CONTROLLING ACCESS TO AN OPERATOR NETWORK BY NON-CONFORMING DEVICES
First Claim
1. A device, comprising:
- one or more processors to;
receive an alarm message from a particular device that received a radio resource control request from a client device,the alarm message indicating that at least one of a threshold access limit to an operator network is satisfied by the client device or a particular protocol is being used by the client device;
determine a policy associated with the client device,the policy indicating a policy rule associated with a policy action to be taken if the policy rule is violated;
determine the policy rule is violated based on the alarm message received from the particular device; and
instruct the particular device to perform the policy action, by accepting or rejecting the radio resource control request, based on the policy rule being violated.
1 Assignment
0 Petitions
Accused Products
Abstract
A device is configured to receive an alarm message from a particular device that received a radio resource control request from a client device. The alarm message may indicate that a threshold access limit to an operator network is satisfied by the client device or that a particular protocol is being used by the client device. The device may determine a policy associated with the client device. The policy may indicate a policy rule associated with a policy action to be taken if the policy rule is violated. The device may determine the policy rule is violated based on the alarm message received from the particular device. The device may instruct the particular device to perform the policy action, by accepting or rejecting the radio resource control request, based on the policy rule being violated.
-
Citations
20 Claims
-
1. A device, comprising:
one or more processors to; receive an alarm message from a particular device that received a radio resource control request from a client device, the alarm message indicating that at least one of a threshold access limit to an operator network is satisfied by the client device or a particular protocol is being used by the client device; determine a policy associated with the client device, the policy indicating a policy rule associated with a policy action to be taken if the policy rule is violated; determine the policy rule is violated based on the alarm message received from the particular device; and instruct the particular device to perform the policy action, by accepting or rejecting the radio resource control request, based on the policy rule being violated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
13. A computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors, cause the one or more processors to; store a policy data structure indicating a policy associated with a client device, the policy indicating a policy rule associated with a policy action to be taken if the policy rule is violated by the client device, the policy rule indicating at least one of a threshold access limit to an operator network or that a particular protocol is restricted; receive a radio resource control request from the client device that requests a radio resource be assigned to the client device; determine whether the client device violates the policy rule indicated by the policy data structure; execute the policy action when the client device violates the policy rule; and selectively assign the radio resource to the client device based on executing the policy action. - View Dependent Claims (14, 15, 16)
-
17. A method, comprising:
-
storing, by a gateway device in an operator network, a policy data structure that indicates a policy associated with a client device, the policy indicating a policy rule associated with a policy action to be taken if the policy rule is violated, the policy rule indicating at least one of a threshold access limit to an operator network or that a particular protocol is restricted; receiving, by the gateway device, a message from an application server to be sent to the client device; determining, by the gateway device, whether the message causes the client device to violate the policy rule indicated by the policy data structure; executing, by the gateway device, the policy action when the message causes the client device to violate the policy rule; and selectively causing, by the gateway device, the message to be sent to the client device, via the operator network, based on executing the policy action. - View Dependent Claims (18, 19, 20)
-
Specification