摘要:
Systems and methods relating to location-based applications, such as widgets, are disclosed. In general, in one embodiment, a mobile device obtains a list of applications associated with a current or anticipated location of the mobile device from a centralized or distributed application service. One or more desired applications to be activated are either manually or automatically selected from the list of applications associated with the current location or the anticipated location of the mobile device. The mobile device then activates the one or more desired applications. Optionally, for each desired application that has been activated, the desired application may be deactivated once one or more deactivation criteria are satisfied.
摘要:
A system and method for influencing behavior in a virtual environment. A virtual environment identifies a hotspot of activity that is, or may, cause lag in the virtual environment. An influencing event is determined and is presented into the virtual environment. The influencing event is configured to influence a control entity associated with a virtual object to avoid the hotspot.
摘要:
An application state aware mediating server or proxy. In general, the mediating server includes a packet inspection engine, a state inspector, and optionally a state classifier. The packet inspection engine examines packets passing through the mediating server to identify packets satisfying packet identification criteria of the state inspector. The identified packets are provided to the state inspector. Based on one or more of the identified packets, the state inspector determines an application state, or partial application state, for the application. Optionally, the state classifier may map the application state into one of a number of predefined state classifications.
摘要:
The present invention provides a system and method for modifying a profile of a user device prior to sending the profile to a destination server, wherein the destination server customizes content provided to the user device based on the modified profile. In general, the profile of the user device may include information identifying capabilities of the user device, user preferences, and demographic information regarding a user of the user device. At either the user device or a mediating server interconnecting the user device and the destination server, the profile of the user device is modified based upon one or more rules to provide the modified profile. The modified profile is then provided to the destination server, which customizes content provided to the user device based on the modified profile.
摘要:
A redundant hybrid peer-to-peer content sharing system is provided. In general, the system includes a proxy hosted by a central server and, for each user, a primary user device hosting a primary sharing engine and one or more secondary user devices hosting secondary sharing engines. The user's shared images are hosted by the primary user device, and, based on the capabilities of the secondary user devices, versions of the shared images are copied to the secondary devices. When a guest at a guest node desires to view a shared image, a request for the shared image is provided to the proxy. Generally, if the primary user device is online, the proxy forwards the request to the primary device. If the primary user device is offline, the proxy identifies one of the secondary user devices capable of serving the request and forwards the request to the identified secondary user device.
摘要:
A method and system for quantifying a threat associated with a sender of a message. A threat assessment module receives a message from a sender directed toward a recipient. The threat assessment module accesses a behavioral data source to obtain an activity record identifying an activity of the sender. The activity record is analyzed to determine if the content of the activity record contains non-preferred content. A threat assessment quantifier is generated based on the analysis and sent toward the recipient.
摘要:
A method and system for distributing to a destination a notification of a topic being discussed by two participants of a voice call. Terms are extracted from an audio stream generated during the voice call. A topic is determined based on the extracted terms. A topic notification identifying the topic and at least one of the two participants is sent to a destination. A recipient of the notification may indicate a desire to join the voice call. Upon approval by one of the participants, the recipient may be joined to the voice call.
摘要:
An apparatus is disclosed which includes a communication interface and a controller associated with the communication interface and configured to receive from a device a request for a preview markup of a document including at least one page, determine a level of detail for the preview markup, and analyze at least one layout element and at least one content element of the at least one page to generate the preview markup having the level of detail.
摘要:
Systems and methods relating to callback triggers for mobile or electronic documents are provided. In general, a callback trigger defines a triggering event and a callback action to be performed in response to an occurrence of the triggering event during consumption of the electronic document by an end user. As such, when the triggering event defined by a callback trigger is detected during consumption of the electronic document by an end user, a corresponding callback action is performed. In one embodiment, the one or more callback triggers for the electronic document include at least one dynamic callback trigger that is updated over time.
摘要:
Systems and methods are disclosed for routing mobile users to safe, or secure, locations. In one embodiment, based on threat information obtained from one or more source, a threat level is determined for a location of a user of a mobile device. The threat level is indicative of physical safety and/or network safety at the location of the user of the mobile device. The threat level may be a function of a transaction type of a transaction being performed or desired to be performed by the user of the mobile device. If the location is unsafe, a safe location is identified, and the user of the mobile device is routed to the safe location.