Security for network load broadcasts over cellular networks
First Claim
Patent Images
1. A method comprising:
- obtaining, by a processor of a policy server of a cellular network, cellular network load information, wherein the cellular network load information comprises a volume of a bandwidth used for user traffic and for control traffic by the cellular network;
encrypting, by the processor, the cellular network load information;
determining, by the processor, a decryption key for decrypting the cellular network load information that is encrypted; and
sending to an endpoint device, by the processor, the decryption key for decrypting cellular network load information and a policy of the cellular network that indicates how the endpoint device is permitted to respond to the cellular network load information, wherein the endpoint device is a phone, wherein the cellular network load information is sent via a broadcast message from the cellular network, wherein the policy is sent prior to the sending the cellular network load information, wherein the cellular network load information that is decrypted enables the endpoint device to perform a task responsive to the cellular network load information, wherein the task is performed based on the policy, wherein the task comprises switching the endpoint device between a usage of the cellular network and a usage of a non-cellular network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, computer readable medium and apparatus for obtaining cellular network load information in a secure manner are disclosed. For example, the method receives the cellular network load information, where the cellular network load information is encrypted. The method then decrypts the cellular network load information using a decryption key and performs a task responsive to the network load information that is decrypted.
-
Citations
20 Claims
-
1. A method comprising:
-
obtaining, by a processor of a policy server of a cellular network, cellular network load information, wherein the cellular network load information comprises a volume of a bandwidth used for user traffic and for control traffic by the cellular network; encrypting, by the processor, the cellular network load information; determining, by the processor, a decryption key for decrypting the cellular network load information that is encrypted; and sending to an endpoint device, by the processor, the decryption key for decrypting cellular network load information and a policy of the cellular network that indicates how the endpoint device is permitted to respond to the cellular network load information, wherein the endpoint device is a phone, wherein the cellular network load information is sent via a broadcast message from the cellular network, wherein the policy is sent prior to the sending the cellular network load information, wherein the cellular network load information that is decrypted enables the endpoint device to perform a task responsive to the cellular network load information, wherein the task is performed based on the policy, wherein the task comprises switching the endpoint device between a usage of the cellular network and a usage of a non-cellular network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium storing a plurality of instructions which, when executed by a processor of a policy server of a cellular network, cause the processor to perform operations, the operations comprising:
-
obtaining cellular network load information, wherein the cellular network load information comprises a volume of a bandwidth used for user traffic and for control traffic by the cellular network; encrypting the cellular network load information; determining a decryption key for decrypting the cellular network load information that is encrypted; and sending to an endpoint device the decryption key for decrypting cellular network load information and a policy of the cellular network that indicates how the endpoint device is permitted to respond to the cellular network load information, wherein the endpoint device is a phone, wherein the cellular network load information is sent via a broadcast message from the cellular network, wherein the policy is sent prior to the sending the cellular network load information, wherein the cellular network load information that is decrypted enables the endpoint device to perform a task responsive to the cellular network load information, wherein the task is performed based on the policy, wherein the task comprises switching the endpoint device between a usage of the cellular network and a usage of a non-cellular network. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus comprising:
-
a hardware processor of a policy server of a cellular network; and a non-transitory computer-readable medium storing a plurality of instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising; obtaining cellular network load information, wherein the cellular network load information comprises a volume of a bandwidth used for user traffic and for control traffic by the cellular network; encrypting the cellular network load information; determining a decryption key for decrypting the cellular network load information that is encrypted; and sending to an endpoint device the decryption key for decrypting cellular network load information and a policy of the cellular network that indicates how the endpoint device is permitted to respond to the cellular network load information, wherein the endpoint device is a phone, wherein the cellular network load information is sent via a broadcast message from the cellular network, wherein the policy is sent prior to the sending the cellular network load information, wherein the cellular network load information that is decrypted enables the endpoint device to perform a task responsive to the cellular network load information, wherein the task is performed based on the policy, wherein the task comprises switching the endpoint device between a usage of the cellular network and a usage of a non-cellular network. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification