摘要:
An approach is provided for automated user authentication for a priority communication session. An authentication platform receives a session request for establishing a priority communication session over a data network between a user device and a service platform. The authentication platform determines network information and device information associated with the session request and the user device, respectively. The authentication platform further determines user history information regarding one or more prior communication sessions of a user of the user device. The authentication platform authenticates the user based on the network information, the device information, and the user history information for establishing the priority communication session.
摘要:
An approach for providing context-based view content management is described. A request for content associated with a user is received. A view of a subset of the content is dynamically generated based on the request and context information associated with the user. Access to the view is provided for one or more user devices.
摘要:
An approach for providing context-based view content management is described. A request for content associated with a user is received. A view of a subset of the content is dynamically generated based on the request and context information associated with the user. Access to the view is provided for one or more user devices.
摘要:
An approach for enabling event notifications to be directed to one or more contacts based on the acquiring of common event data by one or more wireless devices is described. A multimedia event processor receives event data corresponding to an event from a mobile device. The event data is associated with a tag for describing the event data and classified as corresponding to a level of severity based on the tag. A target destination is then determined for transmission of a notification message, the event data, or a combination thereof.
摘要:
A server device is configured to receive, from a proxy server, a request by a user device to access a network; obtain information associated with the user device that includes an identifier associated with the user device and context information associated with the user device; determine a level of trust associated with the user device based on the identifier and the context information, where the level of trust is a measure of security risk associated with the user device; generate an access token based on the level of trust, where the access token identifies a level at which the user device is authorized to access the network; and send, to the user device via the proxy server, the access token that enables the proxy server to authorize the user device to access the network at the level identified by the access token.
摘要:
Methods, devices, and storage media for user devices to operate in multiple modes and provide mode indicators that indicate the mode in which the user device operates, and a network that provides multimode services that include monitoring service events associated with the multiple modes, control modes of operation, and allow users to view, manage, and classify service usage information that includes service event information and correlated mode information.
摘要:
Methods, devices, and storage media for user devices to operate in multiple modes and provide mode indicators that indicate the mode in which the user device operates, and a network that provides multimode services that include monitoring service events associated with the multiple modes, control modes of operation, and allow users to view, manage, and classify service usage information that includes service event information and correlated mode information.
摘要:
A computing device receives a request for a service level agreement (SLA) that indicates a specific combination of services and service levels selected from a group of available services and available service levels. The computing device generates an SLA identifier for the specific combination of services and service levels, and determines if the SLA identifier matches one of a group of stored SLA identifiers. The computing device generates a new SLA based on the specific combination of services and service levels when the SLA identifier does not match one of the group of stored SLA identifiers, and assigns an existing SLA, corresponding to one of the group of stored SLA identifiers, when the SLA identifier matches one of the group of stored SLA identifiers.
摘要:
A system that includes a memory to store registration information for a particular application hosted by a particular user device, where the registration information includes context information regarding the particular user device and an integrity code based on credentials associated with the particular application. The system also includes a first server to receive, from a second server, a request to receive a service on behalf of a user device that hosts an application, the request including other credentials associated with the application; generate, using a data integrity algorithm, another integrity code based on the other credentials; determine that the application is trusted when the integrity code matches the other integrity code; compare other context information associated with the user device with the context information when the application is trusted; and send an instruction to the user device to re-register the application when the context information does not match the other context information.
摘要:
A method may include storing user information associated with a first user, where the user information includes at least two of location information, presence information, address book information or calendar information. The method may also include storing access control information identifying criteria for allowing parties to access the user information and receiving, from a first party, a request for access to at least a first portion of the user information. The method may further include determining, based on the access control information, whether the first party is authorized to access the first portion of the user information and providing access to the first portion of the user information, when it is determined that the first party is authorized to access the first portion of the user information.