A method comprising inspecting a traffic flow associated with a device; identifying a requested access within the traffic flow; determining, based on one or more rules, whether the requested access is within a profile associated with a first service available to the device over a wireless network, t
A method comprising inspecting a traffic flow associated with a device; identifying a requested access within the traffic flow; determining, based on one or more rules, whether the requested access is within a profile associated with a first service available to the device over a wireless network, the profile identifying a network destination, an application on the device, or a content type, a first usage associated with the service being accounted for separately from a second usage associated with a second service available to the device; and if the requested access is within the profile, creating or modifying a record for assisting in accounting for a measure of the first usage to a sponsor entity responsible for at least subsidizing at least a portion of the first usage, wherein determining whether the requested access is within the profile comprises determining whether the requested access is associated with the service.
대표청구항▼
1. A method comprising: inspecting a traffic flow associated with an end-user device;identifying a requested access within the traffic flow;determining, based on a set of one or more access rules, whether the requested access is within a service profile associated with a first service available to t
1. A method comprising: inspecting a traffic flow associated with an end-user device;identifying a requested access within the traffic flow;determining, based on a set of one or more access rules, whether the requested access is within a service profile associated with a first service available to the end-user device over a wireless network, the service profile identifying a particular network destination, a particular application on the end-user device, a particular content type, or a combination of these, a first service usage associated with the first service being accounted for separately from a second service usage associated with at least one other service available to the end-user device over the wireless network; andif the requested access is within the service profile, creating or modifying a record, the record for assisting in accounting for at least a portion of a measure of the first service usage to a sponsor entity responsible for paying for or subsidizing at least a portion of the first service usage, the sponsor entity being an entity other than a user or subscriber associated with the end-user device,wherein determining, based on the set of one or more access rules, whether the requested access is within the service profile comprises determining whether the requested access is associated with the first service. 2. The method of claim 1, further comprising: applying one or more control rules to the requested access. 3. The method of claim 2, wherein the one or more control rules are configured to modify a transmission speed or limit a total amount of data transmitted. 4. The method of claim 2, wherein the one or more control rules are configured to provide a differentiated bandwidth or a differentiated data transfer limit to the requested access based on whether the requested access is a particular activity. 5. The method of claim 2, wherein the one or more control rules are based on a period of time, a network address, a service type, a content type, an application type, a quality-of-service (QoS) class, a time of day, a network busy state, a transmission speed, a bandwidth, a data usage, a rate of service usage, a policy limit, a number of transactions, or a user activity. 6. The method of claim 1, wherein determining whether the requested access is associated with the first service comprises determining whether the requested access is within a particular traffic flow, the particular traffic flow being associated with the first service. 7. The method of claim 1, wherein determining whether the requested access is associated with the first service comprises identifying a referred uniform resource locator (URL), a hyperlink reference (HREF), or a hypertext markup language (HTML) tag based on the requested access. 8. The method of claim 1, wherein determining whether the requested access is associated with the first service comprises performing a reverse lookup based on the requested access. 9. The method of claim 1, wherein determining whether the requested access is associated with the first service comprises monitoring: a total traffic, the particular application on the end-user device, a source, the particular network destination, a network socket, a time of day, a service profile categorization, a web browsing traffic pattern, a content download pattern, or a combination of these. 10. The method of claim 1, wherein determining whether the requested access is associated with the first service comprises determining whether the requested access is associated with an in-progress Internet protocol (IP) session or socket that is associated with the first service. 11. The method of claim 1, wherein the service profile identifies the particular application on the end-user device, and wherein determining whether the requested access is associated with the first service comprises determining whether the requested access is associated with the particular application on the end-user device. 12. The method of claim 1, wherein the service profile identifies the particular network destination, and wherein determining whether the requested access is associated with the first service comprises determining whether the requested access is associated with a referral from the particular network destination. 13. The method of claim 1, wherein determining whether the requested access is associated with the first service comprises determining whether the requested access is associated with a traffic usage pattern. 14. The method of claim 1, further comprising receiving side information from the end-user device, and wherein determining whether the requested access is associated with the first service comprises examining the side information. 15. The method of claim 14, wherein the side information comprises embedded information or information identifying a link or tunnel associated with the first service. 16. The method of claim 1, further comprising obtaining a header or field included in the traffic flow. 17. The method of claim 14, wherein the side information is received from the end-user device over a control channel or a secure network connection. 18. The method of claim 1, wherein the record is a record, and further comprising: if the requested access is not within the service profile, creating or modifying a second record. 19. The method of claim 18, wherein the second record is configured to account for at least a portion of traffic that is not associated with the first service. 20. The method of claim 18, further comprising performing a pro-rata allocation, based on information in the second record, to a plurality of entities, each of the plurality of entities responsible for paying for or subsidizing at least a portion of an end-user device service usage. 21. The method of claim 18, wherein the sponsor entity is a first sponsor entity, and wherein the second record assists in providing an accounting, to the user or subscriber or to a second sponsor entity, of at least a portion of a measure of the second service usage. 22. The method of claim 18, wherein the second record is configured to account for traffic that is likely to be associated with an ambient service, a user-paid service, or network overhead. 23. The method of claim 18, wherein the second record is configured to account for traffic that is not identified as being associated with an allowed service. 24. The method of claim 19, further comprising: monitoring an amount of traffic accounted for in the second record; andwhen the amount of traffic accounted for in the second record exceeds a limit, modifying one or more rules that allow, restrict, or control traffic accounted for in the second record. 25. The method of claim 19, further comprising: monitoring a growth of traffic accounted for in the second record; andwhen the growth of traffic accounted for in the second record exceeds a limit, modifying one or more rules that allow, restrict, or control traffic accounted for in the second record. 26. The method of claim 24, wherein the amount of traffic is measured as an amount of service usage charges. 27. The method of claim 25, wherein the rate of growth of traffic is measured as a rate of service usage. 28. The method of claim 1, wherein the side information comprises information about the first service usage, information about the record, information about the measure of the first service usage, or a combination of these. 29. The method of claim 1, wherein at least a portion of the method is performed by a network element communicatively coupled to the end-user device over the wireless network. 30. The method of claim 1, wherein at least a portion of the method is performed by the end-user device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (298)
Goldner, Alla, Access network discovery and selection and internet protocol multimedia system service architecture.
Jobs, Steven P.; Anzures, Freddy Allen; Ording, Bas; Chaudhri, Imran; Forstall, Scott; Christie, Greg; Lemay, Stephen O., Account information display for portable communication device.
Urban, Mark; Jackson, Simon Adrian; Lopez Perez, Daniel Jose; Hoareau, Christian; Sjoestroem, Martin Briand; Arvin, Rene, Adaptive correlation of service level agreement and network application performance.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Goldman, Jason D; Houck, Peter Thomas; Lachelt, David Jonathan; Roeling, Fredrick M; Stoecker, Paul A, Aggregated policy deployment and status propagation in network management systems.
Bang, Jung-Hee; Kang, Gyung-Mo; Cho, Young-Lan; Lee, Jong-Hyun, Apparatus and method for integrated billing management by real-time session management in wire/wireless integrated service network.
Ruutu, Jussi; Costa-Requena, Jose; Kilkki, Kalevi; Korhonen, Ossi; Suoknuuti, Marko, Apparatus and method for providing quality of service for a network data connection.
Yano, Masashi; Matsui, Susumu; Yamamoto, Yoshinobu, Base station for multi-carrier TDMA mobile communication system and method for assigning communication channels.
Chow, Albert T.; Erving, Richard Henry; Kim, Jinman; Miller, II, Robert Raymond; Russell, Jesse E.; Ying, Wenchu, Broadband network with enterprise wireless communication system for residential and business environment.
Ayyagari,Deepak; Resheff,Samuel; Ephremides,Anthony, Capacity enhancement for multi-code CDMA with integrated services through quality of service and admission control.
Jackowski Steven J. ; Thomas Christopher N., Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control.
Roskowski, Steve; Kolm, David; Ruf, Michael P.; Jaquet, James R.; Othmer, Konstantin, Collection of data at target wireless devices using data collection profiles.
Chow, Albert T.; Erving, Richard Henry; Kim, Jinman; Miller, II, Robert Raymond; Russell, Jesse E.; Ying, Wenchu, Computer readable medium with embedded instructions for providing communication services between a broadband network and an enterprise wireless communication platform within a residential or business environment.
Wu, Lizhong; Barker, Terrance Gordon; Desai, Vijay S., Computer-implemented modeling systems and methods for analyzing and predicting computer network intrusions.
Abu-Amara Hosame ; Babbitt Jeff ; Best Robert ; Boray Giridhar ; Lo Wing ; Maveddat Payam ; Qian Yi, Controlling communication in wireless and satellite networks.
Chowdhury, Amor; Breznik, Gregor; Verdnik, Klemen; Prihavec, Bor, Customer identification and authentication procedure for online internet payments using mobile phone.
Araujo, Wladimir; Sajedi, Mohammad H.; Ali, Altaf H., Dynamic service activation using COPS-PR to support outsourcing and configuration models for policy control.
Kannas, Chris; Sundell, Hans-Olof; Andersson, Rutger; Carlsson, Niclas; Holmstrom, Tomas, Dynamic upgrade of quality of service in a packet switched network.
Simon James Joyce TH; Prafulla C. Gupta ; Manohar S. Vaidya IN; Rajesh Alla IN; Ashok K. Reddy IN; Sree Ram Murphy Ayyala IN; Richa Gupta IN; Alok Kaushal IN; Jampana Lakshmi Jagannadha Siva , Enhanced communication platform and related communication method using the platform.
Proctor, Jr., James A.; Proctor, III, James A., Exchanging identifiers between wireless communication to determine further information to be exchanged or further services to be provided.
Martti, Jyrki; Mäkeläinen, Sami, Generating and providing access and content charges for different services to a user device in a communication system.
Bartoli Paul D. ; Griesmer Stephen J. ; Lidor Gideon ; Ronen Yzhak ; Tessier Jean, Method and apparatus for billing for transactions conducted over the internet.
Edwards, Warren Keith; Newman, Mark Webster; Smith, Trevor Fredrick; Sedivy, Jana Zdislava; Marcelo, Karen; Izadi, Shahram; Hong, Jason I., Method and apparatus for dynamically delivering service profiles to clients.
Gai, Silvano; McCloghrie, Keith; Mohaban, Shai, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
Wang,Jiwei R.; Jayant,Alin; Kadar,Vincent; Kim,Ken, Method and apparatus for providing service selection, redirection and managing of subscriber access to multiple WAP (Wireless Application Protocol) gateways simultaneously.
Buhrmann Michael ; Montemayor Jane Elizabeth, Method and apparatus for providing telecommunication services based on a subscriber profile updated by a personal inform.
Jorgensen,Jacob W., Method and computer program product for internet protocol (IP)-flow classification in a wireless point to multi-point (PtMP) transmission system.
Prueitt, James K.; Pineau, Richard A.; Bernier, Kevin F.; Lynton, Todd M.; Wicker, Scott D., Method and system for generating a permanent record of a service provided to a mobile device.
Xanthos, James; McDowell, Mark; Stead, Graham; Khalil, Joseph; Helinski, David; Kitchell, Joseph, Method and system for measuring data quality of service in a wireless network using multiple remote units and a back end processor.
Kim, Eun Ah; Yi, Jeong Hyun; Fomin, Alexey; Afanasyeva, Alexandria; Bezzateev, Sergey, Method and system for performing distributed verification with respect to measurement data in sensor network.
Motoyama, Tetsuro; Niro, Masaichi, Method and system for remote diagnostic, control and information collection based on various communication modes for sending messages to users.
Russell, Jesse E., Method, computer program, and algorithm for computing network service value pricing based on communication service experiences delivered to consumers and merchants over a smart multi-services (SMS) communication network.
Nordman, Ian; Alamaki, Tero; Vanska, Marko; Gyorbiro, Norbert; Gripenberg, Casper; Tarkiainen, Mikko, Method, system, and apparatus for providing services in a privacy enabled mobile and Ubicom environment.
Prendergast, Liam N.; O'Connor, Denis A.; Quinn, Liam B., Methods and systems for managing and/or tracking use of subscriber identity module components.
VanFleet, Steven L.; Benton, Blake; Byrne, Matthew T.; Horton, Timothy; Mascavage, III, John J.; Mollett, Cassandra J.; Nelson, Susan M.; Rogers, SuZanne; Sargent, Rhonda D.; Stivers, Martin; Trainor, Gary J.; Weichert, Margaret; Wing, Diane, Methods and systems for online transaction processing.
Huslak, Nicholas Steven; Anschutz, Thomas Arnold; Shrum, Jr., Edgar Vaughan, Methods and systems for providing video on demand over a communication network using managed quality of service, bandwidth allocation and/or user profiles.
Adamczyk, Maria; Anschutz, Thomas Arnold; Blackburn, Alan Ryan; Cassanova, Jeffrey Patrick; Hill, Sammie Walter; Holt, Scott Crandall; Huslak, Nicholas Steven; McQuaide, Jr., Arnold Chester; Shrum, Jr., Edgar Vaughan; Stillman, Scott Traynham; Wright, Steven Allen; Zhang, Li, Methods of implementing dynamic QoS and/or bandwidth provisioning and related data networks, data service providers, routing gateways, and computer program products.
Morford, Michael Robert, Methods, apparatuses and systems facilitating concurrent classification and control of tunneled and non-tunneled network traffic.
Morford,Michael Robert, Methods, apparatuses and systems facilitating concurrent classification and control of tunneled and non-tunneled network traffic.
Kim,Myong Ju, Mobile communication terminal, wireless data service authentication server, system for automatically blocking voice call connection, and method of processing various messages in mobile communication terminal.
Kennewick, Robert A.; Locke, David; Kennewick, Sr., Michael R.; Kennewick, Jr., Michael R.; Kennewick, Richard; Freeman, Tom; Elston, Stephen F., Mobile systems and methods for responding to natural language speech utterance.
Weider, Chris; Kennewick, Richard; Kennewick, Mike; Di Cristo, Philippe; Kennewick, Robert A.; Menaker, Samuel; Armstrong, Lynn Elise, Mobile systems and methods of supporting natural language human-machine interactions.
Vanttila Jaakko,FIX ; Alanara Seppo,FIX ; Seppanen Jorma,FIX ; Vaihoja Juha,FIX ; Lietsalmi Mikko,FIX, Mobile terminal having network services activation through the use of point-to-point short message service.
Bogineni, Kalyani; Flynn, Gerard J.; Stone, Jr., William H.; Salas, Edward A., Multimedia next generation network architecture for IP services delivery based on network and user policy.
Thomas Christopher N. ; Jackowski Steven J. ; Brock Keven J., Ordering of multiple plugin applications using extensible layered service provider with network traffic filtering.
Anderson, Thomas W.; Liu, Chung-Zin; Lassers, Harold A.; Mathai, Stinson S., Packet filtering/classification and/or policy control support from both visited and home networks.
Gurnani, Roger; Meehan, Kevin Patrick; Shunk, Christopher James; Crouch, Robert Samuel, Postpay spending limit using a cellular network usage governor.
Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Sidelnik, Albert; Smith, Brian E., Providing policy-based operating system services in a hypervisor on a computing system.
Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Sidelnik, Albert; Smith, Brian E., Providing policy-based operating system services in an operating system on a computing system.
Park, Vincent D.; Tsirtsis, Georgios; O'Neill, Alan William; Corson, M. Scott, Providing quality of service for various traffic flows in a communications environment.
Gallagher, Michael D.; Gupta, Rajeev; Markovic, Milan; Shi, Jianxiong (Jason); Baranowski, Joseph G., Registration messaging in an unlicensed mobile access telecommunications system.
Roskowski, Steve; Kolm, David; Ruf, Michael P.; Jaquet, James R.; Othmer, Konstantin, Rule based data collection and management in a wireless communications network.
Berger, Thomas R.; Denny, Joseph E.; Robins, David S.; Koop, LaMonte Peter; Payne, Edward Allen; Twitchell, Jr., Robert W., Securing, monitoring and tracking shipping containers.
Erickson, Richard R.; Polston, Steven, Software application implemented using services from a services repository generated using a target services roadmap.
Necka, William; Fey, Igor; Akgun, Ali; Arutyunov, Yuri, System and method for a specialized dynamic host configuration protocol proxy in a data-over-cable network.
Ray, Amar N.; Bugenhagen, Michael K.; Morrill, Robert J.; Chakravarthy, Cadathur V., System and method for adjusting the window size of a TCP packet through remote network elements.
Bowen,Jerre F.; Mathkar,Anup R.; Mathur,Rajat; Syed,Samina M. A.; Weimer,Thomas W.; Bennett,James E.; Braganza,Carl W.; Dwivedi,Tarun, System and method for an access layer application programming interface for managing heterogeneous components of a storage area network.
Deshpande, Sumit B.; Gudipudi, Srinivas; Swarangi, Muralidhar S.; Pore, Ravi R.; Shankar, Rohit; Short, Theodore R.; Zhu, Yidong, System and method for automatic network logon over a wireless network.
Wiley, William L.; Bugenhagen, Michael K.; Morrill, Robert J., System and method for call routing based on transmission performance of a packet network.
Kozisek, Steven E., System and method for enabling subscribers of a communications carrier to access a network of wireless access points of subscribers of other communications carriers.
Hendrickson, Keith; Maguy, William; Prehn, Paul; Stamos, Nick; Su, Annie, System and method for measuring wireless device and network usage and performance metrics.
Buckley, Adrian; Bumiller, George Baldwin; Carpenter, Paul, System and method for providing operator-differentiated messaging to a wireless user equipment (UE) device.
Garland Stuart M. ; Smith David B. ; Smith Matthew Richard, System for suppressed ringing access of subscriber lines to identify usage anomalies of customer premise equipment connected thereto.
Stewart, Hugh Donal; Sidebottom, Gregory Allan; Araujo, Wladimir de Lara Filho; Ries, Steffen Georg; Stevens, Scott Joseph, Systems and methods for providing quality assurance.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Technique for providing dynamic modification of application specific policies in a feedback-based, adaptive data network.
Makkonen Matti (Helsinki FIX) Pokka Tapani (Helsinki FIX) Lehto Markku (Helsinki FIX), Wireless private branch exchange system for use with mobile communication devices.
Burckart, Erik J.; Cuomo, Gennaro; Ivory, Andrew J.; Moore, Victor S.; Shook, Aaron K., Application-specific chargeback of content cached at the wireless tower.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.