摘要:
A network device may include a memory to store instructions. The network device may further include a processor to execute the instructions to obtain information relating to a loosely-coupled composite service, where the loosely-coupled composite service includes a group of services. The processor may further execute the instructions to analyze the obtained information to determine one or more design recommendations, and re-factor the loosely-coupled composite service as a target composite platform based on at least one of the one or more design recommendations.
摘要:
A network device may receive a call request message. The call request message may include information identifying a user to which the call is destined. The network device may further retrieve, using the information identifying the user, information identifying a device with which the user is associated. In addition, the network device may retrieve, using the information identifying the device, a first list of codecs that the device is willing to support, and establish the call to the device using a codec from the first list of codecs.
摘要:
A method may include transmitting or receiving a communication in a non-social network, where the communication is between a user and one or more other users, selecting a social network based on the communication, accessing the social network, searching for social network information related to the one or more other users, retrieving the social network information based on the searching, and providing a non-social network service based on the social network information.
摘要:
Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used to provide personalized advertisements for the user.
摘要:
Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used by authorized context consumers.
摘要:
A system receives, when a multimedia component is operating in a first identity, a first communication request from a first user. The first communication request includes a voice session establishment request or a video session establishment request. The system provides, in response to receiving the first communication request, first multimedia content to the first user based on the first identity and an identifier associated with the first user. The system further receives, when the multimedia component is operating in the first identity, a second communication request from a second, different user. The second communication request includes a voice session establishment request or a video session establishment request. The system provides, in response to receiving the second communication request, second, different multimedia content to the second, different user based on the first identity and an identifier associated with the second, different user.
摘要:
User imaging terminals (such as mobile phones with camera or video functionality) may be used to take images that are used to create an image stream of an event. In one implementation, a device may receive the images and transmit the images to one or more second users. The device may receive indications, from the second users, of whether the images are approved by the second users for incorporation into an image stream; and generate the image stream, based on the images that are approved by the second users. The image stream may be transmitted to one or more display devices.
摘要:
A server device is configured to receive, from a proxy server, a request by a user device to access a network; obtain information associated with the user device that includes an identifier associated with the user device and context information associated with the user device; determine a level of trust associated with the user device based on the identifier and the context information, where the level of trust is a measure of security risk associated with the user device; generate an access token based on the level of trust, where the access token identifies a level at which the user device is authorized to access the network; and send, to the user device via the proxy server, the access token that enables the proxy server to authorize the user device to access the network at the level identified by the access token.
摘要:
A system enables voice authentication via a network. The system may include an intelligent voice response engine operatively coupled to the network for receiving transaction or access requests from a plurality of telecommunications devices over the network. A speech recognition and verification services engine may be operatively coupled to the network and a database may be operatively coupled to the speech recognition and verification services engine for storing user voice print profiles. The speech recognition and verification services engine may receive a speaker verification call from the intelligent voice response engine and perform speaker verification on the received speaker verification call based on the stored user voice print profiles. The speech recognition and verification services engine may generate a verification score based upon results of the speaker verification.
摘要:
A server device that includes a memory to store identity information for a group of users, policy information, and context information for a group user devices. The server device also includes a processor to receive, from another server device, a request for login credentials, associated with a user of a user device, that enable a third party application to access a service provider on behalf of the user, the request including identity information associated with the user and context information associated with the user device; verify the identity of the user based on a determination that particular identity information is stored in the memory; authorize the disclosure of the particular identity information based on a determination that the context information matches particular context information stored in the memory and that the policy information permits the disclosure of the particular identity information; and send the particular identity information, that includes the login credentials, to the other server device based on the verified identity and the authorized disclosure.