Creativity Pool
103 results found displaying 1-3
      
julianmello
 USA
ISHARE Printer Friendly Version
One of the biggest subjects when it comes to phone use is social media. People are constantly connecting and communicating with their friends and fellows. This is why an invention like iSHARE would be helpful.
iSHARE is an application on your phone that has your basic data: name, phone number, social media username, or any other information you would feel comfortable with sharing to people you meet. When you come in contact with someone you would like to share this information with, you simply touch your phones. The GPS in the app senses when in close contact with another phone that has iSHARE, and automatically transfers your contact info.
This would be a faster and more convenient way to share your information then to manually type in their phone number or username. iSHARE would help to better connect the people in our community and prompt more social interaction.
Reward: A free download would do! 

Post a reply to this idea


Want to use this idea? Check out the Site Concept as well as the Site Rules.

      
olya0320
 Latvia
An application to stop using applications Printer Friendly Version
Problem: Mobile phone's addiction.
Solution:
1) A program for the phone which will be downloaded by the owner's will.
2) Consists of two parts. 1st part - a morning block. The phone blocks all applications (except for SMS and ordinary calls) on the phone for the 30 minutes after the alarm set in the morning, so that owner can't immediately check social networks after awaking.
2nd part - day time block, turns on periodically. The owner should type in a lot of numbers combinations which will appear on the screen. This operation will take 2.5 minutes. It will cut the interest of using the telephone without necessity.

Post a reply to this idea


Want to use this idea? Check out the Site Concept as well as the Site Rules.
54°

      
imax500
 Australia
Security Device for Smartphones Printer Friendly Version
The core of this invention is the inclusion of a security routine, either in the OS, in the cloud, in the firmware or as an application of the device, or other. This security system operates as follows; (1) a pattern if typical usage is constantly recorded and becomes a training set, (2) if the pattern of usage is detected that is not consistent with the training set then the user is asked for a secure password, (3) if this password is not entered then the device is locked down, or wiped or other secure actions take place.
Firstly, after the software system is installed on a device the software starts recording all user inputs and usage patterns, including:
1. Touch screen inputs, inclusive of typical errors and typos made
2. Voice entry and phone calls, inclusive of person recognition by voice characteristics
3. Application menu options selected, the order of menu selection, typical times and dates for specific application to be used etc
4. Types of websites visited
Smart algorithms running on the phone or a cloud computer then convert this common usage data into algorithms that detect uncommon usage, which are indicators of a third party using the smart device. If this is detected the suspected third party user is asked for a password, which if not supplied enables the phone to be locked down or even wiped, or any other secure action taken. Note there are two types of common usage modes that can be detected:
1. When actual usage does not match the training set by action (e.g. when certain touch screen errors are not made), or
2. When certain function are not performed when they normally are (e.g. a weather website is not visited as it usually is).

Post a reply to this idea


Want to use this idea? Check out the Site Concept as well as the Site Rules.
40°

Results are currently sorted by "newest". Click here to see the hottest ideas first.
OFFSHORE