Adapting network policies based on device service processor configuration
First Claim
Patent Images
1. A method of operating a network system comprising at least one server, the method comprising:
- receiving a notification from a cellular data network that a mobile device has gained or requested access to a cellular network data service;
in association with the notification, and during an authentication time period related to the receipt of the notification, wait for a corresponding request from a mobile device data traffic characterization agent for login and/or authentication;
when the mobile device data traffic characterization agent requests login and/or authentication during the authentication time period and properly logs in or authenticates, set up a data rating service for cellular data traffic of the mobile device in a first configuration that relies on data traffic characterization from the mobile device agent; and
when the mobile device agent fails to make during the authentication time period or successfully complete the corresponding request, set up the data rating service for cellular data traffic of the mobile device in a second configuration that operates without reliance on data traffic characterization from the mobile device agent.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.
-
Citations
8 Claims
-
1. A method of operating a network system comprising at least one server, the method comprising:
-
receiving a notification from a cellular data network that a mobile device has gained or requested access to a cellular network data service; in association with the notification, and during an authentication time period related to the receipt of the notification, wait for a corresponding request from a mobile device data traffic characterization agent for login and/or authentication; when the mobile device data traffic characterization agent requests login and/or authentication during the authentication time period and properly logs in or authenticates, set up a data rating service for cellular data traffic of the mobile device in a first configuration that relies on data traffic characterization from the mobile device agent; and when the mobile device agent fails to make during the authentication time period or successfully complete the corresponding request, set up the data rating service for cellular data traffic of the mobile device in a second configuration that operates without reliance on data traffic characterization from the mobile device agent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification