Patent application number | Description | Published |
20100262506 | MOBILE CONTENT DELIVERY ON A MOBILE NETWORK - Embodiments related to mobile content delivery are disclosed. One disclosed embodiment provides a method of facilitating mobile content delivery on a mobile network. The method comprises receiving a purchase request from a network client at a mobile marketplace system; prompting the network client to provide a billing preference; receiving the billing preference from the network client at the mobile marketplace system, the billing preference indicating a billing party; authenticating a billing relationship between the network client and a mobile operator if the billing preference indicates the mobile operator as the billing party; authenticating a billing relationship between the network client and the mobile marketplace system if the billing preference indicates the mobile marketplace system as the billing party; and providing a mobile content item from the mobile marketplace system to the network client if the billing relationship between the network client and the billing party is authenticated. | 10-14-2010 |
20100262619 | PROVISION OF APPLICATIONS TO MOBILE DEVICES - Embodiments related to the provision of applications to mobile devices are disclosed. One embodiment provides a mobile device application server system, comprising a database, a processor, and memory comprising instructions stored thereon that are executable by the processor to perform a method of providing applications to mobile devices. The method comprises receiving a first application configured to be run on a first mobile device type, storing the first application, receiving a second application configured to be run on a second device mobile device type, and storing the second application. The method further comprises receiving a request for the first application from a first mobile device of the first mobile device type, providing the first application to the first mobile device, receiving a request for the second application from a second mobile device of the second mobile device type, and providing the second application to the second mobile device. | 10-14-2010 |
20100262959 | REVOCATION OF APPLICATION ON MOBILE DEVICE - Embodiments related to the revocation of applications on mobile devices are disclosed. For example, one disclosed embodiment provides a method of revoking an application stored on a mobile device, wherein the method comprises receiving an application revocation request, the application revocation request comprising an instruction to revoke a selected application saved on one or more mobile devices, sending to a mobile device an application revocation instruction configured to revoke the selected application on the mobile device, and sending to another entity a request to roll back a previously-made transaction related to the selected application. | 10-14-2010 |
20100306090 | DIGITAL CONTENT BILLING VIA MULTIPLE CHANNELS - Embodiments related to billing for digital content via multiple billing channels with different permissible prices are disclosed. One disclosed embodiment comprises a digital content server configured to receive from a content provider an input of a digital content item, send to the content provider a list of suggested prices that are permissible in each billing channel, and then receive an input of a selected price for the content item. If the selected price is from the list of suggested prices, then billing is enabled via each of the billing. On the other hand, if the selected price for the digital content item is not from the list of suggested prices, then billing is enabled via a first subset of billing channels for which the selected price is permissible, and not enabled via a second subset of billing channels for which the selected price is not permissible. | 12-02-2010 |
20140236925 | PROVISION OF APPLICATIONS TO MOBILE DEVICES - Embodiments related to the provision of applications to mobile devices are disclosed. One embodiment provides a mobile device application server system, comprising a database, a processor, and memory comprising instructions stored thereon that are executable by the processor to perform a method of providing applications to mobile devices. The method comprises receiving a first application configured to be run on a first mobile device type, storing the first application, receiving a second application configured to be run on a second device mobile device type, and storing the second application. The method further comprises receiving a request for the first application from a first mobile device of the first mobile device type, providing the first application to the first mobile device, receiving a request for the second application from a second mobile device of the second mobile device type, and providing the second application to the second mobile device. | 08-21-2014 |
Patent application number | Description | Published |
20110238532 | DETERMINING MOBILE OPERATORS FOR MOBILE DEVICES - Determining a mobile operator for a mobile device. The mobile operator is determined using one or more of an international mobile subscriber identity (IMSI) and a current operator name (CON) and service provider name (SPN) pair. Correlations between the IMSI and mobile operators, and between the CON/SPN pairs and mobile operators, are maintained. Correlations between unrecognized CON/SPN pairs and mobile operators are created based on a quantity of requests received from the mobile devices. In some embodiments, identifying the mobile operator enables financial transactions by the mobile device when visiting, for example, a mobile applications store. | 09-29-2011 |
20110251886 | PROMOTIONAL PLACEMENT OF APPLICATIONS IN A MARKETPLACE - Assigning a mobile application to a promotional slot in a mobile application marketplace managed by an operator. One or more bids for the promotional slot in the mobile application marketplace are received. Each of the received bids is associated with one of a plurality of applications and includes a value representing a proposed revenue share with the operator. Revenue potential information corresponding to the applications associated with the bids is accessed. Expected revenue for the operator for the applications associated with the bids is calculated based on the received bids and the accessed revenue potential information. The calculated expected revenue differentiates the mobile applications. One of the applications is selected to be assigned to the promotional slot based at least on the calculated expected revenue for the operator. | 10-13-2011 |
20110258249 | TARGETING APPLICATIONS BASED ON MOBILE OPERATOR - Filtering mobile applications in a mobile applications store based on a determined mobile operator associated with a mobile computing device. Mobile operators select mobile applications to be made available to mobile computing devices associated with the mobile operators. Users visit the online mobile applications store via the mobile computing devices. During the visits, the mobile operators associated with the mobile computing device are determined. The mobile applications selected by the mobile operators are presented to the mobile computing devices. In some embodiments, branding content from the mobile operators is provided to the mobile computing device when presenting the filtered mobile applications. | 10-20-2011 |
20120089404 | GLOBAL PRICING FOR CONTENT DISTRIBUTION - In embodiments of global pricing for content distribution, price points at which content is distributed for sale in a base currency can be determined, and a base price point selected from the price points. Currency value equivalents to the selected base price point may then be obtained for multiple currencies. A base price tier is populated with base prices that include the selected base price point and the currency value equivalents for the multiple currencies. A tax amount for each of the base prices in the base price tier can be calculated, and the calculated tax amount added to the base prices to generate tax-based prices in the base price tier. The tax-based prices can then be increased to a common price ending for each of the multiple currencies to generate the base price tier of global base prices. | 04-12-2012 |
20120099727 | PROVISIONING TECHNIQUES - Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request received via a network. The located public key is communicated via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key. | 04-26-2012 |
20120109771 | Application Name Marketplace - Application name marketplace techniques are described. In one or more implementations, a service provide implemented by one or more computing devices identifies one or more terms for use in naming applications to be available for purchase via a network. The one or more terms are exposed by the service as available for purchase of a right to use the one or more terms to name a respective application. | 05-03-2012 |
20120109999 | Application store concierge - An application sequence may be composed in response to a user query. The application sequence may be based upon user data accessed by the application concierge service. Each application within the personalized chain of applications may request and receive data from the application concierge service about the other applications within the chain. | 05-03-2012 |
20120124028 | Unified Application Discovery across Application Stores - Techniques for discovery of applications across a plurality of application stores are described herein. The discovery may be in response to a query and intent process, which may be initiated by a search query. The search query may reveal user intent to discover an application by operation of a search engine. The user intent may be matched with indexed application content. The application content may be obtained by operation of a discovery and indexing process. A crawler may discover and crawl a plurality of application stores. Additionally or alternatively, a feed store may receive direct feeds of application information and links to download locations from a plurality of application stores. Both the discovered data and direct feeds may be sent to an indexer, to create and maintain an index. Search results pages may be returned to provide users with information, links to developer websites and links to download pages from a plurality of application stores. | 05-17-2012 |
20120143677 | Discoverability Using Behavioral Data - The present disclosure describes a system and method of increasing discoverability of software applications in a marketplace catalog via behavioral data. Specifically, a client monitors behavioral usage of applications with a local usage tracking framework, optionally utilizing a data template. The data is aggregated either on the client or on a server or both, and synchronized with a server storage to be made available via application behavioral services. The client may also host an advertising placement framework to place selected advertising in the view of the client's user. Application behavioral services may apply one or more behavioral algorithms to the aggregated behavioral usage, to generate recommendations to maximize marketplace catalog ranking, visibility and projected revenue. | 06-07-2012 |
20120143694 | USING BEHAVIORAL DATA TO MANAGE COMPUTER SERVICES - Some implementations provide techniques for managing features provided by a computer service. A service side framework may receive usage data relating to an application executed on a client device. One or more behavioral algorithms may be implemented to perform behavioral analysis on the received usage data to identify at least one behavioral trend associated with the application. At least one feature of the computer service may be modified based on at least some of the behavioral analysis performed on the usage data. In some implementations, location data may also be taken into consideration. | 06-07-2012 |
20120144201 | SECURE ELEMENT AUTHENTICATION - Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware. | 06-07-2012 |