Abstract:
Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request received via a network. The located public key is communicated via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key.
Abstract:
Loyalty offer techniques are described. In one or more implementations, data is received from a plurality of merchants via a network, the data describing transactions for goods or services initiated at physical locations of respective said merchants and including identifiers that uniquely identify mobile communication devices that were used to initiate the transactions. Information is updated that describes participation in one or more loyalty offers associated with the plurality of merchants using the identifiers that uniquely identify the mobile communication devices and the data that describes the transactions.
Abstract:
A wireless communications signal is sampled to obtain one or more data packets. Identifying data is then retrieved from the wireless data packets that uniquely identifies a proximately located computing device that transmitted one or more of the data packets. A server computer is then queried with the identifying data to obtain additional information regarding the proximately located computing device. The additional information regarding the proximately located computing device may then be utilized to obtain data regarding an owner or user of the proximately located computing device. This information may be display within a graphical user interface and exposed to application programs.
Abstract:
A storage aggregator is described. In an implementation, a method includes executing a module to determine whether sufficient storage is available to the module to store a particular content item and access a content storage provider over a network to open a client account to obtain additional storage when sufficient storage is not available.
Abstract:
Embodiments enhance the functionality of a vehicle, a user device, or both by the selection and sharing of data. Upon detection of each other, the vehicle device and the user device obtain and share data. The data may be associated with the user, the user computing device, and/or the vehicle and may be stored in cloud-based services. Functionality of the vehicle and/or user device is customized to the user based on the shared data. For example, the user device may provide assisted global positioning system (GPS) data to the vehicle to reduce a time-to-fix (TTF) when determining a location of the vehicle. In other examples, settings of the vehicle are personalized to the user, and location-relevant content is downloaded to the user device.
Abstract:
Commerce card techniques are described. In one or more implementations, one or more credentials are received at a commerce card, the credentials encrypted using a public key. The one or more credentials are decrypted using a private key that corresponds to the public key, the decrypting performed by a secure element implemented in tamper-resistant hardware of the commerce card without exposing the private key outside of the secure element. The decrypted one or more credentials are stored within the secure element of the commerce card such that the decrypted one or more credentials are not exposed outside of the secure element, the one or more credentials usable by the commerce card as part of a transaction to purchase a good or service.