摘要:
Computer-readable media, systems, and methods for delegated pre-configuration are described. In embodiments, an identification of a user is received. Further, in various embodiments, one or more pre-configuration instructions is received from a delegate. In various embodiments, one or more online service settings is processed in accordance with the one or more pre-configuration instructions. In various other embodiments an online service is presented in accordance with the processed one or more online service settings.
摘要:
Computer-readable media, systems, and methods for delegated pre-configuration are described. In embodiments, an identification of a user is received. Further, in various embodiments, one or more pre-configuration instructions is received from a delegate. In various embodiments, one or more online service settings is processed in accordance with the one or more pre-configuration instructions. In various other embodiments an online service is presented in accordance with the processed one or more online service settings.
摘要:
A method for associating a networked device with an online service is provided. The networked device may be an appliance or other device that has limited input capabilities, making it difficult to to download information such as digital media files from an online service without having to input a significant amount of information using the device or appliance. The method begins by establishing communication with a service over a network. A claim token is received from the service over the network. The claim token is returned to the service over the network after the claim token has been bound to an authorized user of the service. In response to return of the claim token, a device identifier binds the networked device to an account with the service that is associated with the authorized user.
摘要:
Systems and methods for sharing and synchronizing data using the addition of synchronization data to a feed that contains data items, and at least a node or endpoint that provides synchronization-related services to other endpoints, are disclosed. Such systems and methods, and client and service endpoints, may use the added synchronization data in multiple ways to share data, incorporate changes consistently, and resolve conflicts.
摘要:
A method for associating a networked device with an online service is provided. The networked device may be an appliance or other device that has limited input capabilities, making it difficult to to download information such as digital media files from an online service without having to input a significant amount of information using the device or appliance. The method begins by establishing communication with a service over a network. A claim token is received from the service over the network. The claim token is returned to the service over the network after the claim token has been bound to an authorized user of the service. In response to return of the claim token, a device identifier binds the networked device to an account with the service that is associated with the authorized user.
摘要:
Systems and methods for sharing and synchronizing data using the addition of synchronization data to a feed that contains data items, and at least a node or endpoint that provides synchronization-related services to other endpoints, are disclosed. Such systems and methods, and client and service endpoints, may use the added synchronization data in multiple ways to share data, incorporate changes consistently, and resolve conflicts.
摘要:
Systems and methods that provide for a virtual reality entertainment system that supplies immersive entertainment and creates a sensation for a user similar to having guests in a remote location to be physically present as virtual guests. Such virtual reality entertainment system can supply a graphic and/or audio; wherein interconnected computers, video and audio processing devices, supply a live interaction between a user and a guest(s). Although guests are only present virtually (e.g., electronically present with other objects/user within the environment) such virtual invitation enables a user and guests to concurrently experience the entertainment together (e.g., a live sporting event, spectator game). In a related aspect, the subject innovation can implement holographic avatars, and a plurality of communication interfaces, to imitate (and/or transform) a relationship between the user and the virtual guests/surrounding environment.
摘要:
Providing services within a network of service providers sharing an authentication service and a set of business rules. A central server receives a first request from a first server to provide a first service to a user via a client without forcing the user to present credentials. In response to the received first request, the central server stores data identifying the first service on the client. The central server further receives a second request from a second server to provide a second service to the user via the client after the user presents the credentials to the second service. After receiving the second request and the presented credentials, the central server allows the user access to the second service. In response to allowing the user access to the second service, the central server further allows the user access to the first service as a result of the stored data.
摘要:
A method is disclosed for a device to interdependently validate a digital content package having a piece of digital content in an encrypted form, and a corresponding digital license for rendering the digital content. A first key is derived from a source available to the device, and a first digital signature is obtained from the digital content package. The first key is applied to the first digital signature to validate the first digital signature and the digital content package. A second key is derived based on the first digital signature, and a second digital signature is obtained from the license. The second key is applied to the second digital signature to validate the second digital signature and the license.
摘要:
A method is disclosed for sending messages such as emails where the sender and receiver in the exchange remain anonymous to each other. The method uses a service, which may for example be an Internet service provider, which acts as an intermediary between a first party and second party to a message. All exchanges between the first and second parties pass through the service, which masks all true identities while ensuring that the message is routed to the proper recipient(s).