Patent application number | Description | Published |
20110113488 | ACCESS TO USER INFORMATION - A method may include storing user information associated with a first user, where the user information includes at least two of location information, presence information, address book information or calendar information. The method may also include storing access control information identifying criteria for allowing parties to access the user information and receiving, from a first party, a request for access to at least a first portion of the user information. The method may further include determining, based on the access control information, whether the first party is authorized to access the first portion of the user information and providing access to the first portion of the user information, when it is determined that the first party is authorized to access the first portion of the user information. | 05-12-2011 |
20110161911 | COMPOSITE SERVICE REFACTORING - A network device may include a memory to store instructions. The network device may further include a processor to execute the instructions to obtain information relating to a loosely-coupled composite service, where the loosely-coupled composite service includes a group of services. The processor may further execute the instructions to analyze the obtained information to determine one or more design recommendations, and re-factor the loosely-coupled composite service as a target composite platform based on at least one of the one or more design recommendations. | 06-30-2011 |
20120023556 | IDENTITY MANAGEMENT AND SINGLE SIGN-ON IN A HETEROGENEOUS COMPOSITE SERVICE SCENARIO - A server device that includes a memory to store identity information for a group of users, policy information, and context information for a group user devices. The server device also includes a processor to receive, from another server device, a request for login credentials, associated with a user of a user device, that enable a third party application to access a service provider on behalf of the user, the request including identity information associated with the user and context information associated with the user device; verify the identity of the user based on a determination that particular identity information is stored in the memory; authorize the disclosure of the particular identity information based on a determination that the context information matches particular context information stored in the memory and that the policy information permits the disclosure of the particular identity information; and send the particular identity information, that includes the login credentials, to the other server device based on the verified identity and the authorized disclosure. | 01-26-2012 |
20120324072 | DYNAMIC POLICY GENERATION AND ASSIGNMENT - A computing device receives a request for a service level agreement (SLA) that indicates a specific combination of services and service levels selected from a group of available services and available service levels. The computing device generates an SLA identifier for the specific combination of services and service levels, and determines if the SLA identifier matches one of a group of stored SLA identifiers. The computing device generates a new SLA based on the specific combination of services and service levels when the SLA identifier does not match one of the group of stored SLA identifiers, and assigns an existing SLA, corresponding to one of the group of stored SLA identifiers, when the SLA identifier matches one of the group of stored SLA identifiers. | 12-20-2012 |
20130046831 | METHOD AND SYSTEM FOR PROVIDING CONTEXT-BASED VIEW CONTENT MANAGEMENT - An approach for providing context-based view content management is described. A request for content associated with a user is received. A view of a subset of the content is dynamically generated based on the request and context information associated with the user. Access to the view is provided for one or more user devices. | 02-21-2013 |
20130047227 | METHOD AND SYSTEM FOR AUTOMATED USER AUTHENTICATION FOR A PRIORITY COMMUNICATION SESSION - An approach is provided for automated user authentication for a priority communication session. An authentication platform receives a session request for establishing a priority communication session over a data network between a user device and a service platform. The authentication platform determines network information and device information associated with the session request and the user device, respectively. The authentication platform further determines user history information regarding one or more prior communication sessions of a user of the user device. The authentication platform authenticates the user based on the network information, the device information, and the user history information for establishing the priority communication session. | 02-21-2013 |
20130085968 | METHOD AND SYSTEM FOR SECURE MOBILE PRINTING - An approach is provided for secured mobile printing. A printing platform receives a printing request, generates authenticating information associated with the print request, and sends the authenticating information to a mobile device for retrieval of printed materials generated in response to the printing request. | 04-04-2013 |
20130160138 | NETWORK INFORMATION COLLECTION AND ACCESS CONTROL SYSTEM - An approach is provided for collecting and controlling access to network information. A network information anonymizer receives network information associated with a device, separates the network information into anonymized network information and user identifiable information, and enables access to the anonymized network information independently of the user identifiable information based on a privacy setting. | 06-20-2013 |
20130222133 | METHOD AND SYSTEM FOR GENERATING EMERGENCY NOTIFICATIONS BASED ON AGGREGATE EVENT DATA - An approach for enabling event notifications to be directed to one or more contacts based on the acquiring of common event data by one or more wireless devices is described. A multimedia event processor receives event data corresponding to an event from a mobile device. The event data is associated with a tag for describing the event data and classified as corresponding to a level of severity based on the tag. A target destination is then determined for transmission of a notification message, the event data, or a combination thereof. | 08-29-2013 |
20130288656 | MULTI-MODE USER DEVICE AND NETWORK-BASED CONTROL AND MONITORING - Methods, devices, and storage media for user devices to operate in multiple modes and provide mode indicators that indicate the mode in which the user device operates, and a network that provides multimode services that include monitoring service events associated with the multiple modes, control modes of operation, and allow users to view, manage, and classify service usage information that includes service event information and correlated mode information. | 10-31-2013 |
20140090010 | CHANGING LEVELS OF QUALITY OF SERVICE - A first network device is configured to receive information regarding a quality of service application that is part of an application stored on a device. The first network device is configured to further receive a request for a network to apply the level of quality service to the application stored on the device. The first network device is configured to further send an authorization request to the second network device. The first network device is configured to further receive an authorization result from the second network device. The first network device is configured send a first message to a third network device and receiving a response from the third network device that the level of quality of service is applied to the information; and send a message to the provider that the level of quality of service is applied to the information. | 03-27-2014 |
20140095580 | PRIVACY-BASED DEVICE LOCATION PROXIMITY - A server is configured to receive a query from a first device, the query including an identifier, associated with a second device, information regarding a geographic radius, and information regarding a geographic position. The server is further configured to determine a first proximity based on the information regarding the geographic radius and based on the information regarding the geographic position; determine a second proximity, associated with the second device; determine a value based on the first proximity and the second proximity. The value may indicate a likelihood that the first proximity is within the second proximity. The server is further configured to provide proximity information to the first device, the proximity information including the value. | 04-03-2014 |
20140173691 | METHOD AND SYSTEM FOR AUTOMATED USER AUTHENTICATION FOR A PRIORITY COMMUNICATION SESSION - An approach is provided for automated user authentication for a priority communication session. An authentication platform receives a session request for establishing a priority communication session over a data network between a user device and a service platform. The authentication platform determines network information and device information associated with the session request and the user device, respectively. The authentication platform further determines user history information regarding one or more prior communication sessions of a user of the user device. The authentication platform authenticates the user based on the network information, the device information, and the user history information for establishing the priority communication session. | 06-19-2014 |
20140179266 | SHARED DATA MONITOR - A method includes identifying a data volume allocation associated with a user account from a shared data volume allocation, identifying previous data consumption corresponding to the data volume allocation by the user account, and identifying a current data usage rate associated with the user account. The method also includes identifying a data usage threshold associated with the user account. A projected data usage is determined based on the current data usage rate and the previous data consumption. The method includes determining whether the projected data usage exceeds the data usage threshold, and, if the projected data usage exceeds the data usage threshold, sending a notification indicating that the data usage is projected to exceed the data usage threshold to at least one account associated with the shared data plan. The method further includes performing an action to limit data consumption below the data usage threshold. | 06-26-2014 |
20140359722 | METHOD AND APPARATUS FOR PROVIDING MULTI-SENSOR MULTI-FACTOR IDENTITY VERIFICATION - An approach for multi-sensor multi-factor identity verification. An identity verification platform determines biometric data associated with a user from one or more sources. The one or more sources are associated with one or more respective network sessions. The platform generates one or more respective trust scores for the one or more sources, the one or more respective network sessions, or a combination thereof based on one or more contextual parameters associated with the user, the one or more sources, the one or more respective network sessions, or a combination thereof. Then the platform verifies an identity of the user based on the biometric data and the one or more respective trust scores. | 12-04-2014 |
20150032795 | ONE TOUCH MACHINE TO MACHINE DEVICE CONNECTION - A computing device may execute a device connection application on a processor of the computing device to provide operations including establishing an ad-hoc data connection between the computing device and a machine-to-machine device, the computing device configured to set up the machine-to-machine device to interact with a network-based service using a user account of the network-based service; receiving device information from the machine-to-machine device over the established ad-hoc data connection; and connecting the machine-to-machine device to the network-based service based on the device information received from the machine-to-machine device and according to authentication of the computing device as being associated with the user account. The computing device may further be configured to authenticate and authorize a user to configure the machine-to-machine device to join the network and network-based service. | 01-29-2015 |