H04L51/18

System and Method for Improved Generation of Avatars for Virtual Try-On of Garments

A system and a method for improved generation of 3D avatars for virtual try-on of garments is provided. Inputs from a first user type are received, via a first input unit, for generating one or more garment types in a graphical format. Further, a 3D avatar of a second user type is generated in a semi-automatic manner or an automatic manner based on capturing a first input type or a second input type respectively received via a second input unit. The first input type comprises measurements of body specifications of the second user type and the second input type comprises body images of the second user type. Further, the generated garments are rendered on the generated 3D avatar of the second user type for carrying out a virtual try-on operation.

SECURELY VERIFYING PROTECTED DEVICES
20230024751 · 2023-01-26 ·

One or more computing devices, systems, and/or methods for securely verifying devices such as protected are provided. A code may be generated for a first device. A short message service (SMS) message comprising the code may be transmitted to the first device at a mobile directory number of the first device. An entry may be created to associate the code with the mobile directory number. A determination may be made as to whether a first code within a message associated with the mobile directory number matches the code within the entry. In response to a match, the message may be processed and a status of the first device may be marked as valid, otherwise, the message may be rejected.

Method and apparatus for electronic transactions based on a reply message

A method, apparatus and computer program product are provided for electronic transactions based on a reply message. In the context of a computer executed method, the method includes receiving a message, from a sender device, including a reply to buy (RTB) identifier associated with a promotion and a RTB validation code. The method also includes authenticating, using a promotion and marketing service host, the RTB validation code, associating the message from the sender with a recipient identifier, and causing the transmission of a purchase order message to the recipient device based on the RTB identifier.

Method and apparatus for electronic transactions based on a reply message

A method, apparatus and computer program product are provided for electronic transactions based on a reply message. In the context of a computer executed method, the method includes receiving a message, from a sender device, including a reply to buy (RTB) identifier associated with a promotion and a RTB validation code. The method also includes authenticating, using a promotion and marketing service host, the RTB validation code, associating the message from the sender with a recipient identifier, and causing the transmission of a purchase order message to the recipient device based on the RTB identifier.

MAIL ROUTING SYSTEM UTILIZING PRINTED INDICIA-CONTAINING MAILING ADDRESSES
20230226576 · 2023-07-20 ·

In some embodiments, the present invention provides an exemplary system that includes a mechanism configured to create by a digital mailing services provider, DMSP, a recipient-specific handling information indicia and provide said recipient-specific handling information indicia to a recipient; a mechanism configured to allow the recipient to provide said handling information indicia in delivery address C/O line, on a mail item, thereby indicating to said service provider their desired handling route for the mail item so that a paper mail recipient to receive improved transmission of correspondence from said service provider via both paper and electronic channels solely via including said handling information indicia contained in the delivery address C/O line of the recipient's delivery address on the mail item.

DETERMINING WHETHER AND/OR WHEN TO PROVIDE NOTIFICATIONS, BASED ON APPLICATION CONTENT, TO MITIGATE COMPUTATIONALLY WASTEFUL APPLICATION-LAUNCHING BEHAVIOR
20230229530 · 2023-07-20 ·

Implementations set forth herein relate to intervening notifications provided by an application for mitigating computationally wasteful application launching behavior that is exhibited by some users. A state of a module of a target application can be identified by emulating user inputs previously provided by the user to the target application. In this way, the state of the module can be determined without visibly launching the target application. When the state of the module is determined to satisfy criteria for providing a notification to the user, the application can render a notification for the user. The application can provide intervening notifications for a variety of different target applications in order to reduce a frequency at which the user launches and closes applications to check for variations in target application content.

GRAPHICAL USER INTERFACES AND SYSTEMS FOR PRESENTING CONTENT SUMMARIES
20230229288 · 2023-07-20 ·

In one implementation, a computing device to provide a graphical user interface (GUI) for presenting content includes one or more processors; a network interface to establish a network connection with a remote server system; a display to output a plurality of graphical elements as part of the GUI; one or more input devices to receive user input related to the plurality of graphical elements; and memory storing instructions that, when executed, cause the one or more processors to perform operations including selecting a first content element; selecting second content elements; detecting a third content element comprising a content summary of the second content elements; and outputting, in the GUI on the display, a first graphical element for the first content element and a third graphical element for the third content element, wherein second graphical elements for the second content elements are hidden or collapsed in the GUI.

Audio verification

Techniques for enabling a system to verify operations or transactions as being associated with a user account are described. A system receives message data associated with an unverified operation or an unverified transaction. The system generates first audio data that includes a representation of a first digital signature based on at least a first verification code. The system sends a message including second message data with an ability to output the first audio data responsive to first device playing the first audio data within earshot of the second device. The system receives, from a second device, second audio data that represents the first audio data. The system determines that the second audio data includes an audio representation of a second digital signature based on at least the first verification code. The system verifies the unverified operation and associates the operation with the user account to indicate that the operation is a verified operation.

Data privacy plug-in for enterprise instant messaging platform
11563723 · 2023-01-24 · ·

A plug-in module, which, in combination with a host module, prevents unauthorized copying—like screen captures, screenshots, or screen recordings—of the streaming content provided to a participant in an online content-sharing session via an Instant Messenger (IM) service. The plug-in module may be a part of an IM application running on the participant's system or the host module may transmit a self-installing plug-in module to the participant's system upon receiving an indication that a user is hosting the online session. The plug-in module provides kernel-specific interface of the participant system's Operating System (OS) to the host module, which, then sends an OS-specific instruction to the plug-in module to trigger the OS to disable or control the copying of the streaming content as specified in a privacy preference received from the user hosting the online session. In this manner, sensitive and critical business data may be conveniently and securely shared online.

Systems and methods for retrieving relevant information content while typing

Methods, systems, and apparatus, including computer programs stored on computer-readable media, for retrieving relevant information content while typing are disclosed. Upon identifying text being entered by a user into a text field of a typing-enabled application, one or more keywords may be determined that match the text. The matching keywords may be presented for selection. Upon receiving a selection of a keyword, an information card related to the selected keyword may be retrieved and presented. In addition to presenting the information card, information content associated with the information card may be inserted into the text field of the typing-enabled application.