Patent classifications
H04L12/1417
Secure tokens for controlling access to a resource in a resource distribution network
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a time-based token based on a time duration specified for a meter. The time-based token indicates the time duration for the meter. The time-based token is further generated based on an identifier of the meter. The headend system transmits the time-based token to the meter via at least a mesh network. After receiving the time-based token, the meter validates the time-based token to determine that the time-based token is generated for the meter based on information related to the identifier of the meter. If the meter determines that the time-based token is valid, the meter connects premises associated with the meter to a resource distribution network for at least the time duration specified in the time-based token.
Secure tokens for controlling access to a resource in a resource distribution network
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a global token based on a time duration specified for multiple meters that are in communication with the headend system through at least a mesh network in a normal condition. The global token is associated with the time duration and is applicable to the multiple meters. The headend system causes the global token to be broadcast via a broadcast network. After receiving the global token, the meter verifies the global token and determines the time duration associated with the global token. The meter further connects premises associated with the meter to a resource distribution network for at least the time duration associated with the global token.
System and method for granular network access and accounting
A method and apparatus are provided in which network traffic is separated based on application, query, or other criteria. A first application is stored in a first control group in a resource isolation environment, the first control group being associated with a first policy. A second application is stored in a second control group in the resource isolation environment, the second control group being associated with a second policy. Upon receiving a request for content through one of the first application and the second application, it is determined which control group is associated with the request. Traffic is managed in connection with the request according to the policy associated with the determined control group.
System, method, and computer program for rating network transmissions based on user requested data
A system, method, and computer program product are provided for rating network transmissions based on user requested data. In use, a transmission of data over a network is identified, where the data includes user requested data and additional data. Additionally, a size of the user requested data is determined. Furthermore, the transmission of the user requested data is rated based on the size of the user requested data. The transmission of additional data may be charged to third parties such as advertisers.
Method for processing service connection in a communication network and device thereof
The present invention provides a method for processing a service connection in a communication network, comprising: A) determining, in response to a establishment request for the service connection from a UE, whether the service corresponding to the establishment request is a sponsored service, wherein the sponsored service is provided by a third party application provider; B) sending a validating request for the sponsored service to the third party application provider, if the service corresponding to the establishment request is a sponsored service; and C) controlling the sponsored service connection according to the information related to the sponsored service, if receiving a successful acknowledgement corresponding to the validating request. And a device corresponding to the method is provided. With the above method, the data connection of the sponsored application service may be dynamically controlled and configured, moreover the requirement of QoS control service can be dynamically met.
Changing a data stream characteristic based on a data usage rate
An approach is provided for adjusting a characteristic of a data stream. A rate of data usage provided by one or more data streams within a time period that has not ended is determined. An amount of time remaining in the time period is determined. Based at least in part on the amount of time remaining in the time period and the rate of data usage, an expected amount of data usage within the entire time period is determined. Whether the expected amount of data usage exceeds a limit on data usage within the entire time period is determined. If the expected amount of data usage exceeds the limit, the characteristic of the data stream is adjusted so that actual data usage within the entire time period does not exceed the limit. The actual data usage is based in part on the adjusted characteristic.
Wireless access point having metering capability and metering display
The disclosure provides a system and method for metering on a prepaid wireless access point the amount of data transferred between a wireless device and the Internet and inhibiting further data transmission when the amount of prepaid data available reaches or drops below a pre-determined threshold. Specifically, the wireless access point includes a metering client to track one of data usage or an amount of prepaid data available. When the metering client indicates that the amount of data available has dropped below a pre-determined threshold, the wireless access point inhibits further data transmission.
Method and apparatus for verifying the correctness of a roaming account balance
This application discloses a roaming charging method and apparatus. A blockchain network stores information related to roaming fee settlement, to reduce a possibility that the information related to roaming fee settlement is tampered with. In addition, a digital signature algorithm is used to sign roaming service statistics to generate an abstract, to further prevent the roaming service statistics from being tampered with. In this way, when a home carrier verifies a roaming account balance by using the roaming service statistics and a roaming charging rule, accuracy of a verification result can be ensured, and the home carrier can obtain an accurate roaming fee of a user.
Systems and methods for improving telecommunications device experiences
Systems and methods for providing a better user experience and provider profitability. An exemplary system includes a telecommunications device subject to a cellular service plan from a cellular carrier. The telecommunications device includes an application program that gathers device usage data and determines whether the current cellular service plan is the best service plan based on gathered usage data. If a current cellular service plan is not the best service plan, based on the gathered usage data, then cellular service plans from the current cellular service provider or other service providers are measured against the gathered device-usage data to determine the best available service plan.
Technologies for converting mobile communications network billing records
Technologies for converting mobile communications network billing records include a billing record converter system. The billing record converter system receives a data usage billing record associated with a mobile computing device communicatively coupled to a long term evolution wireless communications network. The received data usage billing record is formatted according to a real-time data usage billing record format. The received data usage billing record is converted into a new data usage billing record formatted according to a roaming data usage billing record format that corresponds to a legacy wireless communications network. The new data usage billing record is transmitted to a billing system of the legacy wireless communications network for processing. In some embodiments, the billing record converter system cumulates and converts multiple data usage billing records associated with the mobile computing device into the new data usage billing record. Other embodiments are described and claimed.