Tuesday, November 18, 2014

Mobile Entertainment Device



A MOBILE ENTERTAINMENT DEVICE:

 Image result for hologram cell ph9ones

A device providing full entertainment, unlike any current device on the market. To be fully entertained, consumers ought to be able to:

watch full length movies 
watch television (global television)
download, collect, share music/videos
make phone calls
make video phone calls
SMS/TXT message
Receive SMS/TXT message 
Internet (wi-fi and network)
Play games
Children education use and adult blockage 
adult education use
Visit global locations visually
organize day to day living
Microsoft office applications
Shop (ex. amazon) pre-loaded accounts
Have summary medical records accessible * (x-rays, last doctor visits, doctor contact, insurance data)
Fully Secured (highest level of security)
full replacement (same day-24 to 48hrs)
Direct contact with family members (message/video phone/text)
Gamble
Health development (ex. exercise applications)
Other (entertainment)

THINK: 

1.) COX introduces ContourSM
A new way to watch TV. ContourSM lets you watch TV in a way that fits you. Imagine an on-screen guide that recommends shows based on your personal profile., an HD DVR that lets you record six shows at once and store 1,000 and an app that enables you to watch up to 90 TV channels on your tablet ContourSM from COX delivers TV like you've never seen before.


2.) Century Links Prism TV 
With easy-to-use features that put you in control of your entertainment, Prism TV lets you watch what you want, when you want, where you want. And powering all this is CenturyLink’s fiber-optic network. It not only sets Prism TV apart from cable TV and satellite TV with lightning-fast responses and incredible control, but also delivers everything from local channels to sports to award-winning series in crystal-clear HD.

3.) ADT Security for business


THIS IS A MOBILE ENTERTAINMENT DEVICE. Providing:
1    200 plus channels (ex: HBO, Showtime, NBC, ABC, CBS, FOX)
      Unlimited Movies (sub-contract with Netflixs/or DirectTV)
Unlimited Phone Service (sub-contract with Skype: video calling, conference calling, non-video calling, SMS message from Skype site)
       Music Downloader (sub-contract with Rhapsody/or  Amazon.com)
5   Cloud Space (ex: Microsoft Cloud, Dropbox)
Unlimited Internet 4G Service (sub-contract with

It is tablet like device, whereby the manufacture is also the carrier (or corporate holders of several sub-contractual agreements with affiliated providers).  This device has a bundle package that includes all of the following. Thus limiting the need for a conventional cell phone. Advantage is in the security and customer service (lost units/controlled security). When a unit is lost or stolen, (this can be determined several ways)

 1.) unit has eye scanning identification, through front cam and back cam.
 2.) unit is on a live (24hr) network-security for temporary suspension (#4)
3.) only the account holder is identified as the user-account holder can temporary allow other users. after non-account holder use, unit defaults back to secure state/account holder only.
4.) if unit is not used within given time period by account holder-the unit is temporary suspended. Once account holder uses the unit, thus eye scan re-identifies, unit becomes operational again.
5.) if unit is not used by user within a 24hour period- direct contact from customer service/email/phone call is ensure unit is in account holders possession.  (this can be specific to user: thus 6 hours, 12 hours, etc)
6.) if unit if after 24 hours unit is not identified with account holder-IMMEDIATE operations of unit begins.
7.) Account holder is provided a new unit (cost free) with total back-up of prior unit, within 24hrs. (thus total time 48 hours). All account holders data is blocked, until account holder activates new unit, using same eye scan security device as original set up with account.
8.) lost/stolen units are put into HI-SECURITY RECOVERY MODE. (check privacy laws and criminal laws for Grand Theft).
9.) Hi-Security Recovery Mode: Objective recover 100% of lost/stolen units.
- Upon lost/stolen acknowledgement, unit blacks out. Security application provides a GHOST
    operational system. This system provides live web-cam surveillance from both front and rear cams.
    Audio is recorded. HI-Security Recovery Mode, records up to 72 hours of data, during the lost/stolen
    period, to be used as evidence against those in possession of device.

- Hi-Security Recovery Mode (original software): The unit is non-operational by external when in lost/stolen mode. The unit
   is only operational by manufacture. For Civil Liberty Rights-unit deplay informs subject in possession of
   statue laws regarding this unit, the current surveillance and options.

Hi-Security Recovery Mode Options for subjects in possession of lost/stolen property:
     1.) Reward is offered for the return of the unit to participating sub-contractors
     2.) All criminal/fraud investigations are suspended-Unit is recovered
     3.) All surveillance is deleted

- If unit is not returned within 7 days, manufacture proceeds with criminal charges.

LOGISTIC QUESTIONS:
1.) Can manufacture/carrier identify subject from surveillance as individual to place criminal charges against? If manufacture/carrier can prove that the unit was stolen (using the audio and video recordings) can charges be brought up against those in the collected evidence?

2.) Is it legal to collect evidence, with intent to pursue criminal charges, knowing that other possible incidences could have resulted in the unit being stolen?

3.) Will insurance companies cover total replace units?

4.) How secure is this Hi-Security Recovery Mode application/software? (Test result) is it possible to have 99% secured units and service, whereby account holders data is never in jeopardy? Eye scan offers some security. What network securities can be included to prevent intrusions to manufacture/carrier system.

EYE SCAN SECURITY:
http://www.macrumors.com/2014/01/21/apple-iris-scanning/

Over the course of the last several years, Apple has begun to take an intense interest in biometrics as a way to improve the security and accessibility of its devices. Apple purchased sensor company AuthenTec in 2012 and quickly incorporated its fingerprint-sensing technology into the Touch ID fingerprint scanner that debuted in the iPhone 5s.

Touch ID marked Apple's first foray into biometrics, confirming user identity via fingerprint, but the company may have much bigger plans in mind for biometric sensors in future devices. Biometrics are said to play a key role in Apple's iWatch, and Apple may even expand beyond fingerprint technology, as the company has reportedly taken a new interest in iris scanning.







RESTRUCTURED:

No comments:

Post a Comment