Abstract:
A user device may request access to a service provided by an application server. The application server may request that an identity server authenticate the user device. The identity server may have a network authentication system assist with the authentication of the user device. Once authenticated by the network authentication system, the application server may be informed and may grant the user device access to the requested service. Additionally, the identity server may help determine whether the user device is a security threat by comparing user information from the network authentication system with user information from the application server. Additionally, the network authentication system may provide the application server with user information to enable the application server to automatically register the user device for a particular service.
Abstract:
A network device provides, to a user device, an application for managing viewing and sharing of content available via an Internet service provider, and assigns a unique code for a user of the user device. The network device provides a catalog of available content items that includes toll-free data (TFD) content items with a different TFD uniform resource locator (URL) for each TFD content item in the catalog of available content items. The network device receives a user's selection, from the catalog, of a TFD content item to share, and generates a sharing URL based on a TFD URL for the selected TFD content item and the unique sharing code. The network device provides the sharing URL to the user device for sharing with other users.
Abstract:
A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device. The device may obtain a file key for encrypting the file and a security key for encrypting the file key. The security key may be obtained based on the unique identifier. The device may encrypt the file, using the file key, to create an encrypted file. The device may encrypt the file key, using the security key, to create an encrypted file key. The device may provide the encrypted file and the encrypted file key for storage by a storage device.
Abstract:
Techniques described herein may be used to enable a user device (e.g., a smartphone, a tablet computer, etc.) to access network services without having to be connected to a network (e.g., a wireless telecommunications network). A first user device may communicate discovery packets in search of other user devices to which the first user device may connect. The first user device may identify a second user device (as a result of sending the discover packets). The first and second user devices may obtain configuration parameters (e.g., a communication channel allocation, encryption keys, synchronization information, etc.) and may establish a D2D connection based on the configuration parameters. The D2D connection may enable the first and second user devices to communicate with another as though the user devices were connected to a wireless telecommunications network (e.g., via telephone calls, video calls, simple messaging services (SMS) messages, instant messages, etc.).
Abstract:
A server device may communicate with a user device by engaging in a telephone call with the user device, by providing a webpage to the user device, or in another way. The user device may communicate a request to the server device for a particular web service, such as a mapping service, a banking service, technical support, customer service, etc., and the server device may communicate the request to an instant access device that may cause the user device to instantly access the web service, whether by automatically downloading and installing a mobile application with the web service or by automatically accessing a web page. In some implementations, the instant access device may authenticate the user device in order to provide the user device with access to the web server.
Abstract:
A user device may request access to a service provided by an application server. The application server may request that an identity server authenticate the user device. The identity server may have a network authentication system assist with the authentication of the user device. Once authenticated by the network authentication system, the application server may be informed and may grant the user device access to the requested service. Additionally, the identity server may help determine whether the user device is a security threat by comparing user information from the network authentication system with user information from the application server. Additionally, the network authentication system may provide the application server with user information to enable the application server to automatically register the user device for a particular service.
Abstract:
Techniques described herein may allow for the automatic downloading, installing, and/or launching of applications (commonly referred to as “apps”), during the presentation of content. For example, a user device (e.g., a smart phone) may play video content, such as a trailer for a video game app. During the presentation of the trailer, a button, to install the video game app, may be presented. Based on a single click of the button, the video game app may be downloaded and installed. The app may further be launched as soon as it is installed, and/or as soon as the trailer ends. Some techniques described herein may be applicable for the automatic downloading, installing, and/or launching of an application on a wearable device while another device presents content, or vice versa.
Abstract:
A server device may communicate with a user device by engaging in a telephone call with the user device, by providing a webpage to the user device, or in another way. The user device may communicate a request to the server device for a particular web service, such as a mapping service, a banking service, technical support, customer service, etc., and the server device may communicate the request to an instant access device that may cause the user device to instantly access the web service, whether by automatically downloading and installing a mobile application with the web service or by automatically accessing a web page. In some implementations, the instant access device may authenticate the user device in order to provide the user device with access to the web server.
Abstract:
A first server device may receive, from a second server device, a unique identifier (ID) relates to content stored by the second server device; determine a policy based on the unique ID; generate a policy tag identifying the determined policy; and output the policy tag to the second server device. Outputting the policy tag may cause the second server device to apply the policy tag to a packet associated with the content, and output the packet towards a requesting user device that requests the content.
Abstract:
A method, a system, and a non-transitory storage medium provide an IP address and port-based identity service in which an anchor node of a wireless network stores identity information pertaining to a user of a mobile device in a centralized database. An authenticated and authorized web server may query the centralized database using the IP address or the IP address and port of an end device connected to the web server. The web server may obtain identity information pertaining to the user, such as a mobile telephone number.