NETWORK NODE AND METHOD TO CONTROL ROUTING OR BYPASSING OF DEPLOYED TRAFFIC DETECTION FUNCTION NODES
First Claim
Patent Images
1. A network node that participates in an Internet Protocol-Connectivity Access Network (IP-CAN) session establishment within a telecommunications network, the network node configured to:
- receive a user privacy policy of an end user, wherein the user privacy policy indicates whether or not data flows to and from a user equipment used by the end user are to be routed through a traffic detection function (TDF) node; and
utilize the user privacy policy during the IP-CAN session establishment to assign an IP address to the end user, wherein the assigned IP address ensures that the data flows to and from the user equipment are routed or not through a TDF node depending on the user privacy policy.
2 Assignments
0 Petitions
Accused Products
Abstract
A network is described herein which can control, through subscriber profile data and/or policy preconfigured control data, whether deep packet inspection for data flow/s for an Internet Protocol-Connectivity Access Network (IP-CAN) session established by an end user should take place, or not, according to a defined “User Privacy Policy”, and, in the former case, to which traffic detection function (TDF) node the data flow(s) should be directed.
-
Citations
24 Claims
-
1. A network node that participates in an Internet Protocol-Connectivity Access Network (IP-CAN) session establishment within a telecommunications network, the network node configured to:
-
receive a user privacy policy of an end user, wherein the user privacy policy indicates whether or not data flows to and from a user equipment used by the end user are to be routed through a traffic detection function (TDF) node; and utilize the user privacy policy during the IP-CAN session establishment to assign an IP address to the end user, wherein the assigned IP address ensures that the data flows to and from the user equipment are routed or not through a TDF node depending on the user privacy policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method implemented by a network node that participates in an Internet Protocol-Connectivity Access Network (IP-CAN) session establishment within a telecommunications network, the method comprising the steps of:
-
receiving a user privacy policy of an end user, wherein the user privacy policy indicates whether or not data flows to and from a user equipment used by the end user are to be routed through a traffic detection function (TDF) node; and utilizing the user privacy policy during the IP-CAN session establishment to assign an IP address to the end user, wherein the assigned IP address ensures that the data flows to and from the user equipment are routed or not through a TDF node depending on the user privacy policy. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A network node that participates in an Internet Protocol-Connectivity Access Network (IP-CAN) session establishment within a telecommunications network, the network node configured to:
-
receive a request for IP-CAN bearer establishment of an user equipment; send an indication of IP-CAN session establishment to a Policy and Charging Rules Function (PCRF), wherein the PCRF interfaces with a Subscription Profile Repository (SPR) to obtain subscriber related information including a user privacy policy which indicates whether or not data flows to and from the user equipment are to be routed through a traffic detection function (TDF) node; and receive an acknowledgment message from the PCRF, wherein the acknowledgment message includes a configuration option profile which is dependent upon the user privacy policy and defines and points to a set of local predefined PCEF configuration to be used for IP address allocation/IP configuration and subsequent routing of the data flows to and from the user equipment. - View Dependent Claims (22)
-
-
23. A method implemented by a network node that participates in an Internet Protocol-Connectivity Access Network (IP-CAN) session establishment within a telecommunications network, the method comprising the steps of:
-
receiving a request for IP-CAN bearer establishment of an user equipment; sending an indication of IP-CAN session establishment to a Policy and Charging Rules Function (PCRF), wherein the PCRF interfaces with a Subscription Profile Repository (SPR) to obtain subscriber related information including a user privacy policy which indicates whether or not data flows to and from the user equipment are to be routed through a traffic detection function (TDF) node; and receiving an acknowledgment message from the PCRF, wherein the acknowledgment message includes a configuration option profile which is dependent upon the user privacy policy and defines and points to a set of local predefined PCEF configuration to be used for IP address allocation/IP configuration and subsequent routing of the data flows to and from the user equipment. - View Dependent Claims (24)
-
Specification