Providing configurable pricing for use of invocable services by applications

ABSTRACT

Techniques are described for facilitating use of invocable services by applications in a configurable manner. In at least some situations, the invocable services are Web services or other network-accessible services that are made available by providers of the services for use by others in exchange for fees defined by the service providers. The described techniques facilitate use of such invocable services by applications in a manner configured by the developers of the applications, including to allow the application developers to configure pricing terms that will be used to determine fees that end users of the applications will be charged for use of the invocable services via the applications. In some situations, the configured pricing terms for a service specify fees for end users that differ in one or more ways from the defined fees charged by the provider of that service.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is related to U.S. patent application Ser. No. 11/618,480, filed concurrently on Dec. 29, 2006 and entitled “Using Configured Application Pricing To Determine End User Fees For Use Of Invocable Services,” and to U.S. patent application Ser. No. 11/618,486, filed concurrently on Dec. 29, 2006 and entitled “Providing Configurable Use By Applications Of Sequences Of Invocable Services,” each of which is hereby incorporated by reference in its entirety.

TECHNICAL FIELD

The following disclosure relates generally to facilitating use of invocable services by applications in a configurable manner, such as to enable applications to charge end users configured fees for use of third-party invocable services.

BACKGROUND

Various mechanisms exist to allow computers and executing software applications to interact. For example, remote procedure call (“RPC”) protocols have long existed that allow a program on one computer to cause a program on another computer to be executed. In a similar manner, various object-oriented architectures such as CORBA (“Common Object Request Broker Architecture”) and DCOM (“Distributed Component Object Model”) provide remote execution capabilities. In addition, various middleware programs have been implemented to connect separate applications (often of distinct types and from unrelated sources) to allow communication. For example, various EDI (“Electronic Data Interchange”) networks exist that provide standard mechanisms to allow a computer system of one user of the network to send data to a computer system of another user of the network.

The widespread popularity of the World Wide Web (“Web”) has provided additional opportunities for computers to inter-communicate. For example, much current Web use involves users interactively requesting Web pages from Web servers (e.g., via Web browser applications executing on user computers) and receiving the requested information in response. In addition, there is also growing use of the Web to support the programmatic interaction of remote applications to exchange information via defined APIs (“application program interfaces”), such as via Web services. Web services allow heterogeneous applications and computers to interact, and can be defined and implemented using a variety of underlying protocols and techniques. For example, some Web service implementations return data in XML (“eXtensible Markup Language”) format using HTTP (“HyperText Transport Protocol”) in response to a Web service invocation request specified as a URI (“Uniform Resource Identifier”), such as a URL (“Uniform Resource Locator”) that includes a specified operation and one or more query parameters. In other implementations, additional underlying protocols are used for various purposes, such as SOAP (“Simple Object Access Protocol”) for standard message exchange, WSDL (“Web Services Description Language”) for description of service invocations, and UDDI (“Universal Description, Discovery, and Integration service”) for discovery of available services.

Although Web services and other mechanisms allow various applications and computers to interact, various problems exist with the use of such interaction mechanisms. For example, if a developer of an application would like to incorporate the use of fee-based Web services that are available from third parties in the application, but in a manner that end users of the application will be responsible for corresponding fees, such functionality is typically difficult and costly to implement. Such functionality may include, for example, mechanisms to collect specified payments from end users, and mechanisms to distribute payments to providers of the Web services used by the application. The functionality may also include mechanisms to allow the application developer to manage and monitor the use of third-party Web services via the application, to allow end users to monitor their own use of Web services via the application, etc. In addition, the application developer will typically be liable for the Web service usage costs to the third parties if payment is not ultimately obtained from the end users.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A-1B illustrate examples of interactions to facilitate use of invocable services by applications in a configurable manner.

FIGS. 2A-2D illustrate examples of interactions between application creators and an embodiment of a system that enables configuration of use of invocable services.

FIGS. 3A-3D illustrate examples of interactions between end users and an embodiment of a system that enables the end users to obtain access to invocable services via an application in accordance with configuration specified for the application.

FIG. 4 is a block diagram illustrating a computing system suitable for executing an example embodiment of a system for facilitating use of invocable services by applications in a configurable manner.

FIG. 5 is a flow diagram of an example embodiment of an Application Configuration routine.

FIG. 6 is a flow diagram of an example embodiment of an End User Application Subscription routine.

FIG. 7 is a flow diagram of an example embodiment of an Application Copy Initialization routine.

FIG. 8 is a flow diagram of an example embodiment of a Usage Tracking routine.

DETAILED DESCRIPTION

Techniques are described for facilitating use of invocable services by applications in a configurable manner. In at least some embodiments, the invocable services are Web services or other network-accessible services. In addition, in at least some embodiments the invocable services are fee-based services that are made available by providers of the services for use by others in exchange for fees defined by the service providers. The described techniques facilitate use of such invocable services by software applications in a manner configured by the developers of the applications. In at least some embodiments, the configuring of the software applications includes allowing the application developers to define pricing terms that will be used to determine fees that end users of the applications will be charged for use of the invocable services via the applications. In at least some embodiments, the described techniques are performed by an automated Configurable Service Usage Facility (“CSUF”) system, as described in greater detail below.

In at least some embodiments, a user associated with an application (e.g., an application developer user or other application creator user that is involved in creation of the application) may interact with an embodiment of the CSUF system to configure pricing and other information for use of selected invocable services via the application. Types of applications that may use such invocable services may include, for example, application programs designed to execute on computing devices of end users, as well as server-based applications that end users may access using remote client devices (e.g., Web applications accessed via a Web browser executing on a client device of an end user).

To perform the configuration for an application, in at least some embodiments, an application creator user selects one or more invocable services that are available via the CSUF system, and interactively configures a usage model for each selected service to correspond to use of the service via the application. A configured usage model for a service may include a variety of pricing terms and other information related to use of the service, such as a configured indicated price for a configured indicated amount of use of a configured indicated use dimension (e.g., an indicated price for each use of the service, an indicated price per amount of time of use, an indicated price per unit of processing time, an indicated price per unit of storage used, an indicated price for a predetermined number of times of use in a predetermined period of time, etc.). In addition, in some situations a selected service may be a fee-based service that has a predefined usage model that specifies fees for use of the service, such as with pricing terms specified by a provider of the service. If so, the configured usage model for the service may differ from the predefined usage model for the service in one or more ways, such as by having a differing use price, a differing amount of use, and/or a differing use dimension.

After the application creator user has configured a usage model for each of one or more selected invocable services for an application, the CSUF system in some embodiments provides the application creator user with an application key (e.g., an alphanumeric string) for use by the application in order to facilitate tracking of the use of services by the application, while in other embodiments the application creator user may instead select the application key and provide it to the CSUF system (e.g., for use in situations in which the application development is completed and the application is already configured to use a particular application key). In particular, the application key is for use when an executing copy of the application makes use of one of the selected invocable services, such as by including the application key when an executing copy of the application makes a call to invoke or request access to one of the selected invocable services. When the application key is received by the CSUF system as part of the use of a selected invocable service, the application key may be used by the CSUF system to identify the application that used the service, and to track the use by that application. When appropriate (e.g., once a month, for each service usage, etc.), the configured usage model specified for use of the service by the application may be retrieved, and appropriate pricing terms may be determined from the configured usage model in order to determine fees to be charged an end user of the application copy for the use of the service.

In addition, in some embodiments, before an end user may access selected services via an executing copy of an application, the end user first subscribes to the use of those services via the application. In particular, the end user may be directed to interact with the CSUF system to perform the subscription, which may include providing payment information for fees to be charged to the end user, as well as optionally providing other information to the CSUF system (e.g., end user contact information, an indication of assent to any specified use terms and conditions for the application and/or the selected services, etc.). The end user may be directed to interact with the CSUF system at various times and in various ways in various embodiments, including when the end user is first purchasing or otherwise acquiring the application, when the end user first attempts to use the application, when the end user first attempts to use a selected service via the application, etc. In addition, in some embodiments, the end users are charged recurring fees (e.g., monthly fees) and/or one-time fees (e.g., setup fees). The recurring and/or one-time fees may be charged in advance (e.g., at a beginning of a month for which a monthly fee corresponds) and/or periodically after use has occurred (e.g., at the end of a month for any use in excess of a standard monthly charge during that month). Accordingly, an end user subscription may in some embodiments and situations be for recurring use of an application and service(s) (e.g., a monthly subscription that is automatically renewed unless otherwise specified), while in other situations may be for other types of use (e.g., for a single use, for use for only a limited specified time, for use for only a limited number of times, etc.).

After an end user subscribes to use of the selected services for an indicated application, in at least some embodiments a user token is provided for use with a copy of the application. In some embodiments, the end user may be provided with the user token, and then use the user token to customize or configure the application copy to be used by the end user (e.g., by supplying the user token to the application copy). In other embodiments, a user token may be associated with an application copy in other manners, such as if other software stores the user token and supplies it when appropriate for use with that application copy. For example, the other software may be a proxy server operated by the application provider that receives service usage requests from the application copy, and adds the user token or other corresponding user information when forwarding the service usage requests on to their destinations. The user token may have various forms in various embodiments, such as a random alphanumeric string associated with the end user, or an alphanumeric string that includes various information about the end user (e.g., an indication of the end user name and/or unique identifier, an indication of the application key for the application with which the user token may be used, an indication of a creation time and a subsequent time-to-live value during which the end user may use the user token, etc.) and that may be encoded to protect the included information (e.g., by being encrypted, by being the result of a one-way hash, etc.). The user token (or other user information based on the user token, such as a user credential, discussed below) may be used in a manner similar to the application key, such as by including the user information as part of a call by the end user's copy of the application to invoke or request access to one of the selected invocable services. When the user token or other user information is received by the CSUF system as part of the use of a selected invocable service, the user information may be used by the CSUF system to identify the end user on whose behalf the service use occurred (and if the user tokens are specific to the applications with which they are used, to identify the application that used the service), and to track the use by that end user. When appropriate (e.g., once a month, for each service usage, etc.), the payment information specified by the end user may be retrieved and used for providing payment for use of the service via the application, such as based on the configured usage model for the application.

As one particular example of end user interaction with the CSUF system, in some embodiments an application with one or more configured usage models for selected services receives not only an application key to be used as part of the application, but also a reference to the CSUF system to be used to facilitate subscriptions by end users (e.g., an Internet URL that directs an end user to the CSUF system). When an end user requests to purchase, subscribe to or otherwise acquire access to the application (e.g., by interacting with a Web site of the application creator), the end user is directed to the CSUF system to complete the subscription process and receive a user token. The end user acquires a copy of the application (e.g., by downloading the application copy from the Web site of the application creator), and supplies the user token to the acquired application copy, such as during an initialization process of the application copy, or instead at other times (e.g., when the end user first attempts to use application functionality that is based on capabilities of one of the selected services; periodically, such as if an end user is prompted to periodically supply new user tokens obtained from the CSUF system; etc.). When the application copy receives the user token, in some embodiments it interacts with an embodiment of the CSUF system to obtain a user credential based on the user token, such as by supplying the user token and other information related to an identity of the end user and/or a computing device of the end user on which the application copy will be used (e.g., a public key certificate or identity certificate, such as an X.509 certificate based on the Internet Engineering Task Force's Public-Key Infrastructure X.509 standard). After such a user credential is obtained from the CSUF system, it is then stored with the application copy, and used along with the application key to make service invocation calls or other requests to obtain access to selected invocable services. As previously noted, in some embodiments such user credentials may have a limited time-to-live, such that the end user and/or application copy may need to periodically obtain new user certificates from the CSUF system. Furthermore, in some embodiments a user credential may include additional information, such as information about use restrictions (e.g., that service invocations based on the user credential may occur only at certain times, only at certain volumes, etc.), which may then be enforced by the CSUF system, application copy and/or selected invocable services. In addition, in some embodiments the user credential is used to associate an application copy, end user and end user's computing device together, such that access to some or all of the functionality of the application copy may be available only to the end user and only on the end user's computing device.

Thus, both an application key and a user token (or a user credential based on one or both of them) may be supplied by an application when accessing invocable services on behalf of an end user. The use of the various invocable services on behalf of an end user is then metered (e.g., by tracking use based on the application key and/or the user token or credential) by the CSUF system or by an associated system, so that the end user may be charged appropriate fees for the use according to the configured usage model specified by the application creator for the application. The revenue collected based on the end user's use of the invocable service may be subsequently split between the application creator and the one or more service providers of the invocable services, such as if the configured usage model results in fees charged to the end user that are greater than fees charged by the providers of the invocable services. In some embodiments, if payment is not obtained from the end user for the use of invocable services, the application creator does not receive corresponding payment, but in some embodiments is also removed by the CSUF system of liability for fees charged by the providers of the invocable services for that use (and that does not owe any money to the service providers for use of the invocable services via the indicated application). In other embodiments, liability may not be removed in certain situations, such as if an application creator configures a use price for a selected invocable service that is less than the use price associated with the selected invocable service (or liability may be removed for only a portion of the use price associated with the selected invocable service, such as the use price configured by the application creator), if the application creator specifies a configured use price based on a use dimension that is not used by the selected invocable service, etc. Furthermore, in some embodiments and situations, the CSUF system may provide authentication functionality, such as in response to a request from an executing copy of an application to access a particular selected service on behalf of an end user. The authentication functionality may include determining whether the application and end user are authorized to access the particular selected service, such as by retrieving information regarding any configured usage models for the application and any subscription information for the end user, and/or by using information encoded in and/or associated with a received user credential or user token.

In some embodiments, invocable services may further charge fees for their use based on multiple different use aspects (e.g., by specifying use prices with respect to multiple use dimensions). For example, an invocable storage service may charge fees based on the amount of data stored (e.g., with a first indicated price per megabyte of data) and on the number of times that storage and/or retrieval access occurs (e.g., with a second indicated price per access). Similarly, an application creator user may configure pricing terms that correspond to multiple use dimensions for an invocable service, whether based on the same multiple use dimensions as specified by the invocable service or not (e.g., by adding a use price for a second use dimension when the underlying invocable service specified a price for only a single use dimension). If an application creator user specifies one or more custom use dimensions for an invocable service that differ from the use dimensions specified by the service, the application may further in some embodiments provide information to the CSUF system during application execution to specify how much usage has occurred with respect to those custom use dimensions.

In addition, in some embodiments the CSUF system may charge various fees for the functionality that it provides. For example, the CSUF system may charge a fee to an application creator for providing capabilities to allow the application creator to specify one or more configured usage models for selected invocable services, for providing capabilities to meter usage of invocable services and obtain corresponding payment from end users, for providing capabilities to pay service providers for use of their services based on corresponding payments received from end users, etc. Furthermore, the fees charged may have various forms, such as a predetermined percentage (e.g., 10%) of the proceeds after paying service provider(s) for use of their service(s), a predetermined amount for each service (e.g., $0.50), etc., or a combination thereof. Additional details related to configuring prices and allocating fees between application creators or other application providers, service providers, and an entity providing an embodiment of the CSUF system are included with respect to a described Configurable Service Sequence Usage Facility system in U.S. patent application Ser. No. 11/618,486, filed concurrently and entitled “Providing Configurable Use By Applications Of Sequences Of Invocable Services,” which is hereby incorporated by reference in its entirety.

As previously noted, the described techniques may be used in various manners in various embodiments. For example, the CSUF system may be used with various types of applications, such as applications with a graphical user interface (e.g., desktop applications or Web applications), a command-line interface (e.g., for a system utility), or a programmatic interface. Similarly, the invocable services may be of various types, including, but not limited to, Web services, storage services, indexing services, and queuing services. In addition, some or all of the invocable services may be provided by an entity providing the CSUF system and/or by third-party service providers.

FIG. 1A illustrates an example of interactions in which application creator users configure usage models for invocable services to be used via their applications, and in which end users subsequently subscribe to use those services via those applications. In this example, the invocable services (also referred to as “component services”) are network-accessible services, such as Web services or other services that may be remotely invoked or otherwise accessed over one or more computer or transmission networks. In particular, providers of network-accessible services 105 each offer one or more component network-accessible services (not shown) as being available to third-party applications via the Configurable Service Usage Facility (“CSUF”) system 110, with each component service having predefined pricing terms (not shown) that include an indicated use price for an indicated amount of use with respect to an indicated use dimension. In some situations, some or all of the providers of the network-accessible services may be the same entity that provides the CSUF system, with the CSUF system 110 and the provider systems 105 being part of a group of systems 125 of that entity, while in other embodiments some or all of the providers of the network-accessible services may be distinct from and external to the entity that provides the CSUF system.

After the component network-accessible services are specified to the CSUF system, an application creator user 115 interacts with the CSUF system to select one or more of the component services to use in an application being created (not shown), and configures one or more usage models (not shown) for the selected services. After the usage model(s) are configured, the application creator receives an application key for use with the application, as well as one or more URLs to use to direct end users to the CSUF system to perform subscription activities regarding the application. The application key may in some embodiments be any unique identifier, such as an alphanumeric string of a predetermined length. In addition, the application creator may associate the application key with the application in various ways, such as by configuring the application to use the application key when making requests to use other selected services.

After the application creator 115 develops the application and configures the usage models, an end user 120 may decide to purchase or otherwise acquire access to the application, such as by interacting with the application creator's Web site (not shown) or in other manners (e.g., via other Internet sites, such as a Web site associated with the CSUF system). The end user 120 then interacts with the CSUF system 110 to subscribe to use of the selected services via the application, such as by providing contact and payment information. The end user then receives a user token for use with a copy of the application, which may be any unique identifier (such as an alphanumeric string of a predetermined length). After using the user token to configure a copy of the application, such as based on a corresponding user credential, the end user 120 may use the application copy to access the network-accessible services.

FIG. 1B illustrates an example of interactions between an end user, an executing application copy, one or more selected invocable services and the CSUF system as the application copy invokes the selected invocable services on behalf of the end users. In particular, in this example, an end user 120 is interacting with an executing application copy 130, such as an application created by one of the application creators 115 of FIG. 1A and provided to the end user by the one application creator or other application provider (e.g., a distributor of the application). The application copy 130 includes an application key (not shown) based on prior configuration of one or more usage models via the CSUF system 110 for the application, and has been configured based on a user token (not shown) for the end user in order to obtain a corresponding user credential, such as previously described with respect to FIG. 1A.

During execution, the application copy 130 invokes one or more network-accessible services 135 on behalf of the end user, such as network-accessible services provided by the providers 105 of FIG. 1A. When invoking a network-accessible service, the application copy provides its application key and the user credential. In this example, when network-accessible services receive invocation requests from the application copy, some or all of the network-accessible services may authenticate the requests by sending to the CSUF system the received application key and user credential, as well as an identifier associated with the network-accessible service. If so, such network-accessible services may provide their capabilities to the application copy only if the requests are authenticated by the CSUF system 110. If an invocation request of a network-accessible service is authenticated, or if such authentication is not performed, the network-accessible service may then perform a requested task and return results (not shown) to the application copy. When the application copy receives results from a network-accessible service, the results may be indicated to the end user or otherwise used by the application copy as appropriate.

Furthermore, in at least some embodiments, the network-accessible services may also interact with the CSUF system 110 to indicate the use of the network-accessible service by the application copy 130 on behalf of the end user 120 (e.g., by providing the received application key, received user credential, and service identifier), such as to enable service use metering capabilities of the CSUF system. Various information may be sent to the CSUF system by the network-accessible service, including information regarding the amount of use of the service with respect to one or more use dimensions specified in a predefined usage model for the service. In at least some embodiments, some or all of the network-accessible services may perform a single interaction with the CSUF system that enables both authentication and metering capabilities, such as before the service functionality is provided if the amount of use of the service that will occur can be determined in advance. In other embodiments, the CSUF system may provide metering capabilities by initiating communication with some or all of the network-accessible services periodically to determine prior and/or current use of the service on behalf of the end user, such as to track the amount of storage that is currently used by an end user and application copy for a storage service. In yet other embodiments, the application copy may instead interact with the CSUF system (or an associated system acting as an intermediary) to invoke some or all of the network-accessible services. In those embodiments, authenticating may happen before the network-accessible service is invoked on behalf of the end user, and results may be returned to the application copy via the CSUF system or directly to the application copy by the network-accessible services.

Authentication of an access request to an indicated network-accessible service by the application copy on behalf of the end user may be performed in various ways in various embodiments. For example, authentication may include verifying that the user credential (or user token) is currently valid, that the application key is valid, and that use restrictions (if any) that are associated with or embedded with the user credential are satisfied. The authentication functionality may further include retrieving information about the application and end user to determine whether the access to the indicated service is authorized, such as by retrieving information regarding any configured usage models for the application and any subscription information for the end user. In at least some embodiments, a user credential (or user token) may be revoked or expire for various reasons, such as the end user canceling a subscription to an application, payment not being obtained for use of a service, a predefined life of the user credential being reached (e.g., based on a specified time-to-live value), etc. In those embodiments, service invocation authentication may occur each time that a network-accessible service is invoked. In other embodiments, some or all of the calls to a network-accessible service may not be individually authenticated (or may only be partially authenticated, such as by only verifying the user token or user credential), such as additional calls within a predetermined period of time to a particular network-accessible service from a single application copy on behalf of the same end user, or for calls to the component service from a predetermined set of computing systems (e.g., based on their IP address).

Various information about the use of an indicated service that is received by the CSUF system may be stored for later use in determining fees to be paid by end users for use of network-accessible services via an application. In at least some embodiments, the information may include the user credential (or user token), the application key, an indication of the service used, and an indication of the amount of use of the indicated service with respect to an indicated use dimension. In addition, in at least some embodiments, an application copy may interact with the CSUF system to provide metering information with regard to one or more use dimensions other than the predefined use dimensions of the component service. If so, the use of the component service with respect to the predefined use dimension may nonetheless be metered by the CSUF system, such as for use in determining fees to be paid to the service provider for the use of the service.

As previously mentioned, when appropriate (e.g., once a month, for each service usage, after a predetermined amount of fees are owed, when canceling a subscription, etc.), fees to be charged to an end user for the use of one or more network-accessible services via one or more applications are determined. The determination of such fees may include retrieving information about the configured usage model(s) specified for use of the services via the applications. Other fees (e.g., recurring application use fees, or fees paid by the end user to the CSUF system) may also be determined and added to the fees owed by the end user based on the service usage. Payment may be obtained using supplied payment information from the end user. If obtaining payment was not successful, in some embodiments various remedial actions are taken, such as contacting the end user to obtain alternative payment information and/or to prevent future access to the network-accessible services by the application (e.g., by revoking the user credential or the user token so that it will no longer be authenticated).

After receiving payment of fees from the end user, the CSUF system may allocate the fees received between the provider of the application copy and the providers of the network-accessible services used by the application, and initiate payment of the allocated amounts to the parties. In some embodiments, the service provider of each component service used by the application is paid according to the use of the service by the application on behalf of the end user (based on the predefined usage models for the services), and the application provider is paid the remaining fees. In at least some embodiments, the CSUF system may also allocate at least some of the fees to itself for the functionality that it provides, and if so the net proceeds received by the application provider and/or service providers may be reduced appropriately.

In at least some embodiments, an application creator or provider user associated with an application may interact with the CSUF system to monitor (e.g., in substantially real-time) use of network-accessible services via the application and/or to monitor fees to be paid to the application creator or provider. Similarly, in at least some embodiments, an end user may interact with the CSUF system to monitor use of an application by the end user and/or use of invocable services by the application on behalf of the end user, as well as to monitor any fees owed based on such use. In addition, application creator/provider users and end users may interact with the CSUF system to update various information about their applications and subscriptions as appropriate.

While not illustrated, some parties may serve multiple roles. For example, an application creator may also provide one or more component services that are available via the CSUF system. As another example, in some embodiments the entity providing the CSUF system may also create one or more applications. In addition, some of the parties may be an entity (e.g., a company) instead of an individual.

For illustrative purposes, some embodiments are described below in which specific embodiments of the CSUF system provide various specific types of capabilities with respect to various types of applications and network-accessible services, including using specific types of user interfaces and other interactions. However, it will be appreciated that the described techniques may be used in a wide variety of other situations, including with other types of computer-implemented services, with other types of applications, with other types of user interactions, etc., and that the invention is not limited to the exemplary details provided.

FIGS. 2A-2D illustrate examples of interactions between an application creator user and an embodiment of a CSUF system in order to configure a usage model for a selected component service to be used by an application being developed by the application creator user. In particular, FIG. 2A illustrates an example user interface screen that may be displayed to an application creator user to enable the application creator user to specify various information related to an application. In this example, the displayed information includes instructional information 201 for the application creator, a section 203 in which the application creator user can specify the name of the provider of the application and the name of the application, a section 205 to provide a description of the application, a section 207 to indicate a URL to redirect end users to after they have subscribed to use of the selected component services via the application, a section 209 to provide terms and conditions, and a section 211 to provide contact information for the application creator. In some embodiments, some or all of the contact information entered in section 211 is for use by the entity providing the CSUF system, and is not supplied to end users. After the application creator user enters the appropriate information in FIG. 2A, the information is submitted to the CSUF system by selection of a user-selectable control (not shown).

Next, in this example, the application creator user is presented with the user interface screen illustrated in FIG. 2B, to enable the application creator user to select one or more network-accessible services for use by the application of the application creator user. In particular, FIG. 2B includes an informational section 215, a list 217 of available services for the application, a list 221 of selected services for the application, user-selectable controls 219 for selecting and deselecting one or more services, and a user-selectable control 223 to submit the list of the selected services to the CSUF system. Additional information may be available for each of the available services in some embodiments, such as a description of the service, predefined pricing information, ratings or other assessment information, etc. Although only one component service is selected in this example, multiple component services, including multiple component services from different parties, may be used by an application.

Once the application creator user selects the one or more component services and uses the user-selectable control 223 to submit the selected services to the CSUF system, the user interface screen illustrated in FIG. 2C is presented to the application creator user. In this example, the selected service has a single usage model that includes predefined pricing information for two use dimensions, but in other embodiments a service may have multiple alternative usage models that the application creator may choose from (e.g., different usage models corresponding to different quality of service levels). In this example, FIG. 2C includes an information section 225, a section 227 for configuring the use prices for a component network-accessible service, a section 229 for configuring optional recurring (e.g., monthly) and/or one-time fees, and a user-selectable control 231 for submitting the configured usage model to the CSUF system. In this example, the information specified in sections 227 and 229 will be part of the configured usage model for the selected service and the application, although in other embodiments additional types of information may be specified (e.g., service-specific use restrictions, service-specific terms and conditions, etc.) and/or some of the illustrated types of information may not be available to be specified. If multiple component services had been selected, similar information would be displayed to the application creator user for each of the services.

In this example, section 227 includes rows 227 a and 227 b, with each row corresponding to one of the use dimension specified in the predefined pricing information for the selected service. The predefined pricing information is shown for each use dimension, including a predefined use price for a predetermined amount of use with respect to the use dimension. User-specifiable fields are also present to allow the application creator user to specify a distinct configured use price for the same predetermined amount of use with respect to the use dimension. While not illustrated here, in some embodiments, the application creator user may further be able to configure differing amounts of use and/or use dimensions. In this example, the application creator user may further specify an optional explanation, which will be provided to end users during configuration to explain the configured pricing. Accordingly, since multiple applications may each configure different usage models for those applications' use of a single component service, an end user using multiple such applications may be charged different fees for use of the same component service.

Although not shown, in some embodiments additional information may be specified for the configured usage model. For example, in some embodiments an application creator user may configure one or more use restrictions, such as to restrict a minimum or maximum use of a component service, and/or to restrict the use of the service to a particular type of use (e.g., non-commercial use). In some embodiments, some or all of the use restrictions of the component service are automatically incorporated as use restrictions for the application. As a second example, the application creator may be able to specify particular aspects of billing, such as the billing cycle, or the smallest increment in which to bill (e.g., in tenths of a GB/month).

After the application creator user selects user-selectable control 231 to define the configured usage model for the selected service, the application creator user is presented with the example user interface screen of FIG. 2D to confirm the configured usage model. In particular, FIG. 2D includes an informational section 233, a section 235 with the configured use prices, a section 237 with additional fees for use of the application, and a user-selectable control 239 to continue. In this example, sections 235 and 237 each contain a user-selectable control to allow the application creator user to make changes if so desired. In this example, the CSUF system charges a fee for providing its capabilities (e.g., 10% after paying the service provider for use of the component service), and sections 235 and 237 indicate that CSUF system fee as well as the portion of the fees from the end user that will be provided to the service provider and the application creator user (or a separate provider of the application that the application creator user represents).

After the application creator user selects user-selectable control 239, the application creator will receive an application key for use with the application, as well as one or more indicated URLs to use to allow end users to interact with the CSUF system to subscribe to the application and its use of the selected service. The application key and the URLs may be provided to the application creator in various manners, such as by email or displayed on a user interface. The application creator may use the URLs in various ways, such as on the application creator's Web site (e.g., as shown in FIG. 3A), or instead as part of the application (e.g., to allow end user subscription to the application via an executing copy of the application).

The previously illustrated user interfaces are provided for example purposes, and the same or related functionality may be performed in other manners in other embodiments. For example, in other embodiments, more or less information may be displayed to an application creator user and/or obtained from an application creator user. Additionally, some or all of the information may be provided to an application creator user and/or obtained from an application creator user in other manners, such as programmatically rather than via a graphical user interface, or via the use of a custom application rather than via a Web-based interface.

After an application has been created by an application creator user and configured usage models have been specified for any selected component services, end users may subscribe to use the application and the functionality provided by any such component services. FIGS. 3A-3D illustrate examples of interactions between end users and an embodiment of the CSUF system in order to perform such a subscription process. In other embodiments, end users may obtain access to use such an application in a manner other than via a subscription, such as based on payment of a one-time fee or in other manners. In this example, FIG. 3A illustrates an example user interface screen 301 on an application creator's Web site, with the screen providing information to a potential end user about a particular application. This example screen further allows the end user to purchase access to the application or manage an existing subscription to the application. In particular, in this example the user interface screen includes user-selectable controls to “Order” 305 access to the application and to “Manage Your Account” 303. Information about the application on the user interface screen includes an overview about pricing for use of the component services via the application, a description of the application, and a name of the application. Additional information may be displayed in other embodiments, such as minimum system requirements and operating systems supported (e.g., for a desktop application that will be executed on the end user's computing system).

If the end user has not previously subscribed to the application and selects the “Order” user-selectable control 305, the end user is presented with the user interface illustrated in FIG. 3B. FIG. 3B illustrates an example sign-in page for the end user that is provided by the CSUF system, and may in some embodiments correspond to a URL supplied by the CSUF system to the application creator when configuring a usage model for the application. In this example, FIG. 3B includes an instructional information section 307, a section 309 for the end user to specify a username and password, and a user-selectable control 311 to continue the subscription process. The end user may create a new user account with the CSUF system, or in this example, is able to use a username and password for an account on an associated system if one already exists. If the end user is creating a new user account, the end user may be prompted to provide various types of information (e.g., payment information), which is not shown here. In addition, while not illustrated here, in some embodiments the CSUF system may gather information from the end user for one or more component services, such as to be supplied to the provider(s) of those component service(s).

After the end user has specified the various types of information for a new user account, or if the end user signs in to an account for which such information is already available, the user interface screen 313 of FIG. 3C is displayed to the end user. The user interface screen 313 provides information to the end user regarding the configured usage model for the application, and allows the end user to place an order for a subscription for access to the application and the one or more invocable component services used by the application. In particular, FIG. 3C includes various information about fees charged by the configured usage model (e.g., setup fees and recurring monthly fees), and about end user payment information that may be used to pay the fees. In this example, the information about the configured usage model for the application includes the configured use price for each of the use dimensions for the component services. In addition, in this example FIG. 3C includes a section 315 for the end user to agree to terms and conditions, such as terms and conditions specified by the CSUF system, by the application (e.g., as specified in section 209 of FIG. 2A), and/or by one or more of the component services. However, in other embodiments, the end user may have agreed to some of those terms and conditions at other times, or no such terms and conditions may be used. In addition, while the end user paid for the application subscription using a credit card in this example, various other payment methods (e.g., an ACH transaction, a debit card, a gift card) may be used in other embodiments.

After reviewing the information displayed in FIG. 3C, the user may proceed with the subscription process by selecting the “Place Your Order” user-selectable control 317. In this example, after appropriate processing by the CSUF system (e.g., checking that the end user has agreed to the terms and conditions, charging the end user for the setup fees and any recurring monthly fee, etc.), the user is presented with the example user interface screen illustrated in FIG. 3D. In this example, the user interface screen of FIG. 3D contains a receipt section 317 corresponding to the description, and a section 321 (e.g., based on the URL specified in section 207 of FIG. 2A) with information to enable the end user to download the application. The receipt section 317 in this example indicates a user token for the end user to use with the application, although in other embodiments the user token may instead be supplied in other manners (e.g., in a file included with a copy of the application download). In addition, in this example, a receipt was also sent via email to the end user. The section 321, in this example, includes user-selectable controls to allow the end user to download a copy of the application, so that the downloaded application copy may be used by the end user.

As with the example user interfaces for use in configuring usage models, the illustrated user interfaces for end user subscription are provided for example purposes, and the same or related functionality may be performed in other manners in other embodiments. For example, in other embodiments more or less information may be displayed to an end user and/or obtained from an end user. Additionally, some or all of the information may be provided to an end user and/or obtained from an end user in other manners, such as programmatically rather than via a graphical user interface, or via the use of a custom application rather than via a Web-based interface.

FIG. 4 illustrates a server computing system 400 suitable for executing an embodiment of the Configurable Service Usage Facility (“CSUF”) system, as well as various other computing systems. In this example, the other computing systems include one or more application creator computing systems 450, one or more end user client computing systems 470, and one or more service provider computing systems 490. In the illustrated embodiment, the server computing system 400 includes a CPU 405, various I/O components 410, storage 420, and memory 430. The I/O components include a display 411, a network connection 412, a computer-readable media drive 413, and other I/O devices 415 (e.g., a keyboard, a mouse, speakers, etc.).

An embodiment of the CSUF system 440 is executing in memory 430, and it interacts with the other computing systems over the network 480 (e.g., via the Internet and/or the World Wide Web, via a private cellular network, etc.). The other computing systems may similarly execute various software as part of the interactions. For example, a Web browser 459 executing in memory 457 of an application creator computing system allows an application creator user to interact with the CSUF system (e.g., to configure usage models for component services used by their applications and/or to monitor use of their applications). In addition, a Web browser 479 executing in memory 477 of an end user client computing system allows end users to interact with the CSUF system (e.g., to subscribe to an application). Furthermore, a network-accessible service server 499 may execute in memory 497 of a service provider computing system in order to provide a network-accessible service that is registered with the CSUF system and used by one or more applications.

In this illustrated embodiment, an application creator user creates an application 453 that is stored on storage 451 of the application creator computing system, and that is configured to use one or more invocable component services via the CSUF system that are provided by one or more service provider computing systems. One or more of the end users may then obtain a copy 478 of the application 451, such as based on interactions with the application creator computing system, and execute the application copy in memory 477 of the end users' computing systems (e.g., to provide various functionality via the selected services) after the end user has completed a corresponding subscription process via the CSUF system. In the illustrated embodiment, a variety of database data structures 422, 423 and 424 are present on the storage 420 for use by the CSUF system, such as to store information about applications and their configured usage models, about component services and their predefined usage models, and about tracked usage of applications and component services, although in other embodiments some or all such databases may instead be located elsewhere and/or be organized in other manners. Furthermore, in other embodiments the stored information may be stored in other manners. In addition, one or more optional other systems 445 may also be executing on the server computing system, such as an electronic marketplace system for network-accessible services.

It will be appreciated that the illustrated computing systems are merely illustrative and are not intended to limit the scope of the present invention. The computing systems 400, 450, 470 and/or 490 may instead each include multiple interacting computing systems or devices, and those computing systems may be connected to other devices that are not illustrated, including through one or more networks such as the Internet, via the Web, or via private networks (e.g., mobile communication networks, etc.). More generally, a server or client computing system or device may comprise any combination of hardware or software that can interact, including (without limitation) desktop or other computers, network devices, PDAs (“Personal Digital Assistants”), cellphones, wireless phones, pagers, electronic organizers, Internet appliances, television-based systems (e.g., using set-top boxes and/or personal/digital video recorders), and various other consumer products that include appropriate inter-communication capabilities. In addition, in some embodiments, at least some of the described functionality may instead not be provided as part of an embodiment of the CSUF system and/or other additional functionality may be available.

It will also be appreciated that, while various items are discussed or illustrated as being stored in memory or on storage while being used, these items or portions of them may be transferred between memory and other storage devices for purposes of memory management and data integrity. Alternatively, in other embodiments some or all of the software systems may execute in memory on another device and communicate with the illustrated computing systems via inter-computer communication. Some or all of the systems and/or data structures may also be stored (e.g., as software instructions or structured data) on a computer-readable medium, such as a hard disk, memory, a network, or a portable media article (e.g., a DVD or a flash memory device) to be read by an appropriate drive or via an appropriate connection. The systems and data structures may also be transmitted via generated data signals (e.g., by being encoded in a carrier wave or otherwise included as part of an analog or digital propagated signal) on a variety of computer-readable transmission mediums, including wireless-based and wired/cable-based mediums, and may take a variety of forms (e.g., as part of a single or multiplexed analog signal, or as multiple discrete digital packets or frames). Such computer program products may also take other forms in other embodiments. Accordingly, the present techniques may be practiced with other computer system configurations.

FIG. 5 is a flow diagram of an example embodiment of an Application Configuration routine 500. The routine may, for example, be provided by execution of a configuration component of the CSUF system 110 of FIG. 1A and/or of the CSUF system 440 of FIG. 4, such as to allow application creators to configure usage models for component services used by their applications. In this illustrated example, the usage model configuration is performed in an interactive manner by the application creator, although in other embodiments it may be performed in other manners, such as by the CSUF system automatically determining configured use prices for one or more component services (e.g., by charging a predetermined amount above the default use price or a predetermined multiple of the default use price).

The routine begins at step 505, where the routine receives an indication from an application creator user to configure usage models for one or more component services to be used via an indicated application. In step 510, information is received from the application creator user that indicates a name, a description and optionally additional information for the indicated application. A variety of types of additional information may be specified, and some types of additional information indicated may depend on the type of application. After receiving the information about the application, the routine continues to step 515, where the routine provides indications of one or more available invocable services, such as by displaying them to the application creator user. In some embodiments, some services associated with the CSUF system may not be available for the application (e.g., based on use restrictions in the usage models of various applications, based on previous services selections such as to prevent incompatible scheduled maintenance windows, etc.). In step 520, the routine receives indications of one or more of the invocable services that are selected by the application creator user to be used by the application.

After receiving the indications of the available services, the routine proceeds to step 525, where the next component service is selected, beginning with the first. Once the service is selected, the routine continues to step 530, where the predefined usage model for the service is displayed. After displaying the predefined usage model, the routine continues to step 535, where it receives information from the application creator user for a new configured usage model for use of the selected service via the application. In some embodiments, the CSUF system may assist the application creator user by suggesting various information for the configured usage model, such as one or more suggested configured use prices. After receiving the configured usage model information, the routine proceeds to step 540, where additional information for the usage model may optionally be received from the application creator user and/or the CSUF system for use as part of the configured usage model. A variety of types of additional information may be specified in various embodiments, including timing for obtaining payments (e.g., billing date, billing cycle), promotions, discounts to be provided via discount coupons to be used, etc.

At step 545, the routine determines whether additional invocable services were selected in step 520, and if so the routine returns to step 525. If not, the routine continues to step 550, where in the illustrated embodiment it provides an application key to the application creator user for use with the application. In other embodiments, the application creator user may instead be permitted to specify an application key to be used with the application. In some embodiments, the routine may provide additional information to the application creator user, such as information to direct potential end users of the application to the CSUF system to subscribe to use of the application. After step 550, the routine continues to step 595 to determine whether to continue. If so, the routine returns to step 505, and if not continues to step 599 and ends.

FIG. 6 is a flow diagram of an example embodiment of the End User Application Subscription routine 600. The routine may, for example, be provided by execution of a subscription component of the CSUF system 110 of FIG. 1A and/or of the CSUF system 440 of FIG. 4, such as to subscribe end users for use of indicated applications. While in the illustrated embodiment the routine creates subscriptions for end users to enable use of indicated applications, in other embodiments the routine may provide access to indicated applications for end users in other manners.

The routine begins at step 605, where an indication is received from an end user to initiate a potential subscription to an indicated application. The routine then continues to step 610 to display information about the indicated application and the component invocable services to the end user, although in other embodiments some or all of that information may instead not be provided or may be provided in other manners (e.g., already have been displayed to the end user by the application creator, such as on a Web site associated with the application creator). The displayed information may include information about the one or more configured usage models for the indicated application that correspond to the one or more component invocable services used by the application, a description of the application, etc.

After displaying the information to the end user, the routine proceeds to step 615, where the routine determines if the end user has decided to request a subscription to the specified application, such as based on selection by the end user of a corresponding user-selectable control. If so, the routine continues to step 620, and if not proceeds to step 695. At step 620, the routine receives contact and payment information for the end user. In at least some embodiments, the information may be retrieved from an existing account at an associated system if such an account is available. After receiving contact and payment information, the routine proceeds to step 625 to determine whether the subscription to the application has an initial upfront fee (e.g., a one-time setup fee, the first month of a recurring monthly fee, etc.), and if so to attempt to obtain payment for the fee. If it is determined in step 630 that payment is obtained or if no payment is currently needed, the routine proceeds to step 635 to create the subscription and store related information. In addition, in the illustrated embodiment, the routine provides a user token to the end user for use in configuring a copy of the application for use by the end user. In some embodiments, additional functionality (not shown) may be provided, such as to redirect the end user to a Web page from which the end user may download or initiate use of the application. After step 635, the routine continues to step 695. Alternatively, if payment was needed but not received in step 625, then the routine in the illustrated embodiment proceeds from step 630 to step 695 without creating the subscription for the end user. In other embodiments, the routine may instead proceed in other manners, such as to create a subscription for the end user even if the needed payment was not received (or if a determination as to whether the needed payment has been received may not be available until a later time), but to later fail to authenticate access requests if payment is still not received at that time. At step 695, the routine determines whether to continue. If so, the routine returns to step 605, and if not ends at step 699.

While not illustrated here, in some embodiments various additional security mechanisms may be used, such as to ensure that only authorized end users are allowed to subscribe to some or all of the applications. Similarly, in some embodiments various anti-fraud mechanisms may be utilized, such as to ensure that valid payment is received from an end user and/or to prevent abuse of a configured usage model through multiple accounts or violations of use conditions.

FIG. 7 is a flow diagram of an example embodiment of an Application Copy Initialization routine 700. The routine may, for example, be provided as part of the execution of an application that has one or more configured usage models via the CSUF system, such as application copy 478 of FIG. 4. In the illustrated embodiment, the initialization of an application copy for use by an end user includes configuring the application copy with a user credential for the end user, which will be used when accessing the various component services via the application. However, in other embodiments, a user token may be used instead of a separate user credential. Furthermore, in the illustrated embodiment, the configuration of the application copy with a user credential based on a supplied end user token is performed at the time of initialization of the application copy, but may be performed at other times in other embodiments. For example, in some embodiments the application copy configuration may be delayed until after application copy initialization, such as until the application copy is to invoke a selected invocable service on behalf of an end user. In addition, in some embodiments the application copy may request user tokens and obtain corresponding user credentials multiple times, such as periodically if the user tokens and/or user credentials expire or otherwise become invalid. In such embodiments, an end user may obtain the new user tokens in various ways, such as by interacting with an embodiment of the CSUF system. Furthermore, as previously noted, in at least some embodiments a user credential and/or user token may be revoked or may expire for various reasons, and if so the end user may be prompted to supply a new user token. For example, a user credential and/or user taken may be revoked by the end user (e.g., based on canceling a subscription to an application), or by the application developer and/or the CSUF system (e.g., if the user information may have been compromised, if payment is obtained for use of a service, if a predefined life of the user credential is reached, etc.)

The routine begins at step 705, where an indication of the application initialization process is received (e.g., based on the first use of the application by an end user). The routine then continues to step 710, where it presents a request to the end user for a user token, such as by displaying a user interface to the user. The routine then receives an indication of a user token from the end user in step 715. However, in other types of applications, a user token may be supplied in other manners. After receiving an indication of the user token, the routine proceeds to step 720, where the routine contacts the CSUF system to authenticate the user token. In step 725, the routine determines if the user token was authenticated by the CSUF system. If so, the routine proceeds to step 735 to receive a user credential from the CSUF system that is based on the user token to use when invoking component services on behalf of the end user. If not, the routine proceeds to step 730, where the routine indicates that the user token is invalid, which in some embodiments may prevent the end user from further using the application, or may cause the application to have restricted capabilities (e.g., an inability to use the functionality provided by the component services). After steps 730 or 735, the routine continues to step 795 to determine whether to continue. If so, the routine returns to step 705, and if not continues to step 799 and ends.

FIG. 8 is a flow diagram of an example embodiment of a Usage Tracking routine 800. The routine may, for example, be provided by execution of a metering and/or billing component of the CSUF system 110 of FIG. 1A and/or of the CSUF system 440 of FIG. 4, such as to track usage of invocable services by applications on behalf of end users in order to determine fees to be paid by the end users, and to allocate received fees among the application providers and service providers as appropriate.

The routine begins at step 805, where an indication is received that an indicated service is being invoked via a copy of an application on behalf of an end user. The received indication may in some embodiments be received from the indicated service, while in other embodiments made be received from the application copy being used by the end user. Furthermore, in the illustrated embodiment, the received indication may reflect an access request that is performed before the service use occurs, or may reflect an indication of actual service use that is made during or after the service use occurs. The received indication may include an indication of an application key and either a user token or a user credential, and additional information may be received as well (e.g., the amount of use with respect to an indicated use dimension, a starting and/or ending time of use of the service, etc.). After receiving the indication, the routine continues to step 810, where the routine identifies the application performing the invocation of the indicated service and the end user on whose behalf the invocation is performed. In at least some embodiments, the routine identifies the application based on an application key received in step 805, and identifies the end user based on a user credential or token received in step 805. In the illustrated embodiment, the routine then proceeds to step 815 to retrieve information related to the identified application and end user for use in determining access rights to the service and/or for use in determining corresponding fees for the service use, such as any configured usage models for the application and any subscription information for the end user and the application. In other embodiments, however, determinations regarding service use access and/or fee determination may be made in other ways, such as based on information included in a received user credential.

In the illustrated embodiment, the routine next continues to step 820 to determine whether the indication received in step 805 corresponds to an access request to determine whether the application and end user are authorized to use the indicated service. If not, the routine proceeds to step 845 to store information about the use of the indicated service by the application copy on behalf of the end user. If so, the routine instead continues to step 825 to determine if the access is authorized, such as based on the retrieved configured usage models and/or user subscription information, although in other embodiments the determination may be made in other manners (e.g., based on information included in the received user credential). After step 825, the routine continues to step 830 to determine whether the access is authorized, and if not continues to step 840 to provide an indication of a lack of access authorization. If the access is authorized, the routine continues instead to step 835 to provide an indication of access authorization to the indicated service. After step 835, the routine then continues to step 845 to store information about the use of the indicated service by the application copy on behalf of the end user, such as prospectively based on the authorization, although in other embodiments may instead wait to track such use until the routine is notified of the actual use.

After step 845, the routine continues to step 850 to determine whether fees should be determined now, such as if fees are determined for each service use indication, or if a specified amount of time or service use have occurred since a last time that fees were determined. If not, or after step 840, the routine continues to step 895. If fees are to be determined now, however, the routine continues to step 855 to determine one or more fees to be paid by the end user. The fee(s) to be paid by the end user may be determined, for example, by retrieving the configured usage model for use of the indicated service via the application, and applying the configured use price to any currently received information regarding an amount of use of the indicated service. If the fee determination is to be performed for more than just the current service indication, stored information about other service use by one or more application copies of behalf of the end user may be retrieved and similarly used to determine one or more corresponding fees. Once the fee(s) to be paid by the end user are determined, the routine continues to step 860 to determine one or more fees to be paid to the provider of the indicated service and/or to other service providers. A fee to pay a service provider may be determined based on a predefined usage model for the service, as well as any current and/or stored corresponding service usage information. After determining the fees to pay the service provider(s), the routine continues to step 865 to determine the fee(s) to pay the provider(s) of the application(s) whose copies are used on behalf of the end user to invoke the indicated service and/or other services. For example, the fees to pay an application provided may be determined based on the difference between the fees to be paid by the end user for use of the application and the fees to pay the service provider(s) for use of services via the application. In addition, if the CSUF system charges any fees, those fees may be subtracted from the resulting difference. Once the fee(s) to pay the application provider(s) are determined, the routine continues to step 870 to indicate the determined fees. In some embodiments, the indications may be stored until the end user is subsequently charged, while in other embodiments the end user may be charged in response to the indications. Furthermore, while not illustrated here, in some embodiments the routine may further proceed to allocate obtained fees as appropriate between the application provider(s) and the service provider(s), such as by initiating payment to the providers as appropriate.

After step 870, the routine continues to step 895 to determine whether to continue. If so, the routine returns to step 805, and if not continues to step 899 and ends.

Various additional functionality may be provided in various embodiments of the Configurable Service Usage Facility (“CSUF”) system. For example, in at least some embodiments, the entity providing the CSUF system and/or third-party service providers may set various criteria to be met by configured usage models for some or all services and/or applications, such as by indicating a minimum configured use price (e.g., a configured use price that exceeds the predefined use price for the service by a predetermined amount) and/or a maximum configured use price. The CSUF system may further enforce any such criteria when configured usage models are created. As a second example, in some embodiments one or more related individuals may be associated with a single user token. For example, if a copy of an application is used by an entity rather than an individual, multiple individuals may be authorized to use a single end user token for a specified application copy. Furthermore, in some embodiments a received application key may be associated with a particular configured usage model for the application, such that, if the application has multiple configured usage models for multiple distinct component services, a distinct application key is issued for each configured usage model.

In addition, in some embodiments configured use prices may have other forms, such as tiered use prices. For instance, tiered use prices may be used to provide volume discounts to high-volume users of an application. When tiered use prices are used, they may be specified in various manners. For example, information may be specified regarding how a tier-based usage model is structured, such as the start and end of various tiers (e.g., in units of the use price for the service, or in terms of conditions such as times for peak/off-peak pricing), whether the tiers are cumulative, etc.

Furthermore, as previously noted, in some embodiments an application creator user may configure a usage model for a component service to use a different use dimension than the use dimensions specified for the predefined usage model for the component service. For example, instead of specifying prices for the use of a storage service based on a number of gigabytes of space used, the configured usage model for an application may specify prices on other bases, such as a price for each DVD stored or for each picture stored. When such custom metering is performed, the application may send information to the CSUF system to indicate when corresponding usage has occurred, such as to indicate that a particular user has stored three pictures. In other situations, the CSUF system may be able to determine at least some such types of corresponding usage automatically without receiving such usage information from an application.

In addition, in some embodiments the CSUF system may enable the use of variable pricing that may be dynamically specified at runtime for applications, such as based on end user negotiation with an application copy being used. If so, when an application creator is interacting with the CSUF system to configure one or more usage models for an application, the application creator may indicate that variable pricing is available to be used with the application. The application creator may then design or configure the application to support such variable pricing. For example, an end user of the application may be able to bid on or otherwise request an indicated price for an amount of use of the application, such as an indicated price that is lower than the price that the application would otherwise charge. The application may then optionally determine to accept or reject the indicated price based on one or more of various factors. For example, the application may accept a lower indicated price based on a minimum volume of use, based on use that occurs at times when demand for use of the application and/or underlying services is low, based on use that is subject to more restrictive terms (e.g., that may be discontinued if specified conditions occur, such as other higher-paying demand occurs), etc. If the application accepts a particular indicated price for use by an end user, the application may then provide information to the CSUF system to specify the price to be charged for corresponding use by the end user, so that the CSUF system may charge the end user the appropriate fees for the use. For example, the application may provide such use price information when the application copy makes a request for a particular use of an invocable service and/or when the application copy provides usage information to the CSUF system.

It will also be appreciated that in some embodiments the functionality provided by the routines discussed above may be provided in alternative ways, such as being split among more routines or consolidated into fewer routines. Similarly, in some embodiments illustrated routines may provide more or less functionality than is described, such as when other illustrated routines instead lack or include such functionality respectively, or when the amount of functionality that is provided is altered. In addition, while various operations may be illustrated as being performed in a particular manner (e.g., in serial or in parallel) and/or in a particular order, those skilled in the art will appreciate that in other embodiments the operations may be performed in other orders and in other manners. Those skilled in the art will also appreciate that the data structures discussed above may be structured in different manners, such as by having a single data structure split into multiple data structures or by having multiple data structures consolidated into a single data structure. Similarly, in some embodiments illustrated data structures may store more or less information than is described, such as when other illustrated data structures instead lack or include such information respectively, or when the amount or types of information that is stored is altered.

From the foregoing it will be appreciated that, although specific embodiments have been described herein for purposes of illustration, various modifications may be made without deviating from the spirit and scope of the invention. Accordingly, the invention is not limited except as by the appended claims and the elements recited therein. In addition, while certain aspects of the invention are presented below in certain claim forms, the inventors contemplate the various aspects of the invention in any available claim form. For example, while only some aspects of the invention may currently be recited as being embodied in a computer-readable medium, other aspects may likewise be so embodied. 

What is claimed is:
 1. A computer-implemented method, comprising: performing, by one or more configured computing systems: providing information to an application creator system of an indicated application about one or more network-accessible services from other providers separate from the application creator system, wherein each of the network-accessible services has an associated usage model with use restrictions specified by a provider of the network-accessible service for the network-accessible service; receiving information from the application creator system that indicates a selected one of the network-accessible services and an additional usage model specified by the application creator system for the selected one service via the indicated application, wherein the additional usage model has one or more additional use restrictions specified by the application creator system for the selected one service via the indicated application by one or more end users of the indicated application; storing information about the additional usage model and an associated application key for the indicated application; providing a user token for an end user for use to invoke the selected one service via the indicated application; receiving information from the selected one service about an invocation of the selected one service by the indicated application for the end user, wherein the invocation includes the application key and the user token; responsive to the receiving of the information about the invocation: retrieving, using the application key, the stored information about the additional usage model; determining, based at least in part on the stored information, that the invocation satisfies the one or more additional use restrictions of the additional usage model; determining that the invocation satisfies the use restrictions of the usage model associated with the selected one service; authorizing the invocation based at least in part on the determinations that the invocation satisfies the use restrictions and the one or more additional use restrictions; and tracking, based on the application key and the user token included in the information received from the selected one service, that the invocation of the selected one service is by the indicated application and for the end user.
 2. The method of claim 1 further comprising providing, by the one or more configured computing systems and before the invocation of the selected one service by the indicated application, the application key to the application creator system for use by the indicated application as part of invoking the selected one service.
 3. The method of claim 1 further comprising associating the user token provided to the end user with the indicated application in the stored information, and wherein the tracking is based at least in part on use of the stored information.
 4. The method of claim 1 wherein the receiving of the information includes receiving a request for access to the selected one service via the indicated application on behalf of the end user, and wherein the method further comprises providing an indication to the indicated application or the selected one service that the invocation is determined to satisfy the additional use restrictions of the additional usage model and the use restrictions of the usage model associated with the selected one service.
 5. The method of claim 1 further comprising receiving information from the application creator system that indicates, for another selected service of the network-accessible services, another additional usage model that is specified by the application creator system to control use of the other selected service via the indicated application.
 6. The method of claim 1 wherein the method is performed by the provider of the selected one service.
 7. The method of claim 1 wherein the selected one service is provided by a service provider that is unaffiliated with the application creator system.
 8. The method of claim 1 wherein the selected one service is a Web service.
 9. The method of claim 1 further comprising identifying one or more criteria that the additional usage model is to satisfy, and automatically verifying that the additional usage model satisfies the identified criteria.
 10. The method of claim 1 wherein the associated usage model for each of the one or more network-accessible services includes an indicated amount of use with respect to an indicated use dimension, and wherein the additional usage model is distinct from the usage model for the selected one service based on at least one of a different configured amount of use or a different configured use dimension.
 11. The method of claim 10 wherein the providing of the information to the application creator system includes presenting, to the application creator system, information that includes the indicated amount of use and the indicated use dimension for the usage model of the selected one service.
 12. The method of claim 11 wherein the receiving of the information that indicates the additional usage model is based at least in part on selections made by the application creator system from the presented information.
 13. The method of claim 10 wherein the configured use dimension of the additional usage model for the selected one service includes at least one of a unit of storage, a quantity of one or more uses, an amount of time, a unit of processing time, or a quantity of multiple uses during a period of time.
 14. The method of claim 10 wherein the additional usage model for the selected one service has a different use dimension than the indicated use dimension for the usage model for the selected one service.
 15. The method of claim 1 wherein the indicated application is at least one of a Web application or an application program that executes on a computing device of an end user.
 16. The method of claim 1 wherein the one or more network-accessible services include multiple services available from multiple distinct providers, and wherein the method further comprises receiving, by the one or more configured computing systems, information about each of the multiple services from the provider of that service.
 17. The method of claim 1 wherein the providing of the information to the application creator system is performed in response to a request from the application creator system to configure use of network-accessible services by the indicated application.
 18. One or more non-transitory computer-readable media having stored instructions that when executed by one or more processors of a computing system and cause the computing system to: provide information to an application creator system of an indicated application about one or more network-accessible services available from other providers separate from the application creator system, wherein each of the network-accessible services has an associated usage model with use restrictions for the network-accessible service specified by a provider of the network-accessible service for the network-accessible service; receive information from the application creator system that indicates a selected one of the network-accessible services and an additional usage model specified by the application creator system for the selected one service via the indicated application, wherein the additional usage model has one or more additional use restrictions specified by the application creator system for the selected one service via the indicated application by one or more end users of the indicated application; store information about the additional usage model and an associated application key for the indicated application; provide a user token for an end user for use to invoke the selected one service via the indicated application; receive information from the selected one service about an invocation of the selected one service by the indicated application for the end user, wherein the invocation includes the application key and the user token; responsive to the receiving of the information about the invocation: retrieve, using the application key, the stored information about the additional usage model; determine, based at least in part on the stored information, that the invocation satisfies the one or more additional use restrictions of the usage model or the additional usage model; determine that the invocation satisfies the use restrictions of the usage model associated with the selected one service; authorize the invocation based at least in part on the determinations that invocation satisfies the use restrictions and the one or more additional use restrictions; and track, based on the application key and the user token included in the information received from the selected one service, that the invocation of the selected one service is by the indicated application and for the end user.
 19. The one or more non-transitory computer-readable media of claim 18 wherein the stored instructions when executed by the one or more processors further cause the computing system to provide the application key to the application creator system for use by the indicated application as part of invoking the selected one service.
 20. The one or more non-transitory computer-readable media of claim 18 wherein the associated usage model for the selected one service includes an indicated amount of use with respect to an indicated use dimension, and wherein the additional usage model differs from the associated usage model for the selected one service based on at least one of a configured amount of use or a configured use dimension.
 21. A computing system, comprising: one or more processors; and one or more memories with stored instructions that, when executed by at least one of the one or more processors, cause the computing system to perform automated operations to at least: provide information to an application creator system of an indicated application about one or more network-accessible services available from other providers separate from the application creator system, wherein each of the network-accessible services has an associated usage model with use restrictions specified by a provider of the network-accessible service for the network-accessible service; receive information from the application creator system that indicates a selected one of the network-accessible services and an additional usage model specified by the application creator system for the selected one service via the indicated application, wherein the additional usage model has one or more additional use restrictions specified by the application creator system for the selected one service via the indicated application by one or more end users of the indicated application; store information about the additional model and an associated application key for the indicated application; provide a user token for an end user for use to invoke the selected one service via the indicated application; receive information from the selected one service about an invocation of the selected one service by the indicated application for the end user, wherein the invocation includes the application key and the user token: responsive to the receiving of the information about the invocation: retrieve, using the application key, the stored information about the additional usage model; determine, based at least in part on the stored information, that the invocation satisfies the one or more additional use restrictions of the additional usage model; determining that the invocation satisfies the use restrictions of the usage model associated with the selected one service; authorize the invocation based at least in part on the determinations that invocation satisfies the use restrictions and one or more additional use restrictions; and track, based on the application key and the user token included in the information received from the selected one service, that the invocation of the selected one service is by the indicated application and for the end user.
 22. The computing system of claim 21 wherein the stored instructions further cause the computing system to implement functionality of a configurable service usage facility system and to provide the application key to the application creator system for use with the indicated application.
 23. The computing system of claim 21 wherein the associated usage model include an indicated amount of use with respect to an indicated use dimension, and wherein the additional usage model differs from the associated usage model for the selected one service based at least in part on a configured amount of use or a configured use dimension.
 24. The computing system of claim 21 wherein to receive the information from the application creator system that indicates the additional usage model, the stored instructions cause the computing system to receive a particular use restriction for the selected one service, wherein the particular use restriction restricts usage based on one or more of: (a) amount of data storage used, (b) storage volume used, (c) number of storage or retrieval accesses, (d) time of use, (e) amount of time of use, or (f) number uses within a time period. 