Abstract:
An instant access device may receive a request from a user device to access secure content corresponding to a particular web service. The instant access device may create a hash code based on a telephone number of the user device and a hash code, and may communicate the hash code to an authentication system. The authentication system may authenticate the user device by comparing the hash code to a hash table that includes a list of hash codes associated with user devices that are authorized to access the secure content. Based on whether the user device is authenticated by the authentication system, the instant access device may cause the user device to access the secure content, whether by accessing the secure content directly (when the user device authentication is successful) or by creating a new user account (when the user device authentication is unsuccessful).
Abstract:
A device may receive an indication of a playback of media content. The device may receive a trigger signal associated with the playback of the media content. The trigger signal may indicate a point, within the playback of the media content, to capture user reaction information associated with the media content. The device may determine, based on the trigger signal, that the user reaction information is to be captured. The device may capture the user reaction information, to form captured user reaction information, based on determining that the user reaction information is to be captured. The captured user reaction information may include an audio recording or a video recording captured by the device. The device may cause the captured user reaction information and the media content to be linked.
Abstract:
A device receives an identifier associated with a user device, and receives information associated with data usage by the user device. The device determines whether the data usage is sponsored by a sponsor based on the identifier and the information associated with the data usage. The sponsor sponsors data usage associated with particular content accessed by the user device. The device assigns charges for the data usage to an account associated with the user device when the data usage is not sponsored by the sponsor, or to an account associated with the sponsor when the data usage is sponsored by the sponsor.
Abstract:
Techniques described herein may allow for the single-input capture of clips during the presentation of content, such as video content. The single-input capture may be based on an analysis of clips captured by users in the same video content, such that popular clips can be identified and used for subsequent users. A user may select a button to capture, or to begin capturing, a clip during the presentation of content. Based on the single selection of the button, an entire clip may be captured, which may correspond to a previously detected popular clip.
Abstract:
Techniques described herein may be used to analyze written messages between users (e.g., messages in a mobile messaging application, simple messaging service (SMS) messages, instant messages, etc.) to identify media content being discussed by the users. Additionally, the opinions of the users regarding the media content (e.g., favorable, unfavorable, etc.) may be deciphered and used to update user profiles. The updated user profiles may be used to provide media content recommendations for the users, targeted marketing to the users, rating scores for the media content, and user reviews for the media content. The analysis of the written message may also enable the written messages to be organized (e.g., according to topic) within a graphic user interface (GUI) of each user device.
Abstract:
Techniques described herein may enable users to manage the division of storage, for multiple applications and on a per-content type basis, between cloud storage and local storage. A mobile device may receive user preference information relating to storage limits, each of the storage limits being applicable to an aggregate amount of data, of a particular content type, and associated with a number of applications executed by the mobile device. The mobile device transfer data, to and from cloud storage, to enforce the storage limits included in the user preference information.
Abstract:
A network device provides, to a user device, an application for managing viewing and sharing of content available via an Internet service provider, and assigns a unique code for a user of the user device. The network device provides a catalog of available content items that includes toll-free data (TFD) content items with a different TFD uniform resource locator (URL) for each TFD content item in the catalog of available content items. The network device receives a user's selection, from the catalog, of a TFD content item to share, and generates a sharing URL based on a TFD URL for the selected TFD content item and the unique sharing code. The network device provides the sharing URL to the user device for sharing with other users.
Abstract:
Systems described herein allow for placement and presentation of virtual objects using mobile devices with a single camera lens. A device receives, from a first mobile device, a target image captured from a camera and target image data collected contemporaneously with the target image. The target image data includes a geographic location, a direction heading, and a tilt. The device receives, from the first mobile device, a first virtual object definition that includes an object type, a size, and a mobile device orientation for presenting a first virtual object within a video feed. The device generates a simplified model of the target image, and stores the first virtual object definition associated with the target image data and the simplified model of the target image. The device uploads the first virtual object definition and the target image data, so the first virtual object is discoverable by a second mobile device.
Abstract:
A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device. The device may obtain a file key for encrypting the file and a security key for encrypting the file key. The security key may be obtained based on the unique identifier. The device may encrypt the file, using the file key, to create an encrypted file. The device may encrypt the file key, using the security key, to create an encrypted file key. The device may provide the encrypted file and the encrypted file key for storage by a storage device.
Abstract:
Techniques described herein may be used to enable a user device (e.g., a smartphone, a tablet computer, etc.) to access network services without having to be connected to a network (e.g., a wireless telecommunications network). A first user device may communicate discovery packets in search of other user devices to which the first user device may connect. The first user device may identify a second user device (as a result of sending the discover packets). The first and second user devices may obtain configuration parameters (e.g., a communication channel allocation, encryption keys, synchronization information, etc.) and may establish a D2D connection based on the configuration parameters. The D2D connection may enable the first and second user devices to communicate with another as though the user devices were connected to a wireless telecommunications network (e.g., via telephone calls, video calls, simple messaging services (SMS) messages, instant messages, etc.).