Abstract:
A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device. The device may obtain a file key for encrypting the file and a security key for encrypting the file key. The security key may be obtained based on the unique identifier. The device may encrypt the file, using the file key, to create an encrypted file. The device may encrypt the file key, using the security key, to create an encrypted file key. The device may provide the encrypted file and the encrypted file key for storage by a storage device.
Abstract:
A device may receive a request for a mobile device to obtain an application. The request may include a mobile device identifier for the mobile device. The device may send, to the mobile device, a link to a web page. The device may receive, from the mobile device, a request for the web page. The device may send, to the mobile device, a redirect to a software distribution platform to obtain the application from the software distribution platform. The device may receive a registration identifier for the mobile device after the mobile device obtains the application from the software distribution platform. The device may send, to a message server, a request for a message to be sent to the mobile device. The request may be based on the registration identifier and the application.
Abstract:
Techniques described herein may be used to enable a user device (e.g., a smartphone, a tablet computer, etc.) to access network services without having to be connected to a network (e.g., a wireless telecommunications network). A first user device may communicate discovery packets in search of other user devices to which the first user device may connect. The first user device may identify a second user device (as a result of sending the discover packets). The first and second user devices may obtain configuration parameters (e.g., a communication channel allocation, encryption keys, synchronization information, etc.) and may establish a D2D connection based on the configuration parameters. The D2D connection may enable the first and second user devices to communicate with another as though the user devices were connected to a wireless telecommunications network (e.g., via telephone calls, video calls, simple messaging services (SMS) messages, instant messages, etc.).
Abstract:
Techniques described herein may be used to enable a user to obtain services from multiple organizations in a seamless, automated, and efficient manner. A network device may cause a user device to automatically access a web service by, for example, downloading a mobile application or accessing a web page designed to provide the web service. The network device may automatically identify a second web service that is logically related to the first web service and offer the second web service to the user. If the user accepts the second web service, the network device may cause the user device to automatically access the second web service via a mobile application, a webpage, etc. Identification and authentication issues for accessing the first or second web services may be automatically resolved by network device based on the mobile device number (MDN) of the user device and/or other profile information.
Abstract:
A processor server receives transaction information associated with an online transaction between a user device and a merchant server, and provides embedded code to the user device based on receiving the transaction information. The processor server receives, based on execution of the embedded code, location information identifying a geographic location at which the user device is located, and an identifier associated with the user device. The processor server determines an authorization decision for the online transaction based on the transaction information, the location information, and the identifier, and forwards the authorization decision to the merchant server to permit the merchant server to approve or deny the online transaction.
Abstract:
Techniques described herein may be used to enable a user to obtain services from multiple organizations in a seamless, automated, and efficient manner. A network device may cause a user device to automatically access a web service by, for example, downloading a mobile application or accessing a web page designed to provide the web service. The network device may automatically identify a second web service that is logically related to the first web service and offer the second web service to the user. If the user accepts the second web service, the network device may cause the user device to automatically access the second web service via a mobile application, a webpage, etc. Identification and authentication issues for accessing the first or second web services may be automatically resolved by network device based on the mobile device number (MDN) of the user device and/or other profile information.
Abstract:
A device may receive a request for an authorization code, associated with providing content to a second device, from the second device. The device may provide the authorization code to the second device. The device may receive, from a third device, a request for a unique device identifier corresponding to the authorization code. The request for the unique device identifier may include the authorization code. The unique identifier may be associated with a subscriber of a network. The subscriber may be associated with the second device. The device may provide the unique device identifier to the third device. The third device may be associated with providing the content to the second device. The content may be targeted to the subscriber based on the unique device identifier.
Abstract:
A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device. The device may obtain a file key for encrypting the file and a security key for encrypting the file key. The security key may be obtained based on the unique identifier. The device may encrypt the file, using the file key, to create an encrypted file. The device may encrypt the file key, using the security key, to create an encrypted file key. The device may provide the encrypted file and the encrypted file key for storage by a storage device.
Abstract:
A first server device may receive, from a second server device, a unique identifier (ID) relates to content stored by the second server device; determine a policy based on the unique ID; generate a policy tag identifying the determined policy; and output the policy tag to the second server device. Outputting the policy tag may cause the second server device to apply the policy tag to a packet associated with the content, and output the packet towards a requesting user device that requests the content.
Abstract:
Techniques described herein may enable users to manage the division of storage, for multiple applications and on a per-content type basis, between cloud storage and local storage. A mobile device may receive user preference information relating to storage limits, each of the storage limits being applicable to an aggregate amount of data, of a particular content type, and associated with a number of applications executed by the mobile device. The mobile device transfer data, to and from cloud storage, to enforce the storage limits included in the user preference information.