Abstract:
A device can receive, from a network device, information that identifies a user device. The network device might have authenticated the user device based on the user device accessing a radio access network. The device can receive, from the user device, a request for a first token. The request can include an encrypted session identifier. A server device might have encrypted the session identifier. The device can determine the session identifier, and generate the first token based on the session identifier and the information that identifies the user device. The device can encrypt the first token using an application public key, and provide, to the user device, the encrypted first token. The user device can provide, to the server device, the encrypted first token. The server device can register the user device to receive content based on the encrypted first token.
Abstract:
A device may receive campaign information for deploying a toll-free data service campaign. The campaign information may identify a uniform resource identifier for accessing a toll-free data service associated with the toll-free data service campaign. The device may determine a host name included in the uniform resource identifier. The device may determine a network address associated with the host name. The device may modify the uniform resource identifier, to generate a modified uniform resource identifier for accessing the toll-free data service, by replacing the host name, included in the uniform resource identifier, with the network address. The device may deploy the toll-free data service campaign by providing, to an enforcement device, the modified uniform resource identifier.
Abstract:
A first device may receive a first session token from a second device; determine that the first session token is expired or invalid; provide a security input to the second device to cause the second device to generate a first hash value of the security input using a key corresponding to a key identifier (ID); receive the key ID and the first hash value from the second device; generate a second hash value using the key corresponding to the key ID; determine that the first hash value matches the second hash value; and establish a session with the second device based on determining that the first hash value matches the second hash value.