Abstract:
A computing device may be configured to receive a content asset and to determine whether the content asset comprises one or more triggers. The trigger may be a word, phrase, or passcode that alerts a voice activated device to the presence of a voice command and may serve as an instruction to the voice activated device to cause execution of the voice command. In response to determining that the content asset comprises one or more triggers, the computing device may be configured to insert one or more signal markers into the content asset at a location corresponding to the one or more triggers, and to cause transmission and/or presentation of the content asset with the one or more signal markers. The signal markers may cause a voice activated device to ignore a voice command in the content asset, despite the presence of one or more triggers.
Abstract:
Various features described herein may allow an authorized user to provide a guest with access to a secured location through use of an encoded image containing steganographically encoded access information. The encoded access information may be recognizable by a security system, and the security system may grant access to the secured location when the encoded image is presented to the security system. The authorized user may request the generation of the encoded image on an authorized computing device, and the encoded image may be provided to the guest on a guest computing device. When a monitoring device associated with the security system captures the encoded access information, the security system may, for example, open a door at the secured location.
Abstract:
Disclosures related to waking a sleeping device while minimizing active components needed to receive a remote wakeup request. In one aspect, devices having an RF tuner, may be configured to detect a digital or an analog signal variation or change in RF signal characteristics. Further, the variation or change may be interpreted as a wakeup signal.
Abstract:
Various features described herein may allow an authorized user to provide a guest with access to a secured location through use of an encoded image containing steganographically encoded access information. The encoded access information may be recognizable by a security system, and the security system may grant access to the secured location when the encoded image is presented to the security system. The authorized user may request the generation of the encoded image on an authorized computing device, and the encoded image may be provided to the guest on a guest computing device. When a monitoring device associated with the security system captures the encoded access information, the security system may, for example, open a door at the secured location.