Abstract:
Techniques to replicate data using uploads from messaging clients are described. In one embodiment, for example, an apparatus may comprise a messaging server component operative to determine a sharing event for a data item, the sharing event associated with a source client device with a local storage of the data item, and request the source client device upload the data item in response to a determination that network storage of the data item is scheduled for relocation; and a storage management component operative to determine that the network storage of the data item is scheduled for relocation from a source storage and de-schedule the relocation of the data item from the source storage device.
Abstract:
Techniques for dynamic media album display and management are described. An apparatus may comprise a messaging component operative on the processor circuit to receive a plurality of messaging packages from a messaging server and determine a plurality of visual media items referenced by the plurality of messaging packages; a display component operative to display a first visual media item of the plurality of visual media items in a user interface and replace the first visual media item in the user interface in response to a user scroll; and a user interface component operative to receive a user scroll of the user interface. Other embodiments are described and claimed.
Abstract:
A system and methods are provided for dynamically muting or suppressing notifications of new communications. When a new communication is received for a user of a communication device (e.g., a mobile telephone, a computer) while notifications are muted, no notification may be issued to the user or, alternatively, a muted notification that differs from a normal notification may be issued. A muted notification may have muted sound or no sound, abbreviated vibration or no vibration, or may otherwise be a dampened version of a normal notification. Dynamic muting may be applied or managed on the user's device or on a system that hosts the communication application for which notifications are muted. Different applications and/or communication sessions (e.g., different chat groups) may be muted differently (e.g., for different periods of time). When a group chat session is muted, the duration of muting may be proportional to the number of participants.
Abstract:
A system and method for automatically verifying a telephone number proffered by a user of an application. During registration or installation of the application, client software is installed on the user's mobile device (e.g., a smart phone, a tablet computer). One of a pool of telephone numbers for outgoing calls is selected, and a call is initiated to the proffered number by the system. The software executing on the user's device detects the incoming call, extracts caller identification data (i.e., the originating telephone number), formats a data communication (e.g., an http request) to include the data, and sends it to the system. The system receives the data communication and compares the data with the originating number. If they match, the user's telephone number is verified. The outgoing call from the system may be canceled before it rings at the device if the data communication is received in time.
Abstract:
A system and method for detecting unwanted electronic content, such as spam. As a user operates an application to send messages, several metrics are tracked to allow the system to analyze her activity. Illustrative metrics may include, but are not limited to, block count (e.g., how many other users have blocked her), block rate (e.g., the rate at which other users block her), peer symmetry (e.g., percentage of her messages that are to other users that have her in their address book), message uniqueness (e.g., how unique her messages are from each other), peer uniqueness (e.g., how unique the addressees of her messages are), and message rate (e.g., the rate at which she sends messages). Periodically, metrics may be compared to corresponding thresholds. Depending on whether a threshold is crossed, and which threshold is crossed, she may be banned from using the application or placed on a watch list.
Abstract:
A system, apparatus, graphical user interface and methods are provided for conducting electronic voice communications with status notifications. A user of a first portable device executing a communication application selects a multi-function control that automatically initiates an audio recording, which is automatically sent toward another participant of an active communication session when the control is released. The same multi-function control may be used to transmit a textual message. A representation of the recording is displayed on the user's device, with an indicator that changes appearance when the other participant plays the recording. In addition, when one user initiates an audio recording that will be automatically sent to another user, the other user's device is advised of the initiation of recording and displays that status for the other user.
Abstract:
A system, apparatus, graphical user interface and methods are provided for conducting electronic voice communications with status notifications. A user of a first portable device executing a communication application selects a multi-function control that automatically initiates an audio recording, which is automatically sent toward another participant of an active communication session when the control is released. The same multi-function control may be used to transmit a textual message. A representation of the recording is displayed on the user's device, with an indicator that changes appearance when the other participant plays the recording. In addition, when one user initiates an audio recording that will be automatically sent to another user, the other user's device is advised of the initiation of recording and displays that status for the other user.
Abstract:
Exemplary embodiments relate to techniques for asserting the authenticity of digital content being communicated among client devices of a communication or computer system by configuring the digital content with one or more sensor responsive elements. The sensor responsive element may be a visual interface that dynamically reacts or responds to sensor data generated by one or more sensors (such as a gyroscope sensor, a microphone, and a camera) of a receiving client device. If the sensor responsive element does not dynamically react or respond to movement data, image data, or sound data generated by the one or more sensors, the digital content may fail user inspection and may indicate to the recipient that the digital content is a fake or a counterfeit.
Abstract:
A system, apparatus, and methods are provided for facilitating payment for a third party's use of an application by a current user. The current user, or payor, initiates the process within the application by selecting one or more recipients. The system that hosts the application then determines which of the third parties are eligible. A target recipient may be ineligible because her application subscription never expires, because it doesn't expire within a threshold period of time, or for some other reason. The system identifies the target recipients that are eligible, and the payor may configure the gift payment (e.g., by choosing a duration of the subscription). The payor then chooses a method of electronic payment and, depending on the method selected, may redeem a coupon with the application host system, or the process may complete automatically. The payor and/or the recipient(s) may be notified of successful activation of the subscription(s).
Abstract:
Exemplary embodiments relate to techniques for anonymizing information in an end-to-end (E2E) encrypted environment; the information may include, for example, statistical data about unique page/message views, view counts, view time, what users selected on the message or page, etc. Exemplary embodiments may prevent an E2E system server from being able to identify which user is associated with which record. Various examples are described, including an embodiment in which an originating client generates the data, encrypts it, and sends it to a random contact. The contact decrypts the data, re-encyrpts it, and sends it to another random contact. The procedure continues for a set amount of time or for a set number of hops. Other embodiments relate to wrapping the data in various layers of encryption and sending the data to clients in a chain. The encrypted layers prevent clients along the chain from being able to view the anonymized data.