Open development system for access service providers
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06Q-020/00
H04M-003/42
출원번호
US-0380782
(2009-03-02)
등록번호
US-8270952
(2012-09-18)
발명자
/ 주소
Raleigh, Gregory G.
출원인 / 주소
Headwater Partners I LLC
대리인 / 주소
Jacobsen, Krista S.
인용정보
피인용 횟수 :
17인용 특허 :
121
초록▼
Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a software developers kit is provided for implementing a verifiable service processor to be stored on a communications device, in which the software developer kit facilitates development of
Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a software developers kit is provided for implementing a verifiable service processor to be stored on a communications device, in which the software developer kit facilitates development of a plurality of service processors for controlling network service usage of a plurality of communications devices and includes one or more tested service processor versions for more or more communications device types.
대표청구항▼
1. A method, comprising: configuring a verifiable first service processor using a software developer kit, wherein the software developer kit is accessible via a processor of a computer, and wherein the software developer kit facilitates configuration of the verifiable first service processor, the ve
1. A method, comprising: configuring a verifiable first service processor using a software developer kit, wherein the software developer kit is accessible via a processor of a computer, and wherein the software developer kit facilitates configuration of the verifiable first service processor, the verifiable first service processor for controlling network service usage of a plurality of communications devices by: detecting whether a particular wireless communication device of the plurality of wireless communication devices is connected to a first wireless access network or to a second wireless access network,applying a first service policy for controlling network service usage associated with a service activity when the particular wireless communication device is connected to the first wireless access network, andapplying a second service policy for controlling network service usage associated with the service activity when the particular wireless communication device is connected to the second wireless access network; andinstalling the verifiable first service processor on each of the plurality of wireless communication devices. 2. The method of claim 1, wherein the service activity includes an attempted or successful data access. 3. The method of claim 1, wherein the service activity includes attempted or successful traffic associated with a particular application program. 4. The method of claim 1, wherein the service activity includes attempted or successful traffic associated with a particular network communication end-point. 5. The method of claim 1, wherein the service activity comprises attempted or successful traffic associated with a particular content type. 6. The method of claim 5, wherein the content type comprises one or more of video traffic, audio traffic, and voice-over-Internet-protocol (VOIP) traffic. 7. The method of claim 5, wherein the content type includes a background download associated with an application program or an operating system component. 8. The method of claim 1, wherein the service activity comprises attempted or successful traffic associated with an intermediate networking device forwarding service for enabling the particular wireless communication device to forward traffic between an end-point device and at least one network communication end point over at least one of the first wireless access network and the second wireless access network. 9. The method of claim 1, wherein the first wireless access network is a cellular network and the second wireless access network is a WiFi network, and wherein the second service policy is configured to allow the service activity. 10. The method of claim 1, wherein the first wireless access network or the second wireless access network is a roaming network. 11. The method of claim 1, further comprising maintaining service processor software configured to verify a configuration of at least a portion of the verifiable first service processor. 12. The method of claim 11, wherein the service processor software is configured to verify the configuration of the at least a portion of the verifiable service processor using a hash, a signature, or a certificate. 13. The method of claim 1, wherein the verifiable service processor comprises an operating system component. 14. The method of claim 1, wherein the verifiable first service processor controls the network service usage of the plurality of communications devices by directing activation traffic to an activation server associated with the first wireless access network. 15. The method of claim 1, further comprising using an application programming interface to assist in configuring a setting of a device application program. 16. The method of claim 1, wherein the first service policy is configured to block the service activity. 17. The method of claim 1, wherein the first service policy is configured to allow the service activity. 18. The method of claim 1, wherein the verifiable service processor is configured to: assist in causing a service purchase offer to be presented through a device user interface,obtain a response to the service purchase offer, andsend the response to the service purchase offer to a network element. 19. The method of claim 1, further comprising obtaining at least a portion of the first service policy from a network element. 20. The method of claim 1, further comprising obtaining at least a portion of the first service policy from a user.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (121)
Jobs, Steven P.; Anzures, Freddy Allen; Ording, Bas; Chaudhri, Imran; Forstall, Scott; Christie, Greg; Lemay, Stephen O., Account information display for portable communication device.
Urban, Mark; Jackson, Simon Adrian; Lopez Perez, Daniel Jose; Hoareau, Christian; Sjoestroem, Martin Briand; Arvin, Rene, Adaptive correlation of service level agreement and network application performance.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Goldman, Jason D; Houck, Peter Thomas; Lachelt, David Jonathan; Roeling, Fredrick M; Stoecker, Paul A, Aggregated policy deployment and status propagation in network management systems.
Yano, Masashi; Matsui, Susumu; Yamamoto, Yoshinobu, Base station for multi-carrier TDMA mobile communication system and method for assigning communication channels.
Jackowski Steven J. ; Thomas Christopher N., Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control.
Wu, Lizhong; Barker, Terrance Gordon; Desai, Vijay S., Computer-implemented modeling systems and methods for analyzing and predicting computer network intrusions.
Abu-Amara Hosame ; Babbitt Jeff ; Best Robert ; Boray Giridhar ; Lo Wing ; Maveddat Payam ; Qian Yi, Controlling communication in wireless and satellite networks.
Chowdhury, Amor; Breznik, Gregor; Verdnik, Klemen; Prihavec, Bor, Customer identification and authentication procedure for online internet payments using mobile phone.
Araujo, Wladimir; Sajedi, Mohammad H.; Ali, Altaf H., Dynamic service activation using COPS-PR to support outsourcing and configuration models for policy control.
Bartoli Paul D. ; Griesmer Stephen J. ; Lidor Gideon ; Ronen Yzhak ; Tessier Jean, Method and apparatus for billing for transactions conducted over the internet.
Edwards, Warren Keith; Newman, Mark Webster; Smith, Trevor Fredrick; Sedivy, Jana Zdislava; Marcelo, Karen; Izadi, Shahram; Hong, Jason I., Method and apparatus for dynamically delivering service profiles to clients.
Gai, Silvano; McCloghrie, Keith; Mohaban, Shai, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
Buhrmann Michael ; Montemayor Jane Elizabeth, Method and apparatus for providing telecommunication services based on a subscriber profile updated by a personal inform.
Prueitt, James K.; Pineau, Richard A.; Bernier, Kevin F.; Lynton, Todd M.; Wicker, Scott D., Method and system for generating a permanent record of a service provided to a mobile device.
Prendergast, Liam N.; O'Connor, Denis A.; Quinn, Liam B., Methods and systems for managing and/or tracking use of subscriber identity module components.
VanFleet, Steven L.; Benton, Blake; Byrne, Matthew T.; Horton, Timothy; Mascavage, III, John J.; Mollett, Cassandra J.; Nelson, Susan M.; Rogers, SuZanne; Sargent, Rhonda D.; Stivers, Martin; Trainor, Gary J.; Weichert, Margaret; Wing, Diane, Methods and systems for online transaction processing.
Huslak, Nicholas Steven; Anschutz, Thomas Arnold; Shrum, Jr., Edgar Vaughan, Methods and systems for providing video on demand over a communication network using managed quality of service, bandwidth allocation and/or user profiles.
Morford,Michael Robert, Methods, apparatuses and systems facilitating concurrent classification and control of tunneled and non-tunneled network traffic.
Kennewick, Robert A.; Locke, David; Kennewick, Sr., Michael R.; Kennewick, Jr., Michael R.; Kennewick, Richard; Freeman, Tom; Elston, Stephen F., Mobile systems and methods for responding to natural language speech utterance.
Weider, Chris; Kennewick, Richard; Kennewick, Mike; Di Cristo, Philippe; Kennewick, Robert A.; Menaker, Samuel; Armstrong, Lynn Elise, Mobile systems and methods of supporting natural language human-machine interactions.
Vanttila Jaakko,FIX ; Alanara Seppo,FIX ; Seppanen Jorma,FIX ; Vaihoja Juha,FIX ; Lietsalmi Mikko,FIX, Mobile terminal having network services activation through the use of point-to-point short message service.
Bogineni, Kalyani; Flynn, Gerard J.; Stone, Jr., William H.; Salas, Edward A., Multimedia next generation network architecture for IP services delivery based on network and user policy.
Thomas Christopher N. ; Jackowski Steven J. ; Brock Keven J., Ordering of multiple plugin applications using extensible layered service provider with network traffic filtering.
Necka, William; Fey, Igor; Akgun, Ali; Arutyunov, Yuri, System and method for a specialized dynamic host configuration protocol proxy in a data-over-cable network.
Bowen,Jerre F.; Mathkar,Anup R.; Mathur,Rajat; Syed,Samina M. A.; Weimer,Thomas W.; Bennett,James E.; Braganza,Carl W.; Dwivedi,Tarun, System and method for an access layer application programming interface for managing heterogeneous components of a storage area network.
Garland Stuart M. ; Smith David B. ; Smith Matthew Richard, System for suppressed ringing access of subscriber lines to identify usage anomalies of customer premise equipment connected thereto.
Stewart, Hugh Donal; Sidebottom, Gregory Allan; Araujo, Wladimir de Lara Filho; Ries, Steffen Georg; Stevens, Scott Joseph, Systems and methods for providing quality assurance.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Technique for providing dynamic modification of application specific policies in a feedback-based, adaptive data network.
Cratsenburg, Mark E.; Blackburn, Stephen, Method and system for detecting and minimizing harmful network device and application behavior on cellular networks.
Felstaine, Eyal; Hermoni, Ofer; Sandlerman, Nimrod; Kitroser, Itzik, System, method, and computer program for inter-module communication in a network based on network function virtualization (NFV).
Felstaine, Eyal; Hermoni, Ofer; Sandlerman, Nimrod, System, method, and computer program for managing fault recovery in network function virtualization (NFV) based networks.
Felstaine, Eyal; Hermoni, Ofer; Sandlerman, Nimrod, System, method, and computer program for managing hierarchy and optimization in a network function virtualization (NFV) based communication network.
Felstaine, Eyal; Hermoni, Ofer; Sandlerman, Nimrod, System, method, and computer program for managing security in a network function virtualization (NFV) based communication network.
Felstaine, Eyal; Hermoni, Ofer; Sandlerman, Nimrod, System, method, and computer program for optimizing a chain of virtual network functions in a network based on network function virtualization (NFV).
Felstaine, Eyal; Hermoni, Ofer; Sandlerman, Nimrod, System, method, and computer program for performing preventative maintenance in a network function virtualization (NFV) based communication network.
Felstaine, Eyal; Hermoni, Ofer; Sandlerman, Nimrod, System, method, and computer program for preserving service continuity in a network function virtualization (NFV) based communication network.
Felstaine, Eyal; Hermoni, Ofer; Sandlerman, Nimrod, System, method, and computer program for resource conversion in a network function virtualization (NFV) based communication network.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.