Patent classifications
H04W12/088
Device Group Partitions and Settlement Platform
Device group partitions and a settlement platform are provided. In some embodiments, device group partitions (e.g., partitions of devices based on associated device groups) are provided. In some embodiments, a settlement platform service is provided. In some embodiments, a settlement platform service is provided for partitioned devices. In some embodiments, collecting device generated service usage information for one or more devices in wireless communication on a wireless network; and aggregating the device generated service usage information for a settlement platform for the one or more devices in wireless communication on the wireless network is provided. In some embodiments, a settlement platform implements a service billing allocation and/or a service/transactional revenue share among one or more partners. In some embodiments, service usage information includes micro-CDRs, which are used for CDR mediation or reconciliation that provides for service usage accounting on any device activity that is desired. In some embodiments, each device activity that is desired to be associated with a billing event is assigned a micro-CDR transaction code, and a service processor of the device is programmed to account for that activity associated with that transaction code. In some embodiments, a service processor executing on a wireless communications device periodically reports (e.g., during each heartbeat or based on any other periodic, push, and/or pull communication technique(s)) micro-CDR usage measures to, for example, a service controller or some other network element for CDR mediation or reconciliation.
NETWORK FILTER
Systems and methods for managing a network are disclosed. One method can comprise transmitting a first identifier associated with a first service. Access to the first service can be provided to a user device using the first identifier. A filter element associated with the user device can be received. Transmission of a second identifier associated with a second service can be filtered based on the filter element, wherein filtering transmission inhibits access of the user device to the second service.
NETWORK FILTER
Systems and methods for managing a network are disclosed. One method can comprise transmitting a first identifier associated with a first service. Access to the first service can be provided to a user device using the first identifier. A filter element associated with the user device can be received. Transmission of a second identifier associated with a second service can be filtered based on the filter element, wherein filtering transmission inhibits access of the user device to the second service.
Integrated activity management system and method of using same
A method of providing secure communication between users of a network using layered security, the method includes providing a communicator to each user of a network, each user having user information including user hardware, user software, and user location stored within the network, providing multiple keys to each communicator and corresponding locks to the network, each key including a plurality of identifiers to confirm identity of the user, verifying that a user seeking to obtain access to the network has a communicator with keys that match all the locks stored on the network, and providing the user access to the network when the keys on the communicator are verified, wherein the plurality of identifiers is a combination of user hardware, user software, and user location.
Integrated activity management system and method of using same
A method of providing secure communication between users of a network using layered security, the method includes providing a communicator to each user of a network, each user having user information including user hardware, user software, and user location stored within the network, providing multiple keys to each communicator and corresponding locks to the network, each key including a plurality of identifiers to confirm identity of the user, verifying that a user seeking to obtain access to the network has a communicator with keys that match all the locks stored on the network, and providing the user access to the network when the keys on the communicator are verified, wherein the plurality of identifiers is a combination of user hardware, user software, and user location.
Cloud application-agnostic data loss prevention (DLP)
The technology disclosed applies data loss prevention (DLP) to those cloud-applications for which no application-specific parser is available. Known cloud applications can be arranged in categories of services such as “personal pages and blog,” “news websites,” “cloud-based storage services,” and “social media services.” A category includes a list of uniform resource locators (URLs) of providers of cloud applications that allow users to perform similar activities. The various providers in a category use different syntaxes to implement services in the category. The disclosed category-directed parsers synthesize interaction syntax patterns of a sample of providers in the category. A category-directed parser collects metadata from known cloud applications using multiple category-directed match rules synthesized from syntaxes used by the sample providers in the category. The metadata collected by the category-directed parser enables the DLP processor to focus analysis of the content being conveyed via a corresponding API.
ELECTRONIC DEVICE FOR PERFORMING EDGE COMPUTING SERVICE, AND OPERATING METHOD OF ELECTRONIC DEVICE
An electronic device and an operating method of an electronic device are provided. The electronic device receives, from a first server, access information about a second server for accessing the second server, receives access information about a third server from the second server accessed based on the access information about the second server, in response to a service connection request using the third server of an application, checks the validity of the application based on data for verifying the validity of the application included in the access information about the third server, and performs the service by accessing the third server based on the result of identifying the validity of the application.
Proxy gateway mediated internet-enabled data consumption over unstructured supplementary service data
Apparatuses, methods, and systems for internet-enabled data for transparent application consumption over unstructured supplementary service data are disclosed. One method includes generating, by an application, IP (internet protocol) packets, encapsulating, by a proxy interface, the IP packets into protocol data units (PDUs), generating frames of data for facilitating communication through a wireless link, wherein the frames include data slots and control information slots, identifying, by the base station, unused control information slots of the frames of data, scheduling transmission of a stream of the PDUs over the unused control information slots for a full-time duration of the unused control information slots, inserting the PDUs into one or more of the scheduled control information slots of the frames of data as specified by the scheduling, and transmitting, by the computing device, the frames of data through the wireless link to the base station on the scheduled control information slots.
Proxy gateway mediated internet-enabled data consumption over unstructured supplementary service data
Apparatuses, methods, and systems for internet-enabled data for transparent application consumption over unstructured supplementary service data are disclosed. One method includes generating, by an application, IP (internet protocol) packets, encapsulating, by a proxy interface, the IP packets into protocol data units (PDUs), generating frames of data for facilitating communication through a wireless link, wherein the frames include data slots and control information slots, identifying, by the base station, unused control information slots of the frames of data, scheduling transmission of a stream of the PDUs over the unused control information slots for a full-time duration of the unused control information slots, inserting the PDUs into one or more of the scheduled control information slots of the frames of data as specified by the scheduling, and transmitting, by the computing device, the frames of data through the wireless link to the base station on the scheduled control information slots.
Privacy-Enhanced Contact Tracing using Mobile Applications and Portable Devices
A embodiment may involve receiving a contact tracing request for a first user identifier that corresponds to a first portable device identifier of a first portable device. The second example embodiment may also involve requesting and receiving, from a first computing device associated with the first user identifier, device adjacency data, wherein the device adjacency data contains a plurality of contact entries, wherein one of the contact entries identifies a second portable device identifier of a second portable device that was wirelessly detected by the first portable device and a timestamp of when the wireless detection of the second portable device occurred. The second example embodiment may involve determining, from the mappings, a second user identifier that corresponds to the second portable device identifier. The second example embodiment may further involve transmitting, to a second computing device associated with the second user identifier, a contact tracing notification.