Abstract:
A processor server receives transaction information associated with an online transaction between a user device and a merchant server, and provides embedded code to the user device based on receiving the transaction information. The processor server receives, based on execution of the embedded code, location information identifying a geographic location at which the user device is located, and an identifier associated with the user device. The processor server determines an authorization decision for the online transaction based on the transaction information, the location information, and the identifier, and forwards the authorization decision to the merchant server to permit the merchant server to approve or deny the online transaction.
Abstract:
A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device. The device may obtain a file key for encrypting the file and a security key for encrypting the file key. The security key may be obtained based on the unique identifier. The device may encrypt the file, using the file key, to create an encrypted file. The device may encrypt the file key, using the security key, to create an encrypted file key. The device may provide the encrypted file and the encrypted file key for storage by a storage device.
Abstract:
A device provides for display, to a first user device, information associated with a potential contact, and an option to communicate with the potential contact. The device receives a selection of the option from the first user device, and obtains, based on the selection, an identifier for a second user device associated with the potential contact. The device provides a communication request and the identifier to a message server to cause the message server to selectively cause a communication session to be established between the first user device and the second user device. An indication that the communication session is denied may be provided to the first user device when the second user device does not accept the communication request. The communication session may be established, without revealing the identifier to the first user device, when the second user device accepts the communication request.
Abstract:
Techniques described herein may be used to enable a user device (e.g., a smartphone, a tablet computer, etc.) to access network services without having to be connected to a network (e.g., a wireless telecommunications network). A first user device may communicate discovery packets in search of other user devices to which the first user device may connect. The first user device may identify a second user device (as a result of sending the discover packets). The first and second user devices may obtain configuration parameters (e.g., a communication channel allocation, encryption keys, synchronization information, etc.) and may establish a D2D connection based on the configuration parameters. The D2D connection may enable the first and second user devices to communicate with another as though the user devices were connected to a wireless telecommunications network (e.g., via telephone calls, video calls, simple messaging services (SMS) messages, instant messages, etc.).
Abstract:
Crowdsourcing techniques may be used to enhance the experience of users viewing and/or listening to content (e.g., live and/or pre-recorded content, such as movies, sporting events, etc.). A server device may analyze audio, captured by multiple user devices, in order to determine trigger points, in the content. The trigger point may be a time point in the content, at which the captured audio, received from multiple user devices, should be played by subsequent user devices that play back the content.
Abstract:
A device may receive an indication that a first device, a second device, and a third device are within communication range of a target device. The first device may be outside of communication range of a positioning system that provides information for determining a location. The target device may be outside of communication range of the positioning system and outside of communication range of three or more devices which are within communication range of the positioning system. The device may receive information that identifies a first location associated with the first device, a second location associated with the second device, and a third location associated with the third device. The device may determine a target device location based on the information that identifies the first location, the second location, and the third location. The device may provide or store information that identifies the target device location.
Abstract:
An instant access device may receive a request from a user device to access secure content corresponding to a particular web service. The instant access device may create a hash code based on a telephone number of the user device and a hash code, and may communicate the hash code to an authentication system. The authentication system may authenticate the user device by comparing the hash code to a hash table that includes a list of hash codes associated with user devices that are authorized to access the secure content. Based on whether the user device is authenticated by the authentication system, the instant access device may cause the user device to access the secure content, whether by accessing the secure content directly (when the user device authentication is successful) or by creating a new user account (when the user device authentication is unsuccessful).
Abstract:
A network device receives utilization information, for an infrastructure network, that provides data for individual segments of the infrastructure network. Based on the data for the individual segments, the network device generates a costing matrix that includes prices for each segment of the individual segments. The network device identifies particular segments of the infrastructure network associated with an end-to-end path for a subscriber and generates pricing of different service levels for the end-to-end path. The pricing is based on the costing matrix and a particular time period. The network device provides, to the subscriber, a user interface that includes service plan options with the pricing of different service levels for the end-to-end path and receives, via the user interface, a selection of one of the service plan options. The network device sends instructions to provision the infrastructure network to support the selected service plan option.
Abstract:
A network device provides, to a user device, an application for managing viewing and sharing of content available via an Internet service provider, and assigns a unique code for a user of the user device. The network device provides a catalog of available content items that includes toll-free data (TFD) content items with a different TFD uniform resource locator (URL) for each TFD content item in the catalog of available content items. The network device receives a user's selection, from the catalog, of a TFD content item to share, and generates a sharing URL based on a TFD URL for the selected TFD content item and the unique sharing code. The network device provides the sharing URL to the user device for sharing with other users.
Abstract:
Systems described herein allow for placement and presentation of virtual objects using mobile devices with a single camera lens. A device receives, from a first mobile device, a target image captured from a camera and target image data collected contemporaneously with the target image. The target image data includes a geographic location, a direction heading, and a tilt. The device receives, from the first mobile device, a first virtual object definition that includes an object type, a size, and a mobile device orientation for presenting a first virtual object within a video feed. The device generates a simplified model of the target image, and stores the first virtual object definition associated with the target image data and the simplified model of the target image. The device uploads the first virtual object definition and the target image data, so the first virtual object is discoverable by a second mobile device.