Deep packet inspection policy enforcement
First Claim
Patent Images
1. A method of operating a communication system, comprising:
- selecting a data packet from a flow of data traffic communicated between a wireless device and a network;
inspecting an attribute of the data packet, wherein the attribute includes an application indicator that is associated with an application on the wireless device;
based on the attribute, associating the data packet with at least one of a plurality of service levels;
based on the at least one service level, determining a network policy associated with the wireless device; and
,enforcing the network policy by causing a message to be sent to the wireless device instructing the wireless device to enter a dormant mode if the network policy indicates that the application has a low priority relative to other applications.
6 Assignments
0 Petitions
Accused Products
Abstract
A data packet is selected from a flow of data traffic communicated between a wireless device and a network. An attribute of the data packet is inspected to associate the packet with a profile. Based on the profile, a network policy associated with the wireless device is determined. The network policy may be enforced by causing a message to be sent to the wireless device instructing the wireless device to enter a dormant mode. The network policy may be enforced by causing a message to be sent to the wireless device that causes the wireless device to not request air-interface resources from a sector.
24 Citations
20 Claims
-
1. A method of operating a communication system, comprising:
-
selecting a data packet from a flow of data traffic communicated between a wireless device and a network; inspecting an attribute of the data packet, wherein the attribute includes an application indicator that is associated with an application on the wireless device; based on the attribute, associating the data packet with at least one of a plurality of service levels; based on the at least one service level, determining a network policy associated with the wireless device; and
,enforcing the network policy by causing a message to be sent to the wireless device instructing the wireless device to enter a dormant mode if the network policy indicates that the application has a low priority relative to other applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of operating a communication system, comprising:
-
selecting a data packet from a flow of data traffic communicated between a wireless device and a network; inspecting an attribute of the data packet, wherein the attribute includes an application indicator that is associated with an application on the wireless device; based on the attribute, associating the data packet with at least one of a plurality of service levels; based on the at least one service level, determining a network policy associated with the wireless device; and
,enforcing the network policy by causing a message to be sent to the wireless device that causes the wireless device to not request air-interface resources from a sector if the network policy indicates that the application has a low priority relative to other applications. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of operating a communication system, comprising:
-
selecting a data packet from a flow of data traffic communicated between a wireless device and a network; inspecting an attribute of the data packet, wherein the attribute includes an application indicator that is associated with an application on the wireless device; based on the attribute, associating the data packet with at least one of a plurality of service levels; based on the at least one service level, determining a network policy associated with the wireless device; enforcing the network policy by causing a message to be sent to the wireless device that causes the wireless device to not request air-interfaces from a sector; and
,enforcing the network policy by causing a message to be sent to the wireless device instructing the wireless device to enter a dormant mode if the network policy indicates that the application has a low priority relative to other applications. - View Dependent Claims (18, 19, 20)
-
Specification