System and methods for carrier-centric mobile device data communications cost monitoring and control
First Claim
1. A method, comprising:
- receiving, at a usage policy server, a registration request associated with a data communications session between a service provider and a subscriber;
determining a usage breach probability for the data communications session, where the usage breach probability represents a probability that the subscriber will breach a usage quota during the data communications session;
determining an interval at which subscriber usage updates are collected, based at least in part on the determined usage breach probability; and
determining current data usage associated with the data communications session including retrieving subscriber profile data from a subscriber data repository, utilizing the determined interval;
receiving, at the usage policy server, a request to change a service tier associated with the data communications session and a request to change a threshold associated with the data communications session; and
updating the subscriber profile data based upon the service tier change request and the threshold change request.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing carrier-centric data communications cost monitoring and controls are provided. In an embodiment, the method operates by receiving a registration request associated with a subscriber session, determining current data usage associated with the subscriber, and receiving data usage thresholds. The method further comprises receiving quotas associated with the subscriber session and collecting data usage information associated with the subscriber session. The method sends a notification to the subscriber when a pre-determined quota is exceeded during the subscriber session and controls data usage. The cost monitoring and control system comprises a usage policy server and a usage policy application. The usage policy application allows a carrier to offer alterations to terms of a subscription. The usage policy application displays current data usage information on a per-network and per-application basis using subscriber profile information, subscriber session information, and prior subscriber usage history provided by the usage policy server.
88 Citations
21 Claims
-
1. A method, comprising:
-
receiving, at a usage policy server, a registration request associated with a data communications session between a service provider and a subscriber; determining a usage breach probability for the data communications session, where the usage breach probability represents a probability that the subscriber will breach a usage quota during the data communications session; determining an interval at which subscriber usage updates are collected, based at least in part on the determined usage breach probability; and determining current data usage associated with the data communications session including retrieving subscriber profile data from a subscriber data repository, utilizing the determined interval; receiving, at the usage policy server, a request to change a service tier associated with the data communications session and a request to change a threshold associated with the data communications session; and updating the subscriber profile data based upon the service tier change request and the threshold change request. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising:
-
a usage policy server configured to receive a registration request associated with a data communications session between a service provider and a subscriber; a breach probability calculation module adapted to determine a usage breach probability for the data communications session, where the usage breach probability represents a probability that the subscriber will breach a usage quota during the data communications session; a usage update interval module adapted to determine an interval at which subscriber usage updates are collected, based at least in part on the determined usage breach probability; and a usage policy application configured to determine current data usage associated with the data communications session including retrieving subscriber profile data from a subscriber data repository, utilizing the determined interval; wherein the usage policy server receives a request to change a service tier associated with the data communications session and a request to change a threshold associated with the data communications session, and updates the subscriber profile data based upon the service tier change request and the threshold change request. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product stored on a non-transitory storage media, comprising:
-
computer code for receiving, at a usage policy server, a registration request associated with a data communications session between a service provider and a subscriber; computer code for determining a usage breach probability for the data communications session, where the usage breach probability represents a probability that the subscriber will breach a usage quota during the data communications session; computer code for determining an interval at which subscriber usage updates are collected, based at least in part on the determined usage breach probability; and computer code for determining current data usage associated with the data communications session including retrieving subscriber profile data from a subscriber data repository, utilizing the determined interval; computer code for receiving, at the usage policy server, a request to change a service tier associated with the data communications session and a request to change a threshold associated with the data communications session; and computer code for updating the subscriber profile data based upon the service tier change request and the threshold change request. - View Dependent Claims (20, 21)
-
Specification