Browse Prior Art Database

A System and Mmethod of Transferring Mobile Data Plan as Data Blocks

IP.com Disclosure Number: IPCOM000239653D
Publication Date: 2014-Nov-21
Document File: 3 page(s) / 63K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a system that employs several methods to allow a user who anticipates underutilization of a limited data plan to gift or transfer some or all of the unused data allotment to another user. One method makes use of a third party broker; another method calculates a potential optimal dollar value of the transfer in relation to the receiving party's cost avoidance gains.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 3

A System and Mmethod of Transferring Mobile Data Plan as Data Blocks

Every month, millions of people with mobile devices do not exceed data plan limits, while millions more exceed data plan limits and incur significant overage charges from the carriers. Some users avoid overage charges by closely and vigilantly monitoring usage. Some use applications (apps) or operating system (OS) functions to assist with this process; however, millions of consumers do not employ any of these practices or have the skills or discipline to do so.

An opportunity exists for users who consistently pay for more data than is actually used to "lend" or "transfer" those unused minutes to friends and family to use and avoid high overage costs. No such system exists.

It is known in the art to perform proximity sharing and pooling of data. This can be done via hotspots technology or other methods. In this case, a peer-to-peer connection is established and the users (i.e. provider/consumer) arbitrate a fee for the service. In addition, the concept of a limited data usage is known in the art. For example, in some countries a user can contract with a person to use an access point for T amount of time or D amount of Data.

The novel contribution is a system to allow a user who anticipates underutilization of a limited data plan to gift or transfer some or all of the unused data allotment to another user. One method makes use of a third party broker. Another method calculates a potential optimal dollar value of the transfer in relation to the receiving party's cost avoidance gains.

In the third-party broker method, the sender must make all transfer requests through the associated network carrier. Each request includes the constraint parameters. The carrier then deficits the sender's account and credits the receiver's data plan account. In some cases, the carrier may charge a fee either in dollars or in bytes in order to broker the exchange. In this case, all three parties potentially benefit.

Third-Party Broker Method Steps:

1. Sender installs app 2. Sender enters constraint parameters including data block size and the receiver's identity 3. Constraint parameters get sent to the carrier 4. Carrier checks if transfer request meets eligibility requirements A. Is this transfer intra- or inter- carrier?

B. Does the destination market to where the data all...