Abstract:
A device is configured to receive a request to use a sensor of a user device. The device determines a sensitivity area associated with the sensor. The sensitivity area indicates an area the sensor is capable of sensing. The device identifies a restricted area in the sensitivity area. The restricted area corresponds to an area from which the user device is limited from use. The user device identifies a restriction associated with the restricted area, generates a response to the request based on the restriction, and provides the response. The response causes the user device to limit use of the sensor, recording of data captured by the sensor, or access to data recorded by the user device even when the user device is located outside of the restricted area.
Abstract:
A network device receives, from a first video camera system, position information for a first video camera at a first site and sends, to a second video camera system, position instructions for a second video camera at a second site. The position instructions are configured to locate the second video camera within the second site to correspond to a relative position of the first camera in the first site. The network device receives, from the first video camera system, a first video feed including images of the first site and receives, from the second video camera system, a second video feed including images of a subject of the second site. The network device combines the first video feed and the second video feed to generate a synchronized combined video feed that overlays the images of the subject of the second video feed in images of the first site.
Abstract:
A system may receive a beacon identifier. The system may translate the beacon identifier to a virtual beacon identifier. The virtual beacon identifier may be associated with an entity. The system may determine message information based on the virtual beacon identifier. The message information may include information associated with a message to be provided for display to a user and may be associated with the entity. The system may provide, for display to the user, the message associated with the message information.
Abstract:
A one time password (OTP) associated with a client device, and a padding rule, of a plurality of possible padding rules, associated with the client device may be determined. A padded OTP that include the OTP and additional data may be formed based on the padding rule. The padding rule may be associated with at least one of a position of the OTP within the padded OTP, a characteristic of the additional data, or a characteristic of the padded OTP. The padded OTP may be provided to the client device. A selection of a portion of the padded OTP may be received from the client device, and the client device may be authenticated when the selected portion of the padded OTP corresponds to the OTP. If the selected portion of the padded OTP does not correspond to the OTP, other actions may be performed based on the selected portion.
Abstract:
A system may receive a beacon identifier. The system may translate the beacon identifier to a virtual beacon identifier. The virtual beacon identifier may be associated with an entity. The system may determine message information based on the virtual beacon identifier. The message information may include information associated with a message to be provided for display to a user and may be associated with the entity. The system may provide, for display to the user, the message associated with the message information.
Abstract:
A method, apparatus, and user interface for providing a network based surround-light environment to dynamically drive lighting scenes are described. Location information of one or more illuminating elements relative to a display for presenting media information is determined. Lighting characteristic information for the one or more illuminating elements is determined. And a lighting profile for illuminating the one or more illuminating elements based on the location information and lighting characteristic information is determined.
Abstract:
A one time password (OTP) associated with a client device, and a padding rule, of a plurality of possible padding rules, associated with the client device may be determined. A padded OTP that includes the OTP and additional data may be formed based on the padding rule. The padding rule may be associated with at least one of a position of the OTP within the padded OTP, a characteristic of the additional data, or a characteristic of the padded OTP. The padded OTP may be provided to the client device. A selection of a portion of the padded OTP may be received from the client device, and the client device may be authenticated when the selected portion of the padded OTP corresponds to the OTP. If the selected portion of the padded OTP does not correspond to the OTP, other actions may be performed based on the selected portion.
Abstract:
A system may obtain courier location information associated with a package to be delivered, by a courier, to a delivery location associated with a customer. The courier location information may indicate that the customer is not available at the delivery location. The system may obtain delivery location information associated with the delivery location. The system may determine that the courier location information matches the delivery location information. The system may provide, to a customer device associated with the customer, a delivery notification based on determining that the courier location information matches the delivery location information. The system may receive a customer signature based on providing the delivery notification. The customer signature may be associated with the customer. The system may provide the customer signature. The customer signature being provided to inform the courier to deliver the package while the customer is not available at the delivery location.
Abstract:
Exemplary methods and systems for verifying human interaction with a computer interface are described herein. An exemplary method includes a human-interaction verification system detecting a request by an access device to access network-based content, providing, for display by the access device, a visually dynamic representation of one or more security images associated with a passcode in response to the access request, receiving, by way of the access device, challenge-response input associated with the visually dynamic representation of the one or more security images, and performing an access operation based at least in part on a comparison of the challenge-response input to the passcode.
Abstract:
A method, a device, and a non-transitory storage medium to store inventory information pertaining to items stored in a dispensary system; receive a request from a user via a user device to retrieve one of the items from the dispensary system; determine whether the dispensary system stores the one of the items based on the inventory information; validate an identity of the user, a location of the user, date and time, and a location of the dispensary system; determine which of the lockers of the dispensary system stores the one of the items, in response to a successful validation; transmit to the user via the user device, a message indicating one of the lockers in which the one of the items is stored; and transmit to the dispensary system, a command to open the one of the lockers.