Abstract:
A device may receive a request for a mobile device to obtain an application. The request may include a mobile device identifier for the mobile device. The device may send, to the mobile device, a link to a web page. The device may receive, from the mobile device, a request for the web page. The device may send, to the mobile device, a redirect to a software distribution platform to obtain the application from the software distribution platform. The device may receive a registration identifier for the mobile device after the mobile device obtains the application from the software distribution platform. The device may send, to a message server, a request for a message to be sent to the mobile device. The request may be based on the registration identifier and the application.
Abstract:
Techniques described herein may allow for the automatic downloading, installing, and/or launching of applications (commonly referred to as “apps”), during the presentation of content. For example, a user device (e.g., a smart phone) may play video content, such as a trailer for a video game app. During the presentation of the trailer, a button, to install the video game app, may be presented. Based on a single click of the button, the video game app may be downloaded and installed. The app may further be launched as soon as it is installed, and/or as soon as the trailer ends. Some techniques described herein may be applicable for the automatic downloading, installing, and/or launching of an application on a wearable device while another device presents content, or vice versa.
Abstract:
A processor server receives transaction information associated with an online transaction between a user device and a merchant server, and provides embedded code to the user device based on receiving the transaction information. The processor server receives, based on execution of the embedded code, location information identifying a geographic location at which the user device is located, and an identifier associated with the user device. The processor server determines an authorization decision for the online transaction based on the transaction information, the location information, and the identifier, and forwards the authorization decision to the merchant server to permit the merchant server to approve or deny the online transaction.
Abstract:
A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device. The device may obtain a file key for encrypting the file and a security key for encrypting the file key. The security key may be obtained based on the unique identifier. The device may encrypt the file, using the file key, to create an encrypted file. The device may encrypt the file key, using the security key, to create an encrypted file key. The device may provide the encrypted file and the encrypted file key for storage by a storage device.
Abstract:
Techniques described herein may be used to enable a user device (e.g., a smartphone, a tablet computer, etc.) to access network services without having to be connected to a network (e.g., a wireless telecommunications network). A first user device may communicate discovery packets in search of other user devices to which the first user device may connect. The first user device may identify a second user device (as a result of sending the discover packets). The first and second user devices may obtain configuration parameters (e.g., a communication channel allocation, encryption keys, synchronization information, etc.) and may establish a D2D connection based on the configuration parameters. The D2D connection may enable the first and second user devices to communicate with another as though the user devices were connected to a wireless telecommunications network (e.g., via telephone calls, video calls, simple messaging services (SMS) messages, instant messages, etc.).
Abstract:
A device may receive an indication that a first device, a second device, and a third device are within communication range of a target device. The first device may be outside of communication range of a positioning system that provides information for determining a location. The target device may be outside of communication range of the positioning system and outside of communication range of three or more devices which are within communication range of the positioning system. The device may receive information that identifies a first location associated with the first device, a second location associated with the second device, and a third location associated with the third device. The device may determine a target device location based on the information that identifies the first location, the second location, and the third location. The device may provide or store information that identifies the target device location.
Abstract:
An instant access device may receive a request from a user device to access secure content corresponding to a particular web service. The instant access device may create a hash code based on a telephone number of the user device and a hash code, and may communicate the hash code to an authentication system. The authentication system may authenticate the user device by comparing the hash code to a hash table that includes a list of hash codes associated with user devices that are authorized to access the secure content. Based on whether the user device is authenticated by the authentication system, the instant access device may cause the user device to access the secure content, whether by accessing the secure content directly (when the user device authentication is successful) or by creating a new user account (when the user device authentication is unsuccessful).
Abstract:
A system described herein may allow for the frictionless authentication of a user and/or user device (e.g., without requiring that the user provide login details, such as a user name and password). The frictionless authentication may occur via a licensed wireless network, even when the user device is actively engaged in communications with an unlicensed wireless network (and/or is not engaged in communications with the licensed wireless network).
Abstract:
A network device provides, to a user device, an application for managing viewing and sharing of content available via an Internet service provider, and assigns a unique code for a user of the user device. The network device provides a catalog of available content items that includes toll-free data (TFD) content items with a different TFD uniform resource locator (URL) for each TFD content item in the catalog of available content items. The network device receives a user's selection, from the catalog, of a TFD content item to share, and generates a sharing URL based on a TFD URL for the selected TFD content item and the unique sharing code. The network device provides the sharing URL to the user device for sharing with other users.
Abstract:
A device may receive an identifier for a subscriber of a first network. The subscriber may be associated with the device. The device may store the identifier and receive a request for content. The device may generate a modified request by adding the identifier to the request. The device may send the modified request using a network communication. The network communication may communicate via a second network without using the first network, and the first network may be different than the second network. The device may receive the content and targeted content based on the modified request. The targeted content may be targeted to the subscriber based on the identifier.