficiently/significantly, the device can
be determined to be more likely to be on the left side of the
vehicle (i.e., a driver device), as shown in FIG. 132.
[0870] In certain implementations, visual captures that were
captured/received during periods in which the device/vehicle was in
a turn (e.g., as perceived/determined based on a sufficiently large
lateral acceleration on the device and/or as perceived by another
device in the vehicle), may be discarded/ignored and/or may be
accounted for differently with respect to the referenced
determinations (e.g., taking into account the expected direction of
the movement of objects in such visual captures conditioned on the
presence of such lateral forces).
[0871] In certain implementations, the described techniques can be
combined with a second visual capture from a front-facing camera
(simultaneous, in series, and/or interlaced), which can be
processed to determine the in-vehicle location of the device and/or
in-vehicle role of the user that the device is associated
with/being used by based on one or more elements (e.g. face)
present in the referenced visual capture, as described herein.
[0872] Various in-vehicle cameras and camera systems (which may
include inward facing cameras, e.g., towards the inside of the
vehicle and/or outward facing cameras, e.g., towards the outside of
the vehicle) can be employed, e.g., to track the behavior of or
otherwise manage drivers (e.g., by companies who employ drivers),
to better determine/understand risks associated with various
driving-related behaviors and/or to resolve crash claims (e.g., by
insurance companies). Some such camera systems can include
event-based capabilities/functionality. For example, when a
condition is met (e.g., one or more motion sensors in the camera
system and/or elsewhere in the vehicle detect(s) or otherwise
determine a particular/unusual acceleration event (e.g., a hard
brake, a crash) and/or one or more motion/speed sensors (e.g., in
the camera system and/or elsewhere in the vehicle) detects or
otherwise determines that the vehicle is moving faster than a
threshold speed), such camera systems can be configured to
save/retain a certain amount of video/content (e.g., the last X
seconds of video), e.g., to permanent storage (e.g., on-camera
storage, off-camera storage, in the cloud, etc.). It can be
appreciated that the video, etc., captured by such systems may not
capture improper device use by a driver unless such use occurred
within the referenced `pre-event` window (and even then, such use
may be identifiable within the captured video only to the extent
that the prevailing conditions (e.g. lighting, angle) are conducive
to such determination(s)) (and even then, only to the often limited
extent that the referenced event/usage can be unambiguously
identified (e.g., was the user using an allowed app to navigate or
a disallowed app to watch a video).
[0873] Other such cameras/system may be configured to constantly
record visual capture(s) (e.g., images, videos, etc.) to temporary
and/or permanent storage. Such systems may thus capture improper
driver device usage (assuming that appropriate cameras (e.g., cabin
facing) and the appropriate conditions (e.g., lighting, angle,
etc.) are present). However, utilizing visual capture(s) taken in
such a manner can be highly ineffective/inefficient. For example,
in order to determine when and how often a driver used a device
improperly, a considerable amount of processing resources would
need to be devoted to analyzing the stored visual capture(s).
[0874] In certain implementations, a user device can be configured
to effectively/efficiently identify/determine improper driver
device use. For example, software executing on a device (e.g., the
driver's device) can enable the exact time and type of device usage
to be identified. The device can, for example, record such data
(e.g., to storage on the device, storage not on the device, but
elsewhere in the vehicle, to a remote server, etc.) and/or emit
signal(s) or other such transmissions (e.g., RF wireless, audio,
optical, wired, etc.), e.g., to one or more other devices (e.g., a
camera system that can record visual capture(s) of such driver
device event) and/or to a network (which, in turn, can directly or
indirectly communicate such driver device usage event to the camera
system). An event-based camera system can then store visual
capture(s) (e.g., a certain amount of video/content footage, such
as the last Y-seconds of visual capture, where Y may depend on the
type of driver device event reported and/or the latency of the
report). Accordingly, the referenced camera systems can be used in
conjunction with the timing and content of such driver device
events to determine which drivers should be rewarded, educated,
reprimanded, dismissed, etc., and/or to take/initiate any other
such actions as a result.
[0875] In certain implementations, the device can determine when an
improper device usage event has occurred. In certain
implementations, the device can identify that an event that may be
improper has occurred. Additionally, one or more second devices
(e.g., the camera system, in the in-vehicle computer, a remote
server, etc.) can determine (e.g., based on other information,
rules, etc.), if the determined event is improper whereupon the
second device can signals/indicate (e.g., to the camera system) the
occurrence of such improper driver device event (if the improper
nature of such event was not determined by the camera system
itself). For example, the driver device might detect that the user
of the device is using YouTube and the second device (which has
vehicle-direct speed data) can detect that the vehicle is moving at
100 km/h, and further determine that this is an improper driver
device event and emit a Bluetooth signal to the camera system which
causes/instructs such system to store the last Y-seconds of visual
capture.
[0876] In certain implementations, the occurrence of improper
driver device usage can be detected off-device (e.g., within a
connected network). For example, (a) a phone call placed, received,
answered; (b) a text sent, received, read; or (c) the
source/destination and/or the content of data sent and/or received
from the device (e.g., via packet inspection). In these cases a
device connected the network can signal/indicate/notify the
occurrence of such event to the camera system or and/or record its
occurrence, as appropriate for the camera system and/or the
application, device, customer, etc.
[0877] In certain implementations, the order of the described
operations can be reversed. For example, instead of a driver device
event causing the camera system to record, a vehicle event can
cause the device to record. For example, when a vehicle event is
detected (e.g., by the camera system, such as by various sensors
used by the camera system to trigger driving events, or by sensors
unrelated to the camera system like in a UBI system), a
signal/notification/instruction can be generated and sent to the
device, instructing the device, for example, to save the last
Z-seconds and/or the next F-seconds of device use data (e.g., to
permanent storage).
[0878] It should be understood that while the examples provided
herein have been directed to visual capture(s), the described
techniques can be similarly employed with respect to other
media/content types (e.g., audio capture(s)).
[0879] FIG. 109 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0880] At 10910, one or more inputs can be received, such as from a
first device (e.g., a wearable device).
[0881] At 10920, the one or more inputs can be processed. In doing
so, one or more characteristics that correspond to driving can be
identified. Examples of such characteristics include but are not
limited to motion characteristics, e.g., circular motion, motion
that corresponds to rotation of a steering wheel, etc. Further
examples of such characteristics include but are not limited to
orientation characteristics (e.g., orientation in a position that
corresponds to a user grasping a steering wheel), illumination
characteristics (which may be identified in view of a hand on which
the first device is worn, a time of day, a time of year, one or
more weather conditions, one or more environmental conditions,
etc., such as in a manner described herein).
[0882] At 10930, one or more actions can be initiated, such as with
respect to the user and/or the first device. In certain
implementations, such actions can be initiated based on an
identification of the one or more characteristics that correspond
to driving (e.g., at 10920). In certain implementations, such
actions can include modifying a restriction with respect to a
second device (e.g., restricting a smartphone also being used by
the same user, such as in a manner described herein).
[0883] FIG. 110 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0884] At 11010, one or more inputs, such as inputs pertaining to a
first device that is associated with a user, can be received.
[0885] At 11020, the one or more inputs can be processed. In doing
so, a first hand with respect to which the first device is
associated can be identified.
[0886] At 11030, one or more first motion inputs pertaining to the
first device and one or more second motion inputs pertaining to a
second device associated with the user can be received, such as
with respect to one or more motion instances, such as in a manner
described herein.
[0887] At 11040, the first motion inputs and the second motion
inputs can be compared.
[0888] At 11050, an in-vehicle role of the user can be determined
based on the comparison, such as in a manner described herein.
[0889] At 11060, one or more actions can be initiated such as with
respect to at least one of (a) the user, (b) the first device or
(c) the second device, such as based on the in-vehicle role of the
user.
[0890] FIG. 123 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0891] At 12310, one or more first motion inputs pertaining to a
first device associated with a first hand of a user and one or more
second motion inputs pertaining to a second device associated with
a user and/or a first device can be received, such as with respect
to one or more motion instances, such as in a manner described
herein.
[0892] At 12320, the first motion inputs and the second motion
inputs can be compared.
[0893] At 12330, an in-vehicle role of the user can be determined,
such as based on the comparison.
[0894] At 12340, based on the in-vehicle role of the user, one or
more actions can be initiated, such as with respect to the user,
the first device and/or the second device.
[0895] FIG. 124 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0896] At 12410, one or more first inputs (e.g., motion inputs) can
be received, such as from a first device (e.g., a wearable device),
such as in a manner described herein.
[0897] At 12420, the one or more first inputs can be processed,
such as in order to determine a context associated with the first
device (e.g., within a vehicle or within a trip). Such a context
can include: operation of the first device in a circular motion,
operation of the first device in a motion that corresponds to
rotation of a steering wheel, one or more orientation
characteristics of the first device (e.g., orientation in a
position that corresponds to a user grasping a steering wheel, one
or more illumination characteristics perceived by the first device,
etc.). Moreover, in certain implementations the one or more first
inputs and one or more second inputs (e.g., motion inputs) received
from a second device can be processed to determine the context.
[0898] At 12430, inputs that are reflected in one of the one or
more first inputs or the one or more second inputs but not the
other can be filtered out, such as is described herein.
[0899] At 12440, one or more actions can be initiated based on the
context (e.g., with respect to the second device). In certain
implementations, one or more restrictions can be modified with
respect a second device. In certain implementations, it can be
determined, in relation to a user of the first device, which data
to log with respect to a trip. In certain implementations, data
logged during a trip can be associated with a navigation history
associated with a user of the first device, such as in a manner
described herein.
[0900] By way of further illustration, in some implementations, the
in-vehicle role of a user can be determined based on inputs/data
received from/perceived by one or more sensors (e.g., motion
sensors) from the user's one or more wearable devices and/or
implantable devices.
[0901] For example, the orientation and/or motion of such a device
can be used to determine the device user's (or wearer's) in-vehicle
role based on a determination as to whether, during a trip, the
device's orientations are consistent with driving (e.g. hands on
the wheel and/or in certain popular/common positions like
`10-o'clock/2 o'clock.` e.g., as perceived by the device's
accelerometer and/or gyroscope) and/or the motion perceived by the
device can be determined to be consistent with driving (e.g.,
motion in an arc with radius and/or angular velocity similar to
that of a steering wheel, e.g., as perceived by the device's
accelerometer and/or gyroscope, e.g., using the arcs traversed by
the device on the user's hand). Determining the time and position
of a driver's hands on the steering wheel (whether
`10-o'clock/2-o'clock` or `5-o'clock/7-o'clock` (i.e., holding the
wheel from below)), based on inputs originating from such a
wearable device can be further utilized in computing various
further determinations and/or initiating various actions, such as
with respect to driver safety, monitoring and training.
[0902] In another example, the strength of the light perceived by a
light sensor on such a device, where such device is known to be
worn in a particular way by its user (e.g., watch on left hand that
gets a lot of light is more likely to be a driver's than a
passenger's, which determination can be refined to further account
for calendar/time (e.g., sun position at the time in the location),
weather (cloudy or sunny at the location) and environmental effects
(tall buildings, trees in the location).
[0903] In another example, inputs originating from two devices
within a vehicle can be used to determine the in-vehicle role of
the user: for example, one device a phone and one device a watch.
Based on a determination (e.g., over time) on which hand the watch
is on (e.g., using techniques described herein), the in-vehicle
role of the watch/phone user can be determined based on data
acquired when such users are actively using such phone (as opposed
to a phone that is not being used and may be positioned anywhere
within the vehicle). If the user is determined to wear her watch on
her left hand, her watch can be determined, by definition, to be
oriented to the left of the phone when she is typing on the phone
(e.g., relative to the vehicle's direction of travel). Accordingly,
if her car makes a right turn (e.g., as sensed by the
accelerometer, gyroscope, magnetometer. GPS) and she is on the
right side of the car, the watch will perceive more lateral
acceleration than the phone, whereas if she is on the left side of
the car, the reverse will be true.
[0904] The various techniques (e.g., for trip detection and
in-vehicle role determination) described herein can be further
enhanced based on a determination as to how the user wears such a
device (e.g., watch in right hand, hearing device implanted in left
ear, etc.), e.g., using the techniques for so determining as
described herein.
[0905] It should be noted that the described techniques may use
additional light sources (e.g., screen light, flash) as and when
appropriate (e.g., night, bad weather, poor light conditions).
[0906] It should be noted that the described techniques may need to
be reversed in left-side-of-the-road driving countries like the
United Kingdom.
[0907] Turning now to FIG. 21, a flow diagram is described showing
a routine 2100 that illustrates a broad aspect of a method for
selectively restricting a mobile device 105 in accordance with at
least one embodiment disclosed herein. It should be understood that
in certain implementations, including any and all of the
implementations and approaches described herein, it can be
advantageous to initially determine (e.g., by and/or based on
inputs originating at vehicle data system 164) that there is a
passenger present in the vehicle. It can be appreciated that if the
presence of a passenger within a vehicle cannot be initially
determined, it can be more efficient to preclude any/all of the
various methods and approaches described herein, such as those
which serve to identify the in-vehicle role of the particular user,
and thus simply employ one or more restrictions based upon a
determination that the user is likely to be the driver. Moreover,
in certain implementations, it can be advantageous to initially
determine (e.g., based on inputs originating at the mobile device
105 and/or external sources such as vehicle data system 164) that
the vehicle within which the mobile device 105 is present is in
motion (being that certain restrictions may be
preferable/appropriate/necessary only when the vehicle is in
motion).
[0908] At step 2110, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
receives one or more inputs, substantially in the manner described
in detail above with respect to step 1710. For example, inputs
originating at various sensors within a vehicle (e.g., seatbelt
sensors weight/movement/heat sensors at a passenger seat, etc.) can
indicate and/or be processed to determine that a passenger is
present within the vehicle. Put differently, one or more sensors or
sources (e.g., vehicle data system 164) can provide inputs and/or
other such information that indicate and/or can be processed to
determine that a vehicle is moving and/or that there are occupants
in the vehicle other than a driver. In certain implementations, if
no such inputs/notifications, etc, are received, and thus the
presence of a passenger in the vehicle cannot be confirmed), any or
all of the various methods described in detail herein will
effectively be precluded, as referenced above, such as by not
adjusting any restriction/unlocking the device.
[0909] At step 2120, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, process the inputs (such as those received at step 2110) in
order to determine a presence of a passenger within the vehicle.
That is, as referenced above, in certain implementations (which, as
noted, can be employed independently or in conjunction with one or
more of the various other implementations and approaches described
herein) one or more inputs originating at a vehicle data system
(e.g., OBDii or other in-car computer systems such as seatbelt
sensors, weight/movement/heat sensors in a passenger seat, etc.)
can be processed to determining that there are one or more
passenger occupants in the vehicle (and/or a degree of likelihood
of such) and/or that more than one occupant is present in the
vehicle (and/or a degree of likelihood of such).
[0910] Various aspects of the referenced communication interfaces,
capabilities, etc., between in-vehicle systems and mobile devices
can be employed in order to reduce driver distraction, including
distractions originating from the mobile devices. For example, an
in-vehicle system that transmits signal(s) (which can be perceived
via one or more of the sensors of a device, e.g., one of its
radios, microphones, camera, etc.) based on which it can be
determined that a device is present within a vehicle and/or allows
a device to query the in-vehicle system, can be utilized, in
conjunction with the device, to determine whether or not various
functionality of the device should/should not be restricted,
adjusted, etc. (e.g., to reduce distraction). Additionally, in
certain implementations, upon determining that only one occupant is
present within a vehicle (for example, based on inputs provided
by/received from weight sensors, heat sensors, seat belt sensors,
etc.), mobile device(s) determined to be within the vehicle can, by
default, are determined to be operated by a driver, and one or more
safety measures, restrictions, usage policies, etc, can be applied
to/in relation to it. Upon determining that multiple occupants are
present within the vehicle (thus allowing for the possibility that
a device present within the vehicle is being operated by a
passenger), one or more aspects of the functionality of the device
can be adjusted, changed etc. (e.g., restricted in one or more
ways) that may allow for authentication/unlocking by a passenger
(e.g., using one or more of the techniques described herein, such
as those which may be relatively easy for a passenger to perform
but relatively harder or impossible for a driver to perform) or
which may occur passively, without the active involvement of the
operator of the device).
[0911] In certain implementations, one or more selective
restrictions can be applied, removed, and/or modified on a device
based on a determination as to whether a passenger is present in a
vehicle or not (as determined, for example, in a manner described
herein). For example, a car or ride-sharing application/service
(e.g. Uber, Lyft, etc.) can be configured to apply various
restriction(s) to a device, infotainment system, etc., associated
with a driver (e.g., a driver as designated by the car/ride-sharing
application/service) based on a determination that a passenger is
also present in the vehicle. Moreover, in certain implementations
the described technologies can be configured to apply fewer
restrictions (or to relax/remove restrictions, etc.) to the
referenced device, infotainment system, etc. of one of its drivers
based on a determination that no passenger is present within the
vehicle. For example, in a scenario in which it can be determined
that a passenger is on board, the described technologies can
configure the device or infotainment system to prevent the driver
from, for example, conducting non-emergency telephone calls and/or
using an application to book future pickups, whereas in a scenario
in which it can be determined that no passenger is on board, the
described technologies can configure the device or infotainment
system to permit/not restrict the driver from performing these
actions.
[0912] In another embodiment, a mobile device can be configured to
emit/project a signal upon determining that it is present within a
moving vehicle (as determined using one or more of the techniques
described herein or known to those of ordinary skill in the art).
With respect to a device determined to be in a moving vehicle, but
that does not receive such a signal (i.e., from another device in
the same vehicle), it can be determined that there is likely to
only be one occupant present within the vehicle (i.e., a driver)
(e.g., based on the assumption that each vehicle occupant has at
least one mobile device) and the functionality of such a device can
be restricted as appropriate. It can be appreciated that the
accuracy of the referenced technique is likely to increase as
mobile devices become even more ubiquitous (e.g., wearable devices,
implantable devices, etc.).
[0913] In certain implementations, such signal can be homogenous
across devices, while in other implementations additional
identifying information (e.g., a unique ID) can be encoding in the
signal, for example, based on which it can be determined how many
devices are present within a vehicle.
[0914] It should be noted that various techniques enable the
identification of the presence of more than one device within a
vehicle associated with the same user (e.g., cross-device
advertising techniques, such as are known to those of ordinary
skilled in the art) and/or in identifying devices that are being
used to circumvent protection systems such as those described
herein. In doing so, various restrictions can be implemented, e.g.,
to prevent a driver with access to more than one device into
"fooling" this driver protection technique (intentionally or
unintentionally) into thinking that there is more than one occupant
in the vehicle. Additionally, if it can be determined, e.g., via
another driver protection technique, that it is appropriate to
place one or more restrictions on a device, restrictions can also
be placed on other devices that can be determined to be relatively
likely to belong to/be used by the same user. Moreover, in some
scenarios, such restrictions can be applied to the additional
devices that are likely to belong to the same user upon determining
that they are in relatively close proximity to the primary
device.
[0915] It should also be noted that one or more of the techniques
described herein can be performed at the device, at a server
connected to/in communication with the device, and/or any
combination thereof.
[0916] Then, at step 2142, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
adjusts an implementation of one or more restrictions at/in
relation to mobile device 105 (that is, employs one or more
restrictions, modifies an implementation of one or more previously
employed restrictions, and/or removes one or more previously
employed restrictions) based on the determination. That is, it can
be appreciated that if the presence of at least one passenger
within the vehicle cannot be determined, the various methods and
authentication approaches described herein can be
precluded/prohibited from commencing and/or made to fail regardless
of the result of the other components, accounting for the fact that
it is unlikely that a passenger is actually present in the vehicle,
and thus the user of the device within the vehicle is likely to be
the driver.
[0917] It should also be noted that in certain implementations,
various of the methods and approaches described herein, such as
various approaches for determining an in-vehicle role of a user,
can operate based on a default assumption/setting reflecting that
the in-vehicle role of the user of the device is a driver, until
proven otherwise (through one or more of the various methods
described herein).
[0918] In certain implementations such a default setting can
optionally allow the device user unrestricted access until such
time as such user wants to perform certain interactions that
require passenger authentication.
[0919] It should also be understood that the references provided
above to holding/maintaining the mobile device at a particular
orientation (such as substantially horizontal) are non-limiting,
and in certain implementations various other restrictions, methods,
approaches, etc, can be employed without requiring such orientation
constraint.
[0920] It should also be noted that many of the implementations
described herein can be implemented alone and/or in different
combinations.
[0921] It should also be noted that in certain implementations, any
of the passenger authentication methods/approaches described herein
can be configured to require that certain components/aspects of the
authentication methods/approaches be performed at certain times
within the process and/or within certain amounts of time and/or for
certain amounts of time (e.g., the user must begin a swipe gesture
within 1 second of the phone being placed in the required
orientation and must be complete the gesture within 0.8 seconds
thereafter during which time, for example, the user must place a
finger in a certain location of the device for at least 1
second).
[0922] It should also be noted that the calculations, computations,
and/or processing operations that are required in such
authentication processes can be performed at the device itself
and/or can be performed at a remote device (such as at central
machine 168)--or in some combination thereof, in a manner known to
those of ordinary skill in the art.
[0923] It should also be noted that in certain implementations, the
authentication approaches/methods described herein are configured
to prevent/preclude requiring a passenger to re-authenticate
his/her device when a vehicle temporarily stops or slows down
(e.g., reduces its speed below a certain threshold), during the
course of a journey. This can be done, for example, by requiring
that a the user of the device re-authenticate only if the vehicle
within which the device is present can be determined to have
stopped and/or maintained a slow speed (e.g., as can be determined
based on inputs originating at the GPS, accelerometer, gyroscope,
vehicle data system, antennas, radio frequencies/signals, such as
those originating at one or more radio towers, such as those
utilized in implementing cellular communication networks, as is
known to those of ordinary skill in the art, and/or other sensors),
for more than a certain amount of time. In other implementations,
the referenced requirement for re-authentication can be correlated
with a determination that the engine of the vehicle within which
the device is present is still operating (e.g., based on a
determination computed by processing one or more of inputs
originating at the accelerometer, gyroscope, magnetometer and/or
microphone, as described herein).
[0924] FIG. 112 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0925] At 11210, an operational context can be determined with
respect to a first device. In certain implementations, such an
operational context can include at least one of: within a vehicle,
within a trip, and/or within a restricted use area.
[0926] At 11220, a second device that is proximate to the first
device can be associated with the operational context. In certain
implementations, a notification of the operational context can be
transmitted to the second device. Moreover, in certain
implementations a command associated with the operational context
(e.g., a command to restrict one or more functions of the second
device, a command to determine, in relation to a user, which data
to log with respect to a trip, a command to associate data logged
during a trip with a navigation history associated with the user,
etc.) can be transmitted to the second device, such as in a manner
described herein.
[0927] FIG. 125 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0928] At 12510, it can be determined that it is disadvantageous
(e.g., not energy efficient, not possible, not accurately possible,
etc.) to compute an operational context of a second device based on
inputs originating from the second device.
[0929] At 12520, the operational context (e.g., within a vehicle,
within a trip, or within a restricted use area, etc.) can be
determined, such as with respect to a first device. In certain
implementations, such a first device can include one or more
sensors that are not included in the second device. In certain
implementations an operational context can be determined based on
inputs originating from the one or more sensors. Moreover, in
certain implementations the operational context with respect to a
first device can be determined based on a determination that it is
disadvantageous to compute the operational context of the second
device based on inputs originating from the second device.
[0930] At 12530, based on a determination that the second device is
proximate to the first device, the second device can be associated
with the operational context.
[0931] At 12540, one or more actions can be initiated, such as with
respect to the second device. In certain implementations, such
actions can be initiated based on an association of the second
device with the operational context. In certain implementations, a
notification of the operational context can be transmitted to the
second device. In certain implementations, a command associated
with the operational context can be transmitted to the second
device (e.g., a command to restrict one or more functions of the
second device, a command to determine, in relation to a user, which
data to log with respect to a trip, a command to associate data
logged during a trip with a navigation history associated with the
user, etc.).
[0932] FIG. 126 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0933] At 12610, an operational context can be determined, such as
with respect to a first device.
[0934] At 12620, a second device that is proximate to the first
device can be associated with the operational context.
[0935] At 12630, one or more actions can be initiated, such as with
respect to the second device. In certain implementations, such
actions can be initiated based on an association of the second
device with the operational context.
[0936] At 12640, based on an association of the second device with
the operational context determined with respect to the first
device, performance of a context determination by the second device
can be precluded, prevented, stopped, etc. (e.g., in order to
reduce power consumption and/or improve response/computing
time).
[0937] FIG. 127 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0938] At 12710, it can be determined that a first device is
capable of determining an operational context prior to a second
device.
[0939] At 12720, the operational context of the first device can be
determined.
[0940] At 12730, based on a determination that the second device is
proximate to the first device, the second device can be associated
with the operational context.
[0941] At 12740, one or more actions with respect to the second
device can be initiated, such as based on an association of the
second device with the operational context.
[0942] FIG. 128 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0943] At 12810, an operational context with respect to a first
device can be determined, e.g., prior to a determination of an
operational context of a second device.
[0944] At 12820, based on a determination that the second device is
proximate to the first device, the second device can be associated
with the operational context.
[0945] At 12830, one or more actions can be initiated, such as with
respect to the second device. In certain implementations, such
actions can be initiated based on an association of the second
device with the operational context.
[0946] FIG. 129 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0947] At 12910, a first aspect of an operational context
determination can be received, such as from a first device.
[0948] At 12920, a second aspect of the operational context
determination can be determined, e.g., with respect to a second
device (e.g., a device that is proximate to, in communication with,
etc, the first device). It should be understood that, in certain
implementations, the first aspect of the operational context
determination may be determined based on one or more inputs
originating from one or more first sensors (e.g., an accelerometer)
and the second aspect of the operational context determination may
be determined based on one or more inputs originating from one or
more second sensors (e.g., GPS).
[0949] At 12930, based on the first aspect of an operational
context determination and the second aspect of the operational
context determination, one or more actions can be initiated, such
as with respect to at least one of (a) the first device, (b) the
second device, or (c) a user of at least one of the first device or
the second device.
[0950] At 12940, a determination of the first aspect of the
operational context determination with respect to the second device
can be precluded, prevented, stopped, etc., such as based on
receipt of the first aspect of an operational context determination
from the first device. For example, having received various
motion/orientation inputs (e.g., from an accelerometer/gyroscope,
etc. of a first device), a second device may be precluded from
using its own corresponding sensors (e.g., its own accelerometer,
gyroscope), being that it can rely/depend on the determination
provided by the first device. Rather, the second device can use one
or more other sensors (e.g., GPS), and based on the
inputs/determinations (e.g., from both the first device and the
second device) considered and/or computed (e.g., with respect to a
trip, etc.), an operational context determination can be computed.
Moreover, the respective devices can be selected for certain
determinations based on various capabilities, statuses, etc., of
the device (e.g., sensors included in the device, battery level,
battery capacity, accuracy, etc.), such as in a manner described
herein. Moreover, in certain implementations the
roles/determinations of each respective device can change/be
adjusted over time, as is also described herein.
[0951] By way of further illustration, in certain implementations,
the context(s) (e.g., present within a vehicle, etc.) that may be
determined with respect to various mobile (and non-mobile) devices
may depend, among other things, on information received from the
sensor(s) that are included within or otherwise in communication
with such devices. However, in certain scenarios it may not be
efficient (or possible) to determine a particular context of a
first device (e.g., with sufficiently the same accuracy, latency,
power consumption, etc.) using (only) the sensors associated with
the first device. Accordingly, in certain implementations, such
context(s) of the referenced first device may be determined (in
whole or in part) based on determinations performed with respect to
inputs originating at one or more second devices, such as devices
that may provide complimentary information (which may or may not be
and conveyed directly or indirectly to the first device).
[0952] For example, in one implementation, a parent who wants to
protect a child's laptop from being used while driving, but which
laptop doesn't have the sensors needed to determine that it is in a
moving vehicle with sufficient accuracy, in a scenario in which a
smartphone is co-located in the vehicle (and is equipped with the
requisite sensors to satisfactorily determine that it is in a
moving vehicle, such as in the manner described herein), such a
smartphone can convey such "in a vehicle" information to the laptop
(e.g., via Bluetooth, Wifi, etc.), based upon which the laptop can
then restrict its usage accordingly.
[0953] In another implementation, a "feature phone" (i.e., a mobile
device without the sensors needed to satisfactorily determine
whether it is in a moving vehicle) can be protected from being used
in a moving vehicle in a scenario in which a smartphone is
co-located within the vehicle. For example, once the smartphone
determines that it is in a vehicle (such as in the manner described
herein), such a determination can be conveyed to the "feature
phone" (which may then shuts itself off or restrict itself in some
other way) or a 3rd party (e.g., the feature phone's mobile
operator or administrator) who can then restrict the device's
ability to send/receive texts on the network side.
[0954] In another implementation, a company which has a policy to
disallow the operation of device cameras in certain locations
(e.g., for security reasons) may not be able to effectively
implement/enforce such policy on devices that are not able to
satisfactorily self-locate. Accordingly, in a scenario in which one
or more second devices (e.g., smartphones) can satisfactorily
self-locate (in whole or in part), and can be determined to be
proximate to the first device, a determination that the device is
present within a secure area can be transmitted, based on which the
camera policy can be applied.
[0955] In another implementation, it may be advantageous to utilize
more than one second device to provide the data needed (with or
without participation from a first device) to determine the context
of a first device. In some cases, leveraging multiple devices, if
available, and breaking down tasks across the devices can assist in
improving accuracy, reducing latency and reducing power used. For
example, a first second device may attempt to determine a walking
context of a first device (e.g., a laptop or a feature phone) using
an accelerometer, whereas a second device may attempt to determine
the walking context of the first device using a gyroscope. Both
second devices pass their data to the first device (e.g., the
laptop) which then makes a determination as to whether or not it is
walking or to a third part (e.g., a remote server) that makes the
calculation and, for example, passes the results to the first
device or to another server.
[0956] Turning now to FIG. 22, a flow diagram is described showing
a routine 2200 that illustrates a broad aspect of a method for
eliciting an authentication at a mobile device 105 in accordance
with at least one embodiment disclosed herein. It should be
understood that in certain implementations, such mobile device
preferably has one or more authentication modes, such as a first
authentication mode and a second authentication mode. Moreover, in
certain implementations, such a mobile device preferably has a
single authentication mode having a range of settings/parameters
that can be adjusted, as described in detail herein.
[0957] At step 2205, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, employs one a first authentication mode at/in relation to
mobile device 105. By way of example, a first authentication mode
can include a lock screen or mode (such as those referenced above
at step 1710) wherein a user is prompted/required to provide
alphanumeric input(s) in completion of a CAPTCHA exercise, complete
an interactive puzzle, etc.
[0958] At step 2210, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, receives a first authentication attempt. For example, such a
first authentication attempt can include an input provided by the
user in attempting to authenticate/unlock the device, such as
alphanumeric input(s) (in the case of a CAPTCHA prompt), an input
attempting to perform an interactive puzzle, etc.
[0959] At step 2220, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, processes the first authentication attempt to determine a
degree of authentication success. For example, in the case of a
CAPTCHA prompt, the first authentication attempt (that is, the
alphanumeric characters input by the user) can be processed to
determine the degree to which the input was successful in
performing the task required to authenticate the device (such as
the percentage of characters in the CAPTCHA prompt that were
properly input by the user).
[0960] At step 2225, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, employs a second authentication mode based on the first
authentication attempt. That is, it can be appreciated that in a
scenario where the first authentication attempt did not
successfully authenticate the device and/or where the first
authentication attempt did not meet a certain degree of
authentication success (e.g., inputting at least 70% of the
characters in the CAPTCHA prompt correctly), a second
authentication mode can be employed. In certain implementations,
such a second authentication mode preferably entails an
authentication mode that is more restrictive and/or more difficult
to authenticate than the first authentication mode. For example,
the second authentication mode can require a certain delay (e.g.,
30 seconds) before another authentication attempt can be received
at the mobile device. By way of further example, a second CAPTCHA
prompt can be presented requiring the user to input more letters
than the first CAPTCHA prompt and/or to input such letters more
accurately, in order to authenticate/unlock the device.
[0961] At step 2226, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, maintains a log of authentication attempts. At step 2230,
processor 110 executing one or more of software modules 130,
including, preferably, restriction module 171, transmits one or
more notifications regarding one or more authentication attempts,
such as to a third party. It can be appreciated that in doing so,
such authentication attempts can be monitored, and users who
consistently fail to authenticate their devices can be identified
as potentially attempting to authenticate their devices while
driving.
[0962] By way of further illustration, it can be appreciated that
in certain implementations, such as those described above, it can
be advantageous to make passenger authentication attempts, which
come after failures to authenticate, increasingly/progressively
difficult. In certain implementations, this can be achieved by
requiring that a certain amount/duration of time elapse before a
device, whose authentication has failed, can elicit and/or receive
a re-authentication attempt. Such time can also be configured to
increase progressively after each authentication failure. Moreover,
in certain implementations, such authentication failures can be
reported one or more third parties. Moreover, in certain
implementations, such authentication failures can entail one or
more dynamic changes/adjustments to the parameters of the various
techniques required to successfully authenticate (e.g., the device
must be more stable on successive attempts in order to
authenticate).
[0963] It should also be noted that in certain implementations the
details of the passenger authentication can be reported/transmitted
to one or more third parties, and corresponding logs can be
established/maintained for them.
[0964] Turning now to FIG. 23, a flow diagram is described showing
a routine 2300 that illustrates a broad aspect of a method for
eliciting an authentication at a mobile device 105 in accordance
with at least one embodiment disclosed herein. It should be
understood that in certain implementations, such mobile device
preferably has one or more authentication modes, such as a first
authentication mode and a second authentication mode. Moreover, in
certain implementations, such a mobile device preferably has a
single authentication mode having a range of settings/parameters
that can be adjusted, as described in detail herein.
[0965] At step 2310, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, receives one or more inputs, substantially in the manner
describe in detail above with respect to step 1710. Examples of
such inputs include, but are not limited to, inputs relating to
speed, location, road type, time of day, weather conditions,
traffic conditions, (as received, perceived and/or determined based
on one or more inputs of the sensors of a particular device,
information and/or data received from one or more external sensors
and/or devices, such as, for example, external data streams, RSS
feeds, and/or databases, such as those accessible over a GPRS data
connection, and/or computations and/or determinations that are
computed based on one or more of such inputs, information, data,
etc.).
[0966] At step 2320, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, processes the input(s) to compute one or more determinations.
Preferably the determinations reflect a degree to which a user,
such as a user in a moving vehicle, is likely to be capable of
multitasking and/or is distracted and/or is potentially distracted
or distractible. For example, it can be determined that a user of a
device present within a vehicle moving at a high rate of speed is
likely to be more distracted (such as in scenario where such a user
is the driver, on account of the increased concentration that the
driver must dedicate to driving at a higher speed) and/or subject
to the increasing force(s) (such as in a scenario where such a user
is a passenger, especially while the vehicle is moving laterally),
moreso than a user in a vehicle moving at a relatively lower rate
of speed.
[0967] At step 2330, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, employs an authentication mode at the mobile device based on
the determination. It should be understood that in certain
implementations such an authentication mode can include multiple
parameters, settings, and or configurations, while in other
implementations such an authentication mode can be selected from
among multiple distinct authentication modes, such as a first
authentication mode and a second authentication mode. For example,
as referenced above, it can be appreciated that a driver present in
a vehicle moving at a relatively high rate of speed is likely to be
potentially more distracted, and thus relatively less able than a
driver present in a vehicle moving at a relatively low rate of
speed to provide even a relatively simple authentication (while, at
the same time, a passenger in such a vehicle can be similarly
limited, on account of the forces imposed on the user while riding
in such a fast moving vehicle). It can be similarly appreciated
that a user traveling within a vehicle moving at a relatively
slower rate of speed is likely to be more capable of multitasking,
even while driving, than a comparable user traveling within a
vehicle moving at a relatively faster rate of speed, and thus can
be determined to be relatively less distracted than such a
comparable user traveling in a vehicle moving at a relatively
faster rate of speed. As such, in certain implementations, one of
the various authentication modes and/or settings thereto can be
employed/selected based on a determination that reflects the
likelihood that the user is/is not distracted/able to multitask.
Thus, by way of illustration, in certain implementations, when the
vehicle is moving at a relatively slower rate of speed, an
authentication mode/setting requiring relatively more
concentration/attention can be employed (such as a CAPTCHA prompt
requiring six letters to be correctly/accurately input in order to
authenticate/unlock the device), and when the vehicle is moving at
a relatively faster rate of speed, an authentication mode/setting
requiring relatively less concentration/attention can be employed
(such as a CAPTCHA prompt requiring only four letters to be
correctly/accurately input in order to authenticate/unlock the
device) can be employed.
[0968] By way of further illustration, it should be noted that any
and all of the implementations, methods, and approaches described
herein, including those enumerated above, can also be employed in a
manner whereby the difficulty of the task presented to and/or
required of a user in order to authenticate the in-vehicle role of
a user as a passenger (including the time needed for a user to
perform an action in order to so authenticate his/her identity as a
driver or passenger, and/or the time limit within which the user is
required to so authenticate), can be determined and/or adjusted
dynamically based upon any number of factors. By way of example,
factors such as speed, location, road type, time of day, weather
conditions, traffic conditions, (as perceived and/or determined
based on one or more inputs of the sensors of a particular device,
information and/or data received from one or more external sensors
and/or devices, such as, for example, external data streams. RSS
feeds, and/or databases, such as those accessible over a GPRS data
connection, and/or computations and/or determinations that are
computed based on one or more of such inputs, information, data,
etc., such as in the manner described in detail herein) can be
considered and/or processed in order to determine and/or adjust one
or more operational parameters of a particular authentication
task/mode or tasks/modes, as described above. For example, in a
scenario where the vehicle within which the user is traveling is
moving at a relatively slow speed, the user can be required to
complete an authentication task within a relatively shorter time
limit (as compared to when the vehicle is moving at a relatively
faster speed), thereby accounting for the fact that when traveling
at a slower speed, a driver may be able to divert his/her attention
from driving for a relatively longer time interval (as compared to
when driving faster). As such, the time limit within which the
authentication task must be completed can be reduced at lower
speeds. (Similarly, it can be appreciated that when traveling at
faster speeds, a passenger may require additional time to complete
an authentication task, accounting for the additional forces
attendant with travel at higher speeds.) By way of further
illustration, in certain implementations the duration of time
during which a particular authentication task must be performed can
also be adjusted dynamically based on any number of factors, such
as those referenced above. For example, when a vehicle is traveling
at a relatively slower speed, a user can be required to hold
his/her gaze into a camera of a mobile device for a relatively
longer period of time than such authentication may require when
traveling at relatively faster speeds. Being that at slower speeds
a driver may be able to divert his/her attention from driving for
relatively longer periods of time (as referenced above), the
authentication task/mode can be adjusted (such as by requiring that
the task be performed continuously for a longer period of time) in
order to account for this discrepancy/difference. It should also be
noted that in certain implementations, the particular
authentication task required of a user (e.g., a swipe unlock
gesture, a puzzle, etc.) can be changed or substituted depending on
the various factors referenced above. Thus, for example, at one
speed a swipe unlock gesture can be required in order to
authenticate the user as a passenger, while at another speed a
puzzle must be completed in order to complete such
authentication.
[0969] Moreover, in certain implementations one or more of the
authentication tasks/modes referenced herein can be stopped
prematurely and/or continued indefinitely depending upon inputs
received from one or more sensors that correspond to behavior of a
user. For example, if, at some point prior to the end of such a
task, the device is determined to be likely to be operated by a
driver (e.g., the device or aspects thereof are moving in a certain
manner that can be determined to resemble that of a driver, such as
(a) a relatively significant amount of `shaking` as can be
measured/determined based on inputs originating at the
accelerometer and/or gyroscope of the device and/or (b) the manner
in which the user input is provided can be determined to more
closely resemble that of a driver, such as based on relatively
inexact key presses, time to press keys, etc.), (a) the task can
automatically be ended prematurely in failure, (b) the task can be
scored/registered as failed, even despite the fact that the user
may have completed the actual task successfully (and vice versa),
and/or (c) the task length/time/difficulty is dynamically changed
(i.e., the time in which the user must complete the task can be
lengthened or shortened, the difficulty of the task can be
increased or decreased, etc.), such as in the manner described
herein.
[0970] In certain implementations, the authentication task can
include elements that may require a response to be provided by the
user (e.g., numbers that are presented on the display screen of the
device for a fixed or dynamic/random period of time), whereby (a)
the element location on the device screen contains or otherwise
incorporates a random or varying component/aspect (e.g., elements
are placed in different locations on the device display screen on
different passenger authentication attempts), (b) the element sizes
contain or otherwise incorporate a random or varying
component/aspect, (c) the element orientations contain or otherwise
incorporate a random or varying component/aspect (e.g., they can
rotate around an axis, reflect through an axis, etc.), (d) the time
between the presentation of elements contains or otherwise
incorporates a random or varying component/aspect, and/or (e) the
time during which the element remains on device's display screen
contains or otherwise incorporates a random or varying
component/aspect. It should also be understood that, in certain
implementations, the referenced task elements can be arranged in a
static manner (e.g., element 1 is placed at location A, in
orientation B for as long as it appears) or can be arranged in a
dynamic manner (e.g., element 1 is placed on the device display
screen at location A and in orientation B, but moves from location
A to some other location (along any path, even a non-continuous
one) and/or changes its on-screen orientation from orientation B to
some other orientation (e.g., in any way, even if not necessarily
continuous), such as for as long as it appears.
[0971] In certain implementations, the difficulty of any of the
authentication tasks described herein can be adjusted (e.g., up or
down), such as based upon the age of the user of the device (as can
be determined, for example, based on the adeptness of the user at
completing such tasks). It can be appreciated that in many
scenarios relatively younger users will be more adept than older
users. In addition, users who actively engage in activities that
are similar to such task (e.g., game playing, etc.), will be able
to perform the task faster and with fewer errors than those who do
not.
[0972] As such for example, the younger and/or more adept a user
can be determined to be, the harder the passenger authentication
task that can be presented to such user. For example, (a) the time
to complete the task will be shorter for a younger and/or more
adept user than for an older and/or less adept user, and/or (b) the
substance of the task to be performed by a young and/or adept user
can be more difficult than that for an older and/or less adept
user.
[0973] The age and/or adeptness of the device user may be (a)
identified (e.g., having been provided by a parent, an employer,
etc.), (b) discovered (e.g., from auto-fill settings, social
network information), (c) determined/estimated (e.g., based on the
applications (e.g. games), installed on the device, the number of
texts sent on average per unit of time, the type of e-mail accounts
on the device (e.g., work/corporate vs. not work), the existence of
any connections that might suggest corporate citizenship (e.g.,
Exchange/APN/VPN), the hours of activity, the speed of typing, the
maturity of the prose used in messages, or any other such
indicators of the age/adeptness of a user of the device) and/or (d)
learned (e.g., adjusted dynamically based upon the adeptness
displayed in relation to the device, such as in previous passenger
authentication task attempts).
[0974] Additionally, in certain implementations, an authentication
task can require that at least one hand of the user be constantly
engaged with the device for substantially the entire task. For
example, the user can be prompted to place a finger on a certain
part of the screen (which part of the screen may not be the same
from trial to trial) or a certain button which the user is required
to hold throughout the task (or else the task may end in failure),
such as in the manner described herein in relation to FIG. 15A.
Alternatively, the user can be required to perform a gesture with
one hand, and to maintain the gesture throughout the task in a
manner that is perceptible by the device (e.g., by a camera).
[0975] In yet other embodiments, different tasks can be assigned to
each of a user's hands. For example, one hand can be required to
perform a fixed task (e.g., maintaining contact with a particular
area of the device, such as the screen, as described above), while
the second hand is required to perform a non-fixed task (e.g.,
typing).
[0976] It should also be noted that, in certain implementations, it
can be advantageous to allow passengers to be authenticated by
3.sup.rd parties, despite previous failed, inconclusive,
incomplete, or non-existent authentication attempts, such as the
results of one or more of the above referenced methods. For
example, if mobile device 105 is damaged or malfunctions (e.g., due
to a broken sensor, environmental disturbances such as weather
conditions affecting the performance of the GPS, etc.) thereby
precluding various of the authentication methods/approaches (such
as those described herein) from being employed effectively, a third
party such as an employer or a parent can remotely provide such
authentication, such as in a manner known to those of ordinary
skill in the art.
[0977] It should also be noted that various of the methods
described herein are described with reference to a road system
where the cars travel on the right-side of the road and where
drivers are seated on the left-side of the vehicle. However, it
should be understood that the methods described herein are not so
limited, and can be similarly employed/transferred to other road
systems (such as that of the United Kingdom).
[0978] Turning now to FIG. 24, a flow diagram is described showing
a routine 2400 that illustrates a broad aspect of a method for
selectively modifying a restriction employed at a mobile device 105
in accordance with at least one embodiment disclosed herein.
[0979] At step 2410, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, receives one or more inputs, substantially in the manner
describe in detail above with respect to step 1710. For example,
such inputs can originate at the accelerometer and/or gyroscope of
the mobile device 105, and reflect the movement/motion that the
device perceives.
[0980] At step 2420, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, processes the input(s) to compute one or more trends/patterns.
By way of example, inputs, such as those received at step 2410, can
be processed to determine one or more patterns, such as those that
correspond to driving and/or walking (e.g., by comparing the
various inputs to operation signatures that correspond to such
activities, as is known to those of ordinary skill in the art). In
doing so, one or more trends/patterns can be computed, such as a
trend/pattern that reflects that the user of the device is now
walking. By way of further illustration, a trend/pattern can be
computed reflecting the docking status of a mobile device, such as
in the manner described in detail herein.
[0981] At step 2442, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, adjusts an implementation of one or more restrictions at/in
relation to mobile device 105 (that is, employs one or more
restrictions, modifies an implementation of one or more previously
employed restrictions, and/or removes one or more previously
employed restrictions) based on the one or more trends/patterns.
For example, in certain implementations, despite having previously
determined that the user of mobile device 105 is a driver of a
vehicle (and thus employing one or more restrictions on such a
device), upon computing one or more trends/patterns that indicate
that the user of the device is now walking (and thus is no longer
driving a vehicle), such previously imposed restrictions can be
adjusted, eased, removed, etc. By way of further illustration,
based on a determination of the docking status of a device, as
described in detail herein, one or more restrictions appropriate
for a docked device (e.g., a restriction that prohibits voice calls
to be made/conducted) can be modified/eased/lifted.
[0982] By way of further illustration, in certain implementations,
after a device is placed in driver mode (e.g., the user of the
device been authenticated as a driver and/or the device and/or
restriction are configured such that the device operates by default
in driver mode, until the user can prove otherwise by way of one or
more authentications, such as through the methods described herein)
a further determination can be made with regard to whether the
device remains or is no longer in a moving vehicle. In doing so,
some or all of various restrictions referenced herein, e.g.,
operation of a mobile device in a `driver mode.` can be suspended
and/or canceled, thus returning the device to its default,
un-restricted operation. In various implementations, such a
determination can be computed (for example, using inputs
originating at one or more of the GPS, the accelerometer, the
gyroscope, and/or the RF transceiver/antenna to know which cell
towers the device is in communication) based on (a) whether the
vehicle has not moved above a certain speed for more than a certain
period of time: and/or (b) whether the vehicle has not moved above
a certain speed for more than a certain portion over a period of
time (the `timeout period`). Additionally, in certain
implementations, a user who was previously identified as a driver
can be enabled to authenticate that he/she is no longer the driver
of a moving vehicle in order not to have to wait the full timeout
period before regaining full control over the device. In certain
implementations, this can be achieved, for example, (a) by holding
the device so that the camera of the device can capture (and
recognize, such as with face recognitions methods, as are known to
those of ordinary skill in the art) the presence of a face (or eyes
or gaze etc.) and by then rotating 360 (or more or fewer) degrees,
as measured by device's sensors (e.g., magnetometer, gyroscope,
accelerometer, etc.), during which time the camera perceives the
face (or eyes or gaze etc.); (b) by touching the device in a manner
that can be detected (e.g., touching the screen, holding a button,
etc.) and by then rotating 360 (or more or fewer) degrees, while
the user maintains his/her touch or hold on the device: (c) by
moving the device (e.g., up, down, sideways) a distance greater
than the distance that a driver in a moving vehicle is able to as
measured by the device's sensors (e.g., accelerometer, gyroscope,
etc.): and/or (d) by taking a visual capture from close range of a
license plate (such a visual capture can be processed to identify
an indication of a degree of close proximity of a license plate. It
can be appreciated that a driver of a moving vehicle is likely to
be incapable of capturing a visual capture within close proximity
of a license plate).
[0983] It can be appreciated that the referenced techniques are
preferably actions or tasks that are difficult, if not impossible,
for a user to perform while he/she is still the driver of a
vehicle.
[0984] FIG. 59 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0985] At 5910, a trip initiation instance can be identified. Such
a trip initiation instance can be, for example, an occurrence with
respect to which it can be determined that a trip (e.g., traveling
in a vehicle) has begun and/or is currently underway. In certain
implementations, such a trip initiation instance can be identified
using one or more `trip start` identification/determination
techniques described herein. Moreover, in certain implementations,
such a trip initiation instance can be identified with respect to a
device (e.g., a smartphone present within a vehicle).
[0986] At 5920, a trip conclusion instance can be identified. Such
a trip conclusion instance can be, for example, an occurrence with
respect to which it can be determined that a trip (e.g., traveling
in a vehicle) is ending/has ended. In certain implementations, such
a trip conclusion instance can be identified using one or more
`trip end` identification/determination techniques described
herein. In certain implementations, such a trip conclusion instance
can be identified with respect to the device (e.g., the device with
respect to which the trip initiation instance was identified at
5910).
[0987] At 5930, a determination that a user of/associated with the
device is likely to be a driver or a passenger can be computed. In
certain implementations, such a determination can be computed using
one or more techniques described herein (e.g., user role
determination techniques).
[0988] At 5940, one or more actions or operations can be initiated.
In certain implementations, such actions/operations can be
initiated subsequent to identifying the trip conclusion instance
(e.g., at 5920). Moreover, in certain implementations such actions
can be initiated in relation to the device and/or the user.
Moreover, in certain implementations such actions can be initiated
based on/in response to a determination that the user of the device
is likely to a driver or a passenger.
[0989] Examples of such action(s) can include actions that are not
necessarily related to device restrictions. Moreover, in certain
implementations such action(s) may be related to the device (e.g.,
send a message from the device to another party or entity) or not
related directly to the device (e.g., charge an insurance policy).
It should be further understood that such actions(s) may be
tailored or configured to a particular context, setting, and/or
industry. For example, with respect to a `pay as you go` insurance
policy/company, the determination as to whether the user of the
device (which was determined to previously have been in a trip) was
the driver or the passenger can dictate whether the insurance
company will or will not charge the user for the trip (as described
in greater detail below). In a corporate/enterprise context, the
determination as to whether the user (e.g., an employee of the
company) of the device (which was determined to previously have
been in a trip) was the driver or the passenger can be reported to
the employer and/or used to determine whether the employee is
complying with company policy (e.g., that drivers should not use
their devices in certain ways while driving). In a parent/child
context, the determination as to whether the user (e.g., a child)
of the device (which was determined to previously have been in a
trip) was the driver or the passenger can be reported to the parent
and/or used to determine whether the child is complying with a
policy dictated by the parent and/or the law (e.g., that drivers
should not use their devices in certain ways while driving). In a
regulatory/law enforcement context, the determination as to whether
the user (e.g., a citizen) of the device (which was determined to
previously have been in a trip) was the driver or the passenger can
be reported to an agency and/or used to determine whether the user
is complying with a policy recommended and/or required by law
(e.g., that drivers should not use their devices in certain ways
while driving).
[0990] By way of illustration, it can be appreciated that in some
cases it may be advantageous to identify/determine the role of the
user of a device (e.g., as a driver or passenger) that is (or has
been) present in a trip, such as using one or more of the
techniques described herein, even if such determination is only
made after the trip has begun or even after the trip has ended
(e.g., for reasons of accuracy, power, performance). In some cases
such role determination may be achieved with higher accuracy
(and/or lower power consumption) after additional inputs from one
or more sensors and/or radios (and/or alternative, lower power
sensors) have become available/received and/or analyzed. For
example, with respect to an insurance company that charges its
policyholders based upon the amount they drive (e.g., "Pay How Much
You Drive" insurance) and utilizes the policyholder's mobile
devices to help monitor how much the policyholder drives (e.g., in
time, distance, etc.) it can be advantageous to determine/identify
whether the policyholder was the driver (in which case they will be
charged) or the passenger (in which case they will not be charged)
during each trip. In many cases, however, it is not necessarily
imperative that such determination be made (or verified) close to
the beginning of the trip it is sufficient that the determination
be made later into the trip or at (or after) the end of the trip
(in particular if making such a determination later can help
improve the accuracy of such determination). In another example,
the described techniques can be implemented by a driver safety
research organization which wants to be able to test the effect of
certain educational policies on device use by drivers. In order to
do so, it wishes to identify certain behaviors as dangerous only
when the user is a driver, but there is no significant advantage to
making such determination at or near the start of a trip.
[0991] Moreover, in certain implementations the in-vehicle role of
a user can be used in order to further determine whether a set of
data should be included or not used/included in calculating one or
more further determinations/scores (e.g., a driver score), which
can be used to give feedback (e.g., to drivers, 3rd parties like
employers or parents) or can be used as a factor to price vehicle
insurance premiums (e.g., by insurance companies).
[0992] In certain implementations the relationship between the use
of the device and the speed at which the vehicle is traveling can
be used in determining the in-vehicle role of the device user. For
example, device use by drivers happens relatively more frequently
at lower speeds than passenger device use (e.g., relative frequency
of driver use is higher than passenger use at red lights).
[0993] In certain implementations, a user of a restricted mobile
device (e.g., a mobile device that is restricted in one or more
ways, such as when the device is determined to be present within a
vehicle and/or a trip, until the user successfully verifies that
he/she is a passenger, such as in a manner described herein), such
as a device that is present within a vehicle/trip, can be
determined/identified/assumed (e.g., by default) that if/so long as
the user does not verify him/herself as a passenger, they are the
driver. Such a determination/identification/assumption can be
provided to one or more other services or third parties, including
but not limited to: (a) an application (e.g., executing at the
device or remotely) pertaining to a usage-based insurance product
which may take various action(s) depending on whether the
policyholder is determined to be the driver (e.g., in which case
his/her driving behavior may be logged and/or scored and factor
into his/her insurance premium) or a passenger (in which case it
will not); (b) an application (e.g., executing at the device or
remotely) pertaining to a "per-mile" or "per-hour" based insurance
product which may take various action(s) depending on whether the
policyholder is the driver (e.g., in which case she may be charged
an insurance premium for such trips) or a passenger (in which case
she will not). Moreover, in certain implementations the referenced
determination/identification/assumption (e.g., reflecting that a
user who doesn't verify as a passenger over the course of a trip is
in fact a driver) can be weighted or scored (reflecting, for
example, the a degree of likelihood or certainty with respect to
the determination/identification/assumption), and such a
weight/score can be increased based on various factors including
but not limited to: (a) the distance of the trip (the longer the
trip, the more likely a user who does not authenticate as a
passenger is likely to be a driver), (b) the more active a mobile
device user the user is (the more active the user is, the more
likely it is that if the user does not authenticate, that he/she is
likely to be a driver), and/or (c) the higher the frequency at
which the user verifies as a passenger when she is a passenger (the
more often the user authenticates as a passenger, the more likely
it is that if the user does not authenticate, that he/she is likely
to be a driver), and the converse.
[0994] In certain implementations, the accuracy, latency and/or
power of the methods used to differentiate between passengers and
driver can be improved by using vehicle class determinations, e.g.,
if it can be determined that, with sufficient likelihood, a device
is (or was) on a mass transportation vehicle (e.g., train, bus)
during a trip, then that device can be determined to be (or have
been) a passenger device for that trip and the driving data from
such trip will not serve to affect the user's usage-based insurance
score/rating.
[0995] FIG. 54 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[0996] At 5410, it can be determined that one device is connected
or otherwise linked to another device, (e.g., an in-vehicle
system). For example, various technologies and protocols enable the
connection of a mobile device to an in-vehicle system (e.g., an
infotainment system, a communication system, etc.), such as
MirrorLink. AppLink. Sync, Intelilink. ConnectedDrive, and others.
In many such vehicle systems, when a device is connected, the
device can/must cede/relinquish some or all control of the device
to the vehicle system for as long as it is connected (or, in
certain implementations, for as long as the vehicle is moving,
ignited, and/or in gear). It can be further appreciated that such
vehicle systems can be configured in a manner that reduces user
distraction (e.g., based on NHTSA Phase I guidelines).
[0997] Accordingly, in certain implementations, a mobile device
determined to be connected to a vehicle (e.g., to one of such
in-vehicle systems) can be identified/determined to be relatively
less distracting (e.g., by virtue of the configuration of the
system to which is connected and/or the manner in which such a
system can control/override operation(s) of the mobile device,
e.g., in view of various safety guidelines that the system is
configured with/based on), as compared to a device that is present
within a vehicle but not connected to, an in-vehicle system.
[0998] At 5420, one or more restrictions can be employed, such as
at/with respect to the device. In certain implementations, such
restrictions can be employed based on a determination that the
device is no longer connected to the in-vehicle system. That is, it
can be appreciated that the referenced reduction in driver
distraction (e.g., based on a connection of the device to such a
system configured based on various safety guidelines) may be
ephemeral, as a user may simply disconnect the mobile device from
the in-vehicle system to release/remove any such restriction(s).
Accordingly, in certain implementations, upon determining that a
device is disconnected from an in-vehicle system (e.g., by sensing
the termination of a wired or wireless connection on the device),
one or more restrictions can be employed (and/or continue to be
employed) at/in relation to the device, e.g., for as long as one or
more conditions are met (e.g., the device is determined to remain
in a moving vehicle, the device is determined to remain in an
ignited, or in-gear vehicle). Alternatively, in certain
implementations, such restrictions can be employed at/in relation
to the device until such time as one or more other conditions can
be determined to be met (e.g., the vehicle is no longer moving, the
device is no longer in the vehicle, the vehicle is no longer
ignited, the vehicle is no longer in gear, etc.). It should be
understood that the detection of these various conditions and
states can be achieved, for example, using one or more of the
techniques described herein or until the user is identified as or
authenticates as a passenger (e.g., in the event that the device
that was disconnected is being used by a passenger), using, for
example, one or more of the techniques described herein.
[0999] At 5430, one or more restrictions (such as those employed at
5420) can be adjusted or otherwise modified. In certain
implementations, such restrictions can be adjusted (e.g., eased,
loosened, removed, etc.) based on a determination that the device
has been reconnected to the in-vehicle system.
[1000] At 5440, the referenced restrictions (such as those employed
at 5420) can be maintained. In certain implementations, such
restrictions can be maintained for as long as the vehicle in which
the device is determined to present is determined and/or perceived
to be in a trip (as determined using one or more of the techniques
described herein).
[1001] At 5450, one or more restrictions (such as those employed at
5420) can be adjusted. In certain implementations such restrictions
can be adjusted based on a perception of one or more changes in an
operation of a vehicle, such as a vehicle associated with the
referenced in-vehicle system (e.g., the vehicle in which the device
is present/traveling). Examples of such changes include but are not
limited to changes that pertain to an ignition state of the vehicle
(e.g., whether the car and/or its engine is on or off), and/or an
in-gear state of the vehicle (e.g., whether the vehicle is in
`drive` or `park`).
[1002] FIG. 55 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1003] At 5510, it can be determined that a first device (e.g., a
smartphone, mobile device, etc.) is proximate (or is relatively
likely to be proximate to) to a second device (e.g., within a
certain distance, radius, etc. of the second device). As described
herein, such a second device can be, for example, one or more
wireless hardware components (e.g., WiFi access point, Bluetooth
devices, speakers, NFC, etc.).
[1004] At 5520, one or more trip detection techniques (such as
those described herein) can be employed. In certain
implementations, such trip detection techniques can be employed
based on a determination (e.g., at 5510) that the first device is
proximate to and/or can otherwise perceive the second device
(and/or can perceive signals, such as wireless signals, which
originate from the second device). For example, having determined
that a mobile device can perceive a particular access point (e.g.,
an access point within the vehicle), one or more trip detection
techniques can be employed, in order to determine whether the
device is present within a trip. Moreover, in certain
implementations, one or more of such trip detection techniques can
be adjusted based on a determination (e.g., at 5510) that the first
device is proximate to and/or can otherwise perceive the second
device (and/or can perceive signals, such as wireless signals,
which originate from the second device).
[1005] Moreover, it should be understood that in certain
implementations the determination that the first device is
proximate to the second device can reflect that the first device is
relatively likely to be present in a trip (e.g., in a vehicle that
is currently traveling). By way of illustration, in certain
implementations, in addition to (or instead of) the various other
techniques described herein (which may detect or determine when a
mobile device is present within a moving vehicle), an association
or correlation between various characteristics (e.g., IDs, signal
strengths, transmission channels, frequencies, etc.) of one or more
hardware components (e.g., wireless components, WiFi access points.
Bluetooth devices, speakers. NFC, etc.) that are present within the
vehicle (whether original equipment or after-market, whether
professionally-installed, user-installed or otherwise present
within the vehicle without requiring installation or without having
been installed) and various device movement characteristics (e.g.,
within a trip, not in a trip) can determined (and/or learned over
time, such as using machine learning techniques as are known to
those of ordinary skill in the art). When one or more of the
referenced devices (e.g., wireless hardware components that has
been associated with particular device movement characteristics is
perceived or otherwise observed (e.g., detecting that a certain
WiFi access point is in range of the mobile device), a
determination may be made as to whether the device is in a trip.
For example, if the 14 of the last 15 times that (i) input(s) from
one or more of the device's motion sensors (e.g., accelerometer,
GPS, etc.) indicated/reflected that it was relatively likely that
the device was in a trip (e.g., greater than a certain threshold
value), and (ii) the device was concurrently (or within a certain
time interval) determined to be in the presence of MAC address
11:22:33:44:55:66 with a signal strength greater than -80 dbm, upon
subsequently determining that the device is again in the proximity
of this MAC address (and its signal strength is sufficiently high),
it can be determined, concluded, or otherwise assumed that the
device is again within a moving trip (e.g., even without utilizing
other trip detection techniques, such as based on inputs from one
or more motion sensors). Such techniques can be advantageous, for
example, in a scenario in which the power consumption of various
motion sensors is higher than that of sensing wireless hardware
components (e.g., scanning, listening), such that tasks associated
with motion detection are performed after an initial perception
(e.g., of an access point, etc.).
[1006] In another implementation, an initial indication of movement
(e.g., based on inputs from various sensors such as an
accelerometer, etc.) can first be identified/determined and having
determined that motion is present (e.g., there is an increased
likelihood that the device may be within a trip), a further
determination can be made with respect to whether the device can
perceive/is in proximity to a hardware device (e.g., a wireless
access point, etc.). Such techniques can be advantageous, for
example, in a scenario in which the power consumption of various
motion sensors is lower than that of sensing wireless hardware
components (e.g., scanning, listening), such that tasks associated
with motion detection are performed prior to attempting to
perceive/identify hardware devices (e.g., an access point,
etc.).
[1007] At 5530, one or more notifications can be provided. In
certain implementations, such notifications can be provided in
relation to the first device. For example, in certain
implementations such notification can be provided based on a
determination (e.g., at 5510) that the first device (e.g., the
mobile device) is no longer proximate to (or can no longer
perceive) the second device (e.g., an access point).
[1008] By way of illustration, in certain implementations when (i)
a mobile device is within a certain proximity to a wireless
in-vehicle hardware component and/or (ii) after a trip start has
been determined (e.g., using one or more techniques described
herein), the device can be configured to notify/query the user as
to whether there is a young child in the vehicle (who might not be
able to exit the vehicle on her own). If the user indicates that
there is one or more such children in the vehicle, when it is
subsequently detected/determined that the device is no longer
within the referenced proximity to the same hardware component
(e.g., WiFi access point, etc.) and/or that a trip has stopped, the
device can notify or query the user to confirm that the young child
has been removed from the vehicle. The device may also send one or
more electronic updates or notifications (e.g., text, data, voice,
etc.) to one or more third parties (e.g., a worried mom) reflecting
the referenced status.
[1009] FIG. 56 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1010] At 5610, a proximity instance to a first device can be
associated. Such a proximity instance can be, for example, an
instance of a first device (e.g., a smartphone) being determined to
be within a defined proximity (and/or being capable of perceiving,
such as in the case of a WiFi access point or any other such
wireless transmitter/receiver) of a second device (e.g., an access
point, Bluetooth transmitter/receiver, etc.), and may be associated
with a trip state such as `within a trip.` As described in detail
herein, upon determining or otherwise identifying (e.g., based on
one or more prior observations) that a particular proximity
instance is associated, correlated and/or otherwise coincides with
various other inputs (e.g., motion inputs, such as may originate
from an accelerometer, GPS, etc.) that reflect and/or that can be
used to determine a trip state (e.g., whether a vehicle is or is
not currently in a trip), it can be further determined that
subsequent identifications of such a proximity instance can be
associated with a comparable trip state (e.g., even without
affirmatively confirming the trip state, e.g., via inputs from the
accelerometer. GPS, etc.).
[1011] At 5620, one or more actions can be initiated. In certain
implementations, such actions may be associated with the trip state
associated with the proximity instance. Moreover, in certain
implementations such actions can be initiated based on an
identification of the proximity instance with respect to a second
device (e.g., a Wifi access point). For example, upon identifying,
with respect to a particular device (e.g., a smartphone) a
proximity instance with respect to another device (e.g., a WiFi
access point) that has been associated with a particular trip state
(e.g., `within trip`), such a trip state can be imputed or
otherwise applied or associated with the device (e.g., smartphone),
and one or more actions (which may depend or be triggered by the
trip state such as device restrictions or authentication
techniques) can be initiated.
[1012] In certain implementations, instead of, or in addition to
querying the device user, a determination can be suggested or made
as to whether or not there is a young child in the vehicle and/or
whether or not the young child left the vehicle, such as based on
inputs originating from various vehicle occupant sensors in the car
(e.g., weight sensor, heat sensors, seat-belt sensor).
[1013] In some implementations, whether or not a user is in a trip
can be determined based on inputs/data perceived by one or more
sensors (e.g., motion sensors, wireless radios, environmental
sensors) from a user's one or more mobile devices and/or wearable
devices and/or an implantable device. For example, by looking at
those signals that are perceived both (i) by a wearable/implantable
device; and (b) by a phone, located in the same vehicle (e.g., by
filtering out signals that are perceived only by one device and not
by the other), trips can be detected because various
indicators/signals of a trip (e.g., lateral acceleration, forward
accelerations upward acceleration, pressure changes, light changes,
audio changes, etc.) are likely to be imparted/perceptible (albeit
perhaps with some variations), to some or all devices present in
the same vehicle.
[1014] Turning now to FIG. 18, a flow diagram is described showing
a routine 1800 that illustrates a broad aspect of a method for
selectively restricting an operation of and/or selectively
modifying a restriction employed at mobile device 105, such as
within a geographic area and/or a date/time window, in accordance
with at least one embodiment disclosed herein. As will be described
in detail herein, it can be appreciated that under certain
circumstances (e.g., within defined spaces and/or times) it can be
advantageous to control and/or influence the operation of one or
more mobile devices 105, 160 in various ways, such as by
configuring such devices to operate in a highly conspicuous/overt
fashion. For example, considering the distracting nature of mobile
device usage during class (particularly when used in an
inconspicuous fashion), it can be advantageous for a school to
require that its students only operate mobile devices 105, 160
during school days/time and/or on school locations/grounds and/or
in certain location within school grounds (e.g., classrooms) in a
manner that is highly conspicuous, thereby effectively precluding
the inconspicuous usage of such devices 105, 160 in settings where
their use is undesirable.
[1015] At step 1811, processor 110 executing one or more of
software modules 130, including, preferably, restriction module 171
generates one or more output(s), such as an audio output (such as a
beep or chirp) that is projected through speaker 146 of mobile
device 105. It should be understood that such outputs can be
configured/adjusted in any number of ways (e.g., in frequency,
duration, and/or volume), both with respect to their substance
(e.g., chirps, beeps, tones, etc.) and the periodic interval within
which they are projected (static and/or dynamic). In any event, it
should be understood that such outputs are preferably projected at
volumes and for durations such that inconspicuous operation of
mobile device 105, 160 is effectively precluded (e.g., in a
classroom setting) on their account. Moreover, in certain
arrangements it can be preferable that such outputs are not so loud
and/or so frequent so as to significantly annoy the user and/or
those around them while using mobile device 105, 160 in a permitted
setting. At this juncture, it should also be noted that in certain
arrangements, one or more of the referenced outputs can be
generated in response to one or more inputs, as will be described
in greater detail below. It should also be noted that, in certain
implementations, the referenced device can be configured to
generate/project such audio output(s) (e.g., `chirp(s).` etc.)
irrespective of one or more other settings (e.g., audio settings)
associated with the device (so, for example, the device can
continue to `chirp` even when set to silent/vibrate mode).
[1016] At step 1812, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, receives one or more inputs. For example, in certain
implementations one or more of the outputs projected by mobile
device 105 (such as through speaker 146, as described with
reference to step 1811) can, in turn be received, as inputs, at the
mobile device, such as through microphone 145D.
[1017] By way of further example, in other implementations the one
or more inputs can correspond to various user interactions with the
device, such as tactile interactions (e.g., with one or more
tactile sensors such as one or more buttons, a touchscreen, etc.,
as describe in detail herein) or device movements. Upon receiving
such inputs, one or more outputs can be projected, as described
above with respect to step 1811. (It should be understood that in
the referenced implementations, the sequence with which steps 1812
and 1811 occur are preferably reversed, such that inputs are
received, and then outputs are projected based on such inputs.
However, as noted herein, the various steps, operations, etc., that
pertain to and/or make up any and all of the various systems and
methods described herein should not be understood to be required to
be performed in a particular order or sequence. Rather, such steps
can be arranged and/or performed in any number of sequences, as can
be appreciated by those of ordinary skill in the art, and each such
sequence/arrangement should be understood to be encompassed by the
methods and systems disclosed herein).
[1018] By way of further example, it should be understood that in
certain implementations, the systems and methods disclosed herein
can be configured such that one or more of the output(s) that the
mobile device generates/projects upon/in response to a user input
are not readily audible to humans, though such output(s) are
perceptible to other electronic devices (e.g., a device used by a
teacher and/or in the classroom, such as the teacher's mobile
device and/or other devices such as devices configured to perform
and/or provide the same or similar functionality), in a manner
known to those of ordinary skill in the art. In such scenarios,
various devices, such as a device used by a teacher, can be
configured to perceive and recognize the referenced output(s) (that
is, those output(s) that are not readily audible to humans but
which may be in the audible range and not audible by virtue of
their short duration (temporal summation) and/or their low volume).
Moreover, such device(s), such as a device used by a teacher or
administrator, can be configured to generate and/or project another
signal, such as a signal that is readily audible to humans. In
doing so, the teacher and/or others can be alerted (by way of a
human-audible signal/tone) to the fact that a mobile device is in
use within the classroom. It can be appreciated that such an
implementation can be advantageous in certain situations because in
utilizing signals that are not audible to humans, potential
distractions arising as a result of periodic/ongoing projection of
audible noises (as emitted from chirp-enabled devices) are reduced.
Moreover, it should be understood that in certain implementations a
device, such as a device used by a teacher, can configure other
mobile devices (such as mobile devices belonging to students
present in the teacher's classroom and/or students in the teacher's
class) not to emit readily audible sounds during times when the
teacher sanctions use of mobile devices for his/her students, such
as for legitimate learning purposes. It should also be noted that
various of the implementations described herein can also be
configured such that a mobile device, such as a mobile device
belonging to a student, generates/projects output(s) that are
readily audible to human.
[1019] In certain implementations, the referenced chirp-enabled
mobile device(s) (e.g., a device belonging to and/or being used by
a student) can be configured to receive a special output (such as a
signal, as described herein) originating, for example, from another
device, such as a device controlled and/or operated by a teacher.
As referenced above, in certain implementations, such output/signal
can either be readily or not readily audible to humans, whereupon
the mobile devices that receive such signal preferably cease to
chirp (that is, to project/emit an output as described herein) when
the user interacts with the device for some period of time or until
they receive another signal that they should re-initiate chirping
when the user interacts with the device (it should be noted that in
other implementations the device can, by default, not be in chirp
mode, or cannot be in chirp mode on account of the teacher
disabling it, and chirp mode in such devices can be subsequently
activated by the teacher, such as by projecting the appropriate
signal to such devices). It should be noted that such special
signal is preferably secure so that it cannot be readily emitted by
all devices (e.g., non-Teacher Devices so as to unintentionally or
nefariously disable chirping on chirp-enabled mobile devices.
Methods of ensuring this security are known to those of ordinary
skill in the art. In certain implementations it can also be useful
to utilize two-way communication, including various forms of
"handshaking" between the mobile device(s) and the "teacher's
device," in a manner known to those of ordinary skill in the
art.
[1020] At step 1815, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, adjusts one or more aspects of one or more outputs based on
one or more of the inputs. That is, in certain implementations the
various device(s) can be configured whereby a device chirps in
response to one or more external stimuli (e.g., one or more sounds)
in a manner that configures the device to chirp more or less
frequently and/or more or less loudly. For example, a teacher that
hears a chirp, but is unsure as to which device in the classroom
emitted the chirp, can use his/her a mobile device or a different
electronic device, mechanical device and/or physiological action
(e.g., his/her voice or a hand clap) to emit a signal which, upon
receipt and processing by chirp enabled devices, causes such
devices to chirp, either in their usual manner or in an alternative
manner (e.g., in a more frequent and/or a louder manner).
Additionally, in certain implementations, one or more aspects of
the outputs/chirps can be adjusted based on various determinations,
such as a determination the device is operating in a regular/normal
fashion for an extended period of time (indicating that the present
use of the device is likely permitted), as described in greater
detail below.
[1021] At step 1820, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, processes the one or more outputs and the one or more inputs.
In doing so, a correlation between the one or more outputs and the
one or more inputs can be determined. By way of illustration, in
certain implementations a mobile device can be configured to chirp
(that is, to generate/project an output), such as in response to a
user's tactile input, such as a button press or a tap/gesture at a
touchscreen), and the mobile device can, in turn, receive/perceive
such chirps by receiving them as inputs via microphone 145D. As
such, a correlation can be computed, reflecting the degree to which
such outputs (that is, the chirps or signals projected from speaker
146 of mobile device 105) correlate with the inputs (that is, the
sound of such chirps/signals) are, in turn, received by microphone
145D. It can be appreciated that if a strong/close correlation can
be identified between such outputs/inputs, it is likely that the
mobile device is operating properly with respect to projecting and
receiving chirp signals. However, if such a strong correlation
cannot be determined, it can be determined that the mobile device
may have been/has been tampered with, such as in order to prevent
the projection of chirp signals (e.g., if the user breaks and/or
attempts to muffle/mute speaker 146).
[1022] By way of further illustration, in certain implementations
the presence/absence of one or more input(s) and/or the
presence/absence of a correlation between a first input and a
second input can be determined, while the device is within a
defined geographic area and/or within a defined date/time window.
That is, in certain arrangements restriction module 171 is
configured such that one or more inputs (e.g., depressing a button,
interaction with the touchscreen, device movement, etc.) cause the
outputting referenced above at step 1811. Thus, given that such
inputs trigger the projecting of the referenced audio output
through speaker 146, it can be appreciated that microphone 145D can
be easily configured to have the capacity to detect such an output
because the timing in which to look for the signals is exactly
known to the device. Accordingly, if a presence of an audio output
and/or a presence of a correlation between a first input (e.g., a
user depressing a button) and a second input (e.g., detecting the
audio output projected by speaker 146 in response to the user's
input at microphone 145D) is determined, the restriction scheme
(that is a scheme requiring such ongoing `chirping` in order to
prevent covert operation of the mobile device) can be determined to
be working properly, and no change or adjustment need be made
(given that the restriction(s) are preferably configured, in
certain implementations, to allow the device 105, 160 to operate in
a conspicuous manner). However, if the presence of an audio output
and/or the presence of a correlation between a first input (e.g., a
user depressing a button) and a second input (e.g., detecting the
audio output projected by speaker 146 in response to the user's
input at microphone 145D) is not determined, the restriction scheme
can be determined to be unlikely to be working properly. This
malfunction can, in certain circumstances, be due to a user
attempting to prevent mobile device 105, 160 from functioning
properly, perhaps in hopes of avoiding the referenced
effects/restrictions. In such a case, where it has been determined
that device 105, 160 is not operating properly, one or more
restrictions can be employed, modified, and/or removed. In doing
so, the framework established can ensure that unauthorized use of
the device 105, 160 (e.g., during a class) is effectively
precluded, except, in certain circumstances, such as in emergency
situations. By way of further illustration, it may be useful for
the device to output sound (e.g., frequency, duration, volume) from
its speakers and listen for it on its microphone, unrelated to the
user's interaction with the device, and where such sounds are
similar to the sounds that the teacher devices transmit so that the
device will not be blocked from receiving the signals from the
teacher's device if and when they are transmitted. If the student
device does not receive the signals so transmitted by the student
device, i.e., the speaker and/or microphone are not working
properly, the device will be restricted.
[1023] Moreover, in certain implementations, in response to such
previously described external stimuli, only those devices that meet
one or more conditions (e.g., devices that have chirped within the
last few minutes) are to chirp in response to one or more such
external stimuli. For example, a teacher that hears a chirp, but is
unsure as to which device in the classroom chirped, can use a
device or take an action to emit a output/signal which will cause
chirp-enabled phones that meet the referenced condition(s) to chirp
in their usual or in an alternative manner.
[1024] In certain implementations, the output/signal that the
mobile device emits/projects upon user input can consist of two or
more elements, at least one of which is preferably audible. For
example, the detection/determination as to whether the device's
speaker is working properly (as referenced herein) can be performed
by having the device emit one or more outputs/signals, with or
without connection to the user's interactions with the device, that
are not ready/easily audible to humans (e.g., due to their
frequency, intensity and/or duration), but which can also be
perceived by microphone 145D (the "Detection Signal"), while
another output/signal, which preferably enables teachers to
identify mobile devices that are in use (the "Teacher Signal"), can
be at a frequency in the human audible range. It can be appreciated
that by emitting/projecting the detection signal in a range or for
durations that are not readily audible to humans, such a signal can
optionally be transmitted louder, thus improving the signal to
noise ratio (SNR), without distracting others.
[1025] Additionally, in certain implementations the Detection
Signal and/or the Teacher Signal outputted/emitted from different
mobile devices can vary across different devices (it should be
understood that in certain other implementations such
signals/outputs can actually be the same signal). For example, such
outputs can be randomized and/or altered by the user input (e.g.,
different chirps correspond to different types of inputs, e.g.,
texting, game playing, etc.). This is useful as it can make the
task of detecting the chirp more accurate, easier, more power
efficient and/or faster.
[1026] At step 1842, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, adjusts an implementation of one or more restrictions at/in
relation to mobile device 105 (that is, employs one or more
restrictions, modifies an implementation of one or more previously
employed restrictions, removes one or more previously employed
restrictions, and/or maintains one or more previously employed
restrictions). That is, as referenced above, in a scenario where a
close coordination can be identified between one or more inputs and
outputs, such a correlation can indicate that the `chirp`
restriction is operating properly at the mobile device, and the
employment of such a restriction can be maintained. However, in a
scenario where such a close correlation cannot be identified, thus
indicating that the device may be malfunctioning and/or has been
tampered with. In such a scenario, a further restriction can be
employed, such as a restriction deactivating all operation of the
device. Finally, in implementations where the teacher's device (or
similar) signals to the student's device to disable/enable chirp
mode on the student's device, the appropriate changes to the
restrictions will be made.
[1027] In certain implementations, the student devices can be
restricted (e.g., instead of being made conspicuous) as desired
based on an instruction originating at a teacher device, i.e., the
student device can be put into `Class Mode.` where one or more
functionalities of the device are restricted (e.g., all use is
disabled except for emergency calls), while Teacher Mode is on or
for some period of time.
[1028] Turning now to FIG. 25, a flow diagram is described showing
a routine 2500 that illustrates a broad aspect of a method for
selectively projecting outputs at a mobile device 105 in accordance
with at least one embodiment disclosed herein.
[1029] At step 2510, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, receives one or more inputs, substantially in the manner
describe in detail above with respect to step 1710. For example,
such inputs can originate at the accelerometer and/or gyroscope
and/or user interface of the mobile device 105, and reflect the
movement/motion perceived at the device.
[1030] At step 2520, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, processes the input(s) to determine a first relationship
(e.g., a correlation). By way of example, inputs, such as those
received at step 2510, can be processed, such as with one or more
operation signatures. In doing so, a relationship between the
inputs received and the operation signatures can be determined.
[1031] By way of illustration, it should be understood that in
certain implementations, the `chirps` referenced herein can be
triggered based on the movement of a mobile device, and/or a
combination of user input and movement. For example, inputs
received from the accelerometer and/or gyroscope of a device (such
as at step 2510) can be processed, such as by being processed
with/against one or more operation signatures (that is, data that
identifies, such as based on mechanical and/or statistical
analysis, how a device moves when engaged in certain activities,
such as when a user is texting, walking, etc.). It can be
appreciated that in doing so, the manner in which the device is
being used can be determined (e.g., whether the device is being
used to play a game, text, etc.), such as based on a correlation
between the inputs and the operation signature. For example, it can
be appreciated that the signature of various inputs originating at
the various sensors when the device is being used to text, surf
and/or play games is easily differentiable from the sensor
signature of the device when the device is at rest and/or when the
user is walking with the device on his/her person or in a bag, as
is known to those of ordinary skill in the art.
[1032] At step 2522, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, projects one or more outputs based on the first relationship.
For example, in a scenario where it has been determined (such as
based on the relationship computed at step 2520) that the user is
texting or playing a video game on his/her mobile device, the
device can be configured to project one or more outputs (e.g.,
chirps), thereby creating a scenario whereby others (such as a
teacher) can be made aware of such activity.
[1033] At step 2524, processor 110 executing one or more of
software modules 130, including preferably, restriction module 171,
processes the one or more outputs (such as those projected at step
2522) and one or more inputs (such as an input received via a
microphone, substantially in the manner described above with
respect to step 1812). In doing so a second relationship, such as a
correlation can be determined that reflects a correlation between
the one or more outputs and the one or more inputs, substantially
in the manner described above with respect to step 1820. As
described in detail above, it can be appreciated that in doing so,
it can be determined whether or not the speaker 146 of mobile
device 105 is functioning properly (and thus is projecting
output/chirps, such as those projected at step 2522), or whether
the speaker may have been tampered with, as described in detail
above.
[1034] At step 2542, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, adjusts an implementation of one or more restrictions at/in
relation to mobile device 105 (that is, employs one or more
restrictions, modifies an implementation of one or more previously
employed restrictions, removes one or more previously employed
restrictions, and/or maintains one or more previously employed
restrictions), preferably based on the second correlation (as
computed at step 2524), substantially in the manner described above
with respect to step 1842.
[1035] Turning now to FIG. 26, a flow diagram is described showing
a routine 2600 that illustrates a broad aspect of a method for
selectively configuring overt operation of a mobile device 105 in
accordance with at least one embodiment disclosed herein.
[1036] At step 2602, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, determines a location of the mobile device and/or the current
time/date. For example, using the GPS sensor of the mobile device,
the location of the device can be determined. Specifically, in
certain implementations, the location of the mobile device can be
determined as being within a defined area or areas, such as within
the grounds of a school, using techniques known as geofencing, as
are known to those of ordinary skill in the art. In certain
implementations, the presence of the device in an area of interest
(e.g., the school) can be detected/determined by the device by
sensing the presence of the wifi signals associated with the
school's wifi transmitters and/or cell towers/base stations that
are known to be near the area of interest. By way of further
illustration, the current time date can be determined from one or
more sources (e.g., the device's internal or remote clock/calendar,
and/or a remote/third party source such as the GPS time, the
cellular time, the wifi network time, etc.--i.e., sources that a
user is potentially less likely to be able to tamper with).
[1037] At this juncture, it should be noted that in certain
implementations, any or all of the following steps (2605-2642) can
be employed based on the determination at step 2602. Thus, by way
of example, based on a determination (at step 2602) that a mobile
device is within a defined area (e.g., a school) at a certain time
(e.g., during school hours), a restriction can be employed at the
device, as described with reference to step 2605.
[1038] At step 2605, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, employs a first restriction at the mobile device. It should be
understood that the first restriction preferably configures the
mobile device to operate in an overt mode. It should be understood
that the term "overt mode" as used herein is intended to encompass
one or more modes and/or operational states of a mobile device that
configure the device to operate in such a way such that operation
of such a device by a user, on average, will be more conspicuous to
others in the vicinity/presence of the mobile device than if the
device were not configured to operate in such a way. An example of
such an overt mode is a restriction that configures the device to
project an audible `chirp` tone in response to every (or only
certain) user input(s) received at the device, such as in the
manner described in detail herein.
[1039] By way of further illustration, in certain implementations,
an overt mode can include a restriction that restricts the mobile
device to receive one or more commands/actions/events (such as the
command to send a message or email or open a message, and email
editor, or a browser) only through voice commands. It can be
appreciated that in doing so a user of the device will only be
capable of sending a message by saying (or shouting) `send` in an
audible tone, thereby resulting in overt operation of the device.
It should be appreciated that such a restriction can be further
employed together with/in parallel to other restrictions, such as
restrictions requiring the user to perform one or more tactile
gestures (e.g., holding a finger on a region of a touchscreen while
saying `send`).
[1040] By way of further illustration, in certain implementations,
an overt mode can include a restriction that restricts the mobile
device to receive one or more commands/actions/events (such as the
command to send a message or email or open a message, an email
editor, or a browser) only based on a `shake` gesture (that is, a
gesture that can be identified as an ongoing significant deviation
from the typical inputs provided by the accelerometer/gyroscope of
a device). It can be appreciated that in doing so a user of the
device will only be capable of sending a message by shaking his/her
device, preferably vigorously, thereby resulting in overt operation
of the device. In other implementations, similar gestures, such as
large/broad movements of the mobile device, can similarly result in
overt operation of the device. It should be appreciated that such
restrictions can be further employed together with/in parallel to
other restrictions, such as restrictions that entail the
simultaneous projection of one or more chirps/signals, as described
herein.
[1041] At step 2610, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, receives one or more first inputs, substantially in the manner
describe in detail above with respect to step 1710. For example,
such inputs can correspond to one or more user interactions with
the device, such as the user typing an email, playing a game,
etc.
[1042] At step 2620, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, processes the input(s). In doing so, a determination can be
computed that reflects an operation state of the mobile device. By
way of illustration, based on the location within and/or the
time/date during which the device is operating (indicating whether
the device is/is not within school grounds, and/or whether the
device is/is not operating during school hours) in addition to the
inputs received (reflecting a particular operation or action being
performed at the mobile device), a determination can be computed
reflecting the operation state of the mobile device (e.g., a video
game is presently being played in a non-school location during
school hours, and/or a text is being sent in a school location
during recess hours).
[1043] At step 2642, processor 110 executing one or more of
software modules 130, including, preferably, restriction module
171, adjusts an implementation of one or more restrictions at/in
relation to mobile device 105 (that is, employs one or more
restrictions, modifies an implementation of one or more previously
employed restrictions, removes one or more previously employed
restrictions, and/or maintains one or more previously employed
restrictions), preferably based on the determination.
[1044] It should be noted that in certain implementations, the
transmission of signals to and/or the routing of signals received
from all or certain mobile devices within a geo-area (which can be
detected, for example, using the device's GPS and/or the wifi
and/or the cellular tower/base station and/or location information
provided from the cellular carrier such as DOA, AOA, signal
strength) and/or in a certain date/time range, that are not
chirp-enabled (i.e., not configured to chirp on user input) (and/or
restricted such as in the manner described with reference to FIG.
26, such as where movement and/or and audible voice is required),
is restricted. For example, a school's wifi network can be
configured so that it only transmits to/from mobile devices that
were known to the wifi network to be chirp-enabled (and/or
restricted such as in the manner described with reference to FIG.
26, such as where movement and/or and audible voice is required),
or which mobile devices were on a pre-defined list (e.g., using MAC
addresses for teacher devices). In another example, one or more
cellular carriers would only transmit (voice, data etc.) to mobile
devices that are on a school's premises (e.g., within a geo-area)
and in their cellular networks, that were known to the cellular
network to be chirp-enabled (and/or restricted such as in the
manner described with reference to FIG. 26, such as where movement
and/or and audible voice is required) or which mobile devices were
on a pre-defined list (e.g., MAC addresses or UDIDs for teacher
devices). In both cases there can be exceptions for certain usage
(e.g., emergency calls, emergency text-messages) whereby the
aforementioned networks will allow such communications to pass
through.
[1045] The following represents a logical flow that reflects the
basic operations of various of the implementations disclosed
herein, in a manner that can be appreciated by those of ordinary
skill in the art.
TABLE-US-00001 If chirping application is installed on device If
during school hours If (device sees school wifi || device GPS shows
in geo-fenced area || device sees certain cell towers) Beep when
user inputs If mic hears beeps Allow free use Else Restrict as per
usage policy Else if GPS shows outside geo-fenced area Allow free
use Else if no GPS signal Assume in geo-fenced area Else Allow free
use
[1046] At this juncture, it should be noted in certain
implementations, various aspects of the outputs/chirps projected by
the mobile device can be determined/dictated based upon various
determinations that can be computed in relation to such
outputs/chirps and the device's usage. For example, it can be
appreciated that a device that is being used actively and/or
continuously by a user is relatively less likely to be operating in
a manner that is improper. As such, upon determining that a device
is so operating, the device can be configured to chirp in a
different manner (e.g., by adjusting the frequency and/or pattern
and/or volume of the outputs/chirps).
[1047] At this juncture it should also be noted that the referenced
restrictions (e.g., geographic area and/or date/time can be, and
preferably are, established by a third party, such as a school
administrator or parent. It should also be noted that the required
geographic determinations can be achieved using GPS receiver 145C
using standard geofencing approaches known to those of ordinary
skill in the art. Additionally, in certain implementations, one or
more third parties can optionally override various of the
restrictions referenced herein. For example, in a scenario where
one (or more) of the sensors at a mobile device is broken or
malfunctioning, it can be appreciated that various authentication
approaches may no longer be possible. As a result, one or more
third parties (e.g., a parent, telecommunications provider, etc.)
can override such restrictions, in order to account for the
malfunctioning/broken sensor, and thus enable the user to use
his/her device in an unrestricted manner.
[1048] In certain implementations, inputs originating at the
magnetometer of a device can be used/processed in order to
determine if the device is in a classroom or not by comparing a
magnetic map that is presently perceived at a device, such as in
its current location, to a database of magnetic maps, such as for a
school (or any other such location), and/or a set of rules that
define the areas in which students are and are not permitted to use
their devices. Based on a determination that the magnetic map of
the current location of the device can be matched to the magnetic
map of a location in which students are allowed to use their mobile
devices, the usage of the device can be allowed. However, based on
a determination that the magnetic map of the current location of
the device cannot be matched to the magnetic map of a location in
which students are allowed to use their mobile devices, the usage
of the device can be restricted.
[1049] It should also be noted that, in certain implementations,
the set of rules defining the allowed and disallowed location(s)
may be different for different devices and may change over time
(i.e., based upon the day and/or the time of day) and that the
magnetic map database may reside locally, i.e., on the device
itself, or remotely.
[1050] Moreover, in certain implementations, by (a) applying only
to a device that is determined to be present on school grounds
and/or during the school day, and/or (b) applying to a device that
is determined to be in a restricted device usage area, e.g., within
a classroom (or at least is not determined to be within a permitted
area, e.g., a lunchroom), such restriction (d) can still be
bypassed based upon whether and for as long as a teacher has
configured the mobile devices in the classroom to allow for their
usage, such as in a manner similar to the one in which a teacher
may configure devices in the classroom to temporarily not emit
sounds as described herein.
[1051] It should be noted that whenever there is a signal (audible
or inaudible) sent to or from a student device, such signal can
also be transmitted via Bluetooth and/or WiFi.
[1052] It should also be noted that many of the techniques
described herein with regard to reducing the power consumption on
the device can apply to the school/classroom setting as well where,
in certain implementations, the various sensors of the device
and/or other techniques are utilized to determine whether or not
the device is on school grounds.
[1053] It can be appreciated that people who make noise during
movies distract those around them. Mobile devices are a huge source
of such unwanted noise. Accordingly, in one implementation, devices
in a theater hall can be configured to be selectively restricted
while a movie is playing (optionally including its preview and
trailers), but without restricting such devices if they are outside
the theater hall (e.g., at the popcorn stand, in the bathroom, in
the lobby, etc.).
[1054] In order to selectively restrict such devices by detecting
that they are within a theater hall (e.g., during a movie
screening), the microphone(s) of the device can capture(s) and/or
pass(es) audio recordings (of some length, frequency, duty cycle,
codec, format, filter etc.), such as to a remote server. Such
recordings can be processed in order to detect/determine whether
the device is in the presence of a screening/movie, such as by
identifying sounds associated with a particular movie (such as in
the manner performed by Shazam for music), and/or by identifying
sounds/patterns that are common to movies (or other media/events)
in general. The identity of the particular movie being played can
be identified and compared, for example, to a list of currently
running movies, such as in order to distinguish it from an older
movie (which may be relatively less likely to be screened within a
public theater).
[1055] This accuracy of such a technique can be improved by
selectively employing such techniques if the location of the device
(e.g., as determined by its GPS, aGPS, BT, last known GPS, etc.) is
first determined to be in or near a movie theater. One way in this
can be achieved is to use the GPS, if available, or alternative
methods (cell tower, wifi, BT), and/or using the last known GPS
location.
[1056] It should be noted that while the user may cover the
microphone of a device, such as in an attempt to reduce the
efficacy of this context-detection technique, the device user will
also not be able to effectively engage in a voice conversation (the
largest distracted movie watcher problem) with a blocked
microphone. It should also be noted that these techniques can also
be employed in similar settings, such as where pre-recorded audio
is played and/or in settings where known live audio is played,
e.g., classical theater, music concerts, speeches (with known
text), etc.
[1057] In other implementations, a movie attendee who has exited
(temporarily or permanently) the theater in which a movie is being
screened (e.g., to buy popcorn) and whose device is still in "movie
mode" (i.e., is still selectively restricted), can provide a
`self-declaration` of the device/user being outside of the theater
(e.g., using tactile, audio and/or visual input methods, such as
those described herein), and, in doing so, can cause the movie
detection mechanism to immediately (or relatively more quickly)
acquire sensor information and/or other information to determine
whether or not the device is still within movie context, in a
manner that is relatively more expedient than would have ordinarily
occurred. Such techniques can be particularly advantageous in cases
where, on account of power savings, the various data/information
acquired to determine whether or not the user is still viewing a
movie are acquired with latency (e.g., with delay, in duty cycles,
etc.) and/or at less than the fastest sampling rates possible.
Accordingly, acquiring such data relatively more quickly (e.g., by
triggering such acquisition via the referenced `self-declaration`)
can enable the device of a movie goer who exited a theater to have
such a selective restriction lifted faster/sooner. Phrased
differently, this technique can allow power-saving techniques to be
applied more readily while reducing the degradation to the user
experience.
[1058] In other implementations, this problem can be solved
(client-side only, server-side only or a combination thereof) by
utilizing the digital audio watermarks/coded anti-piracy mark
embedded within theater films (or inserting a similar or different
mark into the film if such is not present within theater films or
are otherwise ineffective for such purpose due to their frequency
or other reasons) and such client device(s) can be configured to be
selectively restricted when (and for as long as) such mark is
heard.
[1059] Moreover, in theaters within which sufficient network access
(such as to cellular networks) is not present for such devices to
properly utilize the techniques described herein, such theater
complexes can install one or more access points as needed to
facilitate such access. Moreover, the BSSIDs of these access points
can provide additional location information to geo-locate the
devices within the theater complex (e.g., inside a theatre, outside
a theatre, etc.).
[1060] In other implementations, a hardware device can be installed
within each the theater to be protected. While a movie is playing,
such a device can continuously (and/or periodically) emit audio
signals (inaudible, effectively inaudible and/or non-distracting)
that can be perceived, recognized and/or interpreted by an
appropriately equipped device to indicate presence within a movie
theater having a live movie playing. Such a signal can be emitted
at a frequency and/or at a volume that can prevent it from (and/or
mitigate the likelihood of its) being heard outside the theater. In
another implementation, such signals can be transmitted over the
in-theater sound system.
[1061] In another implementation, upon determining that the device
microphone is being blocked (when in or near a theater) so that the
device does not hear the signal(s) necessary for it to identify
that it is present within a theater (e.g., the watermark, the
special inaudible signal, etc., as described herein), such a device
can be restricted or otherwise disabled. For example, the
device-based system can default to operating based on an assumption
that the device is present in a movie, such as in the same or
similar ways described herein with respect to various classroom
implementations.
[1062] In implementations with respect to which such watermarks or
special signal devices may interfere with routine usage of a device
in other places/contexts (despite employing optional
countermeasures that may also require positive geo-location data to
determine that the device is within a theater in order to employ
restrictions), thereby causing such devices to operate based on the
assumption that they are present within a movie when they are
actually not, the referenced in-theater signals can be randomized
and/or varied and/or crowd-sourced so that they could not abused.
Various additional methods for securely delivering such signals are
also contemplated, as known to those of ordinary skill in the
art.
[1063] It should be understood, with regard to any and all of the
implementations described herein, that while various of the
implementations have been described herein as being implemented by
a mobile device (for example, employing a restriction at a mobile
device), it should be understood that any and all such embodiments
can be similarly implemented in relation to such a mobile device,
such as, for example, in a scenario where such a restriction is
initiated/employed by a third party device such as a central
machine that is capable of communication with the mobile device. As
such, all references provided herein that refer to a particular
operation occurring at a mobile device (e.g., preventing a mobile
device from a particular operation) should be understood to also
encompass operations performed by an external/remote device which,
in turn, can affect the operation of the mobile device (whether
directly or indirectly), and all such implementations are equally
within the scope of the methods and systems described herein.
[1064] Additionally, in certain implementations a communications
provider (e.g., a cellular carrier) can optionally restrict the
usage a device, such as the device operated by a driver of a moving
vehicle. This can be achieved by determining if the device is in a
moving vehicle and, if so, assuming that the device is a driver's
(and restricting it accordingly), unless the device user has
authenticated himself/herself as a passenger, as described
herein.
[1065] In one implementation, a cellular carrier can determine
whether the device is in a moving vehicle by analyzing successive
location positions of the device (as can be determined by cellular
networks), pursuant, among other things, to government
regulations/guidelines that require such networks to be able to
determine the location of a cellular device (such as in the case of
an emergency), using such location positioning techniques known to
those of ordinary skill in the art, including but not limited to
methods for locating the device such as angle of arrival (AOA),
time difference of arrival (TDOA), signal strength (device or
cell-tower) and others.
[1066] In other implementations, a system/device can be configured
to adaptively learn, over time, the context (e.g., moving in
vehicle, stationary, etc.) within which a device is present upon
receiving (or in the absence of receiving) one or more data signals
(e.g., pertaining to WiFi APs, cell-towers, locations or geo-areas,
Bluetooth devices, accelerometer signals [e.g., corresponding to
walking], etc.) and can then determine the context of the device,
alone or in conjunction with other data, upon subsequently
receiving (or in the absence of receiving) one or more of such data
signals, such as in the future.
[1067] For example, if, over the course of a sufficiently long
and/or sufficiently recent period of time, it was determined that
98% of the time a device was in range of a particular WiFi access
point it was also determined to be present within a moving vehicle,
then it can be further determined that, upon subsequently
determining that the device is present within range of that same
WiFi access point (and, in certain implementations, unless some
other data, input, and/or indication to the contrary has been
received), the device can be determined to be present within a
moving vehicle.
[1068] For example, if, over the course of a sufficiently long
and/or sufficiently recent period of time, it was determined that
98% of the time a device was in range of a particular WiFi access
point and didn't receive a GPS signal (e.g., present deep inside a
building) it was determined not to be present within a moving
vehicle, then it can further determined that, upon subsequently
determining that the device is present within range of that same
WiFi access point and not receiving a GPS signal (and, in certain
implementations, unless some other data, input, and/or indication
to the contrary has been received), the device can be determined
not to be present within a moving vehicle.
[1069] It should be understood that, in certain implementations,
the referenced data can be maintained on a device-by-device basis
(or user-by-user basis) and/or aggregated across users (whether
non-selectively, or, alternatively, selectively chosen in some
manner, e.g., users with similar daily routines, users with similar
home or work locations, etc.) such as using one or more
`crowd-sourcing` approaches/techniques, such as in a manner known
to those of ordinary skill in the art.
[1070] In another implementation, the cellular carrier/operator can
receive location and/or speed information from the device itself,
consisting of GPS information and/or information from the one or
more of the device's sensors. For example, the cellular carrier can
send requests to the device's SIM card to query the device's GPS
and pass such information back to the carrier. In another example,
the carrier can request information from a process running on the
device which can obtain such information from the GPS and/or the
device's sensors. If no such process is running on the device
(and/or if such a process cannot be initialized), the carrier can
identify such device to be a driver device and can further apply
the associated restrictions, as described herein. The effectiveness
of this method can be increased if the process and/or the
information coming from the process is authenticated and/or
verified, so as to prevent the transmission of erroneous
information that might otherwise trick a cellular carrier into
thinking that the device is not in a moving vehicle. Such
authentication and/or verification can be done in several ways, for
example: (a) The GPS values sent from the device can be compared
with those obtained directly by the carrier network. If the carrier
network is clearly showing that the device is moving, yet the data
the device is passing to the carrier shows otherwise, this can
indicate a security problem; (b) the device can pass an
authentication code to the carrier in a manner known to those of
ordinary skill in the art.
[1071] Additionally, in order to more accurately and/or more
quickly and/or more efficiently determine if the device is in a
moving vehicle, the carrier can combine location/speed information
sourced from the carrier network with the information sourced from
the from the device.
[1072] Upon receipt of such device location/speed information, the
carrier can determine whether the device is in a moving vehicle. In
one implementation, if the speed of the device is greater than a
certain threshold speed, it is determined to be in a moving
vehicle.
[1073] Upon determining that a device is in a moving vehicle and
until such time that it is determined that such device is no longer
in a moving vehicle, the carrier can restrict (partially or
completely) the information that is sent to/from such device unless
the device's user has authenticated the device as a passenger
device using, among others, any one of the passenger authentication
methods described herein. The effectiveness of this method can be
increased by ensuring that any passenger authentication is
trustworthy, so as to prevent the transmission of erroneous
information in order to trick a cellular carrier into thinking that
the device is being used by a passenger. This can be done, for
example, by authenticating the passenger authentication
information, using methods known to those of ordinary skill in the
art.
[1074] Additionally, the cellular carrier can strengthen any such
restrictions by instructing the device's SIM and/or code running on
the device itself to further restrict the device (e.g., preventing
wifi communication).
[1075] FIG. 116 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1076] At 11610, one or more communications directed to a first
device can be received. In certain implementations, it can be
determined that the one or more communications are directed to the
first device based on (a) a communication identifier associated
with the device (e.g., email address, social network account
identifier, etc.), and (b) a network address (e.g., an IP address)
associated with the device, such as in a manner described herein.
Moreover, in certain implementations one or more communications can
be received from an email server and it can be determined that the
one or more communications are directed to the first device based
on (a) a communication associated with the device, and (b) a
network address associated with the device.
[1077] At 11620, transmission of the one or more communications can
be restricted, such as based on a determination that the first
device is (a) present within a trip and/or (b) associated with a
user determined to be a driver.
[1078] At 11630, a response to the one or more communications can
be provided, such as in a manner described herein.
[1079] At 11640, a restriction associated with the transmission of
the one or more communications can be modified, such as based on a
determination that the first device is no longer present within a
trip.
[1080] At 11650, a restriction associated with the transmission of
the one or more communications can be modified, such as based on a
determination that the first device is no longer associated with a
user determined to be a driver, such as in a manner described
herein.
[1081] FIG. 117 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1082] At 11710, a request from a first device can be received.
[1083] At 11720, transmission to the first device in response to
the request can be restricted, such as based on a determination
that the first device is (a) present within a trip and (b)
associated with a user determined to be a driver, such as in a
manner described herein.
[1084] By way of further illustration, the context (e.g., in trip,
in-vehicle user role, in meeting, in classroom, in theater, in
hospital, etc.), in which a mobile device is used can be determined
and monitored. Entities (e.g., people, companies, machines) can
then be prevented (or discouraged or incentivized) from engaging in
and/or facilitating potentially distracting and/or disturbing
communication with individuals and/or devices and/or vehicles that
are determined to be in certain contexts (e.g., in a trip, a driver
device, in a meeting, in class, in theater, etc.).
[1085] In addition to ways of mitigating such distraction and/or
disturbances with operations/functions operating/executing on a
device, in some implementations, such operations can be executed
both on a device and server-side. The device (or devices) (and by
extension its user or users) for which a communication is intended
can be determined based upon an association(s) between the
communication's intended destination/recipient (as determined
server-side) and the device (e.g., a telephone number associated
with the device, an IMSI or IMEI (or their analogies on other
cellular platforms) associated with a device, an email account
associated with the device, a social network associated with the
device) as can be determined in different ways (e.g., IP address,
email account, user agent, combination of these).
[1086] Such distraction/disturbance protection/mitigation can also
allow for entities to provide better service or increased
efficiency, for example by delivering "auto-reply" messages to a
communication initiator advising that the communication's intended
recipient will not be able to reply for some time and/or route any
such communications to someone else (e.g., within the entity) that
is able to provide a more timely reply to such communication.
[1087] In other implementations, a device user can also be
prevented (or discouraged or incentivized) from initiating
potentially distracting communication based upon such device's trip
state and/or device user's in-vehicle role.
[1088] Various aspects of the functionality described herein may be
provided by a mobile network operator. However, due to the
complicated nature of mobile networks and/or a lack of incentive or
even a dis-incentive to do so (economic or otherwise), mobile
operators may not be willing to offer such functionality. Moreover,
while certain types of functionality may be selectively controlled
at the mobile network level naturally (e.g., allow phone calls to
and from some numbers but don't allow from others, allows texts to
and from some numbers but don't allow from others), other
functionality can be more difficult to selectively control at the
mobile network level (e.g., data, where some data is allowed and
other data is not allowed) and can be better controlled at other
stages in its process and/or lifecycle (e.g., emails can be
selectively controlled at a company email server level more easily
than a mobile operator can determine which data packets contain
emails and whether they are to or from currently allowed or
disallowed recipients).
[1089] For example, (a) using a trip detector (e.g., operations,
functionality, logic, etc., as may be implemented in software
and/or hardware that analyzes sensor inputs to determine whether a
mobile device is in a trip--e.g., regardless of whether the data
acquisition and/or the processing required for such detection
occurs on or off such mobile device), the trip state of a device
(e.g., in trip, not in trip) can be determined and/or monitored and
passed to a remote server; and (b) using an in-vehicle role
detector the in-vehicle role of the device user (e.g., driver,
passenger) can be determined and/or monitored and passed to a
remote server. An entity wishing to communicate with and/or
facilitate communication with such device and/or such device's
user, e.g., an email server, a social network, a telephone network,
can modify or restrict some such communications based upon the trip
state of the device and/or the in-vehicle role of its user and/or
provide auto-reply messages and/or communication forwarding
services to such communications.
[1090] For example, in an enterprise setting, a company can install
a `trip detector` (e.g., an application that implements one or more
of the operations/functionality described herein) on the mobile
devices and/or in the vehicles of its employees. When the trip
detector determines that a mobile device is in a trip, it passes
such information to a remote "trip state" server. And, before the
company e-mail server (e.g., Exchange) delivers data (push or pull)
(e.g., POP3, IMAP, ActiveSync, Outlook Web App) for an email
account on the email server to an email client on such device, the
email server can be configured to check the trip state of the
device on the "trip state" server (e.g., by IP address of the
device and/or email address(es) of the device and/or User Agent of
the device, one or more of which are known to the device and the
email server), and can be further configured not to deliver such
data to the client for as long as the device is determined to be in
a trip (it may queue them up for sending after the trip is over) or
only delivers messages specially marked as urgent. For example, if
the email client from a device with IP 192.168.1.100 requests to
pull email messages from the Inbox of email account
joe@safedriving.com on the email server and, according to the trip
state server a device with IP 192.168.1.100 and email account
joe@safedriving.com is currently in a trip, the server doesn't
deliver such messages to the email client.
[1091] In sonic implementations and/or cases in which the email
server is not able to determine the identity of the device to which
data for an email account is to be delivered, the server can be
configured not to deliver such data to any (or certain) devices
that are associated with such email account for as long as at least
one device associated with such email account is in a trip.
[1092] In one implementation, the server can be configured to only
allow messages to be delivered (push or pull) from an account to
e-clients when none of the clients associated with such account are
"in a trip". In other implementations, the email server detects the
device from which a pull request has come and based upon the "trip
state" of such device, decides whether or not to deliver messages
(and perhaps which messages to deliver, e.g., urgent messages).
[1093] In another example, in an enterprise setting, a company
installs a trip detector and an in-vehicle role detector on the
mobile devices of its employees. When the trip detector determines
that a mobile device is in a trip, it passes such information and
information about the device user's in-vehicle role to a remote
"trip state, in-vehicle state" server. And, before the company
e-mail server delivers an email message (sent from someone inside
the company or outside the company) to an e-mail client on such
device, it checks the trip state of the device and the in-vehicle
role of the device's user on the "trip state, in-vehicle state"
server and does not send such message for as long as the device is
in a trip and the in-vehicle role is that of driver.
[1094] In other implementations, the referenced operations, logic,
etc, can be moved to the device, whereupon the email client running
on a device can determine whether or not to display an email
message on such device, based upon the device's trip state. An
entity wishing to offer this protection would then have to ensure
that the email clients using by its members on their devices are
compliant with this functionality.
[1095] Moreover, various security measures can be employed to
ensure that the device user does not trick the cellular carrier
into providing data to the device while the user is the driver. As
example, a device that has been `rooted` or `jail-broken` may not
be allowed to authenticate as a passenger. As an additional
example, various security options for centrally (e.g., from a
cellular data center) authenticating application data sent from a
mobile device can be employed, such as, (a) creating non-repeating
data by incorporating in-data timestamps to make it harder to
`replay` data: (b) using a digital signature to sign data on the
device before it is sent to the carrier, where a one-time key
generation time process can be employed to make this method even
harder to hack/override; (c) performing such authentication at the
operating system level (e.g., within the kernel) to make it harder
to replace the trusted data with altered data; and/or (d)
performing the authentication at the hardware level. These
techniques and similar ones are known to those of ordinary skill in
the art of computer security and cryptography.
[1096] It should also be noted that, in certain implementations,
some or all of the various techniques and technologies described
herein can be incorporated entirely or in part into the operating
system of a device. In doing so, various operations can be
relatively less susceptible to user interference/intervention, and
also make the processes executing with respect to the various
techniques relatively more stable and/or more energy efficient.
[1097] It should be noted that in some methods of passenger
authentication (for example, passenger authentication methods that
incorporate a repeated pass-phrase, pass-code and/or pass-action),
the effectiveness of such methods can be increased by incorporating
a protocol that further enhances security, by (a) running at least
one component process of the passenger authenticating process on
the device in a manner that allows such component process to be
authenticated against a central server using a pre-assigned private
key that signs OS information about such components and/or other
components by using a signed kernel module; (b) if the component
process authentication succeeds, by having a central server send a
phrase, code and/or action to the passenger authenticating process
on the device which, in turn, displays such phrase, code and/or
action to the user; and (c) sending the phrase, code and/or action
input/performed by the user back to a central server, whereupon the
central server only authenticates the device user as a passenger if
the phrase, code and/or actions match those that were sent and are
performed in a timely manner.
[1098] It can also be appreciated that it can be advantageous to
intelligently manage use of energy/power at a mobile device, such
as in any or all of the various contexts and settings described
herein. Due in part to their small size, mobile devices have energy
constraints (e.g., limited battery power). Accordingly, it can be
advantageous to identify and control processes running on mobile
devices that use energy unwisely/sub-optimally. Moreover, because
mobile devices are nomadic, they are easily misplaced. Such
misplacement, among other things, presents a security threat.
[1099] Accordingly, in certain implementations a context in which a
device operates (e.g., one or more of: moving, moving in a vehicle,
moving in a particular type of vehicle [e.g., bicycle, car, truck,
bus, airplane], connected to a power source, battery state, user
presence [as can be determined, for example, by screen state
(on/off), lock screen state (on/off), keystrokes, button presses,
camera, audio, proximity, heat, etc.], prompting the user to
determine if the user believes that the context is such that the
use of one or more device resources should be changed, etc.) can be
determined. Based upon the determined context(s), one or more
resources used by one or more processes on the device can be
adjusted (e.g., processes that use screen display, wake locks,
sensor calls, camera, speakers, microphone. RF, wifi, data
communication, etc.), such as based on the determined context,
thereby providing various benefits (e.g., energy savings, increased
security, better and/or more accurate information/determinations,
etc.).
[1100] FIG. 33 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 3305 an operational state of a first sensor of a device can be
determined. At 3310, an operational state of a second sensor of the
device can be selectively adjusted, such as based on the
operational state of the first sensor.
[1101] FIG. 34 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 3405 a power connection status of a device can be determined. At
3410, an operational state of a sensor of the device can be
selectively adjusted, such as based on the power connection
status.
[1102] In certain implementations, inputs originating at one or
more of the sensors of a device (including but not limited to GPS,
RF, Wifi. NFC. BT, accelerometer, gyroscope, camera, microphone,
magnetometer, light meter, proximity sensor, temperature sensor,
compass, keyboard, buttons, etc.) can be used/processed to
determine if the device is moving and/or where the device is
located. If it is determined that the device is not moving for more
than a certain period of time (e.g., 5 minutes), applications that
are employing a `wake lock` (e.g., a screen wake lock, a CPU wake
lock, a GPS wake lock) can be cancelled and/or modified. For
example, many navigation applications (e.g., Waze) that run on
mobile devices use wake locks to override the screen lock settings
of the device in order to keep such applications continuously
visible to the device user. Such wake locks are often static, i.e.,
for as long as the application is running (e.g., in the
foreground), the wake lock persists. Accordingly, upon determining
that the device is not moving for some period of time (e.g., no
significant GPS changes for 5 minutes), a wake lock of such
applications can be overridden (thereby enabling the lock to be
disabled). Such techniques can be particularly applicable with
respect to applications or processes that already acquire and/or
use location based information and/or movement based information
because little to no or additional energy expenditure is likely to
be required to employ the operations disclosed herein. Moreover,
such context-based resource management determinations and
operations can also enable certain security benefits. For example,
in a scenario where a device was running a navigation application
(e.g., one that implements a screen/CPU wake lock) and the user
forgot the device somewhere (e.g., in a vehicle, in a restaurant,
etc.), the screen of the device will not lock (on account of the
screen/CPU wake lock which continues to be employed), thereby
allowing anyone who finds the device to easily access the
information on the device. By adjusting the device resource usage
(in this example, the screen usage of the device as a result of its
wake lock) based upon its context, it can be determined that this
device was not moving and its wake lock can be overridden, thereby
preventing access (or further access) to the device by unwanted
persons.
[1103] In another implementation, a wake lock can be controlled
dynamically based upon the location of the device as determined by
inputs originating at one or more of its sensors in conjunction
with and/or separate from the movement of the device as also
determined based on inputs originating at one or more sensors. For
example, if the device is determined not to have moved for some
period of time, but is determined to be within a certain distance
of a specific location (e.g., the home or office of a user), the
wake lock can be overridden according to one rule (e.g., wait a
relatively longer time before overriding the wake lock is), whereas
if the device is not determined to be near such a location, the
wake lock can be overridden according to a second, more stringent
rule (e.g., wait a relatively shorter time before overriding the
wake lock).
[1104] It should also be noted that overriding a wake lock can be
implemented in various forms (e.g., canceling the wake lock
altogether, changing the type of wake lock (e.g., from a bright
wake lock to a dim wake lock), and/or canceling the wake lock and
taking an action like dimming the screen).
[1105] It should also be noted that the ability to control device
resources (e.g., by controlling wake locks) based upon their
device's context (e.g., by determining if the device is moving
and/or it location) so as to reduce energy expenditure and/or
improve security can also enable the implementation of processes
and/or applications that have heretofore not applied certain
resource intensive techniques (e.g., wave locks, sensor sampling)
because of the referenced energy consumption and security concerns,
thereby enabling responsible/sustainable employment of such
resource intensive techniques and, in so doing, allow their users
access to better and/or more accurate information and a better user
experience.
[1106] In certain implementations, if a device is determined to be
oriented in a `flat` orientation (e.g., resting on a table, as can
be determined, for example, based on one or more accelerometer
inputs) and also `upside down` (i.e., with the screen of the device
facing downwards, such as towards the table, which can also be
detected one or more accelerometer inputs), then it can be
determined that the user is unlikely to be looking at the screen of
the device. Accordingly, based on such a determination (and, in
order to save power), the display/screen of the device can be
turned off/dimmed, or otherwise deactivated, even before the
device's ordinary screen timeout would have otherwise turned it
off. Such a state/status with respect to the display/screen can be
maintained until, for example (i) the screen is activated (such as
upon receipt of an input, button press, etc.), (ii) the orientation
of the device is determined to have changed so that it is
relatively more likely that the user is using (or may wish to be
using) the screen, and/or (iii) the orientation of the device is
determined to have changed (as in (ii)) within a certain period of
time, otherwise the screen can remain deactivated (despite
orientation changes) until the screen is affirmatively activated
(as in (i)).
[1107] In another implementation one or more of the sensors that
are used by any of the processes running on the device can be
controlled dynamically based upon the device's context. For
example, the accelerometer of the device can be used to determine
that the device is not moving, and, as a result, a process that
uses the (much higher energy expenditure) GPS can be stopped and/or
the rate at which such process uses the GPS can be slowed (in
certain implementations, even to zero). Such dynamic control of
sensors can be affected in various ways. For example, from within a
particular process itself (in the GPS example, the process using
the GPS can register to receive GPS information less frequently),
through the mechanism that controls the sensor readings and/or the
distribution of the information therefrom (in the GPS example, the
device can be configured to acquire GPS information relatively less
frequently).
[1108] In another implementation, power connection state, status,
and/or context of a device can be determined, i.e., whether or not
the device is connected to a power source. If it is determined not
to be, processes running on the device can be notified accordingly
and can selectively reduce the resources that they are using. If
the device is determined to be connected to a power source, the
processes running on the device can also be so notified and can
selectively increase the resources that they are using.
Determination of the context can be further refined by also taking
into account the level of charge of the device's battery. For
example, if the device is not connected to power, but its battery
is fully charged, it can be reasonable for processes to use
resources more aggressively, whereas if the battery not fully
charged, processes can be configured to lower their use of power
intensive resources.
[1109] It should also be noted that the context determination(s)
described herein can be implemented within an application/process
and/or by another process on the device (e.g., a user process, a
system process) which distributes or makes available such context
information to other processes, such as those running on the same
device (e.g., via an API). Moreover, parts and/or aspects of the
context determination(s) can also occur in locations that are
external to the device (e.g., one or more nearby mobile devices,
other computers, one or more remote computers, etc.).
[1110] It should also be noted that many or all of the
determinations and/or other operations referenced and/or described
herein can be useful (and therefore provided) to other applications
or processes running on the same device (and/or external to the
device) so that multiple applications do not need to perform the
same or similar determinations. Such determination(s) can be
provided to such applications or processes (e.g., through an API).
For example, a navigation application that wants to prevent a
driver from the distraction of inputting a destination while
driving but wants to permit a passenger to do so, can be configured
to query the application's API as to whether the device is (a) in a
trip and/or (b) is being operated by a driver or a passenger.
[1111] Many of the techniques described and/or referenced herein
can have one or more components that differ for specific devices,
such as based upon previously observed behavior of that device
and/or that of a user associated with the device and/or an
environment/context associated with the device. For example, the
angles at which a device is held/oriented (such as those consistent
with operation by a driver or a passenger) can be "learned," (e.g.,
using machine learning techniques are known to those of ordinary
skill in the art), the speed at which a user types and the
consistency of such speed (as a driver and/or as a passenger) can
be learned, the characteristics/patterns with which a device
moves/shakes when used by a user can be learned, or practically
anything that happens repeatedly, so as to better fit a set of
rules to differentiate the role of a user explicitly (e.g.,
in-vehicle role, ability to perform a task) or implicitly (e.g.,
from the location of user) for each particular user can be
learned.
[1112] These one or more varying components can also be classified
based upon the different contexts of each user, e.g., when a user
is a driver and when the user is a passenger using various
techniques (e.g., trained learning and/or untrained learning,
clustering) as are known to those of ordinary skill in the art.
[1113] In certain implementations a mobile device operated by a
bicyclist (or another vulnerable road user like a pedestrian,
skateboarder, roller-blader, runner etc.) can transmit the
real-time location of the device to a remote server.
[1114] Moreover, in certain implementations a mobile device
determined to be used within a vehicle (e.g., a car, truck, bus,
train) by a user determined to be driver (or passenger) can
transmits the real-time location of the device to a remote server
(e.g., as is done in crowd-sourced `SatNav` applications like
Waze).
[1115] Moreover, in certain implementations an application can
determine (and, optionally transmits to a remote sever) the mode of
transportation determined (e.g., bicycle, car, etc.), such as with
respect to the user of the device. In certain implementations, such
determination(s) can be made in a relatively passive manner, e.g.,
based on the device's sensors (e.g., the accelerometer and/or
gyroscope readings, changes and variability thereto and the
spectral frequencies thereof). For example, bicycles are always
falling and being corrected, whereas most other vehicles are
generally balanced on the ground. This distinction can be made
using the device's sensors (e.g., accelerometers, gyroscope,
magnetometer, etc.). By way of further example, a transportation
mode can be determined based on the determined speed (e.g., based
on GPS), such as with respect to the change in speed between
portions of the road having different gradients (as most vehicles
other than bicycles have relatively lower sensitivity to gradient
and/or gradient changes). By way of further example, a
transportation mode can be determined based on changes of angle in
turns (as bicycles angle into turns while four-wheeled vehicles do
so much less). By way of further example, a transportation mode can
be determined based on the spectral frequencies measured/determined
by the sensors of a device, as those determined with respect to a
bicycle are relatively different than those of the sensors of a
device being used in a car. By way of further illustration, a
transportation mode can be determined relatively actively, such as
by prompting a user to identify (e.g., with voice, touch, haptic,
etc. inputs) the mode of transportation being used, such as prior
to the start of (or during) a trip, and/or by virtue of the fact
that the information provided in this system can be packaged
differently for different use cases (e.g., bicycles vs. drivers)
and the transportation mode of the device user can be determined
from the application used.
[1116] In certain implementations a driver or a cyclist can elect
to receive alerts (such as real-time alerts) to their device based
on a particular of transportation type, mode, or class. For
example, cyclists can select to receive alerts of approaching motor
vehicles and motor vehicle drivers can select to receive alerts of
nearing cyclists. Such alerts can be delivered to the user by the
device visually (e.g., on screen), audibly (device makes a
distinctive noise) and/or hapticly (device vibrates in some way,
e.g., that may be user configurable and can even be integrated into
the transportation equipment, e.g., device causes user handlebars
to vibrate, device causes the steering wheel to vibrate, etc.).
[1117] FIG. 38 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 3805 one or more inputs can be received, such as in relation to
a user device. At 3810, the one or more inputs can be processed,
such as in order to determine a transportation type associated with
the user device. At 3815, the transportation type can be processed,
such as in relation to one or more aspects associated with one or
more other devices. In certain implementations, the transportation
type can be processed in order to generate one or more
notifications, such as with respect to at least one of (a) the user
device or (b) at least one of the one or more devices. In certain
implementations, the transportation type can be processed in
relation to a visibility condition state. Moreover, in certain
implementations the transportation type can be processed in order
to generate one or more notifications, such as with respect to the
visibility condition state. At 3820, the one or more notifications
can be provided, such as to at least one of (a) the user device or
(b) at least one of the one or more devices.
[1118] FIG. 39 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 3905 one or more inputs can be received, such as in relation to
a user device. At 3910, the one or more inputs can be processed,
such as in order to determine a transportation type, such as a
transportation type associated with the user device. At 3915, the
transportation type can be processed, such as in relation to one or
more data items associated with the transportation type. Moreover,
in certain implementations the transportation type can be processed
in order to generate one or more notifications pertaining to the
transportation type. At 3920 the one or more notifications can be
provided, such as in relation to the user device.
[1119] Moreover, in certain implementations the referenced alerts
can be filtered to be operative/employed only in certain areas
and/or situations and/or conditions, such as based upon the
selection of the device and/or the device user's supervisors (e.g.,
parents, employer etc.). For example, a cyclist might choose to
receive alerts of nearby motor vehicles (a) when she is not near a
city, (b) when a particular vehicle is determined to be exhibiting
dangerous behavior (e.g., driving above a certain absolute speed,
driving above a speed relative to the allowed speed on the current
road (e.g., a vehicle traveling more than 20 MPH above the speed
limit), swerving, is determined to be a dangerous vehicle based on
its current drive or from historical information, etc.), and/or (c)
when the road conditions are determined to be dangerous/unsafe
(e.g., poor visibility due to weather, night, windy road etc.). In
another example, a driver can choose to filter out alerts for
nearby bicycles where (a) the bicycle is on the opposite side of
the road of the driver's vehicle (e.g., as can be
detected/determined by the GPS in one and/or successive readings,
by the accelerometer and the road angle (a bicycle climbing on one
side of the road and a bicycle descending on the opposite side of
the road have different accelerometer readings when fixed to the
bicycle with known orientation) and/or (b) the bicycle is
determined to be on the sidewalk (e.g., as can be detected from GPS
and/or successive GPS readings, from the accelerometer readings as
a bicycle riding on the sidewalk approaches and leaves some
intersections when the bicycle has to come down from sidewalk and
re-elevate to the curbside).
[1120] Moreover, various aspects of the information
learned/determinations made by/in relation to the various
techniques described herein can be incorporated into SatNav
(satellite navigation) applications, such as those that provide
real-time or near real-time alerts to users (e.g., Waze), such as
with respect to road conditions or other information.
[1121] Additionally, in certain implementations information
relating to the transportation mode, such as of the vehicle within
which a device is present/operating, can be generated/provided. For
example, device users who are determined to be riding bicycles can
be provided information on the nearest bicycle stores (e.g., for
repairs), the nearest restaurants (to fuel up), the relevant
recommended cyclist spots (e.g., good climbs, good off-roads),
etc.
[1122] In certain implementations, information pertaining to
pedestrians can be provided, for example at crosswalks, where such
users can be provided with alerts to approaching vehicles.
Moreover, in certain implementations drivers can be alerted to
pedestrians nearby to (e.g., in or approaching) a crosswalk
area.
[1123] It should be noted that while several of the techniques
described herein pertain to allowing vehicles and vulnerable road
users to better co-exist, many of these techniques can also be
implemented in order to improve the co-existence of vehicles with
other vehicles or vulnerable users with other vulnerable users. For
example, it can be advantageous for vehicle drivers to be aware
of/alerted to other vehicles that are approaching/nearing them,
such as in situations of poor visibility (e.g., a blind corner or a
blind turn, poor visibility conditions like snow, fog, exiting a
"hidden driveway," etc.). By way of further example, a vulnerable
road user (e.g., a runner) can be alerted when another vulnerable
user (e.g., a cyclist) is approaching, such as from behind.
[1124] Moreover, while the techniques described herein can be
employed in settings in which information is delivered with the
involvement of a remote server, any or all of the described
operations can also be implemented directly between respective
devices (e.g., the bicyclist's device can communicate directly with
the driver's device, rather than through a remote server).
[1125] Additionally, such techniques can also be employed with
respect to a fixed device on the vehicle side (e.g., a vehicle
infotainment system, an OBDII system) and/or the bicycle side
(e.g., a bicycle computer). Moreover, such a fixed device can
provide redundant and/or additional sources of information (e.g.,
speed) or improved alerts (e.g., via a larger screen, louder
speakers, more consistent remote communication, etc.) that can be
used to augment (e.g., via increased accuracy and/or
functionality), confirm (e.g., via increased accuracy) or replace
(e.g., with respect to lower latency and/or power consumption
considerations) information otherwise obtained from and/or or
determined with respect to a nomadic device (e.g., a portable
device such as a smartphone).
[1126] It can be appreciated that various SatNav applications
(e.g., Waze) provide alerts that are positionally fixed/static
(e.g., that a car is stuck on the roadside in location X). Such
alerts are either passed to all users or passed to users when they
are near the location of the alert. As such, described herein in
various implementations are alerts that are positionally dynamic,
i.e., alerts to items/occurrences whose position is changing (e.g.,
a bicycle rider, a wide vehicle, a slow vehicle, etc.). In
addition, such dynamic position alerts can be provided by the
alertee.
[1127] Moreover, various navigation applications (e.g., Waze)
include features whereby the locations of various other users can
be presented (anonymously or not) to a particular user.
Accordingly, using detection/determination techniques such as those
described herein and (optionally) further incorporating the ability
of a user to self-identify his/her mode of transportation,
technologies described herein can be configured, such as in
conjunction with a navigation application, to show/indicate/provide
alert(s) to the user as to the mode of transportation of other
users, whether in total (i.e., showing all modes of transportation
for all displayed users), or selectively (e.g., showing/alerting a
user only to vulnerable users, e.g., bicycles, pedestrians, etc.,
that are coming close, showing/alerting a user only to large trucks
that are nearby, etc.).
[1128] Many of the techniques described herein with respect to
reducing the power consumption on the device can be apply to the
bicycle/vulnerable road techniques described herein, where, in
certain implementations, one or more sensors and/or other methods
can be utilized in order to determine whether or not a vehicle
(within which a device is present/operating) is within a trip,
and/or the mode of transportation used in such trip (e.g., bicycle,
walking, rollerblades etc.).
[1129] It should also be noted that in certain implementations,
games and/or game-related features can be incorporated into one or
more of the technologies described herein. For example, in certain
implementations. `points` or `credits` can be awarded to a user who
initiates the execution of a determination/verification application
(e.g., an `app` capable of determining whether a device user is
likely to be a driver or a passenger). In other implementations,
such `points` or `credits` can be awarded to a user who
successfully authenticates as a passenger, and/or such `points` or
`credits` can be deducted from a user who fails to
authenticate.
[1130] In certain implementations, it can be advantageous, such as
in relation to a navigation application, to notify a user when the
route that is usually optimal from their current location to their
current destination (as is determined by navigation applications
that implement dynamic routing, such as Waze, as well as those
using static routing), is determined to be sub-optimal such as on a
temporary basis (e.g., due to road work, heavy traffic, etc.). It
should be understood that the referenced `current destination` of
the user can be determined, for example, based on a user input
(e.g., audio, touch, visual [e.g., gestures], etc., inputs) into
the navigation application, and/or can be determined (or
"learned"), such as based on historical routes taken by such user
(which can be accounted for based on the days of the week and/or
the different times of day during which such routes are determined
to be traveled, for example).
[1131] FIG. 40 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 4005 one or more navigation instructions can be computed or
received, such as between a first location and a second location.
At 4010, the one or more navigation instructions can be processed,
such as in relation to at least one of (a) one or more previously
computed navigation instructions between the first location and the
second location or (b) one or more previously traveled routes
between the first location and the second location. It should be
understood that, in certain implementations the referenced
locations (e.g., the first location and/or the second location) can
be practically any points along a navigation route (that is, not
necessarily the origin or destination of a particular trip). In
certain implementations, the one or more navigation instructions
can be processed in order to determine one or more disparities,
such as between the one or more navigation instructions and the at
least one of (a) one or more previously computed navigation
instructions between the first location and the second location or
(b) a previously traveled route between the first location and the
second location. At 4015, one or more notifications can be
generated, such as based on the one or more disparities. In certain
implementations, the one or more notifications can include one or
more navigation instructions that characterize an aspect of the
navigation between the first location and the second location in
relation to the at least one of (a) one or more previously computed
navigation instructions between the first location and the second
location or (b) a previously traveled route between the first
location and the second location. Moreover, in certain
implementations, the one or more notifications can include one or
more navigation instructions that characterize an aspect of the
navigation between the first location and the second location as an
instruction to deviate from at least one aspect of the at least one
of (a) one or more previously computed navigation instructions
between the first location and the second location, (b) a
previously traveled route between the first location and the second
location, or (c) one or more frequently traveled routes between the
first location and the second location.
[1132] Moreover, in certain implementations the referenced
notifications can include various navigation instructions that
characterize an aspect of the navigation between the first location
and the second location as an instruction to continue performing at
least one of the one or more navigation instructions that were
previously provided, such as is described herein. Additionally, in
certain implementations the referenced navigation instructions
(that are included in the referenced notification) can be those
instructions that were previously provided during the same trip as
the navigation instructions received at 4005 (e.g., an instruction
that repeats a previously provided instruction/instructs the user
to continue performing a previously provided instruction, such as
is described herein). Moreover, in certain implementations the
referenced notifications (such as those generated at 4015) can
include various navigation instructions that characterize an aspect
of the navigation between the first location and the second
location as an instruction to continue performing at least one
navigation operation (e.g., a navigation operation that was already
or is currently being performed, such as during the same trip). It
should be understood that `navigation operation` can refer to a
driving/transportation operation or maneuver, such as may be
performed by the user (and winch may not necessarily correspond to
a navigation instruction that is explicitly provided by a
navigation application), for example, an instruction to continue
driving straight (which the user may already be currently doing and
which a navigation application would not otherwise explicitly
instruct).
[1133] At 4020, the referenced notification(s) can be provided,
such as in relation to a location associated with the one or more
disparities (such as those determined at 4010) (e.g., at a defined
time or distance interval prior to the arrival of the user at a
location at winch the routes diverge). In certain implementations
the notification(s) can be provided via one or more interfaces
(e.g., interfaces of the device and/or interfaces external to the
device). Examples of such interfaces include but are not limited to
a display interface, an audio interface, an illumination interface,
or a haptic interface. Moreover, in certain implementations the
referenced notification can be provided in a manner that is
relatively more prominent than the notification(s) provided with
respect to the prior navigation operations (that is, relatively
more prominent than notifications provided previously/earlier
within the same trip) (e.g., in order to draw greater attention to
the notification). For example, the notification can be provided in
a manner that is, for example, relatively louder, relatively
faster, relatively brighter, relatively stronger, relatively
slower, relatively more redundant (e.g., by repeating an
instruction multiple times), relatively longer, relatively more
dynamic (e.g., moving more/faster on display), relatively bolder,
relatively larger (e.g., in font), relatively more red or yellow in
hue, etc., than the notifications provided with respect to the
prior navigation operations (that is, relatively louder, etc., than
notifications provided previously/earlier within the same trip). In
certain implementations, the referenced notification(s) can be
provided in a different voice, tone of voice, etc. (e.g., in a
`male` voice, in contrast to the manner in which other
notifications are provided, e.g., in a `female` voice) than the
notifications provided with respect to the prior navigation
operations. In certain implementations, the referenced
notification(s) can be provided in conjunction with non-verbal
sounds/tones (e.g., such instructions can be preceded by a `beep`).
Additionally, in certain implementations a degree to winch the
operation is relatively unlikely to be complied with can be
determined (such as in a manner described herein) and, based on the
degree to which the navigation instruction is relatively unlikely
to be complied with, at least one of the one or more interfaces at
which to provide the one or more notifications can be selected (for
example, one interface--e.g., an audio interface--can be selected
if the operation is highly unlikely to be complied with, while
another interface--e.g., a visual interface--can be selected if the
operation is relatively less unlikely to be complied with).
Moreover, in certain implementations a degree to which the
operation is relatively unlikely to be complied with can be
determined and, based on the degree to which the navigation
instruction is relatively unlikely to be complied with, the
notification can be provided in a manner that is relatively more
prominent than one or more other notifications provided with
respect to the one or more prior navigation operations (for
example, with respect to an operation that is highly unlikely to be
complied with, the navigation instruction can be provided in a
highly prominent manner e.g., considerably louder than other
instructions during the trip while with respect to an operation
that is relatively less unlikely to be complied with, the
navigation instruction can be provided in a relatively less
prominent manner--e.g., only somewhat louder than other
instructions during the trip). At 4025, the providing of a
notification, such as a notification that does not correspond to
the one or more disparities (e.g., those determined at 4010), can
be precluded, suppressed, or otherwise modified/restricted, such as
in a manner described herein.
[1134] FIG. 48 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 4805 one or more navigation instructions can be computed or
received, such as between a first location and a second location.
It should be understood that, in certain implementations the
referenced locations (e.g., the first location and/or the second
location) can be practically any points along a navigation route
(that is, not necessarily the origin or destination of a particular
trip). At 4810, the one or more navigation instructions can be
processed, such as in relation to at least one of (a) one or more
previously computed navigation instructions between the first
location and the second location or (b) one or more previously
traveled routes between the first location and the second location
to determine one or more disparities between the one or more
navigation instructions and the at least one of (a) one or more
previously computed navigation instructions between the first
location and the second location, (b) a previously traveled route
between the first location and the second location, or (c) one or
more frequently traveled routes between the first location and the
second location. At 4815, one or more notifications can be
generated, such as based on the one or more disparities. Moreover,
in certain implementations the referenced notifications can include
various navigation instructions that characterize an aspect of the
navigation between the first location and the second location as an
instruction to continue performing at least one of the one or more
navigation instructions that were previously provided, such as is
described herein. Additionally, in certain implementations the
referenced navigation instructions (that are included in the
referenced notification) can be those instructions that were
previously provided during the same trip as the navigation
instructions computed/received at 4805 (e.g., an instruction that
repeats a previously provided instruction/instructs the user to
continue performing a previously provided instruction, such as is
described herein). Moreover, in certain implementations the
referenced notifications (such as those generated at 4815) can
include various navigation instructions that characterize an aspect
of the navigation between the first location and the second
location as an instruction to continue performing at least one
navigation operation (e.g., a navigation operation that was already
or is currently being performed, such as during the same trip). It
should be understood that `navigation operation` can refer to a
driving/transportation operation or maneuver, such as may be
performed by the user (and which may not necessarily correspond to
a navigation instruction that is explicitly provided by a
navigation application), for example, an instruction to continue
driving straight (which the user may already be currently doing and
which a navigation application would not otherwise explicitly
instruct).
[1135] At 4820, the referenced notifications can be provided in
relation to a location associated with the one or more disparities
(such as those determined at 4810) (e.g., at a defined time or
distance interval prior to the arrival of the user at a location at
which the routes diverge). In certain implementations the
notification(s) can be provided via one or more interfaces (e.g.,
interfaces of the device and/or interfaces external to the device).
Examples of such interfaces include but are not limited to a
display interface, an audio interface, an illumination interface,
or a haptic interface. Moreover, in certain implementations the
referenced notification can be provided in a manner that is
relatively more prominent than the notification(s) provided with
respect to the prior navigation operations (that is, relatively
more prominent than notifications provided previously/earlier
within the same trip) (e.g., in order to draw greater attention to
the notification). For example, the notification can be provided in
a manner that is, for example, relatively louder, relatively
faster, relatively brighter, relatively stronger, relatively
slower, relatively more redundant (e.g., by repeating an
instruction multiple times), relatively longer, relatively more
dynamic (e.g., moving more/faster on display), relatively bolder,
relatively larger (e.g., in font), relatively more red or yellow in
hue, etc., than the notifications provided with respect to the
prior navigation operations (that is, relatively louder, etc., than
notifications provided previously/earlier within the same trip). In
certain implementations, the referenced notification(s) can be
provided in a different voice, tone of voice, etc. (e.g., in a
`male` voice, in contrast to the manner in which other
notifications are provided, e.g., in a `female` voice) than the
notifications provided with respect to the prior navigation
operations. In certain implementations, the referenced operation(s)
can be provided in conjunction with non-verbal sounds/tones (e.g.,
such instructions can be preceded by a `beep`). Additionally, in
certain implementations a degree to which the operation is
relatively unlikely to be complied with can be determined (such as
in a manner described herein) and, based on the degree to which the
navigation instruction is relatively unlikely to be complied with,
at least one of the one or more interfaces at which to provide the
one or more notifications can be selected (for example, one
interface e.g., an audio interface can be selected if the operation
is highly unlikely to be complied with, while another
interface--e.g., a visual interface--can be selected if the
operation is relatively less unlikely to be complied with).
Moreover, in certain implementations a degree to which the
operation is relatively unlikely to be complied with can be
determined and, based on the degree to which the navigation
instruction is relatively unlikely to be complied with, the
notification can be provided in a manner that is relatively more
prominent than one or more other notifications provided with
respect to the one or more prior navigation operations (for
example, with respect to an operation that is highly unlikely to be
complied with, the navigation instruction can be provided in a
highly prominent manner--e.g., considerably louder than other
instructions during the trip--while with respect to an operation
that is relatively less unlikely to be complied with, the
navigation instruction can be provided in a relatively less
prominent manner--e.g., only somewhat louder than other
instructions during the trip). At 4825, the providing of a
notification, such as a notification that does not correspond to
the one or more disparities (e.g., those determined at 4810), can
be precluded, suppressed, or otherwise modified/restricted, such as
in a manner described herein.
[1136] It can be appreciated that navigation applications generally
instruct a user when to take certain actions (e.g., "in 800 meters
turn right". "at the roundabout take the 2.sup.nd exit," etc.).
Accordingly, in certain implementations such applications can be
improved/augmented by configuring them to provide instructions to
users pertaining to when not to take certain actions (e.g., "in 800
meters, at the intersection, do not take a left", or "in 800
meters, at the intersection, go straight"). Such functionality can
be advantageous to users when a route to their current destination
that is usually optimal is temporarily not optimal (e.g., due to
road work, heavy traffic, etc.). For example, if the route that is
generally fastest from a user's home to the user's place of work
included turning left at a particular intersection, but that route
was not optimal on a particular day/time (e.g., due to road work,
heavy traffic, etc.), and the currently best route involved
proceeding straight at such intersection, existing navigation
systems might simply omit the "turn left" instructions. However,
such an omission may well not be recognized by a user, particularly
one who frequently travels such a route (e.g., a commuter), and
such user may likely turn left at the referenced intersection by
force of habit. Accordingly, providing an explicit negative
instruction such as "do not turn left at" or an implicit negative
instruction (which may also be referred to as a "missing
instruction" and which may, for example, be provided in a scenario
in which (a) the user can be determined to need to go/continue in a
straight direction (or otherwise continue along a particular path)
and (b) the user can be determined to generally/frequently turn at
that location--in such a scenario the referenced "missing
instruction" (e.g., "do not turn", "go straight") can be provided),
such as "go straight at [the referenced intersection]" and/or any
other such technique that can emphasize and/or alerting the user to
the recommended change can be advantageous in such situations.
Moreover, such techniques can be particularly useful when the
user's ordinary routes are learned/observed over time and the
instructions/notifications provided by the navigation application
are generated and provided relative to such learned routes. In
doing so, changes in routes relative to those that the user follows
often can include negative instructions, whereas changes to routes
that the user knows less well may be omitted (or less prominently
emphasized), thereby further improving the user's driving
experience. In another implementation, a navigation application can
provide such implicit negative instruction(s) by advising a device
user to "make a left now instead of at the next intersection". One
exemplary implementation is depicted in FIG. 49.
[1137] In some implementations, the personalization of navigation
instructions described herein can also include the timing of the
delivery of instructions based upon observed/determined tendencies,
habits, etc. of the user (e.g., how quickly does such user process
and react to information) and/or the user's familiarity with a
particular location and/or the likelihood that such user will
comply with such instruction and/or the cost and/or expected cost
of erring on such instruction. For example, an instruction to turn
right at an intersection where the user travels and has turned left
the last 100 times she has reached such intersection may be
provided farther in advance and/or less far in advance (so that the
user does not forget).
[1138] FIG. 97 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 9710 a first set of navigation instructions can be received.
Such a first set of navigation instructions can include navigation
instructions such as from a first origin to a first destination. At
9720 a second set of navigation instructions can be received. Such
a second set of navigation instructions can include navigation
instructions such as from a second origin to a second destination.
Moreover, in certain implementations the referenced second set of
navigation instructions can include one or more previously traveled
routes (e.g., routes previously traveled by the user), one or more
frequently traveled routes (e.g., routes frequently traveled by the
user), and/or one or more previously computed navigation
instructions. It should be noted that, in certain implementations,
the first origin can be equivalent to the second origin and/or the
first destination can be equivalent to the second destination. At
9730, the first set of navigation instructions and the second set
of navigation instructions can be processed. In doing so, one or
more disparities between the first set of navigation instructions
and the second set of navigation instructions can be determined,
such as with respect to one or more locations. In certain
implementations, one or more instructions that are present in both
the first set of navigation instructions and the second set of
navigation instructions and one or more disparities between the
first set of navigation instructions and the second set of
navigation instructions can be determined. Such disparities can
include one or more instructions that follow/succeed the
instructions that are present in both the first set of navigation
instructions and the second set of navigation instructions that are
present in the second set of navigation instructions but are not
present in the first set of navigation instructions and/or or that
are present in the first set of navigation instructions but are not
present in the second set of navigation instructions. At 9740, one
or more notifications can be generated, such as based on the one or
more disparities (such as those determined at 9730). In certain
implementations, the referenced notifications can include a
notification not to perform one or more instructions from the first
set of navigation instructions that are associated with the one or
more locations and that are not present in the second set of
navigation instructions and/or a notification to perform one or
more instructions from the second set of navigation instructions
that are associated with the one or more locations and that are not
present in the first set of navigation instructions. At 9750, the
referenced notifications (such as those generated at 9740) can be
provided, such as in relation to the one or more locations.
[1139] FIG. 98 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1140] At 9810 a navigation instruction can be received, such as in
relation to a location.
[1141] At 9820 the navigation instruction can be processed, such as
with respect to one or more prior navigation operations performed
(and/or with respect to previously used routes, e.g., routes that
are regularly/frequently used, such as by the same user, that
include the same or similar location) with respect to the location.
It should be understood that `navigation operations` can refer to a
driving/transportation operations or maneuvers, such as may be
performed by the user (and which may not necessarily correspond to
a navigation instruction that is explicitly provided by a
navigation application). It should also be understood that the
referenced `prior navigation operations` can refer to navigation
operations that were performed (e.g., by the same user) during a
previous trip/navigation instance and/or during the same
trip/navigation instance. In certain implementations the referenced
prior navigation operations can include navigation operations that
are associated with a user with respect to which the notification
is provided (as described herein). Moreover, in certain
implementations the referenced prior navigation operations can
include navigation operations that are associated with a first
user/group of users, while the notification(s) referenced herein
are provided with respect to another user or users. Additionally,
in certain implementations the navigation instruction can include a
navigation instruction that is provided with respect to travel in a
first direction and the referenced prior navigation operations can
include navigation operations performed with respect to travel in
the first (that is, the same) direction, such as is described
herein.
[1142] At 9830 the prior navigation operation(s) performed with
respect to the location can be processed. In doing so, a relative
predominance of a particular navigation operation can be
determined, such as with respect to the referenced location (e.g.,
the location in relation to which the navigation instruction is
received at 9810). Moreover, in certain implementations the
navigation instruction can be processed with respect to the
particular navigation operation. Additionally, in certain
implementations the navigation operations performed with respect to
travel in a first direction can be processed. In doing so a
relative predominance of a particular navigation operation with
respect to travel in the first direction can be determined, such as
with respect to the referenced location.
[1143] At 9840 a notification can be generated. In certain
implementations such a notification can be generated based on a
determination that the navigation instruction (such as that
received at 9810) deviates from the one or more prior navigation
operations (or previously/frequently traveled/used routes). Such a
notification can include a notification not to perform (e.g., with
respect to the referenced location) an operation in accordance with
the one or more prior navigation operations (for example, "at the
upcoming intersection, don't continue straight like you normally
do"), and/or a notification to perform the navigation instruction
with respect to the location (e.g., "at the upcoming intersection,
turn right").
[1144] At 9850 the notification can be provided. In certain
implementations, such a notification can be provided in relation to
the location. Moreover, in certain implementations the notification
can be provided in relation to the location (e.g., at a defined
distance/time interval prior to reaching the location) based on the
relative predominance (such as that determined at 9830).
Additionally, in certain implementations the notification can be
provided via one or more interfaces (e.g., interfaces of the device
and/or interfaces external to the device). Examples of such
interfaces include but are not limited to a display interface, an
audio interface, an illumination interface, or a haptic interface.
Moreover, in certain implementations the referenced notification
can be provided in a manner that is relatively more prominent than
the notification(s) provided with respect to the prior navigation
operations (that is, relatively more prominent than notifications
provided previously/earlier within the same trip) (e.g., in order
to draw greater attention to the notification). For example, the
notification can be provided in a manner that is, for example,
relatively louder, relatively faster, relatively brighter,
relatively stronger, relatively slower, relatively more redundant
(e.g., by repeating an instruction multiple times), relatively
longer, relatively more dynamic (e.g., moving more/faster on
display), relatively bolder, relatively larger (e.g., in font),
relatively more red or yellow in hue, etc., than the notifications
provided with respect to the prior navigation operations (that is,
relatively louder, etc., than notifications provided
previously/earlier within the same trip). In certain
implementations, the referenced notification(s) can be provided in
a different voice, tone of voice, etc. (e.g., in a `male` voice, in
contrast to the manner in which other notifications are provided,
e.g., in a `female` voice) than the notifications provided with
respect to the prior navigation operations. In certain
implementations, the referenced notification(s) can be provided in
conjunction with non-verbal sounds/tones (e.g., such instructions
can be preceded by a `beep`). Additionally, in certain
implementations a degree to which the operation is relatively
unlikely to be complied with can be determined (such as in a manner
described herein) and, based on the degree to which the navigation
instruction is relatively unlikely to be complied with, at least
one of the one or more interfaces at which to provide the one or
more notifications can be selected (for example, one
interface--e.g., an audio interface--can be selected if the
operation is highly unlikely to be complied with, while another
interface--e.g., a visual interface--can be selected if the
operation is relatively less unlikely to be complied with).
Moreover, in certain implementations a degree to which the
operation is relatively unlikely to be complied with can be
determined and, based on the degree to which the navigation
instruction is relatively unlikely to be complied with, the
notification can be provided in a manner that is relatively more
prominent than one or more other notifications provided with
respect to the one or more prior navigation operations (for
example, with respect to an operation that is highly unlikely to be
complied with, the navigation instruction can be provided in a
highly prominent manner--e.g., considerably louder than other
instructions during the trip--while with respect to an operation
that is relatively less unlikely to be complied with, the
navigation instruction can be provided in a relatively less
prominent manner--e.g., only somewhat louder than other
instructions during the trip).
[1145] At 9860, the providing of a notification that corresponds to
the one or more prior navigation operations (such as those
referenced at 9820) can be precluded, suppressed, or otherwise
modified/restricted, such as in a manner described herein.
[1146] It should be noted that the navigation techniques described
herein can be applied/configured with respect to any/all forms of
navigations (e.g., all forms of motor vehicles, non-motorized
vehicles, pedestrian activities and whether outside, inside, on
Earth, in space, in any medium (e.g., air, water, other), whether
initiated by the user, a 3rd party or autonomously, etc.).
[1147] In certain implementations, when a user travels along a
route (e.g., at least one point on which) she often/regularly
travels or is at a location (e.g., at an intersection) she is
often/regularly at, but in her current trip she wishes to reach a
destination to which she doesn't travel to most often/as
regularly/regularly, a navigation application can be configured to
generate/provide a `special` instruction (e.g., a negative
instruction (explicit or implicit), an instruction with special
audio, visual and/or haptic emphasis), before or at (or even after)
the location at which the route (e.g., best route, the route she
has elected to follow) to her current destination can be determined
to deviate from the route (or from one or more routes) that the
user travels more often/more regularly/regularly (to other
destinations).
[1148] For example, as shown in FIG. 80, a user regularly travels
from home to work each morning (`A` to `C`). On a particular day,
the user is asked to drop a child off at school (`A` to `B`). The
route to school has some initial overlap with the route to work (in
this case the overlap was initial, but the overlap may occur at any
location/time along a route not necessarily at the beginning of the
route and may be arbitrarily short (or long) in distance/time), but
at a particular intersection (`D`), the route to school requires
continuing straight, whereas the route to work requires turning
right. Accordingly, a `special` instruction can be
generated/provided by the navigation application, alerting the user
to the fact that she needs to take an action that is different from
what she is used to. For example, the navigation application can
provide an audio, visual and/or haptic instruction that indicates
"In 300 meters, at the intersection, do not make a right hand turn
but continue straight instead" (an explicit instruction) or "In 300
meters, at the intersection, continue straight" (an implicit
instruction). This can be done in a manner that emphasizes (i.e.,
calls the user's attention to) the instruction in a manner
consistent with the one or more interfaces through which
instructions are delivered and with the design of the particular
navigation application (not all applications have the same
"language" with their users), e.g., a louder or longer instruction
if via audio interface, a larger or brighter or moving instructions
if via visual interface, a stronger vibration, etc.
[1149] By way of further example, as shown in FIG. 83, a user
regularly travels along route `A-C-D-B,` such as from home to work.
However, on account of traffic between points `C` and `D,`
currently the best (e.g., most time efficient) route is
`A-C-E-D-B.` Accordingly in such a scenario, a `special`
instruction can be generated/provided by the navigation
application, alerting the user to the fact that she needs to take
an action that is different from what she is used to. For example,
the navigation application can provide an audio, visual and/or
haptic instruction that indicates "In 300 meters, at the
intersection, do not continue straight (as you normally do) but
make a left hand turn but instead," such as in the manner described
herein.
[1150] By way of yet further example, as shown in FIG. 84, a user
regularly travels along route `A-C-E-B.` such as from home to work.
However, on account of traffic between points `E` and `B.`
currently the best (e.g., most time efficient) route is `A-C-D-B.`
Accordingly in such a scenario, a `special` instruction can be
generated/provided by the navigation application, alerting the user
to the fact that she needs to take an action that is different from
what she is used to. For example, when approaching `C` (e.g., the
point at which the current best route--`A-C-D-B`--diverges from the
regular route--`A-C-E-B`) the navigation application can provide an
audio, visual and/or haptic instruction that indicates "In 300
meters, at the intersection, do not (as you normally do) make a
left hand turn but continue straight instead" (an explicit negative
instruction) or "continue straight" (an implicit negative
instruction), such as in the manner described herein. It should be
noted that other navigation applications, which do not account for
the manner in which previous routes/trips may affect how a user may
relate to a current set of instructions being provided. As such, in
the illustrated scenarios, while other navigation applications may
provide no instruction(s) when the user is determined to be
approaching the point at which the current route diverges from a
regular or common route associated with the user (and particularly
in the scenario illustrated in FIG. 84 in which the user is
supposed to simply continue in the same direction they were already
traveling--a scenario in which existing navigation applications are
unlikely to provide any instructions), as described herein, a
`special` instruction can be generated and provided, instructing
the user not to make a turn they often make and/or to perform (or
continue performing) an operation they are already performing.
[1151] It should be noted that, in certain implementations the
delivery of navigation instructions, and in particular haptic
instructions, to wearables/implantables can be more effective than
those haptic instructions delivered to non-wearable mobile.
[1152] Moreover, in certain implementations, in a scenario in which
a visual UI of a navigation application that is not currently
running in the foreground on a device on which it is providing such
visual UT, upon determining that the device is approaching an
instruction that can be determined to be sufficiently important
(e.g., above a certain threshold) (e.g., a critical instruction,
etc., as determined in one or more ways described herein), the
referenced visual UI can be pushed to the foreground of the device.
Additionally, in certain implementations, in a scenario in which
the screen of the device on which a navigation app is delivering
visual UI is turned off, such screen can be turned on as the
device/user approaches such an instruction that can be determined
to be sufficiently important.
[1153] In certain implementations, the user of a route guidance
application may select one or more geographic regions (and/or the
user may be presented with recommendations for such regions and the
associated app behaviors) within which and/or outside of which the
application can be configured to operate differently than usual
(e.g., no voice instructions, no voice instructions unless there is
a route that can save at least 15 minutes, etc.). Such selection(s)
can be provided/input to the device via one or more interfaces
(e.g., voice, touch, gesture or by accepting default values
proposed by or via the device). Such selection(s) may (i) apply to
one trip (e.g., on the current trip, do not give voice instructions
until we've left my neighborhood); (ii) apply to multiple trips
(e.g., never give me voice instructions on weekday mornings when I
am within 5 km of my workplace); (iii) be conditioned on arriving
(or leaving) a region/location (e.g. do not give voice instruction
until 1 enter the U.S. 101 highway); (iv) be conditioned on a
starting location, a current location and/or a destination (e.g.,
when my starting location is work and my destination is home, do
not give me voice instructions before I get on the highway and or
after I get off the highway); and/or (v) be conditioned on a
current device characteristic, for example, the device's power
state (e.g., connected to power, battery level) (e.g., if I am not
connected to power, do not provide continuous guidance until I exit
my neighborhood).
[1154] In certain implementations, various comparisons between the
current route and previously traveled routes may also include one
or more previous routes manually or semi-manually input into the
device by the user (e.g., a user can input their commuting route
into device as part of navigation app installation/configuration
process).
[1155] FIG. 85 depicts an exemplary set of navigation instructions
8510 which include a `negative instruction` 8520 that instructs the
user not to take perform a particular operation (`don't take the
bridge!`). As noted, such a `special` instruction can be generated
based on various previous trips/navigation scenarios with respect
to which a user may have demonstrated a likelihood to perform such
an operation (e.g., the user may often take the referenced bridge).
Such an instruction can then be provided in relation to (e.g.,
shortly before) the location associated with such an instruction,
thereby alerting the user to the fact that they should not follow
their regular/commonly taken route. It should be noted that while
FIG. 85 depicts a visual instruction (that may be displayed on a
device, for example), the referenced instruction can be provided
via any number of interfaces (e.g., audio, haptic, etc.), as
described herein.
[1156] In another example, as shown in FIG. 81, over the past
month, a user arrived at the intersection that her current route is
now approaching 100 times, of which she turned to the north 80
times and she turned to the south 20 times. If her current route
requires that she go in any direction other than north at this
intersection, a `special` instruction accounting for the user's
prior history can be generated/provided. In another implementation,
such techniques can further account for direction of travel on the
user's previous trips is taken into account in determining whether
a special instruction should be issued (while there is, a priori,
no limit to how many or how frequently a navigation application can
issue special instructions to a user, it may be advantageous to
limit the number of special instructions to situations in which
they have a higher likelihood of preventing user error, or else
they may become ineffective). For example, as shown in FIG. 82, if
the user arrived at the intersection from the east only 20 of the
100 times, but in each such case the user turned south, and in the
current route the user is arriving at the intersection from the
east but is supposed to turn north the navigation application can
minimize the chance of user error by issuing a special instruction,
even though "north" was the most popular direction for the user to
go at this intersection when analyzed blind to "direction of
approach".
[1157] In one implementation, which can be particularly useful to
navigation applications where the device user's traveling patterns
are determined/learned, one or more notifications/alerts can be
provided in advance, such as to the fact that an upcoming trip is
likely to take more/less time than usual (e.g. a commute), so that
the user can adjust his/her departure time accordingly. Such
notification(s) can be generated/determined and/or provided, for
example, based on an estimate of the trip travel time that is
likely to prevail for a trip that is slated to start at or around
the hour that the device user is likely to (or has advised that
he/she will) begin his/her trip. Such estimated trip travel time
can be determined/derived based on one or more of (a) a comparison
of current traffic (e.g., determined today) at one or more points
in time along the referenced possible routes for the referenced
trip with historical traffic data collected/determined with respect
to such times along such routes, (b) acquiring/obtaining data
(time, location) pertaining to specific events set (or likely) to
occur on that day (e.g., a sporting event, holiday, weather
conditions such as rain/snow, etc.) and which may cause changes in
traffic patterns along said routes, and/or (c)
determining/acquiring data pertaining to vehicular or
infrastructure problems/incidents (e.g., crashes, road work, holes
in the road, etc.) that may influence/affect traffic patterns along
the referenced route(s). It should be noted that the time that the
device user is likely to begin such a trip can be
determined/derived from one or more factors such as the
regular/usual time the user begins such commute, the device's alarm
clock settings, entries in the device's/user's calendar and/or user
input indicating a desired departure time or destination arrival
time.
[1158] FIG. 66 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1159] At 6610, one or more operations (e.g., from a set of
navigational operations, such as a set of instructions generated
and/or provided by a navigation instruction application) associated
with a relatively lower likelihood of compliance can be identified.
In certain implementations, such a relatively lower likelihood of
compliance (e.g., with respect to the referenced operation) can be
determined based on one or more geographic locations (e.g., a
location at which the device or vehicle is traveling or present
in--for example, in the left-most lane of a highway when the user
is being directed to exit very shortly via the right-most lane of
the highway), a speed (e.g., a speed at which the operation is
relatively less likely to be complied with for example, if the
vehicle is traveling at 50 miles per hour and is expected to stop
shortly), and/or a device state of the device (e.g., a state or
setting of the device with respect to which it is relatively less
likely that an operation is to be complied with, for example, a
volume state of the device and/or an application executing
thereon--e.g., if the device or navigation application is on a low
volume or mute setting, it is relatively less likely that the user
is aware of upcoming instructions, a display state of the device
and/or an application executing thereon the device e.g., if the
display of the device is on a low brightness or `off` setting, it
is relatively less likely that the user is aware of upcoming
instructions). Additionally, in certain implementations the
referenced operation(s) (e.g., a geographic location associated
with the operation, such as the location at which a turn is to be
made) can be compared with a geographic location associated with a
device to determine that the operation is relatively less likely to
be complied with (e.g., by determining that the device is
considerably distant from the location of the operation, such that
it is unlikely that the operation will be performed) (it should be
understood that the device state of the device can also be
accounted for in this scenario in determining that the operation is
less likely to be complied with, such as in a manner described
herein). Moreover, in certain implementations the referenced
operation can be determined to be relatively less likely to be
complied with based on one or more environmental conditions such as
those that are perceptible to one or more devices (e.g., the level
of audible noise in the environment surrounding the device, as can
be perceived by the microphone of the device, traffic conditions,
weather conditions, etc.). In certain implementations, a
determination can be made, based on a device state of one or more
first devices, that the referenced operation is relatively less
likely to be complied with. Additionally, in certain
implementations a degree to which the operation is relatively
unlikely to be complied with can be determined. Moreover, in
certain implementations the referenced operation (which is
relatively less likely to be complied with) can include a turn, a
stop, a start, a direction change (e.g., forward vs. reverse), a
continuation of a previous/current operation (e.g. to continue
straight), a lane change, a previously performed operation, or an
exit, and/or any other such navigation or driving-related
operation/instruction.
[1160] At 6620, one or more notifications can be generated and/or
provided. In certain implementations, such notifications can
correspond to an operation (such as the operation identified at
6610 as being relatively less likely to be complied with).
Moreover, in certain implementations such notifications can be
provided based on/in relation to a device state of a device (e.g.,
an audio or display setting, etc.). Additionally, in certain
implementations the referenced notifications can include one or
more instructions that are directed or otherwise configured to
increase the likelihood of compliance with the identified operation
(e.g., in a scenario in which it is unlikely that a user traveling
in the left-most lane of a highway will comply with an instruction
to exit via the right lane, a notification to the effect of "you
must exit right shortly, move over now!" can be generated and/or
provided). Moreover, in certain implementations the referenced
notifications can be generated and/or provided based on the degree
to which the operation is relatively unlikely to be complied with
(such as is determined at 6610). Additionally, in certain
implementations one or more interfaces at which to provide the
referenced notifications can be selected, such as based on the
degree to which the operation is relatively unlikely to be complied
with. Moreover, in certain implementations the referenced
notifications can be modified, such as based on/in relation to the
degree to which the operation is relatively unlikely to be complied
with (e.g., by adjusting (a) the volume state of the device, (b) a
volume state of an application executing on the device, (c) a
display state of the device, (d) a display state of an application
executing on the device, (e) a haptic state of the device, and/or
(f) a haptic state of an application executing on the device).
Additionally, in certain implementations the referenced
notifications can be provided to a device associated with a second
vehicle. Such notifications can reflect, for example, that a first
vehicle is relatively less likely to comply with a particular
operation. Additionally, in certain implementations one or more
vehicle functionalities can be initiated, such as based on a degree
to which the operation is relatively unlikely to be complied with
(e.g., activating a left-turn lane-change mechanism in the vehicle
based on a determination that the driver is unlikely to comply with
a left-turn operation). In certain implementations, the referenced
notifications (e.g., notifications corresponding to the referenced
operation) can be provided in relation to one or more second
devices. In certain implementations, such second devices can
be/include one or more of the first devices referenced at 6610,
while in other implementations the referenced first devices can
be/include one or more of the second devices. It should also be
understood that, in certain implementations, the device state
referenced herein can include a volume state of the referenced
second device(s), a volume state of an application executing on the
second device(s), a display state of the second device(s), a
display state of an application executing on the second device(s),
a haptic state of at least one of the second device(s), and/or a
haptic state of an application executing on at least one of the one
or more second devices. As noted, in certain implementations the
one or more first devices can include at least one of the one or
more second devices and/or the one or more second devices can
include at least one of the one or more first devices. Moreover, in
certain implementations the referenced notifications can include
but are not limited to audio notification(s), visual
notification(s), haptic notification(s), etc.
[1161] At 6630, the providing of a notification that does not
correspond to the operation (such as the operation identified at
6610) can be precluded, suppressed, or otherwise
modified/restricted, such as in a manner described herein.
[1162] By way of further illustration, in certain implementations,
when the probability that a user is unlikely to comply with one or
more operations and/or is going to make some other form of mistake
(e.g., deviate from a particular route such as the optimal route or
the selected route) exceeds one or more threshold values, a
navigation application can be configured to generate and/or provide
an instruction/notification (e.g., audio, visual, haptic, etc.)
that can be provided to the user in one or more ways. In certain
implementations, such an instruction/notification can be provided
via an interface (e.g., sound, visual, haptic), such as an
interface that is integrated into the vehicle (e.g., infotainment
system, steering wheel, seat, floor, windshield, rear view mirror,
etc.) and/or on a mobile device present in the vehicle. Moreover,
in certain implementations such an instruction/notification can be
modulated in strength (e.g., with respect to volume, size, length,
amplitude, frequency, etc.), such as based upon the severity and/or
the probability of the pending lack of compliance/mistake. For
example, if an upcoming operation/instruction dictates/recommends
to make a left-hand turn at a traffic light or intersection and the
user/vehicle can be determined to be fast approaching the
light/intersection in the far right lane on a six-lane road, it can
be determined that the user is relatively/highly likely to deviate
from the recommended operation/instruction. Accordingly, the
navigation application can generate one or more alerts and/or
provide such alerts to which can notify the driver to this upcoming
error (e.g. by emitting an audible phrase, e.g., "You are supposed
to turn left", "Warning: You're in the right lane, but are supposed
to turn left in 20 meters," etc.).
[1163] In certain implementations, various factors and/or states
(such as those related to the navigation application and/or various
other devices, elements, etc.) can be used to determine the
probability of the that a user (e.g., a driver) is unlikely to
comply with one or more operations and/or is going to make some
other form of mistake. Examples of such factors, states, etc.,
include but are not limited to: whether the screen of the device on
which the navigation application is to be visually displayed in an
`on` state or otherwise visible, and, even if the display is `on,`
whether the navigation application is in the foreground of the
device/operating system (such that it is readily visible) or in the
background (such that it is not readily visible),
environment/conditions in which the vehicle is traveling (e.g., the
lane location as perceived/determined by one or more in-vehicle
cameras or extra-vehicle cameras, e.g., transmitting information
using vehicle to infrastructure (V2I) protocols), the speed of the
vehicle as determined/perceived by a GPS or speedometer (whether
in-vehicle or extra-vehicle), traffic conditions as
perceived/determined by one or more cameras or through 3rd party
information, the noise level in or around the vehicle (which may
affect the user's ability to hear instructions), and/or any
activities in which the user is engaged (e.g., a phone call, which
may affect the user's cognitive ability to "consume"
instructions).
[1164] For example, a vehicle that is determined (e.g., through
visual capture from one or more cameras), to have a solid line on
its left and a dashed line on its right (i.e., likely in the left
lane), can be determined to have a relatively higher probability of
not complying with an operation/instruction/direction to turn right
at an intersection 20 meters ahead than a vehicle that is
determined to have a solid line on its right and a dashed line on
its left (i.e., likely in the right lane). Accordingly, in
scenarios in which an operation/instruction/direction is determined
to be relatively likely not to be complied with, the navigation
application can be configured to generate and/or provide one or
more corrective instructions (such as are described herein).
[1165] It should also be noted that, as in the case with respect to
`negative instructions,` as described herein (which, for example,
instruct a user not to perform a particular operation--such as not
to follow a route that the user may otherwise be accustomed to
following), the described `corrective instructions` can be explicit
(for example, "you are about to turn left or go straight but you
are actually supposed to turn right") or implicit (e.g., repeating
the instruction "turn right in 20 meters" one or more times).
[1166] In another example, if a vehicle that is supposed to take an
upcoming highway exit cannot be (or is not) determined to
demonstrate the appropriate signs of slowing down as it approaches
the location at which it is to exit, the navigation application can
generate and/or provide an explicit corrective instruction, such as
by vibrating the right part of the steering wheel.
[1167] In another example, if a vehicle is not supposed to take an
upcoming highway exit but can be/is determined to demonstrate signs
of slowing down as it approaches the (incorrect) exit, the
navigation application can generate and/or provide an explicit
corrective instruction, such as by vibrating the left part of the
steering wheel.
[1168] In another implementation, user interfaces can be chosen
and/or modified based upon the effectiveness of the delivery of
information to a user via a particular interface (e.g., audio,
visual, haptic), whether such interface is integrated into the
vehicle (e.g., infotainment system, steering wheel, seat, floor,
windshield, rear view mirror) or on a mobile device present in the
vehicle, based upon the activities determined to be taking place on
the vehicle hardware and/or on the mobile device (e.g., volume
setting, visibility (e.g., foreground/background), brightness
setting, phone call in progress) or in the user's environment
(e.g., loud noise present, bright sunshine present). Based upon the
user's activities (e.g., current foreground application on
infotainment system or mobile device), the state of one or more
interfaces (e.g., infotainment system or mobile speaker volume is
low) and/or the environmental conditions (e.g., windows open and
lots of noise in car), one or more interface actions can be used to
better convey information to the user. For example, a navigation
application may choose to deliver its instructions at higher volume
based on a determination that there is a radio playing in a
vehicle. If that same radio is playing at a volume at which audio
instructions may not be effective, the navigation application
and/or the infotainment system and/or the mobile device can be
configured to provide information visually (e.g., on the
windshield) in lieu of or in addition to providing audio
instructions. For example, in a scenario in which a navigation
application is running in the background on a mobile device (such
that audio instructions are provided to the user from time to time,
but no visual instructions are readily viewable), upon determining
that the user is not likely to effectively receive one or more
audio instruction(s) (e.g. "in 500 meters turn left") (e.g.,
because the radio is playing at a high volume or the user is
engaged in a hand-free phone call) the mobile device can be
configured to provide visual instructions in lieu of (or in
addition to) the audio instruction, or can deliver the instruction
by causing the left side of the driver's seat to vibrate (e.g.,
through communication with one or more in-vehicle systems). It
should be understood that such techniques can be employed with
respect to `negative instructions` and/or a `corrective
instructions.` such as are described herein.
[1169] The fact that a user is less likely to comply with the
instructions and/or has received a corrective instruction also
reflects that the likelihood that the user is going to engage in
one or more dangerous driving behaviors in the near future is
increased. Accordingly, such information can useful, such as to
provide to vehicles in the vicinity of the user and/or can be
shared with them, for example, using V2V or V2I techniques known to
those of ordinary skilled in the art.
[1170] In another implementation, a navigation application can also
be configured to control certain vehicle functionality. For example
when the navigation application instructs the driver to make a
right-hand turn (and, in certain implementations, only upon the
user's confirmation or not declining such instruction), the
vehicle's lane change signaling device can be activated to indicate
an upcoming right hand turn, such as at a calculated distance
before such upcoming turn (e.g., at the best practices distance
before the turn, given the current speed and other conditions).
Moreover, in certain implementations, such actions can be initiated
whether the referenced instruction is a negative instruction or a
corrective instruction.
[1171] In some implementations, the vehicle's blinker/directional
signal, e.g., as can be perceived based on its sound, its flashing
light or directly via one or more interfaces, can be used as an
indicator of whether or not a certain instruction (including an
explicit or implicit "continue straight" instruction or negative
instruction) is likely to be followed. For example, if the
instruction is to turn/exit in a particular direction (e.g.,
right), but, as the vehicle approaches the exit, the blinker has
not been activated (or has been activated, but in the incorrect
direction), the likelihood of the user making an error can be
determined to be significant and a corrective instruction can be
issued. Alternatively, if the vehicle has not been instructed to
exit, but its blinker has been activated (and perhaps if the
vehicle is also in the appropriate lane to so exit), the likelihood
of the user making an error can be determined to be significant and
a corrective instruction can be issued.
[1172] In some implementations, information from other nearby
vehicles (V2V) and from transportation infrastructure (V2I) can be
used as an indicator of whether or not a certain instruction
(including an explicit or implicit "continue straight" instruction
or negative instruction) is likely to be followed. For example, if
information delivered over V2V and/or V2I placed a vehicle in the
left lane when the navigation instructions for the vehicle are to
exit right very soon, a corrective instruction can be issued.
[1173] FIG. 115 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1174] At 11510, an importance of one or more navigation
instructions can be determined. In certain implementations,
determining an importance of one or more navigation instructions
can include determining the importance of the one or more
navigation instructions with respect to a user, determining the
importance of the one or more navigation instructions with respect
to a user based on a navigation history associated with the user,
determining a likelihood that a user is to make an error with
respect to/not comply with the one or more navigation instructions
(the likelihood that the user is to make an error with respect
to/not comply with the one or more navigation instructions can be
determined based on: a travel history of the user, a travel history
of one or more users, an age of the user, a gender of the user, a
time of day, a day of week, traffic conditions pertaining to a
location associated with the one or more navigation instructions,
weather conditions pertaining to a location associated with the one
or more navigation instructions, and/or environmental conditions
pertaining to a location associated with the one or more navigation
instructions), determining a cost associated with
non-compliance/making an error with respect to the one or more
navigation instructions, determining a cost associated with a user
making an error with respect to the one or more navigation
instructions (the cost associated with a user making an
error/noncompliance with an instruction can be determined based on:
an amount of time to be added to a trip in response to an
occurrence of the error, and/or a degree of priority associated
with the user completing the one or more navigation instructions,
and the degree of priority associated with the user completing the
one or more navigation instructions can be determined based on one
or more scheduling entries or one or more electronic communications
associated with the user, an estimated/determined loss of time to
the user as a result of noncompliance with an instruction, an
estimated/determined change in travel distance by the user as a
result of noncompliance with the instruction, an
estimated/determined change in economic cost to the user as a
result of noncompliance with the instruction, an
estimated/determined change in environmental impact as a result of
noncompliance with the instruction, an estimated/determined change
in safety risk as a result of noncompliance with the instruction,
etc., such as in a manner described herein), and/or determining the
expected cost with respect to the one or more navigation
instructions, such as in a manner described herein.
[1175] At 11520, a manner in which to provide the one or more
navigation instructions can be identified, such as based on the
importance (e.g., based on a computed likelihood of non-compliance
by the user with the instruction and/or the computed cost to the
user associated with noncompliance with the instruction). In
certain implementations, one or more interfaces at which to provide
the one or more navigation instructions can be identified and/or
selected, such as in a manner described herein. Moreover, in
certain implementations a relative prominence with which to provide
the one or more navigation instructions can be determined, such as
based on the importance.
[1176] At 11530, the one or more navigation instructions can be
provided in the identified manner (e.g., via the selected
interface).
[1177] By way of further illustration, in certain implementations,
the referenced interface(s) can be selected and/or the navigation
instructions can be delivered differently based on their determined
importance for a particular user or group of users (e.g., higher
sound volume for more important instructions). The importance of an
instruction can be determined based on one or more factors such as
(a) the likelihood of the user making an error (or a particular
error) in performing the instructions and/or one or more aspects
related thereto: and/or (b) the determined cost (or the negative
utility) of the user making an error (or a particular error) in
performing the instructions and/or one or more aspects related
thereto.
[1178] The likelihood of a user making an error (or a particular
error) performing a particular navigation instruction (that is, not
complying with the referenced instruction) and/or one or more
aspects related thereto can be personal and predictable (e.g.,
different likelihoods of different errors can be determined with
respect to different instructions for different users). Such
likelihood can be determined based on one or more factors, such as
(a) the user's travel history; (b) the travel history of a
population of users; (c) the user's age's (d) the user's gender,
(e) the time of day; (f) day of week: (g) the traffic conditions at
or near the instruction location: (h) the weather conditions at or
near the instruction location; (i) environmental conditions in or
around the vehicle, (j) the route traveled including its direction,
(k) the device state of a device associated with the user (e.g.,
whether a turn signal or `blinker` is being utilized, indicating
that a user is likely to make a turn in a particular direction
shortly), and/or (l) one or more of the various other techniques
and/or factors described herein with respect to determining a
likelihood of compliance (e.g., based on geographic location,
speed, proximity to the location associated with an instruction,
lane a user is traveling in, various combinations thereof--e.g.,
the speed being traveled as the user approaches the location at
which the instruction is to be performed, etc.).
[1179] For example, the likelihood of a particular user erring in
making a turn at a complicated highway interchange is very low if
she travels on such route every day, but much higher if she has
never traveled on such route before. In another example, the chance
that a user approaching an intersection (from the south), who
usually turns right at such intersection (when approaching from the
south) and who is supposed to turn left today is likely to make (a)
a "turn right" error is high; and (b) a "go straight" error is
low.
[1180] The cost of the user making an error (or a particular error)
in performing a particular navigation instruction and/or one or
more aspects related thereto can also be personal and predictable.
It can be determined, for example, based upon one or more factors,
such as (a) the time that will be added to the trip from an error
(or a particular error) (for example, the cost of turning right
instead of left at the upcoming intersection will add 45 minutes to
the route): (b) the cost of the user not arriving at the
destination on time (e.g., based on her calendar entry and/or
emails and/or destination, the user has a high priority meeting at
10:00 am with 10 other people all ranked above her in her
organization versus the user doesn't have any meeting
scheduled).
[1181] It should be understood that, as described herein, in
certain implementations, the cost of non-compliance with/making an
error with respect to an instruction can be computed as/with
respect to an expected cost of the result of non-compliance with
the instruction. Such an expected cost can be computed, for
example, as the product of the cost of non-compliance with the
instruction, e.g., for a particular outcome (e.g., how late the
user is to a meeting) for that user at that time, multiplied by the
determined likelihood of such outcome for that user at that time
(which, additionally, may be summed over several or all possible
outcomes).
[1182] For example, as noted, the referenced cost (e.g., the cost
associated with making an error/not complying with one or more
instruction(s)) can be determined by/based on a cost of
non-compliance by the user with a scheduling entry and/or the
likelihood of non-compliance by the user with a scheduling entry.
It should be understood that such a scheduling entry can correspond
to an electronic calendar entry which can include various
parameters, information, etc., including the time and duration of
an event, the location of the event, the identities of others
participating in the event, further information regarding the
subject matter of the event (e.g., an agenda for the event), etc.
Accordingly, such a calendar entry associated with the user can be
processed in order to determine a cost associated with
non-compliance with such a calendar entry. For example, in a
scenario in which the user is traveling to an event
(details/aspects of which are reflected in a scheduling entry
associated with the user), an expected cost of non-compliance with
an instruction (e.g., a navigation instruction on a route that the
user is traveling towards the event) can be computed, for example,
as the cost to the user (e.g., at such time) of missing a certain
portion of the event if the referenced instruction is not complied
with, multiplied by a computed likelihood that the user (e.g., at
such time) is to miss the referenced portion of the event in a
scenario in which the instruction is not complied with (which may
be further summed over some or all possible event portions
missed).
[1183] The manner in which the referenced cost associated with
non-compliance with a navigation instruction can change based on a
scheduling entry can be illustrated in relation to a scenario in
which such a scheduling entry reflects that the user is scheduled
to attend a meeting that begins in 120 minutes. In such a scenario,
when the user is traveling to the referenced meeting (which, as
noted, begins in 120 minutes) and the expected/estimated travel
time until the user arrives at the location associated with the
meeting is 120 minutes (or within a defined time interval within
such time), the cost(s) associated with the navigation
instruction(s) that the user is to perform in order to arrive at
the meeting within the estimated timeframe can be determined to
have a relatively higher cost (since, if the user doesn't comply
with the referenced instruction(s), the user is likely to miss part
of the meeting). Moreover, in certain implementations, those
instructions which, if not complied with, are likely to
significantly increase e.g., above a defined threshold/amount) the
estimated time until the user arrives at the referenced meeting can
be determined to have a yet higher cost (in light of the fact that
such instruction(s), if not complied with, may significantly affect
the ability of the user to attend the meeting). Conversely, in a
scenario in which the user is traveling to the referenced meeting
(which, as noted, begins in 120 minutes) and the expected/estimated
travel time until the user arrives at the location associated with
the meeting is 30 minutes (or within a defined time interval within
such time), the cost(s) associated with the navigation
instruction(s) that the user is to perform in order to arrive at
the meeting within the estimated timeframe can be determined to
have a relatively lower cost (since, even if the user doesn't
comply with the referenced instruction(s), the user still likely
arrive at the meeting on time).
[1184] It should be understood that as noted above, the referenced
cost associated with non-compliance with a scheduling entry can
include and/or account for both the cost of noncompliance with the
scheduling entry as well as a likelihood that the scheduling entry
is not to be complied with (e.g., based on/in relation to
non-compliance with a navigation instruction). In certain
implementations, the referenced cost associated with non-compliance
with a scheduling entry can include and/or reflect an
importance/value associated with a scheduling entry. Such an
importance/value can be computed, for example, based on various
parameters of the scheduling entry, e.g., the identity of others
associated with the scheduling entry (e.g., other attendees at a
meeting, such as a client or supervisor of a the user), a
subject/topic associated with the scheduling entry (e.g., `Discuss
$10 million proposal,` `pick up dry cleaning.` etc.), the length of
time since the scheduling entry was created (e.g., a meeting
scheduled far in advance may be relatively more important), etc.
Additionally, in certain implementations, the referenced likelihood
of non-compliance with a scheduling entry can reflect the degree of
likelihood that the user is to not comply with the scheduling entry
(e.g., not arrive at a location associated with the scheduling
entry by the time or within a defined chronological interval of the
time associated with such a scheduling entry). Thus, for example,
as described above, a relatively low likelihood that a user is to
miss or be late with respect to a scheduling entry (even for an
important event, as determined, for example, based on the
attendees, topic, agenda, etc.) can lower the overall
significance/importance/cost associated with non-compliance with a
navigation instruction provided to a user that is traveling to a
location associated with the referenced entry (since, as noted, the
user is still likely to comply with the scheduling entry, even if a
particular navigation instruction is not complied with).
Conversely, in a scenario in which a scheduling entry can be
determined to be relatively unimportant/associated with a
relatively low cost (e.g., if missed), such a cost can be increased
based on a determination that non-compliance with a particular
instruction is likely to entail noncompliance with the scheduling
entry (e.g., if a user misses a particular turn, by the time other
navigation instructions are provided to reroute them to the
destination, an establishment--e.g., the dry cleaners that they are
traveling to in order to pick up their dry cleaning--will be
closed).
[1185] It should be understood that the likelihood and/or the cost
of a particular user making an error (or a particular error) in
performing a particular navigation instruction and/or one or more
aspects related thereto is dynamic, i.e., the likelihood and/or the
cost and/or the importance of the same instruction for the same
user may be different under different circumstances. For example,
the likelihood of the user making an error at an unlit country road
intersection may be different during the day (when the visibility
is good) as opposed to at night (when the visibility is bad).
[1186] In certain implementations, the importance of a particular
instruction for a particular user at a particular time can be
determined to be the expected cost of (missing) that instruction,
i.e., the product of the likelihood of particular outcomes (success
or different possible errors) for that user at that time,
multiplied by the cost to the user at that time of such outcomes,
summed over the possible outcomes:
E ( C ( u , i , t ) ) = n = 1 N C ( u , i , t outcome = n ) * Prob
( outcome = n u , i , t ) ##EQU00001##
[1187] Where [1188] n is the outcome (success or different possible
errors) from among N possibilities [1189] u is the user [1190] i is
the instruction whose importance is being measured [1191] t is the
time at which this takes place
[1192] In certain implementations, the importance of a particular
instruction for a particular user at a particular time is the
largest expected cost of any particular error on that
instruction:
LEC(u,i,t)=Max(n)(C(u,i,t|outcome=n)*Prob(outcome=n|u,i,t))
[1193] Where [1194] n is the outcome (success or different possible
errors) from among N possibilities [1195] u is the user [1196] i is
the instruction whose importance is being measured [1197] t is the
time at which this takes place
[1198] For example, Mary's navigation system instructs her "in 300
meters at the intersection, turn right". The intersection is a
3-way intersection (right, left, U-turn). The probability that
Mary, conditioned on receiving the instruction from her navigation
system, will make a right, left or U-turn at the intersection
(pursuant to the particular conditions prevailing at that time) can
be determined to be 0.4, 0.5, 0.1, respectively (note that the
probably of her making an error by turning left is the most
probable outcome because she travels to this intersection very
often and 90%, of the time when she approaches this intersection
she makes a left). The cost to Mary of making a right left, or a
U-turn is 0 (no error), 10, and 2, respectively. An instruction
that has such a high likelihood of error (e.g., as measured by the
likelihood of error (0.6=0.5+0.1), the highest cost of error (10),
the expected cost (5.2=0*0.4+10*0.5+2*0.1), the largest expected
cost (5=Max (0*0.4, 10*0.5, 2*0.1))), can be delivered using
multiple delivery methods (e.g., voice and haptic) and special
delivery means (e.g., high volume, different voice, repeated
twice), such as is described herein.
[1199] Additionally, in certain implementations, the importance of
an instruction (e.g., with respect to a particular user) can be
determined (partially or fully) based on observed/determined
behaviors of other users, such as a population of other users who
have previously received the same (or similar/comparable)
instruction and/or have traveled at the same or similar/comparable
location and/or along the same route as the user is presently
traveling.
[1200] For example, in a scenario in which a particular user cannot
be determined to have traveled on a navigation route from point `A`
to point `B` (or has not recently traveled, e.g., within a certain
timeframe, or has never received instructions, e.g., from a
navigation application, with respect to the referenced route, or
there is no information of an instance of travel and/or
instructions associated with travel with respect to the referenced
user, e.g., in a data set being used to score the importance of
instructions), data associated with the historical behaviors of
other users in the same or comparable scenarios can be used to
determine the importance of a particular instruction, e.g., with
respect to the particular user. By way of illustration (and with
respect to the navigation of a particular user from point `A` to
point `B`), based on a determination that, historically, 95% of the
users arriving at point `B` from point `A` then proceed to travel
(or are instructed to travel) from `B` to point `D` and only 5% of
the referenced users then travel (or are instructed to travel) from
point `B` to point `C.` yet today the particular user is routed to
travel along route `A-B-C,` it can be determined that the
importance of the instruction to travel from point `B` to point `C`
is relatively high (by virtue of the referenced being relatively
unusual, as compared with historical scenarios in which the vast
majority of other users are determined to have traveled from point
`B` to point `D`). Accordingly, it can be further determined that
it is relatively likely that the particular user, like the
population of other users, is also used to travel and/or is likely
to travel (by instinct/habit) towards point `D` after traveling
from point `A` to point `B,` despite the fact that the described
technologies may not have necessarily observed (at all or above a
certain degree of certainty) specific navigation instances with
respect to the particular user. It can be further appreciated,
based on the referenced determination that the vast majority of
users proceed to point `D` after traveling from point `A` to point
`B,` that the transportation infrastructure (e.g., signs, lighting
number of traffic lanes, etc.) present on such a route (e.g., at or
near point `B`) may be oriented towards the masses who are to
proceed to point `D.` This, too, may increase the chance of the
particular user continuing towards point `D` after traveling from
point `A` to point `B,` in lien of traveling to point `C` (as
dictated by the route such a user is to follow). Accordingly, upon
making such determination(s), the described technologies can
provide the referenced instruction(s) (that is, instructions that
correspond to traveling to point `C` upon completing travel from
point `A` to point `B`) in a manner that emphasizes such an
instruction, e.g., via one or more of the voice, visual, haptic,
etc., interfaces, as described herein. Additionally, in certain
implementations, upon determining that the importance of a
particular instruction (e.g., by virtue of it having a relatively
low cost of non-compliance) is relatively low, the described
technologies can provide such an instruction in a manner that
de-emphasizes such an instruction, e.g., via one or more interfaces
that are relatively less obtrusive, and/or by
suppressing/precluding the presentation or providing of such an
instruction, such as is described herein.
[1201] Moreover, it can be appreciated that in certain scenarios,
non-compliance with a particular instruction alone may not
necessarily be associated with a relatively high cost, however,
non-compliance with such first instruction may, as a result,
increase the likelihood of non-compliance with a second instruction
which itself may have a relatively high cost associated with its
non-compliance. Accordingly, in certain implementations, the
determination of a cost associated with non-compliance with a
particular instruction (as described herein) may not necessarily
only account for the immediate cost associated with non-compliance
with such an instruction alone, but rather may also account for the
manner in which such non-compliance with a first instruction may,
in turn, affect the likelihood of such a user not complying with
other instruction(s) (which, for example, may be associated with
other, e.g., higher, non-compliance costs). For example, a
navigation route may include a sequence of navigation instructions
`A,` `B,` and`C.` As described herein, it can be appreciated that a
greater cost can be associated with a particular navigation
instruction based on, for example, the fact that, for example, if
such a particular instruction is not complied with, a significant
amount of additional time will be added to the trip. Thus, for
example, in a scenario in which instruction `B` (e.g., entering a
highway) has a high cost (in that if the instruction is not
complied with, significant additional time is likely to be added to
the trip), despite the fact that a preceding instruction (e.g.,
instruction `A`) may not, alone, be associated with such a high
cost, by virtue of the fact that by not complying with instruction
`A,` the user increases the likelihood that instruction `B` will
also not be complied with, the cost associated with instruction `A`
can be increased or otherwise adjusted to account for the
additional cost (that is, noncompliance with instruction `B`) that
may be incurred as a result of noncompliance with instruction
`A.`
[1202] In certain implementations, those instructions whose
importance (e.g., likelihood of error, cost of error, expected
cost, largest expected cost) is determined to be sufficiently low
(e.g., below a threshold value) can be suppressed. For example, the
likelihood of error, the cost of error and, therefore, the expected
cost of (missing) the instruction delivered to a user (e.g.,
audibly, visually, haptically), who starts her trip at home, to
make the left turn at the end of her street, which left turn she
makes 99%, of the time (when she arrives at such end of street
location from her home or from the same direction as her home), is
very low and may be suppressed.
[1203] FIG. 118 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1204] At 11810, one or more navigation instructions that have been
previously provided to a user can be identified, such as with
respect to the user.
[1205] At 11820, one or more location parameters can be processed.
In doing so, it can be determined that the user is present at one
or more locations associated with the one or more navigation
instructions that have been previously provided.
[1206] At 11830, based on a determination that the user is present
at the one or more locations associated with the one or more
navigation instructions that have been previously provided, one or
more first location determination techniques (e.g., location
determination techniques that utilize GPS inputs) can be disabled.
In certain implementations, one or more location determination
sensors can be disabled. In certain implementations, one or more
first location determination techniques can be disabled while/so
long as navigation instructions (e.g., provided by a navigation
application) are not visible (or otherwise perceptible) to the
user. In certain implementations, one or more first location
determination techniques can be disabled while navigation
instructions (e.g., provided by a navigation application) are not
presented (e.g., by a navigation application).
[1207] In certain implementations, a chronological interval during
which the user is likely to remain present at one or more locations
associated with the one or more navigation instructions that have
been previously provided can be computed, and the one or more first
location determination techniques can be disabled until expiration
of the chronological interval.
[1208] In certain implementations, a chronological interval during
which the user is likely to remain present at one or more locations
associated with the one or more navigation instructions that have
been previously provided can be computed, and upon expiration of
the chronological interval, the one or more first location
determination techniques can be enabled.
[1209] In certain implementations, one or more second location
determination techniques (e.g., location determination techniques
that utilize inputs originating from at least one of: a cellular
tower. WiFi. Bluetooth, an accelerometer, and/or a pressure sensor)
can be utilized to determine that the user is present at the one or
more locations associated with the one or more navigation
instructions that have been previously provided, such as in a
manner described herein.
[1210] By way of further illustration, in some implementations, in
some sections of a trip in which a navigation application is being
used, one or more of the sensors/radios (e.g., GPS) that the
application uses may be turned off (e.g., to save power, reduce
internal device heat), without affecting the user's ability to
navigate. For example, based on a determination that a user is
currently traveling on a section of a route on which such user has
traveled previously and/or travels often, and the section of the
route that the user is currently traveling on is the same as a
route that the user has previously traveled on and/or the user's
common/usual route (and thus the instruction(s) to be provided can
be determined to be likely to be `obvious` to the user), one or
more higher-accuracy location determination techniques used to
map-match (e.g., GPS) can be turned off (or sampled less
frequently) because map-matching isn't likely to be needed when the
user is traveling on an `obvious` section of the route, until such
section of the route is nearly completed and the user device's
battery is spared.
[1211] In order (a) to determine when the user is nearing a section
in which high-accuracy location should be turned back on (or
sampled more frequently): and/or (b) to determine whether a
real-time traffic update is relevant for a user (e.g., has the user
already passed the point for which such update is relevant or when
will the user arrive at the point for which such update is
relevant), lower-accuracy location techniques can be used (e.g.,
cell towers, WiFi APs, Bluetooth, accelerometer, pressure
sensor).
[1212] In certain implementations the importance (e.g., likelihood
of error, cost of error, expected cost, largest expected cost) of a
particular instruction to a particular user can be used to
determine which delivery methods (e.g., audio, visual, haptic) to
use and how to deliver such instruction using each such delivery
method(s). For example, if the importance of an instruction is
determined to be high, it may be delivered to the user audibly with
high volume and haptic methods (e.g., the user is approaching an
intersection (from a direction) in which she is supposed to turn in
a direction different from the one in which she usually turns (when
she approaches this intersection from this direction)). If the
importance of an instruction is determined to be low, it may be
delivered only through visual methods (e.g., the turn that I make
every morning at the end my street on the way to work).
[1213] In certain implementations the importance (e.g., likelihood
of error, cost of error, expected cost, largest expected cost) of a
particular instruction to a particular user may even be different
for different delivery methods (e.g., audio, visual, haptic). For
example, a particular instruction might be important visually and
less important audibly (e.g., a complicated intersection in which a
graphical view is more effective than an audio explanation) or vice
versa or important both visually and audibly, and such can be
accounted for in determining how to provide/present the referenced
instruction(s).
[1214] FIG. 67 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1215] At 6710, a first set of navigational operations (e.g.,
directions, instructions, etc.) can be identified/received, such as
between an origin and a destination. In certain implementations,
such an origin can be an initial/original location or a current
location. Moreover, in certain implementations such a destination
can include an ultimate/final or intermediate destination. In
certain implementations, the referenced set of operations can
include those that have been performed (e.g., with at least a
defined frequency) by a user associated with the alternative set of
navigational operations (such as those referenced at 6720).
Additionally, in certain implementations the referenced set of
navigational operations can be those that have been performed
(e.g., with at least a defined frequency) by one or more users.
Additionally, in certain implementations the first set of
navigational operations can include a set of navigational
operations previously traveled by a user associated with a
device.
[1216] At 6720, an alternative set of navigational operations can
be determined and/or received. In certain implementations, such an
alternative set of navigational operations (e.g., between the
origin and the destination) that is likely to be more efficient
(for example, more time efficient, more distance efficient, more
energy efficient, more safe, more efficient with respect to one or
more usage fees, more attractive, be associated with more points of
interest, and/or more familiar) (e.g., at a certain point in time)
than the first set of navigational operations (such as those
identified/received at 6710) can be determined. Moreover, in
certain implementations the alternative set of navigational
operations can be determined based on one or more additional/other
criteria (e.g., in addition to/instead of efficiency). For example,
such alternative set of navigational operations can be determined
based on safety (e.g., the usual route is icy/wet/unsafe), legality
(e.g., a certain road is presently closed or has a temporarily
lower speed limit, a certain turn cannot be made at certain
hours/the present time, etc.).
[1217] At 6730, the alternative set of navigational operations
(such as are determined at 6720) can be compared with the first set
of navigational operations (such as those identified/received at
6710). In doing so, one or more operations included in the
alternative set of navigational operations that deviate from the
first set of navigational operations can be identified.
[1218] At 6740, one or more of the one or more operations included
in the alternative set of navigational operations that deviate from
the first set of navigational operations (such as are identified at
6730) can be provided (e.g., via one or more interfaces). In
certain implementations, information pertaining to and/or otherwise
reflecting a determination that the alternative set of navigational
operations is likely to be more efficient than the first set of
navigational operations can be provided. Additionally, in certain
implementations the referenced operations can be provided via one
or more interfaces (e.g., interfaces of the device and/or
interfaces external to the device). Examples of such interfaces
include but are not limited to a display interface, an audio
interface, an illumination interface, or a haptic interface.
Moreover, in certain implementations the referenced operations can
be provided in a manner that is relatively more prominent than the
notification(s) provided with respect to other navigation
operations (that is, relatively more prominent than notifications
provided previously/earlier within the same trip) (e.g., in order
to draw greater attention to the notification). For example, the
operations can be provided in a manner that is, for example,
relatively louder, relatively faster, relatively brighter,
relatively stronger, relatively slower, relatively more redundant
(e.g., by repeating an instruction multiple times), relatively
longer, relatively more dynamic (e.g., moving more/faster on
display), relatively bolder, relatively larger (e.g., in font),
relatively more red or yellow in hue, etc., than the notifications
provided with respect to the prior navigation operations (that is,
relatively louder, etc., than notifications provided
previously/earlier within the same trip). In certain
implementations, the referenced operations can be provided in a
different voice, tone of voice, etc., (e.g., in a `male` voice, in
contrast to the manner in which other notifications are provided,
e.g., in a `female` voice) than the notifications provided with
respect to the prior navigation operations. Additionally, in
certain implementations a degree to which the operation is
relatively unlikely to be complied with can be determined (such as
in a manner described herein) and, based on the degree to which the
operations is relatively unlikely to be complied with, at least one
of the one or more interfaces at which to provide the one or more
operations can be selected (for example, one interface e.g., an
audio interface can be selected if the operation is highly unlikely
to be complied with, while another interface--e.g., a visual
interface--can be selected if the operation is relatively less
unlikely to be complied with). Moreover, in certain implementations
a degree to which the operation is relatively unlikely to be
complied with can be determined and, based on the degree to which
the navigation instruction is relatively unlikely to be complied
with, the operations can be provided in a manner that is relatively
more prominent than one or more other notifications provided with
respect to the one or more prior navigation operations (for
example, with respect to an operation that is highly unlikely to be
complied with, the navigation instruction can be provided in a
highly prominent manner--e.g., considerably louder than other
instructions during the trip--while with respect to an operation
that is relatively less unlikely to be complied with, the
navigation instruction can be provided in a relatively less
prominent manner--e.g., only somewhat louder than other
instructions during the trip).
[1219] Moreover, in certain implementations the referenced
operations can be generated and/or provided based on the degree to
which the operation is relatively unlikely to be complied with
(such as is determined in a manner described herein). Additionally,
in certain implementations one or more interfaces at which to
provide the referenced operations can be selected, such as based on
the degree to which the operation is relatively unlikely to be
complied with. Moreover, in certain implementations the referenced
operations can be modified, such as based on/in relation to the
degree to which the operation is relatively unlikely to be complied
with (e.g., by adjusting (a) the volume state of the device, (b) a
volume state of an application executing on the device, (c) a
display state of the device, (d) a display state of an application
executing on the device, (e) a haptic state of the device, and/or
(f) a haptic state of an application executing on the device).
Additionally, in certain implementations the referenced
notifications can be provided to a device associated with a second
vehicle. Such operations can reflect, for example, that a first
vehicle is relatively less likely to comply with a particular
operation. Additionally, in certain implementations one or more
vehicle functionalities can be initiated, such as based on a degree
to which the operation is relatively unlikely to be complied with
(e.g., activating a left-turn lane-change mechanism in the vehicle
based on a determination that the driver is unlikely to comply with
a left-turn operation). In certain implementations, the referenced
operations can be provided in relation to one or more second
devices. In certain implementations, such second devices can
be/include one or more of the first devices, while in other
implementations the referenced first devices can be/include one or
more of the second devices. It should also be understood that, in
certain implementations, the device state referenced herein can
include a volume state of the referenced second device(s), a volume
state of an application executing on the second device(s), a
display state of the second device(s), a display state of an
application executing on the second device(s), a haptic state of at
least one of the second device(s), and/or a haptic state of an
application executing on at least one of the one or more second
devices. As noted, in certain implementations the one or more first
devices can include at least one of the one or more second devices
and/or the one or more second devices can include at least one of
the one or more first devices.
[1220] Additionally, in certain implementations information
pertaining to a determination that the alternative set of
navigational operations is likely to be less habitual to a user
than the first set of navigational operations can be provided.
Additionally, in certain implementations, information pertaining to
a determination that, based on (a) the first set of navigational
operations and/or (b) the alternative set of navigational
operations, that the alternative set of navigational operations is
relatively unlikely to be complied with, can be provided.
[1221] Moreover, in certain implementations operations/instructions
included in the alternative set of navigational operations that do
not deviate from the first set of navigational operations can be
prevented from being provided or not provided (e.g., via one or
more interfaces).
[1222] Additionally, in certain implementations one or more
corrective operations can be provided. In certain implementations,
such corrective operations can be provided based on/in response to
a determination that the one or more operations included in the
alternative set of navigational operations are not likely being
complied with. Moreover, in certain implementations the referenced
one or more operations can be provided or emphasized based on a
device state of a device (e.g., in a scenario in which the audio
and/or display of the device is off, such as is described
herein.
[1223] Moreover, in certain implementations, instead of providing
one or more operations, the referenced one or more of the one or
more operations included in the either set of operations may not be
provided, such as when the alternative set of navigational
operations do not deviate from the first set of navigational
operations. Additionally, in certain implementations, the one or
more operations included in the either set or both sets of
operations may not be provided when the alternative set of
navigational operations do not deviate from the first set of
navigational operations.
[1224] Additionally, in certain implementations one or more
navigation instructions can be generated, such as based on the one
or more of the one or more operations included in the alternative
set of navigational operations that deviate from the first set of
navigational operations and a corresponding one or more operations
from at the first set of navigational operations from which the one
or more of the one or more operations included in the alternative
set of navigational operations deviate. Such one or more navigation
instructions can be provided in relation to one or more locations,
such as locations associated with the one or more of the one or
more operations included in the alternative set of navigational
operations that deviate from the first set of navigational
operations.
[1225] Moreover, in certain implementations the referenced one or
more navigation instructions can include a positive/affirmative
instruction (e.g., an instruction that instructs a user to perform
the one or more of the one or more operations included in the
alternative set of navigational operations that deviate from the
first set of navigational operations) and a negative instruction
(such as an instruction that instructs a user not to perform the
one or more operations from at the first set of navigational
operations from which the one or more of the one or more operations
included in the alternative set of navigational operations
deviate).
[1226] Additionally, in certain implementations, one or more of the
one or more operations included in the alternative set of
navigational operations that deviate from the first set of
navigational operations can be provided in relation to the device
(e.g., the device with respect to which the previously traveled
navigational operations are identified/received).
[1227] In certain implementations a user's (or group of users')
previous behavior in situations can be weighted, for example so
that events that occurred more recently can be ascribed more weight
in determining such user's habits. For example, when determining
from what direction a user usually approaches a particular
intersection (e.g., for determining the likelihood that such user
is likely to comply (or not to comply) with a current/future
navigation instruction)--instead of accounting for how such user
acted in the past, irrespective of when (e.g., how long ago) such
events happened, the past observations weighted by how recently
they occurred (e.g., linearly, exponential decay).
[1228] At 6750, a providing of the first set of navigational
operations can be precluded or otherwise suppressed (e.g.,
prevented from being provided/presented), such as based on a
determination that the alternative set of navigational operations
is likely to be more efficient than the first set of navigational
operations or based on the fact that the user is already familiar
with them and presenting them may be perceived as
unnecessary/annoying.
[1229] By way of further illustration, in certain implementations,
a navigation application can generate and/or provide a more general
negative instruction reflecting that the route that a user travels
regularly (or the usually optimal route) is not the best route to
take during the current trip (or a trip that is scheduled to
happen). Such important information can be conveyed explicitly to
the user through one of the interfaces of the device and/or
conveyed implicitly to the user (e.g., by showing a list of
current/expected travel times via different routes, in which the
usual route is emphasized as being sub-optimal and/or used as a
basis for comparison).
[1230] Mobile and fixed in-vehicle navigation applications that
provide navigation instructions that are obvious to a user are
often considered annoying. Such instructions interfere with
in-vehicle or extra-vehicle conversations, with driver thoughts and
create distraction. When a driver is on a route that is known to
him (e.g., home to work, work to home), it can be advantageous to
allow the driver to choose to be alerted to only those instructions
(and/or only via certain interfaces (e.g., audio, visual, haptic)),
if any, which suggest to the driver to deviate from the normally
optimal route or the route that the driver normally takes. Such
instructions to deviate from a normally optimal route can begin
with a "negative" instruction (explicit or implicit) and be
followed by additional "positive" or "affirmative"
instructions.
[1231] For example, on the way to work a user may have 12 turns to
make before he reaches a critical 13th turn where it is usually
better to turn left and get on highway I-80, but sometimes better
to turn right and proceed on highway I-82. Using existing
navigation applications, the user might (a) turn on the application
at or before the trip start and hear the first 12 turn
instructions, unnecessarily; or (b) try to remember to turn on the
application closer to the critical 13th turn, hoping not to forget
and hoping not to lose focus on the driving task while doing so.
The techniques described herein can enable the driver to turn on a
navigation application before starting the vehicle (or any time
after), not have to hear the first 12 instructions and receive the
critical information related to the 13th turn.
[1232] In certain implementations, certain instructions (e.g.,
"obvious" instructions) can be suppressed in scenarios in which
certain conditions are determined to be met. For example, if a user
was engaged in a conversation (e.g., telephone call, with another
occupant) at (or around) the time that a navigation instruction is
to be provided (e.g., by a navigation application) and that
instruction can be determined not to be important (or not important
above a certain threshold, such as in a scenario where such an
instruction is routine for the user and it is highly likely that
the user will comply with the instruction even if it is not
provided), such an instruction can be partially (e.g., its
interference can be reduced on one interface, for example an audio
instruction can be shortened or made quieter and/or suppressed on
only some interfaces, for example, the audio part of the
instruction can be suppressed while the visual part of the
instruction is not) or fully suppressed (i.e., on all interfaces,
e.g., audio, visual, etc.) or altered (e.g., transitioned from an
audio interface to a visual interface, so that it the instruction
interferes less with the ongoing conversation).
[1233] It can be appreciated that many users commute to and from
work each day. They know the route that is typically the best for
them and are usually familiar with one or more alternative routes.
These users do not typically use a navigation application and/or
routing guidance system to help them get to/from work. While these
users recognize that such an application/system offers certain
advantages (e.g., real-time traffic information), they also
recognize that such applications/systems are not designed for the
needs of commuters and include many "features" which are not to
their liking. They typically choose not to use their
application/guidance on commuting trips because the app's/system's
poor design for their commuting needs outweighs its benefits.
[1234] In certain implementations, the technologies described
herein can be configured to provide navigation and other guidance
that is specifically designed/directed to the needs of commuters.
For example, the described technologies can be configured to
provide users with the benefits of real time traffic data without
the various shortcomings present in other navigation
applications/guidance systems. The described technologies can be
configured to run persistently and/or start/stop automatically
(e.g., based upon certain events like time of day, day of week,
movement, location, etc.). For example, on most days the
application/system can rum primarily or even fully "in the
background". i.e. unnoticeable to the regular user, for example,
without any voice, visual and/or haptic
instructions/information/signals sent to the user. It can also be
configured not to alert its user when she has deviated from her
preferred commuting route on the understanding that if the user so
did, she did so intentionally. It may be configured not to require
its user to turn it on or off--it may do so autonomously or
semi-autonomously, e.g., upon the detection of a trip, upon the
detection of its presence in a particular mode of transportation.
It may be configured not to require its user to input a
destination, but to infer/determine such destination (e.g., by
learning the user's history or the history of a group of users who
have or do not have certain similarities to the user). It may be
configured not to use large amounts of battery (e.g., using
techniques described herein). By way of further example, on some
days, when the user's usual route is not the best route (e.g.,
there was a crash on the usual route), the application/guidance
system can be `activated` and, for example, alert the user to the
new best route (as determined based upon a set of user preferences,
like what metric to optimize for (time, distance, cost, etc.) and
what modes of transportation to consider (e.g., car only, mass
transport only, mixed)). In certain implementations the described
technologies can be configured to alert the user at or near a time
that is likely most useful for the user to receive such information
(e.g., close to the time at which the user needs to deviate from
the usual route to follow today's best route--instead of (or in
addition to) at the beginning of the trip or before the trip even
begins).
[1235] Expressing this concept using terms used elsewhere herein,
many or all instructions along the usual commuting route can be
considered `Obvious` (and, for example, `suppressed`), none or few
can be considered Normal and there may be an occasional instruction
along the route that is deemed `Critical` (and perhaps `Missing`
and/or `Negative`).
[1236] In certain implementations, upon determining that there is
no route that is better for the user than the usual route (e.g., as
determined server side), the system may be configured not to check
if the user is in a trip and/or on or sufficiently near to the
user's usual route.
[1237] In certain implementations, if the device location was
determined to be sufficiently far away from the usual route, the
described technologies may be configured not to check if the user
in on the usual route and/or in a trip, e.g., during the minimum
time that it could possibly take the user to return to the usual
route.
[1238] In certain implementations the described technologies can be
implemented at the device. In other implementations substantially
all of the referenced operations can be executed on the server
(e.g., it may be useful from a battery standpoint, an internet
traffic standpoint and/or from a cost standpoint for one (or a few)
devices (e.g., cloud based servers) to monitor that current optimal
routes than for many devices (e.g., mobile devices) to each do
this). And, in yet other implementations some of the referenced
operations can be executed on the device and some executed on the
server.
[1239] The above can apply to one or more usual routes (e.g., home
to work, work to home, home to parent's house, parent's house to
home).
[1240] Below is one example of how the system can be configured:
Paula's usual route to work is as follows: [1241] 1. Make right at
end of driveway onto Oak Drive [1242] 2. Make right at end of Oak
Drive onto Base St. [1243] 3. Make right onto Highway 444 [1244] 4.
Go 24 km on Highway 444 and take exit 27A [1245] 5. Make right at
the light onto Main St. [1246] 6. Continue straight for 400 meters
until you reach 111 Main Street ("Work")
[1247] The system can also determine that Paula starts her usual
route to work between 6:00 am and 8:00 (e.g., learned from history,
input by Paula).
[1248] At 6:00, not knowing yet if Paula's in a trip (the system
may or may not be able to determine if Paula is in a trip because
it may or may not be able to make such determination with
sufficiently high accuracy within its battery budget), the
navigation application/guidance system (which could be resident on
her mobile device(s) and/or fixed in her vehicle and/or in a remote
sever), begins monitoring real time traffic information and
determines that there is no unusual traffic on her usual route at
the moment that could cause such usual route to be sub-optimal for
her today (this determination can be made server side so as to
reduce battery usage on the device and be made for many users--not
just Paula). So, even if Paula is in a trip and on her usual
route--it is optimal so there is no reason for the system to
interact with her.
[1249] At 6:30, the system's real time traffic monitoring
component/module can determine that there is an unusual traffic in
the region of her commute and/or sufficiently large likelihood at
the moment that could cause such usual route to be sub-optimal for
her. At such time--and perhaps only if--such real time traffic
information shows that there is sufficient likelihood that there is
a better route for Paula today (the existence and identity of the
better route may be dependent on Paula's current location), the
system then determines either (a) if Paula is in a trip (if the
system hadn't yet been able to so determine, e.g., because of its
battery budget); and/or (b) Paula's current location (also, if the
system doesn't know this with sufficient accuracy, e.g., because of
its battery budget). Based upon various considerations (e.g.,
battery level, power connection state, battery costs to make such
determinations, time required to make such determinations), the
system may choose to determine (a) before (b), or (b) before (a)
or, in some cases, the data collected will allow both
determinations to be made nearly simultaneously).
[1250] The device determines that Paula is in a trip and that her
location is 20 minutes from the nearest point on the usual
route.
[1251] At 6:50, 20 minutes later, having received no location
information and/or trip stop information to delay the earliest
possible time at which Paula could have returned to her usual route
and given that the real time traffic information continues to show
a sufficiently large likelihood that a route other than her usual
route may be optimal at present, the system checks and sees that
Paula is in a trip and that she is now on the usual route. The
system further determines that, based upon her current location, on
Highway 444 (as per Instruction 4 above), the optimal route at
present for her to reach Work is to leave Highway 444 at Exit 28
(one exit after her usual Exit 27A), and 27 kms from her present
location
[1252] At 7:10, nothing has changed on the road (i.e., the best
route is still different than her usual route) and Paula is now
approaching Exit 27A (perhaps 1-2 kms before the exit). The system
`jumps into action` and advises Paula audibly, visually and/or
haptically, one or more times (and perhaps with at least one of
such instruction being presented farther in advance than
instructions are usually presented by a guidance system), that she
should not take Exit 27A today, but continue straight to Exit 28.
Note that, in this example, this is the first interaction that
Paula had with the system today (on many days there will be no
user/system interaction at all). The system may now launch a full
user interface (UI) on the user's device to help direct the user to
her destination along a route less familiar to her.
[1253] It should be noted that the described/referenced navigation
applications and/or routing guidance systems and the instructions
and/or operations provided by them are not limited to any
particular mode of transportation they can apply to cars, trains,
buses, boats, bicycles, walking, airplanes etc. They are also not
limited to situations in which the user is able to control the
navigation (e.g., turn right) of the mode as is the case, for
example, when the user is the driver of a car, on foot or a cyclist
(on a single-person bicycle)--they can also be applied to
situations in which the user is only able to make more limited
decisions like to board or de-board (e.g., bus, train).
[1254] Navigation applications and/or routing guidance systems
provide a user with guidance to take certain actions at certain
locations on a route. Such locations can be intersections and the
guidance can be how/if to turn at such intersection. Such locations
can be bus stops/stations and train stops/stations and the guidance
can be what bus line or what train line to board on what track, at
what time and in what direction.
[1255] The deviations and similarities between (a) a route
currently presented to, selected by, and/or autonomously deemed
relevant for a user (e.g., as described herein) and (b) one or more
previous routes that such user has (and/or other users have)
traversed, been presented, selected and/or have provided, can be
determined and analyzed. As described herein, the user can be
alerted in certain ways (e.g., via certain interfaces) to certain
such deviations and the instructions related to certain
similarities can be delivered differently (e.g., suppressed or
emphasized on one or more UIs).
[1256] For example, a user's usual route from home to work is:
[1257] 1. (Drive) Make a right and continue 1 km to 10th street
[1258] 2. (Walk) Continue north to 15.sup.th street [1259] 3. (Bus)
Board bus N [1260] 4. (Bus) get off at 20th street [1261] 5.
(Subway) Enter 20th street subway station and take Subway R uptown
on track 2 [1262] 6. (Subway) Get off at 30th street [1263] 7.
(Walk) Make a right and walk north to 40th street
[1264] and today's route is: [1265] 1. (Drive) Make a right and
continue 1 km to 10th street [1266] 2. (Walk) Continue north to
15.sup.th street [1267] 3. (Bus) Board bus N [1268] 4. (Bus) get
off at 20th street [1269] 5. (Bus) Transfer to bus Q [1270] 6.
(Bus) Get off at 32nd street [1271] 7. (Walk) continue north to
40th street
[1272] Today's route deviates from the usual route at Instruction 5
because Subway R uptown is delayed today. These instructions can be
classified as obvious (i.e., do not provide such instruction on one
or more UIs), critical (i.e., provide such instruction in a more
attention grabbing way on one or more UIs, as described herein),
missing (i.e., provide an instruction that was not present in the
original instruction set), negative (e.g., phrased as a "do not"
explicitly or implicitly) and/or corrective (i.e., provide an alert
based upon inputs that indicate an increased likelihood that the
user will not follow an instructions), all in much the same way
that turn-by-turn car navigation instructions are (e.g., as
described herein). Depending on various factors (e.g., the user's
travel history, the travel history for a group of users),
Instructions 1-4 might be classified as obvious instructions and be
suppressed on one or more UIs so as not to overload the user with
unnecessary, potentially annoying information. Instruction 5 might
be classified as a critical instruction (e.g., a high likelihood of
error, a high expected cost of error) and might be delivered using
special forms of voice, visual or haptic presentation/delivery so
as to increase the likelihood of the user's being aware of and/or
complying with them.
[1273] It can be appreciated that existing navigation guidance
systems often provide navigation instructions redundant with
respect to the traveler because the traveler may have already
received and/or otherwise understand the instruction being
provided. As described herein, the described technologies can
determine/identify when such instructions are likely to be
redundant and based on such a determination reduce, mitigate,
and/or eliminate such redundancy, thereby improving the user
experience.
[1274] For example, based on a determination that a user (e.g., the
traveler) received a visual instruction provided by a device
shortly before it needed to be performed, the described
technologies can configure the navigation guidance system to
refrain from providing a corresponding audio instruction. In
another example, based on a determination that a user (e.g., the
traveler) heard and/or understood an audio instruction, the
described technologies can configure the navigation guidance system
to refrain from repeating such audio instruction one or more times
as the traveler moves closer to the location at which such
instruction is to be provided.
[1275] By way of illustration, in certain implementations, the
described technologies can utilize various image processing
techniques which can includes gaze analysis (e.g., using one or
more cameras on the mobile or another mobile device or in-vehicle)
to determine whether or not a user is sufficiently likely to have
successfully understood/received a particular instruction. For
example, such a determination can be made based on the determined
location(s) on which the traveler's eyes are determined to be
focused (e.g., in the direction of one or more visual interfaces),
their variability, and/or the amount of time during which such
focus was determined to have been maintained concurrent with the
referenced navigation instructions being depicted via the
referenced interface(s).
[1276] By way of further illustration, in certain implementations,
the described technologies can be configured to receive active
feedback (e.g., voice, gesture, touch) from the traveler, e.g., to
confirm to the system that the instruction was successfully
received and comprehended, for example, by speaking "Got It" or by
giving a "thumbs-up" gesture or by tapping or swiping on a steering
wheel or mobile device. Based on a determination that such feedback
has been provided, one or more subsequent prompts/notifications for
such instruction(s) can be suppressed.
[1277] It can be appreciated that it may be easier and/or less
stressful for drivers to drive on roads with which they are
familiar. At the same time, drivers often prefer to reach their
destinations in the shortest time possible. Accordingly, in certain
implementations, the described technologies can be configured to
enable a user to balance between these potentially competing
interests, e.g. by enabling the defining of a trade-off threshold,
ration, etc., e.g., between route familiarity and travel time. Such
a configuration can dictate that in order to route (or re-route) a
user on a (sufficiently) less familiar route (e.g., as compared to
another route that is determined to be more familiar to the user),
the expected time savings for such (re-)routing may need to be
determined to be sufficiently large (e.g., above a certain
threshold, e.g., a time threshold, e.g., 15 minutes, a percentage
threshold, e.g., 20% or more longer than the alternative route,
etc.). For example, the described technologies can enable a user to
configure a navigation application such that the application is not
to route the user away from their preferred route (whether prior to
the trip start or during the trip) unless such rerouting is
determined to be likely to save at least 10 minutes (over the
original route).
[1278] In certain implementations, various metrics such as the
determined distance and/or complexity (e.g., number of
turns/instructions) and/or a lowest economic cost of the trip
and/or an ecological cost of a trip can be used in lieu of or in
addition to the referenced `shortest time` metric in order to
determine whether the increased utility is sufficiently high as
compared to the decrease in familiarity (to the user) and/or
increase in complexity to justify such a route choice (or
re-routing choice), based upon default trade-off threshold or user
threshold values provided by the user.
[1279] For example, if a user could save 1 minute in reaching her
destination by taking a route she has never taken before that
included 20 turn instructions on it, relative to a route with which
she is very familiar and that has only 3 turn instructions, she
would not be routed (or re-routed if determined after a trip has
started) to the 1-minute shorter route, but if an alternative route
offered a 15 minutes savings on a route with which she is somewhat
familiar and which has 5 turns instructions (and this represent a
sufficiently utility gain for that user based upon her tradeoff
preferences for travel time, familiarity and complexity), she will
be routed (or re-routed) to the 15-minute shorter route.
[1280] In certain implementations, opportunities (e.g. for the
presentation of advertisements, discount coupons, etc.) and/or
advertisements can be generated and/or presented at a device based
on a determination of the occurrence of one or more events (e.g.,
trip start, trip end, speed, trip length, etc.). In contrast to
traditional location based advertising, such a technique can use
information related to a user's trip to determine when (or what) to
provide advertising and/or commercial offers. Determinations as to
which of several opportunities to present the user can be made
based on/in relation to the determined location, mode of
transportation, time of day, day of week, frequency of user
visitation to location and/or user preferences. For example, when a
trip end is detected at 8:00 AM, a user can be presented with a
discount coupon for breakfast. In another example, three hours into
the user's bicycle ride, s/he can be offered coupon of a local
convenience store to purchase a snack (e.g., a `PowerBar`).
[1281] Moreover, in certain implementations directions/instructions
provided by SatNav applications to users (e.g., "turn right at the
next intersection," etc.) that are actually
confusing/ineffective/suboptimal can be determined/discovered. For
example, such directions/instructions (e.g., the audio and/or
visual prompts that are provided to users while traveling) can be
associated with corresponding user actions, such as those that are
performed concurrent with/subsequent to the providing of such
instructions. Upon determining that concurrent with and/or
subsequent to the proving of a particular directions/instruction
(or set of directions/instructions) by a SatNav application, one or
more users (e.g., relatively more users than is typical/average)
can be determined to navigate in a manner that deviates from the
instructions provided by the application (as can be determined, for
example, as an instance of `rerouting` by the application, for
example based on the user making a `wrong turn`), it can be further
determined that such a direction/instruction is relatively likely
to be confusing/unclear to users, and such a direction/instruction
can be flagged for improvement and/or provided to the appropriate
road authorities in charge, for example, to evaluate/change the
signage, evaluate/change the infrastructure, etc. Moreover, in
certain implementations having identified such locations,
instructions, operations, etc., as being relatively confusing,
unclear, etc., a `special instruction` can be generated and
provided to all users or specifically to those users who are
determined not to be sufficiently familiar with such location,
instruction, operation (as determined, for example, based on the
number of previous visits, the timing of those visits, the
transportation mode and/or the in-vehicle role of the user during
those visits), such as in a manner described herein, such as with
respect to FIGS. 80-85 and 98. For example, a notification such as
"Be careful! You are approaching a tricky location at which many
people make errors. In 400 m you must turn left--be careful not to
take the tunnel" can be generated and provided. Additionally, in
certain implementations such an instruction/notification can be
provided via one or more interfaces, at a different intensity,
etc., such as in the manner described herein.
[1282] FIG. 60 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1283] At 6010, one or more first time intervals can be received.
In certain implementations, such time intervals can correspond to
an amount of time (e.g., in hours, minutes, second, etc.) that a
trip (e.g., between an origin and a destination) was/is determined
to actually have taken (e.g., an actual trip time/duration).
Moreover, in certain implementations, each of the referenced time
intervals can correspond to one or more respective first navigation
instances between an origin and a destination that are associated
with a first navigation instruction provider. Such a navigation
instruction provider can be, for example, a navigation application
that is directed to assisting user in navigating (e.g., driving)
from an origin to a destination by generating and providing a
series of navigation instructions (e.g., driving directions).
Moreover, in certain implementations one or more first trip
efficiency metrics can be received. Examples of such trip
efficiency metrics include but are not limited to a distance (e.g.,
miles/kilometers traveled), a fuel efficiency metric (e.g., amount
of gas or electricity expended), a time interval (e.g., a number of
minutes/hours), and/or any other such metric or quantity that can
reflect or quantify one or more aspects associated with a trip.
[1284] At 6020, one or more second time intervals can be received.
In certain implementations, each of the referenced second time
intervals can correspond to one or more respective second
navigation instances between the origin and the destination (e.g.,
substantially the same origin/destination that are associated with
the first navigation instances referenced at 6010). Moreover, in
certain implementations the referenced first time intervals and the
second time intervals may correspond to one or more substantially
similar trip characteristics (e.g., the same/substantially similar
day, date, time of day, traffic condition, etc.). Doing so can
ensure that the comparison between first time interval(s) and the
second time interval(s) accurately reflect differences in
efficiency (as opposed to, say, different traffic patterns at
different times of the day). Moreover, in certain implementations,
the referenced one or more respective second navigation instances
can include one or more respective second navigation instances
between the origin and the destination (e.g., substantially the
same origin/destination that are associated with the first
navigation instances referenced at 6010) that are associated with a
second navigation instruction provider (e.g., a navigation
application/provider other than the application/provider associated
with the one or more first time intervals, or, alternatively, the
same navigation application/provider configured with different
settings--e.g., a setting to avoid/use toll roads, highways, to
compute instructions based on fuel efficiency as opposed to time
efficiency, etc.). Additionally, in certain implementations the
referenced second navigation instance may not be associated with a
navigation instruction provider (e.g., in a scenario in which a
user is simply driving without the user of a navigation instruction
provider). Moreover, in certain implementations one or more second
trip efficiency metrics can be received (e.g., with respect to
distance, fuel efficiency, etc.).
[1285] In many locations, a driver can elect to take or not to take
a toll road based upon a fixed price. In some locations, the price
of the tolls is dynamic, e.g., based upon a time savings metric
when compared, considering real time traffic, to an alternative
free route. In both models (static price and dynamic pricing), the
price is one size fits all--that is, users can either take the toll
road and pay--or not. However, it can be appreciated that different
drivers may derive different benefits (e.g., time savings) from
using toll roads--even if they drive the same distance on such
roads (e.g., same entrance and exit from the toll road). For
example, one driver may reduce her travel time by 5 minutes by
taking a toll road and another by 25 minutes by taking the same
toll road and, in some cases, even entering and exiting at the same
exits. Nevertheless, existing technologies charge both drivers the
same toll for access to the referenced road. Accordingly, toll
roads may lose those customers for which the benefits of the use of
such road are determined to be small relative to the toll's cost.
Accordingly, by charging drivers/vehicles based (in part or
entirely) upon a determined individual benefit to the user (e.g.,
as determined based on inputs originating from a mobile device, an
in-vehicle application, a vehicle-to-infrastructure (V2X)
communication and/or a customer declaration), the described
technologies can enable such toll road prices to be personalized
and/or dynamically adjusted in relation to a determined benefits to
a driver and/or passenger(s) (whether expected benefit and/or
actual benefits, e.g., on a particular trip).
[1286] For example, if by taking a certain toll road (I-95) from
Exit 1 to Exit 3, Driver A, who saves 5 minutes (based on traffic
on a particular day/time or on average for that day/time or on
average across days and time) in reaching her destination (e.g.,
her work place as is determined based on inputs originating at her
mobile device or vehicle) may be likely to pay up to $2.50 (i.e.,
$0.50 per minute) in lieu of, for example, a fixed cost of $7.50
while Driver B, who saves 25 minutes in reaching his destination
may be likely to pay up to $12.50 in lieu of the $7.50 fixed cost.
In another example, the toll price can be set at $1.50 plus $0.40
per minute saved, i.e., $3.50 for Driver A and $11.50 for Driver
B.
[1287] It should be noted that multiple instances of the referenced
first and second time intervals can be received over time, and, in
doing so a database can be generated which contains historical
information pertaining to time intervals with respect to various
origins/destinations, at various times/conditions, with respect to
various navigation instruction providers, etc. (e.g., using
crowdsourcing techniques as are known to those of ordinary skill in
the art). Based on such aggregated information, the various
comparisons and determinations described herein can be made, such
as with respect to numerous time intervals that have been
observed/identified.
[1288] At 6030, the one or more first time intervals (such as those
received at 6010) can be compared with the one or more second time
intervals (such as those received at 6020). In doing so, a relative
efficiency of the first navigation provider can be determined, such
as in a manner described herein. Moreover, in certain
implementations the one or more first time intervals (such as those
received at 6010) can be compared with the one or more second time
intervals (such as those received at 6020) to determine which of
the first navigation instruction provider or the second navigation
instruction provider provide navigation instructions that
correspond to a relatively lower time interval (and/or is otherwise
more efficient, such as based on any number of other factors such
as fuel efficiency, distance traveled, etc.). Additionally, in
certain implementations the one or more first efficiency metrics
(such as those received at 6010) can be compared with the one or
more second efficiency metrics (such as those received at 6020) to
determine a relative efficiency of the first navigation provider
(e.g., with respect to the efficiency metric, e.g., fuel
efficiency, distance traveled, etc.).
[1289] At 6040, a recommendation can be provided. In certain
implementations, such a recommendation can be to select the first
navigation instruction provider. Moreover, in certain
implementations such a recommendation (e.g., to select the first
navigation instruction provider to generate/provide further
instructions) can be provided based on a determination that the
first navigation instruction provider is relatively efficient
(e.g., with respect to distance, fuel efficiency, time, etc.--for
example, based on a determination that the first navigation
instruction provider provides navigation instructions that
correspond to relatively lower time intervals). Moreover, in
certain implementations the referenced recommendation (e.g., to
select the first navigation instruction provider) can be provided
with respect to a geographic location (e.g., in response to a
request for navigation instructions that can be determined to
originate from and/or correspond to a destination associated with
the same or a substantially similar or related geographic
location). Additionally, in certain implementations the referenced
recommendation to select the first navigation instruction provider
can be provided with respect to the origin and/or the destination
(e.g., `select navigation application X for trips starting in New
York City.` `select navigation application Y when traveling to
Boston,` `select navigation application Z when traveling from New
York City to Boston.` etc.). Moreover, in yet other implementations
one or more actions can be initiated (e.g., based on a
determination that the first navigation instruction provider is
relatively efficient). For example, a device (e.g., smartphone) can
be configured to select from among several available navigation
applications based on a determination that a particular application
is more efficient than the other(s) (e.g., navigation application X
can be automatically selected for trips in New York City while
navigation application Y can be automatically selected for trips in
Boston). By way of illustration, it can be advantageous to
determine and be able to notify users as to various efficiencies
(e.g., time savings) with respect to which they are likely to
benefit (or have benefited) by using a particular navigation
application (e.g., a satellite navigation or `SatNav` application).
Doing so can, for example, enable users to make smarter
"purchasing" decisions as to which applications and/or premium
features to choose, such as by considering the costs of such
applications/features against their benefits.
[1290] The benefits (e.g. time savings, fuel savings, safety gains)
of a navigation application (for a navigation provider and/or to a
navigation user) can be quantified or otherwise determined, for
example, by (a) one or more navigation providers where each such
provider effects its own calculations, e.g., according to
particular standards or protocols (with or without independent
auditing) so that the results can be compared easily across
providers or (b) a central server/system which computes, scores,
and/or ranks various statistics related to the benefits provided by
various providers, thereby allowing a user to compare more
effectively across/between providers.
[1291] For example, a technique for calculating the benefits that a
navigation application's route choice offers its user relative to
another route (e.g., the main line/straightforward route or the
usual/common route at that point in time) to the same location can
be computed by comparing (i) the time that it takes a user that
travels from Origin A to Destination B on the route recommended by
a navigation application with (ii) the time that it takes for a
different user (who may or may not be using the same navigation
application or any navigation application at all), that travels
from Origin A to Destination B along a different route, starting at
substantially the same time. Such a computation/comparison can be
done on a trip-by-trip basis and/or a cumulative basis, e.g., over
some period of time (e.g., day, week, month, since installed) and
can, in certain implementations, be further controlled for
respective driving styles (e.g., certain drivers may naturally
driver faster than others) and can also use various statistical
noise reduction techniques to meaningfully aggregate information
across users, across routes and across time. For example, if a user
who, on average, drives at a speed that is 2% slower than the
average, drives three trips from Origin A to Destination B,
following the recommendation of the navigation application each
time (which recommendations happened to include identical
navigation instructions each time), which trips take 40 min, 45 min
and 50 min each, respectively, whereas 1,000 other drives from
Origin A to Destination B that occurred at substantially the same
time (e.g., they began their trip at within 10 seconds of the time
the user began her trip) along different routes took an average
(across devices) of 42 min, 47 min and 52 min each, where the
average speed at which the (1,000 or fewer) drivers of these 1,000
drives is 0% slower than the average, and so, the navigation
application used by the mobile device provided a benefits of about
3 minutes per trip (.about.7% per trip), on average, for that user.
This information can also be aggregated across multiple users of
the same navigation application, across multiple days to
determine/score the benefits of the application, and the same can
be done for multiple navigation applications, so that comparison
statistics between different navigation applications can be
generated/provided (reflecting which one provides instructions that
are most time efficient, fuel efficient, etc.).
[1292] It should be understood that when analyzing trips that begin
at Origin A and end at Destination B, this does not necessarily
connote that the trip actually began and ended at these locations
(i.e., that the engine was ignited at Origin A and the engine was
turned off at Destination B). Rather, travel/a trip between the
referenced `Origin` and `Destination` (as they are used/referenced
herein) can refer to the device traveling from Origin A to
Destination B without user-elected stops (e.g., at a gas station).
Accordingly, it can be appreciated that any trip undertaken by the
user may consist of any number of (potentially overlapping)
segments that can be used for the purposes of calculating the
benefits and the navigation application scoring described
herein.
[1293] FIG. 61 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1294] At 6110, one or more first navigation instructions can be
received. In certain implementations, such instructions can be
received from a first provider. Moreover, in certain
implementations such instructions can pertain to a particular
destination.
[1295] At 6120, one or more second navigation instructions can be
received. In certain implementations, such instructions can be
received from a second provider. Moreover, in certain
implementations such instructions can pertain to a particular
destination (e.g., the same or substantially similar destination to
the instructions received at 6110).
[1296] At 6130, the first navigation instructions (e.g., those
received at 6110) can be compared with the second navigation
instructions (e.g., those received at 6120). In doing so, it can be
determined which of the first navigation instructions or the second
navigation instructions are relatively more efficient (e.g., with
respect to time, fuel efficiency, distance, etc.).
[1297] At 6140, a recommended set of navigation instructions can be
provided. In certain implementations, such a recommended set of
navigation instructions can be provided based on the relative
efficiency (e.g., as determined at 6130). In certain
implementations, the referenced relative efficiency can include or
reflect a relatively shorter distance, a relatively shorter
timeframe, a relatively lower fuel expenditure, etc.
[1298] At 6150, a deviation from the recommended set of navigation
instructions can be identified (e.g., at a point along a trip where
a user deviates from the recommended set of navigation
instructions), and, based on an identification of the deviation
from the recommended set of navigation instructions, a relative
efficiency of the recommended set of navigation instructions in
relation to the deviation can be computed (reflecting, for example,
an amount of time, gas, etc., that the user is likely to have saved
had they followed the recommended set of navigation instructions
and not deviated therefrom).
[1299] At 6160, a notification corresponding to the relative
efficiency (e.g., of the recommended set of navigation instructions
in relation to the deviation therefrom) can be provided (e.g.,
"following the instructions provided by navigation application X
would have saved you 5 minutes over the route that you are
taking").
[1300] FIG. 62 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1301] At 6210, an estimated travel duration can be received. In
certain implementations, such an estimated travel duration can be
received with respect to one or more first navigation instructions
(e.g., from an origin and/or to a destination) At 6220, an actual
travel duration can be compared with respect to the one or more
first navigation instructions to the destination. In doing so, an
accuracy of the estimated travel duration (e.g., the estimated
travel duration received at 6210) can be determined.
[1302] FIG. 63 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1303] At 6310, a suggestion of one or more first navigation
instructions to a destination can be provided. In certain
implementations, such a suggestion can be provided based on an
estimated travel duration, such as with respect to one or more
first navigation instructions to the destination (and/or from an
origin to the destination).
[1304] At 6320, an actual travel duration can be determined. In
certain implementations, such an actual travel duration can be
determined with respect to one or more second navigation
instructions, such as one or more second navigation instructions to
the destination.
[1305] At 6330, a relative efficiency of the one or more first
navigation instructions can be determined. In certain
implementations, such a relative efficiency of the one or more
first navigation instructions can be determined by comparing an
actual travel duration with respect to the one or more first
navigation instructions to the destination with the actual travel
duration with respect to one or more second navigation instructions
to the destination.
[1306] FIG. 64 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1307] At 6410, one or more eligibility characteristics can be
determined. In certain implementations, such eligibility
characteristics can be determined with respect to a navigational
instance (e.g., an incidence of a trip, such as from one geographic
location to another).
[1308] In certain implementations, the referenced eligibility
characteristics can include but are not limited to: a quantity of
occupants within a vehicle, a time and/or date, a vehicle class,
and/or a vehicle weight.
[1309] At 6420, one or more navigational instructions can be
computed. In certain implementations, such navigational
instructions can be computed based on the one or more eligibility
characteristics (such as those determined at 6410).
[1310] For example, in a scenario in which the referenced
eligibility characteristics pertain to a quantity of occupants
within a vehicle, the referenced navigational instructions can be
computed based on the quantity of occupants within the vehicle. In
a scenario in which the referenced eligibility characteristics
pertain to at a time and/or date, the referenced navigational
instructions can be computed based on the time and/or date. In a
scenario in which the referenced eligibility characteristics
pertain to a vehicle class and the referenced navigational
instructions can be computed based on the vehicle class. In a
scenario in which the referenced eligibility characteristics
pertain to a vehicle weight, the referenced navigational
instructions can be computed based on the vehicle weight.
[1311] At 6430, the one or more navigational instructions (e.g.,
those computed at 6420) can be provided (e.g., within/in
conjunction with a navigation application).
[1312] At 6440, a change can be identified. In certain
implementations, such a change can be identified with respect to
the referenced eligibility characteristics (such as those
determined at 6410). For example, it can be determined (e.g., based
on seat sensors, etc.) that a vehicle that previously had three
passengers riding in it now has only one).
[1313] At 6450, the one or more navigational instructions can be
recomputed. In certain implementations, such instructions can be
recomputed based on the changed eligibility characteristics (e.g.,
as identified at 6440). For example, having determined that fewer
passengers are in a vehicle than were previously (and thus the
vehicle no longer qualifies to travel in the `carpool lane.`
navigation instructions (e.g., to a destination) can be recomputed
to account for the fact that the vehicle can no longer travel in
the `carpool lane.`
[1314] In certain implementations, a navigation application (e.g.,
an application that determines the optimal route to travel between
two or more locations) can be configured to account for the
eligibility of a particular vehicle (i.e., the vehicle within which
the user is traveling) to travel in restricted (e.g., carpool)
lanes, restricted roads, etc., and to improve the computation of
such optimal routes conditioned on such information. For example,
the eligibility of a vehicle to travel in certain lanes or on
certain roads may depend on/be a function of the number of
occupants within the vehicle (e.g., for carpool lanes, mass
transportation lanes, etc.), the time of day and/or day of week
(e.g., right turns on red may be allowed or prohibited between
certain hours or on certain days), vehicle weight (e.g., roads
limited to vehicles weighing fewer than 5 tons), the vehicle class
(e.g., trucks must drive in two right lanes only, may not travel on
certain streets, highways, bridges, etc.), and, using the various
techniques described herein (e.g., to determine the number of
passengers within a vehicle, the vehicle class, etc.), a navigation
application can account for such determinations and compute/adjust
the routing to a particular destination accordingly. Additionally,
in certain implementations the eligibility of a particular vehicle
may change dynamically over the course of a journey (e.g.,
occupants may enter or exit the vehicle, cargo can be loaded or
unloaded, a time/date range can be entered or exited, etc.), and
thus the navigation application can recompute the referenced
routing at the occurrence of various events (e.g., stops), at
various intervals and/or on an ongoing basis and, in some cases,
e.g., when they receive an advance schedule of stops and pick-ups
with occupants and/or cargo weight, take such factors into account
in advance. In certain implementations one or more of the
parameters that are considered in determining such an improved
optimal route may be conveyed/provided/input manually (e.g., user
input via touch, voice, gesture) and/or electronically (e.g., by
communication, directly or indirectly, with a vehicle's systems
(e.g., weight sensors, heat sensors, seat belt sensors, etc.)) or
remotely (e.g., factory loads weight data provided over the air) or
set as defaults.
[1315] In another embodiment, a navigation application offers an
emergency mode wherein the determination of an optimal route for a
vehicle to travel between two or more locations might be made
assuming that it is eligible to travel in all lanes (and on all
roads) regardless of the restrictions that would ordinarily be
applicable to such vehicle in non-emergency circumstances.
[1316] Various other types of lane/road restrictions are also
possible, such as travel restrictions on certain types of vehicles.
For example, certain travel priorities (e.g., specific lanes,
roads, traffic rules, etc.) may be provided to: (a) pollution
friendly vehicles, e.g., hybrid or electric vehicles (as opposed to
pollution unfriendly vehicles): (b) vehicles equipped with one or
more safety features (as opposed to vehicles not so equipped);
and/or (c) autonomous vehicles (as opposed to non-autonomous
vehicles).
[1317] In another implementation, the flow of traffic (e.g.,
forecasted, real-time, historical, and/or static) can also be
utilized as an input and/or otherwise factored/accounted for by/in
conjunction with a navigation application routing system with
respect to differentiating between the flow of traffic in different
lanes (or on different roads), based upon the conditions required
for a vehicle to be eligible to travel in such lanes (or on such
roads). For example, lanes with respect to which only vehicles that
meet one or more conditions (e.g., more than 3 occupants) are
permitted can be accounted for (e.g., by the navigation
application) as different/separate roads and computing a routing to
a particular destination can account for the fact that eligible
vehicles have the option of traveling in both such restricted lanes
(or roads) as well as in unrestricted lanes, while also accounting
for the fact that ineligible vehicles (e.g., those having fewer
than 3 occupants) may only travel in unrestricted lanes (i.e., they
have more limited routing possibilities).
[1318] In another implementation, traffic crashes and/or other
incidents that are reported on roads (e.g., by crowdsourcing), are
expanded to include the side of the road on which (or lane(s) in
which) the crash took place (or in which immobile vehicles are
blocking traffic). Doing so can assist drivers by alerting them to
the lanes they should move into in order to pass the blockage and
can also significantly improve routing systems such as those
described herein (e.g., if the crash is known to have taken place
in an unrestricted lane, vehicles eligible for the carpool lanes
are likely to be significantly less-effected by the crash than
vehicles that are not eligible for the carpool lanes, or, for
example, if the crash took place in the right lane of a 6-lane
road, a truck that is only allowed to travel in the two rights
lanes is likely to be relatively more delayed by the crash than a
passenger vehicle that is eligible to travel in all 6 lanes).
[1319] FIG. 119 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1320] At 11910, an identity of a first user of a first device
(e.g., an in-vehicle system) can be determined. In certain
implementations, the first device may be used by a first user
and/or a second user. Moreover, in certain implementations an
identity of the first user can be determined based on parameters
that pertain to a usage of the vehicle by the first user, including
but not limited to: a seat position associated with the first user,
a seat orientation associated with the first user, a mirror
orientation associated with the first user, a presence of a second
device that is associated with the first user, and/or a music
selection associated with the first user.
[1321] At 11920, one or more navigation instructions to be provided
by the first device can be identified.
[1322] At 11930, one or more aspects of a presentation of at least
one of the one or more navigation instructions can be adjusted such
as based on the identity of the first user.
[1323] In certain implementations, a navigation history associated
with the first user can be received and one or more aspects of a
presentation of at least one of the one or more navigation
instructions can be adjusted based on the navigation history, such
as in a manner described herein.
[1324] FIG. 120 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1325] At 12010, an identity of a first user of a device can be
determined. In certain implementations, an in-vehicle role of the
first user can be determined. Moreover, in certain implementations
an in-vehicle location of the first user can be determined.
[1326] At 12020, one or more navigation operations performed in
relation to the user can be identified. Moreover, in certain
implementations a vehicle type within which the first user is
traveling can be identified.
[1327] At 12030, a navigation history of the user can be updated,
such as based on the one or more navigation operations.
[1328] Moreover, in certain implementations a navigation history of
the user can be updated based on the in-vehicle role of the first
user and/or the one or more navigation operations. Additionally, in
certain implementations a weight associated with the one or more
navigation operations can be adjusted, such as based on the
in-vehicle role of the first user. Moreover, in certain
implementations, a weight associated with the one or more
navigation operations can be increased based on a determination
that the in-vehicle role of the first user is a driver.
Additionally, in certain implementations a weight associated with
the one or more navigation operations can be decreased based on a
determination that the in-vehicle role of the first user is a
passenger.
[1329] In certain implementations a navigation history of the user
can be updated based on the vehicle type and/or the one or more
navigation operations. A weight associated with the one or more
navigation operations can be adjusted based on the vehicle type,
such as in a manner described herein.
[1330] In certain implementations, a navigation history of the user
can be updated based on the in-vehicle location of the first user
and/or the one or more navigation operations, such as in a manner
described herein. A weight associated with the one or more
navigation operations can be adjusted based on the in-vehicle
location of the first user, such as in a manner described
herein.
[1331] By way of further illustration. In some cases navigation
applications may execute on devices that are usually/primarily
single-user devices (e.g., smartphones and other mobile devices)
and the in-vehicle role of their users (e.g., as a driver or
passenger) can change from trip to trip. In other cases navigation
applications execute on devices that are usually/primarily
multi-user devices (e.g., an in-vehicle infotainment system) and
the in-vehicle role of the user doesn't typically change from
trip-to-trip (as navigation is almost always used by the driver).
In order to provide personalized navigation instruction, as
described in detail herein, it can be advantageous to determine (a)
the in-vehicle role of the user (for single-user, multi-role
devices): and (b) to disambiguate the driver (for multi-user,
single role devices), i.e., determine which of a collection/set of
possible drivers is the driver during a particular trip.
[1332] In scenarios in which a navigation application on a device
is used, over time, by multiple users (e.g., with respect to an
in-vehicle navigation system, a shared device, etc.) it can be
advantageous to generate/provide personalized navigation
information to the user currently utilizing the device. For
example, the identity of the particular driver currently driving
the (e.g., during a particular trip) can be determined, for
example, based on the driver seat position/orientation, orientation
of the mirrors, which mobile device is present during the trip, the
music selections chosen in-vehicle or on-mobile device (as
perceived by one or more in-vehicle microphones), etc.
[1333] In doing so, (a) a travel history for each driver can be
more accurately built/generated, and (b) it can be determined which
user's travel history to draw on (or rely on more, if it uses
multiple user travel histories), such as in order to personalize
the navigation experience for the driver in the present trip.
[1334] For example, for a car driven by a husband and wife, there
are two seat/mirror positioned profiles (either explicit in cars
that support such profiles or determined from the various
in-vehicle sensors in cars that do not support such user profiles,
but do have the seat sensors and mirror sensors to determine such
driver's positioning), and/or two different smartphones that are
sometimes present (e.g., connected via Bluetooth or WiFi and
determined via their BSSID/MAC address), and/or two different music
profiles. When a trip starts and the seats and mirrors are in the
position used by the taller user and/or the smartphone A (the
husband's smartphone) is perceived and/or the genre of the music
selected is reggae (the husband's favorite), it can be determined
that it is likely that the husband is driving and the trip
information is assigned to the husband's travel history and/or the
husband's trip history is that which is used (wholly or in part) to
personalize the navigation instructions for the current trip.
[1335] In some implementations (e.g., on mobile devices) the
ability to determine the in-vehicle role that a device user played
during a trip can be significant, such as in order to deliver
personalized navigation instructions so that the user's travel
history can be built properly. For example, a user can be
considered to be more familiar with a route or an intersection or a
location when such user traversed such as a driver than when the
same user traversed such as a passenger.
[1336] Similarly, in some implementations, the mode of
transportation and/or the in-vehicle position that a passenger
occupant was using when traveling can be used to build a user's
travel history in order to improve navigation instructions. A
route, intersection and/or location that such user traversed can be
weighted more or less in or to determine how to personalize
navigation instructions for that user based upon the mode of
transportation used and/or the passenger's in-vehicle position. For
example, a trip as a car (in which the user can see the
surroundings during the trip very well) can be weighted more
heavily than a trip in a train (in which the user cannot typically
see the surroundings very well) and a trip as a front-seat car
passenger can be weighted more heavily that a trip as a rear seat
passenger.
[1337] It should be noted that, for the purpose of determining how
to use the data from a trip to build a user's travel history and
how to weight various data points (e.g., for the purpose of
personalizing navigation instructions), the determination as to (a)
which user was driving a vehicle on a particular trip (e.g., an
in-vehicle device); and/or (b) the in-vehicle role of a user during
a trip (e.g., driver or passenger on a mobile device); and/or (c)
the transportation mode used and/or the user's in-vehicle position
in such trip, can be made anytime during the trip, at the end of
the trip or even well after the end of the trip (including after
the start and/or end of one or more subsequent trips which, when
analyzed together with the trip, may provide even better
information).
[1338] In some implementations, even better navigation instructions
can be provided when user travel history is shared between
different applications on the same or different devices (e.g.,
mobile navigation applications and in-vehicle navigation
applications).
[1339] FIG. 65 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1340] At 6510, a degree of danger can be computed. In certain
implementations, such a degree of danger can be computed with
respect to a navigational instance (e.g., an occurrence of trip,
such as between one location and another, which, in certain
implementations, may be guided via instructions originating from a
navigation instruction application). In certain implementations,
the referenced the degree of danger can be computed based on: a
speed limit associated with the navigational instance, a road
curvature associated with the navigational instance, one or more
weather conditions associated with the navigational instance, a
time associated with the navigational instance, a date or day of
week associated with the navigational instance, a skill level of a
driver associated with the navigational instance, a driving history
of one or more drivers associated with the navigational instance,
one or more driving tendencies of a driver associated with the
navigational instance, one or more incidents associated with one or
more drivers associated with a location within the navigational
instance, one or more incidents associated with a location within
the navigational instance, and/or a vehicle type associated with
the navigational instance (it can be appreciated that data
pertaining to some or all of such factors may, for example, dictate
or suggest the degree of danger associated with traveling with
respect to a particular route, at a particular time, by a
particular driver driving a particular vehicle under specific
conditions). Moreover, in certain implementations a determination
of an entry of a vehicle into a relatively dangerous location can
also be computed.
[1341] Additionally, in certain implementations one or more sets of
navigation routes can be computed, such as between an origin and a
destination. In certain implementations, such sets of navigation
routes may be being associated with respective degrees of danger
(e.g., route X is twice as dangerous as route Y, such as with
respect to a particular driver at a particular time and/or under
particular conditions).
[1342] At 6520, one or more actions can be initiated. In certain
implementations, such actions can be initiated based on a degree of
danger (such as is computed at 6510). For example, in certain
implementations, one or more notifications can be provided in
conjunction with the entry of a vehicle into the relatively
dangerous location (e.g., a warning that can be provided to the
driver that they are entering a dangerous driving location, which,
in certain implementations, may also include information pertaining
to the nature/cause of such danger and/or suggestions as to what
the driver can do/how the driver can drive to minimize such
danger).
[1343] Additionally, various aspects of the functionality of one or
more crash avoidance techniques or technologies (e.g., as may be
implemented or integrated within the vehicle, such as automatic
braking or steering technologies) may be initiated modified and/or
removed based on the computed degree of danger. It should be
understood that, in certain implementations, the operation of such
crash avoidance techniques/technologies may be affected by
instructions originating from systems/application that pertain to
navigation during the navigation instance (e.g., a navigation
instruction application).
[1344] Moreover, in certain implementations, one or more sets of
navigation instructions can be recommended (e.g., by a navigation
instruction application) based on their respective degrees of
danger (e.g., a navigation instruction provider can indicate or
notify a user of the respective degrees of danger associated with
each potential route/set of instructions, and/or can suggest a
particular route/set of instructions based on its relative or
absolute degree of danger). Additionally, in certain
implementations one or more third-party incentives can be provided
with respect to one or more of the sets of navigation instructions
based on their respective degrees of danger (for example, an
insurance company can provide the user with an incentive e.g.,
`save $3 off your insurance premium` in return for the user
selecting a particular route/set of instructions that is determined
to be relatively less dangerous than other options).
[1345] By way of further illustration, it can be appreciated that
different roads can be identified/determined to be associated with
different types of and/or different levels of danger. Such danger
types and/or levels can be estimated (e.g., based on speed limit,
road curvature, surface, presence/absence of guard rails, current,
predicted, and/or historical weather conditions, etc.) and/or
measured/determined empirically (e.g., based on a number of
fatalities, injuries or crashes on a stretch of road) and can
further be normalized in various ways (e.g., number of vehicle
trips, time of day, day of week, time of year, type of vehicles
permitted/traveling, etc.).
[1346] Information about the danger level of a road can be
utilized, considered, factored in, etc., in various ways. For
example, in one implementation, upon determining that a vehicle is
entering (or leaving) a dangerous stretch of road, one or more
warnings, notifications, etc., (e.g., audio, visual, haptic) can be
generated and provided to a driver, such as through one or more
interfaces (e.g., a mobile device, an infotainment system, a
steering wheel, etc.). In another implementation, the
operation/behavior of one or more vehicle/driver safety accessories
can be configured to change based on such road danger information.
For example, upon identifying/determining that a vehicle is
entering a high road danger area, parameters of a crash avoidance
system can be changed/modified (e.g., temporarily), such as
parameters that define tailgating so as to generate/provide
recommendations to the driver to maintain more distance between the
vehicle being driven and the vehicle in front of it.
[1347] In certain implementations, a navigation application can be
configured to compute a route from one location to another in a
manner that optimizes/accounts for the safety of the route, with or
without other terms/factors (e.g., estimated time to destination,
variance of time to destination, cost to destination, etc.). In
another implementation, the optimal route(s) can be determined
subject to satisfying certain constraints/requirements, one or more
of which can pertain to the safety of the route, e.g., compute the
fastest route, subject to not traveling on any extremely dangerous
roads. In another implementation, a navigation application can be
configured to generate/provide/recommend different routes for
different drivers based on each driver's respective levels of
experience, characteristics, skill, driving tendencies, etc. (as
can be determined, computed, observed, etc.) based on one or more
factors (e.g., danger, length, time of day, etc.). For example, (i)
the routes recommended to a young driver may be different than
those recommended to a more experienced driver; (ii) the routes
recommended for daytime driving from destination A to destination B
may be different than those recommended for night time driving from
A to B (even when there are not time related differences).
[1348] In another implementation, insurance companies and/or other
entities (e.g., regulatory agencies) can
incentivize/encourage/require their policyholders to place more
weight/emphasis on the safety of their route selections and/or to
dis-incentivize those policyholders that do not, such as by
reducing (or penalizing) drivers (or vehicles) based on the routes
they traveled. For example, instead of a customer paying her
insurance company a fixed fee (e.g., annually) or paying based upon
how much she drives (e.g., distance, time), she would now pay, in
part or in whole, based upon the safety of the routes on which she
chooses to drive on. Such incentives could also be computed based
on a combination of factors (e.g., safety and
age/experience/skill), for example, young driver might pay a
disproportionately higher price (or not be insured at all) when
traveling, for example, on certain dangerous roads and at certain
times.
[1349] It should be noted that, in certain implementations,
dangerous geographical locations that are not directly related to
road safety (e.g., dangerous neighborhoods, war zones, dangerous to
people from one socio-economic-political affiliation) may also be
accounted for in the described techniques.
[1350] In order to improve road safety, various navigation
applications (e.g., running on mobile device or in-vehicle
devices), enable users to report road hazards and/or report
upcoming road hazards to their users (e.g. "Hazard reported ahead"
with a screen visual showing how far ahead). When a vehicle becomes
a hazard (e.g., stops in the road shoulder), the vehicle's driver
(or passengers) may not be in a state of mind to report their
vehicle as a hazard (i.e., self-report). Accordingly, the describe
technologies can be configured to automatically report the vehicle
as a hazard based on a determination that the vehicle is in fact a
hazard. For example, in certain implementations, in a scenario in
which a vehicle stops on a highway at a location that is determined
not to be a rest stop (e.g., as determined from inputs originating
at a GPS receiver of the device, V2V, V2I, etc., inputs, and/or a
database of rest stops locations), a hazard can be auto-reported.
In certain implementations, a vehicle stopping hazard may be
distinguished from a vehicle stopping in traffic (e.g., not a
hazard) by determining the speed of other vehicles on the road
(i.e., crowdsourcing) from one or more speed-related inputs (e.g.,
inputs originating from GPS, in-vehicle speed sensors, etc.),
and/or the lane the vehicle is in (e.g., from V2V, V2I, in-vehicle,
mobile cameras or extra-vehicle cameras).
[1351] In certain implementation vehicles (whether non-autonomous,
partially autonomous or fully-autonomous) can be configured to
self-report themselves as hazards, e.g., to a central
server/service which can make such information available to other
users, devices, etc.
[1352] While some of the examples and illustrations provided herein
may have been described with respect to a mobile device(s), it
should be understood that many or all of them may be equally
applicable to non-mobile, in-vehicle interfaces (e.g., infotainment
systems, navigation systems, etc.) and vehicle-to-vehicle systems
("V2V") and vehicle-to-infrastructure systems ("V2I) as well.
[1353] In certain implementations, various aspects of a vehicle's
behavior in turns and around corners can be determined (e.g.,
scored, measured) using a mobile device (or a non-nomadic device)
and information regarding that behavior can be delivered/used by
various parties (e.g., as feedback to the driver, to the driver's
employer or parents, to an insurance company). In one
implementation, the acceleration (e.g., as perceived by the
device's accelerometer) can be correlated to the turn (e.g., as
perceived using the GPS radio on the device in conjunction with a
map). The acceleration perceived by the device will tend to change
in a turn both on one or more axes (depending on the orientation of
the device with respect to the vehicle) and/or overall (e.g., the
root mean square or the root mean delta square of the 3-axis
accelerometer values). The GPS lag, i.e., the time it takes for a
change in speed in a vehicle to be perceived and reported by the
GPS radio on a device in the vehicle can also be used to better
correlate between acceleration (or changes in acceleration) and the
road topography.
[1354] In some implementations a navigation application (or a
speed-trap application) can be configured to deliver speed trap
warnings to a user when the vehicle is traveling at a speed that is
greater than the current speed limit (or greater than some
percentage of the current speed limit or sufficiently near the
current speed limit). Doing so can provided an improved user
experience for a user who, for example, is using cruise control and
whose speed hasn't crossed the ticket threshold in an hour.
[1355] FIG. 37 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 3705 a plurality of indications can be received. In certain
implementations, each of the one or more indications can correspond
to at least one of: (a) a determination of a start of a trip or (b)
a determination of an end of a trip. At 3710, a request for a
vacant parking location can be received. At 3715, the plurality of
indications can be processed, such as in order to identify one or
more vacant parking locations. At 3720, a notification
corresponding to at least one of the one or more vacant parking
locations can be provided. In certain implementations, such a
notification can be provided in response to the request.
[1356] A trip can be determined to have ended when a driver parks a
vehicle and a trip typically starts when a driver starts a parked
vehicle. Accordingly, it can be advantageous to determined and/or
maintain parking information related to vehicles (e.g., where
vehicles are parked, how long they have been parked, their parking
habits, when they vacate their parked position, etc.). Moreover,
based on such information, technologies can be implemented whereby
vehicles that seek to park in an approximate particular location
can be provided with tools to assist them to do so more
effectively/efficiently (e.g., faster, with less stress, cheaper,
with better alignment between parking rules/regulations and their
needs, etc.).
[1357] For example, in certain implementations, information related
to public parking regulations can be obtained/referenced, such as
from a database (built, for example, via crowd-sourcing).
Accordingly, upon determining/detecting a `trip-end` (i.e., the end
of a trip, such as in the manner described herein) at/in relation
to a mobile device, it can also be determined that a vehicle may
have parked in that location. Such determination(s) can be computed
with even greater accuracy, for example, based on a determination
that the device with respect to which such determinations are made
has also been determined to be operated by a user identified as a
driver. By way of further example, when a mobile device
determines/detects a `trip-start` (i.e., the start of a trip, such
as in the manner described herein) it can also be determined that a
vehicle that was parked in that location is likely to have vacated
a parking spot.
[1358] In one implementation, users that are determined to be
leaving their parking location (e.g., as determined for example,
through the use of one or more trip start/end determination
techniques, such as those described herein, and/or through the use
of a parking payment application such as Pango) can be offered a
reward (e.g., a parking discount, cash, credit for future parking,
credit or discount from a 3.sup.rd party, etc.) to remain in their
current location for a some period of time, until a certain other
vehicle can arrives in order to allow the parking spot to be
`handed off` or transferred from one user to the other. Moreover,
in certain implementations, users that are looking for parking
spaces can be offered the opportunity to receive (or reserve) a
parking space near their desired location in return for providing a
payment (e.g., in-app, credit card, e-wallet, etc.).
[1359] It can be appreciated that such technologies can be
configured such that the cost (e.g., to the `new` parker) and the
payment (e.g., to the current parker) can be static or dynamic
(e.g., based on time of day, day of week, day in year, location,
number of currently parked users, parking habits of users,
etc.).
[1360] In one implementation the participation of a user in such a
system and/or the payments and costs thereto can be governed by the
user's reputation, as can be determined based on the user's
previous transactions.
[1361] It should also be noted that any or all instructions and/or
notifications referenced herein can be delivered audibly and/or
hapticly and/or visually.
[1362] Moreover, any/all of the referenced navigation applications
and the improvements described herein can be implemented
client-side (e.g., on a device such as a mobile device, on an
in-vehicle device, on another type of device, etc.) and/or
server-side (i.e., remotely) and/or in a combination of the
two.
[1363] FIG. 41 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of both.
At 4105 one or more restrictions can be employed, such as in
relation to a user device. In certain implementations, the one or
more restrictions can include a restriction of one or more
messaging services, such as in relation to the user device. At
4110, a message associated with a restriction override notification
can be received. At 4115, it can be determined that the message
originated from one or more designated sources. At 4120, an
instruction can be provided, such as to perform one or more
actions. At 4125 the message can be provided, such as in relation
to the user device. In certain implementations, the message can be
provided concurrent with an employment of the one or more
restrictions. In certain implementations, the referenced message
can be provided in relation to the user device, such as based on a
determination that the one or more instructions have been
performed.
[1364] In another embodiment, a third party can `page` a vehicle
driver through the driver's mobile device. Upon receiving such a
`page.` the device can signal to the driver (e.g., using audio,
visual and/or haptic means) that there is an emergency or other
such occurrence that the driver must address (in certain
implementations by first stopping or slowing down the vehicle).
Such techniques can be useful in scenarios where a device operated
by a user determined to be likely to be a driver of a vehicle is
put into a restricted mode so as to prevent distraction (e.g.,
otherwise preventing calls, texts, etc.), because such a `page` can
provide a relatively low distraction manner in which to alert the
driver that they are urgently needed.
[1365] It should be noted that such techniques can also be
implemented with respect to devices that are in other forms of "do
not disturb" modes, whether they are passenger devices or not even
within a vehicle.
[1366] In one implementation, such techniques can be employed
whereby a party wishing to urgently contact a device user can be
provided with a message from the user's device indicating that the
device user is currently driving and cannot safely communicate. The
party can also be notified as to how to `page` the user in urgent
situations. Such a notification can be provided, for example by/in
relation to the user's device (e.g., via a voice message and/or a
text message indicating, for example that "I am driving right now
and cannot take your call, if you need my attention urgently,
please [take a certain action]"), and/or via a third party or
object (e.g., as provided by the user's company, the user's spouse,
a website containing such information, the user's business card,
etc.).
[1367] Examples of action(s) to be taken by the party wishing to
`page` the device user include but are not limited to: (i) calling
a specified telephone number, (ii) providing a specified code in a
voicemail or IVR system (either on the device or remotely), (iii)
texting to a special number or emailing to a special address or
posting to a certain URL/IP address, and/or (iv)
texting/e-mailing/posting a special message or a message containing
a special code to the user's device. Such techniques can signal a
`page` to the device directly (e.g., via a text message to the
device with a short message such as "page"), and/or indirectly,
such as by causing a `page` to be communicated or signaled to the
device (e.g., the party inputs the "page" code on the user's
company voice mail menu (e.g., in response to a prompt indicating
that "to reach me urgently hit 4", which, in some implementations,
may be made available only based on a determination that the user
is driving) and, in response, the voice mail program sends a
pre-defined signal to the user's device). It should be understood
that the referenced `page` signal(s) can be sent/transmitted in
various ways, e.g., via voice, data. RF, etc.
[1368] Upon receipt of the referenced `page` signal, the driver's
device can be configured to provide one or more alerts to the
driver, such as those that indicated that someone is urgently
seeking them. Such alerts may be provided in any of a number of
ways, such as, visually (e.g., by causing the device to turn on and
have the screen blink red), via audio (e.g., by playing an audio
file saying "someone is trying to contact you urgently" with or
without the name of such person, if available) and/or haptically
(e.g., by providing a special haptic/vibration pattern to indicate
a `page`).
[1369] In certain implementations the referenced paging feature can
be configured to restrict those that can page a device (e.g., only
contacts determined to be stored at/in relation to the device), so
as to minimize distraction/potential harassment.
[1370] In addition, in various implementations one or more of the
various functionalities and features described herein can be
provided as options which the user can choose to enable or disabled
as desired.
[1371] Moreover, in certain implementations the device and/or one
or more applications executing thereon can be configured to prevent
uninstallation of one or more applications, such as of one or more
applications that enable one or more aspects of the various
functionalities described herein. For example, in one
implementation, a first application/module can monitor the ongoing
execution of a second application/module. Upon determining that the
second application is no longer executing, the first application
can initiate the reexecution/reinstallation of the second
application. Moreover, in certain implementations a device can be
polled (e.g., remotely) to identify applications that are
running/installed on the device. Upon identifying that a particular
application is not installed/running, such an application can be
installed/initiated.
[1372] Moreover, in certain implementations one or more of the
various technologies described herein can be implemented in
scenarios where identifying an existence of/interaction with a
human user (as opposed to a computer/non-human user) can be
advantageous). For example, in scenarios, such as for event ticket
purchases, where vendors wish to ensure that the purchaser of such
items (e.g., tickets) are human users (and not computer `bots` or
robots programmed to perform such transactions), one or more of the
various techniques described herein can be implemented in
conjunction with such a transaction, in order to determine that the
purchaser is likely to be a human user (by virtue of various
sensor-based determinations, such as those originating at a mobile
device, such as is described herein).
[1373] It can be appreciated that a tension exists between whether
advertiser should pay for `leads` (e.g., using a cost per click
model) or `acquisitions` (e.g., using a cost per action model).
Accordingly, it can be advantageous to provide
techniques/technologies that are operative to increase the
likelihood that award/promotional points/credits that are converted
into a discount coupon/voucher actually result in a sale. In doing
so, companies that provide such discount coupons can be
paid/compensated more based upon the issuance of the coupon than is
currently prevalent in existing systems/frameworks, avoiding the
necessity of receiving subsequent reports from the coupon honoror
in order to be paid/compensated. To do this, the time for which
such a coupon is valid can be limited (a "time bomb"), and user to
which the coupon is issued can be required to be within a certain
location (e.g., within a certain store) in order to make the
conversion that generates the coupon. For example, in order to
convert United `frequent flyer` miles into a coupon for a 20%
discount at Marriott (for which United gets paid some amount by
Marriott), Marriot may wish to require that, in order to pay United
for the mere conversion of the miles into a coupon (and not through
Marriott's subsequent definitive confirmation of such a booking),
the customer must make the conversion of the miles into the coupon
within Marriott's hotel grounds (as can be determined via GPS,
WiFi, cell-towers. BT, camera, NFC, and/or any other such
determination technique, such as is described herein) and/or the
validity of the coupon can also be time-limited (e.g., only valid
for redemption within the next 15 minutes).
[1374] Moreover, in certain implementations vehicle recognition
equipment (e.g., cameras) can be oriented in various locations,
such as those where driving is inappropriate/illegal (e.g.,
oriented in locations with respect to which occurrences such as
drivers driving through a gas station in order to gain a few extra
minutes during traffic, cutting in line at a highway exit, etc.,
can be observed). Using such camera(s), one or more vehicles that
perform such inappropriate/illegal acts can be identified (e.g.,
using license plate recognition technologies, as are known to those
of ordinary skill in the art). Upon identifying such vehicles
(and/or users associated with such vehicles, such as the registered
owners/drivers of such vehicles), the identity of such vehicles
(and/or users/drivers) can be processed against one or more data
items, data sets, databases, etc., such as those referenced herein,
in order to determine whether such vehicles (and/or users/drivers)
have higher rate of crash or insurance claims than the population
at large (or the population having one or more similar/comparable
characteristics, e.g. the same/comparable type of car, and/or in
the same geographic area, etc.). Moreover, in certain
implementations the referenced data and/or determinations can be
maintained in a database and insurance policies of drivers
determined to be exhibiting (or not exhibiting) the same or
comparable behaviors can be priced accordingly (e.g., higher or
lower).
[1375] In certain implementations, various techniques described
herein can be employed in order to protect users against the risks
of using their mobile device(s) while such users are in motion. For
example, in industrial settings (e.g., on manufacturing floors),
where employees walking or operating industrial equipment (e.g., a
forklift, a ladder, etc.), while they are distracted by their
mobile device, can cause great damage to people and property, and
on sidewalks, in stairwells, and on escalators, where pedestrians
walking while distracted by their mobile device can cause injury
and economic loss to themselves and others.
[1376] For example, inputs originating from one or more sensors of
a mobile device can be processed to differentiate (i) movements
that are indicative of (a) a user's full body being in motion,
relative to earth: or (b) a user's needing to be in full body
motion relative to earth in order to remain in contact with and/or
in substantially the same proximity to the device, and regardless
of whether the energy for such movement is provided by the user,
like walking, swimming or provided by an external source, like
riding an elevator, escalator or forklift, from (ii) no movement;
from (iii) movements that are indicative of only part of a user's
body being in motion, relative to the earth (e.g., holding phone
while bending, standing, waving arms). Upon identifying/determining
a pattern indicative of full body movement among such inputs, one
or more restrictions can be employed at/in relation to the device,
e.g., until such time as a pattern that is no longer indicative of
full body movement (or, in some cases, of any body movement) can be
identified/determined at/in relation to the device.
[1377] Such techniques can be advantageous, for example, in order
to allow a device operator to interact with a mobile device while
standing in a largely fixed location (but in which the device may
not be completely motionless relative to earth), but to restrict
the device (such that the operator prevented/precluded from so
interacting with the device in one or more ways) when walking or
operating a forklift. In another example, a device can be
configured to enable an employee to place a call on the device
while standing near a stairwell, but such a device can be
restricted such that the employee cannot place the same call once
she can be determined to be engaged in the more dangerous act of
walking the stairs.
[1378] It should be noted that full body movement can be
detected/determined/identified, for example, by analyzing inputs
originating at the accelerometer and/or gyroscope of the device to
detect a pattern indicative of walking (e.g., steps). From the time
that such movement is determined to have started, e.g., until some
time after it is determined to have ended, one or more restrictions
(e.g., a lockscreen is shown, phone calls are not allowed in our
out, etc.) can be employed at/in relation to the device.
[1379] Full body movement can also be determined, for example, by
processing successive visual captures taken by one or more cameras
of the device in order to identify/determine the identity,
position, angles, speed, distance and/or acceleration of objects
(or parts thereof) or the background (e.g., the ceiling, the floor,
the walls, the sky) in successive visual captures from the device
change in such a way that are more likely to be caused by full body
movement that partial device movement.
[1380] Full body movement can also be determined, for example,
using a pressure sensor of the device to detect changes in
elevation (which can be indicative, for example, of the user riding
on an escalator, elevator, ladder or of shelf-picker use). From the
time that such movement is determined to have started, until some
time after as it is determined to have ended, one or more
restrictions can be employed (e.g., a lockscreen can be shown,
phone calls are not allowed in our out, etc.) at/in relation to the
device.
[1381] Full body movement can also be determined, for example, by
monitoring the identify (and/or changes thereto) of the beacons
(e.g. sound. RF, optical) and/or strength of the signals (and/or
changes thereto) of the beacons, that the device can perceive, for
patterns indicative of full body movement (e.g., sufficiently large
changes to signal strength from one or more beacons). This may
particularly useful in locations where such infrastructure has
already been deployed like a manufacturing floor, e.g., for asset
tracking.
[1382] It should be noted that certain techniques described herein
can be more useful when applied (i) only within certain geographic
areas (e.g., on a manufacturing floor, in a stairwell, on a
sidewalk), the presence of a device in such areas (e.g., geo-fences
which may be static or dynamic) can be detected using one or more
sensors and/or radios on the device (WiFi, cellular, GPS. BT,
cameras, microphones); or (ii) within certain date/time windows
(e.g., allowing walking on manufacturing floor using a mobile
device after manufacturing hours).
[1383] It should be noted that, in certain implementations, the
various determinations described herein may be directed towards
determining whether any activity is being performed with respect to
which the device (and/or the user) is likely to be moving beyond a
range in which it can be moved by the user moving only his arms
and/or standing/bending (e.g., in contrast to, for example,
determining the type of activity being performed). Such
determination can reflect, for example, that movement of the device
is outside an envelope that defines the positions and orientations
that a device can be in without its user's feet changing their 3D
position (and, in some cases, only if such activity is performed
within a certain location).
[1384] It should be understood that the movement detection
techniques described herein, also include scenarios in which the
device user may be moving with or near her device, but is not in
direct physical contact with such device (e.g., the device may be
resting on, docked to, mounted on a cart that the user is
operating, pushing or walking next to).
[1385] It should be noted that, it certain situations, the ability
to differentiate between patterns indicative of partial-body
movements, full-body movements and no movements, can also be
utilized in additional contexts and settings. For example, one or
more restrictions can be employed at/in relation to a device until
some time after (and then, optionally, for as long as) a pattern
indicative of full body movement (or even of partial body movement)
can be determined. For example, mobile device that is used to
monitor processes on an industrial machine can be motion activated
(e.g., to activate the screen, CPU, etc.), as there may otherwise
be no need to activate such a device until such time as the machine
begins working. It should be understood that the device can
determined that the machine has started/stopped working, for
example, via motion sensors in contact with the machine, e.g., via
the sound of the machine or a signal emitted when the machine
starts/ends and/or while it is in operation. By way of further
example, operation of a device can be allowed while walking on the
floor, but prevented/restricted while the operator is very close to
a machine (e.g., and must concentrate on operation of the
machine).
[1386] It should be noted that in certain implementations, various
techniques such as those described herein which may reduce battery
usage can be employed in conjunction with the techniques described
herein.
[1387] Described herein in various implementations are techniques
and technologies that enable the collection of data and the
computation of various determinations with respect to the
experiences (e.g., mood, activity level, engagement level, other
behaviors, etc.) of users/people (e.g., patrons, workers, viewers,
etc.) at a venue (e.g., club, party, concert, festival, park, town
square, show, movie, sporting event, restaurant, including
sub-venues (e.g., different parties on different floors of a club,
different sections in a concert), and including virtual venues
(e.g., those users watching a live event via the Internet) etc.),
such as based on various inputs originating at sensors incorporated
within one or more of their mobile devices (e.g., phones, wearable
devices, implantable devices, etc.) and/or one or originating at
the sensors of one or more external devices (e.g., a camera, a
microphone) in the vicinity. As described herein, in certain
implementations various crowd-sourcing techniques (with passive
and/or active components) can be utilized in collecting/receiving
such data/inputs and/or computing such determinations.
[1388] For example, input(s) originating from various sensors of
the mobile devices of those present in a particular venue can be
processed in order to determine various characteristics of the
crowd's experience (e.g., at a given point in time, over the course
of an evening, etc.). In certain implementations, aspects of such
an experience can be determined, for example, based on the
frequency, duration, intensity, happiness level and/or
continuousness of dancing (as can be determined, for example, based
on one or more patterns/sensor profiles, such as patterns exhibited
by inputs originating from an accelerometer and/or gyroscope or
physiological/biometric monitoring using device sensors like heart
rate monitoring, blood pressure, brain activity monitoring using
techniques and sensors like EEG, fMRI, PET, etc., that correspond
to dancing) (as opposed to standing, sitting, or performing various
actions that may be determined or identified to be indicative of
boredom or disengagement with the entertainment at the venue, e.g.,
playing a video game, etc.). In doing so, real-time and/or
retrospective feedback can be generated and/or provided,
reflecting, for example, which songs, settings, moods, etc., were
most popular and which weren't, etc.
[1389] Additionally, in certain implementations such crowd
experience data can be compared, for example, over/across multiple
venues. In certain implementations, such a comparison can be
performed in real-time and/or quasi real-time (based on which it
can be determined, for example, at which venue are the individuals
dancing most actively at a given time, during a given night, etc.),
over time (e.g., how is the mood of patrons in Studio 45 this
Friday night as compared to its average Friday night performance?)
and/or with respect to an individual (e.g., how actively am I
dancing tonight as compared to others? Compared to others in the
venue that I'm in?Others my age? Relative to my usual activity
level?, etc.).
[1390] In one implementation, a disk jockey (`DJ`) in a nightclub
or a performer at a concert/performance can utilize inputs
originating from and/or reflecting the venue's conditions (such as
can be collectively perceived by the sensors from patrons' mobile
devices and/or external devices) to receive and/or determine
real-time and/or near real-time feedback from the current crowd. In
doing so, the DJ, performer, etc, can better understand how various
aspects of a particular song (or songs) or performance selection
(or selections) is being received by the crowd (e.g., with respect
to the genre, songs, tempo, volume, mixes, transitions, etc.), and
the DJ/performer can take one or more actions (e.g., maintaining
the same type of music/performance, making changes to the
music/performance, etc, and/or can learn from the feedback to
improve future engagements). Additionally, in certain
implementations various suggestions and/or recommendations can be
generated (e.g., based on the referenced feedback) and/or provided
to the DJ/performer.
[1391] In another implementation, the conditions of different
venues can be determined and made available to users (e.g., via a
mobile device app, a web application, etc.), such as in order to
assist them in selecting which venue to visit (e.g., which clubs in
my locale are "hot" tonight? which are playing the type of music
that I like? at which are users like me (e.g., those that enjoy
similar music, are the same age) having a better time at tonight
7?) or to socialize their experience (e.g., to post information
about their venue choices, experiences and "performance").
[1392] In another implementation, a venue can use information
regarding the conditions in it to (i) better identify/target the
people invites and/or the places it advertises; (ii) make better
decisions when booking talent (e.g., musicians/DJs), such as based
on the characteristics identified with respect to the previous
performances of different artists and choosing and/or pricing
future artists more intelligently; and/or (iii) better target the
partygoers/dancers for promotions in each venue.
[1393] FIG. 70 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1394] At 7010, one or more inputs can be received. In certain
implementations, such inputs can be received in relation to one or
more environmental aspects. Examples of such environmental aspects
include but are not limited to: one or more content items and/or
one or more demographic profiles.
[1395] At 7020, the one or more inputs can be processed. In doing
so, one or more user experience characteristics can be computed. In
certain implementations, such user experience characteristics can
be computed with respect to and/or based on the one or more
environmental aspects.
[1396] At 7030, one or more recommendations can be provided. In
certain implementations, such recommendations can be provided based
on/in response to the one or more user experience characteristics.
In certain implementations, such recommendations can include but
are not limited to: one or more recommendations with respect to the
one or more content items and/or one or more recommendations with
respect to the one or more demographic profiles.
[1397] By way of further illustration, in certain implementations
the time to gain entrance to a location (e.g., a club, the ticket
counter at a concert, the teller at the passport office, etc.) can
be determined based on information received from various sensors on
the mobile devices of people waiting on line. For example, the
devices of users that are in sufficiently close proximity to a
location can have their waiting time monitored passively (e.g.,
using techniques known to those of ordinary skill in the art, such
as using device sensors such as GPS. WiFi, cellular. Bluetooth,
microphones, physiological/biometric monitoring using device
sensors like heart rate monitoring, blood pressure, brain activity
monitoring using techniques and sensors like EEG, fMRI, PET, etc.)
and/or actively (e.g., by having the user provide (and then
possibly confirming) that they have entered/exited the line or the
location).
[1398] FIG. 75 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1399] At 7510, one or more inputs can be received, such as from
one or more devices. Examples of such inputs include but are not
limited to motion inputs (e.g., dancing) and/or audio inputs (e.g.,
singing out loud).
[1400] At 7520, the one or more inputs can be correlated, such as
with one or more first acoustic elements that are perceptible to
the one or more devices. Examples of such first acoustic elements
include but are not limited to one or more first songs. In doing
so, an association can be drawn between the inputs (e.g.,
corresponding to dancing and/or signing) and one or more songs that
are playing concurrently.
[1401] At 7530, one or more suggestions can be generated. In
certain implementations, such suggestions can be generated based on
a degree of correlation between the one or more inputs and the one
or more first acoustic elements. Moreover, in certain
implementations such one or more suggestions can be generated with
respect to one or more second acoustic elements. Examples of such
second acoustic elements include but are not limited to other songs
that are of the same genre as the first song. For example, upon
determining (e.g., based on the referenced singing/dancing) that a
user enjoys a first song, one or more other songs that are
related/associated (e.g., by the same artist, of the same genre,
etc.) can be identified and/or suggested to the user.
[1402] By way of further illustration, in certain implementations,
characteristics of peoples' enjoyment of music (as can be expressed
and/or identified, for example, based on motion singing out loud),
as can be perceived by sensors of mobile devices (e.g., motion
sensors, microphones, cameras, proximity and light sensors, various
RF radios, user content (e.g., camera usage, communications usage,
application usage), physiological/biometric sensors (e.g., heart
rate monitors, breath rate, GSV) and brain activity sensors), that
are near to, in contact with, worn by or inside them can be
correlated with different types of music (e.g., of a particular
genre, specific songs as can be determined by technologies such as
Shazam), to determine the musical preferences of a user or users.
Such preferences can then be used by such people themselves (e.g.,
to discover or rediscover new songs and artists, to create more
enjoyable music playlists for different situations, to find and
meet people who have certain preferences for music or dance (e.g.,
highly similar, exactly opposite, substantially uncorrelated, etc.)
and/or by 3.sup.rd parties (e.g., DJs in a club who can
refine/improve/be more confident with their selection of music when
they better know the preferences of their crowd or clubs can target
advertising to people who are more likely to enjoy the type of
music they are planning to play on a particular night/time).
[1403] FIG. 71 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1404] At 7110, one or more inputs can be received. In certain
implementations, such inputs can be received from one or more
devices, such as devices that are present in one or more locations.
Moreover, in certain implementations such inputs can correspond to
one or more environmental aspects of the one or more locations.
[1405] At 7120, the one or more inputs can be processed. In doing
so, one or more characteristics of the one or more locations can be
determined.
[1406] At 7130, one or more actions can be initiated. In certain
implementations, such actions can be initiated with respect to the
one or more locations. Moreover, in certain implementations such
actions can be initiated based on the one or more
characteristics.
[1407] FIG. 72 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1408] At 7210, one or more inputs can be received. In certain
implementations, such inputs can be received from one or more
(and/or from a plurality of) devices, such as devices that are
present in a particular location. Moreover, in certain
implementations, each of the one or more inputs can include
demographic information associated with one (or more) of the one or
more devices. For example, the age of users within a particular
space or venue can be received.
[1409] At 7220, the one or more inputs can be processed. In doing
so, one or more actions can be selected. Moreover, in certain
implementations such actions can be selected based on the
demographic information. Additionally, in certain implementations
the one or more inputs can be processed to select content
associated with the demographic information. For example, one or
more advertisements (which are to be deployed on a billboard in a
place where the referenced users are present) can be selected.
[1410] At 7230, at least one of the one or more actions can be
initiated. In certain implementations, such actions can be
initiated in relation to the location. For example, content (such
as that selected at 7220--e.g., the referenced advertisements that
are selected) can be provided with respect to the location.
[1411] By way of further illustration, in certain implementations
the demographic characteristics of a venue or area, aggregated
across multiple users (e.g., crowd-sourced) can be used to
determine an action taken that may affect multiple users. For
example, based upon the demographic characteristics in Times Square
each minute, the advertisement that is to be shown on one or more
large billboards can be selected in some way (e.g., through a
bidding process). Such demographic characteristics can be acquired
in real-time and/or based on historical information. Or, for
example, based upon the demographic and activity characteristics in
Times Square where an advertiser wants the real-time demographic,
but only for those people who are currently walking.
[1412] In certain implementations, a database of information
relating to the various devices can be maintained and/or accessed
by/via 3rd parties (e.g., Facebook), such as in order to estimate
additional venue characteristics and/or patron characteristics and
changes thereto, such as in real-time/near real-time. For example,
(i) the age/gender distribution of the patrons and other
demographic info (e.g., marital status, education level, income
level, home location) in an venue and/or in a particular location;
(ii) the population density of an venue (is the club crowded? is
the restaurant seating more than its allowed to pursuant to fire
codes?); average visit time (longer time at some venues might be
considered a good sign (e.g., a club), while at other venues a bad
sign (e.g., a passport office), etc.
[1413] FIG. 73 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1414] At 7310, one or more inputs can be received. In certain
implementations, such inputs can be received from one or more
devices, such as devices that are present in a location. Moreover,
in certain implementations, each of the one or more inputs can
include demographic information, such as demographic information
associated with one of the one or more devices. For example,
demographic information can be received with respect to users that
are present at/in proximity to a nightclub or a restaurant.
[1415] At 7320, the one or more inputs can be processed. In doing
so, a demographic profile can be computed, such as with respect to
the location. In certain implementations, such a demographic
profile can be computed, based on the demographic information. For
example, an aggregate demographic profile (e.g., an average age)
can be computed.
[1416] At 7330, one or more recommendations can be provided. In
certain implementations, such recommendations can be provided with
respect to the location. Moreover, in certain implementations such
recommendations can be provided based on the demographic profile.
For example, various menu changes can be generated and provided to
a restaurant owner in order to appeal to the demographic currently
present (e.g., `happy hour specials,` etc.).
[1417] By way of further illustration, in certain implementations
the aggregate demographic data at different locations over time can
be compared. In doing so, it can be determined how a current
demographic at a venue compares to demographics at this venue over
time (e.g., a particular venue may be at an all-time high for young
male patrons) and/or in comparison to other venues (e.g., while
we're attracting mostly women, aged 30-39, we have far fewer such
women than other businesses like us). In doing so, various
suggestions can be generated and/or provided. For example, a
suggestion can be generated for a restaurant owner in order to
optimize his fare/pricing for the demographic that frequents his
venue. By way of further example, a 28 year old man wants to go
clubbing to meet women and a suggestion can be generated and/or
provided indicating in which club the current real time demographic
(e.g., age, gender) best suites his wishes.
[1418] FIG. 74 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1419] At 7410, one or more inputs can be received. In certain
implementations, each of the one or more inputs can be received
with respect to a presentation of a first content item (e.g., a
first segment or section of a content item such as a movie). For
example, the referenced inputs can be received from respective
mobile devices, each of which can be associated with a viewer of a
movie. Examples of such inputs include but are not limited to
biometric inputs (e.g., heart rate, etc.) and brain activity
monitoring (using techniques and sensors like EEG, fMRI, PET,
etc.).
[1420] At 7420, the one or more inputs can be processed. In doing
so, feedback can be determined, such as with respect to the first
content item. For example, as described herein, based on the
received inputs it can be determined how the referenced
users/viewers reacted to the first content item (e.g., whether they
did/didn't enjoy the segment and/or to what degree, whether they
were frightened by it and/or to what degree, etc.).
[1421] At 7430, a second content item can be selected, such as for
presentation. In certain implementations, such a second content
item can be selected for presentation based on the feedback. For
example, as described herein, having determined that a first
segment of a movie frightened a substantial number of the
users/viewers, a subsequent segment (which may be relatively less
frightening) can be selected and/or provided. By way of further
example, as describe herein, having determined that one segment of
a movie was particularly enjoyable to a substantial number of the
users/viewers, a comparable segment can be selected and/or
subsequently provided.
[1422] By way of further illustration, in certain implementations a
content creator such as a movie producer can test various candidate
scenes on different groups to see how the scenes are received
(and/or how the reactions to such scenes correspond to various
audience demographics). Using this information, the movie producer
can choose which of the candidate scenes to include in the movie,
can choose if/how to customize movies released in different
locations (e.g., different countries), such as by including (or
excluding) different scenes based on the feedback received from
users associated with the demographic of such location.
[1423] In another implementation, a movie producer can create a
movie which may unfold differently based upon various predictions
and/or determinations as to how a particular audience will react
(e.g. by customizing the movie in a manner that will be best
received by the audience). For example, audience reaction to one or
more scenes of a movie up until the current time in the movie
(e.g., as determined based on inputs received from mobile devices
and/or external devices (e.g. in-seat devices, in-floor devices)
associated with viewers of the movie) can be used to determine
which of one or more scenes is to be shown (or not shown) in the
remainder of the movie. For example, if the audience in a
particular theatre had abnormally high spikes in heart rate and
blood pressure during the first scary scene of the movie, the
remainder of the movie can be adjusted such that a "less scary"
version is shown (or perhaps the reverse if the intention is to
deliver a scary user experience). In another example, if a
sufficiently significant portion of a viewing audience demonstrates
aggregate brain activity indicating greater than usual positive (or
negative) feelings of a particular kind (e.g., happiness,
satisfaction) when a beautiful nature scene is shown, the remainder
of the movie can be adjusted/modified or "tilted" (e.g., in
real-time) towards including (or excluding) additional nature-based
scenes (e.g., where available and appropriate).
[1424] In another example, the demographic composition of a viewing
audience can be used (e.g., in conjunction with the audience
reaction or alone) to determine which of one or more scenes is to
be shown (or not shown) in (the remainder of) the movie. For
example, for a younger demographic the movie might contain a
scarier scene, but, if, despite being applicable for the audience
demographic, the audience reaction demonstrates an undesirable
effect (e.g., stress beyond normal for the demographic, etc.), a
less scary form of the next available scene (if available) can be
chosen.
[1425] In certain implementations, inputs originating from various
motion sensors (e.g., on mobile devices) can be processed in order
to determine/identify when and/or how much viewers `jump` at scary
scenes, laugh at jokes, etc. (e.g., during a TV show or movie).
Such determinations (e.g., with respect to individual users) can
also be combined/aggregated, based on which the collective user
experience with respect to various scenes and/or cinematic
techniques can be further determined.
[1426] Moreover, in certain implementations various alternative
pieces of content (e.g., scenes, endings, etc.) can be tested, and
the received/determined feedback (such as is described herein) can
be utilized to identify, for example, which scenes generate more
positive (or a desired--e.g., fright in the case of a horror movie)
reaction(s)/response(s). Additionally, as noted, works (e.g.,
movies, etc.) that unfold differently based upon the audience
mood/reactions can be created and/or presented (e.g., custom,
audience-optimized performances).
[1427] FIG. 76 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1428] At 7610, one or more inputs can be received. In certain
implementations, such inputs can be received from one or more
devices, such as devices present in one or more locations.
Moreover, in certain implementations such inputs can correspond to
one or more environmental aspects of the one or more locations,
such as is described herein.
[1429] At 7620, the one or more inputs can be processed. In doing
so, one or more characteristics of the one or more locations can be
determined, such as is described herein.
[1430] At 7630, one or more recommendations can be provided. In
certain implementations, such recommendations can be provided,
based on the one or more characteristics. Moreover, in certain
implementations the one or more recommendations can be provided
with respect to the one or more locations, such as is described
herein.
[1431] In certain implementations, it should be understood that the
referenced inputs can include inputs from sensors such as
cigarette-smoke sensors, other air quality sensors like CO2, CO,
temperature, etc. (based on which various aspects such as
environmental factors can be determined, such as are referenced
herein).
[1432] It should be understood that the techniques and technologies
described herein can be expanded/improved to provide data and
services about other forms of entertainment such as stand-up
comedians and sporting events (e.g., measuring the laugher level or
cheering level perceived by the devices microphones and analyzed
using techniques known to those of ordinary skill in the art),
movies (e.g., measuring how engrossed the user is by the lack of
movement of the motion sensors on a mobile device), music (e.g., a
tool to help artists get passive real-time feedback from their
audience and recommend ways to improve performance), advertising
(e.g., delivering "mood-based" advertisements, etc.). Additionally,
it should be understood that the referenced recommendation(s) can
be made passively (e.g., posting to a website) or actively (e.g.,
vibrating a user's device).
[1433] A geo-fence (as can be employed or implemented using any
number of technologies or techniques, including but not limited to
WiFi, cellular, GPS. Bluetooth, etc., as is known to those of
ordinary skill in the art), when used in certain ways can be an
accurate and power efficient technique for monitoring the movement
of a mobile device. Using geo-fences in a manner that allows for a
low-power consumption method for monitoring device movement can be
advantageous in systems that selectively restrict usage of a device
determined to be associated with or operated by a driver, such as
while in a moving vehicle. In order to monitor/determine when a
device begins to move (as opposed to when, for example, one passes
the grocery store on the way home), a geo-fence can be `erected` or
defined around/with respect to the location of a device and can be
configured to provide notifications (e.g., to various interested
parties such as the `erector` of the geo-fence) and/or initiate
various other actions, such as when a device is determined to have
moved out of a geo-fenced area (i.e., an exit geo-fence). However,
as described herein, in lieu of/in addition to monitoring a
device's movement via a single geo-fence (e.g., around its current
location), a coordinated arrangement/system of multiple geo-fences
can be employed, through the use of which improved determinations
can be made, such as determining whether a device has begun a trip
and/or is still moving (e.g., within a vehicle). For example, as a
device moves, it can exit or enter different areas in the system of
geo-fences (e.g., different geo-fences that are adjacent or
otherwise proximate to one another), based upon which one or more
notifications can be provided and/or one or more actions initiated
(e.g., using processes on the device or external to the device) in
a manner that is relatively faster, more efficient, and/or more
accurate than can be achieved using a single geo-fence and, in many
cases, more power efficient than using GPS alone. For example, it
can be appreciated that, under certain circumstances, entry
geo-fences may react to the presence/entry of a device more quickly
than exit geo-fences will react to the non-presence/exit of the
device (e.g., geo-fencing systems that rely on WiFi as a first
technique or interface for determining entry/exit, such as for
reasons of power efficiency, may cause an entry geo-fence to react
nearly immediately upon the detection of one or more WiFi access
points in a list of access points whereas an exit geo-fence may
react more slowly, by requiring confirmation over time that no WiFi
access points within a possibly different list of access points are
present (e.g. to reduce false positive geo-fence breaks/exits by
differentiating between the case of a true geo-fence break from the
case where the device hasn't broken a fence, but temporarily
doesn't receive signals from one or more WiFi access points (e.g.,
the WiFi access point was turned off, the signal is blocked by a
wall)) and/or some form of affirmative or positive
confirmation).
[1434] FIG. 77 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1435] At 7710 it can be determined that a device exited one or
more first locations (and/or regions and/or areas) and/or entered
one or more second locations (and/or regions and/or areas). In
certain implementations, such first and second locations can be
defined or otherwise arranged such that the one or more second
locations surround (whether partially--e.g., from one or more
sides--or entirely) the first location(s). Moreover, in certain
implementations the referenced second locations can be configured
or otherwise arranged such that they do and/or do not overlap with
one another.
[1436] Additionally, in certain implementations the referenced
first locations and/or second locations can be defined by a
perceptibility of another device (e.g., an access point, cell
tower, etc.). Moreover, in certain implementations the size (e.g.,
the radius, area, length, other dimensions, etc.) of the first
locations and/or the second locations can be determined based on a
metric such as a density metric. Examples of such a metric/density
metric include but are not limited to: a density of one or more
devices, a population density, a traffic light density, one or more
speed limits, a tree density, and/or a quantity of vehicles owned
per capita.
[1437] By way of further illustration, in order to improve the
responsiveness of a geo-fencing system, such as with respect to
movement (e.g., in order to achieve higher accuracy and/or lower
latency) an arrangement/collection of multiple exit and/or entry
geo-fences (which, in certain implementations may and may not
overlap with one another) can be established or otherwise defined.
Doing so can be advantageous, for example, in order to provide
enhanced protection to drivers and/or passengers within a vehicle
as well as other road users against the perils of distracted
driving (e.g., by enabling quick/accurate determinations as to
whether a vehicle is traveling, has departed a location, etc.). In
one implementation, a system or arrangement of eight (8) circular
entry geo-fences (e.g., of equal radius) and one circular exit
geo-fence can be defined or `erected.` whereby (i) the entry
geo-fences, together, substantially circumscribe the exit
geo-fence, (ii) the exit geo-fence is of smaller radius than the
others (e.g., in order to reduce the latency of detecting an exit)
and/or the entry geo-fences are of larger radii (e.g., to increase
the likelihood that the device will be perceptible within such
geo-fences before exiting them), (iii) the referenced geo-fences
(entry and exit geo-fences) are arranged/defined such that they do
not overlap with one another (in other implementations some or all
of them may overlap one another), and/or (iv) the center of the
exit geo-fence can be defined based on a current location of the
device (e.g., a current estimated location). One exemplary scenario
of an arrangement of geo-fences is depicted in FIG. 78.
[1438] Moreover, in certain implementations a system/arrangement of
multiple geo-fences can be employed in lieu of (or in addition to)
a single geo-fence. In doing so, a smaller/finer/more precise
geo-fence system (than may otherwise be possible using a single
geo-fence) can be employed. By way of illustration, in certain
implementations an arrangement/system of four circular exit
geo-fences (e.g., having equal radii) can be defined or `erected`
such that each geo-fence overlaps each of the others, such as is
shown in FIG. 79. In doing so, the geo-fencing system can be more
responsive to movement (e.g., the geo-fence will break after a
smaller distance movement and/or shorter time), than in scenarios
in which the minimum size of a geo-fence is limited (e.g., by a
device's operating system, hardware, industry standards, etc.).
[1439] It should be understood that while various illustrations of
the referenced geo-fences pertain to circular geo-fences, various
arrangements of such geo-fences, etc., in other implementations (i)
the geo-fences may be other shapes (e.g., polygonal), (ii) the
geo-fences may be arranged in different numbers and/or combinations
of exit and entry geo-fences, (iii) two or more of the geo-fences
may overlap one another, (iv) the radii of the geo-fences (or the
dimensions of the geo-fences) may not be equal, and/or (v) some or
all of the geo-fences can be `entry` geo-fences. `exit` geo-fences,
and/or a combination thereof.
[1440] At 7720, one or more actions can be initiated, such as with
respect to the device (e.g., the device determined to have
exited/entered the first/second location(s). By way of
illustration, one or more restrictions (e.g., restrictions of the
device) can be modified at/in relation to the device. Moreover, in
certain implementations such actions can be initiated based on a
determination that the device has exited one or more of the first
location(s) and/or entered one or more of the second
location(s).
[1441] By way of illustration, in certain implementations the
size(s) of the referenced geo-fences can be
selected/identified/determined or otherwise defined based on a
metric that reflects the density of various devices such as
wireless transmitters (e.g., WiFi, cellular, GPS, Bluetooth, etc.)
and/or one or more other metrics (e.g., population density, traffic
light density, speed limits, tree density, vehicles owned per
capita per region, etc.). For example, with respect to an
implementation of the described geofencing system/arrangement in a
densely populated urban area (e.g., New York City), the size of one
or more (or all) of the geo-fences in the system/arrangement can be
smaller (thereby reducing latency). It can be appreciated that
despite utilizing relatively smaller geo-fences in such a densely
populated area (e.g., as compared to a less densely populated are)
is not likely to substantially reduce the ability to determine that
a vehicle is passing through (e.g., entering/exiting) the various
geo-fences, since vehicles traveling in such an urban area are
likely to travel at relatively slower speeds (at which it is
relatively simpler (e.g., relatively slower sampling rates are
required) to detect an entry/exit of the device from a particular
geo-fence). With respect to a rural area, the size of one or more
(or all) of the geo-fences in the system/arrangement can be
relatively larger/increased. In doing so, the ability to determine
that a vehicle is passing through (e.g., entering/exiting) the
various geo-fences can be increased (e.g., relative to a fixed
signal sampling rate), since vehicles traveling in such a rural
area are likely to travel at relatively faster speeds (at which it
may be relatively more difficult or power intensive (e.g., require
a higher sampling rate) to detect an entry/exit of the device from
a particular geo-fence).
[1442] FIG. 121 is a flow diagram of a routine that illustrates
aspects of one or more methods, such as those described in relation
to one or more embodiments described herein. In various
implementations, one or more aspects of the referenced method can
be performed by one or more hardware devices/components (such as
those depicted in FIG. 1), one or more software elements/components
(such as those depicted in FIG. 1), and/or a combination of
both.
[1443] At 12110, one or more inputs are received, such as in a
manner described herein. In certain implementations, such inputs
can originate from an accelerometer of the first device (e.g.,
inputs that correspond to an X-axis, a Y-axis, and/or a Z-axis of
the first device, such as is described herein). As described
herein, such first device can be, for example, a wearable device,
an implantable device, a smartwatch, etc.
[1444] At 12120, one or more inputs can be processed, such as in
order to determine an orientation of a first device. In certain
implementations, one or more inputs that correspond to the X-axis
of the first device can be processed to determine a hand of a user
on which the first device is worn. For example, one or more
positive values that correspond to the X-axis of the first device
can be processed to determine that the first device is worn on a
right hand of a user. By way of further example, one or more
negative values that correspond to the X-axis of the first device
can be processed to determine that the first device is worn on a
left hand of a user.
[1445] In certain implementations, one or more inputs originating
from an accelerometer of the first device can include input(s) that
correspond to a Y-axis of the first device and input(s) that
correspond to a Z-axis of the first device. In certain
implementations, the one or more inputs that correspond to the
Y-axis of the first device and the one or more inputs that
correspond to the Z-axis of the first device can be received in
conjunction with one or more inputs provided to the user interface
of the first device. In certain implementations, the one or more
inputs that correspond to the Y-axis of the first device and the
one or more inputs that correspond to a Z-axis of the first device
can be processed to determine a hand of a user on which the first
device is worn, such as in a manner described herein.
[1446] Moreover, in certain implementations one or more positive
values that correspond to a Y-axis of the first device and one or
more negative values that correspond to a Z-axis of the first
device can be processed to determine that the first device is worn
on a right hand of a user. In certain implementations the one or
more positive values that correspond to the Y-axis of the first
device and the one or more negative values that correspond to the
Z-axis of the first device can be received in conjunction with one
or more inputs provided to the user interface of the first device,
such as is described herein.
[1447] Additionally, in certain implementations one or more
negative values that correspond to a Y-axis of the first device and
one or more negative values that correspond to a Z-axis of the
first device can be processed to determine that the first device is
worn on a left hand of a user. In certain implementations the one
or more positive values that correspond to the Y-axis of the first
device and the one or more negative values that correspond to the
Z-axis of the first device can be received in conjunction with one
or more inputs provided to the user interface of the first
device.
[1448] At 12130, one or more aspects of a user interface of the
first device can be adjusted, such as based on the orientation of
the first device, such as in a manner described herein.
[1449] At 12140, a notification of the hand of a user on which the
first device is worn can be provided, e.g., to a second device,
such as in a manner described herein.
[1450] At 12150, an instruction can be provided to a second device
(e.g., a second device associated with the user and/or the first
device), such as an instruction to adjust one or more aspects of a
user interface of the second device based on the hand of the user
on which the first device is worn, such as in a manner described
herein.
[1451] By way of further illustration, it can be appreciated that
some wearable and/or implantable devices can be worn/oriented at
different orientations and positions with respect to the user's
body in/on which they may be located, e.g., a watch on either
wrist, a step counter on a foot or a knee or a hand, a heart rate
sensor on/in a chest, one a wrist or on a head. Upon determining
such an orientation and/or position, various aspects of the
interface and/or behavior of such devices and/or the interface
and/or behavior of other device's used by the same user can be
adjusted, modified, etc., to account for the referenced
orientation.
[1452] For example, as shown in FIGS. 99A-B, when (A) a watch is
worn on a user's left hand/wrist, a crown/button/knob (or any other
such interface) (whether hard or soft) on the watch may be
positioned closer to the user's hand and can be more easily
accessible by the user's opposite hand (i.e., right hand); than
when (B) the same watch worn on the user's right hand (assuming
that the display is not designed to rotate, e.g., 180 degrees),
where the button is positioned farther from the user's hand and is
less easily accessible by the user's opposite hand (i.e., left
hand).
[1453] For watches designed to be worn in this manner, the sensors
on the watch can be used to determine whether or not it is being
worn on the user's right hand or the user's left hand. For example,
when the user's arms are largely being pulled down by gravity
(e.g., standing with arms by sides, walking), the x-axis
accelerometer values will be large. But in one case (watch worn on
left hand) the value will be a large negative number close to
gravity, whereas in the other case (watch worn on right hand) the
value will be a large positive number, close to gravity, as
depicted in FIGS. 100A-B. FIG. 101 depicts the various
accelerometer axes referenced herein.
[1454] In another example, as shown in FIGS. 102A-B, a watch can be
designed/configured so that its display can rotate 180 degrees. As
a result, the button will be at the same distance to the user's
hand and it will be equally easily accessible by and oriented
properly to the user's opposite hand regardless of what wrist the
user wears it on.
[1455] For watches designed to be worn in this manner, the sensors
on the watch can also be used to determine whether or not it is
being worn on the user's right hand or the user's left hand. For
example, when the watch is oriented so that its Z-axis is
perceiving less than gravity (e.g., by a sufficiently large amount)
and is being used by the user (e.g., user input via touch, user
looking at device as determined by visual capture), the y-axis
accelerometer of a watch worn on the user's left hand will perceive
a positive value, whereas the y-axis accelerometer of a watch worn
on the user's right hand will perceive a negative value, as
depicted in FIGS. 103A-B.
[1456] The above can also be applied to cases in which there is no
button/knob (or similar orientation-defining element) on the watch
as well. Moreover, in watches that are designed to work either way
(e.g., screen can rotate as needed or not), the device's display
state, e.g., portrait or upside-down-portrait can be used to decide
which of the described techniques should be used in order to make
such right/left determination.
[1457] In the provided examples, once the device orientation and/or
position is determined, the device interface and/or behavior can be
changed so that, if the device is worn on a the user's right hand
(e.g., the non-default case), the user interface of the watch can
be changed (e.g., the placement of one or more soft buttons on the
device can be moved from (its default position on) the left side of
the UI to right side of the UI) and/or the behavior of the device
can be changed (e.g., the functionality that is usually performed
when the user right-swipes the watch screen, is now performed when
the user left-swipes the screen or the algorithm to predict typed
[or Swyped] input takes into account the hand with which the user
is likely to be using to touch, gesture or otherwise input
information to the device) in ways that improve its usability.
[1458] It should be understood that the described techniques can be
applied and/or extended beyond watches and other dual-positioning
devices to devices that can be placed in multi-positions and/or
orientations and beyond hands and wrists to other body parts.
[1459] In some implementations, upon determining certain habits or
preferences (e.g., `handedness`) of the user (or likelihoods
thereof) via a device (or, in some cases via more than one device),
such determination can be conveyed to and/or used by other devices
used by the same user. Extending on the example above, upon
determining that the user wears her watch on her right wrist, being
that users that wear their watch on their right wrist have a higher
likelihood of being left-handed, such determination(s) can be
provided (e.g., via device-to-device methods or
device-to-cloud-to-device methods) to other devices used by the
same user, and the interface design (e.g., placement of buttons)
and functionality (e.g., swipe behavior, keyboard interpretation of
typed [or Swyped] input) on such other devices can be changed
(e.g., such change can be offered to the user, can be made
anticipatorily, etc.) based on this determination, thereby, for
example, improving utility to/experience of left-handed users.
[1460] It should be noted that U.S. patent application Ser. No.
13/244,978, filed Sep. 26, 2011 (now U.S. Pat. No. 8,290,480),
International PCT Application No. PCT/US2011/052655, filed Sep. 21,
2011, International PCT Application No. PCT/US2012/030017, filed
Mar. 21, 2012, International PCT Application No. PCT/IB2013/001582.
Filed Jun. 21, 2013. International PCT Application No.
PCT/US14/52583, filed Aug. 25, 2014 (each assigned to the present
applicant) may be relevant to various aspects described herein, and
each of the referenced applications/patents is hereby incorporated
by reference herein in their respective entireties.
[1461] At this juncture, it should be noted that although much of
the foregoing description has been directed to systems and methods
for determining user roles and/or devices usages within the context
of vehicular travel, the systems and methods disclosed herein can
be similarly deployed and/or implemented in scenarios, situations,
and settings far beyond the referenced scenarios. It can be readily
appreciated that the user-role determination system 100 can be
effectively employed in practically any scenario where the
determination and/or identification of a user or usage of a mobile
device is of value, such as in the context of exercising or game
playing. It should be further understood that any such
implementation and/or deployment is within the scope of the systems
and methods described herein.
[1462] It is to be understood that like numerals in the drawings
represent like elements through the several figures, and that not
all components and/or steps described and illustrated with
reference to the figures are required for all embodiments or
arrangements. It should also be understood that the embodiments
and/or arrangements of the systems and methods disclosed herein can
be incorporated as a software algorithm, application, program,
module, or code residing in hardware, firmware and/or on a computer
useable medium (including software modules and browser plug-ins)
that can be executed in a processor of a computer system or a
computing device to configure the processor and/or other elements
to perform the functions and/or operations described below. It
should be appreciated that according to at least one embodiment,
one or more computer programs or applications that when executed
perform methods of the present invention need not reside on a
single computer or processor, but can be distributed in a modular
fashion amongst a number of different computers or processors to
implement various aspects of the systems and methods disclosed
herein.
[1463] Thus, illustrative embodiments and arrangements of the
present systems and methods provide a computer implemented method,
computer system, and computer program product for selectively
restricting a mobile device. The flowchart and block diagrams in
the figures illustrate the architecture, functionality, and
operation of possible implementations of systems, methods and
computer program products according to various embodiments and
arrangements. In this regard, each block in the flowchart or block
diagrams can represent a module, segment, or portion of code, which
comprises one or more executable instructions for implementing the
specified logical function(s). It should also be noted that, in
some alternative implementations, the functions noted in the block
may occur out of the order noted in the figures. For example, two
blocks shown in succession may, in fact, be executed substantially
concurrently, or the blocks may sometimes be executed in the
reverse order, depending upon the functionality involved. It will
also be noted that each block of the block diagrams and/or
flowchart illustration, and combinations of blocks in the block
diagrams and/or flowchart illustration, can be implemented by
special purpose hardware-based systems that perform the specified
functions or acts, or combinations of special purpose hardware and
computer instructions.
[1464] The terminology used herein is for the purpose of describing
particular embodiments only and is not intended to be limiting of
the invention. As used herein, the singular forms "a". "an" and
"the" are intended to include the plural forms as well, unless the
context clearly indicates otherwise. It will be further understood
that the terms "comprises" and/or "comprising", when used in this
specification, specify the presence of stated features, integers,
steps, operations, elements, and/or components, but do not preclude
the presence or addition of one or more other features, integers,
steps, operations, elements, components, and/or groups thereof.
[1465] It should be noted that use of ordinal terms such as
"first," "second," "third," etc., in the claims to modify a claim
element does not by itself connote any priority, precedence, or
order of one claim element over another or the temporal order in
which acts of a method are performed, but are used merely as labels
to distinguish one claim element having a certain name from another
element having a same name (but for use of the ordinal term) to
distinguish the claim elements.
[1466] Also, the phraseology and terminology used herein is for the
purpose of description and should not be regarded as limiting. The
use of "including," "comprising." or "having," "containing,"
"involving," and variations thereof herein, is meant to encompass
the items listed thereafter and equivalents thereof as well as
additional items.
[1467] The subject matter described above is provided by way of
illustration only and should not be construed as limiting. Various
modifications and changes can be made to the subject matter
described herein without following the example embodiments and
applications illustrated and described, and without departing from
the true spirit and scope of the present invention, which is set
forth in the following claims.
* * * * *
References