최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0147394 (2014-01-03) |
등록번호 | US-9026079 (2015-05-05) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 0 인용 특허 : 554 |
A method performed by a network system operated by or on behalf of a service provider, the network system capable of communicating with a user device over a wireless access network, the method comprising establishing, in cooperation with software running on the user device, a secure link between the
A method performed by a network system operated by or on behalf of a service provider, the network system capable of communicating with a user device over a wireless access network, the method comprising establishing, in cooperation with software running on the user device, a secure link between the network system and the software, the secure link for preventing unauthorized access to communications between the software and the network system; providing, to the software over the secure link, first information enabling the software to assist a user of the user device to view, select, or change an aspect of a service plan associated with the user device; and providing, to the software over the secure link, second information, the second information enabling the software to present, through a user interface of the user device, a notification about a past or current service usage by the user device.
1. A method performed by a network system, the network system capable of communicating with a wireless end-user device over a wireless access network, the method comprising: communicating with the wireless end-user device via a secure communication link across the wireless access network between the
1. A method performed by a network system, the network system capable of communicating with a wireless end-user device over a wireless access network, the method comprising: communicating with the wireless end-user device via a secure communication link across the wireless access network between the network system and software executing on the wireless end-user device, the secure communication link preventing unauthorized access to communications between the software and the network system;providing over the secure communication link to the wireless end-user device, first information, the first information enabling the software to assist a user of the wireless end-user device to view, select, or change at least a data service usage aspect of a service plan associated with the wireless end-user device; andproviding over the secure communication link to the wireless end-user device, second information, the second information enabling the software to present, through a user interface of the wireless end-user device, a notification about a past or current data service usage by the wireless end-user device. 2. The method of claim 1, wherein providing the first information or providing the second information comprises pushing at least a portion of the first information or at least a portion of the second information to the software. 3. The method of claim 1, wherein at least an aspect of the software is based on a service provider identity. 4. The method of claim 1, wherein providing, to the software over the secure communication link, the first information comprises providing a catalog of one or more available service plan options to the software over the secure communication link. 5. The method of claim 4, wherein the catalog of one or more available service plan options includes a listing of one or more available service plans. 6. The method of claim 4, wherein the catalog of one or more available service plan options is based at least in part on a credential of the wireless end-user device, wherein the credential comprises a phone number, a device identification number, a mobile equipment identifier (MEID), a hardware identifier, a signature, a device serial number, a device identification, information from a SIM, one or more IP addresses, one or more MAC addresses, a key, a security signature algorithm, a password, a service processor identifier, a device type identifier, a header, a token, a cookie, or information identifying a service provider, information identifying an original equipment manufacturer (OEM), information identifying a master agent, information identifying a virtual service provider (VSP), information identifying a device service owner, information identifying a distributor, information identifying a device group, information identifying a user group, or information identifying the user. 7. The method of claim 4, wherein the service plan is a first service plan, and wherein the catalog of one or more available service plan options includes an option to purchase a second service plan. 8. The method of claim 4, wherein the service plan is a first service plan, and wherein the catalog of one or more available service plan options includes an option to select a second service plan. 9. The method of claim 4, further comprising obtaining a user response from the software over the secure communication link, the user response indicating a user selection of one of the one or more available service plan options. 10. The method of claim 9, further comprising sending a confirmation to the software over the secure communication link, the confirmation enabling the software to present a confirmation message through the user interface of the wireless end-user device. 11. The method of claim 9, further comprising provisioning one or more components of the network system based on the user response. 12. The method of claim 1, wherein providing the first information or the second information is in response to a request from the software. 13. The method of claim 12, wherein the request comprises a credential identifying at least an aspect of the wireless end-user device. 14. The method of claim 13, wherein the credential comprises a phone number, a device identification number, a mobile equipment identifier (MEID), a hardware identifier, a signature, a device serial number, a device identification, information from a SIM, one or more IP addresses, one or more MAC addresses, a key, a security signature algorithm, a password, a service processor identifier, a device type identifier, a header, a token, a cookie, or information identifying a service provider, information identifying an original equipment manufacturer (OEM), information identifying a master agent, information identifying a virtual service provider (VSP), information identifying a device service owner, information identifying a distributor, information identifying a device group, information identifying a user group, or information identifying the user. 15. The method of claim 1, wherein the information about the past or current data service usage by the wireless end-user device comprises a measure of past or current usage of Internet data service by the wireless end-user device. 16. The method of claim 1, further comprising providing, to the software over the secure communication link, an estimated, projected, predicted, or expected measure of data service usage by the wireless end-user device. 17. The method of claim 1, wherein the information about the past or current data service usage by the wireless end-user device comprises a measure of past or current usage of the service plan associated with the wireless end-user device. 18. The method of claim 1, wherein the information about the past or current data service usage by the wireless end-user device comprises a percentage of usage of a data limit for the service plan associated with the end-user device. 19. The method of claim 1, wherein the information about the past or current data service usage by the wireless end-user device indicates a classification of data usage. 20. The method of claim 19, wherein the classification of data usage is based on a network destination accessible to the wireless end-user device. 21. The method of claim 19, wherein the classification of data usage is based on one or more application programs on the wireless end-user device. 22. The method of claim 19, wherein the classification of data usage is based on whether the wireless access network comprises a cellular network, a Wi-Fi network, a home cellular network, a roaming cellular network, or a combination of these. 23. The method of claim 1, wherein the information about the past or current data service usage by the wireless end-user device indicates a cost. 24. The method of claim 1, wherein providing the second information occurs before providing the first information. 25. The method of claim 16, wherein providing the estimated, projected, predicted, or expected measure of data service usage by the wireless end-user device occurs before providing the first information. 26. The method of claim 16, wherein the estimated, projected, predicted, or expected measure of data service usage by the wireless end-user device indicates a classification of data usage. 27. The method of claim 26, wherein the classification of data usage is associated with a network destination accessible to the wireless end-user device. 28. The method of claim 26, wherein the classification of data usage is associated with one or more application programs on the wireless end-user device. 29. The method of claim 26, wherein the classification of data usage indicates that the wireless access network comprises a cellular network, a Wi-Fi network, a home cellular network, a roaming cellular network, or a combination of these.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.