Abstract:
Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used to provide personalized advertisements for the user.
Abstract:
A device may receive a connection request including a digital certificate from an endpoint for establishing a secure connection for a communication, the digital certificate including a digital certificate chain identifying one or more certificate authorities associated with the digital certificate. The device may determine whether the digital certificate is valid based on the digital certificate chain identifying one or more certificate authorities trusted by the device. The device may determine whether the connection request includes a valid token. The device may generate a token based on the digital certificate being valid and an absence of a valid token included in the connection request. The device may associate the token with the digital certificate. The device may distribute the token to the endpoint. The device may establish the secure connection with the endpoint using the token associated with the digital certificate.
Abstract:
An approach for providing hierarchical pattern recognition of communication network data is described. A network security brain platform may process communication network data associated with one or more levels of communication network hierarchies. The network security brain platform may further determine a network information pattern of the communication network data based on one or more network information pattern models. The network security brain platform may also identify a network service issue based on the determined network information pattern. The network information pattern may include a network security pattern.
Abstract:
An approach for enabling multi-factor biometric authentication of a user based on different data capture modalities of a mobile device is described. A biometric enabler receives a request for authentication of a user via a network at a mobile device of the user. The biometric authentication further initiates a capture of media associated with the user at the mobile device based on the request, wherein the capture is based on a capture condition. The biometric enabler also determines, in response to the request, whether the media is associated with different types of biometric information of the user as maintained in association with a resource that requires authentication of the user.
Abstract:
A system may be configured to request, from a user device, consent for an application server to output one or more messages to the user device. When requesting the consent, the system may output a consent message associated with the application server. The system may receive, from the user device, an indication of consent, the indication being sent by the user device based on the consent message; and enforce, by the consent gateway device, the consent indicated by the user device. When enforcing the consent, the system may allow or disallow application traffic, from the application server, based on the indication of consent. The application traffic may be associated with the user device.
Abstract:
A method may include performing secure device configuration, via a configuration service manager device, for a SIP user device. The method includes monitoring, via the configuration service manager device, the SIP user device for device authentication problems, configuration file download problems, device registration problems and device third party registration problems. The method may also include detecting the device authentication problems, and logging and reporting the detected device authentication problems. The method may also include automated testing of the device and logging and reporting of detected device test problems. The method further includes resolving the detected device authentication, registration or testing problems.
Abstract:
Techniques described herein may provide for affiliation and disaffiliation of devices, such as office communication devices, associated with a user. The affiliation/disaffiliation may be performed using a mobile device (e.g., a smart phone). In one implementation, a method may include receiving a request to affiliate a user with one or more office devices; and receiving context data, from a mobile device, relating to a current context of the mobile device. The method may further include determining, based on the context data, to authorize the affiliation of the user with the one or more office devices; and provisioning, based on the determination to authorize the affiliation, the one or more office devices to customize the one or more office devices for the user.
Abstract:
A computing device may execute a device connection application on a processor of the computing device to provide operations including establishing an ad-hoc data connection between the computing device and a machine-to-machine device, the computing device configured to set up the machine-to-machine device to interact with a network-based service using a user account of the network-based service; receiving device information from the machine-to-machine device over the established ad-hoc data connection; and connecting the machine-to-machine device to the network-based service based on the device information received from the machine-to-machine device and according to authentication of the computing device as being associated with the user account. The computing device may further be configured to authenticate and authorize a user to configure the machine-to-machine device to join the network and network-based service.
Abstract:
A server may receive a query from a query device. The query may include an identifier that identifies a user device, information regarding a geographic radius, and information regarding a geographic position. The server may determine a first proximity area based on the geographic radius and the geographic position indicated by the query. The server may determine a second proximity area that represents an area in which the user device may be included. The server may determine a value that indicates a likelihood that the first proximity area is within the second proximity area. The server may provide information to the query device indicating the value.
Abstract:
A method and system are disclosed that enables a customer to specify when services should be provisioned on a “just-in-time” or elastic basis. By dynamically specifying when services should be received, a customer is better able to suit such services to customer needs, thereby allowing the customer to only pay for what is actually used. Using an on-demand portal, a customer may prescribe when (or the degree to which) services should be enabled, and/or when the devices that utilize those services, or the services themselves, need to be monitored. Accordingly, the customer is given flexibility to dictate when services are required or when their services or devices require monitoring by a service provider, and the service provider is given the flexibility to tailor the amount of resources required to support and manage the customer's demands, thereby enabling more efficient use of both the customer's and service provider's resources.