Data Stitching For Networked Automation
First Claim
1. A computer-implemented method, comprising:
- assigning a state to a user of a user device at a telecommunication carrier based at least on a data stitch of information from multiple data sources, the data sources including data on a geolocation of the user device;
providing, via a carrier network of the telecommunication carrier, the state to a rules engine at a remote location;
receiving, via the carrier network, an indication from the rules engine that the user is granted or denied access to one or more entities at the location based at least on the state; and
providing, via the carrier network, the indication of granted or denied access to the user device of the user.
7 Assignments
0 Petitions
Accused Products
Abstract
A telecommunication carrier may stitch data from multiple sources to support device automation and access control. A state may be assigned to a user of a user device at a telecommunication carrier based on a data stitch of information from multiple data sources. The data sources may include data on a geolocation of the user device. The state may be provided to a rules engine at a remote location via a carrier network of the telecommunication carrier. An indication from the rules engine that the user device is granted or denied access to one or more entities at the location based on the state may be received via the carrier network at the telecommunication carrier. In turn, the telecommunication carrier may provide the indication of the granted or denied access to the user device of the user.
43 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
assigning a state to a user of a user device at a telecommunication carrier based at least on a data stitch of information from multiple data sources, the data sources including data on a geolocation of the user device; providing, via a carrier network of the telecommunication carrier, the state to a rules engine at a remote location; receiving, via the carrier network, an indication from the rules engine that the user is granted or denied access to one or more entities at the location based at least on the state; and providing, via the carrier network, the indication of granted or denied access to the user device of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. One or more non-transitory computer-readable media storing computer-executable instructions that upon execution cause one or more processors to perform acts comprising:
-
receiving, via a carrier network, information from multiple data sources that include a database of a telecommunication carrier that stores a geolocation of a user device, a database of a government agency, or a database of a private firm; assigning a state to a user of the user device based at least on a data stitch of the information from the multiple data sources; providing, via the carrier network, the state to a rules engine at a remote location; receiving, via the carrier network, an indication from the rules engine that the user is granted or denied access to one or more entities at the location based at least on the state; and providing, via the carrier network, the indication of granted or denied access to the user device of the user. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computing device, comprising:
-
one or more processors; and memory having instructions stored therein, the instructions, when executed by the one or more processors, cause the one or more processors to perform acts comprising; receiving a geolocation of a user device at least via a carrier network of a telecommunication carrier; receiving information related to a user of the user device from one or more additional data sources via the carrier network of the telecommunication carrier; assigning a state to a user of the user device based on a data stitch of the geolocation of the user device and the information from the one or more additional data sources; and directing the user device to grant or deny the user access to one or more entities that are on the user device or at a location that is proximate to the user device based on a state of the user. - View Dependent Claims (19, 20)
-
Specification