Patent classifications
G11B27/028
Method and system for generating a smart time-lapse video clip
An electronic device with a display, processor(s), and memory displays a video monitoring user interface. The interface includes a video window displaying video feed from a camera located remotely from the device. A subset of the video includes a first motion event associated with an event category and a second motion event not associated with the event category. The device detects a user request for video playback. In response to the request, the device identifies a segment of the video for playback. The segment includes a first portion associated with the first motion event and a second portion associated with the second motion event. The device causes generation of a time-lapse video clip of the segment of the video for playback, including configuring the first portion to play at a different speed from the second portion. The device displays and plays the video clip of the segment.
Providing workout recap
Athletic activity may be tracked while providing encouragement to perform athletic activity. For example, a user's route may be captured during a workout and used to assemble a media presentation corresponding to the workout. Prior captured images may be assembled forming a hyperlapse video and included in a media presentation corresponding to a user's workout. Images representing locations along a workout route may be assembled and provided in the media presentation and may be shared with other users.
Shared Digital Environment for Music Production, Creation, Sharing and the Like
A method for connecting a plurality of remotely located users over a shared environment. The method includes the steps of loading, by a first user, a first data sample to a shared sequencer, which is converted to a base64 string. The base64 string is part of a JUCE library code. The converted first data sample is converted to a compressed data sample and a plurality of messages is converted by splitting the compressed data sample into 65k byte chunks having therein a portion of metadata. The messages are prioritized from low priority to high priority and queued for sorting. Finally, the sorted messages are sent to a server. The server has a defined studio identification. The server routes the sorted messages to the studio for caching. The cached messages are added to one or more of the remotely located second users' message queues.
Shared Digital Environment for Music Production, Creation, Sharing and the Like
A method for connecting a plurality of remotely located users over a shared environment. The method includes the steps of loading, by a first user, a first data sample to a shared sequencer, which is converted to a base64 string. The base64 string is part of a JUCE library code. The converted first data sample is converted to a compressed data sample and a plurality of messages is converted by splitting the compressed data sample into 65k byte chunks having therein a portion of metadata. The messages are prioritized from low priority to high priority and queued for sorting. Finally, the sorted messages are sent to a server. The server has a defined studio identification. The server routes the sorted messages to the studio for caching. The cached messages are added to one or more of the remotely located second users' message queues.
Techniques for identifying and indexing distinguishing features in a video feed
A method for security and/or automation systems is described. In one embodiment, the method may include receiving a plurality of video footage at a home automation system from at least one video monitor. The method may further include reviewing the plurality of video footage recorded over a predetermined period of time. The method may further include automatically identifying at least one distinguishing feature in the video footage over the predetermined period of time, and automatically indexing the video footage based, at least in part, on identifying the at least one distinguishing feature in the video footage.
Techniques for identifying and indexing distinguishing features in a video feed
A method for security and/or automation systems is described. In one embodiment, the method may include receiving a plurality of video footage at a home automation system from at least one video monitor. The method may further include reviewing the plurality of video footage recorded over a predetermined period of time. The method may further include automatically identifying at least one distinguishing feature in the video footage over the predetermined period of time, and automatically indexing the video footage based, at least in part, on identifying the at least one distinguishing feature in the video footage.
Method and system for provisioning an electronic device
This application discloses a method of provisioning an electronic device. The electronic device establishes a communication link with a client device that can obtain network credentials for accessing a secure wireless network. The network credentials is configured to enable the electronic device to independently access the secure wireless network. The client device encrypts at least a portion of the network credentials using a password key provided by a remote server. The password key is based on a secret not known to the client device, and the secret is associated with the electronic device at the remote server. The client device sends the encrypted network credentials to the electronic device over the established communication link, thereby allowing the electronic device to recover the network credentials based on the secret and access the secure wireless network using the network credentials.
Method and system for provisioning an electronic device
This application discloses a method of provisioning an electronic device. The electronic device establishes a communication link with a client device that can obtain network credentials for accessing a secure wireless network. The network credentials is configured to enable the electronic device to independently access the secure wireless network. The client device encrypts at least a portion of the network credentials using a password key provided by a remote server. The password key is based on a secret not known to the client device, and the secret is associated with the electronic device at the remote server. The client device sends the encrypted network credentials to the electronic device over the established communication link, thereby allowing the electronic device to recover the network credentials based on the secret and access the secure wireless network using the network credentials.
SYSTEMS AND METHODS FOR CROSS-REDACTION
Systems and methods for analyzing recorded data from one recording device, or a subset of recording devices to identify redactions that should be made to the recorded data. The identified redactions may be in accordance with a redaction policy. The identified redactions may be applied to recorded data recorded by other devices that recorded data the same incident. The redactions may be made to recorded data that was not analyzed prior to performing the redactions, so the redactions identified in one recorded data are performed in other recorded data that was not used to identify the types of redactions that should be made. Applying redactions to data that was not analyzed to determine what types of redactions should be made reduces the amount of time required to analyze recorded data for redaction.
SYSTEMS AND METHODS FOR CROSS-REDACTION
Systems and methods for analyzing recorded data from one recording device, or a subset of recording devices to identify redactions that should be made to the recorded data. The identified redactions may be in accordance with a redaction policy. The identified redactions may be applied to recorded data recorded by other devices that recorded data the same incident. The redactions may be made to recorded data that was not analyzed prior to performing the redactions, so the redactions identified in one recorded data are performed in other recorded data that was not used to identify the types of redactions that should be made. Applying redactions to data that was not analyzed to determine what types of redactions should be made reduces the amount of time required to analyze recorded data for redaction.