US20080057923A1 - Systems and methods for managing content provided through a mobile carrier - Google Patents
Systems and methods for managing content provided through a mobile carrier Download PDFInfo
- Publication number
- US20080057923A1 US20080057923A1 US11/696,636 US69663607A US2008057923A1 US 20080057923 A1 US20080057923 A1 US 20080057923A1 US 69663607 A US69663607 A US 69663607A US 2008057923 A1 US2008057923 A1 US 2008057923A1
- Authority
- US
- United States
- Prior art keywords
- network
- platform
- wireless network
- application
- enabled
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/082—Access security using revocation of authorisation
Definitions
- the present invention relates to a method and system providing the capability for a wireless network carrier to track and monitor content applications (pods) that are accessed by, and billed to, users of the wireless network carrier, and to control access to such content applications (pods) based on selectable criteria for the performance and user-based feedback related to each content application (pod).
- pods content applications
- the present invention relates to a method and system providing the capability for a wireless network carrier to track and monitor content applications (pods) that are accessed by, and billed to, users of the wireless network carrier, and to control access to such content applications (pods) based on selectable criteria for the performance and user-based feedback related to each content application (pod).
- the community platform described in the '921 application allows an application provider to commercially offer an application to a community of mobile phone users without the need for the application provider to have a contractual agreement with any of the wireless network carriers to which the mobile phone users respectively subscribe.
- the platform described in the '921 application provides application (pod) providers a simple and automatic way to register and present their applications for access, purchase and use by the global community by registering the applications in an automatic fashion that eliminates the need for a lengthy registration processing involving multiple layers of people and procedures.
- an application provider can write an application pod and then register the pod with the community platform for automatic access to a community of mobile phone users via various wireless network carriers.
- an application provider may design and develop an application pod that allows a user to view current stock prices for selected stocks in which the user is interested. The application provider would then register the completed “stock price” application pod with the community platform, after which the pod would be available for access, purchase and use by all mobile phone users that are members of the community. A mobile phone user could then subscribe to use the “stock price” application pod through the community platform, after which the user could access and use the pod to check stock prices from within a typical web browser on a computer or on the user's mobile phone.
- the community platform automatically charges the user for use of (subscription to) the application pod through the user's existing billing account with the wireless network carrier to which the user subscribes.
- the wireless network carrier may need to handle a large volume of user complaints regarding the billing methods and the quality of certain third-party application pods that are billed to users through the wireless network carrier. Furthermore, these complaints may lead to the wireless network carrier having to credit substantial amounts to users' bills in order to offset billing by third-party application pods that have applied unclear and inconsistent pricing models and which have delivered low quality product/services to users, or none at all.
- the delivery of low quality product/service and the unexpected billing to the user's accounts by various third-party application pods may provide a bad image to the wireless network carrier through which such application pods are offered, and may lead users to cancel their service account with that wireless network carrier and subscribe to another wireless network carrier.
- the wireless network carrier would have to constantly review the pricing model offered by each application pod and also constantly review the content provided by each application pod to determine whether the application pod is providing content (product or service) of an acceptable quality to users of the wireless network carrier.
- Proactive monitoring of all third-party application pods offered through the wireless network carrier can cost significant expenditures of manpower and money by the wireless network carrier. Also, when “problem” third-party application pods are identified, the wireless network carrier would need to deal individually with each third-party that operates the application pod to convince them to remedy the problem, or then cancel the access and use of the third-party application pod through the wireless network carrier, which also requires significant time and expense on the part of the wireless network carrier.
- a wireless network carrier needs a way to easily and efficiently monitor third-party content applications (pods) that are accessed by, and billed to, users of the wireless network carrier, and to control access to such third-party content applications (pods) based on selectable criteria for the performance and quality of each content application (pod).
- pods third-party content applications
- the present invention generally provides a way for a wireless network carrier to track and monitor third-party network-enabled applications (pods) that are accessed by, and billed to, users of the wireless network carrier, and to control access to such third-party network-enabled applications (pods) based on selectable criteria for the performance and user-based feedback related to each content application (pod).
- pods third-party network-enabled applications
- a system and method are provided that allow each of many mobile service providers to access a community platform through which the wireless network carrier can view all third-party application pods that are offered through that wireless network carrier, monitor the use of each application pod and the pricing model of each application pod, and the revenue generated by each application pod.
- the present invention allows the wireless network carrier to control the type of pricing model used by each third-party application pod and the consistent display of such pricing model to the users, along with the enforcement of the pricing model when the application pod bills users through the wireless network carrier.
- the present invention also allows the wireless network carrier to disconnect a third-party application pod from being accessed by users of the wireless network carrier based on monitored user feedback and comments related to the third-party application pod in comparison to quality sensitivity criteria set by the wireless network carrier.
- the present application also provides the capability for the wireless network carrier to automatically control the amount of marketing exposure (advertising) of each application pod to users of the wireless network carrier.
- the wireless network carrier can increase the amount of advertising of a particular application pod to a user on a user's displayed web page, if that application pod is growing in popularity and meets acceptable billing and quality criteria set by the wireless network carrier.
- the wireless network carrier can efficiently and inexpensively for a wireless network carrier track and monitor third-party content applications (pods) that are accessed by, and billed to, users of the wireless network carrier, and to control access to, and billing practices of, such third-party content applications (pods) based on selectable criteria for the performance and user-based feedback related to each content application (pod).
- pods third-party content applications
- FIG. 1 is a diagram illustrating an example mobile community platform that includes a content monitor configured in accordance with one embodiment
- FIG. 2 is a diagram illustrating the functions that can be made available via the content manager of FIG. 1 in accordance with one embodiment
- FIGS. 3-12 are screen shots illustrating how the functions of FIG. 2 can be presented to a user
- FIG. 13 is a diagram illustrating an example mobile community platform in accordance with one embodiment
- FIG. 14 is a diagram illustrating the mobile community platform of FIG. 13 in more detail
- FIG. 15 is a flow chart illustrating an example process by which a content provider can create and register a mobile application pod with the mobile community platform of FIG. 13 in accordance with one embodiment
- FIG. 16 is a diagram illustrating an example mobile pod in accordance with one embodiment
- FIG. 17 is a diagram illustrating an example user profile page as presented by the mobile community platform of FIG. 13 in accordance with one embodiment.
- FIG. 18 is a diagram illustrating an example mobile community platform in accordance with another embodiment.
- the aforementioned '921 application provides a thorough description of a community platform for access by users of many different wireless network carriers that allows the users to efficiently and effectively form a virtual community for communication, sharing, and access to a large number of third-party application pods that provide services and products to users of the community platform, where the third-party application pods are developed and operated by third-parties and then integrated with the community platform.
- a mobile community 202 is accessible to users 212 - 216 through the internet 210 or to users 224 - 228 through their respective cellular carrier systems 204 - 208 .
- users of mobile community 202 can access applications and services provided through mobile community 202 either through their mobile phones or through their computer browsers.
- mobile community 202 shown in FIG. 14 includes global mobile platform 306 , user area 304 where the content, community and commerce functions are handled for the users, and a multimedia messaging system 302 .
- Users 212 , 214 , 216 can visit the user area 304 to participate in an on-line community that includes various content and commerce opportunities.
- user area 304 includes a web server that communicates with users 212 , 214 , 216 and includes a data store of user information and other content.
- mobile community 202 presents to a user 212 a profile page (“home page”) that reflects content and information associated with, and desired by, that particular user. This content and information is not maintained on the local computer being used by the user 212 but, rather, is maintained and managed by the computer systems within the user area 304 .
- Multimedia messaging system 302 includes applications for connecting with and communicating with the multiple different wireless network carriers 204 , 206 , 208 that have been partnered with the platform of mobile community 202 .
- MMS 302 is configured to generate message requests in the appropriate format for each of the wireless network carriers 204 , 206 , 208 including tariff information that determines the amount for which the recipient of the message will be charged.
- the wireless network carriers 204 , 206 , 208 Upon receipt of the message request, the wireless network carriers 204 , 206 , 208 will use the information in the request to generate an appropriate message to the intended recipient/subscriber of the cellular carrier and then bill the recipient/subscriber's cellular service account for the specified amount.
- MMS 302 communicates with the user area 304 , such that users of the mobile community 202 can advantageously use the connectivity of MMS 302 with the carriers in order to send messages to subscribers of any of the wireless network carriers 204 , 206 , 208 .
- the messages may be SMS messages, MMS messages, or other message formats that are subsequently developed. Some of these messages may have zero tariff and, therefore do not generate a bill (other than the underlying charges implemented by the cellular carrier) and others may have non-zero tariffs resulting in a billing event for the recipient.
- Mobile users can also communicate via MMS 302 with user area 304 to access the content, community and commerce offered though mobile community 202 .
- Global mobile platform 306 provides a link between third-party software developers/providers 308 , 310 and mobile community 202 .
- a third-party software provider 308 , 310 may offer services and products to users 212 , 214 , 216 .
- the global mobile platform 306 also provides automatic and instant connectivity to the MMS 302 and the wireless network carriers 204 , 206 , 208 , and their users.
- the third-party software provider 308 , 310 can interact with all users of the mobile community 202 whereby billable transactions with users 212 , 214 , 216 are automatically billed via the billing systems of the wireless network carriers 204 , 206 , 208 . Furthermore, and importantly, this capability is available to the third-party software provider 308 , 310 without requiring the software provider 308 , 310 to negotiate or contract with any cellular carrier for billing arrangements, or to worry about how to communicate with a cellular carrier's systems and resources.
- the software provider seamlessly takes advantage of the unified set of connectivity and billing arrangements that exist between the mobile community 202 and the wireless network carriers 204 , 206 , 208 .
- the mobile community 202 has in place with different wireless network carriers 204 , 206 , 208 , the underlying technical and communications infrastructure is also in place to communicate with and interoperate with each of the different wireless network carriers 204 , 206 , 208 .
- application pod vendors and other members of the mobile community may interface with and operate with any of a variety of different carriers without difficulty. While some applications that are available to users 212 , 214 , 216 may be hosted in the user area 304 , the global mobile platform 306 , or elsewhere in the community 202 , it is often the case that the third-party developer/provider 308 , 310 will host their own application at their own remote location.
- mobile platform 202 can also provide billing services through a variety of payment systems.
- the billing events generated in the system are not necessarily limited to mobile billing events. Rather, mobile platform can have agreements with a variety of differnet payment and transaction systems and allow providers 308 , 310 to benefit from these arrangements without the need to have arrangements of their own. This can enable providers 308 , 310 to reach an even wider pool of potential customers.
- FIG. 4 of the '921 application depicts a flowchart showing the basic steps through which a third-party application pod developer takes advantage of the community and billing resources offered by the mobile community.
- the application developer identifies a service need (such as a stock price information service, for example) in step 402 , and then the application developer designs and develops an application pod for the desired service (step 404 ).
- the developer registers the pod with the community through global mobile platform 306 to make the pod available to users of mobile community 202 for purchase and use. Once registered, the system databases and directories of mobile community 202 are updated to accommodate the new pod for access, billing, and other purposes (step 408 ).
- FIG. 9 of the '921 application included herein as FIG. 16
- FIG. 10 of the '921 application included herein as FIG. 17
- FIG. 10 of the '921 application included herein as FIG. 17
- the present invention of this application is directed to providing an efficient and inexpensive way for a wireless network carrier to track and monitor third-party content applications (pods) that are accessed by, and billed to, users of the wireless network carrier, and to control access to, and billing practices of, such third-party content applications (pods) based on selectable criteria for the performance and user-based feedback related to each content application (pod).
- pods third-party content applications
- FIG. 1 of the present application is a block diagram that depicts the integration of a content monitor functionality into the community-based architecture discussed above with respect to FIGS. 13 and 14 in which third-party application developers register their application pods with the community platform of the mobile community for access, purchase and use by users of the mobile community, and for automatic billing to the wireless network carrier account of a user when that user purchases (opts into) and uses an application pod.
- the components of FIG. 1 are similar to those shown in FIGS. 13 and 14 , with the exception of the additional components that provide the content monitor functionality.
- the community platform based architecture is shown in which third-party application pods 308 - 310 are integrated into the community 202 through global community platform 306 .
- the application pods can then be accessed and purchased for use by users 370 (including users 224 to 228 ) of wireless network carriers 204 to 208 , respectively.
- Content monitor 350 is shown in FIG. 1 to be integrated into the architecture such that it is in communication with MMS 302 , user area 304 and global mobile platform 306 .
- content monitor 350 can provide information regarding the use, billing structure and performance of each application pod to a wireless network carrier, and can also control a users access to, and purchase of, an application pod.
- Content monitor 350 can be a program or set of executable instructions that can be executed on a computer or server, either along with the other components shown in community 202 of FIG. 1 , or separately, but in communication with the other components of community 202 .
- content monitor web portal 360 is a secure website developed and maintained by community 202 for secure access by mobile service providers 204 to 208 .
- Content monitor web portal 360 can be accessed through, e.g., a networked computer, such as a typical personal computer or workstation with network access to the internet.
- FIG. 2 is a block diagram that explains the functionality of content monitor 350 of FIG. 1 , e.g., when accessed through content monitor web portal 360 .
- one of mobile service providers 204 to 208 accesses content monitor web portal 360 by providing a secure identification, such as an identifier code and a password.
- an application pod list display 361 is provided which lists all application pods that are offered to users through the specific mobile service provider that is logged into content monitor web portal 360 .
- An example of application pod list display 361 is shown in the screen shot of FIG. 3 , and shows a listing of all application pods offered through the mobile service provider, along with various data fields in the row corresponding to each application pod. Each of these various data fields is discussed in more detail below.
- a user can click on one of the listed application pods to bring up a selected pod monitor view 380 .
- An example of selected pod monitor view 380 also shown in the middle of the screen shot of FIG. 3 , for application pod “Hottie or NOT.”
- a selected pod monitor view 380 can include a mobile marketing exposure control bar that can be configured to allow the mobile service provider to control how often the specific application pod is advertised to the users of the mobile service provider when users are accessing user area 304 of community 202 .
- Selected pod monitor view 380 also includes a “Read Comments” button, a “View Pricing” button, and a “Suspend Mobile Pod” button, each of which is described further below.
- each of the various data field functions 381 to 388 are shown.
- a display of the data field function pops-up when the mouse is pointed over that field function in the row of the corresponding application pod, e.g., in the list display of FIG. 3 .
- “Total Users” function 381 can allow the mobile service provider to see the total number of users that have currently purchased (opted into) the selected application pod.
- An example of a display of the “Total Users” is shown in the screen shot of FIG. 4 .
- “Opt-ins” function 382 can allow the mobile service provider to see the number of users that have opted into (purchased) the selected application pod during the current month.
- “Opt-ins” An example of a display of the “Opt-ins” is shown in the screen shot of FIG. 5 .
- “Opt-outs” function 383 can allow the mobile service provider to see the number of users that have opted out of (canceled) the selected application pod during the current month.
- An example of a display of the “Opt-outs” is shown in the screen shot of FIG. 6 .
- the user does not necessarily opt-in/opt-out as those terms may normally be defined. Rather, the terms opt-in/opt-out can be used more generically to refer to the simple activation/de-activation of a pod, regardless of the actual mechanism for activating/de-activating.
- “Revenue Last Month” function 384 can allow the mobile service provider to see the total amount of revenue billed by the selected application pod through the mobile service provider for the last (previous) month. An example of a display of the “Revenue Last Month” is shown in the screen shot of FIG. 7 . “Revenue This Month” function 385 can allow the mobile service provider to see the total amount of revenue billed by the selected application pod through the mobile service provider for this (current) month. An example of a display of the “Revenue This Month” is shown in the screen shot of FIG. 8 .
- “User Rating” function 386 can allow the mobile service provider to see the composite user rating based on rating input from the users in the community that use the selected application pod, and is shown in the form of one-to-five stars, as indicated for each application pod in the screen shot of FIG. 3 .
- “Complaints” function 387 can allow the mobile service provider to see the total number of complaints related to the selected application pod as provided by users in the community that use the selected application pod, as indicated for each application pod in the screen shot of FIG. 3 .
- FIG. 15 of the '921 application is a flow chart illustrating an example method for instituting a complaint department within mobile community 202 .
- the mobile service provider can also read the subject complaints for a selected application pod.
- “Status” function 388 can allow the mobile service provider to track and monitor the performance of the selected application pod, and to control access and purchase of the selected application pod based on criteria selected by the mobile service provider for the selected application pod.
- the current status of the selected application pod is shown in the row corresponding to the application pod, as seen in FIG. 3 , and the status is depicted by a colored button, such as green for “good,” yellow for “warning,” and red for “suspension”.
- a colored button such as green for “good,” yellow for “warning,” and red for “suspension”.
- the colored status indicators of “Status” function 388 are based on the number of complaints from users of the selected application pod, in comparison, e.g., to a selected sensitivity (threshold) criteria set by the mobile service provider.
- a display of the “threshold” setting of the “Status” function is shown in the “threshold” pop-up box in the right side of the screen shot of FIG. 11 . As seen in FIG.
- buttons are provided for “Automatic Suspension” or “Manual Suspension”, which the mobile service provider can select depending on whether it is desired for content monitor 350 to automatically suspend an application pod that has a number of complaints exceeding a set threshold, or whether content monitor 350 is simply to warn the mobile service provider that the threshold has been exceed by turning the status indicator to red, and then the mobile service provider must manually suspend the application pod, as described below.
- a “threshold” setting bar which allows the mobile service provider to set the level of user complaints (based on percentage of users that purchased the application pod) required as a threshold for the status indicator to turn from green (good standing) to yellow (warning), and from yellow (warning) to red (suspend). In this manner, the mobile service provider can decide how strictly they want to control the quality of application pods that are offered to users through the mobile service provider.
- an average “threshold” bar which displays the average threshold levels set for all mobile service providers in a given region, such as the United States. This allows a specific mobile service provider to see how all other mobile service providers are controlling access to, and purchase of, a specific application pod.
- the status indicator is shown in application pod list display 361 is set to the appropriate color according to the number of complaints received in community 202 from users of the selected application pod.
- the status indicator is set to “red”, and the application pod is automatically suspended from access and use by content monitor 350 if “automatic suspension” button has been set by the mobile service provider. Otherwise, the mobile service provider must notice the red status indicator and then manually suspend the application pod. Either way, when an application pod is suspended, content monitor 350 coordinates with global mobile platform 306 and user area 304 to prevent the suspended application pod from being accessed and purchased by users of the mobile service provider (carrier).
- the threshold should be based on reasonable percentage as oppose to say an overall number of complaints. Clearly a pod that generates millions of messages will often also generate more complaints than say a pod that generates a few thousand messages; however, the percentage may be much lower. For example, a pod that generates one million messages may generate 10,000 complaints. But this means that a complaint is generated only 1% of the time. If the pod only generates one hundred thousand messages, then the same 10,000 complaints would represent a 10% complaint rate. Clearly the second example is more of a problem than the first. Therefore, thresholds based on a percentage or rate of complaints can be more useful than thresholds based on volume of complaints. In certain embodiments, however, the raw number of complaints can be used either alone or in combination with a rate analysis.
- the number of opt-outs, or de-activations can also be used to determine whether to suspend a certain pod with respect to a certain carrier and/or, as explained below, a certain aggregator.
- a opt-out/de-activation threshold can be set that when crossed causes content monitor 350 to automatically suspend the pod for the specific carrier.
- the status indication can also be generated based on the number of opt-outs/de-activations. If automatic suspension is not enabled, then the status indicator can alert the carrier to the situation so that the carrier can make a determination regarding manual suspension based on the rate of opt-outs/de-activations. In other embodiments, the status indicator and/or automatic suspension can be based on a combination of complaints and opt-outs.de-activations.
- the “Read Comments” button function 391 of selected pod monitor view 380 can allow the mobile service provider (carrier) to view all comments entered by users of the selected application pod, as shown in FIG. 9 .
- the “View Pricing” function 392 of selected pod monitor view 380 can allow the mobile service provider (carrier) to view the pricing model of the selected application pod, along with information of the third party that operated the selected application pod. This allows the mobile service provider to ensure that the pricing model and information is in the correct format as presented to users, and to ensure that it is fair and clear, as shown in FIG. 10 .
- the “Suspend Mobile Pod” function 393 of selected pod monitor view 380 can allow the mobile service provider (carrier) to suspend an application pod from use for any reason, such as when the status indicator is red in the status display of the selected application pod in the application pod list display 361 .
- FIG. 12 shows an example of a “Suspend Mobile Pod” pop-up display that can be displayed upon operation of the “Suspend Mobile Pod” button of selected pod monitor view 380 .
- the mobile service provider can elect to suspend the application pod from service through the mobile service provider for a specific amount of time, such as one day, one week, or one month, or indefinitely.
- a mobile carrier can control the content provided to its customers through mobile platform 202 in a manner that cuts down on complaints and increases customer satisfaction; however, as will be understood there is often a middle man involved when it comes to providing content to mobile users.
- These middlemen are often referred to as “Aggregators.”
- Aggregators For example, it is well understood that short codes associated with SMS messaging are actually managed by an Aggregator. When a mobile user sends a message using a short code, the message, and any reply, are routed through the Aggregator's system. The Aggregator is then in charge of collecting all fees associated with the message and forwarding the respective shares, e.g., to the associated carrier and the service/content provider associated with the short code. The Aggregator also makes a small transaction fee for handling each message.
- Other intermediaries such as transaction processors, e.g., Paypal or a bank, can also perform some or all of the functions of an aggregator as described herein.
- FIG. 18 This type of arrangement is illustrated in FIG. 18 .
- mobile platform 202 is interfaced with a plurality of mobile carriers, 204 - 208 through aggregators 1802 , 1804 , 1806 .
- aggregators 1802 , 1804 , 1806 It will be understood that more or less carriers can be interfaced with mobile platform 202 via more or less aggregators and that number of carriers and aggregators illustrated in FIG. 18 is by way of example only and not intended to limit the embodiments described herein to specific numbers of carriers or aggregators.
- aggregators 1802 , 1804 , 1806 will have contracts to provide messaging services with only certain of carriers 204 , 206 , 208 and may not have contracts to provide messaging services for all carriers 204 , 206 , 208 .
- mobile platform 202 may have contracts with each of aggregators 1802 , 1804 , 1806 to handle messages for only certain of carriers 204 , 206 , 208 .
- aggregators 1802 , 1804 , 1806 can provide message routing and fee collection and allocation services for mobile users 224 , 226 , 228 when accessing the pods of mobile platform 202 .
- Aggregators 1802 , 1804 , 1806 can also be very sensitive to complaints associated with messages being provide via the application pods, because they do not want to risk being dropped as an aggregator by carriers 204 , 206 , 208 . Accordingly, in certain embodiments, aggregators 1802 , 1804 , 1806 can use the services provided by content monitor 350 and accessed via content monitor portal 360 .
- the aggregator can then access the functions of FIG. 2 and illustrated in the screen shots of FIGS. 3-12 ; however, the information displayed will be with respect to the aggregator and not the carrier.
- the thresholds of FIG. 11 can be provided per carrier per aggregator. In other words, an aggregator can select a higher threshold for one carrier versus another. When a carrier specific threshold for a certain aggregator is exceeded, then mobile platform 202 will not send any messages intended for a mobile user associated with the carrier originating from the offending pod through the particular aggregator. But mobile platform 202 may continue to send messages from the offending pod to user's associated with the specific carrier through another aggregator if the associated threshold for that aggregator has not been exceeded.
- aggregators 1802 , 1804 , 1806 can define a threshold for each carrier 204 , 206 , 208 they are servicing. If aggregators 1802 and 1804 are both servicing carrier 204 , then messages for users of carrier 204 can be routed through both aggregators 1802 and 1804 . For example, a type of load balancing may be employed using both aggregators. In other embodiments, pricing may dictate which aggregator is used.
- the mobile platform 202 can automatically stop sending messages associated with the pod to users of carrier 204 through aggregator 1802 ; however, mobile platform 202 may still send messages associated with the pod to user's of carrier 204 through aggregator 1804 , provided the threshold set by aggregator 1804 is not also exceeded.
- the systems and methods described above and in related applications such as the '921 application should help ensure greater customer satisfaction, because for example the systems and methods ensure that the user is not billed unless they opt in and the user is billed the amount agreed upon. But in the event a particular pod still generates complaints, the aggregator, or carrier can simply shut down access to that pod. Thus, the carriers do not need to expend the resources required to deal with such situations, and the aggregators can preserve their relationships with the various carriers by eliminating a problem before it reaches a level where the carriers will start paying attention.
- aggregators can sign up and register pods to be made available by mobile platform 202 via an aggregator 1802 , 1804 , 1806 .
- aggregators 1802 , 1804 , 1806 can offer, e.g., via a link on their web pages, the ability for content providers to provide content via an application pod and mobile platform 202 .
- an aggregator can develop a marketing page that includes a link to mobile platform 202 .
- a content provider access the marketing page and clicks on the link, they will be interfaced with platform 202 where they can register their pod, e.g., in accordance with the process described in relation to FIG. 14 .
- the content providers pod will then be made available as illustrated in FIGS. 16 and 17 .
- all messages associated with that pod can then be routed through the aggregator through which the content provider accessed platform 202 . In this manner, the aggregator can drive more messages, and therefore more revenue, through the aggregator's system.
- the aggregator can be paid an additional fee, e.g., 5% of the revenue assigned to mobile platform 202 and/or the content provider.
- messages associated with the pod are not necessarily routed through the associated content provider, but the revenue share fee, e.g., 5%, can apply regardless of what aggregator the message is sent through.
- the revenue share fee e.g., 5%
- the messages can be routed through the aggregator. But the messages can be routed through other aggregators in other geographic regions, thereby driving additional revenue for all parties involved.
- each aggregator 1802 , 1804 , 1806 can be servicing a particular geographic region. All messages routed to at least certain carriers in the associated region can be route through the associated aggregator 1802 , 1804 , 1806 ; however, if a message being routed through one aggregator is related to a pod that was registered through one of the other aggregator's marketing pages, then the other aggregator can still get a share of the processing fee collected in association with the message.
- the pod can be permanently associated with the originating aggregator for the purpose of fee splitting/revenue sharing as described above. For example, even if the content provider of the pod jumps to another aggregator, which as explained above is very common, then the originating aggregator can still receive a share of the fees generated by that pod.
- mobile platform 202 can be configured to provide message and billing capabilities through a variety of systems and intermediaries, including non-mobile systems and intermediaries. Accordingly, the operators of these systems and/or intermediaries can have similar concerns about network-enabled applications that generate a lot of complaints and/or de-activation requests. Thus, the ability to suspend a network-based application as described above can also be made available to these non-mobile entities. Further, the non-mobile intermediaries can have the ability to sign up content providers and share in revenue generated by messages associated with the content provider's application in a manner similar to that described for mobile intermediaries.
Abstract
A wireless network carrier can track and monitor third-party network-enabled applications (pods) that are accessed by, and billed to, users of the wireless network carrier through a mobile content platform, and to control access to such third-party network-enabled applications (pods) based on selectable criteria for the performance and user-based feedback related to each content application (pod). The network-enabled applications can also be registered with the mobile content platform through an intermediary, such as an aggregator. The network-enabled application can then be associated with the intermediary so that the intermediary receives a share of the revenue generated by the network-enabled application.
Description
- This application claims priority under 35 U.S.C. 119(e) to U.S. Provisional Patent Application Ser. No. 60/789,388, filed Apr. 4, 2006, entitled “Content Application Manager,” which is incorporated herein by reference as if set forth in full.
- This Application is also related to U.S. patent application Ser. No., 11/516, 921, filed Sep. 6, 2006, entitled “Automated Billing and Distribution Platform for Application Providers,” which is also incorporated herein by reference as if set forth in full.
- 1. Field
- The present invention relates to a method and system providing the capability for a wireless network carrier to track and monitor content applications (pods) that are accessed by, and billed to, users of the wireless network carrier, and to control access to such content applications (pods) based on selectable criteria for the performance and user-based feedback related to each content application (pod).
- 2. Background
- The invention described in commonly-owned U.S. patent application Ser. No. 11/516,921, entitled “Automated Mobile Phone Billing and Distribution Platform for Application Providers,” (the “'921 application”), is directed to a method and platform through which content application providers can easily and automatically connect to a common platform in order to offer access and use of their network-enabled applications (pods) to a global community of mobile phone users through a variety of different mediums, while automatically charging the user for use of the application through the user's billing account with the wireless network carrier to which the user subscribes. In this manner, the community platform described in the '921 application allows an application provider to commercially offer an application to a community of mobile phone users without the need for the application provider to have a contractual agreement with any of the wireless network carriers to which the mobile phone users respectively subscribe. Furthermore, the platform described in the '921 application provides application (pod) providers a simple and automatic way to register and present their applications for access, purchase and use by the global community by registering the applications in an automatic fashion that eliminates the need for a lengthy registration processing involving multiple layers of people and procedures.
- According to the platform and methods described in the '921 application, an application provider can write an application pod and then register the pod with the community platform for automatic access to a community of mobile phone users via various wireless network carriers. For example, an application provider may design and develop an application pod that allows a user to view current stock prices for selected stocks in which the user is interested. The application provider would then register the completed “stock price” application pod with the community platform, after which the pod would be available for access, purchase and use by all mobile phone users that are members of the community. A mobile phone user could then subscribe to use the “stock price” application pod through the community platform, after which the user could access and use the pod to check stock prices from within a typical web browser on a computer or on the user's mobile phone. As mentioned above with respect to the '921 application, the community platform automatically charges the user for use of (subscription to) the application pod through the user's existing billing account with the wireless network carrier to which the user subscribes.
- Sometimes, difficulties arise with the access and use of third-party application pods by users of a wireless network carrier, whether through the internet or through the user's mobile phone, because the third-party application pods offered for billing through the wireless network carrier may have various, inconsistent types of pricing models. This results in lack of clarity to a user of such pods, thereby leading to unexpected and/or unwanted billed charges on the user's account with the wireless network carrier. Also, some third-party application pods may not deliver the service or product that was expected when the user agreed to pay for (opt in to) the application pod. These problems can cost the wireless network carrier a substantial amount of time and money to deal with. For example, the wireless network carrier may need to handle a large volume of user complaints regarding the billing methods and the quality of certain third-party application pods that are billed to users through the wireless network carrier. Furthermore, these complaints may lead to the wireless network carrier having to credit substantial amounts to users' bills in order to offset billing by third-party application pods that have applied unclear and inconsistent pricing models and which have delivered low quality product/services to users, or none at all.
- In addition, the delivery of low quality product/service and the unexpected billing to the user's accounts by various third-party application pods may provide a bad image to the wireless network carrier through which such application pods are offered, and may lead users to cancel their service account with that wireless network carrier and subscribe to another wireless network carrier. In order for a wireless network carrier to proactively monitor the billing practices and the quality of content provided by the numerous and various third-party application pods offered through the wireless network carrier, the wireless network carrier would have to constantly review the pricing model offered by each application pod and also constantly review the content provided by each application pod to determine whether the application pod is providing content (product or service) of an acceptable quality to users of the wireless network carrier.
- Proactive monitoring of all third-party application pods offered through the wireless network carrier can cost significant expenditures of manpower and money by the wireless network carrier. Also, when “problem” third-party application pods are identified, the wireless network carrier would need to deal individually with each third-party that operates the application pod to convince them to remedy the problem, or then cancel the access and use of the third-party application pod through the wireless network carrier, which also requires significant time and expense on the part of the wireless network carrier.
- Accordingly, a wireless network carrier needs a way to easily and efficiently monitor third-party content applications (pods) that are accessed by, and billed to, users of the wireless network carrier, and to control access to such third-party content applications (pods) based on selectable criteria for the performance and quality of each content application (pod).
- The present invention generally provides a way for a wireless network carrier to track and monitor third-party network-enabled applications (pods) that are accessed by, and billed to, users of the wireless network carrier, and to control access to such third-party network-enabled applications (pods) based on selectable criteria for the performance and user-based feedback related to each content application (pod).
- In one embodiment of the invention, a system and method are provided that allow each of many mobile service providers to access a community platform through which the wireless network carrier can view all third-party application pods that are offered through that wireless network carrier, monitor the use of each application pod and the pricing model of each application pod, and the revenue generated by each application pod. In addition, the present invention allows the wireless network carrier to control the type of pricing model used by each third-party application pod and the consistent display of such pricing model to the users, along with the enforcement of the pricing model when the application pod bills users through the wireless network carrier. The present invention also allows the wireless network carrier to disconnect a third-party application pod from being accessed by users of the wireless network carrier based on monitored user feedback and comments related to the third-party application pod in comparison to quality sensitivity criteria set by the wireless network carrier.
- In other embodiments, the present application also provides the capability for the wireless network carrier to automatically control the amount of marketing exposure (advertising) of each application pod to users of the wireless network carrier. For example, the wireless network carrier can increase the amount of advertising of a particular application pod to a user on a user's displayed web page, if that application pod is growing in popularity and meets acceptable billing and quality criteria set by the wireless network carrier.
- In this manner, the wireless network carrier can efficiently and inexpensively for a wireless network carrier track and monitor third-party content applications (pods) that are accessed by, and billed to, users of the wireless network carrier, and to control access to, and billing practices of, such third-party content applications (pods) based on selectable criteria for the performance and user-based feedback related to each content application (pod).
- These and other features, aspects, and embodiments of the invention are described below in the section entitled “Detailed Description.”
- Features, aspects, and embodiments of the inventions are described in conjunction with the attached drawings, in which:
-
FIG. 1 is a diagram illustrating an example mobile community platform that includes a content monitor configured in accordance with one embodiment; -
FIG. 2 is a diagram illustrating the functions that can be made available via the content manager ofFIG. 1 in accordance with one embodiment; -
FIGS. 3-12 are screen shots illustrating how the functions ofFIG. 2 can be presented to a user; -
FIG. 13 is a diagram illustrating an example mobile community platform in accordance with one embodiment; -
FIG. 14 is a diagram illustrating the mobile community platform ofFIG. 13 in more detail; -
FIG. 15 is a flow chart illustrating an example process by which a content provider can create and register a mobile application pod with the mobile community platform ofFIG. 13 in accordance with one embodiment; -
FIG. 16 is a diagram illustrating an example mobile pod in accordance with one embodiment; -
FIG. 17 is a diagram illustrating an example user profile page as presented by the mobile community platform ofFIG. 13 in accordance with one embodiment; and -
FIG. 18 is a diagram illustrating an example mobile community platform in accordance with another embodiment. - The aforementioned '921 application provides a thorough description of a community platform for access by users of many different wireless network carriers that allows the users to efficiently and effectively form a virtual community for communication, sharing, and access to a large number of third-party application pods that provide services and products to users of the community platform, where the third-party application pods are developed and operated by third-parties and then integrated with the community platform.
- Referring to
FIG. 2 of the '921 application, included herein asFIG. 13 , amobile community 202 is accessible to users 212-216 through theinternet 210 or to users 224-228 through their respective cellular carrier systems 204-208. In this manner, users ofmobile community 202 can access applications and services provided throughmobile community 202 either through their mobile phones or through their computer browsers. - Referring to
FIG. 3 of the '921 application, included herein asFIG. 14 , an architecture is depicted which allows application developers to register their application pods with the community platform of themobile community 202 for access, purchase and use by users ofmobile community 202. Briefly,mobile community 202 shown inFIG. 14 includes globalmobile platform 306,user area 304 where the content, community and commerce functions are handled for the users, and amultimedia messaging system 302.Users user area 304 to participate in an on-line community that includes various content and commerce opportunities. This is typically accomplished via a user's web browser that may be hosted on a laptop or desktop computer, or, in the alternative, even on the user's mobile device such as a PDA or mobile phone. Thus,user area 304 includes a web server that communicates withusers mobile community 202 presents to a user 212 a profile page (“home page”) that reflects content and information associated with, and desired by, that particular user. This content and information is not maintained on the local computer being used by theuser 212 but, rather, is maintained and managed by the computer systems within theuser area 304. -
Multimedia messaging system 302 includes applications for connecting with and communicating with the multiple differentwireless network carriers mobile community 202. MMS 302 is configured to generate message requests in the appropriate format for each of thewireless network carriers wireless network carriers -
MMS 302 communicates with theuser area 304, such that users of themobile community 202 can advantageously use the connectivity ofMMS 302 with the carriers in order to send messages to subscribers of any of thewireless network carriers MMS 302 withuser area 304 to access the content, community and commerce offered thoughmobile community 202. - Global
mobile platform 306 provides a link between third-party software developers/providers mobile community 202. In particular, by using aninterface 312, a third-party software provider users software provider mobile platform 306 also provides automatic and instant connectivity to theMMS 302 and thewireless network carriers party software provider mobile community 202 whereby billable transactions withusers wireless network carriers party software provider software provider mobile community 202 and thewireless network carriers mobile community 202 has in place with differentwireless network carriers wireless network carriers users user area 304, the globalmobile platform 306, or elsewhere in thecommunity 202, it is often the case that the third-party developer/provider - It should be noted that
mobile platform 202 can also provide billing services through a variety of payment systems. In other words, the billing events generated in the system are not necessarily limited to mobile billing events. Rather, mobile platform can have agreements with a variety of differnet payment and transaction systems and allowproviders providers -
FIG. 4 of the '921 application, included herein asFIG. 15 , depicts a flowchart showing the basic steps through which a third-party application pod developer takes advantage of the community and billing resources offered by the mobile community. First, the application developer identifies a service need (such as a stock price information service, for example) instep 402, and then the application developer designs and develops an application pod for the desired service (step 404). Instep 406, the developer registers the pod with the community through globalmobile platform 306 to make the pod available to users ofmobile community 202 for purchase and use. Once registered, the system databases and directories ofmobile community 202 are updated to accommodate the new pod for access, billing, and other purposes (step 408). An example of an application pod developed by a developer and registered withmobile community 202 is shown inFIG. 9 of the '921 application, included herein asFIG. 16 , and a depiction of a user's home page is shown inFIG. 10 of the '921 application, included herein asFIG. 17 , in which it can be seen that the user's home page contains several application pods to which the user has subscribed. - As mentioned above, the present invention of this application is directed to providing an efficient and inexpensive way for a wireless network carrier to track and monitor third-party content applications (pods) that are accessed by, and billed to, users of the wireless network carrier, and to control access to, and billing practices of, such third-party content applications (pods) based on selectable criteria for the performance and user-based feedback related to each content application (pod).
-
FIG. 1 of the present application is a block diagram that depicts the integration of a content monitor functionality into the community-based architecture discussed above with respect toFIGS. 13 and 14 in which third-party application developers register their application pods with the community platform of the mobile community for access, purchase and use by users of the mobile community, and for automatic billing to the wireless network carrier account of a user when that user purchases (opts into) and uses an application pod. In this regard, the components ofFIG. 1 are similar to those shown inFIGS. 13 and 14 , with the exception of the additional components that provide the content monitor functionality. - As seen in
FIG. 1 , the community platform based architecture is shown in which third-party application pods 308-310 are integrated into thecommunity 202 throughglobal community platform 306. The application pods can then be accessed and purchased for use by users 370 (includingusers 224 to 228) ofwireless network carriers 204 to 208, respectively.Content monitor 350 is shown inFIG. 1 to be integrated into the architecture such that it is in communication withMMS 302,user area 304 and globalmobile platform 306. In this way, content monitor 350 can provide information regarding the use, billing structure and performance of each application pod to a wireless network carrier, and can also control a users access to, and purchase of, an application pod.Content monitor 350 can be a program or set of executable instructions that can be executed on a computer or server, either along with the other components shown incommunity 202 ofFIG. 1 , or separately, but in communication with the other components ofcommunity 202. - In one embodiment, the functionality of
content monitor 350 is accessed bymobile service providers 204 to 208 through contentmonitor web portal 360. In this regard, contentmonitor web portal 360 is a secure website developed and maintained bycommunity 202 for secure access bymobile service providers 204 to 208. Contentmonitor web portal 360 can be accessed through, e.g., a networked computer, such as a typical personal computer or workstation with network access to the internet. -
FIG. 2 is a block diagram that explains the functionality of content monitor 350 ofFIG. 1 , e.g., when accessed through contentmonitor web portal 360. As seen inFIG. 2 , one ofmobile service providers 204 to 208 accesses contentmonitor web portal 360 by providing a secure identification, such as an identifier code and a password. Once logged into contentmonitor web portal 360, an applicationpod list display 361 is provided which lists all application pods that are offered to users through the specific mobile service provider that is logged into contentmonitor web portal 360. An example of applicationpod list display 361 is shown in the screen shot ofFIG. 3 , and shows a listing of all application pods offered through the mobile service provider, along with various data fields in the row corresponding to each application pod. Each of these various data fields is discussed in more detail below. - From application
pod list display 361, a user can click on one of the listed application pods to bring up a selectedpod monitor view 380. An example of selectedpod monitor view 380 also shown in the middle of the screen shot ofFIG. 3 , for application pod “Hottie or NOT.” As can be seen, a selectedpod monitor view 380 can include a mobile marketing exposure control bar that can be configured to allow the mobile service provider to control how often the specific application pod is advertised to the users of the mobile service provider when users are accessinguser area 304 ofcommunity 202. Selectedpod monitor view 380 also includes a “Read Comments” button, a “View Pricing” button, and a “Suspend Mobile Pod” button, each of which is described further below. - Returning to
FIG. 2 , each of the various data field functions 381 to 388 are shown. In certain embodiments, a display of the data field function pops-up when the mouse is pointed over that field function in the row of the corresponding application pod, e.g., in the list display ofFIG. 3 . “Total Users”function 381 can allow the mobile service provider to see the total number of users that have currently purchased (opted into) the selected application pod. An example of a display of the “Total Users” is shown in the screen shot ofFIG. 4 . “Opt-ins”function 382 can allow the mobile service provider to see the number of users that have opted into (purchased) the selected application pod during the current month. An example of a display of the “Opt-ins” is shown in the screen shot ofFIG. 5 . “Opt-outs”function 383 can allow the mobile service provider to see the number of users that have opted out of (canceled) the selected application pod during the current month. An example of a display of the “Opt-outs” is shown in the screen shot ofFIG. 6 . - In certain embodiments, the user does not necessarily opt-in/opt-out as those terms may normally be defined. Rather, the terms opt-in/opt-out can be used more generically to refer to the simple activation/de-activation of a pod, regardless of the actual mechanism for activating/de-activating.
- “Revenue Last Month”
function 384 can allow the mobile service provider to see the total amount of revenue billed by the selected application pod through the mobile service provider for the last (previous) month. An example of a display of the “Revenue Last Month” is shown in the screen shot ofFIG. 7 . “Revenue This Month”function 385 can allow the mobile service provider to see the total amount of revenue billed by the selected application pod through the mobile service provider for this (current) month. An example of a display of the “Revenue This Month” is shown in the screen shot ofFIG. 8 . “User Rating”function 386 can allow the mobile service provider to see the composite user rating based on rating input from the users in the community that use the selected application pod, and is shown in the form of one-to-five stars, as indicated for each application pod in the screen shot ofFIG. 3 . - “Complaints”
function 387 can allow the mobile service provider to see the total number of complaints related to the selected application pod as provided by users in the community that use the selected application pod, as indicated for each application pod in the screen shot ofFIG. 3 . For example,FIG. 15 of the '921 application is a flow chart illustrating an example method for instituting a complaint department withinmobile community 202. In exemplary embodiments, the mobile service provider can also read the subject complaints for a selected application pod. Lastly, “Status”function 388 can allow the mobile service provider to track and monitor the performance of the selected application pod, and to control access and purchase of the selected application pod based on criteria selected by the mobile service provider for the selected application pod. The current status of the selected application pod is shown in the row corresponding to the application pod, as seen inFIG. 3 , and the status is depicted by a colored button, such as green for “good,” yellow for “warning,” and red for “suspension”. In this way, the mobile service provider can easily see if there is a problem with a specific application pod or if the application pod needs to be suspended so that users of mobile service provider can no longer access or purchase the application pod. - The colored status indicators of “Status”
function 388 are based on the number of complaints from users of the selected application pod, in comparison, e.g., to a selected sensitivity (threshold) criteria set by the mobile service provider. In this regard, an example of a display of the “threshold” setting of the “Status” function is shown in the “threshold” pop-up box in the right side of the screen shot ofFIG. 11 . As seen inFIG. 11 , the buttons are provided for “Automatic Suspension” or “Manual Suspension”, which the mobile service provider can select depending on whether it is desired forcontent monitor 350 to automatically suspend an application pod that has a number of complaints exceeding a set threshold, or whether content monitor 350 is simply to warn the mobile service provider that the threshold has been exceed by turning the status indicator to red, and then the mobile service provider must manually suspend the application pod, as described below. - Also provided in the “threshold” pop-up box shown in
FIG. 11 is a “threshold” setting bar which allows the mobile service provider to set the level of user complaints (based on percentage of users that purchased the application pod) required as a threshold for the status indicator to turn from green (good standing) to yellow (warning), and from yellow (warning) to red (suspend). In this manner, the mobile service provider can decide how strictly they want to control the quality of application pods that are offered to users through the mobile service provider. - Also provided in the “threshold” pop-up box is an average “threshold” bar which displays the average threshold levels set for all mobile service providers in a given region, such as the United States. This allows a specific mobile service provider to see how all other mobile service providers are controlling access to, and purchase of, a specific application pod. Based on the aforementioned thresholds and button settings set by the mobile service provider in the “threshold” pop-up box, the status indicator is shown in application
pod list display 361 is set to the appropriate color according to the number of complaints received incommunity 202 from users of the selected application pod. If the threshold for suspension is crossed based on the number of complaints, the status indicator is set to “red”, and the application pod is automatically suspended from access and use bycontent monitor 350 if “automatic suspension” button has been set by the mobile service provider. Otherwise, the mobile service provider must notice the red status indicator and then manually suspend the application pod. Either way, when an application pod is suspended, content monitor 350 coordinates with globalmobile platform 306 anduser area 304 to prevent the suspended application pod from being accessed and purchased by users of the mobile service provider (carrier). - It should be noted that the threshold should be based on reasonable percentage as oppose to say an overall number of complaints. Clearly a pod that generates millions of messages will often also generate more complaints than say a pod that generates a few thousand messages; however, the percentage may be much lower. For example, a pod that generates one million messages may generate 10,000 complaints. But this means that a complaint is generated only 1% of the time. If the pod only generates one hundred thousand messages, then the same 10,000 complaints would represent a 10% complaint rate. Clearly the second example is more of a problem than the first. Therefore, thresholds based on a percentage or rate of complaints can be more useful than thresholds based on volume of complaints. In certain embodiments, however, the raw number of complaints can be used either alone or in combination with a rate analysis.
- In other embodiments, the number of opt-outs, or de-activations can also be used to determine whether to suspend a certain pod with respect to a certain carrier and/or, as explained below, a certain aggregator. For example, in certain embodiments, a opt-out/de-activation threshold can be set that when crossed causes content monitor 350 to automatically suspend the pod for the specific carrier. Further, the status indication can also be generated based on the number of opt-outs/de-activations. If automatic suspension is not enabled, then the status indicator can alert the carrier to the situation so that the carrier can make a determination regarding manual suspension based on the rate of opt-outs/de-activations. In other embodiments, the status indicator and/or automatic suspension can be based on a combination of complaints and opt-outs.de-activations.
- Returning to
FIGS. 2 and 3 , the “Read Comments”button function 391 of selectedpod monitor view 380 can allow the mobile service provider (carrier) to view all comments entered by users of the selected application pod, as shown inFIG. 9 . Similarly, the “View Pricing”function 392 of selectedpod monitor view 380 can allow the mobile service provider (carrier) to view the pricing model of the selected application pod, along with information of the third party that operated the selected application pod. This allows the mobile service provider to ensure that the pricing model and information is in the correct format as presented to users, and to ensure that it is fair and clear, as shown inFIG. 10 . Lastly, the “Suspend Mobile Pod”function 393 of selectedpod monitor view 380 can allow the mobile service provider (carrier) to suspend an application pod from use for any reason, such as when the status indicator is red in the status display of the selected application pod in the applicationpod list display 361.FIG. 12 shows an example of a “Suspend Mobile Pod” pop-up display that can be displayed upon operation of the “Suspend Mobile Pod” button of selectedpod monitor view 380. As seen inFIG. 12 , the mobile service provider can elect to suspend the application pod from service through the mobile service provider for a specific amount of time, such as one day, one week, or one month, or indefinitely. - Thus, as described above, a mobile carrier can control the content provided to its customers through
mobile platform 202 in a manner that cuts down on complaints and increases customer satisfaction; however, as will be understood there is often a middle man involved when it comes to providing content to mobile users. These middlemen are often referred to as “Aggregators.” For example, it is well understood that short codes associated with SMS messaging are actually managed by an Aggregator. When a mobile user sends a message using a short code, the message, and any reply, are routed through the Aggregator's system. The Aggregator is then in charge of collecting all fees associated with the message and forwarding the respective shares, e.g., to the associated carrier and the service/content provider associated with the short code. The Aggregator also makes a small transaction fee for handling each message. Other intermediaries, such as transaction processors, e.g., Paypal or a bank, can also perform some or all of the functions of an aggregator as described herein. - This type of arrangement is illustrated in
FIG. 18 . As can be seen,mobile platform 202 is interfaced with a plurality of mobile carriers, 204-208 throughaggregators mobile platform 202 via more or less aggregators and that number of carriers and aggregators illustrated inFIG. 18 is by way of example only and not intended to limit the embodiments described herein to specific numbers of carriers or aggregators. Further, it will be understood that some ofaggregators carriers carriers mobile platform 202 may have contracts with each ofaggregators carriers aggregators mobile users mobile platform 202. -
Aggregators carriers aggregators content monitor 350 and accessed viacontent monitor portal 360. - The aggregator can then access the functions of
FIG. 2 and illustrated in the screen shots ofFIGS. 3-12 ; however, the information displayed will be with respect to the aggregator and not the carrier. Further, the thresholds ofFIG. 11 can be provided per carrier per aggregator. In other words, an aggregator can select a higher threshold for one carrier versus another. When a carrier specific threshold for a certain aggregator is exceeded, thenmobile platform 202 will not send any messages intended for a mobile user associated with the carrier originating from the offending pod through the particular aggregator. Butmobile platform 202 may continue to send messages from the offending pod to user's associated with the specific carrier through another aggregator if the associated threshold for that aggregator has not been exceeded. - In other words,
aggregators carrier aggregators carrier 204, then messages for users ofcarrier 204 can be routed through bothaggregators aggregator 1802, themobile platform 202 can automatically stop sending messages associated with the pod to users ofcarrier 204 throughaggregator 1802; however,mobile platform 202 may still send messages associated with the pod to user's ofcarrier 204 throughaggregator 1804, provided the threshold set byaggregator 1804 is not also exceeded. - It should be noted that the systems and methods described above and in related applications such as the '921 application should help ensure greater customer satisfaction, because for example the systems and methods ensure that the user is not billed unless they opt in and the user is billed the amount agreed upon. But in the event a particular pod still generates complaints, the aggregator, or carrier can simply shut down access to that pod. Thus, the carriers do not need to expend the resources required to deal with such situations, and the aggregators can preserve their relationships with the various carriers by eliminating a problem before it reaches a level where the carriers will start paying attention.
- Another problem for aggregators is that content providers are constantly jumping from one aggregator to another, e.g., in an attempt to get better pricing. As a result, the aggregator's margins are constantly being squeezed. Accordingly, in certain embodiments, content providers can sign up and register pods to be made available by
mobile platform 202 via anaggregator aggregators mobile platform 202. - For example, an aggregator can develop a marketing page that includes a link to
mobile platform 202. When a content provider access the marketing page and clicks on the link, they will be interfaced withplatform 202 where they can register their pod, e.g., in accordance with the process described in relation toFIG. 14 . The content providers pod will then be made available as illustrated inFIGS. 16 and 17 . In certain embodiments, all messages associated with that pod can then be routed through the aggregator through which the content provider accessedplatform 202. In this manner, the aggregator can drive more messages, and therefore more revenue, through the aggregator's system. - In other embodiments, the aggregator can be paid an additional fee, e.g., 5% of the revenue assigned to
mobile platform 202 and/or the content provider. In other embodiments, messages associated with the pod are not necessarily routed through the associated content provider, but the revenue share fee, e.g., 5%, can apply regardless of what aggregator the message is sent through. Thus for example, if messages are sent within a geographic area serviced by the aggregator, then the messages can be routed through the aggregator. But the messages can be routed through other aggregators in other geographic regions, thereby driving additional revenue for all parties involved. - In other words, in the embodiment of
FIG. 18 , eachaggregator aggregator - Moreover, in certain embodiments, the pod can be permanently associated with the originating aggregator for the purpose of fee splitting/revenue sharing as described above. For example, even if the content provider of the pod jumps to another aggregator, which as explained above is very common, then the originating aggregator can still receive a share of the fees generated by that pod.
- It should be noted that the systems and methods describe above are generally related to wireless network carriers and associated aggregators; however, as is mentioned above,
mobile platform 202 can be configured to provide message and billing capabilities through a variety of systems and intermediaries, including non-mobile systems and intermediaries. Accordingly, the operators of these systems and/or intermediaries can have similar concerns about network-enabled applications that generate a lot of complaints and/or de-activation requests. Thus, the ability to suspend a network-based application as described above can also be made available to these non-mobile entities. Further, the non-mobile intermediaries can have the ability to sign up content providers and share in revenue generated by messages associated with the content provider's application in a manner similar to that described for mobile intermediaries. - While certain embodiments of the inventions have been described above, it will be understood that the embodiments described are by way of example only. Accordingly, the inventions should not be limited based on the described embodiments. Rather, the scope of the inventions described herein should only be limited in light of the claims that follow when taken in conjunction with the above description and accompanying drawings.
Claims (45)
1. A method for providing a plurality of network-enabled application to a plurality of users via a plurality of communication channels with a respective plurality of wireless network carriers, the method comprising:
a request receipt step of receiving, at the platform, a request from one of the plurality of wireless network carriers for a list of network-enabled applications being provided to users associated with the requesting wireless network carrier;
a listing step of providing, at the platform, the list to the requesting wireless network carrier, the list including the name, user information, revenue information, and status of each network-enabled application being provided via the requesting wireless network carrier;
a complaint receipt step of receiving, at the platform, complaints associated with the plurality of network-enabled applications from the plurality of users; and
a status update step of updating, at the platform, status information for each of the plurality of network-based application based on the complaints received in the complaint receipt step.
2. The method of claim 1 , further comprising a threshold evaluation step of comparing, at the platform, the number of complaints received for each of the plurality of network-enabled applications with a pre-determined complaint threshold, and wherein the status is updated based on the comparison.
3. The method of claim 2 , further comprising a threshold receipt step of receiving, at the platform, complaint threshold information from the plurality of wireless network carriers.
4. The method of claim 2 , further comprising a disabling step of disabling, at the platform, a network-enabled application for one of the plurality of wireless network carriers when the complaint threshold for the wireless network carrier is exceeded for the network-enabled application.
5. The method of claim 1 , wherein user information includes the total number of users for each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
6. The method of claim 1 , wherein user information includes the number of activations in the current month for each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
7. The method of claim 1 , wherein user information includes the number of de-activations for each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
8. The method of claim 1 , wherein user information includes user ratings for each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
9. The method of claim 1 , wherein revenue information includes the total revenue generated for the requesting wireless network carrier by each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
10. The method of claim 1 , wherein revenue information includes the revenue generated in the current month for the requesting wireless network carrier by each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
11. The method of claim 1 , wherein revenue information includes the total revenue generated in the previous month for the requesting wireless network carrier by each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
12. The method of claim 1 , further comprising for each of the plurality of network-enabled applications:
a registration data receipt step of receiving, at the platform, a set of registration data corresponding to the network-enabled application from a third-party provider, the set of registration data including a link to an application location for accessing the network-enabled application;
a pricing structure data receipt step of receiving, at the platform, a set of pricing structure data corresponding to the network-enabled application from the third-party provider;
a database update step of updating a system database in the platform to include the set of registration data corresponding to the network-enabled application and to include the pricing structure data corresponding to the network-enabled application; and
an enablement step of enabling the network-enabled application to be accessible to the plurality of users via a networked interface operated by the platform.
13. The method of claim 1 , wherein the plurality of wireless network carriers included a plurality of wireless network carriers and a plurality of intermediaries.
14. A method for providing a plurality of network-enabled application to a plurality of users via a plurality of communication channels with a respective plurality of wireless network carriers, the method comprising:
a request receipt step of receiving, at the platform, a request from one of the plurality of wireless network carriers for a list of network-enabled applications being provided to users associated with the requesting wireless network carrier;
a listing step of providing, at the platform, the list to the requesting wireless network carrier, the list including the name, user information, revenue information, and status of each network-enabled application being provided via the requesting wireless network carrier;
a de-activation request receipt step of receiving, at the platform, a requests to de-activate at least some of the plurality of network-enabled applications from the plurality of users; and
a status update step of updating, at the platform, status information for each of the plurality of network-based application based on the de-activation requests received in the de-activation request receipt step.
15. The method of claim 14 , further comprising a threshold evaluation step of comparing, at the platform, the number of de-activation requests received for each of the plurality of network-enabled applications with a pre-determined de-activation request threshold, and wherein the status is updated based on the comparison.
16. The method of claim 15 , further comprising a threshold receipt step of receiving, at the platform, de-activation request threshold information from the plurality of wireless network carriers.
17. The method of claim 15 , further comprising a disabling step of disabling, at the platform, a network-enabled application for one of the plurality of wireless network carriers when the de-activation request threshold for the wireless network carrier is exceeded for the network-enabled application.
18. The method of claim 14 , wherein user information includes the total number of users for each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
19. The method of claim 14 , wherein user information includes the number of activations in the current month for each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
20. The method of claim 14 , wherein user information includes a number of complaints received for each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
21. The method of claim 14 , wherein user information includes user ratings for each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
22. The method of claim 14 , wherein revenue information includes the total revenue generated for the requesting wireless network carrier by each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
23. The method of claim 14 , wherein revenue information includes the revenue generated in the current month for the requesting wireless network carrier by each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
24. The method of claim 14 , wherein revenue information includes the total revenue generated in the previous month for the requesting wireless network carrier by each of the plurality of network-enabled applications being provided via the requesting wireless network carrier.
25. The method of claim 14 , further comprising for each of the plurality of network-enabled applications:
a registration data receipt step of receiving, at the platform, a set of registration data corresponding to the network-enabled application from a third-party provider, the set of registration data including a link to an application location for accessing the network-enabled application;
a pricing structure data receipt step of receiving, at the platform, a set of pricing structure data corresponding to the network-enabled application from the third-party provider;
a database update step of updating a system database in the platform to include the set of registration data corresponding to the network-enabled application and to include the pricing structure data corresponding to the network-enabled application; and
an enablement step of enabling the network-enabled application to be accessible to the plurality of users via a networked interface operated by the platform.
26. The method of claim 14 , wherein the plurality of wireless network carriers included a plurality of wireless network carriers and a plurality of intermediaries.
27. A method for integrating a network-enabled application with a platform having a plurality of users and a plurality of communication channels with a respective plurality of wireless network carriers, the plurality of communication channels including an intermediary system operated by an intermediary, the method comprising:
a request receipt step of receiving, at the platform, a request from a third-party provider to integrate a network-enabled application with the platform;
a registration data receipt step of receiving, at the platform, a set of registration data corresponding to the network-enabled application from the third-party provider, the set of registration data including a link to an application location for accessing the network-enabled application, wherein the set of registration data is received from the third-party provider through a registration webpage operated by the intermediary;
a pricing structure data receipt step of receiving, at the platform, a set of pricing structure data corresponding to the network-enabled application from the third-party provider;
a database update step of updating a system database in the platform to include the set of registration data corresponding to the network-enabled application and to include the pricing structure data corresponding to the network-enabled application; and
an enablement step of enabling the network-enabled application to be accessible to the plurality of users via a networked interface operated by the platform.
28. The method of claim 27 , wherein the set of registration data includes an application identifier corresponding to the network-enabled application, and a provider identifier corresponding to the third-party.
29. The method of claim 27 , wherein, in the pricing structure data receipt step, the pricing structure data is received from the third-party provider through a pricing structure webpage operated by the intermediary.
30. The method of claim 27 , wherein the platform includes an application interface platform and wherein, in the enablement step, the network-enabled application is integrated with the platform via the application interface platform.
31. The method of claim 27 , wherein the platform includes a message management system for sending messages to the plurality of users via the intermediary system and the plurality of communication channels with the respective plurality of wireless network carriers and wherein, in the enablement step, a message communication channel is established between the network-enabled application and the message management system.
32. The method of claim 27 , wherein the registration data received in the registration data receipt step includes an intermediary identification associated with the intermediary.
33. A method for providing a plurality of network-enabled application to a plurality of users via a plurality of communication channels with a respective plurality of message systems, the method comprising:
a request receipt step of receiving, at the platform, a request from one of the plurality of message systems for a list of network-enabled applications being provided to users associated with the requesting message system;
a listing step of providing, at the platform, the list to the requesting message system, the list including the name, user information, revenue information, and status of each network-enabled application being provided via the requesting message system;
a complaint receipt step of receiving, at the platform, complaints associated with the plurality of network-enabled applications from the plurality of users; and
a status update step of updating, at the platform, status information for each of the plurality of network-based application based on the complaints received in the complaint receipt step.
34. The method of claim 33 , further comprising a threshold evaluation step of comparing, at the platform, the number of complaints received for each of the plurality of network-enabled applications with a pre-determined complaint threshold, and wherein the status is updated based on the comparison.
35. The method of claim 34 , further comprising a threshold receipt step of receiving, at the platform, complaint threshold information from the plurality of message systems.
36. The method of claim 34 , further comprising a disabling step of disabling, at the platform, a network-enabled application for one of the plurality of message systems when the complaint threshold for the message system is exceeded for the network-enabled application.
37. The method of claim 33 , wherein user information includes the total number of users for each of the plurality of network-enabled applications being provided via the requesting message system.
38. The method of claim 33 , wherein user information includes the number of activations in the current month for each of the plurality of network-enabled applications being provided via the requesting message system.
39. The method of claim 33 , wherein user information includes the number of de-activations for each of the plurality of network-enabled applications being provided via the requesting message system.
40. The method of claim 33 , wherein user information includes user ratings for each of the plurality of network-enabled applications being provided via the requesting message system.
41. The method of claim 33 , wherein revenue information includes the total revenue generated for the requesting message system by each of the plurality of network-enabled applications being provided via the requesting message system.
42. The method of claim 33 , wherein revenue information includes the revenue generated in the current month for the requesting message system by each of the plurality of network-enabled applications being provided via the requesting message system.
43. The method of claim 33 , wherein revenue information includes the total revenue generated in the previous month for the requesting message system by each of the plurality of network-enabled applications being provided via the requesting message system.
44. The method of claim 33 , further comprising for each of the plurality of network-enabled applications:
a registration data receipt step of receiving, at the platform, a set of registration data corresponding to the network-enabled application from a third-party provider, the set of registration data including a link to an application location for accessing the network-enabled application;
a pricing structure data receipt step of receiving, at the platform, a set of pricing structure data corresponding to the network-enabled application from the third-party provider;
a database update step of updating a system database in the platform to include the set of registration data corresponding to the network-enabled application and to include the pricing structure data corresponding to the network-enabled application; and
an enablement step of enabling the network-enabled application to be accessible to the plurality of users via a networked interface operated by the platform.
45. The method of claim 33 , wherein the plurality of message systems included a plurality of message systems and a plurality of intermediaries.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/696,636 US20080057923A1 (en) | 2006-04-04 | 2007-04-04 | Systems and methods for managing content provided through a mobile carrier |
US13/631,262 US8718616B2 (en) | 2006-04-04 | 2012-09-28 | Systems and methods for managing content provided through a mobile carrier |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US78938806P | 2006-04-04 | 2006-04-04 | |
US11/696,636 US20080057923A1 (en) | 2006-04-04 | 2007-04-04 | Systems and methods for managing content provided through a mobile carrier |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/631,262 Continuation US8718616B2 (en) | 2006-04-04 | 2012-09-28 | Systems and methods for managing content provided through a mobile carrier |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080057923A1 true US20080057923A1 (en) | 2008-03-06 |
Family
ID=39152341
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/696,636 Abandoned US20080057923A1 (en) | 2006-04-04 | 2007-04-04 | Systems and methods for managing content provided through a mobile carrier |
US13/631,262 Active US8718616B2 (en) | 2006-04-04 | 2012-09-28 | Systems and methods for managing content provided through a mobile carrier |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/631,262 Active US8718616B2 (en) | 2006-04-04 | 2012-09-28 | Systems and methods for managing content provided through a mobile carrier |
Country Status (1)
Country | Link |
---|---|
US (2) | US20080057923A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090177567A1 (en) * | 2008-01-09 | 2009-07-09 | Mckerlich Ian | Mobile application monitoring system |
US20130102276A1 (en) * | 2011-10-21 | 2013-04-25 | Microsoft Corporation | Split billing for a mobile device |
US20140086103A1 (en) * | 2012-09-26 | 2014-03-27 | Muthaiah Venkatachalam | Techniques for Fractional Wireless Broadband Usage |
US20140195458A1 (en) * | 2013-01-10 | 2014-07-10 | Pegmap, LLC. | Methods, systems, and computer program products for compiling experience ratings for service providers |
US20170331690A1 (en) * | 2016-05-12 | 2017-11-16 | Iboss, Inc. | Applying network policies to devices based on their current access network |
US20220345462A1 (en) * | 2019-04-10 | 2022-10-27 | Ca, Inc. | Secure access to a corporate web application with translation between an internal address and an external address |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102006016994A1 (en) * | 2006-04-11 | 2007-10-18 | Giesecke & Devrient Gmbh | Recording the resource consumption |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030139174A1 (en) * | 2001-12-13 | 2003-07-24 | Far Eastone Telecommunications Co., Ltd. | Common service platform and software |
US20040068431A1 (en) * | 2002-10-07 | 2004-04-08 | Gartner, Inc. | Methods and systems for evaluation of business performance |
US6891953B1 (en) * | 2000-06-27 | 2005-05-10 | Microsoft Corporation | Method and system for binding enhanced software features to a persona |
US20050210102A1 (en) * | 2004-03-16 | 2005-09-22 | Johnson Aaron Q | System and method for enabling identification of network users having similar interests and facilitating communication between them |
US20050289047A1 (en) * | 2004-06-28 | 2005-12-29 | Oliver Mitchell B | Virtual marketplace for wireless device applications and services with integrated multi-party settlement |
US20060212537A1 (en) * | 2005-03-16 | 2006-09-21 | Sun Microsystems, Inc. | Card device for loading applications to a mobile device |
US20070038567A1 (en) * | 2005-08-12 | 2007-02-15 | Jeremy Allaire | Distribution of content |
US20070185867A1 (en) * | 2006-02-03 | 2007-08-09 | Matteo Maga | Statistical modeling methods for determining customer distribution by churn probability within a customer population |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6413213B1 (en) * | 2000-04-18 | 2002-07-02 | Roche Diagnostics Corporation | Subscription based monitoring system and method |
US8554794B2 (en) * | 2004-05-17 | 2013-10-08 | Hoover's Inc. | System and method for enforcing privacy in social networks |
-
2007
- 2007-04-04 US US11/696,636 patent/US20080057923A1/en not_active Abandoned
-
2012
- 2012-09-28 US US13/631,262 patent/US8718616B2/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6891953B1 (en) * | 2000-06-27 | 2005-05-10 | Microsoft Corporation | Method and system for binding enhanced software features to a persona |
US20030139174A1 (en) * | 2001-12-13 | 2003-07-24 | Far Eastone Telecommunications Co., Ltd. | Common service platform and software |
US20040068431A1 (en) * | 2002-10-07 | 2004-04-08 | Gartner, Inc. | Methods and systems for evaluation of business performance |
US20050210102A1 (en) * | 2004-03-16 | 2005-09-22 | Johnson Aaron Q | System and method for enabling identification of network users having similar interests and facilitating communication between them |
US20050289047A1 (en) * | 2004-06-28 | 2005-12-29 | Oliver Mitchell B | Virtual marketplace for wireless device applications and services with integrated multi-party settlement |
US20060212537A1 (en) * | 2005-03-16 | 2006-09-21 | Sun Microsystems, Inc. | Card device for loading applications to a mobile device |
US20070038567A1 (en) * | 2005-08-12 | 2007-02-15 | Jeremy Allaire | Distribution of content |
US20070185867A1 (en) * | 2006-02-03 | 2007-08-09 | Matteo Maga | Statistical modeling methods for determining customer distribution by churn probability within a customer population |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090177567A1 (en) * | 2008-01-09 | 2009-07-09 | Mckerlich Ian | Mobile application monitoring system |
US9402000B2 (en) | 2011-10-21 | 2016-07-26 | Microsoft Technology Licensing, Llc | Metering traffic for a mobile device |
US20130102276A1 (en) * | 2011-10-21 | 2013-04-25 | Microsoft Corporation | Split billing for a mobile device |
US8965330B2 (en) * | 2011-10-21 | 2015-02-24 | Microsoft Corporation | Split billing for a mobile device |
US20140086103A1 (en) * | 2012-09-26 | 2014-03-27 | Muthaiah Venkatachalam | Techniques for Fractional Wireless Broadband Usage |
US9397899B2 (en) * | 2012-09-26 | 2016-07-19 | Intel Corporation | Techniques for fractional wireless broadband usage |
US20140195458A1 (en) * | 2013-01-10 | 2014-07-10 | Pegmap, LLC. | Methods, systems, and computer program products for compiling experience ratings for service providers |
US20170331690A1 (en) * | 2016-05-12 | 2017-11-16 | Iboss, Inc. | Applying network policies to devices based on their current access network |
WO2017197349A1 (en) * | 2016-05-12 | 2017-11-16 | Iboss, Inc. | Applying network policies to devices based on their current access network |
US20200084108A1 (en) * | 2016-05-12 | 2020-03-12 | Iboss, Inc. | Applying network policies to devices based on their current access network |
US11374818B2 (en) * | 2016-05-12 | 2022-06-28 | Iboss, Inc. | Applying network policies to devices based on their current access network |
US11595262B2 (en) | 2016-05-12 | 2023-02-28 | Iboss, Inc. | Applying network policies to devices based on their current access network |
US11936528B2 (en) | 2016-05-12 | 2024-03-19 | Iboss, Inc. | Applying network policies to devices based on their current access network |
US20220345462A1 (en) * | 2019-04-10 | 2022-10-27 | Ca, Inc. | Secure access to a corporate web application with translation between an internal address and an external address |
US11665171B2 (en) * | 2019-04-10 | 2023-05-30 | Ca, Inc. | Secure access to a corporate web application with translation between an internal address and an external address |
Also Published As
Publication number | Publication date |
---|---|
US8718616B2 (en) | 2014-05-06 |
US20130023251A1 (en) | 2013-01-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8718616B2 (en) | Systems and methods for managing content provided through a mobile carrier | |
US10469434B2 (en) | Managing data on computer and telecommunications networks | |
US7826822B2 (en) | Automated billing and distribution platform for application providers | |
JP6023802B2 (en) | Core service platform for wireless voice, data and messaging network services | |
US10133450B2 (en) | System and method for task specific, metered bandwidth control within shared client environment on mobile communications platforms | |
US7860484B2 (en) | Automated billing and distribution platform for application providers | |
US7848736B2 (en) | Package billing for micro-transactions | |
US20200382651A1 (en) | Platform for enabling sponsors to sponsor functions of a computing device | |
US9641345B2 (en) | Integrated communication system and method | |
US8554626B2 (en) | Mobile advertisement and marketing integration with business process and workflow systems | |
US20080040733A1 (en) | Application pod integration with automated mobile phone billing and distribution platform | |
US20080015927A1 (en) | System for Enabling Secure Private Exchange of Data and Communication Between Anonymous Network Participants and Third Parties and a Method Thereof | |
US20130130645A1 (en) | Systems and methods for automatic generation, registration and mobile phone billing of a pod using third party web page content | |
US10313532B2 (en) | Platform for enabling users to sign up for sponsored functions on computing devices | |
WO2007084593A2 (en) | Package billing for micro-transactions | |
KR20170107712A (en) | Server, system, method, recording medium and application for charging communication fee in association with purchase | |
KR20030074957A (en) | System and Method for managing community using billing system on wired, wireless network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SMS.AC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:POUSTI, MICHAEL;REEL/FRAME:020144/0917 Effective date: 20070712 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |