H04M15/30

Wireless device applying different background data traffic policies to different device applications

A wireless end-user device can communicate data using a home network or a roaming network. The device stores a network service usage activity classification list that indicates which of a plurality of background data traffic policies to apply respectively to each of a plurality of applications resident on the device. A processor on the device determines which type of network the device currently connects through, and whether a particular application is currently operating as a background application. According to the applicable policy, a given application operating in the background may be allowed to perform network service usage activities on both network types, on only one of the network types, or on neither of the network types.

Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
12238051 · 2025-02-25 · ·

Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.

Proximity service charging

A mechanism for a user equipment is described. The mechanism comprises allocating a secure memory area, wherein said secure memory area being inaccessible by a user of the user equipment; generating an charging identifier relating to proximity communication involving the user equipment; collecting proximity service charging data during the proximity communication; storing the charging identifier and the proximity service charging data in the secure memory area.

Proximity service charging

A mechanism for a user equipment is described. The mechanism comprises allocating a secure memory area, wherein said secure memory area being inaccessible by a user of the user equipment; generating an charging identifier relating to proximity communication involving the user equipment; collecting proximity service charging data during the proximity communication; storing the charging identifier and the proximity service charging data in the secure memory area.

Hybrid network based metering server and tracking client for wireless services

A process of tracking usage of a wireless device in a wireless network with a metering system includes implementing the metering system in a network separate from the wireless network and activating the wireless device in response to identification of the wireless device and confirmation of use of a tracking system to the metering system. The process further includes obtaining, by the metering system, an amount of wireless services used by the wireless device. The obtaining includes at least one of obtaining an amount of wireless services used from the wireless network and obtaining an amount of wireless services used from the tracking system.

Hybrid network based metering server and tracking client for wireless services

A process of tracking usage of a wireless device in a wireless network with a metering system includes implementing the metering system in a network separate from the wireless network and activating the wireless device in response to identification of the wireless device and confirmation of use of a tracking system to the metering system. The process further includes obtaining, by the metering system, an amount of wireless services used by the wireless device. The obtaining includes at least one of obtaining an amount of wireless services used from the wireless network and obtaining an amount of wireless services used from the tracking system.

Device-assisted services for protecting network capacity

A system comprising a processor of a communications device configured to monitor a network service usage activity of the communications device in network communication, classify the network service usage activity for differential network access control for protecting network capacity, and associate the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity; and a memory coupled to the processor and configured to provide the processor with instructions.

Device-Assisted Services for Protecting Network Capacity
20250080370 · 2025-03-06 ·

There is provided a wireless end-user device configured to assign one of classifications to each of end-user applications to allow for a differential network access control of the end-user applications. The classifications include a background classification and a foreground classification. The differential network access control includes a service usage control policies applicable when a network service is available via a wireless modem, the service usage control policies including a first policy that allows data associated with a first end-user application of the end-user applications to be communicated via the wireless modem, and a second policy that defers the data associated with the first end-user application to be communicated via the wireless modem until a state change occurs. The wireless end-user device is configured to dynamically select from the service usage control policies based on whether the background classification or the foreground classification is assigned to the first end-user application.

Device group partitions and settlement platform
09565543 · 2017-02-07 · ·

A method performed by a network system communicatively coupled to a device over a wireless network, the method comprising: receiving authentication information from the device over the wireless network, the authentication information enabling the network system to authenticate the device; obtaining a charging data record (CDR) comprising information identifying a device activity over the wireless network associated with the device and indicating a usage amount associated with the device activity; and using one or more rules, processing the CDR to generate information configured to assist in (a) providing to a partner entity an accounting of a first portion of usage of the wireless network associated with the device activity indicated by the CDR, the partner entity providing an Internet-based service to the device, and (b) determining an accounting of a second portion of the usage of the wireless network associated with the activity indicated by the CDR.

Device group partitions and settlement platform
09565543 · 2017-02-07 · ·

A method performed by a network system communicatively coupled to a device over a wireless network, the method comprising: receiving authentication information from the device over the wireless network, the authentication information enabling the network system to authenticate the device; obtaining a charging data record (CDR) comprising information identifying a device activity over the wireless network associated with the device and indicating a usage amount associated with the device activity; and using one or more rules, processing the CDR to generate information configured to assist in (a) providing to a partner entity an accounting of a first portion of usage of the wireless network associated with the device activity indicated by the CDR, the partner entity providing an Internet-based service to the device, and (b) determining an accounting of a second portion of the usage of the wireless network associated with the activity indicated by the CDR.