Patent application number | Description | Published |
20140040975 | Virtualized Policy & Charging System - A network system for providing one or more services to one or more end-user devices communicatively coupled to the network system over a wireless access network, the network system comprising: a policy enforcement function, a first policy element, a second policy element, and a network element, wherein the network element is communicatively coupled to the policy enforcement function, the first policy element, and the second policy element, and wherein the network element is configured to communicate first policy information between the policy enforcement function and the first policy element, and communicate second policy information between the first policy enforcement function and the second policy element. | 02-06-2014 |
20140059640 | Adapting Network Policies Based on Device Service Processor Configuration - Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems. | 02-27-2014 |
20140075567 | Service Processor Configurations for Enhancing or Augmenting System Software of a Mobile Communications Device - A device comprising non-volatile memory capable of being partitioned into first and second partitions, the first partition for storing device system software, the second partition for storing a service processor and having one or more system execution properties for enhancing or augmenting the device system software, and comprising one or more processors for verifying integrity of the device system software using a first security element, verifying integrity of the service processor using a second security element, obtaining the service processor from the non-volatile memory, executing the obtained service processor, and updating, installing, removing, or modifying the service processor in the second partition of the non-volatile memory without affecting the device system software in the first partition. | 03-13-2014 |
20140094159 | Controlling Mobile Device Communications On a Roaming Network Based on Device State - A device that determines an aspect of a service policy based on a state of the device, and applies the service policy. The state is based on a user interaction, or a lack of user interaction, with the device. The service policy applies a first control to a first activity over a roaming network and a second control to the first activity over a home network, wherein the first control controls the first activity differently than the second control controls the first activity. The first activity is caused by a first software component on the device and comprises a first set of prospective or successful communications over an available wireless network. The aspect of the service policy controls the first activity differently from a second activity over a roaming network, where the second activity is associated with a second software component on the device. | 04-03-2014 |
20140095706 | Device-Assisted Services for Protecting Network Capacity - A system comprising a processor of a communications device configured to monitor a network service usage activity of the communications device in network communication, classify the network service usage activity for differential network access control for protecting network capacity, and associate the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity; and a memory coupled to the processor and configured to provide the processor with instructions. | 04-03-2014 |
20140133297 | SYSTEM AND METHOD FOR WIRELESS NETWORK OFFLOADING - A method comprising obtaining, by a server, wireless-network performance data from a plurality of end user devices; generating, by the server, a prioritized network list from the wireless-network performance data; and provisioning, by the server, the prioritized network list to an end user device comprising a radio interface for receiving the prioritized network list from the server, the radio interface being identified to receive the prioritized network list based on a characteristic associated with the end user device; a radio configured to identify available wireless networks, the available wireless networks being different than a current wireless network to which the end user device is currently connected; a prioritized network selection engine for using the prioritized network list to select one of the available wireless networks; and a network connection engine configured to initiate disconnection from the current wireless network and connection to the selected wireless network. | 05-15-2014 |
20140140213 | Service Policy Implementation for an End-User Device Having a Control Application or a Proxy Agent for Routing an Application Traffic Flow - A method performed by a network system communicatively coupled to a device over a wireless access network, the method comprising transmitting a traffic flow to, or receiving the traffic flow from, a software application on the device, the traffic flow comprising one or more related data transfers over the wireless access network, the traffic flow being routed between the software application and the network system through an assisting element comprising a control application or a proxy agent on the device, wherein the traffic flow has a characteristic associating the traffic flow with the first software application, the characteristic preserving the association between the traffic flow and the software application when the traffic flow is routed by the one or more assisting elements; identifying the characteristic; and implementing at least a portion of a control, accounting, or notification service policy based on the identified characteristic. | 05-22-2014 |
20140148123 | WIRELESS NETWORK SERVICE INTERFACES - A method performed by a network system operated by or on behalf of a service provider, the network system capable of communicating with a user device over a wireless access network, the method comprising establishing, in cooperation with software running on the user device, a secure link between the network system and the software, the secure link for preventing unauthorized access to communications between the software and the network system; providing, to the software over the secure link, first information enabling the software to assist a user of the user device to view, select, or change an aspect of a service plan associated with the user device; and providing, to the software over the secure link, second information, the second information enabling the software to present, through a user interface of the user device, a notification about a past or current service usage by the user device. | 05-29-2014 |
20140162595 | ENHANCED CURFEW AND PROTECTION ASSOCIATED WITH A DEVICE GROUP - A method comprising obtaining, from a master user, a device usage allocation applicable to two or more devices, the two or more devices being associated with another user, the another user being different from the master user, obtaining an aggregate measure of device usage associated with the two or more devices, if the aggregate measure of device usage associated with the two or more devices satisfies a condition relative to the device usage allocation, managing an activity of the two or more devices, and sending a notification to at least one of the two or more devices, the notification for presentation to the another user through a user interface of the at least one of the two or more devices. | 06-12-2014 |
20140248852 | MOBILE DEVICE AND SERVICE MANAGEMENT - A wireless end-user device, comprising one or more modems enabling the wireless end-user device to communicate with a network system over a wireless access network, a touch-screen user interface, and one or more processors configured to execute one or more instructions that, when executed by the one or more processors, cause the one or more processors to detect a user input through the touch-screen user interface, the user input comprising a request to remove the wireless end-user device from an existing device group account, the existing device group account being associated with one or more devices including the wireless end-user device, and send a message to the network system over the wireless access network, the message conveying the request to remove the wireless end-user device from the existing device group account. | 09-04-2014 |
20140273965 | AUTOMATED CREDENTIAL PORTING FOR MOBILE DEVICES - Devices, systems, and non-transitory computer-readable storage media for updating wireless device credentials, the wireless device comprising: a user interface, memory configured to store one or more credentials for enabling the wireless device to obtain one or more services over a wireless access network, and one or more processors configured to execute one or more machine-executable instructions that, when executed by the one or more processors, cause the one or more processors to obtain an indication of a user request to replace a particular credential with a target credential, detect a network-provisioning state change, determine that the particular credential does not match the target credential, initiate a programming session with a network element over a wireless access network, obtain an updated credential from the network element, and assist in storing the updated credential in memory. | 09-18-2014 |
20140289794 | COMMUNICATIONS DEVICE WITH SECURE DATA PATH PROCESSING AGENTS - A network system comprising memory configured to store a device communication activity policy, and a policy verification processor configured to (a) receive a device data record over a trusted communication link between the network system and a device data record generator on a communications device, the device data record comprising information about a data communications activity by the communications device, the information configured to assist the policy verification processor in determining whether the communications device is operating or has operated in accordance with the device communication activity policy, (b) determine, based on the device data record, whether the communications device is operating or has operated in accordance with the device communication activity policy, and (c) upon determining that the communications device is not operating or has not operated in accordance with the device communication activity policy, initiate an error handling action. | 09-25-2014 |
20140337519 | Techniques For Attribution Of Mobile Device Data Traffic To Initiating End-User Application - A method performed by a network system communicatively coupled to a device over a wireless access network, the method comprising transmitting a traffic flow to, or receiving the traffic flow from, a software application on the device, the traffic flow comprising one or more related data transfers over the wireless access network, the traffic flow being routed between the software application and the network system through an assisting element comprising a control application or a proxy agent on the device, wherein the traffic flow has a characteristic associating the traffic flow with the first software application, the characteristic preserving the association between the traffic flow and the software application when the traffic flow is routed by the one or more assisting elements; identifying the characteristic; and implementing at least a portion of a control, accounting, or notification service policy based on the identified characteristic. | 11-13-2014 |
20140337520 | Attribution Of Mobile Device Data Traffic To End-User Application Based On Socket Flows - A method performed by a network system communicatively coupled to a device over a wireless access network, the method comprising transmitting a traffic flow to, or receiving the traffic flow from, a software application on the device, the traffic flow comprising one or more related data transfers over the wireless access network, the traffic flow being routed between the software application and the network system through an assisting element comprising a control application or a proxy agent on the device, wherein the traffic flow has a characteristic associating the traffic flow with the first software application, the characteristic preserving the association between the traffic flow and the software application when the traffic flow is routed by the one or more assisting elements; identifying the characteristic; and implementing at least a portion of a control, accounting, or notification service policy based on the identified characteristic. | 11-13-2014 |
20150026761 | SECURITY, FRAUD DETECTION, AND FRAUD MITIGATION IN DEVICE-ASSISTED SERVICES SYSTEMS - A device having: an application program that assists the device in accessing a data service over a wireless access network, an application credential associated with the application program, and a policy to be applied when the application program initiates or attempts to initiate communication over the wireless access network. The device also has one or more agents that detect an attempted installation of update software on the device, the update software purporting to be a modification, update, or replacement of the application program; obtain an update-software credential associated with the update software; obtain the application credential; allow the update software to be installed if the update-software credential matches the application credential; and interact with the application program to arrange a setting of the application program, the setting configured to assist in applying the policy when the application program initiates or attempts to initiate communication over the wireless access network. | 01-22-2015 |
20150072641 | System and Method for Providing User Notifications - A method performed by an end user device associated with a service plan having a limit on usage of a network service, the method comprising storing one or more notification actions corresponding to one or more notification requests; performing a device action that reflects a past or intended use of the network service; receiving one of the one or more notification requests from a network element in response to the device action; performing one of the one or more notification actions in response to the notification request, the notification action causing the end user device to retrieve at least a portion of a notification message associated with a status of the use, the at least a portion of the notification message being separate from the one of the one or more notification requests; and presenting the notification message on a user interface of the end user device. | 03-12-2015 |
20150111528 | ADAPTING NETWORK POLICIES BASED ON DEVICE SERVICE PROCESSOR CONFIGURATION - Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems. | 04-23-2015 |
20150143456 | END USER DEVICE THAT SECURES AN ASSOCIATION OF APPLICATION TO SERVICE POLICY WITH AN APPLICATION CERTIFICATE CHECK - Mobile end-user devices are disclosed having a stored network access policy, applicable to specific applications stored on and executable by the device. The policy specifies, for at least some of the applications, whether or not those applications are individually allowed to initiate access network communication activity using one or more wireless data modems, when those applications are running as a background application. One or more device agents, which may operate at different points within the device in different embodiments, enforce the policies based on a determination as to whether a running application is running as a background application. | 05-21-2015 |
20150181415 | SERVICE SELECTION SET PUBLISHING TO DEVICE AGENT WITH ON-DEVICE SERVICE SELECTION - Disclosed herein are various embodiments for publishing a service selection set to a device agent on an end-user device and for on-device selection of a service. In some embodiments, a network system publishes a service selection set to an end-user device over a wireless access network, receives a selection set user selection from the end-user device, and provisions one or more network functions based on the selection set user selection. | 06-25-2015 |
20150201089 | Service Design Center for Device Assisted Services - A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls. | 07-16-2015 |
20150207686 | Wireless end-user device with differentiated network access and access status for background and foreground device applications - A wireless end-user device has wireless wide-area network (WWAN) and wireless local-area network (WLAN) modems. One or more processors classify when an application is interacting in the device foreground with a user. For a time period when data for Internet service activities is communicated through the WWAN modem, the processors use a differential traffic control policy to selectively block and allow network access for an application based on whether the application is classified as interacting in the device foreground with a user. The processors provide a network access condition to the application through an application program interface (API), and thus can indicate that Internet data service is unavailable to that particular application based on the classification. A different policy may apply to WLAN modem usage and/or to different WWAN networks. | 07-23-2015 |
20150207708 | Data Usage Monitoring for Media Data Services used by Applications - A wireless end-user device contains a wireless modem, a network stack configurable to receive and transmit network data via the wireless modem, a media service manager, and a service classification agent. The media service manager manages network data transfers for media objects as requested by multiple applications. Even though the media service manager manages the network data transfers, the service classification agent provides a capability to associate network data usage for the network data transfers with the applications that requested the service from the media service manager. | 07-23-2015 |
20150207760 | Wireless end-user device with differentiated network access status for different device applications - A wireless end-user device has wireless wide-area network (WWAN) and wireless local-area network (WLAN) modems. One or more processors apply a WWAN-specific differential traffic control policy to Internet data service provided using the WWAN modem. Based on the applied policy, an application program interface (API) can indicate to particular applications that Internet data service available via the WWAN modem to other applications is not available to those particular applications. | 07-23-2015 |
20150208273 | Device-Assisted Services for Protecting Network Capacity - A wireless end-user device has wireless wide-area network (WWAN) and wireless local-area network (WLAN) modems. One or more processors determine when an application is running in a background state or as a foreground application. The processors control application access for Internet service activities through an application program interface (API). At a time when Internet service activities are communicated through the WWAN modem, the processors use a differential traffic control policy to selectively block and allow network access for an application based on the determination as to whether the application is running in a background state or as a foreground application. A different policy may apply to WLAN modem usage. | 07-23-2015 |
20150215215 | Wireless End-User Device With Differentiated Network Access Selectively Applied to Different Applications - A wireless end-user device has wireless wide-area network (WWAN) and wireless local-area network (WLAN) modems. A memory stores a network service activity control policy set that includes multiple differential traffic control policy elements applicable respectively to different end-user applications. One or more processors are configured to implement an application program interface (API) to control application access to Internet data services communicated through the modems. The API selectively blocks or allows Internet access activities by each of the end-user applications based on their respective traffic control policy elements and based on the modem to be used for the Internet access activities. | 07-30-2015 |
20150215814 | Device-Assisted Services for Protecting Network Capacity - Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity. | 07-30-2015 |
20150215815 | Device-Assisted Services for Protecting Network Capacity - A wireless end-user device has a configurable wireless wide-area network (WWAN) modem capable of connection to both a home WWAN and a roaming WWAN. One or more processors classify whether an application is interacting with a user in a user interface foreground of the device. At a time when Internet service activities are communicated through the roaming WWAN, the processors use a differential traffic control policy list to determine whether or not to apply a differential traffic control policy to an application requesting Internet service access. When the policy is applicable, and the application is not classified as interacting with a user in the device user interface foreground, the Internet service access request is blocked. | 07-30-2015 |
20150223071 | Device-Assisted Services for Protecting Network Capacity - A wireless end-user device has a wireless wide-area network (WWAN) modem and supports multiple wireless network types. A network service activity control policy set has a policy element that associates one or more Internet activity access controls with at least one end-user application. One or more processors determine whether to apply the Internet activity access controls to an Internet access request by or on behalf of the end-user application, based at least on which of the wireless network types is configured to support Internet service activity. The determination may further be based on whether or not the application is interacting with a user. When the controls are to be applied, network activity for the Internet access request is delayed until it can be associated with network activity for one or more other requests not associated with the application. | 08-06-2015 |
20150223100 | Device-Assisted Services for Protecting Network Capacity - A wireless end-user device has wireless wide-area network (WWAN) and wireless local-area network (WLAN) modems. One or more processors classify whether an application is interacting with a user in a user interface foreground of the device. At a time when Internet service activities are communicated through a first wireless network type, the processors use a differential traffic control policy list to determine whether or not to apply a differential traffic control policy to Internet service activities for an application. When the policy is applicable, the policy may direct that Internet service activities by the application are blocked. A user of the device is allowed to augment the policy that will be applied for applications specified as controlled by the list, but not for other applications and/or services. | 08-06-2015 |
20150223101 | Wireless End-User Device With Differential Traffic Control Policy List Applicable toOne of Several Wireless Modems - A wireless end-user device has wireless wide-area network (WWAN) and wireless local-area network (WLAN) modems. One or more processors associate each of a plurality of Internet access requests with a corresponding application executing on the device. The processors apply a differential traffic control policy to at least some of the Internet access requests, based on the corresponding executing application and whether or not that application is covered by a differential traffic control policy list. For one of the modems, the list treatment of an associated application determines whether an Internet access request is allowed or disallowed. For the other modem, the list treatment does not cause that same application to have its Internet access requests disallowed. | 08-06-2015 |
20150223102 | Wireless End-User Device With Differential Traffic Control Policy List Applicable to One of Several Wireless Modems - A wireless end-user device has wireless wide-area network (WWAN) and wireless local-area network (WLAN) modems. One or more processors associate each of a plurality of Internet access requests with a corresponding destination address. The processors apply a differential traffic control policy to at least some of the Internet access requests, based on the corresponding destination address and whether or not that destination address is covered by a differential traffic control policy list. For one of the modems, the list treatment of a destination address determines whether an Internet access request is allowed or disallowed. For the other modem, the list treatment does not cause that same destination address to cause an Internet access request to be disallowed. | 08-06-2015 |
20150223103 | Wireless End-User Device With Network Traffic API to Indicate Unavailability ofRoaming Wireless Connection to Background Applications - A wireless end-user device has a configurable wireless wide-area network (WWAN) modem capable of connection to both a home WWAN and a roaming WWAN. At a time when Internet service activities are communicated through the roaming WWAN, one or more processors apply a differential traffic control policy list so as to disallow background Internet data service. When the policy is applicable, an application program interface (API) indicates that an Internet data service is unavailable to an application operating in a background mode, even though that service is available to a different application. | 08-06-2015 |
20150223109 | Device-Assisted Services for Protecting Network Capacity - A wireless end-user device has wireless wide-area network (WWAN) and wireless local-area network (WLAN) modems. One or more processors classify whether an application is interacting with a user in a user interface foreground of the device. At a time when Internet service activities are communicated through a first wireless network type, the processors use a differential traffic control policy list to determine whether or not to apply a differential traffic control policy to an application requesting Internet service access. When the policy is applicable, and the application is not classified as interacting with a user in the device user interface foreground, the Internet service access request is blocked. A network element supplies or contributes to the contents of the traffic control policy list via secure updates transmitted to the processor(s). | 08-06-2015 |
20150230126 | Device-Assisted Services for Protecting Network Capacity - A wireless end-user device has a wireless wide-area network (WWAN) modem. A network element securely provisions the device with a differential traffic control policy list that distinguishes how network traffic for at least one network type should be treated on a per-application basis. A user is also allowed, through an interface, to configure one or more aspects of how a differential traffic control policy is applied to applications. One or more device agents classify whether an application is interacting with a user in a user interface foreground of the device and whether data communication for Internet service activities is provided through the WWAN modem. Based on the network- and user-configured policy information and the classifications, a network stack agent determines whether to allow or disallow a given Internet access request. Some requests that may otherwise be disallowed are allowed when the WWAN modem is already active to serve another request. | 08-13-2015 |
20150230127 | Wireless End-User Device With Application Program Interface to Allow Applications to Access Application-Specific Aspects of a Wireless Network Access Policy - A wireless end-user device has wireless wide-area network (WWAN) and wireless local-area network (WLAN) modems. A WWAN-specific differential traffic control policy includes aspects that are user-configurable for specific applications, including a background/foreground operation-based policy. One or more processors implement an application program interface that allows an application to access one or more aspects of the policy that are applicable to that application, including one or more user-configurable aspects of the policy. | 08-13-2015 |
20150230152 | Wireless End-User Device With Per-Application Data Limit and Traffic Control Policy List Limiting Background Application Traffic - A wireless end-user device has a wireless wide-area network (WWAN) modem. One or more processors classify whether an application is interacting with a user in a user interface foreground of the device. At a time when Internet service activities are communicated through the WWAN modem, the processors use a differential traffic control policy list to determine whether or not to apply a differential traffic control policy to an application requesting Internet service access. When the policy is applicable, and the application is not classified as interacting with a user in the device user interface foreground, the Internet service access request is blocked. Even when an application access is allowed, a separate control provided a wireless data usage limit for that application. | 08-13-2015 |
20150230184 | Wireless End-User Device With Power-Control-State-Based Wireless Network AccessPolicy for Background Applications - Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity. | 08-13-2015 |
Patent application number | Description | Published |
20110314145 | Device-assisted services for protecting network capacity - Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity. | 12-22-2011 |
20120084438 | Secure Device Data Records - Secure device data records (DDRs) are provided. In some embodiments, a system for secure DDRs includes a processor of a wireless communication device for wireless communication with a wireless network, in which the processor is configured with a secure execution environment, and in which the secure execution environment is configured to: monitor service usage of the wireless communication device with the wireless network; and generate a plurality of device data records of the monitored service usage of the wireless communication device with the wireless network, in which each device data record is associated with a unique sequence order identifier; and a memory coupled to the processor and configured to provide the processor with instructions. In some embodiments, the secure execution environment is located in an application processor, in a modem processor, and/or in a subscriber identity module (SIM). | 04-05-2012 |
20120087319 | SERVICE OFFER SET PUBLISHING TO DEVICE AGENT WITH ON-DEVICE SERVICE SELECTION - Disclosed herein are various embodiments for publishing a service offer set to a device agent on an end-user device and for on-device selection of a service. In some embodiments, a network system publishes a service offer set to an end-user device over a wireless access network, receives an offer set user selection from the end-user device, and provisions one or more network functions based on the offer set user selection. | 04-12-2012 |
20120089727 | SERVICE DESIGN CENTER FOR DEVICE ASSISTED SERVICES - A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls. | 04-12-2012 |
20120096513 | Adapting Network Policies Based on Device Service Processor Configuration - Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems. | 04-19-2012 |
20120101952 | System and Method for Providing User Notifications - A process includes storing on an end user device (EUD) one or more notification actions corresponding to one or more notification requests, the EUD being associated with a service plan having a network service usage limit; performing a device action that reflects a past or intended use of the one or more network services; receiving by the EUD one of the one or more notification requests from a network element in response to the device action; performing by the EUD one of the one or more notification actions in response to the one of the one or more notification requests, the one of the one or more notification actions causing the EUD to retrieve a notification message portion associated with a status of the use, the portion being separate from the one of the one or more notification requests; and presenting the notification message on an EUD user interface. | 04-26-2012 |
20120167162 | SECURITY, FRAUD DETECTION, AND FRAUD MITIGATION IN DEVICE-ASSISTED SERVICES SYSTEMS - Secure architectures and methods for improving the security of mobile devices are disclosed. Also disclosed are apparatuses and methods to detect and mitigate fraud in device-assisted services implementations. | 06-28-2012 |
20120215911 | Flow tagging for service policy implementation - A flow tagging technique includes tagging a data flow at a plurality of points in the data flow. For example, the data flow can be tagged at a socket and at a proxy manager API. By tagging the data flow at multiple points, it becomes possible to map network service usage activities to the appropriate initiating applications. | 08-23-2012 |
20120221955 | END USER DEVICE THAT SECURES AN ASSOCIATION OF APPLICATION TO SERVICE POLICY WITH AN APPLICATION CERTIFICATE CHECK - Network service provisioning is described. Network service provisioning to a device includes a mechanism for ensuring that network services are available based upon one or more of appropriate traffic control, billing, and notification policies. Ensuring that the policies are properly enforced on a device is a focus of this paper. The enforcement policies can be on the device or in the network. | 08-30-2012 |
20120324091 | Device-assisted services for protecting network capacity - Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity. | 12-20-2012 |
20130065551 | Wireless Network Service Interfaces - A uniform wireless network service selection information exchange interface system is provided to facilitate a consistent user experience across multiple wireless networks that may have different service plan activation or service plan purchase processes. Network detection of service usage anomalies based on device-based data usage reports is provided to enable the network to determine whether an end-user device is likely operating in accordance with the established policy, or whether the end-user device may be operating fraudulently. | 03-14-2013 |
20130132854 | Service Plan Design, User Interfaces, Application Programming Interfaces, and Device Management - Disclosed herein are methods, systems, and apparatuses to enable subscribers of mobile wireless communication devices to view, research, select and customize service plans; to create and manage device groups, share and set permission controls for service plans among devices in device groups; to manage communication services through graphical user interfaces; to sponsor and promote service plans; and to design, manage, and control communication services through application programming interfaces. | 05-23-2013 |
20130196647 | Mobile Device Activation Via Dynamically Selected Access Network - Within a network system, a wireless device sends a message to a network element over a first wireless access network, the message including a first device credential and being configured to obtain information to assist in presenting an on-device user service plan selection choice through a user interface of the wireless device. After sending the message, the wireless device determines that it lacks authorization to connect to the network element over the first wireless network and, in response, attempts to connect to the network element over a second data access network. | 08-01-2013 |
20130304616 | TEXT NOT AVAILABLE - A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls. | 11-14-2013 |
20130305322 | System and Method for Providing User Notifications - A method comprising obtaining a credential associated with a first device in a device group, the device group having a shared data allocation available to the device group, the shared data allocation establishing an amount of communication over a first wireless network; determining, based on the credential, that the first device is authorized to set or change an aspect of a policy applicable when a second device in the device group is connected to the first wireless network; obtaining, from the first device, a user preference; and provisioning, based on the user preference and the determination that the first device is authorized to set or change the at least an aspect of the policy for the second device, one or more network elements to at least assist in enforcing or applying the policy when the second device is connected to the first wireless network. | 11-14-2013 |