Abstract:
Techniques described herein may allow for the granting and revoking of temporary access, for User Equipment (“UE”) devices, to a wireless network. Multiple UEs may be registered with a group, where only a limited quantity of UEs in the group may be active at a given time. Once granted access, a UE device may have limits on the access, such as a maximum duration and/or a data limit. When a particular UE device, in a group, requests access to the network, a Group Device Authentication Server (“GDAS”) may determine whether to grant the access, based on how many other UEs in the group (if any) currently have access. The GDAS may also revoke the access once granted (e.g., once the maximum duration has been reached).
Abstract:
A mobile device may receive user input for requesting personal information for a subject in proximity of a mobile device and based on the user input, selecting one of available functions. The functions may include a first function for obtaining personal information using a first identifier. The functions may also include a second function for obtaining the personal information using the first identifier. The mobile device may output the personal information as an image to a display or as speech to speaker.
Abstract:
A reporting server receives reports on unicast and/or broadcast multimedia content items being accessed by respective user equipment (UE) devices through a network. The reporting server determines, for each multimedia content item, a number of UE devices that are accessing the multimedia content item and whether it is being unicast or broadcast. The reporting server ranks the multimedia content items by the number of UE devices accessing each item. In several disclosed examples, a broadcast video provisioning system switches unicast transmissions to broadcast transmissions based on the ranked list, based on this ranking and possibly on the available unicast and broadcast bandwidth.
Abstract:
A first network device is configured to receive a request for content from a user device, determine that the user device is not authenticated, and send information to the user device that the user device requires authentication. The first network device is configured further to receive authentication information for the user device from a second network device. The first network device is configured further to generate a secret key, authenticate the user device. The first network device is configured further to request user knowledge information from the user device, validate the user knowledge information and send the content to the user device.
Abstract:
A network device may be configured to receive information regarding a location of a user device; compare the location of the user device to one or more coverage areas associated with each of one or more cells that are associated with a base station of a wireless telecommunications network; determine that the user device is within a particular coverage area of a particular cell, of the one or more cells; and instruct the user device, based on determining that the user device is within the particular coverage area of the particular cell, to connect to the particular cell.
Abstract:
A network device may be configured to receive information regarding a location of a user device; compare the location of the user device to one or more coverage areas associated with each of one or more cells that are associated with a base station of a wireless telecommunications network; determine that the user device is within a particular coverage area of a particular cell, of the one or more cells; and instruct the user device, based on determining that the user device is within the particular coverage area of the particular cell, to connect to the particular cell.