Abstract:
A device receives, from a client device, a first request associated with target audience criteria and a time constraint. Based on the target audience criteria, the device sends, to an information device, a network state request. In response to the network state request, the device receives, from the information device, a network state response including user data associated with user devices. Based on the network state response, the device determines a predicted network state, including predicted user data associated with the user devices, associated with the time constraint. Based on the predicted network state and the target audience criteria, the device determines a predicted quantity of user devices associated with both the target audience criteria and the time constraint. The device sends, to the client device, a first response based on the determination of the predicted quantity of user devices.
Abstract:
A device may receive an indication that a first device, a second device, and a third device are within communication range of a target device. The first device may be outside of communication range of a positioning system that provides information for determining a location. The target device may be outside of communication range of the positioning system and outside of communication range of three or more devices which are within communication range of the positioning system. The device may receive information that identifies a first location associated with the first device, a second location associated with the second device, and a third location associated with the third device. The device may determine a target device location based on the information that identifies the first location, the second location, and the third location. The device may provide or store information that identifies the target device location.
Abstract:
Techniques described herein may allow for the automatic downloading, installing, and/or launching of applications (commonly referred to as “apps”), during the presentation of content. For example, a user device (e.g., a smart phone) may play video content, such as a trailer for a video game app. During the presentation of the trailer, a button, to install the video game app, may be presented. Based on a single click of the button, the video game app may be downloaded and installed. The app may further be launched as soon as it is installed, and/or as soon as the trailer ends. Some techniques described herein may be applicable for the automatic downloading, installing, and/or launching of an application on a wearable device while another device presents content, or vice versa.
Abstract:
A system may receive a search term from a user device. The system may identify a set of media files based on the search term, the set of media files including multiple media files. The system may automatically create a single media file by combining the multiple media files, from the set of media files, into the single media file. The system may output the single media file for presentation on the user device.
Abstract:
Systems described herein apply visual computer-generated elements into real-world images with an appearance of depth by using information available via conventional mobile devices. The systems receive a reference image and reference image data collected contemporaneously with the reference image. The reference image data includes a geo-location, a direction heading, and a tilt. The systems identify one or more features within the reference image and receive a user's selection of a foreground feature from the one or more features. The systems receive a virtual object definition that includes an object type, a size, and an overlay position of the virtual object relative to the foreground feature. The virtual object is provided in the virtual layer appearing behind the foreground feature. The systems store, in a memory, the reference image data associated with the virtual object definition.
Abstract:
Systems described herein apply visual computer-generated elements into real-world images with an appearance of depth by using information available via conventional mobile devices. The systems receive a reference image and reference image data collected contemporaneously with the reference image. The reference image data includes a geo-location, a direction heading, and a tilt. The systems identify one or more features within the reference image and receive a user's selection of a foreground feature from the one or more features. The systems receive a virtual object definition that includes an object type, a size, and an overlay position of the virtual object relative to the foreground feature. The virtual object is provided in the virtual layer appearing behind the foreground feature. The systems store, in a memory, the reference image data associated with the virtual object definition.
Abstract:
A processor server receives transaction information associated with an online transaction between a user device and a merchant server, and provides embedded code to the user device based on receiving the transaction information. The processor server receives, based on execution of the embedded code, location information identifying a geographic location at which the user device is located, and an identifier associated with the user device. The processor server determines an authorization decision for the online transaction based on the transaction information, the location information, and the identifier, and forwards the authorization decision to the merchant server to permit the merchant server to approve or deny the online transaction.
Abstract:
A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device. The device may obtain a file key for encrypting the file and a security key for encrypting the file key. The security key may be obtained based on the unique identifier. The device may encrypt the file, using the file key, to create an encrypted file. The device may encrypt the file key, using the security key, to create an encrypted file key. The device may provide the encrypted file and the encrypted file key for storage by a storage device.
Abstract:
A device provides for display, to a first user device, information associated with a potential contact, and an option to communicate with the potential contact. The device receives a selection of the option from the first user device, and obtains, based on the selection, an identifier for a second user device associated with the potential contact. The device provides a communication request and the identifier to a message server to cause the message server to selectively cause a communication session to be established between the first user device and the second user device. An indication that the communication session is denied may be provided to the first user device when the second user device does not accept the communication request. The communication session may be established, without revealing the identifier to the first user device, when the second user device accepts the communication request.
Abstract:
Techniques described herein may be used to enable a user device (e.g., a smartphone, a tablet computer, etc.) to access network services without having to be connected to a network (e.g., a wireless telecommunications network). A first user device may communicate discovery packets in search of other user devices to which the first user device may connect. The first user device may identify a second user device (as a result of sending the discover packets). The first and second user devices may obtain configuration parameters (e.g., a communication channel allocation, encryption keys, synchronization information, etc.) and may establish a D2D connection based on the configuration parameters. The D2D connection may enable the first and second user devices to communicate with another as though the user devices were connected to a wireless telecommunications network (e.g., via telephone calls, video calls, simple messaging services (SMS) messages, instant messages, etc.).