Steganographic access controls
    11.
    发明授权
    Steganographic access controls 有权
    隐写访问控制

    公开(公告)号:US09589124B2

    公开(公告)日:2017-03-07

    申请号:US14290318

    申请日:2014-05-29

    Abstract: Various features described herein may allow an authorized user to provide a guest with access to a secured location through use of an encoded image containing steganographically encoded access information. The encoded access information may be recognizable by a security system, and the security system may grant access to the secured location when the encoded image is presented to the security system. The authorized user may request the generation of the encoded image on an authorized computing device, and the encoded image may be provided to the guest on a guest computing device. When a monitoring device associated with the security system captures the encoded access information, the security system may, for example, open a door at the secured location.

    Abstract translation: 本文描述的各种特征可以允许授权用户通过使用包含隐写编码的访问信息的编码图像向访客提供对安全位置的访问。 编码的访问信息可以由安全系统识别,并且当编码图像被呈现给安全系统时,安全系统可以授权对安全位置的访问。 授权的用户可以在授权的计算设备上请求生成编码的图像,并且编码的图像可以在客户计算设备上提供给客人。 当与安全系统相关联的监视设备捕获编码的访问信息时,安全系统可以例如在安全位置打开门。

    Methods and systems for repairing recorded content

    公开(公告)号:US11269850B2

    公开(公告)日:2022-03-08

    申请号:US15721349

    申请日:2017-09-29

    Abstract: Systems and methods are described for repairing recordings with at least a portion of a content item stored by a user device. If received metadata does not match reference metadata associated with a reference of the content item, one or more portions of the content stored by the user device may be damaged. The reference metadata and at least portions of the reference content item corresponding to the one or more portions of the content stored by the user device that are damaged may be received to replace the damaged content.

    Preventing unwanted activation of a device

    公开(公告)号:US11626110B2

    公开(公告)日:2023-04-11

    申请号:US17249747

    申请日:2021-03-11

    Abstract: A computing device may be configured to receive a content asset and to determine whether the content asset comprises one or more triggers. The trigger may be a word, phrase, or passcode that alerts a voice activated device to the presence of a voice command and may serve as an instruction to the voice activated device to cause execution of the voice command. In response to determining that the content asset comprises one or more triggers, the computing device may be configured to insert one or more signal markers into the content asset at a location corresponding to the one or more triggers, and to cause transmission and/or presentation of the content asset with the one or more signal markers. The signal markers may cause a voice activated device to ignore a voice command in the content asset, despite the presence of one or more triggers.

Patent Agency Ranking