H04L69/24

Systems and methods for encoding and sharing content between devices
11711410 · 2023-07-25 · ·

Systems and methods for sharing content between devices are disclosed. To request a shared piece of media content, a playback device generates and sends a request to content server. The playback device includes information in the request that indicates the playback capabilities of the device. The content server receives the request and determines the playback capabilities of the playback device from the information in the request. The content server then determines the assets that may be used by the playback device to obtain the media content and generates a top level index file for the playback device that includes information about the determined assets. The top level index file is then sent to the playback device that may then use the top level index file to obtain the media content using the indicated assets.

Systems and methods for encoding and sharing content between devices
11711410 · 2023-07-25 · ·

Systems and methods for sharing content between devices are disclosed. To request a shared piece of media content, a playback device generates and sends a request to content server. The playback device includes information in the request that indicates the playback capabilities of the device. The content server receives the request and determines the playback capabilities of the playback device from the information in the request. The content server then determines the assets that may be used by the playback device to obtain the media content and generates a top level index file for the playback device that includes information about the determined assets. The top level index file is then sent to the playback device that may then use the top level index file to obtain the media content using the indicated assets.

COMMUNICATION PROTOCOLS FOR SECURE DIGITAL (SD) CARDS

In some examples, a system comprises: a socket; a controller coupled to the socket; a storage device comprising machine-readable instructions; and a processor coupled to the controller and the storage device, wherein execution of the machine-readable instructions causes the processor to: detect a Secure Digital (SD) card in the socket via the controller; prompt a user to select a communication protocol to be utilized by the system to communicate with the SD card; and enable the system to communicate with the SD card based on the user selection.

Proxy system for bot connectivity to communication channels

A proxy apparatus acts as an intermediary between one or more bot apparatuses and one or more communication channels. The proxy apparatus connects a communication channel to a bot apparatus for the exchange of messages. A user can interact with the bot apparatus through the communication channel. The proxy apparatus is configured to perform one or more operations or services. Example operations include, but are not limited to, registration, authentication and authorization, the recordation of telemetry data, schema transformation, and identity transformation.

Proxy system for bot connectivity to communication channels

A proxy apparatus acts as an intermediary between one or more bot apparatuses and one or more communication channels. The proxy apparatus connects a communication channel to a bot apparatus for the exchange of messages. A user can interact with the bot apparatus through the communication channel. The proxy apparatus is configured to perform one or more operations or services. Example operations include, but are not limited to, registration, authentication and authorization, the recordation of telemetry data, schema transformation, and identity transformation.

Detection of signals in a virtual meeting

A method, a system, and a computer program product for determining whether signals are received by one or more devices in a virtual meeting. The method includes transmitting a data stream received from one or more host computing devices to one or more user computing devices in a plurality of user computing devices. The host and user computing devices are communicatively coupled using a real-time online connection. A first hash in a plurality of hashes is generated by the server using a portion of the data stream and stored in a memory location. The first hash is compared to a second hash received from the user computing devices. The second hash is generated by the user computing devices upon receipt of the transmitted data stream. Based on the comparison, a status of the real-time online connection between the host computing devices and the user computing devices is determined.

Detection of signals in a virtual meeting

A method, a system, and a computer program product for determining whether signals are received by one or more devices in a virtual meeting. The method includes transmitting a data stream received from one or more host computing devices to one or more user computing devices in a plurality of user computing devices. The host and user computing devices are communicatively coupled using a real-time online connection. A first hash in a plurality of hashes is generated by the server using a portion of the data stream and stored in a memory location. The first hash is compared to a second hash received from the user computing devices. The second hash is generated by the user computing devices upon receipt of the transmitted data stream. Based on the comparison, a status of the real-time online connection between the host computing devices and the user computing devices is determined.

TECHNIQUES FOR COMMUNICATION PROCESS FLOW APPROVAL MANAGEMENT
20230239263 · 2023-07-27 ·

Methods, systems, apparatuses, devices, and computer program products are described. A communication platform may receive a first request indicating a first data object comprising metadata associated with an update to an action of a communication process flow. The metadata may indicate that a user with particular permissions is to approve the update. The communication platform may post an entry displaying the metadata and configured to receive an indication of approval of the update from the user. The communication platform may receive an indication of the approval from the user, for example via a user interface component. The communication platform may generate a second data object indicating the action and the user, ensuring that the update was successfully approved, and transmit a second request to a communication process flow management service supporting the communication process flow, the second request including the second object and configured to activate the update.

TECHNIQUES FOR COMMUNICATION PROCESS FLOW APPROVAL MANAGEMENT
20230239263 · 2023-07-27 ·

Methods, systems, apparatuses, devices, and computer program products are described. A communication platform may receive a first request indicating a first data object comprising metadata associated with an update to an action of a communication process flow. The metadata may indicate that a user with particular permissions is to approve the update. The communication platform may post an entry displaying the metadata and configured to receive an indication of approval of the update from the user. The communication platform may receive an indication of the approval from the user, for example via a user interface component. The communication platform may generate a second data object indicating the action and the user, ensuring that the update was successfully approved, and transmit a second request to a communication process flow management service supporting the communication process flow, the second request including the second object and configured to activate the update.

Function control method, function control device, and computer-readable storage medium
11561622 · 2023-01-24 · ·

In a function control method, a function trigger event is monitored, the function trigger event having a preset correspondence with function configuration information; when the function trigger event is monitored, the function configuration information corresponding to the function trigger event is retrieved; and a second device is controlled to perform a specified function triggered by the function trigger event based on the function configuration information.