Patent classifications
H04L12/1435
Functionality management via application modification
Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, a request to perform an action may be received. Upon determining that the action is associated with a metered resource, a further determination may be made as to whether the request complies with at least one management policy. In response to determining that the request complies with the at least one management policy, the requested action may be authorized and/or caused to be performed.
Enabling role-based operations to be performed on machine data in a machine environment
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and objects that may be part of a multi-tenant application, such as a search application. Search objects may be employed to access indexed objects. An amount of indexed data accessible to a user may be based on an index storage limit selected by the user, such that data that exceeds the index storage limit may continue to be indexed. Also, one or more projects can be elastically scaled for a user to provide resources that may meet the specific needs of each project.
METHOD, APPARATUS AND SYSTEM FOR USING A USER EQUIPMENT AS A SMALL EVOLVED NODEB FOR A SMALL CELL
A device, method and system of using a first user equipment (UE) as a small evolved NodeB (eNB) for a small cell may comprise receiving a first long term evolution (LTE) packet from a second UE over the small cell; converting the first LTE packet into a first transmission control protocol/Internet protocol (TCP/IP) packet, wherein the converting includes retrieving payload data from the first LTE packet and encapsulating the payload data into the first TCP/IP packet by adding a TCP/IP header to the payload data, and wherein the TCP/IP header includes an IP address of an Evolved Packet Core (EPC) network associated to Internet based on a TCP/IP tunneling protocol; and transmitting the first TCP/IP packet to an Internet destination via the EPC connected with the first UE through an Internet server over a local area network (LAN).
Method, system and apparatus for adaptive quota determination for shared resources
A method of adapting quotas for a shared resource in a network includes: retrieving, at a charging server, a usage level and a time period for each of a plurality of communication sessions associated with the shared resource, the communication sessions corresponding to respective client devices connected to the network; determining, at the charging server, whether the shared resource can support each of the communication sessions for the corresponding retrieved usage level and time period; when the determination is negative, determining a common reduced time period for each of the communication sessions at the charging server; and at the charging server, when the reduced time period exceeds a predefined threshold, allocating quotas to each of the communication sessions from the shared resource based on the usage levels and the reduced time period.
Management of subscriber identity modules
Management of subscriber identity modules is disclosed. A server apparatus manages, in addition to or instead of mobile network operators, by a service provider, subscriptions to wireless communication networks. The server apparatus maintains subscriber identity module-specific usage records. Each usage record comprises a quantity quantifying amount of data transferred with each subscriber identity module and a limit setting the maximum allowed amount of data transfer for each subscriber identity module. The server apparatus compares periodically the quantity in each usage record with the limit in the same usage record, and if the quantity in the usage record is within a predetermined margin of the limit in the same usage record, transmits, with the data communication interface, to the mobile apparatus, a command to limit data transfer speed of the subscriber identity module defined by the usage record.
METHOD AND SYSTEM FOR ENABLING DATA USAGE ACCOUNTING THROUGH A RELAY
A method and system for enabling data usage accounting is described herein. The method can be practiced on a computing device that has secure applications and unsecure applications installed thereon. Initially, a request for a data session that includes a final endpoint can be received through a secure application. The request for the data session can be intercepted and modified to cause the request to be re-directed back to the secure application. A connection with a relay server can be initiated instead of the final endpoint such that data usage accounting for the data session is to be conducted at a remote location.
Method, apparatus and mobile device for measuring internet traffic of mobile device
An apparatus for measuring and displaying Internet traffic of a mobile device, which includes a traffic measurement module and a traffic display module. The apparatus also includes a SIM card account creation module configured to create a SIM card account for each of a plurality of SIM cards. The traffic measurement module measures the Internet traffic of each of the SIM card accounts. The traffic display module displays the Internet traffic of each of the SIM card accounts. The Internet traffic of each SIM card on the mobile device may be measured and displayed.
Method and system for wireless local area network user to access fixed broadband network
A method and system for a wireless local area network user accessing a fixed broadband network, the method includes: a broadband network gateway (BNG) device initiating an identity authenticating process to an authentication authorization accounting (AAA) server for a wireless local area network (WLAN) user; after the AAA server successfully authenticates the WLAN user, the BNG device acquiring a mobility identifier of the WLAN user from the AAA server; after receiving the mobility identifier of the WLAN user, the BNG device allowing the mobility access of the WLAN user.
Solution to enforce time and usage threshold for monitoring
Methods, apparatuses, and computer program products for enforcing time and usage limits are provided. One method includes allocating a usage allowance and time allowance for a group subscription to a network, and receiving a notification when a minimum threshold is reached for either the usage allowance or the time allowance within a certain duration. The method may further include determining a remainder of the usage allowance and a remainder of the time allowance by querying at least one policy and charging enforcement function, and reallocating the usage allowance and the time allowance based on the determined remainder of the usage allowance and the determined remainder of the time allowance.
System and method for providing toll-free application data access
Toll-free application data network access is disclosed. In one aspect, there is a device for providing data connectivity. The device includes a connection detector configured to receive a data connectivity request from an application installed on the device. The device further includes an authorization transceiver. The authorization transceiver is configured to transmit an authorization request to a service provider associated with the application via a telecommunication connection, the authorization request including an application identifier for the application and an operator identifier for the service provider. The authorization transceiver is further configured to receive an authorization response indicative of operator specific billing for the application from the service provider. The device also includes a connection manager configured to establish data connectivity via the telecommunication connection based on the authorization response.