Abstract:
A method for seamlessly authenticating users of a first and second device is described. The method includes: determining a set of first signatures for a first device; generating a set of second signatures for a second device; comparing the set of first signatures with the set of second signatures; and based on the comparing, granting a user authentication status if a difference between the set of first signatures and the set of second signatures is less than a predetermined tolerance threshold, and rejecting the user authentication status if a difference between the set of first signatures and the set of second signatures is more than the predetermined tolerance threshold.
Abstract:
A methods and systems for communicating are disclosed. A request is received at a first device to communicate with a second device. Contact is initiated with the second device via a data center. A first form of communication is transmitted to the second device without requiring the transmitting to be routed through a central server. The first form of communication is received from the second device without requiring the receiving to be routed through a central server. A second form of communication is transmitted to the second device without requiring the transmitting to be routed through a central server.
Abstract:
A method for authenticating a third-party application for enabling access to messaging functionalities, including: receiving a first application launching request for an establishment of a connection between the first application and a server, wherein the connection enables a set of messaging functionalities that reside at the server and that are available for implementation by a second application to be available for implementation by the first application; validating that the first application is allowed to access the set of messaging functionalities at the server, wherein the validating includes: sending an indication of the first application launching request, to the server; and receiving an authentication token from the server, wherein the authentication token is configured for providing an authentication pass to the server when delivered thereto by the first application, thereby allowing the first application access to the set of messaging functionalities; and delivering the authentication token to the first application.
Abstract:
Systems and methods are disclosed for creating a contact list and pre-populated user accounts. An existing contact list associated with a first user is imported at a computer system. A second contact list is created for the first user for a user account associated with a social network service wherein the second contact list comprises members from the existing contact list. Members of the existing contact list whom already have a user account with the social network service are filtered into a first category. Members of the existing contact list whom do not have a user account with the social network service are filtered into a second category. Pre-populated user accounts associated with the social network service are created for the members in the second category.
Abstract:
A method for sending a video ringtone. The method includes: sending a call from a first communication device to a second communication device, wherein the call communicates a selectable video as a ringtone at the second communication device.
Abstract:
A method for sending a video ringtone. The method includes: integrating a received first video of a first location with an interactive activity, wherein the interactive activity includes an activity in which a first entity at the first location and a second entity at a second location are engaged over a telecommunications network, wherein the integrating the received first video of the first location with the interactive activity achieves an integrated interactive activity.
Abstract:
Communicating in a peer-to-peer computer environment. A request is received from a user device at a peer provider node computer system, wherein the request is signed by a private key. Provided a public key verifies the private key, providing potential peers to the user device from the peer provider node computer system such that the user device is enabled to utilize the peer-to-peer computer environment for a communication according to user requirements.
Abstract:
Communicating in a peer-to-peer computer environment. A portion of a communication is received from a first user device at a relay peer, wherein the relay peer is one of a list of potential peers and wherein the first user device and a second user device have disparate CPU power and bandwidth capabilities. The portion of the communication is transcoded to comprise a base layer and an enhanced layer. In one embodiment, transcoding encompasses changing the resolution of the communication. The base layer of the portion of the communication is sent to the second user device from the relay peer. The enhanced layer of the portion of the communication is selectively sent to the second user device depending upon a set of capabilities of the second user device.
Abstract:
A computer-implemented method for obtaining information corresponding to a first user. The computer-implemented method includes, obtaining information corresponding to a first user, accessing a database comprising information corresponding to a plurality of individuals, based on the information corresponding to a plurality of individuals. The method further includes determining whether a potential relationship exists between a first user and at least one of the plurality of individuals.