425 results found displaying 10-12
    
Steve
 Austria
Copier Forgotten Document Warning Printer Friendly Version
Around the world, this is probably happening every other minute: Someone takes a xerox of an important document - passport, school test, classified airplane construction plan - and ultimately forgets it in the copying machine.
I guess it would be really easy to create a sensor that can tell whether or not a document is still lying on the copying glass. So the ingenious part is to come up with a clever algo to determine if the document is actually being forgotten, or if the guy at the copying machine is just taking a short break.
Reward: I'd actually like one of those for my home copier - thank you. 

Post a reply to this idea



Want to use this idea? Check out the Site Concept as well as the Site Rules.
40°

    
Steve
 Austria
Crumb collector for laptops Printer Friendly Version
Lets face it - the vast majority of people I know eat while sitting in front of their laptops. Crumbs fall on the keyboard, some are removed, some disappear - but where to they go? I like to think that they are food for Tron and his friends, but I fear far worse things.
To solve the problem, why not invent a crumb collector for laptops? It works so beautifully with my toaster - pull out the tray, remove the crumbs, done. Why do we need to fiddle with brushes and pressure cleaners or even disassemble our devices? This can be made much easier.
Reward: A laptop with crumb collector 

Post a reply to this idea

Want to use this idea? Check out the Site Concept as well as the Site Rules.
62°

    
imax500
 Australia
Security Device for Smartphones Printer Friendly Version
The core of this invention is the inclusion of a security routine, either in the OS, in the cloud, in the firmware or as an application of the device, or other. This security system operates as follows; (1) a pattern if typical usage is constantly recorded and becomes a training set, (2) if the pattern of usage is detected that is not consistent with the training set then the user is asked for a secure password, (3) if this password is not entered then the device is locked down, or wiped or other secure actions take place.
Firstly, after the software system is installed on a device the software starts recording all user inputs and usage patterns, including:
1. Touch screen inputs, inclusive of typical errors and typos made
2. Voice entry and phone calls, inclusive of person recognition by voice characteristics
3. Application menu options selected, the order of menu selection, typical times and dates for specific application to be used etc
4. Types of websites visited
Smart algorithms running on the phone or a cloud computer then convert this common usage data into algorithms that detect uncommon usage, which are indicators of a third party using the smart device. If this is detected the suspected third party user is asked for a password, which if not supplied enables the phone to be locked down or even wiped, or any other secure action taken. Note there are two types of common usage modes that can be detected:
1. When actual usage does not match the training set by action (e.g. when certain touch screen errors are not made), or
2. When certain function are not performed when they normally are (e.g. a weather website is not visited as it usually is).

Post a reply to this idea



Want to use this idea? Check out the Site Concept as well as the Site Rules.
40°

Results are currently sorted by "newest". Click here to see the hottest ideas first.
OFFSHORE