Abstract:
A method includes identifying a data volume allocation associated with a user account from a shared data volume allocation, identifying previous data consumption corresponding to the data volume allocation by the user account, and identifying a current data usage rate associated with the user account. The method also includes identifying a data usage threshold associated with the user account. A projected data usage is determined based on the current data usage rate and the previous data consumption. The method includes determining whether the projected data usage exceeds the data usage threshold, and, if the projected data usage exceeds the data usage threshold, sending a notification indicating that the data usage is projected to exceed the data usage threshold to at least one account associated with the shared data plan. The method further includes performing an action to limit data consumption below the data usage threshold.
Abstract:
A first network device is configured to receive information regarding a quality of service application that is part of an application stored on a device. The first network device is configured to further receive a request for a network to apply the level of quality service to the application stored on the device. The first network device is configured to further send an authorization request to the second network device. The first network device is configured to further receive an authorization result from the second network device. The first network device is configured send a first message to a third network device and receiving a response from the third network device that the level of quality of service is applied to the information; and send a message to the provider that the level of quality of service is applied to the information.
Abstract:
An approach is provided for automated user authentication for a priority communication session. An authentication platform receives a session request for establishing a priority communication session over a data network between a user device and a service platform. The authentication platform determines network information and device information associated with the session request and the user device, respectively. The authentication platform further determines user history information regarding one or more prior communication sessions of a user of the user device. The authentication platform authenticates the user based on the network information, the device information, and the user history information for establishing the priority communication session.
Abstract:
A computing device may execute a device connection application on a processor of the computing device to provide operations including establishing an ad-hoc data connection between the computing device and a machine-to-machine device, the computing device configured to set up the machine-to-machine device to interact with a network-based service using a user account of the network-based service; receiving device information from the machine-to-machine device over the established ad-hoc data connection; and connecting the machine-to-machine device to the network-based service based on the device information received from the machine-to-machine device and according to authentication of the computing device as being associated with the user account. The computing device may further be configured to authenticate and authorize a user to configure the machine-to-machine device to join the network and network-based service.
Abstract:
An approach for multi-sensor multi-factor identity verification. An identity verification platform determines biometric data associated with a user from one or more sources. The one or more sources are associated with one or more respective network sessions. The platform generates one or more respective trust scores for the one or more sources, the one or more respective network sessions, or a combination thereof based on one or more contextual parameters associated with the user, the one or more sources, the one or more respective network sessions, or a combination thereof. Then the platform verifies an identity of the user based on the biometric data and the one or more respective trust scores.
Abstract:
A computing device may execute a device connection application on a processor of the computing device to provide operations including establishing an ad-hoc data connection between the computing device and a machine-to-machine device, the computing device configured to set up the machine-to-machine device to interact with a network-based service using a user account of the network-based service; receiving device information from the machine-to-machine device over the established ad-hoc data connection; and connecting the machine-to-machine device to the network-based service based on the device information received from the machine-to-machine device and according to authentication of the computing device as being associated with the user account. The computing device may further be configured to authenticate and authorize a user to configure the machine-to-machine device to join the network and network-based service.
Abstract:
A server may receive a query from a query device. The query may include an identifier that identifies a user device, information regarding a geographic radius, and information regarding a geographic position. The server may determine a first proximity area based on the geographic radius and the geographic position indicated by the query. The server may determine a second proximity area that represents an area in which the user device may be included. The server may determine a value that indicates a likelihood that the first proximity area is within the second proximity area. The server may provide information to the query device indicating the value.