摘要:
A method and system operative to preclude content providers from tracking users, while still allowing content providers to communicate to users. An intermediary, such as an access channel provider for instance, gives content providers non-repeating user-identification-tokens, each of which a content provider can use as a key to access an intermediary resource that facilitates a communication to the user, without revealing the user's identity to the content provider.
摘要:
A system for authenticating and/or authorizing users of a service includes one communication interface with an access communication channel and another communication interface with a confirmation communication channel. Requests for a user to access a service are received over the access communication channel, and confirmation codes for the user are received over a trusted confirmation channel, such as an SMS text messaging system. Confirmation codes may be received from the user requesting access to the service or by a third party acting as a gatekeeper to the service. The system tests the validity of received confirmation codes, and enables the user to access the service if a valid confirmation code is received.
摘要:
A system for authenticating and/or authorizing users of a service includes one communication interface with an access communication channel and another communication interface with a confirmation communication channel. Requests for a user to access a service are received over the access communication channel, and confirmation codes for the user are received over a trusted confirmation channel, such as an SMS text messaging system. Confirmation codes may be received from the user requesting access to the service or by a third party acting as a gatekeeper to the service. The system tests the validity of received confirmation codes, and enables the user to access the service if a valid confirmation code is received.
摘要:
Embodiments of the present invention provide systems, methods, and computer-readable media for initiating anonymous communication between a first user and a second user. In particular, an anonymous communication request is transmitted from a first user to a session management node. The anonymous communication request may include search criteria provided by the first user. Based on the search criteria, the session management node many generate a query to a profile server. The profile server may identify a second user based on the search criteria provided by the first user. Additionally, the profile server may provide an identifier of the second user to the session management node. Further, the session management node may initiate anonymous communication between the first user and the second user.
摘要:
A method, system, and medium are provided for applying call events in association with user devices based on priority levels is provided. One embodiment of the method includes referencing an active event level associated with a user device. The active event level indicates an extent of call events, such as dropped calls and/or blocked calls, in association with the user device. When it is determined that the active event level is unacceptable, a priority level associated with the user device is adjusted based on the active event level to reconcile the unacceptable active event level.
摘要:
Embodiments of the present invention provide systems, methods, and computer-readable media for providing supplemental information to callers during a call. In embodiments, a call is initiated between a first caller and a second caller. Information communicated during the call is monitored to determine that a keyword has been spoken. Supplemental information associated with the keyword is identified, and the supplemental information is provided to the first caller during the call.
摘要:
Methods, systems, and computer-readable media are provided for providing enhanced video voice messages from a first mobile device to a second mobile device. The method comprises providing user preferences from a first mobile device to a video enhancement component. A video voice message is generated at the first mobile device. Additionally, the video voice message is communicated to the video enhancement component. Further, the video voice message is enhanced based on the user preferences from the first mobile device. The enhanced video voice message is then provided to the second mobile device.
摘要:
When a failure notification is received that was transmitted from a service node indicating a failure of a wireless communication device to pass an authentication when attempting to register with a communication network, device information, network data, and a user profile associated with the wireless communication device is retrieved and processed to generate a network access score for the wireless communication device. If the network access score exceeds a priority threshold, a priority notification is transferred instructing the service node to bypass the authentication for the wireless communication device. If the network access score exceeds a legitimate user threshold but does not exceed the priority threshold, an access notification is transferred instructing the service node to bypass the authentication for the wireless communication device, and subsequent usage of the wireless communication device is monitored for fraudulent activity. If the network access score does not exceed the legitimate user threshold, a suspect notification is transferred instructing the service node to maintain the authentication for the wireless communication device.
摘要:
Methods are provided for preventing the delivery of undesired voicemails, which may occur when a voicemail is being left for a given user, and the given user calls back the user currently leaving the voicemail. An incoming call is received while a communications device is facilitating a recording of the voicemail. A voicemail system is instructed to prevent the voicemail from being delivered and also to terminate a suspended call corresponding to the recording of the voicemail. The incoming call is connected.
摘要:
A method and system for dynamic selection of user plane or control plane signaling for mobile station location determination. A positioning system receives a request for the location of a mobile station and then makes a determination, based on one or more factors, of whether to employ user plane signaling or control plane signaling to obtain mobile station location data. The factors may include mobile station capability, mobile station call state, mobile station support for user plane signaling, mobile station support for simultaneous voice and data communication, time, precision of requested location, subscriber preference, failure of control plane or user plane signaling, and preference specified by the request, among others. Given the determination, the positioning system then employs the selected signaling mechanism.