Adapting Network Policies Based on Device Service Processor Configuration
First Claim
Patent Images
1. A network system, comprising:
- one or more network elements configured to receive a device credential from an end-user device; and
a service processor authentication and management system configured to;
obtain service processor authentication information, andusing the service processor authentication information, facilitate execution of an end-user device service processor authentication procedure.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.
-
Citations
31 Claims
-
1. A network system, comprising:
-
one or more network elements configured to receive a device credential from an end-user device; and a service processor authentication and management system configured to; obtain service processor authentication information, and using the service processor authentication information, facilitate execution of an end-user device service processor authentication procedure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An end-user device, comprising:
-
a modem for enabling the end-user device to access available network data services over an access network; one or more device credential sources configured to store a device credential; and a service processor configured to; enforce a device-based portion of a wireless access network service policy; and communicate with a network-based service controller to provide service processor authentication information configured to assist the network-based service controller in authenticating the service processor. - View Dependent Claims (14, 15)
-
-
16. A network system, comprising:
-
memory configured to store a trusted usage data report associated with an end-user device; and one or more network elements configured to; receive a usage data report from the end-user device; obtain the trusted usage data report associated with the end-user device; and reconcile the usage data report from the end-user device and the trusted usage data report associated with the end-user device. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A network system, comprising:
one or more network elements configured to; receive a data usage report associated with an end-user device from a good customer feedback source, and based on the data usage report from the good customer feedback source, reduce a bulk data usage amount associated with a user account.
-
24. A network system, comprising:
-
one or more network elements configured to detect a service usage indication associated with an end-user device; and a service controller configured to; determine that a device credential is intended to be associated with a service processor on the end-user device; receive the service usage indication associated with the end-user device; detect a specified condition; and declare a service processor integrity violation upon detecting the specified condition. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31)
-
Specification