H04M15/885

Detection of a delinquent mobile device

A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.

RESTORING FUNCTIONALITY OF A MOBILE DEVICE
20170230515 · 2017-08-10 ·

A method and system of restoring a functionality of a mobile user device. A lock screen is displayed on the display of the user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card presently installed in the user device is determined. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS indicating whether the IMSI is authorized for the user device and whether an account of the user device is replenished at least in part. Upon determining that the IMSI is authorized for the user device and the account of the user device is replenished at least in part, at least one function that was previously restricted is restored.

APPLICATION-SPECIFIC MOBILE DATA ALLOCATION

Mobile devices may obtain applications from an application market infrastructure. The applications may consume data from a data allocation that has been purchased from a mobile data provider. A user may assign a sub-allocation of the data allocation with a specific application, for use by the application. When the sub-allocation is depleted, the application may alert the user and also give the user an opportunity to purchase additional data. If the user accepts an offer to purchase additional data, the application calls the application market infrastructure to process a purchase transaction for the additional data. The application market infrastructure interacts with the user to complete the transaction and then instructs the mobile data provider to allocation additional data to the mobile device of the user, which is then added to the sub-allocation associated with the application.

METHOD, APPARATUS AND COMPUTER-READABLE MEDIUM FOR CELLULAR DATA MONITORING
20170180968 · 2017-06-22 ·

Method, apparatus and computer-readable medium for cellular data monitoring are provided. The method may include: receiving a cellular data monitoring command to get a cellular data usage for a background application, wherein the background application is an application program running in background; and outputting a correspondence relationship between an application identifier of the background application and the cellular data usage for the background application.

DATA QUOTA MANAGEMENT FOR WIRELESS COMMUNICATION SYSTEMS

A wireless service provider server includes a transceiver to provide data for transmission to and receive data from one or more subscribers to a wireless service plan at a quality-of-service (QoS). The wireless service provider server also includes a processor to modify the QoS for the at least one subscriber based on a comparison of data usage by the at least one subscriber during a time interval specified by the wireless service plan and an elapsed portion of the time interval.

BANDWIDTH MONITORING FOR DATA PLANS
20170134592 · 2017-05-11 ·

Users with limited data plans for a network connection can have usage of that network connection by various applications monitored such that the user can determine how much bandwidth each application uses based on activity of that user. Upon viewing application-specific usage information and/or determining how much each application can contribute to overage charges, the user can determine how to adjust behavior to meet personal usage targets. In at least some embodiments, a user can specify limits for specific applications, after which the traffic for that application can be blocked or at least require approval from the user. Such limits also can guarantee enough bandwidth for specific applications when the user otherwise would reach or exceed the maximum amount of bandwidth under the data plan.

Application processing method and mobile terminal
09609142 · 2017-03-28 ·

An application processing method and a mobile terminal are provided. The method includes: analyzing an operation right of an application when the application executes an invoking operation for a fee deduction event; allowing the application to execute the invoking operation if the application has an operation right for the fee deduction event; and forbidding the application from executing the invoking operation if the application does not have the operation right for the fee deduction event. In the present disclosure, it is not necessary to scan an application every time the application runs. It is only necessary to determine the operation right of the application, which cuts down processing time and avoids waste of system resources, while at the same time does not require participation of the user and facilitates the user to use. In this way, the user experience is improved.

ELECTRONIC DEVICE AND CONTENT TRANSMITTING AND RECEIVING METHOD THEREOF
20170085723 · 2017-03-23 · ·

An electronic device is provided. The electronic device includes a communication module configured to communicate with an external electronic device and a processor configured to determine a size of content, transmit or receive the content at a first speed if the size of the content is less than a specific size, and transmit or receive the content at a second speed, which is slower than the first speed, if the size of the content is greater than or equal to the specific size.

Application-specific mobile data allocation

Mobile devices may obtain applications from an application market infrastructure. The applications may consume data from a data allocation that has been purchased from a mobile data provider. A user may assign a sub-allocation of the data allocation with a specific application, for use by the application. When the sub-allocation is depleted, the application may alert the user and also give the user an opportunity to purchase additional data. If the user accepts an offer to purchase additional data, the application calls the application market infrastructure to process a purchase transaction for the additional data. The application market infrastructure interacts with the user to complete the transaction and then instructs the mobile data provider to allocation additional data to the mobile device of the user, which is then added to the sub-allocation associated with the application.

INFORMATION THROTTLE THAT ENFORCES POLICIES FOR WORKPLACE USE OF ELECTRONIC DEVICES

Information throttle that modifies a device's access to applications, features, or information to enforce workplace use policies. May be used with bring your own devices that belong to a user but are also used at work. For example, the system may disable games, media players, or social media when it determines that a device is used at work. A usage context monitor determines the context in which the device is currently used. The monitor may determine that a device is used for work when the time matches working hours, the device location matches a work site location, or the network connected to a device matches a workplace network. In addition to blocking access to inappropriate features, the information throttle may allow access to sensitive information only when the device is at work. Access may also depend on factors such as user credentials and the identity and configuration of the device.