Abstract:
Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.
Abstract:
A processing system including at least one processor may obtain a parking request for a vehicle to park at a parking facility and may offer a plurality of parking spots of the parking facility for the vehicle, where at least one of the plurality of parking spots that is offered is a parking spot that is predicted to be available, and where the offering includes presenting information regarding predicted adjacent parking spot occupancy of the at least one of the plurality of parking spots for a duration of an intended stay of the vehicle at the parking facility. The processing system may then obtain a selection of a parking spot from among the plurality of parking spots and reserve the parking spot for the vehicle.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a processing system that analyses, without user intervention, content of a first message directed from equipment of a sending user to equipment of a receiving user, to identify a task. The processing system determines that the receiving user is unable to perform the task according to biometric data of the receiving user. The biometric data is selected from one of heart rate, blood pressure, respiratory rate, and combinations thereof. According to the content of the first message and the biometric data obtained from the receiving user, the processing system determines that the task should be delegated to another user, and responsive thereto, provides a second message associated with the task to equipment of the other user. Other embodiments are disclosed.
Abstract:
A processing system including at least one processor may detect at least one dark zone in a vicinity of a user, determine at least one lighting feature for an illumination of the at least one dark zone in accordance with a user profile of the user, identify at least one light source to provide the illumination of the at least one dark area in accordance with the at least one lighting feature that is determined, and transmit an instruction to the at least one light source to provide the illumination of the at least one dark zone in accordance with the at least one lighting feature that is determined.
Abstract:
A processing system including at least one processor may detect at least one dark zone in a vicinity of a user, determine at least one lighting feature for an illumination of the at least one dark zone in accordance with a user profile of the user, identify at least one light source to provide the illumination of the at least one dark area in accordance with the at least one lighting feature that is determined, and transmit an instruction to the at least one light source to provide the illumination of the at least one dark zone in accordance with the at least one lighting feature that is determined.
Abstract:
Wireless pairing is automatically performed based on a purchase of a wireless product. When the wireless product is purchased, a unique product identifier and/or an account number (such as a credit card number) may be used to obtain one or more corresponding wireless network security credentials. Once the wireless network security credentials are identified, the wireless product may be paired to a wireless network based on the wireless network security credentials.
Abstract:
Concepts and technologies are disclosed herein for predictive determination of actions. According to one aspect of the concepts and technologies disclosed herein, a user device can receive input via a user input interface. The user input interface is application agnostic. The user device can analyze the input to determine an action option. The action option can include an action to be performed by the user device if selected. The user device also can present the action option for selection.
Abstract:
A method includes storing locations of mobile devices that are registered for ad hoc grouping, and matching an access request that specifies a location that corresponds to a goal for an ad hoc grouping with candidate mobile devices that match the access request. The method also includes retrieving network addresses of the candidate mobile devices and sending invitations to join the ad hoc grouping. An ad hoc grouping is formed from the candidate mobile devices accepting the invitations.
Abstract:
Ad hoc communications are established between unknown contacts. For example, in today's mobile communications environment, there are many instances in which a user of smart phone may wish to send a message to an unknown user's smartphone. An ad hoc communication thus allows messaging with an unknown user.
Abstract:
A method, computer-readable storage device and apparatus for establishing an ad hoc communication with an unknown contact are disclosed. For example, the method receives an authentication token from a recipient endpoint device for authentication of an unsolicited message from a sender endpoint device, wherein the recipient endpoint device is an unknown contact to the sender endpoint device and the unsolicited message is sent over an open communications protocol, authenticates the authentication token, and sends a confirmation that the authentication token is authenticated to the recipient endpoint device to allow the recipient endpoint device to establish a connection to the sender endpoint device to begin the ad hoc communication.