Various embodiments of the invention are disclosed in the following detailed description and the accompanying drawings.
In recent years, mobile wireless communication devices have become popular, and many individuals, families, and organizations use or own multiple mobile wireless communication devices. As would be appreciated by a person having ordinary skill in the art, there are many kinds of mobile wireless communication devices, including, for example, smart phones, tablets, laptops, mobile phones, personal digital assistants, and many others. These mobile wireless communication devices are capable of sending and receiving wireless radio frequency signals over one or more wireless communication networks, such as cellular (e.g., 2G, 2.5G, 3G, 4G, LTE, LTE advanced, etc.) networks, local-area (e.g., Wi-Fi) networks, or other wireless communication networks.
A mobile wireless communication device (hereinafter generally referred to simply as a device) may need to be associated with a service account in order to allow a user or owner of the device (herein referred to as a subscriber or user) to use the device to communicate over a particular wireless communication network in a manner that is meaningful to the subscriber (e.g., to access content or a service offered by a service provider). Moreover, the device may need to be associated with one or more service plans that allow it to access services offered by a service provider. A service plan may, in general, allow for a quantity of communication or a time period of communication (e.g., 100 MB of data per month, 24 hours of network access, 100 minutes of phone calls, etc.). Some examples of services that may be offered by a service provider include the non-mutually-exclusive categories of voice services (e.g., phone calls, etc.), messaging services (e.g., text messages, multimedia messages, etc.), data services (e.g., Internet access, etc.), and hybrid services (e.g., voice over IP (VOIP), video chat, etc.). A service provider may be an operator of a wireless communication network, or may be another entity, such as a mobile virtual network operator (MVNO), a retail partner, a mobile wireless communication device original equipment manufacturer (OEM), a mobile wireless communication device operating system (OS) provider or a third-party service partner. There are many other examples of services, service plans, and service providers, and the examples provided herein are not intended to be limiting.
It may also be desirable to associate more than one device with a particular service account. There are many potential benefits of associating multiple devices with a particular service account, including, for example, simplifying billing for the service provider and for the subscriber, and potentially reducing service costs for subscribers, e.g., by sharing the particular service account among multiple devices. For example, a husband and wife may want to establish a single service account for both of their smart phones. As another example, a parent may want to establish a single service account for the several mobile phones used by family members. As another example, an employer may want to establish a single service account for multiple smart phones used by one or more of its employees. As another example, a person may want to establish a single service plan for multiple devices that the person uses, such as, for example, one or more of a smart phone, a tablet, a laptop, and an intermediate networking device that forwards traffic between a local area network and a wireless cellular network. There are many other examples of situations in which it might be desirable to associate multiple devices with a single service account (hereinafter referred to as a master service account).
In addition to associating multiple devices with a master service account, it may be desirable to share a service plan that is associated with the master service account among the multiple devices associated with the master service account. For example, a parent might want to purchase a single service plan that is shared among all members of the family, or an employer might want to purchase a single service plan that is shared among multiple employees.
Today, subscribers who wish to share a service plan among multiple devices can only do so with several limitations. For example, creating a master service account and sharing a service plan among multiple devices can require direct involvement of a service provider, e.g. a service provider customer representative. The service provider associates each of the devices with a master service account and with a service plan, and the associated devices then share the service plan. Often, subscribers cannot add or delete devices from the master service account without assistance from the service provider. In order to make changes to the master account, subscribers may need to call the service provider or may be required to log in to a web portal (e.g., by logging into a website), e.g., through a separate computing system. Another drawback is that although all of the devices associated with a master service account share a service plan, there are no controls to prevent a particular device from “hogging” allocations provided by the service plan. Another drawback is that although some service providers today allow sharing of voice minutes or text message allocations, they may not allow sharing of a data plan, or they may limit sharing of a data plan. Yet another drawback is that today's shared service plans may not allow subscribers to associate different kinds of devices (e.g., a tablet and a smart phone) with a master service account. As a result of these drawbacks, the utility of shared service plans available today is limited.
Disclosed herein are methods, systems, and apparatuses to enable subscribers of devices to view, research, select and customize service plans for one or more devices. Also disclosed herein are methods, systems, and apparatuses that allow subscribers to create and manage a group of two or more devices (herein referred to as a device group) without service provider involvement. After a subscriber has established a master service account, the subscriber can create a device group by associating additional devices with the established master service account that is already associated with a master device or with a master user (e.g., an administrator at an enterprise or another party who is not necessarily associated with a master device, but who is associated with the master service account). Also disclosed are methods, systems, and apparatuses to enable subscribers to share service plans among multiple devices in the device group. Also disclosed are methods, systems, and apparatuses to enable subscribers to fully or partially assign a service plan from one device to another device in the device group. Also disclosed are methods, systems, and apparatuses to allow subscribers to monitor or manage the devices in a device group from one or more master devices in the device group. Managing includes adding, deleting, or modifying devices or properties of devices, service plans, service accounts, etc. For example, managing includes dictating or changing a usage limit on one or more services available to devices in the device group.
As used herein, service activity is used to refer to any service usage or traffic usage that can be associated with, for example, an application; a network communication end point, such as an address, uniform resource locator (URL) or other identifier with which the device is communicating; a traffic content type; a transaction where content or other material, information or goods are transacted, purchased, reserved, ordered or exchanged; a download, upload or file transfer; email, text, short messaging service (SMS), IP multimedia system (IMS), or other messaging activity or usage; VOIP services; video services; a device usage event that generates a billing event; service usage associated with a bill by account activity (also referred to as billing by account) as described herein; device location; device service usage patterns, device user interface (UI) discovery patterns, content usage patterns or other characterizations of device usage; or other categories of user or device activity that can be identified, monitored, recorded, reported, controlled or processed in accordance with a set of verifiable service control policies. As will be apparent to one of ordinary skill in the art in view of the embodiments described herein, some embodiments identify various service activities for the purpose of decomposing overall service usage into finer sub-categories of activities that can be verifiably monitored, categorized, cataloged, reported, controlled, monetized and used for end user notification in a manner that results in superior optimization of the service capabilities for various levels of service cost or for various types of devices or groups. In some embodiments, it will be apparent to one of ordinary skill in the art that the terms “service activity” and “service usage” are associated with categorizing and possibly monitoring or controlling data traffic, application usage, communication with certain network end points, or transactions, and it will also be apparent that in some embodiments, the term service activity is intended to include one or more of the broader aspects listed above. The term service usage can be used interchangeably with the term service activity, and neither term is intended in general to exclude any aspect of the other. In some cases, where the term service usage and/or service activity is used, more specific descriptors such as traffic usage, application usage, website usage, and other service usage examples are also used to provide more specific examples or focus in on a particular element of the more encompassing term.
In some embodiments, service controller 122 illustrated in
In some embodiments, a request to add device 100B to the master service account, device group, or multi-device service plan is communicated to another device, device 100A. In some embodiments, device 100A is a master device. In some embodiments, device 100A is any device associated with the primary service account holder (e.g., the subscriber who pays for the service). In some embodiments, device 100A is any device associated with the shared account that also has permissions to add additional devices or subscribers to the master service account, device group, or multi-device service plan. In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan is communicated over a wireless network. In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan is communicated over a wired network. In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan is communicated using a code or a unique display object presented through a user interface of device 100B. In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan is communicated using an audio signal.
In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan includes a credential that provides for unique identification of device 100B, such as a subscriber identity module, a device identifier, a phone number, an International Mobile Subscriber Identity (IMSI), a mobile equipment identifier (MEID), or any other credential. In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan includes information that provides for identification of a user of device 100B (e.g., a subscriber). In some embodiments, the credential comprises a secure information aspect associated with device 100B. In some embodiments, the credential comprises a secure information aspect associated with device 100A (which may be a master device). As would be appreciated by a person having ordinary skill in the art, a credential allows a user to access network services using a device. A credential uniquely identifies an entity, such as a particular device 100, a particular subscriber or account-holder, a particular service account, etc. Examples of credentials include, but are not limited to, a phone number, an international mobile subscriber identifier (IMSI), a mobile station identifier (MSID), a subscriber identity module (SIM) identifier, an electronic serial number (ESN), a mobile equipment identifier (MEID), an international mobile equipment identity (IMEI), a device identifier, a subscriber identifier, a service account identifier, a media access control (MAC) address, an Internet protocol (IP) address, a token, a one-time token, any other identifying information that uniquely identifies an entity, and combinations of these. Some credentials (e.g., a SIM, a phone number, etc.) may be moved from one device 100 to another device 100 (e.g., from device 100A to device 100B), whereas other credentials are permanently associated with a device 100 (e.g., an ESN, a device identifier, etc.). This document often refers to a credential as uniquely identifying the device 100 because even a credential that can be moved from one device 100 to another device 100 can uniquely identify a particular device 100 when the credential is installed in the particular device 100 (e.g., while a SIM card is in device 100, the SIM card uniquely identifies the particular device 100 because the SIM card can only be installed in one device 100 at a time).
In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan or service plan bundle includes information that identifies a user of device 100B. In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan includes information that identifies a user of device 100B or information that identifies a user of device 100A. In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan includes a credential that provides for unique identification of the master service account, device group, or multi-device service plan. In some embodiments, the credential also includes a secure service plan information aspect (e.g., a password, a personal identification number, etc.) known only to a subscriber of the master service account, device group, or multi-device service plan. In some embodiments, the credential comprises information associated with an aspect of an account that is associated with the master service account, device group, or multi-device service plan (e.g., an account number, etc.).
In some embodiments, device 100B includes a user interface, and the first device agent (e.g., Device Agent 9006B) initiates the request to add device 100B to the master service account, device group, or multi-device service plan based at least in part on a user input obtained through the user interface. In some embodiments, the user input includes: a credential that provides for unique identification of device 100B; information that provides for identification of a user of device 100B; information that provides for identification of a unique master service account, device group, or multi-device service plan; information that provides for identification of a user of a second device (e.g., a master device) associated with the master service account, device group, or multi-device service plan, such as Master Device 100A; information that provides for identification of an account associated with the master service account, device group, or multi-device service plan; or a combination of these.
In some embodiments, a device agent installed on a device 100 is configured to communicate a request to add another device to a master service account, device group, or multi-device service plan. In some embodiments, at least an aspect of the request is received from a network element, such as service controller 122 shown in
In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan includes a credential that provides for unique identification of device 100A, such as a subscriber identity module, a device identifier, a phone number, an IMSI, an MEID, or any other credential. In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan includes information that provides for identification of a user of device 100A (e.g., a subscriber). In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan includes a credential that provides for unique identification of device 100A, such as a subscriber identity module, a device identifier, a phone number, an IMSI, an MEID, or any other credential. In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan includes information that provides for identification of a user of device 100B. In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan includes a credential that provides for unique identification of device 100B. In some embodiments, the credential comprises a secure information aspect associated with device 100A. In some embodiments, the credential comprises a secure information aspect associated with device 100B. In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan includes information that identifies a user of device 100A. In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan includes information that identifies a user of device 100B.
In some embodiments, the request to add device 100B to the master service account, device group, or multi-device service plan includes a credential that provides for unique identification of the master service account, device group, or multi-device service plan. In some embodiments, the credential also includes a secure service plan information aspect known only to a subscriber of the master service account, device group, or multi-device service plan (e.g., a password, a personal identification number, etc.). In some embodiments, the credential comprises information associated with an aspect of an account that is associated with the master service account, device group, or multi-device service plan (e.g., an account number, etc.).
In some embodiments, device 100A includes a user interface, and a first device agent (e.g., Device Agent 9006A) initiates the request to add device 100B to the master service account, device group, or multi-device service plan based at least in part on a user input obtained through the user interface. In some embodiments, the user input includes information associated with at least one of: a credential that provides for unique identification of device 100A; a credential that provides for unique identification of device 100B; information that provides for identification of a user of device 100A; information that provides for identification of a user of device 100B; information that provides for identification of a unique master service account, device group, or multi-device service plan; and information that provides for identification of an account associated with the master service account, device group, or multi-device service plan.
In some embodiments, a first device agent (e.g., Device Agent 9006A) installed on device 100A is configured to communicate an acknowledgment to add device 100B to a master service account, device group, or multi-device service plan. In some embodiments, the acknowledgment comprises a permission or a request acceptance. In some embodiments, the acknowledgment is based on a user response to a message presented through a user interface of device 100A. In some embodiments, the device agent is configured to present the message. In some embodiments, the message includes information obtained from a network element. In some embodiments, the network element is a website, a web page, a wireless application protocol (WAP) site, a portal server, a message server, or an access network policy interface.
In some embodiments, the first device agent receives, from a network element, information associated with device 100B's request to share a service plan. In some embodiments, the first device agent presents a message based on the information associated with device 100B's request to share a service plan through a user interface of device 100A, obtains a user response, and generates the acknowledgment based on the user response. In some embodiments, the network element is a website, a web page, a wireless application protocol (WAP) site, a portal server, a message server, or an access network policy interface.
In some embodiments, the first device agent receives, from device 100B, information associated with another device's request to share a service plan. In some embodiments, the first device agent presents a message based on the information associated with the another device's request to share a service plan through a user interface of device 100A, obtains a user response, and generates the acknowledgment based on the user response.
In some embodiments, a first device agent (e.g., Device Agent 9006A) installed on device 100A is configured to communicate an acknowledgment to add device 100B to a master service account, device group, or multi-device service plan. In some embodiments, the acknowledgment comprises a permission or a request acceptance. In some embodiments, the first device agent assists in presenting a message through a user interface of device 100A, the message being configured to seek the acknowledgment. In some embodiments, the acknowledgment is configured to assist in enrolling device 100B in a master service account, device group, or multi-device service plan. In some embodiments, the message includes information obtained from a network element. In some embodiments, the network element is a website, a web page, a wireless application protocol (WAP) site, a portal server, a message server, or an access network policy interface.
In some embodiments, the first device agent receives, from a network element, information associated with device 100B's request to share a service plan. In some embodiments, the first device agent presents a message based on the information associated with the second device's request to share the service plan through a user interface of device 100A, obtains a user response, and generates the acknowledgment based on the user response. In some embodiments, the network element is a website, a web page, a wireless application protocol (WAP) site, a portal server, a message server, or an access network policy interface.
In some embodiments, the first device agent receives, from device 100B, information associated with another device's request to share a service plan. In some embodiments, the first device agent presents a message based on the information associated with the another device's request to share the service plan through a user interface of device 100A, obtains a user response, and generates the acknowledgment based on the user response.
In some embodiments, device 100B is not associated with a master service account, device group, or multi-device service plan. In some embodiments, a network element (e.g., service controller 122 shown in
In some embodiments, the network element configures the one or more network service policies to add device 100B to the master service account, device group, or multi-device service plan by provisioning a device service usage accounting system to identify service usage associated with device 100B and account the identified first device service usage to the master service account, device group, or multi-device service plan. In some embodiments, the network element configures the one or more network service policies to add device 100B to the master service account, device group, or multi-device service plan by provisioning a device access service policy system to identify attempted or successful network service activity associated with device 100B and to apply a set of one or more access control policies associated with the master service account, device group, or multi-device service plan to the identified attempted or successful network service activity associated with device 100B.
In some embodiments, the network element configures the one or more network service policies to add device 100B to the master service account, device group, or multi-device service plan by provisioning a device access service notification system to identify attempted or actual network service activity associated with device 100B and to apply a set of one or more access service notification policies associated with device 100B and to apply a set of one or more access service notification policies associated with the multi-device service plan to cause a multi-device service plan notification to be presented through device 100B's user interface.
In some embodiments, the aspect of the request that is communicated to a device agent (e.g., Device Agent 9006A) installed on device 100A comprises an indication that a user of device 100B desires to add device 100B to the master service account, device group, or multi-device service plan, and the aspect of the secure information associated with the request that is communicated from device 100A to the network element comprises an indication that a user of device 100A approves enrollment of device 100B in the master service account, device group, or multi-device service plan.
In some embodiments, device 100A includes a user interface, and a device agent (e.g., Device Agent 9006A) on device 100A presents a breakdown of usage of a shared or assigned service plan through the user interface. In some embodiments, the breakdown of service usage includes a first subset of a shared service plan and a second subset of the shared service plan. In some embodiments, the first subset is associated with device 100A, and the second subset is associated with a second device (e.g., device 100B). In some embodiments, neither of the first subset and the second subset is associated with device 100A. In some embodiments, the breakdown of service usage includes a characterization of the service activities that are generating service usage for the second subset. In some embodiments, the device agent is configured to accept user inputs to specify alert conditions for assisting in creating user interface alert messages when the service usage for the second subset of the shared device plan usage associated with the second device satisfies a condition. In some embodiments, the condition is based on an input from a user of device 100A. In some embodiments, the second subset includes a characterization of at least a portion of the device activities responsible for at least a portion of the service usage of device 100B. In some embodiments, the device agent on device 100A is configured to specify a policy limit on the service activities that are generating service usage for the second subset. In some embodiments, the policy limit specifies a limit on voice service usage. In some embodiments, the policy limit specifies a limit on data service usage. In some embodiments, the policy limit includes a limit on a subset of service activities less than all service activities available to device 100B. In some embodiments, the policy limit includes a limit on service usage while device 100B is roaming. In some embodiments, the policy limit includes a limit on cellular wireless services. In some embodiments, the policy limit includes a limit on Wi-Fi access.
In some embodiments, device 100A includes a user interface, and a device agent on device 100A (e.g., Device Agent 9006A) is configured to present, through the user interface, a message configured to present a service policy management option associated with device 100B's use of a shared or assigned service plan. In some embodiments, the message includes at least an aspect that is obtained from a network element. In some embodiments, the message includes at least an aspect that is stored locally on device 100A. In some embodiments, the network element is a website, a web page, a wireless application protocol (WAP) site, a portal server, a message server, or an access network policy interface. In some embodiments, the message is pushed to device 100A by a network element.
In some embodiments, the service policy management option is a service permission. In some embodiments, the service policy management option is a service allowance. In some embodiments, the device agent on device 100A assists in obtaining, through the user interface, a user input indicating that a user of device 100A desires to implement the presented service policy management option. In some embodiments, the device agent on device 100A assists in causing the service policy management option to be implemented to govern, at least in part, one or more service policies of device 100B. In some embodiments, the device agent on device 100A assists in causing the service policy management option to be implemented by providing information to a network element configured to implement the service policy management option. In some embodiments, the device agent on device 100A assists in causing the service policy management option to be implemented by providing information to a device agent (e.g., Device Agent 9006B) installed on device 100B, the device agent on device 100B being configured to implement the service policy management option. In some embodiments, the device agent on device 100A assists in causing the service policy management option to be implemented by communicating information that causes a device agent (e.g., Device Agent 9006A) on device 100B to implement the service policy management option.
In some embodiments, the service policy management option comprises an indication or acknowledgment that device 100B is authorized to use wireless access services in accordance with access service policies associated with the master service account, device group, or multi-device service plan.
In some embodiments, the service policy management option comprises an indication or acknowledgment that device 100B is authorized to use less than all of a total service allowance provided for under the service policies associated with a multi-device (e.g., shared, shareable, assignable, or assigned) service plan. In some embodiments, the less than all of the total service allowance is less than the entire allowance provided for under the service policies associated with the multi-device service plan. In some embodiments, the less than all of the total service allowance specifies a service usage limit. In some embodiments, the limit is expressed as a percentage. In some embodiments, the limit is expressed as an amount of a resource. In some embodiments, the less than all of the total service allowance specifies an allowance for a set of one or more service activities, the set of one or more device service activities being less than all service activities available to device 100B. In some embodiments, the less than all of the total service allowance specifies a time period during which device 100B is authorized for one or more services. In some embodiments, the less than all of the total service allowance specifies a time period during which device 100B is authorized for a set of one or more service activities less than all service activities available to device 100B. In some embodiments, the set of one or more service activities includes one or more emergency services (e.g., the ability to place an outgoing call to an emergency number, the ability to send an outgoing text to a specified emergency number, etc., where the emergency number is not necessarily a public services emergency number but could instead be a number associated with a parent or another trusted entity). In some embodiments, the set of one or more service activities includes communication with a subset of devices, the subset of devices less than all devices that device 100B is capable of communicating with. In some embodiments, the less than all of the total service allowance is network-dependent (e.g., there is one allowance when device 100B is communicating over a cellular network and another, potentially different, allowance when device 100B is communicating over a Wi-Fi network, or there is one allowance when device 100B is communicating over a roaming network and another, potentially different, allowance when device 100B is communicating over a home network, etc.). In some embodiments, the less than all of the total service allowance is associated with service policies that apply to more than one wireless network (e.g., the service policies apply whether device 100B is connected to a roaming network or a home network, or the service policies apply whether device 100B is connected to a cellular network or a Wi-Fi network, etc.).
In some embodiments, the less than all of the total service allowance specifies a time period during which device 100B is to be de-authorized for service. In some embodiments, one or more service policies governing service usage in the de-authorized state provide for access to one or more emergency services (e.g., the ability to place an outgoing call to an emergency number, the ability to send an outgoing text to a specified emergency number, etc., where the emergency number is not necessarily a public services emergency number but could instead be a number associated with a parent or another trusted entity) while device 100B is in the de-authorized state. In some embodiments, one or more service policies governing service usage in the de-authorized state provide for communication with a subset of devices while device 100B is in the de-authorized state, the subset of devices being less than all devices device 100B is capable of communicating with (e.g., device 100B may communicate with a first parent's device but not with a sibling's device). In some embodiments, the one or more service policies governing service usage in the de-authorized state are network-dependent (e.g., the service policies in effect when device 100B is connected to a roaming network are different from the service policies in effect when device 100B is connected to a home network, or the service policies in effect when device 100B is connected to a cellular network are different from the service policies in effect when device 100B is connected to a Wi-Fi network, etc.). In some embodiments, the one or more service policies governing service usage in the de-authorized state apply to more than one wireless network (e.g., the service policies apply whether device 100B is connected to a roaming network or a home network, or the service policies apply whether device 100B is connected to a cellular network or a Wi-Fi network, etc.).
In some embodiments, the less than all of the total service allowance specifies a time period during which device 100B is to be de-authorized for a set of one or more service activities, the set of one or more service activities less than all service activities available to device 100B (e.g., in the de-authorized state, device 100B may make phone calls to one or more numbers (e.g., an emergency number), but device 100B may not stream video or use one or more applications or access one or more network destinations).
In some embodiments, the less than all of the total service allowance includes a first service allowance and a second service allowance, the first service allowance providing information to govern an aspect of a service policy for a first set of one or more service activities, the first set of service activities less than all service activities available to device 100B, and the second service allowance providing information to govern an aspect of a service policy for a second set of one or more service activities. In some embodiments, the first service allowance allows one or more services associated with the first set of one or more service activities, and the second service allowance blocks one or more services associated with the second set of one or more service activities.
In some embodiments, the policy management option comprises a policy setting. In some embodiments, the policy setting is applicable to more than one wireless network that device 100B is capable of connecting to (e.g., the policy setting applies whether device 100B is connected to a cellular network or a Wi-Fi network). In some embodiments, the policy setting has at least an aspect that changes depending on the type of network device 100B is connected to (e.g., the policy setting has a first aspect when device 100B is connected to a cellular network and a second aspect when device 100B is connected to a Wi-Fi network, or the policy setting has a first aspect when device 100B is connected to a roaming network and a second aspect when device 100B is connected to a home network, etc.).
In some embodiments, the device agent on device 100A (e.g., Device Agent 9006A) is configured to receive a message indicating a service condition exists for device 100V. In some embodiments, the service condition is an “out of allowance” condition (e.g., device 100B has exhausted a usage allowance, etc.). In some embodiments, the service condition is an indication that a particular amount or percentage of service usage has occurred. In some embodiments, the service condition is an indication that a particular service activity that is not allowed under the current service policy settings for device 100B has been attempted by device 100B. In some embodiments, the service condition is an indication that a user of device 100B desires a particular service activity that is not allowed under the current service policy settings for device 100B. In some embodiments, device 100A includes a user interface, and the device agent on device 100A is configured to present, through the user interface, a service-condition notification including information about the service condition. In some embodiments, device 100A includes a user interface, and the device agent is configured to present, through the user interface, an option to modify a service policy associated with device 100B in response to the service-condition notification.
In some embodiments, the multi-device (e.g., shared or assigned) service plan comprises a set of one or more service policies that govern at least an aspect of wireless network access permissions for one or more wireless access networks, and wherein the set of one or more service policies is capable of supporting wireless access services for a plurality of wireless devices.
In some embodiments, a network system is configured to provide a user interface to a service account owner or a manager of a master service account, device group, or multi-device service plan, wherein the user interface presents a user option to include a device in the master service account, device group, or multi-device service plan, the device not having been included in the master service account, device group, or multi-device service plan when the device was initially purchased or activated. In some embodiments, the network system accepts a user input comprising an instruction to add the device to the master service account, device group, or multi-device service plan. In some embodiments, the network system determines whether the device is already associated with a pre-existing service plan provided by a particular mobile operator. In some embodiments, if the device is associated with a pre-existing service plan provided by the particular mobile operator, the network system provisions the device to be de-activated from the pre-existing service plan and added to the master service account, device group, or multi-device service plan. In some embodiments, if the device is not associated with a pre-existing service plan provided by the particular mobile operator, the network system determines if the device requires a number port (e.g., the transfer of a phone number). In some embodiments, if the device is not associated with a pre-existing service plan provided by the particular mobile operator, and the device requires a number port, the network system communicates the number porting requirement to a number porting system queue in the network. In some embodiments, if the device is not associated with a pre-existing service plan provided by the particular mobile operator, and the device does not require a number port, the network system provisions the device to be added to the master service account, device group, or multi-device service plan.
In some embodiments, the network system user interface is provided by a network element. In some embodiments, the network element is a website, a web page, a wireless application protocol (WAP) site, a portal server, a message server, or an access network policy interface. In some embodiments, the user interface is provided by communicating a user interface message to a device agent located on a device (e.g., a master device). In some embodiments, the device agent is on a device belonging to an account owner or account master for the master service account, device group, or multi-device service plan. In some embodiments, the device accepts a user input. In some embodiments accepting the user input comprises accepting a user secure credential to authenticate the account owner or account master identity. In some embodiments, the device belongs to a user who wishes to add the device to a master service account, device group, or multi-device service plan, and accepting a user input comprises accepting a user secure credential to authenticate that the device user has the permission of the multi-device service account owner or master to add the device to the master service account, device group, or multi-device service plan. In some embodiments, accepting a user input includes accepting a user secure credential to authenticate the account owner or account master identity.
Next, this document describes several embodiments that allow a subscriber to establish a master service account and to manage the service plans and devices associated with the master service account.
Establishing a Master Service Account
In some embodiments, a subscriber can acquire a device and establish a master service account through the device user interface (e.g., a touch screen) or through, for example, a website.
In some embodiments, service controller 122 is also communicatively coupled to service design center 135. In some embodiments, service design center 135 allows a service provider or a service provider partner entity, through service provider/third-party interface 145, to configure service plan and service plan bundle offerings for distribution to devices such as device 100. In some embodiments, service design center 135 allows a service provider or a service provider partner entity to configure the messages, information, and screens as illustrated by multiple figures provided herein.
When a subscriber selects the “Account” partition 2801 in
In the example of
Although
Adding Devices to Master Service Account
Having used one device, hereinafter referred to as the “master device” (“Jeff Master” in
In accordance with some embodiments,
In addition to establishing multiple master devices and permissions associated with each master device, the subscriber can establish permission privileges for added (e.g., child) devices.
Sharing Service Plans
Having added another device to the master service account, the subscriber can manage all devices in the device group and can share one or more service plans among devices in the device group. The subscriber can also assign a service plan from a master device to a child device. In some embodiments, service plans are designed to be shareable, assignable (see below), or not shareable. In some embodiments, service plans are designed using a service design center, e.g., service design center 135 illustrated in
In some embodiments, the subscriber can view information about shared service plans and can share service plans by selecting “Plans & Sharing” from the screen shown in
Rather than simply sharing a service plan among multiple devices, which may not prevent “hogging” of the allocation provided by the service plan by individual devices, it may be desirable to allocate discrete portions of a service plan to different devices within the device group. For example, a parent who has purchased a service plan that includes 500 voice minutes and 100 text messages per month might want to allocate 100 of the voice minutes and 40 text messages to each of her two children's mobile phones.
As would be appreciated by a person having ordinary skill in the art, there are many ways a service plan could be shared among devices. For example, the subscriber could allocate a certain percentage or amount (e.g., number of minutes, number of texts, number of bytes, etc.) of a service plan to each device associated with the master service account such that the sum of all individual allocations is equal to the total allowed by the service plan. As would also be appreciated by a person having ordinary skill in the art, the subscriber may choose to share different service plans differently among devices in the device group. Similarly, when the subscriber has purchased a service plan bundle, such as “Starter Plan,” the subscriber may choose to share constituent service plans of the service plan bundle differently (e.g., a parent may choose to share 80% of the text messages but only 50% of the voice minutes with a child), or she may choose to share all service plans included in a service plan bundle in the same way (e.g., a parent may allow a child to use up to 50% of each service plan included in the service plan bundle.)
In some embodiments, the subscriber chooses to place limits on a service usage amount (e.g., impose a cap or specify an allocation) that can be consumed by a particular device in the device group, e.g., by entering a specific service usage limit using the master device or by using another device and providing a credential that indicates that the subscriber has permission to set service usage limits. By providing a limit for a service usage amount, the subscriber can prevent the particular device from “hogging” the service plan. In some embodiments, the particular device that is limited is the master device. In some embodiments, the particular device that is limited is a child device in a device group shared with the master device (i.e., of which the master device is also a member). In some embodiments, the particular device is another device in a device group shared with the master device. In some embodiments, the particular device is a device managed by a system administrator.
In some embodiments, the subscriber specifies a “micro-lease” allocation, wherein a device (master or child) is provided an allocation of service usage, and the device subsequently requests an additional allocation after the initial allocation is exhausted.
In some embodiments, the master device monitors usage by devices in the device group and changes one or more plan-sharing parameters based on the monitored usage. In some embodiments, the master device revokes an allocation when the master device determines that the allocation is not being used, or when the master device determines that another device has a greater need for the allocation. In some embodiments, the master device changes an allocation (i.e., increases or decreases an allocation) based on a metric. In some embodiments, the metric is an amount of usage (or a failure to use a service plan) during a time period. In some embodiments, the metric is an expected usage during a time period. In some embodiments, the metric is based on service plan usage by one or more other devices in the device group. In some embodiments, the master device reapportions a service plan or an allocation of a service plan to one or more devices based on a determination that the reapportionment will reduce waste of the service plan.
In some embodiments, the subscriber specifies one or more parameters to assist the master device in managing plan sharing. In some embodiments, the master device manages plan sharing without subscriber involvement.
In some embodiments, the subscriber allocates a maximum amount of a service plan for a period of time and establishes a “metering” of the total during a sequence of time periods (e.g., a total of 100 text messages during a month and no more than 25 text messages per week). In some embodiments, the subscriber allocates an initial allocation to a child device and then allocates an additional allocation (e.g., a smaller allocation) when the child device exhausts the initial allocation.
In the examples provided herein, none of the “Starter Plan” service plan bundle had been consumed when the subscriber shared the service plan bundle with another device. In some embodiments, had a portion of the service plan bundle been consumed prior to sharing, the subscriber would only be able to share what service usage allocation remained of the service plan bundle. In some embodiments, each service plan within a service plan bundle can be shared individually.
Assigning Service Plans
In some embodiments, a subscriber may want to allocate the entirety of a service plan to a child device, leaving none of the service plan available to the master device. For example, a parent might purchase a service plan that is of great interest to her child but of no interest to the parent. In some embodiments, therefore, a subscriber may assign a service plan from one device in the device group to another device in the device group. In some embodiments, a service plan must be assignable to be assigned. In some embodiments, whether a service plan is assignable is configured using a service design center. In some embodiments, a service plan has an attribute that determines whether it is assignable. In some embodiments, a service plan is assignable but not shareable. In some embodiments, a service plan is shareable but not assignable. In some embodiments, a service plan is both shareable and assignable. In some embodiments, a service plan is neither shareable nor assignable. In some embodiments, one or more permission policies that can apply to a shared service plan can also apply to an assigned service plan.
As would be appreciated by a person having ordinary skill in the art, there are many different examples, combinations, and permutations of shared service usage displays, and the examples presented herein are meant to be illustrative and not intended to be limiting.
Although
As will be appreciated by a person having ordinary skill in the art in light of the disclosures herein, a difference between a subscriber assigning a service plan to one or more devices and the subscriber sharing the service plan is that, in some embodiments, a shared service plan remains visible on the master device as a service plan that is available to the master device, whereas an assigned service plan does not remain visible on the master device as a service plan that is available to the master device.
It should now be apparent to a person having ordinary skill in the art that there are many unique and interesting ways that a subscriber can share and assign service plans, and the examples herein are not intended to be limiting.
Monitoring Usage and Transactions
In addition to adding devices to the master service account, sharing service plans, and assigning service plans, subscribers may track usage and access usage history by selecting “Usage” from the display 2806 shown in
The subscriber may track usage for all devices or for just the master device from the master device by selecting “Usage” from the screen 850 illustrated in
In addition to viewing information about service usage, in some embodiments, the subscriber can access information about transactions.
In some embodiments, a child device sends a message to a master device when a usage allocation is exhausted (e.g., when the child device has exhausted its share of a service plan) or when a particular milestone is met (e.g., when the child device has only two minutes of talk time left). In some embodiments, the child device sends a message to a master device, and the master device presents a notification to the subscriber to provide information about the service usage event on the child device. In some embodiments, the master device suggests a solution to the service usage event, such as by presenting an offer to the subscriber, such as an offer to purchase an additional service plan or an offer to assist the subscriber in modifying the parameters of a shared service plan.
In some embodiments, a child device sends a message to a master device when a user of the child device has attempted an unauthorized service usage. For example, in some embodiments, if a user of a child device attempts to send a text message, but the child device does not have an allocation of text messages, the child device sends a message to the master device to report that the child device attempted to send a text message. In some embodiments, the child device sends a message about an attempted unauthorized service usage to the master device without interaction with or input from a user of the child device. In some embodiments, the master device presents an offer to the subscriber, such as an offer to purchase an additional service plan or an offer to assist the subscriber in modifying the parameters of a shared service plan.
In some embodiments, the child device presents a notification through its user interface when a user of the child device attempts an unauthorized service usage. In some embodiments, a user of a child device subject to an allocation (e.g., a maximum number of text messages) who exhausts the allocation can send a message to one or more master devices to request an additional allocation. In some embodiments, the child device assists a user of the child device in requesting a service plan or additional resources from the subscriber.
In some embodiments, a subscriber can access the master service account from a device that is not a master device, but is associated with the master service account, by logging into the master service account (e.g., through a screen such as the representative screen 2805 illustrated in
In some embodiments, a subscriber can give, as a gift, a service plan or a portion of a service plan to a device 100 that is not within the device group but that is capable of receiving the gift. For example, in some embodiments, a subscriber can give a service plan or a portion of a service plan to a device outside a first device group but within a second device group.
In some embodiments, a user of child device with no purchase capability can, from the child device, request that the master device grant the child device access to a service. For example, in some embodiments, when a user of a child device attempts to use or access a service that is not authorized, the child device will present a notification that indicates the child device is not authorized for the service. In some embodiments, the notification facilitates the child device requesting access from the master device (e.g., the notification includes a button called “Request Access From Master”). In some embodiments, the master device receives the request and presents a notification through the master device's user interface, thus allowing the subscriber to grant or deny access to the requested service. In some embodiments, the master device sends a message to the child device indicating whether the request was granted or denied. In some embodiments, after receiving the message from the master device, the child device presents a notification through a user interface to indicate whether the request was granted or denied.
On-Device Multi-Device Service Sign-Up
In some embodiments, the master device subscriber initiates the linking process. In some embodiments, the master device subscriber (e.g., via a Device Agent 9006A) requests a one-time token from Sign-Up Request Processor 9002 (labeled 4600A in
At 4600F, Device Agent 9006B sends the entered token information plus its (e.g., device, user, etc.) credential (e.g., 2nd credential shown in
In some embodiments, Sign-Up Request Processor 9002 does not send the token back to Master Device 100A, but instead sends it directly to Secondary Device 100B to enable the secondary device subscriber to accept the “invitation” to be added to the shared plan. In this embodiment, when the secondary device subscriber accepts the invitation, the token is sent back to Sign-Up Request Processor 9002 as described above, and the provisioning process occurs.
In some embodiments, the master device subscriber initiates the share request from a website. In this embodiment, the process is similar to the process where the share request is initiated from Master Device 100A. In this embodiment, the master device subscriber logs into a secure website or portal and enters the necessary information to initiate the sharing request (e.g., his account number, user credential, device credential, etc.) and the request is then processed in the same manner as if the request originated from Master Device 100A.
In some embodiments, the token is a PIN and the PIN is delivered out-of-band to the secondary device subscriber (e.g., via SMS, email message, etc.). In some embodiments, the secondary device subscriber calls an Interactive Voice Recognition (IVR) system and enters the PIN. The IVR obtains the PIN (e.g., through DTMF tones or through voice-to-text processing) and delivers it to Sign-Up Request Processor 9002. From there, the process continues as if the request were handled by Device Agent 9006B on Secondary Device 100B.
In some embodiments, the token is a PIN and the PIN is delivered out-of-band to the secondary device subscriber (e.g., via SMS, email message, etc.). In some embodiments, an IVR system automatically calls the secondary device subscriber (at a phone number specified by the Master device subscriber in the share request or on the secondary device itself, etc.). The secondary device subscriber then enters the PIN (e.g., using DTM voice-to-text processing) on the IVR and the IVR delivers the PIN to Sign-Up Request Processor 9002. From there, the process continues as if the request were handled by Device Agent 9006B on Secondary Device 100B.
In some embodiments, Master Device 100A is a first device that has a master device credential provisioned into a network access service permission system by Subscriber Management System 9004 to provide for Master Device 100A to access network services in accordance with a multi-device service plan, and Secondary Device 100B is a second device that has a secondary device credential provisioned into the network access service permission system by Subscriber Management System 9004 to provide for secondary device access network services in accordance with a multi-device service plan.
In some embodiments, the master device credential is provisioned into the network access service permission system before the secondary device credential is provisioned into the network access service permission system. In some embodiments, the secondary device credential is provisioned into the network access service permission system before the master device credential is provisioned into the network access service permission system. In some embodiments, the secondary device credential and the master device credential are provisioned at the same time into the network access service permission system.
In some embodiments, Sign-Up Request Processor 9002 is located in the carrier network. In some embodiments, Sign-Up Request Processor 9002 is located in a third-party provider network (e.g., device OEM, VSP, MVNO, device OS provider, Voice over IP (VoIP) provider, etc.).
The system illustrated in
In some embodiments, at 4700A, the secondary device subscriber (via Device Agent 9006B) sends a request to Sign-Up Request Processor 9002 requesting to add Secondary Device 100B a device to the Master Device's master service account, device group, or multi-device service plan. The request includes Secondary Device 100B's credential and/or the user's credential (e.g., MEID, IMEI, IMSI, MSID, phone number, account number, etc.) and a credential for Master Device 100A's account (e.g., MEID, IMEI, phone number, IMSI, MSID, account number, etc.). (The secondary device and/or user's credential is labeled as “2nd credential” in
At 4900A, the master device subscriber enters his credentials on Secondary Device 100B (via Device Agent 9006B). (The master device subscriber credentials are labeled “1st credential” in
In some embodiments, Sign-Up Request Processor 9002 is located in the carrier network. In other embodiments, Sign-Up Request Processor 9002 is located in a third-party provider network (e.g., device OEM, VSP, MVNO, device OS provider, VoIP provider, etc.).
At 5100A, the master device subscriber enters a secondary device credential (e.g., IMSI, MSID, IMEI, MEID, phone number, etc.) (via Device Agent 9006A). (The secondary device credential is labeled “2nd credential” in
In some embodiments, prior to sending the “add” request to Subscriber Management System 9004 at 5100D, Sign-Up Request Processor 9002 may send a validation request to Secondary Device 100B (via Device Agent 9006B) or the secondary device subscriber to confirm the change and wait for the response before performing the “add” action. In some embodiments, the request is an SMS, a call from an IVR system, an email, a notification on Secondary Device 100B (via Device Agent 9006B), etc.
In some embodiments, the master device subscriber adds Secondary Device 100B to the master device subscriber's shared plan prior to Secondary Device 100B being activated. In some embodiments, the master device subscriber adds Secondary Device 100B to the master device subscriber's shared plan at the time that Secondary Device 100B is being provisioned or activated.
In some embodiments, where Secondary Device 100B is added to the master service account, device group, or multi-device service plan prior or during the activation process, Sign-Up Request Processor 9002 delivers a notification to the secondary device subscriber indicating that the device has been associated with the master service account, device group, or multi-device service plan. In some embodiments, the notification is delivered to Device Agent 9006B for presentation through a user interface of Secondary Device 100B. In some embodiments, the notification is delivered as an SMS, MMS, voice message (either live or IVR), or email. In some embodiments, the notification requires the secondary device subscriber to acknowledge the notification prior to associating Secondary Device 100B with the master service account, device group, or multi-device service plan. In some embodiments, the secondary device subscriber is automatically associated with the master service account, device group, or multi-device service plan without the secondary device subscriber having to confirm the notification.
In some embodiments, Sign-Up Request Processor 9002 is located in the carrier network. In other embodiments, it is located in a third-party provider network (e.g., device OEM, VSP, MVNO, device OS provider, VoIP provider, etc.).
Service Plan Sharing with Allowance Limits
In some embodiments in which a service plan is shared, the master device subscriber may wish to only share a portion of the total service plan with a secondary device subscriber. In some embodiments, the sharing process includes a step where the master device subscriber defines what portion or portions of the service plan (voice service plan, messaging service plan, data access service plan, etc.) are to be shared with the secondary device subscriber. In some embodiments, the portions represent a set of services less than all of the services offered by the service plan to be shared. In some embodiments, the portions are represented by imitations expressed in voice minutes, long distance minutes, international calling destinations, international calling minutes, number of text messages, number of MIMS messages, access to specific data services (e.g., website, domain, content type (e.g., streaming audio, streaming video, VoIP, etc.), quality-of-service (QoS) rated services, protocol type, general data access in time or usage (e.g., megabytes, kilobytes, etc.), application usage, content downloads, content uploads, 3G access, 4G access, Wi-Fi access, etc.), time periods (e.g., days of the week, specific hours in a day, or total hours in a day, total hours in a week, total days in a month, etc.), or other units that are applicable to the shared portion of the service plan. In some embodiments, the portions can be expressed as percentage of the service plans' service usage allowance for a category of service (e.g., 5% of the voice minute allowance, 20% of the data allowance, etc.) or absolute values (e.g., 20 minutes of voice, 100 messages, 5 MB of data, 5 hours of data use, 1 hour of VoIP calling, 30 minutes of media streaming, etc.). In some embodiments, the sharing limits are set up with the initial offer to share. In some embodiments, the sharing limits are set up after the plan has been shared with Secondary Device 100B. In some embodiments, in which sharing limits are set up with the initial offer to share, the sharing attributes may be stored in database 9000 and associated with the sharing token. When the secondary device subscriber is provisioned onto the sharing plan, the sharing attributes are also communicated to Subscriber Management System 9004 along with the “add” request.
In some embodiments, the master device subscriber may purchase an add-on service plan for the secondary device subscriber and allocate (e.g., assign) the entire add-on service plan to the secondary device subscriber (e.g., the secondary device subscriber gets an add-on service plan that provides additional service usage quota for a service that the secondary device subscriber uses more frequently than other users (e.g., an application-specific (e.g., Facebook, email, etc.) service plan, an additional allocation of voice minutes or text messages, etc.). In some embodiments, the master device subscriber adds certain capabilities (that might be offered at a discount) to certain users so that those users do not consume the quotas of the shared service plan while using these activities. For example, a master device subscriber might share a non-streaming data plan with a secondary device subscriber, but the secondary device subscriber desires to stream data (e.g., by watching a video, listening to streaming audio, video conferencing, etc.). The master device subscriber may purchase an audio/video streaming-capable service plan and assign that service plan to Secondary Device 100B, but not to other devices. This allows the secondary device subscriber to stream data without the master device subscriber having to purchase a larger streaming capable plan.
Sharing with Curfews
In some embodiments in which a service plan is shared, the master device subscriber may wish to set curfews (e.g., no messaging between 10:00 PM and 6:00 AM, email data access only during school hours, no voice calls except certain numbers during the school day (e.g., numbers on a “whitelist”), no international long distance calls, etc.) associated with Secondary Device 100B (which may be a child device) as part of the sharing process. In some embodiments, these curfews provide limits on usage of certain aspects of the shared portion of the service plan and thus provide for further control of service plan sharing. In some embodiments, the service plan sharing process includes a step where the master device subscriber defines the curfews on the portion or portions of a service plan (voice service plan, messaging service plan, data access service plan, etc.) that are to be shared with Secondary Device 100B. The curfews can be expressed as limits on certain aspects of the service plan during certain time periods (e.g., no text messaging from 10:00 PM until 6:00 AM Monday-Friday, only allow voice calls to a certain set of numbers during school hours, no Hulu videos after 8:00 PM, etc.), maximum usage of an aspect of a service plan during a time period (e.g., maximum of 30 minutes of voice calling per day on weekdays, maximum of 20 MB of Facebook during school hours, no text messaging on Mondays, etc.). In some embodiments, the curfews restrict certain types of access during a specified interval. In some embodiments, the curfews limit certain types of access during a specified interval. In some embodiments, the curfews are set up with the initial offer to share. In some embodiments, the curfews are set up after the secondary device subscriber has been joined to a shared service plan. In some embodiments in which the curfews are set up with the initial offer to share, the curfew attributes are stored in database 9000 and associated with the sharing token. When the secondary device subscriber is provisioned onto a shared service plan, the curfew attributes are communicated to Subscriber Management System 9004 along with the “add” request. In some embodiments, curfews are combined with sharing limits (e.g., 100 MB of data usage during the service plan cycle and no data usage allowed during school hours, etc.).
User Establishing Quotas/Curfews/Limitations on Service Usage
In some embodiments, a user may want to set quotas, curfews or limitations on his own service usage. One motivation for doing this may be cost-related (e.g., a user wants to ensure a service plan allowance is not exhausted before the end of the service plan cycle, a user wants to prevent overages, a user's company subsidizes only a certain percentage of service plan usage and the user does not want to exhaust his portion of the allowance, etc.), but there may be other reasons. In some embodiments, the notification enables the secondary subscriber to request additional service from the master subscriber when the notification is triggered. In some embodiments, the notification enables an automatic purchase (or re-purchase) of a specified service plan. In some embodiments, the automatic purchase of a service plan also delivers a notification to the master subscriber. In some embodiments, the notification that is delivered to the master subscriber is delivered via email, SMS, MMS, a message on Master Device 100A (e.g., through Device Agent 9006A), a message on a portal, or a message on a website. In some embodiments, the user interacts with Device Agent 9006A on his device to set the desired service controls. Device Agent 9006A communicates the service limits to Subscriber Management System 9004 (either directly or via an intermediate element), and Subscriber Management System 9004 provisions the controls to the appropriate enforcement elements. In some embodiments, the control elements are network elements (e.g., policy controller, policy charging and rules function (PCRF), policy charging enforcement function (PCEF), etc.). In some embodiments, the control elements are device-based agents/elements. In some embodiments, the control agents/elements exist both in the network and on the device.
Notifications
In some embodiments, the master device subscriber may desire to set up notifications for secondary users to alert them when they are reaching plan allowances, their individual quota allowances, plan time elapsed or remaining, usage velocity (e.g., rate of service usage), etc. In these types of embodiments, the master device subscriber can, from his device or from an alternative device (e.g., a Secondary Device 100B, another device associated with the master service account, device group, or multi-device service plan, a website visited from a computer or tablet, etc.), set up these notifications. In some embodiments, the notifications can also include actions or offers to modify an aspect of service usage (e.g., turn off or block certain services because an allocated quota is running out, or because a service is expensive while roaming, etc.). In other embodiments, the notifications can include an action to also inform the master device subscriber of a secondary device subscriber's activity within the service. In some embodiments, this alert to the master device subscriber can also include a request from the secondary device subscriber to increase the secondary device subscriber's quota allocation, to purchase additional service and assign an additional allocation to the secondary device subscriber, to re-allocate other users' quotas on the service to this particular secondary subscriber, etc. In some embodiments, these notifications can be initiated because a particular secondary user is not using much of his allocated quota, and the notification is sent to the master device subscriber to inform the master device subscriber of the condition and allow the master device subscriber to reallocate the quota as the master device subscriber deems appropriate (e.g., the subscriber may give more service allocation to a different user (including himself) since the particular secondary device subscriber is not going to use his allocation based on current usage velocity (e.g., the average rate of data consumption over a period of time (e.g., one hour, one day, one week, etc.)) trends).
In some embodiments, the master device subscriber uses an application (e.g., application locally on Master Device 100A, a website from a computer, an application on Secondary Device 100B, etc.) to configure the notifications. In some embodiments, the master device subscriber enters a login credential, an account number, a phone number, etc., to identify him as someone who is authorized to make changes to the account. Once logged in, the master device subscriber interacts with the application to set up the desired notifications for the specific secondary device subscriber (or users). In some embodiments, the notifications are configured to be the same for all secondary device subscribers. In some embodiments, the notifications are specific to each secondary device subscriber. In some embodiments, the notifications are specific to a subset of secondary device subscribers. For example, in an enterprise scenario, there may be groups of users based on their position or function within the enterprise (e.g., sales, executive, field service, etc.). Each group of users may have different sets on notifications configured by the master device subscriber because each group of users may have different aspects of a service plan shared with them. For example, a sales group and a field service group may have a larger allocation of service usage for maps and navigation services, and there could be notifications for service usage within that particular allocation for those groups, so they know if they are running out of that type of service. In a family share scenario, the children might have limited access to a social networking application during school hours (e.g., 10 MB, 30 minutes, etc.), and the master device subscriber sets a notification to notify the child when she is reaching her daily limit. In some embodiments, the notification that is configured is delivered to the specific user of the service (e.g., the child, etc.). In some embodiments, the notification is delivered to the master device subscriber. In some embodiments, the notification is delivered to both the master device subscriber and the specific user of the service. Once the notifications are configured, they are sent to Subscriber Management System 9004. Subscriber Management System 9004 provisions the notification type, parameters, text, actions, etc. to the various elements that are responsible for implementing the notification policy. In some embodiments, the elements are network-based elements (e.g., OCS, PCRF, PCEF, notification element, etc.). In some embodiments, the elements are device-based agents (e.g., agents for local usage counting, local classification and policy management, local notification agent, etc.). In some embodiments, the elements are located in both the network and the device (e.g., accounting and policy control in the network, notification agent on the device, etc.). Once the elements are provisioned, the notification policy is associated with the appropriate subscribers (e.g., the one or more secondary device subscribers) and enabled when the subscriber is actively using the services.
As discussed previously, in some embodiments, the notification is actionable by either the secondary device subscriber or the master device subscriber. For example, in an enterprise scenario, when the user is reaching the limit of an enterprise-paid service, the notification can include an option for the secondary device subscriber to purchase additional service just for him (e.g., not shared with other users). In some embodiments, the notification action is to alert the master device subscriber so he can take action (e.g., purchase additional shared service, purchase service just for that user, reallocate usage quotas, etc.). In some embodiments, the notification to the master device subscriber includes an option to purchase additional service. In some embodiments, the additional service includes shared service (e.g., additional usage for all subscribers on the shared account). In some embodiments, the additional service is specifically for the subscriber whose usage profile generated the notification. In some embodiments, the additional service is for a specific subset of subscribers on the shared service plan. In some embodiments, the master device subscriber has the option to decline the additional service offer. In some embodiments, the action taken by the master device subscriber (e.g., additional service purchased, no additional service purchased, etc.) is communicated to the secondary Device subscriber. In some embodiments, the communication is via email, SMS, MMS, a message delivered to Device Agent 9006B on Secondary Device 100B, a message displayed on a portal, or a message displayed on a website.
In some embodiments, the system is configured to detect when Device Agent 9006B on Secondary Device 100B has been tampered with. In some embodiments, tampering includes removal of Device Agent 9006B, modification of Device Agent 9006B, or modification of the configuration data used by Device Agent 9006B. In some embodiments, this is achieved by detecting that Device Agent 9006B on Secondary Device 100B has not sent a heartbeat message (e.g., a message configured to inform a network element that the device agent is present and operating properly, where such messages are possibly sent periodically or upon request by the network element) to Sign-Up Request Processor 9002 (or other monitoring network element) or to Device Agent 9006A on Master Device 100A in the configured time interval. In some embodiments, the detection is achieved by inspecting traffic to or from Secondary Device 100B and determining if the inspected traffic conforms to the controls that are expected to be enforced (e.g., whether there is data usage when data curfews are in place, whether there is a voice call to a non-whitelisted number when a voice curfew is in place, etc.). In some embodiments, detecting tampering is achieved by verifying a credential of Device Agent 9006B, a software signing key, a software hash, a software configuration integrity, a software configuration hash, an operating system (OS) credential, an OS software hash, or an OS signing key. In some embodiments, the detection occurs on Secondary Device 100B. In some embodiments, the detection occurs on Master Device 100A. In some embodiments, the detection occurs in the network. In some embodiments, the detection is performed by two or more elements (e.g., missing heartbeat message between Secondary Device 100B and a network element). In some embodiments, when it has been detected that tampering has occurred on Secondary Device 100B, a notification is sent to the master device user. In some embodiments, the notification is delivered directly to Master Device 100A via, for example, SMS, Device Agent 9006B notification, email or IVR phone call. In some embodiments, the notification also includes an alert sound to bring immediate attention to the notification. In some embodiments, the notification is displayed on top of all other UI elements on the master device. In some embodiments, the notification is delivered to other account entities in addition to the master device subscriber or Master Device 100A. In some embodiments, the notification is delivered to multiple account entities.
In some embodiments, the master device credential is provisioned into the network access service permission system to provide a master device user with a higher level of control over multi-device service plan configuration, and the secondary device credential is provisioned into the network access service permission system to provide a secondary device user with a lesser degree of control over multi-device service plan configuration. In some embodiments, the secondary device credential is provisioned into the network access service permission system to provide a secondary device user with a higher level of control over multi-device service plan configuration, and the master device credential is provisioned into the network access service permission system to provide a master device user with a lesser degree of control over multi-device service plan configuration. In some embodiments, the master device credential and the secondary device credential are provisioned into the network access service permission system to provide the same degree of control over multi-device service plan configuration to a user of Master Device 100A and a user of Secondary Device 100B.
In some embodiments, the control over multi-device service plan configuration comprises the ability to approve or initiate purchasing, upgrading, downgrading or discontinuing a service plan or a multi-device service plan. In some embodiments, the control over multi-device service plan configuration comprises the ability to approve or initiate adding or deleting one or more devices associated with the master service account, device group, or multi-device service plan. In some embodiments, the control over multi-device service plan configuration comprises the assignment of or approval of a service usage allowance for one or more devices capable of receiving services in accordance with the multi-device service plan. In some embodiments, the service usage allowance comprises a voice, text or data usage allowance for one or more wireless access networks. In some embodiments, the allowance comprises an allowance on one or more applications or one or more application types that may be used on one or more wireless access networks. In some embodiments, the allowance comprises a time of day or time period allowance during which one or more access network services may be used. In some embodiments, the allowance comprises an allowance for communication with one or more network end points or websites or one or more network endpoint types or website types over one or more wireless access networks. In some embodiments, the allowance comprises an allowance for one or more content types or traffic types on one or more wireless access networks. In some embodiments, the allowance comprises an allowance for one or more QoS levels on one or more wireless access networks. In some embodiments, the allowance comprises one or more roaming permission levels for one or more wireless roaming networks. In some embodiments, an allowance is implemented by provisioning an allowance policy instruction or allowance policy setting into one or more device agents on the device associated with the allowance. In some embodiments, the allowance is implemented by provisioning an allowance policy instruction or allowance policy setting into a device service processor on the device associated with the allowance.
In some embodiments, information defining at least an aspect of the allowance is obtained from one or more device agents on master device 100A (e.g., Device Agent 9006A). In some embodiments, information defining at least an aspect of the allowance is obtained from one or more device agents on Secondary Device 100B (e.g., Device Agent 9006B). In some embodiments, information defining at least an aspect of the allowance is obtained from a master device user or secondary device user input to a website or portal. In some embodiments, information defining at least an aspect of the allowance is obtained from an account owner input to a website or portal.
In some embodiments, the control over multi-device service plan configuration comprises the assignment of or approval of a service usage limit for one or more devices capable of receiving services in accordance with the multi-device service plan. In some embodiments, the service usage limit comprises a voice, text, or data usage limit for one or more wireless access networks. In some embodiments, the limit comprises a limit on one or more applications or one or more application types that may be used on one or more wireless access networks. In some embodiments, the limit comprises a time of day or time period limit during which one or more access network services may be used. In some embodiments, the limit comprises a limit on communication with one or more network end points or websites or one or more network endpoint types or website types over one or more wireless access networks. In some embodiments, the limit comprises a limit for one or more content types or traffic types on one or more wireless access networks. In some embodiments, the limit comprises a limit for one or more QoS levels on one or more wireless access networks. In some embodiments, the limit comprises one or more roaming limitations for one or more wireless roaming networks. In some embodiments, a limit is implemented by provisioning a limit policy instruction or limit policy setting into one or more network elements responsible for providing wireless access network permission for one or more wireless access networks to the device associated with the limit. In some embodiments, a limit is implemented by provisioning a limit policy instruction or limit policy setting into one or more network elements responsible for providing wireless access network permission for one or more wireless access networks to the device associated with the limit.
Notifications During a Voice Call
In some embodiments, one or more device applications, one or more device agents (e.g., Device Agent 9006), or one or more service processor agents (the “service purchase application”) are configured to allow a user to purchase a voice service allowance increase, upgrade, service plan increase, “top up,” or other service increase during the time a device user is conducting a phone call.
In some embodiments, coincident in time with a voice call being conducted over a cellular wireless network, the service purchase application is configured to establish a data connection over the same cellular network to a network server, service controller, activation server, or billing server (the “service purchase server”) that is configured to modify, increase, or effect a purchase of a voice service allowance, and the service purchase application is further configured to communicate a user selection to purchase a voice service allowance increase, upgrade, service plan increase, “top up,” or other service increase during the time a device user is conducting a phone call.
In some embodiments, coincident in time with a voice call being conducted over a cellular wireless network, the service purchase application is configured to establish a secure data connection over the same cellular network to the service purchase server, and the service purchase application is further configured to provide one or more device credentials to identify the device to the service purchase server and communicate a user selection to purchase a voice service allowance increase, upgrade, service plan increase, “top up,” or other service increase during the time a device user is conducting a phone call. In some embodiments, the voice application is further configured to display a user interface notification that provides the user with one or more actionable options to purchase additional voice service during a voice call. In some embodiments, the service purchase application is configured to track real time voice service usage coincident in time with a voice call taking place.
In some embodiments, the service purchase application is configured to track real time voice service usage coincident in time with a voice call taking place and communicate, or display on the device UI, an indication of the real time voice service usage during the call. In some embodiments, the service purchase agent is further configured to communicate an indication of the real time voice service usage through an earpiece or speaker of the device. In some embodiments, the service purchase agent is further configured to communicate an indication of the real time voice service usage through an earpiece or speaker of the device during the time a voice call is being conducted. In some embodiments the service purchase agent is further configured to communicate an indication of the real time voice service usage through an earpiece or speaker of the device during the time a voice call is being conducted in a manner that does not result in a call participant on the other side of the call from the device hearing the communication of an indication of the real time voice service usage.
In some embodiments, the service purchase application is configured to track real time voice service usage coincident in time with a voice call taking place and communicate, or display on the device UI, an indication of the real time voice service usage during the call, the indication of real time voice service usage comprising text on the UI, numeric indication on the UI, an amount of use compared to a service limit on the UI, an amount of use as a percentage of a service limit on the UI, an indication that there is a certain amount of time consumed on the service plan, an indication that there is only a certain amount of time left on a service plan, or any combination of these. In some embodiments, the display on the device UI of an indication of the real time voice service usage during the call comprises a graphical object. In some embodiments, the graphical object comprises a graph, a horizontal bar, a vertical bar, a dial or gauge, a pie, or a slider.
In some embodiments, the service purchase application is configured to track real time voice service usage coincident in time with a voice call taking place and communicate through an earpiece speaker connected to the device an indication of the real time voice service usage during the call, the indication of real time voice service usage comprising a voice message. In some embodiments, the voice message comprises a numeric indication, an amount of use compared to a service limit, an amount of use as a percentage of a service limit, an indication that there is a certain amount of time consumed on the service plan, an indication that there is only a certain amount of time left on a service plan, or any combination of these.
In some embodiments, the service purchase application is configured to track real time voice service usage during a voice call, and compare the voice service usage against one or more pre-configured limits on service, and when one of the one or more service limits is reached, communicate, or display on the device UI, a notification message as described above. In some embodiments, the message includes a device pop-up UI that enables a user of the device to select a voice upgrade, top up, service plan increase, or other voice service purchase. In some embodiments the service purchase application is further configured to communicate the user selection to a service purchase server coincident in time with the voice call. In some embodiments, the service purchase agent is configured to complete the purchase prior to the voice call ending so that the call can continue beyond an original limit on voice service use. In some embodiments, the service purchase agent is further configured to provide an acknowledgement to the device UI that the service purchase has been completed. In some embodiments, the service purchase agent is further configured to provide an acknowledgement to the device UI that the service purchase has been completed prior to the voice call ending.
In some embodiments, a cellular network system is configured to simultaneously establish a data communication connection between a device service purchase application and a service purchase server coincident in time with a voice call being conducted by the same cellular network, and the service purchase server is configured to accept a service purchase agent voice service purchase indication and cause a voice service plan to be upgraded, to increase a voice service limit, reconfigure a voice or bundle service plan, or purchase a new voice or bundle service plan. In some embodiments, the voice service purchase server is configured to increase voice service before the end of a voice call so that the voice call can continue beyond an original service limit.
In some embodiments, the voice service purchase server is further configured to cause the voice service plan to be upgraded, to increase a voice service limit, reconfigure a voice or bundle service plan, or purchase a new voice or bundle service plan by communicating with a billing system to assist in changing a service plan status associated with the device credential.
In some embodiments, the voice service purchase server is further configured to cause the voice service plan to be upgraded, to increase a voice service limit, reconfigure a voice or bundle service plan, or purchase a new voice or bundle service plan by communicating with a OCS system to assist in changing a service plan status associated with the device credential.
In some embodiments, the voice service purchase server is further configured to cause the voice service plan to be upgraded, to increase a voice service limit, reconfigure a voice or bundle service plan, or purchase a new voice or bundle service plan by communicating with a service controller or activation server system to assist in changing a service plan status associated with the device credential.
In some embodiments, the voice service purchase server is further configured to cause the voice service plan to be upgraded, to increase a voice service limit, reconfigure a voice or bundle service plan, or purchase a new voice or bundle service plan by communicating with a service controller system to assist in changing a service plan status associated with the device credential, and the service controller system is configured to provide a new voice service allowance policy to one or more service processor agents on the device.
In some embodiments, during a voice call a service processor is configured to track real time voice service usage, communicate an indication of real time voice service usage to an earpiece, speaker or UI connected to the device, and provide the user with a voice service upgrade or purchase offer before the voice call expires. In some embodiments, the indication is provided when a pre-configured limit is reached. In some embodiments, the pre-configured limit is set by a user of the device on the device UI. In some embodiments, the pre-configured limit (and possibly other aspects of the notification) is provided by a network element or configured in the software of the device. In some embodiments, when the user responds to the upgrade offer indicating a user desire to purchase the upgrade, the service processor increases a voice allowance implemented by one or more device service processor agent (such as a policy control agent, a policy decision agent, a policy implementation agent, or policy enforcement agent, or a combination of these). In some embodiments, the service processor also communicates the service plan purchase to a network element such as a service purchase server, a service controller, an activation server or a billing server.
In some embodiments, such as the embodiment illustrated in
In some embodiments, Usage Accounting 9018 and Policy Management 9016 interwork to meet a service policy objective (e.g., when usage within a service plan for a specific secondary device subscriber hits a certain usage level, block further access to that service plan for that secondary device). In some embodiments, Provisioning 9014 also provisions Notification element 9020 with the details about notifications that need to be delivered to subscribers based on certain events. In some embodiments, these details include trigger identification, notification text, and actions. In some embodiments, these details include other instructions that instruct Notification 9020 (and, in some embodiments, a device agent such as Device Agent 9006A or 9006B) on further workflow associated with a notification (e.g., a notification trigger identification that indicates that a service plan limit has been reached, the text to be shown to the subscriber when the condition occurs, the buttons to display on the notification (e.g., dismiss, purchase additional service, view product catalog, “snooze,” “don't remind me again,” etc.), and the action to take when specific buttons are selected (e.g., when the user selects “don't remind me again,” show these choices for when to remind him again (e.g., never, 1 hour, 2 hours, 4 hours, etc.)).
In some embodiments, the elements illustrated in
In some embodiments, the elements in
In some embodiments, a network system is configured to provision a multi-device service plan access network permission configuration into one or more access network permission control elements, the permission configuration allowing access network service permission in accordance with a multi-device service plan for at least Master Device 100A and Secondary Device 100B. In some embodiments, the provisioning of the secondary device service permissions is accomplished by providing a secondary device credential and service permission information to a subscriber management system that configures a set of one or more wireless access network permissions on one or more wireless access network access control elements, the one or more wireless access network permissions comprising access control permissions for attempted or actual access traffic associated with the secondary device credential. In some embodiments, the one or more access network permission control elements comprise one or more device agents (e.g., Device Agent 9006B) located on Secondary Device 100B. In some embodiments, the one or more device agents comprise a service processor (e.g., service processor 115). In some embodiments, the one or more access network permission control elements comprise a subscriber management system (e.g., Subscriber Management System 9004). In some embodiments, the one or more access network permission control elements comprise a service controller (e.g., service controller 122). In some embodiments, the one or more access network permission control elements comprise a network AAA system. In some embodiments, the one or more access network permission control elements comprise one or more of a network gateway, router, policy control enforcement function, gateway GPRS support node (GGSN), serving GPRS support node (SGSN), packet data serving node (PDSN), home location register (HLR), home subscriber server (HSS), packet data network gateway (PGW), serving gateway (SGW), traffic monitoring function, deep packet inspection (DPI) function, or home agent.
In some embodiments, Sign-Up Request Processor 9002 is located in the carrier network. In other embodiments, it is located in a third party provider network (e.g., device OEM, VSP, MVNO, device OS provider, VoIP provider, etc.).
It is sometimes desirable that a common application programming interface (API) be implemented to simplify or eliminate the details of what has to happen in one or more carrier networks, and to establish a finite set of pre-specified API commands to support a common multi-device service plan assignment system that works with a plurality of third-party on-device multi-device service plan sharing and assignment solutions. In some embodiments, the pre-specified API commands include such actions as activate a device 100 onto a shared plan, add a device 100 to a master service account, device group, or multi-device service plan, remove a device 100 from a master service account, device group, or multi-device service plan, manage quotas for devices 100 on a shared plan, manage notifications for devices 100 on a shared plan, or assign specific plans to certain devices 100 on a shared plan. As would be appreciated by a person having ordinary skill in the art, there are many types actions that can be defined, and the examples provided herein are not intended to be limiting.
In some embodiments, such as the embodiment illustrated in
For example, a device manufacturer may want to have a common service sign-up and sharing management UI and process for all of its products and desires that the common service sign-up and sharing management UI and process are implemented consistently across all of the service operators that are selling the manufacturer's products. Thus, in some embodiments, the device manufacturer provides Sign-Up Request Processor 9002 and Common API 9022 and works with the service operators to have them implement the required functionality to support the on-device service sign-up and multi-device sharing functions. In some embodiments, the manufacturer implements, on Sign-Up Request Processor 9002, common APIs (e.g., Common API 9022) for functions like add new service, delete service, add a device 100 to a master service account, device group, or multi-device service plan, delete a device 100 from a master service account, device group, or multi-device service plan, manage quotas on a shared plan, etc., and then provide a well-defined API, interface, and protocol (e.g., JSON, WSDL, etc.) to the interface with the individual service operators. In some embodiments, the interface protocol between Sign-Up Request Processor 9002 and the service operator Subscriber Management System 9004 is a “high level” functional interface as described above, and Subscriber Management System 9004 implements a series of “low level” instructions to each of the affected operator elements (as described in the discussion of
In some embodiments, Sign-Up Request Processor 9002 is located in the carrier network. In other embodiments, Sign-Up Request Processor 9002 is located in a third-party provider network (e.g., device OEM, VSP, MVNO, device OS provider, VoIP provider, etc.). In some embodiments, there is a plurality of Sign-Up Request Processors 9002. In some embodiments, each of the plurality of Sign-Up Request Processors 9002 conforms to the common API command set. In some embodiments, each of the plurality of Sign-Up Request Processors 9002 is associated with a subset of the entities requiring access to manage multi-device plan sharing and assignment. In some embodiments, these entities include device OEM, OS provider, VSP, MVNO, MNO, retail distribution partners, or sponsored service providers. In some embodiments, each of the entities requiring access to manage multi-device plan sharing and assignment implements its own UI, device agent, and on-device workflows to enable the entity to customize the process to suit its needs without impacting the service operator interfaces.
Although
In some embodiments, a party specifies a global API that defines a superset of required “high level” commands that entities use to manage multi-device plan sharing capabilities and then provide an internal framework to allow the individual service operators to convert the “high level” commands received from Sign-Up Request Processor 9002 into the service operator-specific “low level” commands and workflows that apply to that service operator. In some embodiments, the party is an operator, a VSP, an MVNO, an OEM, an OS provider, a retail distribution partner, or any type of partner that would benefit from a consistent multi-device service management experience across multiple service providers.
Device Credentials
In some embodiments, device 100 comprises one or more wireless modems that enable the device to connect to at least a first wireless network and one or more device agents (e.g., Device Agent 9006) that: obtain a first device credential from a device credential storage element, the first device credential uniquely identifying device 100; present a multi-device service plan sign-up message through a user interface of device 100, the multi-device service plan sign-up message offering the user an option to associate device 100 with a master service account, device group, or multi-device service plan, the master service account, device group, or multi-device service plan comprising access service permissions to enable communication over the first wireless network by one or more devices; obtain a user input indicating that the user desires to associate device 100 with the master service account, device group, or multi-device service plan; and communicate the first device credential and the user input to a network element responsible for associating device 100 with the master service account, device group, or multi-device service plan.
In some embodiments, device 100 receives an acknowledgment that device 100 was successfully associated with the master service account, device group, or multi-device service plan. In some embodiments, device 100 receives the acknowledgment from a network element and presents the acknowledgment through a device user interface.
In some embodiments, device 100 receives an instruction that assists in associating device 100 with the master service account, device group, or multi-device service plan. In some embodiments, device 100 receives that instruction from a network element and executes the instruction to assist in associating device 100 with the master service account, device group, or multi-device service plan. In some embodiments, the instruction modifies an aspect of a device connection to the first wireless network. In some embodiments, the instruction modifies an aspect of a device access permission associated with communicating over the first wireless network. In some embodiments, the instruction modifies an aspect of a first device credential or a second device credential.
In some embodiments, the first device credential comprises one or more of a phone number, an IMSI, an MSID, a SIM identifier, an ESN, an MEID, an IMEI, a device identifier, a subscriber identifier, a service account identifier, a token, and a one-time token.
In some embodiments, at least a portion of the service plan sign-up message is obtained from a device system memory. In some embodiments, the at least a portion of the service plan sign-up message is pre-stored in the device system memory before the service plan sign-up message display sequence is initiated. In some embodiments, at least a portion of the service plan sign-up message is obtained from a network destination. In some embodiments, the at least a portion of the service plan sign-up message is obtained from a network element before the service plan sign-up message display sequence is initiated. In some embodiments, the at least a portion of the service plan sign-up message is obtained from a network element immediately prior to the service plan sign-up message display sequence being initiated. In some embodiments, the network element comprises a website, a portal, or a message server.
In some embodiments, device 100 obtains at least a portion of the service plan sign-up message from a push message sent by a network server. In some embodiments, the network server is a push server. In some embodiments, device 100 receives the push message over a secure push message control link. In some embodiments, device 100 assists in securing the push message control link by sharing the first device credential with a push message server and establishing an encrypted link in cooperation with the push message server.
In some embodiments, a network system receives a secondary device multi-device service plan sign-up request from a device agent (e.g., Device Agent 9006B) on Secondary Device 100B. In some embodiments, the multi-device service plan sign-up request comprises a master user credential and a secondary device credential. In some embodiments, the network system compares the master user credential to an account owner credential associated with a master service account, device group, or multi-device service plan. In some embodiments, if the comparison indicates that the master user credential and the account owner credential are consistent, the network system provides a provisioning instruction to a wireless access network control system to associate Secondary Device 100B with access control permissions associated with the master service account, device group, or multi-device service plan.
In some embodiments, a network system receives a secondary device multi-device service plan sign-up request from a device agent (e.g., Device Agent 9006B) on Secondary Device 100B. In some embodiments, the multi-device service plan sign-up request comprises a master user credential and a secondary device credential. In some embodiments, the network system compares the master user credential to an account owner credential associated with a master service account, device group, or multi-device service plan. In some embodiments, if the comparison indicates that the master user credential and the account owner credential are consistent, the network system provides a provisioning instruction to a wireless access network accounting system to account service usage associated with Secondary Device 100B to the master service account.
Sign-Up Requests
In some embodiments, a master device (e.g., Master Device 100A) comprises one or more device agents (e.g., Device Agent 9006A) that receive a multi-device sign-up option message or request message from a network element to add Secondary Device 100B to a master service account, device group, or multi-device service plan. In some embodiments, the one or more agents present the multi-device sign-up option message or request message to a user through a user interface of the master device. In some embodiments, the one or more agents obtain a user response through the user interface and send the user response to the network element. In some embodiments, the user response comprises a master account-holder credential and an acknowledgment of the request to add Secondary Device 100B to the master service account, device group, or multi-device service plan. In some embodiments, the master device also sends a master device credential to the network element, the master device credential uniquely identifying the master device. In some embodiments, the master device communicates with the network element over a secure link. In some embodiments, the master device receives the multi-device sign-up option message or request message request from the network element over the secure link. In some embodiments, the secure link comprises a secure push message link, and the master device receives the message over the secure link by receiving a push message from a network push message server. In some embodiments, the master device assists in securing the secure push message link by executing a link establishment process during which the master device shares a master credential with the network push message server and, in cooperation with the network push message server, establishes an encrypted link.
In some embodiments, a network system receives a secondary device multi-device service plan sign-up option response message or request message from a device agent (e.g., Device Agent 9006B) on Secondary Device 100B. In some embodiments, the network system communicates information about the secondary device multi-device service plan sign-up option response message or request message to a master device agent on a master device (e.g., Device Agent 9006A on Master Device 100A). In some embodiments, the network system obtains a response to the information about the secondary device multi-device service plan sign-up option response message or request message from the master device agent. In some embodiments, if the response indicates that the secondary device service plan sign-up option response or request is granted or acknowledged, the network system provides a provisioning instruction to a wireless access network control system to associate Secondary Device 100B with access control permissions associated with the master service account, device group, or multi-device service plan. In some embodiments, the network system also receives a device credential from the master device in association with the response. In some embodiments, the network system includes a secure message link server that communicates the information about the secondary device multi-device service plan sign-up option response message or request message to the master device agent. In some embodiments, the network system includes a network push message server and the secure link comprises a secure push message link, and the network system communicates the information about the secondary device multi-device service plan sign-up option response message or request message to the master device agent by sending a push message from a network push message server. In some embodiments, the network system secures the network push message server by executing a push message link establishment process in which the network push message server obtains a device credential and, in cooperation with the master device, establishes an encrypted link.
In some embodiments, a network system receives a secondary device multi-device service plan sign-up option response message or request message from a device agent (e.g., Device Agent 9006B) on Secondary Device 100B. In some embodiments, the network system communicates information about the secondary device multi-device service plan sign-up option response message or request message to a master device agent on a master device (e.g., Device Agent 9006A on Master Device 100A). In some embodiments, the network system obtains a response to the information about the secondary device multi-device service plan sign-up option response message or request message from the master device agent. In some embodiments, if the response indicates that the secondary device service plan sign-up option response or request is granted or acknowledged, the network system provides a provisioning instruction to a wireless access network accounting system to account service usage associated with Secondary Device 100B to the master service account. In some embodiments, the network system also receives a device credential from the master device in association with the response. In some embodiments, the network system includes a secure message link server that communicates the information about the secondary device multi-device service plan sign-up option response message or request message to the master device agent. In some embodiments, the network system includes a network push message server and the secure link comprises a secure push message link, and the network system communicates the information about the secondary device multi-device service plan sign-up option response message or request message to the master device agent by sending a push message from a network push message server. In some embodiments, the network system secures the network push message server by executing a push message link establishment process in which the network push message server obtains a device credential and, in cooperation with the master device, establishes an encrypted link.
In some embodiments, Secondary Device 100B comprises one or more device agents (e.g., Device Agent 9006B) that receive a request from a network element to add Secondary Device 100B to a master service account, device group, or multi-device service plan. In some embodiments, the one or more agents present the multi-device sign-up option message or request message to a user through a user interface of Secondary Device 100B. In some embodiments, the one or more agents obtain a user response through the user interface and send the user response to the network element. In some embodiments, the user response comprises a master account-holder credential and an acknowledgment of the request to add Secondary Device 100B to the master service account, device group, or multi-device service plan. In some embodiments, the response comprises a credential associated with a user of Secondary Device 100B and an acknowledgment of the request to add Secondary Device 100B to the master service account, device group, or multi-device service plan. In some embodiments, Secondary Device 100B sends a secondary device credential to the network element in association with the response. In some embodiments, Secondary Device 100B communicates with the network element over a secure link. In some embodiments, the master device (e.g., Master Device 100A) receives the request from the network element over the secure link. In some embodiments, the secure link comprises a secure push message link, and the master device receives the request over the secure link by receiving a push message from a network push message server. In some embodiments, the master device assists in securing the secure push message link by executing a link establishment process during which the master device shares a master credential with the network push message server and, in cooperation with the network push message server, establishes an encrypted link.
In some embodiments, a network system receives a secondary device multi-device service plan sign-up request from a master device agent (e.g., Device Agent 9006A) on a master device (e.g., Master Device 100A). In some embodiments, the network system communicates information about the secondary device multi-device service plan sign-up request to a device agent (e.g., Device Agent 9006B) on Secondary Device 100B. In some embodiments, the network system obtains a response to the information about the secondary device multi-device service plan sign-up option request from device agent on the secondary device (e.g., Device Agent 9006B). In some embodiments, if the response indicates that the secondary device service plan sign-up option request is granted or acknowledged, the network system provides a provisioning instruction to a wireless access network control system to associate Secondary Device 100B with access control permissions associated with the master service account, device group, or multi-device service plan. In some embodiments, the network system is further configured to obtain a device credential associated with the master device in association with the request. In some embodiments, the network system is further configured to obtain a device credential associated with Secondary Device 100B in association with the response. In some embodiments, the network system includes a secure message link server that communicates the information about the secondary device multi-device service plan sign-up request to the device agent on Secondary Device 100B (e.g., Device Agent 9006B). In some embodiments, the network system includes a network push message server and the secure link comprises a secure push message link, and the network system communicates the information about the secondary device multi-device service plan sign-up request to the device agent on Secondary Device 100B by sending a push message from a network push message server. In some embodiments, the network system secures the network push message server by executing a push message link establishment process in which the network push message server obtains a device credential and, in cooperation with Secondary Device 100B, establishes an encrypted link.
In some embodiments, a network system receives a secondary device multi-device service plan sign-up request from a master device agent on a master device (e.g., Device Agent 9006A on Master Device 100A). In some embodiments, the network system communicates information about the secondary device multi-device service plan sign-up request to a device agent (e.g., Device Agent 9006B) on Secondary Device 100B. In some embodiments, the network system obtains a response to the information about the secondary device multi-device service plan sign-up request from the device agent on Secondary Device 100B. In some embodiments, if the response indicates that the secondary device service plan sign-up request is granted or acknowledged, the network system provides a provisioning instruction to a wireless access network accounting system to account service usage associated with Secondary Device 100B to the master service account. In some embodiments, the network system obtains a device credential associated with the master device in association with the response. In some embodiments, the network system obtains a device credential associated with Secondary Device 100B in association with the response. In some embodiments, the network system includes a secure message link server that communicates the information about the secondary device multi-device service plan sign-up option response message or request message to the master device agent (e.g., Device Agent 9006A). In some embodiments, the network system includes a network push message server and the secure link comprises a secure push message link, and the network system communicates the information about the secondary device multi-device service plan sign-up option response message or request message to the master device agent by sending a push message from a network push message server. In some embodiments, the network system secures the network push message server by executing a push message link establishment process in which the network push message server obtains a device credential and, in cooperation with Master Device 100A, establishes an encrypted link.
In some embodiments, Master Device 100A comprises one or more device agents (e.g., Device Agent 9006A) that present a user interface message offering to associate Secondary Device 100B with a master service account, device group, or multi-device service plan. In some embodiments, the one or more device agents obtain an affirmative user response to the user interface message. In some embodiments, the one or more device agents obtain a secondary device credential and send an indication of the affirmative user response and the secondary device credential to a network element. In some embodiments, the one or more device agents obtain the secondary device credential from a user input obtained through the master device user interface. In some embodiments, the one or more device agents obtain secondary device credential by communicating with Secondary Device 100B through, for example, the first wireless network, Bluetooth, near-field communication, an object presented on the secondary device user interface and captured by Master Device 100A (for example, by a camera), an encoded sound signal, etc. In some embodiments, the one or more device agents obtain a user credential and send the user credential to the network element. In some embodiments, the one or more device agents obtain a master device credential and send the master device credential to the network element. In some embodiments, the one or more device agents obtain an indication of a user-established limit on service usage for Secondary Device 100B. In some embodiments, the one or more device agents send information about the user-established limit on service usage to the network element. In some embodiments, the one or more device agents obtain a user-established permission level associated with Secondary Device 100B. In some embodiments, the one or more device agents send information about the user-established permission level to the network element. In some embodiments, the one or more device agents obtain at least a portion of the user interface message offering to associate Secondary Device 100B with a master service account, device group, or multi-device service plan from memory on the master device. In some embodiments, the one or more device agents obtain at least a portion of the user interface message offering to associate Secondary Device 100B with a master service account, device group, or multi-device service plan from a network element. In some embodiments, the network element is a website or a portal.
In some embodiments, a device (e.g., Master Device 100A or Secondary Device 100B) comprises one or more agents (e.g., Device Agent 9006A, 9006B) that present a user interface message offering an option to provide monetary credit (e.g., money or an equivalent) to Secondary Device 100B. In some embodiments, the one or more agents accept a user response to the offer and provide the user response to a network element (e.g., by sending the user response to the network element).
In some embodiments, a network system communicates over a secure link with a master device agent on a master device (e.g., Device Agent 9006A on Master Device 100A). In some embodiments, the network system obtains a request to provide monetary credit to Secondary Device 100B. In some embodiments, the request includes a master user credential and a secondary credential identifying the secondary device. In some embodiments, the network system determines if the master user credential is associated with the secondary credential, and, if it is, the network system provisions a monetary accounting system to provide monetary credit to Secondary Device 100B.
In some embodiments, a device (e.g., Master Device 100A or Secondary Device 100B) comprises one or more agents (e.g., Device Agent 9006A, 9006B) configured to present a user interface (UI) message offering an option to provide access usage credit to Secondary Device 100B, accept a user input in response to the offer, and communicate the user input to a network element.
In some embodiments, a network system communicates over a secure link with a master device agent on a master device (e.g., Device Agent 9006A on Master Device 100A). In some embodiments, the network system obtains a request to provide service usage credit to Secondary Device 100B. In some embodiments, the network system obtains the request from the master device agent over the secure link. In some embodiments, the network system obtains a master user credential and a secondary device credential associated with the request and determines if the master user credential is associated with the secondary device credential. In some embodiments, if the master user credential is associated with the secondary device credential, the network system provisions a service usage accounting system to provide service usage credit to Secondary Device 100B.
In some embodiments, a device 100 comprises one or more agents configured to present a user interface (UI) message offering an option to provide control of at least an aspect of a secondary device service permission level, obtain a user response to the offer, and communicate the user response to a network element.
In some embodiments, a network system communicates over a secure link with a master device agent on a master device (e.g., Device Agent 9006A on Master Device 100A). In some embodiments, the network system obtains a request to control at least an aspect of a secondary device service permission level. In some embodiments, the network system obtains the request from the master device agent over the secure link. In some embodiments, the network system obtains a master user credential and a secondary device credential associated with the request and determines if the master user credential is associated with the secondary device credential. In some embodiments, if the master user credential is associated with the secondary device credential, the network system provisions a service permission control system to control the at least an aspect of the secondary device service permission level.
In some embodiments, a device system comprises one or more agents configured to present a user interface (UI) message offering an option to deny at least an aspect of a secondary device service permission level, obtain a user response to the offer, and communicate the user response to a network element.
In some embodiments, a network system communicates over a secure link with a master device agent on a master device (e.g., Device Agent 9006A on Master Device 100A). In some embodiments, the network system obtains a request to deny at least an aspect of a secondary device service permission level. In some embodiments, the network system obtains the request from the master device agent over the secure link. In some embodiments, the network system obtains a master user credential and a secondary device credential associated with the request and determines if the master user credential is associated with the secondary device credential. In some embodiments, if the master user credential is associated with the secondary device credential, the network system provisions a service permission control system to deny the at least an aspect of the secondary device service permission level.
In some embodiments, a network system configures a notification regarding a secondary device usage level, wherein the notification is to be delivered to Master Device 100A. In some embodiments, the network system configures a usage level setting based on information from Master Device 100A. In some embodiments, the network system configures the usage level setting based on information from a website or portal. In some embodiments, the network system configures the usage level setting as part of a service plan provisioning interface.
In some embodiments, the usage level is associated with voice usage. In some embodiments, the voice usage is expressed in units of minutes. In some embodiments, the voice usage is expressed as a percentage of plan limit. In some embodiments, voice usage is expressed as a percentage of an allowance.
In some embodiments, the usage level is associated with text or SMS usage. In some embodiments, the text or SMS usage is expressed as a number of texts or SMS messages. In some embodiments, text or SMS usage is expressed as an object count. In some embodiments, text or SMS usage is expressed as a number of megabytes (MB). In some embodiments, text or SMS usage is expressed as a percentage of a plan limit. In some embodiments, a text or SMS usage is expressed as a percentage of an allowance (e.g., an allowance under a shared plan).
In some embodiments, the usage level is associated with data usage. In some embodiments, the data usage is expressed as an amount of data (e.g., measured in megabytes, kilobytes, etc.). In some embodiments, the data usage is expressed as an amount of time. In some embodiments, the data is expressed as a percentage of a plan limit. In some embodiments, the data is expressed as a percentage of an allowance (e.g., an allowance under a shared plan).
In some embodiments, the usage level is for classification of data (e.g., a category of service activities less than all service activities available to device 100). In some embodiments, the data classification usage expressed in MB. In some embodiments, the data classification is expressed as a usage during a period of time. In some embodiments, the data classification is expressed as a percentage of a plan limit. In some embodiments, the data classification is expressed as a percentage of an allowance (e.g., an allowance under a shared plan). In some embodiments, the classification of data is for one or more applications. In some embodiments, the classification is for one or more network end points. In some embodiments, the classification is for one or more voice services. In some embodiments, the classification is for one or more text messages or messaging services. In some embodiments, the classification is for one or more content types. In some embodiments, the classification is for roaming services (e.g., service usage while roaming, such as number of voice minutes used while roaming, amount of data used while roaming, etc.). In some embodiments, the classification is for home cellular network services (e.g., service usage while on a home cellular network, such as number of voice minutes used while roaming, amount of data used while roaming, etc.). In some embodiments, the classification is for Wi-Fi services (e.g., service usage while on one or more Wi-Fi networks, such as number of voice minutes used while on Wi-Fi networks, amount of data used while on Wi-Fi networks, etc.). In some embodiments, the classification is for one or more quality-of-service (QoS) levels or one or more QoS types. In some embodiments, the classification is for one or more traffic or content types (e.g., service usage for streaming video, service usage for streaming audio, service usage for a particular protocol, etc.). In some embodiments, the classification is for one or more time periods (e.g., service usage during the past day, week, month, etc.). In some embodiments, the classification is for one or more geographic areas or physical locations (e.g., service usage in Santa Clara County, service usage at the office, service usage at home, etc.). In some embodiments, classification is for one or more application types (e.g., service usage associated with user applications, service usage associated with social networking applications, service usage associated with video applications, etc.). In some embodiments, the classification is for one or more websites. In some embodiments, the classification is for one or more website types. In some embodiments, the classification is for one or more of categories of service usage, such as, for example, voice, text, data, gaming, video, browsing, chat, shopping, maps, audio, etc.
In some embodiments, a master device (e.g., Master Device 100A) comprises one or more agents (e.g., Device Agent 100A) configured to receive a child usage level message and present information about the child usage levels through a master device user interface (UI).
In some embodiments, a network system compares a pre-determined secondary device service usage limit with a measured secondary device service usage level associated with a secondary device (e.g. Secondary Device 100B) associated with a secondary device credential. In some embodiments, the network system determines if the measured secondary device service usage level exceeds the pre-determined secondary device service usage limit. In some embodiments, if the limit is exceeded, the network system obtains (e.g., configures, retrieves, etc.) a secondary device service usage message associated with the secondary device service usage limit. In some embodiments, the network system determines a master device credential of a master device (e.g., Master Device 100A) that is associated with the secondary device and sends the secondary device service usage message to a master device agent (e.g., Device Agent 9006A) on the master device identified by the master device credential.
In some embodiments, a master device (e.g., Master Device 100A) comprises one or more agents (e.g., Device Agent 9006A) configured to receive a child usage level message and present information from or determined based on the child usage level message through a master-device user interface. In some embodiments, the child usage level message indicates that the secondary device (e.g., Secondary Device 100B) is out of usage allocation. In some embodiments, the child usage level message indicates that the secondary device is nearing a condition where it will be out of usage allocation. In some embodiments, the one or more agents also present an option to modify (e.g., increase or decrease) secondary device usage permissions or limits. In some embodiments, the one or more agents accept a user response to the option to modify the secondary usage permissions or limits. In some embodiments, the one or more agents send the user response to a network element.
In some embodiments, a network system determines a usage level for a secondary device (e.g., Secondary Device 100B). In some embodiments, the network system determines if secondary device usage level satisfies a pre-determined condition. In some embodiments, if the secondary device usage level satisfies the pre-determined condition, the network system determines a master device (e.g., Master Device 100A) that is associated with the secondary device. In some embodiments, the network system determines (e.g., configures, obtains, etc.) a secondary device usage level message associated with the pre-determined condition and sends the secondary device usage level message to the master device. In some embodiments, the usage level message includes an option to increase a usage allowance for secondary device. In some embodiments, the network system also obtains a master user response to increase the secondary device usage allowance. In some embodiments, the network system receives the master user response from the master device. In some embodiments, the network system provisions one or more network elements to as needed to increase the secondary device usage allowance.
In some embodiments, the network system receives a secure request from a master account holder to add a device (device 100) to a master service account, device group, or multi-device service plan. In some embodiments, the secure request comprises a master account holder credential and a first device credential. In some embodiments, the network system confirms the master account credential and, after confirming the master account credential, provisions a network access system to provide the service usage or attempted service usage over a first wireless access network that is associated with a first device credential to support the access permissions associated with the master service account, device group, or multi-device service plan. In some embodiments, the request to add device 100 to the master service account, device group, or multi-device service plan is obtained from a device agent (e.g., Device Agent 9006) on device 100. In some embodiments, the request to add device 100 to the master service account, device group, or multi-device service plan is obtained from a device agent on another device. In some embodiments, the request to add device 100 to the master service account, device group, or multi-device service plan is obtained from a website or portal. In some embodiments, provisioning includes associating device 100 credential to the master service account, device group, or multi-device service plan. In some embodiments, provisioning includes de-assigning device 100 credential from a pre-existing service plan. In some embodiments, access permissions include one or more permissions for categories of service usage established by the master account holder.
In some embodiments, a network system receives a secure request from a master account holder to add a first device (device 100) to a master service account, device group, or multi-device service plan, the secure request comprising a master account holder credential and a first device credential. In some embodiments, the network system confirms the master account credential and provisions a network service usage accounting system to account service usage over a first wireless access network that is associated with device 100 credential to the master account. In some embodiments, the request to add device 100 to the master service account, device group, or multi-device service plan is obtained from a device agent located on device 100. In some embodiments, the request to add device 100 to the master service account, device group, or multi-device service plan is obtained from a device agent (e.g., Device Agent 9006) located on another device. In some embodiments, the request to add device 100 to the master service account, device group, or multi-device service plan is obtained from a website or portal. In some embodiments, provisioning includes associating device 100 credential to the master service account, device group, or multi-device service plan. In some embodiments, provisioning includes de-assigning device 100 credential from a pre-existing service plan. In some embodiments, the request to add device 100 to the master service account, device group, or multi-device service plan is obtained from a device agent on device 100. In some embodiments, the request to add device 100 to the master service account, device group, or multi-device service plan is obtained from a device agent on another device (e.g., Device Agent 9006). In some embodiments, the request to add device 100 to the master service account, device group, or multi-device service plan is obtained from a website or portal. In some embodiments, provisioning includes associating a first device credential to the master service account, device group, or multi-device service plan. In some embodiments, provisioning includes de-assigning the first device credential from a pre-existing service plan. In some embodiments, access permissions include one or more permissions for a category of service usage established by the master account holder.
In some embodiments, a network system obtains a secondary device access credit indication for a classification of service (e.g., a category of service usage) from a master device agent on a master device (e.g., Device Agent 9006A on Master Device 100A) and provisions an access control system to provide access credit for the classification of service for a secondary device (e.g., Secondary Device 100B) from the master device, the classification of service less than all services available to the secondary device. In some embodiments, the classification is for one or more applications. In some embodiments, the classification is for one or more network end points. In some embodiments, the classification is for one or more voice services. In some embodiments, the classification is for one or more text messages. In some embodiments, the classification is for one or more content types. In some embodiments, the classification is for roaming services. In some embodiments, the classification is for home cellular services. In some embodiments, the classification is for Wi-Fi services. In some embodiments, the classification is for one or more QoS levels or one or more QoS types. In some embodiments, the classification is for one or more traffic types. In some embodiments, the classification is for one or more time periods. In some embodiments, the classification is for one or more geographic areas or physical locations. In some embodiments, the classification is for one or more application types. In some embodiments, the classification is for one or more websites. In some embodiments, the classification is for one or more website types. In some embodiments, the classification is for one or more of voice, text, data, gaming, video, browsing, chat, shopping, maps, audio, etc.
In some embodiments, a network system obtains a secondary device access credit indication for a classification of service from a master account holder user interface (UI), the classification of service less than all services available to device 100. In some embodiments, the master account holder UI is located on a master device (e.g., Master Device 100A). In some embodiments, the master account holder UI comprises a website.
Enhanced Curfews
In some embodiments, a master user (alternatively or in addition denoted herein as a subscriber, a manager user, user group master, an owner, or an account holder) manages (wherein “manages” comprises one or more of: sets, defines, controls, monitors, notifies, acknowledges) a curfew on at least a portion of a service plan (comprising one or more service activities, such as browsing, texting, email, video streaming, etc., or other activities associated with one or more devices 100 and/or one or more users (or subscribers) associated with the one or more devices 100, such as application or game usage) for one or more other devices 100 associated with a device group (wherein the device group may be defined by a service plan, a service account, a shared allocation group, a device agent grouping, device pairing, etc.), a user group, or both a device group and a user group. In some embodiments, a master user manages a curfew from a master device (e.g., Master Device 100A). In some embodiments, a master user manages a curfew from a child or secondary device (e.g., Secondary Device 100B) after sharing a master user credential. In some embodiments, the master user manages a curfew from a master device after sharing a master user credential. In some embodiments, the master user manages a curfew for a device associated with the master user, for example a master device. In some embodiments, the device group has more than one master user (e.g., both parents of a family plan). In some embodiments, the curfew is based on the union of the more than one master user management. In some embodiments, the curfew is based on the latest master user management. In some embodiments, the master users are organized by a hierarchy or by tiers, and the master user management is based on the hierarchy (e.g., one parent of a family plan may set a curfew and the other parent of the family plan may or may not be allowed to override it).
In some embodiments, it may be more convenient for the curfew manager to select a common selection for all the devices by setting “Select All Devices” (e.g., if the whole family is having or about to have dinner, a master user may select “Dinner” in the “Select All Devices” drop down menu). In some embodiments, a master user selection may take place real time (or alternatively in near-real time or quasi real-time). In some embodiments, real time includes the actions associated with the master user management taking effect within a few minutes of being set by the master user. In some embodiments, real time includes the actions associated with the master user management taking effect in less than a minute after being set by the master user. In some embodiments, real time includes the actions associated with the master user management taking effect in less than a few seconds after being set by the master user. In some embodiments, the master user selection takes place in real time after the master user selects the “OK” button (e.g., through a touch screen or a voice command). In some embodiments, the “Master Device Curfew settings” menu (or alternatively: presentation, display, screen, window, or portal, etc.) may be used by a master user to check the curfew status of one or more devices. In some embodiments the “Master Device Curfew settings” presentation (or alternatively: display, screen, window, or portal, etc.) may be used by a master user to change a previously selected curfew status of one or more devices (or one or more users). In some embodiments, the “Master Device Curfew settings” presentation (or alternatively: display, screen, window, or portal, etc.) may be used by a master user to end the curfew status of one or more devices (e.g., by changing the selected setting for “Child Device A” from “Dinner” to “None” and selecting “OK,” or alternatively one or more of: “Accept,” “Yes,” “Start,” “Curfew Now,” “Curfew Start,” “Time-out,” or “Time-out Now”).
In some embodiments, the master user desires to manage time events for a curfew.
In the illustration of
In some embodiments, a curfew selection may manage new (or alternatively un-initiated, future, or un-started) service activities. For example, a curfew selection may manage calls, texts, or browsing that may be attempted or desired at a future time after the curfew has been set (e.g., a real-time curfew selection). In some embodiments, a curfew selection may manage ongoing (or alternatively in progress or initiated, or started) service activities. For example, a curfew selection may manage calls, texts, browsing, app or usage that may be ongoing prior to when the curfew has been set (e.g., a real-time curfew selection after a child device has initiated a phone call or is in the middle of using an app or playing a game). In some embodiments, it may be desirable to select (e.g., from a list of preset or custom settings) management actions to be taken on ongoing activities. In some embodiments, managing an ongoing activity may include one or more of: locking the device, pausing the device, powering down the device, disabling a UI of the device, terminating a service activity, or providing a notification to be presented to a user regarding the ongoing service activity. In some embodiments, managing an ongoing activity may include a plurality of activities, such as presenting a notification to a user of a child device followed by pausing/terminating the service activity. In some embodiments, the pausing/terminating is delayed relative to the notification.
In some embodiments, a user (e.g., a master user) may select common management actions for several activities (e.g., for faster enforcement, to save setting time or simplify selections). In the illustration of
In some embodiments, a user (e.g., a master user) may define a custom (or alternatively, or in addition, a new) curfew management mode, for example to complement one or more preset curfew management modes.
In some embodiments a user of one or more devices of the device group (e.g., a master user of the master device) may provide additional (or alternatively referred to within as advanced or enhanced) curfew settings. In some embodiments, the additional curfew setting comprise one or more of: locations included or excluded (or alternatively called allowed or disallowed; or whitelisted or blacklisted), location changes (or alternatively or in addition: location variation, change of location, speed, velocity, location positioning, etc.) included or excluded, device state included or excluded, network state (e.g., networks available, quality of network connection, cost of network usage, state of service plan, etc.) included or excluded, device connectivity state (e.g., which of the one or more modems are enabled or disabled).
In the embodiment illustrated in
In some embodiments, it may be advantageous to provide messages (also referred to within as notifications) to a device (e.g., a child device) based on curfew management activities, events, etc., for presentation to a user interacting with the device under curfew. In some embodiments, it may be advantageous for a user interacting with the device associated with a curfew to accept (also referred to within as acknowledge) a least a portion of the notifications received. In some embodiments, notifications may be customized (or selected from a list of preset messages) by a master user (e.g., at a master device) prior to communication to the device under curfew.
In some embodiments, the curfew is associated with a child user (or some other user of the device group or user group) and a curfew notification (or some other curfew management) could be communicated to one or more devices associated with the child user (e.g., the child may be using more than one device, or may switch from a first device to a second device during the curfew). In some embodiments, a notification is presented at a curfew-managed device in real-time. In some embodiments, a notification is presented at a curfew-managed device at a later time based on an event (e.g., a child device may not be in use at the time curfew is initiated, but is attempted to be used at a later time during the curfew enforcement and the notification is presented at that time).
In some embodiments, the curfew is associated with a child user (or some other user associated with the device group or user group) and the curfew management (e.g., control) could be associated to one or more devices associated with the child user (e.g., the child may be using more than one device during the curfew, or may switch from a first device to a second device during the curfew). In some embodiments, a user (e.g., a child user) interacts with different devices during the time the curfew is in effect, and the curfew management is adapted based on the user interactions with one or more of the different devices over time.
In some embodiments, the curfew device group (or user group) is based on a service account (e.g., a wireless access account, a family share account, a shared usage allocation account, a SMB account, an enterprise account, etc.). In some embodiments, the curfew device group is based on a service plan (e.g., a wireless operator, service provider, mobile wireless operator, MVNO, etc.). In some embodiments, the curfew device group is based on an access network (e.g., the devices associated with a home WLAN). In some embodiments, a curfew device group is based on two or more of: a service account, service plan, access network. In some embodiments, a curfew device group is based on a device agent (e.g., an OS function, service processor, app, mobile operator app, third-party app, etc.) on the device group. For example, the device agent could be an application that is installed on each device in the device group (e.g., with a special credential assigned to the device group) and optionally at least one of the devices has an additional capability based on the application that allows it to be the curfew manager. In some embodiments, a first device of the curfew device group is part of a first service account (or a first service plan, or a first mobile operator, or a first service provider) and a second device of the curfew device group is part of a second service account (or a second service plan, a second mobile operator, or a second service provider). In some embodiments, a first device of the curfew device group is part of a first service account (or a first service plan, or a first mobile operator, or a first service provider) and a second device of the curfew device group is part of a second service account (or a second service plan, a second mobile operator, or a second service provider) and device 100A and device 100B are associated to a device group based on a device agent (e.g., an application) or a website, portal or a third-party device group provider (not associated with the mobile operator, wireless service provider). In some embodiments, the curfew device group (or user group) is based on a common operating system (e.g., two or more devices in the device group are based on Android, iOS, etc.), for example assisted by an OS function, service processor or application and optionally a device group credential. In some embodiments, the master device is not part of the device group and the master device manages the devices (or users associated to devices) based on a website, portal or a third-party device group provider (e.g., not associated with the mobile operator, wireless service provider). For example, the device group may only include child devices or devices associated to child users. In some embodiments, the device group is based on one or more credentials that enable a master user (e.g., on a device with network access or device-to-device communication) to configure a device agent on the device under curfew.
In some embodiments, the curfew user group is based on a service account (e.g., a wireless access account, family share account, a shared usage allocation account, a SMB account, an enterprise account, etc.). In some embodiments, the curfew user group is based on a service plan (e.g., a wireless operator, service provider, mobile wireless operator, MVNO, etc.). In some embodiments, the curfew user group is based on an access network (e.g., the users interacting with devices communicating with a home WLAN). In some embodiments, a curfew user group is based on two or more of: a service account, service plan, access network. In some embodiments, a curfew user group is based on a device agent on the device group. For example, the device agent could be an application installed on the device configured to obtain a user credential associated with the device group (e.g., with a special credential assigned to the user group) and optionally at least one of the users has additional capabilities based on the user credential that allows him/her to be the curfew manager.
In some embodiments, a curfew group comprises a combination of one or more devices and one or more users (e.g., a curfew group may comprise a master device, two child devices, a master user, and a child user).
In some embodiments, curfew management and/or enforcement (e.g., a curfew control policy) is implemented (or is assisted by) at least in part by one or more network elements or a network system (e.g., a service controller or a DPI server inspecting data communications associated with a device under curfew). In some embodiments, curfew management (e.g., a curfew control policy) is implemented (or is assisted by) at least in part by a device under curfew (e.g., one or more device agents such as an OS function, service processor, app, mobile operator app, third-party app, etc.). In some embodiments, curfew management (e.g., a curfew control policy) is implemented (or is assisted by) at least in part by one or more network elements and at least in part by a device under curfew. In some embodiments, a master user (e.g., from a master device) provides management information to a network element (e.g., via a website, portal, or entering information into a third-party server) for assistance in enforcing (e.g., control, monitoring, notification) the curfew. In some embodiments, a master user (e.g., from a master device) provides management information to a network element (e.g., via a website, portal, or entering information into a third-party server) which communicates with a device agent on the device under curfew for assistance in enforcing (e.g., controlling, monitoring, notifying) the curfew.
In the illustrations of
In some embodiments, a user may provide input to manage a statistic associated with the device activities (e.g., a time or usage limit, a time or usage maximum, a usage, a percentage of usage, or any prior parameter normalized per unit of time). In some embodiments, a user may provide input to manage a statistic associated with the device activities and information associated with the statistic is shared with a device under curfew by a curfew notification.
In the illustrations of
In some embodiments, additional (or alternatively or in addition enhanced or optional) curfew notification messages may be generated by a master user/device and received by a child user/device. In some embodiments, curfew notification messages are associated with termination of activities that were ongoing prior to a change of curfew management (e.g., a real-time curfew management to enter “Dinner” mode when a child device has an active app session).
In some embodiments, a user or device (e.g., a child or significant other, or a child device) under curfew or to be curfewed or to be offered a curfew could be given an option to accept (alternatively referred to herein as an OK, ACK, acknowledge, Yes, etc.) the notification (and alternatively or in addition accept management associated with the curfew notification) or request a change in the curfew management. In some embodiments, the request for a change in the curfew management may include requesting an extension prior to the curfew taking effect (e.g., relative to a current time or real-time enforcement).
In some embodiments, a curfew service activity usage management characteristic (e.g., a limit, a maximum amount, a maximum amount per unit of time, or a percentage) comprises aggregating the usage over a plurality of devices. In some embodiments, a user under curfew interacts with more than one device (e.g., a child table and a child smartphone) and a user (e.g., a child user) is managed based on the aggregated usage (e.g., a child having a five minute limit of app usage during a “Homework curfew” will not be allowed to play five minutes on a smartphone followed by another five minutes on a tablet). In some embodiments, the aggregation of usage over more than one device may account for simultaneous usage during a curfew management. For example, if a child is allowed to have five minutes of audio streaming and five minutes of surfing during a “Homework” curfew, if the child's audio streaming partially overlaps with the child's five minutes of surfing, at least a portion of the first or second five minute allocations may be reduced or not accounted for. In some embodiments, activities are grouped (or alternatively or in addition classified, tiered, ranked, etc.) for assisting in managing a curfew. In some embodiments, a plurality of activities are grouped and a service usage management characteristic is managed for the group of activities. For example, the three service activities: apps/games, browsing and video streaming may be grouped into the category “get a break” and a limit of usage may be applied on the group (e.g., a maximum of 10 min/hr of activities from the “get a break” group during a “Homework” curfew mode, and the aggregate of apps/games, browsing and video streaming should be limited to ten minutes of each hour—which may or may not include discounts for overlapping activities).
In some embodiments, a master curfew management communication (e.g., from a master device or based on information provided by a master user onto any device from the group) to a particular device or a device associated with a particular user (e.g., a child device or a device a child user is engaging with) originates or terminates at a device agent (e.g., an app, OS function, service processor at the master device or child device). In some embodiments, a master curfew management communication comprises at least: control information, notification information, and acknowledgement information. In some embodiments, a master curfew management assists in providing a device agent (e.g., an app) to particular device (e.g., a child device). In some embodiments, a master curfew management communication from a device to a particular device or a device associated with a particular user is communicated over a device-to-device link, such as near field communication (NFC), ad hoc Wi-Fi, Bluetooth, Zigbee, etc. In some embodiments, a master curfew management communication from a device to a particular device or a device associated with a particular user is communicated over a local area network (LAN), such as a wireless local area network (WLAN), Wi-Fi, etc. In some embodiments, a master curfew management communication from a device to a particular device or a device associated with a particular user is communicated over a wide area network (WAN), such as WWAN, cellular, etc. In some embodiments, a master curfew management communication from a device to a particular device or a device associated with a particular user is communicated over a combination of access networks (e.g., a master device communicating over Wi-Fi to a intermediate networking device communicating over a cellular network to a child wireless device). In some embodiments, a master curfew management communication from a device to a particular device or a device associated with a particular user is communicated over a limited access network (e.g., the curfew control is only allowed in a home Wi-Fi network).
Enhanced Protection
In some embodiments, a master user (alternatively or in addition denoted herein as a subscriber, a manager user, user group master, an owner or an account holder) manages (wherein manages comprises one or more of sets, defines, controls, monitors, notifies, acknowledges) a protection on at least a portion of a service plan (e.g., comprising one or more service activities, such as browsing, texting, email, video streaming, etc. or other activities associated with one or more devices and/or one or more users (or subscribers) associated with the one or more devices, such as app/games usage) for one or more other devices associated with a device group (wherein the device group may be defined by a service plan, a service account, a shared allocation group a device agent grouping, device pairing, etc.) or a user group or both a device group and user group. In some embodiments a master user manages a protection from a master device. In some embodiments, a master user manages a protection from a second device after sharing a master user credential. In some embodiments the master user manages a protection from a master device after sharing a master user credential. In some embodiments, the master user manages a protection for a device associated with the master user, for example a master device. In some embodiments, the device group has more than one master user (e.g., both parents of a family plan). In some embodiments, the protection is based on the union of the more than one master user management. In some embodiments, the protection is based on the latest master user management. In some embodiments, the plurality of master users is grouped by a hierarchy or tiers, and the master user management is based on the hierarchy (e.g., one parent may set a protection and another parent may or may not be allowed to override it). In some embodiments, the protection is used to prevent a user of a user group (e.g., a child) from accessing inappropriate content (e.g., adult or violent content) or to prevent the user from establishing connections (e.g., phone/video conversations, exchanging texts, social networking) with inappropriate individuals.
In some embodiments, at least one of the embodiments described above associated with a curfew may be applied to a protection. In some embodiments, at least one of the embodiments described above associated with curfew management may be applied to protection management. In some embodiments, at least one of the embodiments described above associated with applying/enforcing a curfew may be applied to applying/enforcing a protection.
In some embodiments, the “Master Device Protection settings” menu (or alternatively presentation, display, screen, window, or portal, etc.) may be used by a master user to check the protection status of one or more devices or one or more users. In some embodiments, the “Master Device Protection settings” presentation (or alternatively display, screen, window, or portal, etc.) may be used by a master user to change a previously selected protection status of one or more devices (or one or more users). In some embodiments, the “Master Device Protection settings” presentation (or alternatively display, screen, window, or portal, etc.) may be used by a master user to end the protection status of one or more devices or one or more users (e.g., by changing “Child Device A” or “Child A” from “PG 7” to “PG 12” and selecting “OK”).
In the illustration of
In some embodiments, a protection management (e.g., a state or mode) could be based on time events, such as a start time, end time, or duration (e.g., similar to
In some embodiments, a protection management comprises allowed (or alternatively or equivalently called whitelisted) activities and/or disallowed (or alternatively or equivalently called blacklisted or blocked) activities. In some embodiments, a protection management comprises monitored activities.
In some embodiments, a protection management comprises detecting an activity (e.g., a disallowed or monitored activity) and recording at least a portion of the activity. In some embodiments, information associated with the at least a portion of the activity is communicated with a master user (e.g., over a master device, website, portal, etc.). In some embodiments, at least a portion of a call, a text, a website, a streaming audio/video, social networking update is shared by a child device (e.g., a child based activity) to a master user (e.g., via a master device). In some embodiments, the master user may receive one or more of an email, a text, an audio/video stream, or a push notification containing information associated with the child device activity.
In some embodiments, the protection device group is based on a service account (e.g., a wireless access account, family share account, a shared usage allocation account, a SMB account, an enterprise account, etc.). In some embodiments, the protection device group is based on a service plan (e.g., a wireless operator, service provider, mobile wireless operator, MVNO, etc.). In some embodiments, the protection device group is based on an access network (e.g., the devices associated with a home WLAN). In some embodiments, a protection device group is based on two or more of: a service account, service plan, or access network. In some embodiments, a protection device group is based on a device agent on the device group. For example, the device agent could be an application installed on each device in the device group (e.g., with a special credential assigned to the device group) and optionally at least one of the devices has additional capabilities based on the app that allows it to be the protection manager. In some embodiments, a first device of the protection device group is part of a first service account (or a first service plan, or a first mobile operator, or a first service provider) and a second device of the protection device group is part of a second service account (or a second service plan, a second mobile operator, or a second service provider). In some embodiments, a first device of the protection device group is part of a first service account (or a first service plan, or a first mobile operator, or a first service provider) and a second device of the protection device group is part of a second service account (or a second service plan, a second mobile operator, or a second service provider) and device 100A and device 100B are associated with a device group based on a device agent (e.g., an app) or a website, portal, or a third-party device group provider (e.g., not associated with the mobile operator or wireless service provider).
In some embodiments, the protection user group is based on a service account (e.g., a wireless access account, family share account, a shared usage allocation account, a SMB account, an enterprise account, etc.). In some embodiments, the protection user group is based on a service plan (e.g., a wireless operator, service provider, mobile wireless operator, MVNO, etc.). In some embodiments, the protection user group is based on an access network (e.g., the users interacting with devices communicating with a home WLAN). In some embodiments, a protection user group is based on two or more of: a service account, service plan, or access network. In some embodiments, protection user group is based on a device agent on the device group. For example, the device agent could be an app installed on the device that is configured to obtain a user credential associated with the device group (e.g., with a special credential assigned to the user group) and optionally at least one of the users has additional capabilities based on the user credential that allows him/her to be the protection manager.
In some embodiments, a protection group comprises a combination of one or more devices and one or more users (e.g., a protection group may comprise a master device, two child devices, a master user, and a child user).
In some embodiments, protection management and/or enforcement (e.g., a protection control policy) is implemented (or is assisted by) at least in part by one or more network elements or a network system (e.g., a service controller or a DPI server inspecting data communications associated with a device under protection). In some embodiments, protection management (e.g., a protection control policy) is implemented (or is assisted by) at least in part by a device under protection (e.g., one or more device agents such as an OS function, service processor, or an app). In some embodiments, protection management (e.g., a protection control policy) is implemented (or is assisted by) at least in part by one or more network elements and at least in part by a device under protection.
In some embodiments, a master protection management communication (e.g., from a master device or based on information provided by a master user onto any device from the group) to a particular device or a device associated with a particular user (e.g., a child device or a device a child user is using) originates or terminates at a device agent (e.g., an app or OS function, service processor at the master device or child device). In some embodiments, a master protection management communication comprises at least control information, notification information, and acknowledgement information. In some embodiments, a master protection management assists in providing a device agent (e.g., an app) to a particular device (e.g., a child device). In some embodiments, a master protection management communication from a device to a particular device or a device associated with a particular user is communicated over a device-to-device link, such as a near field communication (NFC), ad hoc Wi-Fi, Bluetooth, Zigbee, etc. In some embodiments, a master protection management communication from a device to a particular device or a device associated with a particular user is communicated over a LAN, such as, WLAN, Wi-Fi, etc. In some embodiments, a master protection management communication from a device to a particular device or a device associated with a particular user is communicated over a WAN, such as, WWAN, cellular, etc. In some embodiments, a master protection management communication from a device to a particular device or a device associated with a particular user is communicated over a combination of access networks (e.g., a master device communicating over Wi-Fi to a intermediate networking device communicating over a cellular network to a child wireless device). In some embodiments, a master protection management communication from a device to a particular device or a device associated with a particular user is communicated over a limited access network (e.g., the protection control is only allowed in a home Wi-Fi network).
In some embodiments, the actions illustrated in one or more of
Device Group Management and Service Activity Control
In some embodiments, a device group manager (or alternatively, a “master” user, an administrator, a service account owner, a service account manager, a user/subscriber having administrative privileges, a user group manager, a “parent” for a “family” plan, a corporate IT manager for a corporate account, a service provider administrator) manages (defines, controls, administrates, etc.) a set of one or more service activity controls (e.g., restrictions, curfews) that apply to an individual device, a device group, a subset of a device group, a set of related devices, or a set of unrelated devices. In some embodiments, the service activity controls apply to any service activity, to a specific set of service activities, or to a single service activity for a device to which the service plan controls are administered. In some embodiments, service activity controls are referred to as service controls, device controls, service permissions, device permissions, curfews, service limits, service restrictions, or other equivalent terms. In some embodiments, permissions for a device or a user refers to properties for administrative control for which the device is configured or the user is assigned, and restrictions for a device or a user refer to specific service activity controls that restrict use or access of one or more service activities on the device or for the user when using a device. In some embodiments, the device group manager creates the set of one or more service activity controls to apply to any device within a device group (or other set of devices). In some embodiments, through a service design/management system, the device group manager configures properties of the service activity control. In some embodiments, the device group manager configures the service activity control through a user interface of a device belonging to the device group. In some embodiments, the device group manager configures the service activity control through an application on the device connected to an application server/portal located in a network system. In some embodiments, the device group manager configures the service activity control through a web-based interface to a web server communicatively coupled to (or part of) a network system. In some embodiments, the device group manager configures the service activity control using one or more operating system (OS) components resident on a device. In some embodiments, the device group manager configures service activity controls through a “master” device (or through any device while “logged in” as a “master” user to the device). In some embodiments, the device group manager configures service activity controls through a computing device separate from the device group, e.g., a personal computer, a tablet, a laptop, a terminal, etc.
In some embodiments, service activity control configurations are stored in a network-based service design/management system, in one or more devices of the device group, or in a combination of a network-based service design/management system and one or more devices of the device group. In some embodiments, service activity controls configured by the device group manager are stored in the network-based service design/management system and “pushed” or “pulled” to individual devices in the device group. In some embodiments, service activity controls configured by the device group manager are stored in the “master” device and “pushed” or “pulled” to other devices in the device group from the “master” device, either directly device-to-device, or indirectly through one or more network elements communicatively coupled between the “master” device and the “other” device. In some embodiments, service activity controls are configured by a first device group manager for a first device group and shared with a second device group manager for a second device group. In some embodiments, a service design/management system catalogs a set of pre-configured service activity controls. In some embodiments, the service design/management system adds “user configured” service activity controls to the catalog of service activity controls, e.g., with permission (or in some embodiments without permission) of the device group manager that configured the service activity control. In some embodiments, through one or more UI screens on a device, the device group manager selects, configures, customizes, and applies service activity controls to one or more devices. In some embodiments, the service design/management system provides all or part of information for the one or more UI screens. In some embodiments, the service design/management system provides information for UI screens that include a fully pre-configured service activity control, a partially pre-configured service activity control, or a “shell” for a fully customizable service activity control. In some embodiments, a set of pre-configured service activity controls are presented to the device group manager (e.g., through one or more UIs) organized according to properties of what is controlled, when the controls apply, alphabetically, according to a service type, or according to another “categorization” of service activity control. In some embodiments, the device group manager selects one or more “named” pre-configured service activity controls from a menu, list, drop down, array or other presentation of labels for the pre-configured service activity control catalog and applies the selected service activity controls to one or more devices.
In some embodiments, a device group manager, a network management system, and/or specific software/hardware elements on a device monitors and verifies integrity of software components (e.g., operating system elements, applications, etc.) for a device of a device group. In some embodiments, integrity of software and/or hardware settings for a device is checked, e.g., to determine whether one or more elements of the software and/or hardware settings have been tampered with (hacked into, corrupted, or otherwise altered outside of permissions allowed for the device). In some embodiments, a “time” setting for a device is verified against a reference time (e.g., a network-based time) to verify that time settings for the device are intact and correct. By verifying settings, the device group manager and/or service management system ensures (at least in part) that service activity controls that include time-based restrictions are properly applied for the device. In some embodiments, one or more device settings are overridden by the device group manager or the service management system to apply “correct” settings that correspond to service activity controls applied to the device. In some embodiments, service activity controls for applications are verified by the device group manager, the service management system, and/or by software/hardware elements on the device. In some embodiments, one or more application names and/or “security” certificates for applications are verified against a reference list, set, or file (on the device, in the network, or in a combination thereof). In some embodiments, applications stored on a device (or in network-based storage, e.g., an application store or a cloud server) to which service activity controls apply are periodically verified. In some embodiments, one or operating system components are checked to verify that the operating system components have not been tampered with. In some embodiments, a service processor on a device is checked to verify integrity of the service processor. In some embodiments, service policies (or portions thereof) stored on a device are verified. In some embodiments, the device group manager is provided access to device hardware/software integrity information. In some embodiments, the device group manager is alerted when integrity verification fails for one or more software and/or hardware elements of a device in the device group. In some embodiments, a network system administrator is notified when hardware and/or software integrity verification fails for a device. In some embodiments, one or more device agents in the device verifies integrity of one or more applications or operating system components, e.g., using credentials and/or security certificates. In some embodiments, tampering of an operating system component is detected, and an indication of tampering is provided to a device user, a device manager, a device administrator, a device group manager or other entity. In some embodiments, a device is disabled when tampering is detected. In some embodiments, a notification is provided to a device group manager indicating tampering of software/hardware of the device, and the device group manager selects actions to take. In some embodiments, the device group manager selects to restrict use of the device in response to the detection of tampering.
In some embodiments, a device group manager sets one or more notification alert limits for one or more devices in a device group. In some embodiments, the device group manager receives notification alerts according to limits set by the device group manager and/or limits automatically configured for a service activity, and/or limits set by a user of a device in the device group. In some embodiments, the device group manager sets limits for notifications that are presented to the device group manager and/or to a user of a device for a device in the device group. In some embodiments, a notification includes information about service usage for a particular service activity or set of service activities, e.g., for service usage of a particular service type according to a service plan. In some embodiments, service usage limits are based on specific service usage amounts or percentages used during a subscription time period, e.g., a recurring allocation for a service plan pre-paid or post-paid for a regular time period. In some embodiments, service usage limits are based on specific service usage amounts or percentages remaining for an allocation during a subscription time period. In some embodiments, the device group manager receives notifications according to service usage limits for an individual device, for a set of devices, and/or for all devices in a device group. In some embodiments, an individual service usage triggers a notification alert to a user of a device and/or to the device group manager. In some embodiments, an aggregated service usage (e.g., for one or more devices in a device group) triggers a notification alert to a user of a device, to a subset of devices in a device group, to all devices in a device group, and/or to the device group manager. In some embodiments, a notification alert provided to the device group manager includes an option to provide additional service usage allocation to a device, a set of devices, or the entire device group. In some embodiments, a notification alert provided to a user of a device includes an option to request additional service usage allocation for the device. In some embodiments, the request for additional service usage allocation from the user of the device is provided to the device group manager. In some embodiments, the device group manager approves or denies the request for additional service usage allocation to the requesting device/user. In some embodiments, the device group manager approves a different service usage amount from an amount requested by the requesting device/user.
In some embodiments, a device group manager sets a service activity control that restricts use of one or more particular applications or application types on a device. In some embodiments, an application is restricted by blocking communication of the application to and/or from a network, e.g., a browser application can be “not connected” to the network, even though a network can be available for communication to/from the device, e.g., for another “allowed” application. In some embodiments, a service activity control restricts an application by blocking use of the application on a device, e.g., an application can be restricted from launching and operating on the device. In some embodiments, a service activity control restricts download and/or upload of information for an application from a network. In some embodiments, a service activity control restricts download of one or more applications. In some embodiments, a restricted (limited) use of an application is allowed by a service activity control. In some embodiments, a service activity control restricts a service activity (e.g., use of an application) based on a particular time, e.g., always, during a specific time period (day, date, time of day, type of day, etc.) In some embodiments, a service activity control restricts use of, connections for, download of, or other uses of an application during a time period specified by a device group manager for a device, a group of devices, of an entire device group.
In some embodiments, a device group manager, e.g., through use of a “master” device in cooperation with a network-based server, determines one or more applications to which a service activity control applies. In some embodiments, the device group manager selects applications to which to apply service activity controls from a listing or by searching for one or more applications in an application store database, e.g., on a network-based server. In some embodiments, the device group manager identifies applications for service activity control by reviewing a “backup” copy of applications for one or more devices of a device group stored in a “cloud” based server. In some embodiments, the device group manager selects applications to which to apply service activity controls by obtaining a listing or search results for applications downloaded to and/or resident on a device of a device group. In some embodiments, the device group manager verifies credentials for applications of a device of a device group. In some embodiments, the device group manager verifies integrity of software/hardware elements of a device in a device group. In some embodiments, application restrictions are applied to “unverified” and/or “unverifiable” applications of a device in a device group. In some embodiments, only “verified” applications (or specified “verified” applications) are allowed and other applications for a device in a device group are blocked and/or otherwise restricted by one or more service activity controls defined by the device group manager. In some embodiments, a device group manager obtains information on verification of credentials for one or more devices in a device group. In some embodiments, when credentials for a device in a device group are not verified or verifiable, one or more service activity controls are applied to the device. In some embodiments, the device group manager obtains information on software/hardware integrity of software/hardware for one or more devices in a device group. In some embodiments, when the integrity of software/hardware of a device in device group indicates compromise, or otherwise when the device integrity is not confirmed, one or more service activity controls are applied to the device in the device group.
In some embodiments, the device group manager, through a master device, or logged as a “master” user to a device, or through an interface to a service management system (e.g., a website, application portal, or service management server), is presented information for applications available in an application store. In some embodiments, the device group manager selects a set of applications from the application store to which service activity controls for one or more devices in a device group are applied. In some embodiments, the device group manager accesses an application store, searches for one or more applications or sets of applications, and obtains a list of applications downloaded, accessed, or otherwise associated with one or more devices in a device group. In some embodiments, a set of applications are automatically populated in an interface screen presented to the device group manager, e.g., based on association with the device group or based on one or more search terms entered by the device group manager. In some embodiments, the device group manager accesses information for a set of applications downloaded to, resident on, or accessible from a device in the device group. In some embodiments, the device group manager obtains one or more security certificates (or other secure forms of verification) for the one or more applications of the device in the device group. In some embodiments, the device group manager obtains the security certificates for the applications from an application store (or other network-based server) and compares the network security certificates to security certificates for the applications resident on (and/or obtained from) the device in the device group. In some embodiments, the device group manager verifies an application's identity and failing verification applies service activity controls to the application. In some embodiments, the device group manager selects an application from a menu (e.g., based on information obtained from an application store), obtains an application security certificate from the application store, and sends the application security certificate to a device in the device group (directly from the application store, or indirectly from the application store to a device used by the device group manager and then to the device in the device group). In some embodiments, the device group manager obtains verification of the application from the device in the device group based on use of the obtained security certificate. In some embodiments, verification is performed by the device in the device group, by a device used by the device group manager, by a network-based verification system, or by a combination of these.
In some embodiments, the device group manager, through a master device, or logged as a “master” user to a device, or through an interface to a service management system (e.g., a website, application portal, or service management server), is presented information for applications of another device (e.g., a “secondary/child” device) in the device group. In some embodiments, the device group manager obtains information on certificates for applications from the secondary device, from a “primary” device of the device group, or from a network-based service management system (or other network-based server/database). In some embodiments, a set of applications for a secondary device is presented through a user interface to the device group manager, e.g., on a “primary” device or through another computing device connected to a device service management system. In some embodiments, the set of applications presented represent a set of available applications to download/install. In some embodiments, the set of applications presented represent a set of downloaded and/or installed applications for the secondary device. In some embodiments, the set of applications are presented with display options to enable or disable the applications for use on and/or download to and/or restrictions applied to the secondary device. In some embodiments, the device group manager applies service activity controls to one or more applications in the set of applications presented through a user interface of a master device (or device on which the device group manager is “logged in.”) In some embodiments, a set of “pre-selections” for service activity control of the applications is presented to the device group manager. In some embodiments, the set of “pre-selections” include particular service activity control settings to apply to one or more applications of the secondary device. In some embodiments, the set of “pre-selections” include a subset of the applications of the secondary device to which to apply one or more service activity controls. In some embodiments, an allowed/enabled/white list of applications is presented to the device group manager. In some embodiments, the device group manager creates an allowed/enabled/white list of applications for the secondary device. In some embodiments, the device group manager from a device service management system obtains recommendations for service activity controls of applications. In some embodiments, the device group manager applies all or part of the obtained recommendations for service activity controls to one or more applications of the secondary device. In some embodiments, the device group manager maintains control of a master white list for all devices in a device group. In some embodiments, the device group manager maintains individual white lists for applications for each device in a device group. In some embodiments, the device group manager transfers a white list from one device in the device group to another device in the device group. In some embodiments, the device group manager obtains recommended white lists (e.g., based on age groups or other categorizations) for users of secondary devices in the device group. In some embodiments, the device group manager enforces service activity controls for applications on secondary devices by applying a white list (e.g., selected from the recommended white lists) to one or more secondary devices in the device group. In some embodiments, only applications on a white list are allowed/enabled on a secondary device and other applications are restricted/disabled on the secondary device. In some embodiments, applications on a white list are always allowed/enabled irrespective of service activity controls applied to applications or otherwise applied on the secondary device. In some embodiments, the device group manager obtains a list of applications resident on, downloaded to, accessible to, or otherwise operable on one or more devices in the device group, e.g., on the master device, on a secondary device, on any device other than the master device, on any device with service management responsibilities for the device group, on a set of secondary devices in a device group. In some embodiments, the device group manager obtains information for applications, service activity controls, and/or white lists for the set of devices in a device group. In some embodiments, the device group manager defines an application group (a set of applications selected from those available to, resident on or otherwise operable on one or more devices of a device group). In some embodiments, the device group manager defines a service activity control for the application group. In some embodiments, the service activity control for the application group applies to one or more specific applications in the application group. In some embodiments, the service activity control applies to one or more devices in the device group that can use or attempt to one or more of the applications in the application group. In some embodiments, the service activity control is automatically applied to an application of an application group for any device (or for a specified set of devices) of a device group. In some embodiments, the device group manager defines an application group and a service activity control for applications of the application group. In some embodiments, the device group manager applies the service activity control to devices in the device group, and applications of the application group resident on the devices automatically are associated with the service activity control. In some embodiments, an application of the application group has a service activity control automatically applied when downloaded to a device in the device group. In some embodiments, one or more aspects of a service activity control apply to all applications in an application group and one or more additional aspects of the service activity control apply individually to different applications in an application group. In some embodiments, one or more aspects of a service activity control apply to all devices in a device group and one or more additional aspects of the service activity control apply individually to different devices in the device group.
In some embodiments, the device group manager applies a service activity control to disallow downloading of an application (or application group) from an application store for a device, a set of devices or an entire device group. In some embodiments, the device group manager applies a service activity control to restrict permissions to download one or more applications from an application store to one or more devices of a device group. In some embodiments, the application store maintains information about devices in a device group and permissions to download or otherwise access applications of the application store. In some embodiments, only a subset of applications available in an application store are presented to a secondary device in a device group, the subset of applications presented determined at least in part by a service activity control and/or by an application group defined by a device group manager. In some embodiments, the application store determines permission to display, download, and/or access an application to a secondary device based on information supplied from a device group manager. In some embodiments, the application store determines permission to display, download, and/or access one or more applications to a secondary device based on one or more policies, security certificates, credentials, security keys, or other secure information provided by the secondary device to the application store. In some embodiments, the application store requires presentation of a security certificate and/or a secure “log in” identity (or other permission information) from a user of a secondary device in order to display, download or access one or more applications of the application store. In some embodiments, a service activity control on the secondary device restricts the secondary device from downloading one or more applications. In some embodiments, the secondary device is restricted to downloading, launching, use of applications to a specific white list of applications provided by the device group manager. In some embodiments, the secondary device is restricted based on a service activity control that allows or disallows installing, launching and/or particular use of one or more applications based on particular restrictions defined by the device group manager for a device group to which the secondary device belongs. In some embodiments, software/hardware on the secondary device disallows or allows downloading, installation, launching and/or execution of applications based on one or more security certificates, security keys, application lists, a secure code, a hash signature, or other secure means. In some embodiments, a service activity control and/or integrity verification software/hardware on a device restricts execution of an application for a specific time period, for a recurring time period, for an indefinite time period (approximately now until otherwise changed), for a future time period, for specific days of the week, for specific types of days, for specific dates, or for combinations of these. In some embodiments, a service activity control restricts a network connection for one or more applications of a device. In some embodiments, network connection restrictions are implemented on the device. In some embodiments, network connection restrictions are implemented in one or more network elements. In some embodiments, network connection restrictions are implemented in a combination of software/hardware elements on the device and in one or more network elements. In some embodiments, a service activity control allows or disallows use of a device in its entirety. In some embodiments, a service activity control allows or disallows a subset of capabilities of a device. In some embodiments, time-based restrictions are combined with application-based restrictions on a device of a device group. In some embodiments, the device group manager defines one or more service activity controls as a combination of time-based restrictions and/or application-based restrictions directly through a user interface of a “master” device and/or through an interface to a network-based service management system.
In some embodiments, a device group manager defines and/or obtains one or more service activity controls, e.g., through an interface of a device and/or through an interface to a service management system, for a device group. In some embodiments, the device group manager defines or modifies properties of the one or more service activity controls, e.g., to what activity the service activity control applies, when the service activity control applies, to what extent the service activity control applies, etc. In some embodiments, the device group manager selects from a set of service activity controls and a set of devices in a device group to determine which service activity controls apply to which devices in the device group. In some embodiments, the device group manager associates one or more devices of the device group with one or more specific service activity controls. In some embodiments, through a user interface, the device group manager selects from a display of devices and service activity controls and associates specific service activity controls with specific devices of the device group. In some embodiments, the device group manager selects a specific device, a subset of devices, or all devices of a device group to which one or more service activity controls apply. In some embodiments, the device group manager defines a new device group (or a subset thereof) to which to apply service activity controls. In some embodiments, the device group manager applies service activity controls to an already defined device group (or to a subset thereof). In some embodiments, through the user interface, the device group manager obtains a display of devices of a device group, a set of service activity controls, and/or a set of service plans applicable for the devices of the device group. In some embodiments, the device group manager is presented selection buttons to apply a specific service activity control to a device group, a device, or a subset of devices of a device group. In some embodiments, the device group manager is presented selected buttons to apply a set of specific service activity controls to the device group, the device, or to the subset of devices of the device group. In some embodiments, the devices of a device group and a set of service activity controls are presented in a matrix, a table, a set of drop down menus, a spreadsheet, a listing, or an otherwise navigable grouping. In some embodiments, the device group manager is presented a set of devices, e.g., listed in a heading column or row and a set of service activity controls, e.g., listed in a corresponding heading row or column for a matrix/table. In some embodiments, the device group manager selects to enable or disable application of a particular service activity control to a particular device by selecting a button in a matrix/table element that represents the intersection of the particular service activity control with the particular device. In some embodiments, a set of devices for a device group and a set of service plans applicable to the devices in the device group are presented in a table/matrix format, and the device group manager selects whether to apply one or more service activity controls to particular combinations of service plans and devices in the device group. In some embodiments, the device group manager applies service activity controls to a particular service plan, a set of service plans, or to all service plans for a particular device. In some embodiments, the device group manager applies a particular service activity control to a particular device, a set of devices, or to all devices in a device group (the particular service activity control includes, in some embodiments, to which service plans the particular service activity control applies). In some embodiments, the device group manager is presented a set of service activity controls and a set of service plans for a particular device in the device group. In some embodiments, the device group manager associates particular service activity controls with particular service plans by selecting buttons (or other equivalent user interface constructs) for the particular device. In some embodiments, the device group manager obtains information for a set of service plans operable on (and/or available to operate on) a particular device. In some embodiments, the device group manager applies service activity controls to service plans for particular devices after the service plan is associated with the particular device. (In some embodiments, the service plan is a shared service plan associated with multiple devices in a device group.) In some embodiments, the device group manager applies service activity controls to service plans before the service plan is associated with the particular device, e.g., through a service management system, and/or for a set of service plans associated with at least one device in the device group, and/or for a set of service plans associated with a “master” device (and/or “master” user) of the device group. In some embodiments, the device group manager assigns service plan controls for different types of devices in a device group (e.g., service plan controls vary for different devices depending on where a device sits in a hierarchy of service control for a device group.) In some embodiments, a parent/master/primary device/user (or a set of parent/master/primary devices/users) for a device group is associated with a first set of service activity controls, and a child/slave/secondary device/user (or set of child/slave/secondary devices/users) is associated with a second set of service activity controls. In some embodiments, a “new” or “added” primary device/user inherits the first set of service activity controls, while a “new” or “added” secondary device/user inherits the second set of service activity controls automatically when added to the device group.
In some embodiments, a catalog or library of service activity controls is maintained by and/or accessible to a device group manager in the master device, in local storage associated with the master device, in network storage, or in a service management system. In some embodiments, a device group manager defines a second service activity control by selecting a first service activity control from the catalog of service activity controls, modifying one or more properties of the first service activity control, naming the modified first service activity control as the second service activity control, and saving the second service activity control to the catalog/library of service activity controls. In some embodiments, a service activity control is a “named” object resident on a device in a device group. In some embodiments, the service activity control is enabled or disabled for a particular device in the device group. In some embodiments, the service activity control is associated with a user of a user group and transfers to a device in use by the user. In some embodiments, one or more service activity controls defined for a device or set of devices in a device group is applied to another device or set of devices in the device group. In some embodiments, a network-based service management system or device-based service management application provides one or more templates for service activity control definition and management. In some embodiments, service activity control templates are provided to the device group manager, e.g., for particular time periods with pre-defined properties. In some embodiments, the device group manager subsequently modifies/adjusts properties of the service activity control template to create a new service activity control for the device group.
In some embodiments, the device group manager is presented a set of devices, e.g., in a list, drop down menu, array, matrix, table, or other navigable set, with which to associate one or more service activity controls. In some embodiments, the device group manager selects a device to which to apply, define, or associate one or more service activity controls. In some embodiments, the device is represented through a user interface as a selectable object (e.g., a button) and by selecting the device, the device group manager is presented a list of service activity controls to apply, define, or associate with the device. In some embodiments, the device group is presented a set of service activity controls, e.g., in a list, drop down menu, array, matrix, table, or other navigable set, with which to associate one or more devices in a device group. In some embodiments, the device group manager selects a service activity control to which to apply, define, or associate with a device in a device group. In some embodiments, the service activity control is represented through a user interface as a selectable object (e.g., a button) and by selecting the service activity control, the device group manager is presented a list of devices in the device group with which to apply, define, or associate the service activity control. In some embodiments, a set of devices of a device group and a set of service activity controls are presented in a table with selectable objects to associate one or more particular service activity controls with one or more devices of the device group.
In some embodiments, the device group manager obtains a set of pre-defined service activity controls with properties for when the service activity control applies (time period based) and what the service activity controls (application, service activity, service type based). In some embodiments, a service activity control includes restrictions/limits on when the service activity is allowed/blocked, what service activities are allowed/blocked, an amount of allowed service usage associated with particular service activities, or a combination of these properties. In some embodiments, the device group manager associates service activity controls listed through a user interface to various devices in a device group, e.g., by selecting/checking devices of the device group to which each/one/several/all of the service activity controls applies. In some embodiments, a list of devices is presented through a user interface to the device group manager in combination with a list of service activity controls and a set of “checked” boxes/buttons that indicate which service activity controls apply to which devices of a device group. In some embodiments, the device group manager selects a box/button to enable/disable to particular service activity control association with a particular device of a device group. In some embodiments, the device group manager selects a particular service activity control, which highlights or otherwise indicates a list of devices of a device group to which the service activity control applies or may be applied. In some embodiments, all devices, or a pre-defined subset of devices of a device group, are associated with a service activity control based on a single button/box selection (one-click association). In some embodiments, the device group manager selects a service activity control and then selects each device to which to apply the service activity control. In some embodiments, the device group manager selects a device and then selects one or more service activity controls to associate with the device.
In some embodiments, user interface constructs, as described herein and in other applications incorporated by reference herein, for associating service activity controls with devices of a device group also apply to associating service plans with devices of a device group, e.g., assigning and or sharing service plans between one or more devices in a device group. In some embodiments, the device group manager selects an association of a device in a device group with a service plan in order to share/assign the service plan with the device. In some embodiments, a set of devices in the device group and a set of service plans are presented through a user interface (on a device or through a separate computing device/terminal) to the device group manager. In some embodiments, the device group manager selects a particular service plan and then selects a set of devices of a device group with which to share/assign the particular service plan. In some embodiments, relationships of devices in a device group and service plans for a device group are represented by a matrix, table, or other navigable array through a user interface to the device group manager. In some embodiments, information on service activity controls for service plans are also represented on the same display. In some embodiments, service usage allocations for a service plan are represented on the display. In some embodiments, service usage allocation sharing/assignments to different devices of a device group (e.g., for a “shared” service plan having an aggregate total allocation of service usage for the device group) for a particular service plan is displayed. In some embodiments, the device group manager re-allocates service usage allocations for one or more service plans through a user interface.
In some embodiments, a secondary device in a device group requests an allocation (or generically to “share”) a particular service plan. In some embodiments, the device group manager receives a notification of the request from the secondary device (directly device-to-device or indirectly device-to-network element-to device). In some embodiments, the device group manager approves a request for sharing a service plan with the secondary device. In some embodiments, the device group manager approves service plan sharing through a master device, while logged in as a master user on a device, or through a service management system. In some embodiments, the device group manager receives or otherwise obtains a notification that indicates a request from the secondary device to share the particular service plan. In some embodiments, the notification includes an option to approve and/or an option to disapprove sharing the service plan with the secondary device. In some embodiments, the notification includes an option to modify the request to share the service plan with the secondary device. In some embodiments, the notification includes an option to approve select aspects of the request to share a service plan with the secondary device. In some embodiments, the secondary device requests a first allocation for sharing of a service plan, and the device group manager approves a second allocation for sharing of the service plan, e.g., (an amount approved differs from an amount requested.)
In some embodiments, a device that is not associated with a device group sends a request to “join” a device group. In some embodiments, a device group manager approves requests of a device to “join” a device group. In some embodiments, the device group manager applies a set of service activity controls and/or a set of service plans to the new device that joins the device group. In some embodiments, a device group manager sends in “invite” to another device to join the device to a device group. In some embodiments, the new device approves joining the device group, e.g., through a user interface on the secondary “new” device invited to join the device group. In some embodiments, a device group manager invites a device to “share” an allocation of a service plan (or be associated with a service plan). In some embodiments, a user of the secondary device to which the invitation to share the allocation is sent approves sharing the service plan. In some embodiments, a secondary device is associated with a first service plan, and subsequent to sharing a second service plan, e.g., in response to an invitation to share the second service plan, the secondary device is associated with both the first service plan and the second service plan. In some embodiments, the secondary device is associated with a first service plan, and subsequent to sharing a second service plan, the secondary device is associated with the second service plan and disassociated from the first service plan.
In some embodiments, a device group manager assigns and/or shares a service plan with one or more other devices in a device group. In some embodiments, the device group manager is presented a set of service plans and a set of devices of a device group through a user interface and selects to which devices in the device group to share one or more of the service plans. In some embodiments, the device group manager shares and/or assigns a service usage amount of a service plan to one or more devices of a device group. In some embodiments, the service usage amount refers to a quantifiable amount of service usage associated with an aspect of the service plan. In some embodiments, the service usage amount represents a time amount (e.g., minutes of voice service), a data amount (e.g., megabytes of data usage), or a usage count (e.g., number of messages in/out). In some embodiments, the device group manager assigns and/or shares a service usage “currency” with one or more devices of a device group. In some embodiments, service usage “currency” refers to actual currency units (e.g., dollars) and/or virtual currency units (e.g., service credits). In some embodiments, service usage “currency” applies to particular service plans, particular applications, or particular service activities for the device in the device group. In some embodiments, the device group manager assigns/shares a portion of a service plan with another device in the device group. In some embodiments, a service plan includes a plurality of service activities, and the device group manager shares/assigns a subset of service activities of the service plan with one or more devices of the device group. In some embodiments, a service plan includes a plurality of service usage amounts for different service activities, and the device group manager shares/assigns a subset of the service usage amounts for one or more of the different service activities of the service plan with one or more devices in the device group. In some embodiments, the device group manager shares a combination of service plan service activities, service plan service usage amounts, and service usage “currency” with one or more devices of a device group. In some embodiments, the device group manager shares/assigns a service usage amount for a particular time period to a device in the device group. In some embodiments, the device group manager shares/assigns a service plan, a service usage amount, a service usage “currency,” or a combination of these to a device outside of a device group. In some embodiments, the device group manager shares/assigns a portion of a “shared” service plan to a device that is not associated with the “shared” service plan. In some embodiments, the device group manager allows use of a portion of a “shared” service plan with a device that is not associated with the “shared” service plan or outside a device group managed by the device group manager for a specific purpose and/or a specific time period. In some embodiments, the device group manager shares a portion of a service plan, a service usage amount, a service usage “currency,” or a combination of these with a user of a device in the device group that can then use the “shared” service plan on a device that is not associated with the device group.
In some embodiments, a device group manager of a device group defines an allowed/enabled/white list for a device in a device group, a subset of devices in the device group, or the entire device group. In some embodiments, the device group manager obtains a representative allowed/enabled/white list from a service management system. In some embodiments, the device group manager obtains a particular allowed/enabled/white list from another device, e.g., in the device group or from another device group. In some embodiments, the device group manager modifies an obtained allowed/enabled/white list. In some embodiments, the allowed/enabled/white list applies to a set of contacts to and/or from which a device can communicate, e.g., using an application or other service capability of the device. In some embodiments, contacts include individuals, users, devices, user groups, device groups, or other sets of devices/users. In some embodiments, a device number, a telephone number, an email address, a messaging identifier, or other unique identifier by which the device can communicate using a voice, messaging, or data application specifies a contact. In some embodiments, the device group manager defines an allowed/enabled/white list of contacts for a device in a device group by selecting a particular set of contacts from a list of contacts available in the device, in a service management system, in a master device, associated with the user of the device, or associated with a master user. In some embodiments, the device group manager selects one or more contacts for an allowed/enabled/white list by entering information in a search field through a user interface, e.g., on the device or through a separate computing device. In some embodiments, a set of one or more candidate contacts for the allowed/enabled/white list is presented through the user interface dynamically as the device group manager enters information in the search field (e.g., automatically populate based on a portion of a search string entered). In some embodiments, the device group manager selects one or more of the presented contacts to add to the allowed/enabled/white list of contacts. In some embodiments, the device group manager defines the allowed/enabled/white list of contacts based on a set of contacts in the device, e.g., all contacts in the device and/or a specific subset of contacts in the device. In some embodiments, the device group manager defines the allowed/enabled/white list of contacts based on a set of contacts in the master device, e.g., all contacts in the master device or a set of contacts in the master device. In some embodiments, the device group manager defines an allowed/enabled/white list of contacts by collecting a set of contacts from one or more devices in the device group. In some embodiments, the device group manager defines an allowed/enabled/white list of contacts by editing a collated set of contacts obtained from one or more devices in the device group. In some embodiments, the device group manager enters one or more contacts directly to define the allowed/enabled/white list of contacts. In some embodiments, the device group manager retrieves one or more contacts for the allowed/enabled/white list from a network based system, e.g., from a “cloud-based” server. In some embodiments, a network-based service (cloud service) provides a set of contacts for an allowed/enabled/white list to the device group manager. In some embodiments, the device group manager edits the set of contacts obtained from the network-based service to define an allowed/enabled/white list for the device in the device group. In some embodiments, a set of emergency services contacts are automatically loaded to an allowed/enabled/white list for a device in the device group. In some embodiments, a set of contacts for the device group (e.g., a family group, corporate group, user group) is automatically loaded to the allowed/enabled/white list for a device in the device group. In some embodiments, a set of contacts included in an allowed/enabled/white list is automatically determined based on a geographic location and/or a network type and/or a specific network and/or a set of network types/networks available for use by the device. In some embodiments, a set of contacts included in an allowed/enabled/white list is downloaded from a service management system. In some embodiments, the device group manager specifies a geographic location or specific network for the device (e.g., for future travel) and obtains a set of contacts for the specified geographic location or specific network for the device. In some embodiments, contacts on an allowed/enabled/white list can be communicated with irrespective of service activity controls applied to one or more service plans of a device in the device group. In some embodiments, a subset of service activities available to a device in the device group is available for communication with contacts on an allowed/enabled/white list, e.g., voice communication only, messaging only, email only, etc. In some embodiments, a service plan control blocks a specific set of service activities but allows other service activities for contacts on an allowed/enabled/white list. In some embodiments, outgoing calls, messages, and/or emails are blocked for a device including members of an allowed/enabled/white list, while incoming calls, message, and/or emails are allowed for the device. In some embodiments, incoming calls, messages, and/or emails are blocked for a device including members of an allowed/enabled/white list, while outgoing calls, message, and/or emails are allowed for the device. In some embodiments, the device group manager defines a disallowed/disabled/black list of contacts with which the device is not able to communicate by voice, message, and/or email. In some embodiments, the device group manager is notified when a device in the device group communicates with a contact that is not on an allowed/enabled/white list of contacts. In some embodiments, notifications are provided for voice, messaging, and/or email received by or transmitted from a device in the device group to a contact that is not in the allowed/enabled/white list of contacts. In some embodiments, the device group manager obtains both a notification and at least a portion of a voice, message, or email communication received from or transmitted to a contact that is not in the allowed/enabled/white list of contacts. In some embodiments, the device group manager obtains a notification of an attempted communication between a device in the device group and a contact that is not on an allowed/enabled/white list of contacts. In some embodiments, the device group manager controls one or more subsequent actions possible from the device in response to the notification. In some embodiments, the notification includes a request for approval from the device group manager for communication to the contact that is not on the approved/enabled/white list. In some embodiments, the device group manager approves the communication in response to the notification, and the device subsequently is allowed/enabled to communicate with the contact that is not on the approved/enabled/white list. In some embodiments, the device group manager restricts the available communication methods and/or times for communication with contacts that are not on the approved/enabled/white list. In some embodiments, the device group manager receives a portion of voice content for incoming or outgoing voice connections by a device in the device group with a contact that is not on the approved/enabled/white list. In some embodiments, the device group manager receives a portion of message content for incoming or outgoing message connections by a device in the device group with a contact that is not on the approved/enabled/white list. In some embodiments, the device group manager receives a portion of email content for incoming or outgoing communication by a device in the device group with a contact that is not on the approved/enabled/white list.
In some embodiments, the device group manager applies service activity controls on a device through communication between an application on a primary/master device and a device agent on a secondary/child device. In some embodiments, the device group manager applies service activity controls on a device through communication between the application on the primary/master device to a network element (e.g., a server) and then to a device agent on the secondary/child device. In some embodiments, the network element is a service controller. In some embodiments, the device group manager applies service activity controls on a device through communication from an application on the primary/master device to a network-based server that controls service activities of the secondary/child device using network resource management. In some embodiments, service activity controls are managed by a combination of device-based controls and network-based controls. In some embodiments, the device group manager accesses in real time or near real time a state of service activity control for one or more devices in a device group. In some embodiments, the device group manager obtains information about service activity control settings using an application on the primary/master device. In some embodiments, the device group manager obtains the information about service activity control settings from a network-based server.
In some embodiments, a device group manager (e.g., a user with device administrative privileges) transfers a device from a first service account to a second service account through a user interface, e.g., on a master device, logged in as a master user on a device, or through an interface to a service management system. In some embodiments, the device group manager manages a device group that includes only one device (e.g., as an administrative user of a particular device.) In some embodiments, the device group manager transfers the device in a device group to another device group. In some embodiments, the device group manager transfers the device an initial, temporary, or ambient services account to a subsequent, permanent, or particular services account. In some embodiments, the device group manager transfers the device from a pre-activation service account to a post-activation service account, e.g., as part of an activation process for the device. In some embodiments, a user of a device transfers a device from one service account to another service account. In some embodiments, through a user interface of a device, the device is transferred from one service account to another service account. In some embodiments, during an activation process, the device is transferred from a temporary activation account to a permanent service account. In some embodiments, the device is transferred from an individual service account to a shared service account (e.g., a service account associated with a device group). In some embodiments, the device is transferred from an individual service account to a family service account. In some embodiments, the device is transferred from a family service account to an individual service account. In some embodiments, the device is transferred from an individual service account to a corporate service account. In some embodiments, the device is transferred from a corporate service account to an individual service account. In some embodiments, the device is transferred from a first service account to a second service account created directly from the device. In some embodiments, through a user interface of the device, the device is transferred from one account to another account. In some embodiments, a new or different service account is created “on the fly” from the device, and the device is subsequently transferred from a temporary account (or from “no account”) to the created service account. In some embodiments, a device group manager creates a service account through a master device, or logged in as a master user or through a service management system in preparation for transfer of one or more devices to the created service account. In some embodiments, the device group manager subsequently associates one or more devices with the service account, e.g., directly through the interface of the devices being associated with the service account. In some embodiments, a service account is associated with one or more service plans. In some embodiments, through a user interface of a device (e.g., a master device or through a child device), a device group manager (or a device user) transfers a device from one service plan to another service plan in a service account with which the device is associated. In some embodiments, a device group manager (or a device user) transfers service plans between service accounts. In some embodiments, devices associated with service plans automatically transfer from one service account to another service account accompanying the transfer of service plans between service accounts. In some embodiments, when a device transfers from one service account to another service account, service plans associated with the device also transfer from the one service account to another service account.
In some embodiments, a device group manager defines a service activity control for an application through a user interface of a first device, e.g., a first device of a device group. In some embodiments, a user interface screen is displayed to the device group manager on device 100A. In some embodiments, the user interface screen includes a field in which the device group manager enters (or searches for) an application identifier. In some embodiments, the user interface screen includes options for a user preference associated with the service activity control for the application. In some embodiments, an application credential associated with the application identifier is determined, e.g., by device 100A, by a network system, or by a combination of device 100A and a network system. In some embodiments, one or more service activity control policy instructions for the application are determined based on the user preference. In some embodiments, the one or more service activity control policy instructions for the application are determined by device 100A, by a network system, or by a combination of device 100A and a network system. In some embodiments, the application credential and the one or more service activity control policy instructions for the application are provided to a second device (e.g., device 100B). In some embodiments, the application credential and the one or more service activity control policy instructions for the application are provided directly from device 100A to device 100B. In some embodiments, a secure communication link is established between device 100A and device 100B through which the application credential and the one or more service activity control policy instructions are communicated between device 100A and device 100B. In some embodiments, the application credential and the one or more service activity control policy instructions are communicated from device 100A to device 100B through a network system. In some embodiments, device 100A communicates with the network system over a secure communication link. In some embodiments, device 100B communicates with the network system over a secure communication link. In some embodiments, the network system authenticates device 100A and/or device 100B before, after, or in conjunction with establishing secure communication links to device 100A and/or device 100B. In some embodiments, device 100B uses the application credential and the one or more service activity control policy instructions to apply the defined service activity control to the application on device 100B. In some embodiments, device 100B determines an attempt to download the application to device 100B. In some embodiments, device 100B determines the application is resident on device 100B. In some embodiments, device 100B determines the application (or a portion thereof) is installed on device 100B. In some embodiments, device 100B applies the service activity control for the application by enforcing at least a portion of the one or more service activity control policy instructions. In some embodiments, device 100B blocks the application from downloading to device 100B. In some embodiments, device 100B provides an indication to assist in presenting a notification to the device group manager (e.g., on device 100A). In some embodiments, device 100B blocks the application from starting on device 100B. In some embodiments, device 100B blocks the application from starting on device 100B during a particular time period. In some embodiments, device 100B blocks the application from communicating outside of (and/or within) device 100B. In some embodiments, time-based blocking is applied using the at least a portion of the one or more service activity control policy instructions. In some embodiments, indications to one or more other devices, users, device group managers are generated in response to determining an attempt to download, launch, use, or communicate with the application on device 100B.
In some embodiments, one or more service usage limits for a service activity are defined by a user of a device, a device group manager for a device, or by a system administrator. In some embodiments, a service usage limit defines a specific service usage amount for a particular user and/or device. In some embodiments, a service usage limit defines a specific service usage amount from a service usage allocation for the device, for a set of devices, for a device group, for a service plan, or for a set of service plans. In some embodiments, a service usage limit defines a percentage of an allocation of a service usage amount for a device or set of devices. In some embodiments, a service usage limit applies to a particular device in a device group. In some embodiments, a service usage limit applies to a set of devices in a device group. In some embodiments, a service usage limit applies to any device in a device group. In some embodiments, a service usage limit applies to a particular time period (e.g., a billing cycle) for a service plan, a part of a service plan, or a set of service plans. In some embodiments, a service usage limit determines a trigger for providing a notification to a user of a device (or to another device or user, e.g., to a device group manager). In some embodiments, a service controller, network system, service management system, service design center, or other collection of network elements defines one or more service usage limits. In some embodiments, notifications are provided to a user and/or a device through voice, text, messaging, email, or a combination of these. In some embodiments, a voice message is generated that provides an indication of a service usage (e.g., an absolute amount, relative amount, percentage used, percentage remaining). In some embodiments, the voice message is provided to a user of a device and/or to other devices in a device group and/or to a device group manager. In some embodiments, the voice message is automatically presented (e.g., audibly presented through a speaker of a device to a user of the device). In some embodiments, the voice message provides an audible indication of an amount of service usage consumed or an amount of service usage allocation remaining for a service plan or service allocation to a user or device.
In some embodiments, a device is configured to present a notification, alert, or other indication to a user of the device when an incoming communication is attempted, e.g., based on information supplied from a network system. In some embodiments, incoming communication includes voice calls, text messages, chat sessions, video services, email messages, or other forms of voice, text, video, and/or data communications. In some embodiments, the device provides the notification, alert, or other indication to inform the user of the device when an incoming communication is pending. In some embodiments, the device provides a notification message that requires a response from the user of the device before the incoming communication is received, completed, and/or connected. In some embodiments, the device provides a notification with options to allow the user to accept the incoming communication. In some embodiments, one or more notifications are provided to the user in real time (or near real time). In some embodiments, a connection is established for the incoming communication to the user of the device in response to an acceptance input received from the user of the device (e.g., through a user interface of the device.) In some embodiments, all or a portion of the incoming communication is stored for the user in advance of the acceptance of the incoming communication by the user of the device. In some embodiments, information is provided to the user to accept service terms and conditions before the incoming communication is received and/or a communication session is initiated. In some embodiments, the device and/or a network system stores all or part of a voice, text, video, data, email or other form of communication for the incoming communication to deliver to the user of the device in response to an acceptance from the user of the device. In some embodiments, the device and/or a network system automatically provides at least a portion of the incoming communication to the user to provide additional information to determine whether to accept the incoming communication. In some embodiments, the device and/or a network system provides at least a portion of the incoming communication to the user after acceptance by the user. In some embodiments, the device and/or a network system initiates a communication to a sender of the incoming communication (e.g., calls back when a user accepts). In some embodiments, the device and/or a network system provides for storage and playback in real time, near real time, and/or “accelerated” time (i.e., “fast” playback) of at least a portion of the incoming communication.
In some embodiments, a user of a device and/or a device group manager manages one or more aspects of service plans through a user interface of the device. In some embodiments, service usage amounts for service plans associated with a device and/or a device group are displayed on a user interface. In some embodiments, service usage amounts displayed are refreshed at regular (or irregular) intervals. In some embodiments, service usage amounts displayed on a user interface are updated based on service usage monitoring in the device, by a network system, or by a combination of the device and a network system. In some embodiments, a service usage displayed on the user interface of the device is updated in response to a user input. In some embodiments, service usage information is determined on the device and/or in a network and service usage updates are provided from the device to the network and/or from the network to the device to refresh display of service usage information for the device. In some embodiments, service plan status information and/or service plan options are updated for the device. In some embodiments, the device obtains service plan status updates and/or service plan option updates from the network, e.g., in real time, in response to a user input, or through a background process. In some embodiments, service plan information for the device is updated when a user selects one or more buttons/icons on the user interface of the device. In some embodiments, updates for service usage and/or service plans are provided in the background so that service usage information and/or service plan status and/or service plan options are up to date when a user selects to display information about a service plan. In some embodiments, service plan options (e.g., for alternative service plans or for service plans already subscribed to by the user) are updated in real time, in near real time, and/or in the background so that a user can be informed of service plan availability when a user selects one or more buttons and/or icons on the user interface of the device. In some embodiments, service usage and/or service plan information is obtained from a network and/or updated in response to a user input for any icon or button on a user interface of the device and before the user requests information for service usage and/or service plans. In some embodiments, an indication is provided on the user interface when new information is available and/or has been obtained for one or more service plans of the device. In some embodiments, in response to a user input, a superset of information that may be of interest to the user of the device is updated. In some embodiments, a synchronization and/or update indication is provided by a network element to the device, and the device determines whether to obtain new service usage and/or service plan information based at least in part on the synchronization and/or update indication provided. In some embodiments, service usage updates and/or service plan updates are obtained, pulled, pushed, or otherwise provided to the device as available. In some embodiments, service usage updates and/or service plan updates are provided after a pre-determined accumulation of updates. In some embodiments, service usage updates and/or service plan updates are provided based on a pre-determined time interval. In some embodiments, a user of the device provides a user preference for service usage and/or service plan update frequency and/or content. In some embodiments, a device maintains a service selection status version and synchronizes the service selection status version with information from a network element to determine what information for service usage and/or service plans requires updates and only update incrementally what is required. In some embodiments, the device obtains service selection status version information from a network element. In some embodiments, the device provides service selection status version information to a network element. In some embodiments, the device determines when service usage updates and/or service plan information requires updates. In some embodiments, a network element determines when service usage updates and/or service information requires updates. In some embodiments, the device maintains a catalog of a subset of status possibilities for service usage and/or service plan information and only updates the catalog. In some embodiments, a service plan lease is provided when a user selects a service plan, e.g., through a user interface of a device, and before a network system has confirmed the service plan for the device (or for the user of the device). In some embodiments, a service plan lease provides for a temporary or limited service usage in advance of a selected service plan. In some embodiments, a user of a device is pre-approved for service authorization and/or credit standing before, upon, or after selection of a service plan. In some embodiments, a user service plan lease is revoked when credit standing for the user is not approved, or when configuration of a service plan for the device and/or for the user of the device cannot be completed.
In some embodiments, a network system analyzes service usage and/or service plan records for a device, a user, a device group, or a user group and determines service plan recommendations. In some embodiments, the network system determines service plans that match a user/device/group's service usage history. In some embodiments, the network system recommends one or more service plans to a user/device/group based on one or more service plan characteristics (e.g., features, performance, cost). In some embodiments, the network system determines service plans based on cost to the user, for a device, and/or for a device group. In some embodiments, the network system determines service plans based on wholesale cost to provide the service to the user, to the device, and/or to the device group. In some embodiments, the network system provides service plan recommendations for current and/or future use by a user, device, and/or device group. In some embodiments, the network system provides recommended service plans to the user, device, and/or device group, e.g., through a notification, alert, marketing interceptor, upsell, advertisement, or other means of presenting the service plan recommendations to the user/device/group.
Device Group Management and Service Activity Control User Interface
In some embodiments, the process includes joining device 100 to a service account, establishing a new service account, updating service plans, updating service settings, updating device settings, loading service policies, loading service plans, establishing network connections, or a combination of these.
In some embodiments, service activity controls (access restrictions) apply to particular network types (e.g., disallow communication for particular times on particular networks). In some embodiments, service activity controls restrict access to mobile wireless networks. In some embodiments, service activity controls restrict access to Wi-Fi wireless networks. In some embodiments, service activity controls restrict based on a combination of wireless network type, specific wireless networks, specific communication types, applications, application types, time-based restriction, etc.
In some embodiments, a user interface presents one or more screens through which an administrator can select service plans (or elements thereof) with one or more devices 100. In some embodiments, the administrator selects a particular device from a listing of devices (e.g., of a device group) and then selects service plans to share with the particular device. In some embodiments, the administrator selects a particular service plan from a listing of service plans (e.g., for a particular device) and then selects a particular device (or devices) with which to share the particular service plan. In some embodiments, a user interface presents a table or matrix of information that illustrates sharing of service plans among a set of devices. In some embodiments, a user interface presents one or more screens through which an administrator can select service activity controls (restrictions) to apply to one or more devices 100. In some embodiments, the administrator selects a particular device from a listing of devices (e.g., of a device group) and then selects a service activity control (restriction) to apply to the particular device. In some embodiments, the administrator selects a service activity control (restriction) from a listing of service activity controls (restrictions) (e.g., defined for a device group) and then selects a device (or devices) to which to apply the service activity control (restriction). In some embodiments, a user interface presents a table or matrix of information that illustrates applications of service activity controls (restrictions) among a set of devices 100.
In some embodiments, application programming interfaces (APIs) are provided through which devices 100 and/or network elements communicate information, e.g., within device 100, between device 100 and a network elements, or between network elements of a network system. In some embodiments APIs are defined for providing service plan and device management. In some embodiments, APIs are defined to provide for obtaining, exchanging, modifying, and/or transferring credentials to/from device 100. In some embodiments, APIs are defined to provide for exchanging credentials between device 100 and a website. In some embodiments, APIs are defined to provide for transferring credentials between device 100 and one or more activation servers. In some embodiments, APIs are defined to provide for transferring credentials between activation servers. In some embodiments, APIs are defined to allow for activating multiple devices 100. In some embodiments, APIs are defined to allow for managing multiple devices 100, device groups, or other collections of devices 100. In some embodiments, APIs are defined for managing quality of service features. In some embodiments, APIs are defined for managing service plan offers. In some embodiments, APIs are defined for managing sponsored service plans.
This document incorporates by reference for all purposes the following non-provisional U.S. patent applications: application Ser. No. 12/380,778, filed Mar. 2, 2009, entitled VERIFIABLE DEVICE ASSISTED SERVICE USAGE BILLING WITH INTEGRATED ACCOUNTING, MEDIATION ACCOUNTING, AND MULTI-ACCOUNT, now U.S. Pat. No. 8,321,526 (issued Nov. 27, 2012); application Ser. No. 12/380,780, filed Mar. 2, 2009, entitled AUTOMATED DEVICE PROVISIONING AND ACTIVATION, now U.S. Pat. No. 8,839,388 (issued Sep. 16, 2014); application Ser. No. 12/695,019, filed Jan. 27, 2010, entitled DEVICE ASSISTED CDR CREATION, AGGREGATION, MEDIATION AND BILLING, now U.S. Pat. No. 8,275,830 (issued Sep. 25, 2012); application Ser. No. 12/695,020, filed Jan. 27, 2010, entitled ADAPTIVE AMBIENT SERVICES, now U.S. Pat. No. 8,406,748 (issued Mar. 26, 2013); application Ser. No. 12/694,445, filed Jan. 27, 2010, entitled SECURITY TECHNIQUES FOR DEVICE ASSISTED SERVICES, now U.S. Pat. No. 8,391,834 (issued Mar. 5, 2013); application Ser. No. 12/694,451, filed Jan. 27, 2010, entitled DEVICE GROUP PARTITIONS AND SETTLEMENT PLATFORM, now U.S. Pat. No. 8,548,428 (issued Oct. 1, 2013); application Ser. No. 12/694,455, filed Jan. 27, 2010, entitled DEVICE ASSISTED SERVICES INSTALL, now U.S. Pat. No. 8,402,111 (issued Mar. 19, 2013); application Ser. No. 12/695,021, filed Jan. 27, 2010, entitled QUALITY OF SERVICE FOR DEVICE ASSISTED SERVICES, now U.S. Pat. No. 8,346,225 (issued Jan. 1, 2013); application Ser. No. 12/695,980, filed Jan. 28, 2010, entitled ENHANCED ROAMING SERVICES AND CONVERGED CARRIER NETWORKS WITH DEVICE ASSISTED SERVICES AND A PROXY, now U.S. Pat. No. 8,340,634 (issued Dec. 25, 2012); application Ser. No. 13/134,005, filed May 25, 2011, entitled SYSTEM AND METHOD FOR WIRELESS NETWORK OFFLOADING, now U.S. Pat. No. 8,635,335 (issued Jan. 21, 2014); application Ser. No. 13/134,028, filed May 25, 2011, entitled DEVICE-ASSISTED SERVICES FOR PROTECTING NETWORK CAPACITY, now U.S. Pat. No. 8,589,541 (issued Nov. 19, 2013); application Ser. No. 13/229,580, filed Sep. 9, 2011, entitled WIRELESS NETWORK SERVICE INTERFACES, now U.S. Pat. No. 8,626,115 (issued Jan. 7, 2014); application Ser. No. 13/237,827, filed Sep. 20, 2011, entitled ADAPTING NETWORK POLICIES BASED ON DEVICE SERVICE PROCESSOR CONFIGURATION, now U.S. Pat. No. 8,832,777 (issued Sep. 9, 2014); application Ser. No. 13/239,321, filed Sep. 21, 2011, entitled SERVICE OFFER SET PUBLISHING TO DEVICE AGENT WITH ON-DEVICE SERVICE SELECTION, now U.S. Pat. No. 8,898,293; application Ser. No. 13/248,028, filed Sep. 28, 2011, entitled ENTERPRISE ACCESS CONTROL AND ACCOUNTING ALLOCATION FOR ACCESS NETWORKS, now U.S. Pat. No. 8,924,469; application Ser. No. 13/247,998, filed Sep. 28, 2011, entitled COMMUNICATIONS DEVICE WITH SECURE DATA PATH PROCESSING AGENTS, now U.S. Pat. No. 8,725,123 (issued May 13, 2014); application Ser. No. 13/248,025, filed Sep. 28, 2011, entitled SERVICE DESIGN CENTER FOR DEVICE ASSISTED SERVICES, now U.S. Pat. No. 8,924,543; application Ser. No. 13/253,013, filed Oct. 4, 2011, entitled SYSTEM AND METHOD FOR PROVIDING USER NOTIFICATIONS, now U.S. Pat. No. 8,745,191 (issued Jun. 3, 2014); application Ser. No. 13/309,556, filed Dec. 1, 2011, entitled END USER DEVICE THAT SECURES AN ASSOCIATION OF APPLICATION TO SERVICE POLICY WITH AN APPLICATION CERTIFICATE CHECK, now U.S. Pat. No. 8,893,009; application Ser. No. 13/309,463, filed Dec. 1, 2011, entitled SECURITY, FRAUD DETECTION, AND FRAUD MITIGATION IN DEVICE-ASSISTED SERVICES SYSTEMS, now U.S. Pat. No. 8,793,758 (issued Jul. 29, 2014); application Ser. No. 13/374,959, filed Jan. 24, 2012, entitled FLOW TAGGING FOR SERVICE POLICY IMPLEMENTATION, now U.S. Pat. No. 8,606,911 (issued Dec. 10, 2013); application Ser. No. 13/441,821, filed Apr. 6, 2012, entitled MANAGING SERVICE USER DISCOVERY AND SERVICE LAUNCH OBJECT PLACEMENT ON A DEVICE, now U.S. Pat. No. 9,755,842 (issued Sep. 5, 2017); application Ser. No. 13/748,152, filed Jan. 23, 2013, entitled SERVICE PLAN DESIGN, USER INTERFACES, APPLICATION PROGRAMMING INTERFACES, AND DEVICE MANAGEMENT, now U.S. Pat. No. 9,557,889 (issued Jan. 31, 2017); application Ser. No. 13/802,483, filed Mar. 13, 2013, entitled MOBILE DEVICE ACTIVATION VIA DYNAMICALLY SELECTED ACCESS NETWORK; and application Ser. No. 13/842,172, filed Mar. 15, 2013, entitled NETWORK SERVICE PLAN DESIGN, now U.S. Pat. No. 9,858,559 (issued Jan. 2, 2018);
This document incorporates by reference for all purposes the following provisional patent applications: Provisional Application No. 61/206,354, filed Jan. 28, 2009, entitled SERVICES POLICY COMMUNICATION SYSTEM AND METHOD; Provisional Application No. 61/206,944, filed Feb. 4, 2009, entitled SERVICES POLICY COMMUNICATION SYSTEM AND METHOD; Provisional Application No. 61/207,393, filed Feb. 10, 2009, entitled SERVICES POLICY COMMUNICATION SYSTEM AND METHOD; and Provisional Application No. 61/207,739, entitled SERVICES POLICY COMMUNICATION SYSTEM AND METHOD, filed Feb. 13, 2009; Provisional Application No. 61/270,353, filed on Jul. 6, 2009, entitled DEVICE ASSISTED CDR CREATION, AGGREGATION, MEDIATION AND BILLING; Provisional Application No. 61/275,208, filed Aug. 25, 2009, entitled ADAPTIVE AMBIENT SERVICES; and Provisional Application No. 61/237,753, filed Aug. 28, 2009, entitled ADAPTIVE AMBIENT SERVICES; Provisional Application No. 61/252,151, filed Oct. 15, 2009, entitled SECURITY TECHNIQUES FOR DEVICE ASSISTED SERVICES; Provisional Application No. 61/252,153, filed Oct. 15, 2009, entitled DEVICE GROUP PARTITIONS AND SETTLEMENT PLATFORM; Provisional Application No. 61/264,120, filed Nov. 24, 2009, entitled DEVICE ASSISTED SERVICES INSTALL; Provisional Application No. 61/264,126, filed Nov. 24, 2009, entitled DEVICE ASSISTED SERVICES ACTIVITY MAP; Provisional Application No. 61/348,022, filed May 25, 2010, entitled DEVICE ASSISTED SERVICES FOR PROTECTING NETWORK CAPACITY; Provisional Application No. 61/381,159, filed Sep. 9, 2010, entitled DEVICE ASSISTED SERVICES FOR PROTECTING NETWORK CAPACITY; Provisional Application No. 61/381,162, filed Sep. 9, 2010, entitled SERVICE CONTROLLER INTERFACES AND WORKFLOWS; Provisional Application No. 61/384,456, filed Sep. 20, 2010, entitled SECURING SERVICE PROCESSOR WITH SPONSORED SIMS; Provisional Application No. 61/389,547, filed Oct. 4, 2010, entitled USER NOTIFICATIONS FOR DEVICE ASSISTED SERVICES; Provisional Application No. 61/385,020, filed Sep. 21, 2010, entitled SERVICE USAGE RECONCILIATION SYSTEM OVERVIEW; Provisional Application No. 61/387,243, filed Sep. 28, 2010, entitled ENTERPRISE AND CONSUMER BILLING ALLOCATION FOR WIRELESS COMMUNICATION DEVICE SERVICE USAGE ACTIVITIES; Provisional Application No. 61/387,247, filed September 28, entitled SECURED DEVICE DATA RECORDS, 2010; Provisional Application No. 61/407,358, filed Oct. 27, 2010, entitled SERVICE CONTROLLER AND SERVICE PROCESSOR ARCHITECTURE; Provisional Application No. 61/418,507, filed Dec. 1, 2010, entitled APPLICATION SERVICE PROVIDER INTERFACE SYSTEM; Provisional Application No. 61/418,509, filed Dec. 1, 2010, entitled SERVICE USAGE REPORTING RECONCILIATION AND FRAUD DETECTION FOR DEVICE ASSISTED SERVICES; Provisional Application No. 61/420,727, filed Dec. 7, 2010, entitled SECURE DEVICE DATA RECORDS; Provisional Application No. 61/422,565, filed Dec. 13, 2010, entitled SERVICE DESIGN CENTER FOR DEVICE ASSISTED SERVICES; Provisional Application No. 61/422,572, filed Dec. 13, 2010, entitled SYSTEM INTERFACES AND WORKFLOWS FOR DEVICE ASSISTED SERVICES; Provisional Application No. 61/422,574, filed Dec. 13, 2010, entitled SECURITY AND FRAUD DETECTION FOR DEVICE ASSISTED SERVICES; Provisional Application No. 61/435,564, filed Jan. 24, 2011, entitled FRAMEWORK FOR DEVICE ASSISTED SERVICES; Provisional Application No. 61/472,606, filed Apr. 6, 2011, entitled MANAGING SERVICE USER DISCOVERY AND SERVICE LAUNCH OBJECT PLACEMENT ON A DEVICE; Provisional Application No. 61/550,906, filed Oct. 24, 2011, entitled SECURITY FOR DEVICE-ASSISTED SERVICES; Provisional Application No. 61/589,830, filed Jan. 23, 2012, entitled METHODS AND APPARATUS TO PRESENT INFORMATION ABOUT VOICE, MESSAGING, AND DATA SERVICES ON WIRELESS MOBILE DEVICES; Provisional Application No. 61/610,876, filed Mar. 14, 2012, entitled METHODS AND APPARATUS FOR APPLICATION PROMOTION AND SPONSORSHIP; Provisional Application No. 61/610,910, filed Mar. 14, 2012, entitled WIFI ACTIVATION BACKUP PROCESS; Provisional Application No. 61/658,339, filed Jun. 11, 2012, entitled MULTI-DEVICE MASTER SERVICES ACCOUNTS, SERVICE PLAN SHARING AND ASSIGNMENTS, AND DEVICE MANAGEMENT FROM A MASTER DEVICE; Provisional Application No. 61/667,927, filed Jul. 3, 2012, entitled FLEXIBLE MULTI-DEVICE MASTER SERVICE ACCOUNTS, SERVICE PLAN SHARING AND ASSIGNMENTS, AND DEVICE MANAGEMENT; Provisional Application No. 61/674,331, filed Jul. 21, 2012, entitled SERVICE CONTROLLER FOR MANAGING CLOUD-BASED POLICY; Provisional Application No. 61/724,267, filed Nov. 8, 2012, entitled FLEXIBLE SERVICE PLAN DESIGN, USER INTERFACE AND DEVICE MANAGEMENT; Provisional Application No. 61/724,837, filed Nov. 9, 2012, entitled SERVICE PLAN DISCOVERY, CUSTOMIZATION, AND MANAGEMENT; Provisional Application No. 61/724,974, filed Nov. 10, 2012, entitled SERVICE PLAN DISCOVERY, CUSTOMIZATION, AND MANAGEMENT; Provisional Application No. 61/732,249, filed Nov. 30, 2012, entitled APPLICATION PROGRAMMING INTERFACES FOR SMART SERVICES; Provisional Application No. 61/734,288, filed Dec. 6, 2012, entitled INTERMEDIATE NETWORKING DEVICE SERVICES; and Provisional Application No. 61/745,548, filed Dec. 22, 2012, entitled SERVICE PLAN DESIGN, USER INTERFACES, APPLICATION PROGRAMMING INTERFACES, AND DEVICE MANAGEMENT; Provisional Application No. 61/756,332, filed Jan. 24, 2013, entitled MOBILE HOTSPOT; Provisional Application No. 61/758,964, filed Jan. 30, 2013, entitled MOBILE HOTSPOT; Provisional Application No. 61/765,978, filed Feb. 18, 2013, entitled ENHANCED CURFEW AND PROTECTION ASSOCIATED WITH A DEVICE GROUP; Provisional Application No. 61/785,988, filed Mar. 14, 2013, entitled AUTOMATED CREDENTIAL PORTING FOR MOBILE DEVICES; Provisional Application No. 61/794,116, filed Mar. 15, 2013, entitled ENHANCED INTERMEDIATE NETWORKING DEVICE; Provisional Application No. 61/792,765, filed Mar. 15, 2013, entitled DEVICE GROUP AND SERVICE PLAN MANAGEMENT; Provisional Application No. 61/793,894, filed Mar. 15, 2013, entitled SIMPLIFIED POLICY DESIGN, MANAGEMENT, AND IMPLEMENTATION; Provisional Application No. 61/799,710, filed Mar. 15, 2013, entitled AMBIENT OR SPONSORED SERVICES; and Provisional Application No. 61/801,074, filed Mar. 15, 2013, entitled DEVICE GROUP AND SERVICE PLAN MANAGEMENT.
Number | Name | Date | Kind |
---|---|---|---|
5131020 | Liebesny et al. | Jul 1992 | A |
5283904 | Carson et al. | Feb 1994 | A |
5325532 | Crosswy et al. | Jun 1994 | A |
5572528 | Shuen | Nov 1996 | A |
5577100 | McGregor et al. | Nov 1996 | A |
5594777 | Makkonen et al. | Jan 1997 | A |
5617539 | Ludwig et al. | Apr 1997 | A |
5630159 | Zancho | May 1997 | A |
5633484 | Zancho et al. | May 1997 | A |
5633868 | Baldwin et al. | May 1997 | A |
5754953 | Briancon et al. | May 1998 | A |
5774532 | Gottlieb et al. | Jun 1998 | A |
5794142 | Vanttila et al. | Aug 1998 | A |
5814798 | Zancho | Sep 1998 | A |
5889477 | Fastenrath | Mar 1999 | A |
5892900 | Ginter et al. | Apr 1999 | A |
5903845 | Buhrmann et al. | May 1999 | A |
5915008 | Dulman | Jun 1999 | A |
5915226 | Martineau | Jun 1999 | A |
5933778 | Buhrmann et al. | Aug 1999 | A |
5940472 | Newman et al. | Aug 1999 | A |
5974439 | Bollella | Oct 1999 | A |
5983270 | Abraham et al. | Nov 1999 | A |
6035281 | Crosskey et al. | Mar 2000 | A |
6038452 | Strawczynski et al. | Mar 2000 | A |
6038540 | Krist et al. | Mar 2000 | A |
6047268 | Bartoli et al. | Apr 2000 | A |
6058434 | Wilt et al. | May 2000 | A |
6061571 | Tamura | May 2000 | A |
6064878 | Denker et al. | May 2000 | A |
6078953 | Vaid et al. | Jun 2000 | A |
6081591 | Skoog | Jun 2000 | A |
6098878 | Dent et al. | Aug 2000 | A |
6104700 | Haddock et al. | Aug 2000 | A |
6115823 | Velasco et al. | Sep 2000 | A |
6119933 | Wong et al. | Sep 2000 | A |
6125391 | Meltzer et al. | Sep 2000 | A |
6141565 | Feuerstein et al. | Oct 2000 | A |
6141686 | Jackowski et al. | Oct 2000 | A |
6148336 | Thomas et al. | Nov 2000 | A |
6154738 | Call | Nov 2000 | A |
6157636 | Voit et al. | Dec 2000 | A |
6185576 | Mcintosh | Feb 2001 | B1 |
6198915 | McGregor et al. | Mar 2001 | B1 |
6219786 | Cunningham et al. | Apr 2001 | B1 |
6226277 | Chuah | May 2001 | B1 |
6246870 | Dent et al. | Jun 2001 | B1 |
6263055 | Garland et al. | Jul 2001 | B1 |
6292828 | Williams | Sep 2001 | B1 |
6317584 | Abu-Amara et al. | Nov 2001 | B1 |
6370139 | Redmond | Apr 2002 | B2 |
6381316 | Joyce et al. | Apr 2002 | B2 |
6393014 | Daly et al. | May 2002 | B1 |
6397259 | Lincke et al. | May 2002 | B1 |
6401113 | Lazaridis et al. | Jun 2002 | B2 |
6418147 | Wiedeman | Jul 2002 | B1 |
6438575 | Khan et al. | Aug 2002 | B1 |
6445777 | Clark | Sep 2002 | B1 |
6449479 | Sanchez | Sep 2002 | B1 |
6466984 | Naveh et al. | Oct 2002 | B1 |
6477670 | Ahmadvand | Nov 2002 | B1 |
6502131 | Vaid et al. | Dec 2002 | B1 |
6505114 | Luciani | Jan 2003 | B2 |
6510152 | Gerszberg et al. | Jan 2003 | B1 |
6522629 | Anderson, Sr. | Feb 2003 | B1 |
6532235 | Benson et al. | Mar 2003 | B1 |
6532579 | Sato et al. | Mar 2003 | B2 |
6535855 | Cahill et al. | Mar 2003 | B1 |
6535949 | Parker | Mar 2003 | B1 |
6539082 | Lowe et al. | Mar 2003 | B1 |
6542500 | Gerszberg et al. | Apr 2003 | B1 |
6542992 | Peirce et al. | Apr 2003 | B1 |
6546016 | Gerszberg et al. | Apr 2003 | B1 |
6563806 | Yano et al. | May 2003 | B1 |
6570974 | Gerszberg et al. | May 2003 | B1 |
6574321 | Cox et al. | Jun 2003 | B1 |
6574465 | Marsh et al. | Jun 2003 | B2 |
6578076 | Putzolu | Jun 2003 | B1 |
6581092 | Motoyama | Jun 2003 | B1 |
6591098 | Shieh et al. | Jul 2003 | B1 |
6598034 | Kloth | Jul 2003 | B1 |
6601040 | Kolls | Jul 2003 | B1 |
6603969 | Vuoristo et al. | Aug 2003 | B1 |
6603975 | Inouchi et al. | Aug 2003 | B1 |
6606744 | Mikurak | Aug 2003 | B1 |
6628934 | Rosenberg et al. | Sep 2003 | B2 |
6631122 | Arunachalam et al. | Oct 2003 | B1 |
6636721 | Threadgill et al. | Oct 2003 | B2 |
6639975 | O'Neal et al. | Oct 2003 | B1 |
6640097 | Corrigan et al. | Oct 2003 | B2 |
6640334 | Rasmussen | Oct 2003 | B1 |
6650887 | McGregor et al. | Nov 2003 | B2 |
6651101 | Gai et al. | Nov 2003 | B1 |
6654786 | Fox et al. | Nov 2003 | B1 |
6654814 | Britton et al. | Nov 2003 | B1 |
6658254 | Purdy et al. | Dec 2003 | B1 |
6662014 | Walsh | Dec 2003 | B1 |
6678516 | Nordman et al. | Jan 2004 | B2 |
6683853 | Kannas et al. | Jan 2004 | B1 |
6684244 | Goldman et al. | Jan 2004 | B1 |
6690918 | Evans et al. | Feb 2004 | B2 |
6697821 | Ziff et al. | Feb 2004 | B2 |
6725031 | Watler et al. | Apr 2004 | B2 |
6725256 | Albal et al. | Apr 2004 | B1 |
6732176 | Stewart et al. | May 2004 | B1 |
6735206 | Oki et al. | May 2004 | B1 |
6748195 | Phillips | Jun 2004 | B1 |
6748437 | Mankude et al. | Jun 2004 | B1 |
6751296 | Albal et al. | Jun 2004 | B1 |
6754470 | Hendrickson et al. | Jun 2004 | B2 |
6757717 | Goldstein | Jun 2004 | B1 |
6760417 | Wallenius | Jul 2004 | B1 |
6763000 | Walsh | Jul 2004 | B1 |
6763226 | McZeal, Jr. | Jul 2004 | B1 |
6765864 | Natarajan et al. | Jul 2004 | B1 |
6765925 | Sawyer et al. | Jul 2004 | B1 |
6782412 | Brophy et al. | Aug 2004 | B2 |
6785889 | Williams | Aug 2004 | B1 |
6792461 | Hericourt | Sep 2004 | B1 |
6829596 | Frazee | Dec 2004 | B1 |
6829696 | Balmer et al. | Dec 2004 | B1 |
6839340 | Voit et al. | Jan 2005 | B1 |
6842628 | Arnold et al. | Jan 2005 | B1 |
6873988 | Herrmann et al. | Mar 2005 | B2 |
6876653 | Ambe et al. | Apr 2005 | B2 |
6879825 | Daly | Apr 2005 | B1 |
6882718 | Smith | Apr 2005 | B1 |
6885997 | Roberts | Apr 2005 | B1 |
6901440 | Bimm et al. | May 2005 | B1 |
6920455 | Weschler | Jul 2005 | B1 |
6922562 | Ward et al. | Jul 2005 | B2 |
6928280 | Xanthos et al. | Aug 2005 | B1 |
6934249 | Bertin et al. | Aug 2005 | B1 |
6934751 | Jayapalan et al. | Aug 2005 | B2 |
6947723 | Gurnani et al. | Sep 2005 | B1 |
6947985 | Hegli et al. | Sep 2005 | B2 |
6952428 | Necka et al. | Oct 2005 | B1 |
6957067 | Iyer et al. | Oct 2005 | B1 |
6959202 | Heinonen et al. | Oct 2005 | B2 |
6959393 | Hollis et al. | Oct 2005 | B2 |
6965667 | Trabandt et al. | Nov 2005 | B2 |
6965872 | Grdina | Nov 2005 | B1 |
6967958 | Ono et al. | Nov 2005 | B2 |
6970692 | Tysor | Nov 2005 | B2 |
6970927 | Stewart et al. | Nov 2005 | B1 |
6982733 | McNally et al. | Jan 2006 | B1 |
6983370 | Eaton et al. | Jan 2006 | B2 |
6996062 | Freed et al. | Feb 2006 | B1 |
6996076 | Forbes et al. | Feb 2006 | B1 |
6996393 | Pyhalammi et al. | Feb 2006 | B2 |
6998985 | Reisman et al. | Feb 2006 | B2 |
7000001 | Lazaridis | Feb 2006 | B2 |
7002920 | Ayyagari et al. | Feb 2006 | B1 |
7007295 | Rose et al. | Feb 2006 | B1 |
7013469 | Smith et al. | Mar 2006 | B2 |
7017189 | DeMello et al. | Mar 2006 | B1 |
7024200 | McKenna et al. | Apr 2006 | B2 |
7024460 | Koopmas et al. | Apr 2006 | B2 |
7027055 | Anderson et al. | Apr 2006 | B2 |
7027408 | Nabkel et al. | Apr 2006 | B2 |
7031733 | Alminana et al. | Apr 2006 | B2 |
7032072 | Quinn et al. | Apr 2006 | B1 |
7039027 | Bridgelall | May 2006 | B2 |
7039037 | Wang et al. | May 2006 | B2 |
7039403 | Wong | May 2006 | B2 |
7039713 | Van Gunter et al. | May 2006 | B1 |
7042988 | Juitt et al. | May 2006 | B2 |
7043225 | Patel et al. | May 2006 | B1 |
7043226 | Yamauchi | May 2006 | B2 |
7043268 | Yukie et al. | May 2006 | B2 |
7047276 | Liu et al. | May 2006 | B2 |
7058022 | Carolan et al. | Jun 2006 | B1 |
7058968 | Rowland et al. | Jun 2006 | B2 |
7068600 | Cain | Jun 2006 | B2 |
7069248 | Huber | Jun 2006 | B2 |
7082422 | Zirngibl et al. | Jul 2006 | B1 |
7084775 | Smith | Aug 2006 | B1 |
7092696 | Hosain et al. | Aug 2006 | B1 |
7095754 | Benveniste | Aug 2006 | B2 |
7102620 | Harries et al. | Sep 2006 | B2 |
7110753 | Campen | Sep 2006 | B2 |
7113780 | Mckenna et al. | Sep 2006 | B2 |
7113997 | Jayapalan et al. | Sep 2006 | B2 |
7120133 | Joo et al. | Oct 2006 | B1 |
7131578 | Paschini et al. | Nov 2006 | B2 |
7133386 | Holur et al. | Nov 2006 | B2 |
7133695 | Beyda | Nov 2006 | B2 |
7136361 | Benveniste | Nov 2006 | B2 |
7139569 | Kato | Nov 2006 | B2 |
7142876 | Trossen et al. | Nov 2006 | B2 |
7149229 | Leung | Dec 2006 | B1 |
7149521 | Sundar et al. | Dec 2006 | B2 |
7151764 | Heinonen et al. | Dec 2006 | B1 |
7158792 | Cook et al. | Jan 2007 | B1 |
7162237 | Silver et al. | Jan 2007 | B1 |
7165040 | Ehrman et al. | Jan 2007 | B2 |
7167078 | Pourchot | Jan 2007 | B2 |
7174156 | Mangal | Feb 2007 | B1 |
7174174 | Boris et al. | Feb 2007 | B2 |
7177919 | Truong et al. | Feb 2007 | B1 |
7180855 | Lin | Feb 2007 | B1 |
7181017 | Nagel et al. | Feb 2007 | B1 |
7191248 | Chattopadhyay et al. | Mar 2007 | B2 |
7197321 | Erskine et al. | Mar 2007 | B2 |
7200112 | Sundar et al. | Apr 2007 | B2 |
7200551 | Senez | Apr 2007 | B1 |
7203169 | Okholm et al. | Apr 2007 | B1 |
7203721 | Ben-Efraim et al. | Apr 2007 | B1 |
7203752 | Rice et al. | Apr 2007 | B2 |
7212491 | Koga | May 2007 | B2 |
7219123 | Fiechter et al. | May 2007 | B1 |
7222190 | Klinker et al. | May 2007 | B2 |
7222304 | Beaton et al. | May 2007 | B2 |
7224968 | Dobson et al. | May 2007 | B2 |
7228354 | Chambliss et al. | Jun 2007 | B2 |
7236780 | Benco | Jun 2007 | B2 |
7242668 | Kan et al. | Jul 2007 | B2 |
7242920 | Morris | Jul 2007 | B2 |
7245901 | McGregor et al. | Jul 2007 | B2 |
7248570 | Bahl et al. | Jul 2007 | B2 |
7251218 | Jorgensen | Jul 2007 | B2 |
7260382 | Lamb et al. | Aug 2007 | B1 |
7266371 | Amin et al. | Sep 2007 | B1 |
7269157 | Klinker et al. | Sep 2007 | B2 |
7271765 | Stilp et al. | Sep 2007 | B2 |
7272660 | Powers et al. | Sep 2007 | B1 |
7280816 | Fratti et al. | Oct 2007 | B2 |
7280818 | Clayton | Oct 2007 | B2 |
7283561 | Picher-Dempsey | Oct 2007 | B1 |
7283963 | Fitzpatrick et al. | Oct 2007 | B1 |
7286834 | Walter | Oct 2007 | B2 |
7286848 | Vireday et al. | Oct 2007 | B2 |
7289489 | Kung et al. | Oct 2007 | B1 |
7290283 | Copeland, III | Oct 2007 | B2 |
7310424 | Gehring et al. | Dec 2007 | B2 |
7313237 | Bahl et al. | Dec 2007 | B2 |
7315892 | Freimuth et al. | Jan 2008 | B2 |
7317699 | Godfrey et al. | Jan 2008 | B2 |
7318111 | Zhao | Jan 2008 | B2 |
7320029 | Rinne et al. | Jan 2008 | B2 |
7322044 | Hrastar | Jan 2008 | B2 |
7324447 | Morford | Jan 2008 | B1 |
7325037 | Lawson | Jan 2008 | B2 |
7336960 | Zavalkovsky et al. | Feb 2008 | B2 |
7340772 | Panasyuk et al. | Mar 2008 | B2 |
7346410 | Uchiyama | Mar 2008 | B2 |
7349695 | Oommen et al. | Mar 2008 | B2 |
7353533 | Wright et al. | Apr 2008 | B2 |
7356011 | Waters et al. | Apr 2008 | B1 |
7356337 | Florence | Apr 2008 | B2 |
7366497 | Nagata | Apr 2008 | B2 |
7366654 | Moore | Apr 2008 | B2 |
7369848 | Jiang | May 2008 | B2 |
7369856 | Ovadia | May 2008 | B2 |
7373136 | Watler et al. | May 2008 | B2 |
7373179 | Stine et al. | May 2008 | B2 |
7379731 | Natsuno et al. | May 2008 | B2 |
7388950 | Elsey et al. | Jun 2008 | B2 |
7389412 | Sharma et al. | Jun 2008 | B2 |
7391724 | Alakoski et al. | Jun 2008 | B2 |
7395244 | Kingsford | Jul 2008 | B1 |
7401338 | Bowen et al. | Jul 2008 | B1 |
7403763 | Maes | Jul 2008 | B2 |
7409447 | Assadzadeh | Aug 2008 | B1 |
7409569 | Illowsky et al. | Aug 2008 | B2 |
7411930 | Montojo et al. | Aug 2008 | B2 |
7418253 | Kavanah | Aug 2008 | B2 |
7418257 | Kim | Aug 2008 | B2 |
7421004 | Feher | Sep 2008 | B2 |
7423971 | Mohaban et al. | Sep 2008 | B1 |
7428750 | Dunn et al. | Sep 2008 | B1 |
7433362 | Mallya et al. | Oct 2008 | B2 |
7436816 | Mehta et al. | Oct 2008 | B2 |
7440433 | Rink et al. | Oct 2008 | B2 |
7444669 | Bahl et al. | Oct 2008 | B1 |
7450591 | Korling et al. | Nov 2008 | B2 |
7450927 | Creswell et al. | Nov 2008 | B1 |
7454191 | Dawson et al. | Nov 2008 | B2 |
7457265 | Julka et al. | Nov 2008 | B2 |
7457870 | Lownsbrough et al. | Nov 2008 | B1 |
7460837 | Diener | Dec 2008 | B2 |
7466652 | Lau et al. | Dec 2008 | B2 |
7467160 | McIntyre | Dec 2008 | B2 |
7472189 | Mallya et al. | Dec 2008 | B2 |
7478420 | Wright et al. | Jan 2009 | B2 |
7486185 | Culpepper et al. | Feb 2009 | B2 |
7486658 | Kumar | Feb 2009 | B2 |
7493659 | Wu et al. | Feb 2009 | B1 |
7496652 | Pezzutti | Feb 2009 | B2 |
7499438 | Hinman et al. | Mar 2009 | B2 |
7499537 | Elsey et al. | Mar 2009 | B2 |
7502672 | Kolls | Mar 2009 | B1 |
7505756 | Bahl | Mar 2009 | B2 |
7505795 | Lim et al. | Mar 2009 | B1 |
7508799 | Sumner et al. | Mar 2009 | B2 |
7512128 | DiMambro et al. | Mar 2009 | B2 |
7512131 | Svensson et al. | Mar 2009 | B2 |
7515608 | Yuan et al. | Apr 2009 | B2 |
7515926 | Bu et al. | Apr 2009 | B2 |
7516219 | Moghaddam et al. | Apr 2009 | B2 |
7522549 | Karaoguz et al. | Apr 2009 | B2 |
7522576 | Du et al. | Apr 2009 | B2 |
7526541 | Roese et al. | Apr 2009 | B2 |
7529204 | Bourlas et al. | May 2009 | B2 |
7533158 | Grannan | May 2009 | B2 |
7535880 | Hinman et al. | May 2009 | B1 |
7536695 | Alam et al. | May 2009 | B2 |
7539132 | Werner et al. | May 2009 | B2 |
7539862 | Edgett et al. | May 2009 | B2 |
7540408 | Levine et al. | Jun 2009 | B2 |
7545782 | Rayment et al. | Jun 2009 | B2 |
7546460 | Maes | Jun 2009 | B2 |
7546629 | Albert et al. | Jun 2009 | B2 |
7548875 | Mikkelsen et al. | Jun 2009 | B2 |
7548976 | Bahl et al. | Jun 2009 | B2 |
7551921 | Petermann | Jun 2009 | B2 |
7551922 | Roskowski et al. | Jun 2009 | B2 |
7554983 | Muppala | Jun 2009 | B1 |
7555757 | Smith et al. | Jun 2009 | B2 |
7561899 | Lee | Jul 2009 | B2 |
7562213 | Timms | Jul 2009 | B1 |
7564799 | Holland et al. | Jul 2009 | B2 |
7565141 | Macaluso | Jul 2009 | B2 |
7574509 | Nixon et al. | Aug 2009 | B2 |
7574731 | Fascenda | Aug 2009 | B2 |
7577431 | Jiang | Aug 2009 | B2 |
7580356 | Mishra et al. | Aug 2009 | B1 |
7580857 | VanFleet et al. | Aug 2009 | B2 |
7583964 | Wong | Sep 2009 | B2 |
7584298 | Klinker et al. | Sep 2009 | B2 |
7586871 | Hamilton et al. | Sep 2009 | B2 |
7593417 | Wang et al. | Sep 2009 | B2 |
7593730 | Khandelwal et al. | Sep 2009 | B2 |
7596373 | Mcgregor et al. | Sep 2009 | B2 |
7599288 | Cole et al. | Oct 2009 | B2 |
7599714 | Kuzminskiy | Oct 2009 | B2 |
7602746 | Calhoun et al. | Oct 2009 | B2 |
7603710 | Harvey | Oct 2009 | B2 |
7606918 | Holzman et al. | Oct 2009 | B2 |
7607041 | Kraemer et al. | Oct 2009 | B2 |
7609650 | Roskowski et al. | Oct 2009 | B2 |
7609700 | Ying et al. | Oct 2009 | B1 |
7610047 | Hicks, III et al. | Oct 2009 | B2 |
7610057 | Bahl et al. | Oct 2009 | B2 |
7610328 | Haase et al. | Oct 2009 | B2 |
7610396 | Taglienti et al. | Oct 2009 | B2 |
7614051 | Glaum et al. | Nov 2009 | B2 |
7616962 | Oswal et al. | Nov 2009 | B2 |
7617516 | Huslak et al. | Nov 2009 | B2 |
7620041 | Dunn et al. | Nov 2009 | B2 |
7620065 | Falardeau | Nov 2009 | B2 |
7620162 | Aaron et al. | Nov 2009 | B2 |
7620383 | Taglienti et al. | Nov 2009 | B2 |
7627314 | Carlson et al. | Dec 2009 | B2 |
7627600 | Citron et al. | Dec 2009 | B2 |
7627767 | Sherman et al. | Dec 2009 | B2 |
7627872 | Hebeler et al. | Dec 2009 | B2 |
7633438 | Tysowski | Dec 2009 | B2 |
7634253 | Plestid et al. | Dec 2009 | B2 |
7634388 | Archer et al. | Dec 2009 | B2 |
7636574 | Poosala | Dec 2009 | B2 |
7636626 | Oesterling et al. | Dec 2009 | B2 |
7643411 | Andreasen et al. | Jan 2010 | B2 |
7644151 | Jerrim et al. | Jan 2010 | B2 |
7644267 | Ylikoski et al. | Jan 2010 | B2 |
7644414 | Smith et al. | Jan 2010 | B2 |
7647047 | Moghaddam et al. | Jan 2010 | B2 |
7650137 | Jobs et al. | Jan 2010 | B2 |
7653394 | McMillin | Jan 2010 | B2 |
7656271 | Ehrman et al. | Feb 2010 | B2 |
7657920 | Arseneau et al. | Feb 2010 | B2 |
7660419 | Ho | Feb 2010 | B1 |
7661124 | Ramanathan et al. | Feb 2010 | B2 |
7664494 | Jiang | Feb 2010 | B2 |
7668176 | Chuah | Feb 2010 | B2 |
7668612 | Okkonen | Feb 2010 | B1 |
7668903 | Edwards et al. | Feb 2010 | B2 |
7668966 | Klinker et al. | Feb 2010 | B2 |
7676673 | Weller et al. | Mar 2010 | B2 |
7680086 | Eglin | Mar 2010 | B2 |
7681226 | Kraemer et al. | Mar 2010 | B2 |
7684370 | Kezys | Mar 2010 | B2 |
7685131 | Batra et al. | Mar 2010 | B2 |
7685254 | Pandya | Mar 2010 | B2 |
7685530 | Sherrard et al. | Mar 2010 | B2 |
7688792 | Babbar et al. | Mar 2010 | B2 |
7693107 | De Froment | Apr 2010 | B2 |
7693720 | Kennewick et al. | Apr 2010 | B2 |
7697540 | Haddad et al. | Apr 2010 | B2 |
7710932 | Muthuswamy et al. | May 2010 | B2 |
7711848 | Maes | May 2010 | B2 |
7719966 | Luft et al. | May 2010 | B2 |
7720206 | Devolites et al. | May 2010 | B2 |
7720464 | Batta | May 2010 | B2 |
7720505 | Gopi et al. | May 2010 | B2 |
7720960 | Pruss et al. | May 2010 | B2 |
7721296 | Ricagni | May 2010 | B2 |
7724716 | Fadell | May 2010 | B2 |
7725570 | Lewis | May 2010 | B1 |
7729326 | Sekhar | Jun 2010 | B2 |
7730123 | Erickson et al. | Jun 2010 | B1 |
7734784 | Araujo et al. | Jun 2010 | B1 |
7742406 | Muppala | Jun 2010 | B1 |
7743119 | Friend et al. | Jun 2010 | B2 |
7746854 | Ambe et al. | Jun 2010 | B2 |
7747240 | Briscoe et al. | Jun 2010 | B1 |
7747699 | Prueitt et al. | Jun 2010 | B2 |
7747730 | Harlow | Jun 2010 | B1 |
7752330 | Olsen et al. | Jul 2010 | B2 |
7756056 | Kim et al. | Jul 2010 | B2 |
7756534 | Anupam et al. | Jul 2010 | B2 |
7756757 | Oakes, III | Jul 2010 | B1 |
7760137 | Martucci et al. | Jul 2010 | B2 |
7760711 | Kung et al. | Jul 2010 | B1 |
7760861 | Croak et al. | Jul 2010 | B1 |
7765294 | Edwards et al. | Jul 2010 | B2 |
7769397 | Funato et al. | Aug 2010 | B2 |
7770785 | Jha et al. | Aug 2010 | B2 |
7774323 | Helfman | Aug 2010 | B2 |
7774412 | Schnepel | Aug 2010 | B1 |
7774456 | Lownsbrough et al. | Aug 2010 | B1 |
7778176 | Morford | Aug 2010 | B2 |
7778643 | Laroia et al. | Aug 2010 | B2 |
7792257 | Vanier et al. | Sep 2010 | B1 |
7792538 | Kozisek | Sep 2010 | B2 |
7792708 | Alva | Sep 2010 | B2 |
7797019 | Friedmann | Sep 2010 | B2 |
7797060 | Grgic et al. | Sep 2010 | B2 |
7797204 | Balent | Sep 2010 | B2 |
7797401 | Stewart et al. | Sep 2010 | B2 |
7801523 | Kenderov | Sep 2010 | B1 |
7801783 | Kende et al. | Sep 2010 | B2 |
7801985 | Pitkow et al. | Sep 2010 | B1 |
7802724 | Nohr | Sep 2010 | B1 |
7805140 | Friday et al. | Sep 2010 | B2 |
7805522 | Schlüter et al. | Sep 2010 | B2 |
7805606 | Birger et al. | Sep 2010 | B2 |
7809351 | Panda et al. | Oct 2010 | B1 |
7809372 | Rajaniemi | Oct 2010 | B2 |
7813746 | Rajkotia | Oct 2010 | B2 |
7817615 | Breau et al. | Oct 2010 | B1 |
7817983 | Cassett et al. | Oct 2010 | B2 |
7822837 | Urban et al. | Oct 2010 | B1 |
7822849 | Titus | Oct 2010 | B2 |
7826427 | Sood et al. | Nov 2010 | B2 |
7826607 | De Carvalho Resende et al. | Nov 2010 | B1 |
7835275 | Swan et al. | Nov 2010 | B1 |
7843831 | Morrill et al. | Nov 2010 | B2 |
7843843 | Papp, III et al. | Nov 2010 | B1 |
7844034 | Oh et al. | Nov 2010 | B1 |
7844728 | Anderson et al. | Nov 2010 | B2 |
7848768 | Omori et al. | Dec 2010 | B2 |
7849161 | Koch et al. | Dec 2010 | B2 |
7849170 | Hargens et al. | Dec 2010 | B1 |
7849477 | Cristofalo et al. | Dec 2010 | B2 |
7853250 | Harvey | Dec 2010 | B2 |
7853255 | Karaoguz et al. | Dec 2010 | B2 |
7853656 | Yach et al. | Dec 2010 | B2 |
7856226 | Wong et al. | Dec 2010 | B2 |
7860088 | Lioy | Dec 2010 | B2 |
7865182 | Macaluso | Jan 2011 | B2 |
7865187 | Ramer et al. | Jan 2011 | B2 |
7868778 | Kenwright | Jan 2011 | B2 |
7873001 | Silver | Jan 2011 | B2 |
7873344 | Bowser et al. | Jan 2011 | B2 |
7873346 | Petersson et al. | Jan 2011 | B2 |
7873540 | Arumugam | Jan 2011 | B2 |
7873705 | Kalish | Jan 2011 | B2 |
7877090 | Maes | Jan 2011 | B2 |
7881199 | Krstulich | Feb 2011 | B2 |
7881697 | Baker et al. | Feb 2011 | B2 |
7882029 | White | Feb 2011 | B2 |
7882247 | Sturniolo et al. | Feb 2011 | B2 |
7882560 | Kraemer et al. | Feb 2011 | B2 |
7886047 | Potluri | Feb 2011 | B1 |
7889384 | Armentrout et al. | Feb 2011 | B2 |
7890084 | Dudziak et al. | Feb 2011 | B1 |
7890111 | Bugenhagen | Feb 2011 | B2 |
7894431 | Goring et al. | Feb 2011 | B2 |
7899039 | Andreasen et al. | Mar 2011 | B2 |
7899438 | Baker et al. | Mar 2011 | B2 |
7903553 | Liu | Mar 2011 | B2 |
7907970 | Park et al. | Mar 2011 | B2 |
7911975 | Droz et al. | Mar 2011 | B2 |
7912025 | Pattenden et al. | Mar 2011 | B2 |
7912056 | Brassem | Mar 2011 | B1 |
7920529 | Mahler et al. | Apr 2011 | B1 |
7921463 | Sood et al. | Apr 2011 | B2 |
7925740 | Nath et al. | Apr 2011 | B2 |
7925778 | Wijnands et al. | Apr 2011 | B1 |
7929959 | DeAtley et al. | Apr 2011 | B2 |
7929960 | Martin et al. | Apr 2011 | B2 |
7929973 | Zavalkovsky et al. | Apr 2011 | B2 |
7930327 | Craft et al. | Apr 2011 | B2 |
7930446 | Kesselman et al. | Apr 2011 | B2 |
7930553 | Satarasinghe et al. | Apr 2011 | B2 |
7933274 | Verma et al. | Apr 2011 | B2 |
7936736 | Proctor, Jr. et al. | May 2011 | B2 |
7937069 | Rassam | May 2011 | B2 |
7937450 | Janik | May 2011 | B2 |
7940685 | Breslau et al. | May 2011 | B1 |
7940751 | Hansen | May 2011 | B2 |
7941184 | Prendergast et al. | May 2011 | B2 |
7944948 | Chow et al. | May 2011 | B2 |
7945238 | Baker et al. | May 2011 | B2 |
7945240 | Klock et al. | May 2011 | B1 |
7945945 | Graham et al. | May 2011 | B2 |
7948952 | Hurtta et al. | May 2011 | B2 |
7948953 | Melkote et al. | May 2011 | B2 |
7948968 | Voit et al. | May 2011 | B2 |
7949529 | Weider et al. | May 2011 | B2 |
7953808 | Sharp et al. | May 2011 | B2 |
7953877 | Vemula et al. | May 2011 | B2 |
7957020 | Mine et al. | Jun 2011 | B2 |
7957381 | Clermidy et al. | Jun 2011 | B2 |
7957511 | Drudis et al. | Jun 2011 | B2 |
7958029 | Bobich et al. | Jun 2011 | B1 |
7962622 | Friend et al. | Jun 2011 | B2 |
7965983 | Swan et al. | Jun 2011 | B1 |
7966405 | Sundaresan et al. | Jun 2011 | B2 |
7967682 | Huizinga | Jun 2011 | B2 |
7969950 | Iyer et al. | Jun 2011 | B2 |
7970350 | Sheynman | Jun 2011 | B2 |
7970426 | Poe et al. | Jun 2011 | B2 |
7974624 | Gallagher et al. | Jul 2011 | B2 |
7975184 | Goff et al. | Jul 2011 | B2 |
7978627 | Taylor et al. | Jul 2011 | B2 |
7978686 | Goyal et al. | Jul 2011 | B2 |
7979069 | Hupp et al. | Jul 2011 | B2 |
7979889 | Gladstone et al. | Jul 2011 | B2 |
7979896 | McMurtry et al. | Jul 2011 | B2 |
7984130 | Bogineni et al. | Jul 2011 | B2 |
7984511 | Kocher et al. | Jul 2011 | B2 |
7986935 | D'Souza et al. | Jul 2011 | B1 |
7987496 | Bryce et al. | Jul 2011 | B2 |
7987510 | Kocher et al. | Jul 2011 | B2 |
7990049 | Shioya | Aug 2011 | B2 |
8000276 | Scherzer et al. | Aug 2011 | B2 |
8000318 | Wiley et al. | Aug 2011 | B2 |
8005009 | McKee et al. | Aug 2011 | B2 |
8005459 | Balsillie | Aug 2011 | B2 |
8005726 | Bao | Aug 2011 | B1 |
8005913 | Carlander | Aug 2011 | B1 |
8005988 | Maes | Aug 2011 | B2 |
8010080 | Thenthiruperai et al. | Aug 2011 | B1 |
8010081 | Roskowski | Aug 2011 | B1 |
8010082 | Sutaria et al. | Aug 2011 | B2 |
8010623 | Fitch et al. | Aug 2011 | B1 |
8010990 | Ferguson et al. | Aug 2011 | B2 |
8015133 | Wu et al. | Sep 2011 | B1 |
8015234 | Lum et al. | Sep 2011 | B2 |
8019687 | Wang et al. | Sep 2011 | B2 |
8019820 | Son et al. | Sep 2011 | B2 |
8019846 | Roelens et al. | Sep 2011 | B2 |
8019868 | Rao et al. | Sep 2011 | B2 |
8019886 | Harrang et al. | Sep 2011 | B2 |
8023425 | Raleigh | Sep 2011 | B2 |
8024397 | Erickson et al. | Sep 2011 | B1 |
8024424 | Freimuth et al. | Sep 2011 | B2 |
8027339 | Short et al. | Sep 2011 | B2 |
8031601 | Feroz et al. | Oct 2011 | B2 |
8032168 | Ikaheimo | Oct 2011 | B2 |
8032409 | Mikurak | Oct 2011 | B1 |
8032899 | Archer et al. | Oct 2011 | B2 |
8036387 | Kudelski et al. | Oct 2011 | B2 |
8036600 | Garrett et al. | Oct 2011 | B2 |
8044792 | Orr et al. | Oct 2011 | B2 |
8045973 | Chambers | Oct 2011 | B2 |
8046449 | Yoshiuchi | Oct 2011 | B2 |
8050275 | Iyer | Nov 2011 | B1 |
8050690 | Neeraj | Nov 2011 | B2 |
8050705 | Sicher et al. | Nov 2011 | B2 |
8059530 | Cole | Nov 2011 | B1 |
8060017 | Schlicht et al. | Nov 2011 | B2 |
8060463 | Spiegel | Nov 2011 | B1 |
8064418 | Maki | Nov 2011 | B2 |
8064896 | Bell et al. | Nov 2011 | B2 |
8065365 | Saxena et al. | Nov 2011 | B2 |
8068824 | Shan et al. | Nov 2011 | B2 |
8068829 | Lemond et al. | Nov 2011 | B2 |
8073427 | Koch et al. | Dec 2011 | B2 |
8073721 | Lewis | Dec 2011 | B1 |
8078140 | Baker et al. | Dec 2011 | B2 |
8078163 | Lemond et al. | Dec 2011 | B2 |
8085808 | Brusca et al. | Dec 2011 | B2 |
8086398 | Sanchez et al. | Dec 2011 | B2 |
8086497 | Oakes, III | Dec 2011 | B1 |
8086791 | Caulkins | Dec 2011 | B2 |
8090359 | Proctor, Jr. et al. | Jan 2012 | B2 |
8090361 | Hagan | Jan 2012 | B2 |
8090616 | Proctor, Jr. et al. | Jan 2012 | B2 |
8091087 | Ali et al. | Jan 2012 | B2 |
8094551 | Huber et al. | Jan 2012 | B2 |
8095112 | Chow et al. | Jan 2012 | B2 |
8095124 | Balia | Jan 2012 | B2 |
8095175 | Todd et al. | Jan 2012 | B2 |
8095640 | Guingo et al. | Jan 2012 | B2 |
8095666 | Schmidt et al. | Jan 2012 | B2 |
8098579 | Ray et al. | Jan 2012 | B2 |
8099077 | Chowdhury et al. | Jan 2012 | B2 |
8099517 | Jia et al. | Jan 2012 | B2 |
8102814 | Rahman et al. | Jan 2012 | B2 |
8103285 | Kalhan | Jan 2012 | B2 |
8104080 | Burns et al. | Jan 2012 | B2 |
8107953 | Zimmerman et al. | Jan 2012 | B2 |
8108520 | Ruutu et al. | Jan 2012 | B2 |
8108680 | Murray | Jan 2012 | B2 |
8112435 | Epstein et al. | Feb 2012 | B2 |
8116223 | Tian et al. | Feb 2012 | B2 |
8116749 | Proctor, Jr. et al. | Feb 2012 | B2 |
8116781 | Chen et al. | Feb 2012 | B2 |
8122128 | Burke, II et al. | Feb 2012 | B2 |
8122249 | Falk et al. | Feb 2012 | B2 |
8125897 | Ray et al. | Feb 2012 | B2 |
8126123 | Cai et al. | Feb 2012 | B2 |
8126396 | Bennett | Feb 2012 | B2 |
8126476 | Vardi et al. | Feb 2012 | B2 |
8126722 | Robb et al. | Feb 2012 | B2 |
8130793 | Edwards et al. | Mar 2012 | B2 |
8131256 | Martti et al. | Mar 2012 | B2 |
8131281 | Hildner et al. | Mar 2012 | B1 |
8131301 | Ahmed | Mar 2012 | B1 |
8131840 | Denker | Mar 2012 | B1 |
8131858 | Agulnik et al. | Mar 2012 | B2 |
8132256 | Bari | Mar 2012 | B2 |
8134954 | Godfrey et al. | Mar 2012 | B2 |
8135388 | Gailloux et al. | Mar 2012 | B1 |
8135392 | Marcellino et al. | Mar 2012 | B2 |
8135657 | Kapoor et al. | Mar 2012 | B2 |
8140690 | Ly et al. | Mar 2012 | B2 |
8144591 | Ghai et al. | Mar 2012 | B2 |
8144853 | Aboujaoude | Mar 2012 | B1 |
8145194 | Yoshikawa et al. | Mar 2012 | B2 |
8146142 | Lortz et al. | Mar 2012 | B2 |
8149748 | Bata et al. | Apr 2012 | B2 |
8149823 | Turcan et al. | Apr 2012 | B2 |
8150394 | Bianconi et al. | Apr 2012 | B2 |
8150431 | Wolovitz et al. | Apr 2012 | B2 |
8151205 | Follmann et al. | Apr 2012 | B2 |
8155155 | Chow et al. | Apr 2012 | B1 |
8155620 | Wang et al. | Apr 2012 | B2 |
8155666 | Alizadeh-Shabdiz | Apr 2012 | B2 |
8155670 | Fullam et al. | Apr 2012 | B2 |
8156206 | Kiley et al. | Apr 2012 | B2 |
8159520 | Dhanoa et al. | Apr 2012 | B1 |
8160015 | Rashid et al. | Apr 2012 | B2 |
8160056 | Van der Merwe et al. | Apr 2012 | B2 |
8160598 | Savoor | Apr 2012 | B2 |
8165576 | Raju et al. | Apr 2012 | B2 |
8166040 | Brindisi et al. | Apr 2012 | B2 |
8166554 | John | Apr 2012 | B2 |
8170553 | Bennett | May 2012 | B2 |
8174378 | Richman et al. | May 2012 | B2 |
8174970 | Adamczyk et al. | May 2012 | B2 |
8175574 | Panda et al. | May 2012 | B1 |
8180333 | Wells et al. | May 2012 | B1 |
8180881 | Seo et al. | May 2012 | B2 |
8180886 | Overcash et al. | May 2012 | B2 |
8184530 | Swan et al. | May 2012 | B1 |
8184590 | Rosenblatt | May 2012 | B2 |
8185088 | Klein et al. | May 2012 | B2 |
8185093 | Jheng et al. | May 2012 | B2 |
8185127 | Cai et al. | May 2012 | B1 |
8185152 | Goldner | May 2012 | B1 |
8185158 | Tamura et al. | May 2012 | B2 |
8190087 | Fisher et al. | May 2012 | B2 |
8190122 | Alexander et al. | May 2012 | B1 |
8190675 | Tribbett | May 2012 | B2 |
8191106 | Choyi et al. | May 2012 | B2 |
8191116 | Gazzard | May 2012 | B1 |
8191124 | Wynn et al. | May 2012 | B2 |
8194549 | Huber et al. | Jun 2012 | B2 |
8194553 | Liang et al. | Jun 2012 | B2 |
8194572 | Horvath et al. | Jun 2012 | B2 |
8194581 | Schroeder et al. | Jun 2012 | B1 |
8195093 | Garrett et al. | Jun 2012 | B2 |
8195153 | Frencel et al. | Jun 2012 | B1 |
8195163 | Gisby et al. | Jun 2012 | B2 |
8195661 | Kalavade | Jun 2012 | B2 |
8196199 | Hrastar et al. | Jun 2012 | B2 |
8200163 | Hoffman | Jun 2012 | B2 |
8200200 | Belser et al. | Jun 2012 | B1 |
8200509 | Kenedy et al. | Jun 2012 | B2 |
8200775 | Moore | Jun 2012 | B2 |
8200818 | Freund et al. | Jun 2012 | B2 |
8204190 | Bang et al. | Jun 2012 | B2 |
8204505 | Jin et al. | Jun 2012 | B2 |
8204794 | Peng et al. | Jun 2012 | B1 |
8208788 | Ando et al. | Jun 2012 | B2 |
8208919 | Kotecha | Jun 2012 | B2 |
8213296 | Shannon et al. | Jul 2012 | B2 |
8213363 | Ying et al. | Jul 2012 | B2 |
8214536 | Zhao | Jul 2012 | B2 |
8214890 | Kirovski et al. | Jul 2012 | B2 |
8219134 | Maharajh et al. | Jul 2012 | B2 |
8223655 | Heinz et al. | Jul 2012 | B2 |
8223741 | Bartlett et al. | Jul 2012 | B1 |
8224382 | Bultman | Jul 2012 | B2 |
8224773 | Spiegel | Jul 2012 | B2 |
8228818 | Chase et al. | Jul 2012 | B2 |
8229394 | Karlberg | Jul 2012 | B2 |
8229914 | Ramer et al. | Jul 2012 | B2 |
8230061 | Hassan et al. | Jul 2012 | B2 |
8233433 | Kalhan | Jul 2012 | B2 |
8233883 | De Froment | Jul 2012 | B2 |
8233895 | Tysowski | Jul 2012 | B2 |
8234583 | Sloo et al. | Jul 2012 | B2 |
8238287 | Gopi et al. | Aug 2012 | B1 |
8239520 | Grah | Aug 2012 | B2 |
8242959 | Mia et al. | Aug 2012 | B2 |
8244241 | Montemurro | Aug 2012 | B2 |
8249601 | Emberson et al. | Aug 2012 | B2 |
8254880 | Aaltonen et al. | Aug 2012 | B2 |
8254915 | Kozisek | Aug 2012 | B2 |
8255515 | Melman et al. | Aug 2012 | B1 |
8255534 | Assadzadeh | Aug 2012 | B2 |
8255689 | Kim et al. | Aug 2012 | B2 |
8259692 | Bajko | Sep 2012 | B2 |
8264965 | Dolganow et al. | Sep 2012 | B2 |
8265004 | Toutonghi | Sep 2012 | B2 |
8266249 | Hu | Sep 2012 | B2 |
8266681 | Deshpande et al. | Sep 2012 | B2 |
8270955 | Ramer et al. | Sep 2012 | B2 |
8270972 | Otting et al. | Sep 2012 | B2 |
8271025 | Brisebois et al. | Sep 2012 | B2 |
8271045 | Parolkar et al. | Sep 2012 | B2 |
8271049 | Silver et al. | Sep 2012 | B2 |
8271992 | Chatley et al. | Sep 2012 | B2 |
8275415 | Huslak | Sep 2012 | B2 |
8275830 | Raleigh | Sep 2012 | B2 |
8279067 | Berger et al. | Oct 2012 | B2 |
8279864 | Wood | Oct 2012 | B2 |
8280351 | Ahmed et al. | Oct 2012 | B1 |
8280354 | Smith et al. | Oct 2012 | B2 |
8284740 | O'Connor | Oct 2012 | B2 |
8285249 | Baker et al. | Oct 2012 | B2 |
8285992 | Mathur et al. | Oct 2012 | B2 |
8291238 | Ginter et al. | Oct 2012 | B2 |
8291439 | Jethi et al. | Oct 2012 | B2 |
8296404 | McDysan et al. | Oct 2012 | B2 |
8300575 | Willars | Oct 2012 | B2 |
8301513 | Peng et al. | Oct 2012 | B1 |
8306518 | Gailloux | Nov 2012 | B1 |
8306741 | Tu | Nov 2012 | B2 |
8307067 | Ryan | Nov 2012 | B2 |
8307095 | Clark et al. | Nov 2012 | B2 |
8310943 | Mehta et al. | Nov 2012 | B2 |
8315198 | Corneille et al. | Nov 2012 | B2 |
8315593 | Gallant et al. | Nov 2012 | B2 |
8315594 | Mauser et al. | Nov 2012 | B1 |
8315718 | Caffrey et al. | Nov 2012 | B2 |
8315999 | Chatley et al. | Nov 2012 | B2 |
8320244 | Muqattash et al. | Nov 2012 | B2 |
8320902 | Moring et al. | Nov 2012 | B2 |
8320949 | Matta | Nov 2012 | B2 |
8325638 | Jin et al. | Dec 2012 | B2 |
8325906 | Fullarton et al. | Dec 2012 | B2 |
8326319 | Davis | Dec 2012 | B2 |
8326359 | Kauffman | Dec 2012 | B2 |
8326828 | Zhou et al. | Dec 2012 | B2 |
8331223 | Hill et al. | Dec 2012 | B2 |
8331293 | Sood | Dec 2012 | B2 |
8332375 | Chatley et al. | Dec 2012 | B2 |
8332517 | Russell | Dec 2012 | B2 |
8335161 | Foottit et al. | Dec 2012 | B2 |
8339991 | Biswas et al. | Dec 2012 | B2 |
8340625 | Johnson et al. | Dec 2012 | B1 |
8340628 | Taylor et al. | Dec 2012 | B2 |
8340678 | Pandey | Dec 2012 | B1 |
8340718 | Colonna et al. | Dec 2012 | B2 |
8346210 | Balsan et al. | Jan 2013 | B2 |
8346923 | Rowles et al. | Jan 2013 | B2 |
8347104 | Pathiyal | Jan 2013 | B2 |
8347362 | Cai et al. | Jan 2013 | B2 |
8347378 | Merkin et al. | Jan 2013 | B2 |
8350700 | Fast et al. | Jan 2013 | B2 |
8351592 | Freeny, Jr. et al. | Jan 2013 | B2 |
8351898 | Raleigh | Jan 2013 | B2 |
8352360 | De Judicibus et al. | Jan 2013 | B2 |
8352630 | Hart | Jan 2013 | B2 |
8352980 | Howcroft | Jan 2013 | B2 |
8353001 | Herrod | Jan 2013 | B2 |
8355570 | Karsanbhai et al. | Jan 2013 | B2 |
8355696 | Olding et al. | Jan 2013 | B1 |
8356336 | Johnston et al. | Jan 2013 | B2 |
8358638 | Scherzer et al. | Jan 2013 | B2 |
8358975 | Bahl et al. | Jan 2013 | B2 |
8363658 | Delker et al. | Jan 2013 | B1 |
8363799 | Gruchala et al. | Jan 2013 | B2 |
8364089 | Phillips | Jan 2013 | B2 |
8364806 | Short et al. | Jan 2013 | B2 |
8369274 | Sawai | Feb 2013 | B2 |
8370477 | Short et al. | Feb 2013 | B2 |
8370483 | Choong et al. | Feb 2013 | B2 |
8374090 | Morrill et al. | Feb 2013 | B2 |
8374592 | Proctor, Jr. et al. | Feb 2013 | B2 |
8375128 | Tofighbakhsh et al. | Feb 2013 | B2 |
8375136 | Roman et al. | Feb 2013 | B2 |
8379847 | Bell et al. | Feb 2013 | B2 |
8380247 | Engstrom | Feb 2013 | B2 |
8385199 | Coward et al. | Feb 2013 | B1 |
8385896 | Proctor, Jr. et al. | Feb 2013 | B2 |
8385964 | Haney | Feb 2013 | B2 |
8385975 | Forutanpour et al. | Feb 2013 | B2 |
8386386 | Zhu | Feb 2013 | B1 |
8391262 | Maki et al. | Mar 2013 | B2 |
8391834 | Raleigh | Mar 2013 | B2 |
8392982 | Harris et al. | Mar 2013 | B2 |
8396458 | Raleigh | Mar 2013 | B2 |
8396929 | Helfman et al. | Mar 2013 | B2 |
8401968 | Schattauer et al. | Mar 2013 | B1 |
8402165 | Deu-Ngoc et al. | Mar 2013 | B2 |
8402540 | Kapoor et al. | Mar 2013 | B2 |
8406427 | Chand et al. | Mar 2013 | B2 |
8406736 | Das et al. | Mar 2013 | B2 |
8407472 | Hao et al. | Mar 2013 | B2 |
8407763 | Weller et al. | Mar 2013 | B2 |
8411587 | Curtis et al. | Apr 2013 | B2 |
8411691 | Aggarwal | Apr 2013 | B2 |
8412798 | Wang | Apr 2013 | B1 |
8413245 | Kraemer et al. | Apr 2013 | B2 |
8418168 | Tyhurst et al. | Apr 2013 | B2 |
8422988 | Keshav | Apr 2013 | B1 |
8423016 | Buckley et al. | Apr 2013 | B2 |
8429403 | Moret et al. | Apr 2013 | B2 |
8429409 | Wall et al. | Apr 2013 | B1 |
8437734 | Ray et al. | May 2013 | B2 |
8441955 | Wilkinson et al. | May 2013 | B2 |
8442015 | Behzad et al. | May 2013 | B2 |
8446831 | Kwan et al. | May 2013 | B2 |
8447324 | Shuman et al. | May 2013 | B2 |
8447607 | Weider et al. | May 2013 | B2 |
8447980 | Godfrey et al. | May 2013 | B2 |
8448015 | Gerhart | May 2013 | B2 |
8452858 | Wu et al. | May 2013 | B2 |
8461958 | Saenz et al. | Jun 2013 | B2 |
8463194 | Erlenback et al. | Jun 2013 | B2 |
8463232 | Tuli et al. | Jun 2013 | B2 |
8468337 | Gaur et al. | Jun 2013 | B2 |
8472371 | Bari et al. | Jun 2013 | B1 |
8477778 | Lehmann, Jr. et al. | Jul 2013 | B2 |
8483135 | Cai et al. | Jul 2013 | B2 |
8483694 | Lewis et al. | Jul 2013 | B2 |
8484327 | Werner et al. | Jul 2013 | B2 |
8484568 | Rados et al. | Jul 2013 | B2 |
8488597 | Nie et al. | Jul 2013 | B2 |
8489110 | Frank et al. | Jul 2013 | B2 |
8489720 | Morford et al. | Jul 2013 | B1 |
8494559 | Malmi | Jul 2013 | B1 |
8495181 | Venkatraman et al. | Jul 2013 | B2 |
8495227 | Kaminsky et al. | Jul 2013 | B2 |
8495360 | Falk et al. | Jul 2013 | B2 |
8495700 | Shahbazi | Jul 2013 | B2 |
8495743 | Kraemer et al. | Jul 2013 | B2 |
8499087 | Hu | Jul 2013 | B2 |
RE44412 | Naqvi et al. | Aug 2013 | E |
8500533 | Lutnick et al. | Aug 2013 | B2 |
8503358 | Hanson et al. | Aug 2013 | B2 |
8503455 | Heikens | Aug 2013 | B2 |
8504032 | Lott et al. | Aug 2013 | B2 |
8504574 | Dvorak et al. | Aug 2013 | B2 |
8504687 | Maffione et al. | Aug 2013 | B2 |
8504690 | Shah et al. | Aug 2013 | B2 |
8504729 | Pezzutti | Aug 2013 | B2 |
8505073 | Taglienti et al. | Aug 2013 | B2 |
8509082 | Heinz et al. | Aug 2013 | B2 |
8514927 | Sundararajan et al. | Aug 2013 | B2 |
8516552 | Raleigh | Aug 2013 | B2 |
8520589 | Bhatt et al. | Aug 2013 | B2 |
8520595 | Yadav et al. | Aug 2013 | B2 |
8521110 | Rofougaran | Aug 2013 | B2 |
8521775 | Poh et al. | Aug 2013 | B1 |
8522039 | Hyndman et al. | Aug 2013 | B2 |
8522249 | Beaule | Aug 2013 | B2 |
8522337 | Adusumilli et al. | Aug 2013 | B2 |
8523547 | Pekrul | Sep 2013 | B2 |
8526329 | Mahany et al. | Sep 2013 | B2 |
8526350 | Xue et al. | Sep 2013 | B2 |
8527410 | Markki et al. | Sep 2013 | B2 |
8527662 | Biswas et al. | Sep 2013 | B2 |
8528068 | Weglein et al. | Sep 2013 | B1 |
8531954 | McNaughton et al. | Sep 2013 | B2 |
8531995 | Khan et al. | Sep 2013 | B2 |
8532610 | Manning Cassett et al. | Sep 2013 | B2 |
8533775 | Alcorn et al. | Sep 2013 | B2 |
8535160 | Lutnick et al. | Sep 2013 | B2 |
8538394 | Zimmerman et al. | Sep 2013 | B2 |
8538402 | Vidal et al. | Sep 2013 | B2 |
8538421 | Brisebois et al. | Sep 2013 | B2 |
8538458 | Haney | Sep 2013 | B2 |
8539544 | Garimella et al. | Sep 2013 | B2 |
8539561 | Gupta et al. | Sep 2013 | B2 |
8543265 | Ekhaguere et al. | Sep 2013 | B2 |
8543814 | Laitinen et al. | Sep 2013 | B2 |
8544105 | Mclean et al. | Sep 2013 | B2 |
8548427 | Chow et al. | Oct 2013 | B2 |
8548428 | Raleigh | Oct 2013 | B2 |
8549173 | Wu et al. | Oct 2013 | B1 |
8554876 | Winsor | Oct 2013 | B2 |
8559369 | Barkan | Oct 2013 | B2 |
8561138 | Rothman et al. | Oct 2013 | B2 |
8565746 | Hoffman | Oct 2013 | B2 |
8566236 | Busch | Oct 2013 | B2 |
8571474 | Chavez et al. | Oct 2013 | B2 |
8571501 | Miller et al. | Oct 2013 | B2 |
8571598 | Valavi | Oct 2013 | B2 |
8571993 | Kocher et al. | Oct 2013 | B2 |
8572117 | Rappaport | Oct 2013 | B2 |
8572256 | Babbar | Oct 2013 | B2 |
8583499 | De Judicibus et al. | Nov 2013 | B2 |
8588240 | Ramankutty et al. | Nov 2013 | B2 |
8589541 | Raleigh et al. | Nov 2013 | B2 |
8589955 | Roundtree et al. | Nov 2013 | B2 |
8594665 | Anschutz | Nov 2013 | B2 |
8595186 | Mandyam et al. | Nov 2013 | B1 |
8600895 | Felsher | Dec 2013 | B2 |
8601125 | Huang et al. | Dec 2013 | B2 |
8605691 | Soomro et al. | Dec 2013 | B2 |
8615507 | Varadarajulu et al. | Dec 2013 | B2 |
8619735 | Montemurro et al. | Dec 2013 | B2 |
8620257 | Qiu et al. | Dec 2013 | B2 |
8621056 | Coussemaeker et al. | Dec 2013 | B2 |
8626115 | Raleigh et al. | Jan 2014 | B2 |
8630314 | York | Jan 2014 | B2 |
8631428 | Scott et al. | Jan 2014 | B2 |
8634425 | Gorti et al. | Jan 2014 | B2 |
8635164 | Rosenhaft et al. | Jan 2014 | B2 |
8639215 | McGregor et al. | Jan 2014 | B2 |
8644702 | Kalajan | Feb 2014 | B1 |
8644813 | Gailloux et al. | Feb 2014 | B1 |
8645518 | David | Feb 2014 | B2 |
8655357 | Gazzard et al. | Feb 2014 | B1 |
8656472 | McMurtry et al. | Feb 2014 | B2 |
8660853 | Robb et al. | Feb 2014 | B2 |
8666395 | Silver | Mar 2014 | B2 |
8667542 | Bertz et al. | Mar 2014 | B1 |
8670334 | Keohane et al. | Mar 2014 | B2 |
8670752 | Fan et al. | Mar 2014 | B2 |
8675852 | Maes | Mar 2014 | B2 |
8676682 | Kalliola | Mar 2014 | B2 |
8676925 | Liu et al. | Mar 2014 | B1 |
8693323 | McDysan | Apr 2014 | B1 |
8694772 | Kao et al. | Apr 2014 | B2 |
8699355 | Macias | Apr 2014 | B2 |
8700729 | Dua | Apr 2014 | B2 |
8701015 | Bonnat | Apr 2014 | B2 |
8705361 | Venkataraman et al. | Apr 2014 | B2 |
8706863 | Fadell | Apr 2014 | B2 |
8712631 | Tietjen et al. | Apr 2014 | B2 |
8713535 | Malhotra et al. | Apr 2014 | B2 |
8713641 | Pagan et al. | Apr 2014 | B1 |
8719397 | Levi et al. | May 2014 | B2 |
8719423 | Wyld | May 2014 | B2 |
8725899 | Short et al. | May 2014 | B2 |
8730842 | Collins et al. | May 2014 | B2 |
8731519 | Flynn et al. | May 2014 | B2 |
8732808 | Sewall et al. | May 2014 | B2 |
8738860 | Griffin et al. | May 2014 | B1 |
8739035 | Trethewey | May 2014 | B2 |
8739287 | Polyakov et al. | May 2014 | B1 |
8742694 | Bora | Jun 2014 | B2 |
8744339 | Halfmann et al. | Jun 2014 | B2 |
8761711 | Grignani et al. | Jun 2014 | B2 |
8780857 | Balasubramanian et al. | Jul 2014 | B2 |
8787249 | Giaretta et al. | Jul 2014 | B2 |
8793304 | Lu et al. | Jul 2014 | B2 |
8793758 | Raleigh et al. | Jul 2014 | B2 |
8799227 | Ferguson et al. | Aug 2014 | B2 |
8804517 | Oerton | Aug 2014 | B2 |
8804695 | Branam | Aug 2014 | B2 |
8811338 | Jin et al. | Aug 2014 | B2 |
8811991 | Jain et al. | Aug 2014 | B2 |
8812525 | Taylor, III | Aug 2014 | B1 |
8818394 | Bienas et al. | Aug 2014 | B2 |
8819253 | Simeloff et al. | Aug 2014 | B2 |
8825109 | Montemurro et al. | Sep 2014 | B2 |
8826411 | Moen et al. | Sep 2014 | B2 |
8831561 | Sutaria et al. | Sep 2014 | B2 |
8837322 | Venkataramanan et al. | Sep 2014 | B2 |
8838686 | Getchius | Sep 2014 | B2 |
8838752 | Lor et al. | Sep 2014 | B2 |
8843849 | Neil et al. | Sep 2014 | B2 |
8845415 | Lutnick et al. | Sep 2014 | B2 |
8849297 | Balasubramanian | Sep 2014 | B2 |
8855620 | Sievers et al. | Oct 2014 | B2 |
8862751 | Faccin et al. | Oct 2014 | B2 |
8863111 | Selitser et al. | Oct 2014 | B2 |
8868725 | Samba | Oct 2014 | B2 |
8868727 | Yumerefendi et al. | Oct 2014 | B2 |
8875042 | LeJeune et al. | Oct 2014 | B2 |
8880047 | Konicek et al. | Nov 2014 | B2 |
8891483 | Connelly et al. | Nov 2014 | B2 |
8898748 | Burks et al. | Nov 2014 | B2 |
8908516 | Tzamaloukas et al. | Dec 2014 | B2 |
8929374 | Tönsing et al. | Jan 2015 | B2 |
8930238 | Coffman et al. | Jan 2015 | B2 |
8943551 | Ganapathy et al. | Jan 2015 | B2 |
8948726 | Smith et al. | Feb 2015 | B2 |
8949382 | Cornett et al. | Feb 2015 | B2 |
8949597 | Reeves et al. | Feb 2015 | B1 |
8955038 | Nicodemus et al. | Feb 2015 | B2 |
8966018 | Bugwadia et al. | Feb 2015 | B2 |
8971841 | Menezes et al. | Mar 2015 | B2 |
8971912 | Chou et al. | Mar 2015 | B2 |
8972537 | Bastian et al. | Mar 2015 | B2 |
8977284 | Reed | Mar 2015 | B2 |
8977856 | Malek et al. | Mar 2015 | B2 |
8983860 | Beda, III et al. | Mar 2015 | B1 |
8995952 | Baker et al. | Mar 2015 | B1 |
9002322 | Cotterill | Apr 2015 | B2 |
9002342 | Tenhunen et al. | Apr 2015 | B2 |
9014973 | Ruckart | Apr 2015 | B2 |
9015331 | Lai et al. | Apr 2015 | B2 |
9021069 | Ducrou et al. | Apr 2015 | B2 |
9030934 | Shah et al. | May 2015 | B2 |
9032427 | Gallant et al. | May 2015 | B2 |
9042923 | Mirho | May 2015 | B1 |
9043462 | Badiee et al. | May 2015 | B2 |
9047651 | Roumeliotis et al. | Jun 2015 | B2 |
9049010 | Jueneman et al. | Jun 2015 | B2 |
9064275 | Lu et al. | Jun 2015 | B1 |
9105031 | Shen et al. | Aug 2015 | B2 |
9111088 | Ghai et al. | Aug 2015 | B2 |
9135037 | Petrescu-Prahova et al. | Sep 2015 | B1 |
9137286 | Yuan | Sep 2015 | B1 |
9137389 | Neal et al. | Sep 2015 | B2 |
9172553 | Dawes et al. | Oct 2015 | B2 |
9173090 | Tuchman et al. | Oct 2015 | B2 |
9176913 | Millet et al. | Nov 2015 | B2 |
9177455 | Remer | Nov 2015 | B2 |
9191394 | Novak et al. | Nov 2015 | B2 |
9225847 | Daymond | Dec 2015 | B2 |
9282460 | Souissi | Mar 2016 | B2 |
9286469 | Kraemer et al. | Mar 2016 | B2 |
9286604 | Aabye et al. | Mar 2016 | B2 |
9298723 | Vincent | Mar 2016 | B1 |
9313708 | Nam et al. | Apr 2016 | B2 |
9325737 | Gutowski et al. | Apr 2016 | B2 |
9326173 | Luft | Apr 2016 | B2 |
9344557 | Gruchala et al. | May 2016 | B2 |
9361451 | Oberheide et al. | Jun 2016 | B2 |
9363285 | Kitamura | Jun 2016 | B2 |
9367680 | Mahaffey et al. | Jun 2016 | B2 |
9369959 | Ruutu et al. | Jun 2016 | B2 |
9386045 | Kgil et al. | Jul 2016 | B2 |
9402254 | Kneckt et al. | Jul 2016 | B2 |
9413546 | Meier et al. | Aug 2016 | B2 |
9418381 | Ahuja et al. | Aug 2016 | B2 |
9436805 | Kravets | Sep 2016 | B1 |
9454598 | Hwang et al. | Sep 2016 | B2 |
9459767 | Cockcroft et al. | Oct 2016 | B2 |
9501803 | Bilac et al. | Nov 2016 | B2 |
9525992 | Rao | Dec 2016 | B2 |
9534861 | Kellgren | Jan 2017 | B1 |
9557889 | Raleigh et al. | Jan 2017 | B2 |
9589117 | Ali et al. | Mar 2017 | B2 |
9609459 | Raleigh | Mar 2017 | B2 |
9609510 | Raleigh et al. | Mar 2017 | B2 |
9634850 | Taft et al. | Apr 2017 | B2 |
9642004 | Wang et al. | May 2017 | B2 |
9680658 | Goel et al. | Jun 2017 | B2 |
9954975 | Raleigh | Apr 2018 | B2 |
10024948 | Ganick et al. | Jul 2018 | B2 |
20010048738 | Baniak et al. | Dec 2001 | A1 |
20010053694 | Igarashi et al. | Dec 2001 | A1 |
20020013844 | Garrett et al. | Jan 2002 | A1 |
20020022472 | Watler et al. | Feb 2002 | A1 |
20020022483 | Thompson et al. | Feb 2002 | A1 |
20020049074 | Eisinger et al. | Apr 2002 | A1 |
20020099848 | Lee | Jul 2002 | A1 |
20020116338 | Gonthier et al. | Aug 2002 | A1 |
20020120370 | Parupudi et al. | Aug 2002 | A1 |
20020120540 | Kende et al. | Aug 2002 | A1 |
20020131404 | Mehta et al. | Sep 2002 | A1 |
20020138599 | Dilman et al. | Sep 2002 | A1 |
20020138601 | Piponius et al. | Sep 2002 | A1 |
20020154751 | Thompson et al. | Oct 2002 | A1 |
20020161601 | Nauer et al. | Oct 2002 | A1 |
20020164983 | Raviv et al. | Nov 2002 | A1 |
20020176377 | Hamilton | Nov 2002 | A1 |
20020188732 | Buckman et al. | Dec 2002 | A1 |
20020191573 | Whitehill et al. | Dec 2002 | A1 |
20020199001 | Wenocur et al. | Dec 2002 | A1 |
20030004937 | Salmenkaita et al. | Jan 2003 | A1 |
20030005112 | Krautkremer | Jan 2003 | A1 |
20030013434 | Rosenberg et al. | Jan 2003 | A1 |
20030018524 | Fishman et al. | Jan 2003 | A1 |
20030028623 | Hennessey et al. | Feb 2003 | A1 |
20030046396 | Richter et al. | Mar 2003 | A1 |
20030050070 | Mashinsky et al. | Mar 2003 | A1 |
20030050837 | Kim | Mar 2003 | A1 |
20030084321 | Tarquini et al. | May 2003 | A1 |
20030088671 | Klinker et al. | May 2003 | A1 |
20030133408 | Cheng et al. | Jul 2003 | A1 |
20030134650 | Sundar et al. | Jul 2003 | A1 |
20030159030 | Evans | Aug 2003 | A1 |
20030161265 | Cao et al. | Aug 2003 | A1 |
20030171112 | Lupper et al. | Sep 2003 | A1 |
20030182420 | Jones et al. | Sep 2003 | A1 |
20030182435 | Redlich et al. | Sep 2003 | A1 |
20030184793 | Pineau | Oct 2003 | A1 |
20030188006 | Bard | Oct 2003 | A1 |
20030188117 | Yoshino et al. | Oct 2003 | A1 |
20030220984 | Jones et al. | Nov 2003 | A1 |
20030224781 | Milford et al. | Dec 2003 | A1 |
20030229900 | Reisman | Dec 2003 | A1 |
20030233332 | Keeler et al. | Dec 2003 | A1 |
20030236745 | Hartsell et al. | Dec 2003 | A1 |
20040019539 | Raman et al. | Jan 2004 | A1 |
20040019564 | Goldthwaite et al. | Jan 2004 | A1 |
20040021697 | Beaton et al. | Feb 2004 | A1 |
20040024756 | Rickard | Feb 2004 | A1 |
20040030705 | Bowman-Amuah | Feb 2004 | A1 |
20040039792 | Nakanishi | Feb 2004 | A1 |
20040044623 | Wake et al. | Mar 2004 | A1 |
20040047358 | Chen et al. | Mar 2004 | A1 |
20040054779 | Takeshima et al. | Mar 2004 | A1 |
20040073672 | Fascenda | Apr 2004 | A1 |
20040082346 | Skytt et al. | Apr 2004 | A1 |
20040098715 | Aghera et al. | May 2004 | A1 |
20040102182 | Reith et al. | May 2004 | A1 |
20040103193 | Pandya et al. | May 2004 | A1 |
20040107360 | Herrmann et al. | Jun 2004 | A1 |
20040114553 | Jiang et al. | Jun 2004 | A1 |
20040116140 | Babbar et al. | Jun 2004 | A1 |
20040127200 | Shaw et al. | Jul 2004 | A1 |
20040127208 | Nair et al. | Jul 2004 | A1 |
20040127256 | Goldthwaite et al. | Jul 2004 | A1 |
20040132427 | Lee et al. | Jul 2004 | A1 |
20040133668 | Nicholas, III | Jul 2004 | A1 |
20040137890 | Kalke | Jul 2004 | A1 |
20040165596 | Garcia et al. | Aug 2004 | A1 |
20040167958 | Stewart et al. | Aug 2004 | A1 |
20040168052 | Clisham et al. | Aug 2004 | A1 |
20040170191 | Guo et al. | Sep 2004 | A1 |
20040176104 | Arcens | Sep 2004 | A1 |
20040198331 | Coward et al. | Oct 2004 | A1 |
20040203755 | Brunet et al. | Oct 2004 | A1 |
20040203833 | Rathunde et al. | Oct 2004 | A1 |
20040225561 | Hertzberg et al. | Nov 2004 | A1 |
20040225898 | Frost et al. | Nov 2004 | A1 |
20040236547 | Rappaport et al. | Nov 2004 | A1 |
20040243680 | Mayer | Dec 2004 | A1 |
20040243992 | Gustafson et al. | Dec 2004 | A1 |
20040249918 | Sunshine | Dec 2004 | A1 |
20040255145 | Chow | Dec 2004 | A1 |
20040259534 | Chaudhari et al. | Dec 2004 | A1 |
20040260766 | Barros et al. | Dec 2004 | A1 |
20040267872 | Serdy et al. | Dec 2004 | A1 |
20050007993 | Chambers et al. | Jan 2005 | A1 |
20050009499 | Koster | Jan 2005 | A1 |
20050021995 | Lal et al. | Jan 2005 | A1 |
20050041617 | Huotari et al. | Feb 2005 | A1 |
20050048950 | Morper | Mar 2005 | A1 |
20050055291 | Bevente et al. | Mar 2005 | A1 |
20050055309 | Williams et al. | Mar 2005 | A1 |
20050055595 | Frazer et al. | Mar 2005 | A1 |
20050060266 | Demello et al. | Mar 2005 | A1 |
20050060525 | Schwartz et al. | Mar 2005 | A1 |
20050075115 | Corneille et al. | Apr 2005 | A1 |
20050079863 | Macaluso | Apr 2005 | A1 |
20050091505 | Riley et al. | Apr 2005 | A1 |
20050096024 | Bicker et al. | May 2005 | A1 |
20050097516 | Donnelly et al. | May 2005 | A1 |
20050107091 | Vannithamby et al. | May 2005 | A1 |
20050108075 | Douglis et al. | May 2005 | A1 |
20050111463 | Leung et al. | May 2005 | A1 |
20050128967 | Scobbie | Jun 2005 | A1 |
20050135264 | Popoff et al. | Jun 2005 | A1 |
20050163320 | Brown et al. | Jul 2005 | A1 |
20050166043 | Zhang et al. | Jul 2005 | A1 |
20050183143 | Anderholm et al. | Aug 2005 | A1 |
20050186948 | Gallagher et al. | Aug 2005 | A1 |
20050198377 | Ferguson et al. | Sep 2005 | A1 |
20050216421 | Barry et al. | Sep 2005 | A1 |
20050226178 | Forand et al. | Oct 2005 | A1 |
20050228985 | Ylikoski et al. | Oct 2005 | A1 |
20050238046 | Hassan et al. | Oct 2005 | A1 |
20050239447 | Holzman et al. | Oct 2005 | A1 |
20050245241 | Durand et al. | Nov 2005 | A1 |
20050246282 | Naslund et al. | Nov 2005 | A1 |
20050250508 | Guo et al. | Nov 2005 | A1 |
20050250536 | Deng et al. | Nov 2005 | A1 |
20050254435 | Moakley et al. | Nov 2005 | A1 |
20050266825 | Clayton | Dec 2005 | A1 |
20050266880 | Gupta | Dec 2005 | A1 |
20060014519 | Marsh et al. | Jan 2006 | A1 |
20060019632 | Cunningham et al. | Jan 2006 | A1 |
20060020787 | Choyi et al. | Jan 2006 | A1 |
20060026679 | Zakas | Feb 2006 | A1 |
20060030306 | Kuhn | Feb 2006 | A1 |
20060034256 | Addagatla et al. | Feb 2006 | A1 |
20060035631 | White et al. | Feb 2006 | A1 |
20060040642 | Boris et al. | Feb 2006 | A1 |
20060045245 | Aaron et al. | Mar 2006 | A1 |
20060048223 | Lee et al. | Mar 2006 | A1 |
20060068796 | Millen et al. | Mar 2006 | A1 |
20060072451 | Ross | Apr 2006 | A1 |
20060072550 | Davis et al. | Apr 2006 | A1 |
20060072646 | Feher | Apr 2006 | A1 |
20060075506 | Sanda et al. | Apr 2006 | A1 |
20060085543 | Hrastar et al. | Apr 2006 | A1 |
20060095517 | O'Connor et al. | May 2006 | A1 |
20060098627 | Karaoguz et al. | May 2006 | A1 |
20060099970 | Morgan et al. | May 2006 | A1 |
20060101507 | Camenisch | May 2006 | A1 |
20060112016 | Ishibashi | May 2006 | A1 |
20060114821 | Willey et al. | Jun 2006 | A1 |
20060114832 | Hamilton et al. | Jun 2006 | A1 |
20060126562 | Liu | Jun 2006 | A1 |
20060135144 | Jothipragasam | Jun 2006 | A1 |
20060136882 | Noonan et al. | Jun 2006 | A1 |
20060143066 | Calabria | Jun 2006 | A1 |
20060143098 | Lazaridis | Jun 2006 | A1 |
20060156398 | Ross et al. | Jul 2006 | A1 |
20060160536 | Chou | Jul 2006 | A1 |
20060165060 | Dua | Jul 2006 | A1 |
20060168128 | Sistla et al. | Jul 2006 | A1 |
20060173959 | Mckelvie et al. | Aug 2006 | A1 |
20060174035 | Tufail | Aug 2006 | A1 |
20060178917 | Merriam et al. | Aug 2006 | A1 |
20060178918 | Mikurak | Aug 2006 | A1 |
20060182137 | Zhou et al. | Aug 2006 | A1 |
20060183462 | Kolehmainen | Aug 2006 | A1 |
20060190314 | Hernandez | Aug 2006 | A1 |
20060190987 | Ohta et al. | Aug 2006 | A1 |
20060193280 | Lee et al. | Aug 2006 | A1 |
20060199608 | Dunn et al. | Sep 2006 | A1 |
20060200663 | Thornton | Sep 2006 | A1 |
20060206709 | Labrou et al. | Sep 2006 | A1 |
20060206904 | Watkins et al. | Sep 2006 | A1 |
20060218395 | Maes | Sep 2006 | A1 |
20060233108 | Krishnan | Oct 2006 | A1 |
20060233166 | Bou-Diab et al. | Oct 2006 | A1 |
20060236095 | Smith et al. | Oct 2006 | A1 |
20060242685 | Heard et al. | Oct 2006 | A1 |
20060258341 | Miller et al. | Nov 2006 | A1 |
20060277590 | Limont et al. | Dec 2006 | A1 |
20060291419 | McConnell et al. | Dec 2006 | A1 |
20060291477 | Croak et al. | Dec 2006 | A1 |
20070005795 | Gonzalez | Jan 2007 | A1 |
20070019670 | Falardeau | Jan 2007 | A1 |
20070022289 | Alt et al. | Jan 2007 | A1 |
20070025301 | Petersson et al. | Feb 2007 | A1 |
20070033194 | Srinivas et al. | Feb 2007 | A1 |
20070033197 | Scherzer et al. | Feb 2007 | A1 |
20070036312 | Cai et al. | Feb 2007 | A1 |
20070038763 | Oestvall | Feb 2007 | A1 |
20070055694 | Ruge et al. | Mar 2007 | A1 |
20070060200 | Boris et al. | Mar 2007 | A1 |
20070061243 | Ramer et al. | Mar 2007 | A1 |
20070061800 | Cheng et al. | Mar 2007 | A1 |
20070061878 | Hagiu et al. | Mar 2007 | A1 |
20070073899 | Judge et al. | Mar 2007 | A1 |
20070076616 | Ngo et al. | Apr 2007 | A1 |
20070093243 | Kapadekar et al. | Apr 2007 | A1 |
20070100981 | Adamczyk et al. | May 2007 | A1 |
20070101426 | Lee et al. | May 2007 | A1 |
20070104126 | Calhoun et al. | May 2007 | A1 |
20070109983 | Shankar et al. | May 2007 | A1 |
20070111740 | Wandel | May 2007 | A1 |
20070130283 | Klein et al. | Jun 2007 | A1 |
20070130315 | Friend et al. | Jun 2007 | A1 |
20070140113 | Gemelos | Jun 2007 | A1 |
20070140145 | Kumar et al. | Jun 2007 | A1 |
20070140275 | Bowman et al. | Jun 2007 | A1 |
20070143824 | Shahbazi | Jun 2007 | A1 |
20070147317 | Smith et al. | Jun 2007 | A1 |
20070147324 | McGary | Jun 2007 | A1 |
20070155365 | Kim et al. | Jul 2007 | A1 |
20070165630 | Rasanen et al. | Jul 2007 | A1 |
20070168499 | Chu | Jul 2007 | A1 |
20070171856 | Bruce et al. | Jul 2007 | A1 |
20070174490 | Choi et al. | Jul 2007 | A1 |
20070191006 | Carpenter | Aug 2007 | A1 |
20070192460 | Choi et al. | Aug 2007 | A1 |
20070198656 | Mazzaferri et al. | Aug 2007 | A1 |
20070201502 | Abramson | Aug 2007 | A1 |
20070213054 | Han | Sep 2007 | A1 |
20070220251 | Rosenberg et al. | Sep 2007 | A1 |
20070226225 | Yiu et al. | Sep 2007 | A1 |
20070226775 | Andreasen et al. | Sep 2007 | A1 |
20070234402 | Khosravi et al. | Oct 2007 | A1 |
20070243862 | Coskun et al. | Oct 2007 | A1 |
20070248100 | Zuberi et al. | Oct 2007 | A1 |
20070254646 | Sokondar | Nov 2007 | A1 |
20070254675 | Zorlu Ozer et al. | Nov 2007 | A1 |
20070255769 | Agrawal et al. | Nov 2007 | A1 |
20070255797 | Dunn et al. | Nov 2007 | A1 |
20070255848 | Sewall et al. | Nov 2007 | A1 |
20070257767 | Beeson | Nov 2007 | A1 |
20070259656 | Jeong | Nov 2007 | A1 |
20070259673 | Willars et al. | Nov 2007 | A1 |
20070263558 | Salomone | Nov 2007 | A1 |
20070265003 | Kezys et al. | Nov 2007 | A1 |
20070266422 | Germano et al. | Nov 2007 | A1 |
20070274327 | Kaarela et al. | Nov 2007 | A1 |
20070280453 | Kelley | Dec 2007 | A1 |
20070282896 | Wydroug et al. | Dec 2007 | A1 |
20070293191 | Mir et al. | Dec 2007 | A1 |
20070294395 | Strub et al. | Dec 2007 | A1 |
20070294410 | Pandya et al. | Dec 2007 | A1 |
20070297378 | Poyhonen et al. | Dec 2007 | A1 |
20070298764 | Clayton | Dec 2007 | A1 |
20070299965 | Nieh et al. | Dec 2007 | A1 |
20070300252 | Acharya et al. | Dec 2007 | A1 |
20080005285 | Robinson et al. | Jan 2008 | A1 |
20080005561 | Brown et al. | Jan 2008 | A1 |
20080010379 | Zhao | Jan 2008 | A1 |
20080010452 | Holtzman et al. | Jan 2008 | A1 |
20080018494 | Waite et al. | Jan 2008 | A1 |
20080022354 | Grewal et al. | Jan 2008 | A1 |
20080025230 | Patel et al. | Jan 2008 | A1 |
20080032715 | Jia et al. | Feb 2008 | A1 |
20080034063 | Yee | Feb 2008 | A1 |
20080034419 | Mullick et al. | Feb 2008 | A1 |
20080039102 | Sewall et al. | Feb 2008 | A1 |
20080049630 | Kozisek et al. | Feb 2008 | A1 |
20080050715 | Golczewski et al. | Feb 2008 | A1 |
20080051076 | O'Shaughnessy et al. | Feb 2008 | A1 |
20080052387 | Heinz et al. | Feb 2008 | A1 |
20080056273 | Pelletier et al. | Mar 2008 | A1 |
20080059474 | Lim | Mar 2008 | A1 |
20080059743 | Bychkov et al. | Mar 2008 | A1 |
20080060066 | Wynn et al. | Mar 2008 | A1 |
20080062900 | Rao | Mar 2008 | A1 |
20080064367 | Nath et al. | Mar 2008 | A1 |
20080066149 | Lim | Mar 2008 | A1 |
20080066150 | Lim | Mar 2008 | A1 |
20080066181 | Haveson et al. | Mar 2008 | A1 |
20080070550 | Hose | Mar 2008 | A1 |
20080077705 | Li et al. | Mar 2008 | A1 |
20080080457 | Cole | Apr 2008 | A1 |
20080081606 | Cole | Apr 2008 | A1 |
20080082643 | Storrie et al. | Apr 2008 | A1 |
20080083013 | Soliman et al. | Apr 2008 | A1 |
20080085707 | Fadell | Apr 2008 | A1 |
20080089295 | Keeler et al. | Apr 2008 | A1 |
20080089303 | Wirtanen et al. | Apr 2008 | A1 |
20080095339 | Elliott et al. | Apr 2008 | A1 |
20080096559 | Phillips et al. | Apr 2008 | A1 |
20080098062 | Balia | Apr 2008 | A1 |
20080101291 | Jiang et al. | May 2008 | A1 |
20080109679 | Wright et al. | May 2008 | A1 |
20080120129 | Seubert et al. | May 2008 | A1 |
20080120668 | Yau | May 2008 | A1 |
20080120688 | Qiu et al. | May 2008 | A1 |
20080125079 | O'Neil et al. | May 2008 | A1 |
20080126287 | Cox et al. | May 2008 | A1 |
20080127304 | Ginter et al. | May 2008 | A1 |
20080130534 | Tomioka | Jun 2008 | A1 |
20080130656 | Kim et al. | Jun 2008 | A1 |
20080132201 | Karlberg | Jun 2008 | A1 |
20080132268 | Choi-Grogan et al. | Jun 2008 | A1 |
20080134330 | Kapoor et al. | Jun 2008 | A1 |
20080139210 | Gisby et al. | Jun 2008 | A1 |
20080147454 | Walker et al. | Jun 2008 | A1 |
20080160958 | Abichandani et al. | Jul 2008 | A1 |
20080162637 | Adamczyk et al. | Jul 2008 | A1 |
20080162704 | Poplett et al. | Jul 2008 | A1 |
20080164304 | Narasimhan et al. | Jul 2008 | A1 |
20080166993 | Gautier et al. | Jul 2008 | A1 |
20080167027 | Gautier et al. | Jul 2008 | A1 |
20080167033 | Beckers | Jul 2008 | A1 |
20080168275 | DeAtley et al. | Jul 2008 | A1 |
20080168523 | Ansari et al. | Jul 2008 | A1 |
20080177998 | Apsangi et al. | Jul 2008 | A1 |
20080178300 | Brown et al. | Jul 2008 | A1 |
20080183812 | Paul et al. | Jul 2008 | A1 |
20080184127 | Rafey et al. | Jul 2008 | A1 |
20080189760 | Rosenberg et al. | Aug 2008 | A1 |
20080201266 | Chua et al. | Aug 2008 | A1 |
20080207167 | Bugenhagen | Aug 2008 | A1 |
20080212470 | Castaneda et al. | Sep 2008 | A1 |
20080212751 | Chung | Sep 2008 | A1 |
20080219268 | Dennison | Sep 2008 | A1 |
20080221951 | Stanforth et al. | Sep 2008 | A1 |
20080222692 | Andersson et al. | Sep 2008 | A1 |
20080225748 | Khemani et al. | Sep 2008 | A1 |
20080229385 | Feder et al. | Sep 2008 | A1 |
20080229388 | Maes | Sep 2008 | A1 |
20080235511 | O'Brien et al. | Sep 2008 | A1 |
20080240373 | Wilhelm | Oct 2008 | A1 |
20080250053 | Aaltonen et al. | Oct 2008 | A1 |
20080256593 | Vinberg et al. | Oct 2008 | A1 |
20080259924 | Gooch et al. | Oct 2008 | A1 |
20080262798 | Kim et al. | Oct 2008 | A1 |
20080263348 | Zaltsman et al. | Oct 2008 | A1 |
20080268813 | Maes | Oct 2008 | A1 |
20080270212 | Blight et al. | Oct 2008 | A1 |
20080279216 | Sharif-Ahmadi et al. | Nov 2008 | A1 |
20080282319 | Fontijn et al. | Nov 2008 | A1 |
20080293395 | Mathews et al. | Nov 2008 | A1 |
20080298230 | Luft et al. | Dec 2008 | A1 |
20080305793 | Gallagher et al. | Dec 2008 | A1 |
20080311885 | Dawson et al. | Dec 2008 | A1 |
20080313315 | Karaoguz et al. | Dec 2008 | A1 |
20080313730 | Iftimie et al. | Dec 2008 | A1 |
20080316923 | Fedders et al. | Dec 2008 | A1 |
20080318547 | Ballou et al. | Dec 2008 | A1 |
20080318550 | DeAtley | Dec 2008 | A1 |
20080319879 | Carroll et al. | Dec 2008 | A1 |
20080320497 | Tarkoma et al. | Dec 2008 | A1 |
20090005000 | Baker et al. | Jan 2009 | A1 |
20090005005 | Forstall et al. | Jan 2009 | A1 |
20090006116 | Baker et al. | Jan 2009 | A1 |
20090006200 | Baker et al. | Jan 2009 | A1 |
20090006229 | Sweeney et al. | Jan 2009 | A1 |
20090013157 | Beaule | Jan 2009 | A1 |
20090016310 | Rasal | Jan 2009 | A1 |
20090036111 | Danford et al. | Feb 2009 | A1 |
20090042536 | Bernard et al. | Feb 2009 | A1 |
20090044185 | Krivopaltsev | Feb 2009 | A1 |
20090046707 | Smires et al. | Feb 2009 | A1 |
20090046723 | Rahman et al. | Feb 2009 | A1 |
20090047989 | Harmon et al. | Feb 2009 | A1 |
20090048913 | Shenfield et al. | Feb 2009 | A1 |
20090049156 | Aronsson et al. | Feb 2009 | A1 |
20090049518 | Roman et al. | Feb 2009 | A1 |
20090054030 | Golds | Feb 2009 | A1 |
20090065571 | Jain | Mar 2009 | A1 |
20090067372 | Shah et al. | Mar 2009 | A1 |
20090068984 | Burnett | Mar 2009 | A1 |
20090070379 | Rappaport | Mar 2009 | A1 |
20090077622 | Baum et al. | Mar 2009 | A1 |
20090079699 | Sun | Mar 2009 | A1 |
20090113514 | Hu | Apr 2009 | A1 |
20090125619 | Antani | May 2009 | A1 |
20090132860 | Liu et al. | May 2009 | A1 |
20090149154 | Bhasin et al. | Jun 2009 | A1 |
20090157792 | Fiatal | Jun 2009 | A1 |
20090163173 | Williams | Jun 2009 | A1 |
20090170554 | Want et al. | Jul 2009 | A1 |
20090172077 | Roxburgh et al. | Jul 2009 | A1 |
20090180391 | Petersen et al. | Jul 2009 | A1 |
20090181662 | Fleischman et al. | Jul 2009 | A1 |
20090197585 | Aaron | Aug 2009 | A1 |
20090197612 | Kiiskinen | Aug 2009 | A1 |
20090203352 | Fordon et al. | Aug 2009 | A1 |
20090217364 | Salmela et al. | Aug 2009 | A1 |
20090219170 | Clark et al. | Sep 2009 | A1 |
20090248883 | Suryanarayana et al. | Oct 2009 | A1 |
20090254857 | Romine et al. | Oct 2009 | A1 |
20090257379 | Robinson et al. | Oct 2009 | A1 |
20090271514 | Thomas et al. | Oct 2009 | A1 |
20090282127 | Leblanc et al. | Nov 2009 | A1 |
20090286507 | O'Neil et al. | Nov 2009 | A1 |
20090287921 | Zhu et al. | Nov 2009 | A1 |
20090288140 | Huber et al. | Nov 2009 | A1 |
20090291665 | Gaskarth et al. | Nov 2009 | A1 |
20090299857 | Brubaker | Dec 2009 | A1 |
20090307696 | Vals et al. | Dec 2009 | A1 |
20090307746 | Di et al. | Dec 2009 | A1 |
20090315735 | Bhavani et al. | Dec 2009 | A1 |
20090320110 | Nicolson et al. | Dec 2009 | A1 |
20100017506 | Fadell | Jan 2010 | A1 |
20100020822 | Zerillo et al. | Jan 2010 | A1 |
20100027469 | Gurajala et al. | Feb 2010 | A1 |
20100027525 | Zhu | Feb 2010 | A1 |
20100027559 | Lin et al. | Feb 2010 | A1 |
20100030890 | Dutta et al. | Feb 2010 | A1 |
20100041364 | Lott et al. | Feb 2010 | A1 |
20100041365 | Lott et al. | Feb 2010 | A1 |
20100042675 | Fujii | Feb 2010 | A1 |
20100043068 | Varadhan et al. | Feb 2010 | A1 |
20100046373 | Smith et al. | Feb 2010 | A1 |
20100069074 | Kodialam et al. | Mar 2010 | A1 |
20100071053 | Ansari et al. | Mar 2010 | A1 |
20100075666 | Garner | Mar 2010 | A1 |
20100080202 | Hanson | Apr 2010 | A1 |
20100082431 | Ramer et al. | Apr 2010 | A1 |
20100103820 | Fuller et al. | Apr 2010 | A1 |
20100113020 | Subramanian et al. | May 2010 | A1 |
20100121744 | Belz et al. | May 2010 | A1 |
20100131584 | Johnson | May 2010 | A1 |
20100142478 | Forssell et al. | Jun 2010 | A1 |
20100144310 | Bedingfield | Jun 2010 | A1 |
20100151866 | Karpov et al. | Jun 2010 | A1 |
20100153781 | Hanna | Jun 2010 | A1 |
20100167696 | Smith et al. | Jul 2010 | A1 |
20100188975 | Raleigh | Jul 2010 | A1 |
20100188990 | Raleigh | Jul 2010 | A1 |
20100188992 | Raleigh | Jul 2010 | A1 |
20100188994 | Raleigh | Jul 2010 | A1 |
20100190469 | Vanderveen et al. | Jul 2010 | A1 |
20100191576 | Raleigh | Jul 2010 | A1 |
20100191612 | Raleigh | Jul 2010 | A1 |
20100191846 | Raleigh | Jul 2010 | A1 |
20100192170 | Raleigh | Jul 2010 | A1 |
20100192212 | Raleigh | Jul 2010 | A1 |
20100195503 | Raleigh | Aug 2010 | A1 |
20100197268 | Raleigh | Aug 2010 | A1 |
20100198698 | Raleigh et al. | Aug 2010 | A1 |
20100198939 | Raleigh | Aug 2010 | A1 |
20100227632 | Bell et al. | Sep 2010 | A1 |
20100235329 | Koren et al. | Sep 2010 | A1 |
20100241544 | Benson et al. | Sep 2010 | A1 |
20100248719 | Scholaert | Sep 2010 | A1 |
20100254387 | Trinh et al. | Oct 2010 | A1 |
20100284327 | Miklos | Nov 2010 | A1 |
20100284388 | Fantini et al. | Nov 2010 | A1 |
20100287599 | He et al. | Nov 2010 | A1 |
20100311402 | Srinivasan et al. | Dec 2010 | A1 |
20100318652 | Samba | Dec 2010 | A1 |
20100322071 | Avdanin et al. | Dec 2010 | A1 |
20100325420 | Kanekar | Dec 2010 | A1 |
20110004917 | Saisa et al. | Jan 2011 | A1 |
20110013569 | Scherzer et al. | Jan 2011 | A1 |
20110019574 | Malomsoky et al. | Jan 2011 | A1 |
20110081881 | Baker et al. | Apr 2011 | A1 |
20110082790 | Baker et al. | Apr 2011 | A1 |
20110110309 | Bennett | May 2011 | A1 |
20110126141 | King et al. | May 2011 | A1 |
20110145920 | Mahaffey et al. | Jun 2011 | A1 |
20110159818 | Scherzer et al. | Jun 2011 | A1 |
20110173678 | Kaippallimalil et al. | Jul 2011 | A1 |
20110177811 | Heckman et al. | Jul 2011 | A1 |
20110195700 | Kukuchka et al. | Aug 2011 | A1 |
20110238545 | Fanaian et al. | Sep 2011 | A1 |
20110241624 | Park et al. | Oct 2011 | A1 |
20110252430 | Chapman et al. | Oct 2011 | A1 |
20110264923 | Kocher et al. | Oct 2011 | A1 |
20110277019 | Pritchard, Jr. | Nov 2011 | A1 |
20120020296 | Scherzer et al. | Jan 2012 | A1 |
20120029718 | Davis | Feb 2012 | A1 |
20120101952 | Raleigh et al. | Apr 2012 | A1 |
20120108225 | Luna et al. | May 2012 | A1 |
20120144025 | Melander et al. | Jun 2012 | A1 |
20120155296 | Kashanian | Jun 2012 | A1 |
20120166364 | Ahmad et al. | Jun 2012 | A1 |
20120166604 | Fortier et al. | Jun 2012 | A1 |
20120195200 | Regan | Aug 2012 | A1 |
20120196644 | Scherzer et al. | Aug 2012 | A1 |
20120238287 | Scherzer | Sep 2012 | A1 |
20120330792 | Kashanian | Dec 2012 | A1 |
20130024914 | Ahmed et al. | Jan 2013 | A1 |
20130029653 | Baker et al. | Jan 2013 | A1 |
20130030960 | Kashanian | Jan 2013 | A1 |
20130058274 | Scherzer et al. | Mar 2013 | A1 |
20130065555 | Baker et al. | Mar 2013 | A1 |
20130072177 | Ross et al. | Mar 2013 | A1 |
20130084835 | Scherzer et al. | Apr 2013 | A1 |
20130095787 | Kashanian | Apr 2013 | A1 |
20130103376 | Gaddam et al. | Apr 2013 | A1 |
20130111572 | Gaddam et al. | May 2013 | A1 |
20130117140 | Kashanian | May 2013 | A1 |
20130117382 | Gaddam et al. | May 2013 | A1 |
20130144789 | Aaltonen et al. | Jun 2013 | A1 |
20130149994 | Gaddam et al. | Jun 2013 | A1 |
20130176908 | Baniel et al. | Jul 2013 | A1 |
20130183937 | Neal et al. | Jul 2013 | A1 |
20130275583 | Roach et al. | Oct 2013 | A1 |
20130326356 | Zheng et al. | Dec 2013 | A9 |
20140066101 | Lyman et al. | Mar 2014 | A1 |
20140073291 | Hildner et al. | Mar 2014 | A1 |
20140080458 | Bonner et al. | Mar 2014 | A1 |
20140241342 | Constantinof | Aug 2014 | A1 |
20150039763 | Chaudhary et al. | Feb 2015 | A1 |
20150149358 | Robbin et al. | May 2015 | A1 |
20150181628 | Haverinen et al. | Jun 2015 | A1 |
20170063695 | Ferrell | Mar 2017 | A1 |
Number | Date | Country |
---|---|---|
2688553 | Dec 2008 | CA |
1310401 | Aug 2001 | CN |
1345154 | Apr 2002 | CN |
1508734 | Jun 2004 | CN |
1538730 | Oct 2004 | CN |
1567818 | Jan 2005 | CN |
101035308 | Mar 2006 | CN |
1801829 | Jul 2006 | CN |
1802839 | Jul 2006 | CN |
1889777 | Jul 2006 | CN |
101155343 | Sep 2006 | CN |
1867024 | Nov 2006 | CN |
1878160 | Dec 2006 | CN |
1937511 | Mar 2007 | CN |
101123553 | Sep 2007 | CN |
101080055 | Nov 2007 | CN |
101115248 | Jan 2008 | CN |
101127988 | Feb 2008 | CN |
101183958 | May 2008 | CN |
101335666 | Dec 2008 | CN |
101341764 | Jan 2009 | CN |
101815275 | Aug 2010 | CN |
1098490 | May 2001 | EP |
1289326 | Mar 2003 | EP |
1463238 | Sep 2004 | EP |
1503548 | Feb 2005 | EP |
1545114 | Jun 2005 | EP |
1739518 | Jan 2007 | EP |
1772988 | Apr 2007 | EP |
1850575 | Oct 2007 | EP |
1887732 | Feb 2008 | EP |
1942698 | Jul 2008 | EP |
1978772 | Oct 2008 | EP |
2007065 | Dec 2008 | EP |
2026514 | Feb 2009 | EP |
2466831 | Jun 2012 | EP |
2154602 | Jun 2017 | EP |
3148713 | Mar 2001 | JP |
2005339247 | Dec 2005 | JP |
2006041989 | Feb 2006 | JP |
2006155263 | Jun 2006 | JP |
2006197137 | Jul 2006 | JP |
2006344007 | Dec 2006 | JP |
2007318354 | Dec 2007 | JP |
2008301121 | Dec 2008 | JP |
2009111919 | May 2009 | JP |
2009212707 | Sep 2009 | JP |
2009218773 | Sep 2009 | JP |
2009232107 | Oct 2009 | JP |
20040053858 | Jun 2004 | KR |
1998058505 | Dec 1998 | WO |
1999027723 | Jun 1999 | WO |
1999065185 | Dec 1999 | WO |
0208863 | Jan 2002 | WO |
2002045315 | Jun 2002 | WO |
2002067616 | Aug 2002 | WO |
2002093877 | Nov 2002 | WO |
2003014891 | Feb 2003 | WO |
2003017063 | Feb 2003 | WO |
2003017065 | Feb 2003 | WO |
2003058880 | Jul 2003 | WO |
2004028070 | Apr 2004 | WO |
2004064306 | Jul 2004 | WO |
2004077797 | Sep 2004 | WO |
2004095753 | Nov 2004 | WO |
2005008995 | Jan 2005 | WO |
2005053335 | Jun 2005 | WO |
2005083934 | Sep 2005 | WO |
2006004467 | Jan 2006 | WO |
2006004784 | Jan 2006 | WO |
2006012610 | Feb 2006 | WO |
2006050758 | May 2006 | WO |
2006073837 | Jul 2006 | WO |
2006077481 | Jul 2006 | WO |
2006093961 | Sep 2006 | WO |
2006120558 | Nov 2006 | WO |
2006130960 | Dec 2006 | WO |
2007001833 | Jan 2007 | WO |
2007014630 | Feb 2007 | WO |
2007018363 | Feb 2007 | WO |
2007053848 | May 2007 | WO |
2007068288 | Jun 2007 | WO |
2007069245 | Jun 2007 | WO |
2007097786 | Aug 2007 | WO |
2007107701 | Sep 2007 | WO |
2007120310 | Oct 2007 | WO |
2007124279 | Nov 2007 | WO |
2007126352 | Nov 2007 | WO |
2007129180 | Nov 2007 | WO |
2007133844 | Nov 2007 | WO |
2008017837 | Feb 2008 | WO |
2008051379 | May 2008 | WO |
2008066419 | Jun 2008 | WO |
2008080139 | Jul 2008 | WO |
2008080430 | Jul 2008 | WO |
2008099802 | Aug 2008 | WO |
2009008817 | Jan 2009 | WO |
2009091295 | Jul 2009 | WO |
2010088413 | Aug 2010 | WO |
2010128391 | Nov 2010 | WO |
2011002450 | Jan 2011 | WO |
2011149532 | Dec 2011 | WO |
2012047275 | Apr 2012 | WO |
Entry |
---|
Oppliger, Rolf, “Internet Security: Firewalls and Bey,” Communications of the ACM, May 1997, vol. 40. No. 5. |
Quintana, David, “Mobile Multitasking,” Apr. 14, 2010. |
Rao et al., “Evolution of Mobile Location-Based Services,” Communication of the ACM, Dec. 2003. |
Richtel, “Cellphone consumerism; If even a debit card is too slow, now you have a new way to act on impulse: [National Edition],” National Post, Canada, Oct. 2, 2007. |
Rivadeneyra et al., “A communication architecture to access data services through GSM,” San Sebastian, Spain, 1998. |
Roy et al., “Energy Management in Mobile Devices with the Cinder Operating System”, Stanford University, MIT CSAIL, Jun. 3, 2010. |
Ruckus Wireless—White Paper; “Smarter Wi-Fi for Mobile Operator Infrastructures” 2010. |
Sabat, “The evolving mobile wireless value chain and market structure,” Nov. 2002. |
Sadeh et al., “Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application,” ISR School of Computer Science, Carnegie Mellon University, 2007. |
Schiller et al., “Location-Based Services,” The Morgan Kaufmann Series in Data Management Systems, 2004. |
Steglich, Stephan, “I-Centric User Interaction,” Nov. 21, 2003. |
Sun et al., “Towards Connectivity Management Adaptability: Context Awareness in Policy Representation and End-to-end Evaluation Algorithm,” Dept. of Electrical and Information Engineering, Univ. of Oulu, Finland, 2004. |
Thurston, Richard, “WISPr 2.0 Boosts Roaming Between 3G and Wi-Fi”; Jun. 23, 2010; Web page from zdnet.com; Zdnet.com/wispr-2-0-boosts-roaming-between-3g-and-wi-fi-3040089325/. |
Van Eijk, et al., “GigaMobile, Agent Technology for Designing Personalized Mobile Service Brokerage,” Jul. 1, 2002. |
VerizonWireless.com news, “Verizon Wireless Adds to Portfolio of Cosumer-Friendly Tools With Introduction of Usage Controls, Usage Controls and Chaperone 2.0 Offer Parents Full Family Security Solution,” Aug. 18, 2008. |
Wi-Fi Alliance Hotspot 2.0 Technical Task Group, “Wi-Fi Certified Passpoint™ (Release 1) Deployment Guidelines—Version 1.0—Oct. 2012”. |
Wi-Fi Alliance Technical Committee Hotspot 2.0 Technical Task Group, “Hotspot 2.0 (Release 1) Technical Specification—Version 1.0.0”; 2012. |
Windows7 Power Management, published Apr. 2009. |
Wireless Broadband Alliance, “WISPr 2.0, Apr. 8, 2010”; Doc. Ref. No. WBA/RM/WISPr, Version 01.00. |
Zhu et al., “A Survey of Quality of Service in IEEE 802.11 Networks,” IEEE Wireless Communications, Aug. 2004. |
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Policy and charging control architecture (Release 11),” 3GPP Standard; 3GPP TS 23.203 v11.6.0; Sophia Antipolis, France; pp. 1-177; Jun. 2012. |
“Ads and movies on the run,” the Gold Coast Bulletin, Southport, Qld, Jan. 29, 2008. |
“ASA/PIX: Allow Split Tunneling for VPN Clients on the ASA Configuration Example,” Document ID 70917, Jan. 10, 2008. |
“Communication Concepts for Mobile Agent Systems,” by Joachim Baumann et al.; Inst. of Parallel and Distributed High-Performance Systems, Univ. of Stuttgart, Germany, pp. 123-135, 1997. |
“End to End QoS Solution for Real-time Multimedia Application;” Computer Engineering and Applications, 2007, 43 (4):155-159, by Tan Zu-guo, Wang Wen-juan; Information and Science School, Zhanjian Normal College, Zhan jiang, Guangdong 524048, China. |
“Jentro Technologies launches Zenlet platform to accelerate location-based content delivery to mobile devices,” The Mobile Internet, Boston, MA, Feb. 2008. |
“Prevent iCloud Documents & Data from using your data plan,” Oct. 26, 2011; CNET webarchive, by Jason Cipriani. |
“The Construction of Intelligent Residential District in Use of Cable Television Network,” Shandong Science, vol. 13, No. 2, Jun. 2000. |
3rd Generation Partnership Project, “Technical Specification Group Core Network and Terminals; Access Network Discovery and Selection Function (ANDSF) Management Object (MO),” Release 9, Document No. 3GPP TS 24.312, V9.1.0, Mar. 2010. |
3rd Generation Partnership Project, “Technical Specification Group Services and System Aspects; General Packet Radio Service (GPRS) Enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) Access,” Release 8, Document No. 3GPP TS 23.401, V8.4.0, Dec. 2008. |
3rd Generation Partnership Project, “Technical Specification Group Services and System Aspects; Policy and Charging Control Architecture,” Release 8, Document No. 3GPP TS 23.203, V8.4.0, Dec. 2008. |
3rd Generation Partnership Project; “Technical Specification Group Services and System Aspects; IP Flow Mobility and seamless WLAN offlload; Stage 2,” Release 10, Document No. 3GPP TS 23.261, V1.0.0, Mar. 2010. |
Accuris Networks, “The Business Value of Mobile Data Offload—a White Paper”, 2010. |
Ahmed et al., “A Context-Aware Vertical Handover Decision Algorithm for Multimode Mobile Terminals and Its Performance,” BenQ Mobile, Munich Germany; University of Klagenfurt, Klagenfurt, Austria; 2006. |
Ahmed et al., “Multi Access Data Network Connectivity and IP Flow Mobility in Evolved Packet System (EPS),” 2010 IEEE. |
Alonistioti et al., “Intelligent Architectures Enabling Flexible Service Provision and Adaptability,” 2002. |
Amazon Technologies, Inc., “Kindle™ User's Guide,” 3rd Edition, Copyright 2004-2009. |
Android Cupcake excerpts, The Android Open Source Project, Feb. 10, 2009. |
Anton, B. et al., “Best Current Practices for Wireless Internet Service Provider (WISP) Roaming”; Release Date Feb. 2003, Version 1.0; Wi-Fi Alliance—Wireless ISP Roaming (WISPr). |
Blackberry Mobile Data System, version 4.1, Technical Overview, 2006. |
Chandrasekhar et al., “Femtocell Networks: A Survey,” Jun. 28, 2008. |
Chaouchi et al., “Policy Based Networking in the Integration Effort of 4G Networks and Services,” 2004 IEEE. |
Cisco Systems, Inc., “Cisco Mobile Exchange (CMX) Solution Guide: Chapter 2—Overview of GSM, GPRS, and UMTS,” Nov. 4, 2008. |
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control, 2007. |
Dikaiakos et al., “A Distributed Middleware Infrastructure for Personalized Services,” Nov. 24, 2003. |
Dixon et al., Triple Play Digital Services: Comcast and Verizon (Digital Phone, Television, and Internet), Aug. 2007. |
Ehnert, “Small application to monitor IP trafic on a Blackberry—1.01.03 ”, Mar. 27, 2008; http://www.ehnert.net/MiniMoni/. |
European Commission, “Data Roaming Tariffs—Transparency Measures,” obtained from EUROPA—Europe's Information Society Thematic Portal website, Jun. 24, 2011: “http://ec.europa.eu/information_society/activities/roaming/data/measures/index_en.htm.” |
Farooq et al., “An IEEE 802.16 WiMax Module for the NS-3 Simulator,” Mar. 2-6, 2009. |
Fujitsu, “Server Push Technology Survey and Bidirectional Communication in HTTP Browser,” Jan. 9, 2008 (JP). |
Han et al., “Information Collection Services for Qos-Aware Mobile Applications,” 2005. |
Hartmann et al., “Agent-Based Banking Transactions & Information Retrieval—What About Performance Issues?” 1999. |
Hewlett-Packard Development Company, LP, “IP Multimedia Services Charging,” white paper, Jan. 2006. |
Hossain et al., “Gain-Based Selection of Ambient Media Services in Pervasive Environments,” Mobile Networks and Applications. Oct. 3, 2008. |
Jing et al., “Client-Server Computing in Mobile Environments,” GTE Labs. Inc., Purdue University, ACM Computing Surveys, vol. 31, No. 2, Jun. 1999. |
Kasper et al., “Subscriber Authentication in mobile cellular Networks with virtual software SIM Credentials using Trusted Computing,” Fraunhofer—Institute for Secure Information Technology SIT, Darmstadt; Germany; ICACT 2008. |
Kassar et al., “An overview of vertical handover decision strategies in heterogeneous wireless networks,” ScienceDirect, University Pierre & Marie Curie, Paris, France, Jun. 5, 2007. |
Kim, “Free wireless a high-wire act; MetroFi needs to draw enough ads to make service add profits,” San Francisco chronicle, Aug. 21, 2006. |
Knight et al., “Layer 2 and 3 Virtual Private Networks: Taxonomy, Technology, and Standarization Efforts,” IEEE Communications Magazine, Jun. 2004. |
Koutsopoulou et al., “Charging, Accounting and Billing Management Schemes in Mobile Telecommunication Networks and the Internet,” IEEE Communications Surveys & Tutorials, First Quarter 2004, vol. 6, No. 1. |
Koutsopoulou et al., “Middleware Platform for the Support of Charging Reconfiguration Actions,” 2005. |
Kuntze et al., “Trustworthy content push,” Fraunhofer—Institute for Secure Information Technology SIT; Germany; WCNC 2007 proceedings, IEEE. |
Kyriakakos et al., “Ubiquitous Service Provision in Next Generation Mobile Networks,” Proceedings of the 13th IST Mobile and Wireless Communications Summit, Lyon, France, Jun. 2004. |
Li, Yu, “Dedicated E-Reading Device: The State of the Art and the Challenges,” Scroll, vol. 1, No. 1, 2008. |
Loopt User Guide, metroPCS, Jul. 17, 2008. |
Muntermann et al., “Potentials und Sicherheitsanforderungen mobiler Finanzinformationsdienste und deren Systeminfrastrukturen,” Chair of Mobile Commerce & Multilateral Security, Goethe Univ. Frankfurt, 2004. |
NetLimiter Lite 4.0.19.0; http://www.heise.de/download/netlimiter-lite-3617703.html from vol. 14/2007. |
Nilsson et al., “A Novel MAC Scheme for Solving the QoS Parameter Adjustment Problem in IEEE802.11e EDCA,” Feb. 2006. |
Nuzman et al., “A compund model for TCP connection arrivals for LAN and WAN applications,” Oct. 22, 2002. |
Open Mobile Alliance (OMA), Push Architecture, Candidate Version 2.2; Oct. 2, 2007; OMA-AD-Push-V2_2-20071002-C. |
Number | Date | Country | |
---|---|---|---|
20190037049 A1 | Jan 2019 | US |
Number | Date | Country | |
---|---|---|---|
61765978 | Feb 2013 | US | |
61785988 | Mar 2013 | US | |
61794116 | Mar 2013 | US | |
61792765 | Mar 2013 | US | |
61793894 | Mar 2013 | US | |
61799710 | Mar 2013 | US | |
61801074 | Mar 2013 | US | |
61589830 | Jan 2012 | US | |
61610876 | Mar 2012 | US | |
61658339 | Jun 2012 | US | |
61667927 | Jul 2012 | US | |
61674331 | Jul 2012 | US | |
61724267 | Nov 2012 | US | |
61724837 | Nov 2012 | US | |
61724974 | Nov 2012 | US | |
61732249 | Nov 2012 | US | |
61734288 | Dec 2012 | US | |
61745548 | Dec 2012 | US | |
61610910 | Mar 2012 | US | |
61435564 | Jan 2011 | US | |
61472606 | Apr 2011 | US | |
61550906 | Oct 2011 | US | |
61589830 | Jan 2012 | US | |
61206354 | Jan 2009 | US | |
61206944 | Feb 2009 | US | |
61207393 | Feb 2009 | US | |
61207739 | Feb 2009 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15416377 | Jan 2017 | US |
Child | 15958378 | US | |
Parent | 14181910 | Feb 2014 | US |
Child | 15416377 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13748152 | Jan 2013 | US |
Child | 14181910 | US | |
Parent | 13411821 | Apr 2012 | US |
Child | 13748152 | US | |
Parent | 13374959 | Jan 2012 | US |
Child | 13411821 | US | |
Parent | 13134028 | May 2011 | US |
Child | 13374959 | US | |
Parent | 12695021 | Jan 2010 | US |
Child | 13134028 | US | |
Parent | 13134005 | May 2011 | US |
Child | 12695021 | US | |
Parent | 12380780 | Mar 2009 | US |
Child | 12695021 | US | |
Parent | 12380780 | US | |
Child | 13134005 | US | |
Parent | 12380778 | Mar 2009 | US |
Child | 12380780 | US |