최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0633817 (2012-10-02) |
등록번호 | US-8903452 (2014-12-02) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 1 인용 특허 : 492 |
Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device implements a service profile for assisting control of the communications device use of a service on a network, in which the service profile includes service policy se
Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device implements a service profile for assisting control of the communications device use of a service on a network, in which the service profile includes service policy settings, and the service profile is associated with an ambient service plan that provides for initial access to the service with limited service capabilities prior to activation of a new service plan; and monitors use of the service based on the service profile.
1. An end-user device comprising: a modem for enabling the end-user device to access one or more network communication end points over a wireless network;memory configured to store at least a portion of a service policy associated with one or more service activities, the one or more service activiti
1. An end-user device comprising: a modem for enabling the end-user device to access one or more network communication end points over a wireless network;memory configured to store at least a portion of a service policy associated with one or more service activities, the one or more service activities being fewer than all service activities available to the end-user device, the service policy for providing, to a sponsor entity, an accounting of at least a portion of a wireless network usage cost or usage measure associated with the one or more service activities over the wireless network, the sponsor entity being an entity other than a user of the end-user device, other than an account-holder associated with the end-user device, and other than an operator of the wireless network; andone or more processors configured to: monitor end-user device data traffic,identify, in the monitored end-user device data traffic, an intended, attempted, or successful data communication over the wireless network associated with the one or more service activities, andin response to identifying the intended, attempted, or successful data communication over the wireless network associated with the one or more service activities, apply the at least a portion of the service policy. 2. The end-user device recited in claim 1, wherein the one or more service activities include a data communication associated with a particular application of one or more applications on the end-user device. 3. The end-user device recited in claim 1, wherein the one or more service activities include a data communication associated with a particular network communication end point of the one or more network communication end points. 4. The end-user device recited in claim 1, wherein the one or more service activities comprise a particular content type. 5. The end-user device recited in claim 1, wherein at least a portion of the one or more service activities is within an ambient service. 6. The end-user device recited in claim 1, wherein the at least a portion of the wireless network usage cost or usage measure associated with the one or more service activities over the wireless network comprises a service usage amount, a service usage time, a service usage event, a revenue share, a transaction fee or amount, a fixed fee for service, a service bundle fee or amount, or a combination of these. 7. The end-user device recited in claim 1, wherein the at least a portion of the wireless network usage cost or usage measure associated with the one or more service activities over the wireless network provides for a user incentive, a free trial of a service, a discounted service to the user as a reward for user behavior, or a combination of these. 8. The end-user device recited in claim 1, wherein the sponsor entity is an enterprise, a website provider, an advertiser, an operator of a content download service, an operator of an online shopping site, a transactional service provider, or a roaming service provider. 9. The end-user device recited in claim 1, wherein the one or more processors are further configured to modify the at least a portion of the service policy based on: an expiration of time, a service usage pattern, a transaction pattern, a service sign-up pattern, a time of day, a network capacity, a network connection type, a service provider, the user of the end-user device, a user group, a user input, an update to the service profile, a trial offer, a point of sale, a master agent identifier, a location of the end-user device, or a combination of these. 10. The end-user device recited in claim 1, wherein the service policy is dependent on a type of the wireless network. 11. The end-user device recited in claim 1, wherein the service policy is dependent on whether the wireless network is a roaming network. 12. The end-user device recited in claim 1, wherein the service policy is dependent on a time period. 13. The end-user device recited in claim 1, wherein identifying, in the monitored end-user device data traffic, the intended, attempted, or successful data communication associated with the one or more service activities comprises assigning a literal or virtual flow tag to a traffic flow within the end-user device data traffic, the literal or virtual flow tag configured to assist in preserving an association of the traffic flow with the one or more service activities when the traffic flow is processed by one or more end-user device functions that operate on the traffic flow. 14. The end-user device recited in claim 1, wherein identifying, in the monitored end-user device data traffic, the intended, attempted, or successful data communication associated with the one or more service activities comprises detecting an application-layer traffic activity associated with the one or more service activities. 15. The end-user device recited in claim 1, wherein identifying, in the monitored end-user device data traffic, the intended, attempted, or successful data communication associated with the one or more service activities comprises detecting a literal tag, a virtual tag, a header, a token, or a cookie within the end-user device data traffic. 16. The end-user device recited in claim 1, wherein the one or more processors are further configured to: assist in establishing a secure control link between the end-user device and a network element, the secure control link secured by an encryption protocol and configured to support control-plane communications between the end-user device and the network element, andreceive the at least a portion of the service policy from the network element over the secure control link. 17. The end-user device recited in claim 1, wherein applying the at least a portion of the service policy comprises determining a service usage measure associated with the one or more service activities. 18. The end-user device recited in claim 17, wherein the one or more processors are further configured to: assist in establishing a secure control link between the end-user device and a network element, the secure control link secured by an encryption protocol and configured to support control-plane communications between the end-user device and the network element, andassist in sending the service usage measure to the network element over the secure control link. 19. The end-user device recited in claim 1, wherein the sponsor entity is a mobile virtual network operator (MVNO), an original equipment manufacturer (OEM), a machine to machine service provider, or a virtual service provider (VSP). 20. The end-user device recited in claim 1, wherein the one or more processors are further configured to at least assist in controlling access to the wireless network associated with the one or more service activities. 21. The end-user device recited in claim 20, wherein controlling access to the wireless network associated with the one or more service activities comprises blocking, allowing, throttling, traffic shaping, quarantining, or delaying the intended, attempted, or successful data communication over the wireless network associated with the one or more service activities. 22. The end-user device recited in claim 20, wherein controlling access to the wireless network associated with the one or more service activities comprises arranging a setting of software component on the end-user device. 23. The end-user device recited in claim 20, wherein controlling access to the wireless network associated with the one or more service activities comprises directing a traffic flow associated with the one or more service activities to a particular network route, a particular network tunnel, or a particular network communication end point of the one or more network communication end points. 24. The end-user device recited in claim 1, wherein the sponsor entity is responsible for providing consideration for the at least a portion of the wireless-network usage cost or usage measure associated with the one or more service activities over the wireless network. 25. An end-user device comprising: means for monitoring end-user device data traffic;means for identifying, in the monitored end-user device data traffic, an intended, attempted, or successful data communication over a wireless network associated with one or more service activities, the one or more service activities being fewer than all service activities available to the end-user device, the wireless network communicatively coupling the end-user device to a network system; andmeans for applying at least a portion of a service policy associated with the one or more service activities in response to identifying the intended, attempted, or successful data communication over the wireless network associated with the one or more service activities, the service policy for providing, to a sponsor entity, an accounting of at least a portion of a wireless network usage cost or usage measure associated with the one or more service activities, the sponsor entity being an entity other than a user of the end-user device and other than an operator of the wireless network. 26. A non-transitory computer-readable storage medium storing machine-executable instructions that, when executed by one or more processors of an end-user device, cause the one or more processors to: monitor end-user device data traffic of the end-user device;identify, in the monitored end-user device data traffic, an intended, attempted, or successful data communication over a wireless network associated with one or more service activities, the one or more service activities being fewer than all service activities available to the end-user device, the wireless network communicatively coupling the end-user device to a network system; andin response to identifying the intended, attempted, or successful data communication over the wireless network associated with the one or more service activities, apply at least a portion of a service policy associated with the one or more service activities, the service policy for providing, to a sponsor entity, an accounting of at least a portion of a wireless-network usage cost or usage measure associated with the one or more service activities, the sponsor entity being an entity other than a user of the end-user device and other than an operator of the wireless network. 27. The non-transitory computer-readable storage medium recited in claim 26, wherein the service policy is dependent on a type of the wireless network. 28. The non-transitory computer-readable storage medium recited in claim 26, wherein, when executed by the one or more processors, the machine-executable instructions further cause the one or more processors to at least assist in controlling access to the wireless network associated with the one or more service activities. 29. The non-transitory computer-readable storage medium recited in claim 28, wherein controlling access to the wireless network associated with the one or more service activities comprises blocking, allowing, throttling, traffic shaping, quarantining, or delaying the intended, attempted, or successful data communication over the wireless network associated with the one or more service activities. 30. The non-transitory computer-readable storage medium recited in claim 26, wherein the at least a portion of the wireless-network usage cost or usage measure associated with the one or more service activities over the wireless network comprises a service usage amount, a service usage time, a service usage event, a revenue share, a transaction fee or amount, a fixed fee for service, a service bundle fee or amount, or a combination of these.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.