摘要:
Methods, devices, and storage media for user devices to operate in multiple modes and provide mode indicators that indicate the mode in which the user device operates, and a network that provides multimode services that include monitoring service events associated with the multiple modes, control modes of operation, and allow users to view, manage, and classify service usage information that includes service event information and correlated mode information.
摘要:
A computing device receives a request for a service level agreement (SLA) that indicates a specific combination of services and service levels selected from a group of available services and available service levels. The computing device generates an SLA identifier for the specific combination of services and service levels, and determines if the SLA identifier matches one of a group of stored SLA identifiers. The computing device generates a new SLA based on the specific combination of services and service levels when the SLA identifier does not match one of the group of stored SLA identifiers, and assigns an existing SLA, corresponding to one of the group of stored SLA identifiers, when the SLA identifier matches one of the group of stored SLA identifiers.
摘要:
A system that includes a memory to store registration information for a particular application hosted by a particular user device, where the registration information includes context information regarding the particular user device and an integrity code based on credentials associated with the particular application. The system also includes a first server to receive, from a second server, a request to receive a service on behalf of a user device that hosts an application, the request including other credentials associated with the application; generate, using a data integrity algorithm, another integrity code based on the other credentials; determine that the application is trusted when the integrity code matches the other integrity code; compare other context information associated with the user device with the context information when the application is trusted; and send an instruction to the user device to re-register the application when the context information does not match the other context information.
摘要:
A method may include storing user information associated with a first user, where the user information includes at least two of location information, presence information, address book information or calendar information. The method may also include storing access control information identifying criteria for allowing parties to access the user information and receiving, from a first party, a request for access to at least a first portion of the user information. The method may further include determining, based on the access control information, whether the first party is authorized to access the first portion of the user information and providing access to the first portion of the user information, when it is determined that the first party is authorized to access the first portion of the user information.
摘要:
An approach is provided for collecting and controlling access to network information. A network information anonymizer receives network information associated with a device, separates the network information into anonymized network information and user identifiable information, and enables access to the anonymized network information independently of the user identifiable information based on a privacy setting.
摘要:
A system that includes a memory to store registration information for a particular application hosted by a particular user device, where the registration information includes context information regarding the particular user device and an integrity code based on credentials associated with the particular application. The system also includes a first server to receive, from a second server, a request to receive a service on behalf of a user device that hosts an application, the request including other credentials associated with the application; generate, using a data integrity algorithm, another integrity code based on the other credentials; determine that the application is trusted when the integrity code matches the other integrity code; compare other context information associated with the user device with the context information when the application is trusted; and send an instruction to the user device to re-register the application when the context information does not match the other context information.
摘要:
A method may include storing user information associated with a first user, where the user information includes at least two of location information, presence information, address book information or calendar information. The method may also include storing access control information identifying criteria for allowing parties to access the user information and receiving, from a first party, a request for access to at least a first portion of the user information. The method may further include determining, based on the access control information, whether the first party is authorized to access the first portion of the user information and providing access to the first portion of the user information, when it is determined that the first party is authorized to access the first portion of the user information.
摘要:
An approach for providing context-based view content management is described. A request for content associated with a user is received. A view of a subset of the content is dynamically generated based on the request and context information associated with the user. Access to the view is provided for one or more user devices.
摘要:
An approach for enabling event notifications to be directed to one or more contacts based on the acquiring of common event data by one or more wireless devices is described. A multimedia event processor receives event data corresponding to an event from a mobile device. The event data is associated with a tag for describing the event data and classified as corresponding to a level of severity based on the tag. A target destination is then determined for transmission of a notification message, the event data, or a combination thereof.
摘要:
An approach is provided for collecting and controlling access to network information. A network information anonymizer receives network information associated with a device, separates the network information into anonymized network information and user identifiable information, and enables access to the anonymized network information independently of the user identifiable information based on a privacy setting.