摘要:
Techniques and tools for controlling public output devices (e.g., public display devices) with client devices over a network. In some examples, a time-limited proximity code is displayed by a public display device, and a client device can provide the code via a public network to verify that the client device is present within a proximity zone and is allowed to control the public display. Once authorized, the client device can provide control data to control visual content on the public display. A relay service can be used to relay data over a network via communication connections between client devices and public display devices. For example, the relay service can be implemented on a server connected to the network and can use HTTP (hypertext transfer protocol) to relay data such as control data via messages from one device to another.
摘要:
Techniques and tools for controlling public output devices (e.g., public display devices) with client devices over a network. In some examples, a time-limited proximity code is displayed by a public display device, and a client device can provide the code via a public network to verify that the client device is present within a proximity zone and is allowed to control the public display. Once authorized, the client device can provide control data to control visual content on the public display. A relay service can be used to relay data over a network via communication connections between client devices and public display devices. For example, the relay service can be implemented on a server connected to the network and can use HTTP (hypertext transfer protocol) to relay data such as control data via messages from one device to another.
摘要:
A Domain Name System (DNS) service provider may be engaged to host DNS service for a domain. Before providing service for a domain, the service provider may wish to verify that the entity that set up the service is the owner, or authorized controller, of the domain. The service provider gives the entity some information, such as a particular pair of name servers, and instructs the entity to have the domain registrar put the information into the name server (NS) record(s) for the domain. The service provider then queries NS for the domain and compares the NS record(s) returned with the information provided to the entity. If the NS records match the information given to the entity, then the service provider concludes that the entity has control over the domain, and uses the DNS records provided by the entity to provide service.
摘要:
A Domain Name System (DNS) service provider may be engaged to host DNS service for a domain. Before providing service for a domain, the service provider may wish to verify that the entity that set up the service is the owner, or authorized controller, of the domain. The service provider gives the entity some information, such as a particular pair of name servers, and instructs the entity to have the domain registrar put the information into the name server (NS) record(s) for the domain. The service provider then queries NS for the domain and compares the NS record(s) returned with the information provided to the entity. If the NS records match the information given to the entity, then the service provider concludes that the entity has control over the domain, and uses the DNS records provided by the entity to provide service.
摘要:
Systems and methods that provide for a virtual reality entertainment system that supplies immersive entertainment and creates a sensation for a user similar to having guests in a remote location to be physically present as virtual guests. Such virtual reality entertainment system can supply a graphic and/or audio; wherein interconnected computers, video and audio processing devices, supply a live interaction between a user and a guest(s). Although guests are only present virtually (e.g., electronically present with other objects/user within the environment) such virtual invitation enables a user and guests to concurrently experience the entertainment together (e.g., a live sporting event, spectator game). In a related aspect, the subject innovation can implement holographic avatars, and a plurality of communication interfaces, to imitate (and/or transform) a relationship between the user and the virtual guests/surrounding environment.
摘要:
Providing services within a network of service providers sharing an authentication service and a set of business rules. A central server receives a first request from a first server to provide a first service to a user via a client without forcing the user to present credentials. In response to the received first request, the central server stores data identifying the first service on the client. The central server further receives a second request from a second server to provide a second service to the user via the client after the user presents the credentials to the second service. After receiving the second request and the presented credentials, the central server allows the user access to the second service. In response to allowing the user access to the second service, the central server further allows the user access to the first service as a result of the stored data.
摘要:
A method is disclosed for a device to interdependently validate a digital content package having a piece of digital content in an encrypted form, and a corresponding digital license for rendering the digital content. A first key is derived from a source available to the device, and a first digital signature is obtained from the digital content package. The first key is applied to the first digital signature to validate the first digital signature and the digital content package. A second key is derived based on the first digital signature, and a second digital signature is obtained from the license. The second key is applied to the second digital signature to validate the second digital signature and the license.
摘要:
Computer-readable media, systems, and methods for delegated pre-configuration are described. In embodiments, an identification of a user is received. Further, in various embodiments, one or more pre-configuration instructions is received from a delegate. In various embodiments, one or more online service settings is processed in accordance with the one or more pre-configuration instructions. In various other embodiments an online service is presented in accordance with the processed one or more online service settings.
摘要:
A method is disclosed for sending messages such as emails where the sender and receiver in the exchange remain anonymous to each other. The method uses a service, which may for example be an Internet service provider, which acts as an intermediary between a first party and second party to a message. All exchanges between the first and second parties pass through the service, which masks all true identities while ensuring that the message is routed to the proper recipient(s).
摘要:
A system and method that facilitates and effectuates communications between disparate clients that reside in a network topology (e.g., cloud). The system and method provides a component that receives one or more prospective end points, a set of desired communication criteria/characteristics, and desired content extant on one of the clients that reside on network topology. Additionally, the system and method provides a component that establishes communications pathways to one or more prospective end points or to subsequently identified end points to facilitate transfer of desired content from the end point to a requesting client.