Security techniques for device assisted services
First Claim
1. A system, comprising:
- a processor of a communications device configured to;
implement a service profile executed at least in part in a secure execution environment for assisting control of the communications device use of a service on a wireless network, wherein the service profile includes a plurality of service policy settings, and wherein the service profile is associated with a service plan that provides for access to the service on the wireless network;
operate a host service control link in the secure execution environment to connect securely to a network service controller through a first control channel, the host service control link to receive one or more messages from the network service controller through the first control channel, and based on the one or more messages, to update one or more of the service policy settings;
monitor use of the service based on the service profile; and
verify the use of the service based on the monitored use of the service;
a memory of the communications device coupled to the processor and configured to provide the processor with instructions, the memory comprising a secure partition accessible only from the secure execution environment; and
a secure modem subsystem including;
a wireless modem to communicate with the wireless network;
a modem control link to connect securely to the network service controller through a second control channel.
2 Assignments
0 Petitions
Accused Products
Abstract
Security techniques for device assisted services are provided. In some embodiments, secure service measurement and/or control execution partition is provided. In some embodiments, implementing a service profile executed at least in part in a secure execution environment of a processor of a communications device for assisting control of the communications device use of a service on a wireless network, in which the service profile includes a plurality of service policy settings, and wherein the service profile is associated with a service plan that provides for access to the service on the wireless network; monitoring use of the service based on the service profile; and verifying the use of the service based on the monitored use of the service.
1446 Citations
12 Claims
-
1. A system, comprising:
-
a processor of a communications device configured to; implement a service profile executed at least in part in a secure execution environment for assisting control of the communications device use of a service on a wireless network, wherein the service profile includes a plurality of service policy settings, and wherein the service profile is associated with a service plan that provides for access to the service on the wireless network; operate a host service control link in the secure execution environment to connect securely to a network service controller through a first control channel, the host service control link to receive one or more messages from the network service controller through the first control channel, and based on the one or more messages, to update one or more of the service policy settings; monitor use of the service based on the service profile; and verify the use of the service based on the monitored use of the service; a memory of the communications device coupled to the processor and configured to provide the processor with instructions, the memory comprising a secure partition accessible only from the secure execution environment; and a secure modem subsystem including; a wireless modem to communicate with the wireless network; a modem control link to connect securely to the network service controller through a second control channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification