On-device attribution of network data usage

ABSTRACT

Embodiments attribute network data transfers to applications executing on a computing device. A data transfer service executes on the computing device to receive and process data transfer requests. The data transfer requests, populated by the applications, have identifiers attributed thereto to enable monitoring of the network data transfers per identifier. For example, network data transfers associated with different mail accounts of a mail program or different web sites of browser are attributed separately. Data usage statistics relating to the network data transfers for each identifier may be generated and presented to the user for review.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No. 14/988,462, filed on Jan. 5, 2016, which is a continuation of U.S. application Ser. No. 13/721,083, filed on Dec. 20, 2012, which claims the benefit of U.S. Provisional Application No. 61/696,472, filed Sep. 4, 2012, U.S. Provisional Application No. 61/591,503, filed Jan. 27, 2012, and U.S. Provisional Application No. 61/591,509, filed Jan. 27, 2012. The entireties of these applications are hereby incorporated by reference herein.

This application is related to the following applications: U.S. Patent Application entitled “Tracking Data Usage Under a Schematized Data Usage Plan,” U.S. Patent Application entitled “Managing Data Transfers Over Network Connections Based on Priority and a Data Usage Plan,” U.S. Patent Application entitled “Predicting Network Data Consumption Relative to Data Usage Patterns,” U.S. Patent Application entitled “Updating Dynamic Data Usage Plans and Statistics,” U.S. Patent Application entitled “Data Usage Profiles for Users and Applications,” U.S. Patent Application entitled “Recommendations for Reducing Data Consumption Based on Data Usage Profiles,” U.S. Patent Application entitled “Dynamically Adjusting a Data Usage Plan Based on Data Usage Statistics,” and U.S. Patent Application entitled “Managing Network Data Transfers in View of Multiple Data Usage Plans.” All of these applications are incorporated by reference herein in their entirety.

BACKGROUND

With the increased popularity of smart telephones, tablets, and other mobile devices, there has been a similar increase in the amount of data handled by the networks of mobile operators. To reduce the strain on network infrastructure and to reduce network transfer costs, mobile operators are shifting from offering simple unlimited mobile data plans to offering capped and metered plans. Some of these capped and metered plans are complex, with allotted data caps varying based on network type, time of day, etc. Further, the fees for exceeding the allotted data caps may be significant and may also vary based on network type, time of day, etc. The existing systems generally lack mechanisms to help the user understand and manage network data consumption and transfer costs in view of the data usage plans.

As a result, with the existing systems, users can unknowingly exceed the allotted data caps and experience bandwidth throttling (e.g., a reduction or limit placed upon the rate of consumption) and/or be presented with a much larger than normal monthly bill, resulting in “bill shock.” Throttling and bill shock can impact the user experience, leading to dissatisfied customers, increased customer service calls, and negative impressions of the mobile operators.

Some of the existing systems are focused on measuring network data consumption at content providers. However, server-based tracking such as by web site address in some of the existing systems fails to identify which particular application originated the request, at least because multiple applications on a device can access the same web site address. For example, some of the existing systems are not suitable for environments in which applications on a device queue data traffic with a centralized service executing on the device. In such environments, the identity of the originating application is not maintained and hence the network data usage is mis-attributed to the centralized service (rather than being attributed to the originating application). Such attribution is meaningless to the user trying to evaluate the amount of network data consumed by each application.

SUMMARY

Embodiments of the disclosure provide a data transfer service that enables attribution of data transfer requests to identifiers associated with applications originating the data transfer requests. The data transfer service executes on a computing device and receives data transfer requests from a plurality of applications executing on the computing device. Each of the data transfer requests has attributed thereto an identifier associated with origination of the data transfer request. The received data transfer requests are added to a queue. The data transfer service processes the queue to perform the data transfer requests. Data usage statistics are generated per identifier based on the performed data transfer requests.

This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an exemplary block diagram illustrating a mobile computing device obtaining data via a network.

FIG. 2 is an exemplary flow chart illustrating operation of a data transfer service executing on a computing device to perform data transfer operations associated with a plurality of applications executing on the computing device.

FIG. 3 is an exemplary user interface illustrating network data usage by different types of network connections and by application.

FIG. 4 is an exemplary user interface illustrating network data usage per application and identifiers associated with the applications.

FIG. 5A is an exemplary user interface illustrating network data usage per application under a data usage plan with a monthly limit.

FIG. 5B is an exemplary user interface illustrating network data usage per application under a pay-as-you-go data usage plan.

FIG. 5C is an exemplary user interface illustrating network data usage per application under a data usage plan with unlimited data usage.

FIG. 6 is an exemplary block diagram illustrating a mobile computing device having a tile for displaying network data usage statistics to a user.

Corresponding reference characters indicate corresponding parts throughout the drawings.

DETAILED DESCRIPTION

Referring to the figures, embodiments of the disclosure track network data usage per application 114 on a computing device by a data transfer service 121 executing on the computing device. The centralized data transfer service 121, download manager, or other background service allows the applications 114 to attribute or otherwise disambiguate data transfer request (e.g., to upload and/or download data) via identifiers 113 and to queue the attributed data transfer requests 115. For example, a web browser is able to attribute data transfer requests 115 from one web site separately from data transfer requests 115 from another web site by using a different identifier 113 separate from, or incorporated within, the application identifier.

By tagging every network communication with at least one of the identifiers 113, aspects of the disclosure enable network data usage monitoring that distinguishes among different applications 114, groups of applications 114, portions of applications 114, and/or application types. In this manner, the amount of network data being consumed by the application 114 or service on behalf of another application 114 or another service may be tracked. Further, tracking of network data consumption may continue even after termination of the originating application 114 at least because of the identifiers 113.

Referring next to FIG. 1, an exemplary block diagram illustrates a mobile computing device 102 obtaining data via a network 109. User computing devices include, for example, the mobile computing device 102 and other computing devices 106. The user computing devices communicate over one or more of the networks 109. In some embodiments, one or more of the user computing devices are associated with one of the data usage plans 116. The data usage plan 116 represents the terms and/or conditions (e.g., network data consumption allotment) under which the mobile operator 111 provides data transfer services to the user computing devices. For example, a plurality of the user computing devices may share network data consumption allotted under the same or common data usage plan 116.

The user computing devices include any device executing instructions (e.g., as application programs, operating system functionality, or both) to implement operations and functionality. The user computing devices may include, for example, the mobile computing device 102 or any other portable device. In some embodiments, the mobile computing device 102 includes a mobile telephone (e.g., mobile telephone 602 in FIG. 6), laptop, tablet, computing pad, netbook, gaming device, e-reader, and/or portable media player. The other computing devices 106 may include less portable devices such as desktop personal computers, kiosks, and tabletop devices that have network connectivity capabilities. Additionally, each user computing device may represent a group of processing units. While aspects of the disclosure may be described herein with reference to the mobile computing device 102, the descriptions are applicable to any of the user computing devices.

Communication to/from the user computing devices may occur using any protocol or mechanism over one or more of the networks 109. The networks 109 represent any infrastructure or other means for sending and/or receiving data. The networks 109 may include wired and/or wireless networks.

One or more of the mobile operators 111 communicate with the web service 108 and/or the user computing devices via the network 109. Further, the user computing devices communicate with the web service 108, or other entity that performs the operations described herein as being associated with the web service 108.

In some embodiments, the mobile computing device 102 and the other computing devices 106 are associated with a common data usage plan 116 of the user 104. For example, the mobile computing device 102 may represent the mobile telephone 602 of the user 104, while the other computing devices 106 may include a tablet and a laptop associated with the user 104. In other embodiments, the mobile computing device 102 and each of the other computing devices 106 are associated with separate data usage plans 116.

In some embodiments, each of the user computing devices collects data usage statistics 120 relating thereto. For example, the data transfer service 121 executing on the mobile computing device 102 generates, monitors, collects, compiles, and/or receives the data usage statistics 120 relating to network data consumption by the applications 114 executing on the mobile computing device 102. The data usage statistics 120 collected by the data transfer service 121 represent an amount of network data consumed by the mobile computing device 102 under the data usage plan 116. Alternatively or in addition, the centralized web service 108 interacts with the user computing devices and the mobile operators 111 to aggregate the data usage statistics 120. In such embodiments, the web service 108 receives a schema populated with data relating to the data usage plan 116 from the mobile operator 111 and distributes the populated schema to one or more of the user computing devices associated with the data usage plan 116.

In some embodiments, the mobile computing device 102 has at least one processor 110, a memory area 112, and at least one user interface (not shown). The processor 110 includes any quantity of processing units, and is programmed to execute computer-executable instructions for implementing aspects of the disclosure. The instructions may be performed by the processor 110 or by multiple processors executing within the mobile computing device 102, or performed by a processor external to the mobile computing device 102. In some embodiments, the processor 110 is programmed to execute instructions such as those illustrated in the figures (e.g., FIG. 2).

In some embodiments, the processor 110 represents an implementation of analog techniques to perform the operations described herein. For example, the operations may be performed by an analog computing device and/or a digital computing device.

The mobile computing device 102 further has one or more computer readable media such as the memory area 112. The memory area 112 includes any quantity of media associated with or accessible by the mobile computing device 102. The memory area 112 may be internal to the mobile computing device 102 (as shown in FIG. 1), external to the mobile computing device 102 (not shown), or both (not shown). In some embodiments, the memory area 112 includes read-only memory and/or memory wired into an analog computing device.

The memory area 112 stores, among other data, one or more applications 114 such as application #1 through application #N. The applications 114, when executed by the processor 110, operate to perform functionality on the mobile computing device 102. Exemplary applications 114 include mail application programs, web browsers, calendar application programs, address book application programs, messaging programs, media applications, location-based services, search programs, and the like. The applications 114 may communicate with counterpart applications or services such as the web services 108 accessible via the network 109. For example, the applications 114 may represent downloaded client-side applications that correspond to server-side services executing in a cloud.

Each of the applications 114 has one or more identifiers 113 associated therewith. The identifiers 113 are allocated to the applications 114 on demand in some embodiments. For example, the applications 114 register at least one identifier 113, unique among the other identifiers 113, with the data transfer service 121, operating system, or other entity that tracks the network data consumption. Applications 114 may register additional identifiers 113 to increase the granularity of resource tracking (e.g., a mail program may register different identifiers 113 for different mail accounts, a browser may register different identifiers 113 for different web sites, etc.).

The identifiers 113 enable the applications 114 (e.g., containing applications) to attribute the origination of data transfer requests 115. For example, a browser application may have separate identifiers 113 for each of the web sites that originate a data transfer request 115 (e.g., Web Site A is assigned a particular identifier 113, Web Site B is assigned a particular identifier 113, etc.). The identifiers 113 correspond, for example, to one or more of the following: at least one of the applications 114, at least one application type, at least one service, and at least one service type. For example, a particular identifier 113 may correspond to a service that uses one of the applications 114 (e.g., a web site downloading data via a browser).

The mobile computing device 102 further establishes and maintains one or more network connections 130 representing communication channels or other means for sending and/or receiving data over the network 109. Exemplary network connections 130 include, but are not limited to, Wi-Fi, cellular, tethered, BLUETOOTH brand communication, near-field communication (NFC), and more. The network connections 130 may also be categorized into voice, text, data, or other categories or types of network traffic.

The memory area 112 further stores the data transfer service 121. The data transfer service 121, when executed by the processor 110, receives and processes one or more data transfer requests 115 from the applications 114. For example, and as described further below with reference to FIG. 2, the data transfer service 121 receives one of the data transfer requests 115, adds the received data transfer request 115 to a data transfer queue 123, and processes the data transfer queue 123 to initiate the queued data transfer requests 115.

The memory area 112 further stores data describing at least one data usage plan 116 associated with the user 104. In some embodiments, the memory area 112 stores a plurality of data usage plans 116. The data describing the data usage plans 116 may be received from the mobile operators 111 offering the data usage plans 116.

The data usage plan 116 may be represented by a schema (e.g., an extensible markup language schema) or other data structure. For example, the user 104 has contracted with the mobile operator 111 to receive network data transfer services from the mobile operator 111. The data usage plan 116 describes the services provided by the mobile operator 111, such as the amount of network data the user 104 can consume during a particular duration (e.g., a billing time period). For example, the data usage plan 116 describes threshold values 118 associated with the network connections 130 of one or more devices of the user 104. The threshold values 118 represent a maximum amount of network data consumption allotted under the data usage plan 116 for the network connections 130. For example, one threshold value 118 may indicate a maximum amount of network data consumption for a Wi-Fi connection, while another threshold value 118 indicates a maximum amount of network data consumption for a cellular data connection.

The schema or other data structure representing the data usage plan 116 may be defined by the web service 108, by the mobile operator 111, or by another entity. In some embodiments, each of the various data usage plans 116 subscribed to by the mobile computing device 102 and the other computing devices 106 use the same common schema. In general, the schema enables descriptions of the parts, components, services, features, or other aspects of the data usage plan 116 including, but not limited to, multi-rate data plans, peak times, roaming rates, allotted network data consumption per network connection 130, etc. In some embodiments, use of the schema allows the mobile operators 111 to send out updated portions of the schema corresponding to updated parts of a particular data usage plan 116.

In some embodiments, the schema includes a plurality of fields. Each of the threshold values 118 may be associated with one or more of the fields. For example, the fields may correspond to one or more of the following: peak times, off-peak times, peak time network data consumption quota, off-peak time network data consumption quota, peak time network data consumption remaining, off-peak time network data consumption remaining, a roaming rate, rules, a mobile operator name, a billing cycle type, a network connection type, identification of free hosts available for connection, a list of mobile hotspots, and any other elements or information pertaining to the data usage plan 116. The list of free hosts represents zero-rated or reduced cost hosts (e.g., visiting particular web sites does not count against the data usage plan 116).

The schema may also include fields supporting different billing rates per host accessed, per weekend, per night, friends and family rates, peak and off-peak rates, and more. The schema also allows each mobile operator 111 the flexibility to define complex plans including broadly offered plans, and dynamic, short-term offers to specific users 104 likely to use a specific part or parts of the overall services. Other offers based on any combination of the metrics obtained are available to the mobile operator 111.

The schema stored by the mobile computing device 102 may also include fields corresponding to the data usage statistics 120 collected, generated, or received by the mobile computing device 102 and/or the mobile operators 111. For example, to facilitate sharing the data usage statistics 120 among the mobile operators 111, web service 108, and/or user computing devices, the mobile operators 111, web service 108, and the user computing devices may populate the schema with the data usage statistics 120.

The memory area 112 further stores the data usage statistics 120 relating to one or more of the data usage plans 116. The data usage statistics 120 may be viewed as a current or instant snapshot of the amount of network data transmitted and/or received by the mobile computing device 102. For example, the mobile computing device 102 collects ongoing usage data relating to network data transfers, such as from device radios, drivers, and accelerometers of the mobile computing device 102. The data usage statistics 120 identify, to a granularity of time (e.g., per minute) or data (e.g., per kilobyte), how much data has been sent and/or received by the mobile computing device 102, the time and date of usage (e.g., start and end times), the location of usage, network interface used (e.g., over which network connections 130), roaming state, data usage plan information, the subscriber identity module (SIM) or other user identity module used for dual SIM scenarios, the international mobile station equipment identity (IMEI) or other device identifier for multi-device scenarios, the Internet protocol (IP) address or other address of the access point used for Wi-Fi scenarios, the IP address or other address of a target computer (e.g., for whitelist/blacklists in data usage), the application responsible for the data transfer, and the like. In a further example, information relating to text messages, data, voice calls, minutes used, voice over Internet Protocol (VoIP) usage, and any other element of usage consumed by, or that impacts, the mobile computing device 102 is collected to produce the data usage statistics 120. Other data usage statistics 120 are also contemplated.

The data usage statistics 120 may be collected by the mobile computing device 102, the web service 108, and/or the mobile operators 111. For example, the data usage statistics 120 may be compiled directly (e.g., by monitoring network traffic) and/or by collecting the data usage statistics 120 from other devices that perform the collection. In the example of FIG. 1, the data transfer service 121 executing on the mobile computing device 102 collects the data usage statistics 120 relating to the applications 114 executing on the mobile computing device 102.

Alternatively or in addition, the mobile computing device 102 receives updates of network data consumption by the other computing devices 106 sharing the same data usage plan 116. For example, the data usage statistics 120 may represent the network data collectively consumed by the mobile telephone 602, tablet, and laptop of the user 104. In the example of FIG. 1, the data transfer service 121 updates the data usage statistics 120 stored in the memory area 112 with the network data consumption by the other computing devices 106.

In a further example, the data transfer service 121 collects data usage statistics 120 corresponding to a plurality of data usage plans 116. In such an example, there may be a plurality of sets of data usage statistics 120 (e.g., one set for each data usage plan 116 or user 104) for the mobile computing device 102.

The memory area 112 further stores exemplary computer-executable components such as a communications interface component 126, a queue component 128, a usage component 122, and a user interface component 124. Operation of the computer-executable components, when executed, is described below with reference to FIG. 2.

Referring next to FIG. 2, an exemplary flow chart illustrates operation of the data transfer service 121 executing on a computing device to perform data transfer operations associated with a plurality of applications 114 executing on the computing device. The data transfer service 121 executes on the computing device to perform data transfer operations associated with the applications 114 also executing on the computing device. While the operations illustrated in FIG. 2 are described in some embodiments as being performed by the data transfer service 121 executing on the mobile computing device 102 or other computing device, the operations may be performed by any service executing on the computing device also executing the applications 114 from which the data transfer requests 115 are received. Further, the operations illustrated in FIG. 2 may be performed at an operating system level or an application program level.

At 202, the data transfer service 121 or other entity (e.g., an operating system executing on the computing device) allocates at least one of the identifiers 113 to each of the applications 114. For example, the data transfer service 121 may receive a request from one of the applications 114 to allocate a particular quantity of identifiers 113 to allocate to that application 114.

On receiving at least one of the data transfer requests 115 from at least one of the applications 114 by the data transfer service 121 at 204, the data transfer service 121 adds the received data transfer request 115 to the data transfer queue 123 or other data structure at 206. The data transfer request 115 may be stored in any way and in any form for processing by the data transfer service 121. Each received data transfer request 115 includes, or has attributed thereto, one of the identifiers 113. The included identifier 113 is associated with the application 114 that originated the data transfer request 115.

In some embodiments, the data transfer service 121 defines a data transfer request data structure. In other embodiments, another entity (e.g., an operating system executing on the computing device) defines the data transfer request data structure. The data transfer service 121 provides, or otherwise makes available, the defined data transfer request data structure to the applications 114 executing on the computing device. Each of the applications 114 populates the data transfer request data structure with at least one of the data transfer requests 115 and the identifier 113 attributed thereto or otherwise associated with origination or creation of the data transfer request 115. For example, each populated data transfer request data structure is associated with one of the data transfer requests 115. In another example, a single data transfer request data structure includes a plurality of the data transfer requests 115 each having at least one of the identifiers 113 attributed thereto.

Example implementations for associating the identifiers 113 with the data transfer requests 115 are provided in Appendix A. In particular, the identifier 113 may be added as a separate field in existing data structures, or the identifier 113 may be included within an existing field.

At 208, the data transfer service 121, or other entity executing on the mobile computing device 102, processes the data transfer queue 123 to initiate or otherwise perform the queued data transfer requests 115. At 210, the data transfer service 121 generates the data usage statistics 120 based on the performed data transfer requests 115. For example, the data usage statistics 120 are generated per identifier 113 to enable analysis of the amount of network data consumption associated with each of the identifiers 113. For example, at 212, the generated data usage statistics 120 are presented to the user 104 of the computing device for review. The presented data usage statistics 120 may be grouped by identifier 113 to enable the user 104 to identify the application 114 or subpart of the application 114 that originated the greatest amount of network data transfers. For example, the identifiers 113 are sorted in decreasing order of network data consumption corresponding thereto. In another example, the generated data usage statistics 120 are compared to the threshold values 118 of the data usage plan 116 to enable the user 104 to identify the amount of current network data consumption relative to the allotment under the data usage plan 116.

At least because the data transfer service 121 executes on the computing device to communicate with the plurality of applications 114 also executing on the computing device, the data transfer service 121 is able to maintain the attribution of the data transfer requests 115 even after the application 114 originating the data transfer requests 115 has stopped executing. For example, a browser may execute to send a data transfer request 115 to the data transfer service 121 and then terminate execution before the data transfer request 115 is fulfilled, completed, initiated, or otherwise processed by the data transfer service 121. In such an example, at least because the data transfer request 115 includes the identifier 113, the data transfer service 121 is able to identify the application 114 or subpart of the application 114 that originated the data transfer request 115.

In some embodiments, the computing device may store, or have access to, the computer-executable components stored in the memory area 112 illustrated in FIG. 1 that implement one or more of the operations illustrated in FIG. 2. For example, the communications interface component 126, when executed by the computing device, receives at least one data transfer request 115 from at least one of the applications 114. For example, the communications interface component 126 may receive a data transfer request 115 from a web browser. The received data transfer request 115 has attributed thereto an identifier 113 associated with a web site originating the data transfer request 115 through the web browser.

In some embodiments, the communications interface component 126 includes a network interface card and/or computer-executable instructions (e.g., a driver) for operating the network interface card. In some embodiments, the communications interface is operable with near-field communication (NFC) tags.

The queue component 128, when executed by the computing device, initiates the data transfer requests 115 received by the communications interface component 126. The usage component 122, when executed by the computing device, generates the data usage statistics 120 per identifier 113 based on the data transfer requests 115 initiated or otherwise performed by the queue component 128. In some embodiments, the usage component 122 groups the data transfer requests 115 received by the communications interface component 126 by type of application 114 (e.g., mail applications, video player applications, music player applications, etc.).

The user interface component 124, when executed by the computing device, presents the data usage statistics 120 generated by the usage component 122 to the user 104 of the computing device. In some embodiments, the user interface component 124 includes a graphics card for displaying data to the user 104 and for receiving data from the user 104. The user interface component 124 may also include computer-executable instructions (e.g., a driver) for operating the graphics card. Further, the user interface component 124 may include a display (e.g., a touch screen display or natural user interface) and/or computer-executable instructions (e.g., a driver) for operating the display. The user interface component 124 may also include one or more of the following to provide data to the user 104 or receive data from the user 104: speakers, a sound card, a camera, a microphone, a vibration motor, one or more accelerometers, a BLUETOOTH brand communication module, global positioning system (GPS) hardware, and a photoreceptive light sensor. For example, the user 104 may input commands or manipulate data by moving the mobile computing device 102 in a particular way.

The communications interface component 126 may execute independently of the other computer-executable components (e.g., not sequentially, or without interaction or dependency on another component). For example, the communications interface component 126 may be executed by a thread separate from other thread(s) executing the queue component 128, the usage component 122, and/or the user interface component 124.

Referring next to FIG. 3, an exemplary user interface 302 illustrates network data usage by different types of network connections 130 and by application 114. While the proportions of the user interfaces 302, 402, 502, 504, 506 illustrated in FIG. 3, FIG. 4, FIG. 5A, FIG. 5B, and FIG. 5C are shown to conform to a screen of the mobile computing device 102 (e.g., the mobile telephone 602), the content displayed within the user interfaces 302, 402, 502, 504, 506 may be shown in any format on any of the user computing devices.

In FIG. 3, data usage for a plurality of the network connections 130 is shown to the user 104 in the user interface 302. In particular, data usage statistics 120 attributed to each of the exemplary network connections 130 is shown. For example, the amounts of data transmitted and/or received over a cellular network connection, a tethered network connection, a Hotspot network connection, and a Wi-Fi network connection are shown. The amounts of data are represented by horizontal bars sized proportionally to the corresponding amounts of data transmitted and/or received.

The user interface 302 also displays the threshold values 118 associated with each of the network connections 130. The threshold values 118 are taken from the data usage plan 116. For example, the data usage plan 116 indicates that the user 104 has a maximum of 5 gigabytes (GB) of data usage available for the cellular network connection, 2 GB of data usage for the tethered network connection, 1 GB of data usage for the Hotspot network connection, and an unlimited amount of data usage for the Wi-Fi network connection.

The user interface 302 in FIG. 3 may also display a button or bar that, when selected by the user 104 (e.g., clicked or touched), the user interface 302 allows the user 104 to select options or other configuration settings for receiving notifications. The notifications are sent when the amounts of data transmitted and/or received over the various network connections 130 reaches particular values (e.g., set by the user 104, mobile computing device 102, mobile operator 111, or other entity).

In the bottom portion of the user interface 302, the data usage statistics 120 are shown per application 114. For example, the amount of network data consumed by each of a video player, a music player, a music synchronization application, and a radio application is shown. The amounts of network data consumed are represented by horizontal bars sized proportionally to the corresponding amounts of data transmitted and/or received.

Referring next to FIG. 4, an exemplary user interface 402 illustrates network data usage per application 114 and identifiers 113 associated with the applications 114. In the example of FIG. 4, the user interface 402 displays network data consumption over cellular and Wi-Fi networks for each of four applications 114 executing on the mobile computing device 102: Application A has consumed 5 megabytes (MB) of cellular data and 15 MB of Wi-Fi data, Application B has consumed 4 MB of cellular data and 9 MB of Wi-Fi data, Application C—Web Site #1 has consumed 5 MB of cellular data and 5 MB of Wi-Fi data, and Application C—Web Site #2 has consumed 6 MB of cellular data and 4 MB of Wi-Fi data. While the user interface 402 in FIG. 4 illustrates only cellular and Wi-Fi data consumption, the network data used over other networks 109 may be displayed alternatively or in addition. Further, the applications 114 may be ranked in order of total bandwidth consumption (e.g., total network data consumption) or consumption by network or connection type (e.g., cellular, Wi-Fi, etc.).

In the example of FIG. 4, Application C (e.g., a browser) has at least two identifiers 113 allocated thereto: an identifier for Web Site #1 and an identifier for Web Site #2. In this manner, rather than merely viewing an aggregate amount of network data consumed by Application C, the user 104 is able to view the amount of network data consumed on behalf of each web site displayed through Application C.

In some embodiments (not shown), the user interface 402 may show consumption of resources other than network data, such as power and/or memory consumption by each of the applications 114.

Referring next to FIG. 5A, an exemplary user interface 502 illustrates network data usage per application 114 under the data usage plan 116 with a monthly limit. The user interface 502 displays a set of the applications 114 executing on the mobile computing device 102 (e.g., the applications 114 consuming the greatest amount of network data, the applications 114 frequently or recently selected by the user 104 for execution, etc.). In the example of FIG. 5A, the set of applications 114 includes a music player, a video player, a radio application, and a mail application. The term “music player” is underlined in FIG. 5A, indicating that the user 104 has chosen to view the data usage statistics 120 associated with the music player application. Clicking on the other applications 114 displays the data usage statistics 120 associated with the other applications 114.

While the overviews of data usage illustrated in FIG. 5A, FIG. 5B, and FIG. 5C indicate that the data usage statistics 120 shown are per application 114, the user interfaces 502, 504, 506 may alternatively or in addition display an overview of aggregated data usage across the applications 114 on the mobile computing device 102. Further, the user interfaces 502, 504, 506 may alternatively or in addition display an overview of data usage per computing device of the user 104 or aggregated across a plurality of the computing devices of the user 104. For example, the different statistics may be shown in different tabs or tiles in the user interfaces 502, 504, 506. In an example involving a family or shared data plan, the statistics for each plan member may be shown in separate tiles.

Further, in addition to overall cellular data usage and overall Wi-Fi data usage, aspects of the disclosure may show subsets of the data usage generally corresponding to various tariff levels. For example, for the cellular data usage, the data usage at each of the following tariff levels may be shown: local, roaming, and/or international. As another example, for the wireless local area network, the data usage at each of the following tariff levels may be shown: hotspot, remote, paid, and/or free.

In FIG. 5A, the data usage statistics 120 include the amount of network data remaining for use (e.g., the remainder of the monthly limit specified by the data usage plan 116), the amount of network data used during the current billing period, and the quantity of time (e.g., days) remaining within the current billing period. The data usage statistics 120 also indicate a breakout of the data usage, such as the amount of data consumed under a cellular network connection versus the amount of data consumed under a Wi-Fi network connection.

Referring next to FIG. 5B, an exemplary user interface 504 illustrates network data usage per application 114 under a pay-as-you-go data usage plan 116. In FIG. 5B, the data usage statistics 120 include the amount of network data consumption remaining for use (e.g., the remainder of the pay-as-you-go amount specified by the data usage plan 116), the amount of network data consumed recently (e.g., within the last 30 days), and the quantity of time (e.g., days) remaining. For example, the remaining network data consumption expires in 16 days. The data usage statistics 120 also indicate a breakout of the data usage, such as the amount of data consumed under a cellular network connection versus the amount of data consumed under a Wi-Fi network connection.

Referring next to FIG. 5C, an exemplary user interface 506 illustrates network data usage per application 114 under the data usage plan 116 with unlimited data usage. In FIG. 5C, the data usage statistics 120 include the amount of network data consumed recently (e.g., within the last 30 days). The data usage statistics 120 also indicate a breakout of the data usage, such as the amount of data consumed under a cellular network connection versus the amount of data consumed under a Wi-Fi network connection. The data usage statistics 120 also indicate a total amount of usage by the mobile computing device 102.

The usage component 122, data transfer service 121, or other component or module provides a set of application programming interfaces (APIs) to correlate the identifier 113 associated with a particular data transfer request 115 to the application 114 that originated the data transfer request 115. For example, from an example identifier 113 of “3^(rd) Party App:Game 1”, aspects of the disclosure map this example identifier 113 to the actual application name, localized text, icons, etc. for display purposes, such as in the user interfaces 502, 504, 506.

The user interfaces 502, 504, and 506 enable the user 104 to instantly view and interpret the amount of network data being consumed by particular applications 114 or groups of applications 114. For example, when the user 104 views the network data consumption for the video player application, the user 104 may conclude that the video player application consumes much of the network data usage allotted under the data usage plan 116. The user 104 may then decide to watch fewer videos to preserve some network data consumption for the end of the billing cycle, and to stop worrying about excess data fees.

From the user interfaces 502, 504, 506 or elsewhere during the interaction between the user 104 and the mobile telephone 602, the user 104 is able to pin any of the applications 114 to a start or home screen of the mobile telephone 602 to view the network data usage information in real-time from the start screen.

In some embodiments, the data usage statistics 120 include an average of the network data consumption per time of day, for each of the applications 114. The user interfaces 502, 504, 506 may display such an average, alternatively or in addition to other data usage statistics 120.

Referring next to FIG. 6, an exemplary block diagram illustrates the mobile computing device 102 having tiles for displaying network data usage statistics 120 to the user 104. The mobile telephone 602 displays a plurality of tiles (e.g., active tiles) that may be updated with the data usage statistics 120. In some embodiments, tiles represent tile user interface elements. In one of the tiles in the example of FIG. 6, the mobile telephone 602 indicates that 78% of the allotment for text messages has been consumed, while 55% of the allotment for data usage has been consumed.

In another tile, the data usage statistics 120 associated with a particular application 114 and the cellular network connection are displayed. In the example of FIG. 6, 26% of the allotment for cellular data transmissions by Application A has been consumed.

In another tile, the real-time or instant usage of cellular network data by any of the applications 114 is shown. In the example of FIG. 6, the tile indicates that 0% of the allotment is currently being used (e.g., cellular connectivity is disabled). The user 104 may find this tile useful when the user 104 is worried that the mobile telephone 602 might connect to a cellular network and incur data charges. The pinned tile enables the user 104 to confirm in real-time that the no such data use is occurring.

Additional Examples

In some embodiments, the applications 114 may define timers and/or events to start and stop attribution of the data transfer requests 115. For example, a particular application 114 may attribute data transfer requests 115 during peak times but not off-peak times because the data usage plan 116 includes free off-peak data transfers.

Some embodiments contemplate separate broker services executing on the mobile computing device 102 for uploading and downloading data to/from the mobile computing device 102. For example, a communication service downloads feeds/emails from different user accounts (e.g., social networking, mail, etc.). A background download service receives requests from different applications 114 and schedules the downloads. Both the communication service and the background download service attribute network data usage to the requesting applications 114 even though these broker services actually execute the network data transfer.

The identifier 113 may be tagged on a per-socket basis. In such embodiments, network traffic that occurs between the initial connection of the socket and final closure of the socket is exclusively attributed to an identifier associated with that socket. If the application 114 uses more than one socket, the network activities in that application 114 are separately attributed to each socket.

At least a portion of the functionality of the various elements in FIG. 1 may be performed by other elements in FIG. 1, or an entity (e.g., processor, web service, server, application program, computing device, etc.) not shown in FIG. 1.

In some embodiments, the operations illustrated in FIG. 2 may be implemented as software instructions encoded on a computer readable medium, in hardware programmed or designed to perform the operations, or both. For example, aspects of the disclosure may be implemented as a system on a chip or other circuitry including a plurality of interconnected, electrically conductive elements.

The term “roaming” as used herein refers, in some embodiments, to connectivity provided outside a subscriber's home zone that may be subject to additional tariffs, fees, or constraints. Roaming service may or may not be provided by the same mobile operator 111. The term “tethered” as used herein refers, in some embodiments, to situations where one device acts as an access point for another device for network access. A tethered connection may occur over a wired connection or a wireless connection. The term “Wi-Fi” as used herein refers, in some embodiments, to a wireless local area network using high frequency radio signals for the transmission of data. The term “BLUETOOTH” as used herein refers, in some embodiments, to a wireless technology standard for exchanging data over short distances using short wavelength radio transmission. The term “cellular” as used herein refers, in some embodiments, to a wireless communication system using short-range radio stations that, when joined together, enable the transmission of data over a wide geographic area. The term “NFC” as used herein refers, in some embodiments, to a short-range high frequency wireless communication technology for the exchange of data over short distances.

Embodiments have been described with reference to data monitored and/or collected from users 104. In some embodiments, notice may be provided to the users 104 of the collection of the data (e.g., via a dialog box or preference setting) and users 104 are given the opportunity to give or deny consent for the monitoring and/or collection. The consent may take the form of opt-in consent or opt-out consent.

Exemplary Operating Environment

Exemplary computer readable media include flash memory drives, digital versatile discs (DVDs), compact discs (CDs), floppy disks, and tape cassettes. By way of example and not limitation, computer readable media comprise computer storage media and communication media. Computer storage media include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media are tangible and are mutually exclusive to communication media. In some embodiments, computer storage media are implemented in hardware. Exemplary computer storage media include hard disks, flash drives, and other solid-state memory. In contrast, communication media typically embody computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and include any information delivery media.

Although described in connection with an exemplary computing system environment, embodiments of the disclosure are capable of implementation with numerous other general purpose or special purpose computing system environments, configurations, or devices.

Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with aspects of the invention include, but are not limited to, mobile computing devices, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, gaming consoles, microprocessor-based systems, set top boxes, programmable consumer electronics, mobile telephones, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. Such systems or devices may accept input from the user 104 in any way, including from input devices such as a keyboard or pointing device, via gesture input, and/or via voice input.

Embodiments of the invention may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. The computer-executable instructions may be organized into one or more computer-executable components or modules. Generally, program modules include, but are not limited to, routines, programs, objects, components, and data structures that perform particular tasks or implement particular abstract data types. Aspects of the invention may be implemented with any number and organization of such components or modules. For example, aspects of the invention are not limited to the specific computer-executable instructions or the specific components or modules illustrated in the figures and described herein. Other embodiments of the invention may include different computer-executable instructions or components having more or less functionality than illustrated and described herein.

Aspects of the invention transform a general-purpose computer into a special-purpose computing device when configured to execute the instructions described herein.

The embodiments illustrated and described herein as well as embodiments not specifically described herein but within the scope of aspects of the invention constitute exemplary means for enabling attribution of the data transfer requests 115 by the plurality of applications 114 in communication with the data transfer service 121 executing on the mobile computing device 102.

The order of execution or performance of the operations in embodiments of the invention illustrated and described herein is not essential, unless otherwise specified. That is, the operations may be performed in any order, unless otherwise specified, and embodiments of the invention may include additional or fewer operations than those disclosed herein. For example, it is contemplated that executing or performing a particular operation before, contemporaneously with, or after another operation is within the scope of aspects of the invention.

When introducing elements of aspects of the invention or the embodiments thereof, the articles “a,” “an,” “the,” and “said” are intended to mean that there are one or more of the elements. The terms “comprising,” “including,” and “having” are intended to be inclusive and mean that there may be additional elements other than the listed elements. The term “exemplary” is intended to mean “an example of” The phrase “one or more of the following: A, B, and C” means “at least one of A and/or at least one of B and/or at least one of C.”

Having described aspects of the invention in detail, it will be apparent that modifications and variations are possible without departing from the scope of aspects of the invention as defined in the appended claims. As various changes could be made in the above constructions, products, and methods without departing from the scope of aspects of the invention, it is intended that all matter contained in the above description and shown in the accompanying drawings shall be interpreted as illustrative and not in a limiting sense.

Appendix A

In some embodiments, a subProcessTag is overloaded to implement network data usage attribution as described herein. For example, the subProcessTag is used to attribute network data usage to individual services running within the same service host process. In operation, the subProcessTag on the current thread is temporarily overwritten by a custom tag right before establishing one of the network connections 130. The original value of the subProcessTag may be restored once the connection has been made.

Aspects of the disclosure map application data (e.g., product identifier, name, icon, etc.) to the identifier 113 for association with the data transfer request 115. For example, when the data transfer service 121 retrieves feeds from a social networking account, the data transfer service 121 performs the following exemplary operations:

 ULONG originalTagValue = SetCustomValueOnSubProcessTag(Comms.SocialNetworkingWebSite);  HttpRequest.Open(...);  RestoreOriginalValueOnSubProcessTag(originalTagValue);  HttpRequest.Send(...);

The subProcessTag is further propagated between threads executing on the mobile computing device 102, in some embodiments, to enable support for asynchronous operation.

In another example, the network data attribution identifier 113 may be included in a three-tuple or triplet as (ProcessIdentifier, ApplicationIdentifier, NetworkDataAttributionIdentifier). The NetworkDataAttributionIdentifier represents a custom tag identifying the application, or portion or entity associated therewith, that originates the data transfer request 115.

In still another example, the ApplicationIdentifier tag in the two-tuple (ProcessIdentifier, ApplicationIdentifier) is modified to be ApplicationIdentifier:NetworkDataAttributionIdentifier, thus including the application identifier and the network data attribution identifier 113. 

What is claimed is:
 1. A method comprising: monitoring active network interfaces to track data usage of a plurality of applications executing on a mobile computer, wherein each of the plurality of applications is associated with one or more identifiers including a unique identifier; generating data usage statistics per unique identifier of an application of a subset of the plurality of applications, based on data transfers performed by the mobile computer based on data transfer requests from the application of the subset of the plurality of applications executing on the mobile computer, wherein each data transfer request includes information about a unique identification of a particular application that originated the data transfer request, wherein the unique identifier is different from a network identifier associated with a network connection; and displaying the generated data usage statistics per unique identifier of each application of the subset of the plurality of applications.
 2. The method of claim 1, wherein the generated data usage statistics provide network data consumed for each application of the subset of the plurality of applications.
 3. The method of claim 1, wherein the generated data usage statistics identify which network interface is being used for data usage.
 4. The method of claim 1, wherein displaying the generated data usage statistics comprises sorting the generated data usage statistics application in decreasing order of network data consumption.
 5. The method of claim 1, further comprising receiving a request from the application of the subset of the plurality of applications to register the unique identifier with a service that tracks data consumption.
 6. The method of claim 1, further comprising: receiving data transfer requests from one or more of the plurality of applications; identifying a unique identifier associated with each of the data transfer requests; and identifying the one or more applications based on the identified unique identifiers.
 7. The method of claim 6, further comprising: adding the received data transfer requests to a queue; and processing the queue to initiate the data transfer requests.
 8. A system for tracking network data usage for a plurality of applications executing on a mobile computing device, the system comprising: a memory area associated with the mobile computing device, the memory area storing the plurality of applications; and a processor programmed to: monitor active network interfaces to track data usage of the plurality of applications, wherein each of the plurality of applications is associated with one or more identifiers including a unique identifier; generate data usage statistics per unique identifier of an application of a subset of the plurality of applications, based on data transfers performed by the mobile computing device based on data transfer requests from the application of the subset of the plurality of applications executing on the mobile computing device, wherein each data transfer request includes information about a unique identification of a particular application that originated the data transfer request, wherein the unique identifier is different from a network identifier associated with a network connection; and display the generated data usage statistics per unique identifier of each application of the subset of the plurality of applications.
 9. The system of claim 8, wherein the generated data usage statistics represent network data consumed for each application of the subset of the plurality of applications.
 10. The system of claim 8, wherein the generated data usage statistics identify which network interface is being used for data usage.
 11. The system of claim 8, wherein displaying the generated data usage statistics comprises sorting the generated data usage statistics application identifier in decreasing order of network data consumption.
 12. The system of claim 8, wherein the processor is further programmed to receive a request from the application of the subset of the plurality of applications to register the unique identifier with a service that tracks data consumption.
 13. The system of claim 8, wherein the processor is further programmed to: receive data transfer requests from one or more of the plurality of applications; identify a unique identifier associated with each of the data transfer requests; and identify the one or more applications based on the identified unique identifiers.
 14. The system of claim 13, wherein the processor is further programmed to: add the received data transfer requests to a queue; and process the queue to initiate the data transfer requests.
 15. One or more computer-readable storage devices comprising computer-executable instructions, that when executed by one or more processors, cause the one or more processors to: monitor active network interfaces to track data usage of a plurality of applications executed on a mobile computing device, wherein each of the plurality of applications is associated with one or more identifiers including a unique identifier; generate data usage statistics per unique identifier of an application of a subset of the plurality of applications, based on data transfers performed by the mobile computing device based on data transfer requests from the application of the subset of the plurality of applications executing on the mobile computing device, the performed data transfer requests being processed at the mobile computing device, wherein each data transfer request includes information about a unique identification of a particular application that originated the data transfer request, wherein the unique identifier is different from a network identifier associated with a network connection; and displaying the generated data usage statistics per unique identifier of each application of the subset of the plurality of applications.
 16. The one or more computer-readable storage devices of claim 15, wherein the generated data usage statistics represent network data consumed for each application of the subset of the plurality of applications.
 17. The one or more computer-readable storage devices of claim 15, wherein the generated data usage statistics identify which network is being used for data usage.
 18. The one or more computer-readable storage devices of claim 15, wherein displaying the generated data usage statistics comprises sorting the generated data usage statistics per application in decreasing order of network data consumption.
 19. The one or more computer-readable storage devices of claim 15, wherein the computer-executable instructions further cause the one or more processors to receive a request from the application of the subset of the plurality of applications to register the unique identifier with a service that tracks data consumption.
 20. The one or more computer-readable storage devices of claim 15, wherein the computer-executable instructions further cause the one or more processors to: receive data transfer requests from one or more of the plurality of applications; identify a unique identifier associated with each of the data transfer requests; identify the one or more applications based on the identified unique identifiers; add the received data transfer requests to a queue; and process the queue to initiate the data transfer requests. 