Abstract:
A profile-based system is employed to manage user identities and preferences, devices, content and/or other aspects of service delivery. The user profiles may be maintained in one or more servers or other elements located in an external network access via a customer premises equipment (CPE) gateway of a local network. The profiles can be used to map users to identities, devices, services, and other features that affect the manner in which a particular user communicates with (or through) the external network.
Abstract:
Methods and apparatus are disclosed for efficient storage and retrieval of content items, such as recorded content items of a cloud DVR system or other system storing content items.
Abstract:
A mobile device may comprise a secure memory. The mobile device may receive a request from a mobile application executing on the mobile device to store data in the secure memory. The request may comprise the data and a group identifier associated with the mobile application. A primary symmetric key associated with the group identifier may be determined. The data may be encrypted, using the primary symmetric key, to produce first encrypted data. A secondary symmetric key associated with the group identifier may be determined. The first encrypted data may be encrypted, using the secondary symmetric key, to produce second encrypted data. The second encrypted data may be stored to the secure memory.
Abstract:
Systems, apparatuses, and methods are described for wireless communications. Third party charging may be performed to provide services for a wireless device. One or more policies may be determined for the wireless device based on charging information.
Abstract:
A communication device may use a channel access procedure to determine channel availability for signal transmission. The communication device may select a channel access procedure, among a plurality of channel access procedures, based on a beam indication from a base station and a transmission beam to be used for the signal transmission.
Abstract:
Systems, apparatuses, and methods are described for presence detection of a wireless device in a sensing region. Communication parameters determined by a computing device over one or more periods may be used to generate criteria for determining the occurrence of enter events or leave events. The criteria may comprise, for values of one or more communication parameters, rates of change associated with movement into or out of the sensing region. The criteria may be compared against subsequent data associated with the communication parameters to determine if an enter event or a leave event has occurred.
Abstract:
Aspects of the invention relate to systems and methods for securely retaining profile data and the use of such data for the targeted delivery of content. In one embodiment, a unique profile that represents the user location and is keyed to profile attributes selected from both a first set of data collected from the user location and the second set of profile data collected from an external source, is generated. The key does not allow a third party to identify the end-user location or a user associated with the end-user location. Electronic content transmitted to end-user locations may be encoded such that it may only be accessed by an authorized user and/or on a specific electronic device at the user location. A graphical user interface may be utilized to allow a third-party to provide selection criteria for determining user locations to receive targeted content. Further aspects of the invention relate to an electronic device configured to present targeted content to a user at a user location.
Abstract:
Described herein are methods and systems for improved domain name resolution/routing. Routing data associated with domain names (e.g., websites) may be cached by a Domain Name System (DNS) based on historical domain name queries. The historical domain name queries may be analyzed to determine a ranking (e.g., popularity) for the domain names at multiple time intervals throughout a day, week, etc. Routing data for the highest ranked domain names during one or more time intervals may be cached for a period(s) of time corresponding to the one or more time intervals (e.g., times during which those domain names are most popular).
Abstract:
A disruption of power on a network may be detected. A gateway device of the network may transition to a low power mode. The gateway device may determine inactive physical interfaces on the gateway device and shut down the inactive physical interfaces. The gateway device may determine inactive wireless interfaces on the gateway device and shut down the inactive wireless interfaces. The gateway device may determine actively operating physical interfaces on the gateway device and reduce a modulation rate associated with the actively operating physical interfaces for a first time. The gateway device may determine actively operating wireless interfaces on the gateway device and reduce a modulation rate associated with the actively operating wireless interfaces for the first time. The gateway device may shut down the actively operating physical interfaces after the first time. The gateway device may shut down the actively operating wireless interfaces after the first time.
Abstract:
Systems, apparatuses, and methods are described for warming one or more batteries in a battery-operated device, such as a video doorbell. The battery's core may be internally heated by periodically forming a temporary short circuit between a positive electrode and a negative electrode of the battery. Such heating may warm the battery to a minimum operational temperature within seconds, so that the video doorbell is able to use its camera shortly after a motion is detected.