Patent application number | Description | Published |
20090006264 | Methods and Systems For Secure Voice-Authenticated Electronic Payment - This application discloses systems, methods, and processes for providing a secure, voice-authenticated form of electronic payment from a device. The described exemplary system provides an infrastructure for receiving an electronic payment request, verifying the request using voice authentication, and allowing or denying the request based on the authentication or non-authentication of the user. | 01-01-2009 |
20090116703 | MULTIFACTOR MULTIMEDIA BIOMETRIC AUTHENTICATION - A device may receive a request to authenticate a user, automatically establish a multimedia session with the user in response to receiving the request, and capture a group of biometric identifiers for the user from the multimedia session. The device may further perform a group of biometric authentication operations using the analyzed or captured biometric identifiers to obtain a group of authentication scores, determine whether the user is properly authenticated based on the group of authentication scores, and transmit a message representing the determination of whether the user is properly authenticated. | 05-07-2009 |
20090161838 | AUTOMATED MULTIMEDIA CALL CENTER AGENT - An automated multimedia call center device may receive a verbal request for information from a user device during a multimedia session between the automated multimedia call center device and the user device. The automated multimedia call center device may further obtain a group of recognition results for the verbal request using speech recognition, cause at least two recognition results of the group of recognition results to be visually displayed on the user device, receive selection of one recognition result of the at least two recognition results, perform a search using the selected one recognition result to obtain multimedia content, and provide the multimedia content to the user device. | 06-25-2009 |
20090164481 | MULTIMEDIA PORTAL - A system receives, from a first user, a communication request for a second user and determines, in response to receiving the communication request, whether a trigger is satisfied. The system may aggregate, in response to determining that the trigger is satisfied, content of different types to form multimedia content and provide the multimedia content to the first user. | 06-25-2009 |
20090164580 | MULTIMEDIA OUTBOUND NOTIFICATION - A device may include a memory and a processor. The memory may store first information relating to a trigger, second information relating to multimedia content, and a destination party identifier. The memory may further associate the first information, the second information, and the one or more destination party identifiers. The processor may detect that the trigger has been satisfied, and obtain, in response to detecting that the trigger has been satisfied, the multimedia content based on the second information. The processor may also establish a session with a user device using the destination party identifier, and provide the multimedia content to the user device. | 06-25-2009 |
20090164640 | MULTIMEDIA PERSONAL ASSISTANT - A system receives, when a multimedia component is operating in a first identity, a first communication request from a first user. The first communication request includes a voice session establishment request or a video session establishment request. The system provides, in response to receiving the first communication request, first multimedia content to the first user based on the first identity and an identifier associated with the first user. The system further receives, when the multimedia component is operating in the first identity, a second communication request from a second, different user. The second communication request includes a voice session establishment request or a video session establishment request. The system provides, in response to receiving the second communication request, second, different multimedia content to the second, different user based on the first identity and an identifier associated with the second, different user. | 06-25-2009 |
20090265236 | AGGREGATION AND USE OF INFORMATION RELATING TO A USERS CONTEXT FOR PERSONALIZED ADVERTISEMENTS - Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used to provide personalized advertisements for the user. | 10-22-2009 |
20090265764 | AGGREGATION AND USE OF INFORMATION RELATING TO A USERS CONTEXT - Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used by authorized context consumers. | 10-22-2009 |
20090279681 | LOCATION- AND PRESENCE-BASED MEDIA SESSION ROUTING - A method includes defining multiple recipient candidates for a media session request; identifying a geographic location of a communication device that initiates the media session request; identifying a geographic location of each of the recipient candidates at the time of the media session request; determining the optimal recipient candidate for the media session request based on the geographic location of the communication device that initiates the media session request and the geographic location of each of the recipient candidates; and automatically routing the media session request over a network to the determined optimal recipient candidate. | 11-12-2009 |
20090291663 | EMERGENCY CALL FORKING AND NOTIFICATION - A method includes receiving subscriber configuration information for an emergency forking/notification service, the subscriber configuration information including criteria for initiating the forking/notification service and contact information for a recipient of the forking/notification service; receiving an emergency call from a calling device; routing the emergency call to a public safety answering point (PSAP); identifying the emergency call as a candidate for the emergency forking/notification service based on information associated with the calling device and the criteria for initiating the forking/notification service; and automatically initiating a forking/notification session to notify the recipient that an emergency call has been initiated from the calling device. | 11-26-2009 |
20090293079 | METHOD AND APPARATUS FOR PROVIDING ONLINE SOCIAL NETWORKING FOR TELEVISION VIEWING - An approach is provided for extending social networking to television viewing. A community of a plurality of users is created, wherein each user is logged in a device configured to present audio-video content. Presence information of one of the users in the community is determined and transmitted to a corresponding device of another one of the users. | 11-26-2009 |
20100027765 | METHOD AND SYSTEM FOR PROVIDING ASSISTED COMMUNICATIONS - An approach is provided for selectively translating a communication session and associated media among different formats based on user sensory impairment, preferred communication format, device capability, and restrictive environmental conditions. | 02-04-2010 |
20100042647 | METHOD AND SYSTEM FOR RECORDING REAL-TIME COMMUNICATIONS - An approach is provided for buffering and recording real-time communications and then delivering the recorded communication to a user-specified device in a user-specified format. | 02-18-2010 |
20100082350 | METHOD AND SYSTEM FOR PROVIDING SYNTHESIZED SPEECH - An approach providing the efficient use of speech synthesis in rendering text content as audio in a communications network. The communications network can include a telephony network and a data network in support of, for example, Voice over Internet Protocol (VoIP) services. A speech synthesis system receives a text string from either a telephony network, or a data network. The speech synthesis system determines whether a rendered audio file of the text string is stored in a database and to render the text string to output the rendered audio file, if the rendered audio is determined not to exist. The rendered audio file is stored in the database for re-use according to a hash value generated by the speech synthesis system based on the text string. | 04-01-2010 |
20100097228 | SYSTEM AND METHOD FOR MONITORING AND/OR NOTIFYING WIRELESS DEVICE USERS OF RADIATION EXPOSURE - A system and method for monitoring and/or notifying wireless device users of radiation exposure includes determining at least one of an amount of radiation and a level of radiation, a wireless device user is exposed to. The system and method may also comprise inputting at least one of a threshold amount of radiation and a threshold level of radiation. The system and method may further comprise comparing at least one of the amount of radiation with the threshold amount of radiation and the level of radiation with the threshold level of radiation. In addition, the system and method may comprise transmitting an alert message based at least in part on a result of the comparison of at least one of the amount of radiation with the threshold amount of radiation and the level of radiation with the threshold level of radiation. | 04-22-2010 |
20100106500 | METHOD AND SYSTEM FOR ENHANCING VERBAL COMMUNICATION SESSIONS - An approach is provided for enhancing verbal communication sessions. A verbal component of a communication session is converted into textual information. The converted textual information is scanned for a text string to trigger an application. The application is invoked to provide supplemental information about the textual information or to perform an action in response to the textual information for or on behalf of a party of the communication session. The supplemental information or a confirmation of the action is transmitted to the party. | 04-29-2010 |
20100106748 | METHOD AND SYSTEM FOR LOGGING AND STORING HETEROGENEOUS COMMUNICATION SESSIONS - An approach is provided for creating a workspace for automatically logging and storing heterogeneous communication sessions and for accessing this workspace from a user-designated environment. | 04-29-2010 |
20100111101 | METHOD AND SYSTEM FOR MANAGING CONTENT FOR ACCESS DURING A MEDIA SESSION - An approach is provided for managing content for access during a media session. Content or information relating to the content is received from a user over a data network. A message is generated, according to an application layer protocol, specifying an address for subsequent retrieval, by the user, of the content over a communication session established over the data network utilizing the application layer protocol. | 05-06-2010 |
20100131858 | USER INTERFACE - A device may include a user interface configured to provide audio, video or haptic output in response to received communications. The device may also include logic to identify information associated with an availability status of a user of the device and provide an audio, video or haptic output via the user interface based on the information associated with the availability status of the user of the device. | 05-27-2010 |
20100214090 | SYSTEM AND METHOD FOR PROVIDING MANAGED REMOTE MONITORING SERVICES - An approach is provided for a managed heterogeneous sensor service. A plurality of signals are received over a communication network from, respectively, a plurality of heterogeneous sensors. A plurality of instant communication sessions are established over the communication network corresponding to each of the sensors. Presence of each of the sensors is indicated over the instant communication sessions. Sensor data is generated in response to the received signals. The sensor data is transmitted over the corresponding instant communication sessions. | 08-26-2010 |
20100226490 | VIRTUAL CALL CENTER MANAGER - An approach is provided for providing a virtual call center by receiving a request for service from a user (e.g., subscriber) and staffing the virtual call center with virtual agents selected based on the service requirements of the user and the rich presence information of the virtual agents. The rich presence information includes a skill set of the virtual agent, presence status of the virtual agent, location of the virtual agent, calendar information of the virtual agent, communication capability of the virtual agent, mobility of the virtual agent, or a combination thereof. | 09-09-2010 |
20100268830 | WEIGHTING SOCIAL NETWORK RELATIONSHIPS BASED ON COMMUNICATIONS HISTORY - A method may include receiving or retrieving session information associated with one or more electronic communications that occurred outside of the social network site and included users of the social network site, comparing the session information with information associated with the users of the social network site, selecting one of the users as a user of the social network site and one or more of the users as one or more connections of the selected user of the social network site, based on the comparing, generating a weighted social graph for the selected user of the social network site, based on the session information, generating social network information based on the weighted social graph, and providing the social network information to at least one of the selected user of the social network site or the selected one or more connections of the user of the social network site. | 10-21-2010 |
20100293247 | APPLICATION OF SOCIAL NETWORKING DATA - A method may include transmitting or receiving a communication in a non-social network, where the communication is between a user and one or more other users, selecting a social network based on the communication, accessing the social network, searching for social network information related to the one or more other users, retrieving the social network information based on the searching, and providing a non-social network service based on the social network information. | 11-18-2010 |
20100293601 | SHARED DEVICE IDENTITY MANAGER - A device receives an identity claim associated with a user of a shared device, and determines whether the identity claim is valid. The device also determines one of an individual identification or a group identification to affiliate with the shared device when the identity claim is determined to be valid. The device further provides one or more preferences and privileges to the shared device based on the one of an individual identification or a group identification affiliated with the shared device. | 11-18-2010 |
20110075827 | SYSTEMS AND METHODS FOR GATHERING INFORMATION - A method for retrieving information may include receiving a telephone call from a caller and identifying a telephone number from which the telephone call was made. The method may also include retrieving information from a database based on the identified telephone number. The method may further include providing an audible message to the caller to verify whether the retrieved information is correct. | 03-31-2011 |
20110113488 | ACCESS TO USER INFORMATION - A method may include storing user information associated with a first user, where the user information includes at least two of location information, presence information, address book information or calendar information. The method may also include storing access control information identifying criteria for allowing parties to access the user information and receiving, from a first party, a request for access to at least a first portion of the user information. The method may further include determining, based on the access control information, whether the first party is authorized to access the first portion of the user information and providing access to the first portion of the user information, when it is determined that the first party is authorized to access the first portion of the user information. | 05-12-2011 |
20110136483 | LOOK-AHEAD CAPABILITY DETERMINATION VIA DEVICE PROFILES - A network device may receive a call request message. The call request message may include information identifying a user to which the call is destined. The network device may further retrieve, using the information identifying the user, information identifying a device with which the user is associated. In addition, the network device may retrieve, using the information identifying the device, a first list of codecs that the device is willing to support, and establish the call to the device using a codec from the first list of codecs. | 06-09-2011 |
20110161911 | COMPOSITE SERVICE REFACTORING - A network device may include a memory to store instructions. The network device may further include a processor to execute the instructions to obtain information relating to a loosely-coupled composite service, where the loosely-coupled composite service includes a group of services. The processor may further execute the instructions to analyze the obtained information to determine one or more design recommendations, and re-factor the loosely-coupled composite service as a target composite platform based on at least one of the one or more design recommendations. | 06-30-2011 |
20110307256 | SYSTEMS AND METHODS FOR PROVIDING NETWORK-BASED VOICE AUTHENTICATION - A system enables voice authentication via a network. The system may include an intelligent voice response engine operatively coupled to the network for receiving transaction or access requests from a plurality of telecommunications devices over the network. A speech recognition and verification services engine may be operatively coupled to the network and a database may be operatively coupled to the speech recognition and verification services engine for storing user voice print profiles. The speech recognition and verification services engine may receive a speaker verification call from the intelligent voice response engine and perform speaker verification on the received speaker verification call based on the stored user voice print profiles. The speech recognition and verification services engine may generate a verification score based upon results of the speaker verification. | 12-15-2011 |
20120011215 | MULTIMEDIA PORTAL - A system receives, from a first user, a communication request for a second user and determines, in response to receiving the communication request, whether a trigger is satisfied. The system may aggregate, in response to determining that the trigger is satisfied, content of different types to form multimedia content and provide the multimedia content to the first user. | 01-12-2012 |
20120023556 | IDENTITY MANAGEMENT AND SINGLE SIGN-ON IN A HETEROGENEOUS COMPOSITE SERVICE SCENARIO - A server device that includes a memory to store identity information for a group of users, policy information, and context information for a group user devices. The server device also includes a processor to receive, from another server device, a request for login credentials, associated with a user of a user device, that enable a third party application to access a service provider on behalf of the user, the request including identity information associated with the user and context information associated with the user device; verify the identity of the user based on a determination that particular identity information is stored in the memory; authorize the disclosure of the particular identity information based on a determination that the context information matches particular context information stored in the memory and that the policy information permits the disclosure of the particular identity information; and send the particular identity information, that includes the login credentials, to the other server device based on the verified identity and the authorized disclosure. | 01-26-2012 |
20120093303 | METHOD AND SYSTEM FOR PROVIDING CONTEXT BASED MULTIMEDIA INTERCOM SERVICES - An approach is provided for performing context based multi-modal intercom sessions. A control signal to invoke an intercom service between two or more communication devices is received. Context information associated with one or more of the communication devices is determined. An intercom mode communication session among the communication devices is established. The context information is used to customize the intercom service for one or more of the communication devices. | 04-19-2012 |
20120140083 | BROADCASTING CONTENT - User imaging terminals (such as mobile phones with camera or video functionality) may be used to take images that are used to create an image stream of an event. In one implementation, a device may receive the images and transmit the images to one or more second users. The device may receive indications, from the second users, of whether the images are approved by the second users for incorporation into an image stream; and generate the image stream, based on the images that are approved by the second users. The image stream may be transmitted to one or more display devices. | 06-07-2012 |
20120142383 | BROADCASTING CONTENT - A system is configured to: receive information identifying a geographic location of a user device of the user; identify a first recording device based on the geographic location and preferences of the user; instruct the first recording device to record content associated with the user; receive the content from the first recording device in response to instructing the first recording device to record the content; identify a first list of followers of the user based on the preferences of the user; and broadcast the content to follower devices corresponding to the first list of followers. | 06-07-2012 |
20120166261 | METHOD AND SYSTEM FOR DYNAMIC COUPON SHARING - An approach for enabling a purchaser to dynamically direct retail offers to peers within their social network based on a purchase transaction is described. A deal sharing platform maintains a list of one or more items and associated cost information corresponding to a financial transaction conducted with a vendor system. The deal sharing platform retrieves from the list an offer relating to the items based on the transaction and a selection criteria for a predetermined group of one or more recipients specified by a user. An option to distribute the offer to the predetermined group is then initiated for presentation on a communication device of the user. | 06-28-2012 |
20120212668 | BROADCASTING CONTENT - User imaging terminals (such as mobile phones with camera or video functionality) may be used to take images that are used to create an image stream of an event. In one example, a device may receive the images and transmit the images to one or more second users. The device may receive indications, from second devices associated with the second users, of whether the images are approved by the second users for incorporation into an image stream; and perform facial detection of the images to detect faces within the images. The device may generate the image stream, based on the images that are approved by the second users and based on results of the facial detection of the images; and transmit the image stream to one or more display devices. | 08-23-2012 |
20120262275 | MULTIFACTOR MULTIMEDIA BIOMETRIC AUTHENTICATION - A device may receive a request to authenticate a user, automatically establish a multimedia session with the user in response to receiving the request, and capture a group of biometric identifiers for the user from the multimedia session. The device may further perform a group of biometric authentication operations using the analyzed or captured biometric identifiers to obtain a group of authentication scores, determine whether the user is properly authenticated based on the group of authentication scores, and transmit a message representing the determination of whether the user is properly authenticated. | 10-18-2012 |
20120324072 | DYNAMIC POLICY GENERATION AND ASSIGNMENT - A computing device receives a request for a service level agreement (SLA) that indicates a specific combination of services and service levels selected from a group of available services and available service levels. The computing device generates an SLA identifier for the specific combination of services and service levels, and determines if the SLA identifier matches one of a group of stored SLA identifiers. The computing device generates a new SLA based on the specific combination of services and service levels when the SLA identifier does not match one of the group of stored SLA identifiers, and assigns an existing SLA, corresponding to one of the group of stored SLA identifiers, when the SLA identifier matches one of the group of stored SLA identifiers. | 12-20-2012 |
20130046831 | METHOD AND SYSTEM FOR PROVIDING CONTEXT-BASED VIEW CONTENT MANAGEMENT - An approach for providing context-based view content management is described. A request for content associated with a user is received. A view of a subset of the content is dynamically generated based on the request and context information associated with the user. Access to the view is provided for one or more user devices. | 02-21-2013 |
20130047227 | METHOD AND SYSTEM FOR AUTOMATED USER AUTHENTICATION FOR A PRIORITY COMMUNICATION SESSION - An approach is provided for automated user authentication for a priority communication session. An authentication platform receives a session request for establishing a priority communication session over a data network between a user device and a service platform. The authentication platform determines network information and device information associated with the session request and the user device, respectively. The authentication platform further determines user history information regarding one or more prior communication sessions of a user of the user device. The authentication platform authenticates the user based on the network information, the device information, and the user history information for establishing the priority communication session. | 02-21-2013 |
20130085968 | METHOD AND SYSTEM FOR SECURE MOBILE PRINTING - An approach is provided for secured mobile printing. A printing platform receives a printing request, generates authenticating information associated with the print request, and sends the authenticating information to a mobile device for retrieval of printed materials generated in response to the printing request. | 04-04-2013 |
20130086633 | METHOD AND SYSTEM FOR PROVIDING SECURE, MODULAR MULTIMEDIA INTERACTION - An approach is provided for the secure exchange of multimedia content through a mobile telephony device. A docking station receives a control signal from a media headset, and in response thereto determines to establish a communication link. The docking station selects one of a plurality of communication options corresponding to different networks based on the type of the communication link. The docking station initiates an authentication procedure for the communication link according to the selected communication option. Subsequent to successful authorization, the docking station receives multimedia content over the authenticated communication link, and transmits the received media signal to the media headset. | 04-04-2013 |
20130160138 | NETWORK INFORMATION COLLECTION AND ACCESS CONTROL SYSTEM - An approach is provided for collecting and controlling access to network information. A network information anonymizer receives network information associated with a device, separates the network information into anonymized network information and user identifiable information, and enables access to the anonymized network information independently of the user identifiable information based on a privacy setting. | 06-20-2013 |
20130222133 | METHOD AND SYSTEM FOR GENERATING EMERGENCY NOTIFICATIONS BASED ON AGGREGATE EVENT DATA - An approach for enabling event notifications to be directed to one or more contacts based on the acquiring of common event data by one or more wireless devices is described. A multimedia event processor receives event data corresponding to an event from a mobile device. The event data is associated with a tag for describing the event data and classified as corresponding to a level of severity based on the tag. A target destination is then determined for transmission of a notification message, the event data, or a combination thereof. | 08-29-2013 |
20130227651 | METHOD AND SYSTEM FOR MULTI-FACTOR BIOMETRIC AUTHENTICATION - An approach for enabling multi-factor biometric authentication of a user of a mobile device is described. A biometric authenticator captures, via a mobile device, first and second biometric data for a user. The biometric authentication further associates the first biometric data and the second biometric data. The biometric authenticator then initiates a multi-factor authentication procedure that utilizes the first biometric data and the second biometric data to authenticate the user based on the association. | 08-29-2013 |
20130267204 | METHOD AND SYSTEM FOR MULTI-FACTOR BIOMETRIC AUTHENTICATION BASED ON DIFFERENT DEVICE CAPTURE MODALITIES - An approach for enabling multi-factor biometric authentication of a user based on different data capture modalities of a mobile device is described. A biometric enabler receives a request for authentication of a user via a network at a mobile device of the user. The biometric authentication further initiates a capture of media associated with the user at the mobile device based on the request, wherein the capture is based on a capture condition. The biometric enabler also determines, in response to the request, whether the media is associated with different types of biometric information of the user as maintained in association with a resource that requires authentication of the user. | 10-10-2013 |
20130288656 | MULTI-MODE USER DEVICE AND NETWORK-BASED CONTROL AND MONITORING - Methods, devices, and storage media for user devices to operate in multiple modes and provide mode indicators that indicate the mode in which the user device operates, and a network that provides multimode services that include monitoring service events associated with the multiple modes, control modes of operation, and allow users to view, manage, and classify service usage information that includes service event information and correlated mode information. | 10-31-2013 |
20130322711 | MOBILE DERMATOLOGY COLLECTION AND ANALYSIS SYSTEM - A method, performed by a mobile communication device, may include obtaining one or more images, extracting one or more features from the one or more images, and determining a dermatological classification for the obtained one or more images based on the extracted one or more images and based on a dermatological analysis model. The method may further include determining a recommendation based on the determined dermatological classification and providing information about the determined dermatological classification along with the recommendation to a user of the mobile communication device. | 12-05-2013 |
20140095580 | PRIVACY-BASED DEVICE LOCATION PROXIMITY - A server is configured to receive a query from a first device, the query including an identifier, associated with a second device, information regarding a geographic radius, and information regarding a geographic position. The server is further configured to determine a first proximity based on the information regarding the geographic radius and based on the information regarding the geographic position; determine a second proximity, associated with the second device; determine a value based on the first proximity and the second proximity. The value may indicate a likelihood that the first proximity is within the second proximity. The server is further configured to provide proximity information to the first device, the proximity information including the value. | 04-03-2014 |
20140173691 | METHOD AND SYSTEM FOR AUTOMATED USER AUTHENTICATION FOR A PRIORITY COMMUNICATION SESSION - An approach is provided for automated user authentication for a priority communication session. An authentication platform receives a session request for establishing a priority communication session over a data network between a user device and a service platform. The authentication platform determines network information and device information associated with the session request and the user device, respectively. The authentication platform further determines user history information regarding one or more prior communication sessions of a user of the user device. The authentication platform authenticates the user based on the network information, the device information, and the user history information for establishing the priority communication session. | 06-19-2014 |
20140237564 | SECURE ACCESS CREDENTIAL UPDATING - One or more first servers may receive a token, generated by a second server based on the second server validating an authorization parameter received by a third server; receive, from the second server, a token parameter, associated with the token and being associated with the authorization parameter and identifying a credential associated with the third server; receive, from the third server, a request to update the credential, the request including the token; validate the token; form an updated credential based on the token parameter and based on validating the token; and provide the updated credential to the third server. The credential may be replaced, by the third server, with the updated credential without interaction with a user of the third server. | 08-21-2014 |
20140351368 | DYNAMIC CONSENT ENGINE - A system may be configured to request, from a user device, consent for an application server to output one or more messages to the user device. When requesting the consent, the system may output a consent message associated with the application server. The system may receive, from the user device, an indication of consent, the indication being sent by the user device based on the consent message; and enforce, by the consent gateway device, the consent indicated by the user device. When enforcing the consent, the system may allow or disallow application traffic, from the application server, based on the indication of consent. The application traffic may be associated with the user device. | 11-27-2014 |
20140359722 | METHOD AND APPARATUS FOR PROVIDING MULTI-SENSOR MULTI-FACTOR IDENTITY VERIFICATION - An approach for multi-sensor multi-factor identity verification. An identity verification platform determines biometric data associated with a user from one or more sources. The one or more sources are associated with one or more respective network sessions. The platform generates one or more respective trust scores for the one or more sources, the one or more respective network sessions, or a combination thereof based on one or more contextual parameters associated with the user, the one or more sources, the one or more respective network sessions, or a combination thereof. Then the platform verifies an identity of the user based on the biometric data and the one or more respective trust scores. | 12-04-2014 |
20140380466 | METHOD AND APPARATUS FOR PROVIDING HIERARCHICAL PATTERN RECOGNITION OF COMMUNICATION NETWORK DATA - An approach for providing hierarchical pattern recognition of communication network data is described. A network security brain platform may process communication network data associated with one or more levels of communication network hierarchies. The network security brain platform may further determine a network information pattern of the communication network data based on one or more network information pattern models. The network security brain platform may also identify a network service issue based on the determined network information pattern. The network information pattern may include a network security pattern. | 12-25-2014 |
20150032795 | ONE TOUCH MACHINE TO MACHINE DEVICE CONNECTION - A computing device may execute a device connection application on a processor of the computing device to provide operations including establishing an ad-hoc data connection between the computing device and a machine-to-machine device, the computing device configured to set up the machine-to-machine device to interact with a network-based service using a user account of the network-based service; receiving device information from the machine-to-machine device over the established ad-hoc data connection; and connecting the machine-to-machine device to the network-based service based on the device information received from the machine-to-machine device and according to authentication of the computing device as being associated with the user account. The computing device may further be configured to authenticate and authorize a user to configure the machine-to-machine device to join the network and network-based service. | 01-29-2015 |