In an audio speaker network, setup of speaker location, sound track or channel assignation, and speaker parameters is facilitated by an application detecting speaker locations and prompting a user to input rough room boundaries and a desired listener location in the room. Based on this, optimum spea ...
A user is guided through various setup routines to optimize speaker parameters and/or positions and/or frequency assignations for the particular space in which the speaker system is located and intended to be used. This can be done using an application downloaded from a cloud server to a smart phone ...
Transactions using a bank customer's electronic debit or credit card (“e-card”) are authorized based on geographic location. For example, a transaction may be denied if it is determined that no legitimate Point of Sale (POS) terminals are in the area of the e-card.
In an audio speaker network, the individual speakers of the network have lamps on them that are controlled to present a light show in synchrony with the audio being played by the system.
A speaker system comprised of more than one speaker, which utilizes the known characteristics and location of each speaker to enhance low frequency (low (bass) frequency) performance of the system.
A bank customer's CE device passively eavesdrops on NFC communications between the customer's electronic debit or credit card (“e-card”) and a third device and alerts the customer when such communication is detected from the e-card. In this way, the customer is alerted to possibly fraudulent “fishin ...
A networked-speaker system which includes noise cancelling for active suppression of unwanted sounds. Feed-forward or feed-back cancelation can be used as appropriate for the location of the microphone sensing the noise.
Fingerprints for transaction authentication are received through the touch screen of a bank customer's CE device for purposes of approving or denying transactions with the customer's electronic debit or credit card (“e-card”).
A bank customer's CE device is texted by a bank computer when the customer's electronic debit or credit card (“e-card”) is sought to be used so that the customer is alerted to possibly fraudulent “fishing” of the e-card data by a nearby thief device.
Transactions using a bank customer's electronic debit or credit card (“e-card”) are monitored by the card owner's consumer electronic (CE) device and reported to a server associated with the financial institution maintaining the e-card records for analysis of aggregated hack attempts.