Abstract:
A first device may receive a request from a second device. The request may include a device identifier associated with the second device. The request may be transmitted by the second device to obtain a signature, based on which to access a third device. The first device may determine that the device identifier is associated with a secure authentication service. The first device may generate a signature based on determining that the device identifier is associated with the secure authentication service. The first device may provide the signature to the third device. The signature may permit the third device to selectively permit or deny access by the second device based on a result of authenticating the signature. Access may be permitted when the third device successfully authenticates the signature, and access may be denied when the third device fails to authenticate the signature.
Abstract:
An authentication device receives, from an application executing at a mobile device, a request for an authentication token, the request including an application identifier and an encrypted session identifier (SID). The application identifier identifies the application and the SID uniquely identifies a session between the application and a destination network device. The authentication device decrypts, using a first private key of a first public/private key pair, the encrypted SID to produce a decrypted SID; and determines a first hash value of certain data that includes the application identifier and session information associated with the session. The authentication device further encrypts, using a second public key of a second public/private key pair, the determined first hash value and the decrypted SID to produce an authentication token comprising the encrypted first hash value and the SID; and sends the authentication token to the application at the mobile device.
Abstract:
A device may receive campaign information for deploying a toll-free data service campaign. The campaign information may identify a total amount of data to be allocated for a toll-free data service associated with the toll-free data service campaign. The device may determine enforcement devices associated with the toll-free data service campaign, and may allocate a portion of data, of the total amount of data, to an enforcement device. The device may receive, from the enforcement device, data usage information that indicates an amount of the portion of data consumed during a first time period, by mobile devices associated with the enforcement device, in association with the toll-free data service campaign. The device may determine, based on the data usage information, an additional amount of data to be allocated to the enforcement device, and may allocate the additional amount of data to the enforcement device.
Abstract:
A view history of a user viewing a program is generated. The view history record is used to generate a proxy rating of the program when the user does not assign a rating to the program. The proxy rating is used by a recommendation engine to generate recommendations.
Abstract:
A method includes receiving, at a video service provider system, a security markup assertion language (SAML) token encrypted for a partner federated security token service (FSTS) device from a client device. The method includes submitting the SAML token to the partner FSTS device in exchange for a partner SAML token. The partner SAML token is encrypted for a partner account device. The method also includes receiving the partner SAML token, and sending the partner SAML token to the client device. The client device is configured to request an access token from the partner account device based on the partner SAML token and to submit an encrypted message including credit card information to the partner account device based on the access token.