Patent classifications
H04W4/26
Adapting Network Policies Based on Device Service Processor Configuration
Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.
Wirless Network Buffered Message System
A network server system maintains secure Internet data message links with respective device link agents on each of many wireless end-user devices. Through a network interface, the server system receives messages from network elements, for which delivery is requested to specific software components on specific ones of the devices. A message buffer system buffers such messages for delivery, and logic determines whether one of several potential triggers has happened to cause the system to deliver buffered messages to a particular one of the devices. For at least some messages, receiving the message at the buffer will not trigger delivery. At least one trigger identifies a time-critical message, however, which can cause all buffered messages for a particular device to be delivered. Such a system balances wireless network efficiency and opportunistic delivery with a potential for fast message delivery, when needed.
DATA USAGE RECOMMENDATION GENERATOR
The method include receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.
ON-DEVICE ATTRIBUTION OF NETWORK DATA USAGE
Embodiments attribute network data transfers to applications executing on a computing device. A data transfer service executes on the computing device to receive and process data transfer requests. The data transfer requests, populated by the applications, have identifiers attributed thereto to enable monitoring of the network data transfers per identifier. For example, network data transfers associated with different mail accounts of a mail program or different web sites of browser are attributed separately. Data usage statistics relating to the network data transfers for each identifier may be generated and presented to the user for review.
Determining usage predictions and detecting anomalous user activity through traffic patterns
A system for selecting and monitoring data plans for telecommunications systems, and methods of determining, learning and estimating usage patterns in-order to predict usage and tie this to cost and the overlaying of plan selection for cost optimization. Further, additional methods are applied to determine anomalous user behaviors and raise security and data leakage related events.
Data usage recommendation generator
The method include receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.
Hybrid Network Based Metering Server and Tracking Client for Wireless Services
A process of tracking usage of a wireless device in a third party wireless network with a metering system includes implementing the metering system in a network separate from the third party wireless network and activating the wireless device in response to identification of the wireless device and confirmation of use of a tracking system to the metering system. The process further includes obtaining, by the metering system, an amount of wireless services used by the wireless device. The obtaining includes at least one of obtaining an amount of wireless services used from the third party wireless network and obtaining an amount of wireless services used from the tracking system.
Selective enabling of data services to roaming wireless terminals
A system includes a network interface and one or more processors. The processors are configured to track a first pattern with which a user terminal consumes one or more data services while served by a home network specified for the user terminal, to track a second pattern with which the user terminal consumes the one or more data services while served by one or more networks other than the home network, to estimate a reduction in usage of the one or more data services between the first and second patterns, and to selectively enable at least one data service to the user terminal by the networks other than the home network, based on the estimated reduction in usage.
DATA USAGE RECOMMENDATION GENERATOR
The method include receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.
Mobile device configured for communicating with another mobile device associated with an associated user
Systems and methods for operating a mobile virtual network are disclosed. A mobile virtual network operator is disclosed as an entity that provides a mobile networking service to a user, the mobile networking service being provided using a physical mobile network provided by a third party. The mobile virtual network operator may provide content distribution services, data access services, or messaging services to a user of a mobile device.