Abstract:
In some embodiments, techniques for modifying a profile may include associating a permissions level with a second user; responsive to detecting activity by the second user, increasing the permissions level; comparing the permissions level to a threshold; determining that the permissions level exceeds the threshold; responsive to determining that the permissions level exceeds the threshold, permitting the second user to modify a first profile data associated with profile associated with a first user; receiving a second profile data from the second user, wherein the second profile data is a result of a modification of the first profile data; associating the second profile data with the profile of the first user; and providing the profile of the first user to a third user, wherein the profile of the first user includes the second profile data.
Abstract:
In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant.
Abstract:
In some embodiments, techniques for processing an alert may include receiving specifications of a region and a time; creating an alert; associating information relating to the region and the time with the alert; determining a current time; determining that the current time matches the time; determining a first current location as a second location; determining that the second location is outside the region; determining a second current location as the third location; determining that the third location is within the region, based at least in part on the first location and the radius; and responsive to determining that that the third location is within the region and that the current time matches the time specification, sending an indication that the alert has been triggered, wherein the indication that the alert has been triggered includes an identifier associated with the alert.
Abstract:
In some embodiments, a technique for authorizing a subsequent message comprises receiving a request to authorize a subsequent message, determining whether the request is valid, and authorizing the subsequent message, if it is determined that the request is valid.
Abstract:
In some embodiments, techniques for synchronization comprise connecting to a second data device; determining that a first item of multimedia content is more desired than a second item of multimedia content, based at least in part by determining that the first and second items of multimedia content are similar to a third item of multimedia content, and an explicit rating of the third item of multimedia content; determining a set of multimedia data to be synchronized from the second data device to a first data device, wherein the first item of multimedia content is included in the set of multimedia data and the second item of multimedia content is not included in the set of multimedia data; and synchronizing the set of multimedia data from the second data device to a first data device.
Abstract:
Some embodiments comprise: A recipient data device connects to a source data device, which is associated with a profile that includes consumption state including information relating to a point at which playback of a piece of multimedia content at a playback device, different than the recipient data device, has been terminated. Data is synchronized, including the consumption state. The piece of multimedia content is played at the recipient data device, starting from a playback initiation point related to the point at which playback of the piece of multimedia content was terminated.
Abstract:
In some embodiments, techniques for information security include receiving information related to an authentication credential, wherein the information is related to a failed authentication attempt; determining whether the authentication credential is related to a valid account; and performing a security measure related to the valid account, if it is determined that the authentication credential is related to the valid account.In some embodiments, techniques for information security include Determining that an authentication attempt has failed, applying a privacy-performing transformation such as a cryptographic hash or encryption to an authentication credential, and distributing the privacy-preserved credential.In some embodiments, techniques for information security include receiving and redistributing a privacy-preserved authentication credential.