H04M15/30

SYNCHRONOUS INTERFACING WITH UNAFFILIATED NETWORKED SYSTEMS TO ALTER FUNCTIONALITY OF SETS OF ELECTRONIC ASSETS
20240273303 · 2024-08-15 · ·

Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.

MOBILE COMMUNICATION DEVICE MONITORING SYSTEMS AND METHODS
20180343307 · 2018-11-29 ·

Systems and methods are directed to monitoring the communications to and from a mobile communication device in accordance with one or more embodiments. For example in accordance with an embodiment, data services a mobile communication device's applications may be monitored against smart contracts stored in a central data center repository and/or written to a blockchain. Other data services may include all forms of communications between the mobile communication device and a third party along with changes to application or data within the mobile communication device. Monitoring the mobile communication device may be done to determine compliance with the smart contracts and whether a penalty or reward on device usage should be applied.

MOBILE COMMUNICATION DEVICE MONITORING SYSTEMS AND METHODS
20180343339 · 2018-11-29 ·

Systems and methods are directed to monitoring the communications to and from a mobile communication device in accordance with one or more embodiments. For example in accordance with an embodiment, data services a mobile communication device's applications maybe monitored against smart contracts stored in a central data center repository and/or written to a blockchain. Other data services may include all forms of communications between the mobile communication device and a third party along with changes to application or data within the mobile communication device. Monitoring the mobile communication device may be done to determine compliance with the smart contracts and whether a penalty or reward on device usage should be applied.

Bandwidth aware network statistics collection

Herein disclosed are systems, methods, and apparatus for controlling data usage statistics in network-connected devices. The stats collection can be suppressed during minimum window periods, thereby reducing CPU and resources usage needed to processes the stats collection. Further, the minimum window can be a function of a link speed of the communication channel as well as a data usage proximity to a data usage warning limit. Further, stats collection can be triggered by expiration of a timer or data usage that meets a buffer threshold, where both the timer and threshold are selected based on the communication channel link speed, and buffer threshold is further a function of the data usage proximity to the warning limit.

Bandwidth aware network statistics collection

Herein disclosed are systems, methods, and apparatus for controlling data usage statistics in network-connected devices. The stats collection can be suppressed during minimum window periods, thereby reducing CPU and resources usage needed to processes the stats collection. Further, the minimum window can be a function of a link speed of the communication channel as well as a data usage proximity to a data usage warning limit. Further, stats collection can be triggered by expiration of a timer or data usage that meets a buffer threshold, where both the timer and threshold are selected based on the communication channel link speed, and buffer threshold is further a function of the data usage proximity to the warning limit.

Hybrid Network Based Metering Server and Tracking Client for Wireless Services
20180302764 · 2018-10-18 ·

A process of tracking usage of a wireless device in a third party wireless network with a metering system includes implementing the metering system in a network separate from the third party wireless network and activating the wireless device in response to identification of the wireless device and confirmation of use of a tracking system to the metering system. The process further includes obtaining, by the metering system, an amount of wireless services used by the wireless device. The obtaining includes at least one of obtaining an amount of wireless services used from the third party wireless network and obtaining an amount of wireless services used from the tracking system.

Hybrid Network Based Metering Server and Tracking Client for Wireless Services
20180302764 · 2018-10-18 ·

A process of tracking usage of a wireless device in a third party wireless network with a metering system includes implementing the metering system in a network separate from the third party wireless network and activating the wireless device in response to identification of the wireless device and confirmation of use of a tracking system to the metering system. The process further includes obtaining, by the metering system, an amount of wireless services used by the wireless device. The obtaining includes at least one of obtaining an amount of wireless services used from the third party wireless network and obtaining an amount of wireless services used from the tracking system.

Mobile communication device monitoring systems and methods
12113864 · 2024-10-08 · ·

Systems and methods are directed to monitoring the communications to and from a mobile communication device in accordance with one or more embodiments. For example in accordance with an embodiment, data services a mobile communication device's applications may be monitored against smart contracts stored in a central data center repository and/or written to a blockchain. Other data services may include all forms of communications between the mobile communication device and a third party along with changes to application or data within the mobile communication device. Monitoring the mobile communication device may be done to determine compliance with the smart contracts and whether a penalty or reward on device usage should be applied.

Mobile communication device monitoring systems and methods
12113864 · 2024-10-08 · ·

Systems and methods are directed to monitoring the communications to and from a mobile communication device in accordance with one or more embodiments. For example in accordance with an embodiment, data services a mobile communication device's applications may be monitored against smart contracts stored in a central data center repository and/or written to a blockchain. Other data services may include all forms of communications between the mobile communication device and a third party along with changes to application or data within the mobile communication device. Monitoring the mobile communication device may be done to determine compliance with the smart contracts and whether a penalty or reward on device usage should be applied.

Device-Assisted Services for Protecting Network Capacity
20240340190 · 2024-10-10 ·

There is provided a wireless end-user device configured to assign one of classifications to each of end-user applications to allow for a differential network access control of the end-user applications. The classifications include a background classification and a foreground classification. The differential network access control includes a service usage control policies applicable when a network service is available via a wireless modem, the service usage control policies including a first policy that allows data associated with a first end-user application of the end-user applications to be communicated via the wireless modem, and a second policy that defers the data associated with the first end-user application to be communicated via the wireless modem until a state change occurs. The wireless end-user device is configured to dynamically select from the service usage control policies based on whether the background classification or the foreground classification is assigned to the first end-user application.