H04L12/1414

WIRELESS AUTHORIZATION AND ACCESS NETWORK-NEUTRAL ADVICE OF CHARGE TECHNIQUES
20210274048 · 2021-09-02 ·

Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include determining, by a roaming subscriber, that a visited network is a chargeable network; querying, by the roaming subscriber, the visited network for charging policies for at least two identity realms; obtaining, by the roaming subscriber, charging policy metadata associated with the charging policies for the at least two identity realms; selecting, by the roaming subscriber, an identity realm through which to connect to the visited network based on the charging policy metadata for the at least two identity realms; and connecting to the visited network using the selected identity realm.

WIRELESS AUTHORIZATION AND ACCESS NETWORK-NEUTRAL ADVICE OF CHARGE TECHNIQUES

Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include obtaining, by a home network, a request to authorize access of a roaming subscriber for a visited network; determining whether the request includes visited network charging information and visited network metric information; based on determining that the request includes the visited network charging information and the visited network metric information, determining whether one or more visited network metrics satisfy one or more threshold metrics for the roaming subscriber; and based on determining that the one or more visited network metrics satisfy the one or more threshold metrics for the roaming subscriber, authorizing access of the roaming subscriber for the visited network.

AUTOMATIC RECHARGING OF DATA QUOTA FOR SUCCESSFUL COMPLETION OF TRANSACTION

A method, computing system, and computer program product are provided. A processor of a computer system estimates an amount of bandwidth to be used to complete a transaction based on a usage history. Responsive to determining that the amount of the estimated bandwidth to be used exceeds a predefined threshold of an amount of available bandwidth and to determining that an account has any offers for additional bandwidth at no additional cost, the amount of available bandwidth is automatically recharged using at least some of the any offers until either the any offers are exhausted or the estimated amount of the bandwidth to be used would be less than the predefined threshold. When the estimated amount of the bandwidth to be used continues to exceed the predefined threshold, the bandwidth is automatically recharged using an advanced amount of bandwidth to increase a likelihood that the transaction will complete successfully.

MANAGED PUBLIC CLOUD
20200358672 · 2020-11-12 ·

System for Managing Public Cloud (1) comprising at least a software and hardware arrangement for Basic support (or package A), said arrangement allowing to: Display on digital forms configuration questions and to fill up the forms Enable Centralized Billing and Reporting Decide on Security Functionality required among the selected choices Secured Global Account. (Owner Level) (Azure) Secured Root Account (AWS) Collection of audit logs with secure storage and retention Determine thresholds for giving Alert on Cloud Billing.

Data constrained resource access
10776410 · 2020-09-15 · ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for managing data deliver for data constrained user devices. In one aspect, a method includes the actions of receiving, from a user device, requests for resources. For each of the requests, determining whether the user device is currently subject to a data constraint for receiving data responsive to the request. For each request for which the user device is determined to be subject to the data constraint, provide data that causes the user device to display a prompt to choose whether a resource responsive to the request is to be provided in the unrestricted data form or a restricted data form. A resource can be provided in an unrestricted data form has a first data size and provided in a restricted data form has a second data size that is less than the first data size.

Cross Check Confirmation System for Utility Usage and Spend

Presented are methods and systems to universally assess composite utility consumption (1) in which a plurality of real-time and batch sensor readings such as from multiple disparate utility sensor data inputs (3) may be acquired and stored such as into a local device (2) or a central data warehouse (6). A composite utility estimated cost generator (9) can generate missing or uncorrelated data and a collected composite utility data information correlator (11) can correlate the data so it can be applied to determine some type of composite utility cost information. For real-time calculation, a disparate utility rate information accessor (8) can obtain multiple items of disparate rate information and this can use with correlated data to create a composite utility consumption and spend so a user can manage and control utility usage for a home, building, facility, plant, specific equipment, or the like. Cost information, such as a rate of spend or spend amount(s) to date or for a period may be presented to user in a variety of visualizations and reporting formats including specific time usage and spend information, specific time range usage and spend, and time-of-use billing information for specific real-time data points. The visualization and reporting may be used to answer a plurality of usage questions along with specific characterizations of utility spend across time of day domains and specific equipment usage domains thus affording more effective utility cost management.

Data storage metering and billing

A method for data storage metering and billing includes receiving, at an owner server on a periodic basis, storage utilization data. The storage utilization data includes one or more measurements of data storage usage for data storage at a customer location of a customer where the customer location is remote from the owner server. The method includes calculating, from the storage utilization data, average storage utilization data that includes an average of the storage utilization data from the customer location for a billing period. The method includes calculating billing information for the average storage utilization data for the billing period where the billing information is calculated from the average storage utilization data and a calculated storage billing rate, and providing, to the customer, access to the billing information.

Methods and systems for implementing differential pricing configurations
10511454 · 2019-12-17 · ·

Methods for implementing different pricing configurations by a server system are disclosed. The server system provides an application programming interface (API) for one or more network operators and receives, from a network operator via the API, a first request for a pricing configuration for network access for one or more internet protocol (IP) addresses hosted by the network operator. The server system retrieves the pricing configuration and provides a response to the first request to the network operator via the API that includes the pricing configuration.

Systems for real-time analysis and reporting of utility usage and spend

Presented are methods and systems to universally assess composite utility consumption (1) in which a plurality of real-time and batch sensor readings such as from multiple disparate utility sensor data inputs (3) may be acquired and stored such as into a local device (2) or a central data warehouse (6). A composite utility estimated cost generator (9) can generate missing or uncorrelated data and a collected composite utility data information correlator (11) can correlate the data so it can be applied to determine some type of composite utility cost information. For real-time calculation, a disparate utility rate information accessor (8) can obtain multiple items of disparate rate information and this can use with correlated data to create a composite utility consumption and spend so a user can manage and control utility usage for a home, building, facility, plant, specific equipment, or the like. Cost information, such as a rate of spend or spend amount(s) to date or for a period may be presented to user in a variety of visualizations and reporting formats including specific time usage and spend information, specific time range usage and spend, and time-of-use billing information for specific real-time data points. The visualization and reporting may be used to answer a plurality of usage questions along with specific characterizations of utility spend across time of day domains and specific equipment usage domains thus affording more effective utility cost management.

Data binge detection
10462624 · 2019-10-29 · ·

A method for detecting an accidental data binge includes obtaining a data usage category of a user equipment (UE) device based on historical data usage for the UE device over a cellular network, the data usage category associated with a binge data threshold. The method also includes receiving an amount data consumed by the UE device over the cellular network and determining whether the amount of the data consumed by the UE device within a threshold period of time satisfies the binge data threshold. The method also includes determining that the amount of the data consumed by the UE device within the threshold period of time may be accidental and instructing the UE device to output a notification indicating that the amount of the data consumed by the UE device over the cellular network may be accidental.