Mobile content delivery via toll-free uniform resource locators
First Claim
1. A device, comprising:
- a communication interface;
a memory storing instructions; and
a processing unit that executes the instructions to;
connect, via the communication interface, to a network,intercept, from a mobile device via a cell tower serving the network, a content request destined for a content host device in the network, wherein the content request includes a uniform resource locator (URL) that is appended with a first signature generated at the mobile device using a first key of an asymmetric key pair associated with a toll-free data campaign,obtain a second key of the asymmetric key pair,extract the first signature from the URL,decrypt the first signature using the second key to obtain a block of data,encrypt the block of data using the first key to generate a second signature,compare the second signature with the first signature,deny toll-free network access to content associated with the URL when the second signature does not match the first signature,determine, when the second signature matches the first signature, whether data transfer charged to the toll-free data campaign has reached a data transfer limit allocated to the toll-free data campaign,meter, based on a determination that the data transfer limit has not been reached, data delivery associated with toll-free access of the content using the URL, andcharge, to the toll-free data campaign, the metered data delivery.
1 Assignment
0 Petitions
Accused Products
Abstract
A device associated with a cell tower in a Public Land Mobile Network receives, from a mobile device via a network, a uniform resource locator (URL) that is appended with a first signature generated at the mobile device using a private key of a public/private key pair associated with a toll-free campaign. The device obtains a public key of the public/private key pair, extracts the first signature from the URL, decrypts the first signature using the public key to obtain data, and encrypts the data using the private key to generate a second signature. The device compares the second signature with the first signature, denies toll-free network access to content associated with the URL when the second signature does not match the first signature, and designates data involved with accessing the content associated with the URL as being toll-free when the second signature matches the first signature.
-
Citations
20 Claims
-
1. A device, comprising:
-
a communication interface; a memory storing instructions; and a processing unit that executes the instructions to; connect, via the communication interface, to a network, intercept, from a mobile device via a cell tower serving the network, a content request destined for a content host device in the network, wherein the content request includes a uniform resource locator (URL) that is appended with a first signature generated at the mobile device using a first key of an asymmetric key pair associated with a toll-free data campaign, obtain a second key of the asymmetric key pair, extract the first signature from the URL, decrypt the first signature using the second key to obtain a block of data, encrypt the block of data using the first key to generate a second signature, compare the second signature with the first signature, deny toll-free network access to content associated with the URL when the second signature does not match the first signature, determine, when the second signature matches the first signature, whether data transfer charged to the toll-free data campaign has reached a data transfer limit allocated to the toll-free data campaign, meter, based on a determination that the data transfer limit has not been reached, data delivery associated with toll-free access of the content using the URL, and charge, to the toll-free data campaign, the metered data delivery. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory storage medium storing instructions executable by a computational device, wherein the instructions comprise instructions to cause the computational device to:
-
intercept, from a mobile device via a cell tower serving a network, a content request that is destined for a content host device in the network, wherein the content request includes a uniform resource locator (URL) that is appended with a first signature generated at the mobile device using a first key of asymmetric key pair that is associated with a toll-free data campaign; extract the first signature from the URL; validate the content request based on the extracted first signature; determine, based on the validation of the content request, whether data transfer charged to the toll-free data campaign has reached a data transfer limit allocated to the toll-free data campaign; meter, based on a determination that the data transfer limit has not been reached, data delivery associated with toll-free access of the content using the URL, and charge, to the toll-free data campaign, the metered data delivery. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
intercepting, by a device connected to a cell tower serving a network, a content request destined for a content host device in the network, wherein the content request includes a uniform resource locator (URL) that is appended with a first signature generated at a mobile device using a first key of an asymmetric key pair associated with a toll-free data campaign; obtaining, by the device, a second key of the asymmetric key pair; extracting, by the device, the first signature from the URL; decrypting, by the device, the first signature using the second key to obtain a block of data; encrypting, by the device, the block of data using the first key to generate a second signature; comparing, by the device, the second signature with the first signature; denying, by the device, toll-free network access to content associated with the URL when the second signature does not match the first signature; determining, by the device, when the second signature matches the first signature, whether data transfer charged to the toll-free data campaign has reached a data transfer limit allocated to the toll-free data campaign; metering, by the device and based on a determination that the data transfer limit has not been reached, data delivery associated with toll-free access of the content using the URL; and charging, by the device to the toll-free data campaign, the metered data delivery. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification