Device-assisted services for protecting network capacity
DCFirst Claim
1. A non-transitory computer-readable storage medium storing machine-executable instructions that, when executed by one or more processors of a wireless end-user device, cause the one or more processors to:
- identify a service usage activity of the wireless end-user device, the service usage activity being associated with a first software component of a plurality of software components on the wireless end-user device, the service usage activity comprising one or more prospective or successful communications over a wireless network;
determine whether the service usage activity comprises a background activity;
determine at least an aspect of a policy based on a user input obtained through a user interface of the wireless end-user device or based on information from a network element, the policy to be applied if the service usage activity is the background activity, the policy at least for controlling the service usage activity; and
if it is determined that the service usage activity is the background activity, apply the policy.
2 Assignments
Litigations
3 Petitions
Accused Products
Abstract
Disclosed is a non-transitory computer-readable storage medium storing machine-executable instructions that, when executed by one or more processors of a wireless end-user device, cause the one or more processors to: identify a service usage activity of the wireless end-user device, the service usage activity being associated with a first software component of a plurality of software components on the wireless end-user device, the service usage activity comprising one or more prospective or successful communications over a wireless network; determine whether the service usage activity comprises a background activity; determine at least an aspect of a policy based on a user input or based on information from a network element, the policy to be applied if the service usage activity is the background activity, the policy at least for controlling the service usage activity; and if it is determined that the service usage activity is the background activity, apply the policy.
-
Citations
174 Claims
-
1. A non-transitory computer-readable storage medium storing machine-executable instructions that, when executed by one or more processors of a wireless end-user device, cause the one or more processors to:
- identify a service usage activity of the wireless end-user device, the service usage activity being associated with a first software component of a plurality of software components on the wireless end-user device, the service usage activity comprising one or more prospective or successful communications over a wireless network;
determine whether the service usage activity comprises a background activity;
determine at least an aspect of a policy based on a user input obtained through a user interface of the wireless end-user device or based on information from a network element, the policy to be applied if the service usage activity is the background activity, the policy at least for controlling the service usage activity; and
if it is determined that the service usage activity is the background activity, apply the policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159, 160, 161, 162, 163, 164, 165, 166, 167, 168, 169, 170, 171, 172, 173, 174)
-
2. The non-transitory computer-readable storage medium recited in claim 1, wherein the first software component comprises at least a portion of an application component or at least a portion of an operating system component, and wherein the one or more prospective or successful communications over the wireless network comprise an update to the first software component.
-
3. The non-transitory computer-readable storage medium recited in claim 1, wherein the one or more prospective or successful communications over the wireless network comprise a communication associated with a network access, background signaling, a cloud synchronization service, an information feed, a download, an e-mail, a chat client, a security update, a peer-to-peer networking application update, a report of a behavior associated with the wireless end-user device, or a combination of these.
-
4. The non-transitory computer-readable storage medium recited in claim 1, wherein the one or more prospective or successful communications over the wireless network comprise a communication associated with a content update or a content download.
-
5. The non-transitory computer-readable storage medium recited in claim 1, wherein the one or more prospective or successful communications over the wireless network comprise a communication associated with an image, music, a video, an electronic book, an e-mail attachment, a content or media subscription, a news feed, a text message, a video chat, or a combination of these.
-
6. The non-transitory computer-readable storage medium recited in claim 1, wherein the one or more prospective or successful communications over the wireless network comprise a communication associated with a device application or widget, a device operating system function, a file download, streaming media, a software update, a firmware update, a website, a connection to a server, a web browser, or a synchronization service.
-
7. The non-transitory computer-readable storage medium recited in claim 1, wherein identify a service usage activity of the wireless end-user device comprises identify an intention to launch or start the first software component.
-
8. The non-transitory computer-readable storage medium recited in claim 1, wherein identify a service usage activity of the wireless end-user device comprises identify:
- an application identifier associated with the service usage activity or the first software component, an operating system function identifier associated with the service usage activity or the first software component, an aggregate service activity identifier, a component service activity identifier, or a combination of these.
-
9. The non-transitory computer-readable storage medium recited in claim 1, wherein the service usage activity results from cooperation between the first software component and at least one other software component, application, process, function, activity, or service, and wherein identify a service usage activity of the wireless end-user device comprises:
-
identify a data flow to or from the at least one other software component, application, process, function, activity, or service; and associate the data flow with the first software component.
-
-
10. The non-transitory computer-readable storage medium recited in claim 9, wherein the first software component comprises at least a portion of an application, and wherein the at least one other software component, application, process, function, activity, or service performs a proxy function.
-
11. The non-transitory computer-readable storage medium recited in claim 9, wherein the at least one other software component, application, process, function, activity, or service performs a proxy function.
-
12. The non-transitory computer-readable storage medium recited in claim 9, wherein the at least one other software component, application, process, function, activity, or service comprises a media service manager, an e-mail service manager, a domain name service (DNS) function, a software download service manager, a media download manager, a data download service manager, a media library function, a simple mail transfer protocol (SMTP) proxy, an Internet message access protocol (IMAP) proxy, a post office protocol (POP) proxy, a hypertext transfer protocol (HTTP) proxy, an instant messaging (IM) proxy, a virtual private network (VPN) service manager, or a secure socket layer (SSL) proxy.
-
13. The non-transitory computer-readable storage medium recited in claim 1, wherein identify a service usage activity of the wireless end-user device comprises:
-
monitor an application proxy service flow; and classify the application proxy service flow as being initiated by or belonging to the first software component.
-
-
14. The non-transitory computer-readable storage medium recited in claim 1, wherein identify a service usage activity of the wireless end-user device comprises:
-
associate an identifier identifying the first software component with a request to a proxy service; associate the request to the proxy service with a traffic flow, the traffic flow comprising the service usage activity; and associate the traffic flow with the identifier.
-
-
15. The non-transitory computer-readable storage medium recited in claim 14, wherein the identifier comprises a name, a fingerprint, an identification tag, a process number, or a credential.
-
16. The non-transitory computer-readable storage medium recited in claim 1, wherein the service usage activity results from cooperation between the first software component and a proxy function, and wherein identify a service usage activity of the wireless end-user device comprises:
-
identify a data flow to or from the proxy function; and associate the data flow with the first software component.
-
-
17. The non-transitory computer-readable storage medium recited in claim 1, wherein identify a service usage activity of the wireless end-user device comprises identify the service usage activity based on a stream, a flow, a destination, a port, a packet inspection, or a combination of these.
-
18. The non-transitory computer-readable storage medium recited in claim 1, wherein identify a service usage activity of the wireless end-user device comprises determine an identifier associated with the first software component, a number associated with the first software component, a name associated with the first software component, or a signature associated with the first software component.
-
19. The non-transitory computer-readable storage medium recited in claim 1, wherein the first software component comprises at least a portion of an application on the wireless end-user device.
-
20. The non-transitory computer-readable storage medium recited in claim 1, wherein the first software component comprises an operating system component, function, or service.
-
21. The non-transitory computer-readable storage medium recited in claim 1, wherein the first software component comprises a software function, utility, process, or tool.
-
22. The non-transitory computer-readable storage medium recited in claim 1, wherein the first software component comprises a plurality of applications, processes, functions, activities, or services.
-
23. The non-transitory computer-readable storage medium recited in claim 1, wherein the first software component comprises a Java archive (JAR) file, an application that uses an operating system (OS) function, an application that uses a proxy service function, or an OS process function that supports an application or OS function.
-
24. The non-transitory computer-readable storage medium recited in claim 1, wherein the network element is communicatively coupled to the wireless end-user device over the wireless network.
-
25. The non-transitory computer-readable storage medium recited in claim 1, wherein the policy is based on an amount of time, a time of day, a day of a week, a schedule, a network busy state, a network performance state, a network quality-of-service state, a priority of the service usage activity, or a combination of these.
-
26. The non-transitory computer-readable storage medium recited in claim 1, wherein the policy is based on a background service class, a background service state, or a combination of these.
-
27. The non-transitory computer-readable storage medium recited in claim 1, wherein the policy is based on at least an aspect of a service plan.
-
28. The non-transitory computer-readable storage medium recited in claim 1, wherein the policy is based on a behavior of the first software component, a behavior of the service usage activity, a messaging layer behavior, a random back-off, a power state of the wireless end-user device, a usage state of the wireless end-user device, or a combination of these.
-
29. The non-transitory computer-readable storage medium recited in claim 1, wherein the policy is based on a user interaction with the first software component, a user interaction with the service usage activity, a user interaction with the wireless end-user device, a user interface priority of the service usage activity, or a combination of these.
-
30. The non-transitory computer-readable storage medium recited in claim 1, wherein the wireless end-user device is part of a device group, and wherein the policy is associated with the device group.
-
31. The non-transitory computer-readable storage medium recited in claim 1, wherein the policy is based on a type of the wireless network.
-
32. The non-transitory computer-readable storage medium recited in claim 31, wherein the type of the wireless network is cellular, 2G, 3G, 4G, home, roaming, wireless fidelity (WiFi), or a combination of these.
-
33. The non-transitory computer-readable storage medium recited in claim 1, wherein the policy is based on a roaming condition of the wireless end-user device, a cost associated with communicating over the wireless network, or a combination of these.
-
34. The non-transitory computer-readable storage medium recited in claim 1, wherein controlling the service usage activity comprises preventing the first software component from launching, executing, or running.
-
35. The non-transitory computer-readable storage medium recited in claim 1, wherein the at least an aspect of the policy is based on the user input obtained through the user interface of the wireless end-user device, and wherein the user input identifies the first software component or the service usage activity.
-
36. The non-transitory computer-readable storage medium recited in claim 1, wherein the at least an aspect of the policy is based on the user input obtained through the user interface of the wireless end-user device, and wherein the user input identifies a network parameter or a network type.
-
37. The non-transitory computer-readable storage medium recited in claim 1, wherein the policy is based on a usage limit or a threshold.
-
38. The non-transitory computer-readable storage medium recited in claim 1, wherein the policy is based on a limit, wherein the limit is based on the user input obtained through the user interface of the wireless end-user device, a user preference, an indication of a threshold, a total traffic, a type of traffic, a destination, a port, a frequency of access, an access behavior, or a combination of these.
-
39. The non-transitory computer-readable storage medium recited in claim 1, wherein the policy is based on a type of the service usage activity, a priority of the service usage activity, a duration of the service usage activity, a characteristic of the wireless network, a quality-of-service (QoS) rule associated with the service usage activity, or a combination of these.
-
40. The non-transitory computer-readable storage medium recited in claim 1, wherein the policy comprises one or more filters, wherein the one or more filters provide filtering based on:
- a characteristic of the wireless network, a service plan applicable to the wireless end-user device, a characteristic of the first software component, a time of day, a network busy state, or a combination of these.
-
41. The non-transitory computer-readable storage medium recited in claim 1, wherein the wireless network is a first wireless network, and wherein the service usage activity is a first service usage activity, and wherein the policy assists the one or more processors to control the first service usage activity when the wireless end-user device is connected to the first wireless network and refrain from controlling a second service usage activity when the wireless end-user device is connected to a second wireless network, the second service usage activity being associated with the first software component.
-
42. The non-transitory computer-readable storage medium recited in claim 41, wherein control the first service usage activity comprises prevent, restrict, or block the first service usage activity.
-
43. The non-transitory computer-readable storage medium recited in claim 1, wherein the second wireless network is a wireless fidelity (WiFi) network or a home network.
-
44. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises determine whether a user is interacting with or has interacted with the first software component.
-
45. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises determine whether the first software component is in a user interface foreground.
-
46. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises determine whether the service usage activity is a software update.
-
47. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises determine whether the first software component is or has been classified as being in a background state or the service usage activity is or has been classified as a background service.
-
48. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises determine whether the service usage activity is identified by a list specifying one or more background activities.
-
49. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises determine whether the service usage activity is a foreground activity.
-
50. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises determine whether the first software component is a foreground component.
-
51. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises:
-
determine a classification of the service usage activity, and based on the classification of the service usage activity, determine whether the service usage activity comprises the background activity.
-
-
52. The non-transitory computer-readable storage medium recited in claim 51, wherein the classification of the service usage activity is based on:
- whether the first software component requires access to the wireless network, whether the one or more prospective or successful communications over the wireless network comprise an update to the first software component, whether the first software component requires information about the wireless network, whether the first software component requires location information, whether the one or more prospective or successful communications over the wireless network comprise an operating system software update, whether the one or more prospective or successful communications over the wireless network comprise a security software update, whether the one or more prospective or successful communications over the wireless network comprise a communication associated with a network-based back-up, whether the one or more prospective or successful communications over the wireless network comprise a communication associated with an e-mail download, whether the one or more prospective or successful communications over the wireless network comprise communications associated with a cloud synchronization service, or a combination of these.
-
53. The non-transitory computer-readable storage medium recited in claim 51, wherein the user input obtained through the user interface of the wireless end-user device is a first user input, and wherein determine a classification of the service usage activity is based on a characteristic of the first software component, a content type associated with the service usage activity, a characteristic of the wireless network, a service plan, a user preference, the first user input, a second user input, the information from the network element, or a combination of these.
-
54. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity is based on a user interaction with the wireless end-user device.
-
55. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises determine whether a value comprising a measure of the service usage activity satisfies a condition relative to a threshold.
-
56. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises determine whether the first software component is a foreground component or an unclassified component.
-
57. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises determine whether the first software component is in a foreground of user interaction or determine whether the first software component is in a background of user interaction.
-
58. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises determine whether content associated with the service usage activity is in a foreground of a user interface of the wireless end-user device.
-
59. The non-transitory computer-readable storage medium recited in claim 1, wherein determine whether the service usage activity comprises a background activity comprises determine whether the first software component is active.
-
60. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises at least assist in allowing, restricting, delaying, throttling, or preventing the service usage activity.
-
61. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises at least assist in:
- blocking access to the wireless network, restricting access to the wireless network, delaying access to the wireless network, or aggregating and holding the service usage activity.
-
62. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises at least assist in queuing, time-windowing, suspending, quarantining, killing, or removing the service usage activity.
-
63. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises at least assist in preventing an update associated with the first software component.
-
64. The non-transitory computer-readable storage medium recited in claim 1, wherein the one or more prospective or successful communications over the wireless network comprise one or more Internet protocol (IP) address requests, and wherein apply the policy comprises at least assist in withholding, delaying, time-windowing, reducing in frequency, or aggregating at least a portion of the service usage activity.
-
65. The non-transitory computer-readable storage medium recited in claim 1, wherein the information from the network element is first information, and wherein apply the policy comprises provide second information to the first software component.
-
66. The non-transitory computer-readable storage medium recited in claim 65, wherein provide second information to the first software component comprises provide the second information through an application programming interface.
-
67. The non-transitory computer-readable storage medium recited in claim 65, wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to:
provide third information to a second software component on the wireless end-user device, the third information being different from the second information.
-
68. The non-transitory computer-readable storage medium recited in claim 67, wherein provide third information to a second software component on the wireless end-user device comprises provide the third information through an application programming interface.
-
69. The non-transitory computer-readable storage medium recited in claim 67, wherein the third information enables the second software component to communicate over the wireless network.
-
70. The non-transitory computer-readable storage medium recited in claim 65, wherein the wireless network is a first wireless network, and wherein the second information comprises a network access condition of the first wireless network, a network busy state associated with the first wireless network, a network availability state associated with the first wireless network, a network busy state associated with a second wireless network, a network availability state associated with the second wireless network, or information about the policy.
-
71. The non-transitory computer-readable storage medium recited in claim 65, wherein the second information comprises a setting for assisting the first software component in restricting, allowing, blocking, throttling, deferring, time-scheduling, or queuing the service usage activity.
-
72. The non-transitory computer-readable storage medium recited in claim 71, wherein the setting is based on a characteristic of the wireless network, a network busy state associated with the wireless network, a time, a service plan associated with the wireless end-user device, a classification of the service usage activity, or a combination of these.
-
73. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises inform the first software component whether the first software component is allowed to access the wireless network.
-
74. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises inform the first software component whether the wireless network is available.
-
75. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises inform the first software component of a traffic control to be implemented or applied by the first software component.
-
76. The non-transitory computer-readable storage medium recited in claim 1, wherein the information from the network element is first information, and wherein apply the policy comprises obtain second information from the first software component.
-
77. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises at least assist in intercepting, controlling, blocking, modifying, removing, or replacing a notification associated with the first software component or the service usage activity, the notification for presentation through a user interface of the wireless end-user device.
-
78. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises at least assist in intercepting, controlling, blocking, modifying, removing, or replacing a notification for presentation through a user interface of the wireless end-user device.
-
79. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises at least assist in intercepting a stack application programming interface (API) level or application messaging layer request.
-
80. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises at least assist in killing or suspending the service usage activity or the first software component.
-
81. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises at least assist in changing or setting a priority of the service usage activity.
-
82. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises at least assist in emulating a network application programming interface (API) message.
-
83. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises at least assist in intercepting, modifying, blocking, removing, injecting, swapping, or replacing an application interface message.
-
84. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises:
-
at least assist in preventing initiation of the service usage activity by the first software component; and send a message to the first software component.
-
-
85. The non-transitory computer-readable storage medium recited in claim 84, wherein initiation of the service usage activity by the first software component comprises opening of a connection, opening of a socket, initiating transmission, initiating a data flow, or initiating a data stream.
-
86. The non-transitory computer-readable storage medium recited in claim 84, wherein the message comprises a reset message, an indication that the service usage activity is not allowed, or an indication that the wireless network is not available.
-
87. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises:
-
identify a socket to be opened for the service usage activity; and based on a condition, block the service usage activity or terminate the socket.
-
-
88. The non-transitory computer-readable storage medium recited in claim 1, wherein controlling the service usage activity comprises:
- blocking a network access event or attempt associated with the first software component, modulating a number of access events or attempts associated with the first software component, aggregating a plurality of access events or attempts associated with the first software component, or time-windowing the number of access events or attempts associated with the first software component.
-
89. The non-transitory computer-readable storage medium recited in claim 1, wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to:
if it is determined that the service usage activity is not the background activity, refrain from applying the policy.
-
90. The non-transitory computer-readable storage medium recited in claim 1, wherein the policy is a first policy, and wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to:
if it is determined that the service usage activity is not the background activity, apply a second policy.
-
91. The non-transitory computer-readable storage medium recited in claim 1, wherein apply the policy comprises cause a notification to be presented through a user interface of the wireless end-user device.
-
92. The non-transitory computer-readable storage medium recited in claim 91, wherein the notification provides information about the policy.
-
93. The non-transitory computer-readable storage medium recited in claim 91, wherein the notification provides information about an option to set, control, override, or modify the at least an aspect of the policy or a second aspect of the policy.
-
94. The non-transitory computer-readable storage medium recited in claim 91, wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to obtain an indication of a user response to the notification.
-
95. The non-transitory computer-readable storage medium recited in claim 91, wherein the notification provides a warning or an alert.
-
96. The non-transitory computer-readable storage medium recited in claim 91, wherein the notification provides information about a service plan limit.
-
97. The non-transitory computer-readable storage medium recited in claim 91, wherein the first software component is at least a portion of an application, and wherein the one or more prospective or successful communications over the wireless network comprise an attempt to launch, run, or execute the application, and wherein the notification comprises information about the attempt to launch, run, or execute the application.
-
98. The non-transitory computer-readable storage medium recited in claim 91, wherein the one or more prospective or successful communications over the wireless network comprise an attempted or successful launch or execution of the first software component, and wherein the notification comprises information about the attempted or successful launch or execution of the first software component.
-
99. The non-transitory computer-readable storage medium recited in claim 91, wherein the policy is based on a limit, and wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to determine that a data usage associated with the service usage activity is not less than the limit, and wherein cause a notification to be presented through a user interface of the wireless end-user device comprises trigger presentation of the notification based on the determination that the data usage associated with the service usage activity is not less than the limit.
-
100. The non-transitory computer-readable storage medium recited in claim 91, wherein the one or more prospective or successful communications over the wireless network comprise an attempt to download or load an application, and wherein the notification comprises information about the attempted download or load of the application.
-
101. The non-transitory computer-readable storage medium recited in claim 91, wherein the one or more prospective or successful communications over the wireless network comprise an attempt to initiate usage of a cloud-based service or application, and wherein the notification comprises information about the attempted initiation of usage of the cloud-based service or application.
-
102. The non-transitory computer-readable storage medium recited in claim 91, wherein the notification indicates that one or more service usage activities are subject to the policy.
-
103. The non-transitory computer-readable storage medium recited in claim 91, wherein the notification provides information about a second network.
-
104. The non-transitory computer-readable storage medium recited in claim 91, wherein the notification comprises an offer for a service plan upgrade or downgrade.
-
105. The non-transitory computer-readable storage medium recited in claim 91, wherein apply the policy further comprises obtain an indication of a user preference in response to the notification.
-
106. The non-transitory computer-readable storage medium recited in claim 105, wherein the indication of the user preference comprises a user directive to associate the policy with a second software component.
-
107. The non-transitory computer-readable storage medium recited in claim 105, wherein the indication of the user preference comprises a user directive to allow or block the service usage activity.
-
108. The non-transitory computer-readable storage medium recited in claim 105, wherein the indication of the user preference identifies a traffic control setting associated with the policy.
-
109. The non-transitory computer-readable storage medium recited in claim 105, wherein the indication of the user preference comprises a user directive to allow the service usage activity under a specified condition.
-
110. The non-transitory computer-readable storage medium recited in claim 105, wherein the indication of the user preference comprises a user directive to override or modify the policy.
-
111. The non-transitory computer-readable storage medium recited in claim 91, wherein cause a notification to be presented through a user interface of the wireless end-user device comprises cause the notification to be presented based on occurrence of a trigger.
-
112. The non-transitory computer-readable storage medium recited in claim 111, wherein the trigger is:
- a measure of the service usage activity satisfies a first condition relative to a threshold, an aspect of the service usage activity satisfies a second condition, a change to the policy, or a message from the network element.
-
113. The non-transitory computer-readable storage medium recited in claim 91, wherein the notification enables a user associated with the wireless end-user device to obtain information about at least an aspect of the service usage activity or a service plan associated with the wireless end-user device.
-
114. The non-transitory computer-readable storage medium recited in claim 91, wherein the notification presents a list of service usage activities or software components, the list of service usage activities or software components including the service usage activity or the first software component.
-
115. The non-transitory computer-readable storage medium recited in claim 91, wherein the notification presents an option to modify the policy.
-
116. The non-transitory computer-readable storage medium recited in claim 91, wherein the notification presents an indication of a measure of usage of the wireless network associated with the service usage activity.
-
117. The non-transitory computer-readable storage medium recited in claim 91, wherein the notification is provided through an e-mail, a text message, a window, a setting, or a voice message.
-
118. The non-transitory computer-readable storage medium recited in claim 1, wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to:
cause a notification to be presented through a user interface of the wireless end-user device.
-
119. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification provides information about the policy.
-
120. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification provides information about an option to set, control, override, or modify the at least an aspect of the policy or a second aspect of the policy.
-
121. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification indicates that the service usage activity is the background activity.
-
122. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification provides information about a second network.
-
123. The non-transitory computer-readable storage medium recited in claim 118, wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to obtain an indication of a user preference in response to the notification.
-
124. The non-transitory computer-readable storage medium recited in claim 123, wherein the indication of the user preference comprises a user directive to associate the policy with the first software component.
-
125. The non-transitory computer-readable storage medium recited in claim 123, wherein the indication of the user preference comprises a user directive to restrict, allow, or block the service usage activity.
-
126. The non-transitory computer-readable storage medium recited in claim 123, wherein the indication of the user preference identifies a traffic control setting associated with the policy.
-
127. The non-transitory computer-readable storage medium recited in claim 123, wherein the indication of the user preference comprises a user directive to override or modify the policy.
-
128. The non-transitory computer-readable storage medium recited in claim 123, wherein the indication of the user preference comprises a user acknowledgment of the notification.
-
129. The non-transitory computer-readable storage medium recited in claim 123, wherein the indication of the user preference indicates one or more network types.
-
130. The non-transitory computer-readable storage medium recited in claim 129, wherein the one or more network types comprise WiFi, 4G, 3G, wireless, wired, or a combination of these.
-
131. The non-transitory computer-readable storage medium recited in claim 118, wherein cause a notification to be presented through a user interface of the wireless end-user device comprises cause the notification to be presented based on occurrence of a trigger.
-
132. The non-transitory computer-readable storage medium recited in claim 131, wherein the trigger is:
- a measure of the service usage activity satisfies a first condition relative to a threshold, an aspect of the service usage activity satisfies a second condition, a change to the policy, or a message from the network element.
-
133. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification enables a user associated with the wireless end-user device to obtain information about at least an aspect of the service usage activity or a service plan associated with the wireless end-user device.
-
134. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification presents a list of service usage activities or software components, the list of service usage activities or software components including the service usage activity or the first software component.
-
135. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification presents information about a setting associated with the policy.
-
136. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification presents information about the wireless network.
-
137. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification presents an indication of a measure of usage of the wireless network associated with the service usage activity.
-
138. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification presents information about a network busy state or a network availability state.
-
139. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification presents an indication of a measure of usage of the wireless network associated with the first software component.
-
140. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification presents information about a statistic associated with the service usage activity.
-
141. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification comprises a gauge providing service usage information associated with the service usage activity.
-
142. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification comprises a gauge providing service usage information associated with one or more networks, the one or more networks including the wireless network.
-
143. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification comprises a gauge providing information associated with a service plan.
-
144. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification is provided through an e-mail, a text message, a window, a setting, or a voice message.
-
145. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification comprises a warning or an alert.
-
146. The non-transitory computer-readable storage medium recited in claim 118, wherein the information from the network element is first information, and wherein the notification is based on second information from the network element.
-
147. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification comprises information about a cost or a charge associated with the service usage activity.
-
148. The non-transitory computer-readable storage medium recited in claim 118, wherein the notification comprises information about a service sponsor.
-
149. The non-transitory computer-readable storage medium recited in claim 1, wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to:
-
detect an attempted use of the first software component; and based on the detected attempted use of the first software component, cause a notification to be presented through a user interface of the wireless end-user device.
-
-
150. The non-transitory computer-readable storage medium recited in claim 149, wherein the notification provides information to enable a user associated with the wireless end-user device to override the policy.
-
151. The non-transitory computer-readable storage medium recited in claim 149, wherein the notification provides information about a cost or a charge associated with the service usage activity.
-
152. The non-transitory computer-readable storage medium recited in claim 149, wherein the notification provides information to enable a user associated with the wireless end-user device to change or upgrade a service plan associated with the wireless end-user device.
-
153. The non-transitory computer-readable storage medium recited in claim 1, wherein the at least an aspect of a policy is based on the user input obtained through the user interface of the wireless end-user device, and wherein the user input specifies a user preference associated with one or more network types.
-
154. The non-transitory computer-readable storage medium recited in claim 153, wherein the one or more network types comprise wireless fidelity (WiFi), home, roaming, 4G, 3G, wireless, wired, or a combination of these.
-
155. The non-transitory computer-readable storage medium recited in claim 1, wherein the user input obtained through the user interface of the wireless end-user device is a first user input, and wherein the policy is a first policy, and wherein the first user input or a second user input comprises a directive to apply a second policy to a second software component of the plurality of software components on the wireless end-user device.
-
156. The non-transitory computer-readable storage medium recited in claim 1, wherein the user input obtained through the user interface of the wireless end-user device is a first user input, and wherein the first user input or a second user input comprises a directive to refrain from applying the policy to a second software component of the plurality of software components on the wireless end-user device.
-
157. The non-transitory computer-readable storage medium recited in claim 1, wherein the user input obtained through the user interface of the wireless end-user device comprises a directive to apply the policy to a second software component of the plurality of software components on the wireless end-user device.
-
158. The non-transitory computer-readable storage medium recited in claim 1, wherein the user input obtained through the user interface of the wireless end-user device specifies a user preference associated with the service usage activity or the first software component.
-
159. The non-transitory computer-readable storage medium recited in claim 158, wherein the user preference comprises a preference to restrict, allow, block, delay, or throttle the service usage activity.
-
160. The non-transitory computer-readable storage medium recited in claim 1, wherein the service usage activity is a first service usage activity, and wherein the wireless network is a first wireless network, and wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to:
-
identify a second service usage activity of the wireless end-user device, the second service usage activity being associated with the first software component or with a second software component of the plurality of software components on the wireless end-user device, the second service usage activity comprising one or more prospective or successful communications over a second wireless network; and refrain from applying the policy to the second service usage activity.
-
-
161. The non-transitory computer-readable storage medium recited in claim 1, wherein the service usage activity is a first service usage activity, and wherein the background activity is a first background activity, and wherein the wireless network is a first wireless network, and wherein the policy is a first policy, and wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to:
-
identify a second service usage activity of the wireless end-user device, the second service usage activity being associated with the first software component or with a second software component of the plurality of software components on the wireless end-user device, the second service usage activity comprising one or more prospective or successful communications over a second wireless network; and determine whether the second service usage activity is a second background activity; if it is determined that the second service usage activity is the second background activity, apply a second policy to the second service usage activity.
-
-
162. The non-transitory computer-readable storage medium recited in claim 161, wherein the first policy restricts or prevents the first background activity, and wherein the second policy allows the second background activity.
-
163. The non-transitory computer-readable storage medium recited in claim 1, wherein the service usage activity is a first service usage activity, and wherein the wireless network is a first wireless network, and wherein the policy is a first policy, and wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to:
-
identify a second service usage activity of the wireless end-user device, the second service usage activity being associated with the first software component or with a second software component of the plurality of software components on the wireless end-user device, the second service usage activity comprising one or more prospective or successful communications over a second wireless network; and apply a second policy to the second service usage activity.
-
-
164. The non-transitory computer-readable storage medium recited in claim 163, wherein the second policy comprises a control policy, a notification policy, or an accounting policy associated with the first software component or the second software component.
-
165. The non-transitory computer-readable storage medium recited in claim 1, wherein the service usage activity is a first service usage activity, and wherein the one or more prospective or successful communications over the wireless network are first one or more prospective or successful communications over the first wireless network, and wherein the background activity is a first background activity, and wherein the user input obtained through the user interface of the wireless end-user device is a first user input, and wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to:
-
identify a second service usage activity of the wireless end-user device, the second service usage activity being associated with a second software component of the plurality of software components on the wireless end-user device, the second service usage activity comprising second one or more prospective or successful communications over the wireless network; determine whether the second service usage activity is a second background activity; and if it is determined that the second service usage activity is the second background activity, apply at least a portion of the policy, wherein the at least a portion of the policy is based on a second user input.
-
-
166. The non-transitory computer-readable storage medium recited in claim 1, wherein the service usage activity is a first service usage activity, and wherein the one or more prospective or successful communications over the wireless network are first one or more prospective or successful communications over the wireless network, and wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to:
-
identify a second service usage activity of the wireless end-user device, the second service usage activity being associated with a second software component of the plurality of software components on the wireless end-user device, the second service usage activity comprising second one or more prospective or successful communications over the wireless network; determine whether the second service usage activity is the background activity; and if it is determined that the second service usage activity is the background activity, refrain from applying at least a portion of the policy.
-
-
167. The non-transitory computer-readable storage medium recited in claim 1, wherein the background activity is a first background activity, and wherein the service usage activity is a first service usage activity, and wherein the one or more prospective or successful communications over the wireless network are first one or more prospective or successful communications over the wireless network, and wherein the policy is a first policy, and wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to:
-
identify a second service usage activity of the wireless end-user device, the second service usage activity being associated with a second software component of the plurality of software components on the wireless end-user device, the second service usage activity comprising second one or more prospective or successful communications over the wireless network; determine whether the second service usage activity is a second background activity; obtain a second policy, the second policy to be applied when the second service usage activity is the second background activity, the second policy for controlling the second service usage activity; and if it is determined that the second service usage activity is the second background activity, apply the second policy.
-
-
168. The non-transitory computer-readable storage medium recited in claim 167, wherein the first policy, the second policy, or both are based on a network busy state, a network availability state, or a cost associated with the wireless network.
-
169. The non-transitory computer-readable storage medium recited in claim 1, wherein the service usage activity is a first service usage activity, and wherein the one or more prospective or successful communications over the wireless network are first one or more prospective or successful communications over the wireless network, and wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to:
-
identify a second service usage activity of the wireless end-user device, the second service usage activity being associated with the first software component, the second service usage activity comprising second one or more prospective or successful communications over the wireless network; determine whether the second service usage activity is the background activity; and if it is determined that the second service usage activity is the background activity, apply at least a portion of the policy.
-
-
170. The non-transitory computer-readable storage medium recited in claim 1, wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to monitor the service usage activity, account for the service usage activity, report information about the service usage activity, or a combination of these.
-
171. The wireless end-user device embodying the non-transitory computer-readable storage medium recited in claim 1.
-
172. The non-transitory computer-readable storage medium recited in claim 1, wherein the network element comprises a service controller, a server, a cloud element, or a billing element.
-
173. The non-transitory computer-readable storage medium recited in claim 1, wherein, when executed by the one or more processors of the wireless end-user device, the machine-executable instructions further cause the one or more processors to provide information about the service usage activity to the network element.
-
174. The non-transitory computer-readable storage medium recited in claim 173, wherein the information about the service usage activity comprises a count of data traffic associated with the service usage activity, a transaction count, a message count, a connection time, a connection duration, a classification of traffic, an indication that a measure of the service usage activity satisfies a condition relative to a threshold, a parameter associated with the service usage activity, an indication that the background activity is restricted, or a combination of these.
-
2. The non-transitory computer-readable storage medium recited in claim 1, wherein the first software component comprises at least a portion of an application component or at least a portion of an operating system component, and wherein the one or more prospective or successful communications over the wireless network comprise an update to the first software component.
- identify a service usage activity of the wireless end-user device, the service usage activity being associated with a first software component of a plurality of software components on the wireless end-user device, the service usage activity comprising one or more prospective or successful communications over a wireless network;
Specification
- Resources
-
Current AssigneeHeadwater Research LLC (Greg Raleigh)
-
Original AssigneeHeadwater Partners I LLC (Greg Raleigh)
-
InventorsRaleigh, Gregory G., Raissinia, Alireza, Lavine, James
-
Primary Examiner(s)RUDY, ANDREW J
-
Application NumberUS13/134,028Publication NumberTime in Patent Office909 DaysField of Search705/34, 705/30, 709/223, 709/224, 455/414.1, 455/417, 455405-409, 455/422.1, 370/252, 713/189US Class Current709/224CPC Class CodesH04L 12/14 Charging , metering or bill...H04L 12/1492 negotiation of tariffH04L 12/1496 involving discountsH04L 41/0893 Assignment of logical group...H04L 41/0894 Policy-based network config...H04L 41/0896 Bandwidth or capacity manag...H04L 41/5006 Creating or negotiating SLA...H04L 41/5022 by giving priorities, e.g. ...H04L 41/5029 Service quality level-based...H04L 41/5051 Service on demand, e.g. def...H04L 41/5054 Automatic deployment of ser...H04L 43/08 Monitoring or testing based...H04L 43/0882 Utilisation of link capacityH04L 47/12 Avoiding congestion; Recove...H04L 47/19 at layers above the network...H04L 47/20 Traffic policingH04L 47/2425 for supporting services spe...H04L 47/2475 for supporting traffic char...H04L 47/801 Real time trafficH04L 47/803 Application awareH04L 47/805 : QOS or priority awareH04L 47/808 : User-type awareH04L 47/822 : Collecting or measuring res...H04L 47/824 : Applicable to portable or m...H04L 47/83 : based on usage predictionH04L 63/0227 : Filtering policies mail mes...H04L 63/08 : for authentication of entit...H04L 63/10 : for controlling access to d...H04L 63/102 : Entity profilesH04L 63/20 : for managing network securi...H04L 67/02 : based on web technology, e....H04L 67/51 : Discovery or management the...H04L 67/61 : taking into account QoS or ...H04M 15/30 : the meter or calculation of...H04M 15/41 : Billing record details, i.e...H04M 15/43 : Billing software detailsH04M 15/44 : Augmented, consolidated or ...H04M 15/66 : Policy and charging systemH04M 15/8016 : based on quality of service...H04M 15/8055 : Selecting cheaper transport...H04M 15/81 : Dynamic pricing, e.g. chang...H04W 12/06 : AuthenticationH04W 12/084 : using delegated authorisati...H04W 12/088 : using filters or firewallsH04W 24/00 : Supervisory, monitoring or ...H04W 24/02 : Arrangements for optimising...H04W 24/08 : Testing, supervising or mon...H04W 28/021 : in wireless networks with c...H04W 28/0215 : based on user or device pro...H04W 28/0221 : power availability or consu...H04W 28/0247 : based on conditions of the ...H04W 28/0257 : the individual bearer or ch...H04W 28/0268 : using specific QoS paramete...H04W 28/0284 : detecting congestion or ove...H04W 28/12 : using signalling between ne...H04W 28/20 : Negotiating bandwidthH04W 36/144 : over a different radio air ...H04W 4/24 : Accounting or billingH04W 4/50 : Service provisioning or rec...H04W 48/02 : Access restriction performe...H04W 48/04 : based on user or terminal l...H04W 48/06 : based on traffic conditionsH04W 48/16 : Discovering, processing acc...H04W 52/0212 : managed by the network, e.g...H04W 52/0264 : by selectively disabling so...H04W 8/04 : Registration at HLR or HSS ...H04W 80/04 : Network layer protocols, e....H04W 84/042 : Public Land Mobile systems,...H04W 84/12 : WLAN [Wireless Local Area N...Y02D 30/70 : in wireless communication n...