Abstract:
A method performed by an end user device associated with a service plan having a limit on usage of a network service, the method comprising storing one or more notification actions corresponding to one or more notification requests; performing a device action that reflects a past or intended use of the network service; receiving one of the one or more notification requests from a network element in response to the device action; performing one of the one or more notification actions in response to the notification request, the notification action causing the end user device to retrieve at least a portion of a notification message associated with a status of the use, the at least a portion of the notification message being separate from the one of the one or more notification requests; and presenting the notification message on a user interface of the end user device.
Abstract:
A flow tagging technique includes tagging a data flow at a plurality of points in the data flow. For example, the data flow can be tagged at a socket and at a proxy manager API. By tagging the data flow at multiple points, it becomes possible to map network service usage activities to the appropriate initiating applications.
Abstract:
A method performed by an end user device associated with a service plan having a limit on usage of a network service, the method comprising storing one or more notification actions corresponding to one or more notification requests; performing a device action that reflects a past or intended use of the network service; receiving one of the one or more notification requests from a network element in response to the device action; performing one of the one or more notification actions in response to the notification request, the notification action causing the end user device to retrieve at least a portion of a notification message associated with a status of the use, the at least a portion of the notification message being separate from the one of the one or more notification requests; and presenting the notification message on a user interface of the end user device.
Abstract:
A method performed by a network system communicatively coupled to a device over a wireless access network, the method comprising transmitting a traffic flow to, or receiving the traffic flow from, a software application on the device, the traffic flow comprising one or more related data transfers over the wireless access network, the traffic flow being routed between the software application and the network system through an assisting element comprising a control application or a proxy agent on the device, wherein the traffic flow has a characteristic associating the traffic flow with the first software application, the characteristic preserving the association between the traffic flow and the software application when the traffic flow is routed by the one or more assisting elements; identifying the characteristic; and implementing at least a portion of a control, accounting, or notification service policy based on the identified characteristic.
Abstract:
Disclosed herein are methods, systems, and apparatuses to enable subscribers of mobile wireless communication devices to view, research, select and customize service plans; to create and manage device groups, share and set permission controls for service plans among devices in device groups; to manage communication services through graphical user interfaces; to sponsor and promote service plans; and to design, manage, and control communication services through application programming interfaces.
Abstract:
A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls.
Abstract:
A wireless end-user device has a wireless modem, a network stack configurable to receive and transmit data via the modem and a wireless network, and two Application Programming Interfaces (APIs) available to device applications. The first API allows applications to open and use data flows via the network stack. The second API allows applications to make data transfer requests for media objects associated with network resource identifiers. The second API prompts a media service manager to manage network data transfers for the media object via the network stack. A service classification agent associates wireless network data usage for the media object network data transfers with the device application making the request.
Abstract:
A method comprising obtaining, from a master user, a device usage allocation applicable to two or more devices, the two or more devices being associated with another user, the another user being different from the master user, obtaining an aggregate measure of device usage associated with the two or more devices, if the aggregate measure of device usage associated with the two or more devices satisfies a condition relative to the device usage allocation, managing an activity of the two or more devices, and sending a notification to at least one of the two or more devices, the notification for presentation to the another user through a user interface of the at least one of the two or more devices.
Abstract:
A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls.
Abstract:
Mobile end-user devices are disclosed having a stored network access policy, applicable to specific applications stored on and executable by the device. The policy specifies, for at least some of the applications, whether or not those applications are individually allowed to initiate access network communication activity using one or more wireless data modems, when those applications are running as a background application. One or more device agents, which may operate at different points within the device in different embodiments, enforce the policies based on a determination as to whether a running application is running as a background application.