Abstract:
A user device may identify a received a signal indicating an incoming call; determine that another user device has answered the call; generate call log information that indicates that the other user device has answered the call; and store or output the generated call log information. Additionally, or alternatively, a set of user devices may receive a ring signal indicating an incoming call; a particular user device, in the set of user devices, may answer the call; and another user device, in the set of user devices, may store a unified call log. The unified call log may indicate that the particular user device answered the call, and may further indicate that the other user device did not miss the call.
Abstract:
Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used to provide personalized advertisements for the user.
Abstract:
A method and system are disclosed that enables a customer to specify when services should be provisioned on a “just-in-time” or elastic basis. By dynamically specifying when services should be received, a customer is better able to suit such services to customer needs, thereby allowing the customer to only pay for what is actually used. Using an on-demand portal, a customer may prescribe when (or the degree to which) services should be enabled, and/or when the devices that utilize those services, or the services themselves, need to be monitored. Accordingly, the customer is given flexibility to dictate when services are required or when their services or devices require monitoring by a service provider, and the service provider is given the flexibility to tailor the amount of resources required to support and manage the customer's demands, thereby enabling more efficient use of both the customer's and service provider's resources.
Abstract:
A system may be configured to receive an indication that a call has been placed (e.g., to a call center), and may provide a customized visual interface. The customized visual interface may include information that is potentially relevant to a user who has placed the call, and may be based on, for example, a user profile or history information, a purchase history of goods or services offered by an entity associated with the called party. The customized visual interface may allow the user to more quickly satisfy the purposes of his or her call than through traditional audio or touchtone menus.
Abstract:
A device may receive a request for a collaboration session. The device may authenticate a user for the collaboration session. The device may generate a trust-score associated with the collaboration session based on authenticating the user. The trust-score may be associated with a security level for the collaboration session. The security level may be associated with one or more capabilities of the collaboration session. The device may assign the user to a session role associated with the collaboration session. The session role may be associated with the one or more capabilities of the collaboration session. The device may provide information associated with the collaboration session based on the security level for the collaboration session and/or the session role assigned to the user.
Abstract:
An approach is provided for causing an extension of secure emergency network resources via one or more trusted point of presence. The approach involves determining a networking context, wherein the networking context initiates a request to join an extension mesh network to a currently trusted network. The approach also involves determining a target network trust level associated with the networking context, the currently trusted network, or a combination thereof. The approach further involves selecting the extension mesh network based on the target network trust level. The approach also involves initiating a joining of the extension mesh network to the currently trusted network.
Abstract:
A user device may identify a received a signal indicating an incoming call; determine that another user device has answered the call; generate call log information that indicates that the other user device has answered the call; and store or output the generated call log information. Additionally, or alternatively, a set of user devices may receive a ring signal indicating an incoming call; a particular user device, in the set of user devices, may answer the call; and another user device, in the set of user devices, may store a unified call log. The unified call log may indicate that the particular user device answered the call, and may further indicate that the other user device did not miss the call.
Abstract:
An approach is provided for automated user authentication for a priority communication session. An authentication platform receives a session request for establishing a priority communication session over a data network between a user device and a service platform. The authentication platform determines network information and device information associated with the session request and the user device, respectively. The authentication platform further determines user history information regarding one or more prior communication sessions of a user of the user device. The authentication platform authenticates the user based on the network information, the device information, and the user history information for establishing the priority communication session.
Abstract:
A system may be configured to receive an indication that a call has been placed (e.g., to a call center), and may provide a customized visual interface. The customized visual interface may include information that is potentially relevant to a user who has placed the call, and may be based on, for example, a user profile or history information, a purchase history of goods or services offered by an entity associated with the called party. The customized visual interface may allow the user to more quickly satisfy the purposes of his or her call than through traditional audio or touchtone menus.
Abstract:
A computing device may execute a device connection application on a processor of the computing device to provide operations including establishing an ad-hoc data connection between the computing device and a machine-to-machine device, the computing device configured to set up the machine-to-machine device to interact with a network-based service using a user account of the network-based service; receiving device information from the machine-to-machine device over the established ad-hoc data connection; and connecting the machine-to-machine device to the network-based service based on the device information received from the machine-to-machine device and according to authentication of the computing device as being associated with the user account. The computing device may further be configured to authenticate and authorize a user to configure the machine-to-machine device to join the network and network-based service.