IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0380759
(2009-03-02)
|
등록번호 |
US-8089898
(2012-01-03)
|
발명자
/ 주소 |
|
출원인 / 주소 |
- Headwater Partners I, LLC
|
대리인 / 주소 |
Sheppard Mullin Richter & Hampton LLP
|
인용정보 |
피인용 횟수 :
0 인용 특허 :
46 |
초록
▼
Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device implements a service policy for assisting control of the communications device use of a service on a network; and monitors use of the service based on the service pol
Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device implements a service policy for assisting control of the communications device use of a service on a network; and monitors use of the service based on the service policy, in which the implementation of the service policy is verified.
대표청구항
▼
1. A system, comprising: an end user device including: an access modem configured to communicate with an access network that provides a network service;memory configured to store a local service control policy; anda policy implementation agent configured to implement the local service control policy
1. A system, comprising: an end user device including: an access modem configured to communicate with an access network that provides a network service;memory configured to store a local service control policy; anda policy implementation agent configured to implement the local service control policy on the end user device, the local service control policy for assisting in control of the end user device's use of the network service on the access network; andan access control integrity element configured to: obtain a first measure of the end user device's usage of the network service;verify whether the policy implementation agent is properly implementing a proper service control policy by determining whether the first usage measure is consistent with the proper service control policy being properly implemented on the end user device; andidentify the end user device as being not compliant when the first usage measure is not consistent with the proper service control policy being properly implemented on the end user devicewherein the end user device further includes: a first service monitor configured to monitor use of the network service by the end user device, wherein the first service monitor is configured to: classify usage into a plurality of categories, each category corresponding to a different network service provided by the access network; anddetermine a second usage measure for each category, wherein the second usage measures are provided to the access control integrity element for comparing to the first usage measure. 2. The system recited in claim 1, wherein the end user device is a mobile end user device, and the network service includes one or more Internet-based services. 3. The system recited in claim 1, wherein the policy implementation agent is located in the access modem. 4. The system recited in claim 1, wherein the access control integrity element is located in the end user device. 5. The system recited in claim 1, wherein the access control integrity element is located in the access network. 6. The system recited in claim 1, wherein the access control integrity element is on the end user device, and wherein a billing agent on the end user device is configured to bill a service account associated with the end user device or a user of the end user device for a service cost overage when the use of the network service by the end user device exceeds a service usage limit setting stored locally in the end user device, wherein the service usage limit setting is associated with a service usage level record stored in a network device. 7. The system recited in claim 1, wherein the end user device is configured to: measure service usage at a plurality of points in a data path in the end user device, and wherein the access control integrity element is configured to: compare the measured service usage at the plurality of points to each other; anddetermine whether the end user device is noncompliant based on the comparison of the respective measured service usages. 8. The system recited in claim 1, wherein the end user device is configured to: compare the monitored use of the network service by the end user device to the local service control policy; andcontrol use of the network service by the end user device based on the comparison, wherein the policy implementation agent is used to implement the control, and wherein the monitored use is different than the first usage measure. 9. The system recited in claim 1, wherein the policy implementation agent is configured to: perform traffic shaping if the end user device is identified as not being compliant with the proper service control policy being properly implemented on the end user device. 10. The system of claim 1, wherein at least one of the policy implementation agent and the local service control policy are susceptible to compromise, and wherein a compromised state results in the end user device being identified as not compliant. 11. The system of claim 1, wherein the access control integrity element includes an access control integrity server on a network device, the access control integrity server configured to affect the continued use or cost of the network service when the access control integrity server identifies the end user device as not being compliant with the proper service control policy being properly implemented on the end user device. 12. The system of claim 1, wherein the access control integrity element is configured to determine whether the first usage measure is consistent with the proper service control policy being properly implemented on the end user device by comparing the first usage measure to one or more parameters of a service control policy setting, the one or more parameters defining compliant usage of the network service by the end user device. 13. The system of claim 12, wherein the one or more parameters of the proper service control policy include a range of expected usage of the network service by the end user device. 14. The system of claim 13, wherein the expected usage includes at least one of a total amount of usage, an amount of data in a period of time, and a number of times the network service is accessed. 15. The system of claim 13, wherein the range is determined by a statistical analysis of patterns of usage of the network service. 16. The system of claim 12, wherein the one or more parameters of the service control policy setting define an expected service activity behavior for the end user device's use of the network service. 17. The system of claim 12, wherein the access control integrity element is configured to verify implementation of the policy implementation agent based on comparisons of a plurality of usage measures to a plurality of parameters of the service control policy setting. 18. The system of claim 12, wherein the one or more parameters include at least one of a limit on a total usage of the first service, a limit on a rate of usage of the first service, URLs or IP addresses that are blocked, and URLs or IP addresses that are permissible. 19. The system of claim 12, wherein the access control integrity element is configured to determine a projected usage based on the first usage measure, and wherein the comparing the first usage measure to the one or more parameters of the service control policy setting includes comparing the projected usage to the one or more parameters. 20. The system of claim 12, wherein the access control integrity element is further configured to compare the second usage measures against one or more parameters of a service control policy setting. 21. The system of claim 1, further comprising: a network measurement device on the access network, wherein the network measurement device is configured to determine the first measure of usage of the network service by the end user device. 22. The system of claim 1, wherein the end user device further includes a secure measurement device configured to generate the first usage measure. 23. The system of claim 1, wherein the access control integrity element includes an access control integrity agent that is on the end user device and that is inaccessible to a user of the end user device. 24. The system of claim 1, wherein the first service monitor is further configured to determine a third measure of the usage of the access network, andwherein the access control integrity element is configured to: receive the third usage measure; andcompare the third usage measure to the first usage measure to determine whether a difference is within a tolerance limit;compare the first usage measure and/or the third usage measure to a limit on usage; orcompare the first usage measure and/or the third usage measure to an expected usage. 25. The system of claim 1, wherein the access control integrity element is configured to cause the policy implementation agent to alter continued use or cost of the network service when the first usage measure is determined to be not consistent with the proper service control policy being properly implemented on the end user device. 26. The system of claim 1, wherein the access control integrity element is configured to cause a notification of a noncompliance condition to be provided to a user of the end user device when the first usage measure is determined to be not consistent with the proper service control policy being properly implemented on the end user device. 27. The system of claim 1, wherein the policy implementation agent implements a local service control policy specific to each category. 28. The system of claim 1, wherein the access control integrity element is configured to: aggregate the second usage measures to obtain an aggregate result; andcompare the aggregate result to the first usage measure. 29. The system of claim 1, wherein the end user device is configured to receive the local service control policy from the access network. 30. A system, comprising: an end user device including: an access modem configured to communicate with an access network that provides a network service;memory configured to store a service policy;a policy implementation agent configured to implement the service policy, the service policy for assisting in providing a service plan for the end user device's use of the network service on the access network;a service monitor agent configured to: monitor the end user device's use of the network service based on the service policy;measure service usage of the network service by the end user device;classify the service usage into a plurality of categories, each category corresponding to a different network service provided by the access network; anddetermine control channel information based on the service usage for each category, anda service control device link configured to transmit at least a portion if the control channel information over a control channel in response to a trigger, the trigger being based on an amount of service usage of the network service by the end user device since a last transmission of control channel information. 31. The system recited in claim 30, wherein the control channel is a secure communication channel. 32. The system recited in claim 30, wherein the service control device link is further configured to transmit the control channel information over the control channel in response to another trigger, wherein the another trigger is a minimum amount of time between transmissions. 33. The system recited in claim 30, wherein the amount of service usage of the network service by the end user device is a number of messages. 34. A method, comprising: obtaining a first measure of usage of a network service on an access network by an end user device, the end user device including a policy implementation agent configured to implement a local service control policy on the end user device, the local service control policy for assisting in control of the end user device's use of the network service on the access network;obtaining a second usage measure for each of a plurality of categories, each category corresponding to a different network service provided by the access network to the end user device;comparing at least one of the second usage measures to the first usage measure;verifying whether the implementation of the local service control policy is compliant by determining whether the first usage measure is consistent with a proper service control policy being properly implemented on the end user device; andidentifying the end user device as being not compliant when the first usage measure is not consistent with the proper service control policy being properly implemented on the end user device. 35. The method recited in claim 34, wherein the first usage measure is a network-based service usage measure, and wherein verifying whether the implementation of the local service control policy is compliant is performed in a service controller in the access network. 36. The method recited in claim 35, wherein the implementation of the local service control policy is further verified by comparing the network-based service usage measure to a device-assisted service usage measure sent by the end user device. 37. The method recited in claim 34, further comprising: performing a responsive action if the end user device is identified as not being compliant with the local service control policy. 38. The method recited in claim 37, wherein the responsive action includes one or more of the following: quarantine the end user device, suspend the end user device, bill for a service usage overage, route or copy device traffic to a device behavior analysis function, and notify a network manager or network troubleshooting function. 39. The method recited in claim 34, wherein verifying whether the first usage measure is consistent with the proper service control policy being properly implemented on the end user device is determined in the access network. 40. The method of claim 34, wherein the determining whether the first usage measure is consistent with the proper service control policy being properly implemented on the end user device includes: comparing the first usage measure to one or more parameters of a service control policy setting, the one or more parameters defining a compliant usage of the network service by the end user device. 41. The method of claim 40, wherein the one or more parameters of the service control policy setting include a range of expected usage of the network service by the end user device. 42. The method of claim 41, wherein the range is determined by a statistical analysis of patterns of usage of the network service. 43. The method of claim 40, wherein the one or more parameters of the service control policy setting define an expected service activity behavior for the end user device's use of the network service. 44. The method of claim 40, wherein determining whether the first usage measure is consistent with the proper service control policy being properly implemented on the end user device includes: comparing a plurality of usage measures to a plurality of parameters of the service control policy setting. 45. The method of claim 40, further comprising: comparing the second usage measures to the one or more parameters of the service control policy setting. 46. The method of claim 34, further comprising: receiving a third measure of usage of the access network by the end user device, the third measure being measured by a service monitor on the end user device; andcomparing the third usage measure to the first usage measure to determine whether a difference is within a tolerance limit;comparing at least one of the first usage measure and the third usage measure to a limit on usage; orcomparing at least one of the first usage measure and the third usage measure to an expected usage. 47. The method of claim 34, wherein comparing the at least one of the second usage measures to the first usage measure includes: aggregating the plurality of second usage measures to obtain an aggregate result; andcomparing the aggregate result to the first usage measure. 48. A computer program product, the computer program product being embodied in a non-transitory computer readable storage medium and comprising computer instructions executable by a processor for: obtaining a first measure of usage of a network service on an access network by a end user device, the end user device including a policy implementation agent configured to implement a local service control policy on the end user device, the local service control policy for assisting in control of the end user device's use of the network service on the access network;obtaining a second usage measure for each of a plurality of categories, each category corresponding to a different network service provided by the access network to the end user device;comparing at least one of the second usage measures to the first usage measure;verifying whether the implementation of the local service control policy is compliant by determining whether the first usage measure is consistent with a proper service control policy being properly implemented on the end user device; andidentifying the end user device as being not compliant when the first usage measure is not consistent with the proper service control of policy being properly implemented on the end user device. 49. A system comprising: a service controller on an access network, the access network providing a network service to an end user device, the end user device including a policy implementation agent configured to implement a local service control policy on the end user device, the local service control policy for assisting in control of the end user device's use of the network service on the access network,the service controller configured to verify whether the policy implementation agent is properly implementing a proper service control policy, the service controller including: an access control integrity server configured to: obtain a first measure of end user device's usage of the network service;obtain a second usage measure for each of a plurality of categories, each category corresponding to a different network service provided by the access network to the end user device;compare at least one of the second usage measures to the first usage measure;determine whether the first usage measure is consistent with the proper service control policy being properly implemented on the end user device; andidentify the end user device as being not compliant when the first usage measure is not consistent with the proper service control policy being properly implemented on the end user device. 50. The system of claim 49, wherein the access control integrity server is configured to determine whether the first usage measure is consistent with the proper service control policy being properly implemented on the end user device by comparing the first usage measure to one or more parameters of a service control policy setting, the one or more parameters defining a compliant usage of the network service by the end user device. 51. The system of claim 50, wherein the one or more parameters of the service control policy setting include a range of expected usage of the network service by the end user device. 52. The system of claim 51, wherein the range is determined by a statistical analysis of patterns of usage of the network service. 53. The system of claim 50, wherein the one or more parameters of the service control policy setting define an expected service activity behavior for the end user device's use of the network service. 54. The system of claim 50, wherein the access control integrity server is configured to verify the implementation of the policy implementation agent based on comparisons of the second usage measures to the one or more parameters of the service control policy setting. 55. The system of claim 50, wherein the access control integrity server is configured to determine a projected usage based on the first usage measure, and wherein comparing the first usage measure to the one or more parameters of the service control policy setting includes comparing the projected usage to the one or more parameters. 56. The system of claim 49, further comprising: a network measurement device on the access network, wherein the network measurement device is configured to determine the first measure of usage of the network service by the end user device, and wherein the access control integrity server is configured to obtain the first usage measure from the network measurement device. 57. The system of claim 49, wherein the access control integrity server is configured to: receive a third measure of usage of the access network by the end user device, the third measure being measured by a service monitor on the end user device; andcompare the third usage measure to the first usage measure to determine whether a difference is within a tolerance limit;compare at least one of the first usage measure and the third usage measure to a limit on usage; orcompare at least one of the first usage measure and the third usage measure to an expected usage. 58. The system of claim 49, wherein the access control integrity server is configured to: aggregate the second usage measures to obtain an aggregate result; andcompare the aggregate result to the first usage measure. 59. A system comprising: means for obtaining a first measure of usage of a network service on an access network by a end user device, the end user device including a policy implementation agent configured to implement a local service control policy on the end user device, the local service control policy for assisting in control of the end user device's use of the network service on the access network;means for obtaining a second usage measure for each of a plurality of categories, each category corresponding to a different network service provided by the access network to the end user device;means for comparing at least one of the second usage measures to the first usage measure;means for verifying whether the implementation of the local service control policy is compliant by determining whether the first usage measure is consistent with a proper service control policy being properly implemented on the end user device; andmeans for identifying the end user device as being not compliant when the first usage measure is not consistent with the proper service control policy being properly implemented on the end user device.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.