Devices and methods are disclosed for determining that a traffic flow of a wireless end-user device is associated with a first service activity that includes a data communication associated with a particular application of a plurality of applications on the wireless end-user device; assigning, to th
Devices and methods are disclosed for determining that a traffic flow of a wireless end-user device is associated with a first service activity that includes a data communication associated with a particular application of a plurality of applications on the wireless end-user device; assigning, to the traffic flow, a flow tag configured to assist in preserving the association of the traffic flow with the first service activity when the traffic flow is processed by one or more device functions that operate on the traffic flow; monitoring an attempted or successful wireless access network service usage associated with the flow tag, the determining, assigning, and monitoring occurring in any order; and, after determining that the traffic flow is associated with the first service activity, applying a first service policy to the attempted or successful wireless access network service usage.
대표청구항▼
1. A wireless end-user device comprising: one or more modems for enabling the end-user device to communicate over at least a first wireless access network;memory configured to store a first service policy to be applied when the wireless end-user device communicates or attempts to communicate over th
1. A wireless end-user device comprising: one or more modems for enabling the end-user device to communicate over at least a first wireless access network;memory configured to store a first service policy to be applied when the wireless end-user device communicates or attempts to communicate over the first wireless access network, the first service policy associated with a first service activity, the first service activity including a data communication associated with a particular application of a plurality of applications on the wireless end-user device; andone or more processors configured to perform the following steps, when the wireless end-user device communicates or attempts to communicate over the first wireless access network: determining that a traffic flow is associated with the first service activity, the traffic flow comprising one or more related data transfers or attempted data transfers,assigning a flow tag to the traffic flow, the flow tag configured to assist in preserving the association of the traffic flow with the first service activity when the traffic flow is processed by one or more device functions that operate on the traffic flow,monitoring an attempted or successful usage of the first wireless access network associated with the flow tag, the determining, assigning, and monitoring occurring in any order, andafter determining that the traffic flow is associated with the first service activity, applying the first service policy to the attempted or successful usage of the first wireless access network. 2. The wireless end-user device recited in claim 1, further comprising a user interface, and wherein the first service policy is configured to assist the one or more processors in presenting a notification associated with the first service activity through the user interface. 3. The wireless end-user device recited in claim 1, wherein the first service policy is configured to assist the one or more processors in determining a service usage measure associated with the first service activity. 4. The wireless end-user device recited in claim 1, wherein the first service policy is configured to assist the one or more processors in controlling a wireless access associated with the first service activity. 5. The wireless end-user device recited in claim 1, wherein at least one of the one or more modems is configured to enable the wireless end-user device to communicate over a second wireless access network,the memory is further configured to store a second service policy associated with the second wireless access network, the second service policy associated with the first service activity, andthe one or more processors are further configured to: determine that the wireless end-user device is communicating or attempting to communicate over the second wireless access network, andapply the second service policy when the wireless end-user device is communicating or attempting to communicate over the second wireless access network. 6. The wireless end-user device recited in claim 5, wherein the first wireless access network is a cellular network and the second wireless access network is a wireless fidelity (WiFi) network. 7. The wireless end-user device recited in claim 5, wherein the first wireless access network is a roaming network and the second wireless access network is a home network. 8. The wireless end-user device recited in claim 1, further comprising a user interface, and wherein the first service policy is configured to assist the one or more processors in: determining a service usage measure associated with the first service activity, andpresenting, through the user interface, information about the service usage measure. 9. The wireless end-user device recited in claim 1, further comprising a user interface, and wherein the first service policy is further configured to assist the one or more processors in: obtaining a user input through the user interface, the user input comprising an indication of a control to be applied to the first service activity, andapplying the control. 10. The wireless end-user device recited in claim 9, wherein the control is configured to assist in one or more of preventing, restricting, or allowing one or more communications associated with the first service activity over the first wireless access network. 11. The wireless end-user device recited in claim 9, wherein the control is configured to assist in limiting or allowing a first service activity aspect that is non-critical to a user of the wireless end-user device. 12. The wireless end-user device recited in claim 8, wherein the service usage measure comprises a measure of a first service activity aspect that is non-critical to a user of the wireless end-user device. 13. The wireless end-user device recited in claim 1, further comprising a user interface, and wherein the first service policy is configured to assist the one or more processors in: obtaining a service usage measure comprising a measure of a plurality of data communications over the first wireless access network, the plurality of data communications associated with one or more of the plurality of applications, andpresenting, through the user interface, information associated with the service usage measure. 14. The wireless end-user device recited in claim 13, wherein the first service policy is further configured to assist the one or more processors in obtaining a user input through the user interface, the user input comprising an indication of a limit setting associated with the one or more of the plurality of applications. 15. The wireless end-user device recited in claim 13, further comprising a user interface, and wherein the first service policy is further configured to assist the one or more processors in presenting a notification through the user interface when the service usage measure satisfies a condition relative to a limit setting. 16. The wireless end-user device recited in claim 14, wherein the first service policy is further configured to assist the one or more processors in controlling a wireless access usage when the service usage measure satisfies a condition relative to the limit setting. 17. The wireless end-user device recited in claim 1, wherein the first service activity comprises one or more of a content type, a file transfer, a voice over Internet protocol (IP) service, streaming media, and a video service. 18. The wireless end-user device recited in claim 1, wherein the one or more processors are further configured to: obtain a first service usage measure associated with the first service activity,obtain a second service usage measure associated with a second service activity, the second service activity comprising a data communication associated with a second application of the plurality of applications, andassist in presenting, through a user interface, a notification associated with the first service usage measure and the second service usage measure, the notification configured to assist a user of the wireless end-user device in determining a contribution to a service usage by one or more applications of the plurality of applications. 19. The wireless end-user device recited in claim 1, wherein the one or more processors are further configured to apply the first service policy in a secure software environment. 20. The wireless end-user device recited in claim 1, wherein the one or more processors are further configured to detect unauthorized software on the wireless end-user device. 21. The wireless end-user device recited in claim 1, wherein the first service policy is configured to assist the one or more processors in implementing a wireless access usage accounting associated with the first service activity, and the one or more processors are further configured to assist in sending the wireless access usage accounting to a network element. 22. The wireless end-user device recited in claim 1, wherein the one or more processors are further configured to obtain at least a portion of the first service policy from a network element. 23. The wireless end-user device recited in claim 1, wherein the first service policy is configured to assist in managing a quality of service (QoS) associated with the particular application. 24. The wireless end-user device recited in claim 1, wherein the one or more processors are further configured to assign the flow tag without inserting flow tag information into a traffic flow data communications path. 25. The wireless end-user device recited in claim 1, wherein the one or more processors are further configured to assign the flow tag at least in part by inserting information associated with the flow tag into a traffic flow data communications path. 26. The wireless end-user device recited in claim 1, wherein the first service policy is configured to assist in controlling a background activity. 27. The wireless end-user device recited in claim 26, wherein the background activity is a background download. 28. The wireless end-user device recited in claim 1, wherein: the first service policy is configured to assist the one or more processors in controlling a wireless access associated with the first service activity, andthe one or more processors include an application interface function configured to interact with the particular application to arrange an application setting, the application setting configured to assist in controlling the wireless access associated with the first service activity. 29. A method performed by a wireless end-user device, the method comprising: storing a first service policy to be applied when the wireless end-user device communicates or attempts to communicate over a first wireless access network, the first service policy associated with a first service activity, the first service activity including a data communication associated with one of a plurality of applications on the wireless end-user device;determining that a traffic flow is associated with the first service activity, the traffic flow comprising one or more related data transfers or attempted data transfers;assigning a flow tag to the traffic flow, the flow tag configured to assist in preserving the association of the traffic flow with the first service activity when the traffic flow is processed by one or more device functions that operate on the traffic flow;monitoring an attempted or successful usage of the first wireless access network associated with the flow tag, the determining, assigning and monitoring occurring in any order; andafter determining that the traffic flow is associated with the first service activity, applying the first service policy to the attempted or successful usage of the first wireless access network. 30. A wireless end-user device, comprising: means for storing a first service policy to be applied when the wireless end-user device communicates or attempts to communicate over a first wireless access network, the first service policy associated with a first service activity, the first service activity including a data communication associated with one of a plurality of applications on the wireless end-user device;means for determining that a traffic flow is associated with the first service activity, the traffic flow comprising one or more related data transfers or attempted data transfers;means for assigning a flow tag to the traffic flow, the flow tag configured to assist in preserving the association of the traffic flow with the first service activity when the traffic flow is processed by one or more device functions that operate on the traffic flow;means for monitoring an attempted or successful usage of the first wireless access network associated with the flow tag, the determining, assigning and monitoring occurring in any order; andmeans for applying the first service policy to the attempted or successful usage of the first wireless access network after determining that the traffic flow is associated with the first service activity.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (209)
Goldner, Alla, Access network discovery and selection and internet protocol multimedia system service architecture.
Jobs, Steven P.; Anzures, Freddy Allen; Ording, Bas; Chaudhri, Imran; Forstall, Scott; Christie, Greg; Lemay, Stephen O., Account information display for portable communication device.
Urban, Mark; Jackson, Simon Adrian; Lopez Perez, Daniel Jose; Hoareau, Christian; Sjoestroem, Martin Briand; Arvin, Rene, Adaptive correlation of service level agreement and network application performance.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Goldman, Jason D; Houck, Peter Thomas; Lachelt, David Jonathan; Roeling, Fredrick M; Stoecker, Paul A, Aggregated policy deployment and status propagation in network management systems.
Ruutu, Jussi; Costa-Requena, Jose; Kilkki, Kalevi; Korhonen, Ossi; Suoknuuti, Marko, Apparatus and method for providing quality of service for a network data connection.
Yano, Masashi; Matsui, Susumu; Yamamoto, Yoshinobu, Base station for multi-carrier TDMA mobile communication system and method for assigning communication channels.
Ayyagari,Deepak; Resheff,Samuel; Ephremides,Anthony, Capacity enhancement for multi-code CDMA with integrated services through quality of service and admission control.
Jackowski Steven J. ; Thomas Christopher N., Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control.
Roskowski, Steve; Kolm, David; Ruf, Michael P.; Jaquet, James R.; Othmer, Konstantin, Collection of data at target wireless devices using data collection profiles.
Ono, Yoshiyuki; Chujo, Kaoru; Fujino, Naoji, Communication-status notification apparatus for communication system, communication-status display apparatus, communication-status notification method, medium in which communication-status notificati.
Wu, Lizhong; Barker, Terrance Gordon; Desai, Vijay S., Computer-implemented modeling systems and methods for analyzing and predicting computer network intrusions.
Abu-Amara Hosame ; Babbitt Jeff ; Best Robert ; Boray Giridhar ; Lo Wing ; Maveddat Payam ; Qian Yi, Controlling communication in wireless and satellite networks.
Chowdhury, Amor; Breznik, Gregor; Verdnik, Klemen; Prihavec, Bor, Customer identification and authentication procedure for online internet payments using mobile phone.
Araujo, Wladimir; Sajedi, Mohammad H.; Ali, Altaf H., Dynamic service activation using COPS-PR to support outsourcing and configuration models for policy control.
Kannas, Chris; Sundell, Hans-Olof; Andersson, Rutger; Carlsson, Niclas; Holmstrom, Tomas, Dynamic upgrade of quality of service in a packet switched network.
Bartoli Paul D. ; Griesmer Stephen J. ; Lidor Gideon ; Ronen Yzhak ; Tessier Jean, Method and apparatus for billing for transactions conducted over the internet.
Edwards, Warren Keith; Newman, Mark Webster; Smith, Trevor Fredrick; Sedivy, Jana Zdislava; Marcelo, Karen; Izadi, Shahram; Hong, Jason I., Method and apparatus for dynamically delivering service profiles to clients.
Gai, Silvano; McCloghrie, Keith; Mohaban, Shai, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
Buhrmann Michael ; Montemayor Jane Elizabeth, Method and apparatus for providing telecommunication services based on a subscriber profile updated by a personal inform.
Jorgensen,Jacob W., Method and computer program product for internet protocol (IP)-flow classification in a wireless point to multi-point (PtMP) transmission system.
Prueitt, James K.; Pineau, Richard A.; Bernier, Kevin F.; Lynton, Todd M.; Wicker, Scott D., Method and system for generating a permanent record of a service provided to a mobile device.
Kim, Eun Ah; Yi, Jeong Hyun; Fomin, Alexey; Afanasyeva, Alexandria; Bezzateev, Sergey, Method and system for performing distributed verification with respect to measurement data in sensor network.
Motoyama, Tetsuro; Niro, Masaichi, Method and system for remote diagnostic, control and information collection based on various communication modes for sending messages to users.
Nordman, Ian; Alamaki, Tero; Vanska, Marko; Gyorbiro, Norbert; Gripenberg, Casper; Tarkiainen, Mikko, Method, system, and apparatus for providing services in a privacy enabled mobile and Ubicom environment.
Prendergast, Liam N.; O'Connor, Denis A.; Quinn, Liam B., Methods and systems for managing and/or tracking use of subscriber identity module components.
VanFleet, Steven L.; Benton, Blake; Byrne, Matthew T.; Horton, Timothy; Mascavage, III, John J.; Mollett, Cassandra J.; Nelson, Susan M.; Rogers, SuZanne; Sargent, Rhonda D.; Stivers, Martin; Trainor, Gary J.; Weichert, Margaret; Wing, Diane, Methods and systems for online transaction processing.
Huslak, Nicholas Steven; Anschutz, Thomas Arnold; Shrum, Jr., Edgar Vaughan, Methods and systems for providing video on demand over a communication network using managed quality of service, bandwidth allocation and/or user profiles.
Morford,Michael Robert, Methods, apparatuses and systems facilitating concurrent classification and control of tunneled and non-tunneled network traffic.
Kim,Myong Ju, Mobile communication terminal, wireless data service authentication server, system for automatically blocking voice call connection, and method of processing various messages in mobile communication terminal.
Kennewick, Robert A.; Locke, David; Kennewick, Sr., Michael R.; Kennewick, Jr., Michael R.; Kennewick, Richard; Freeman, Tom; Elston, Stephen F., Mobile systems and methods for responding to natural language speech utterance.
Weider, Chris; Kennewick, Richard; Kennewick, Mike; Di Cristo, Philippe; Kennewick, Robert A.; Menaker, Samuel; Armstrong, Lynn Elise, Mobile systems and methods of supporting natural language human-machine interactions.
Vanttila Jaakko,FIX ; Alanara Seppo,FIX ; Seppanen Jorma,FIX ; Vaihoja Juha,FIX ; Lietsalmi Mikko,FIX, Mobile terminal having network services activation through the use of point-to-point short message service.
Bogineni, Kalyani; Flynn, Gerard J.; Stone, Jr., William H.; Salas, Edward A., Multimedia next generation network architecture for IP services delivery based on network and user policy.
Thomas Christopher N. ; Jackowski Steven J. ; Brock Keven J., Ordering of multiple plugin applications using extensible layered service provider with network traffic filtering.
Anderson, Thomas W.; Liu, Chung-Zin; Lassers, Harold A.; Mathai, Stinson S., Packet filtering/classification and/or policy control support from both visited and home networks.
Necka, William; Fey, Igor; Akgun, Ali; Arutyunov, Yuri, System and method for a specialized dynamic host configuration protocol proxy in a data-over-cable network.
Bowen,Jerre F.; Mathkar,Anup R.; Mathur,Rajat; Syed,Samina M. A.; Weimer,Thomas W.; Bennett,James E.; Braganza,Carl W.; Dwivedi,Tarun, System and method for an access layer application programming interface for managing heterogeneous components of a storage area network.
Kozisek, Steven E., System and method for enabling subscribers of a communications carrier to access a network of wireless access points of subscribers of other communications carriers.
Garland Stuart M. ; Smith David B. ; Smith Matthew Richard, System for suppressed ringing access of subscriber lines to identify usage anomalies of customer premise equipment connected thereto.
Stewart, Hugh Donal; Sidebottom, Gregory Allan; Araujo, Wladimir de Lara Filho; Ries, Steffen Georg; Stevens, Scott Joseph, Systems and methods for providing quality assurance.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Technique for providing dynamic modification of application specific policies in a feedback-based, adaptive data network.
Makkonen Matti (Helsinki FIX) Pokka Tapani (Helsinki FIX) Lehto Markku (Helsinki FIX), Wireless private branch exchange system for use with mobile communication devices.
Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Attribution of mobile device data traffic to end-user application based on socket flows.
Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, End user device that secures an association of application to service policy with an application certificate check.
Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand, Enhanced curfew and protection associated with a device group.
Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand, Enhanced curfew and protection associated with a device group.
Annamalai, Magesh; Seckin, Gamze, Location continuity service for locating mobile devices using multiple access networks including wireless telecommunication networks.
Annamalai, Magesh; Seckin, Gamze, Location continuity service for locating mobile devices using multiple access networks including wireless telecommunication networks.
Annamalai, Magesh; Seckin, Gamze, Location continuity service for locating mobile devices using multiple access networks including wireless telecommunication networks.
Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand; James, Justin; Nguyen, Laurent An Minh, Method for child wireless device activation to subscriber account of a master wireless device.
Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy.
Kurian, Manu Jacob; Correro, Greg M.; Glassman, Andrew Benjamin; Abraham, Anish Z.; Anderson, Andy Lee; Hupfer, Glenn Edward; Sampath, Murali; Getachew, Kirubel, Pairing of devices for activation/deactivation of a paired device.
Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; James, Justin; Nguyen, Laurent An Minh; Carter, III, Russell Bertrand, Service plan design, user interfaces, application programming interfaces, and device management.
Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow.
Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Techniques for attribution of device data traffic to initiating end-user application.
Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Techniques for attribution of mobile device data traffic to initiating end-user application.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless device applying different background data traffic policies to different device applications.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with application program interface to allow applications to access application-specific aspects of a wireless network access policy.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list and applying foreground classification to roaming wireless data service.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list and applying foreground classification to wireless data service.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list applicable to one of several wireless modems.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list applicable to one of several wireless modems.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list having limited user control.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access and access status for background and foreground device applications.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access status for different device applications.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with network traffic API to indicate unavailability of roaming wireless connection to background applications.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with per-application data limit and traffic control policy list limiting background application traffic.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with policy-based controls for WWAN network usage and modem state changes requested by specific applications.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with wireless modem power state control policy for background applications.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.