Security techniques for device assisted services
First Claim
1. A system, comprising:
- one or more modems for enabling a communications device to communicate over at least a first wireless network and a second wireless network;
one or more processors of the communications device configured to;
determine that the communications device is connected to the first wireless network;
based on the determination that the communications device is connected to the first wireless network, implement a first service profile executed at least in part in a secure execution environment, the first service profile for assisting control of usage by the communications device of a service over the first wireless network, wherein the service profile includes one or more service policy settings, at least one of the one or more service policy settings for assisting in controlling access to the service over the first wireless network; and
monitor an attempted or successful use of the service over the first wireless network; and
memory of the communications device coupled to the one or more processors and configured to provide the one or more processors with instructions.
2 Assignments
0 Petitions
Accused Products
Abstract
Security techniques for device assisted services are provided. In some embodiments, secure service measurement and/or control execution partition is provided. In some embodiments, implementing a service profile executed at least in part in a secure execution environment of a processor of a communications device for assisting control of the communications device use of a service on a wireless network, in which the service profile includes a plurality of service policy settings, and wherein the service profile is associated with a service plan that provides for access to the service on the wireless network; monitoring use of the service based on the service profile; and verifying the use of the service based on the monitored use of the service.
-
Citations
62 Claims
-
1. A system, comprising:
-
one or more modems for enabling a communications device to communicate over at least a first wireless network and a second wireless network; one or more processors of the communications device configured to; determine that the communications device is connected to the first wireless network; based on the determination that the communications device is connected to the first wireless network, implement a first service profile executed at least in part in a secure execution environment, the first service profile for assisting control of usage by the communications device of a service over the first wireless network, wherein the service profile includes one or more service policy settings, at least one of the one or more service policy settings for assisting in controlling access to the service over the first wireless network; and monitor an attempted or successful use of the service over the first wireless network; and memory of the communications device coupled to the one or more processors and configured to provide the one or more processors with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62)
-
-
24. A method, comprising:
-
determining that a communications device capable of connecting to a first wireless network and to a second wireless network is connected to the first wireless network; based on determining that the communications device is connected to the first wireless network, implementing a first service profile executed at least in part in a secure execution environment of the communications device, the first service profile for assisting control of usage by the communications device of a service over the first wireless network, wherein the service profile includes one or more service policy settings for assisting in controlling access to the service over the first wireless network; and monitoring an attempted or successful use of the service over the first wireless network.
-
-
25. A computer program product, the computer program product being embodied in a non-transitory computer readable storage medium and comprising computer instructions for:
-
determining that a communications device capable of connecting to a first wireless network and to a second wireless network is connected to the first wireless network; based on determining that the communications device is connected to the first wireless network, implementing a first service profile executed at least in part in a secure execution environment of the communications device, the first service profile for assisting control of usage by the communications device of a service over the first wireless network, wherein the service profile includes one or more service policy settings for assisting in controlling access to the service over the first wireless network; and monitoring an attempted or successful use of the service over the first wireless network.
-
Specification