Abstract:
A messaging system, in one embodiment, can establish messaging accounts for a plurality of organizations (e.g., businesses) to allow customers or users of the organizations to conduct two-way messaging sessions between a customer and an organization. The messaging system can use a registration portal to allow an organization to set up a business/organization messaging account by providing account information. The account information can then be used to update one or more searchable databases that allow a customer to have multiple entry points into a messaging session with each of the registered businesses in the messaging system. For example, a search through a web browser or a map application can provide search results that contain or otherwise provide access to a selectable messaging option that is presented on a customer's device.
Abstract:
A messaging system, in one embodiment, can establish messaging accounts for a plurality of organizations (e.g., businesses) to allow customers or users of the organizations to conduct two-way messaging sessions between a customer and an organization. The messaging system can use a registration portal to allow an organization to set up a business/organization messaging account by providing account information. The account information can then be used to update one or more searchable databases that allow a customer to have multiple entry points into a messaging session with each of the registered businesses in the messaging system. For example, a search through a web browser or a map application can provide search results that contain or otherwise provide access to a selectable messaging option that is presented on a customer's device.
Abstract:
The subject disclosure provides systems and methods for application-specific network data filtering. Application-specific network data filtering may be performed by a sandboxed process prior to providing the network data to an application to which the network data is directed. Any malicious or otherwise potentially harmful data that is included in the network data may be removed by the application-specific network data filter or may be allowed to corrupt the application specific network data filtering operations within the sandbox, thereby preventing the malicious or harmful data from affecting the application or other portions of an electronic device. In one or more implementations, a first process such as an application-specific network data filtering process may request allocation of memory for the first process from second process, such as an application, that is separate from a memory manager of the electronic device.
Abstract:
Techniques are disclosed for managing message redundancy for one or more devices. In one example, a device receives a message from a second device using a transmission protocol, the message comprising a control instruction for an accessory device and a message identifier. The device can transmit using the transmission protocol, a second message to the accessory device, the second message comprising the control instruction and a second message identifier. The device can receive a third message from the second device using a second transmission protocol, the second message comprising a second control instruction for the accessory device and a third message identifier. The device can compare the third message identifier with the message identifier to determine whether the second control instruction is a duplicate of the control instruction. The device can determine whether to transmit the third message to the accessory device based on the comparison.
Abstract:
A device implementing a system for notifying a first device of availability of a service on a second device includes a processor configured to receive, from the first device of a first user, a. first request with respect to whether a service is available on the second device of a second user, and to determine that the service is not available on the second device. The processor is further configured to send, to the first device and in response to the determination, an indication that the service is not available on the second device and an indication of a minimum amount of time before the first device can submit a second request with respect to whether the service is available on the second device. The minimum amount of time is based at least partially on an amount of time that has elapsed since the service was made available to the devices.
Abstract:
A companion device (e.g., smart phone) and an accessory device (e.g., wearable device) may be configured to communicate messages to each other to flexibly share information, such as emails, text messages, calendar notifications, and media library items. This communication may occur through a direct connection (e.g., Bluetooth) and when the devices are connected to a common Wi-Fi access point. When these direct and common infrastructure connections are not available, the devices may communicate messages between them using a cloud server. This cloud server message communication may advantageously enable the companion device and the accessory device to share messages even when they are physically distant from each other.
Abstract:
Embodiments described herein relate to systems and methods for transmitting service related messages, e.g., via a reverse push connection. In some embodiments, a UE may be configured to receive a random value from a server, the random value based at least in part on a capacity of the server and/or network. The UE may be configured to compare the random value to a generated value, and determine, based at least in part on the comparison, to transmit a service related message over a reverse push connection rather than via a hypertext transport protocol (HTTP) request. In some embodiments, the service related message may be any message that relates to a service available between devices, such as an identity (ID) query request, a service (de-) registration request, and/or a device listing request, among other types of messages.
Abstract:
Some embodiments relate to a mobile device, such as a smart phone, and associated method for enabling the mobile device to act as a communication proxy for an accessory device, such as a smart watch. The mobile device may be capable of providing proxy communication services for messages received from/provided to the accessory device even when the accessory device has not properly registered for the respective message service.
Abstract:
Some embodiments relate to a mobile device, such as a smart phone, and associated method for enabling the mobile device to act as a communication proxy for an accessory device, such as a smart watch. The mobile device may be capable of providing proxy communication services for messages received from/provided to the accessory device even when the accessory device has not properly registered for the respective message service.
Abstract:
Techniques are disclosed for transmitting a message to a user device in accordance with a determination that another device is unreachable over a network. In one example, a server device, at a first location, may identify a controller device resident at a second location, whereby the controller device is configured to communicate with a router at the second location. The server device may also receive a list of user devices. The server device may transmit a ping message to the controller device via the router to determine whether the controller device is unreachable by the server device. The server device may subsequently transmit a message to a user device on the list in accordance with a determination that the controller device is unreachable by the server device, whereby the message includes instructions for the user device to determine whether the controller device is unreachable by the user device.