Methods and apparatus for machine-to-machine based communication service classes
First Claim
1. A method of operating a wireless network, said method comprising:
- providing a first user station category; and
providing a second user station category;
wherein said operator of said wireless network implements a plurality of operating rules which at least partly differ based at least in part on whether a subscriber comprises said first or second user station categories.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus enabling a wireless network to provide differentiated services to a machine-to-machine (M2M) client. In one embodiment, the wireless network comprises a UMTS network, and the Home Location Register (HLR) entity identifies subscriptions as machine-to-machine (M2M) enabled devices based on flags or other descriptors associated with each M2M device, and imposes one or more rule sets (e.g., service restrictions) based on this identification. The classification of M2M devices within the HLR may optionally include additional capability or profile data for the M2M device (e.g. static, low mobility, low data activity, etc.). Various other network entities may use the M2M identification to modify the delivered data service, so as to optimize network resources. Furthermore, monitoring of M2M client behavior can be used to detect and notify the network operator of abnormal, fraudulent, or malicious activity. Business methods utilizing the aforementioned methods and apparatus are also disclosed.
266 Citations
41 Claims
-
1. A method of operating a wireless network, said method comprising:
-
providing a first user station category; and providing a second user station category; wherein said operator of said wireless network implements a plurality of operating rules which at least partly differ based at least in part on whether a subscriber comprises said first or second user station categories. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer readable apparatus comprising a storage medium adapted to store at least one computer program, said computer program which, when executed by a processing device, governs the operation of a subscriber in a wireless network by at least:
-
assigning a first user type to a network subscriber, said first user type comprising one of a plurality of user types which are at least partly different from one another; and implementing a set of operating rules for said network subscriber, said set of operating rules governed at least in part on said assigning of said first user type. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. Apparatus for use in a wireless network, comprising:
-
a digital processor; at least one network interface in data communication with said digital processor; and a memory storing at least one computer program, said at least one computer program comprising instructions which when executed by said digital processor, govern the operation of a subscriber in a wireless network according to the method comprising; reading a user category associated with a wireless network subscriber received via said at least one network interface; determining whether said user category is directed to an ordinary subscriber or an automated subscriber; and implementing one or more operator rules for said wireless network subscriber based at least in part on said act of determining. - View Dependent Claims (25, 26)
-
-
27. A method of regulating network access in a wireless network comprising at least one Machine-to-Machine (M2M) client device and a network entity, said method comprising:
-
providing a mobile subscriber category identifier to said at least one M2M client that distinguishes said M2M client from an ordinary subscriber; correlating said mobile subscriber category identifier with a unique identifier for said at least one M2M client; receiving an access attempt by said at least one M2M client, said access attempt comprising a request for a network service and said unique identifier; determining said mobile subscriber category identifier based in part on said unique identifier; and permitting or denying access to said wireless network based at least in part on the compatibility of said request for network service with said mobile subscriber category identifier. - View Dependent Claims (28, 29, 30)
-
-
31. A method of detecting unauthorized use of a wireless device within a wireless network, the method comprising:
-
assigning a classification to said device which is different than that for user devices within said network; monitoring the activity of said device according to one or more operating rules, said one or more rules being selected based at least in part on said classification; and based at least in part on said monitoring, implementing one or more actions relating to said device. - View Dependent Claims (32, 33, 34, 35)
-
-
36. A method of operating a wireless network having a plurality of M2M devices and a plurality of user devices associated therewith so as to frustrate theft of services, the method comprising:
-
marking or flagging individual ones of said M2M devices within the network to indicate that they belong to an M2M class; causing said M2M devices to each perform, if required, a location update operation during a prescribed time interval; and monitoring said M2M devices for location updates performed outside of said time interval.
-
-
37. A method of doing business in a wireless network, the method comprising:
-
establishing at least two classes of subscribers, a first of said at least two classes comprising a class for users meeting first criteria, and a second of said at least two classes comprising a class for users not meeting said first criteria; and offering a less costly subscription plan to users of said first class; wherein said criteria are such that less network resources are required to service said users of said first class than those of said second class. - View Dependent Claims (38, 39, 40, 41)
-
Specification