摘要:
A flow tagging technique includes tagging a data flow at a plurality of points in the data flow. For example, the data flow can be tagged at a socket and at a proxy manager API. By tagging the data flow at multiple points, it becomes possible to map network service usage activities to the appropriate initiating applications.
摘要:
Secure architectures and methods for improving the security of mobile devices are disclosed. Also disclosed are apparatuses and methods to detect and mitigate fraud in device-assisted services implementations.
摘要:
Various embodiments are disclosed for user notifications for device assisted services (DAS). A process for notification includes storing on an end user device notification actions corresponding to notification requests, the end user device being associated with a service plan having a limit on usage of network services; performing a device action that reflects a past or intended use of the network services; receiving by the end user device notification requests from a network element in response to the device action; performing by the end user device notification actions in response to the notification requests, the notification actions causing the end user device to retrieve at least a portion of a notification message associated with a status of the use, the at least a portion of the notification message being separate from the notification requests; and presenting the notification message on a user interface of the end user device.
摘要:
Various embodiments are disclosed for user notifications for device assisted services (DAS). In some embodiments, a process for notification includes storing on an end user device one or more notification actions corresponding to one or more notification requests, the end user device being associated with a service plan having a limit on usage of one or more network services; performing a device action that reflects a past or intended use of the one or more network services; receiving by the end user device one of the one or more notification requests from a network element in response to the device action; performing by the end user device one of the one or more notification actions in response to the one of the one or more notification requests, the one of the one or more notification actions causing the end user device to retrieve at least a portion of a notification message associated with a status of the use, the at least a portion of the notification message being separate from the one of the one or more notification requests; and presenting the notification message on a user interface of the end user device.
摘要:
A technique involves modular storage' of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls.
摘要:
A method for lowering dark current in an image sensor pixel, the method includes the steps of providing a photosensitive area for receiving incident light which is converted into a charge; providing a gate for transferring charge from the photosensitive area; wherein the gate is held at a voltage which will accumulate majority carriers at a semiconductor-dielectric interface during integration for the photosensitive area. Alternatively, a potentail profile can be provided under the gate to drain the dark current away from the photogeneration diffusion.
摘要:
A method for lowering dark current in an image sensor pixel, the method includes the steps of providing a photosensitive area for receiving incident light which is converted into a charge; providing a gate for transferring charge from the photosensitive area; wherein the gate is held at a voltage which will accumulate majority carriers at a semiconductor-dielectric interface during integration for the photosensitive area. Alternatively, a potentail profile can be provided under the gate to drain the dark current away from the photogeneration diffusion.
摘要:
A flow tagging technique includes tagging a data flow at a plurality of points in the data flow. For example, the data flow can be tagged at a socket and at a proxy manager API. By tagging the data flow at multiple points, it becomes possible to map network service usage activities to the appropriate initiating applications.
摘要:
Secure device data records (DDRs) are provided. In some embodiments, a system for secure DDRs includes a processor of a wireless communication device for wireless communication with a wireless network, in which the processor is configured with a secure execution environment, and in which the secure execution environment is configured to: monitor service usage of the wireless communication device with the wireless network; and generate a plurality of device data records of the monitored service usage of the wireless communication device with the wireless network, in which each device data record is associated with a unique sequence order identifier; and a memory coupled to the processor and configured to provide the processor with instructions. In some embodiments, the secure execution environment is located in an application processor, in a modem processor, and/or in a subscriber identity module (SIM).
摘要:
Disclosed herein are various embodiments for publishing a service offer set to a device agent on an end-user device and for on-device selection of a service. In some embodiments, a network system publishes a service offer set to an end-user device over a wireless access network, receives an offer set user selection from the end-user device, and provisions one or more network functions based on the offer set user selection.