Patent application number | Description | Published |
20090285179 | Long-Term Evolution (LTE) Packet Data Network Gateway (PDN-GW) Selection - The current 3rd Generation Partnership Project (3GPP) long-term evolution reference architecture defines a packet data network gateway (PDN-GW) selection function which is responsible for allocation of a packet data network gateway that provides packet data network connectivity for 3GPP and non-3GPP access for a given session. Systems and methods are provided for moving the PDN-GW selection function to a centralized network element (the HSS network element) for both 3GPP and non-3GPP access. | 11-19-2009 |
20090305684 | Long-Term Evolution (LTE) Policy Control and Charging Rules Function (PCRF) Selection - The PCRF Selection Function selects the PCRF for an IP-CAN session. In embodiments, the PCRF Selection Function is located in the HSS and/or the 3GPP AAA server. The PCRF Selection Function is only required to be located in the HSS if a Bearer Binding and Event Reporting Function (BBERF) is deployed in the serving gateway. In this case, the PCRF selection takes place at the time that the PDN Gateway is selected and returned by the HSS to the serving gateway over the HSS to MME interface (S6a). | 12-10-2009 |
20100035576 | Usage Measurement Collection and Analysis to Dynamically Regulate Customer Network Usage - In a network subscriber system, a method of determining how to monitor whether a subscriber's network usage exceeds a quota for the current billing period. The frequency at which the subscriber's usage data is collected and analyzed during the billing period is based upon the probability the subscriber's network usage exceeds the quota at a given point in time during the billing cycle. Usage data is collected more frequently as the probability increases. Usage analysis is performed if the probability exceeds a threshold. | 02-11-2010 |
20110275344 | System and Methods for Carrier-Centric Mobile Device Data Communications Cost Monitoring and Control - Systems and methods for providing carrier-centric data communications cost monitoring and controls are provided. In an embodiment, the method operates by receiving a registration request associated with a subscriber session, determining current data usage associated with the subscriber, and receiving data usage thresholds. The method further comprises receiving quotas associated with the subscriber session and collecting data usage information associated with the subscriber session. The method sends a notification to the subscriber when a pre-determined quota is exceeded during the subscriber session and controls data usage. The cost monitoring and control system comprises a usage policy server and a usage policy application. The usage policy application allows a carrier to offer alterations to terms of a subscription. The usage policy application displays current data usage information on a per-network and per-application basis using subscriber profile information, subscriber session information, and prior subscriber usage history provided by the usage policy server. | 11-10-2011 |
20110276442 | System and Methods for User-Centric Mobile Device-Based Data Communications Cost Monitoring and Control - Systems and methods for providing user-centric device-based data communications cost monitoring and controls. In an embodiment, the method operates by sending a registration request associated with a subscriber session, determining current data usage associated with the subscriber, and sending data usage thresholds. The method further comprises sending quotas associated with the subscriber session after collecting data usage information associated with the subscriber session. The method receives a notification at the subscriber's mobile device when a pre-determined quota is exceeded during the subscriber session to control data usage. The system communicates with a usage policy server and a usage policy application. The usage policy application allows a subscriber to alter terms and service tiers of a subscription. The usage policy application displays current data usage information on a per-network and per-application basis using subscriber profile information, subscriber session information, and prior subscriber usage history received from the usage policy server. | 11-10-2011 |
20120030017 | USAGE MEASUREMENT COLLECTION AND ANALYSIS TO DYNAMICALLY REGULATE CUSTOMER NETWORK USAGE - In a network subscriber system, a method of determining how to monitor whether a subscriber's network usage exceeds a quota for the current billing period. The frequency at which the subscriber's usage data is collected and analyzed during the billing period is based upon the probability the subscriber's network usage exceeds the quota at a given point in time during the billing cycle. Usage data is collected more frequently as the probability increases. Usage analysis is performed if the probability exceeds a threshold. | 02-02-2012 |
20120034922 | Systems and Methods for Selective Communications Network Access - Systems and methods for network congestion management thru selective network access among wireless cells and wireless hotspots are provided. In an embodiment of the present invention, a method to transmit a connection policy decision to a wireless communications device that is connected to a cellular wireless network whether to access a wireless hotspot is provided. The method includes determining a wireless cell location of the wireless communications device, generating a connection policy decision to determine whether the wireless communication device should access a wireless hotspot based on the wireless cell location and wireless hotspot availability, and transmitting the connection policy decision to the wireless communications device. In additional embodiments, the connection policy decision is based on one or more of battery charge levels of the wireless communications device, a mobility pattern of the wireless communications device, and historical success rates accessing the wireless hotspot within the wireless cell location. | 02-09-2012 |
20120287860 | LONG-TERM EVOLUTION (LTE) POLICY CONTROL AND CHARGING RULES FUNCTION (PCRF) SELECTION - The PCRF Selection Function selects the PCRF for an IP-CAN session. In embodiments, the PCRF Selection Function is located in the HSS and/or the 3GPP AAA server. The PCRF Selection Function is only required to be located in the HSS if a Bearer Binding and Event Reporting Function (BBERF) is deployed in the serving gateway. In this case, the PCRF selection takes place at the time that the PDN Gateway is selected and returned by the HSS to the serving gateway over the HSS to MME interface (S6a). | 11-15-2012 |
20130023230 | System and Methods for Carrier-Centric Mobile Device Data Communications Cost Monitoring and Control - Systems and methods for providing carrier-centric data communications cost monitoring and controls are provided. In an embodiment, the method operates by receiving a registration request associated with a subscriber session, determining current data usage associated with the subscriber, and receiving data usage thresholds. The method further comprises receiving quotas associated with the subscriber session and collecting data usage information associated with the subscriber session. The method sends a notification to the subscriber when a pre-determined quota is exceeded during the subscriber session and controls data usage. The cost monitoring and control system comprises a usage policy server and a usage policy application. The usage policy application allows a carrier to offer alterations to terms of a subscription. The usage policy application displays current data usage information on a per-network and per-application basis using subscriber profile information, subscriber session information, and prior subscriber usage history provided by the usage policy server. | 01-24-2013 |
20130024915 | Systems and Methods for Authenticating Users Accessing Unsecured WiFi Access Points - Systems and methods system for a user accessing an unsecure Wifi access point are provided. In an embodiment, the present invention requests that the customer perform authentication of the access point to which he is connected. On initial connection to the access point, the customer provides his username/password and chooses a memorable information element (e.g., image or phrase). A site specific cookie is delivered to the customer device after a successful authentication. On subsequent connections, the site specific cookie is validated and the MAC address of the customer device is used to retrieve the memorable information element. If the customer recognizes his memorable image, he confirms that he is on a bona fide access point. In a further embodiment, if the customer connects at a location and/or time of day which breaks a previously observed pattern, MAC authentication is not accepted and a full authentication (e.g., user/password) is required. | 01-24-2013 |