Abstract:
A system may be configured to allow for network-based authentication of a user device, which may reduce or eliminate the need for a user to provide credentials. The authentication may be performed when the user device attempts to access content provided by a third party content provider. The network-based authentication may be performed by, or in conjunction with, a device that (a) is associated with the same telecommunications network as the user device, and (b) can authenticate the identity of the user device.
Abstract:
A device may receive a request from a mobile device. The device may determine a port identifier for a port of the device. The port may correspond to whether the mobile device used a secure communication path to send the request. The device may determine a mobile device identifier for the mobile device. The device may add the mobile device identifier and the port identifier to the request. The device may send the request to an application device after adding the mobile device identifier and the port identifier to the request. The port identifier may be added to the request to enable the application device to determine whether the request was sent, by the mobile device, over the secure communication path.
Abstract:
A method, a system, and a non-transitory storage medium provide an IP address and port-based identity service in which an anchor node of a wireless network stores identity information pertaining to a user of a mobile device in a centralized database. An authenticated and authorized web server may query the centralized database using the IP address or the IP address and port of an end device connected to the web server. The web server may obtain identity information pertaining to the user, such as a mobile telephone number.
Abstract:
A device may receive a request for analytics information associated with a user device. The device may retrieve application programming interface (API) information associated with the request for analytics information. The API information may include information associated with providing an authorization token and with providing user device information. The device may determine demographic information based on the request for analytics information. The demographic information may be associated with a user of the user device. The device may determine the analytics information based on an analysis of the API information and the demographic information. The device may provide the analytics information.
Abstract:
A method, a system, and a non-transitory storage medium provide an IP address and port-based identity service in which an anchor node of a wireless network stores identity information pertaining to a user of a mobile device in a centralized database. An authenticated and authorized web server may query the centralized database using the IP address or the IP address and port of an end device connected to the web server. The web server may obtain identity information pertaining to the user, such as a mobile telephone number.
Abstract:
A device may receive an encrypted authorization request token from a mobile device. The encrypted authorization request token may be based on at least one parameter and may have been created by a third party device. The device may decrypt the encrypted authorization request token to obtain the at least one parameter. The device may determine, based on an address for the mobile device, a mobile device identifier for the mobile device. The device may create an identification token for the mobile device. The identification token may be based on the mobile device identifier and the at least one parameter. The device may send the identification token to at least one of the mobile device or the third party device to permit the third party device to authenticate the mobile device.
Abstract:
A system may be configured to allow for network-based authentication of a user device, which may reduce or eliminate the need for a user to provide credentials. The authentication may be performed when the user device attempts to access content provided by a third party content provider. The network-based authentication may be performed by, or in conjunction with, a device that (a) is associated with the same telecommunications network as the user device, and (b) can authenticate the identity of the user device.
Abstract:
A system may receive a network address to be validated to determine whether the network address is associated with a toll-free data service. The system may perform a validation operation to validate that the network address is associated with the toll-free data service. The validation operation may be based on a key identifier associated with the network address or a network address signature associated with the network address. The key identifier may correspond to a security key used to create the network address signature. The network address signature may be created using the security key. The system may determine whether to bill a first party or a second party for data usage associated with the toll-free data service based on the validation operation. The system may provide information that identifies whether to bill the first party or the second party for the data usage associated with the toll-free data service.
Abstract:
A system may be configured to allow for network-based authentication of a user device, which may reduce or eliminate the need for a user to provide credentials. The authentication may be performed when the user device attempts to access content provided by a third party content provider. The network-based authentication may be performed by, or in conjunction with, a device that is associated with the same telecommunications network as the user device, and which can authenticate the identity of the user device.
Abstract:
A first server device may receive, from a user device, a request to authenticate the user device for a first service using authentication credentials for a second service that is different than the first service; provide the authentication credentials to a second server device that provides the second service; receive from the second server device, and when the authentication credentials are valid for the second service, user information relating to a user of the user device; and provide, to the user device, an authentication response, associated with the user information, that provides authentication of the user device for the first service.