摘要:
The present invention relates to a system and methodology for interacting with a Subscription Platform Service (SPS) and providing data security between entities that employ such service. The system includes a component that receives a request to access an object by an entity, and a data store that stores security information on classes of the objects. A verification component employs the security information to determine whether the entity has permission to call an Application Programming Interface (API) for the object and/or operate on the object, wherein the verification component exposes the object if permission exists or masks the object if permission does not exist.
摘要:
Embodiments enhance the functionality of a vehicle, a user device, or both by the selection and sharing of data. Upon detection of each other, the vehicle device and the user device obtain and share data. The data may be associated with the user, the user computing device, and/or the vehicle and may be stored in cloud-based services. Functionality of the vehicle and/or user device is customized to the user based on the shared data. For example, the user device may provide assisted global positioning system (GPS) data to the vehicle to reduce a time-to-fix (TTF) when determining a location of the vehicle. In other examples, settings of the vehicle are personalized to the user, and location-relevant content is downloaded to the user device.
摘要:
Commerce card techniques are described. In one or more implementations, one or more credentials are received at a commerce card, the credentials encrypted using a public key. The one or more credentials are decrypted using a private key that corresponds to the public key, the decrypting performed by a secure element implemented in tamper-resistant hardware of the commerce card without exposing the private key outside of the secure element. The decrypted one or more credentials are stored within the secure element of the commerce card such that the decrypted one or more credentials are not exposed outside of the secure element, the one or more credentials usable by the commerce card as part of a transaction to purchase a good or service.
摘要:
Loyalty offer modeling techniques are described. In one or more implementations, interaction with a loyalty service via a network is performed to model one or more loyalty offers for a use in conjunction with a merchant. Information is transmitted via the network for receipt by the loyalty service, at least a portion of the information describing consumer interaction with the merchant that pertains to the loyalty offer that is sufficient for use by the loyalty service to manage participation of the consumers with the one or more loyalty offers of the merchant.
摘要:
Advertisement management techniques are described. In one or more implementations, a plurality of identifiers are collected of advertisements communicated to respective ones of a plurality of mobile communication devices, each identifier exposed by a respective mobile communication device at a physical location of a merchant. A monetary amount is calculated to be provided to a service that was involved in providing the one or more advertisements to the mobile communication device.
摘要:
A storage aggregator is described. In an implementation, a method includes executing a module to determine whether sufficient storage is available to the module to store a particular content item and access a content storage provider over a network to open a client account to obtain additional storage when sufficient storage is not available.
摘要:
Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request received via a network. The located public key is communicated via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key.
摘要:
Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request received via a network. The located public key is communicated via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key.
摘要:
Loyalty offer techniques are described. In one or more implementations, data is received from a plurality of merchants via a network, the data describing transactions for goods or services initiated at physical locations of respective said merchants and including identifiers that uniquely identify mobile communication devices that were used to initiate the transactions. Information is updated that describes participation in one or more loyalty offers associated with the plurality of merchants using the identifiers that uniquely identify the mobile communication devices and the data that describes the transactions.
摘要:
A wireless communications signal is sampled to obtain one or more data packets. Identifying data is then retrieved from the wireless data packets that uniquely identifies a proximately located computing device that transmitted one or more of the data packets. A server computer is then queried with the identifying data to obtain additional information regarding the proximately located computing device. The additional information regarding the proximately located computing device may then be utilized to obtain data regarding an owner or user of the proximately located computing device. This information may be display within a graphical user interface and exposed to application programs.