Abstract:
A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device. The device may obtain a file key for encrypting the file and a security key for encrypting the file key. The security key may be obtained based on the unique identifier. The device may encrypt the file, using the file key, to create an encrypted file. The device may encrypt the file key, using the security key, to create an encrypted file key. The device may provide the encrypted file and the encrypted file key for storage by a storage device.
Abstract:
A device may receive an indication that a first device, a second device, and a third device are within communication range of a target device. The first device may be outside of communication range of a positioning system that provides information for determining a location. The target device may be outside of communication range of the positioning system and outside of communication range of three or more devices which are within communication range of the positioning system. The device may receive information that identifies a first location associated with the first device, a second location associated with the second device, and a third location associated with the third device. The device may determine a target device location based on the information that identifies the first location, the second location, and the third location. The device may provide or store information that identifies the target device location.
Abstract:
A device may receive a request for a mobile device to obtain an application. The request may include a mobile device identifier for the mobile device. The device may send, to the mobile device, a link to a web page. The device may receive, from the mobile device, a request for the web page. The device may send, to the mobile device, a redirect to a software distribution platform to obtain the application from the software distribution platform. The device may receive a registration identifier for the mobile device after the mobile device obtains the application from the software distribution platform. The device may send, to a message server, a request for a message to be sent to the mobile device. The request may be based on the registration identifier and the application.
Abstract:
A device may receive a request for a mobile device to obtain an application. The request may include a mobile device identifier for the mobile device. The device may send, to the mobile device, a link to a web page. The device may receive, from the mobile device, a request for the web page. The device may send, to the mobile device, a redirect to a software distribution platform to obtain the application from the software distribution platform. The device may receive a registration identifier for the mobile device after the mobile device obtains the application from the software distribution platform. The device may send, to a message server, a request for a message to be sent to the mobile device. The request may be based on the registration identifier and the application.
Abstract:
A device may receive, from an interactive voice response (IVR) device, a first request for a code. The first request may be based on the IVR device having received a call from a user device. The device may determine user device information, associated with the user device, based on the first request. The device may determine the code based on at least one of the first request or the user device information. The device may send, to the IVR device, the code to enable the IVR device to configure a call tree based on the code. The device may receive, from the IVR device, a second request for an experience. The experience may be based on the code. The device may send, to the user device, a message to cause the user device to provide the experience.
Abstract:
A device may receive a request for an authorization code, associated with providing content to a second device, from the second device. The device may provide the authorization code to the second device. The device may receive, from a third device, a request for a unique device identifier corresponding to the authorization code. The request for the unique device identifier may include the authorization code. The unique identifier may be associated with a subscriber of a network. The subscriber may be associated with the second device. The device may provide the unique device identifier to the third device. The third device may be associated with providing the content to the second device. The content may be targeted to the subscriber based on the unique device identifier.