Abstract:
A first communication session is conducted between a media device and a mobile device. The first communication session includes requesting an authorization code from the mobile device and receiving the authorization code from the mobile device. The mobile device acts as an intermediary for obtaining authentication from a content server. The mobile device initiates a second communication session with a provider authorization service of the content server. The second communication session includes obtaining a token from the provider authorization service using the authorization code. The media device initiates a third communication session with the content server. The third communication session includes utilizing the token to obtain content from the content server. The system automatically attempts to renew the token in response to an expiration of the token.
Abstract:
Internet Connectivity Services provided by mobile wireless stations deployed in drones, balloons, airplanes etc. may be intermittent and in some cases event-driven, such as in response to emergency and natural disasters. In such deployments, end users of wireless devices may not know that Internet connectivity has become available. Even when the wireless device, such as a smartphone, is able to autonomously attach to the network when Internet connectivity becomes available, end users may not realize that their devices have re-connected to the network. The proposed systems and methods relate to providing Internet service availability notification to end users. The proposed systems and methods collect data related to Internet service availability notifications for analytics.
Abstract:
Methods, systems, and media for providing access control for a computing device are provided. In some implementations, methods for providing access control for a computing device are provided, the methods comprising: receiving a first request to authenticate the computing device from a first sender device; authenticating the computing device based at least in part on the first request; transmitting a session identifier and a session key to the first sender device; receiving an application identifier associated with the sender device from the computing device; determining, using a hardware processor, whether a sender application executing on the sender device is valid based at least in part on the application identifier; and transmitting the session key to the computing device in response to determining that the sender application is valid.
Abstract:
Methods, systems, and media for providing access control for a computing device are provided. In some implementations, methods for providing access control for a computing device are provided, the methods comprising: receiving a first request to authenticate the computing device from a first sender device; authenticating the computing device based at least in part on the first request; transmitting a session identifier and a session key to the first sender device; receiving an application identifier associated with the sender device from the computing device; determining, using a hardware processor, whether a sender application executing on the sender device is valid based at least in part on the application identifier; and transmitting the session key to the computing device in response to determining that the sender application is valid.
Abstract:
A method includes initiating, by a processor of a device, a listening session including listening for a message from a mobile device and receiving the message from the mobile device via a microphone of the device, the message including configuration data for a network, and in response to receiving the message from the mobile device, initiating an access session with the network using the configuration data. In some implementations, the device is coupled to a media player. The media player may be a television. The configuration data may include at least one of an identifier for the network or a password for the network. In some implementations, the initiating occurs only after the device fails to connect to any network. In some implementations, the message is encoded in a sub-sonic signal.
Abstract:
Systems, methods, and media for presenting media content are provided. In some implementations, a system for presenting media content is provided, the system comprising: a hardware processor that is programmed to: establish a connection with a media playback device; respond to a discovery request from a computing device presenting a media content item; establish a persistent communication channel with the computing device over a network in response to a request from the computing device to establish the persistent communication channel; receive identifying information of the media content item being presented by the computing device and identifying information of a source of the media content item being presented by the computing device; request the media content item from the identified source of the media content item as a stream of media content; and cause the media content item to be presented using the media playback device.
Abstract:
A system enables universal remote media control across multiple platforms, devices, and users. A protocol allows a media controller (such as computer or mobile device) to have access to running activities (such as a television show playing on a media player). The protocol does not require installation of a specific platform application, or a specific user-login/pairing of the media controller with the media player. The system receives commands from a media controller device using a common interface, provides the commands to a remote media player, loads new media content into the media player, based on the commands, and receives state notifications from the media player. The commands and the state notifications include a namespace and a message payload represented as a two-element script array. Another user or device can control the media player using the common interface, for example provided by a browser application on the media controller device.
Abstract:
Methods, systems, and media for providing access control for a computing device are provided. In some implementations, methods for providing access control for a computing device are provided, the methods comprising: receiving a first request to authenticate the computing device from a first sender device; authenticating the computing device based at least in part on the first request; transmitting a session identifier and a session key to the first sender device; receiving an application identifier associated with the sender device from the computing device; determining, using a hardware processor, whether a sender application executing on the sender device is valid based at least in part on the application identifier; and transmitting the session key to the computing device in response to determining that the sender application is valid.
Abstract:
A system enables universal remote media control across multiple platforms, devices, and users. A protocol allows a media controller (such as computer or mobile device) to have access to running activities (such as a television show playing on a media player). The protocol does not require installation of a specific platform application, or a specific user-login/pairing of the media controller with the media player. The system receives commands from a media controller device using a common interface, provides the commands to a remote media player, loads new media content into the media player, based on the commands, and receives state notifications from the media player. The commands and the state notifications include a namespace and a message payload represented as a two-element script array. Another user or device can control the media player using the common interface, for example provided by a browser application on the media controller device.
Abstract:
Internet Connectivity Services provided by mobile wireless stations deployed in drones, balloons, airplanes etc. may be intermittent and in some cases event-driven, such as in response to emergency and natural disasters. In such deployments, end users of wireless devices may not know that Internet connectivity has become available. Even when the wireless device, such as a smartphone, is able to autonomously attach to the network when Internet connectivity becomes available, end users may not realize that their devices have re-connected to the network. The proposed systems and methods relate to providing Internet service availability notification to end users. The proposed systems and methods collect data related to Internet service availability notifications for analytics.