The main tank, brimful with ideas. Enjoy them, discuss them, take them. - Of course, this is also the #1 place for new submissions!
By imax500
#24152
The core of this invention is the inclusion of a security routine, either in the OS, in the cloud, in the firmware or as an application of the device, or other. This security system operates as follows; (1) a pattern if typical usage is constantly recorded and becomes a training set, (2) if the pattern of usage is detected that is not consistent with the training set then the user is asked for a secure password, (3) if this password is not entered then the device is locked down, or wiped or other secure actions take place.

Firstly, after the software system is installed on a device the software starts recording all user inputs and usage patterns, including:
1. Touch screen inputs, inclusive of typical errors and typos made
2. Voice entry and phone calls, inclusive of person recognition by voice characteristics
3. Application menu options selected, the order of menu selection, typical times and dates for specific application to be used etc
4. Types of websites visited
Smart algorithms running on the phone or a cloud computer then convert this common usage data into algorithms that detect uncommon usage, which are indicators of a third party using the smart device. If this is detected the suspected third party user is asked for a password, which if not supplied enables the phone to be locked down or even wiped, or any other secure action taken. Note there are two types of common usage modes that can be detected:
1. When actual usage does not match the training set by action (e.g. when certain touch screen errors are not made), or
2. When certain function are not performed when they normally are (e.g. a weather website is not visited as it usually is).
OFFSHORE
Finger Wheel Fidget Toy

A three inch wheel with rubber grip on the outside[…]

Makeover of backyard

Nothing to share but I definitely want to see the […]

Sticking Games

No fantasy but real sports. Professional level foo[…]

This must be very useful information. Thank you ve[…]