Patent classifications
H04M15/885
OPERATING SYSTEM SUPPORTING COST AWARE APPLICATIONS
A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network.
METHOD FOR REGULATING ACCESS TO DATA CONNECTION BY AN ELECTRONIC DEVICE
A method for monitoring and limiting access to a data connection by an electronic which has means for enabling/disenabling selectively the data connection is disclosed. The method includes a) detecting the initial and final time of each access to data connection during a predetermined time interval: b) counting the overall duration of the accesses to the data connection during the predetermined time interval: and c) if the overall duration reaches a value equal to a maximum duration value pre-set before the end of the predetermined time interval, actuating the means for disenabling the data connection until the end of the predetermined time interval. The method can provide a detailed report and a check in real time, by remote access, of the accesses and durations of a web site, of the time use of installed applications on the device, telephone calls, texts and screenshots of the devices placed under control.
Efficient service authorization and charging in a communication system
An approach is disclosed for service authorization and service charging in a communication network relying on executing a real time service authorization for a requested service by determining an upper estimate of a service charge for the requested service, comparing the upper estimate with a balance value of an account used for charging the requested service and when affirmative authorizing the requested service. Then follows a calculation of an accurate service charge for the requested service in a batch mode without real time requirements after the real time service authorization.
Systems and methods for monitoring data and bandwidth usage
Access to a communications network may be provided via a data provider that may charge for access. In some cases, the access fee may be related to the amount of network resources consumed (e.g., amount of data downloaded or bandwidth used). In some cases, a user may have access to a particular amount of data provider resources and be required to pay an additional fee for using resources in excess of the particular amount. To assist the user in managing his data resource consumption, a resource utilization component may provide different alerts and notices informing the user of current consumption, expected future consumption, and recommendations for reducing data provider resources consumed (e.g., stopping particular processes or data provider requests, such as downloading media). If several electronic devices in a network are connected to the same data provider resources, a network component may manage the data provider resource use among the several electronic devices (e.g., allow only particular users or devices access).
Operating system supporting cost aware applications
A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network.
Network-based per-application data usage limitations
Servers, computer-readable media, and methods are disclosed for halting forwarding of traffic of an application exceeding a per-application data usage limitation. For example, a processor deployed in a telecommunication network may detect traffic between a third-party device and an endpoint device, associate the traffic with an application of a plurality of applications running on the endpoint device, determine, based upon a volume of the traffic, that a per-application data usage limitation for the application is exceeded, and halt forwarding of the traffic when the per-application data usage limitation for the application is exceeded.
INFORMATION THROTTLE THAT ENFORCES POLICIES FOR WORKPLACE USE OF ELECTRONIC DEVICES
Information throttle that modifies a device's access to applications, features, or information to enforce workplace use policies. May be used with bring your own devices that belong to a user but are also used at work. For example, the system may disable games, media players, or social media when it determines that a device is used at work. A usage context monitor determines the context in which the device is currently used. The monitor may determine that a device is used for work when the time matches working hours, the device location matches a work site location, or the network connected to a device matches a workplace network. In addition to blocking access to inappropriate features, the information throttle may allow access to sensitive information only when the device is at work. Access may also depend on factors such as user credentials and the identity and configuration of the device.
Detection of a delinquent mobile device
A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.
OPERATING SYSTEM SUPPORTING COST AWARE APPLICATIONS
A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network.
RESTORING FUNCTIONALITY OF A MOBILE DEVICE
A method and system of restoring a functionality of a mobile user device. A lock screen is displayed on the display of the user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card presently installed in the user device is determined. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS indicating whether the IMSI is authorized for the user device and whether an account of the user device is replenished at least in part. Upon determining that the IMSI is authorized for the user device and the account of the user device is replenished at least in part, at least one function that was previously restricted is restored.