Abstract:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for verifying an identity of a user. The methods, systems, and apparatus include actions of receiving a request for a verification phrase for verifying an identity of a user. Additional actions include, in response to receiving the request for the verification phrase for verifying the identity of the user, identifying subwords to be included in the verification phrase and in response to identifying the subwords to be included in the verification phrase, obtaining a candidate phrase that includes at least some of the identified subwords as the verification phrase. Further actions include providing the verification phrase as a response to the request for the verification phrase for verifying the identity of the user.
Abstract:
Systems, methods, routines and/or techniques for synchronized content playback related to content recognition are described. A software program may cause a video to play synchronously with a song, for example, a song that is playing in an ambient environment such as a café or bar. In some embodiments, a client device may sense a song and the client device may communicate audio data related to the song to a remote server, and the remote server may identify a song that is related to the audio data. The remote server may also identify one or more videos (e.g., in a video database) that relate to the song. The remote server may communicate one or more of the videos (e.g., a link/URL) back to the client device such that the client device can play one of the videos synchronously with the song, even if playback of the video is delayed.
Abstract:
Systems and methods for matching live media content are disclosed. At a server, obtaining first media content from a client device, herein the first media content corresponds to a portion of media content being played on the client device, and the first media content is associated with a predefined expiration time; obtaining second media content from one or more content feeds, wherein the second media content also corresponds to a portion of the media content being played on the client device; in accordance with a determination that the second media content corresponds to a portion of the media content that has been played on the client device: before the predefined expiration time, obtaining third media content corresponding to the media content being played on the client device, from the one or more content feeds; and comparing the first media content with the third media content.
Abstract:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving (i) audio data that encodes a spoken natural language query, and (ii) environmental audio data, obtaining a transcription of the spoken natural language query, determining a particular content type associated with one or more keywords in the transcription, providing at least a portion of the environmental audio data to a content recognition engine, and identifying a content item that has been output by the content recognition engine, and that matches the particular content type.
Abstract:
A method includes determining, based at least in part on a type of information to be displayed at a display device associated with a computing device, a privacy level for the information to be displayed; and determining whether the privacy level satisfies a threshold privacy level. The method also includes, responsive to determining that the privacy level satisfies the threshold privacy level, determining whether an individual not associated with a currently active user account of the computing device is proximate to the display device. The method also includes determining an estimated speed of the individual not associated with the currently active user account relative to the display device. The method further includes determining, whether the estimated speed satisfies a threshold speed, and responsive to determining that the estimated speed satisfies the threshold speed, outputting the information such that at least a first portion of the information is obscured.
Abstract:
Systems and methods are provided herein relating to audio matching. Interest points that are onsets are generally very efficient in audio matching in that they are robust to multiple types of distortion. Prominent onsets can be detected within an audio signal excerpt as interest points and combined as a function of a set of interest points to form a descriptor. Descriptors associated with an audio signal excerpt that contain a set of prominent onsets as interest points can be used in matching the audio signal excerpt to an audio reference. The benefits in generating and using prominent onsets within descriptors improve the accuracy of an audio matching system.
Abstract:
Apparatus, systems and methods provide incentive-based usage of an audio recognition system. In an aspect, a system is provided that includes a query component configured to receive an audio sample from a device and a recognition component configured to determine an identification of the audio sample. The system further includes a reward component configured to identify a reward associated with the identification of the audio sample, wherein the query component is further configured to provide a query result to the device, the query result comprising the identification of the audio sample and the reward associated therewith.
Abstract:
A computing system receives requests from client devices to process voice queries that have been detected in local environments of the client devices. The system identifies that a value that is based on a number of requests to process voice queries received by the system during a specified time interval satisfies one or more criteria. In response, the system triggers analysis of at least some of the requests received during the specified time interval to trigger analysis of at least some received requests to determine a set of requests that each identify a common voice query. The system can generate an electronic fingerprint that indicates a distinctive model of the common voice query. The fingerprint can then be used to detect an illegitimate voice query identified in a request from a client device at a later time.
Abstract:
Systems and methods are provided for a content-based security for computing devices. An example method includes identifying content rendered by a mobile application, the content being rendered during a session, generating feature vectors from the content and determining that the feature vectors do not match a classification model. The method also includes providing, in response to the determination that the feature vectors do not match the classification model, a challenge configured to authenticate a user of the mobile device. Another example method includes determining a computing device is located at a trusted location, capturing information from a session, the information coming from content rendered by a mobile application during the session, generating feature vectors for the session, and repeating this until a training criteria is met. The method also includes training a classification model using the feature vectors and authenticating a user of the device using the trained classification model.
Abstract:
Systems and methods simulate a hyperlink in regular content displayed on a screen. An example method can include generating, responsive to detecting a simulated hyperlink indication, a centered selection from content displayed on a display of a computing device, providing the centered selection to a simulated hyperlink model that predicts an operation given the centered selection, and initiating the operation using an intent associated with a mobile application. The simulated hyperlink model may also provide, from the centered selection, an intelligent selection used the intent's parameter. Another method includes identifying documents having a hyperlink whitelisted websites, generating positive training examples for a simulated hyperlink model using the documents, each positive training example having a centered selection, a website, and a mobile application mapped to the website, and training the simulated hyperlink model, using the positive training examples, to predict an operation for the mobile application given the centered selection.