Patent application number | Description | Published |
20120084831 | METHOD AND APPARATUS FOR PROVIDING PRIVACY MANAGEMENT IN MACHINE-TO-MACHINE COMMUNICATIONS - A method, non-transitory computer readable medium and apparatus for processing a request from a server of a machine-to-machine service provider are provided. For example, the method receives the request from the server of the machine-to-machine service provider to communicate with a machine-to-machine device, determines whether to authorize the request based upon a policy in a privacy database, and enables communications between the server of the machine-to-machine service provider and the machine-to-machine device if the request is authorized based upon the policy. | 04-05-2012 |
20120191842 | SCALABLE POLICY DEPLOYMENT ARCHITECTURE IN A COMMUNICATION NETWORK - Aspects describe using a Policy Access Gateway to facilitate scalability within a communication network and to provide a solution to deploy an enhanced policy gateway. The Policy Access Gateway can enhance standard defined Diameter Routing Agent (DRA) functions with session binding mechanisms. Further, the Policy Access Gateway is scalable and can be deployed in a very large network that supports hundreds of millions of users. Further, the Policy Access Gateway can provide additional policy information to enable policy information consolidation and caching capabilities. | 07-26-2012 |
20120259970 | POLICY AS A NETWORK SERVICE IN A MOBILE CORE NETWORK - Aspects describe using a network element to facilitate scalability within a communication network and to provide policy as a network service in a mobile core network. The network element can be scalable and can be a primary policy access gateway for a first geographic region and can be a secondary policy access gateway for at least a second geographic region. The first geographic region and the second geographic region can have portions that overlap. Further, the network element can hide topology of the home network from roaming partners. | 10-11-2012 |
20120320824 | System and Method for Providing a Content Delivery Network via a Motor Vehicle - A cache server disposed in a motor vehicle receives and caches content from a content distribution network when a load of a cellular link to the content distribution network is low. The cache server determines that the motor vehicle is turned off, broadcasts a wireless signal as part of a wireless network when the motor vehicle is turned off, and provides a device access to the content cached in the cache server via the wireless network. | 12-20-2012 |
20130077534 | METHOD AND APPARATUS FOR DYNAMIC SERVICE PROVISIONING FOR MACHINE TO MACHINE (M2M) DEVICES IN A COMMUNICATIONS NETWORK - A method and non-transitory computer readable medium for provisioning services for machine to machine communication devices in a communications network. For example, the method receives a request from a third party service provider to provision a service to a user of the third party service provider, determines whether a communication network service provider of the communications network and the third party service provider have a pre-existing agreement to provision the service, and provisions the service of the third party service provider to the user via the communications network in accordance with the pre-existing agreement, wherein the user is a subscriber of the communication network service provider. | 03-28-2013 |
20130139215 | METHOD AND APPARATUS FOR MASTER PRIVACY POLICY MECHANISM IN A COMMUNICATIONS NETWORK - A method, non-transitory computer readable medium and apparatus for providing a master privacy policy in a communications network are disclosed. For example, the method receives a privacy control parameter to configure a master privacy policy, stores the master privacy policy in the communications network, and applies the master privacy policy to configure a third party service provider privacy policy for a third party service provider based upon the master privacy policy. | 05-30-2013 |
20130231101 | SYSTEM, METHOD AND APPARATUS FOR PROTECTING PRIVACY WHEN A MOBILE DEVICE IS LOCATED IN A DEFINED PRIVACY ZONE - A system, method and apparatus for protecting privacy when a mobile device is located in a defined privacy zone are described herein. The available features that a user of a mobile device may use are controlled while the mobile device is located in a define privacy zone. Once a mobile device is detected in the define privacy zone, a database is accessed to determine if the mobile device has the features available that are to be disabled. If the features are available, a disable signal is sent via the communications network to the mobile device and the feature is disabled. Once the mobile device is detected to be outside of the defined privacy zone, the previously disabled mobile device feature is enabled. | 09-05-2013 |
20130258949 | ROAMING SUPPORT FOR WIRELESS ACCESS SUBSCRIBER OVER FIXED IP ACCESS NETWORKS - Roaming support for wireless access subscribers over fixed IP access networks is provided herein. An authentication component can authenticate a subscription of a multi-mode device across different network architectures. A policy component can provide at least a portion of a service-level policy agreement to enable or disable services or policies associated with a multi-mode device at the fixed IP access network on a per session basis. | 10-03-2013 |
20130286983 | SERVICE-BASED ROUTING FOR MOBILE CORE NETWORK - Data sessions are established based in part on services. When establishing a data session for a communication device, the desired mobility gateway can be dynamically assigned via a specified policy mechanism or provisioned using a predefined service policy table, where particular services are linked with respective identifiers associated with respective mobility gateways. A communication device can reference the service policy table to locate a service that is to be used for the data session and can identify an identifier(s) linked to the service(s) and associated with a mobility gateway(s). The identifier(s) can be received and used to facilitate selecting one or more respective mobility gateways for the data session(s). The service policy table can be automatically pushed to the communication device or the communication device can initiate a download of the service policy table when the default data connection is established. | 10-31-2013 |
20130336118 | LONG TERM EVOLUTION NETWORK DYNAMIC OVERLOAD MANAGEMENT - A downstream device in a network may monitor and collect data on its condition, including detecting overload conditions, and transmit such data to an upstream network device. The upstream network device may select a best downstream device for a particular traffic flow based on condition data received from downstream devices and transmit the traffic flow to the selected downstream device. A network management server may be configured to perform similar functions, instructing network devices on how to transport data through a network based on condition data received from such devices. | 12-19-2013 |
20140002327 | Real-Time Management of Content Depicted on a Plurality of Displays | 01-02-2014 |
20140006131 | Interactive Inventory Systems and Methods | 01-02-2014 |
20140006198 | Generating and Categorizing Transaction Records | 01-02-2014 |
20140006329 | Providing Resource Consumption Recommendations | 01-02-2014 |
20140006451 | Remote-Controllable Kiosk | 01-02-2014 |
20140007191 | Managing Personal Information on a Network | 01-02-2014 |
20140019313 | Enhancing a User's Shopping Experience - The subject disclosure provides systems and methods for enhancing a purchasing experience by enabling a purchaser to receive a variety of real-time updates or recommendations regarding products that the purchaser, such as a user, may need or intend to purchase. A recommendation provided by the system may be based upon comparing the product with a plurality of sources. The recommendation may include a recommendation that a product may near depletion and thus may need to be replaced, a recommendation that the user may already have a sufficient amount or number of the product, a recommendation that the product may or may not match an existing item owned by the user, or a recommendation not to purchase a product. A virtual closet may also be created according the systems and methods of the subject disclosure, allowing users and contacts selected by the user to collaborate on products. | 01-16-2014 |
20140123219 | POLICY-BASED SERVICE MANAGEMENT SYSTEM - A policy-based management mechanism is provided, whereby the mechanism provides for at least the controlling of access to network resources, the integration of different frameworks into a common open standard, and modular components for assembling integrated date and voice services. The mechanism accomplishes this by using an access management component that checks for access credentials, a service management component that identifies which resources are available to a requestor of resources, and a resource management component that manages the requested resources. In one exemplary implementation, a fourth component, the policy management component links the first three components such that a resource request gains access to resources based on policy decisions determined by the fourth component for the first three components. | 05-01-2014 |
20140150054 | METHOD AND APPARATUS FOR A MASTER PRIVACY POLICY MECHANISM IN A COMMUNICATIONS NETWORK - A method, non-transitory computer readable medium and apparatus for providing a master privacy policy in a communications network are disclosed. For example, the method receives a privacy control parameter to configure a master privacy policy, stores the master privacy policy in the communications network, and applies the master privacy policy to configure a third party service provider privacy policy for a third party service provider based upon the master privacy policy. | 05-29-2014 |
20140164589 | POLICY APPLICATION SERVER FOR MOBILE DATA NETWORKS - A policy application server and methods for use are described. The policy application server is a logical element of a policy-based control and charging system for a mobile data service network. The policy application server is configured to manage policies including creating, revising, formatting, and provisioning of policies. The policy application server is configured to assemble policy rules from policies and context data. Context data includes subscriber and service information needed to make a particular policy rule. The policy application server gathers context data from one or more network databases. The policy application server is configured to send policy rules to select ones of a plurality of policy decision engines. The policy application server manages the storing of policies, policy rules and formatted context data in select ones of a plurality of policy repositories. | 06-12-2014 |
20140169172 | DYNAMIC IN-BAND SERVICE CONTROL MECHANISM IN MOBILE NETWORK - A method, computer readable medium and apparatus for transmitting signaling information within payload traffic. For example, the method parses a certificate received from a service provider to obtain service imprint information associated with a mobile service, inserts a service control parameter derived from the service imprint information into a packet header, and forwards the packet header within payload traffic to a policy charging and enforcing function. | 06-19-2014 |
20140237206 | Managing Personal Information on a Network - Devices, systems, and methods are provided for managing personal information by providing a centralized source or database for a user's information and enabling the user to regulate privacy levels for each information item or category of information. Templates are provided as a table of hierarchies or an onion layers model. Private information may be stored in an inner layer while public information may be stored in an outer layer, and multiple layers and categories can be defined and customized within the template. A requesting entity requests information via a disseminating server that acts as a gateway for authenticating, authorizing, and providing access to the requesting entity. The user may therefore control and regulate their online presence simply by monitoring who requests their information and adjusting privacy levels accordingly. | 08-21-2014 |
20140348003 | Policy-Enabled Dynamic Deep Packet Inspection for Telecommunications Networks - Provided herein is a method including the steps of: establishing at least one policy in a centralized policy management framework (PMF), wherein the policy includes at least one policy condition; monitoring data traffic; determining if the data traffic at least substantially meets one of the policy conditions; sending a trigger to the PMF, if at least one of the policy conditions is at least substantially met; generating an enforcement decision at the PMF, wherein the enforcement decision includes at least one enforcement action; sending the enforcement decision to an enforcement function; and enforcing the enforcement decision. A system for realizing this method is also provided. | 11-27-2014 |
20150079925 | METHOD AND APPARATUS FOR POLICY MANAGEMENT IN A COMMUNICATION SYSTEM - A system that incorporates the subject disclosure may perform, for example, operations including monitoring events relating to activities by a plurality of communication devices, content sources supplying content to the plurality of communication devices, and network conditions during content exchanges between the plurality of communication devices and the content sources, tagging the events to generate tagged events, detecting an event initiated by a communication device of the plurality of communication devices, obtaining tagged event information from the tagged events according to the event detected, generating a policy according to the tagged event information, and transmitting the policy to a policy enforcement function system to facilitate a communication session between the communication device and the content source according to the policy. Other embodiments are disclosed. | 03-19-2015 |