Abstract:
A network device receives, from a first video camera system, position information for a first video camera at a first site and sends, to a second video camera system, position instructions for a second video camera at a second site. The position instructions are configured to locate the second video camera within the second site to correspond to a relative position of the first camera in the first site. The network device receives, from the first video camera system, a first video feed including images of the first site and receives, from the second video camera system, a second video feed including images of a subject of the second site. The network device combines the first video feed and the second video feed to generate a synchronized combined video feed that overlays the images of the subject of the second video feed in images of the first site.
Abstract:
A system may obtain courier location information associated with a package to be delivered, by a courier, to a delivery location associated with a customer. The courier location information may indicate that the customer is not available at the delivery location. The system may obtain delivery location information associated with the delivery location. The system may determine that the courier location information matches the delivery location information. The system may provide, to a customer device associated with the customer, a delivery notification based on determining that the courier location information matches the delivery location information. The system may receive a customer signature based on providing the delivery notification. The customer signature may be associated with the customer. The system may provide the customer signature. The customer signature being provided to inform the courier to deliver the package while the customer is not available at the delivery location.
Abstract:
Exemplary methods and systems for verifying human interaction with a computer interface are described herein. An exemplary method includes a human-interaction verification system detecting a request by an access device to access network-based content, providing, for display by the access device, a visually dynamic representation of one or more security images associated with a passcode in response to the access request, receiving, by way of the access device, challenge-response input associated with the visually dynamic representation of the one or more security images, and performing an access operation based at least in part on a comparison of the challenge-response input to the passcode.
Abstract:
The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value.
Abstract:
An approach is provided for authenticating and/or identifying a user through machine-transferrable one-time password codes. A user device sends to an authentication platform a request for a one-time password for authenticating a user at a relying party device. A machine readable form of the one-time password deliverable to the relying party device over an air gap between the user device and the relying party device is determined and transmitted. The relying party device reverts the machine readable form back to the one-time password, and transmits the one-time password to the authentication platform to authenticate the user device.
Abstract:
A system may obtain courier location information associated with a package to be delivered, by a courier, to a delivery location associated with a customer. The courier location information may indicate that the customer is not available at the delivery location. The system may obtain delivery location information associated with the delivery location. The system may determine that the courier location information matches the delivery location information. The system may provide, to a customer device associated with the customer, a delivery notification based on determining that the courier location information matches the delivery location information. The system may receive a customer signature based on providing the delivery notification. The customer signature may be associated with the customer. The system may provide the customer signature. The customer signature being provided to inform the courier to deliver the package while the customer is not available at the delivery location.
Abstract:
A method, performed by one or more computer devices, may include generating a sequence script for a venue event, wherein the sequence script is configured to synchronize a plurality of user devices located at the venue during the venue event to form one or more images discernable when the devices are viewed collectively. The method may further include obtaining user registration information associated with the venue event, wherein the user registration information identifies user devices registered to participate in the generation of the one or more images; detecting a trigger event associated with the sequence script; and orchestrating the plurality of user devices to form the one or more images, in response to detecting the trigger event.