Adapting network policies based on device service processor configuration
First Claim
Patent Images
1. A method performed by a network system, the method comprising:
- receiving a device credential from an end-user device communicatively coupled to the network system over a wireless access network;
obtaining a service policy based at least in part on the device credential, the service policy being applicable to the end-user device;
obtaining service processor authentication information associated with a service processor on the end-user device, the service processor comprising one or more device agents at least assisting to implement the service policy; and
using the service processor authentication information, facilitating execution of an end-user device service processor authentication procedure.
2 Assignments
0 Petitions
Accused Products
Abstract
A network system, comprising a communication interface enabling the network system to communicate with an end-user device over a wireless access network, and one or more network elements configured to receive a device credential from the end-user device, obtain a service policy based at least in part on the device credential, the service policy being applicable to the end-user device, obtain service processor authentication information associated with a service processor on the end-user device, and using the service processor authentication information, facilitate execution of an end-user device service processor authentication procedure.
874 Citations
33 Claims
-
1. A method performed by a network system, the method comprising:
-
receiving a device credential from an end-user device communicatively coupled to the network system over a wireless access network; obtaining a service policy based at least in part on the device credential, the service policy being applicable to the end-user device; obtaining service processor authentication information associated with a service processor on the end-user device, the service processor comprising one or more device agents at least assisting to implement the service policy; and using the service processor authentication information, facilitating execution of an end-user device service processor authentication procedure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification