Patent application number | Description | Published |
20140040975 | Virtualized Policy & Charging System - A network system for providing one or more services to one or more end-user devices communicatively coupled to the network system over a wireless access network, the network system comprising: a policy enforcement function, a first policy element, a second policy element, and a network element, wherein the network element is communicatively coupled to the policy enforcement function, the first policy element, and the second policy element, and wherein the network element is configured to communicate first policy information between the policy enforcement function and the first policy element, and communicate second policy information between the first policy enforcement function and the second policy element. | 02-06-2014 |
20140059640 | Adapting Network Policies Based on Device Service Processor Configuration - Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems. | 02-27-2014 |
20140075567 | Service Processor Configurations for Enhancing or Augmenting System Software of a Mobile Communications Device - A device comprising non-volatile memory capable of being partitioned into first and second partitions, the first partition for storing device system software, the second partition for storing a service processor and having one or more system execution properties for enhancing or augmenting the device system software, and comprising one or more processors for verifying integrity of the device system software using a first security element, verifying integrity of the service processor using a second security element, obtaining the service processor from the non-volatile memory, executing the obtained service processor, and updating, installing, removing, or modifying the service processor in the second partition of the non-volatile memory without affecting the device system software in the first partition. | 03-13-2014 |
20140094159 | Controlling Mobile Device Communications On a Roaming Network Based on Device State - A device that determines an aspect of a service policy based on a state of the device, and applies the service policy. The state is based on a user interaction, or a lack of user interaction, with the device. The service policy applies a first control to a first activity over a roaming network and a second control to the first activity over a home network, wherein the first control controls the first activity differently than the second control controls the first activity. The first activity is caused by a first software component on the device and comprises a first set of prospective or successful communications over an available wireless network. The aspect of the service policy controls the first activity differently from a second activity over a roaming network, where the second activity is associated with a second software component on the device. | 04-03-2014 |
20140095706 | Device-Assisted Services for Protecting Network Capacity - A system comprising a processor of a communications device configured to monitor a network service usage activity of the communications device in network communication, classify the network service usage activity for differential network access control for protecting network capacity, and associate the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity; and a memory coupled to the processor and configured to provide the processor with instructions. | 04-03-2014 |
20140133297 | SYSTEM AND METHOD FOR WIRELESS NETWORK OFFLOADING - A method comprising obtaining, by a server, wireless-network performance data from a plurality of end user devices; generating, by the server, a prioritized network list from the wireless-network performance data; and provisioning, by the server, the prioritized network list to an end user device comprising a radio interface for receiving the prioritized network list from the server, the radio interface being identified to receive the prioritized network list based on a characteristic associated with the end user device; a radio configured to identify available wireless networks, the available wireless networks being different than a current wireless network to which the end user device is currently connected; a prioritized network selection engine for using the prioritized network list to select one of the available wireless networks; and a network connection engine configured to initiate disconnection from the current wireless network and connection to the selected wireless network. | 05-15-2014 |
20140140213 | Service Policy Implementation for an End-User Device Having a Control Application or a Proxy Agent for Routing an Application Traffic Flow - A method performed by a network system communicatively coupled to a device over a wireless access network, the method comprising transmitting a traffic flow to, or receiving the traffic flow from, a software application on the device, the traffic flow comprising one or more related data transfers over the wireless access network, the traffic flow being routed between the software application and the network system through an assisting element comprising a control application or a proxy agent on the device, wherein the traffic flow has a characteristic associating the traffic flow with the first software application, the characteristic preserving the association between the traffic flow and the software application when the traffic flow is routed by the one or more assisting elements; identifying the characteristic; and implementing at least a portion of a control, accounting, or notification service policy based on the identified characteristic. | 05-22-2014 |
20140148123 | WIRELESS NETWORK SERVICE INTERFACES - A method performed by a network system operated by or on behalf of a service provider, the network system capable of communicating with a user device over a wireless access network, the method comprising establishing, in cooperation with software running on the user device, a secure link between the network system and the software, the secure link for preventing unauthorized access to communications between the software and the network system; providing, to the software over the secure link, first information enabling the software to assist a user of the user device to view, select, or change an aspect of a service plan associated with the user device; and providing, to the software over the secure link, second information, the second information enabling the software to present, through a user interface of the user device, a notification about a past or current service usage by the user device. | 05-29-2014 |
20140162595 | ENHANCED CURFEW AND PROTECTION ASSOCIATED WITH A DEVICE GROUP - A method comprising obtaining, from a master user, a device usage allocation applicable to two or more devices, the two or more devices being associated with another user, the another user being different from the master user, obtaining an aggregate measure of device usage associated with the two or more devices, if the aggregate measure of device usage associated with the two or more devices satisfies a condition relative to the device usage allocation, managing an activity of the two or more devices, and sending a notification to at least one of the two or more devices, the notification for presentation to the another user through a user interface of the at least one of the two or more devices. | 06-12-2014 |
20140248852 | MOBILE DEVICE AND SERVICE MANAGEMENT - A wireless end-user device, comprising one or more modems enabling the wireless end-user device to communicate with a network system over a wireless access network, a touch-screen user interface, and one or more processors configured to execute one or more instructions that, when executed by the one or more processors, cause the one or more processors to detect a user input through the touch-screen user interface, the user input comprising a request to remove the wireless end-user device from an existing device group account, the existing device group account being associated with one or more devices including the wireless end-user device, and send a message to the network system over the wireless access network, the message conveying the request to remove the wireless end-user device from the existing device group account. | 09-04-2014 |
20140273965 | AUTOMATED CREDENTIAL PORTING FOR MOBILE DEVICES - Devices, systems, and non-transitory computer-readable storage media for updating wireless device credentials, the wireless device comprising: a user interface, memory configured to store one or more credentials for enabling the wireless device to obtain one or more services over a wireless access network, and one or more processors configured to execute one or more machine-executable instructions that, when executed by the one or more processors, cause the one or more processors to obtain an indication of a user request to replace a particular credential with a target credential, detect a network-provisioning state change, determine that the particular credential does not match the target credential, initiate a programming session with a network element over a wireless access network, obtain an updated credential from the network element, and assist in storing the updated credential in memory. | 09-18-2014 |
20140289794 | COMMUNICATIONS DEVICE WITH SECURE DATA PATH PROCESSING AGENTS - A network system comprising memory configured to store a device communication activity policy, and a policy verification processor configured to (a) receive a device data record over a trusted communication link between the network system and a device data record generator on a communications device, the device data record comprising information about a data communications activity by the communications device, the information configured to assist the policy verification processor in determining whether the communications device is operating or has operated in accordance with the device communication activity policy, (b) determine, based on the device data record, whether the communications device is operating or has operated in accordance with the device communication activity policy, and (c) upon determining that the communications device is not operating or has not operated in accordance with the device communication activity policy, initiate an error handling action. | 09-25-2014 |
20140337519 | Techniques For Attribution Of Mobile Device Data Traffic To Initiating End-User Application - A method performed by a network system communicatively coupled to a device over a wireless access network, the method comprising transmitting a traffic flow to, or receiving the traffic flow from, a software application on the device, the traffic flow comprising one or more related data transfers over the wireless access network, the traffic flow being routed between the software application and the network system through an assisting element comprising a control application or a proxy agent on the device, wherein the traffic flow has a characteristic associating the traffic flow with the first software application, the characteristic preserving the association between the traffic flow and the software application when the traffic flow is routed by the one or more assisting elements; identifying the characteristic; and implementing at least a portion of a control, accounting, or notification service policy based on the identified characteristic. | 11-13-2014 |
20140337520 | Attribution Of Mobile Device Data Traffic To End-User Application Based On Socket Flows - A method performed by a network system communicatively coupled to a device over a wireless access network, the method comprising transmitting a traffic flow to, or receiving the traffic flow from, a software application on the device, the traffic flow comprising one or more related data transfers over the wireless access network, the traffic flow being routed between the software application and the network system through an assisting element comprising a control application or a proxy agent on the device, wherein the traffic flow has a characteristic associating the traffic flow with the first software application, the characteristic preserving the association between the traffic flow and the software application when the traffic flow is routed by the one or more assisting elements; identifying the characteristic; and implementing at least a portion of a control, accounting, or notification service policy based on the identified characteristic. | 11-13-2014 |
20150026761 | SECURITY, FRAUD DETECTION, AND FRAUD MITIGATION IN DEVICE-ASSISTED SERVICES SYSTEMS - A device having: an application program that assists the device in accessing a data service over a wireless access network, an application credential associated with the application program, and a policy to be applied when the application program initiates or attempts to initiate communication over the wireless access network. The device also has one or more agents that detect an attempted installation of update software on the device, the update software purporting to be a modification, update, or replacement of the application program; obtain an update-software credential associated with the update software; obtain the application credential; allow the update software to be installed if the update-software credential matches the application credential; and interact with the application program to arrange a setting of the application program, the setting configured to assist in applying the policy when the application program initiates or attempts to initiate communication over the wireless access network. | 01-22-2015 |
20150072641 | System and Method for Providing User Notifications - A method performed by an end user device associated with a service plan having a limit on usage of a network service, the method comprising storing one or more notification actions corresponding to one or more notification requests; performing a device action that reflects a past or intended use of the network service; receiving one of the one or more notification requests from a network element in response to the device action; performing one of the one or more notification actions in response to the notification request, the notification action causing the end user device to retrieve at least a portion of a notification message associated with a status of the use, the at least a portion of the notification message being separate from the one of the one or more notification requests; and presenting the notification message on a user interface of the end user device. | 03-12-2015 |