Temporary shared storage

ABSTRACT

Aspects of the subject disclosure may include, for example, a method for providing temporary shared cloud-based storage, where access to the shared storage is time-limited, location-limited and anonymous. The method includes receiving a request for storage accessible to a plurality of user devices. A storage account is initiated in response to the request; a password and a time period are associated with the storage account. User devices obtain access to the storage account using only the password provided and without users&#39; personal credentials; access is also according to location within a geographic area defined in the request. Any of the data items is available to each user device having access to the storage account. Upon expiration of the time period, the storage account is disabled and the data items are deleted. Other embodiments are disclosed.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.17/018,425 filed on Sep. 11, 2020, which is a continuation of U.S.patent application Ser. No. 15/273,145 filed on Sep. 22, 2016 (now U.S.Pat. No. 10,810,185). All sections of the aforementioned application(s)and/or patent(s) are incorporated herein by reference in their entirety.

FIELD OF THE DISCLOSURE

The subject disclosure relates to temporary shared storage, and moreparticularly to cloud-based storage shared among mobile device users whoare not acquainted with each other.

BACKGROUND

Users of mobile communication devices often want to share informationwith each other. In some situations it is desirable to share informationanonymously and/or with a restricted group of users, and for only alimited period of time.

BRIEF DESCRIPTION OF THE DRAWINGS

Reference will now be made to the accompanying drawings, which are notnecessarily drawn to scale, and wherein:

FIG. 1 schematically illustrates a group of mobile device users sharingdata items while logged in to an online service;

FIG. 2 schematically illustrates creation of a temporary shared storageaccount using the online service, in accordance with an embodiment ofthe disclosure;

FIG. 3 schematically illustrates a group of mobile device users sharingdata items stored in the temporary shared storage of FIG. 2 ;

FIG. 4 schematically illustrates a system for providing cloud-basedtemporary shared storage to a mobile device;

FIG. 5 is a flowchart illustrating a method in which cloud-basedtemporary shared storage is created and accessed, in accordance withembodiments of the disclosure;

FIGS. 6-8 depict illustrative embodiments of systems that providecommunications services to the devices of FIGS. 1-4 ;

FIG. 9 depicts an illustrative embodiment of a web portal forinteracting with the communication systems of FIGS. 6-8 ;

FIG. 10 depicts an illustrative embodiment of a communication device;and

FIG. 11 is a diagrammatic representation of a machine in the form of acomputer system within which a set of instructions, when executed, maycause the machine to perform any one or more of the methods describedherein.

DETAILED DESCRIPTION

The subject disclosure describes, among other things, illustrativeembodiments for providing temporary shared cloud-based storage, whereaccess to the shared storage is time-limited, location-limited andanonymous. Other embodiments are described in the subject disclosure.

One or more aspects of the subject disclosure include a methodcomprising receiving, by a processing system including a processor, arequest for storage accessible to a plurality of user devices; wherein aplurality of device users associated with the plurality of user devicessubscribe to a service provided by the processing system, and each ofthe plurality of device users has a personal credential for accessingthe service. The method also comprises initiating a storage account inresponse to the request; a name, a password and a time period areassociated with the storage account. The method further comprisesstoring data items transmitted by user devices having access to thestorage account without using the personal credential, by using thepassword and according to location within a geographic area defined inthe request; any of the data items is available to each of the pluralityof user devices having access to the storage account. The request isreceived from a requester device of the plurality of user devices; thegeographic area is based on a location of the requester device. Themethod also comprises, upon expiration of the time period, disabling thestorage account and deleting the data items.

One or more aspects of the subject disclosure include a devicecomprising a processing system including a processor and a memory thatstores executable instructions that, when executed by the processingsystem, facilitate performance of operations. The operations comprisereceiving a request for storage accessible to a plurality of userdevices; a plurality of device users associated with the plurality ofuser devices subscribe to a service provided by the processing system,and each of the plurality of device users has a personal credential foraccessing the service. The operations also comprise initiating, inresponse to the request, a storage account having associated therewith aname, a password and a time period, and storing data items transmittedby user devices having access to the storage account without thepersonal credential, by using the password and according to locationwithin a geographic area defined in the request; any of the data itemsis available to each of the plurality of user devices having access tothe storage account. The request is received from a requester device ofthe plurality of user devices, and the geographic area is based on alocation of the requester device. The operations further comprise, uponexpiration of the time period, disabling the storage account anddeleting the data items, the name associated with the storage account,and the password associated with the storage account.

One or more aspects of the subject disclosure include a machine-readablestorage medium comprising executable instructions that, when executed bya processing system including a processor, facilitate performance ofoperations. The operations comprise receiving a request for storageaccessible to a plurality of user devices; a plurality of device usersassociated with the plurality of user devices subscribe to a serviceprovided by the processing system, and each of the plurality of deviceusers has a personal credential for accessing the service. Theoperations also comprise initiating, in response to the request, astorage account having associated therewith a name, a password and atime period. The operations further comprise storing data itemstransmitted by user devices having access to the storage account withoutthe personal credential, by using the password and according to locationwithin a geographic area defined in the request; any of the data itemsis available to each of the plurality of user devices having access tothe storage account. The request is received from a requester device ofthe plurality of user devices, and the geographic area is based on alocation of the requester device. The operations also comprise disablingthe storage account and deleting the data items upon expiration of thetime period. A single message comprising all of the stored data items istransmitted to one of the plurality of user devices responsive to acommand from that user device.

FIG. 1 depicts a gathering of mobile device users 120 at an event 100whose devices communicate with an online service 150 via a network(schematically illustrated as cloud 160). In the example of FIG. 1 ,there are N users 120-1, 120-2, 120-3, . . . 120-N who are within alimited physical distance from each other, but may or may not be knownto each other. For example, the mobile device users may be at a socialgathering, or attending a major public event.

As shown in FIG. 1 , each user has a data item (a picture, text message,etc.) they wish to share with the others; for example, user 120-1uploads data item 121 and downloads items 122, 123, 129 from storagelocation(s) in cloud 160. In order to share all data items, users 120must perform a total number of N*(N−1) upload/download transactions.(For the sake of clarity, not all transactions involving data items 121,122, 123, 129 are shown in FIG. 1 .)

FIG. 2 schematically illustrates creation of a temporary storage accountfor use at an event 200, in accordance with an embodiment of thedisclosure. One of the mobile device users 120 (in this example, user120-1) transmits a message 211 to the online service, requesting that atemporary storage account 220 be created. In an embodiment, thetemporary storage is provided by the requesting user invoking anapplication offered by the online service. The service responds bycreating the account and associating information including identifiersto the account; in this embodiment, the account is associated with anevent name, a username, a password, and an expiration time. Thisinformation is transmitted in a message 221 to the requesting user120-1. All the information in message 221 is temporary; none is retainedafter the expiration time.

The event name may be specified by the requesting user when transmittingthe request. In another embodiment, the event name is generated by theonline service from a calendar maintained by the requesting user. Theonline service may also attach a username (associated with therequesting user) to the account 220, to distinguish that account fromother accounts being created at the same event. The online serviceprovides a password for accessing the temporary account 220; in anembodiment, the password can be specified by user 120-1 in the request.Message 221 also specifies the expiration time for the temporarystorage; that is, a time after which no access to the storage ispermitted. The expiration time (which can be expressed as a storageperiod or a lifetime for the storage account, e.g. six hours, threedays, etc.) can depend on a level of service subscribed to by therequesting user, or can be specified in the request.

In an embodiment, the requesting user can include in the request adistance X, so that only users within a boundary 231 at a distance Xfrom the requester are permitted to access the temporary storage.Boundary 231 can thus be fixed at the time the request is transmitted.In another embodiment, the online service updates the location of therequester during the lifetime of the account, so that the boundary movesas the requester changes his location. In another embodiment, therequester can specify the name of the venue of event 200 (or the onlineservice can infer the venue name from the requester's current location),so that boundary 231 is defined by the physical limits of the venue.

In this embodiment, the online service provides information regardingcreation of the temporary storage account 220 only to the requestinguser; in particular, only the requesting user receives message 221 withthe password for accessing the temporary storage. However, all users 120(that is, all subscribers logged in to service 150 and located withinboundary 231), after learning the temporary password, can access storageaccount 220 by providing only the temporary password, without having toprovide their individual identifying information. Accordingly, access tothe shared storage in this embodiment is time-limited, location-limitedand anonymous.

Furthermore, it will be appreciated that the data uploaded to thetemporary storage 320 is shared among the user devices, while the userdevices do not communicate with each other. The users 120, while theymay be temporarily considered a group for purposes of sharing the storeddata, are in general not acquainted with each other and have no need tomeet each other.

In this embodiment, the requester 120-1 provides the temporary passwordto the other users 120-2, . . . 120-N in an offline operation (e.g. avocal announcement, written placard, electronic billboard, etc.). Inanother embodiment, the requester can transmit a preselected password tohis acquaintances (e.g. by text messaging), who then can access thetemporary storage account without communicating with any other user orrevealing their presence at the event.

FIG. 3 schematically illustrates a gathering 300 where all mobile deviceusers 120-1, . . . 120-N share data items using temporary storage 320via temporary account 220. In this embodiment, a user can log in toservice 150, look up the event name, transmit the temporary password350, and proceed to share data items with the other users. In thisembodiment, each user can upload one or more data items (e.g. 121, 122,123, 129); an uploaded data item (for example, data item 121 in FIG. 3 )can be tagged with the user's username 321. Each user can download aselected portion of the temporarily stored data items in a single stream360. In a particular embodiment, each of the user devices downloads allof the stored data items in a single message transmitted to that userdevice from the temporary shared storage. In this situation, all N usersshare all of the data items in 2N transactions (one upload and onedownload for each user), compared to the N*(N−1) transactions of FIG. 1.

In an embodiment (for example, at a business conference), the requestercan specify that all items uploaded to the shared storage be tagged. Asystem providing the shared storage can then maintain a log of uploadedfiles with identifiers of the individuals submitting those files.

In an embodiment, some or all of users 120 subscribe to a social networkconnected to cloud 160 via a gateway. A user having access to thetemporary storage 320 can then upload the contents of the temporarystorage to the social network.

In another embodiment, the requesting user (e.g. an organizer of aconference) can assemble a file of data items and upload the file whenthe temporary storage account is created. Alternatively, the file can beattached to the request 211. The organizer can then announce thetemporary password at the conference; each participant then can downloadthe data items without having to provide identification or addresses tothe other participants. In this embodiment, the organizer may wish tocreate the temporary storage only to distribute the file; accordingly,the temporary account can be accessed by the conference participants fordownloading the file but not for uploading. More generally, differentexpiration times for uploading and downloading data items can bespecified in the request 211.

FIG. 4 schematically illustrates a system 400 for providing temporaryshared storage in accordance with embodiments of the disclosure. Mobiledevice 402, associated with user 401, is connected to online services incloud 160 via mobile device gateway 410. Device 402 can transmit andreceive information via an interface (e.g. graphical user interface orGUI) 405. In this embodiment, application 420 residing on applicationserver 415 is downloaded to device 402; when user 402 provides thetemporary password via GUI 405, the application grants access to thetemporary cloud-based storage. In an embodiment, contents of thetemporary storage can be uploaded via a social networks gateway 450 anddistributed on social network

FIG. 5 depicts an illustrative embodiment of a method 500 for creatingand using temporary shared storage. In this method, a number of usersare logged in 501 to an online service. A user (requester) associatedwith a requesting device sends a request for a shared storage account tothe online service (step 502); in an embodiment, the request includesthe location of the device (e.g. address, name of venue). The temporarystorage account is created (step 504) and a reply is transmitted to therequester device (step 506). In this embodiment, the reply includes anevent name, a username, a password and an expiration time for thetemporary storage.

In step 508, the requester announces information to other users so thatthey can access the temporary shared storage; the announcement includesthe temporary password, which in general is different from the passwordsused to log in to the online service. In this embodiment, step 508 isperformed as an offline operation, so that the requestor's device doesnot need to communicate with any other user device.

During the lifetime of the temporary shared storage (step 510), accessto the temporary storage account is available with the temporarypassword (step 512). In this embodiment, the online service enforceslocality (step 514) by determining whether a user device is locatedwithin the defined boundary 231; access by devices outside the boundaryis denied. Users accessing the temporary shared storage can upload andview data items with their devices (step 516), and can download storeddata items (step 518). In an embodiment, a user can view the stored dataitems and select items for download. In another embodiment, a downloadto a user device includes all of the stored data items, streamed in asingle message.

If the expiration time has passed (step 510), the storage account ispermanently disabled (step 520) and all of the stored items are deleted(step 522).

While for purposes of simplicity of explanation, the respectiveprocesses are shown and described as a series of blocks in FIG. 5 , itis to be understood and appreciated that the claimed subject matter isnot limited by the order of the blocks, as some blocks may occur indifferent orders and/or concurrently with other blocks from what isdepicted and described herein. Moreover, not all illustrated blocks maybe required to implement the methods described herein.

It will be appreciated that temporary shared cloud-based storageaccording to various embodiments of the disclosure, examples of whichare described herein, can be used in mobile communications including,but not limited to, fourth generation long term evolution (4G LTE)communications described in whole or in part by standards bodies such asThird Generation Partnership Project (3GPP). Embodiments of thedisclosure may also be applicable to technologies evolving from 4G LTE,such as LTE Advanced (3GPP Release 10), LTE Advanced Pro (3GPP Release13), and fifth generation radio access networks (5G RAN).

FIG. 6 depicts an illustrative embodiment of an architecture 600 for anetwork for interacting with mobile communication devices. According toan embodiment of the disclosure, a mobile device 616 (which maycorrespond to a UE 110) can connect with one or more of the networksshown in FIG. 6 using a personal credential and a mobile device gateway.Mobile devices 616 may represent a variety of technologies (phones,tablets, etc.) and may have an end-to-end connection established witheither the Public Switched Telephone Network (PSTN) 660, in the case ofvoice traffic, or an internet protocol network (Internet) 602, in thecase of data traffic. The architecture can include a Global System forMobile (GSM) network 620, a 3G network 630, and/or a Long Term Evolution(LTE) network 640. In particular, LTE specifications define anall-internet protocol architecture with voice over internet protocol(VoIP).

FIG. 6 also illustrates a device 615 accessing the network through abroadband connection 612 to an Internet Service Provider (ISP) 603. Anyof devices 615-616 can include a processing system including a processorand a memory that stores executable instructions that, when executed bythe processing system, facilitate performance of operations. Theoperations can comprise receiving a request for storage accessible to aplurality of user devices; a plurality of device users associated withthe plurality of user devices subscribe to a service provided by theprocessing system, and each of the plurality of device users has apersonal credential for accessing the service. In response to therequest, a storage account is initiated, having associated therewith aname, a password and a time period, and storing data items transmittedby user devices having access to the storage account without thepersonal credential, by using the password and according to locationwithin a geographic area defined in the request; any of the data itemsis available to each of the plurality of user devices having access tothe storage account. The request is received from a requester device ofthe plurality of user devices, and the geographic area is based on alocation of the requester device. The operations further comprise, uponexpiration of the time period, disabling the storage account anddeleting the data items, the name associated with the storage account,and the password associated with the storage account.

FIG. 7 schematically illustrates a communication system 700 in which oneor more embodiments of the subject disclosure may be implemented. MobileStation 701 may be one of, but not limited to, a cellular telephone, acellular telephone in combination with another electronic device or anyother wireless mobile communication device. According to an embodimentof the disclosure, Mobile Station 701 and/or User Equipment 702 cancommunicate wirelessly with one or more of the systems shown in FIG. 7 .

Mobile Station 701 may communicate wirelessly with Base Station System(BSS) 710. BSS 710 contains a Base Station Controller (BSC) 711 and aBase Transceiver Station (BTS) 712. BSS 710 may include a single BSC711/BTS 712 pair (Base Station) or a system of BSC/BTS pairs which arepart of a larger network. BSS 710 is responsible for communicating withMobile Station 701 and may support one or more cells. BSS 710 isresponsible for handling cellular traffic and signaling between MobileStation 701 and Core Network 740. BSS 710 can perform functions thatinclude, but are not limited to, digital conversion of speech channels,allocation of channels to mobile devices, paging, andtransmission/reception of cellular signals.

Additionally, Mobile Station 701 may communicate wirelessly with RadioNetwork System (RNS) 720. RNS 720 contains a Radio Network Controller(RNC) 721 and one or more Node(s) B 722. RNS 720 may support one or morecells. RNS 720 may also include one or more RNC 721/Node B 722 pairs oralternatively a single RNC 721 may manage multiple Nodes B 722. RNS 720is responsible for communicating with Mobile Station 701 in itsgeographically defined area. RNC 721 is responsible for controlling theNode(s) B 722 that are connected to it and is a control element in aUMTS radio access network. RNC 721 can perform functions such as, butnot limited to, load control, packet scheduling, handover control,security functions, as well as controlling access by Mobile Station 701access to the Core Network (CN).

The evolved UMTS Terrestrial Radio Access Network (E-UTRAN) 730 is aradio access network that provides wireless data communications forMobile Station 701 and User Equipment 702. E-UTRAN 730 provides higherdata rates than traditional UMTS. It is part of the Long Term Evolution(LTE) upgrade for mobile networks; later releases meet the requirementsof the International Mobile Telecommunications (IMT) Advanced and arecommonly known as a 4G networks. E-UTRAN 730 may include a series oflogical network components such as E-UTRAN Node B (eNB) 731 and E-UTRANNode B (eNB) 732. E-UTRAN 730 may contain one or more eNBs. UserEquipment 702 may be any user device capable of connecting to E-UTRAN730 including, but not limited to, a personal computer, laptop, mobiledevice, wireless router, or other device capable of wirelessconnectivity to E-UTRAN 730. The improved performance of the E-UTRAN 730relative to a typical UMTS network allows for increased bandwidth,spectral efficiency, and functionality including, but not limited to,voice, high-speed applications, large data transfer and IPTV, whilestill allowing for full mobility.

An exemplary embodiment of a mobile data and communication service thatmay be implemented in the PLMN architecture described in FIG. 7 is theEnhanced Data rates for GSM Evolution (EDGE). EDGE is an enhancement forGPRS networks that implements an improved signal modulation scheme knownas 9-PSK (Phase Shift Keying). By increasing network utilization, EDGEmay achieve up to three times faster data rates as compared to a typicalGPRS network. EDGE may be implemented on any GSM network capable ofhosting a GPRS network, making it an ideal upgrade over GPRS since itmay provide increased functionality of existing network resources.Evolved EDGE networks are becoming standardized in later releases of theradio telecommunication standards, which provide for even greaterefficiency and peak data rates of up to 1 Mbit/s, while still allowingimplementation on existing GPRS-capable network infrastructure.

Mobile Station 701 may communicate with any or all of BSS 710, RNS 720,or E-UTRAN 730. In an illustrative system, each of BSS 710, RNS 720, andE-UTRAN 730 may provide Mobile Station 701 with access to Core Network740. The Core Network 740 may include of a series of devices that routedata and communications between end users. Core Network 740 may providenetwork service functions to users in the Circuit Switched (CS) domain,the Packet Switched (PS) domain or both. The CS domain refers toconnections in which dedicated network resources are allocated at thetime of connection establishment and then released when the connectionis terminated. The PS domain refers to communications and data transfersthat make use of autonomous groupings of bits called packets. Eachpacket may be routed, manipulated, processed or handled independently ofall other packets in the PS domain and does not require dedicatednetwork resources.

The Circuit Switched—Media Gateway Function (CS-MGW) 741 is part of CoreNetwork 740, and interacts with Visitor Location Register (VLR) andMobile-Services Switching Center (MSC) Server 760 and Gateway MSC Server761 in order to facilitate Core Network 740 resource control in the CSdomain. Functions of CS-MGW 741 include, but are not limited to, mediaconversion, bearer control, payload processing and other mobile networkprocessing such as handover or anchoring. CS-MGW 741 may receiveconnections to Mobile Station 701 through BSS 710, RNS 720 or both.

Serving GPRS Support Node (SGSN) 742 stores subscriber data regardingMobile Station 701 in order to facilitate network functionality. SGSN742 may store subscription information such as, but not limited to, theInternational Mobile Subscriber Identity (IMSI), temporary identities,or Packet Data Protocol (PDP) addresses. SGSN 742 may also storelocation information such as, but not limited to, the Gateway GPRSSupport Node (GGSN) 744 address for each GGSN where an active PDPexists. GGSN 744 may implement a location register function to storesubscriber data it receives from SGSN 742 such as subscription orlocation information.

Serving Gateway (S-GW) 743 is an interface which provides connectivitybetween E-UTRAN 730 and Core Network 740. Functions of S-GW 743 include,but are not limited to, packet routing, packet forwarding, transportlevel packet processing, event reporting to Policy and Charging RulesFunction (PCRF) 750, and mobility anchoring for inter-network mobility.PCRF 750 uses information gathered from S-GW 743, as well as othersources, to make applicable policy and charging decisions related todata flows, network resources and other network administrationfunctions. Packet Data Network Gateway (PDN-GW) 745 may provideuser-to-services connectivity functionality including, but not limitedto, network-wide mobility anchoring, bearer session anchoring andcontrol, and IP address allocation for PS domain connections.

Home Subscriber Server (HSS) 763 is a database for user information; HSS763 can store subscription data regarding Mobile Station 701 or UserEquipment 702 for handling calls or data sessions. Networks may containone HSS 763, or more if additional resources are required. Exemplarydata stored by HSS 763 include, but is not limited to, useridentification, numbering and addressing information, securityinformation, or location information. HSS 763 may also provide call orsession establishment procedures in both the PS and CS domains.

The VLR/MSC Server 760 can provide user location functionality. In anembodiment, when Mobile Station 701 enters a new network location, itbegins a registration procedure. A MSC Server for that locationtransfers the location information to the VLR for the area. A VLR andMSC Server may be located in the same computing environment, as is shownby VLR/MSC Server 760, or alternatively may be located in separatecomputing environments. A VLR may contain, but is not limited to, userinformation such as the IMSI, the Temporary Mobile Station Identity(TMSI), the Local Mobile Station Identity (LMSI), the last knownlocation of the mobile station, or the SGSN where the mobile station waspreviously registered. The MSC server may contain information such as,but not limited to, procedures for Mobile Station 701 registration orprocedures for handover of Mobile Station 701 to a different section ofthe Core Network 740. GMSC Server 761 may serve as a connection toalternate GMSC Servers for other mobile stations in larger networks.

Equipment Identity Register (EIR) 762 is a logical element which maystore the International Mobile Equipment Identities (IMEI) for MobileStation 701. In a typical embodiment, user equipment may be classifiedas either “white listed” or “black listed” depending on its status inthe network. In one embodiment, if Mobile Station 701 is stolen and putto use by an unauthorized user, it may be registered as “black listed”in EIR 762, preventing its use on the network. Mobility ManagementEntity (MME) 764 is a control node which may track Mobile Station 701 orUser Equipment 702 if the devices are idle. Additional functionality mayinclude the ability of MME 764 to contact an idle Mobile Station 701 orUser Equipment 702 if retransmission of a previous session is required.

FIG. 8 depicts an illustrative embodiment of a communication system 800employing an IP Multimedia Subsystem (IMS) network architecture tofacilitate the combined services of circuit-switched and packet-switchedsystems. Communication system 800 can be overlaid or operably coupledwith systems 400, 600 and/or 700 as another representative embodiment.In particular, system 800 when operably coupled with systems 400, 600and/or 700 can facilitate performance of a method including receiving arequest for storage accessible to a plurality of user devices; aplurality of device users associated with the plurality of user devicessubscribe to a service provided by the processing system, and each ofthe plurality of device users has a personal credential for accessingthe service. In response to the request, a storage account is initiated,having associated therewith a name, a password and a time period, andstoring data items transmitted by user devices having access to thestorage account without the personal credential, by using the passwordand according to location within a geographic area defined in therequest; any of the data items is available to each of the plurality ofuser devices having access to the storage account. The request isreceived from a requester device of the plurality of user devices, andthe geographic area is based on a location of the requester device. Theoperations further comprise, upon expiration of the time period,disabling the storage account and deleting the data items, the nameassociated with the storage account, and the password associated withthe storage account.

Communication system 800 can comprise a Home Subscriber Server (HSS)840, a tElephone NUmber Mapping (ENUM) server 830, and other networkelements of an IMS network 850. The IMS network 850 can establishcommunications between IMS-compliant communication devices (CDs) 801,802, Public Switched Telephone Network (PSTN) CDs 803, 805, andcombinations thereof by way of a Media Gateway Control Function (MGCF)820 coupled to a PSTN network 860. The MGCF 820 need not be used when acommunication session involves IMS CD to IMS CD communications. Acommunication session involving at least one PSTN CD may utilize theMGCF 820.

IMS CDs 801, 802 can register with the IMS network 850 by contacting aProxy Call Session Control Function (P-CSCF) which communicates with aninterrogating CSCF (I-CSCF), which in turn, communicates with a ServingCSCF (S-CSCF) to register the CDs with the HSS 840. To initiate acommunication session between CDs, an originating IMS CD 801 can submita Session Initiation Protocol (SIP INVITE) message to an originatingP-CSCF 804 which communicates with a corresponding originating S-CSCF806. The originating S-CSCF 806 can submit the SIP INVITE message to oneor more application servers (ASs) 817 that can provide a variety ofservices to IMS subscribers.

For example, the application servers 817 can be used to performoriginating call feature treatment functions on the calling party numberreceived by the originating S-CSCF 806 in the SIP INVITE message.Originating treatment functions can include determining whether thecalling party number has international calling services, call IDblocking, calling name blocking, 7-digit dialing, and/or is requestingspecial telephony features (e.g., *72 forward calls, *73 cancel callforwarding, *67 for caller ID blocking, and so on). Based on initialfilter criteria (iFCs) in a subscriber profile associated with a CD, oneor more application servers may be invoked to provide various calloriginating feature services.

Additionally, the originating S-CSCF 806 can submit queries to the ENUMsystem 830 to translate an E.164 telephone number in the SIP INVITEmessage to a SIP Uniform Resource Identifier (URI) if the terminatingcommunication device is IMS-compliant. The SIP URI can be used by anInterrogating CSCF (I-CSCF) 807 to submit a query to the HSS 840 toidentify a terminating S-CSCF 814 associated with a terminating IMS CDsuch as reference 802. Once identified, the I-CSCF 807 can submit theSIP INVITE message to the terminating S-CSCF 814. The terminating S-CSCF814 can then identify a terminating P-CSCF 816 associated with theterminating CD 802. The P-CSCF 816 may then signal the CD 802 toestablish Voice over Internet Protocol (VoIP) communication services,thereby enabling the calling and called parties to engage in voiceand/or data communications. Based on the iFCs in the subscriber profile,one or more application servers may be invoked to provide various callterminating feature services, such as call forwarding, do not disturb,music tones, simultaneous ringing, sequential ringing, etc.

In some instances the aforementioned communication process issymmetrical. Accordingly, the terms “originating” and “terminating” inFIG. 8 may be interchangeable. It is further noted that communicationsystem 800 can be adapted to support video conferencing. In addition,communication system 800 can be adapted to provide the IMS CDs 801, 802with the Internet services of communication system 700 of FIG. 7 .

If the terminating communication device is instead a PSTN CD such as CD803 or CD 805 (in instances where the cellular phone only supportscircuit-switched voice communications), the ENUM system 830 can respondwith an unsuccessful address resolution which can cause the originatingS-CSCF 806 to forward the call to the MGCF 820 via a Breakout GatewayControl Function (BGCF) 819. The MGCF 820 can then initiate the call tothe terminating PSTN CD over the PSTN network 860 to enable the callingand called parties to engage in voice and/or data communications.

It is further appreciated that the CDs of FIG. 8 can operate as wirelineor wireless devices. For example, the CDs of FIG. 8 can becommunicatively coupled to a cellular base station 821, a femtocell, aWiFi router, a Digital Enhanced Cordless Telecommunications (DECT) baseunit, or another suitable wireless access unit to establishcommunications with the IMS network 850 of FIG. 8 . The cellular accessbase station 821 can operate according to common wireless accessprotocols such as GSM, CDMA, TDMA, UMTS, WiMax, SDR, LTE, and so on.Other present and next generation wireless network technologies can beused by one or more embodiments of the subject disclosure. Accordingly,multiple wireline and wireless communication technologies can be used bythe CDs of FIG. 8 .

Cellular phones supporting LTE can support packet-switched voice andpacket-switched data communications and thus may operate asIMS-compliant mobile devices. In this embodiment, the cellular basestation 821 may communicate directly with the IMS network 850 as shownby the arrow connecting the cellular base station 821 and the P-CSCF816.

Alternative forms of a CSCF can operate in a device, system, component,or other form of centralized or distributed hardware and/or software.Indeed, a respective CSCF may be embodied as a respective CSCF systemhaving one or more computers or servers, either centralized ordistributed, where each computer or server may be configured to performor provide, in whole or in part, any method, step, or functionalitydescribed herein in accordance with a respective CSCF. Likewise, otherfunctions, servers and computers described herein, including but notlimited to, the HSS, the ENUM server, the BGCF, and the MGCF, can beembodied in a respective system having one or more computers or servers,either centralized or distributed, where each computer or server may beconfigured to perform or provide, in whole or in part, any method, step,or functionality described herein in accordance with a respectivefunction, server, or computer.

For illustration purposes only, the terms S-CSCF, P-CSCF, I-CSCF, and soon, can be server devices, but may be referred to in the subjectdisclosure without the word “server.” It is also understood that anyform of a CSCF server can operate in a device, system, component, orother form of centralized or distributed hardware and software. It isfurther noted that these terms and other terms such as DIAMETER commandsare terms can include features, methodologies, and/or fields that may bedescribed in whole or in part by standards bodies such as ThirdGeneration Partnership Project (3GPP). It is further noted that some orall embodiments of the subject disclosure may in whole or in partmodify, supplement, or otherwise supersede final or proposed standardspublished and promulgated by 3GPP.

FIG. 9 depicts an illustrative embodiment of a web portal 902 of acommunication system 900. Communication system 900 can be overlaid oroperably coupled with communication system 600 and/or communicationsystem 700 as another representative embodiment of a system forproviding temporary shared storage as shown in FIGS. 2-4 . The webportal 902 can be used for managing services of communication systems600-700. A web page of the web portal 902 can be accessed by a UniformResource Locator (URL) with an Internet browser using anInternet-capable communication device such as those described in FIGS. 1and 6-8 . The web portal 902 can be configured, for example, to accessUE 702; in an embodiment, UE 702 comprises a media processor andservices managed thereby such as a Digital Video Recorder (DVR), a Videoon Demand (VoD) catalog, an Electronic Programming Guide (EPG), or apersonal catalog (such as personal videos, pictures, audio recordings,etc.) stored at the media processor. The web portal 902 can also be usedfor provisioning IMS services described earlier, provisioning Internetservices, provisioning cellular phone services, and so on.

The web portal 902 can further be utilized to manage and provisionsoftware applications to adapt these applications as may be desired bysubscribers and/or service providers of communication systems 600-800.For instance, users of services provided over networks shown in FIGS.6-8 can log into their on-line accounts and provision server 763 or 840with user profiles or contact information to the server to enablecommunication with devices described in FIGS. 1, 6, 7 and 8 , and so on.Service providers can log onto an administrator account to provision,monitor and/or maintain the systems of FIGS. 1, 6, 7 and/or 8 .

FIG. 10 depicts an illustrative embodiment of a communication device1000. Communication device 1000 can serve in whole or in part as anillustrative embodiment of the devices depicted in FIGS. 1, 6, 7 and/or8 , and can be configured to perform portions of [method 500 of FIG. 5 .

Communication device 1000 can comprise a wireline and/or wirelesstransceiver 1002 (herein transceiver 1002), a user interface (UI) 1004,a power supply 1014, a location receiver 1016, a motion sensor 1018, anorientation sensor 1020, and a controller 1006 for managing operationsthereof. The transceiver 1002 can support short-range or long-rangewireless access technologies such as Bluetooth®, ZigBee®, WiFi, DECT, orcellular communication technologies, just to mention a few (Bluetooth®and ZigBee® are trademarks registered by the Bluetooth® Special InterestGroup and the ZigBee® Alliance, respectively). Cellular technologies caninclude, for example, CDMA-1X, UMTS/HSDPA, GSM/GPRS, TDMA/EDGE, EV/DO,WiMAX, SDR, LTE, as well as other next generation wireless communicationtechnologies as they arise. The transceiver 1002 can also be adapted tosupport circuit-switched wireline access technologies (such as PSTN),packet-switched wireline access technologies (such as TCP/IP, VoIP,etc.), and combinations thereof.

The UI 1004 can include a depressible or touch-sensitive keypad 1008with a navigation mechanism such as a roller ball, a joystick, a mouse,or a navigation disk for manipulating operations of the communicationdevice 1000. The keypad 1008 can be an integral part of a housingassembly of the communication device 1000 or an independent deviceoperably coupled thereto by a tethered wireline interface (such as a USBcable) or a wireless interface supporting for example Bluetooth®. Thekeypad 1008 can represent a numeric keypad commonly used by phones,and/or a QWERTY keypad with alphanumeric keys. The UI 1004 can furtherinclude a display 1010 such as monochrome or color LCD (Liquid CrystalDisplay), OLED (Organic Light Emitting Diode) or other suitable displaytechnology for conveying images to an end user of the communicationdevice 1000. In an embodiment where the display 1010 is touch-sensitive,a portion or all of the keypad 1008 can be presented by way of thedisplay 1010 with navigation features.

The display 1010 can use touch screen technology to also serve as a userinterface for detecting user input. As a touch screen display, thecommunication device 1000 can be adapted to present a user interfacewith graphical user interface (GUI) elements that can be selected by auser with a touch of a finger. The touch screen display 1010 can beequipped with capacitive, resistive or other forms of sensing technologyto detect how much surface area of a user's finger has been placed on aportion of the touch screen display. This sensing information can beused to control the manipulation of the GUI elements or other functionsof the user interface. The display 1010 can be an integral part of thehousing assembly of the communication device 1000 or an independentdevice communicatively coupled thereto by a tethered wireline interface(such as a cable) or a wireless interface.

The UI 1004 can also include an audio system 1012 that utilizes audiotechnology for conveying low volume audio (such as audio heard inproximity of a human ear) and high volume audio (such as speakerphonefor hands free operation). The audio system 1012 can further include amicrophone for receiving audible signals of an end user. The audiosystem 1012 can also be used for voice recognition applications. The UI1004 can further include an image sensor 1013 such as a charged coupleddevice (CCD) camera for capturing still or moving images.

The power supply 1014 can utilize common power management technologiessuch as replaceable and rechargeable batteries, supply regulationtechnologies, and/or charging system technologies for supplying energyto the components of the communication device 1000 to facilitatelong-range or short-range portable applications. Alternatively, or incombination, the charging system can utilize external power sources suchas DC power supplied over a physical interface such as a USB port orother suitable tethering technologies.

The location receiver 1016 can utilize location technology such as aglobal positioning system (GPS) receiver capable of assisted GPS foridentifying a location of the communication device 1000 based on signalsgenerated by a constellation of GPS satellites, which can be used forfacilitating location services such as navigation. The motion sensor1018 can utilize motion sensing technology such as an accelerometer, agyroscope, or other suitable motion sensing technology to detect motionof the communication device 1000 in three-dimensional space. Theorientation sensor 1020 can utilize orientation sensing technology suchas a magnetometer to detect the orientation of the communication device1000 (north, south, west, and east, as well as combined orientations indegrees, minutes, or other suitable orientation metrics).

The communication device 1000 can use the transceiver 1002 to alsodetermine a proximity to a cellular, WiFi, Bluetooth®, or other wirelessaccess points by sensing techniques such as utilizing a received signalstrength indicator (RSSI) and/or signal time of arrival (TOA) or time offlight (TOF) measurements. The controller 1006 can utilize computingtechnologies such as a microprocessor, a digital signal processor (DSP),programmable gate arrays, application specific integrated circuits,and/or a video processor with associated storage memory such as Flash,ROM, RAM, SRAM, DRAM or other storage technologies for executingcomputer instructions, controlling, and processing data supplied by theaforementioned components of the communication device 1000.

Other components not shown in FIG. 7 can be used in one or moreembodiments of the subject disclosure. For instance, the communicationdevice 1000 can include a reset button (not shown). The reset button canbe used to reset the controller 1006 of the communication device 1000.In yet another embodiment, the communication device 1000 can alsoinclude a factory default setting button positioned, for example, belowa small hole in a housing assembly of the communication device 1000 toforce the communication device 1000 to re-establish factory settings. Inthis embodiment, a user can use a protruding object such as a pen orpaper clip tip to reach into the hole and depress the default settingbutton. The communication device 1000 can also include a slot for addingor removing an identity module such as a Subscriber Identity Module(SIM) card. SIM cards can be used for identifying subscriber services,executing programs, storing subscriber data, and so forth.

The communication device 1000 as described herein can operate with moreor less of the circuit components shown in FIG. 7 . These variantembodiments can be used in one or more embodiments of the subjectdisclosure.

The communication device 1000 can be adapted to perform the functions ofUE devices of FIG. 1 , the portable communication devices 616 of FIG. 6, and the mobile station 701 and UE 702 of FIG. 7 , as well as the IMSCDs 801-802 and PSTN CDs 803-805 of FIG. 8 . It will be appreciated thatthe communication device 1000 can also represent other devices that canoperate in communication systems 600-800 of FIGS. 6-8 ′. In addition,the controller 1006 can be adapted in various embodiments for requestingcreation of a shared storage account and accessing the shared storageaccount.

Upon reviewing the aforementioned embodiments, it would be evident to anartisan with ordinary skill in the art that said embodiments can bemodified, reduced, or enhanced without departing from the scope of theclaims described below. For example, a computing device including aprocessor can be configured to provide temporary shared storage in whichadvertising content is stored when the storage account is created, sothat the advertising content is delivered to the user device when adownload from the shared storage is performed. Other embodiments can beused in the subject disclosure.

It should be understood that devices described in the exemplaryembodiments can be in communication with each other via various wirelessand/or wired methodologies. The methodologies can be links that aredescribed as coupled, connected and so forth, which can includeunidirectional and/or bidirectional communication over wireless pathsand/or wired paths that utilize one or more of various protocols ormethodologies, where the coupling and/or connection can be direct (e.g.,no intervening processing device) and/or indirect (e.g., an intermediaryprocessing device such as a router).

FIG. 11 depicts an exemplary diagrammatic representation of a machine inthe form of a computer system 1100 within which a set of instructions,when executed, may cause the machine to perform any one or more of themethods described above. One or more instances of the machine canoperate, for example, as a processing system that receives a request forstorage accessible to a plurality of user devices; initiates a sharedstorage account; and disables the shared storage account upon expirationof a predefined time period. In some embodiments, the machine may beconnected (e.g., using a network 1126) to other machines. In a networkeddeployment, the machine may operate in the capacity of a server or aclient user machine in a server-client user network environment, or as apeer machine in a peer-to-peer (or distributed) network environment.

The machine may comprise a server computer, a client user computer, apersonal computer (PC), a tablet, a smart phone, a laptop computer, adesktop computer, a control system, a network router, switch or bridge,or any machine capable of executing a set of instructions (sequential orotherwise) that specify actions to be taken by that machine. It will beunderstood that a communication device of the subject disclosureincludes broadly any electronic device that provides voice, video ordata communication. Further, while a single machine is illustrated, theterm “machine” shall also be taken to include any collection of machinesthat individually or jointly execute a set (or multiple sets) ofinstructions to perform any one or more of the methods discussed herein.

The computer system 1100 may include a processor (or controller) 1102(e.g., a central processing unit (CPU)), a graphics processing unit(GPU, or both), a main memory 1104 and a static memory 1106, whichcommunicate with each other via a bus 1108. The computer system 1100 mayfurther include a display unit 1110 (e.g., a liquid crystal display(LCD), a flat panel, or a solid state display). The computer system 1100may include an input device 1112 (e.g., a keyboard), a cursor controldevice 1114 (e.g., a mouse), a disk drive unit 1116, a signal generationdevice 1118 (e.g., a speaker or remote control) and a network interfacedevice 1120. In distributed environments, the embodiments described inthe subject disclosure can be adapted to utilize multiple display units1110 controlled by two or more computer systems 1100. In thisconfiguration, presentations described by the subject disclosure may inpart be shown in a first of the display units 1110, while the remainingportion is presented in a second of the display units 1110.

The disk drive unit 1116 may include a tangible computer-readablestorage medium 1122 on which is stored one or more sets of instructions(e.g., software 1124) embodying any one or more of the methods orfunctions described herein, including those methods illustrated above.The instructions 1124 may also reside, completely or at least partially,within the main memory 1104, the static memory 1106, and/or within theprocessor 1102 during execution thereof by the computer system 1100. Themain memory 1104 and the processor 1102 also may constitute tangiblecomputer-readable storage media.

Dedicated hardware implementations including, but not limited to,application specific integrated circuits, programmable logic arrays andother hardware devices can likewise be constructed to implement themethods described herein. Application specific integrated circuits andprogrammable logic array can use downloadable instructions for executingstate machines and/or circuit configurations to implement embodiments ofthe subject disclosure. Applications that may include the apparatus andsystems of various embodiments broadly include a variety of electronicand computer systems. Some embodiments implement functions in two ormore specific interconnected hardware modules or devices with relatedcontrol and data signals communicated between and through the modules,or as portions of an application-specific integrated circuit. Thus, theexample system is applicable to software, firmware, and hardwareimplementations.

In accordance with various embodiments of the subject disclosure, theoperations or methods described herein are intended for operation assoftware programs or instructions running on or executed by a computerprocessor or other computing device, and which may include other formsof instructions manifested as a state machine implemented with logiccomponents in an application specific integrated circuit or fieldprogrammable gate array. Furthermore, software implementations (e.g.,software programs, instructions, etc.) including, but not limited to,distributed processing or component/object distributed processing,parallel processing, or virtual machine processing can also beconstructed to implement the methods described herein. Distributedprocessing environments can include multiple processors in a singlemachine, single processors in multiple machines, and/or multipleprocessors in multiple machines. It is further noted that a computingdevice such as a processor, a controller, a state machine or othersuitable device for executing instructions to perform operations ormethods may perform such operations directly or indirectly by way of oneor more intermediate devices directed by the computing device.

While the tangible computer-readable storage medium 1122 is shown in anexample embodiment to be a single medium, the term “tangiblecomputer-readable storage medium” should be taken to include a singlemedium or multiple media (e.g., a centralized or distributed database,and/or associated caches and servers) that store the one or more sets ofinstructions. The term “tangible computer-readable storage medium” shallalso be taken to include any non-transitory medium that is capable ofstoring or encoding a set of instructions for execution by the machineand that cause the machine to perform any one or more of the methods ofthe subject disclosure. The term “non-transitory” as in a non-transitorycomputer-readable storage includes without limitation memories, drives,devices and anything tangible but not a signal per se.

The term “tangible computer-readable storage medium” shall accordinglybe taken to include, but not be limited to: solid-state memories such asa memory card or other package that houses one or more read-only(non-volatile) memories, random access memories, or other re-writable(volatile) memories, a magneto-optical or optical medium such as a diskor tape, or other tangible media which can be used to store information.Accordingly, the disclosure is considered to include any one or more ofa tangible computer-readable storage medium, as listed herein andincluding art-recognized equivalents and successor media, in which thesoftware implementations herein are stored.

Although the present specification describes components and functionsimplemented in the embodiments with reference to particular standardsand protocols, the disclosure is not limited to such standards andprotocols. Each of the standards for Internet and other packet switchednetwork transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) representexamples of the state of the art. Such standards are from time-to-timesuperseded by faster or more efficient equivalents having essentiallythe same functions. Wireless standards for device detection (e.g.,RFID), short-range communications (e.g., Bluetooth®, WiFi, Zigbee®), andlong-range communications (e.g., WiMAX, GSM, CDMA, LTE) can be used bycomputer system 1100. In one or more embodiments, information regardinguse of services can be generated including services being accessed,media consumption history, user preferences, and so forth. Thisinformation can be obtained by various methods including user input,detecting types of communications (e.g., video content vs. audiocontent), analysis of content streams, and so forth. The generating,obtaining and/or monitoring of this information can be responsive to anauthorization provided by the user.

The illustrations of embodiments described herein are intended toprovide a general understanding of the structure of various embodiments,and they are not intended to serve as a complete description of all theelements and features of apparatus and systems that might make use ofthe structures described herein. Many other embodiments will be apparentto those of skill in the art upon reviewing the above description. Theexemplary embodiments can include combinations of features and/or stepsfrom multiple embodiments. Other embodiments may be utilized and derivedtherefrom, such that structural and logical substitutions and changesmay be made without departing from the scope of this disclosure. Figuresare also merely representational and may not be drawn to scale. Certainproportions thereof may be exaggerated, while others may be minimized.Accordingly, the specification and drawings are to be regarded in anillustrative rather than a restrictive sense.

Although specific embodiments have been illustrated and describedherein, it should be appreciated that any arrangement which achieves thesame or similar purpose may be substituted for the embodiments describedor shown by the subject disclosure. The subject disclosure is intendedto cover any and all adaptations or variations of various embodiments.Combinations of the above embodiments, and other embodiments notspecifically described herein, can be used in the subject disclosure.For instance, one or more features from one or more embodiments can becombined with one or more features of one or more other embodiments. Inone or more embodiments, features that are positively recited can alsobe negatively recited and excluded from the embodiment with or withoutreplacement by another structural and/or functional feature. The stepsor functions described with respect to the embodiments of the subjectdisclosure can be performed in any order. The steps or functionsdescribed with respect to the embodiments of the subject disclosure canbe performed alone or in combination with other steps or functions ofthe subject disclosure, as well as from other embodiments or from othersteps that have not been described in the subject disclosure. Further,more than or less than all of the features described with respect to anembodiment can also be utilized.

Less than all of the steps or functions described with respect to theexemplary processes or methods can also be performed in one or more ofthe exemplary embodiments. Further, the use of numerical terms todescribe a device, component, step or function, such as first, second,third, and so forth, is not intended to describe an order or functionunless expressly stated so. The use of the terms first, second, thirdand so forth, is generally to distinguish between devices, components,steps or functions unless expressly stated otherwise. Additionally, oneor more devices or components described with respect to the exemplaryembodiments can facilitate one or more functions, where the facilitating(e.g., facilitating access or facilitating establishing a connection)can include less than every step needed to perform the function or caninclude all of the steps needed to perform the function.

In one or more embodiments, a processor (which can include a controlleror circuit) has been described that performs various functions. Itshould be understood that the processor can be multiple processors,which can include distributed processors or parallel processors in asingle machine or multiple machines. The processor can be used insupporting a virtual processing environment. The virtual processingenvironment may support one or more virtual machines representingcomputers, servers, or other computing devices. In such virtualmachines, components such as microprocessors and storage devices may bevirtualized or logically represented. The processor can include a statemachine, application specific integrated circuit, and/or programmablegate array including a Field PGA. In one or more embodiments, when aprocessor executes instructions to perform “operations”, this caninclude the processor performing the operations directly and/orfacilitating, directing, or cooperating with another device or componentto perform the operations.

The Abstract of the Disclosure is provided with the understanding thatit will not be used to interpret or limit the scope or meaning of theclaims. In addition, in the foregoing Detailed Description, it can beseen that various features are grouped together in a single embodimentfor the purpose of streamlining the disclosure. This method ofdisclosure is not to be interpreted as reflecting an intention that theclaimed embodiments require more features than are expressly recited ineach claim. Rather, as the following claims reflect, inventive subjectmatter lies in less than all features of a single disclosed embodiment.Thus the following claims are hereby incorporated into the DetailedDescription, with each claim standing on its own as a separately claimedsubject matter.

What is claimed is:
 1. A device comprising: a processing systemincluding a processor; and a memory that stores executable instructionsthat, when executed by the processing system, facilitate performance ofoperations, the operations comprising: initiating a temporary storageaccount having a predetermined uploading time period, a predetermineddownloading time period, and a predetermined storage time period;determining an uploader user device of a plurality of user devices iswithin a geographic area; uploading a group of data items from theuploader user device; storing the group of data items into the temporarystorage account; determining a first requester user device of theplurality of user devices is within the geographic area; selecting aportion of the group of data items in response to receiving a messagefrom the first requester user device indicating a selection of theportion of the group of data items; and streaming the portion of thegroup of data items from the temporary storage account to the firstrequester user device into a single message.
 2. The device of claim 1,wherein the operations comprise receiving a first request for access tothe temporary storage account from the uploader user device.
 3. Thedevice of claim 2, wherein the operations comprise: receiving firstcredentials associated with the temporary storage account from theuploader user device; and providing access to the temporary storageaccount to the uploader user device in response to authenticating thefirst credentials.
 4. The device of claim 1, wherein the operationscomprise receiving a second request for access to the temporary storageaccount from the first requester user device.
 5. The device of claim 4,wherein the operations comprise: receiving second credentials associatedwith the temporary storage account from the first requester user device;and providing access to the temporary storage account to the firstrequester user device in response to authenticating the secondcredentials.
 6. The device of claim 1, wherein the operations comprisedisabling the temporary storage account in response to determining thatthe predetermine storage time period has expired.
 7. The device of claim1, wherein the operations comprise deleting the group of data items fromthe temporary storage account in response to determining that thepredetermine storage time period has expired.
 8. The device of claim 1,wherein the geographic area is based on a distance from a location ofthe first requester user device.
 9. The device of claim 8, wherein thegeographic area is updated according to movements of the first requesteruser device thereby resulting in a dynamically updated geographic area.10. The device of claim 9, wherein the dynamically updated geographicarea results in a second requester user device of the plurality of userdevices previously outside the geographic area being able to access thetemporary storage account upon being detected within the dynamicallyupdated geographic area.
 11. The device of claim 9, wherein thedynamically updated geographic area results in a third requester userdevice of the plurality of user devices previously inside the geographicarea being unable to access the temporary storage account upon beingdetected outside of the dynamically updated geographic area.
 12. Thedevice of claim 1, wherein the temporary storage account is anonymouslyshared with the plurality of user devices.
 13. A non-transitory,machine-readable storage medium, comprising executable instructionsthat, when executed by a processing system including a processor,facilitate performance of operations comprising: initiating a temporarystorage account having a predetermined uploading time period, apredetermined downloading time period, and a predetermined storage timeperiod; determining an uploader user device of a plurality of userdevices is within a geographic area; uploading a group of data itemsfrom the uploader user device; storing the group of data items into thetemporary storage account; determining a group of requester user devicesof the plurality of user devices is within the geographic area;selecting a portion of the group of data items in response to receivinga message from the each of the group of requester user devicesindicating a selection of the portion of the group of data items;streaming the portion of the group of data items from the temporarystorage account to each of the group of requester user devices into asingle message; detecting that a first user device of the plurality ofuser devices has entered the geographic area; and streaming the portionof the group of data items from the temporary storage account to thefirst user device into a single message.
 14. The non-transitory,machine-readable storage medium of claim 13, receiving a first requestfor access to the temporary storage account from the uploader userdevice.
 15. The non-transitory, machine-readable storage medium of claim14, wherein the operations comprise: receiving first credentialsassociated with the temporary storage account from the uploader userdevice; and providing access to the temporary storage account to theuploader user device in response to authenticating the firstcredentials.
 16. The non-transitory, machine-readable storage medium ofclaim 13, wherein the operations comprise receiving a request for accessto the temporary storage account from each of the group of requesteruser devices.
 17. The non-transitory, machine-readable storage medium ofclaim 16, receiving credentials associated with the temporary storageaccount from each of the group of requester user devices resulting in agroup of credentials; and providing access to the temporary storageaccount to each of the group of requester user device in response toauthenticating each of the credentials from the group of credentials.18. The non-transitory, machine-readable storage medium of claim 13,wherein the operations comprise disabling the temporary storage accountin response to determining that the predetermine storage time period hasexpired.
 19. The non-transitory, machine-readable storage medium ofclaim 13, wherein the operations comprise deleting the group of dataitems from the temporary storage account in response to determining thatthe predetermine storage time period has expired.
 20. A method,comprising: initiating, by a processing system including a processor, atemporary storage account having a predetermined uploading time period,a predetermined downloading time period, and a predetermined storagetime period; determining, by the processing system, an uploader userdevice of a plurality of user devices is within a geographic area;uploading, by the processing system, a group of data items from theuploader user device; storing, by the processing system, the group ofdata items into the temporary storage account; determining, by theprocessing system, a group of requester user devices of the plurality ofuser devices is within the geographic area; selecting, by the processingsystem, a portion of the group of data items in response to receiving amessage from the each of the group of requester user devices indicatinga selection of the portion of the group of data items; streaming, by theprocessing system, the portion of the group of data items from thetemporary storage account to each of the group of requester user devicesinto a single message; detecting, by the processing system, that a firstuser device of the group of requester user devices has moved outside thegeographic area; and ceasing, by the processing system, streaming theportion of the group of data items from the temporary storage account tothe first user device.