DYNAMIC USAGE INEQUITY DETECTION AND/OR REMEDY
First Claim
Patent Images
1. A network device, comprising:
- a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising;
receiving first data representative of a call detail record that is generated in response to a determination a first subscriber device accessed a network service;
determining, based on the first data, that a second subscriber device accessed the network service via the first subscriber device;
in response to examining second data representative of a service agreement between a provider entity that provides the network service and a subscriber entity associated with the first subscriber device, determining that a usage violation has occurred, wherein the usage violation is representative of a determination that the second subscriber device is not authorized by the service agreement to access the network service; and
in response to the determining that the usage violation has occurred, implementing a violation policy in connection with access to the network service by the first subscriber device.
1 Assignment
0 Petitions
Accused Products
Abstract
An architecture that can dynamically detect and/or automatically remedy service usage inequities in a communications network is provided. For example, based upon a comparison of incoming call detail records (CDRs) to various subscriber information entities (e.g., service plan, blacklisted devices for the service plan, historic or current billing cycle usage, etc.), the architecture can identify when a usage inequity occurs or is likely to occur, substantially in real time.
-
Citations
20 Claims
-
1. A network device, comprising:
-
a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising; receiving first data representative of a call detail record that is generated in response to a determination a first subscriber device accessed a network service; determining, based on the first data, that a second subscriber device accessed the network service via the first subscriber device; in response to examining second data representative of a service agreement between a provider entity that provides the network service and a subscriber entity associated with the first subscriber device, determining that a usage violation has occurred, wherein the usage violation is representative of a determination that the second subscriber device is not authorized by the service agreement to access the network service; and in response to the determining that the usage violation has occurred, implementing a violation policy in connection with access to the network service by the first subscriber device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
receiving, by a device comprising a processor, first data representative of a call detail record that is generated in response to a determination a first subscriber device accessed a network service; based on the first data, determining, by the device, that a second subscriber device accessed the network service via the first subscriber device; in response to examining second data representative of a service agreement between a provider entity that provides the network service and a subscriber entity associated with the first subscriber device, determining, by the device, that a usage violation has occurred, wherein the usage violation is in response to a determination that the second subscriber device is not authorized by the service agreement to access the network service; and in response to the determining that the usage violation has occurred, implementing, by the device, a violation policy in connection with access to the network service by the first subscriber device. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising:
-
receiving first data representative of a call detail record that is generated in response to a determination a first subscriber device accessed a network service; based on the first data, determining that a second subscriber device accessed the network service via the first subscriber device; in response to examining second data representative of a service agreement between a provider entity that provides the network service and a subscriber entity associated with the first subscriber device, determining that a usage violation has occurred, wherein the usage violation is determined to have occurred in response to a determination that the second subscriber device is not authorized by the service agreement to access the network service; and in response to the determining that the usage violation has occurred, implementing, by the system, a violation policy in connection with access to the network service by the first subscriber device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification