Abstract:
A user may have real-time control over whether accessing a network service account implements two-factor authentication. When a username and password is provided to log into the network service account, a determination may be made about whether the login attempt is a potential security threat. When the login attempt does not appear to be a threat, the login attempt may be processed based on the username and password. When the login attempt is a potential security threat, the actual user corresponding to the network service account may be notified and asked to confirm whether the login attempt is a security threat. When the user confirms that the login attempt is not a security threat, the user may be logged in based on the username and password. When the user confirms that the login attempt is a security threat, two-factor authentication may be implemented for accessing the network service account.
Abstract:
Credit card fraud prevention techniques are disclosed in which the authorization of a payment card may be performed using information obtained from a mobile device (e.g., a smart phone) associated with a user who initiates a point-of-sale payment card transaction. In one implementation, a device may receive a request for authorization of a payment associated with a payment card; and obtain location information relating to a location of a mobile device associated with a user of the payment card. The device may determine, based at least on a location of the point-of-sale terminal and the location of the mobile device, whether to authorize the request for authorization of the payment.
Abstract:
A device of a first party may receive a message from a second party. The device may obtain mapping information. The mapping information may be associated with a third party verification that the enterprise identifier was assigned to the second party. The mapping information may be associated with mapping the enterprise identifier to a media identifier selected by the second party or the third party to represent the enterprise sender. The device may map the enterprise identifier to the media identifier based on the mapping information. The device may provide the media identifier with the message.
Abstract:
A user may have real-time control over whether accessing a network service account implements two-factor authentication. When a username and password is provided to log into the network service account, a determination may be made about whether the login attempt is a potential security threat. When the login attempt does not appear to be a threat, the login attempt may be processed based on the username and password. When the login attempt is a potential security threat, the actual user corresponding to the network service account may be notified and asked to confirm whether the login attempt is a security threat. When the user confirms that the login attempt is not a security threat, the user may be logged in based on the username and password. When the user confirms that the login attempt is a security threat, two-factor authentication may be implemented for accessing the network service account.
Abstract:
A system may use optical character recognition (“OCR”) techniques to identify license plates or other textual information associated with vehicles. Based on this OCR information, the system may determine additional information, such as users associated with the vehicles. The system may further obtain other information, such as history information associated with the vehicles and/or the users (e.g., via an “opt-in” data collection service). Ad content may be selected based on trends associated with the users and/or vehicles, and may be presented via “smart” billboards (e.g., billboards that may dynamically display different content).
Abstract:
A server device may receive a message from a first user device, the message being destined for a second user device; determine a call session control function (CSCF) server device associated with the second user device; and output, based on the determining, the message to the CSCF server device.
Abstract:
Credit card fraud prevention techniques are disclosed in which the authorization of a payment card may be performed using information obtained from a mobile device (e.g., a smart phone) associated with a user who initiates a point-of-sale payment card transaction. In one implementation, a device may receive a request for authorization of a payment associated with a payment card; and obtain location information relating to a location of a mobile device associated with a user of the payment card. The device may determine, based at least on a location of the point-of-sale terminal and the location of the mobile device, whether to authorize the request for authorization of the payment.
Abstract:
A device may receive information associated with establishing a gateway connection. The gateway connection may be an ad hoc connection to a user device that permits the user device to transfer network traffic to/from a base station via another user device and without the user device directly connecting to the base station via a radio access network. The information being associated with determining that a gateway establishment condition is satisfied. The device may cause the gateway connection to be established based on the information associated with establishing the gateway connection. The device may cause the user device to utilize the gateway connection to transfer network traffic to/from the base station.
Abstract:
A user device may monitor sensor data gathered by the user device; detect, based on the sensor data, that the user device has been dropped; and output, based on detecting that the user device has been dropped, an alert indicating that the user device has been dropped.
Abstract:
A mobile device may perform actions based on sensing a wireless beacons. The action to take, for a particular beacon, may be determined based on a query to a remote database or server. For example, in one implementation, a method may include detecting a wireless beacon that is in proximity to the mobile device; querying, based on the beacon identifier, a remote computing device for attribute information relating to the wireless beacon; and determining, based on the received attribute information, one or more actions to perform by the mobile device.