Abstract:
A method and system and may receive an information request from a user device. An establishment list may be transmitted to the user device in response to the information request, wherein the establishment list includes at least one subscribing establishment. An establishment selection may be received and an establishment option associated with the establishment selection may then be transmitted to the user device. An option selection may then be received from the user device and an establishment record may be updated in response to the selected option, wherein the user device and the subscribing establishments have a pre-existing relationship within the establishment record.
Abstract:
A device is configured to receive an authentication credential from a user device, and is configured to authenticate the user device based on the authentication credential. The device is configured to transmit, based on authenticating the user device, a first application for establishing a tunnel that permits the user device to access a second application using an Internet protocol multimedia subsystem (IMS) network architecture. The device is configured to establish, based on the first application, a tunnel for transferring IMS traffic to or from the user device, and is configured to transfer the IMS traffic to or from the user device, using the tunnel, where transferring the IMS traffic permits the user device to access the second application.
Abstract:
A system may be configured to identify that a user device is connected to a first radio access network (“RAN”), via a first technology; and to identify that the user device is capable of accessing a second RAN, via a second technology. The system may further be configured to instruct the user device to concurrently connect to the second RAN and the first RAN, send or receive a first type of traffic via the first RAN, and send or receive a second type of traffic via the second RAN.
Abstract:
A reporting server receives reports on unicast and/or broadcast multimedia content items being accessed by respective user equipment (UE) devices through a network. The reporting server determines, for each multimedia content item, a number of UE devices that are accessing the multimedia content item and whether it is being unicast or broadcast. The reporting server ranks the multimedia content items by the number of UE devices accessing each item. In several disclosed examples, a broadcast video provisioning system switches unicast transmissions to broadcast transmissions based on the ranked list, based on this ranking and possibly on the available unicast and broadcast bandwidth.
Abstract:
A network device may be configured to receive information regarding a location of a user device; compare the location of the user device to one or more coverage areas associated with each of one or more cells that are associated with a base station of a wireless telecommunications network; determine that the user device is within a particular coverage area of a particular cell, of the one or more cells; and instruct the user device, based on determining that the user device is within the particular coverage area of the particular cell, to connect to the particular cell.
Abstract:
A network device may be configured to receive information regarding a location of a user device; compare the location of the user device to one or more coverage areas associated with each of one or more cells that are associated with a base station of a wireless telecommunications network; determine that the user device is within a particular coverage area of a particular cell, of the one or more cells; and instruct the user device, based on determining that the user device is within the particular coverage area of the particular cell, to connect to the particular cell.
Abstract:
A system may use optical character recognition (“OCR”) techniques to identify license plates or other textual information associated with vehicles. Based on this OCR information, the system may determine additional information, such as users associated with the vehicles. The system may further obtain other information, such as history information associated with the vehicles and/or the users (e.g., via an “opt-in” data collection service). Ad content may be selected based on trends associated with the users and/or vehicles, and may be presented via “smart” billboards (e.g., billboards that may dynamically display different content).
Abstract:
A system may be configured to identify that a user device is connected to a first radio access network (“RAN”), via a first technology; and to identify that the user device is capable of accessing a second RAN, via a second technology. The system may further be configured to instruct the user device to concurrently connect to the second RAN and the first RAN, send or receive a first type of traffic via the first RAN, and send or receive a second type of traffic via the second RAN.
Abstract:
A system may be configured to identify that a user device is connected to a first radio access network (“RAN”), via a first technology; and to identify that the user device is capable of accessing a second RAN, via a second technology. The system may further be configured to instruct the user device to concurrently connect to the second RAN and the first RAN, send or receive a first type of traffic via the first RAN, and send or receive a second type of traffic via the second RAN.
Abstract:
A security device may be configured to receive information regarding traffic that has been outputted by a particular user device; and compare the information regarding the traffic to security information. The security information may include device behavior information, traffic policy information, or device policy information. The security device may determine, based on the comparing, that a security threat exists with regard to the traffic; and take, based on determining that the security threat exists, remedial action with respect to the traffic. Taking the remedial action may include preventing the traffic from being forwarded to an intended destination associated with the traffic, providing an alert, regarding the security threat, to the particular user device, or providing an alert, regarding to the security threat, to another device.