Network based resource management and allocation

ABSTRACT

An electronic system provides various features and functionality for managing resources. An alert may be sent when a mobile device crosses a geo-fence. The alert may describe how much of the resource is available for the types of transaction that are likely to occur within the geo-fence. The alert may request or confirm the allocation of the transaction to a resource pool or suggest alternative transactions.

RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional PatentApplication No. 62/175,260, entitled “Network Based Resource Managementand Allocation,” filed Jun. 13, 2015. The contents of U.S. ProvisionalPatent Application No. 62/175,260 are incorporated by reference hereinin its entirety.

BACKGROUND OF THE INVENTION

Despite the continued importance of managing personal resources (e.g.,battery power, memory, etc.), there is yet to be developed an effectivesystem of leveraging electronic capabilities to assist with multipleaspects of managing resources.

SUMMARY OF THE INVENTION

Described herein are one or more examples that include an electronicsystem that provides various features and functionality for managingpersonal resources (e.g., battery power, memory, or money). For example,an alert may be sent when a mobile device crosses a geo-fence. The alertmay describe how much of the resource is available for the types oftransaction that are likely to occur within the geo-fence. The alert mayrequest or confirm the allocation of the transaction to a resource poolor suggest alternative transactions.

This Summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This Summary is not intended to identify key features oressential features of the claimed subject matter, nor is it intended tobe used to limit the scope of the claimed subject matter. Furthermore,the claimed subject matter is not constrained to limitations that solveany or all disadvantages noted in any part of this disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

A more detailed understanding may be had from the following description,given by way of example in conjunction with the accompanying drawingswherein:

FIG. 1 depicts an exemplary system for using network based resourcemanagement and allocation described herein;

FIG. 2 illustrates an exemplary resource allocation;

FIG. 3 illustrates an exemplary flowchart depicting an operation of thesystem of FIG. 1;

FIG. 4 illustrates an exemplary flowchart depicting another operation ofthe system of FIG. 1; and

FIG. 5 illustrates an exemplary computing device that may be used incoordination with network based resource management and allocation asdescribed herein.

DETAILED DESCRIPTION OF CERTAIN EXAMPLES

FIG. 1 illustrates an exemplary system that may be utilized to practicenetwork based resource management and allocation, as described herein.FIG. 1 includes management module 110, network 50, communications 75,stores (e.g., store 21, store 22, or store 23), geo-fences (e.g., geofence 31, geo fence 32, or geo fence 33), and devices (e.g., mobiledevice 41 or mobile device 42). Also, in this example, module 110includes data collection engine 112, transaction analysis engine 114,trigger configuration engine 116, stash engine 118, and stash 120.

Generally, a stash may be considered an allocation of a resource. FIG. 2illustrates exemplary resource that comprises a plurality of stashes.Block 119 is an exemplary resource (hereinafter resource 119). Resource119 may be any appropriate resource, such as electrical, memory, fuelfor a vehicle (e.g., gasoline), or money. Different stashes, such asstash 120, stash 121, or stash 122, may reserve the same or differentamounts of resource 119. In a first scenario, resource 119 may beassociated with bandwidth usage of a data connection of mobile device 41or an associated user profile 40. Stash 120 may be designated“entertainment” with a desired 50 megabytes limit for a 30 day period,stash 121 may be designated “work” with a desired 100 megabytes limitfor a 30 day period, and stash 122 may be designated “continuededucation” with a desired 50 megabytes limit for a 30 day period. Inthis first scenario, the bandwidth usage of a football game applicationused on mobile device 41 may be attributed to the entertainment stash(e.g., stash 120), while the bandwidth usage of an electronic mailapplication (or e-mail account within the e-mail application) may beattributed to the work stash (e.g., stash 121). In a second scenario,resource 119 may be associated with use of funds linked to user profile40. Stash 120 may be “entertainment” ($500), stash 121 may be “clothes”($200), and stash 122 may be “groceries” ($300). For example, thepurchase of a football game application linked to user profile 40 may beattributed to the entertainment stash (e.g., stash 120), while thepurchase of a hat linked to user profile 40 may be attributed to theclothes stash (e.g., stash 121). Stashes, as discussed herein, may berigidly separated logical or physical entities (e.g., partitionedmemory, separate physical hardware memory, or separate bank accounts).

Referring further to FIG. 1, it is to be appreciated that network 50depicted in FIG. 1 may include a local area network (LAN), a wide areanetwork (WAN), a personal area network (PAN), and/or combinationsthereof. Such networking environments are commonplace in offices,enterprise-wide computer networks, intranets, and the Internet. Forinstance, when used in a LAN networking environment, the system 100 isconnected with the LAN through a network interface or adapter (notshown). When used in a WAN networking environment, the computing systemenvironment typically includes a modem or other means for establishingcommunications over the WAN, such as the Internet. The modem, which maybe internal or external, may be connected to a system bus via a userinput interface, or via another appropriate mechanism. In a networkedenvironment, program modules depicted relative to the system 100, orportions thereof, may be stored in a remote memory storage device suchas storage medium. Communication links 75 may comprise either wired orwireless links. It is to be appreciated that the illustrated networkconnections of FIG. 1 are exemplary and other means of establishing acommunications link between multiple devices may be used.

Still referring to FIG. 1, data collection engine 112 may be utilized toreceive and store information relating to transactions (e.g., use ofsoftware applications or purchases of products) that may be linked withuser profile 40 which is associated with mobile device 41. Transactions,as discussed herein, are generally associated with a resource. In afirst example, if the resource is power (e.g., battery life of mobiledevice 41), memory, or bandwidth, the transaction may be a use of anapplication (e.g., a mapping application or video streaming application)that affects those resources. In a second example, if the resource isfinancial in nature (e.g., funds in an account) the transaction may be apurchase that affects that financial resource.

Transaction analysis engine 114 may be utilized to analyze transactionsassociated with user profile 40. For example, transaction analysisengine 114 may analyze previous purchases linked to user profile 40 inorder to determine that certain purchases (e.g., shoes) or purchase(s)at certain locations (e.g., store 21, store 22, or store 23) have ahistory of being associated with certain stashes (e.g., stash 120). Inanother example, similar user profiles to a specific user profile (e.g.,user profile 40) may be identified based on threshold levels ofsimilarity of characteristics of the “similar user profiles” and userprofile 40. For example, characteristics may include age, gender,presence of applications on mobile device 41, use of applications ofmobile device 41, device specifications (e.g., presence or performanceof hardware), previous purchases, previous creation of stashes, previousmodification of stashes, family profile (e.g., single, married, numberof kids), residence situation (e.g., own, rent, address), income level,or interests (e.g., sport or running), among other things. Then, basedon a threshold level associated with similarity of user profiles, forexample, stashes may automatically be generated for user profile 40(e.g., during initial setup or a periodic update that creates a newstash) or automatically ascribe a specific purchase to stash 120 (e.g.,based on how similar user profiles labeled the same transaction). Giventhat a plurality of characteristics may be considered when identifyingwhether user profiles are similar, it is contemplated herein that eachof the user profiles may have a similarity score associated with them(e.g., based on how similar user profile 40 is to user profile 43).Thus, similar user profiles may have a weighted contribution to apossible suggested mapping (e.g., user profiles that are more similar touser profile 40 may more heavily influence what suggestion or automaticmapping is ascribed for a transaction conducted by user profile 40).

Still referring to FIG. 1, trigger configuration engine 116 may beutilized to (automatically) analyze transactions or events to identifytriggers that may be configured or generated for user profile 40. Forexample, when a device or person associated with user profile 40 entersinto geo-fence 31 of store 21 (e.g., the vicinity of an ice creamstore), there may be a particular transaction linked with user profile40 occurs (e.g., use of e-mail application, use of video streaming, orpurchase of ice cream). In this example, the transaction may beallocated to stash 120, which may be designated any appropriatecategory, such as “work” (e.g., e-mail application), “entertainment”(e.g., video streaming application), “discretionary” (e.g., purchase ofice scream), or the like, based on the resource and transaction. Thus,for user profile 40, a trigger may be generated for when a person ordevice associated with user profile 40 has moved within a thresholddistance and direction of first store 21 (e.g., by entering intogeo-fence 31). Mobile device 41, which is associated with user profile40 in this example, may be sent specific information in response to thegenerated trigger, such as the remaining level of resources in stash 120(e.g., level of bandwidth resource, battery power resource, or fundingresource). It is contemplated herein that a person may be determined tobe within geo-fence 31 based on recognition of a location of a deviceassociated with the person (e.g., mobile device 41), by facialrecognition, recognition of movement, or the like. Stash engine 118 maybe utilized to generate stashes or manage resource allocation (e.g.,energy, bandwidth, memory, or funding) between various stashes, amongother things. Stash engine 118 may include stash 120, among others. Datacollection engine 112, transaction analysis engine 114, triggerconfiguration engine 116, stash engine 118, and stash 120 are logicalentities in which their functions maybe appropriately distributed orcombined over one or more devices.

In an example, a software application executes on mobile device 41(e.g., smart phone or electronic wearable) associated with user profile40, which includes a display that shows an amount of an unallocatedresource (e.g., energy, bandwidth, memory, money). In an example, if,between the one or more memory accounts available to user profile 40(e.g., cloud storage or local storage) the user has 4000 megabytes, andthe pre-allocated uses (e.g., “work” or “continuing education”) accountfor 3200 megabytes, then the amount left would be 800 megabytes, whichmay be displayed (e.g., “What's left: 800 megabytes”). In anotherexample, if, between the one or more financial accounts available to theuser (e.g., checking account, savings account) the user has $4,000, andthe pre-allocated expenditures (e.g., stashes) account for $3,200, thenthe amount left would be $800, which may be displayed to the user (e.g.,“What's left: $800”).

The user may further configure the stash(es) 120 to replenish themselveswhen resources become available. In an example with regard to batterypower, there may be instructions for module 110 that every time mobiledevice 41 is plugged in to an external power source, one or more stashesget replenished. It is contemplated herein that the replenishment may beby a fixed amount (e.g., 5 minutes or ‘X’ milliamp-hours) or apercentage amount (e.g., 3% of the power added). In another example withregard to money, there may be configuration that every pay day linked touser profile 40 (or maybe every other payday (e.g., only on pay days notnear the end of the month when rent is due)), certain stashes getreplenished. It is contemplated herein that the replenishment may be bya fixed amount (e.g., $50.00) or a percentage amount (e.g., 3% of thefunds added to one or more of the accounts linked to user profile 40).The replenishment of stash 120 may just be a topping off (e.g., onlyspent $75 of $100 so only $75 needs to be replenished not adding another$100 to stash 120).

Additional functions of module 110 are discussed below. Stash engine 118may create stashes when transactions are reoccurring. In an example, ifthere is a reoccurring bill each month, the system will detect that andover time prorate the amount of the bill to move money into a desiredstash 120. So by the time the bill comes due, the proper amount of moneywould be set aside in stash 120. Expanding on this example, there may bean internet bill of $70 that occurs every month, while a user gets paidbi-weekly. Stash engine 118 would make sure to set aside $35 for eachpay period. In a financial context, stash engine 118 may adjust stashesto assist in financial performance. For example, stash engine may adjustincrease funds to a first credit card (e.g., stash 120) which as ahigher interest rate than a second credit card (e.g., stash 121).

Data collection engine may allow for a change of default names oftransactions. The name change will be applied to subsequent identifiers(e.g., CoffeeShop1234=CoffeeShop) for transactions. This allows foreasier review of transactions.

Referring to FIG. 3, exemplary operation of a process 200 associatedwith network based resource management and allocation is discussedbelow. At step 201, configuration information relevant to a stash 120 isreceived. For example, information linked to user profile 40 may besupplied in order to identify how resources (e.g., energy, memory,bandwidth, or money) are to be allocated among stash 120, stash 121, andstash 122. The configuration information of step 201 may includelocation information of mobile device 41, creating additional stashes,updating stashes, deleting stashes. The configuration information may bebased on similar user profiles (e.g., user profile 43). Step 201 may beconsidered an initialization or setup step and may be particularlyrelevant for new users of the network based resource management andallocation system.

At step 202, information (e.g., a notification) associated with atransaction linked to user profile 40 or other action linked to userprofile 40 is received. The information of step 202 may include alocation or movement of mobile device 41, an indication that atransaction occurred, a location of a transaction, an anticipatedlocation of a transaction, or time of transaction, among other things.For example, a notification about a transaction with regard to using anaudio book application on mobile device 41 may be received from mobiledevice 41 or a cloud service that hosts the audio application. Inanother example, a notification with regard to a purchase of ice creamfrom an ice cream store via a credit card linked to user profile 40 maybe received. The notification may be received from the organization thatmanages or deals with management of the credit card (e.g., for example,if the credit card company is authorized to share details of thepurchase to other entities).

At step 203, stash allocation with respect to the transaction of step202 is determined. The determination of the stash to attribute thetransaction to may be based on a selection from a user (e.g., via mobiledevice 41), or the identification of the stash to attribute thetransaction to may be performed automatically (e.g., transactionanalysis engine 114). In an example, a message may be sent to mobiledevice 41 that requests identification of which stash a transactionshould be ascribed to. This request may include one or more suggestionsof stashes (e.g., stash 121 or stash 122 after stash 120 is ruled out).In an example, if a transaction occurs, analysis of the transactionalong with the previous transactions linked to user profile 40 (orprevious transactions associated with similar user profiles) may suggestthat the transaction should be subscribed to stash 121 or stash 122.Thus, in this example, mobile device 41 (e.g., a smart phone, a smartwearable (e.g., watch, glasses), etc. . . . ) may display stash 121 orstash 122 in the order that a user is more likely to select between thetwo, and a third option of “see more stashes.” In other words, if it ismore likely the user will select stash 121, then that stash (e.g., stash121) is listed first. It is contemplated herein that the displayedstash(es) may be a list of the names of the stashes, picturesrepresenting the stashes, or a combination thereof.

With continued reference to step 202, it is contemplated herein that,after determining the stash to attribute the transaction to is receivedand applied, an alert may be sent to mobile device 41 via electronicmail, short message service (SMS) text, or the like (anothercommunication system linked to user profile 40). The alert (alsoconsidered a notification herein) may include the stash that thetransaction was ascribed to (e.g., stash 121), how much is left in stash121, or how much longer before the next reloading of stash 121 is (e.g.,the next expected connection of mobile device 41 into an external powersource or the next expected payday), among other things.

Still referring to step 203, if a transaction is initially identifiedwith a stash that does not have sufficient allocated resourcesremaining, then a determination of which stash or stashes will cover theshortage is made. The determination may be made based on a response to arequest to a user or identified based on analysis of past allocationpatterns of user profile 40 or similar profiles (e.g., user profile 43).In another example, the stash to be used may be preconfigured. Forexample, if a user spends a weekend on vacation, then all transactionsover the course of that that time period (e.g., a weekend) may beallocated to stash 120 (e.g., the vacation stash). Stashes may becreated for regular bills or a general goal (e.g., vacation) and besetup to spread payments over a period (e.g., 12 months).

At step 204, a trigger may be generated or updated. The analysis oftransactions linked to user profile 40 may lead to the generation of atrigger. The analysis may be a consideration of the determination ofstep 203. Triggers may be constantly refined (e.g., updated) orgenerated based on past behaviors (e.g., actions and stash allocations).

With continued reference to step 204, trigger function engine 116 maydetermine that transactions associated with a use of a certainapplication (or operation within the application) or purchase from acertain store occurs whenever mobile device 41 is within a certainthreshold distance, direction, or speed, for example. Thus a trigger maybe generated to include a geo-fence (e.g., geo-fence 21) for which tobase the trigger.

Although the geo-fences in FIG. 1 are circular and may encompass theirrespective store or other anchor object (e.g., geo-fence 31 encompassesstore 21), it is contemplated herein that the geo-fences may be anyshape. Triggers may be based on actions (e.g., movements) by mobiledevice 41, such as mobile device 41 moving along a certain road orstopping at an intersection. Analysis of past movements of mobile device41 may be used to ascertain a geo-fence or other trigger supportingactions, which may not rely much or not at all with the distance ofperforming an action and the anchor point (e.g., store 21, store 22, orstore 23).

At step 205, a device has detected that a trigger event (e.g., location,use of an application, purchase of an item, etc. . . . ) has occurred.In one example, this detection may occur via location information forthe user being generated via a device of the user's (e.g., GPS on theuser's cell phone, whether a device of the user is within WiFi/NFC/otherelectronic communications range of an area or device).

At step 206, send information relating to the occurrence of a triggerevent. For example, if mobile device 41 enters into geo-fence 31, and atrigger exists for geo-fence 31 around store 21 (or stores with athreshold level of similar characteristics as store 21), then aproactive notification may be sent with regard to how much is left inthe expected stash (e.g., stash 120) to be utilized (e.g., use of anavigation application or purchase from store 21).

With continued reference to step 206, a proactive notification based onpast actions or the like may assist in keeping the actual use of aresource within a desired threshold that is allocated to stash 120. Inan example, a trigger may be activated based on geo-fence 31 for store21, which may be a grocery store. Based on past actions module 110 maygenerate a list of items that are expected to be purchased. Based on theexpected purchase list it may be determined that stash 120 would nothave the necessary funds to purchase all the items on the list. Inanother example, the list of items may be automatically generated ormodified with lower cost equivalents or reduction of items to get thedesired purchase within amount of the stash (e.g., stash 120). Inanother example, before purchasing an item, the price of the item may bedetermined (e.g., scanning using mobile device 41 via barcode orradio-frequency identification (RFID) communication) before purchase.This may allow module 110 to provide an alert of any possible shortfallwithin stash 120.

Referring still to FIG. 3, it is contemplated herein that when mobiledevice 42 is within two geo-fences (e.g., geo-fence 32 and geo-fence33), one alert may be sent with respect to each geo-fence or a singlealert may be sent that combines the information that would have beenrepresented by the two or more alerts.

Turning now to FIG. 4, FIG. 4 illustrates an exemplary process 250associated with network based resource management and allocation. Atstep 251, a check is received by a user. For example, the user mayinitially fill out a check that is to be sent to someone else. Then, theuser takes an electronic image of the check (step 252), and the image isanalyzed (step 253). It is contemplated herein that the analysis of thecheck's image may be performed on the device that captured the image(e.g., mobile device 41) or it may be performed on another device, suchas a server or another personal device (e.g., the picture was capturedby a wearable but the analysis is performed by a cell phone)). At step254, funds may be allocated based on the analysis of the check image.

To illustrate this, in one exemplary use case, a user owes someone $200,so they write a check for $200, payable to the payee. The user thencaptures an image of the check, and the image is analyzed to identifycheck characteristics such as the amount of the check, the date it wassigned, the signature, the memo field, the check number, or any otherinformation that may be gleaned from the check, via visible light orotherwise (e.g., or wavelengths emitted by the check could be collectedand analyzed). Then, optionally, the check's amount may be set asideinto stash 120. In one example, the amount of the check may beautomatically set aside as tentatively credited to stash 120 or a theremay be a creation of a new stash 120. Mobile device 41 may display aprompt that requests an indication of which stashes the money should beallocated from. This set-aside may be another stash that is controlledand managed by the user or it may be to a stash controlled by a thirdparty (e.g., a financial entity such as the user's bank). In this way,the funds may be guaranteed similar to how a certified check's funds areguaranteed (e.g., by virtue of the fact that the check's payor no longerhas access to manage the funds, and instead the certifying bank hasplaced the funds in an account that can only be accessed by thecertifying bank when the check itself is deposited and cleared).

In another example, after the check's image is analyzed, the payee maybe notified that they are about to receive the check. The notificationmay include an identification of how much the check is for or who thecheck is from. Optionally, the payee may be provided the ability toelectronically accept the check, in which case the payee may immediatelyaccept electronic payment of the check, and optionally the payor maythen dispose of the physical check without having sent it (e.g., to thepayee, to the payee's bank, to the payor's bank). Optionally, if thefunds are certified then the payee may also be notified that the fundsare certified.

Although specific nomenclature is used in the above example(s) (e.g.,“discretionary spending”, “entertainment”, and “see more stashes”), suchare provided for exemplary purposes only and the breadth of thisdescription and these example(s) is not to be limited to saidterminology. It is contemplated herein that a user profile may beassociated with one particular device or no particular device, but aparticular identifier.

Also, although one or more examples described herein refer to finances(e.g., U.S. dollars), it is contemplated herein that any type ofresource may be utilized in coordination with the one or more examplesdescribed herein, including, for exemplary purposes only, other versionsof physical currency (e.g., Euros), electronic currency (e.g.,bitcoins), owed activities (e.g., an obligation to perform someservice), or other resources (e.g., power, memory, or bandwidth).

In one example, if a user is traveling by herself, then a certaintrigger may not be initiated, whereas if the user is traveling withsomeone else (e.g., a friend, a child), then a certain trigger may beinitiated. Thus, for example, if the user nears an ice cream shop byherself, that trigger may not be initiated, whereas if she is with herchild (which may be detected via NFC from electronics of theaccompanying person's, the friend's cell's location, Wi-Ficommunications detection, MAC address detection of a known electronicdevice that belongs to a specific person, facial recognition) then theuser may be sent a notification of how much ice cream related funds theuser has left, in the appropriate stash (e.g., stash 120). Thus, thetrigger may include initiation characteristics related to and based inpart on whether the user is accompanied by anyone, and by whom.

In another example, the trigger may include initiation characteristicsrelated to the time the analysis is being performed (e.g., when the usercrossed or remained in geo-fence 31). In another example, some states(e.g., Texas) allow student supplies to be purchased tax-free on one ormore days—thus, the user may have one or more triggers that alert theuser, such as when they cross a geo-fence related to a store that sellsschool supplies, as to the fact that they may make these purchases taxfree that day/time.

In another example, if the user has not eaten for a while (thisdetermination may be based on analysis of the user's biometrics measuredby mobile device 41 or based on recent purchase history), then a triggermay be sent such that, if the user associated with user profile 40 isexpected to be hungry and they enter geo-fence 31 of a food distributionplace (e.g., supermarket, restaurant, convenience store), the user maybe sent an alert along the lines of “you are likely hungry—this is youhelpfully reminding you to be careful about what food you buy now.”

It is contemplated herein that a plurality of electronic devicesassociated with a user profile 40 may act in coordination. For example,mobile device 41 and the user's smart watch may coordinatecommunications and display of information. It is also contemplated thatuser profile 40 may be associated with more than one person (e.g., afamily). In an example, the movements or other actions (or projectedactions) of different family members, may be taken into account ingenerating triggers and ascribing transactions to stashes.

Referring to FIG. 5, illustrated is an exemplary computing device asmight be used when utilizing the systems and methods of network basedresource management and allocation described herein. In one example,computing device 500 includes memory 510, a processor 502, an interfacedevice 504 (e.g., mouse, keyboard, monitor), a network device 506.Memory 510 or any storage medium as discussed herein should not beconstrued as a signal. Examples of memory 510 may comprise a recordabledata storage medium, such as a magnetic, optical, biological, or atomicdata storage medium. In one example, memory 510 includes a series ofcomputer instructions written in or implemented with any of a number ofprogramming languages, as will be appreciated by those skilled in theart.

Memory 510 in one example includes RAM 512, hard drive 515, which mayinclude database 516. Database 516 in one example holds information,such as information that relates to users or parties interacting withsystem 100.

The terms “engine” and “module” denote a functional operation that maybe a stand-alone component or an integrated configuration of a pluralityof subordinate components. Thus, engines and modules may be implementedas a single engine/module or as a plurality of engine/modules thatoperate in cooperation with one another. Moreover, engines/modules maybe implemented as software instructions in memory 510 or separately inany of hardware (e.g., electronic circuitry such as mobile device 41),firmware, software, or a combination thereof. In one example,engines/modules contain instructions for controlling processor 502 toexecute the methods described herein. Examples of these methods areexplained in further detail in the exemplary examples herein.

Steps associated with the processes described herein can be performed inany order, unless otherwise specified or dictated by the stepsthemselves. The present disclosure is intended to alternatives,modifications, or variances that fall within the scope of the appendedclaims.

The present disclosure is directed to network based resource managementand allocation. It is to be appreciated that network based resourcemanagement and allocation is described herein more fully with referenceto the accompanying drawings. The illustrated examples described hereinare exemplary of network based resource management and allocation, whichcan be embodied in various forms. Therefore, it is to be understood thatany structural and functional details disclosed herein as a basis forthe claims and for teaching one skilled in the art to variously employthe present invention. Furthermore, the terms and phrases used hereinmerely provide an understandable description of the invention.

The use of the singular forms “a”, “an,” and “the” include pluralreferents unless the context dictates otherwise. Thus, for example,reference to “a stimulus” includes a plurality of such stimuli andreference to “the signal” includes reference to one or more signals andequivalents thereof, and so forth.

It is to be appreciated that certain examples as discussed herein are asoftware algorithm, program or code residing on computer useable mediumhaving control logic for enabling execution on a machine having acomputer processor. A computer useable medium as discussed herein is notand should not be construed to be a signal. The machine typicallyincludes memory storage configured to provide output from execution ofthe computer algorithm or program. As used herein, the term “software”is meant to be synonymous with any code or program that can be in aprocessor of a host computer, regardless of whether the implementationis in hardware, firmware or as a software computer product available ona disc, a memory storage device, or for download from a remote machine.The examples described herein include such software to implement theequations, relationships and algorithms described above. Although atleast one series of steps are presented as an exemplary method ofpracticing one or more examples described herein, it will be appreciatedthat the steps identified may be practiced in any order that ispracticable, including without limitation the omission of one or moresteps.

Examples of mobile devices that may be utilized include but are notlimited to mobile devices, such as a multifunction “smart phones”,wearables (e.g., smart watch, smart glasses) personal computers,notebook computers, tablet computers, or server devices. It should beunderstood that devices each generally include at least one processor,at least one data interface, and at least one memory device coupled viabuses. Devices may be capable of being coupled together, coupled toperipheral devices, and input/output devices. Each device may becombined with other devices in a distributed processing environment ordivided into subcomponents.

The terms “comprises” or “comprising” are to be interpreted asspecifying the presence of the stated features, integers, steps orcomponents, but not precluding the presence of one or more otherfeatures, integers, steps or components or groups thereof.

Although the systems and methods for network based resource managementand allocation have been described with respect to the examplesdisclosed herein, those skilled in the art will readily appreciate thatchanges and modifications may be made thereto without departing from thespirit and scope of the subject invention.

What is claimed is:
 1. A device comprising: a processor; and a memorycoupled with the processor, the memory having stored thereon executableinstructions that when executed by the processor cause the processor toeffectuate operations comprising: receiving information associated withan action of a mobile device; responsive to receiving the informationassociated with the action of the mobile device, determining ananticipated transaction associated with a user profile; ascribing theanticipated transaction to a first allocation of a plurality ofallocations of a resource; and determining a projected remaining balanceof the first allocation of the resource based on if the anticipatedtransaction occurs.
 2. The device of claim 1, wherein the resourcecomprises a memory resource.
 3. The device of claim 1, wherein theresource comprises a battery power resource.
 4. The device of claim 1,wherein the information associated with the action of the mobile devicecomprises a location of the mobile device.
 5. The device of claim 1,wherein the determining of the anticipated transaction associated withthe user profile is based on the mobile device being within a geo-fence.6. The device of claim 1, further operations comprising providinginstruction to send an alert to the mobile device comprising theprojected remaining balance.
 7. The device of claim 1, wherein theresource comprises a monetary resource.
 8. A method comprising:receiving information associated with an action of a mobile device;responsive to receiving the information associated with the action ofthe mobile device, determining an anticipated transaction associatedwith a user profile; ascribing the anticipated transaction to a firstallocation of a plurality of allocations of a resource; and determininga projected remaining balance of the first allocation of the resourcebased on if the anticipated transaction occurs.
 9. The method of claim8, wherein the resource comprises a memory resource.
 10. The method ofclaim 8, wherein the resource comprises a battery power resource. 11.The method of claim 8, wherein the information associated with theaction of the mobile device comprises a location of the mobile device.12. The method of claim 8, wherein the determining of the anticipatedtransaction associated with the user profile is based on the mobiledevice being within a geo-fence.
 13. The method of claim 8, furtheroperations comprising providing instruction to send an alert to themobile device comprising the projected remaining balance.
 14. The methodof claim 8, wherein the resource comprises a monetary resource.
 15. Acomputer readable storage medium comprising computer executableinstructions that when executed by a computing device cause saidcomputing device to effectuate operations comprising: receivinginformation associated with an action of a mobile device; responsive toreceiving the information associated with the action of the mobiledevice, determining an anticipated transaction associated with a userprofile; ascribing the anticipated transaction to a first allocation ofa plurality of allocations of a resource; and determining a projectedremaining balance of the first allocation of the resource based on ifthe anticipated transaction occurs.
 16. The computer readable storagemedium of claim 15, wherein the anticipated transaction comprises use ofan application.
 17. The computer readable storage medium of claim 15,wherein the anticipated transaction comprises purchase of an item. 18.The computer readable storage medium of claim 15, wherein theinformation associated with the action of the mobile device comprises alocation of the mobile device.
 19. The computer readable storage mediumof claim 15, wherein the determining of the anticipated transactionassociated with the user profile is based on the mobile device beingwithin a geo-fence.
 20. The computer readable storage medium of claim15, wherein the resource comprises a monetary resource.