摘要:
A computing system is described that at least one microphone, a secure processing unit, and a general processing unit. The microphone is coupled to an audio processor configured to receive at least one audio signal from the at least one microphone and generate a first encrypted audio signal and a second encrypted audio signal The secure processing unit is configured to: receive the first encrypted audio signal from the audio processor, decrypt the first encrypted audio signal, and responsive to determining that the first encrypted audio signal includes an unlock command, output an indication of a decryption key. The general processing unit is configured to: receive the second encrypted audio signal from the audio processor, and decrypt the second encrypted audio signal with the decryption key
摘要:
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. An initial request for a resource is received. A determination is made when fixed or recyclable contact information should be provided with the resource, wherein the contact information is associated with a content sponsor that sponsored the resource. When recyclable contact information should be provided, first recyclable contact information for the content sponsor and time-out information are identified. The first recyclable contact information and the time-out information are combined in an identifier. The identifier is stored on the requesting device and the resource is provided including the first recyclable contact information responsive to the initial request.
摘要:
A method for completing financial transactions by telephone comprises a user that indicates a desire to conduct a financial transaction with a merchant using financial account information maintained by an account system. The merchant determines the user's telephone number and prepares a request to the account system for data to complete the financial transaction. The account system prepares a request for authorization to transmit the data to the merchant to complete the financial transaction and transmits the request to a user device. The user device displays the request for authorization, and the user's authorization is transmitted to the account system. Upon receipt of the authorization, the account system account management system prepares limited use financial account for the transaction with the user and transmits the data to the merchant. The merchant completes the financial transaction requested by the user during the telephone call using the received data.
摘要:
Improving automated package delivery to mobile delivery receptacles to allow accurate and reliable package deliveries comprises a delivery receptacle for an automated package delivery via an unmanned aerial delivery device. The delivery receptacle is notified of a pending delivery and travels to a receiving location. The delivery receptacle emits infrared (“IR”) beacons from one or more IR beacon transmitters. An aerial delivery device detects the IR beacon and uses the beacons to navigate to the delivery receptacle. The delivery receptacle receives IR beacon responses from the aerial delivery device and continually or periodically directs the IR beacons in the direction of the aerial delivery device. The aerial delivery device deposits the package in the delivery receptacle. After receiving the package, the delivery receptacle transports the package to a secure location, such as into a garage.
摘要:
Improving automated package delivery to mobile delivery receptacles to allow accurate and reliable package deliveries comprises a delivery receptacle for an automated package delivery via an unmanned aerial delivery device. The delivery receptacle is notified of a pending delivery and travels to a receiving location. The delivery receptacle emits infrared (“IR”) beacons from one or more IR beacon transmitters. An aerial delivery device detects the IR beacon and uses the beacons to navigate to the delivery receptacle. The delivery receptacle receives IR beacon responses from the aerial delivery device and continually or periodically directs the IR beacons in the direction of the aerial delivery device. The aerial delivery device deposits the package in the delivery receptacle. After receiving the package, the delivery receptacle transports the package to a secure location, such as into a garage.
摘要:
Systems and methods for automatically verifying an identifier of a content provider are provided. A first identifier, a content item, and a uniform resource locator are received from a content provider. The domain of the uniform resource locator is determined. A plurality of second resources under the domain are accessed and stored in memory. From the plurality of second resources, a plurality of second identifiers are detected. A map of domain and a plurality of second identifiers is created. Using the map, the first identifier is compared to each of the plurality of second identifiers. If there is a match, the first identifier is approved to be used with the content item. The first identifier may be displayed on a user device with the content item.
摘要:
Improving automated package delivery to mobile delivery receptacles to allow accurate and reliable package deliveries comprises a delivery receptacle for an automated package delivery via an unmanned aerial delivery device. The delivery receptacle is notified of a pending delivery and travels to a receiving location. The delivery receptacle emits infrared (“IR”) beacons from one or more IR beacon transmitters. An aerial delivery device detects the IR beacon and uses the beacons to navigate to the delivery receptacle. The delivery receptacle receives IR beacon responses from the aerial delivery device and continually or periodically directs the IR beacons in the direction of the aerial delivery device. The aerial delivery device deposits the package in the delivery receptacle. After receiving the package, the delivery receptacle transports the package to a secure location, such as into a garage.
摘要:
Systems and methods for automatically verifying an identifier of a content provider are provided. A first identifier, a content item, and a uniform resource locator are received from a content provider. The domain of the uniform resource locator is determined. A plurality of second resources under the domain are accessed and stored in memory. From the plurality of second resources, a plurality of second identifiers are detected. A map of domain and a plurality of second identifiers is created. Using the map, the first identifier is compared to each of the plurality of second identifiers. If there is a match, the first identifier is approved to be used with the content item. The first identifier may be displayed on a user device with the content item.
摘要:
Systems and methods for automatically extracting a plurality of contact information from a resource, calculating prominence scores of each contact information, and associating a selected contact information with a content item are provided. A content item and a uniform resource locator are received from a content provider. A resource identified by the uniform resource locator is loaded. A plurality of contact information is detected from the loaded resource. For each of the detected contact information, a prominence score is calculated. One of the plurality of contact information is selected based on the calculated prominence scores. The selected contact information is associated with the content item.
摘要:
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. A script is received for execution when a resource is rendered on a client device. The script is stored. A request for the resource is received that includes a token identifying a requesting source item that was interacted with by a user to generate the request. The script is executed. A determination is made as to when fixed or recyclable contact information associated with a content sponsor of the resource should be provided with the resource. When recyclable contact information should be provided, the information is requested from a service including providing the token to the service. Recyclable contact information for the content sponsor and time-out information are received and stored. The identifier is stored on the requesting device. The resource and recyclable contact information are provided responsive to the request.