Abstract:
A computing system is described that at least one microphone, a secure processing unit, and a general processing unit. The microphone is coupled to an audio processor configured to receive at least one audio signal from the at least one microphone and generate a first encrypted audio signal and a second encrypted audio signal The secure processing unit is configured to: receive the first encrypted audio signal from the audio processor, decrypt the first encrypted audio signal, and responsive to determining that the first encrypted audio signal includes an unlock command, output an indication of a decryption key. The general processing unit is configured to: receive the second encrypted audio signal from the audio processor, and decrypt the second encrypted audio signal with the decryption key
Abstract:
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. An initial request for a resource is received. A determination is made when fixed or recyclable contact information should be provided with the resource, wherein the contact information is associated with a content sponsor that sponsored the resource. When recyclable contact information should be provided, first recyclable contact information for the content sponsor and time-out information are identified. The first recyclable contact information and the time-out information are combined in an identifier. The identifier is stored on the requesting device and the resource is provided including the first recyclable contact information responsive to the initial request.
Abstract:
A method for completing financial transactions by telephone comprises a user that indicates a desire to conduct a financial transaction with a merchant using financial account information maintained by an account system. The merchant determines the user's telephone number and prepares a request to the account system for data to complete the financial transaction. The account system prepares a request for authorization to transmit the data to the merchant to complete the financial transaction and transmits the request to a user device. The user device displays the request for authorization, and the user's authorization is transmitted to the account system. Upon receipt of the authorization, the account system account management system prepares limited use financial account for the transaction with the user and transmits the data to the merchant. The merchant completes the financial transaction requested by the user during the telephone call using the received data.
Abstract:
Improving automated package delivery to mobile delivery receptacles to allow accurate and reliable package deliveries comprises a delivery receptacle for an automated package delivery via an unmanned aerial delivery device. The delivery receptacle is notified of a pending delivery and travels to a receiving location. The delivery receptacle emits infrared (“IR”) beacons from one or more IR beacon transmitters. An aerial delivery device detects the IR beacon and uses the beacons to navigate to the delivery receptacle. The delivery receptacle receives IR beacon responses from the aerial delivery device and continually or periodically directs the IR beacons in the direction of the aerial delivery device. The aerial delivery device deposits the package in the delivery receptacle. After receiving the package, the delivery receptacle transports the package to a secure location, such as into a garage.
Abstract:
Improving automated package delivery to mobile delivery receptacles to allow accurate and reliable package deliveries comprises a delivery receptacle for an automated package delivery via an unmanned aerial delivery device. The delivery receptacle is notified of a pending delivery and travels to a receiving location. The delivery receptacle emits infrared (“IR”) beacons from one or more IR beacon transmitters. An aerial delivery device detects the IR beacon and uses the beacons to navigate to the delivery receptacle. The delivery receptacle receives IR beacon responses from the aerial delivery device and continually or periodically directs the IR beacons in the direction of the aerial delivery device. The aerial delivery device deposits the package in the delivery receptacle. After receiving the package, the delivery receptacle transports the package to a secure location, such as into a garage.
Abstract:
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium for dynamic contact information assignment. A pool of telephone numbers is assigned to a pool manager. The pool manager allocates subsets of the telephone numbers to a plurality of allocators that are each responsible for allocating telephone numbers to an associated group of content sponsors. An allocator can determine an allocation of a subset of the telephone numbers for distribution among the content sponsors associated with the allocator. Pools of telephone numbers can be created that are each associated with a respective content sponsor associated with the allocator. One or more telephone numbers can be reclaimed from a pool. A reclaimed telephone number can be assigned by the allocator into either other pools associated with the allocator or back to the pool manager for allocation to other allocators.
Abstract:
Systems and methods for automatically verifying an identifier of a content provider are provided. A first identifier, a content item, and a uniform resource locator are received from a content provider. The domain of the uniform resource locator is determined. A plurality of second resources under the domain are accessed and stored in memory. From the plurality of second resources, a plurality of second identifiers are detected. A map of domain and a plurality of second identifiers is created. Using the map, the first identifier is compared to each of the plurality of second identifiers. If there is a match, the first identifier is approved to be used with the content item. The first identifier may be displayed on a user device with the content item.
Abstract:
Systems and methods for automatically verifying an identifier of a content provider are provided. A first identifier, a content item, and a uniform resource locator are received from a content provider. The domain of the uniform resource locator is determined. A plurality of second resources under the domain are accessed and stored in memory. From the plurality of second resources, a plurality of second identifiers are detected. A map of domain and a plurality of second identifiers is created. Using the map, the first identifier is compared to each of the plurality of second identifiers. If there is a match, the first identifier is approved to be used with the content item. The first identifier may be displayed on a user device with the content item.
Abstract:
A voice-commanded common computing device may be selectively paired other computing devices in a shared network. The common computing device may detect co-presence of paired devices on the shared network, and may determine when audio and/or video content may be cast to devices on the shared network based on the detected co-presence. Audio content may include messages composed by a first user of a first device in the shared network, to be audibly output to a second user of a second device in the shared network. Casting of personal information may include positive authentication and verification prior to audible output of the personal information.
Abstract:
This document describes a content caching system for pre-loading digital components, the system including a communication interface configured to communicate with a remote device over a wireless network, a local content cache; and an evaluation system comprising one or more processors. The one or more operations include pre-loading a digital component for rendering in a browser at a time that is subsequent to a time of the pre-loading, registering a scheme of a network reference for the cached digital component, with the scheme comprising a specified portion of the network reference for the cached digital component; retrieving, from the local content cache, the pre-loaded digital component associated with the digital component tag comprising the network reference; and rendering, from the local content cache, the pre-loaded digital component in a graphical user interface rather than requesting the digital component from the remote device.