Abstract:
The disclosure is related to providing interconnectivity between a plurality of user devices. A wireless interconnectivity device connects to a first user device of the plurality of user devices over a first local wireless network, connects to a second user device of the plurality of user devices over a second local wireless network, receives a request from the first user device to transfer data from the first user device to the second user device, determines whether or not a third user device has granted permission to transfer the data from the first user device to the second user device, and transfers the data from the first user device to the second user device based on the third user device having granted permission to transfer the data from the first user device to the second user device.
Abstract:
Methods and apparatus for providing voicemail services to callers of wireless devices may include providing customized outgoing messages to callers based upon the caller's identification. A subscriber to the voicemail service may select one or more contacts associated with the subscriber to receive a customized outgoing message while the remaining callers receive a general outgoing message. The methods and apparatus may further include distributing voicemail messages from a subscriber's voicemail accounts to one or more social networking sites. The subscriber to the voicemail services may share one or more received voicemail messages via one or more social networking accounts associated with the subscriber.
Abstract:
The disclosure relates to machine-learning behavioral analysis to detect device theft and unauthorized device usage. In particular, during a training phase, an electronic device may generate a local user profile that represents observed user-specific behaviors according to a centroid sequence, wherein the local user profile may be classified into a baseline profile model that represents aggregate behaviors associated with various users over time. Accordingly, during an authentication phase, the electronic device may generate a current user profile model comprising a centroid sequence re-expressing user-specific behaviors observed over an authentication interval, wherein the current user profile model may be compared to plural baseline profile models to identify the baseline profile model closest to the current user profile model. As such, an operator change may be detected where the baseline profile model closest to the current user profile model differs from the baseline profile model in which the electronic device has membership.
Abstract:
An aspect of the disclosure is directed to transmitting a reduced stream of encoded video frames. An original stream of encoded video frames is analyzed, a plurality of frames are removed without re-encoding encoded video frames to generate the reduced stream of encoded video frames, and the reduced stream and metadata describing the plurality of removed frames are transmitted. An aspect of the disclosure is directed to creating a new version of an original stream of encoded video frames from a reduced stream of encoded video frames. The reduced stream of encoded video frames is received, the plurality of removed frames is identified based on metadata related to the reduced stream, a plurality of replacement frames are generated, and the plurality of replacement frames are added to the reduced stream of encoded video frames to recreate the new version of the original stream of encoded video frames.