H04M15/857

DATA USAGE RECOMMENDATION GENERATOR

The method includes receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.

Wireless Access Point Having Metering Capability and Metering Display
20190245980 · 2019-08-08 ·

The disclosure provides a system and method for metering on a prepaid wireless access point the amount of data transferred between a wireless device and the Internet and inhibiting further data transmission when the amount of prepaid data available reaches or drops below a pre-determined threshold. Specifically, the wireless access point includes a metering client to track one of data usage or an amount of prepaid data available. When the metering client indicates that the amount of data available has dropped below a pre-determined threshold, the wireless access point inhibits further data transmission.

Data usage recommendation generator

The method include receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.

Metering and Metering Display on Computer for Wireless Access Point
20190191034 · 2019-06-20 ·

A process of operating a wireless device and a wireless device operative for obtaining at least one of data usage or an amount of data usage available by a wireless access point with a processor. The process and device further connecting to the wireless access point and transferring data to and from the wireless access point with a transceiver and displaying on a display the at least one of data usage or an amount of data usage available by the wireless access point.

Wireless access point having metering capability and metering display
10270916 · 2019-04-23 · ·

The disclosure provides a system and method for metering on a prepaid wireless access point the amount of data transferred between a wireless device and the Internet and inhibiting further data transmission when the amount of prepaid data available reaches or drops below a pre-determined threshold. Specifically, the wireless access point includes a metering client to track one of data usage or an amount of prepaid data available. When the metering client indicates that the amount of data available has dropped below a pre-determined threshold, the wireless access point inhibits further data transmission.

Methods and systems for rule based charging for internet of things (IoT) support

Systems and methods are provided for charging for resource usage by an Internet of Things (IoT) device. The method includes: creating a subscription for the IoT device; estimating, based at least in part on the subscription, a number of event notifications associated with resource usage by the IoT device expected over a period of time; transmitting a first message including the number of estimated event notifications associated with resource usage by the IoT device expected over the period of time towards an Online Charging System (OCS); and transmitting a second message including an actual number of event notifications associated with resource usage by the IoT device over the period of time towards the OCS.

Detection of a delinquent mobile device

A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.

Metering and metering display on computer for wireless access point
10218857 · 2019-02-26 · ·

A process of operating a wireless device and a wireless device operative for obtaining at least one of data usage or an amount of data usage available by a wireless access point with a processor. The process and device further connecting to the wireless access point and transferring data to and from the wireless access point with a transceiver and displaying on a display the at least one of data usage or an amount of data usage available by the wireless access point.

DATA USAGE ANALYTICS APPLICATION FOR DYNAMIC CONTROL OF DATA USAGE ON A CLIENT DEVICE
20190053019 · 2019-02-14 ·

This disclosure sets forth techniques that aggregate and analyze data usage of a client device over a communications network. Particularly, data usage may be quantified over a predetermined time interval and used to provide recommendations that instruct a client on techniques for reducing a data usage rate. Recommendations may be presented as visual and/or audible alerts. This disclosure further describes techniques to dynamically alter data usage characteristics of particular data usage events to reduce a current rate of data usage. Computational instructions may dynamically reduce a file size of a multimedia/data file, limit a capability to download a multimedia/data file, or reduce a data usage rate of a multimedia stream via trans-rating or pacing techniques. Additionally, exemplary user interfaces may facilitate customizing data usage monitoring settings. The exemplary user interfaces may enable a client to customize a graphical representation of data usage over a predetermined period of time.

Charging record authentication for anonymized network service utilization

A user device (10) provides a subscriber with access to a network service. The user device (10) determines service-specific key material and charging-specific key material. The user device (10) determines a charging record indicating usage of the network service by the subscriber and associates the charging record with first authentication information based on the charging-specific key material. The user device (10) generates at least one message including the charging record and the associated first authentication information. The user device (10) associates the at least one message with second authentication information based on the service-specific key material. The user device (10) sends the at least one message to a first network node (150) which is incapable of relating the charging-specific key material or the service-specific key material to a subscriber identity of the subscriber. The first network node (150) receives the at least one message and the associated second authentication information from the user device (10) and authenticates the at least one message based on the service-specific key material and the second authentication information. In response to authenticating the at least one message, the first network node forwards the charging record and the associated first authentication information to a second network node (120). The second network node (120) is capable of relating the charging-specific key material to the subscriber identity of the subscriber. The second network node (120) receives the charging record and the associated first authentication information from the first network node (150) and authenticates the charging record based on the charging-specific key material and the first authentication information. In response to authenticating the charging record, the second network node (120) controls charging of the network service.