Abstract:
Techniques described herein may allow for the automatic downloading, installing, and/or launching of applications (commonly referred to as “apps”), during the presentation of content. For example, a user device (e.g., a smart phone) may play video content, such as a trailer for a video game app. During the presentation of the trailer, a button, to install the video game app, may be presented. Based on a single click of the button, the video game app may be downloaded and installed. The app may further be launched as soon as it is installed, and/or as soon as the trailer ends. Some techniques described herein may be applicable for the automatic downloading, installing, and/or launching of an application on a wearable device while another device presents content, or vice versa.
Abstract:
A system may receive a search term from a user device. The system may identify a set of media files based on the search term, the set of media files including multiple media files. The system may automatically create a single media file by combining the multiple media files, from the set of media files, into the single media file. The system may output the single media file for presentation on the user device.
Abstract:
A processor server receives transaction information associated with an online transaction between a user device and a merchant server, and provides embedded code to the user device based on receiving the transaction information. The processor server receives, based on execution of the embedded code, location information identifying a geographic location at which the user device is located, and an identifier associated with the user device. The processor server determines an authorization decision for the online transaction based on the transaction information, the location information, and the identifier, and forwards the authorization decision to the merchant server to permit the merchant server to approve or deny the online transaction.
Abstract:
A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device. The device may obtain a file key for encrypting the file and a security key for encrypting the file key. The security key may be obtained based on the unique identifier. The device may encrypt the file, using the file key, to create an encrypted file. The device may encrypt the file key, using the security key, to create an encrypted file key. The device may provide the encrypted file and the encrypted file key for storage by a storage device.
Abstract:
A device provides for display, to a first user device, information associated with a potential contact, and an option to communicate with the potential contact. The device receives a selection of the option from the first user device, and obtains, based on the selection, an identifier for a second user device associated with the potential contact. The device provides a communication request and the identifier to a message server to cause the message server to selectively cause a communication session to be established between the first user device and the second user device. An indication that the communication session is denied may be provided to the first user device when the second user device does not accept the communication request. The communication session may be established, without revealing the identifier to the first user device, when the second user device accepts the communication request.
Abstract:
Techniques described herein may be used to enable a user device (e.g., a smartphone, a tablet computer, etc.) to access network services without having to be connected to a network (e.g., a wireless telecommunications network). A first user device may communicate discovery packets in search of other user devices to which the first user device may connect. The first user device may identify a second user device (as a result of sending the discover packets). The first and second user devices may obtain configuration parameters (e.g., a communication channel allocation, encryption keys, synchronization information, etc.) and may establish a D2D connection based on the configuration parameters. The D2D connection may enable the first and second user devices to communicate with another as though the user devices were connected to a wireless telecommunications network (e.g., via telephone calls, video calls, simple messaging services (SMS) messages, instant messages, etc.).
Abstract:
Crowdsourcing techniques may be used to enhance the experience of users viewing and/or listening to content (e.g., live and/or pre-recorded content, such as movies, sporting events, etc.). A server device may analyze audio, captured by multiple user devices, in order to determine trigger points, in the content. The trigger point may be a time point in the content, at which the captured audio, received from multiple user devices, should be played by subsequent user devices that play back the content.
Abstract:
A device may receive an indication that a first device, a second device, and a third device are within communication range of a target device. The first device may be outside of communication range of a positioning system that provides information for determining a location. The target device may be outside of communication range of the positioning system and outside of communication range of three or more devices which are within communication range of the positioning system. The device may receive information that identifies a first location associated with the first device, a second location associated with the second device, and a third location associated with the third device. The device may determine a target device location based on the information that identifies the first location, the second location, and the third location. The device may provide or store information that identifies the target device location.
Abstract:
An instant access device may receive a request from a user device to access secure content corresponding to a particular web service. The instant access device may create a hash code based on a telephone number of the user device and a hash code, and may communicate the hash code to an authentication system. The authentication system may authenticate the user device by comparing the hash code to a hash table that includes a list of hash codes associated with user devices that are authorized to access the secure content. Based on whether the user device is authenticated by the authentication system, the instant access device may cause the user device to access the secure content, whether by accessing the secure content directly (when the user device authentication is successful) or by creating a new user account (when the user device authentication is unsuccessful).
Abstract:
A device receives content that includes embedded authentication code, and provides the content for display. The device generates a request to authenticate the content based on execution of the embedded authentication code, and provides the request to a server device that authenticates the content based on the request. The device receives, from the server device, an indication indicating that the content is authenticated, when the content is authenticated. The indication includes a portion of an identifier associated with the device. The device provides the indication and the portion of the identifier associated with the device for display.