최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0941310 (2013-07-12) |
등록번호 | US-8745220 (2014-06-03) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 7 인용 특허 : 510 |
A method comprising obtaining a credential associated with a first device in a device group, the device group having a shared data allocation available to the device group, the shared data allocation establishing an amount of communication over a first wireless network; determining, based on the cre
A method comprising obtaining a credential associated with a first device in a device group, the device group having a shared data allocation available to the device group, the shared data allocation establishing an amount of communication over a first wireless network; determining, based on the credential, that the first device is authorized to set or change an aspect of a policy applicable when a second device in the device group is connected to the first wireless network; obtaining, from the first device, a user preference; and provisioning, based on the user preference and the determination that the first device is authorized to set or change the at least an aspect of the policy for the second device, one or more network elements to at least assist in enforcing or applying the policy when the second device is connected to the first wireless network.
1. A method performed by a network system communicatively coupled to a first end-user device over a first wireless network, the method comprising: obtaining a first credential associated with the first end-user device, the first end-user device being included in a device group comprising at least th
1. A method performed by a network system communicatively coupled to a first end-user device over a first wireless network, the method comprising: obtaining a first credential associated with the first end-user device, the first end-user device being included in a device group comprising at least the first end-user device and a second end-user device, the second end-user device capable of communicating over the first wireless network and capable of communicating over a second wireless network, the device group associated with a shared data allocation that is available to the device group, the shared data allocation establishing an amount of communication over the first wireless network associated with the device group;determining, based on at least the first credential, that the first end-user device is authorized to set or change at least an aspect of a data usage policy for the second end-user device, the data usage policy for the second end-user device applicable when the second end-user device is connected to the first wireless network;obtaining, from the first end-user device over the first wireless network, one or more indications of one or more user preferences, the one or more user preferences at least for setting or changing the at least an aspect of the data usage policy for the second end-user device; andprovisioning, based on the determination that the first end-user device is authorized to set or change the at least an aspect of the data usage policy for the second end-user device and based on the one or more indications of the one or more user preferences, one or more network elements of the network system to at least assist in enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the first wireless network. 2. The method of claim 1, wherein the first credential associated with the first end-user device is associated with a hardware or software component of the first end-user device, or with a user of the first end-user device. 3. The method of claim 1, wherein the first credential associated with the first end-user device identifies a primary line of the device group. 4. The method of claim 1, wherein the first credential associated with the first end-user device identifies a point of contact, a primary user, master user, an owner, a parent, an account holder, a manager of the device group, or a combination of these. 5. The method of claim 1, wherein enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the first wireless network comprises blocking a data usage of the second end-user device over the first wireless network. 6. The method of claim 1, wherein enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the first wireless network comprises allowing, throttling or restricting a data usage of the second end-user device over the first wireless network. 7. The method of claim 1, wherein the data usage policy for the second end-user device provides for a usage allowance for the second end-user device, and wherein the one or more indications of the one or more user preferences identify or specify the usage allowance. 8. The method of claim 7, further comprising monitoring an aggregate usage of the second end-user device, and wherein enforcing or applying the data usage policy for the second-end user device when the second end-user device is connected to the first wireless network comprises allowing, throttling, restricting, or blocking usage associated with the second end-user device over the first wireless network if the aggregate usage of the second end-user device is not less than the usage allowance. 9. The method of claim 8, wherein the one or more indications of the one or more user preferences indicate whether to allow, throttle, restrict, or block usage associated with the second-user device over the first wireless network if the aggregate usage of the second end-user device is not less than the usage allowance. 10. The method of claim 7, further comprising monitoring an aggregate usage of the second end-user device, and wherein enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the first wireless network comprises triggering a notification to the first end-user device or to the second end-user device if the aggregate usage satisfies a condition relative to the usage allowance. 11. The method of claim 10, wherein the one or more indications of the one or more user preferences further identify or specify the condition. 12. The method of claim 11, wherein the condition is a percentage of the usage allowance. 13. The method of claim 1, wherein the shared data allocation comprises a number of bytes or bits. 14. The method of claim 1, wherein the aspect of the data usage policy for the second end-user device is a first aspect, and wherein the one or more user preferences are one or more first user preferences selected from a first plurality of choices or options available to a user of the first end-user device, and further comprising: determining, based on at least a second credential, that a third end-user device in the device group is authorized to set or change a second aspect of the data usage policy for the second end-user device the second credential being associated with the third end-user device; andobtaining, over the first wireless network, from the third end-user device, one or more indications of one or more second user preferences, the one or more second user preferences at least for setting or changing the second aspect of the data usage policy for the second end-user device, the one or more second user preferences selected from a second plurality of choices or options available to a user of the second end-user device based on the second credential, wherein at least one of the first plurality of choices or options is not one of the second plurality of choices or options. 15. The method of claim 1, wherein the one or more indications of the one or more user preferences identify the second end-user device. 16. The method of claim 1, further comprising obtaining a second credential associated with the second end-user device, and wherein provisioning one or more network elements of the network system to at least assist in enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the first wireless network is based at least in part on the second credential. 17. The method of claim 1, wherein enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the first wireless network comprises providing a service processor to the second end-user device, providing first information to the service processor, providing second information to the second end-user device, or a combination of these. 18. The method of claim 17, wherein enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the first wireless network comprises blocking or restricting a first communication over the first wireless network, and allowing the first communication over the second wireless network. 19. The method of claim 1, wherein: the first wireless network comprises a home network, and the second wireless network comprises a roaming network, orthe first wireless network comprises a roaming network, and the second wireless network comprises a home network. 20. The method of claim 1, wherein the first wireless network comprises a cellular network, and the second wireless network comprises a wireless fidelity (WiFi) network. 21. The method of claim 1, wherein the first wireless network is of a first network type, and the second wireless network is of a second network type. 22. The method of claim 1, further comprising refraining from enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the second wireless network. 23. The method of claim 1, wherein the data usage policy is a first data usage policy, and further comprising provisioning the one or more network elements of the network system to at least assist in enforcing or applying a second data usage policy for the second end-user device when the second end-user device is connected to the second network. 24. The method of claim 1, wherein enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the first wireless network comprises at least assisting to provide a notification to the first end-user device or to the second end-user device based on a permission or an authorization level. 25. The method of claim 1, wherein enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the first wireless network comprises at least assisting to provide a notification to the first end-user device or to the second end-user device. 26. The method of claim 25, wherein the notification is based on the one or more indications of the one or more user preferences. 27. The method of claim 25, wherein the notification comprises a service plan option, wherein the service plan option is based on a usage pattern of one or more devices in the device group. 28. The method of claim 1, wherein enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the first wireless network comprises: determining whether the second end-user device is attempting to use or is successfully using a sponsored service, andif the second end-user device is attempting to use or is successfully using the sponsored service, allowing usage of the sponsored service by the second end-user device. 29. The method of claim 28, wherein the data usage policy for the second end-user device provides for a usage allowance for the second end-user device, and wherein enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the first wireless network further comprises: determining whether the second end-user device is within the usage allowance for the second end-user device, wherein the determination either includes or excludes usage of the first wireless network associated with the sponsored service. 30. A network system comprising: a communication interface enabling the network system to communicate with a first end-user device over a first wireless network; andone or more processors configured to: obtain a first credential associated with the first end-user device, the first end-user device being included in a device group comprising at least the first end-user device and a second end-user device, the second end-user device capable of communicating over the first wireless network and capable of communicating over a second wireless network, the device group associated with a shared data allocation that is available to the device group, the shared data allocation establishing an amount of communication over the first wireless network associated with the device group;determine, based on at least the first credential, that the first end-user device is authorized to set or change at least an aspect of a data usage policy for the second end-user device, the data usage policy for the second end-user device applicable when the second end-user device is connected to the first wireless network;at least assist in obtaining, from the first end-user device over the first wireless network, one or more indications of one or more user preferences, the one or more user preferences at least for setting or changing the at least an aspect of the data usage policy for the second end-user device; andat least assist in provisioning, based on the determination that the first end-user device is authorized to set or change the at least an aspect of the data usage policy for the second end-user device and based on the one or more indications of the one or more user preferences, one or more network elements of the network system to at least assist in enforcing or applying the data usage policy for the second end-user device when the second end-user device is connected to the first wireless network.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.