Dynamic usage inequity detection and/or remedy
First Claim
Patent Images
1. A network device, comprising:
- a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising;
determining first data indicative of a call detail record that is generated in response to a determination that a network service has been used by a subscriber device associated with a subscriber identity, wherein the first data represents a violation of second data indicative of a service agreement between the subscriber identity and a provider identity that provides the network service, wherein the violation relates to usage of the network service by an unauthorized device that is not authorized by the service agreement, and wherein the unauthorized device accesses the network service via an authorized device that is authorized by the service agreement;
transmitting event data that describes the violation to a control device that determines a defined treatment to apply in response to the violation; and
facilitating applying the defined treatment with regard to the service agreement.
1 Assignment
0 Petitions
Accused Products
Abstract
An architecture that can dynamically detect and/or automatically remedy service usage inequities in a communications network is provided. For example, based upon a comparison of incoming call detail records (CDRs) to various subscriber information entities (e.g., service plan, blacklisted devices for the service plan, historic or current billing cycle usage, etc.), the architecture can identify when a usage inequity occurs or is likely to occur, substantially in real time.
30 Citations
20 Claims
-
1. A network device, comprising:
-
a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising; determining first data indicative of a call detail record that is generated in response to a determination that a network service has been used by a subscriber device associated with a subscriber identity, wherein the first data represents a violation of second data indicative of a service agreement between the subscriber identity and a provider identity that provides the network service, wherein the violation relates to usage of the network service by an unauthorized device that is not authorized by the service agreement, and wherein the unauthorized device accesses the network service via an authorized device that is authorized by the service agreement; transmitting event data that describes the violation to a control device that determines a defined treatment to apply in response to the violation; and facilitating applying the defined treatment with regard to the service agreement. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
determining, by a system comprising a processor, that first data, representative of a call detail record that is generated in response to a determination a subscriber identity used a network service, is indicative of a violation of second data representative of a service agreement between the subscriber identity and a provider identity of the network service, wherein the violation relates to usage of the network service by an unauthorized device that is not authorized by the service agreement, and wherein the unauthorized device accesses the network service via an authorized device that is authorized by the service agreement; transmitting, by the system, event data that describes the violation to a control device that determines a defined treatment to apply in response to the violation; and facilitating, by the system, application of the defined treatment in connection with the network service. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising:
-
determining first data that represents a violation of second data indicative of a service agreement between a subscriber identity and a provider identity of a network service, wherein the first data is indicative of a call detail record that is generated in response to a determination that the subscriber identity accessed the network service via a device determined to be associated with the subscriber identity, wherein the violation relates to usage of the network service by an unauthorized device that is not authorized by the service agreement and wherein the unauthorized device is communicatively tethered to the device that is authorized by the service agreement; facilitating transmission of event data that describes the violation to a control device that determines a defined treatment to apply in response to the violation; and facilitating applying the defined treatment with regard to the network service. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification