Method and apparatus for subscriber management

ABSTRACT

Aspects of the subject disclosure may include, for example, a method including enabling, by a system comprising a processor, a first modification of a first user profile at a secondary data repository of a communication network; the first modification is directed by a first application operating at a first communication device of the communication network. A usage event is identified that is associated with the first communication device according to the first modification to the first user profile. A second modification to a second user profile is replicated at a primary data repository according to a change in operation of a second application associated with the usage event that is identified to the first communication device; the replication is performed according to an update policy for the primary data repository. Other embodiments are disclosed.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.15/412,567, filed Jan. 23, 2017, which is a continuation of U.S.application Ser. No. 14/317,701, filed Jun. 27, 2014 (now U.S. Pat. No.9,589,040), which are incorporated by reference herein in theirentirety.

FIELD OF THE DISCLOSURE

The subject disclosure relates to a method and apparatus for subscribermanagement, and, more particularly, for dynamic updating of subscriberprofile information.

BACKGROUND

Modern telecommunications systems allow consumers to utilize telephonycapabilities while accessing a large variety of content. Consumers areno longer bound to specific locations when communicating with others orwhen enjoying content, including video programming Network capabilitieshave expanded and have created additional interconnections and newopportunities for using mobile communication devices in a variety ofsituations. Intelligent devices offer new means for the enjoyment ofnetwork interactions in ways that anticipate consumer desires.

BRIEF DESCRIPTION OF THE DRAWINGS

Reference will now be made to the accompanying drawings, which are notnecessarily drawn to scale, and wherein:

FIG. 1 depicts illustrative embodiments of a system that can be utilizedfor managing subscriber profile information for communication devices;

FIG. 2 depicts an illustrative embodiment of a scenario for dynamicupdating of a subscriber profile;

FIG. 3 depicts an illustrative embodiment of a method used in portionsof the system described in FIGS. 1-2 and 4-5;

FIGS. 4-5 depict illustrative embodiments of communication systems thatprovide communication and media services for communication devicesaccording to embodiments illustrated in FIGS. 1-3;

FIG. 6 depicts an illustrative embodiment of a web portal forinteracting with the communication systems of FIGS. 1-2 and 4-5;

FIG. 7 depicts an illustrative embodiment of a communication device; and

FIG. 8 is a diagrammatic representation of a machine in the form of acomputer system within which a set of instructions, when executed, maycause the machine to perform any one or more of the methods describedherein.

DETAILED DESCRIPTION

The subject disclosure describes, among other things, illustrativeembodiments for dynamically configuring subscriber profile informationin a communication system by enabling a modification to a subscriberprofile associated with a communication device at a secondary datarepository that is accessible to third party applications andidentifying a usage event association with the communication devicebased on the modification made to the subscriber profile. Theillustrative embodiments further describe modifying another user profileat the secondary data repository based on the usage event andreplicating modifications to user profiles at a primary data repositorythat is not accessible to third party applications according to anupdate policy for the primary data repository. Other embodiments aredescribed in the subject disclosure.

One embodiment of the subject disclosure includes a computer-readablestorage device, comprising executable instructions. The executableinstructions can cause a processor to perform operations comprisinggenerating a copy of a first plurality of user profiles stored in aprimary data repository of a communication network and storing the copyof the first plurality of user profiles in a secondary data repositoryof the communication network. The copy of the first plurality of userprofiles can correspond to a second plurality of user profiles. Thesecond plurality of user profiles can be accessible and adjustable bythird party applications, while the first plurality of user profiles canbe not accessible and not adjustable by the third party applications.The executable instructions can further cause the processor to performoperations comprising detecting a first modification of a first userprofile of the second plurality of user profiles at the secondary datarepository, wherein the first modification is directed by a firstapplication operating at a first communication device of thecommunication network. The executable instructions can also cause theprocessor to perform operations comprising identifying a usage eventthat is associated with the first communication device according to thefirst modification to the first user profile and, in turn, determining achange in operation of a second application operating at a secondcommunication device of the communication network based on the usageevent that is associated with the first communication device. Theexecutable instructions can cause a processor to perform operationscomprising modifying a second user profile of the second plurality ofuser profiles of the secondary data repository according to the changein operation of the second application to generate a modified seconduser profile and, in turn, updating the first plurality of user profilesof the primary data repository according to the modified second userprofile responsive to the modified second user profile conforming to anupdate policy of the primary data repository.

One embodiment of the subject disclosure includes a server devicecomprising a memory to store executable instructions and a processor.The processor, responsive to executing the executable instructions, canperform operations including detecting a first modification of a firstuser profile at a secondary data repository of a communication network,wherein the first modification is directed by a first applicationoperating at a first communication device of the communication network.The processor can also perform operations comprising determining achange in operation of a second application based on the firstmodification for the first user profile and, in turn, modifying a seconduser profile at the secondary data repository according to the change inoperation of the second application to generate a modified second userprofile. The processor can further perform operations comprisingupdating a second user profile of a primary data repository according tothe modified second user profile of the secondary data repositoryconforming to an update policy for the primary data repository.

One embodiment of the subject disclosure includes a method includingenabling, by a system comprising a processor, a first modification of afirst user profile at a secondary data repository of a communicationnetwork, wherein the first modification is directed by a firstapplication operating at a first communication device of thecommunication network. The method can also include identifying, by thesystem, a usage event that is associated with the first communicationdevice according to the first modification to the first user profile.The method can further include updating, by the system, a second userprofile of a primary data repository according to a second modificationassociated with the usage event that is identified for the firstcommunication device, wherein the updating conforms to an update policyfor the primary data repository.

FIG. 1 depicts an illustrative embodiment of a system 100 that can beutilized for providing communication device via a communication network.In one or more embodiments, the system 100 can include a communicationnetwork 150. The system 100 can include a subscription telecommunicationservice, such as an Internet Protocol Multimedia Subsystem (IMS) network150 for providing cellular/mobile communications, Internet access, andcontent to mobile communication devices 116 via a mobility network ofmobile base stations 117. The system can include a subscription contentservice, such as an Internet Protocol Television (IPTV) network forproviding media content to subscribers. The IPTV network can be part ofa cable, satellite, or DSL-based media content delivery system. Themedia content can be any type of viewable content, such as broadcasttelevision, cable or premium television, video on demand, orpay-per-view television. The IPTV network can deliver media content tomedia processing devices 106 and media display devices 108 at subscriberlocations via gateway devices 104. In one or more embodiments, thesystem 100 can include wireless computer devices 118 that are connectedto the communication network 150. For example, a wireless computerdevice 118 can be coupled to the communication network 150 via a gatewaydevice 104.

In one or more embodiments, the system 100 can provide wired andwireless access to communication services and media services for mobilecommunication devices 116, computer devices 118, and media processordevices 106. For example, a mobile communication device 116 cancommunicate through the IMS network 150 via a cellular network includingbase stations 117 and/or a gateway device 104 using wirelesscommunications. In various embodiments, the mobile communication device116 can access Internet-based services via the IMS network 150. Forexample, the mobile communication device 160 can access the firstapplication 174 and/or a second application 176. The first and secondapplication 174 and 176 can be third-party services, such as socialmedia sites, news sites, streaming media sites, service providers,service carriers, and/or search sites.

In one or more embodiments, the system 100 can incorporate functions ofa service provider and/or network carrier for offering services of theprovider/carrier and/or services from third parties. The system 100 canprovide databases 160 and 165, which include a set of parameters foreach subscriber to the system 100. For example, the system 100 caninclude a primary data repository 165 and a secondary data repository160. The primary and secondary data repositories 165 and 160 can includesubscriber and/or user profile information of a variety of types. Thesetypes can include personal identification information, demographicinformation, location information, subscription service information,device configuration information, and/or preference information. Theuser profile information that is stored in the primary and secondarydata repositories 165 and 160 is used by the system 100 to provideconsistent performance of the system 100 as user communication devices116, 118, and 106 access services from and/or through the system 100.For example, when a mobile communication device 116 is powered on andregisters to the IMS network 150, the IMS network 150 can access a datarepository 160 to obtain profile information that is associated with themobile communication device 116 and/or a user of the device 116. Inaddition, the IMS network 150 can access the data repository 164 profileinformation as the mobile communication device 116 access the servicesof the IMS network 150.

In one or more embodiments, the primary and secondary data repositories165 and 160 can be utilized in a manner that provides security andaccessibility for profile information. The primary data repository 165can include all profile data for subscribers in the network 100including services used by those subscribers. In one embodiment, theprimary data repository 165 can be in the form of a Consolidated NetworkRepository (CNR) that includes subscriber profile data and rules andpolicies for accessing this information. In one or more embodiments theprimary data repository 165 can be a restricted and confidentialdatabase that is accessible only via proprietary services within the IMSnetwork 150. Third-party companies, such as the first and secondapplications 174 and 176, can have little or no direct access to theinformation at the primary data repository 165. By maintaining a strictlimit on accessibility to the primary data repository 165, the system100 can protect subscriber data from malicious acts such as hackerattacks and can ensure security and integrity of subscriber profiles andrights as well as reliable system performance. The primary datarepository 165 can store user profile information associated withthird-party applications 174, however, access to and modification ofthis profile information can be strictly limited.

In one or more embodiments, the second data repository 160 can provide amore accessible database for the system 100. For example the second datarepository 160 can allow third-party applications 174 and 176 to accessand/or modify user profile information in the database. And applicationprogramming interface (API) of the second data repository 160 can allowthird-party applications 174 176 to perform standard database functionssuch as searching, accessing, modifying, editing, adding, and/ordeleting user profile information that is associated with thethird-party application. In one or more embodiments, secondary datarepository 160 can be configured as a Shadow CNR for the system 100. Thesecondary data repository 160 can receive a copy of the profileinformation that is stored at the primary data repository 165. Thisapproach allows the system 100 to maintain a permanent and secure set ofuser profile information at the primary data repository 165 whilesimultaneously maintaining an up-to-date version of the same userprofile information at the secondary data repository 160 in a form thatcan be easily accessed and/or modify by third-party applications 174and/or user devices 116, 118, and 106.

In one or more embodiments, the secondary data repository 160 can accessrules and policies 168 that govern access and/or modification of theuser profile information that is stored at the secondary data repository160. Similarly, the primary data repository 165 can access rules andpolicies 168 for the restricted access and/or modification and/orreplication of the secured user profile information stored at theprimary data repository 165. In one or more embodiments, the system 100can include additional data repositories that can be designated forspecific services, third-party services, and/or users. These additionaldata repositories can receive replicated user profile information fromthe primary data repository 165.

In one or more embodiments, the system 100 can include a dynamic profileadaptation server 130, or simply, adaptation server 130. The adaptationserver 130 can provide a policy of security function for monitoring andthe policing modifications to user profile information performed at thesecondary data repository 160. As application services 174, includingthird-party applications, modify user profile information associatedwith those applications, the information contained in the secondary datarepository 160 can differ from that contained in the primary datarepository 165. The adaptation server 130 can determine when modifieduser profile information should be imported back to the primary datarepository 165.

In one or more embodiments, the adaptation server 130 can monitormodifications in user profile information at the second data repository160 and determine from the application in use by communication device116 and/or a context of service whether a usage event has occurred. Forexample, the adaptation server 130 can detect that a user profileassociated with a communication device 116 has been modify by anapplication 176 that performs a navigation function using a globalpositioning satellite (GPS) signal. The adaptation server 130 can inferfrom the modification that the mobile communication device 116 is beingmoved from one location to another. From this inference, the adaptationserver 130 can apply rules and policies 168 to determine if themodification to the user profile should be forwarded to the primary datarepository 165 as a permanent change or should be confined to thesecondary data repository 160 as a temporary change.

In one or more embodiments, the adaptation server 130 can draw aninference from a modification in a user profile at the secondary datarepository 160, where the inference strongly implies that an operatingcondition for the communication device 116 has changed. Referring toFIG. 2, for example, a mobile communication device 116 can at one pointin time establish wireless communications to the IMS system 150 via agateway device 104. At a later time, the mobile communication device 116can be moved such that it can no longer communicate through the gatewaydevice 104. Rather, the mobile communication device 116 can becommunicating to the IMS system 150 via a cellular network 117. The IMSnetwork 150 and/or an application 174 in communication with the mobilecommunication device 116 can detect the change in location of the deviceand or change in communication path of the device and can respond tothis change by modifying user profile for major associated with thedevice. The modified user profile information can be stored at thesecondary data repository 160 the adaptation server 130 can detect thischange in user profile to draw an inference that a usage event hasoccurred, where the specific usage event is a transition incommunication path of the mobile communication device 116. Theadaptation server 130 can further draw an inference that the mobilecommunication device 116 moved from one location to another. In oneembodiment the adaptation server can draw inferences based onmodifications to user profile information at the secondary datarepository 160. In another embodiment, the adaptation server 130 candraw inferences further based upon information that is independent ofthe second data repository 130, such as GPS information associated withthe mobile communication device 116.

In one or more embodiments, modifications to user profile information atthe secondary data repository 160 can directly indicate a usage event.For example a modification to user profile can directly indicate achange in user status, such as a change in name, age, location,subscription status, and/or device type or capability. The adaptationserver 130 can monitor for such changes and determine directly thenature of a usage event. In other embodiments, modifications to userprofile information at the secondary data repository 160 are inferentialand may have to be combined with other contextual information indetermining a usage event. For example, an application 174 can detect achange in communication path for a mobile communication device 116, asillustrated in FIG. 2, and can respond by modifying the user profileassociated with login security for the application. The application 174can, for example, alter a user profile configuration governing a maximumnumber of tries for logging into the application responsive todetermining that the communication path has changed. The adaptationserver 130 can detect the modification in the user profile informationassociated with the maximum number of tries for login and draw aninference of a usage event whereby the mobile communication device 116has changed its communication to the IMS network 150.

In one or more embodiments, the adaptation server 130 can determinewhether a modification in a user profile and/or a usage event inferredfrom a modification to user profile should result in an additionalmodification to a different user profile that is stored secondary datarepository 160. For example, where the adaptation server 130 detects amodification in a maximum user login configuration associated with afirst application 174, the adaptation server 130 can determine that asimilar maximum user login configuration associated with a secondapplication 176 should be changed at the second data repository 160. Theadaptation server 130 can use user profile modifications to anticipatefurther user profile modification that will benefit operations for acommunication device 116 and implement these additional modifications atthe second data repository 160 before they are requested. The adaptationserver 130 can thereby reduce the need for user intervention in makinguser profile changes after, for example, the user has upgraded a mobilecommunication device 116. New capabilities and/or function of the mobilecommunication device 116 can create a scenario where a global change inuser profile information is beneficial. The adaptation server 130 candetect a first change in user profile at the second data repository 160,can determine that this change is due to a usage event, such as theacquisition of a new local communication device 116, and then canpropagate this change through a number of user profiles associated withdifferent applications. The adaptation server 130 can then present thenewly modified user profile information to the primary data repository165 for permanent storage.

FIG. 3 depicts an illustrative embodiment of a method operating in orusing portions of the system described in FIGS. 1, 4, and 5. Method 300can begin with step 304, in which adaptation server 130 replicates userprofile information that is stored at a primary data repository 165 to asecondary data repository 160 of the communication system 100. The userprofile information can be associated with services of the communicationsystem 100 or with services of third parties, including those of othercommunication systems. The adaptation server 130 can replicate selectedprofile information according to policies and rules 168 fourperiodically refreshing the contents of the secondary data repository160.

At step 308, the adaptation server 130 can detect a modification of auser profile at the secondary data repository 160. The adaptation server130 can monitor user profiles, as well as other information, stored atthe secondary data repository 160 changes in the stored information.User profile information can be modified by applications and serviceswithin a service provider communication network 150 or applications andservices managed by other network providers and/or third-partycompanies. User profile information can be modified via actionsinitiated at communication devices 116 of the user and/or viaapplications 174 accessed using the communication devices 116 via thecommunications network 150

At step 312, the adaptation server 130 can identify a usage of the fourcommunication device 116 based on a modification of the user profilethat has been detected at the secondary data repository 160. Usageevents can be identified where a type of user profile and/ormodification to that user profile points toward a change in operation atthe communications device 116. The adaptation server 130 can infer ausage event by combining contextual information about the communicationdevices 116 with the detective modification to the user profile.

At step 316, the adaptation server 130 can modify a second user profileat the secondary data repository 160 based on the usage event. Theadaptation server 130 can apply rules and policies 168 that link adetect a change in a first user profile at the secondary data repository162 one or more further modifications in user profile information at thesecondary data repository 160. The additional modifications to userprofile information at the second data repository 160 can be associatedwith the same application 174 that generated the detected modificationto the user profile or can be associated with a different application176. The adaptation server 130 can apply rules and policies 168 todetected modifications to user profiles to direct further modificationof user profile information at the secondary data repository forspecific applications, for specific communication devices 116, and/orfor all devices and or applications accessed by the user/subscriber.

At step 320, the adaptation server 130 can replicate user profiles thathad been modified at the secondary data repository 160 to the primarydata repository 165 according to an update policy 168. The adaptationserver 130 can perform a periodic update to ensure that the user profileinformation at the primary data repository 165 is kept up-to-date withchanges to user profile information at the secondary data repository160. The adaptation server 130 can filter user profile updates such thata safety margin is maintained whereby critical user profile informationis quarantined away from automatic update to the primary data repository165, requires an additional authorization step, and/or requires anadditional delay in storage.

In one or more additional embodiments, the adaptation server 130 canpredict the behavior of a user by extrapolating a change in user profileat the secondary data repository 160 and/or a determined usage eventassociated with a communication device of the user. For example, a usercan use a computer device 118 to access a first application 174 at ahome environment via a gateway device 104 and then switch to a mobilecommunication device 116 for access to the first application 174 via acellular network 117. The first application 174 can respond by alteringa bandwidth of service to the mobile communication device. For example,where the first application streams content, the altered bandwidth ofservice can include a streaming codec that is compatible with the lowerbandwidth available at the cellular network 117. This change inbandwidth of service can be detected by the adaptation server 130 as achange in a user profile at the secondary data repository 160, where thefirst application 174 has initiated to change in user profile using anAPI. In response to the detection of the change in user profileassociated with the first application 174, the adaptation server 130 candetermine a usage event associated with a user of the computer device118 and the mobile communications device 116, whereby the user is now“on the go.” The inference that the user of the computer device 118 andthe mobile communication device 116 is now on the go can further be usedby the adaptation server 132 direct a change in security or otherservices, such as a second application 176, reflective of this usageevent. Hence, the adaptation server 130 can cause additional userprofiles to be modified at the secondary data repository 160. Plus, theadaptation server 130 can dynamically change security and performancefor multiple applications, services, and devices of a user.

In one or more embodiments, the policies and rules 168 that are appliedby the adaptation server 130 can be specific to specific users, types ofusers, and/or levels of subscription. In one or more embodiments, a setof related services, applications, and/or features can be dynamicallychanged in response to the change of a user profile for any singleservice, application, and/or feature. For example, a change in profileassociated with a home media provider service, such as interactivetelevision or cable television, can cause the adaptation server 130 tochange a user profile associated with a home alarm service, a lawn andpool service, or another service related to the home.

In one or more embodiments, where a user purchases a new device 116 withnew capabilities and her features, information regarding these newcapabilities/features can be transferred to the secondary datarepository 160. The adaptation server 130 can detect these changes tothe secondary data repository 160 and can replicate these changes to theprimary data repository 165 as a permanent upgrade.

In one or more embodiments, the adaptation server 130 can stoppropagation of bad profile information from the secondary datarepository 162 the primary data repository to define. A “good” userprofile at the primary data repository 165 is maintained. When a newuser profile is received at the secondary data repository 160, theadaptation server 130 can check this user profile against a set of rulesand policies 168 that are enforced for user profile information that isto be stored at the primary data repository 165. Where the set of rulesand policies 168 are violated, the adaptation server 130 can prevent thenew user profile from being forwarded to the primary data repository165. Alternatively the adaptation server 130 can prevent the new userprofile information from remaining at the secondary data repository 160.In another alternative, the adaptation server 130 can require anadditional security measure, such as requiring a user authenticationstep, before allowing storage of the new user profile at the secondarydata repository 160 and or replication of the new user profile at theprimary data repository 165. In this way, rules and policies 168 canallow certain changes to be made easily while certain other changes aredifficult.

In one or more embodiments, adaptation server 130 can contact a changein user profile associated with a first application 174 at the secondarydata repository 160. In response to this change, the adaptation server130 can notify a communication device 116 of a user that themodification has been detected and can request an acknowledgment and/oran authentication from the user before allowing the modification toremain the secondary data repository 160. In another embodiment, theadaptation server 130 can notify a second application 176 withinformation regarding the modification to the user profile associatedwith the first application 174. The second application 176 canproactively suggest a similar modification of user profile to a user.

In one or more embodiments, the application server 130 can generate areport of current user profile settings and/or modifications. The reportcan be aggregated to conceal personal information. The report can bemade available to third parties for data mining. Alternatively thirdparties can access user profile data at the secondary data repositoryusing an API. A user/subscriber can opt in or opt out from data miningactivities involving user profile information stored at the secondarydata repository 160 and/or monitored by the adaptation server 130.

FIG. 4 depicts an illustrative embodiment of a first communicationsystem 400 for delivering media content. The communication system 400can represent an Internet Protocol Television (IPTV) media system.Communication system 400 can be overlaid or operably coupled with thesystems of FIGS. 1 and 2 as another representative embodiment ofcommunication system 400. Adaptive server 130, mobile communicationdevice 116, computer device 118, and/or media processor device 106 canbe implemented within the communication system 400 for propagating userprofile changes.

The IPTV media system can include a super head-end office (SHO) 410 withat least one super headend office server (SHS) 411 which receives mediacontent from satellite and/or terrestrial communication systems. In thepresent context, media content can represent, for example, audiocontent, moving image content such as 2D or 3D videos, video games,virtual reality content, still image content, and combinations thereof.The SHS server 411 can forward packets associated with the media contentto one or more video head-end servers (VHS) 414 via a network of videohead-end offices (VHO) 412 according to a multicast communicationprotocol.

The VHS 414 can distribute multimedia broadcast content via an accessnetwork 418 to commercial and/or residential buildings 402 housing agateway 404 (such as a residential or commercial gateway). The accessnetwork 418 can represent a group of digital subscriber line accessmultiplexers (DSLAMs) located in a central office or a service areainterface that provide broadband services over fiber optical links orcopper twisted pairs 419 to buildings 402. The gateway 404 can usecommunication technology to distribute broadcast signals to mediaprocessors 406 such as Set-Top Boxes (STBs) which in turn presentbroadcast channels to media devices 408 such as computers or televisionsets managed in some instances by a media controller 407 (such as aninfrared or RF remote controller).

The gateway 404, the media processors 406, and media devices 408 canutilize tethered communication technologies (such as coaxial, powerlineor phone line wiring) or can operate over a wireless access protocolsuch as Wireless Fidelity (WiFi), Bluetooth®, Zigbee®, or other presentor next generation local or personal area wireless network technologies.By way of these interfaces, unicast communications can also be invokedbetween the media processors 406 and subsystems of the IPTV media systemfor services such as video-on-demand (VoD), browsing an electronicprogramming guide (EPG), or other infrastructure services.

A satellite broadcast television system 429 can be used in the mediasystem of FIG. 4. The satellite broadcast television system can beoverlaid, operably coupled with, or replace the IPTV system as anotherrepresentative embodiment of communication system 400. In thisembodiment, signals transmitted by a satellite 415 that include mediacontent can be received by a satellite dish receiver 431 coupled to thebuilding 402. Modulated signals received by the satellite dish receiver431 can be transferred to the media processors 406 for demodulating,decoding, encoding, and/or distributing broadcast channels to the mediadevices 408. The media processors 406 can be equipped with a broadbandport to an Internet Service Provider (ISP) network 432 to enableinteractive services such as VoD and EPG as described above.

In yet another embodiment, an analog or digital cable broadcastdistribution system such as cable TV system 433 can be overlaid,operably coupled with, or replace the IPTV system and/or the satelliteTV system as another representative embodiment of communication system400. In this embodiment, the cable TV system 433 can also provideInternet, telephony, and interactive media services.

The subject disclosure can apply to other present or next generationover-the-air and/or landline media content services system.

Some of the network elements of the IPTV media system can be coupled toone or more computing devices 430, a portion of which can operate as aweb server for providing web portal services over the ISP network 432 towireline media devices 408 or wireless communication devices 416.

Communication system 400 can also provide for all or a portion of thecomputing devices 430 to function as an adaptation server 430. Theadaptation server 430 can use computing and communication technology toperform function 462, which can include among other things, copying userprofile information from the primary data repository 165 to thesecondary data repository 160, detecting modifications a first userprofile information at the secondary data repository 160, identifyingusage events for communication devices 116 based on the modification offirst user profile, modifying a second user profile at the secondarydata repository according to the usage event, and replicatingmodifications to user profiles from the secondary data repository to theprimary data repository according to an update policy 168. For instance,function 462 of server 430 can be similar to the functions described foradaptation server 130 of FIGS. 1-2 in accordance with method 300. Themedia processors 406 and wireless communication devices 416 can beprovisioned with software functions 464 and 466, respectively, toutilize the services of the adaptation server 430. For instance,functions 464 and 466 of media processors 406 and wireless communicationdevices 416 can be similar to the functions described for thecommunication devices 106 and 116 of FIGS. 1-2 in accordance with method300.

Multiple forms of media services can be offered to media devices overlandline technologies such as those described above. Additionally, mediaservices can be offered to media devices by way of a wireless accessbase station 417 operating according to common wireless access protocolssuch as Global System for Mobile or GSM, Code Division Multiple Accessor CDMA, Time Division Multiple Access or TDMA, Universal MobileTelecommunications or UMTS, World interoperability for Microwave orWiMAX, Software Defined Radio or SDR, Long Term Evolution or LTE, and soon. Other present and next generation wide area wireless access networktechnologies can be used in one or more embodiments of the subjectdisclosure.

FIG. 5 depicts an illustrative embodiment of a communication system 500employing IP Multimedia Subsystem (IMS) network architecture tofacilitate the combined services of circuit-switched and packet-switchedsystems. Communication system 500 can be overlaid or operably coupledwith systems 100 and 200 of FIGS. 1 2 and communication system 400 asanother representative embodiment of communication system 400. Adaptiveserver 130, mobile communication device 116, computer device 118, and/ormedia processor device 106 can be implemented within the communicationsystem 500 for propagating user profile changes.

Communication system 500 can comprise a Home Subscriber Server (HSS)540, a tElephone NUmber Mapping (ENUM) server 530, and other networkelements of an IMS network 550. The IMS network 550 can establishcommunications between IMS-compliant communication devices (CDs) 501,502, Public Switched Telephone Network (PSTN) CDs 503, 505, andcombinations thereof by way of a Media Gateway Control Function (MGCF)520 coupled to a PSTN network 560. The MGCF 520 need not be used when acommunication session involves IMS CD to IMS CD communications. Acommunication session involving at least one PSTN CD may utilize theMGCF 520.

IMS CDs 501, 502 can register with the IMS network 550 by contacting aProxy Call Session Control Function (P-CSCF) which communicates with aninterrogating CSCF (I-CSCF), which in turn, communicates with a ServingCSCF (S-CSCF) to register the CDs with the HSS 540. To initiate acommunication session between CDs, an originating IMS CD 501 can submita Session Initiation Protocol (SIP INVITE) message to an originatingP-CSCF 504 which communicates with a corresponding originating S-CSCF506. The originating S-CSCF 506 can submit the SIP INVITE message to oneor more application servers (ASs) 517 that can provide a variety ofservices to IMS subscribers.

For example, the application servers 517 can be used to performoriginating call feature treatment functions on the calling party numberreceived by the originating S-CSCF 506 in the SIP INVITE message.Originating treatment functions can include determining whether thecalling party number has international calling services, call IDblocking, calling name blocking, 7-digit dialing, and/or is requestingspecial telephony features (e.g., *72 forward calls, *73 cancel callforwarding, *67 for caller ID blocking, and so on). Based on initialfilter criteria (iFCs) in a subscriber profile associated with a CD, oneor more application servers may be invoked to provide various calloriginating feature services.

Additionally, the originating S-CSCF 506 can submit queries to the ENUMsystem 530 to translate an E.164 telephone number in the SIP INVITEmessage to a SIP Uniform Resource Identifier (URI) if the terminatingcommunication device is IMS-compliant. The SIP URI can be used by anInterrogating CSCF (I-CSCF) 507 to submit a query to the HSS 540 toidentify a terminating S-CSCF 514 associated with a terminating IMS CDsuch as reference 502. Once identified, the I-CSCF 507 can submit theSIP INVITE message to the terminating S-CSCF 514. The terminating S-CSCF514 can then identify a terminating P-CSCF 516 associated with theterminating CD 502. The P-CSCF 516 may then signal the CD 502 toestablish Voice over Internet Protocol (VoIP) communication services,thereby enabling the calling and called parties to engage in voiceand/or data communications. Based on the iFCs in the subscriber profile,one or more application servers may be invoked to provide various callterminating feature services, such as call forwarding, do not disturb,music tones, simultaneous ringing, sequential ringing, etc.

In some instances the aforementioned communication process issymmetrical. Accordingly, the terms “originating” and “terminating” inFIG. 5 may be interchangeable. It is further noted that communicationsystem 500 can be adapted to support video conferencing. In addition,communication system 500 can be adapted to provide the IMS CDs 501, 502with the multimedia and Internet services of communication system 400 ofFIG. 4.

If the terminating communication device is instead a PSTN CD such as CD503 or CD 505 (in instances where the cellular phone only supportscircuit-switched voice communications), the ENUM system 530 can respondwith an unsuccessful address resolution which can cause the originatingS-CSCF 506 to forward the call to the MGCF 520 via a Breakout GatewayControl Function (BGCF) 519. The MGCF 520 can then initiate the call tothe terminating PSTN CD over the PSTN network 560 to enable the callingand called parties to engage in voice and/or data communications.

It is further appreciated that the CDs of FIG. 5 can operate as wirelineor wireless devices. For example, the CDs of FIG. 5 can becommunicatively coupled to a cellular base station 521, a femtocell, aWiFi router, a Digital Enhanced Cordless Telecommunications (DECT) baseunit, or another suitable wireless access unit to establishcommunications with the IMS network 550 of FIG. 5. The cellular accessbase station 521 can operate according to common wireless accessprotocols such as GSM, CDMA, TDMA, UMTS, WiMax, SDR, LTE, and so on.Other present and next generation wireless network technologies can beused by one or more embodiments of the subject disclosure. Accordingly,multiple wireline and wireless communication technologies can be used bythe CDs of FIG. 5.

Cellular phones supporting LTE can support packet-switched voice andpacket-switched data communications and thus may operate asIMS-compliant mobile devices. In this embodiment, the cellular basestation 521 may communicate directly with the IMS network 550 as shownby the arrow connecting the cellular base station 521 and the P-CSCF516.

Alternative forms of a CSCF can operate in a device, system, component,or other form of centralized or distributed hardware and/or software.Indeed, a respective CSCF may be embodied as a respective CSCF systemhaving one or more computers or servers, either centralized ordistributed, where each computer or server may be configured to performor provide, in whole or in part, any method, step, or functionalitydescribed herein in accordance with a respective CSCF. Likewise, otherfunctions, servers and computers described herein, including but notlimited to, the HSS, the ENUM server, the BGCF, and the MGCF, can beembodied in a respective system having one or more computers or servers,either centralized or distributed, where each computer or server may beconfigured to perform or provide, in whole or in part, any method, step,or functionality described herein in accordance with a respectivefunction, server, or computer.

The adaptation server 430 of FIG. 4 can be operably coupled tocommunication system 500 for purposes similar to those described above.Adaptation server 430 can perform function 462 and thereby provide userprofile services to the CDs 501, 502, 503 and 505 of FIG. 5. Forexample, CDs 501, 502, 503 and 505, can be adapted with software toperform function 572 to utilize the services of the adaptation server430 of FIGS. 1-2 in accordance with method 300 of FIG. 3. Adaptationserver 430 can be an integral part of the application server(s) 517performing function 574, which can be substantially similar to function464 and adapted to the operations of the IMS network 550.

For illustration purposes only, the terms S-CSCF, P-CSCF, I-CSCF, and soon, can be server devices, but may be referred to in the subjectdisclosure without the word “server.” It is also understood that anyform of a CSCF server can operate in a device, system, component, orother form of centralized or distributed hardware and software. It isfurther noted that these terms and other terms such as DIAMETER commandsare terms can include features, methodologies, and/or fields that may bedescribed in whole or in part by standards bodies such as 3^(rd)Generation Partnership Project (3GPP). It is further noted that some orall embodiments of the subject disclosure may in whole or in partmodify, supplement, or otherwise supersede final or proposed standardspublished and promulgated by 3GPP.

FIG. 6 depicts an illustrative embodiment of a web portal 602 of acommunication system 600. Communication system 600 can be overlaid oroperably coupled with systems 100 and 200 of FIGS. 1 and/or 2,communication system 400, and/or communication system 500 as anotherrepresentative embodiment of systems 100 and 200 of FIGS. 1 and 2,communication system 400, and/or communication system 500. The webportal 602 can be used for managing services of systems 100 and 200 ofFIGS. 1 and 2 and communication systems 400-500. A web page of the webportal 602 can be accessed by a Uniform Resource Locator (URL) with anInternet browser using an Internet-capable communication device such asthose described in FIGS. 1 and/or 2 and FIGS. 4-5. The web portal 602can be configured, for example, to access a media processor 406 andservices managed thereby such as a Digital Video Recorder (DVR), a Videoon Demand (VoD) catalog, an Electronic Programming Guide (EPG), or apersonal catalog (such as personal videos, pictures, audio recordings,etc.) stored at the media processor 406. The web portal 602 can also beused for provisioning IMS services described earlier, provisioningInternet services, provisioning cellular phone services, and so on.

The web portal 602 can further be utilized to manage and provisionsoftware applications 462-466, and 572-574 to adapt these applicationsas may be desired by subscribers and/or service providers of systems 100and 200 of FIGS. 1 and 2, and communication systems 400-500. Forinstance, users of the services provided by adaptation server 130 or 430can log into their on-line accounts and provision the adaptation server130 or 430 with a user profile that is updated to the secondary datarepository to enable communication with devices described in FIGS. 1-5.Service providers can log onto an administrator account to provision,monitor and/or maintain the systems 100 and 200 of FIGS. 1 and 2 oradaptation server 430.

FIG. 7 depicts an illustrative embodiment of a communication device 700.Communication device 700 can serve in whole or in part as anillustrative embodiment of the devices depicted in FIGS. 1 and 2, andFIGS. 4-5. Communication device 700 in whole or in part can representany of the communication devices described in FIGS. 1, 2, and 4-5 andcan be configured to perform portions of method 300 of FIG. 3.

Communication device 700 can comprise a wireline and/or wirelesstransceiver 702 (herein transceiver 702), a user interface (UI) 704, apower supply 714, a location receiver 716, a motion sensor 718, anorientation sensor 720, and a controller 706 for managing operationsthereof. The transceiver 702 can support short-range or long-rangewireless access technologies such as Bluetooth®, ZigBee®, WiFi, DECT, orcellular communication technologies, just to mention a few (Bluetooth®and ZigBee® are trademarks registered by the Bluetooth® Special InterestGroup and the ZigBee® Alliance, respectively). Cellular technologies caninclude, for example, CDMA-1X, UMTS/HSDPA, GSM/GPRS, TDMA/EDGE, EV/DO,WiMAX, SDR, LTE, as well as other next generation wireless communicationtechnologies as they arise. The transceiver 702 can also be adapted tosupport circuit-switched wireline access technologies (such as PSTN),packet-switched wireline access technologies (such as TCP/IP, VoIP,etc.), and combinations thereof.

The UI 704 can include a depressible or touch-sensitive keypad 708 witha navigation mechanism such as a roller ball, a joystick, a mouse, or anavigation disk for manipulating operations of the communication device700. The keypad 708 can be an integral part of a housing assembly of thecommunication device 700 or an independent device operably coupledthereto by a tethered wireline interface (such as a USB cable) or awireless interface supporting for example Bluetooth®. The keypad 708 canrepresent a numeric keypad commonly used by phones, and/or a QWERTYkeypad with alphanumeric keys. The UI 704 can further include a display710 such as monochrome or color LCD (Liquid Crystal Display), OLED(Organic Light Emitting Diode) or other suitable display technology forconveying images to an end user of the communication device 700. In anembodiment where the display 710 is touch-sensitive, a portion or all ofthe keypad 708 can be presented by way of the display 710 withnavigation features.

The display 710 can use touch screen technology to also serve as a userinterface for detecting user input. As a touch screen display, thecommunication device 700 can be adapted to present a user interface withgraphical user interface (GUI) elements that can be selected by a userwith a touch of a finger. The touch screen display 710 can be equippedwith capacitive, resistive or other forms of sensing technology todetect how much surface area of a user's finger has been placed on aportion of the touch screen display. This sensing information can beused to control the manipulation of the GUI elements or other functionsof the user interface. The display 710 can be an integral part of thehousing assembly of the communication device 700 or an independentdevice communicatively coupled thereto by a tethered wireline interface(such as a cable) or a wireless interface.

The UI 704 can also include an audio system 712 that utilizes audiotechnology for conveying low volume audio (such as audio heard inproximity of a human ear) and high volume audio (such as speakerphonefor hands free operation). The audio system 712 can further include amicrophone for receiving audible signals of an end user. The audiosystem 712 can also be used for voice recognition applications. The UI704 can further include an image sensor 713 such as a charged coupleddevice (CCD) camera for capturing still or moving images.

The power supply 714 can utilize common power management technologiessuch as replaceable and rechargeable batteries, supply regulationtechnologies, and/or charging system technologies for supplying energyto the components of the communication device 700 to facilitatelong-range or short-range portable applications. Alternatively, or incombination, the charging system can utilize external power sources suchas DC power supplied over a physical interface such as a USB port orother suitable tethering technologies.

The location receiver 716 can utilize location technology such as aglobal positioning system (GPS) receiver capable of assisted GPS foridentifying a location of the communication device 700 based on signalsgenerated by a constellation of GPS satellites, which can be used forfacilitating location services such as navigation. The motion sensor 718can utilize motion sensing technology such as an accelerometer, agyroscope, or other suitable motion sensing technology to detect motionof the communication device 700 in three-dimensional space. Theorientation sensor 720 can utilize orientation sensing technology suchas a magnetometer to detect the orientation of the communication device700 (north, south, west, and east, as well as combined orientations indegrees, minutes, or other suitable orientation metrics).

The communication device 700 can use the transceiver 702 to alsodetermine a proximity to a cellular, WiFi, Bluetooth®, or other wirelessaccess points by sensing techniques such as utilizing a received signalstrength indicator (RSSI) and/or signal time of arrival (TOA) or time offlight (TOF) measurements. The controller 706 can utilize computingtechnologies such as a microprocessor, a digital signal processor (DSP),programmable gate arrays, application specific integrated circuits,and/or a video processor with associated storage memory such as Flash,ROM, RAM, SRAM, DRAM or other storage technologies for executingcomputer instructions, controlling, and processing data supplied by theaforementioned components of the communication device 700.

Other components not shown in FIG. 7 can be used in one or moreembodiments of the subject disclosure. For instance, the communicationdevice 700 can include a reset button (not shown). The reset button canbe used to reset the controller 706 of the communication device 700. Inyet another embodiment, the communication device 700 can also include afactory default setting button positioned, for example, below a smallhole in a housing assembly of the communication device 700 to force thecommunication device 700 to re-establish factory settings. In thisembodiment, a user can use a protruding object such as a pen or paperclip tip to reach into the hole and depress the default setting button.The communication device 700 can also include a slot for adding orremoving an identity module such as a Subscriber Identity Module (SIM)card. SIM cards can be used for identifying subscriber services,executing programs, storing subscriber data, and so forth.

The communication device 700 as described herein can operate with moreor less of the circuit components shown in FIG. 7. These variantembodiments can be used in one or more embodiments of the subjectdisclosure.

The communication device 700 can be adapted to perform the functions ofdevices of FIGS. 1 and 2, the media processor 406, the media devices408, or the portable communication devices 416 of FIG. 4, as well as theIMS CDs 501-502 and PSTN CDs 503-505 of FIG. 5. It will be appreciatedthat the communication device 700 can also represent other devices thatcan operate in systems of FIGS. 1 and 2, communication systems 400-500of FIGS. 4-5 such as a gaming console and a media player.

The communication device 700 shown in FIG. 7 or portions thereof canserve as a representation of one or more of the devices of system ofFIGS. 1 and 2, communication system 400, and communication system 500.In addition, the controller 706 can be adapted in various embodiments toperform the functions 462-466 and 572-574, respectively.

Upon reviewing the aforementioned embodiments, it would be evident to anartisan with ordinary skill in the art that said embodiments can bemodified, reduced, or enhanced without departing from the scope of theclaims described below. Other embodiments can be used in the subjectdisclosure.

It should be understood that devices described in the exemplaryembodiments can be in communication with each other via various wirelessand/or wired methodologies. The methodologies can be links that aredescribed as coupled, connected and so forth, which can includeunidirectional and/or bidirectional communication over wireless pathsand/or wired paths that utilize one or more of various protocols ormethodologies, where the coupling and/or connection can be direct (e.g.,no intervening processing device) and/or indirect (e.g., an intermediaryprocessing device such as a router).

FIG. 8 depicts an exemplary diagrammatic representation of a machine inthe form of a computer system 800 within which a set of instructions,when executed, may cause the machine to perform any one or more of themethods described above. One or more instances of the machine canoperate, for example, as the adaptation server 130, the media processor106, the mobile communication device 116, and/or the computer device 118and other devices of FIGS. 1-2 and 4. In some embodiments, the machinemay be connected (e.g., using a network 826) to other machines. In anetworked deployment, the machine may operate in the capacity of aserver or a client user machine in a server-client user networkenvironment, or as a peer machine in a peer-to-peer (or distributed)network environment.

The machine may comprise a server computer, a client user computer, apersonal computer (PC), a tablet, a smart phone, a laptop computer, adesktop computer, a control system, a network router, switch or bridge,or any machine capable of executing a set of instructions (sequential orotherwise) that specify actions to be taken by that machine. It will beunderstood that a communication device of the subject disclosureincludes broadly any electronic device that provides voice, video ordata communication. Further, while a single machine is illustrated, theterm “machine” shall also be taken to include any collection of machinesthat individually or jointly execute a set (or multiple sets) ofinstructions to perform any one or more of the methods discussed herein.

The computer system 800 may include a processor (or controller) 802(e.g., a central processing unit (CPU)), a graphics processing unit(GPU, or both), a main memory 804 and a static memory 806, whichcommunicate with each other via a bus 808. The computer system 800 mayfurther include a display unit 810 (e.g., a liquid crystal display(LCD), a flat panel, or a solid state display). The computer system 800may include an input device 812 (e.g., a keyboard), a cursor controldevice 814 (e.g., a mouse), a disk drive unit 816, a signal generationdevice 818 (e.g., a speaker or remote control) and a network interfacedevice 820. In distributed environments, the embodiments described inthe subject disclosure can be adapted to utilize multiple display units810 controlled by two or more computer systems 800. In thisconfiguration, presentations described by the subject disclosure may inpart be shown in a first of the display units 810, while the remainingportion is presented in a second of the display units 810.

The disk drive unit 816 may include a tangible computer-readable storagemedium 822 on which is stored one or more sets of instructions (e.g.,software 824) embodying any one or more of the methods or functionsdescribed herein, including those methods illustrated above. Theinstructions 824 may also reside, completely or at least partially,within the main memory 804, the static memory 806, and/or within theprocessor 802 during execution thereof by the computer system 800. Themain memory 804 and the processor 802 also may constitute tangiblecomputer-readable storage media.

Dedicated hardware implementations including, but not limited to,application specific integrated circuits, programmable logic arrays andother hardware devices can likewise be constructed to implement themethods described herein. Application specific integrated circuits andprogrammable logic array can use downloadable instructions for executingstate machines and/or circuit configurations to implement embodiments ofthe subject disclosure. Applications that may include the apparatus andsystems of various embodiments broadly include a variety of electronicand computer systems. Some embodiments implement functions in two ormore specific interconnected hardware modules or devices with relatedcontrol and data signals communicated between and through the modules,or as portions of an application-specific integrated circuit. Thus, theexample system is applicable to software, firmware, and hardwareimplementations.

In accordance with various embodiments of the subject disclosure, theoperations or methods described herein are intended for operation assoftware programs or instructions running on or executed by a computerprocessor or other computing device, and which may include other formsof instructions manifested as a state machine implemented with logiccomponents in an application specific integrated circuit or fieldprogrammable gate array. Furthermore, software implementations (e.g.,software programs, instructions, etc.) including, but not limited to,distributed processing or component/object distributed processing,parallel processing, or virtual machine processing can also beconstructed to implement the methods described herein. It is furthernoted that a computing device such as a processor, a controller, a statemachine or other suitable device for executing instructions to performoperations or methods may perform such operations directly or indirectlyby way of one or more intermediate devices directed by the computingdevice.

While the tangible computer-readable storage medium 822 is shown in anexample embodiment to be a single medium, the term “tangiblecomputer-readable storage medium” should be taken to include a singlemedium or multiple media (e.g., a centralized or distributed database,and/or associated caches and servers) that store the one or more sets ofinstructions. The term “tangible computer-readable storage medium” shallalso be taken to include any non-transitory medium that is capable ofstoring or encoding a set of instructions for execution by the machineand that cause the machine to perform any one or more of the methods ofthe subject disclosure. The term “non-transitory” as in a non-transitorycomputer-readable storage includes without limitation memories, drives,devices and anything tangible but not a signal per se.

The term “tangible computer-readable storage medium” shall accordinglybe taken to include, but not be limited to: solid-state memories such asa memory card or other package that houses one or more read-only(non-volatile) memories, random access memories, or other re-writable(volatile) memories, a magneto-optical or optical medium such as a diskor tape, or other tangible media which can be used to store information.Accordingly, the disclosure is considered to include any one or more ofa tangible computer-readable storage medium, as listed herein andincluding art-recognized equivalents and successor media, in which thesoftware implementations herein are stored.

Although the present specification describes components and functionsimplemented in the embodiments with reference to particular standardsand protocols, the disclosure is not limited to such standards andprotocols. Each of the standards for Internet and other packet switchednetwork transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) representexamples of the state of the art. Such standards are from time-to-timesuperseded by faster or more efficient equivalents having essentiallythe same functions. Wireless standards for device detection (e.g.,RFID), short-range communications (e.g., Bluetooth®, WiFi, Zigbee®), andlong-range communications (e.g., WiMAX, GSM, CDMA, LTE) can be used bycomputer system 800.

The illustrations of embodiments described herein are intended toprovide a general understanding of the structure of various embodiments,and they are not intended to serve as a complete description of all theelements and features of apparatus and systems that might make use ofthe structures described herein. Many other embodiments will be apparentto those of skill in the art upon reviewing the above description. Theexemplary embodiments can include combinations of features and/or stepsfrom multiple embodiments. Other embodiments may be utilized and derivedtherefrom, such that structural and logical substitutions and changesmay be made without departing from the scope of this disclosure. Figuresare also merely representational and may not be drawn to scale. Certainproportions thereof may be exaggerated, while others may be minimized.Accordingly, the specification and drawings are to be regarded in anillustrative rather than a restrictive sense.

Although specific embodiments have been illustrated and describedherein, it should be appreciated that any arrangement calculated toachieve the same purpose may be substituted for the specific embodimentsshown. This disclosure is intended to cover any and all adaptations orvariations of various embodiments. Combinations of the aboveembodiments, and other embodiments not specifically described herein,can be used in the subject disclosure. In one or more embodiments,features that are positively recited can also be excluded from theembodiment with or without replacement by another component or step. Thesteps or functions described with respect to the exemplary processes ormethods can be performed in any order. The steps or functions describedwith respect to the exemplary processes or methods can be performedalone or in combination with other steps or functions (from otherembodiments or from other steps that have not been described).

Less than all of the steps or functions described with respect to theexemplary processes or methods can also be performed in one or more ofthe exemplary embodiments. Further, the use of numerical terms todescribe a device, component, step or function, such as first, second,third, and so forth, is not intended to describe an order or functionunless expressly stated so. The use of the terms first, second, thirdand so forth, is generally to distinguish between devices, components,steps or functions unless expressly stated otherwise. Additionally, oneor more devices or components described with respect to the exemplaryembodiments can facilitate one or more functions, where the facilitating(e.g., facilitating access or facilitating establishing a connection)can include less than every step needed to perform the function or caninclude all of the steps needed to perform the function.

In one or more embodiments, a processor (which can include a controlleror circuit) has been described that performs various functions. Itshould be understood that the processor can be multiple processors,which can include distributed processors or parallel processors in asingle machine or multiple machines. The processor can be used insupporting a virtual processing environment. The virtual processingenvironment may support one or more virtual machines representingcomputers, servers, or other computing devices. In such virtualmachines, components such as microprocessors and storage devices may bevirtualized or logically represented. The processor can include a statemachine, application specific integrated circuit, and/or programmablegate array including a Field PGA. In one or more embodiments, when aprocessor executes instructions to perform “operations”, this caninclude the processor performing the operations directly and/orfacilitating, directing, or cooperating with another device or componentto perform the operations.

The Abstract of the Disclosure is provided with the understanding thatit will not be used to interpret or limit the scope or meaning of theclaims. In addition, in the foregoing Detailed Description, it can beseen that various features are grouped together in a single embodimentfor the purpose of streamlining the disclosure. This method ofdisclosure is not to be interpreted as reflecting an intention that theclaimed embodiments require more features than are expressly recited ineach claim. Rather, as the following claims reflect, inventive subjectmatter lies in less than all features of a single disclosed embodiment.Thus the following claims are hereby incorporated into the DetailedDescription, with each claim standing on its own as a separately claimedsubject matter.

What is claimed is:
 1. A method, comprising: detecting, by a processingsystem including a processor, a first modification of a first userprofile at a secondary data repository of a communication network, thefirst modification resulting in a modified first user profile, whereinthe first modification of the first user profile is directed by a firstapplication operating at a first communication device, the firstapplication comprising a first third-party application; identifying, bythe processing system, a usage event associated with the firstcommunication device according to the first modification of the firstuser profile by inferring from the first modification that the usageevent has occurred, wherein the usage event comprises a change in anoperating condition of the first communication device; generating, bythe processing system according to a change in operation of a secondapplication based on the usage event, a second modification of a seconduser profile at the secondary data repository, the second modificationresulting in a modified second user profile, the second applicationcomprising a second third-party application; determining, by theprocessing system, that at least one of the modified first user profileor the modified second user profile conforms to an update policy for aprimary data repository separate from the secondary data repository,wherein the primary data repository is not accessible by the firstapplication or by the second application; replicating, by the processingsystem in accordance with the determining, the at least one of themodified first user profile or the modified second user profile to theprimary data repository; verifying, by the processing system,authentication information, wherein the replicating is performedresponsive to the verifying of the authentication information; andpredicting, by the processing system, a behavior of a user of the firstcommunication device by extrapolating the first modification of thefirst user profile at the secondary data repository, the identifiedusage event, or both.
 2. The method of claim 1, wherein the firstmodification is due to a change in streaming of media content to thefirst communication device.
 3. The method of claim 1, wherein the usageevent is associated with movement of the first communication device froma first location to a second location.
 4. The method of claim 1, whereinthe first application directs the first modification of the first userprofile via an open application programming interface.
 5. The method ofclaim 1, wherein the generating the second modification of the seconduser profile comprises modifying a security profile for the secondapplication.
 6. The method of claim 1, wherein the second applicationoperates at a second communication device.
 7. The method of claim 6,further comprising: receiving, by the processing system, theauthentication information from the second communication deviceresponsive to determining that the modified second user profile violatesthe update policy.
 8. The method of claim 1, wherein the identifying theusage event is performed using contextual information regarding thefirst communication device.
 9. The method of claim 1, wherein the usageevent is associated with a change in service to the first communicationdevice, a change in capabilities of the first communication device, or acombination thereof.
 10. The method of claim 1, wherein the secondmodification includes a limitation on authentication attempts associatedwith the second application.
 11. A device, comprising: a processingsystem including a processor; and a memory that stores executableinstructions that, when executed by the processing system, facilitateperformance of operations comprising: detecting a first modification ofa first user profile at a secondary data repository of a communicationnetwork, the first modification resulting in a modified first userprofile, wherein the first modification of the first user profile isdirected by a first application operating at a first communicationdevice, the first application comprising a first third-partyapplication; identifying a usage event associated with the firstcommunication device according to the first modification of the firstuser profile by inferring from the first modification that the usageevent has occurred, wherein the usage event comprises a change in anoperating condition of the first communication device; generating,according to a change in operation of a second application based on theusage event, a second modification of a second user profile at thesecondary data repository, the second modification resulting in amodified second user profile, the second application comprising a secondthird-party application; determining that at least one of the modifiedfirst user profile or the modified second user profile conforms to anupdate policy for a primary data repository separate from the secondarydata repository, wherein the primary data repository is not accessibleby the first application or by the second application; replicating, inaccordance with the determining, the at least one of the modified firstuser profile or the modified second user profile to the primary datarepository; verifying authentication information, wherein thereplicating is performed responsive to the verifying of theauthentication information; and predicting a behavior of a user of thefirst communication device by extrapolating the first modification ofthe first user profile at the secondary data repository, the identifiedusage event, or both.
 12. The device of claim 11, wherein the secondmodification includes a limitation on authentication attempts associatedwith the second application.
 13. The device of claim 11, wherein thegenerating the second modification of the second user profile comprisesmodifying a security profile for the second application.
 14. The deviceof claim 11, wherein the second application operates at a secondcommunication device, and wherein the operations further comprise:receiving the authentication information from the second communicationdevice responsive to determining that the modified second user profileviolates the update policy.
 15. The device of claim 11, wherein theusage event is associated with movement of the first communicationdevice from a first location to a second location.
 16. The device ofclaim 11, wherein the first application directs the first modificationof the first user profile via an open application programming interface.17. A non-transitory machine-readable medium comprising a memory thatstores executable instructions that, when executed by a processingsystem including a processor, facilitate performance of operationscomprising: detecting a first modification of a first user profile at asecondary data repository of a communication network, the firstmodification resulting in a modified first user profile, wherein thefirst modification of the first user profile is directed by a firstapplication operating at a first communication device, the firstapplication comprising a first third-party application; identifying ausage event associated with the first communication device according tothe first modification of the first user profile by inferring from thefirst modification that the usage event has occurred, wherein the usageevent comprises a change in an operating condition of the firstcommunication device; generating, according to a change in operation ofa second application based on the usage event, a second modification ofa second user profile at the secondary data repository, the secondmodification resulting in a modified second user profile, the secondapplication comprising a second third-party application; determiningthat at least one of the modified first user profile or the modifiedsecond user profile conforms to an update policy for a primary datarepository separate from the secondary data repository, wherein theprimary data repository is not accessible by the first application or bythe second application; replicating, in accordance with the determining,the at least one of the modified first user profile or the modifiedsecond user profile to the primary data repository; verifyingauthentication information, wherein the replicating is performedresponsive to the verifying of the authentication information; andpredicting a behavior of a user of the first communication device byextrapolating the first modification of the first user profile at thesecondary data repository, the identified usage event, or both.
 18. Thenon-transitory machine-readable medium of claim 17, wherein the secondmodification includes a limitation on authentication attempts associatedwith the second application.
 19. The non-transitory machine-readablemedium of claim 17, wherein the first application directs the firstmodification of the first user profile via an open applicationprogramming interface.
 20. The non-transitory machine-readable medium ofclaim 17, wherein the secondary data repository is accessible by a thirdparty application and wherein the primary data repository is notaccessible by the third party application.