Abstract:
A method may include performing secure device configuration, via a configuration service manager device, for a SIP user device. The method includes monitoring, via the configuration service manager device, the SIP user device for device authentication problems, configuration file download problems, device registration problems and device third party registration problems. The method may also include detecting the device authentication problems, and logging and reporting the detected device authentication problems. The method may also include automated testing of the device and logging and reporting of detected device test problems. The method further includes resolving the detected device authentication, registration or testing problems.
Abstract:
Techniques described herein may provide for affiliation and disaffiliation of devices, such as office communication devices, associated with a user. The affiliation/disaffiliation may be performed using a mobile device (e.g., a smart phone). In one implementation, a method may include receiving a request to affiliate a user with one or more office devices; and receiving context data, from a mobile device, relating to a current context of the mobile device. The method may further include determining, based on the context data, to authorize the affiliation of the user with the one or more office devices; and provisioning, based on the determination to authorize the affiliation, the one or more office devices to customize the one or more office devices for the user.
Abstract:
A server may receive a query from a query device. The query may include an identifier that identifies a user device, information regarding a geographic radius, and information regarding a geographic position. The server may determine a first proximity area based on the geographic radius and the geographic position indicated by the query. The server may determine a second proximity area that represents an area in which the user device may be included. The server may determine a value that indicates a likelihood that the first proximity area is within the second proximity area. The server may provide information to the query device indicating the value.
Abstract:
A user device may identify a received a signal indicating an incoming call; determine that another user device has answered the call; generate call log information that indicates that the other user device has answered the call; and store or output the generated call log information. Additionally, or alternatively, a set of user devices may receive a ring signal indicating an incoming call; a particular user device, in the set of user devices, may answer the call; and another user device, in the set of user devices, may store a unified call log. The unified call log may indicate that the particular user device answered the call, and may further indicate that the other user device did not miss the call.
Abstract:
Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used to provide personalized advertisements for the user.
Abstract:
A system may be configured to receive an indication that a call has been placed (e.g., to a call center), and may provide a customized visual interface. The customized visual interface may include information that is potentially relevant to a user who has placed the call, and may be based on, for example, a user profile or history information, a purchase history of goods or services offered by an entity associated with the called party. The customized visual interface may allow the user to more quickly satisfy the purposes of his or her call than through traditional audio or touchtone menus.
Abstract:
A device may receive a request for a collaboration session. The device may authenticate a user for the collaboration session. The device may generate a trust-score associated with the collaboration session based on authenticating the user. The trust-score may be associated with a security level for the collaboration session. The security level may be associated with one or more capabilities of the collaboration session. The device may assign the user to a session role associated with the collaboration session. The session role may be associated with the one or more capabilities of the collaboration session. The device may provide information associated with the collaboration session based on the security level for the collaboration session and/or the session role assigned to the user.
Abstract:
An approach is provided for causing an extension of secure emergency network resources via one or more trusted point of presence. The approach involves determining a networking context, wherein the networking context initiates a request to join an extension mesh network to a currently trusted network. The approach also involves determining a target network trust level associated with the networking context, the currently trusted network, or a combination thereof. The approach further involves selecting the extension mesh network based on the target network trust level. The approach also involves initiating a joining of the extension mesh network to the currently trusted network.
Abstract:
A user device may identify a received a signal indicating an incoming call; determine that another user device has answered the call; generate call log information that indicates that the other user device has answered the call; and store or output the generated call log information. Additionally, or alternatively, a set of user devices may receive a ring signal indicating an incoming call; a particular user device, in the set of user devices, may answer the call; and another user device, in the set of user devices, may store a unified call log. The unified call log may indicate that the particular user device answered the call, and may further indicate that the other user device did not miss the call.
Abstract:
An approach is provided for automated user authentication for a priority communication session. An authentication platform receives a session request for establishing a priority communication session over a data network between a user device and a service platform. The authentication platform determines network information and device information associated with the session request and the user device, respectively. The authentication platform further determines user history information regarding one or more prior communication sessions of a user of the user device. The authentication platform authenticates the user based on the network information, the device information, and the user history information for establishing the priority communication session.