Patent classifications
H04M15/885
Managing network data consumption of applications on cellular computer networks on one or more server computers
Computer systems and methods for managing network data consumption between a client computer and one or more server computers. A computer system comprising: a memory persistently storing a set of instructions; one or more processors coupled to the memory, wherein the one or more processors execute the set of instructions, which causes the one or more processors to: receive, at an intermediary server computer, a first plurality of requests associated with a first user, a first operator, and a first application; and for each request in the first plurality of requests, determine a size of the request, and add the size of the request to a first running total associated with the first user, the first operator, and the first application; receive, from a remote client computer, at the intermediary server computer, a first request that comprises one or more values that identify the first user, the first application, a first application server computer; determine that the first request is associated with the first operator; determine that the first request is a first size; and determine whether the first size plus the first running total is greater than a first threshold associated with the first user, the first operator, and the first application; in response to determining that the first size plus the first running total is not greater than the first threshold: increment the first running total associated with the first user, the first operator, and the first application by the first size; send the first request to the first application server computer.
Restoring functionality of a mobile device
A method and system of restoring a functionality of a mobile user device. A lock screen is displayed on the display of the user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card presently installed in the user device is determined. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS indicating whether the IMSI is authorized for the user device and whether an account of the user device is replenished at least in part. Upon determining that the IMSI is authorized for the user device and the account of the user device is replenished at least in part, at least one function that was previously restricted is restored.
Information throttle that enforces policies for workplace use of electronic devices
Information throttle that modifies a device's access to applications, features, or information to enforce workplace use policies. May be used with bring your own devices that belong to a user but are also used at work. For example, the system may disable games, media players, or social media when it determines that a device is used at work. A usage context monitor determines the context in which the device is currently used. The monitor may determine that a device is used for work when the time matches working hours, the device location matches a work site location, or the network connected to a device matches a workplace network. In addition to blocking access to inappropriate features, the information throttle may allow access to sensitive information only when the device is at work. Access may also depend on factors such as user credentials and the identity and configuration of the device.
Operating system supporting cost aware applications
A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network.
NETWORK-BASED PER-APPLICATION DATA USAGE LIMITATIONS
Servers, computer-readable media, and methods are disclosed for halting forwarding of traffic of an application exceeding a per-application data usage limitation. For example, a processor deployed in a telecommunication network may detect traffic between a third-party device and an endpoint device, associate the traffic with an application of a plurality of applications running on the endpoint device, determine, based upon a volume of the traffic, that a per-application data usage limitation for the application is exceeded, and halt forwarding of the traffic when the per-application data usage limitation for the application is exceeded.
Secure toll-free application data access
Secure toll-free application data network access is disclosed. Respective limits for registered traffic (e.g., application provider addresses; content type; transmission time; location; etc.) and non-registered traffic (e.g., all other traffic) may be associated with an application eligible for toll-free connectivity. As traffic is received via the toll-free connection, the data is inspected to determine first whether the traffic is registered or non-registered traffic. If registered, the quantity of data is deducted from the allowable data amount specified during provisioning for registered traffic. If non-registered, the quantity of data is deducted from the allowable amount specified during provisioning for non-registered traffic. Accordingly, a toll-free application provider can agree to sponsor a limited quantity of arbitrary traffic which may be generated as content viewed through the wrapped application.
Application-specific mobile data allocation
Mobile devices may obtain applications from an application market infrastructure. The applications may consume data from a data allocation that has been purchased from a mobile data provider. A user may assign a sub-allocation of the data allocation with a specific application, for use by the application. When the sub-allocation is depleted, the application may alert the user and also give the user an opportunity to purchase additional data. If the user accepts an offer to purchase additional data, the application calls the application market infrastructure to process a purchase transaction for the additional data. The application market infrastructure interacts with the user to complete the transaction and then instructs the mobile data provider to allocation additional data to the mobile device of the user, which is then added to the sub-allocation associated with the application.
Customization of traffic control services
A method, a device, and a non-transitory storage medium to provide a user interface that allows a user to configure a traffic control service, the traffic control service including at least one of a content-based service, an application-based service, a time-based service, a location-based service, or a quality-of-service-based service; receive, via the user interface, selections of parameters that govern the traffic control service, and a unique identifier of an end user to which the traffic control service pertains; configure the traffic control service in a line card of a network device included in the data path, wherein the configuration includes the rules data and the unique identifier in the line card, and the traffic control service that includes an in-line quota enforcement service and a charging record service.
Affiliated service provision method
When a plurality of services are enjoyed by a single terminal, a communication regulation caused by another service has influence on enjoyment of another service. A service provider and a mobile communication provider are affiliated with each other and newly provide an affiliated service in which a communication fee for a service use is borne by the service provider to a user. Conventional communication and affiliated service communication are performed on a single communication line of the user together, and communication control is performed in units of services such that a service quality of the affiliated service is maintained. It is implemented by affiliating a communication log and contract information between business operators and performing communication identification using user information at the time of a contract as a key.
Method and system for operating a security system that has a cellular communication connection with a data usage cap
A method for improving the reliability of a security system includes determining an amount of cellular communication data usage over a cellular communication connection since the beginning of a predefined period of time and a remaining amount of cellular communication data for the remainder of the predefined period of time based at least in part on the amount of cellular communication data usage over the cellular communication connection since the beginning of the predefined period of time and a predefined cellular data usage cap for the predefined period of time. When a determination is made that a projected amount of cellular communication data usage is expected to exceed the predefined cellular data usage cap at or before the end of the predefined period of time, one or more operations of the security system are changed to reduce the amount of cellular communication data usage by the security system.