Bridgewater Systems Corp. Patent applications |
Patent application number | Title | Published |
20130023230 | System and Methods for Carrier-Centric Mobile Device Data Communications Cost Monitoring and Control - Systems and methods for providing carrier-centric data communications cost monitoring and controls are provided. In an embodiment, the method operates by receiving a registration request associated with a subscriber session, determining current data usage associated with the subscriber, and receiving data usage thresholds. The method further comprises receiving quotas associated with the subscriber session and collecting data usage information associated with the subscriber session. The method sends a notification to the subscriber when a pre-determined quota is exceeded during the subscriber session and controls data usage. The cost monitoring and control system comprises a usage policy server and a usage policy application. The usage policy application allows a carrier to offer alterations to terms of a subscription. The usage policy application displays current data usage information on a per-network and per-application basis using subscriber profile information, subscriber session information, and prior subscriber usage history provided by the usage policy server. | 01-24-2013 |
20120284366 | CONTENT CAPABILITY CLEARING HOUSE SYSTEMS AND METHODS - A content capability clearing house that can act as a trusted and neutral mediator among network providers to manage rich content capabilities among multiple networks is provided. Content capabilities that can be brokered include, but are not limited to, quality of service and content screening. In an embodiment, a content capability clearing house includes a receiver that receives content capability request messages and other messages from network providers. A content capability request message includes a quality of service request and/or a subscriber profile request for use with content screening and subscriber specific advertisements. The present invention includes a series of methods for determining content capabilities for data transmission over a transaction between a content provider and a subscriber in which a content capability clearing house is used to efficiently broker and manage the capability among multiple network providers. | 11-08-2012 |
20120030017 | USAGE MEASUREMENT COLLECTION AND ANALYSIS TO DYNAMICALLY REGULATE CUSTOMER NETWORK USAGE - In a network subscriber system, a method of determining how to monitor whether a subscriber's network usage exceeds a quota for the current billing period. The frequency at which the subscriber's usage data is collected and analyzed during the billing period is based upon the probability the subscriber's network usage exceeds the quota at a given point in time during the billing cycle. Usage data is collected more frequently as the probability increases. Usage analysis is performed if the probability exceeds a threshold. | 02-02-2012 |
20110276442 | System and Methods for User-Centric Mobile Device-Based Data Communications Cost Monitoring and Control - Systems and methods for providing user-centric device-based data communications cost monitoring and controls. In an embodiment, the method operates by sending a registration request associated with a subscriber session, determining current data usage associated with the subscriber, and sending data usage thresholds. The method further comprises sending quotas associated with the subscriber session after collecting data usage information associated with the subscriber session. The method receives a notification at the subscriber's mobile device when a pre-determined quota is exceeded during the subscriber session to control data usage. The system communicates with a usage policy server and a usage policy application. The usage policy application allows a subscriber to alter terms and service tiers of a subscription. The usage policy application displays current data usage information on a per-network and per-application basis using subscriber profile information, subscriber session information, and prior subscriber usage history received from the usage policy server. | 11-10-2011 |
20110275344 | System and Methods for Carrier-Centric Mobile Device Data Communications Cost Monitoring and Control - Systems and methods for providing carrier-centric data communications cost monitoring and controls are provided. In an embodiment, the method operates by receiving a registration request associated with a subscriber session, determining current data usage associated with the subscriber, and receiving data usage thresholds. The method further comprises receiving quotas associated with the subscriber session and collecting data usage information associated with the subscriber session. The method sends a notification to the subscriber when a pre-determined quota is exceeded during the subscriber session and controls data usage. The cost monitoring and control system comprises a usage policy server and a usage policy application. The usage policy application allows a carrier to offer alterations to terms of a subscription. The usage policy application displays current data usage information on a per-network and per-application basis using subscriber profile information, subscriber session information, and prior subscriber usage history provided by the usage policy server. | 11-10-2011 |
20110208628 | System and Method for Providing Interoperability Between Diameter Policy Control and Charging in a 3GPP Network - A system and method are described whereby interoperability is facilitated in a 3GPP network environment in combination with DIAMETER policy controls. Such interoperability enables updated policy rules to be fully communicated in on-line charging situations where quota expirations occur. This invention maintains centralized policy control in a 3GPP network with on-line charging. | 08-25-2011 |
20110124313 | Systems and Methods for Subscriber Profile Management - Systems and methods subscriber profile management to facilitate seamless roaming of mobile devices from one network to another. A subscriber profile management system is provided that includes a time to live (“TTL”) generator that generates a TTL limit for a subscriber based on usage characteristics of the subscriber. The subscriber profile management system further includes an administration module that administers TTL limits, TTL limit database that store TTL limits, a subscriber profile database that stores subscriber profiles, a usage measurement database that stores usage measurements, and a TTL limit reference module that administers TTLs when a subscriber profile and TTL limit are transmitted. The invention further includes a series of methods that support seamless roaming capabilities of a subscriber throughout visited networks without the need to continually make proxy calls to re-authenticate a subscriber. | 05-26-2011 |
20110075671 | Providing Dynamic Quality of Service for Applications Accessed Over a Network - Methods, systems, and computer program products for providing dynamic Quality of Service (QoS) for connections to applications over a network are provided. The method receives a message associated with the application, wherein the message includes information identifying the connection to the application and information about the application. The method then determines, based on a set of rules defined for the application, a QoS level to apply to the connection, and applies the determined QoS level to the connection. The QoS applied to the connection corresponds to the application and not the QoS associated with a personal or home account QoS that would otherwise be applied to the connection. | 03-31-2011 |
20100287080 | Systems and Methods for Session Records Correlation - A billing mediation system for use within a communications network that correlates session records pertaining to usage of network resources is disclosed. The billing mediation system includes a record receiver, a record correlator, a look ahead cache, a set of buffers, and a session records database. The set of buffers includes a single segment insert buffer, a multi segment insert buffer, a multi segment update buffer and a billing finalization update buffer. A method for correlating session records is also provided. The method includes receiving a session record, placing the session record into a segment buffer based on the type of record, and updating a look ahead cache including providing a timestamp for the last update for a session. The transfer of correlated session records to a billing system is based on whether records for a session have been received based on session tracking within the look ahead cache. | 11-11-2010 |
20100216424 | System and Method for Adaptive Fair Usage Controls in Wireless Networks - A system and method to determine excessive usage across a base station coverage region for the purpose of ensuring fair usage for all wireless data subscribers. During a configurable time window, subscriber usage is monitored. Subscriber usage above a threshold level is deemed excessive and triggers an operator-defined business rule. Based on the business rule, the subscriber's service may be reduced. The system and method adapts to the number of subscribers within the base station coverage region when making an excessive usage determination. This approach enables bursty data protocols to be fully supported, while detecting excessive usage patterns. | 08-26-2010 |
20100035576 | Usage Measurement Collection and Analysis to Dynamically Regulate Customer Network Usage - In a network subscriber system, a method of determining how to monitor whether a subscriber's network usage exceeds a quota for the current billing period. The frequency at which the subscriber's usage data is collected and analyzed during the billing period is based upon the probability the subscriber's network usage exceeds the quota at a given point in time during the billing cycle. Usage data is collected more frequently as the probability increases. Usage analysis is performed if the probability exceeds a threshold. | 02-11-2010 |
20100023699 | System and Method for Usage Analyzer of Subscriber Access to Communications Network - A system and a method are described, whereby a data cache enables the realization of an efficient design of a usage analyzer for monitoring subscriber access to a communications network. By exploiting the speed advantages of cache memory, as well as adopting innovative data loading and retrieval choices, significant performance improvements in the time required to access the necessary data records can be realized. | 01-28-2010 |
20100017603 | Extensible Authentication Protocol Authentication and Key Agreement (EAP-AKA) Optimization - Systems and methods are described for improved authentication of subscribers wishing to connect to a wireless network using the EAP-AKA protocol. Embodiments exploit the requirement that the client store and transmit the Pseudonym and Fast Re-authentication Identities upon request. By using the Fast Re-authentication Identity to store session state key information, the need for the AAA server to store and replicate the EAP-AKA key information for every session is eliminated. | 01-21-2010 |
20100010922 | System and Method for Providing Interoperability Between Diameter Policy Control and Charging in a 3GPP Network - A system and method are described whereby interoperability is facilitated in a 3GPP network environment in combination with DIAMETER policy controls. Such interoperability enables updated policy rules to be fully communicated in on-line charging situations where quota expirations occur. This invention maintains centralized policy control in a 3GPP network with on-line charging. | 01-14-2010 |
20090305684 | Long-Term Evolution (LTE) Policy Control and Charging Rules Function (PCRF) Selection - The PCRF Selection Function selects the PCRF for an IP-CAN session. In embodiments, the PCRF Selection Function is located in the HSS and/or the 3GPP AAA server. The PCRF Selection Function is only required to be located in the HSS if a Bearer Binding and Event Reporting Function (BBERF) is deployed in the serving gateway. In this case, the PCRF selection takes place at the time that the PDN Gateway is selected and returned by the HSS to the serving gateway over the HSS to MME interface (S6a). | 12-10-2009 |
20090285179 | Long-Term Evolution (LTE) Packet Data Network Gateway (PDN-GW) Selection - The current 3rd Generation Partnership Project (3GPP) long-term evolution reference architecture defines a packet data network gateway (PDN-GW) selection function which is responsible for allocation of a packet data network gateway that provides packet data network connectivity for 3GPP and non-3GPP access for a given session. Systems and methods are provided for moving the PDN-GW selection function to a centralized network element (the HSS network element) for both 3GPP and non-3GPP access. | 11-19-2009 |
20090249452 | Systems and Methods for Flexible Service Delivery Network Services - A system and method are described that use a subscriber-centric approach to scalably support the delivery of network services across numerous access protocols and across a multitude of access devices. By allowing the use of a service engine that can range in complexity from a simple macro to a rules engine, this approach is suitable for bundled services, as well as single services. | 10-01-2009 |
20090119742 | Methods for authenticating and authorizing a mobile device using tunneled extensible authentication protocol - Methods for authenticating and authorizing a mobile device using tunneled extensible authentication protocol are provided. The methods include evaluating an inner user identifier against a policy engine to determine a home AAA server to route an access request for inner user authentication. Instead of having a static route configured based on an outer identifier/roaming identity, the policy engine can have multiple rules and actions for routing the request. The evaluation can be based on the conditions of the inner user identifier and or other AAA attributes received in the request. The request is transmitted within a secure communication tunnel. There are several embodiments of evaluating an inner user identifier against a policy engine. | 05-07-2009 |
20090104892 | Efficient Network Resource Management in a Wireless Network - Wireless data services such as wireless email are becoming common, and in particular, “always-on” systems, where new email is automatically forwarded by the service provider to the wireless device. The problem is that there is no effective mechanism for implementing “always-on” systems when the user is moving around a network, or from one network to another. The invention addresses this problem by generating a session key at the service provider's system for a given data session, and returning this session key to the mobile device. Each time the mobile device communicates with the service provider, it enters this session key into a field that will simply pass through the communication network to the service provider. This allows the service provider to manage the data session, preparing proper accounting records and directing the deletion of stale data sessions on network resources. | 04-23-2009 |
20090083861 | Systems and Methods for Server Load Balancing Using Authentication, Authorization, and Accounting Protocols - Systems and methods for dynamically load-balancing clients across available servers without the need for a load balancer in front of a network are provided. Exemplary methods assign servers to clients in wireless and wireline networks based on server load. Methods and systems for using the authentication, authorization, and accounting (AAA) protocols to load-balance network servers are provided. The load-balancing systems and methods further include using the Diameter AAA protocol routing attribute value pairs (AVPs) to implement bootstrap functionality and load balancing. Methods and systems using the Diameter protocol to manage client assignments are disclosed. Methods and systems for dynamically load-balancing clients across available servers using an AAA protocol are further described. Methods and systems to redirect clients to available servers with the least load are disclosed. | 03-26-2009 |
20090025010 | Systems and methods for providing centralized subscriber session state information - Systems and methods for providing centralized subscriber session state information are provided. The system includes multiple local session state store servers associated with one or more access control servers and a global location store. When access to a network is attempted, the local session state store server receives an access request message and creates a local session state store record, including a user identifier and information associated with the requested session. The local session state store server also transmits a location message to the global location store. Upon receipt of the location message, the global location store creates a record including the user identifier and a network address for the local session state store server having the session state information for the user. An application requiring user session information can access the global location store and the multiple local session state store servers via a common application programming interface. | 01-22-2009 |
20080216148 | Systems and methods for policy-based service management - Systems and method for policy-based service management are provided. An exemplary system includes a rule definition interface module configured to receive a plurality of rule definitions and a separate policy management interface module configured to allow a user to define a rule instance from an existing rule definition instance and to define a policy instance based on the defined rule instance. A policy may be simply expressed via the policy management interface as “perform the following set of action if all of the following rule instances are true unless any of the following rule instances are true.” Additionally, policies may be associated with a context at a specific a level in a context hierarchy having multiple levels. The policy may therefore inherit rules from contexts at a higher level in the hierarchy. | 09-04-2008 |