For protecting the device assistant service of network capacityU.S. Patent application
For
For protecting the device assistant service of network capacity
Inventor:
Gregory G. Raleigh
Ali Rui Xiniya
James La Weini
Prepared by following mechanism:
Sheng Zhi lawyer's office
390LYTTON AVENUE
PALO ALTO,CA 94301-1432
Customer ID: 69849
Attorney docket: 26WV-160509
Express Mail Label number: EM 551709852US
For protecting the device assistant service of network capacity
Cross-Reference to Related Applications
The application is the part continuation application of U.S.'s non-provisional co-pending of following announcement by carrying out itQuote and be incorporated at this: US publication 2010/0188975, be filed on March 2nd, 2009, entitled " can verify thatDevice assistant service strategy implements (Verifiable Device Assisted Service PolicyImplementation)”;US publication 2010/0192170, is filed on March 2nd, 2009, and entitled " have user inclinedWell, adaptive strategy, network/net neutrality and device assistant service configuration file management (the Device Assisted of privacy of userService Profile Management with User Preference,Adaptive Policy,NetworkNeutrality,and User Privacy)”;US publication 2010/0191612, is filed on March 2nd, 2009, exercise questionFor " there is report, synchronizing and the device assistant service that can verify that use monitoring (the Verifiable Device of noticeAssisted Service Usage Monitoring with Reporting,Synchronization,andNotification)”;US publication 2010/0191576, is filed on March 2nd, 2009, entitled " have integrated charging,Reconcile charging and device assistant service charging (the Verifiable Device Assisted that can verify that of many accountsService Usage Billing with Integrated Accounting,Mediation Accounting,andMulti-Account)”;US publication 2010/0188991, is filed on March 2nd, 2009, and entitled " have network/net neutralityProperty and privacy of user network service strategy implement (Network Based Service PolicyImplementation with Network Neutrality and User Privacy)”;US publication 2010/0188990, it is filed on March 2nd, 2009, entitled " have user preference, adaptive strategy, network/net neutrality and user hiddenPrivate network service profiles management (Network Based Service Profile Management withUser Preference,Adaptive Policy,Network Neutrality and User Privacy)”;The U.S. is publicThe number of opening 2010/0192212, is filed on March 2nd, 2009, entitled " automation equipment configuration and activation (AutomatedDevice Provisioning and Activation)”;US publication 2010/0191604, is filed in March 2 in 2009Day, entitled " device auxiliary environment service (Device Assisted Ambient Services) ";US publication 2010/0191575, it is filed on March 2nd, 2009, entitled " network environmental services (Network Based AmbientServices)”;US publication 2010/0188993, is filed on March 2nd, 2009, entitled " for service analysis, setMeter, test and network tool (Network Tools for Analysis, Design, Testing, the and producedProduction of Services)”;US publication 2010/0190470, is filed on March 2nd, 2009, entitled " unrestrainedTrip service network and overlay network (Roaming Services Network and Overlay Networks) ";US publication2010/0192120, it is filed on March 2nd, 2009, entitled " the open type developing system for link service provider(Open Development System for Access Service Providers)”;US publication 2010/0192207, it is filed on March 2nd, 2009, entitled " Virtual Service provider system (Virtual Service ProviderSystems)”;Application U.S. Serial No 12/380,757, is filed on March 2nd, 2009, and entitled " Service Activation follows the tracks of systemSystem (Service Activation Tracking System) ";US publication 2010/0191613, is filed in 2009 3The moon 2, entitled " open transaction central charge system (Open Transaction Central BillingSystem)”;US publication 2010/0188995, is filed on March 2nd, 2009, entitled " for middle network deviceThe accurate service that can verify that uses monitoring (Verifiable and Accurate Service Usage Monitoringfor Intermediate Networking Devices)”;US publication 2010/0188994, is filed in March 2 in 2009Day, entitled " service charging (the Verifiable Service Billing for that can verify that for middle network deviceIntermediate Networking Devices)”;US publication 2010/0191846, is filed on March 2nd, 2009,It is entitled that " service strategy that can verify that for middle network device implements (Verifiable Service PolicyImplementation for Intermediate Networking Devices)”;US publication 2010/0188992,Being filed on March 2nd, 2009, entitled " have the service of user preference, adaptive strategy, network/net neutrality and privacy of userConfiguration file management (Service Profile Management with User Preference, Adaptive Policy,Network Neutrality and User Privacy for Intermediate Networking Devices)”;BeautifulState's publication number 2010/0191847, is filed on March 2nd, 2009, the entitled " service network structure (Simplified of simplificationService Network Architecture)”;US publication 2010/0197266, is filed on January 27th, 2010, topicMesh for " device auxiliary CDR create, be polymerized, reconcile and charging (Device Assisted CDR Creation,Aggregation,Mediation,and Billing)”;US publication 2010/0198698, is filed in January 27 in 2010Day, entitled " adaptive environment service (Adaptive Ambient Services) ";US publication 2010/0199325,It is filed on January 27th, 2010, entitled " safe practice (the Security Techniques for for device assistant serviceDevice Assisted Services)”;US publication 2010/0197267, is filed on January 27th, 2010, entitled" device component district and fixed platform (Device Group Partitions and Settlement Platform) ";The U.S.Publication number 2010/0198939, is filed on January 27th, 2010, and entitled " (Device is installed in device assistant serviceAssisted Services Install)”;US publication 2010/0195503, is filed on January 27th, 2010, entitled" service quality (Quality of Service for Device Assisted Services) of device assistant service ";BeautifulState's publication number 2010/0197268, is filed on January 28th, 2010, and entitled " have the enhancing roaming clothes of device assistant serviceIt is engaged in and merges carrier network and agency (Enhanced Roaming Services and Converged CarrierNetworks with Device Assisted Services and a Proxy)”;And Application U.S. Serial No13/_________, is filed on May 25th, 2011, and entitled " system and method (the System and of wireless network unloadingMethod for Wireless Network Offloading)”。
Background of invention
The appearance issued along with the digital communication of Large Copacity market, application and content, many access network such as wireless networks,Cable system and Digital Subscriber Line (DSL) network an urgent demand user capacity, and such as Evolution-Data Optimized (EVDO), high speed pointGroup accesses (HSPA), Long Term Evolution (LTE), worldwide interoperability for microwave accesses (WiMax), DOCSIS, DSL and Wireless Fidelity (Wi-Fi) just becoming to be limited by user capacity.In radio conditions, although network capacity is by along with new more high power capacity in futureWireless access technology (such as multiple-input and multiple-output (MIMO)) and more frequency spectrum and the deployment of cell splitting and increase, these capacityGain may be less than meeting the demand that the digital networking increased requires.
Similarly, although can to have every user compared with wireless higher for wireline access networks (such as cable and DSL)Average size, wireline subscribers service consumption custom just tending to the highest bandwidth applications and content, these bandwidth applications andContent can consume rapidly active volume and make universe network service experience demote.Some composition portions due to service provider's expenseDividing and increase along with the bandwidth increased, the profit of service provider also will be adversely affected by this trend.
The example of above-mentioned trend and problem is intended to illustrative rather than exclusive.According to the reading of this specification withAnd the research to these accompanying drawings, those of ordinary skill in the related art be will become apparent from by other restrictions of this area.
Summary of the invention
The invention provides a kind of system, including:
The processor of communicator, this processor is configured to:
The network service use activity in network communications of this communicator is monitored;
This network service use activity is classified, thus carries out difference Network access control, to protect network capacity;And
Classification based on this network service use activity, uses control strategy phase by this network service use activity with serviceAssociation, thus assist difference Network access control to protect network capacity;And
Memorizer, this memorizer is connected on this processor and is configured to provide instruction to this processor.
Present invention also offers a kind of system, including:
The processor of communicator, this processor is configured to:
The network service use activity in wireless communication of this communicator is monitored;
Using activity reports to network element this network service of this communicator, wherein this network element is to through multiple devicesMultiple reported network service use activities carry out statistical analysis;
Receive a network service from this network element and use activity classification list;And
Use activity classification list that this network service use activity is classified based on this network service, thus poorOther Network access control, to protect network capacity;And
Memorizer, this memorizer is connected on this processor and is configured to provide instruction to this processor.
Wherein this processor of this communicator can be further configured to: based on this network service use activity pointClass, uses control strategy to be associated with network service this network service use activity, thus assists difference Network access controlTo protect network capacity.
Wherein this processor of this communicator can be further configured to: based on this network service use activity pointClass, uses control strategy to be associated with network service this network service use activity, thus assists difference Network access controlTo protect network capacity;And
Use activity classification list that this network service use activity carries out difference control based on this network service, wherein shouldNetwork service use activity is network capacity managed service.
Present invention also offers a kind of system, including:
The processor of network equipment, this processor is configured to:
One first report of the network service use activity of this first device is received from a first device;
One second report of the network service use activity of this second device is received from second device;
Multiple reported network service use activity through multiple devices is carried out statistical analysis, the plurality of device bagInclude this first device and this second device;And
Send a network service to this first device and this second device and use activity classification list thus based on these clothesMake sure and classify to carry out difference Network access control thus catch net to network service use activity with activity classification listNetwork capacity;And
Memorizer, this memorizer is connected on this processor and is configured to provide instruction to this processor.
Wherein this processor of this network equipment can be further configured to: based on this network service use activity pointClass, uses control strategy to be associated with network service this network service use activity, thus assists difference Network access controlTo protect network capacity.
Wherein this processor of this network equipment can be further configured to: based on this network service use activity pointClass, uses control strategy to be associated with network service this network service use activity, thus assists difference Network access controlTo protect network capacity;And use activity classification list that this network service use activity is carried out difference control based on this serviceSystem, to protect network capacity.
Present invention also offers a kind of system, including:
The processor of communicator, this processor is configured to:
Classification based on this network service use activity, by network service use activity and the network service of this communicatorUse control strategy is associated, thus carries out difference Network access control, to protect network capacity;And
Use control strategy based on this network service, generate user's notice;And
Memorizer, this memorizer is connected on this processor and is configured to provide instruction to this processor.
Wherein this network service uses control strategy can include network service use notification strategy.
What wherein this user notice can include in the following is one or more: be classified as network capacity managed serviceOne or more service activitys, the type of network service strategy that one or more network capacity managed service are come into force, oneNetwork service activity belong to network capacity managed service classification notice, one be classified as network capacity managed service classificationIf this service class of notice that service activity can make this classification change changes in order to this network service is movable, the net being associatedNetwork services notice, service program upgrading/degradation indulgence and discount offered and/or the clothes of award that cost of use will changeThe indulgence of business plan, thus respond one or more user notice, to protect network capacity.
Wherein this user notice can include that user preference selects, and this user preference selects can include in the following oneOr multinomial: network service use control strategy and this network service use the regulation of moving phase association, are used for selecting this networkService uses the rewriting option of control strategy, selects this service use the amendment option of control strategy and select new serviceThe selection option of plan.
Wherein this user notice can occur in the following one or more after: an application program is downloaded orIt is loaded into the trial of this communicator, performs that this network service is movable or this network service use activity is attempted thus accesses this netThe trial of network, network service use activity meet or exceed network service usage threshold, network service use activity is attempted meetingThe network service of one prerequisite uses, to the renewal of network capacity managed service activity classification list, be subject to network capacityControl the renewal of service strategy and be sent to the internet message triggering this notice of this device.
What wherein this user notice can include in the following is one or more: controlled for one or more network capacitysThe network service use action message of service, the network service predicted for one or more network capacity managed service makeWith action message, for obtaining the option of information, this net that more network service about this network service use activity usesNetwork service use activity may result in message, the weight that the network service of the thresholding exceeding the service program being associated with this device usesNewly check or select the option of alternative service program, confirmation request and submit the option of this confirmation request to.
Present invention also offers a kind of system, including:
The processor of communicator, this processor is configured to:
Determine the network busy state of wireless network;And
Based on this network busy state, the network service use activity to this communicator is classified, thus assist poorOther Network access control is to protect the network capacity of this wireless network;And
Memorizer, this memorizer is connected on this processor and is configured to provide instruction to this processor.
Wherein this network busy state can one or more based in the following: network performance, network congestion, networkAvailability, network resource availability, network capacity and time-based standard.
The network capacity wherein protecting this wireless network can include the network protecting last limit section of this wireless networkCapacity, and this processor is further configured to: send this network busy state to network element.
Present invention also offers a kind of system, including:
The processor of communicator, this processor is configured to:
Device network service use activity in wireless communication is monitored;
This network service use activity is classified thus assists difference Network access control, to protect network capacity;And
Classification based on this network service use activity carries out charging to this network service use activity, to carry out difference netNetwork service uses charging;And
Memorizer, this memorizer is connected on this processor and is configured to provide instruction to this processor.
Wherein this processor of this communicator can be further configured to: classification based on this network service use activityThis network service use activity is charged, thus carries out difference network service and use charge, wherein this network service is madeCarry out charging with activity and can include reconciling CDR/IPDR charge record for network capacity managed service and non-capacity managed service.
Present invention also offers a kind of system, including:
The processor of communicator, this processor is configured to:
In order to wireless network accesses, use active reception API request from network service;
Respond the API request from this network service use activity;And
Implementing difference network insertion for this network service use activity thus protect network capacity, wherein this difference network connectsEnter is to use the priority of moving phase association and network busy state based on this network service;And
Memorizer, this memorizer is connected on this processor and is configured to provide instruction to this processor.
Wherein the response to this API request can include to this network service use activity provide in the following orMultinomial: network busy state, whether allow this network service use activity to access this network, which network service use activity is arrivedThe network insertion of which access network is authorized to, controls what flow of this network service use activity to be to be required thus implementsNetwork insertion, when this network that to be the access for this network service use activity be is available, make for this network serviceWith the scheduling of movable network insertion, for having the pre-of the network insertion of the network service use activity of particular characteristic gradeStay, to dormancy or the instruction of the conversion of power down mode and from dormancy or the instruction waken up up of power down mode.
Present invention also offers a kind of system, including:
The processor of network equipment, this processor is configured to:
In order to wireless network accesses, use active reception API request from the network service of communicator;And
Respond the API request from this network service use activity, thus implement difference network insertion, to protect network to holdAmount;
Wherein this difference network insertion is based on priority and the network busy using moving phase association with this network serviceState;And
Memorizer, this memorizer is connected on this processor and is configured to provide instruction to this processor.
Wherein the response to this API request can include to this network service use activity provide in the following orMultinomial: network busy state, whether allow this network service use activity to access this network, which network service use activity is arrivedIt is to be required thus real that the network insertion of which access network is authorized to, controls what flow of this network service use activityExecute network insertion, when this network is the access for this network service use activity is available, for this network serviceUse the scheduling of the network insertion of activity, for having the pre-of the network insertion of the network service use activity of particular characteristic gradeStay, to dormancy or the instruction of the conversion of power down mode and from dormancy or the instruction waken up up of power down mode.
Wherein this API can be the network element API securely communicated with this communicator, and wherein this communicator canImplement this difference network insertion, and this difference network insertion enforcement can be through checking.
Wherein this busy state information can obtain from one or more network elements.
Present invention also offers a kind of system, including:
The processor of communicator, this processor is configured to:
Multiple network service use activities to this communicator are monitored;
Based on the multiple network service use activities monitored, determine network busy state;
The report of network busy state is sent to network element;And
Memorizer, this memorizer is connected on this processor and is configured to provide instruction to this processor.
Wherein this communicator can include a service processor through checking, and wherein this passes through the service of checkingMultiple network service use activities of this communicator can be monitored and can be based on the multiple nets monitored by processorNetwork service use activity determines this network busy state.
Wherein determine that this network busy state can include in the following one or more: data rate, the waiting time,Number that shake, the bit error rate, packet error rate, network insertion are attempted, the successful number of network insertion, number that network insertion is failedMesh, QoS grade availability, QoS grade performance and the transmutability of any aforementioned parameters.
Present invention also offers a kind of system, including:
The processor of network equipment, this processor is configured to:
The network busy status information for one or more access networks is collected for multiple communicators;And
Based on each network busy status information being associated in these one or more access networks, for the plurality of logicalOne or more network capacity managed service are implemented difference network insertion, thus are protected network capacity by T unit;And
Memorizer, this memorizer is connected on this processor and is configured to provide instruction to this processor.
Wherein this network busy status information can be from multiple network measurements being transferred to this network equipmentCollecting, wherein these network measurements can be the one or more reception from the following: base station, base station prisonControl instrument, radio wave monitor controller and base station controller.
Present invention also offers a kind of system, including:
The processor of communicator, this processor is configured to:
The network service use activity in network communications of this communicator is monitored;
This network service use activity is classified, thus carries out difference Network access control, to protect network capacity;And
Classification based on this network service use activity, uses this network service use activity with network service and controls planSlightly it is associated, thus assists difference Network access control to protect network capacity;And
Memorizer, this memorizer is connected on this processor and is configured to provide instruction to this processor.
Wherein this communicator can be a mobile communications device, and this service can include one or more based on mutuallyThe service of networking, and wherein this mobile communications device can include in the following one or more: mobile phone, PDA, electricityPhilosophical works reader, musical instruments, amusement/game station, computer, laptop computer, net book, panel computer and familyGroup network system.
Wherein this processor of this communicator can be further configured to: this network service use activity is implemented differenceNetwork access control, to protect network capacity;And it is this network service use activity, implements to carry out to this difference network insertionChecking.
Wherein this processor of this communicator can be further configured to: uses a service processor through checkingDifference Network access control is implemented in this network service use activity, to protect network capacity.
Wherein this processor of this communicator can be further configured to: uses an artificial network to access API to thisDifference Network access control is implemented in network service use activity, to protect network capacity.
Wherein this processor of this communicator can be further configured to: based on service profiles, takes this networkMake sure and be monitored with activity;And use a service processor through checking to be joined based on this service based on monitorPut the use of the network service use activity of file, determine that this network service use activity is network capacity managed service.
Wherein this processor of this communicator can be further configured to: based on the service being associated with this communicatorPlan and this network service use service priority and the network busy state of the network capacity control of moving phase association, reallySurely whether the network insertion for this network service use activity is authorized to.
Wherein this processor can be further configured to: performs a router thus dynamically manages one for this communicatorIndividual or multiple network capacity managed service and/or QoS session.
Wherein this processor can be further configured to: performs a router thus dynamically manages one for this communicatorIndividual or multiple network capacity managed service and/or QoS session;And send network busy status information to service controller, itsIn this service controller can be the strategy that multiple communicators of communicating with one or more base stations provide for managementDetermine point.
Wherein this processor can be further configured to:
Perform a router thus for this communicator dynamically manage one or more network capacity managed service and/orQoS session;
Sending network busy status information to service controller, wherein this service controller can be and one or more basesMultiple communicators that station communicates provide the Policy Decision Point for management;And
Instructing from this service controller receiving router flow-control, wherein this service controller can provide these routersFlow-control instruction thus help and the plurality of communicator that communicates of one or more base stations dynamically manages network capacityUse, to protect the network capacity of one or more access network.
Wherein this classification can be to use control strategy to be based on working as based on present access network and/or this network serviceFront access network.
Wherein classification can include based on network busy state, dynamically distribution network capacity managed service priority.
Wherein classification can include inquiring about network element so that it is determined that the classification of network capacity managed service and/or association include inquiring about netUnit is so that it is determined that use associating of control strategy with this network service.
What wherein this network service used that control strategy can include in the following is one or more: block/allow arrange,Throttling is arranged, adaptability throttles setting, the setting of QoS class, packet error rate, shake and postpone setting, queue is arranged and labelArrange.
Wherein this network service uses control strategy can include multiple flow control policy filter.
Wherein this network service uses control strategy can include the multiple flow control policy mistakes being embodied as cascade filterFilter.
Wherein this network service uses control strategy can include multiple flow control policy filter, these flow-control plansSkipping over filter can use network busy state and/or temporal information as entering the index that flow-control is arranged.
Wherein this processor can be further configured to: uses based on this network service based on network busy state and controlsStrategy carries out difference control to this network service use activity, and wherein this network service use activity can be classified as network capacityManaged service.
Wherein this processor can be further configured to: uses control strategy to make this network service based on this network serviceCarrying out difference control with activity, this network service uses control strategy based on user's input and/or present access network, wherein shouldNetwork service use activity can be classified as network capacity managed service.
Wherein this processor can be further configured to: revises or replace the network stack interface of this communicator to provide rightWhat network insertion message transmitted intercepts or stops thus the enforcement flow-control to network capacity managed service, to protect network to holdAmount.
Wherein this processor can be further configured to: stores a network capacity managed service list, wherein can be based onThe network service use activity that monitored and be updated periodically this network capacity managed service list.
Present invention also offers a kind of method, including:
Communicator network service use activity in network communications is monitored;
This network service use activity is classified, thus carries out difference Network access control, to protect network capacity;And
Classification based on this network service use activity, uses this network service use activity with network service and controls planSlightly it is associated, thus assists difference Network access control to protect network capacity.
Present invention also offers a kind of computer program, this computer program is included in computer-readable storageIn medium and include multiple computer instruction, these computer instructions are used for:
The network service use activity in network communications of this communicator is monitored;
This network service use activity is classified, thus carries out difference Network access control, to protect network capacity;And
Classification based on this network service use activity, uses this network service use activity with network service and controls planSlightly it is associated, thus assists difference Network access control to protect network capacity.
Present invention also offers a kind of method, including:
One specific service use activity is checked so that it is determined that this specifically service use activity if appropriate forOne group of one or more classifying rules, this specific service is used stir yourself to be defined as background service and makes by these classifying rulessWith activity;
Determining whether to meet a condition, this condition includes findings that this specifically services use activity and is confirmed as backstage clothesMake sure with activity;And
When satisfying the condition, this network insertion specifically servicing use activity is limited.
Wherein the one or more classifying rules of this group can check at least one in the following: network type, time believeBreath, connection charge, whether local or roaming, network busy state, QoS and this specifically to service use activity be userThe still backstage in user is mutual, foreground in Jiao Hu.
What wherein the one or more classifying rules of this group can include checking in the following is one or more the most oneSection occurred in the specific time: user is mutual with this device, user uses action interactions, user to pick up this with this serviceDevice, service use activity UI content are in the foreground of this device UI, audio or video letter is being play in this service use activityBreath, this service use activity have transmitted a certain amount of data, service use activity is in or be not in foreground or background service list.
Described method can farther include to obtain which service is used activity classification to be background service use activity by definitionRule user select.
What wherein the user of this classifying rules selected can to include being categorized as background service use activity specifically services useMovable user selects.
Described method can farther include to obtain what definition user carried out selecting from more than one service background class hierarchyThe user of rule selects.
Wherein acquisition user selects to include representing use information to service use activity thus which assists in and is determinedJustice is background service use activity.
Wherein acquisition user selects to include representing cost information to service use activity thus which assists in and is determinedJustice is background service use activity.
Wherein this condition can include enabling the user to select the network for background service use activity.
Wherein the selection of this network can be based on this temporal information.
Wherein the selection of this network can be based on connection charge.
Wherein this user can revise the one or more classifying rules of this group.
Wherein this condition can include
Detect when to start or when attempt starting this service use activity;
This is background service use activity to notify this user;And
There is provided option for this user thus implement conditioning step.
Described method can farther include
Notify what these limited option of this user are;And
If this user selects to implement limited option, then implement this restriction;And
If this user selects to proceed, then disable this restriction.
Wherein network element can arrange this classifying rules.
Wherein classifying ruless one or more to this group arrange and can input based on network manager.
Wherein classifying ruless one or more to this group are arranged can be that feature basedization applies usage behavior.
Wherein classifying ruless one or more to this group are arranged can be the strategy based on being provided to this device by network elementInstruction.
Wherein this inspection can occur on the apparatus.
Wherein the one or more classifying rules of this group may include determining whether whether an application is OS function, client/serviceDevice data sharing/more New function, software upgrading or download, background are downloaded, Email or calendar or contact person updates orSynchronizing function.
What wherein this restriction can include in the following is one or more: blocks, postpone, implement time window, polymerization/guarantorHold/transmit, throttle, limit NBS rate range, limit some network type based on whether this locality or roaming carry out limiting, limitingCertain time period, wait lower fee condition, wait specific network, wait local network, waiting time information, and etc.Treat net background state.
Wherein can just cache, until revising, reduce or eliminate this condition, the backstage needing to be transmitted by this deviceService uses activity data.
The data wherein cached can be prioritized so that when this condition be modified, reduce orDuring removal, first transmit most important data.
Wherein this restriction can occur on the apparatus, and this application can not know that it can experience background service and limit.
Described method can farther include amendment or suppress about the applicative notifications message lacking network connectivty again.
Wherein application can indicate equipped with network state, and these network states indicate according to application background class or priority,Can be differentiated for different application.
Application wherein can be made to know, and it can experience background service and limit.
Wherein this is known can be provided by background service API.
Wherein application can have its rule that should transmit with which kind of background state.
Wherein application can have the ability rewriteeing background service rule for high-priority data.
What wherein application background service state API may indicate that in the following is one or more: license shape is transmitted on backstageState, one or more background class of permission transmission, NBS, QoS, the application of permission transmission, the service class of permission transmission, network classType, temporal information, geographical position and the most local or roaming.
Wherein this restriction can allow the minimum connectedness to background service.
Wherein this user can pay less expense for the background service implemented by background service policy control.
Wherein this user can be that high priority communication rewrites background service policy enforcement.
Wherein when background service policy enforcement is rewritten, the payable higher price of this user.
Wherein patronage Service Partner can pay less for the background service implemented by background service policy controlExpense.
Wherein sponsor can be that high priority communication rewrites background service policy enforcement.
Wherein sponsor can be programmed into rewriteeing decision condition in application.
Wherein sponsor can be programmed into rewriteeing decision condition in network element.
Wherein sponsor's application or network element rewritable background service strategy.
Wherein when background service policy enforcement is rewritten, the payable higher price of sponsor.
Wherein limit and can occur in the network.
Wherein application can not know that it can experience background service and limit.
Described method can farther include amendment or suppress about the applicative notifications message lacking network connectivty again.
Described method can farther include to provide network state instruction, after the instruction of these network states is according to application into applicationPlatform class or priority, can be differentiated for different application.
Described method can farther include notice application, and it can experience background service restriction.
Wherein background service API can carry out this notice.
Wherein application can have its rule that should transmit with which kind of background state.
Wherein application can have the ability rewriteeing background service rule for high-priority data.
What wherein application background service state API may indicate that in the following is one or more: backstage transmit License Status,Allow transmit one or more background class, NBS, QoS, permission transmit application, allow transmit service class, network type,Temporal information, geographical position and the most local or roaming.
Wherein when having followed background service strategy, the price for the service supported of background service use activity canIt is lowered.
Wherein the application of sponsor's device can determine that backstage classification state and can be determined whether communication to be limited.
Wherein application can determine background state from device API.
Wherein application can determine background state from network AP I.
Wherein application can determine background state from NBS monitor controller.
If wherein backstage strategy is rewritten by sponsor's application, then sponsor's price can be enhanced.
Wherein sponsor server can determine that backstage classification state and can be determined whether communication to be limited.
Wherein network element can determine background state from device API.
Wherein network element can determine background state from network AP I.
Wherein network element can determine background state from NBS monitor controller.
If wherein backstage strategy is rewritten by sponsor's network element, then sponsor's price can be enhanced.
Background service state instruction API the most on the apparatus can make background service state be can for application or network element, thus it may decide when to communicate.
Wherein the instruction of the background service state on network element API can provide API to device application or affiliate's serverBackground service status information, thus it may decide when to communicate.
Present invention also offers a kind of portable radio, it includes one or more processor, the one or moreProcessor be configurable with:
Service use activity to the wireless network of described portable radio is classified;
Determine whether the service use activity of described classification includes background activity;
When the service use activity determining described classification includes background activity, application dynamic strategy controls described service to be madeWith activity.
Wherein the service use activity to described portable radio carry out classification can include identify: application identifier, behaviourMake systemic-function identifier, aggregated service activity identifier or Component service activity identifier.
Wherein said service use activity can by the first component software and at least one other component software, application, process,Cooperation between function, activity or service causes, and wherein service use activity to described portable radio is classifiedComprise the steps that identification goes into or from least one other component software described, application, process, function, activity or the data of serviceStream;And make described data stream be associated with described first component software.
Wherein the service use activity to described portable radio carry out classification comprise the steps that monitoring application proxy serviceStream;And be categorized as described application proxy service flow being started by the first component software or belonging to described first component software.
Wherein said service use activity can be associated with application, operating system assembly, function or service.
Wherein said strategy can be based on mutual with the user of the application of the described service moving phase association of use and described serviceThe user interface using the mutual service use activity mutual with the user of described portable radio, described of user of activity is excellentFirst level or these combination.
Wherein said strategy can be based on the type of described wireless network.
Wherein said strategy can roaming conditions based on described portable radio or carry out with by described wireless networkThe expense that communication is associated.
Wherein said strategy can be based at least partially on user's input, and wherein said user inputs identification the first software groupPart or described service use activity.
Wherein said strategy can be based at least partially on user input, and wherein said user input identification network parameter orNetwork type.
Wherein said strategy can use based on data and limit or data usage threshold.
Wherein said wireless network can be the first wireless network, and wherein said service use activity can be firstService use activity, and wherein, when described portable radio is connected to described first wireless network, described strategy can be assistedThe one or more processor is helped to control described first service use activity, and when described portable radio is connected toDuring second wireless network, described strategy can assist the one or more processor to stop control second service use activity, instituteState first service use movable and described second service use activity to be associated with identical application or OS function.
Wherein said second wireless network can be Wireless Fidelity (Wi Fi) network or home network.
Wherein determine whether described service use activity includes that background activity comprises the steps that and determine that user is just the softest with firstPart component interaction or mutual with described first component software.
Wherein determine described service use activity whether include background activity comprise the steps that determine the first component software whether orWhether have been classified as being in background state or whether or whether described service use activity has been classified as background service.
Wherein determine whether described service use activity includes that background activity comprises the steps that and determine that described service use activity isNo is foreground activity.
Wherein determine whether described service use activity includes that background activity comprises the steps that and determine that whether the first component software isFront components.
Wherein determine whether described service use activity includes that background activity comprises the steps that and determine that whether the first component software isFront components or non-classified assembly.
Wherein determine whether described service use activity includes that background activity comprises the steps that and determine that whether the first component software existsIn the foreground that user is mutual or determine that described first component software is whether in the mutual backstage of user.
Wherein apply described strategy can include at least assist in allowing, limit, postpone, throttle or stop described service to use aliveDynamic.
The one or more processor or configurable with: be not described backstage when determining described service use activityTime movable, stop and apply described strategy.
Wherein applying described strategy to comprise the steps that makes notice be presented by the user interface of described portable radio.
The one or more processor or configurable with: make notice be connect by the user of described portable radioMouth presents.
Wherein said notice can provide the information about described strategy.
Wherein said notice can provide in terms of arranging, control, rewrite or to revise at least one of described strategy orThe information of the option of the second aspect of described strategy.
The one or more processor or configurable to obtain the instruction of user preference in response to described notice.
The described instruction of wherein said user preference can include the user limiting, allow or block described service use activityInstruction.
The recognizable flow-control being associated with described strategy of the described instruction of wherein said user preference is arranged.
Wherein said notice can present the information about the setting being associated with described strategy.
Wherein said notice can present the information about described wireless network.
Wherein said notice can present the tolerance of the use of the described wireless network using moving phase association with described serviceInstruction.
Wherein said notice can pass through Email, by text message, by window, by voice messaging or according toFamily preference provides.
The one or more processor or configurable with accept and apply user to input, wherein said user inputThe instruction of the second component software being applied to by described strategy in the multiple component softwares on described portable radio can be included.
The one or more processor or configurable with accept and apply user to input, wherein said user inputMay specify the user preference being associated with described service use activity or the first component software.
Wherein said user preference can include the inclined of described service use activity that limit, allow, block, postpone or throttleGood.
Wherein said service use activity can be first service use activity, and wherein said wireless network can beOne wireless network, and wherein, the one or more processor or configurable with to described portable radioTwo service use activities classifies, described second service use activity can with and described first service use moving phase with shouldWith or OS function be associated;And stop the described second service use activity that is applied to by described strategy.
Brief Description Of Drawings
Fig. 1 illustrate according to some embodiments for for device assistant service (DAS) provide service quality (QoS)And/or for providing DAS to protect a network architecture functional diagram of network capacity.
Fig. 2 illustrate according to some embodiments for for device assistant service (DAS) provide service quality (QoS)And/or for providing DAS with another functional diagram of another network architecture of protection network capacity.
Fig. 3 illustrate according to some embodiments for providing service quality (QoS) for device assistant service (DAS)Including a service processor based on device and a service controller and/or for providing DAS to protect network capacityThe functional diagram of framework.
Fig. 4 A to 4C illustrate according to some embodiments for for device assistant service (DAS) provide service quality(QoS) functional diagram.
Fig. 5 illustrates generating for the service quality (QoS) for device assistant service (DAS) according to some embodimentsThe functional diagram of one QoS activity diagram.
Fig. 6 illustrates the end for the service quality (QoS) for device assistant service (DAS) according to some embodimentsThe functional diagram that Qos service channel controls is coordinated in opposite end.
Fig. 7 illustrates the flow process of the service quality for device assistant service (DAS) (QoS) according to some embodimentsFigure.
The each of Fig. 8 A to 8C illustrates the service quality for device assistant service (DAS) according to some embodiments(QoS) another flow chart.
Fig. 9 illustrates another of the service quality for device assistant service (DAS) (QoS) according to some embodimentsIndividual flow chart.
Figure 10 illustrates the another of the service quality for device assistant service (DAS) (QoS) according to some embodimentsOne flow chart.
Figure 11 illustrates the another of the service quality for device assistant service (DAS) (QoS) according to some embodimentsOne flow chart.
Figure 12 illustrates a kind of device stack for providing various service use measurement technology according to some embodiments.
Figure 13 illustrates the another kind of device for providing various service use measurement technology according to some embodimentsStack.
Figure 14 illustrate according to some embodiments for device assistant service (DAS) thus protect the stream of network capacityCheng Tu.
Figure 15 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.
Figure 16 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.
Figure 17 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.
Figure 18 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.
Figure 19 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.
Figure 20 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.
Figure 21 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.
Figure 22 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.
Figure 23 illustrate according to some embodiments for device assistant service (DAS) to protect of network capacityNetwork capacity managed service priority chart.
Figure 24 depicts the figure of a network capacity protection system using device assistant service (DAS).
Figure 25 depicts the figure of the example of a difference Access Control notice system.
Figure 26 depicts the example of a computer system that may be implemented in technology described herein thereon.
Figure 27 depicts the figure of a system example for applying special difference Network access control.
Describe in detail
The present invention can implement in many ways, including such as process;Device;System;The combination of material;It is included in computerComputer program on readable storage medium;And/or processor, it is stored in and this processor phase coupling as being configured to executionThe processor of instruction that is on the memorizer closed and/or that be provided by.In this manual, these are implemented or the present invention can takeAny other form be referred to alternatively as technology.It is said that in general, the order of the step of disclosed process is within the scope of the inventionIt is changeable.Except as otherwise noted, the described the assembly such as processor or memorizer that are configured to carry out task can conductsIt is configured to perform the general purpose module of this task in the given time or be made as carrying out the specific assembly of this task temporarilyImplement.As used herein, term " processor " refer to be configured to process one of data (such as computer program instructions) orMultiple devices, circuit and/or process core.
Embodiment detailed of the principle of one or more displaying present invention of the present invention is together provided below with accompanying drawingDescribe in detail bright.The present invention combines this type of embodiment and is described, but the present invention is not limited to any embodiment.The present inventionScope be not limited only by the claims appended hereto, and the present invention includes multiple replacement scheme, change and equivalent.Explanation subsequentlyBook protects many concrete details, thus the sufficient understanding to the present invention is provided.Thering is provided these details is for examplePurpose, and some or all of without these concrete details of the present invention can be put into practice according to claim.In order toPurpose clearly, does not describes technologic material related to the present invention known in the art in detail, so that the present invention is notHave unnecessary obscure.
Because network capacity gain is less than meeting the demand that the digital networking increased requires, due at various wireless networks(such as mobile network) upper network congestion increased occurred, a kind of network capacity crisis produces.3G, 4G and otherThe various intelligent telephone equipments that become in advanced radio network to become more and more popular, net book device, tablet computing device and eachThe increasing quantity planting other wireless mobile computing device is facilitating network capacity crisis.Some Virtual network operators refer toGoing out, relatively small number of user on such devices require that serious disproportionate a large amount of network capacitys with it.Such as, AT&T isClosely have been pointed out, its intelligent telephone equipment user (such as, Fructus Mali pumilae of about 3 percentUser) generating operation40 about the percent of the data traffic of business.
Such as, in the wireless network, because Internet resources/capacity requirement raises, management wireless access connection capacity and netIt is important for safeguarding network performance that network accesses connection resource.When offered load increases, if using capacity managementAnd/or network resource management, many network performance measurements advantageously can be safeguarded or improved.Such as, these performance measurementsIncluding network availability;Connect to all of device, user and/or search and can be used in the application of the service on network and passSend the ability of connection;Network insertion trial and success rate;One or more devices, user or the transfer rate of application experience;AllDevice, user and/or the average transmission rate of application experience;The network bit error rate or packet error rate;Ask from network insertionDelivered accesses the time delay connected;The one-way latency of transmission or round-trip delay;The delay timing shake of transmission;One orTime change in the transfer rate of multiple connections;Network is to needing the device of difference Connection Service quality (QoS) class, userOr application delivers the ability of various asked/required QoS grade;Network operation efficiency (such as, run through all devices,User and/or application and the aggregated service handling capacity measured) ability;Network runs through multiple and is respectively provided with identical quality of service classOr the identical device of service program performance parameter, user and/or application and share equably or liberally or distribution performance is surveyedThe ability of amount (such as, performance measurement listed above).
Such as, if (such as, one group of device on a wireless network, such as a given base for one group of user's setStand or base station controller or Microcell or picocell;Or the one group of device etc. on cable modem network) have oneIndividual limited shared amount of bandwidth, and if multiple and/or all devices allow all of application undistinguishable ground access or tasteExamination access network resource or transmission/reception flow, then this network generally can become overload.As a result of which it is, user/deviceCollect or in some cases, most or all of user/device obtains the best network performance.As another example, asFruit forms one or more devices of a device subset on network and connects with allowing multiple and/or all of application undistinguishableEnter or attempt access network resource or transmission/reception flow, then this network can become overload.As a result of which it is, a user/deviceSubset or in some cases, most or all of user/device obtains the best network performance.
Traditionally, mobile device typically has special design, and these designs are optimised thus retain network capacity alsoProtection Internet resources will not overload.Such as, browse the wireless device of the Internet generally use special agreement (such as WAP) andData traffic compression or low resolution technology rather than standard HTTP and the flow used in limited internet apparatus.
But, these are generally implemented for the wireless device implementing special method accessing the Internet and/or other networksThe complicated specification provided by one or more cellular carriers having the network that this device is designed to access it.ThisComplicated specification usually requires that time-consuming design, test and verification process.These procedure division ground have makes those qualifiedAnd be ready to perform the effect that the basis of the device provisioning business of required Specific Design Work narrows, slow down and new equipment is rendered to cityTime on field, increase the expense of exploitation new equipment and reduce the type of supported application.
Device OEM is up-to-date have been createed and is designed to be the most optimised more like standard the Internet device thus protectsStay the wireless device of network capacity and resource.Many wireless service clients intentionally get such device, and these OEMOften want to the time reduced complexity and render on market by such device.Additionally, the newest market demand and newGovernment demand require operator to provide a more open process thus new equipment introduced its network, wherein this process is notNeed all these special design described above and certification.These and other factors various are just promoting lower complexityProperty and the design of time-consuming wireless device and the demand increased of verification process and trend.
This trend has caused many operators to start selling the device being designed to be more like standard the Internet service unit,These devices are connected to the Internet or other data network by operator wireless network.Along with cellular network is to increasingly, there is a kind of growing requirement to allow common interconnection network device and application to obtain in many new equipment, application and market accessWireless network must be accessed without experiencing special design and verification process, so that device and application are for accessing thisIt is efficient for class wireless network and through authorizing.
But, common interconnection network device is not saved or saves wireless network access bandwidth.And, along with the shape that forever networksThe appearance of the wide area network of state, result in, to the connection of the Internet, the access being typically assumed to be dirt cheap and has not generally notedThe popular Internet service of such as network busy state and application.Along with more at various wireless networks (such as, mobile wirelessNetwork) on common interconnection network device be supplied to us, a lot of inefficient wireless networks access persistently to be occurred, and this is sometimesNetwork capacity can be reduced to hinder this device (such as, user, device, software requirement) and/or over the wireless network itsHis device and/or this wireless network segment level to the access of service.As discussed above, for wireless network bandwidth, capacity,And the wise use of resource typically results in the more preferably service to all users, but now, device manufacturer and wirelessNetwork Provider (such as, wireless carriers or operators) does not the most provide or implements more intelligent bandwidth and uses skillArt.These factors typically result in the less operator to device design and control, and this causes protects longer-term network capacity and performanceThe threat stayed, because the quantity with the device optimizing less wireless design persistently rises.
There is network performance and user performance factor that many is affected by network efficiency, including such as, overall network is congested;The access network that one or more groups user, device, application, network service source, communication protocol and/or operation system function are experiencedNetwork performance;And/or given user, device, application, network service source, communication protocol and/or operation system function instituteThe performance of experience.Under a relatively low capacity requirement to wireless network, as by one group of device, application, network service source, communicationAgreement, operation system function and/or user or by a single device, application, network service source, communication protocol, operation systemThe network performance that system function and/or user are experienced can the most proportionally be demoted and (such as, network be deliveredAggregate flow can be the most proportional for peak value available network flow), along with from one or more groups user, dressPut, apply, network service source, communication protocol and/or the network insertion of operation system function and/or the progressively increasing of traffic demandAdd.But, owing to Internet resources/network capacity requirements increase (such as, demand more wireless network data flow generally;More device is serviced by network;More user is serviced by network;More application is serviced by network;More netNetwork service source is serviced by network;More operation system function is serviced by network;And/or more difference QoS session byNetwork is serviced), network availability/performance can reduce and/or network can be one or more users, device fully, answerWith, network service source, communication protocol and/or operation system function service, or can not be one or more groups user, device, shouldWith, network service source, communication protocol and/or operation system function service.
Have how about the network capacity requirements increased reduces many examples of network performance, including such as, each deviceThe reduction of the average bandwidth provided is (such as, in a device, application, network service source, communication protocol and/or on the apparatusOne or more users of the operation system function performing/implementing);The increase of flow delivery latency;Flow delivery latency is shakenIncrease;To one or more devices, user, application, network service source, communication protocol and/or operation system function oneOr the bandwidth of insufficient guaranteed or difference of multiple difference QoS and/or dynamic QoS service (such as described by this);The delay increased of RSVP service;The delay increased of QoS reservation service;Property with one or more communication protocolsCan problem;Unacceptable delay in Consumer's Experience, and/or led by the network capacity of the network availability reduced and/or reductionCause various other or similar result and device or customer impact.There is the network performance of too much offered load or degradationThe example of network communication protocol of made performance degradation include, such as, Internet protocol (IP), HTML agreement, voice communicationAgreement (including VOIP agreement), live video communication agreement, stream media protocol (such as, audio frequency, video etc.), Game Protocol, VPNAgreement, file download protocol, background service agreement, software upgrading agreement and/or other network communication protocols various.Therefore, protectIt is important for staying/protect network capacity.
Control within a given period by given Internet resources (such as, edge network section, base station, base stationController, MAC resource, picocell, Microcell etc.) quantity of required transaction is also important, so that demand is notSurpass the transactional services ability of these Internet resources.Such as, the Internet resources that should not experience excess transactions demand can include base stationOr base station controller resource, medium education (MAC) resource, flow carry resource, AAA resource, safety or certification resource, returnBelong to agency's (HA) resource, DNS resource, in Network finding as a part of resource, gateway or router resource, data sessionReserved or set up resource (such as, manage, set up, carry out and/or close service conversation, PPP session, communication process, communication stream,QoS flow journey, RAB reserve the Internet resources that resource, tunnel, VPN, APN, special service route etc. are required), bandwidthReserved resource, QoS reservation or resource of coordinating, QoS conveying resource, service charge resource, flow analysis resource, network security moneySource and/or various other or similar Internet resources.In some networks, owing to participating in setting up, service, carry out, safeguard,And/or close one or more nets that the information needed for required network service connects and/or carries out a service activity exchangesNetwork resource or limited trading processing ability or limited flow bandwidth and the various Internet resources that cause become to bear and more comeThe biggest, be stepped up of Internet resources/capacity requirement given measurement the network performance degradation caused can becomeRelatively large.Such as, if needing the equipment setting up a PPP session can only process certain number in each given periodNew PPP session is opened and/or is closed, and if device behavior be so that PPP session is often unlocked and/or closes, thenPPP session transaction rate (such as, open and/or close) can be more than the trade capacity of PPP session management resource.This is sometimes referred to asThere is overfull demand or " the flooding " or " overload " to Internet resources of excess connection, and, in this type of situation, networkResource service transacting demand side can start with one control well mode (such as, Internet resources can with or approximationIt is that these Internet resources continue with transaction with a maximum speed) lag behind, or in some cases, this resource is permissibleOne controls not to be good mode, and (such as, Internet resources may over-burden, so that its processing speed not only fallsAfter amounting to transactions demand, and transaction rate disposal ability also reduces under overload) fall after transactions demand.In PPP meetingWords are set up in resource instances, and the speed of the transaction once asked exceedes resource maximum transaction rate, the device need the most not metAsk and can rise to a point, at this point, one or more devices be attached with network and/or communicate (such as, send/Receive data) time experience postpone.
As another example, in any class of Stochastic accessing RSVP agreement, MAC protocol or bandwidth delivering protocolIn type, in not there is the suitably management that flow accesses reserved and/or transmission and/or the network controlled, owing to network needsAsk increase, in reservation request, flow transmission, application demand, network service source demand, communication protocol requirements and/or operating systemThere may be more conflict between functional requirement, cause and can make user, device, application and/or network service performance degradationThe reduction of network efficiency, so that performance is reduced under acceptable degree.As another example, there is oneQoS service session is reserved in the system of system, and QoS reservation that is unsteered and/or that do not manage asks and/or reserve mandate to leadCause QoS reservation resource and/or QoS service delivery resources and be reduced to the burden of point under required degree to QoS service performanceOverweight situation.As another example, requiring that some least resource for transmitting, reserve or Internet resources being concluded the business are dividedJoin in the network of form, if one or more device, application, network service resource, operation system function and/or communication protocolsDiscuss, for small-sized transmission payload, there is higher Internet resources access attempts, network insertion or message transmission rate (such as, minimumMAC reserve the factor, the minimum safe expense factor, the minimum QoS reservation factor, to setting up minimum time response that base station connects, rightSet up or close/minimum time the response etc. of release from a session), network can become poor efficiency.Even if including access eventsPacket be small-sized, complete the Internet resources needed for this access events generally than the time segment length needed for actual data transferMany periods in be busy with servicing for this access events.
Another example of the device service activity behavior that can affect network performance is device, device subsystem and/or adjustsModulator-demodulator subsystem is from the power down mode power cycle to another or the mode of conversion.Such as, set up from device toWireless base station be substantially connected to a period of time internal consumption base station resource, and in some cases, also can consume other networksResource such as AAA, HLR, HA, gateway, charging and/or charging gateway resource.When modem subsystem (such as, or this deviceSome other parts) from active connection state to power down mode, if device is terminated to the connection of base station, should the most every timeDevice enters power down mode and during with backed off after random power down mode, sometimes measures with the second or the most even at someWith a minute period for measurement, consume Internet resources.Save if such device has a kind of entrance after a short idling cycleThe radical power savings algorithms of electricity condition, then this device behavior can proportionally consume ample resources, so that this network supportThe ability of multiple devices reduces, or makes this network can not support very many similar devices in a network.Another is similar toExample be that once base station connection establishment (such as, sets up a PPP meeting between device and home agent (HA) or other gatewaysWords), then BlueDrama will be set up, if wherein a device presents radical power down mode circulation or continually because of itHis reason terminates data session, and the required Internet resources to open and/or to close this BlueDrama are consumed by unknown.
Another example of the device service activity behavior that can affect network performance be maintain lasting network service shouldWith, this network service generates substantial amounts of network packet.Some application have the lasting signaling belonging to this class.Concrete exampleIncluding device signaling sequence frequently thus update the small routine of desktop PC;Synchronizing user data such as calendar, contact person,Email and/or other information/content;Inspection or more new e-mail or RSS are subscribed to;Access social networking website or workTool;Online text, voice or Video chat instrument;Update real time information;And carry out other behaviors repeated.Can seriously takeThe additional application behavior of Internet resources and capacity includes such as, conference service, video flowing, content update, software upgrading and/Or other or similar application behavior.Such as, even the direct application with this type is not had to interact or be therefrom subject to as userBenefit, this application still can consume important Internet resources at running background continuation potentially.
Such as, it is possible to decrease it is right that the type of capacity and/or the service activity of network resource availability and/or device behavior includesOS and the software upgrading of application, frequently OS and application background network access and signaling, frequently Network finding and/or signaling(such as, EtherType message, ARP message and/or other message communicatings relevant to network insertion), cloud synchronous service, RSSSubscribe to and/or other background information are subscribed to, applied under (such as, web browser) or device behavior report, backstage EmailCarry, content subscription service updates and downloads (such as, music/video download, news subscription etc.), text/voice/video chat visitorFamily end, virus renewal, peer to peer connection working application, network insertion invalid in power cycle frequently or power down mode circulateSequence, a large amount of download or other high bandwidths access and/or constantly and/or continually access network have information littleType transmission or the greedy application program of request.Those of ordinary skill in the art be would is that significantly by other examples various.
So, the highest device transmission bandwidth demand can make network capacity, network performance and/or network resource availabilityDegradation, and that other types are accessed by network resource request, network data or other network interactions cause is lasting or frequentlyFlow can also make network capacity, network performance and/or Internet resources degradation, the total no matter overall data throughput is measuredBandwidth demand is high or low.As such, it is desirable to certain technology retains network capacity, controlled by difference the most in every wayThe network service use activity of these types, depends on that service activity request network insertion and/or request are concluded the business with Internet resourcesType.
Owing to such device on the way moves between cellular basestation, smart phone and similar device are by carrying outThe inquiry frequently of wireless network is increased the weight of this problem, such as, push email, accesses social networking instrument and/or enterOther activities repeated of row.When data traffic is also when increasing, being estimated by some, signaling traffic exceedes actual movement data streamTen to five 13 the percent of amount.Such as, a Yahoo IM user can send a piece of news, but waits between message subsequentlySeveral seconds.In order to protect battery life, smart phone typically enters idle pulley.When user pushed another message after several secondsTime, device has to be again started up signaling paths, and even when this signal resource is discharged by smart phone, typically networkReact the fastest, behind several seconds and sometimes a few minutes, it is provided that next website is to use resource.As a result of which it is, at thisBase station controller its ample resources of positive expense in example goes trial to process this signaling, and therefore it can not carry out other task such asUse the resource outside allocation for data network, and this type of poor efficiency has increased the weight of data network capacity crisis and in this type of nothingCall drop is there is on gauze network.
What smart phone distributors used a kind of solves this problem and to save the method for battery life on its device be realExecuting quick dormancy characteristic, this quick dormancy characteristic allows mobile device to inquire about radio network controller rapidly thus releasesPut connection, so that it can return idle condition quickly.In other words, this device has relayed following facts: mobile phone entersEnter dormancy, saver resource (such as, signaling channel) rather than Internet resources.But, quick dormancy characteristic can be by onlyContinue to ask network release prematurely or by re-establishing and this network along with the request being back connected to this networkConnect request and increase the weight of this problem.
Virtual network operator has typically attempted to the various method based on pure concentration/core network of use and has managed network appearanceAmount.Such as, some operators have been pointed out, and need the capacity planning process of a robust and enough investments to alleviate this and increaseCapacity crisis.Pure centralized network scheme not from the auxiliary of ageng (or service processor) based on deviceCan have some limitations.Such as, for the application of some devices, OS function or other service use activities, under consuming in the airAfter load (OTA) spectral bandwidth is to open or to start to open a communication jacks, if the somewhere of the network that this activity is behind base stationBlocked, although the most not allowed data transmission, network capacity or the resource of appreciable consumption still can be there is.It addition,If service use activity is set up network and connected thus to transmit in data be invasive reattempting to, and network continues to permitPermitted this connection establishment OTA part but in a network somewhere block this connection, then a large amount of capacity can be represented this class behavior by manyDevice consumption, even if not allowing any useful service.Therefore, some are for protecting the embodiment of network capacity to includeSources controlling network service use activity at demand device.Further, in some embodiments, service use withA kind of mode is controlled, and which postpones, stops or reduces service use activity and reattempts to the frequency being connected to network.
In some cases, when service use activity is controlled by center network apparatus, blocks, throttles and/or is delayed, produceGive birth to pure centralized network for protecting the additional defect of the scheme of network capacity, and do not have any mechanism or support to be linked toDevice users interface (UI) thus notify that what this user there occurs and why it occurs.This may result in user gloomyThe carrier customer satisfaction experienced and be lowered.Therefore, in some embodiments, it is provided that UI based on device thus beUser provides about why a service use activity is controlled, blocks, throttles and/or the most controlled realityTime or close to real time information, thus protect network capacity.In some embodiments, it is provided that a kind of UI, this UI inform about useWhen family exists for protecting the purpose of network capacity to arrange, control, rewrite or revise service and uses the option controlled.?In some embodiments, the input of this type of user preference is also corresponding with the change of service use charging.In some embodiments,Led to by a UI owing to the Service controll saving capacity of user changes this type of change in service uses charging causedKnow that sequence communicates with this user.In some embodiments, when the service classified for difference user's notification strategyWhen using activity that user may be caused to check the service program upper limit (such as, the counting SC service ceiling of total data byte), it is used for protectingThe technology of network capacity uses user's warning.
What is desired is that intelligent network monitoring thus wireless network (such as, Radio Access Network and/or core net is providedNetwork) real-time traffic monitoring network service use (such as, packet level/layer, network stack application interface level/layer and/or applicationLevel/layer) and effectively manage Web vector graphic with protection network capacity (such as, when still keeping acceptable Consumer's Experience).MakeBy device assistant service (DAS) technology, and use in some cases network assistance/network technology is supplied to dressPut, Virtual network operator/provider network service uses monitoring to be provided thus more deep geographical solution what device, what useFamily and what application and when and where network congestion problem occurs, enable an operator to when necessary to some regions intelligenceGround increases additional resource and (such as, data traffic is unloaded in Microcell or Wi-Fi hotspot and increases more network moneySource), thus differentially control network service and use and/or differentially network service based on such as network busy state madeWith charging, to protect network capacity.
The intelligent network monitoring of the wireless network of network capacity is protected to wrap for effectively managing network service useInclude and provide device assistant service (DAS) to protect network capacity according to various embodiments described here.Such as, for effectivelyManagement network service uses thus protects the intelligent network monitoring of the wireless network of network capacity can include differentially controlling in the airDownloaded software updates and/or only carries out software upgrading by wired connection.As another example, for effectively managing network clothesMake sure with thus protect the intelligent network monitoring of the wireless network of network capacity can include differentially controlling to require important networkResource or the various application of network capacity.As another example, protect network for effectively managing network service useThe intelligent network monitoring of the wireless network of capacity can include the management caused by the off-position of the repetition in modemNetwork insertion connection request, its reconnect that may result in resource-intensive and/or re-authentication process.As another example,Protect the intelligent network monitoring of the wireless network of network capacity can include for protecting for effectively managing network service useHold the technology of PPP session persistence, thus avoid for re-establish PPP session and the needs of consumption of network resources (such as, unless shouldImply that average turn-on time is sufficiently long for there being PPP session to be broken with behavior analysis, and be not resulted in overall networkResource limit).
It is used for setting up on network that one single-ended or (one or more) end-to-end guaranteed service etc. unlike traditionalThe QoS technology of level is such, disclosed herein for protecting the enforcement of the technical assistance of the network capacity service on network, thusAssist to control some difference serviced (such as, to reduce network congestion, network capacity requirements, network money with protection network capacitySource demand;And/or increase network availability).As the most disclosed herein, disclosed herein for protecting the technology of network capacityAid in the enforcement of service on network, thus assist to control some difference serviced can also pass through with protection network capacityNetwork capacity/level of availability required for maintenance assists QoS to implement, thus assists the delivery of some QoS grade/class.ExampleAs, disclosed herein assist some is serviced for protecting the multiple service of technology polymerizable of network capacity and/or deviceDifference control, to protect network capacity.As another example, disclosed herein for protecting the technology of network capacity to use(such as, dynamically distribute/classify in providing dynamic QoS classification and reassignment/reclassification is (based on various standards, event and/or surveyAmount) network service use activity to various QoS grade/classes, as described in this) thus assistance difference control that some is servicedSystem, to protect network capacity.
It thus provides for the device assistant service (DAS) protecting network capacity.In some embodiments, it is used for(such as, network congestion and/or network at network edge element connect in the protection of the DAS offer network capacity of protection network capacityEnter/resource requirement and/or network availability, as on the Radio Access Network (RAN) of wireless network, and/or from device to baseStand/base station controller), as by controlling to carry out the network service activity use activity of the device of radio communication with network, thusReduce the requirement to network.Such as, control network service use activity and can include that (such as, IP address please to network insertion requestAsk), network insertion reservation request (such as, QoS reservation/sequence), network capacity/resource use (such as, bandwidth uses) and/Or other any network service use activities carry out classifying and/or controlling.In some embodiments, application, OS function and/Or other are classified from the network service use activity of network address server resource request IP address and/or control, so thatThese IP Address requests are retained, postpone, the time of carrying out divides window, frequency reduces, polymerization or otherwise control.At someIn embodiment, this type of for one or more application, OS function and/or other network service use activities " IP address pleaseSeek control strategy " connect and carry out with a network element (such as, service controller or another network element/function) being passed through networkIt is set before communication, updates and/or revises.In some embodiments, network service usage behavior is by application, operation systemSystem (OS) function and/or other perform the software/function on the device communicated with network and be generated/ask.At someIn embodiment, it is desirable to use control strategy to protect network capacity for network service use activity application service(such as, reducing network capacity requirements).Such as, some application and/or OS function limit some base postponed in the applicationIn the ability of the discharge pattern being fixedly installed, and this type of application and/or OS function typically can not optimize based on current networkThe network service use activity of busy state (such as, network capacity based on variable level and/or this device can internetworkingCan).In some embodiments, network busy state (such as, or vice versa network availability state) is for one or moreThe characterization of congested (such as, or vice versa active volume) of the network that device connects.Such as, network busy state can provide netIt is the busiest or congested measurement that network or network segment (such as, network edge element) connect for one or more devices.MakeFor another example, what network connection resource is network availability state can provide connect for one or more devices is availableMeasurement.So, network busy state and network availability state can by provide similar information reverse in the way of examineConsider, and as at this relative to described by various embodiments, these terms are interchangeably used.
In some embodiments, it is provided that be used for assigning priority to network service use activity and based on being distributedPriority, control to use the technology of flow of moving phase association with network service.In some embodiments, it is provided that be used forEnforcement difference and dynamic background service classification, such as, as network availability state and/or the function of network busy stateTechnology.
In some embodiments, the service that employs uses control strategy to connect with the network of auxiliary network service use activityEnter to control (such as, postponing the some or all of network capacity requirements movable from these sources).In some embodiments, someOr all-network capacity requirement is satisfied on a point, on this some Internet resources or capacity be more can or the most numerousHurry.In some embodiments, it is provided that the network service for being associated with one or more application or OS function is livedMove and be categorized into a background service class, and differentially control the technology of this background service class flow.In some embodiments, carrySupply for by one or more network service activity classification to background services being associated with an application or OS functionClass, other network service activities being associated with this application or OS function simultaneously are classified into other service classes (such as, or to notWith background service class priority) technology.
In some embodiments, it is provided that be used for determining that network busy state is (such as, for a network to deviceEdge member connects, as accessed and/or to the current base carrying out radio communication with this device for the active wireless network of deviceStand/the RAN of base station controller) technology.In some embodiments, it is provided that for service implementation use control strategy fromAnd be that an activity, one group of activity or a service class differentially control the skill of network flow of services based on network busy stateArt.
In some embodiments, for protecting the DAS of network capacity to include the net to the communicator in network serviceNetwork service use activity is monitored;Network service use activity is classified thus carries out difference Network access control to protectProtect network capacity;And network service use activity is used with network service and controls by classification of based on network service use activityStrategy is associated thus assists to carry out difference Network access control to protect network capacity.
In some embodiments, network service use activity is to be included any of wireless communication by what device was carried outMovable.In some embodiments, application, operating system (OS) and/or other apparatus functions generation network service use and liveDynamic.In some embodiments, application, operating system (OS) and/or other apparatus functions generate one or more network servicesUse activity.The example of network service use activity includes following: (such as, the voice of coding connects or through IP in voice connection(VOIP) voice connects), device application or small routine connects, device OS function connects, e-mail text connects, electronics postalPart downloads connection, file download connection, Streaming Media connection, positioning service connection, Map Services connects, software upgrading (such as, shouldUpdate with, operating system and/or anti-malware) or firmware update connect, device backup connects, RSS subscribe to connect, websiteConnect, connect to the connection of server, web browser, connect for the Internet of device based on service activity, set up withStep service account, user data synchronization service, device data synchronization service, network connect flow process or stream, socket connection, TCPConnect, destination/port distributed connection, IP connect, UDP connect, HTTP or HTTPS connect, TLS connect, SSL connect,VPN connect, usual network service connect (such as, set up PPP session, certification network, obtain IP address, DNS service) andThe various other kinds of connections by wireless communication, as will be obvious to those of ordinary skill in the art.
In some embodiments, network service use activity be classified into, relevant be linked to and/or be assigned to one afterPlatform class (such as, background service or QoS class) thus assist carry out difference network service use control to protect network capacity.OneIn a little embodiments, difference network service uses control to include in the following one or more: uses network service and livesMove and be monitored;Network service use activity is carried out charging;Network service use activity is reported;Make for network serviceUser's notice is generated with activity;Activity request user preference is used for network service;Active reception user is used for network servicePreference;Implementing network service uses active policy (such as, to block/allow;Flow control technique such as throttling, delay, priority teamRow, time window, hang up, isolate, inactivate, remove and other well-known flow control techniques);Implement UI and intercept process;Generate network busy state notifying;Generation background class notifies;Use control to generate network service for difference network service and use aliveDynamic user's notice;And various other technologies as the described herein.
In some embodiments, network availability state includes one section of network (such as, last limit of wireless networkEdge element) the state of availability/capacity or measurement.In some embodiments, network availability state includes one section of networkThe Web vector graphic level of (such as, last edge member of wireless network) or the state of network congestion or measurement.Real at someExecuting in scheme, network availability state and network busy state are contrary measurements.As at this relative to some embodiment instituteUsing, network availability state and network busy state can be based on such as design alternative (such as, based on network busy state or netThe design of the distribution backstage strategy of network usability status produces similar result, but they be by network performance and/or capacity and/Or the different modes of congestion characteristics) and be used interchangeably.In some embodiments, change based on network due to this type of stateUsing activity (such as, based on temporal information, availability/capacitance grade, congestion level and/or performance rate), network can be usedSexual state and network busy state are dynamic measurements.In some embodiments, the difference network of network service use activityService uses and controls based on network busy state or network availability state.
In some embodiments, some network service use activity is classified as background service.In some embodimentsIn, lower priority and/or less important (and/or based on various other standards/measurements) network service use activity baseIt is classified as background service in network busy state, is differentially controlled based on network busy state, to protect network capacity.?In some embodiments, difference network service uses control strategy to be based on temporal information, network busy state, believe based on the timeBreath and/or the background service of network busy state and/or the change of QoS class, access for some network service use activityRandom back, for some network service use activity deterministic schedule, be based on temporal information, network busy whereinOne or more service activitys of state, service program and various other standards, measurement and/or technology described herein orThe time window changing display network service use control strategy of backstage/QoS class.
In some embodiments, a network capacity managed service or network capacity managed service class include being chosen useOne or more network services (such as, the backstage download clothes controlled to protect network capacity are used in carrying out difference network serviceBusiness and/or other types described here various or the service of classification).In some embodiments, a network capacity is controlledClassification of service includes one or more network service being associated with a network capacity managed service/class priority setting, fromAnd carry out difference network service and use control, to protect network capacity.In some embodiments, the controlled clothes of network capacityBusiness or network capacity managed service class include one or more network service being associated with a QoS class, thus carry out differenceNetwork service uses and controls, to protect network capacity.In some embodiments, a network capacity managed service or networkCapacity managed service class includes one or more network service being associated with a dynamic QoS class, thus carries out difference networkService uses and controls, to protect network capacity.
Such as, based on network capacity managed service or dynamic QoS or the difference to network service use activity of QoS classificationControl can be by such as improving network performance, increasing network availability, reduction network resource requirement and/or reduce network capacityDemand (the polyplant that such as, based on single device, is connected to an edge member and/or be connected to many edge memberPolyplant) protect network capacity.In some embodiments, based on network capacity managed service or dynamic QoS or QoSThe difference to network service use activity of classification controls to protect network capacity when keeping normal plant running.OneIn a little embodiments, based on network capacity managed service or dynamic QoS or the difference to network service use activity of QoS classificationControl can keep acceptable Consumer's Experience (such as, normal and/or desired plant running, normal and/or software/Application/OS/ function is run, is avoided (as possible) on the most contrary impact of apparatus function and/or to keep user by realityExecute user's notice that the various difference on device control to be notified) time, protect network capacity.
In some embodiments, dynamic QoS classification include can by based on various standards as the described herein, measurement,Arrange and/or user's input (such as, based on temporal information and/or the some day of one week, based on network busy state, based onFamily preference and/or based on service program) and dynamically revise (such as, reclassification, heavily change priority, upgrading and/or degradation)Dynamic QoS classify in some embodiments, described herein various be associated with DAS thus for DAS provide network appearanceThe technology of amount and/or QoS is applied to the technology that dynamic QoS is relevant.
Owing to wireless network (such as mobile network) is to more high-bandwidth service evolution, this can include or the most various grade of needsService quality (QoS) (such as, conversational, interaction data, flow data and/or can be benefited from QoS various (it is right to holdEnd) real time service), by increase thus assist this type of service to be used for network (such as, it is allowed to control the demand of the network service of polymerizationSystem and/or support this type of service (such as, QoS support) through network boundary, as between wireless network (such as various service providersNetwork) between and IP network (such as the Internet) between, and/or between other networks) peer-to-peer services.Although having attempted eachPlant and make great efforts to solve this type of QoS needs, as being used for assisting the policy management framework of the end-to-end solution of QoS, but still suffer from makingThe needs of various QoS demand are assisted with device assistant service (DAS).
It thus provides for the service quality (QoS) of device assistant service (DAS).In some embodiments, it is provided thatQoS for DAS.
In order to set up a QoS channel, differentiated services typically can use, wherein at network (such as wireless network)Upper offer differentiated services, a service class/grade has higher priority than another.Such as, in a wireless network,Can configure and control various network element/function thus set up a single-ended or end-to-end QoS channel.In some embodiments, carryFor DAS technology with the foundation of the various interelement QoS channel of aided coordination wireless network and the centralized QoS of controlPolicy co-ordination and decision function.
In some embodiments, QoS channel refers to be connected to the QoS providing required grade of a deviceLogical channel.Such as, can create QoS channel together with one or more QoS links, wherein each of the links represents oneThe connection that QoS enables, the total ad-hoc network communication path from a near-end device a to far end device is crossed in this connectionA part.Such as, far end device can on identical network or different networks, be likely to be of different access technologies and/orDifferent access network operators.In some embodiments, QoS channel includes one or more QoS link, wherein at this letterEach of the links in road be QoS enable, or one or more link in the channel be QoS enable and other notIt is.As an example, a QoS channel can include following link: first device flow path link, sets for access networkFirst device (such as, 2G/3G/4G wireless base station, WiFi access point, cable system head end, DSLAM, the optical fiber of standby element linksAggregation, satellite aggregation or other Network Access Point/node), the first operator core network, distance IPX netNetwork, the second operator core network, for the second device of access network device element links and the second device flow pathLink, as relative to various embodiments at this similarly described by.
In some embodiments, that section that these links described above each have for total QoS channel carriesAbility for QoS service.In some embodiments, device flow path link and/or for access network device element chainThe device on road is that QoS enables, but operator core network and/or IPX network link are not QoS to be enabled.Real at someExecuting in scheme, core network and/or IPX network have enough RSVP spaces so that QoS is not limited by these network elementsSystem, and such as, can be limited by device flow link, and/or the device being used for access network device element links does not hasEnough extra bandwidths thus need QoS to enable that these QoS channel links.One common example is that 2G/3G/4G is wirelessNetwork, wherein device flow path link and device (such as, the RAB for access network device element links(RAB)) be QoS enable and operator core network and IPX network link be not (such as, transmit as possible the grade of service orOther grades of service are provided).
In some embodiments, QoS session refers to that, for given device, the QoS flowing through QoS channel or QoS link makesThe flow of energy.This QoS flow amount supports QoS service activity.In some embodiments, QoS service activity include having one toRequested, the configuration determining QoS grade or the device service preferably serviced use.In some embodiments, device QoS livesDynamic is the one or more combination in the following: application, destination, source, socket (such as, IP address, agreement and/orPort), socket addresses (such as, port numbers), URL or other similar service identifiers, service provider, network type,Discharge pattern, content type, procotol, conversation type, QoS identification symbol, temporal information, network capacity (such as, network busyState), user's service program mandate or continue, roaming/local network state and/or other be as the described herein similar toStandard/measurement.Such as, QoS session the QoS service activity supported can include VOIP flow, streaming media video flow, at net(multimedia conferencing connected such as network (such as, shares demonstration, figure for the difference access bandwidth of network peak hours/period, real-time, interactive flowPicture, video, voice and/or other this type of application/service)), as possible transmit mutual (such as internet browsing), the clothes of time-sensitiveBusiness (as email message theme delivers), approximate real time interactive service (if SMS or propelling movement are with talk), backstage download service(such as email download and alternative document transmission (such as, FTP)) and/or true backstage download service are (such as software upgrading (exampleAs, the OS updated including content/signature or application software update and/or anti-malware updates)).
In some embodiments, various QoS grade or class are supported.Such as, conversation class can provide real-time traffic, and this is real-timeFlow the most very delay-sensitive, but tolerable error code or packet loss.Typically, conversation class for ip voice (VOIP) andVideophone, wherein the user of this type of service is benefited from the short delay feature of this conversation class.Streaming Media class is similar with conversation class,Except Streaming Media quasi-representative more than conversation class tolerance postpone.Streaming Media class is being generally user when the one end connected(such as, human user) and the other end be machine/computer (such as, streaming media content is applied, as video flowing (asFilm or other video contents)) time use.Interactive class is typically for allowing when requiring the rational low-response time to postponeThe flow of change (such as, web page browsing or other application, wherein can not use channel in long period, but when user pleaseDuring the page/the data looked for novelty, response time should be the lowest.).Background class is generally used for the service of lowest priority to be madeWith (such as, be typically used in the Email with or without download/adnexa, application software update, O/S software update and/Or other similar applications/functions).In some embodiments, various QoS classes or service can be used for conversation class.Real at someExecuting in scheme, various QoS classes or service can be additionally used in Streaming Media class.In some embodiments, various QoS classes or service also may be usedFor interactive class, but typically it is not useable for background class.As being to those of ordinary skill in the art now it will be evident that baseLower or higher granularity can be had in service use/channel requirements and/or other classes various of the network architecture.
In some embodiments, QoS link or QoS channel support a QoS session.In some embodiments, QoSLink or QoS channel support multiple QoS sessions.In some embodiments, it is provided that QoS link configuration thus be one giveQoS session or one group of QoS session QoS flow amount grade is set.
In some embodiments, QoS channel is single-ended QoS channel or end-to-end QoS channel.Such as, if QoSChannel is end-to-end, then each QoS for QoS channel enables link, and QoS channel configuration is complete in the way of a kind of coordinationBecome.If QoS channel is single-ended, then network element and/or device participate in a configuration held of QoS channel as much as possible, willThe other end of channel is left in QoS configuration for, as the device processing flow and/or the responsibility of network element of the QoS channel other end.OneIn a little embodiments, single-ended QoS channel is included in another single-ended QoS channel of the other end.In some embodiments,Only one end has the enforcement of single-ended QoS channel, and the other end of this channel is to transmit the grade of service as possible, and such as, it canUse and than the other end, flux capacity or quality had the place of tightened up restriction in one end of QoS channel and (such as, haveThe VOIP audio call that the QoS of one end enables on 3G wireless network, itself and the cable modem of the underloading at the other endNetwork equipment is compared has relatively stringent bandwidth, and the cable modem network equipment of the underloading of the other end can need not beQoS enables, thus obtains enough voice qualities).
In some embodiments, QoS request (such as, QoS channel request or QoS service request) is to configure for QoSThe request of event, so that one or more QoS service activity can have QoS channel.In some embodiments, QoS canWith property assessment include determining these links in possible QoS channel one or more be whether available (such as, based onNetwork capacity and transmission quality), thus the necessary grade of the QoS channel configuration QoS by being asked.In some embodiments,QoS request is initiated by device, user, application and/or network element/function, as this similarly described in.
In some embodiments, service program refers to be associated with communicator access service ability, QoS ability and/Or the set of network capacity managed service.In some embodiments, access service ability, QoS ability and/or network capacityManaged service is determined by the set of the access service control strategy for device.In some embodiments, these service controlsStrategy processed is implemented in the network device.In some embodiments, these access service control strategies are at device and the network equipmentThe two is implemented.In some embodiments, these access service control strategies are implemented in a device.In some embodimentsIn, based on different grades of service program payment or device identity or user identity, there is different Service controll ability (examplesAs, strategy) grade.In some embodiments, exist based on network type, temporal information, network busy state and/or itsThe different grades of Service controll strategy of his standard/measurement, as relative to various embodiments this similarly described in.In some embodiments, Access Control and QoS control strategy are types based on the service activity being look for.At someIn embodiment, for a given device or user, given service activity can QoS grade and access grade by withThe strategy that service program is associated determines.In some embodiments, carrying out QoS authorizes assessment so that it is determined that a device or useWhether family has enough service programs exists the QoS grade asked with permission.
In some embodiments, before configuration QoS channel or link (or before response or meeting QoS request), carry outQoS availability assessment with determine whether there is available enough communication channel resources thus must for QoS channel or link configurationThe QoS grade of palpus.In some embodiments, one or more necessary by this channel of this QoS availability assessmentQoS link evaluation can QoS capacity and determine.Such as, available QoS link capacity can be for one or more device flowsPath, device, core network link and/or IPX network link for access network device element links and be estimated.If QoS assessment shows that necessary channel capacity and quality are for the QoS needed for one or more required QoS service activitiesGrade is available, then can authorize QoS channel request or QoS service request.In some embodiments, it is provided that QoS linkOr QoS channel reservation process is with QoS capacity reserved before link or channel configuration and quality, thus ensure available QoS resourceNot allocated between QoS availability assessment and QoS channel configuration.
In some embodiments, after QoS authorizes assessment, QoS availability assessment is carried out.Which prevent when device or useThe operation of nonessential network element when family does not have a QoS of grade needed for enough users plan to exist thus receive, althoughIt is available.This can be as the important screening function on the device carried out in service processor, or by centralized networkFunction is carried out, such as service controller (such as or interchangeably, home agent;Attaching position register (HLR);Authentication, authorize,And charging (AAA) servers/gateways/function;Base station;In gateway, "Policy and Charging Rules Function (PCRF) one or otherNetwork element/function).In some embodiments, have evaluated QoS availability, and QoS need not be carried out and authorize assessment or right receivingBefore QoS authorizes the response of assessment.
In some embodiments, QoS channel is configured to create QoS channel thus supports QoS session (such as, QoS clothesBusiness activity).In some embodiments, QoS channel configuration includes distribution, route and/or otherwise causes QoS sessionFlow thus flow through the one or more QoS links at the QoS channel distributed.
In some embodiments, device assistant service flow-control and QoS are easily and directly applied to believe into QoSThe problem of road configuration management QoS device link.Therefore, in some embodiments, it is provided that service provider is to assist configurationThe device part of QoS channel.In some embodiments, service processor is by placing higher at higher QoS grade flowThe priority of grade and configure the device link portions of QoS channel.In some embodiments, QoS is implemented by multiple methodPriority, is routed in the first priority in downstream and/or upstream flowrate queue including by the QoS flow amount of higher priority.In some embodiments, by first ensureing bit rate flow with the transmission of higher available section flow rate;Second with the joint controlledFlow rate transmission difference QoS flow amount;3rd transmits flow as possible with the relatively low institute's throttle rate controlled;If when/bandwidth is notThe QoS flow amount of greater degree is taken, and the 4th and/or directly carry out with the relatively low throttle rate controlled transmission background trafficUpstream flowrate is queued up.Such as, can be by by queues traffic and delay or stop having of the QoS priority to lower grade to be returnedTCP acknowledgment operate downstream flow, and for the QoS priority of higher level directly by flow and TCP acknowledgment.So,The device link portions of QoS channel puts available bandwidth at any time according to device, by for queuing priority allocation strategy,It is configured for the delay of device assignment of traffic, throttle rate and TCP acknowledgment return rate.In some embodiments, various devices clothesBusiness processor flow control capability indicates according to one group of network strategy (in some embodiments, plans plan including a userSlightly set), adjust or partly adjust QoS.
In some embodiments, device service processor sets up multiple QoS channel, the most often through device flow pathIndividual QoS channel has flow control policy as the described herein, and each QoS channel strategy group creates different QoS classes.OneIn a little embodiments, use this many QoS channel method, by routing traffic to that there is suitable QoS plan for this QoS activityThe suitable QoS channel that slightly arranges and provide the QoS of the service activity given for.Various technology can be used to provideThe suitably route of QoS channel.Such as, can pass through to use the common of the flow set for association moving phase with all QoS serviceFlow of services control strategy collection and this route is provided, these QoS service action needs or request by common flow of services controlThe QoS that system strategy agent provides.The application of flow of services control strategy collection can be in secondary described strategy enforcement by multiple useThe mode of the embodiment that agency and policy control are acted on behalf of and described is implemented.In this type of embodiment, decrease QoS channelThe problem being assigned to multiple QoS service activity, thus each application service flow control policy in these QoS service activitiesPredetermined set, wherein each predetermined set of flow of services control strategy represents different QoS classes.Subsequently, device can baseIn utilizable flow capacity and quality, to the total polymerization traffic demand of each QoS flow amount class and determine compared with other class of traffic,In utilizable flow capacity and the quality of a given grade, each class of traffic is how configuration difference bit rate and flow massPolicing rule, for the total QoS of all traffic managements.
Based on the aggregate demand to each flow QoS class, and flux capacity and credit rating that this device be can use, clothesBusiness processor can be that each QoS class adjusts total Available Bit Rate or the percentage ratio of utilizable flow capacity.Such as, some embodiment partyIn case, it may be determined that real-time, interactive flow-control class (is such as serviced, such as VOIP, urgency communication service or high-performance competition in real-timeGame) aggregate demand, and the QoS routing function (such as, QoS router agency/function) on device can be first from available streamThe fixed bit rate flux capacity that amount capacity distribution is enough services to meet these, the QoS clothes of this QoS class of the most each needsBusiness activity is assigned to this QoS channel.Due to more this class of traffic of QoS service Operations Requirements, from available apparatus capacityThe capacity being assigned to QoS channel adds, and when less this class of traffic of QoS service action need, this QoS channelCapacity is released.No longer have in the event of the active volume ensureing bit rate QoS grade at device, then will not be to extraNeed, require or ask the QoS service activity of this QoS grade to provide this QoS grade, and alternatively, will be configured with relativelyLow QoS grade maybe will be not allowed to be connected to access network.In some embodiments, can have possible QoS service to liveHierarchical structure between Dong, if so that no longer there is active volume in a given service QoS grade, then forThe active volume of this QoS class is provided to need the service activity of the QoS from up to lowest priority, until available QoSClass capacity is consumed, and to obtain service one or more the lowest on priority list with this QoS class subsequentlyQoS service activity is hit to be fallen relatively low QoS class or is denied access.In some embodiments, once meet for fullThe desired volume of fixed rate traffic demand time full, then divide remaining according to priority policy between other QoS channel classesDevice active volume, wherein this priority policy is relative priority based on each service class, the phase of each QoS service activityTo the combination of priority or the priority of each QoS service class and each QoS service activity.Such as, these relative priorityStrategy can be based on service program selection, type of device, user identity, user's group, setting position, plant network connection, network classType, temporal information, network busy state and/or other standards/measurement, different from device to device.
In some embodiments, QoS link establishment is between this device and an access network device element.Such as,This type of equipment component embodiment can include 2G/3G/4G wireless base station, WAP, cable system head end, DSL networkDSLAM, fibre optic network installation flow polymerizer, satellite network device flow polymerizer, frame relay aggregation, ATM are polymerized jointPoint and/or other network equipments.In some embodiments, logical channel creates in this device and this network equipment unitBetween part, this logical channel supports a given QoS grade or QoS class traffic policy collection simultaneously.Such as, this logic letterRoad can include the RAB being formed between a 2G/3G/4G base station and a wireless endpoint device.This RAB can be by controllingThe media interviews of this base station radio channel control (MAC) parameter and are formed, and are enable to implement the QoS class plan of given gradeSlightly.Such as, this RAB can be to ensure that bit rate real-time traffic supports the short communication flows of constant bit rate, waiting time, or isFlow media flux supports that difference high priority accesses channel, or transmits RACH as possible for transmitting flow support as possible,Or for the available untapped volume flow of background traffic support.The QoS channel link created in this way can be specific to singleDevice, or shared with a device subset, or be can be used for all devices.The QoS channel link created in this way can be byDevice is for supporting that the most single QoS is movable, or one group of QoS as described in this is movable.General for this areaLogical technical staff is it is evident that the setting being similar to cable terminations box and cable modem MAC is for cable modulatedemodulateAdjust device situation can produce the QoS class being similar to for QoS link, and similar technology can be used for WAP or satellite systemThe QoS class that system MAC is similar to for QoS link with acquisition.For those of ordinary skill in the art it is evident that pass through at deviceLink creates multiple logic channel, and/or is that each logic device communication channel in DSLAM or Optical Fibre Aggregator adjustsAvailable access network capacity and quality, can be DSL and optical fiber distribution network situation sets up the QoS class QoS link being similar to.
In some embodiments, device service processor carries out servicing thus QoS service activity is routed to suitablyLogical channel, these logical channel are for by a QoS link between device and access network device elementThe required QoS class supported and set up.In some embodiments, these devices can be used in some embodiments to takeBusiness processor elements (such as, policy enforcement agent and/or policy control agency), thus by identical QoS flow amount control strategyIt is assigned to the QoS service activity of the identical QoS grade of one or more needs.In a similar fashion, in some embodiments,These device service processor elements can be used for be a given QoS class by service activity assignment of traffic or be routed to device andCorrect logical channel between access network element (such as, 2G/3G/4G base station), this logical channel is required QoSClass and support flow control policy.Such as, support to ensure bit rate and the QoS service link of waiting time can from a base station toThis device is set up together with one or more RAB, and can set up one and support that difference preferably connects for streaming media contentThe one or more difference that use entered access the second QoS service link of RAB, and one the 3rd is transmitted RAB as possible and can be used forSupport to transmit flow as possible.Required RAB's is each the most requested, the most as described in this, based on one or more QoSTotal desired volume of service activity and quality and be configured, these QoS service activity request or require specific to believe with RAB logicThe QoS service class that road policing parameter is associated.Logic QoS channel set, service processor (such as, QoS road are once hence set upBy device agency/function) flow of association moving phase with each QoS service is routed to suitable RAB.In some embodimentsIn, service processor can detect the total QoS class to each QoS class request be raised and lowered, because QoS activity is by this QoSClass is initiated or terminates, and service processor can be with required needed for supporting the RAB distribution of this logic QoS channelIt is raised and lowered and communicates.
In some embodiments, access QoS link to be set up, this dress in this communication by the directly communication from devicePut from access network device element requests QoS channel or link, or this device in the middle of one interconnection device (such as service controller(such as, or there is the device easily replaced of similar characteristics, such as home agent, HLR, mobile switching centre, base station, access networkPass, AAA system, PCRF or charge system)) ask QoS channel or link.In some embodiments, device service processorQoS channel or link request are carried out QoS service activity and that wanted or required QoS class or QoS flow amount based on this deviceOne association of the coupling of control strategy collection.Such as, the associating of this QoS class or QoS flow amount control strategy collection and QoS service activityCan be determined by the predefined policy mappings stored on the apparatus and used by service processor.Some embodiment partyIn case, the storage of this policy mappings by a service controller (such as, or as the described herein similar function) constituted with/Or update.In some embodiments, report based on the device from the QoS service activity needing QoS channel or link, byOne service controller (such as, or similar function as the described herein) and determine this mapping.
In some embodiments, for QoS grade that is needed for one or more QoS service activities or that wanted by advanceOne set of the QoS service flow control policy being assigned to various QoS service activity is determined.Such as, can be by a QoS classIt is pre-assigned to a given application.As another example, a QoS class can be distributed to such as VOIP services sitesNetwork service destination.As another example, a given application can have a QoS for common internet trafficAllocation level, has a QoS distribution for real-time game flow.As another example, a real-time broadcast website can beProgramming information and generally browse distribution and transmit as possible QoS grade, and for broadcast traffic content, there is difference Streaming Media QoS etc.Level.In some embodiments, to a given activity, QoS needs or the detection of QoS distribution request can be by a deviceService processor distributes according to a predefined qos policy rule list (such as, QoS activity table), or can be by a serviceThe information that controller is reported based on device determines, or can be by an application by QoS application interface (such as a, QoSAPI) determine, or can be determined by the character entering flow.
Two end points in QoS channel are involved in setting up in the embodiment of end-to-end QoS channel, required QoS etc.Level is determined by origin endpoint and/or transmits.In some embodiments, required QoS grade determined by receiving endpoint and/orTransmission.In some embodiments, QoS grade by origin endpoint service controller (such as, or access network element (such as base station),HLR, home agent, mobile switching centre, AAA, gateway or other network element/functions) determine and/or transmit.Some embodiment partyIn case, QoS grade by receiving endpoint service controller (such as, or alternatively access network element (such as base station), HLR, home agent,Mobile switching centre, AAA, gateway or other network element/functions) determine and/or transmit.In some embodiments, receiving endpointService controller is (such as, or access network element (such as base station), HLR, home agent, mobile switching centre, AAA, gateway or other netsNetwork function) and origin endpoint service controller (such as, or other similar functions) communicate with each other, thus coordinate between end pointsThe foundation of QoS channel.
In some embodiments, near-end or originating terminal device service processor and far-end or stop device service processorIt is associated thus starts a QoS channel.In some embodiments, proximally or the startup of QoS channel of initial installation isBy far end device its service processor detect between the two device communication need a given grade QoS time and fromDynamic carry out.In some embodiments, near-end or initial installation service processor one QoS channel of detection are to far-end or terminationThe needs of device, and with central network resource (as service controller (such as, or for this purpose has other of similar functionsEquipment component)) be associated, and this service controller or by directly and far end device communication or by with far end deviceService controller (such as, or this purpose being had to other equipment components of similar functions) communicates, and configures the remote of this QoS channelEnd.Some contact far end device service controllers thus assist configure QoS channel embodiment in, exist locating function fromAnd based in terms of some by far end device voucher (such as, telephone number, SIM ID, MEID, IMSI, IP address, user name,And/or other device vouchers) formed lookup index, determine the address of remote service controller.
In some embodiments, QoS service activity is to the QoS class of required grade or the mapping of QoS flow amount control strategyUse application true with request QoS class or a QoS API of QoS channel connection by providing in device service processorFixed.In some embodiments, it is provided that an API is so that application developer can create use standard interfacing commandsAsk and set up the application software of QoS channel.In some embodiments, or many during API carries out the following activity: accept the QoS request from an application, be converted to the form of QoS channel request be suitable for responsible assessment QoS channelThe agreement of the transmission of the network equipment of availability (for example, it may be possible to including device flow control system) and other network elements are (such as,Potentially include device flow control system) coordinate thus a reserved QoS channel and other network elements are (for example, it may be possible to include deviceFlow control system) coordinate thus configure a QoS channel, notice application may not create required QoS channel and/orCoordinate with other network elements (for example, it may be possible to including device flow control system) thus application is connected with required QoS channel classConnect.In some embodiments, QoS API receives application QoS request and with one or more QoS network equipment elements (such as baseStand, cable head-end or access point) communicate and coordinate possibly.In some embodiments, QoS API accepts from applicationQoS request, and carry out with an intermediate NE (such as service processor (such as, or as the described herein other similar functions))Communicate and coordinate possibly.In some embodiments, QoS API, before QoS channel request is sent to other network elements, commentsEstimate the QoS service plan representing device or user, and if required service program mandate suitable, the most only initiate QoS requestSequence.In this way, need the process supporting to set up the potential complexity of QoS channel with all specific equipment communication protocols, fromAnd assess QoS channel availability and configure QoS channel, this QoS channel is simplified in a limited api command set, thisA little api commands make application and development community easily learn and use QoS differentiated services and application.
In some embodiments, the local flow-control on device service processor and device and access network deviceThe flow-control of the link between element combines.In this way, the device flow control path QoS of access network element QoS linkLink and device can be this for the optimum device QoS results of property of the active volume and quality that provide access network flowDevice is coordinated.In some embodiments, how to manage local flow-control for this device, set up access network element logic channel(such as, RAB) and route traffic to or from access network element logic channel route strategy all by by service controller (or itsHis equivalent network element) the predefined policing rule that is loaded on device determined.In some embodiments, these embodiment partyCase determines in himself at service controller.
In some embodiments, a kind of QoS user interface (such as, QoS UI) is provided for device users.At someIn embodiment, QoS UI selects based on service program, notifies that this device of user is authorized to the QoS to receive what grade and takesBusiness.In some embodiments, QoS UI notifies the current network that the QoS service of what grade of user connects at present at deviceOn be available.In some embodiments, QoS UI notifies the service activity that user has initiated for a given device,When the QoS authorized higher than user's service program is required or is wanted.In some embodimentsIn, QoS UI provides the user one or more upgrade option set with upgrade service plan, thus includes for one or manyThe higher QoS grade of individual service activity.In some embodiments, for one or more service use activities, QoS UIProvide the user the chance indicating what QoS grade this user wants to use.In some embodiments, when network busy,QoS UI allows a user to specify that the service program providing difference QoS is arranged.In some embodiments, QoS UI allows user to purchaseBuy one or more service QoS grade, or at one by the predefined service period of QoS class and one or more pre-definedService use limit after pay, one or more used to limit by the predefined service of QoS class pay in advance, or differenceThe another kind of payment system of QoS service.In some embodiments, for being connected the connection initiated, QoS by the Incoming to deviceUI provides the user QoS and or can pay the chance of QoS service.
In some embodiments, the QoS for DAS technology includes verifying that device is the most such as according to a service programCorrectly implement QoS flow amount control strategy.Which ensure that mistake, hacker, subscriber device software arrange manipulation or other malice thingsPart is not result in inappropriate QoS grade for one or one group given device.Therefore, in some embodiments,Use flow-control described herein and QoS verification technique to verify according to a QoS priority strategy, one is givenService use activity, apply suitable QoS grade.Such as, QoS channel request policing rule behavior checking can be by multipleMode is implemented, including, such as supervising device QoS channel request the QoS grade phase by the QoS grade asked with device mandateRelatively, thus receive in service program for this device actually.Suitable QoS channel usage behavior is tested by deviceCard can be implemented in several ways, including, the network report this is network that such as monitoring QoS service usesReport is compared with the service strategy rule that actually should be given this device service program.Testing of suitable device flow controlDemonstrate,prove and actually can implement in several ways with one QoS service strategy of enforcement, by verifying that suitable flow control policy is advisedThen as described herein and correctly implement.In some embodiments, for protecting the DAS technology of network capacity to includeMultiple verification technique (such as, checking monitoring, flow-control, report and/or other functions being implemented and carried out by this device),As described in this.
In some embodiments, QoS router is to the traffic differentiation order of priority on device.In some embodimentsIn, the session connection that QoS is enabled by QoS router to the RAB with suitable QoS grade.In some embodiments, by oneIndividual session is routed to RAB.In some embodiments, more than one session can be routed to a RAB.Some embodiment partyIn case, this device is created multiple RAB of multiple QoS grades are provided, and each service activity is routed to by QoS routerThe RAB specified by qos policy rule come into force on this device.
In some embodiments, network is that the service of collecting of different QoS classes uses charge.In some embodiments,There is the inhomogeneous differentiated services charge that QoS service is used.As an example, owing to ensureing that bit rate flow is whetherAll consumption of network resources when using flux capacity, can exist and relate to the time element that charge calculates.As one in more detailExample, it is ensured that bit rate service can by one with make bandwidth can time quantum preset time of being multiplied be configured to this deviceTotal bandwidth charge.In some embodiments, have than the transmission higher QoS of flow as possible but be not to ensure that bit rateDifference access flow can as possible transmit that flow is high at a ratio but lower than ensureing bit rate ratio is charged.Implement at someIn scheme, this type of flow can based on make QoS channel can time and the total amount of data transmitted on this channel and charge, orThe total amount of data transmitted on this channel can be based only upon.In some embodiments, transmission flow is based only upon and always uses number as possibleCharging according to amount, data charges is less than difference streaming media access service simultaneously.In some embodiments, back-end data clothesBeing engaged in charging at minimum ratio, may only have and service for this type of, low network traffic demand is some in available one dayTime or period, and service simultaneously is based on total transmission data.In some embodiments, all of QoSCan charge based on a fixing price a fixing charge period, be likely to be of a service SC service ceiling, asFruit has exceeded the service upper limit, then can have extra charge.In this type of fixed price scene embodiment, for higherQoS grade, the price of charge becomes higher again.In some embodiments, the controlled clothes of network capacity that network is differentThe business class service of collecting uses charge.In some embodiments, there is the inhomogeneous difference that network capacity managed service is usedOther service charge, as described in this.
In some embodiments, (such as, access network element, gateway, AAA, service use storage system, return the network equipmentBelong to agency, HLR, mobile data center and/or charge system) record one or more QoS service classes that also annunciator usesService use.In some embodiments, one or more QoS clothes that device service processor record annunciator useThe service of business class uses, and uses to service controller (such as, or another substitute network element) report QoS service class.At someIn the embodiment of the use of device record report one or more QoS service class, checking device service uses report to be important, thus ensure that device use report is undistorted, distort and/or mistake otherwise occurs.In some embodiments,Provide and should occur as using event, agents query in device, service processor proxy functionality operation demonstration, testing serviceResponse sequence, device service processor software resist technology, device service processor software environmental test and other skills someGive Service controll strategy in art uses the service for checking credentials to use report, as described in this to service.Such as, these are used to testOne or more devices providing can verify that auxiliary QoS service in card technology uses Fare Collection System.As anotherExample, uses the one or more network capacity managed service providing can verify that in these verification techniques to use and receivesCharge system.In some embodiments, (such as, access network element, gateway, AAA, service use storage system, ownership to the network equipmentAgency, HLR, mobile data center and/or charge system) one or more network capacitys of using of record annunciator are subject toThe service of control service class uses, as described in this.
In some embodiments, it is provided that device auxiliary flow controls thus manages network congestion as follows.Such as, when oneIndividual given base station or one group of base station experience and available active volume and/or the traffic demand of QoS height correlation, and thisClass condition is to determine based on network busy state estimation (as following and described further below at this) (such as, to be detected or instituteReport) time, then service controller (such as, or another network function) just can experience according to these one or more base stationsThe measurement of added flow demand to/issue for device, send and/or implement flow-control throttling strategy.Such as, may indicate that thisThe device service processor being connected to an excessive busy base station a bit is that the reduction flow-control of one or more QoS flow amount class is excellentFirst level, thus be some or all of reduction queuing prioritys, the throttle rate in one or more class of traffic, postpone and/or accessLicense.As another example, may indicate that these device service processors being connected to an excessive busy base station are oneOr multiple network capacity managed service class of traffic reduces flow-control priority, thus it is in this type of class of traffic one or moreSome or all of reduction queuing prioritys, throttle rate, delay and/or access permission.As another example, can completely close orSignificantly slow down the one or more classes (such as backstage downloading process) that can include such as software upgrading network capacity managed service flow.As another example, for one group is connected to multiple base station apparatus just experiencing added flow demand, can throttle or dropLow transmit flow (such as internet browsing) as possible.As another example, can be on multiple devices being connected to busy base stationImplement a strategy, allow device browse with a higher throttle rate or enter within a period of time in the base station that these are busyRow other transmit service activity as possible, if but device uses within certain a period of time be more than a certain amount service (such as, alwaysDownload and/or the amount of uploading data), then according to adaptive session Flow Policy described herein, this device can be flow-control.In some embodiments, it is impossible to the QoS grade flow throttling higher in this type of environment, such as VOIP flow, protect the most in real timeCard bit rate to meet users service needs or expectation for be important, and throttle and/or block lower priority traffic (asInteractive browser and/or backstage are downloaded).In some embodiments, adjust QoS availability assessment process described herein, fromAnd make not given at one base station or the experience extra demand of one group of base station or higher than a given thresholding requirement timeBetween or position provides and the higher QoS channel of configuration.
In some embodiments, there is period service program or the higher priority of higher QoS grade at busy networkThe user of service program or device have be applied thereon different flow control policy (such as, for QoS service and/Or network capacity managed service), cause the flow performance of greater degree and/or the QoS service availability of greater degree.Such as,The flow-control access strategy that emergency services worker is higher can be given, network or the difference of subnetwork when it causes busy peakDo not service.In some embodiments, the difference for busy peak period accesses, and user can obtain award service program or canThe QoS service using higher level is arranged and/or service program, thus obtains the differentiated services of busy peak time.As separatelyOne example, needs the service of high QoS class hierarchy (such as real-time voice service, instant message transmission, PTT push to talk, difference videoStream and/or interactive game) flow be uncontrolled in same degree, and other lower-priority service or relatively low classThe flow of service program is in check when busy peak.Such as, the service differentiation of this type be also based on type of device,User's group, user identity, user reward district's point and/or other standards/measurement and apply, as similarly described by this.
In some embodiments, control as described above (such as, to reduce, raise and/or in some modesOther control) access flow control arrange decision be by device service processor network capacity based on device assessment andMaking, this decision can use various technology described herein to be determined.In some embodiments, control described aboveBy a service controller being connected to device (such as, or other are one or more the decision that access flow processed controls to arrange isNetwork equipment element that can be mutual, makes as described in this), and this service controller provides instruction to device thus adjusts and connectEnter strategy setting.Such as, service controller can be from access device element, from flux capacity as the described herein and/or qualityDevice report or the report of the flux capacity obtained from the purpose specific device for assessing network capacity and/or quality obtainObtain network capacity information.In some embodiments, control as described above the decision that access flow controls be based on timeBetween information, some day in one week or the two, thus circulation pattern is contained in network capacity and traffic demand.
In some embodiments, service controller is (such as, or another network equipment element or other yuanPart, as described in this) assessment network busy state, and then by reducing by access network device element (such as wireless base station)Support the capacity (such as, for QoS service and/or network capacity managed service) being supplied to one or more service class and controlDevice traffic demand processed.In this type of embodiment, service controller (such as, or similar function) use described here thisOne of a little technology collection network capacity information, and guides the one or more of these access network device elements, thus for connectingOne or more reductions of equipment to these access network device elements be supplied to one or more QoS class grade and/orThe capacity of network capacity managed service class.Such as, can of all devices based on a given service program state equalThrottling, or use pattern based on device flow in the up-to-date past described herein, or based on service program state andNew flow uses the combination of pattern to make the decision that device slows down
In some embodiments, by there is difference QoS service and/or network capacity managed service as external world's serviceThe extraneous service of the part provided makes device to use.Such as, can use is given being arranged in extraneous serviceThe pre-assigned qos policy of service activity, or use and be served by providing extraneous QoS skill by the external world of QoS API request QoSArt.Other provide the embodiment of QoS differentiated services activity now for the common skill in this area in providing in external world's serviceArt personnel will be apparent from.As another example, can use is a given service activity being arranged in extraneous servicePre-assigned network capacity control strategy, monitoring and the technology of dynamically distribution, and/or use one to use API or emulation APIThe external world of technology is served by, and/or other technology described here provide extraneous network capacity managed service technology.
In some embodiments, the type of network that QoS service control strategy is adapted to be connected to for this deviceOne function.Such as, (the flow appearance that relatively low available QoS enables such as, it is generally of when device is connected to a wireless networkAmount 3G/4G network) time with (such as, be generally of the QoS capacitance grade of relatively High Availabitity when device is connected to a cable networkCable or DSL network) time compare, QoS flow amount control strategy and/or QoS service charging policy can be different.At thisIn class embodiment, device service processor and service controller tunable thus adaptive QoS service control strategy and/or QoSService charge strategy and different, depend on which network this device is connected to.Similarly, it is also possible to be connected to one based on this deviceIndividual Local wireless network or roaming wireless network come adaptive device QoS service control strategy and/or QoS service charge planSlightly.In some embodiments, the charging policy that network capacity managed service control strategy and/or network capacity control is fittedIt is made into a function of the type of the network being connected to for this device, as similarly described by this.
In some embodiments, various QoS correlation technique described herein and/or network capacity managed service technologyBy using DAS technology and/or using DAS technology to be performed by warp on the apparatus on service controller on deviceThe secure communication of the service processor crossing checking is carried out.In some embodiments, relevant for various QoS described here technologyAnd/or network capacity managed service technology pass through/with one or more intermediate NE/functions coordination/communicating is carried out, thus beQoS technology as the described herein and/or network capacity managed service technology assist various technology (such as, function).
Fig. 1 illustrate according to some embodiments for for device assistant service (DAS) provide service quality (QoS)And/or for providing DAS to protect a network architecture functional diagram of network capacity.In some embodiments, it is described hereinThe QoS for DAS technology use the network architecture shown in Fig. 1 to implement.In some embodiments, described here forThe DAS technology of protection network capacity uses the network architecture shown in Fig. 1 to implement.
As indicated, Fig. 1 includes a 4G/3G/2G wireless network run by center fed business.As indicated, it is various wirelessDevice 100 communicates with base station 125, thus carries out wireless communication (such as, by fire wall 124) with wireless network,And other devices 100 communicate with Wi-Fi access point (AP) or grid (Mesh) 702, thus with and center fed business connectThe Wi-Fi access CPE 704 entering network 109 communication carries out radio communication.In some embodiments, one or more devices100 provide access point (such as cable network headend, DSL network DSLAM, fiber optic network aggregation and/or satellite network with otherNetwork aggregation) one or more network elements/equipment communication.In some embodiments, each wireless device 100 includes oneService processor 115 (as indicated, such as performing on a processor of wireless device 100), and each service processorIt is connected to a service controller 122 (such as, using coded communication) by a security control plane link.
In some embodiments, service use information includes that network service use information is (for instance, it is possible to such asThe network service being used measurement apparatus to generate by the service in the network equipment uses measures or charging data record(CDR)), its from one or more network elements (such as, BTS/BSC 125, RAN gateway (not shown), transport gateway (not shown),Mobile wireless center/HLR 132, AAA 121, service use history/CDR be polymerized, reconcile, feed 118 or other networks setStandby) obtain.In some embodiments, service use information includes miniature CDR.In some embodiments, miniature CDR is used forThe service that is supplied in any required device activity uses the CDR of charging reconcile or be in harmonious proportion.In some embodiments, for oftenIndividual required device activity one the miniature CDR transaction code of distribution being associated with a charging event, and service processor 115 quiltProgramming is for including the activity computing being associated with this transaction code.In some embodiments, service processor 115 cycleProperty ground report (such as, in each heart beating or based on any other cycle to such as service controller 122 or some other network elements, push and/or one or more communication technologys of pulling) miniature CDR uses measurement.In some embodiments, serviceController 122 miniature for heart beating CDR use information is reformatted as effective CDR form (such as, use and can by SGSN orGGSN or other used/the CDR form that processes of the network element/equipment that authorizes is for generating or processing CDR), and then by itIt is transferred to a network element/function thus carries out CDR conciliation (such as, CDR stores, is polymerized, reconciles, feeds 118).
In some embodiments, CDR reconcile for by storing it in a suitable service and accessing to your account alsoIt is accessed to your account middle deduction from user's set integrity service, miniature CDR service use information is counted.Such as, this skillArt provides and uses the service flexibly for CDR mediation and existing scheme, infrastructure and/or the technology of charging to make to use tricksTake scheme.Such as, charge system (such as, charge system 123 or billing interface 127) processes from being reconciled that CDR reconcilesCDR feeds, and suitable account code is applied to the miniature CDR information being polymerized generated by device, and then with notNeeding the mode changing existing charge system to generate charging event (such as, uses New Transaction code to carry out label new equipment auxiliary meterTake ability).In some embodiments, network configuration system 160 configures various network element/function for the mandate in network,As authorize some network element/function (such as, CDR store, be polymerized, reconcile, feed 118 or other network element/functions) thus provide micro-Type CDR, the miniature CDR of reformatting and/or be polymerized or the CDR that reconciled.
As shown in fig. 1, it is provided that a CDR stores, is polymerized, reconciles, feeds 118.In some embodiments, CDRStore, be polymerized, reconcile, feed 118 receptions, store, be polymerized and reconcile the miniature CDR received from mobile device 100.Real at someExecuting in scheme, CDR stores, is polymerized, reconciles, feeds 118 settlement platforms also providing for the miniature CDR that a use is reconciled, asDescribed by this.In some embodiments, another network element provides and uses miniature CDR (example that is that be polymerized and/or that reconciledAs, central charge interface 127 and/or another network element/function) settlement platform.
In some embodiments, the various technology for the subregion of device group are used for mobile device 100 subregion (exampleAs, it is an allotter, OEM, MVNO and/or another partner or a subset of entity distribution mobile device 100).AsShown in Fig. 1, a MVNO core network 210 includes that a MVNO CDR stores, is polymerized, reconciles, feeds 118, a MVNOBilling interface 122, and a MVNO charge system 123 (and other network elements shown in FIG).Some embodiment partyIn case, MVNO CDR stores, is polymerized, reconciles, feeds 118 receptions, stores, is polymerized and reconciles from mobile device 100 (such as,The device in MVNO component district) the miniature CDR that receives.
It will be recognized by those of ordinary skills other network architectures various can be used for provide device component district andSettlement platform, and Fig. 1 is the explanation of the network architecture of this type of example of only one, may be provided in described by this in this network architectureDevice component district and settlement platform technology.
In some embodiments, CDR stores, be polymerized, reconcile, feed 118 (such as, services use 118, including oneThe storage of charging aggregated data and regulation engine) it is the descriptor of a functional type, in some embodiments, it is in for descriptionOne or more be attached to one or more as Fig. 1 plant shown in sub-network (such as, center fed business access network 109 and/orCenter fed business's core network 110) networking equipment devices/system in device/network hierarchy service use information, poly-Closing, reconcile and function of reporting, it communicates with service controller 122 and a central charge interface 127.Such as institute in FIGShowing, service uses 118 one function communicated with center fed business's core network 110 of offer.In some embodiments, CDRStore, be polymerized, reconcile, feed 118 functions and be in network elsewhere, or be partially in elsewhere or with other netsUnit forms a whole/as a part.In some embodiments, CDR stores, is polymerized, reconciles, to feed 118 functionalBe in or be partially in aaa server 121 and/or mobile wireless center/attaching position register (HLR) 132 (as indicated,Communicate with DNS/DHCP server 126).In some embodiments, service use 118 is functional is in or is partly located inIn base station, base station controller and/or base station polymerizer, the most collectively known as base station 125.In some embodimentsIn, CDR stores, be polymerized, reconcile, feed 118 functional be in or be partially in center fed business's access network 109Networking components in, in networking components in a core network 110, in central charge system 123, central charge interface 127In and/or other networking components or function in.This uses information for network and based on device service, gathersConjunction, conciliation and the function of reporting (such as, CDR stores, is polymerized, reconciles, the feeds 118) discussion in possible position can be by this areasThose of ordinary skill is promoted, as the described herein, and shown in other accompanying drawings described herein and embodiment.Further, as shown in FIG. 1, service controller 122 and central charge interface 127 are (such as, sometimes referred to as outside accounting managementInterface or charging communication interface) communicate, it communicates with central charge system 123.As shown in fig. 1, an orderManagement 180 and user manage 182 and also communicate with center fed business's core network 110, thus according to some embodiments, forThe order of device 100 assistance services and user's management.
In some embodiments, it is provided that service processor downloads 170, and it provides service processor (such as, service centerReason device 115) periodically download/update.In some embodiments, verification technique include being updated periodically, replace,And/or update the version obscured of service processor, in response to any execution or implement service processing on the device 100Potential be compromised or distort one of device functional (such as, qos feature and/or network capacity managed service are functional)Individual instruction carries out any one in these technology.
In some embodiments, CDR stores, is polymerized, reconciles, feeds 118 (and/or other network elements or the combination of network element)A device/network hierarchy service is provided to use information, be polymerized, reconcile and function of reporting.In some embodiments,CDR stores, be polymerized, reconcile, feed 118 (and/or other network elements or the combination of network element) at wireless network (such as, device100) one or more device collection devices on generate/service of auxiliary uses information (such as, miniature CDR);And with oneThe service use information that the spendable syntax of individual wireless network or a communication protocol provide device to generate, thus be wireless networkThe use information that one or more devices on network increase or alternative networks generates.In some embodiments, syntax is oneCharging data record (CDR), and one or more in the following of this communication protocol: 3GPP, 3GPP2 or otherCommunication protocol.In some embodiments, as described in this, CDR stores, is polymerized, reconciles, feeds 118 on wireless networkOne or more devices (such as, device 100) collect/receive miniature CDR.In some embodiments, CDR storage, polymerization,Reconcile, feeding 118 (such as, or other network elements and/or the various combinations of network element) includes that a service uses data storage (exampleAs, charging polymerizer) and a regulation engine being used for being polymerized the service use information that collected device generates.At someIn embodiment, network equipment is a CDR feed aggregator, and this CDR store, be polymerized, reconcile, feed 118 (and/orOther network elements or the combination of network element) also it is one or more devices polymerization (network) CDR and/or micro-on wireless networkType CDR;Use a regulation engine (such as, by the charging of account, transaction charging, income Share Model and/or otherWhat charging or other for servicing the rule using information, being polymerized, reconcile and report) be applied to be gathered by one group of ruleOn the CDR closed and/or miniature CDR, and for the one or more devices on wireless network, one group of new CDR and a charging are connectMouth or a charge system (such as, being had the CDR of charging deviation by account/service offer) are communicated.Implement at someIn scheme, various technology described herein is used to provide an income shared platform.In some embodiments, useThese described various technology provide QoS and use charging/charge and/or network capacity managed service to use charging/charge.
In some embodiments, CDR stores, is polymerized, reconciles, feeds 118 (and/or other network elements or the combination of network element)For the one or more devices on wireless network by one group of new CDR (such as, polymerization and reconcile CDR and/or be one subsequentlyIndividual given wireless network is converted into the miniature CDR of standard CD R) and billing interface (such as, a central charge interface127) or one charge system (such as, central charge system 123) communicates.In some embodiments, CDR stores, gathersClose, reconcile, feed 118 (and/or other network elements or the combination of network element) and service controller (such as a, service controller122) communicate, thus be that (such as, the service that the one or more device collection devices on wireless network generate uses informationMiniature CDR).In some embodiments, CDR stores, is polymerized, reconciles, feeds 118 (and/or other network elements or the group of network elementClose) communicate with a service controller, wherein this service controller and a billing interface or a charge system are carried outCommunication.In some embodiments, CDR store, be polymerized, reconcile, feed 118 (and/or other network elements or the combination of network element) willThe service that device generates uses information to communicate with a billing interface or a charge system.In some embodiments,CDR stores, be polymerized, reconcile, feed 118 (and/or other network elements or the combination of network element) and a transport gateway and/or wireless connectEnter network (RAN) gateway to communicate, thus be one or more device collection devices on wireless network generate/based on dressThe service put uses information.In some embodiments, device assistant service is used information (such as, micro-by service controller 122Type CDR) store, be polymerized, reconcile, feed 118 (such as, or other network elements and/or the various combinations of network element) with CDR and lead toLetter.
In some embodiments, (such as, or other network elements and/or network element CDR stores, is polymerized, reconciles, feeds 118Various combinations) executing rule, thus be polymerized by account and mediation function one bill of execution.In some embodiments, CDRStore, be polymerized, reconcile, feed 118 (and/or other network elements or the combination of network element) executing rule, thus perform a service meterTake function (as described in this), and/or thus perform a service/transaction income sharing functionality (as described in this).?In some embodiments, store with CDR, be polymerized, reconcile, feed 118 that (and/or other network elements or the combination of network element) communicateService controller 122 performs a regulation engine, thus polymerization apparatus for regulating assistant service use information (such as, miniatureCDR).In some embodiments, store with CDR, be polymerized, reconcile, feed 118 (such as, or other network elements and/or network elementVarious combinations) regulation engine device communicating performs a regulation engine, thus polymerization apparatus for regulating assistant service makeWith information (such as, QoS service uses information and/or network capacity managed service to use information).
In some embodiments, regulation engine is included in (such as, form a whole/as a part) CDR and depositsStore up, be polymerized, reconcile, feed in 118.In some embodiments, regulation engine and the function (as described in this) that is associatedIt it is a single function/device.In some embodiments, service controller 122 carries out the merit of these rule-based enginesSome or all of (as described in this) of energy, and communicate with central charge interface 127.In some embodiments,Service controller 122 is carried out some or all of (as described in this) of the function of these rule-based engines, and with central authoritiesCharge system 123 communicates.
In some embodiments, it is provided that a settlement platform service.Such as, polymerizable or reconcile miniature CDR thusIt is one or more services of using of a communicator (such as a, user of communicator) and uses relevant to serviceConnection.One regulation engine or another function can be that a specific service determines that the income that a service uses shares distribution,Thus for income share distribution/model determine this type of service use clearing, and to or multiple operator, distribution partner, MVNO,Whole seller partner and/or other partners or entity distribute charging and settlement information.In some embodiments, this service is oneIndividual transactional services.
In some embodiments, copy is sent from the network equipment to the charge system 123 being used for generating service chargingCDR.In some embodiments, filter copy CDR thus only send those for by service controller and/or service processingThe CDR/ record of the device that device (device such as, managed) controls.Such as, this method can provide and central charge system 123The report of same grade, the report of lower grade and/or the report of greater degree that required report is compared.
In some embodiments, it is provided that account debit charging deviation.Such as, account debit charging deviation information is permissibleIt is informed to central charge system by the CDR polymerizer feeding providing a polyplant assistant service to use data feeding123, thus the device for management provides one group of new CDR to central charge interface 127 and/or central charge system 123.OneIn a little embodiments, similar technology is used to provide transaction charging.Such as, can be to central charge interface 127 and/or central authorities' meterCharge system 123 provides transaction billing log information.
In some embodiments, regulation engine (such as, is performed by service use 118 or another network element, as at thisDescribed) provide an account debit charging deviation.Such as, device assistant service uses information (such as, miniature CDR) to includeOne type of transaction field or transaction code (such as, the service for being associated uses information to indicate a type of service).Such as,Regulation engine can use a rule or one group of rule based on the identified service being associated with device generation service use informationThen, so that it is determined that an account debit charging deviation (such as, can generate a new CDR with account debit determined by offerCharging deviation).In some instances, determined by, account debit charging deviation can be provided as the letter that the service of user accesses to your accountReputation degree (such as, can by the service that a minus deviation is user access to your account generation one new CDR, as Internet chatService uses, or transactional services uses, or any other mesh of one or more rule performed for rule-based engine).
As another example, for a transactional services, the clothes that can be user for the use that this transactional services is relevantBusiness accesses to your account one first new CDR with minus deviation of generation, and can generate one and have and just service the of use valueTwo new CDR thus identical service is used and charges (such as, Amazon (Amazon), Eachnet for transaction service provider(eBay) or another transaction service provider).In some embodiments, to generate the two new for service controller 122CDR, and service use 118 storage, polymerization and CDR new for the two is delivered to central charge interface 127.At someIn embodiment, service controller 122 generates the CDR that the two is new, and service use 118 storage, polymerization and by this twoIndividual new CDR communicates with central charge interface 127, and wherein central charge interface 127 applies rule (such as, executing ruleEngine is so that it is determined that account debit charging deviation).
In some embodiments, to regulation engine, (such as, service uses data storage and rule to service controller 122Engine, as CDR stores, is polymerized, reconciles, feeds 118) dispensing device generate CDR, and regulation engine application one or moreRule, as described herein in those and/or any other charging/service uses relevant rule, as common for this areaTechnical staff is obvious.In some embodiments, service controller 122 generates the CDR of other network elements similar, and rule(such as, account debit) performs in central charge interface 127.Such as, for generate the service of the CDR of other network elements similarController 122, in some embodiments, service controller 122 is configured in wireless network (such as, by network configuration systemSystem 160) on, and substantially behave like other CDR makers on network.
In some embodiments, service controller 122 is configured to a kind of novel network savvy, its by network itsHis required element (such as, CDR stores, is polymerized, reconciles, feeds 118) be identified as one effective to CDR, authorize andSecure source.In some embodiments, if required network equipment is only from certain form of networked devices (such as, RAN gatewayOr transport gateway) identifying CDR, then service controller 122 provides to other networked devices and indicates it is the institute for providing CDRThe authentication credentials of the equipment of one of the type authorized.In some embodiments, service controller 122 and required CDR polymerizationAnd the link between mediation devices fixed, authenticated, encrypted and/or signed.
In some embodiments, CDR stores, is polymerized, reconciles, feeds 118 and abandon and receive from one or more network elementsNetwork service use information (such as, network CDR).In these embodiments, service controller 122 toCDR stores, is polymerized, reconciles, feeds 118 offer device assistant services use information (such as, CDR or miniature based on deviceCDR) (such as, CDR stores, be polymerized, reconcile, feed 118 can only provide one or more storage, polymerization and communication function, because ofFor not requiring to reconcile network CDR and device auxiliary CDR), and service based on device use information is providedCentre billing interface 127 or central charge system 123.
In some embodiments, it is only by device group, user's plan or other any standards, classification and/or packetAnd manage and/or based on device (as based on external world's service or extraneous service provider or transactional services or transactional servicesProvider) provide CDR based on device (such as, miniature CDR) as the described herein and/or the execution of rule-based engineThe new CDR generated.
In some embodiments, the QoS for DAS includes one for assisting coordination and/or configuration wireless access/nothingThe service processor (such as, any device auxiliary element/function) of line access bearer (such as, RAB).In some embodimentsIn, service processor determine for one of QoS request whether be authorized to (such as, according to QoS, user identity, canWith local network capacity (such as, other one or more devices and/or network being reported)).In some embodiments, dressPut the report of QoS capacity requirement provide and/or increase network capacity requirements report.
In some embodiments, one is included for (such as, communicator, such as movement at device for the QoS of DASRadio communication device and/or middle interconnection device) assist to coordinate and/or configuration nothing on upper, network and/or on device and networkService controller (such as, any Service controll based on network equipment unit of line access/RAB (such as, RAB)Part/function).In some embodiments, service controller provides device QoS capacity to need to other network equipments/element/functionalityAsk report, and also configure that subsequently based on various standards and the RAB channel that determines.
In some embodiments, the QoS for DAS provides device auxiliary monitoring, information and/or functional thus assistHelp and not there is and/or assist network monitoring, information and/or the QoS of functional (such as, deep-packet detection (DPI))And/or by network monitoring, information and/or functional offer this type of be not the most available monitoring, information and/orFunctional (such as, the activity of the encryption on device be not likely to be DPI or other network technology accessible).ExampleAs, QoS can be assisted to set up for the QoS of DAS thus assist QoS to set up and provide this type of to use the technology being based only upon network possibleIt is available information on the contrary.Such as, device special operations and/or service monitoring technology can use such as QoS activity map (exampleAs, as described in this or other similar technology) by the activity monitored and/or service auxiliary QoS classification.Such as, useSuch device ancillary technique eliminates and/or minimizes DPI or other can raise privacy concern/problem, network/net neutrality worry/problemNetwork technology, and/or be not the most provided that the granularity service/activity monitoring of similar or equivalence is (more than asDiscussed), and/or also this type of is processed and be unloaded to communicator (such as, extremely from network (such as, network element/device/functional)The communicator of this type of function can be carried out for this type of less, process and/or memory span based on it, such as skill common to this areaArt personnel institute is significantly).In some embodiments, the QoS for DAS include for for QoS request provide initial authorization/permittedCan the service provider of (such as, use various technology described herein), and service controller determines that this QoS request isNo should be authorized to (such as, based on various QoS mandate/license/authorization criteria (such as, QoS activity map and/or QoS requestRule) and/or network capacity, as described in this).In some embodiments, the QoS for DAS includes for serviceController provides the service provider of the QoS request including a QoS class, and whether service controller determines this QoS requestShould be authorized to, as described in this.In some embodiments, for protecting the QoS of network capacity to provide device auxiliary prisonControl, information and/or functional thus assist to protect not there is and/or assist network monitoring, information and/or functionalThe network capacity of (such as, deep-packet detection (DPI)) and/or by network monitoring, information and/or functional offerThis type of is not the most available monitoring, information and/or functional (such as, the activity of the encryption on device is not likely to be DPIOr other network technology are accessible).In some embodiments, for protecting the DAS of network capacity to provide deviceAuxiliary monitoring, information and/or functional thus assist to protect not have and rely on DPI and/or not there is DPI wireless network individuallyAny use of network or the network capacity of any important use, it is by device rather than in the core net of DPI gatewayNetwork depths control plant network access behavior thus preserve Internet resources and network capacity (such as, though chat device behaviorBlocked at DPI gateway, wireless network capacitance is downloaded in technology consumption based on DPI in the air;Otherwise, do not use skill based on DPIArt control that device service uses for protect the DAS technology of network capacity such as to provide not consume aerial download wirelessThe use notice based on device of network capacity and services selection UI).
In some embodiments, for the QoS of DAS and/or for protecting the DAS of network capacity to include for network capacity(such as, sector, channel, busy state information or network capacity use/availability and/or the desired demand of network capacity) toBase station (BTS) provides or assists report, one or more based in such as the following: monitored on the communication deviceApplication uses, the User Activity that monitored on the communication device, communication position, other available networks and/or other monitoredMovable, service use measurement and/or module determined by or.In some embodiments, it is defined as needing net at oneNetwork service use (for instance, it may be required increase wireless network bandwidth, as based on service use activity map) application performTime or afterwards, send for logical to network (such as, network controller or other network equipment element/functionality) for the QoS of DASThe upcoming information of capacity requirement of T unit (such as, initiates QoS RAB (RAB) or other types potentiallyThe configuration of RAB).
In some embodiments, from one or more and wireless communication communicator collection network capacity (exampleAs, busy state information) (such as, from the network capacity/use information of the angular surveying of communicator each respectively by eachThe service processor on communicator respectively is determined and is stored), and reported service controller, and service controlDevice processed (such as, or another network element/function) uses this information to determine what resource is for the various grades of QoS (such as,In response to/assist various QoS request) and/or to run through multiple base station and/or network (such as, cable network, cellular network,Wi-Fi and/or other wireless networks) the distribution of worn balance be available.
In some embodiments, the service processor performed on the communication device sends a QoS to service controllerRequest (such as, wireless network Bearer Channel reservation request or RAB (RAB) request).Service controller uses and such as existsThese described various verification techniques verify this request.In some embodiments, service controller assists have one or manyThe coordination of the various device QoS request of the individual base station (BTS) communicated with communicator, the QoS reservation asked with offerThus assist new QoS session.In some embodiments, service controller is by such as providing to device service processorVarious QoS route instructions (such as, be polymerized, distinguish order of priority, queue up, authorize, distribute reserved/RAB, refusal, heavy-route (asIt is re-routed to other BTS and/or other networks) and/or otherwise manage QoS request) provide QoS routing function, whereinBTS is probably or may not realize that QoS.Such as, such as, QoS priority (can service use based on movable and/or answerWith), the grade of service, user identity, network capacity, temporal information and/or can be on basis of business, in session basis, prop up in advanceThe QoS priority bought on the basis of Fuing or on project basis.As another example, QoS priority also can by type of device,User, group, application type, content type or other any standards in one group or measurement and/or its any combination and notWith.In some embodiments, service controller alsos for QoS enforcement and management and assists have each of other network element/functionsPlant the coordination of device QoS request, thus a QoS scheme end to end is provided.
In some embodiments, QoS can be symmetrical or asymmetrical for two mobile devices.Implement at someIn scheme, QoS resource availability may be from communicator, one or more BTS, other network functions (such as, Service controll,Service controller and/or any other network element/function) or its any combination.In some embodiments, service controller is to separatelyOne network element/function provides QoS demand information.In some embodiments, service controller provides central authorities' polymerizer and strategyDetermine point (PDP).In some embodiments, service controller is communicator, one or more BTS and/or the group of the twoClose and control (such as, at least in part) QoS correlation function.
In some embodiments, use various technology described herein to determine QoS service use/transaction and/orThe charge (such as, monitor and/or determine association charge or charging) that network capacity managed service uses/concludes the business.Such as, service centerReason device can assist the movable charge controlling QoS and/or network capacity.In some embodiments, service processor uses dressPut auxiliary charging data record (CDR) or (such as, miniature CDR assists the movable charge controlling QoS and/or network capacityUse transaction code that QoS class is relevant and/or the relevant transaction code that network capacity controls), as at this about various embodimentsDescribed.In some embodiments, to the charge of QoS and/or network capacity managed service wholly or partly by oneOr multiple network element/function (such as, service controller, other gateways of SGSN/GGSN/ and/or billing interface/server) is carried out.
In some embodiments, service use information includes network service use information.Some embodiment partyIn case, network service use information includes network CDR.In some embodiments, service use information bagInclude service based on device and use information.In some embodiments, service based on device uses information to include that device assistsCDR, is also known as miniature CDR, as described in this at this.In some embodiments, miniature CDR for required anyThe CDR providing service to use charging in device activity reconcile or be in harmonious proportion (such as, it is provided that the service of granularity uses information, as based onApplication layer services uses monitoring, transactional services to use activity/meeting that monitoring, QoS activity/session/transaction, network capacity controlWords/transaction and/or other kinds of service use information).In some embodiments, each device includes a service center(such as, the service processor performed on the processor of communicator, such as the mobile dress that can communicate with wireless network for reason devicePut or middle interconnection device).
In some embodiments, relevant with charging event (charging event such as, being correlated with for QoS) for each hopeConnection device activity distribution one miniature CDR transaction code, and service processor is programmed thus will be with this transaction code-phaseAssociation activity computing interior (such as, various transaction code can with and some service, application and/or based on QoS class or priorityThe service that is associated uses and is associated, respectively, its can be used for for these various service/websites based on the Internet/network/Transaction and/or any other service based on the Internet/network/website provide the clothes of the granularity that can include service based on transactionMake sure use).Such as, using these technology (as described in this), the most any kind of device is movable (such as, including QoSClass that class and priorization and/or network capacity control and priorization) can be calculated in interior individually and/or be controlled (such as, quiltThrottle, limit and/or controlled the most as desired).In some embodiments, service processor is periodicallyGround is reported (such as, in each heart beating or based on any other cycle to such as service controller or some other network elements/function, push and/or one or more communication technologys of pulling) miniature CDR uses measurement.In some embodiments, serviceController miniature for heart beating CDR use information is reformatted as effective CDR form (such as, use and can by SGSN orGGSN or some other network element/functions authorized are the CDR form handled by CDR), and miniature by reformat subsequentlyCDR is transferred to a network element/function, is used for carrying out CDR conciliation.
In some embodiments, CDR reconcile for by storing it in a suitable service and accessing to your account alsoIt is accessed to your account middle deduction from user's set integrity service, miniature CDR service use information is counted suitably.ExampleAs, present technology provides a kind of use for the service flexibly of CDR conciliation and the existing solution of charging and use charging solutionCertainly scheme.Such as, charge system can process the CDR the reconciled feeding reconciled from CDR, is applied by suitable account codeTo the miniature CDR information being polymerized generated by device, and then need not to change existing charge system, basis setsExecute and the mode of technology generates charging event (such as, using New Transaction code to carry out the device auxiliary accounting capabilities that label is new).
In some embodiments, carry out on the communication device or carried out by it various QoS technology (such as, useService processor provides or assists offer QoS session configuration, QoS tactical management, qos policy to enforce and/or QoS meterTake/charge, such as QoS charge record and report) it is empirical tests (such as, using various verification technique described herein).?In some embodiments, carry out on the communication device or the various network capacity managed service technology that carried out by it (such as, makeThere is provided with service processor or assist offer network capacity managed service tactical management, network capacity managed service strategy to forcePerform and/or the charge of network capacity managed service, such as network capacity managed service charge record and report) it is empirical tests (exampleAs, use various verification technique described herein).
Such as, QoS request, relevant for QoS policing rule (such as, QoS activity map, service program relevant for QoS and/Or service strategy arrange) and implement, qos policy enforce and QoS charge be that empirical tests (such as, periodically, is often handed overEasily and/or based on some other standards/estimate).In some embodiments, during verification technique includes the followingOr multinomial: network service is used measure with and the first service strategy that is associated of communicator compared with, by deviceAssistant service uses measurement compared with this first service strategy, this network service is used and measure and this device auxiliaryService uses measurement to compare, carries out testing and confirm that device assistant service based on this test uses measurement, carries out user circleFace (UI) notice (such as, it can include subscription authentication, password, problem/answer challenge and/or other authentication techniques) and/orOther similar verification techniques, as will be obvious to those of ordinary skill in the art.Therefore, in some embodiments, useIn the checking " pass closed-loop " that the QoS of DAS is technology relevant for various QoS, as QoS request, QoS authorize, QoS use and/orQoS charges.In some embodiments, service processor and service controller are used as other QoS element/merits in networkThe QoS managed/coordinated system that can verify that of energy.In some embodiments, if this type of or other verification technique determines orAuxiliary determine QoS request, QoS report and/or qos policy behavior (such as, or similarly, network capacity managed service monitoring,Report and/or strategy interaction) do not mate with desired request, report and/or strategy, then can carry out the behavior responded, exampleAs, communicator (such as, and/or suspecting service) can be interrupted, isolates, inactivate/terminate, and/or is marked for into oneAnalysis/the supervision of step is so that it is determined that this device the most just breaks down, needs to update, be tampered or be compromised, by maliceSoftware infects and/or whether there is any other problem.
In some embodiments, communicator (such as, service processor) safeguard by device activity association to or mappingArrive a QoS flow journey table of RAB/QoS channel to QoS grade/class again, and in some embodiments, communicator is alsoCommunicator notice priorities associated QoS flow QoS management network function/element (such as, based on or use this QoS flow journeyTable).In some embodiments, service controller receives or gather information from communicator, and safeguards this type of for communicatorQoS flow journey table, and in some embodiments, service controller also notifies the QoS flow of priorities associated for communicatorQoS management network function/element (such as, based on or use this QoS flow journey table).In some embodiments, can be by thoroughlyBright mode distributes the stream into the activity initiated at communicator, or simply by activity class or user preference, or useOther technologies.
In some embodiments, communicator safeguards a QoS charge rate, scheduled transmission number of times and/other QoS phasesThe form of pass information thus in data network grade, implement one cover MAC, with management non-QoS MAC enable and/orNot there is QoS on the various functional legacy network supporting QoS to control (such as, and this type of technology can be additionally used in offerGive the qos feature through heterogeneous networks).In some embodiments, relevant for QoS strategy is in roaming and local service controlExchange between device processed, thus assist when roaming on one or more non-local network QoS to support.
In some embodiments, communicator is used as network capacity indicator (such as, for home cell collection network appearanceAmount information, and to service controller communication or report network capacity information).Such as, permanent home cell communicator canIt is placed on region, home cell thus increases legacy equipment for such network Volume Indicator/function of reporting.There is described herein useIn the various other technologies determining network capacity and/or network availability.
In some embodiments, service partner and/or service provider can wholly or partly subsidize by one toFixed user or one group of customer upgrade are to SLA relevant for QoS more preferable for a preferred purpose(SLA)/class.In some embodiments, use and/or the row of other communicators monitored based on the service monitoredThe user of communicator can be presented to (such as, as to required or preferably use for, the QoS upgrading/indulgence that this type of is subsidizedFamily behavior or the reason/award to other reasons).Similarly, in some embodiments, these technology apply also for networkCapacity managed service.
In some embodiments, QoS charge is to charge (such as, often based on QoS channel/reserved, service flow or RABRAB single current, every RAB multithread, often flow many RAB).In some embodiments, charge is (such as, for QoS and/or for netNetwork capacity managed service) be one or more based in the following: network busy state, time standard, user's serviceClass request, flow and class, time and class, network capacity (such as, network busy state) and class, temporal information and class, position, streamAmount type, application type, application class, destination, purpose type, partner services and/or other standards/measurement.Implement at someIn scheme, use various verification technique described here (such as, test billable events) checking QoS charge.Some embodiment partyIn case, use various verification technique described here (such as, test billable events) checking network capacity managed service charge.In some embodiments, QoS charge is to use (such as, by Mbytes (MB)), by when passing through of QoS class by dataBetween service flow, some day by the speed of time, network busy state, temporal information/mono-week, service program, currentNetwork and/or other standards/measurement.In some embodiments, the charge of network capacity managed service is to be used by data(such as, by Mbytes (MB)), by network capacity managed service class by the service flow of time, by the speed of timeSome day, service program, current network and/or other standards/measurement in degree, network busy state, temporal information/mono-week.
In some embodiments, the QoS for DAS includes the one or more coordination merit having in the followingCan: DAS element/functionality, Radio Access Network (RAN), transmission network, core network, GRX network, IPX network and/or otherNetwork/element/functionality.
Fig. 2 illustrate according to some embodiments for for device assistant service (DAS) provide service quality (QoS)And/or for providing DAS with another functional diagram of another network architecture of protection network capacity.In some embodimentsIn, the QoS for DAS technology described here uses the network architecture shown in Fig. 2 to implement.In some embodiments, makeImplement described here for protecting the DAS technology of network capacity by the network architecture shown in Fig. 2.
As indicated, Fig. 2 includes various device 100, these devices include service processor 115.Such as, device 100 can wrapInclude various types of mobile device, such as phone, PDA, calculating device, laptop computer, net book, panel computer, photographing unit, soundPleasure/media player, GPS device, the application of networking and the device of any other networking;And/or device 100 can include variousThe middle interconnection device of type, as described in this.Device 100 accesses and core net with Service controll 210 and center fed businessNetwork 220 communicates.Additionally provide the service strategy and charging communicated with center fed business access and core network 220Function 230.Such as, device 100 can be accessed by center fed business and core network 220 communicates with the Internet 120, thusAccess various internet sites/service 240 (such as, Google (Google) website/service, Yahoo (Yahoo) website/service, blackThe certain kind of berries (Blackberry) service, Fructus Mali pumilae (Apple) iTunes and application shop (AppStore), Amazon (Amaon.com), faceCompose net (FaceBook) and/or any other Internet service or other network-assisted services).
In some embodiments, Fig. 2 provides support as the described herein for protecting the various DAS of network capacityThe wireless network architecture of technology.It will be appreciated by those of ordinary skill in the art that other network architectures various can be used for providing in this instituteDescribe for protecting the various DAS technology of network capacity, and Fig. 2 show only another and may be provided in this described useSuch network examples of architectures in the various DAS technology of protection network capacity.
Fig. 3 illustrate according to some embodiments for providing service quality (QoS) for device assistant service (DAS)Including service processor 115 based on device and service controller 122 and/or for providing DAS with protection network capacityAnother functional diagram of framework 300.In some embodiments, the QoS for DAS technology described here uses in Fig. 3 and showsThe function gone out/element is implemented.In some embodiments, use the function shown in Fig. 3/element implement described here forThe DAS technology of protection network capacity.
Such as, framework 300 provides service processor enforcement and the service controller reality of the more comprehensive device of feature basedExecute.As indicated, this is connected to the Internet 120 corresponding to wherein service controller 122 and is not directly connected to access network 1610Networked deployment.A datum plane (such as, flow of services plane) communication path is shown as indicated, connect with solid line, andConnect with dotted line and show control plane (such as, Service control plane) communication path.As to those of ordinary skill in the art instituteIt will be evident that the functional subregion between a device agency and another device agency is based on such as design alternative, networkingEnvironment, device and/or service/application and can be used for the various different combination of various different enforcement.Such as, functionLine can be drawn again in any mode that product designer considers appropriate.As indicated, this includes the conduct for device agencySome subregion schematically implemented and function Burst Regions, although other the most more complicated embodiments can include for fillingPut different subregions and the function Burst Regions of proxy functionality specification, such as, for management development specification and test complexity andWorkflow.It addition, in various embodiments, may move or rearrange operation and data path is mutual or monitoring dataThe placement of the agency in path.Such as, below with respect to such as Fig. 4,12 and 13 and Fig. 5 to 11 (reality such as, being correlated with for DASExecute the QoS of scheme) and Figure 14 to 23 (such as, be used for the DAS of the embodiment protecting network capacity to be correlated with), describe in Fig. 3Shown function element.
As shown in Figure 3, service processor 115 includes a service control device link 1691.Such as, due to based on dressThe service control technology of the monitoring relating to running through network put becomes more sophisticated, have device agency and network element between effectiveAnd the control plane commu link communicating service strategy flexibly, control, monitor or verifying becomes more and more important.In some embodiments, service control device link 1691 is used for being transferred to and receiving from network element for device side offer oneThe system of the service broker of function.In some embodiments, by the multiple proxy message in buffering transmission and by its framingStrengthen the Flux efficiency of this link.In some embodiments, by controlling transmission frequency or transmission frequency being linked to clothesThe speed that use of make suring or flow use improves Flux efficiency further.In some embodiments, one or more peace is usedComplete or secret grade makes link be robust for finding, eavesdropping or be compromised.In some embodiments, serviceControl device link 1691 and also provide communication link and heart beating timing for acting on behalf of heartbeat function.As discussed below, at thisThe disclosed various embodiments for service control device link 1691 provide one and for transmission and receive and other netsThe effective of information safety approach are implemented, control, monitor and verified to the service strategy of unit.
As shown in Figure 3, service controller 122 includes a service control server link 1638.Some embodiment partyIn case, relate to running through network (such as, the service control technology based on device of monitoring on the control plane) is more complicated,And because so, have at device agency (such as, service processor 115) and network element (such as, service controller 112)Between effectively and the control plane commu link that communicates service strategy flexibly, control, monitor or verify becomes moreCome the most important.Such as, in service control server link 1638 and the service control of service processor 115 of service controller 122Communication link between device link 1691 processed can provide one effectively and flexibly to control plane commu link, in Fig. 3A shown Service controll link 1653, and in some embodiments, this controls plane commu link and provides oneSafety (such as, encryption) communication link, thus provide between service processor 115 and service controller 122 safe, two-wayCommunication.In some embodiments, service control server link 1638 is used for being transferred to and connecing for network side offer oneReceive the system of the service broker from Network Element Function.In some embodiments, by the multiple proxy message in buffering transmissionAnd its framing is strengthened the Flux efficiency (such as, thus reducing Internet chat) of this link.In some embodiments, pass throughControl transmission frequency and/or the service that transmission frequency is linked to uses or the speed of flow use improves flow effect furtherRate.In some embodiments, use one or more safety and/or secret grade to make link for the communication on linkPotential discovery, eavesdrop or be compromised for be safety.In some embodiments, service control server link 1638 is alsoAct on behalf of heartbeat function and provide communication link and heart beating timing.
In some embodiments, service control server link 1638 is for protecting, sign, encrypting and/or with its other partyBefore formula sends this type of communication on Service controll link 1653, protection communicates and provides.Such as, service control server link1638 can be sent to transport layer or be sent directly to link layer to transmit.In another example, service control serverLink 1638 protects the communication with transport layer encryption further, such as TCP TLS or another safe transmission layer protocol.As separatelyOne example, service control server link 1638 can in link layer encryption, as use IPSEC, various possible VPN service,The IP layer encryption of other forms and/or another link layer encryption technology.
As shown in Figure 3, service controller 122 includes an Access Control integrity servers 1654 (such as, service planSlightly security server).In some embodiments, Access Control integrity processor 1654 is collected in service strategy, service makesWith the device information in, proxy configurations and/or act of agency.Such as, Access Control integrity servers 1654 can cross-checkThis information thus identify service strategy implement and control system in integrity violations.In another example, control is accessedIntegrity servers 1654 processed can suspect that service strategy invades (such as, qos policy infringement and/or network capacity managed serviceStrategy invade) or system integrity invade time initiation action.
In some embodiments, Access Control integrity servers 1654 (and/or service controller 122 another itsHe is agency) act in the report and error condition of Access Control integrity agent 1694 (such as, service strategy TSM Security Agent).The many inspection of Access Control integrity agent 1654 can be completed by server.Such as, Access Control integrity agent 1654 is examinedLook into include in the following one or more: use for the service of the range consistent with strategy and measure (such as, fromNetwork and/or the use from device are measured);The configuration of agency;The operation of agency;And/or dynamic proxy download.
In some embodiments, if strategy be intended to suitable, then Access Control integrity servers 1654 (with/Or service controller 122 a certain other agency) by by various service use measure (such as, information based on network monitoring,As by use IPDR or CDR, and/or local service use monitoring information) with desired service usage behavior (such as, QoSStrategy and/or network capacity managed service strategy) it is compared to verify that device service strategy is implemented.Such as, if strategy purportSuitable, then device service implement can include measure pass through total QoS data, the QoS data passed through within a period of time,IP address, the data of every IP address and/or other measure such as position, download, the Email that accesses, URL, and by this type ofMeasure compared with desired service usage behavior.
In some embodiments, Access Control integrity servers 1654 is (such as, and/or certain of service controller 122One other agencies) checking device service strategy, and may indicate that QoS service is measured and the erroneous matching checking of QoS service strategyIt is one or more that error condition includes in the following: undelegated network insertion (such as, surmounts environmental services strategy to limitAccess);Undelegated network speed (such as, surmounts the average speed that service strategy limits);Web database technology does not mate QoSStrategy limits (such as, need not reenter/revise service strategy, device is not parked at the limit);The undelegated network address;NotThe service authorized uses (such as, VOIP, Email and/or web page browsing);Undelegated application uses (such as, electronics postalPart, VOIP, Email and/or webpage);For plan, service utilization rate is the highest;And strategy controller do not controlled/It is throttled to the end;And/or any other is in Service measurement and the erroneous matching of service strategy.Therefore, in some embodiments, connectEnter to control integrity servers 1654 (and/or other agencies a certain of service controller 122) and a strategy/Service controll is providedIntegrity service, thus continuously (such as, be periodically and/or based on trigger event) checking device Service controll not byCrack and/or do not show that strategy is outer (such as, qos policy and/or network capacity managed service strategy).
As shown in Figure 3, service controller 122 includes a service history server 1650 (such as, charging server).In some embodiments, service history server 1650 is from access network aaa server 1621 and service monitoring agent 1696Collect and record service to use or service activity report.Such as, although in certain embodiments, the service from network element usesHistory can be more detailed than the service history from device, and the service history carrying out automatic network can be that device service strategy is realThe checking executed provides a valuable source, because such as, for a device mistake on device or cracking event, brokenSolve network equipment and software is the most difficult.Such as, the service history from device is reported and can be included various serviceTracking information, as described similarly above.In some embodiments, service history server 1650 comes to it according to requestHis server and/or one or more agency provide service history.In some embodiments, service history server 1650 toDevice service history 1618 (such as, CDR feeding and CDR reconcile) provides service to use history.In some embodiments, in order toAssist the purpose of activation trace service function (described below), the net that service history server 1650 attending device is already connected toThe history of network.Such as, present networks summary of activity can include assessed network the movable v time collected, often connect and/orThe flow v time often connected.As another example, can analyze or report this summary of activity further, thus in order to charging is total toEnjoy the purpose of mediation, estimate the type of the service program being associated with traffic activity.
As shown in Figure 3, service controller 122 includes a policy management servers 1652 (such as, Policy Decision Point(PDP) server), this policy management servers is used for the service that manages and uses strategy, as controlled in qos policy and/or network capacityService strategy.In some embodiments, strategy is sent to by policy management servers 1652 by Service controll link 1653Service processor 115.In some embodiments, policy management servers 1652 is filling according to the management of device service profilesThe strategy setting (such as, the various strategy setting as described by embodiments the most various at this) put.In some embodimentsIn, policy management servers 1652 arranges Transient Policy on policy enforcement agent (such as, policy enforcement agent 1690).ExampleAs, policy management servers 1652 can distributing policy be arranged, monitoring service uses, and if desired, revises strategy setting.ExampleAs, in the case of preferably going to manage its user servicing cost of use for network at one, or at any adaptive strategy pipeIn the case of reason demand, policy management servers 1652 can safeguard that higher and device a communication frequency is to collect flowAnd/or Service measurement issue new strategy setting.In this example, be periodically and/or based on various triggering/event/Request reports the Service measurement of assembly monitor and changing of any user's service strategy preference to policy management servers 1652Become.In this example, privacy of user setting usually requires that and securely communicates (such as, security service control link with network1653), as by policy management servers 1652, thus ensure at this type of configuring request/strategy setting transmitted on networkTime, each side of privacy of user is safeguarded suitably.Such as, information can be divided into service strategy management, not with otherFor the database communication of CRM, thus safeguard privacy of user.
In some embodiments, policy management servers 1652 provides adaptive strategy to manage on device.Such as, planSlightly management server 1652 can be arranged and target by distributing policy, and relies on tactical management (such as, service processor based on device115) some or all of strategy self adaptation is carried out.This method can need less mutual, thus for device with deviceTactical management (such as, relative to above-described policy management method based on each server/network, decreases Internet chat)Purpose, reduce Internet chat on Service controll link 1653.This method is also by having permitted a user to privacy of userPreference/arrange configures device strategy and provides the privacy of user embodiment of robust, so that such as without userMandate, then sensitive information (such as, the information of geographic position data, network history and/or other sensitivities) can not be with networkCommunicate.In some embodiments, policy management servers 1652 adjusts service strategy based on temporal information.At someIn embodiment, policy management servers 1652 receives, asks and/or otherwise obtain the survey of network availability/capacity(such as, network is numerous to measure and adjust traffic-shaped strategy and/or other strategy setting based on available network availability/capacityBusy condition).
As shown in Figure 3, service controller 122 includes a network traffic analysis server 1656.Some embodiment partyIn case, network traffic analysis server 1656 is collected/is received service and use history for multiple devices and/or many group devices and analyzeService uses.In some embodiments, network traffic analysis server 1656 represents service in various formats and uses data,Thus identify network service quality and/or the raising of service revenue rate.In some embodiments, network traffic analysis serverFor the network under variable setting, 1656 estimate that in potential service strategy service quality and/or service use.Real at someExecuting in scheme, network traffic analysis server 1656 is asked by one or more causing for overall network service quality or service feeThe service behavior that the device identification of topic is actual or potential.In some embodiments, network traffic analysis server 1656 isNetwork under variable setting estimates network availability/capacity in potential service strategy.In some embodiments, networkFlow analysis servers 1656 is that overall network availability/capacity by one or more impacts and/or causes the device of problem to knowUnactual or potential service behavior.
As shown in Figure 3, service analysis, test and download 122B and include beta testing service device 1658 (such as a, planSlightly create point and beta testing service device).In some embodiments, beta testing service device 1658 to or multiple device issueThe service program strategy setting of candidate.In some embodiments, beta testing service device 1658 is one or more candidate'sService program strategy setting provides network service to use or field feedback summary report.In some embodiments, forDifferent candidate service planning strategies is arranged, and beta testing service device 1658 provides a kind of and beta test result compared or beFurther strategy setting optimization and select the mechanism of the candidate of optimum, as being used for protecting network capacity.
As shown in Figure 3, service controller 122 includes that control server 1660 (such as, service software is downloaded in a serviceDownload and control server).In some embodiments, service download control server 1660 provides a download function thus pacifiesService software element (such as, service processor 115 and/or the agency/group of service processor 115 on dress and/or updating devicePart), as described in this.
As shown in Figure 3, service controller 122 includes a charging event server 1662 (such as, miniature CDR serviceDevice).In some embodiments, charging event server 1662 is collected charging event, is provided service meter to service processor 115Draw information, to service processor 115 provide service use update, as connecing between device and central charge server 1619Mouthful and/or for some ecommerce charging transaction provide believable third party's function.
As shown in Figure 3, access network HLR aaa server 1621 and access network 1610 carry out network service.OneIn a little embodiments, access network aaa server 1621 provides required access network AAA to service and (such as, accesses for deviceThe Access Control of layer and authorization function) thus allow device to arrive above center fed business's access network and service provider network.In some embodiments, another layer of Access Control is required for device accesses other networks, as the Internet,Enterprise network and/or machine to machine network.This extra play of Access Control can be by such as service processor 115 on deviceImplement.In some embodiments, access network aaa server 1621 also provides for suspecting service and for based on from clothes into deviceThe device of the communication that business controller 122 receives recovers the ability of service.In some embodiments, access network aaa server1621 also provide for being routed directly to an isolation network maybe when calling a device isolation condition limit or limit for device flowThe ability of network insertion processed.In some embodiments, access network aaa server 1621 also records and annunciator network clothesUse of make suring (such as, plant network service can be used report to device service history 1618).
As shown in Figure 3, device service history 1618 and access network 1610 carry out network service.In some embodimentsIn, device service history 1618 provides in each embodiment and services usage data record for numerous purposes.Implement at someIn scheme, device service history 1618 is used for assisting service for checking credentials strategy to implement.In some embodiments, device service history1618 monitor for the service for checking credentials.In some embodiments, device service history 1618 by verify the station message recording and/or based onTake strategy enforcement (such as, the service for checking credentials uses charge).In some embodiments, device service history 1618 is used for synchronizingAnd/or checking local service uses enumerator (such as, the service for checking credentials uses charging).
As shown in Figure 3, central charge 1619 (such as, center fed business accounting server) is carried out with access network 1610Network service.In some embodiments, center fed business accounting server 1619 provides one for center fed business's charging eventIndividual mediation function.Such as, center fed business accounting server 1619 acceptable service Planning Change.In some embodiments,Center fed business's accounting server 1619 provides the renewal in device service use, service program restriction and/or service strategy.In some embodiments, center fed business's accounting server 1619 collects charging event, is write out by bill formula, for serviceUser presents the bill, and provides some billing event data and service schedule information to service controller 122 and/or device 100.
As shown in Figure 3, in some embodiments, modem select and control 1811 (such as, as shown with evenConnect manager 1804 to communicate) select access network connect and communicate with modem fire wall 1655, and adjustModulator-demodulator drives 1831,1815,1814,1813,1812 to change data traffic into tune for one or more modemsModulator-demodulator flow bus also selects with modem and controls 1811 to communicate.In some embodiments, based on institute(such as, for WWAN, WLAN, WPAN, Ethernet and/or DSL network even the network selected connects the different configuration file of selectionDifferent service profiles/the strategy connect), it is also referred to as multi-mode configuration file and arranges at this.Such as, service configuration literary compositionPart arrange can based on the true access network (such as, family DSL/ cable or job network) after Wi-Fi rather than it be Wi-The fact that Fi (such as, or other any networks, such as DSL/ cable, satellite or T-1), it is considered to access Wi-with at cafeFi network is different.Such as, in a Wi-Fi Hotspot situation that wherein a lot of users are present on DSL or T-1 back haul link,Service controller can be in service provider's cloud or a MVNO cloud, Service controll can be provided by service provider oneIndividual VSP ability provides, or service controller can not had with access network service provider by self using service controllerThe hotspot service provider having any association has.Such as, service processor can be by service controller control, thus according to QoSOr user shares rule and (such as, has higher difference priority (such as, potentially in order to higher with some than other usersService pay) user) focus divide available bandwidth.As another example, can be that focus provides environmental services (exampleAs, as similarly described by this), for the service processor through checking.
In some embodiments, service processor 115 and service controller 122 can distribute and multiple service program phasesMultiple service profiles of association, user is individually or combination selects these service profiles as a bag.Such as,Device 100 by the environmental services including No charge or fee to trade service, user's payment transaction or event in No charge or fee to trade services andIt not basic service (such as, press service, electronic reader, PND service, expire payable at sight session the Internet), hand at theseEach service is supported by account ability bill easily and in event, thus correctly by partner's charging calculating of any subsidyInterior to provide transactional services (such as, Barnes & Noble bookstore (Barnes and Noble) payable electronic reader service to clothesBusiness provider provides income share, for any books bought from device 100 or magazine transaction).In some embodiments,Account debit service can also follow the tracks of transaction, and in some embodiments, in order to the purpose advertisement of income share all usesService monitoring ability disclosed herein.After initiation has the service of free environmental services discussed above, user subsequently may be usedMonthly the Internet, Email and SMS service is paid after selecting one.In this case, service controller 122 is based on net(such as, or in the case of charging based on device service controller 122 charging event server in the case of the charging of network1622) the billing plan code for new the Internet, Email and SMS service will be obtained from charge system 123.At someIn embodiment, this code is cross reference in a data base (such as, policy management servers 1652), thus withInitial environment service combines, and finds suitable service profiles for new service.Apply new superset service configuration subsequentlyFile, so that user keeps the free access to environmental services, and charging partner continues to subsidize those services, and user is alsoAcquire the access of Internet service and optional Service controll configuration file (such as, from embodiment disclosed hereinOne of).Superset configuration file is when profileapplied to identical device 100 service processor, it is provided that two or manyThe configuration file of the ability of the combination of individual service profiles.In some embodiments, as more than one " can storehouse "When service is selected by user or is otherwise applied to device, device 100 (service processor 115) can determine that superset configuration literary compositionPart rather than service controller 122.Service processor 115 described here and the motility embodiment of service controller 122Consider the rich and varied service profiles needing to define respectively and apply, or implement required dress as a supersetPut 100 service features.
As shown in Figure 3, an agent communication bus 1630 represents for acting on behalf of and function for various service processors 115The function providing communication describes.In some embodiments, as representated by the functional diagram that Fig. 3 shows, the frame of busStructure generally on how point-to-multipoint be so that any agency can be with any other agency, service controller or in some feelingsOther assemblies (such as user interface 1697 and/or modem components) of device in condition communicate.As described below,This framework for some agency or communication transaction can also is that in point-to-point, or agent framework point-to-multipoint so thatObtain and can concentrate or protect or control or limit or record or report all of agent communication.In some embodiments, generationReason communication bus is protected, is signed, is encrypted, is hidden, subregion and/or otherwise protect it from undelegated monitoring or makeWith.In some embodiments, application interface acts on behalf of (not shown) for literal ground labelling or substantially labelling application layerFlow, so that one or more policy enforcement agent 1690 has required information to implement selected traffic-shaped sideCase.In some embodiments, an application interface is acted on behalf of (not shown) and is communicated with various application, applies including TCP1604, IP application 1605 and voice application 1602.
As shown in Figure 3, service processor 115 includes an API and OS stack interface 1693.In some embodiments,API and OS stack interface 1693 provides QoS API functional, as described similarly relative to each embodiment at this.At someIn embodiment, QoS API is for application report QoS availability.In some embodiments, API and OS stack interface 1693There is provided the API and/or emulation API of network capacity control functional, as described similarly relative to each embodiment at this.AsShown in, service processor 115 also includes a router 1698 (such as, QoS router agency/function and/or network capacityManaged service router agency/function) and a Policy Decision Point (PDP) act on behalf of 1692.In some embodiments, router1698 provide QoS router functionality, as described similarly relative to each embodiment at this.In some embodiments,Router 1698 provides network capacity managed service router functionality, as retouched similarly relative to each embodiment at thisState.In some embodiments, QoS router supports (such as, the one or more configured/distribution of multiple QoS channelsQoS link forms a QoS channel between device and required end points, such as the access of the QoS channel single-ended forPoint/BTS/ Gateway/Network or other communicators for a QoS channel end to end, depend on that QoS connection/network props upHold/availability/etc.).In some embodiments, QoS router support multiple QoS channels, the most each have differentQoS class/grade.In some embodiments, application/service is used flow to be routed to a suitable QoS letter by QoS routerRoad.In some embodiments, QoS router determines route/mapping: QoS based on one or more in such as the followingAPI request, QoS active map figure, user's request, service program, service profiles, service strategy setting, network capacity, clothesBusiness controller or other in the middle of QoS network element/function/device and/or other standards/measurement, as at this relative to each embodiment partyCase describes similarly.In some embodiments, use various technology described here by multiple different application/service roadsBy to a specific QoS channel.In some embodiments, use various technology described here by different application/clothesBusiness is routed to different QoS channels.In some embodiments, QoS router is communicator Added Management and/or optimizationQoS uses.In some embodiments, QoS router through multiple communicator Added Management and/or optimizes QoS use (exampleAs, based on the cell area/base station given for or the network capacity of other access points).In some embodiments,PDP agent 1692 provides PDP agent functional, as described similarly relative to each embodiment at this.As indicated, framework300 also include that a hang-up restoration interface 320, network QoS configuration interface 330 (such as, are used for providing various described hereQoS technology) and an activation in service controller 122A/hang-up recover server 340 and changing interface service device350。
In some embodiments, it is provided that for provide an active map figure thus by service use activity classification orDevice assistant service (DAS) technology sorted out, with by each monitored activity (such as, by URL, by network domains, pass through netStand, by network traffics type, by the activity on probation classification/classification of application or application type and/or any other service)It is associated with the IP address associated.In some embodiments, the policy control of service processor 115 acts on behalf of (not shown), clothesBusiness monitoring agent 1696 (such as, billing proxy) or another agency or function (or combinations thereof) provide a DAS activity and reflectPenetrate figure.In some embodiments, the policy control of service processor acts on behalf of (not shown), service monitoring is acted on behalf of or anotherAgency or function (or combinations thereof) provide one to be used for service and use activity classification or the active map figure of classification, thus will be eachThe activity that monitored (such as, by URL (URL), by network domains, by website, by network traffics classType, by socket (as by IP address, agreement and/or port), by socket ID (such as port address/number), pass throughPort numbers, by content type, classify by application or application type and/or other any service usage behaviors/sort out) withIP address and/or the other standards/measurement of association are associated.In some embodiments, the policy control generation of service processorReason, service monitoring agency or another agency or function (or combinations thereof) use various technology to determine the service for being monitoredUse the associated IP address of activity to monitor one or more DNS request (such as, by carrying out this type of on the device 100Monitoring technique, it may be determined that associated IP address is without the network request for reversible dns lookup).In some embodimentsIn, the policy control agency of service processor, service monitoring agency or another agency or function (or combinations thereof) record are alsoReport IP address or include that dns lookup function is to report IP address or for the IP address servicing use activity monitored and phaseThe URL of association.Such as, service processor policy control agency, service monitoring agency or another agency or function (or itsCombination) various technology can be used to determine the IP address for the association servicing use activity monitored, thus carry out dns lookupFunction (such as, uses the local dns caching on the device 100 monitored).In some embodiments, in these technologyOne or more for dynamically setting up and safeguard a DAS active map figure, this DAS active map figure maps such as URL and arrivesIP address, it is applied to IP address, content type to IP address and/or other any possible classification/be categorized into IP address.?In some embodiments, DAS active map figure be used for various DAS flow-controls and/or throttling technology, as at this relative to each realityScheme of executing describes similarly, is used for providing QoS and/or in order to protect network capacity to provide DAS to DAS.Implement at someIn scheme, DAS active map figure is used for providing a user with information relevant for various UI and using relevant notification technique to service,As described similarly relative to each embodiment at this.In some embodiments, DAS active map figure is used for providing serviceUse prediction/estimate that monitoring, future service use, service use charging (such as, account debit and/or any other serviceUse/charging sort out technology), for environmental services use monitoring DAS technology, for generate miniature CDR DAS technology and/Or any other technology relevant for DAS various, as described similarly relative to each embodiment at this.
In some embodiments, the function of all or part of service processor 115 disclosed herein is real in softwareExecute.In some embodiments, the function of all or part of service processor 115 is implemented within hardware.Some embodiment partyIn case, functional (such as, as discussed in this) of all of or substantially all of service processor 115 is real in softwareExecuting and store, software can run (such as, being executed by) on each assembly of device 100.In some embodiments, in instituteProtection or to store in safe storage or implement some part or all of service processor 115 be favourable so thatOther undesired programs (such as, and/or undelegated user) are difficult to access function or software in service processor 115.In some embodiments, service processor 115 is implemented at least in part and/or is stored in secure non-volatile memory(such as, nonvolatile memory can be secure non-volatile memory), this nonvolatile memory is not over keyAnd/or not can be accessed by during other release mechanisms (such as, security proving).In some embodiments, by service processorAt least one of 115 softwares be partially loaded into the ability of protected nonvolatile memory also need to a safe key and/Or sign and/or need service processor 115 component software being loaded in nonvolatile memory to encrypt the most safelyAnd signed suitably by an authority, this authority is trusted, as shown in Figure 3 by fail-safe software downloader functionService downloader 1663.In some embodiments, fail-safe software download embodiment is still deposited with a random bytesReservoir.Those of ordinary skill in the art are it is also appreciated that all of memorizer can be outside on chip, chip, on plateAnd/or plate outside.
Fig. 4 A to 4C illustrate according to some embodiments for for device assistant service (DAS) provide service quality(QoS) functional diagram.In some embodiments, the QoS for DAS technology described here uses shown in Fig. 4 A to 4CThe network architecture is implemented.
See Fig. 4 A, in some embodiments, use service processor 115 to perform qos feature on the communications device 100Property, as described similarly at this.Such as, service processor 115 determines whether a QoS request is authorized to (such as, based on instituteThe service program of association and/or other standards/measurement).If authorizing QoS request, then service processor 115 and base station(BTS) 125 communicate, thus send this QoS request (such as, RAB or many RAB reservation request) to local BTS.BTS determinesWhether accept or refuse this QoS request (such as, based on network capacity, as used the prerequisite variable QoS/ network bandwidth or doing the bestTransmit access strategy or other technologies, and/or other standards/measurement).BTS is therefore in response to this QoS request.If this QoS pleaseAsk authorized, QoS session can be initiated, as described similarly at this.In some embodiments, service processor 115 also makesCarry out various QoS charging function by various technology described here, and service processor 115 is periodically to service controller122 (such as, and/or another network element/function) send QoS charge record or report.In some embodiments, use variousTechnology described herein carries out the cycle to service processor 115 with the function relevant for QoS carried out on service processor 115Property ground checking.
See Fig. 4 B, Fig. 4 B and Fig. 4 A similar, except also show service controller 122 by the clothes with communicator 100Business processor 115 communicates, and this service controller can be to download and be updated periodically that QoS is regular and/or other can includeService program/configuration file/the policy information of qos-related information and provide.In some embodiments, service processor 115Also use various technology described here to carry out various QoS charging function, and service processor 115 is periodically to service controlDevice processed 122 (such as, and/or another network element/function) sends QoS charge record or report.In some embodiments, useService processor 115 is carried out by various technology described herein with the function relevant for QoS carried out on service processor 115Periodically verify.
Seeing Fig. 4 C, 410, service processor 115 sends (such as, the service of a QoS request to service controller 122Processor also can determine whether (at least in part) that this QoS request is authorized, as retouched similarly relative to Fig. 4 A at thisState).420, if use various technology described here determine QoS request be authorized to and/or whether BTS 125 have forThe network capacity of QoS request, service controller 122 sends QoS request to BTS 125.Such as, service controller can be QoS phaseMovable one central policy of offer closed determines that a some function is (such as, based on QoS priorization, network capacity and/or other marksAccurate/to measure/strategy).430, therefore service controller 122 transmits the response to QoS request.440, if authorizing thisQoS request, then device 100 initiates QoS session (such as, using RAB or many RAB to reserve) by BTS 125.Some embodiment partyIn case, service processor 115 also uses various technology described here to carry out various QoS charging function, and service processor115 periodically send QoS charge record or report to service controller 122 (such as, and/or another network element/function).?In some embodiments, various technology described herein is used to carry out to service processor 115 with on service processor 115Function relevant for QoS periodically verify.
In some embodiments, QoS technology described here is implemented in device (such as, using service processor 115)And in one or more other network element/functions, such as BTS 125, service controller 125, other gateways of RAN, SGSN/GGSN/And/or other network element/functions, wherein or can divide function distribution relevant for various QoS based on various design/network architecture methodsBe fitted on this type of network element/function, as to those of ordinary skill in the art it will be evident that wherein use various verification technique described hereThe activity relevant to the QoS at device 100 and/or function are verified.
In some embodiments, device by directly inquire about QoS link reserves equipment in network (such as, access point,Such as BTS 125) determine QoS availability.In some embodiments, device is based on by QoS request and one or more networksThe go-between function that QoS link circuit resource is coordinated mutually determines QoS availability.In some embodiments, device with one orQoS reservation is asked before the QoS link establishment of multiple QoS network link capacity.In some embodiments, in response to QoS request,If only/and after the QoS link determining required one or more required establishment QoS channel is available, report oneIndividual QoS channel is as available channel, and such as, is subsequently based on and confirms or retain in response to the automatic of QoS request, can retainThis QoS channel.
Fig. 5 illustrates generating for the service quality (QoS) for device assistant service (DAS) according to some embodimentsThe functional diagram of one QoS activity diagram.Especially, Fig. 5 illustrates for being used for the service program of QoS 510 or one group of clothesBusiness planning strategy/rule is mapped to the technology of one group of QoS active rule 530.As indicated, use various technology described here,Use QoS mapping function by device state information 510 (such as, the service meter associated by a group relevant for one group of QoS rule/QoSDraw, service program uses, other states enter the some day in network capacity or the requirement of prediction or temporal information/mono-week, activityUse, QoS grade and/or user preference) it is mapped to one group of QoS active rule 530.530, mapping function 520 is used to determineActive rule (such as, active policy rule instruction) 530.In some embodiments, can be similarly used described hereTechnology (such as, being used for generating and implement a network capacity managed service active map) relative to Fig. 5 is implemented for networkThe DAS technology of capacity managed service.
In some embodiments, service program includes an active policy list, and each in service programActive policy points out how service strategy is revised by rule state information.In some embodiments, the most each activityStrategy becomes the instruction for engine (such as, QoS mapping function 520), and active policy is mapped to QoS active rule by this instruction530.In some embodiments, service controller 122 downloads QoS mapping function 520, and this download is real by service processor 115Execute.
In some embodiments, service processor determine (such as, and classification) with or without granularity application/The application/service of service use activity uses Operations Requirements (such as, to depend on each user/service program/service provider/netNetwork/legal and/or other privacies restriction and/or any other relevant requirement or setting).Such as, can download policy (exampleAs, service strategy is arranged and/or service profiles is arranged) provide this type of application/service use activity monitoring rule and useA QoS active map figure of each QoS class or priority it is assigned in the activity this type of monitored, and some embodiment partyIn case, (such as, periodically this type of monitoring and QoS active map figure it be also possible to use various verification techniques described here implementsCompared with audit, test use information with network service).In some embodiments, QoS active map figure is based on logicalService program, service profiles and/or the service strategy that T unit is associated is arranged.In some embodiments, QoSActive map figure is organized based on device group and/or user.In some embodiments, QoS active map figure is based on userInput (such as, the user of communicator may be identified for the QoS class/grade of service of various application and/or service activity, ringYing Yu for user input request, based on user configuration, user-defined rule (such as, with eliminate or relax privacy and/orWorry/the problem of network/net neutrality) and/or the pattern relevant for the user behavior QoS of monitoring that confirmed or preference).At someIn embodiment, QoS active map figure includes based on the one or more mapping/association in the following: for givenPurpose user preference, purpose class, apply, apply class (such as, by application class rather than also can eliminate relative to concrete applicationOr slow down privacy and/or network/net neutrality worry/problem), stream, flow or stream class, period, temporal information, position, network busyState (such as, QoS is provided when providing QoS, then charges more when busy, notify user's busy state), dressPut type, user type, user's plan, user's group, user identity, partner services, token, COS and/or other standardsOr measure.
In some embodiments, for introduce and/or the QoS request of output, manage described here for device 100Various technology.In some embodiments, as shown in Figure 6, the QoS for DAS includes setting up one and coordinates end to endQoS service channel controls.
Fig. 6 illustrates end-to-end for the service quality (QoS) for device assistant service according to some embodimentsCoordination QoS service channel control functional diagram.As shown in FIG. 6, radio communication device 100A includes that one controls with serviceThe service processor 115A that device 122A processed securely communicates.Radio communication device 100B includes one and service controller 122BThe service processor 115B securely communicated.In some embodiments, such as when device 100A initiate one to deviceThe QoS request of the QoS class session that 100B communicates (such as, VOIP calling or another need maybe may to use QoS class/etc.The application service of level session, such as that talk with or other QoS class types/grades) because using service controller 122A and service controlThe order that device 122B processed carries out behavior assists/sets up the QoS service channel of an end-to-end coordination to control.Implement at someIn scheme, as described similarly at this, it is assumed that service processor 115A and service controller 122A determines from device 100A'sQoS request authorizes for this device, then service controller 122A contact registration center 650 (such as, device registration center, asHLR, Mobile Servicing Center or other include such as by device/IP address/other service controller map central dataStorehouse or registration center) determine that service controller is that device 100B is associated with/is responsible for QoS/ Service controll.Registration center650 search based on this and to determine and provide service controller 122B information (such as, IP address/other addresses).Some embodiment partyIn case, service controller 122A initiates QoS request with service controller 122B subsequently, so that it is determined that whether device 100B is authorized toAnd/or whether the QoS session for being asked by device 100A is available.In some embodiments, service controller 122A/B with BTS 125A/B communicates, and determines whether to assist (such as, based on network capacity) QoS request, as in this classAs describe.In some embodiments, service controller 122A and 122B provide central authorities QoS coordination function and can directly fromLocal BTS respectively asks suitable QoS channel.In some embodiments, service controller 122A and 122B is also with followingThe one or more of network element/function as shown in FIG. 6 communicate, thus assist the QoS service of end-to-end coordinationChannel controls: RAN 610/670, core network 620/660 and IPX network 630.In some embodiments, in order to joinPutting, service controller 122A and 122B communicates with various required network elements, thus assists meeting by operator core networkWords configuration, as discussed similarly above.In some embodiments, in order to configure, service controller 122A and 122B is with eachPlant required network element to communicate, thus assist session to configure, as discussed similarly above by IPX network.As to abilityTerritory those of ordinary skill it will be evident that as the described herein QoS for DAS technology can use these or with other networks variousThe technology that framework is similar to is similarly effected.
Fig. 7 illustrates the flow process of the service quality for device assistant service (DAS) (QoS) according to some embodimentsFigure.702, process starts.704, receive or determine QoS rule (such as, service processor receive or request QoS rule,QoS rule may be included in during service program, service profiles and/or the service strategy being associated with communicator arrange).In some embodiments, the various technical identification QoS described here rule (week such as, service controller used is usedUpdate, replace, download, obscure and/or test to phase property and/or use other verification techniques).In some embodiments, respectivelyApplication also uses QoS API to initiate QoS request, as at this relative to described by each embodiment.In some embodiments,According to each embodiment described here, QoS rule is implemented with the form of QoS active map figure.706, use is described hereinVarious technology (such as, arrange based on service program, service profiles, service strategy, QoS rule, based on QoS class, currentService uses, current charge identity and/or other any standard/measurements) determine the identity of the communicator for QoS.OneIn a little embodiments, in addition to for QoS request checking device/user identity, also use various technical identification device described hereWhether follow or in accordance with a QoS reservation request strategy distributed.If it is determined that device is qualified for QoS, then exist708, apparatus user interface (UI) provide about for one or more QoS sessions refusal/underproof information (such as, forRefusal/defective the charging of one or more QoS options offer and/or option, as accessed for one or more QoS sessionsFor certain/service program of mono-group/period upgrading or pay).If it is determined that device is qualified for QoS, then 710,Determine QoS availability (such as, based on network capacity, it can be determined on device, by with the communication of service controller,By with the communication of BTS and/or its any combination, use various technology described here).If it is determined that QoS is unavailable, then 712, UI provides the information about QoS availability and/or option (such as, to provide not for one or more QoS optionsAvailable charging and/or option, as access for one or more QoS sessions for certain/service program of mono-group/periodUpgrading or payment).If it is determined that QoS is available, then 714, to or multiple Internet resources send to the net for QoS sessionRequest (such as, service controller, BTS, gateway, core/transmission network, IPX/GRX network and/or other nets of network resourceUnit/function/resource).716, receive the confirmation of the QoS session authorized thus close closed-loop (such as, for the QoS for DASReceive a QoS planning chart that QoS session confirmation is provided, many RAB of RAB/ as arranged and/or by planning chart/itsOther one or more retained Internet resources of his standard).718, use various verification technique described here, carry outOne or more verification technique verifies QoS (such as, the QoS of automatic network resource in the future implemented for the DAS on deviceService uses report compared with associated device strategy, the QoS service use of automatic network resource in the future is reported and carrys out self-chamberingThe QoS service put uses report compare and/or use other verification techniques described similarly at this).720, process is completeBecome.
The each of Fig. 8 A to 8C illustrates the service quality for device assistant service (DAS) according to some embodiments(QoS) another flow chart.Fig. 8 A illustrates the Service Quality for device assistant service (DAS) according to some embodimentsAnother flow chart of amount (QoS).802, process starts.In some embodiments, qos policy implements (example on deviceAs, a service program being associated defining/indicate the elementary tactics for QoS is collected/received to service processor, is associatedService program can include a QoS active map figure, this map such as based on application, service use, stream type, destination,Temporal information, network capacity and/or other standards/measurement map QoS class, as described similarly at this).Implement at someIn scheme, various application also use QoS API to initiate QoS request, as at this relative to described by each embodiment.At someIn embodiment, according to each embodiment described here, QoS rule is real with the form of the QoS active map figure through checkingExecute.804, determine a QoS request (such as, by QoS class, be a service/application being specifically associated).At someIn embodiment, various technology described here is used to ask by using QoS active map figure to determine QoS at least in partAsk, such as, use monitoring (such as, using monitoring agent by service processor service) based on the service/application on device.In some embodiments, QoS request is determined based on QoS API.In some embodiments, determine QoS request, thus with oneIndividual out connection or an Incoming connection are associated.806, determine QoS request whether be authorized to (such as, QoS request whether byService program is supported, enough charge credit ratings are to exist and/or other standards/measurement for this QoS request).IfNot, then 808, UI provides a response notice and/or option, as described similarly at this.Please if authorizing QoSAsk, then 810, the request for Internet resources being used for QoS session is sent to one or more Internet resources (such as, clothesBusiness controller, BTS, gateway, core/transmission network, IPX/GRX network and another communicator communicate one/Another service controller as setting up one and be connected with class QoS of the dialogue of other communicators and/or other network elements/Function/resource).If it is determined that device is qualified for QoS, then 810, determine that QoS availability (such as, is held based on networkAmount, it can be determined on device, by with the communication of service controller, logical by with BTS or another network element/functionLetter and/or its any combination, use various technology described here).If it is determined that QoS is disabled, then 812, UI carriesFor about the information of QoS availability and/or option (such as, for one or more QoS options provide disabled charging and/orOption, as access for one or more QoS sessions for certain/service program of mono-group/period upgrading or pay).AsFruit determines that QoS is available, then 814, to or multiple Internet resources send request to the Internet resources for QoS session(such as, service controller, BTS, gateway, core/transmission network, IPX/GRX network and/or other network element/function/resources are comeSet up such as one QoS end-to-end link and coordinate all resource-side opposite ends by that authorized and through verifying QoS flow).816, receive the confirmation of the QoS session authorized thus (such as, receive an offer for closing closed-loop for the QoS of DASThe QoS planning chart of QoS session confirmation, many RAB of RAB/ as arranged and/or by other of planning chart/other standardsOne or more retained Internet resources).818, use various verification technique described here perform on the communication device/Carrying out a QoS router assists the QoS implemented for DAS (such as, to carry out QoS queuing, throttling and/or as retouched at thisThe function that other QoS routers stated are relevant).820, device use various technology described herein (such as, useService processor, as charge/service uses monitoring and/or other agencies, the QoS proceeding through as described in this) checking receivesTake (such as, at least in part).In some embodiments, to or multiple network element provide QoS charge record and/or report, useThe Service controll function be correlated with in management QoS charging and/or other QoS management/chargings (such as, to service controller and/orBilling interface or accounting server).In some embodiments, if QoS session/connection/channel/stream is lost or declines, useAlso use in the QoS of DAS and re-establish QoS session/connection/channel/stream with those similar technical assistances described herein,As for those of ordinary skill in the art institute significantly.822, process completes.In some embodiments, tie when device sessionRestraint thus such as vacate various resource, close QoS configurating channel.
Fig. 8 B show service quality for device assistant service (DAS) (QoS) according to some embodiments anotherOne flow chart.In some embodiments, the QoS for DAS includes for service activity identification QoS demand (such as, QoS etc.Level or QoS class).824, process starts.In some embodiments, qos policy implements (such as, service processing on deviceA service program being associated defining/indicate the elementary tactics for QoS, the service program being associated are collected/received to deviceA QoS active map figure can be included, this mapping graph such as based on application, service use, stream type, destination, temporal information,Network capacity and/or other standards/measurement map QoS class, as described similarly at this).In some embodiments, rootAccording to each embodiment described here, QoS rule is implemented with the form of the QoS active map figure through checking.826, deviceSupervising device is movable, such as service/application use activity.In some embodiments, device is based on various services described hereUse the activity that monitoring technology for detection is relevant.828, determine a QoS request, such as, use various skill described hereinArt.830, use various technology described herein based on the various assembly monitors applied and/or be associated with QoS requestService use/application activity determines a QoS grade.Such as, QoS active map figure can be used to determine QoS grade, this QoS livesDynamic mapping graph provides the qos policy of the form definition being associated by various QoS grades with various activities, and these activities includeService use/the application activity of various assembly monitors.In some embodiments, QoS active map figure includes based on followingOne or more QoS grade in Xiang maps: application, destination/source, discharge pattern, connection type, content type, timeSome day in information/mono-week, network capacity, movable use, service program selection, current identity, user class, device class, basisGround/roaming, network capabilities and/or other standards/measurement, as described similarly at this.In some embodiments, exist832, if not can determine that QoS grade and/or in order to confirm a QoS in the QoS grade of multiple potential suitable/mandatesGrade or selection, UI is that user presents option to select QoS grade.834, for determined by QoS grade (such as, QoS classAnd/or priority) initiate QoS request.836, process completes.
Fig. 8 C illustrates the another of the service quality for device assistant service (DAS) (QoS) according to some embodimentsOne flow chart.In some embodiments, the QoS for DAS includes determining whether network should be a given deviceMovable mandate QoS request.842, process starts.844, determine QoS request.846, use various technology described hereDetermine identity (such as, service processor and the service controller combination or be based upon the service of being sent to of the communicator for QoSThe communication of the mandate of the QoS request of controller determines whether QoS request is authorized to, and it can be based on service program, service configuration literary compositionPart, service strategy are arranged, QoS is regular, based on QoS class, current service use, current charge identity and/or any other markAccurate/to measure).If it is determined that device is qualified for QoS, then 848, apparatus user interface (UI) provides about for oneOr refusal/underproof information (refusal/defective meter such as, provided for one or more QoS options of multiple QoS sessionTake and/or option, as access for one or more QoS sessions for certain/service program of mono-group/period upgrading orPay).If it is determined that device is qualified for QoS, then 850, (such as, based on network capacity, it can to determine QoS availabilityDevice is determined, by with the communication of service controller, by with BTS or the communication of another network element/function and/orIts any combination, uses various technology described here).If it is determined that QoS is disabled, then 852, UI provide aboutThe information of QoS availability and/or option (such as, provide disabled charging and/or option for one or more QoS options, asFor one or more QoS sessions access for certain/service program of mono-group/period upgrading or pay).If it is determined thatQoS is available, then 854, to or multiple Internet resources send and the request of the Internet resources for QoS session (such as, may be usedDirectly inquire about service controller, BTS, gateway, core/transmission network, IPX/GRX network and/or other network element/function/resourcesAnd/or one centralized QoS resource/network function/element/data base of inquiry determines such network resource and coordinates this type ofScheduling).856, receive the confirmation of the QoS session authorized thus (such as, receive one for closing closed-loop for the QoS of DASThere is provided the QoS planning chart of QoS session confirmation, many RAB of RAB/ as arranged and/or by planning chart/other standardsOther one or more retained Internet resources).858, perform QoS router.In some embodiments, at a netOn the device of unit/function (such as, service controller), (such as, service processor) and/or a combination thereof perform this QoS router.In some embodiments, multiple QoS request of the communicator given through are distinguished order of priority by QoS router.In some embodiments, the multiple QoS request through multiple communicators and/or through multiple BTS are distinguished by QoS routerOrder of priority.In some embodiments, QoS router carries out what various QoS class degradation, lifting and/or other throttlings were correlated withTechnology, as described similarly at this (such as, dialogue-based priority, network capacity, load balancing, QoS priority rule,And/or other standards/measurement/rule).860, process completes.
Fig. 9 illustrates another of the service quality for device assistant service (DAS) (QoS) according to some embodimentsIndividual flow chart.In some embodiments, the QoS for DAS include be a service activity QoS session configuration.902,Process starts.904, authorize and/or confirm a new QoS session.906, (such as, strategy is certainly for device service processorFixed point (PDP) agency, is also known as policy control agency at this) QoS session authorization is mapped to QoS monitoring strategies (such as, baseIn the strategy relevant for QoS that service controller provides, based on device, user, device/user's group and/or other standards/surveyThe service program that amount is associated, as described similarly at this).908, QoS monitoring strategies to policy enforcement point (PEP,Such as PEP acts on behalf of, and is also known as policy enforcement agent at this) command/instruction is provided, thus it is excellent to manage/enforce new QoSFirst level/session.910, PEP determines whether a session is allowed, blocks, throttled and/or queue based on QoS monitoring strategiesPreferentially (such as, and/or otherwise use the technical controlling that various flow-control is relevant).912, process completes.
Figure 10 illustrates the another of the service quality for device assistant service (DAS) (QoS) according to some embodimentsOne flow chart.In some embodiments, it is available that RAB (RAB) is supported, and according to some embodiment partyCase carries out process subsequently.1002, process starts.1004, device service processor detection QoS request or QoS demand (exampleSuch as, QoS API request, the QoS request of the QoS session using monitoring based on service or demand/interests, as by application and/orAnother service uses measures/activity).1006, service processor and/or the service processing communicated with service controllerDevice determines whether service program allows/support asked QoS.If it does not, then 1008, generate a UI event (exampleAs, notice this type of QoS/QoS grade/class of device users is disabled, and provides potentially for this QoS/QoS grade/classOne QoS/ service program upgrading/purchase).1010, QoS request is passed to service controller by service processor (such as, to be madeLink or secure communication channel is controlled, as described similarly at this with security service) ask QoS grade/class.1012,Service controller uses various technology described here to determine whether Internet resources are available.In some embodiments, makeNetwork capacity is determined, as local device is measured by various technology;Specific local device measurement report;BTS reports;Other network element reportsAccuse;By assessment, the most one or more available bandwidths, traffic delay or time delay, available QoS grade, available bandwidth canDegeneration, the transmutability of time delay and/or the variable combination of available QoS grade;And/or as the described herein other technologies.1014, service controller response QoS request (such as, authorize or refuse this QoS request).In some embodiments, ifHave rejected this QoS request, then generate another UI event, as described similarly at this.1016, (assuming to authorize QoS pleaseAsk), device asks a QoS channel from BTS.In some embodiments, request includes received from service controllerQoS request authorization code.In some embodiments, service controller provides the QoS request mandate for communicator to BTSA notice so that BTS can verify that the mandate of QoS request.In some embodiments, BTS is straight with service controllerConnect confirmation device QoS channel request.Such as, for verifying that the various other technologies of QoS channel request also can be as being similar at thisGround describes and uses, and as obvious to those of ordinary skill in the art.In some embodiments, device service processorAnd/or service controller is based on device request planning, it is provided that notice BTS to configure how many QoS channel (such as, RAB) and to joinPut how many report relevant for QoS transmitting resource as possible.1018 (hypothesis verification QoS channel request), based on one pointThe RAB that joins or from BTS (such as, and/or as this similarly described in other network elements) many RAB of receiving reserve, and initiate QoSSession.1020, process completes.
Figure 11 illustrates the another of the service quality for device assistant service (DAS) (QoS) according to some embodimentsOne flow chart.In some embodiments, it is disabled that RAB supports, and carries out subsequently according to some embodimentsProcess.1102, process starts.1104, device service processor detection QoS request or QoS demand (such as, QoS APIRequest, the QoS request using the QoS session of monitoring based on service or demand/interests, as passed through application, or other services useMeasure/movable).1106, service processor and/or the service processor communicated with service controller determine service programWhether allow/support asked QoS.If it does not, then 1108, generate a UI event (such as, notice device usersThis type of QoS/QoS grade/class is disabled, and provides a QoS/ service program potentially for this QoS/QoS grade/classUpgrading/buy).1110, QoS request and service controller are communicated and (such as, use security service to control by service processorLink or secure communication channel, as described similarly at this) ask QoS grade/class.1112, service controller usesVarious technology described here determines whether Internet resources are available.In some embodiments, various technology is used to determineNetwork capacity, such as local device measurement, BTS report, the report of other network elements and/or other technologies as the described herein.OneIn a little embodiments, other devices on link are throttled by service controller, so that can reach asked QoS grade(such as, supporting it is not available due to RAB).In some embodiments, on service controller link based on current/predictionNetwork capacity, Tong Bu with BTS clock or absolute clock the flow from device end was separated from the time, thus assists to be askedThe QoS grade asked also reaches required network capacity to support/to assist that the QoS grade asked (such as, minimizes shake/bagInterior delay changes).1114, service controller response QoS request (such as, authorize or refuse this QoS request).Implement at someIn scheme, if having rejected this QoS request, then generate another UI event, as described similarly at this.(assume 1116Authorize QoS request), device initiates QoS session.1118, device service processor and/or carry out safety with service controllerThe device service processor of communication uses various monitoring described here and verification technique to monitor and verifies QoS session (such as, inspectionLook into CDR to determine whether QoS channel is suitably carried out by device).In some embodiments, a UI event is generatedWhether notice device users exists the potential problems implementing QoS session, thus periodically notifies that user QoS charges, and/orOther event/information relevant to QoS activity.1120, process completes.
Figure 12 illustrates a kind of device stack for providing various service use measurement technology according to some embodiments.Figure 12 illustrates the various services of a kind of offer each point from networking stack and uses measurement apparatus stack, acts on behalf of for service detection instrument(such as, for monitoring activity relevant for QoS and/or for monitoring network capacity managed service, as described in this), charging generationReason and access network integrity agent, thus use measurement, work relevant for QoS according to the auxiliary service for checking credentials of some embodimentsMove and function and charging report.As shown in Figure 12, some service brokers participate in data path operation and obtain each dataPath is improved, and such as, other service brokers some can be data path Service controll strategy setting, for data path serviceImplement charging, select for the one or more modem of access network connection management and arrange, connect user and/or clothes are providedBusiness strategy implements checking.It addition, in some embodiments, some agencies carry out function assist be appropriately carried out being intended to suitableService for checking credentials control or monitoring strategies, Service controll or monitoring strategies stick together the service processor or of correct operation suitablyIndividual or multiple service brokers, thus stop strategy implement or control in unplanned in mistake, and/or stop/detection clothesBusiness strategy or control distort.As indicated, the Service measurement point being labeled as I to VI represents and acts on behalf of 1696 for service detection instrumentAnd/or each Service measurement point of other agencies, thus it is movable to carry out various service monitoring.In each embodiment described hereIn, these measure point each can have a useful purposes.Such as, the flow measurement points used in a given designEach can be used by a monitoring agent thus be tracked through the application layer traffic of communication stack, thus assist strategy to implement function,As strategy implements to drive/agency 1690 (such as, policy enforcement point drives/agency), or in some embodiments, onceFlow in communication stack is the lowest, and modem firewall agent 1655 or application interface agency are doing about flow parameterOr during the decision of type, the complete decision sometimes making flow parameter is difficulty or impossible.There is provided in these figures is rightIt is intended to as the example instructed in the special position measuring point, and other are measured point and can be used for different embodiments, asIn view of embodiment described herein to those of ordinary skill in the art institute significantly.Generally, in some embodiments,One or more measurement points in a device can be used for assistant service and control checking and/or device or service fault eliminating.
In some embodiments, service monitoring agency and/or other agencies are by following the tracks of or following the trail of through each communication stackFormat, process and the packet stream of encrypting step, and to monitoring, control, formed, throttle or otherwise observe, handle orEach agency of amendment flow provides virtual label information to implement virtual flow labelling.This labeling method is referred to herein as voidIntend labelling, because there is not literal data stream, traffic flow or being attached to stream or the bag label of packet, and instead, labellingThe bookkeeping of packet completes by following the tracks of or follow the trail of stream or the packet through stack.In some embodiments, application interface and/Or other agency identify flows, by its with one service use moving phase association and cause a literal label be attached toThe flow of moving phase association or wrap.This labeling method is referred to herein as literal labelling.Virtual tag and literal labeling methodThere is lot of advantages in both of which.Such as, in some embodiments more preferably through distribute literal label reduce tracking orFollow the trail of the inter-agent communication needed for the packet that stack processes, so that each stream or packet have its of embedding dataThe activity association of self.As another example, it is the most preferably to reuse standard traffic stack softwareOr the part of assembly, thus strengthen mark by inserting the extra process step being associated with each service broker and control pointThe flow-control that can verify that or the Service controll ability of quasi-stack rather than rewrite whole stack thus properly process literal labelling letterBreath, and in this type of situation, it may be desired to virtual tag pattern.Still as another example, for data packet frame or stream in notThat use, unspecified or otherwise can bit field some standard traffic stacks are provided, and these are untapped, notThat indicate or otherwise can bit field can be used for literal ground marked traffic without rewrite all standard traffic stacks softPart, only have stack be added to the flow-control that can verify that for strengthening normal stack or Service controll ability need decodingAnd use the part of the literal label information of encryption in available bit field.In the case of literal labelling, implement at someIn scheme, by packet or be streamed to network or be sent to use the application reach of stack except these labels.Implement at someIn scheme, can by implement virtual or literal labelling method develop into a communications standard specification so that each device orService product developer can be with the side compatible with the product of service controller specification and other devices or service product developerThe independently developed communication stack of formula and/or service processor hardware and/or software.
Although will be appreciated that any or all that shown in fig. 12 measures the enforcement/be used without having one of pointIndividual effective enforcement, illustrates similarly such as each embodiment the most described herein, each embodiment can from these and/orSimilar measurement point is benefited.Also will be appreciated that and will can measure the different position a little moved in flow process stack accuratelyPut, as each embodiment described herein is when still keeping effectively running, can have and move in flow process stackThe agency that the impact of different points is implemented.In some embodiments, one or more points of measuring deeper are provided in modulationIn demodulator stack, there, if modem to be designed as there is suitable software and/or hardware security to protect modulationThe integrity that demodulator stack and one or more measurement are selected, more it is difficult to walk around and can be more it is difficult to for the mesh distortedAccess.
Seeing Figure 12, describe device communication stack as shown from the bottom of stack to top, device communication stack is to lead at deviceThe each of modem of the device bottom letter stack provides a communication layers.Example is measured some VI and is resided in modemDrive in layer or the most thereon.Such as, modem drives and is modulated demodulator bus communication, data protocol conversion, adjustsModulator-demodulator controls and configuration, thus networking stack flow is connected to modem.As indicated, measure some VI for all ofModem drives and modem is common, and for some embodiment, is conducive to difference flow or from oneThe service activity that individual modem occurs through other modems one or more.In some embodiments, surveyTop that amount point VI or another measurement point drive in one or more single modems, wherein or below.ForThe modem bus respectively of each modem resides in example and measures between point V and VI.Higher at the next oneIn Ceng, it is provided that select and key-course for one modem of communication based on multi-mode device.In some embodimentsIn, this layer is that some or all of data traffics select the network of highly desirable network modem to determine strategy control by oneSystem, and when highly desirable network is unavailable, strategy returns to next highly desirable network, until establishing a connectionIt is available for providing in these networks one.In some embodiments, by some network traffics (such as checking, control, redundancyOr safe traffic) it is routed to one of these networks, even it is routed to another net when the some or all of of these data trafficsDuring network.This dual routing capabilities is the safety of multiple enhancing, the reliability of enhancing or the manageability device strengthened, clothesBusiness or application provide.At next higher layer, it is provided that a modem fire wall.Such as, modem fire preventionWall provides for traditional firewall functionality, but unlike traditional fire wall, carries out, in order to rely on fire wall, the clothes that can verify thatMake sure with control, such as Access Control and stop the safety of undesired networking flow or application to be protected, by described here respectivelyPlant service verification technology and agency adds firewall functionality to and with checking and the compatibility of service strategy and stops/detect service controlDistorting of system.In some embodiments, far modem fire wall of implementing on stack, possibly with other layers group mutuallyClose, as indicated by other figs. and described by this.In some embodiments, it is provided that one processes layer independent of otherThe special firewall functionality of (such as strategy implementation level, bag forwarding and/or application layer) or layer.In some embodiments, existFar under stack implement modem fire wall, as inside modem, below modem or at modulatedemodulateAdjust in device self.Example is measured some IV and is resided in modem fire prevention wall layers and an IP queuing and routing layer (such as, QoSIP queuing and routing layer and/or network capacity managed service are queued up and routing layer) between.As indicated, IP queue up and route once withStrategy implementation level separates, and wherein policy enforcement agent implements flow-control and/or a part for service use control strategy.AsDescribed by this, in some embodiments, these functions are to separate, so that a standard network stack function can be used forQoS IP queues up and route and/or queue up for network capacity managed service and route, and implementation strategy implements agent functionalityRequired amendment may be provided in a new layer being inserted in normal stack.In some embodiments, IP queues up and routeLayer uses key-course to combine with flow or service.Such as, a route combined and strategy implementation level embodiment also can be withOther embodiments are used together, as shown in Figure 12.It is tactful with routing layer and one in fact that a measurement point III resides in IP queuingExecute between Agent layer.Measure a some II and reside between policy enforcement agent layer and transport layer, including TCP, UDP and as directedOther IP.Session layer is resident on the level of the transport layer, and it is illustrated as a socket distribution, and (such as, basic TCP builds with session managementVertical, TLS/SSL) layer.Network service API (such as, HTTP, HTTPS, FTP (FTP), SMTP (simple mail transmissionAgreement), POP3, DNS) reside in session layer.Measure some I and reside between network service api layer and an application layer, be shown asThe application service interface proxy in device communication stack in Figure 12.
As shown in Figure 12, (such as, QoS application service interface layer and/or network capacity are controlled for application service interface layerService interface layer) on standard networking stack API, and in some embodiments, its function is monitoring, and in certain situationIn be intercept and processor application with standard networking stack API between flow.In some embodiments, in application trafficFlow more difficult or hardly possible the lowlyest in stack identify before, application service interface layer identification application traffic stream.At someIn embodiment, application service interface layer assistance application layer labelling in the case of virtual and literal labelling two kinds by this way.In the case of upstream flowrate, application layer labelling is straight-through, because flow initiates in application layer.In some downstream embodimentsIn, wherein flow or service activity classification rely on the flow attribution that is readily available, as source address or URL, application socket addresses,IP destination-address, temporal information or any other parameter being readily available, recognizable and marked traffic type thus by preventing firesWall agency or another agency (as it initially arrives) process.In other embodiments, as described in this, in downstream situationIn, needed for one thus by the mode of traffic flow control or throttling, carry out the flow parameter classified on the lower grade of stack notBe be readily available time, solution is typically more complicated, associating in terms of with of application, content type, comprisesSomething in TLS, IPSEC or other Safe Formats or other information being associated with flow.Therefore, some embodiment partyIn case, networking stack is in its complete characterization, classified or identify traffic flow with a service activity before being associated, and subsequently willFlow is passed the application-interface layer having delivered to finally classify.In this type of embodiment, application-interface layer is subsequently by flowStream ID is associated with suitably classifying, so that at initial short flow pulse or after the period, policy enforcement agent can be suitablyControl flow.In some embodiments, there is also a plan for flow is marked and arranges Service controll strategySlightly, all resources (including application layer labelling) that this strategy can not be labeled fully identify.
As shown in Figure 12, service monitoring agency and the device communication stack that also communicates with agent communication bus 1630Each layer communicate.Such as, service monitoring agency measure some I to VI each on be monitored, receive include application letterBreath, service use and service relevant information and the information of distribution information with other.One Access Control integrity agent and serviceMonitoring agent is communicated, as being also shown in out by agent communication bus 1630.
Figure 13 illustrates the another kind of device for providing various service use measurement technology according to some embodimentsStack.Figure 13 illustrates an embodiment similar with Figure 12, wherein according to some embodiments, and a part for service processorIt is implemented on modem, and a part for service processor is implemented on device application processor.Some embodiment partyIn case, a part for service processor is implemented on modem (such as, in modem module hardware or modulation /demodulationOn device chipset), and a part for service processor is implemented on device application processor subsystem.Skill common to this areaArt personnel it will be obvious that depicted in figure 13 the variant of embodiment be possible, the most more or less of serviceProcessor functionality moves in modem subsystem or on device application processor subsystem.Such as, with institute in Figure 13This type of embodiment that the embodiment described is similar can be by the some or all of services being included in modem subsystemProcessor network communication stack processes and/or (such as, and this type of side the advantage of other service broker's functions some or all of promotesMethod may be used on one or more modem).Such as, service processor can be separated into and be included in the modulatedemodulate of software kitAdjust a standard feature collection in device module hardware or modem chip collection hardware or software kit, and this type of configuration can carrySupply is by device OEM, for chipset or the difference of the greater degree of modem module manufacturer, the performance of greater degreeOr service uses and controls to implement integrity or safety, specification or interoperability standard and/or that other benefits are carried out is simplerSingle adopts or develops.
Seeing Figure 13, describe device communication stack as shown from the bottom of stack to top, device communication stack is to lead at deviceThe modem MAC/PHY layer of the device bottom letter stack provides a communication layers.Measure some IV and reside in modemOn MAC/PHY layer.Modem fire prevention wall layers resides between measurement point IV and III.In the layer that the next one is higher,Providing policy enforcement agent, wherein policy enforcement agent is implemented on modem (such as, at modem hardwareOn).Measure some II to reside between policy enforcement agent and modem driving layer, measure some II subsequently at modemIllustrate below bus layer.Next higher layer is illustrated as IP and queues up and routing layer, followed by transport layer, including TCP, UDP andOther shown IP.Session layer resides on transport layer, and it is illustrated as socket distribution and session management (such as, basic TCPFoundation, TLS/SSL) layer.(such as, (simple mail passes network service API for HTTP, HTTPS, FTP (FTP), SMTPSend agreement), POP3, DNS) reside on session layer.Measure some I and reside between network service api layer and application layer, be shown asThe application service interface proxy in device communication stack in Figure 13.
For protecting the additional embodiment of the DAS of network capacity
In some embodiments, it is used for protecting the DAS of network capacity to include a service activity and is categorized as network appearanceAmount managed service and enforcement network capacity managed service strategy.In some embodiments, for protecting the DAS of network capacityIncluding for a service activity being categorized as network capacity managed service and/or implementing the dress of network capacity managed service strategyPut auxiliary/technology based on device.In some embodiments, for protecting the DAS of network capacity to include for by clothesBusiness activity classification be network capacity managed service and/or implement network capacity managed service strategy network assistance/based on netThe technology of network (such as, it is implemented in a network element/functionally, such as service controller, DPI gateway, BTS/BTSC etc., or network elementCombination).In some embodiments, it is used for protecting the DAS of network capacity to include and a network insertion API or an emulation are providedOr virtual network insertion API (such as, this type of API can provide network busy status information and/or other standards/measurement and/orThere is provided the mechanism for allowing, refuse, postpone and/or otherwise control network insertion).In some embodiments,For protecting the DAS of network capacity to include to implement a user's plan including network capacity managed service strategy (such as, to be used forDifference Network access control and/or the differential charge to network capacity managed service, its be also based on network busy state and/orOther standards/measurement).
In some embodiments, for protecting the DAS technology of network capacity also provide for the privacy of user of improvement and assistNetwork/net neutrality requirement.On the contrary, network technology (such as, technology based on DPI) can make in privacy of user and networkVertical property worry and problem rise, as discussed above.In some embodiments, for protecting the DAS technology of network capacity to carryAllow for family allowable specify (such as, permit or disapprove) network whether know user the Internet behavior (such as, use UI defeatedEnter).In some embodiments, for protecting the DAS technology of network capacity to include, permission user is to select how they wantThe flow managing them uses and services planned cost.
Figure 14 illustrate according to some embodiments for device assistant service (DAS) thus protect the stream of network capacityCheng Tu.1402, process starts.Network 1404, to a device in network service (such as, wireless communication)Service use activity is monitored.1406, determine whether monitored network service use activity is that a network capacity is subject toControl service.At 1408 (determining that monitored network service use activity is not a network capacity managed service), network serviceActivity is used not classify for difference Network access control.(determine that monitored network service use activity is one 1410Network capacity managed service), network service use activity is classified (such as, to one or more for difference Network access controlNetwork capacity managed service).In some embodiments, network service use activity is carried out classification to include making network serviceIt is one or more in multiple class categories of difference Network access control with activity classification, thus protects network capacity(such as, the classification of one or more network capacity managed service and/or a priority status category, as background service is classifiedAnd/or backstage priority status category).1412, carry out classification based on this network service use activity, by this network serviceUse activity to be associated with a network capacity managed service control strategy, thus assist difference Network access control with catch netNetwork capacity.1414, carry out by implementing different flow-control enforcement difference for all or some network service use activitiesNetwork access control, thus protect network capacity (such as, based on network busy state or another standard/measurement).1416,Process completes.
Figure 15 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.1502, process starts.1504, the network service use activity to a device in network service is enteredRow monitoring.1506, (such as, to network element/function) reports the network service use activity monitored of this device.1508,(such as, by a network element/function) carries out statistical analysis to the network service use activity reported through multiple devices.1510, device receives a network service from network element and uses activity classification list (such as, network capacity managed service rowTable, its can such as based on the network service use activity monitored and statistical analysis and other standards/measurement (include such as,Service program and/or network busy state) and generate).1512, carry out the reality based on network service use activity classification listExecute difference Network access control to protect network capacity.1514, process completes.In some embodiments, for catch netThe DAS of network capacity farther includes a classification based on network service use activity, by network service use activity with oneNetwork service uses control strategy (such as, a network capacity managed service strategy) to be associated, thus assists difference network to connectEnter to control to protect network capacity.In some embodiments, for protecting the DAS of network capacity to farther include based on serviceActivity classification list is used differentially to control network service use activity (such as, network capacity managed service).
Figure 16 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.1622, process starts.1624, receive (such as, a network element/functionally) from first deviceOne first report of the network service use activity of this first device.1626, receive from second device and (such as, existOne network element/functionally) one second report of network service use activity of this second device.1628, (such as, pass throughOne network element/function) multiple the reported network service use activity through multiple devices is carried out statistical analysis, the plurality ofDevice includes this first device and this second device.1630, a network service is made by (such as, from a network element/function)It is sent to first device with activity classification list (such as, a network capacity managed service tabulation), is used for as difference netNetwork Access Control and based on network service use activity classification list to network service use activity, (such as, network capacity is controlledService) classify, thus protect network capacity.1632, network service use activity classification list be sent to theTwo devices (such as, from a network element/function), for using activity classification for difference Network access control based on network serviceNetwork service use activity is classified by list, thus protects network capacity.1634, process completes.Some embodiment partyIn case, for protecting the DAS of network capacity to farther include a classification based on network service use activity, by network serviceUse movable service with one to use control strategy (such as, a network capacity managed service strategy) to be associated, thus assistDifference Network access control is to protect network capacity.In some embodiments, for protecting the DAS of network capacity to wrap furtherInclude and use activity classification list (such as, network capacity managed service tabulation) based on service, differentially control network serviceUse activity (such as, network capacity managed service).In some embodiments, the classification to network service use activity is baseWhich network to be connected to which device in.In some embodiments, network service uses which net control strategy is based onWhich device network is connected to.
Figure 17 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.1702, process starts.1704, use network technology to multiple devices in network communicationsA network service use activity be monitored.1706, carry out the network service monitored through multiple devices is madeWith movable statistical analysis.1708, a network service uses activity classification list, and (such as, a network capacity is controlledService classification list) it is sent to each of multiple device, live for using based on network service for difference Network access controlNetwork service use activity (such as, network capacity managed service) is classified by dynamic tabulation, thus protects network capacity.1710, process completes.
Figure 18 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.1802, process starts.1804, the network service use activity to a device in network service is enteredRow monitoring.1806, classification (such as, a network capacity managed service category column based on network service use activityTable) and a network service use activity (such as, a network capacity managed service) is used control strategy with a service(such as, a network capacity managed service strategy) is associated, and for difference Network access control, thus protects network capacity.1808, generate the user's notice using control strategy based on service.1810, process completes.
In some embodiments, service uses control strategy to include a service use notification strategy.Implement at someIn scheme, it is one or more that user's notice includes in the following: having application that is to be downloaded and/or that start is that a network holdsThe notice of amount managed service;One or more have network capacity managed service classification service activity (such as, application, OS/ itsHis software function/instrument and/or other function/instruments described herein) list;It is subject to for one or more network capacitysThe type of the service strategy that control service comes into force;One service activity belongs to the notice of a network capacity managed service class;DividedClass is the notice that a service activity of network capacity managed service can have the service class of change;If service class is clothesBusiness activity changes the notice that then service charge will change;One or more networks are available (such as, one or more replacingThe network in generation and/or network busy status information and/or pay imformation and/or the reason being associated with such network), clothesThe notice of business plan upgrading/degradation offer/option;And the offer of a service program, a response is rewarded in this service programIn the service program of the relatively low expense/discount of user one of notice, come for responding notice based on service rating warning noticeUse or do not use service activity.In some embodiments, user's notice includes that a user preference selects, this user preferenceSelect to include in the following is one or more: control an access strategy to be associated with application (such as, it is allowed to/obstruction,Notice uses, arranges in a given Threshold Notify use, flow-control, allow, when network is the busiest in some timeAllow and/or other policy control as the described herein) configuration, for selecting what service used control strategy to shelve choosing?;Service is selected to use the amendment option of control strategy;A new service program is selected (such as, again to check and select canSubstitute/new service program upgrades/demotes option) selection option and confirmation request (such as, confirm/acknowledgement notificationReception, wherein confirm can be transferred to a network element/function and/or locally stored for reference/transmission later).
In some embodiments, a given device application, process, function, OS service or other services are being allowedBefore movable startup, the intention of startup is intercepted by a beginning manager, is retrieved as the background service set of strategies that service activity is arrangedOr network protection service strategy collection, and before allowing service activity to start, implement any required user's notice or service startsControl strategy.In this type of embodiment, can using one, to start to intercept manager functional to implement this.Implement at someIn scheme, this starts to intercept manager and is configured with and identifies have a service activity (example starting control strategy come into forceAs, application identifier, OS function identifier, aggregated service activity identifier and/or Component service activity identifier) oneList.In some embodiments, the list starting control strategy includes blocking or postponing opening of one or more service activityBegin.In some embodiments, start control strategy be included in start before service activity, when or a user afterwards lead toKnow.In some embodiments, notify that user one has the background service control strategy come into force or the network protection come into force clothesThe service activity of business control strategy is just attempted starting, will starting or have begun to.In further one group of embodiment, openBegin intercepted, until notifying and allowing user to determine whether they want to start service activity.In some embodiments, userNotice includes that service activity is just attempted starting consuming a large amount of service and used and ask the user whether one that they want to continue to and disappear(such as, " this application consumes mass data to breath, and you want to continue to?", " this application consumption data does not even use it at youTime, you want to continue to?" " this application is consumption data when you roam, and this increases your expense of use bill, and you want to continueContinue?" etc.).In some embodiments, if the decision of one service activity of beginning is preprogrammed into identification and has a lifeEffect start control strategy service activity (such as, application identifier, OS function identifier, aggregated service activity identifier,And/or Component service activity identifier) list.In some embodiments, a part for list is inclined according to user by userPre-programmed well, for controlling the use of service activity.In some embodiments, network element (such as a, Service controllDevice) specify according to net background service or the service strategy design management system run by service provider described hereinNetwork protection service strategy carries out pre-programmed to a part for list.In some embodiments, the knowledge defined by list is verifiedNot there is service activity (such as, application identifier, OS function identifier, an aggregated service starting control strategy come into forceActivity identifier and/or Component service activity identifier) strategy implement to ensure that user or Malware are not the most defeatedThe policy enforcement specified in list.In some embodiments, identify that having the service starting control strategy come into force livesDynamic list includes it being the beginning strategy of one or more function in the following: background service state, network busy shapeThe type of network, this locality or roaming that state (or performance state or QoS state), device are connected thereto connect, temporal information orSome day in one week.
In some embodiments, described here in view of interception service activity be intended to start and apply backstage to takeBusiness set of strategies or the various designing techniques of network protection service strategy collection can be designed into OS among himself.Such as, can will interceptWith strategy implement functional design to active manager, broadcast of intent manager, media services manager, service managerZ-HU orOther application in Android OS or service activity management function.It will be appreciated by those of ordinary skill in the art that and be described herein similarlyBe intended to start in view of interception service activity and apply the various of background service set of strategies or network protection service strategy collectionDesigning technique can be designed into iPhone OS, windows and move OS, windows PC OS, blackberry (Blackberry) OS, PalmThe application of OS and other OS design starts to manage in function.
In some embodiments, start that user's announcement information indicates in the following in advance is one or more: for justThe typical of service activity attempting starting services use or expense or the service use thrown in or expense.Some embodiment partyIn case, user arranges restriction in the access to one or more service activitys, and once this restriction is accessible, then at toolThe service activity having excessive restriction is attempted notifying user when starting.In some embodiments, user is from one group of service restrictionsMiddle selection rather than block simply or allow service activity to start, has example service restrictions and includes but not limited to: Cong ZhongjinOne group of pre-configured restriction strategy (such as, full access, limited access, limitation in height access or blocked access) of row selection, resistanceFill in, throttle, postpone, be polymerized and keep, limit the usage amount of every unit time, cover the limit using, arranging additional noticeSystem, appointment network type, appointment busy state (performance, QoS) or background state or selection from the setting options pre-seted.
In some embodiments, user notifies to occur to attempt downloading or an application being loaded on device user(such as, the application downloaded from webpage or application on site shop for smart mobile phone or other wireless/network computation devices, asFructus Mali pumilae iPhone or iPad or based on Google's Android (Android)/Chrome device) after.In some embodiments,User notifies to occur to attempt operation service activity user or initiate service/application based on cloud (such as, based on Google(Google) or Microsoft (Microsoft) cloud service application) use after.In some embodiments, user notifies to occurAfter one or more in the following: service use activity touches usage threshold event, service use activity attempts oneThe individual network service meeting prerequisite uses, a network capacity is protected service activity tabulation or set of strategies moreNewly and be sent to the internet message of trigger notice of device.In some embodiments, user's notice is using for serviceActivity is to provide information in possible, typical or suitable service use activity.In some embodiments, user's noticeIncluding one for obtaining the user option of the information of more service use about service activity (such as, as in some modesMiddle being compared, service use activity may result in high service and uses and/or service use activity can maybe will cause high servicing use and arrivingThe message of the limit of current service plan), inform the user that preference is arranged.
In some embodiments, user's notice includes that display is (such as, and as the most applicable, it is allowed to user provides UI defeatedEnter) one or more in the following: current and/or in the past/history/network service of record use effort scale,Current and/or in the past/history/the network capacity managed service use activity of record, current active strategy setting, current orAvailable network, service program option are (such as, for how treating one or more network capacity managed service class of trafficType), one or more flow selecting an option to a network capacity managed service activity is assigned to a different prioritiesControl and/or charge in bucket, movable network service uses (such as, network capacity managed service services with other), network numerousBusy condition (such as, and there is the strategy effectively as result), service activity strategy setting vs busy state and time/My god/week, network service active priority, network service activity use statistics (such as, vs network busy state and/or network clothesMake sure and use control strategy state).
In some embodiments, during network busy state, live when user attempts a network capacity managed serviceTime dynamic, show UI notice (such as, it have modified a network capacity managed service strategy).In some embodiments,UI notice is included in service program selection and network capacity managed service strategy shelve option information (such as, once, time window,Usage amount, movable permanent and/or all), the pay imformation that selects based on user and/or service program upgrade information and choosing?.
In some embodiments, for for multiple networks (such as, WiFi, 4G, 3G and/or other wired or nothingsThe access network of line) preference/configuration, input display one UI notice for user, including charging policy.In some embodimentsIn, the network traffics service use activity specified when one is (such as, based on network capacity managed service classification, QoS classification, excellentFirst level classification, time-based standard, network capacity, service program, expenses standard and/or other standards/measurement) just tastedExamination or just occurring and provide option (such as, it is allowed to, block, postpone, throttle and/or other options) time, show that a UI is logicalKnow.
In some embodiments, one UI fuel gauge of display is (such as, to describe the network clothes of current and/or historyMake sure use, such as about the service program by network for device, about network busy state, time-based standard,And/or other standards/measurement).In some embodiments, user's notice includes being sent to the communication information of user (such as,Email, SMS or other text messages, speech message/calling and/or the communication information of other electronic forms).At someIn embodiment, the communication information being sent to user includes that network service uses information, network capacity managed service to use and is correlated withInformation and/or log in a webpage or send for more information communication information instruction (such as, about information updating and/Or alert or alert message, the charge as used about network service and/or network service uses).
In some embodiments, one notice (such as, Yong Huhuo of generation is used based on an aggregated service activity reportsNetwork service cloud notifies) (such as, it is allowed to network provider generates user's notice and/or notice application provider/service activity carriesFor business).In some embodiments, the issue of based on renewal/new network capacity managed service list generates a notice(such as, user or network service cloud notice), this renewal/new network capacity managed service list work based on polymerization monitoringDynamic (such as, use based on service program, speed, socket open frequency/rate (such as, transport layer behavior message), total data,The peak rush hour makes for being formed or updating the blacklist for monitoring, notify and/or controlling, and this blacklist may be used on oneIndividual, multiple, one group or all of device).In some embodiments, based on for the service program associated and/or comparableDevice or data based on data usage threshold/statistics relatively use the data usage trend measuring relevant special device rawBecome a notice (such as, user or network service cloud notice).
In some embodiments, an application is actually made up of the application of several assemblies, process or function.This feelingsThe example of condition includes but not limited to: the assembly of Java application jar file;Use the application of OS function;Use agency service functionApplication;Coordinate mutually to implement recombination process, function or the application of application, function or process;And support one application orThe OS process function of all OS functions.In this type of embodiment, it is possible to the service to service activity on device is usedIt is important that all of application, function and the process worked is sorted out, so that service activity can be supervised to service useControl, the service with charging use, implement suitably when one or more service activity assemblies are attempted and started or use networkUser's notice, reach the service service rating that a predetermined user of needs notifies when one or more service activity assembliesTime implement suitable user notice and implement the most fixed suitable background service or network protection service use controlSystem (includes but not limited to such as: clogging networks accesses, limits network insertion, throttling network insertion, delay network access, polymerizationAnd keep network insertion, select temporal information network insertion restriction, selection network type restriction, selection roaming network to access and limitSystem, select service use limit such as use restrictions, select service fee limit such as expense restriction or be otherwise placed on asThe background service state of this another described form or Web vector graphic limit).Belong to uniquely at service activity assemblyIn the case of one aggregated service activity (such as, apply, apply jar file or OS function), this can be by living Component serviceImplement in dynamic each list being included in the service activity assembly that an identification belongs to aggregated service activity, and basis subsequentlyThe strategy indicated for aggregated service activity, polymerization based on each service activity or assembly behavior monitoring, controls and carries possiblyNotify for user.Such as, it is necessary that according to background service or network protection service strategy, the polymerization supported for jar file shouldWith will monitoring, start, notify, charging and background service controls or network protection Service controll (or the most fixed itsHis backstage or network protection service strategy) under all application start behavior and/or network insertion behavior grouping.As anotherExample, if an OS Network Synchronization or more New function use each component software or process implement Network Synchronization or update meritCan, the most each component software or process must synchronize for polymerization OS or more under background service strategy or network protection service strategyNew function and be monitored and be polymerized.
In some embodiments, for being devoted to relevant clothes of an aggregated service activity as the described hereinThe ability that use carries out being grouped is used to improve service activity by business moving component collection to be reported to the use of service controller, forStatistically identify and background service policy control or network protection service strategy are controlled to be the purpose of the service activity of candidate.
In some cases, multiple application, process, function, OS service or other service activitys can use an assembly softPart application, process, function or the total collection of OS service.In this type of situation, protect to implement background service strategy and/or networkProtect service strategy thus carry out service activity monitoring as the described herein and charging, service activity starts to control, user's notice,Or Network access control, it is necessary that by the network insertion data specified or flow of information with and from common component software application,Process or function are associated, and these common component software application, process or functions belong to specific initial application, process, functionOr other service activitys managed according to background service or network protection service strategy collection.Hereinafter, for being referred to as generationOne common OS function set of reason service function, protects to implement background service set of strategies as the described herein or networkProtect the purpose of service strategy collection, how by common Component service active map to specific application, process, function, OSA specific example collection is provided in service or other service activity.The most again these examples have been checked, it will to thisField those of ordinary skill is apparent that how the similar mapping of service activity is applied to by a common set for assemblyOne service activity managed according to background service set of strategies as the described herein or network protection service strategy collection.
In some embodiments, use is grouped by a common collection for service activity assembly as the described hereinAbility be used to improve service activity and report to the use of service controller, in order to statistically identify for background service strategyControl or the control of network protection service strategy are the purposes of the service activity of candidate.
In some embodiments, an agency network service managerZ-HU refers to that the device that is in device operation system shouldWith and device networking stack interface between data path on thus provide and carry from the network service of a grade of network stack interfaceTake, the service function of a greater degree above network stack interface, enhancing or special flow process function, media clothesBusiness transmits management, file download service, HTTP Proxy service function, QoS difference or other similar or relevant greater degreesFlow process an intermediary data stream function.Examples Proxy service managerZ-HU includes herein below: media services managerUnder (such as Android media services library facility), E-mail service manager, DNS function, software download service managerZ-HU, mediaCarry manager (such as audio player, DST PLAYER, movie download device, media services OS function etc.), data download clothesBusiness manager, Android (Android) " media " library facility, Android.net library facility, Jave.net library facility, Apache storehouseFunction, other similar software/library facilities in other plant running systems or service, SMTP/IMAP/POP agency, HTTPAgency, IM agency, VPN service managerZ-HU, ssl proxy etc..The network insertion alternatively initiated by an application these theseData stream is termed as application proxy service flow.In this type of embodiment, an application sometimes can be simply from an OSAssembly (such as agency service assembly) is asked a network insertion service activity rather than is directly accessed network.This type of embodiment partyIn case, in order to implement user's notice that background service control or application service use, it is necessary that according to be intended to initiate application orThe strategy of service activity, monitoring application proxy service flow, is classified as specifically being applied or service activity is initiated or belongs toSpecific application or service activity and implement the classification of suitable background service, user's notice, application program start to intercept, backstageService charging and background service use and limit, as described in this.This is to use monitor controller to complete by the service of inserting, these services use monitor controller to allow (i) and initiate application identifier (such as, Apply Names, employing fingerprint, application identificationLabel, application process number, Application Certificate or other safe or dangerous application or procedure identifier) it is mapped to (ii) to generationManage the request of service and be mapped to (iii) network service between agency service and the network element serviced for information transmission subsequentlyStream.Once completing this to map, the service of agency service uses stream can apply and charging, device software mistake subsequently back into initiationJourney or other service activitys, can be applied to suitable strategy each service subsequently and use stream, for user's notice, service activityStart to control, service activity backstage charging (includes depending on background service state and/or the variable receipts of service charge subsidizedRate), service activity background service control or Web vector graphic limit, as described in this (include but not limited to such as: block netNetwork accesses, limits network insertion, throttling network insertion, delay network access, is polymerized and keeps network insertion, selection temporal informationNetwork insertion limits, selects network type to limit, selects roaming network access to limit, selects service to use restriction such as to use limitSystem, selection service fee limit such as expense and limit or be otherwise placed on the backstage clothes of another form as the described hereinBusiness state or Web vector graphic limit).
In some embodiments, use for the service activity follow-up service through agency service as the described hereinAbility be used to improve service activity and report to the use of service controller, in order to statistically identify for background service strategy controlSystem or the control of network protection service strategy are the purposes of the service activity of candidate.
In some embodiments, described here is that the Component service activity belonging to an aggregated service activity is consideredMonitoring, the various designing techniques of charging and/or service implementation strategy can be designed into OS in himself.Such as, current at someMobile OS implement in (such as, Android (Android), iPhone, blackberry (Blackberry) etc.), deposit in the market canSome application, these application permission user obtains and is just consuming many on wireless service provider network for certain application subsetThe estimation of minority evidence, but for user maybe should be used for obtain for some OS function service use instruction be impossible, and embodiment disclosed herein will allow for this point.As another example, implement at some current mobile OSIn, agency service is used (such as, media are downloaded and Media Stream broker library software function) and the use agency service specifiedIt is impossible that application is associated, and is also (such as, to exist equally when can notify the user that the most common OS function or agency serviceIn Android (Android) situation: " media services ", " media ", " picture library ", " Google's service framework " and other the most general OSSoftware library function or agency service), user cannot determine that what applet or other service activitys the most actually generate thisIndividual general service function uses, and the present invention described herein permits that this type of is used monitoring example to be fully visible by user's.Further, having interception and strategy implements function if transform as by OS, it can be designed into active manager, wideBroadcast and be intended to manager, media services manager, service managerZ-HU or other application in Android OS or service activity management meritEnergy.It will be appreciated by those of ordinary skill in the art that the most described here in view of interception service activity be intended to start andThe various designing techniques of application background service set of strategies or network protection service strategy collection can be designed into iPhone OS, windowsThe application of mobile OS, windows PC OS, blackberry (Blackberry) OS, Palm OS and other OS design starts managementIn function.
Figure 19 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.1902, process starts.1904, determine one or more network of network busy state.Implement at someIn scheme, these one or more networks are selected from access network, cable network and wireless network.1906, based on network busyState determines that the classification of the network service use activity (such as, network capacity managed service) to device assists difference network to connectEnter to control, thus protect this one or more network of network capacity.In some embodiments, network busy state based onUnder every in one or more: network performance, network congestion, network availability, network resource availability, network capacity orOther any network services use to be measured and one or more time window (such as, time-based standard).Implement at someIn scheme, protect one or more network of network capacity include protecting a wireless network (such as, RAN, BTS, BTSC and/Or other network elements) the network capacity of back section.In some embodiments, device auxiliary/technology based on device is usedIt is determined and classifies.In some embodiments, use network assistance/network technology is determined and classifies(such as, it is implemented in a network element/functionally, such as service controller, DPI gateway, BTS/BTSC etc., or the combination of network element).?In some embodiments, use device auxiliary/technology based on device and network assistance/combination of network technologyIt is determined and classifies.1908, use activity classification to implement difference flow-control based on service, thus protect network capacity.1910, process completes.In some embodiments, network busy state is determined based on one or more in the following:Temporal information, the busy state of network-reporting and/or device (such as, near-end and/or far-end) determine/report network numerousBusy condition.In some embodiments, use in the following one or more determines network busy state: network probe,Device inquiry, network probe report (such as, including BTS and/or BTSC), network probe analysis, performance based on local flowAnd do not have probe (as TCP time-out, UDP retransmit the test of defeated, Multi net voting, be based upon a network that device is connected thereto and/Or one or more alternative network and network service use activity (such as, the network access performance based on application that carries outData) the network congestion of assembly monitor) device analysis.In some embodiments, network congestion condition and network busyState (such as, network busy state setting/grade) is associated.Such as, the network congestion level of the Web vector graphic of 40% can be withBeing set to the network busy state of 4 be associated, the network congestion level of the Web vector graphic of 80% can be with the network busy being set to 8State is associated, by that analogy.
Figure 20 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.2002, process starts.2004, the network service use activity to a device in network service is enteredRow monitoring.2006, network service uses activity classification, and (such as, classification based on network service use activity is with catch netNetwork capacity, such as, as a network capacity managed service), it is used for protecting network capacity.2008, controlled to network capacityService carry out charging (such as, a classification based on network service use activity carrys out the charging to network service use activity, fromAnd protect network capacity).2010, carry out the charge to network capacity managed service.2012, process completes.Real at someExecuting in scheme, being that network capacity is controlled for protect the DAS of network capacity to farther include network service using activity classificationService.In some embodiments, poor for protecting the DAS of network capacity to include network capacity managed service and foreground serviceOther ground charging and/or differentially charge.In some embodiments, network service uses control strategy to include for the most rightThe control of network capacity managed service, charging and/or charge are (such as, based on network busy state, time-based standard, clothesBusiness plan, device or network service use activity obtain the network and/or other standards/measurement accessed) strategy.At someIn embodiment, include network capacity managed service charging one or more network capacity managed service classes are differentially collectedService uses, and wherein charging is modified/different (such as, dynamically) based on one or more in the following: network is numerousBusy condition (such as, the charging of amendment/trust network not met user preference of congested period), network service are movable, access network(such as, device/service activity is currently connected to network thereon), user preference select, time-based standard (such as, whenSome day in front temporal information/mono-week/mono-month), the service program that is associated, the option of time window.In some embodimentsIn, the charge to network capacity managed service includes charging is mapped to charge report.In some embodiments, network is heldThe charge of amount managed service includes that charge report is sent to a network element, and (such as, service controller, service cloud, charging connectMouth/server and/or another network element/function).In some embodiments, the charge to network capacity managed service includesOther network service use activities of one or more network capacity managed service vs or a large amount of network service use activity are reconciledOr arbitration CDR/IPDR.In some embodiments, the charge to network capacity managed service includes turning a charge reportChange a station message recording or charging action into.In some embodiments, the charge to network capacity managed service includes generatingNetwork capacity managed service is according to request or based on a standard/measurement (such as, thresholding toll level and/or thresholding network clothesBusiness service rating) and charging user's notice.In some embodiments, the charge to network capacity managed service includesBased on charging policy by application charge (such as, according to the charging by application of charging policy rule, as a useFamily or service provider supported, operator and/or the charging of other entities).
Figure 21 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.In some embodiments, for protect the DAS of network capacity include to network insertion connect (such as, orStack) provide a device service to access API, it is that application, OS function and/or other services use and live that this device service accesses APIOne interface of dynamic offer, is used for providing difference network insertion, to protect network capacity.In some embodiments, by followingOne or more in every determines difference network insertion: the service priority of service use activity and network busy state.?2102, process starts.2104, receive a device service and access API request.2106, responding device service accesses API pleaseAsk.In some embodiments, difference network insertion is (such as, for network capacity managed service and/or based on network busy shapeState and/or other standards/measurement) by the one or more enforcement in the following: provide network numerous to service use activityBusy condition, receive network busy status information, for service use active reception network capacity requirements, from service use activity connectReceive scheduling time/slot requirements, receive and/or provide network site and/or physical location information (such as, base station, communication letterRoaming or non-roaming network that road, cell sector, device connect and/or GPS or other physical location data), use to serviceMovable provide notify its when allow the information of access network, provide to service use activity notify its must apply/realExecute the information of what flow-control, provide to service use activity notify its when network be available for it thus connectThe information of the information that enters and turn-on time/time slot of providing it to dispatch to service use activity is (such as, based on the followingIn one or more: priority, network busy state and temporal information) (such as, there is a specific performance rateOr the grade of service, such as data transfer size, speed, network capacity managed service priority level, QoS grade, data transmission classType, scheduling time (number of times) and/or network connection parameter), and indicate device and/or service use activity to different statesThe transformation of (such as, power save mode, sleep state dormancy, free time, waiting state and/or wake-up states).2108, it is poor to implementOther network insertion.2110, process completes.In some embodiments, device service accesses API is to access to network for differenceThere is provided DLL, virtual interface and/or the emulation interface of instruction, to protect network capacity, as described in this.
In some embodiments, API is that device, network element are (such as, for the peace between API communication use device and network elementFull communication, such as HTTPS, TLS, SSL, encryption data connects or SS7 controls channel and/or other well-known secure communicationsTechnology) and/or all/partial service in the two position are thereon.In some embodiments, network API is associationHelp API or other at the interface communication performed between application and network element and/or service cloud on device (such as, such as institute aboveDiscuss secure communication) API, in order to protect network capacity.Such as, network AP I can be that application provides interface and service cloud(such as, the webserver) communicates, thus (such as, network busy state, based on can to obtain Network access control informationBy the Multi net voting information of the network busy status information of network and/or available network, network capacity managed service priority and canBy property, based on network busy state, service program, network capacity managed service and/or other standards/measurement connect for networkEnter and scheduling time/time slot).As another example, network AP I can assist application vendor, central network/service to provideBusiness and/or can with the third party that communicate of application, thus provide and/or solicited message (such as, application physical location,Application network site, application network service use information, be supplied to application network busy status information and/or otherStandard/measurement).Still as another example, network AP I can pass through network capacity relevant information (such as, network busy state,Based on the classification of network capacity managed service and/or the availability of priority level, some network capacity managed service is classifiedAnd/or the scheduling time of priority level/time slot, urgent/high priority software/anti-malware/vulnerability update and rightIn the scheduling time/time slot of this type of software upgrading, and/or other standards/measurement) assist to be broadcast to one or more application, OSFunction and/or device (such as, are partitioned based on geography, network, application, OS function and/or any other standard/measurement).In some embodiments, the network insertion API being used for protecting network capacity is for opening that application and OS developer are announcedThe API of the API put or standard/required (such as, for certain Internet Service Provider for needed for application or standardized, asThered is provided by Verizon application shop or Fructus Mali pumilae (Apple) application shop (AppStore)) so that application and OSFunction is designed to understand and implement network insertion API, thus protects network capacity.Such as, an authentication procedure can be set upThere is provided test specification, work to implement for application and OS developer and/or standard is to guarantee that network insertion API is to be suitably carried outAnd work according to particular requirement.In some embodiments, network insertion API is for service controller (such as,Service controller 122) or another network element/function (such as, for service use server or billing interface/server orAnother is assisted secure communication thus sends/receive or network element/merit that otherwise relevant to network insertion information communicatesThe service that can communicate uses API, thus protects network capacity) interface that communicates.In some embodiments, networkThe partner supported that API is associated to the network service use activity (such as, application) with access network API provides all, classification and/or network service use the charging (such as, reverse charging) supported of charge subset.Real at someExecuting in scheme, by the service providing network API supported, in this service supported, the network service of access network API makesThering is provided the service partner supported to prove with movable (such as, application) to network AP I, this proof is used as billing agent to being praisedHelp partner charge, user account is removed supported partner by conciliation and charges, and network AP I provide access service and/Or information service (such as, positional information, local information, content information, the network information and/or any other information).
Figure 22 illustrate according to some embodiments for device assistant service (DAS) thus protect the another of network capacityOne flow chart.2202, process starts.2204, the network service use activity of one device of monitoring (such as, uses warpCross checking/service processor that can verify that).2206, determine network busy based on the network service use activity monitoredState (such as, the measurement of network capacity, availability and/or performance) (such as, uses various technology as the described herein).In some embodiments, the service processor on device be used for determining (such as, measuring and/or characterization) device (such as, itsCan be used for determining network access control policy for one or more network capacity managed service) the network busy state that experiences.?2208, by network busy state report be sent to a network element/function (such as, network controller as the described herein and/orAnother network element/function).2210, process completes.In some embodiments, various technology described herein is used to testCard service processor.In some embodiments, what the report of network busy state included in the following is one or more: numberAccording to speed, waiting time, shake, the bit error rate, packet error rate, the number of access attempts, the number being successfully accessed, access failureNumber, QoS grade availability, QoS grade performance and the transmutability of any aforementioned parameters.In some embodiments, netIt is one or more that the report of network busy state includes in the following: identifies and reports phase with the network busy state reporting network elementAssociation the base station IDs of edge network, cell sector ID, CDMA ID, FDMA channel id, TDMA channel id, GPS location and/orPhysical location.In some embodiments, the monitoring of network service use activity includes the flow transmitting for device/receivingMeasurement Network performance and/or generation applied in network performance test flow.In some embodiments, measured by one or moreAnd/or network element (such as, BTS, BTSC, base station monitor controller and/or the airwaves monitor controller) collection of report network busy state(and/or being used for assisting, supplementing and/or verify network busy state measurement based on device) network busy state.Such as, may be usedAirwaves monitor controller and/or base station monitor controller is provided to aid in the area of coverage of one or more base station and/or base station sectionThe reliable characterization of the network busy state in territory, as be arranged on (such as, temporarily or permanently) one or more base station and/Or the attachment in the overlay area of base station section (such as, one of them sector is combined with a beam antenna and a channel)Mobile terminal (such as, it may include the monitoring of complementary network busy state and/or the terminal of trust of report functionalities) so thatThe network by mobile terminal busy state that must adhere to monitors and to service controller, home base stations and/or other or manyIndividual network element/function report, as described similarly at this.In some embodiments, the mobile terminal for good and all adhered to providesNetwork monitoring instrument, is used for reporting that can such as be polymerized such network busy state information is one by such as network busy stateOr multiple network's coverage area determines the central network element (such as service controller) of network busy state.In some embodiments,The mobile terminal for good and all adhered to generally these be arranged on and position the most installed therein occur (such as, carry out netNetwork monitors), and can be trusted that (mobile terminal such as, for good and all adhered to can be added by various hardware and/or software credentialsCarry).Such as, use the mobile terminal that for good and all adheres to, it is possible to provide the reliable characterization of network busy state, its can subsequently byReport to central authorities network element and be polymerized thus carry out various network busy state be correlated with technology, as at this relative to each embodiment partyDescribed by case.In some embodiments, network element/function uses the report of network busy state (such as, and from being connected to phaseOther network busy states report of other devices of same network edge segment element) it is the network edge segment element being connected to deviceDetermine network busy state.In some embodiments, the busy state being used for network edge segment element is reported and is sent out by network element/functionDelivering to device (such as, and to being connected to other devices of identical network edge segment element), it is numerous that device can be subsequently based on networkBusy condition uses the report of this busy state to implement difference network insertion strategy (such as, for network capacity managed service).?In some embodiments, network element (such as, service controller or service cloud) and broadcast network busy state is supplied to device(such as, communicating safely with service processor).
Figure 23 illustrate according to some embodiments for device assistant service (DAS) to protect of network capacityNetwork capacity managed service priority chart.In some embodiments, various application, OS function and/or install/be loaded intoAnd/or start/perform/other instrument/apparatus of being active on communicator (such as, device 100) are classified as network capacityManaged service, thus protect network capacity.In some embodiments, network capacity managed service grade or priority etc. are usedOne or more network capacity managed service are allocated or classify by level, thus protect network capacity.In some embodimentsIn, based on one or more standard/measurements (such as, dynamic standard/measurement), such as network busy state, present access network, baseCome dynamically by one or more network capacitys in the standard of time, the service program being associated and/or other standards/measurementManaged service is allocated or classifies.In some embodiments, higher priority level means application or practical journeySequence/function has been authorized to the higher priorities associated for network insertion, and (such as, priority level 10 can provide guaranteedNetwork insertion, and priority level 0 can provide the network insertion of obstruction, the priority level between 1 to 9 can provide phase simultaneouslyNetwork insertion to the priorization raised, potentially with the network insertion distributed and the service phase of other request network insertionsClose).
As shown in Figure 23, network capacity managed service is by network capacity managed service grade or priority level baseDynamically distribute in the network busy state of present access network or classify.Such as, based on network busy state by differencePriority level distribute to e-mail applications (Microsoft (Microsoft) Outlook), be used for protecting network capacity, such as instituteShow: priority level 6 is used for network busy state (NBS) grade of 10% (such as, based on using various skills described hereinArt current or up-to-date/last measure/detection/network capacity/resource of determining uses, just using and be up to about 10%Network capacity), priority level 5 is used for network busy state (NBS) grade of 25%, and priority level 4 is used for the net of 50%Network busy state (NBS) grade, priority level 3 is used for network busy state (NBS) grade of 75%, and priority level2 are used for network busy state (NBS) grade of 90%.Also as indicated, based on network busy state by different priority levelsDistribute to antiviral (AV) software upgrading application/utility program/function, be used for protecting network capacity: priority level 9 is used forNetwork busy state (NBS) grade of 10%, priority level 7 is used for network busy state (NBS) grade of 25%, priorityClass 5 is used for network busy state (NBS) grade of 50%, and priority level 3 is used for the network busy state (NBS) etc. of 75%Level, and priority level 1 is for network busy state (NBS) grade of 90%.Based on the controlled clothes of network capacity at Figure 23Network busy state grade shown in business priority level chart, together illustrates with various priority levels distribution/classificationVarious other application and utility program/functions.As will be to those of ordinary skill in the art it will be evident that can apply for for baseNetwork insertion in network busy state grade dynamically distributes the various distribution of priority level and/or technology to protect network to holdAmount (such as, uses state, time-based based on user preference, service program, access network, the power supply status of device, deviceStandard and the various the most higher priority of other factors are for urgent software and/or security update, such as high priority safetyProperty or vulnerability software patch or renewal, and/or urgent or high priority email or other communication, as 911VOIP exhalesCry).
Refer again to Fig. 1 to 3, according to some embodiments, use the service processor (example of device (such as, device 100)As, service processor 115) implement for protecting the DAS of network capacity to assist difference network service Access Control (such as, to useIn network capacity managed service) thus auxiliary protection network capacity, this device uses various DAS technology as the described herein.In some embodiments, one or more following verification technique service for checking credentials processor and/or service processor are usedOne or more agencies (such as, and/or especially verify the monitoring to network service use activity, by one or more servicesActivity classification to one or more network capacity managed service classes, by one or more network capacity managed service classes with one orMultiple differentiated services active policies are associated and/or determine network busy state): by network service use measure withService strategy and/or compared with the service program that device is associated, by device assistant service use measure with service strategy and/Or use measurement and device assistant service use to measure compared with the service program that device is associated, by network serviceCompare, first device assistant service used and measures compared with the second device assistant service use measurement, at the service for checking credentialsReason device and/or the existence of one or more agencies of service processor, the configuration of service for checking credentials processor, service for checking credentials use workMove by report suitably (such as, use testing service to use and generate service use event/report for analyzing and confirming), testCard chargeable time by suitably report, by network service use measure compared with the device metering data reported,From the communicator of trading server, the report of validation test charging event, checking report that the report of charging event, checking swashThe existence of tracking system of living, checking device configuration or operation, checking device identity or service program identity, service for checking credentials processorSuitably run, the service for checking credentials processor heart beating response report, the monitoring of validation test Service events, download new service centerReason device (such as, and/or one or more agencies of arranging of the new configuration of service processor) and carry out integrity checking, useSelf diagnosis checks that the configuration of service for checking credentials processor code, checking communicator only use first service, checking to use after being authorized toFamily identity, checking network busy state are (such as, from more than one wherein network busy state monitoring device for instance in deviceSecure execution environments in device compare and/or statistical disposition network busy state measurement), verify various difference network insertionControl to implement (such as, network capacity managed service monitored suitably/determine/detect, control, charging and/or charge), testDemonstrate,prove various QoS and implement (such as, as discussed above) and checking agent communication daily record.Described herein and similar is eachKind of other verification techniques and for providing use enforcement based on device (such as, service processor and/or other are based on deviceAgency or software/hardware technology) protect the various verification techniques of DAS of network capacity in view of each enforcement described hereinScheme, it will will be apparent to those of skill in.
In some embodiments, use various hardware described herein and software engineering to protect service processor,Including such as, it is implemented in secure virtual machine, shielded execution environment, safety storage (such as, safe storage), safety modulationDemodulator and/or as described in this service processor in other security implementation technology and/or other or similar technologyAll and/or some, as in view of various embodiments described herein, it will to those of ordinary skill in the art beSignificantly.Such as, service processor can be implemented in software and perform in the protected field of OS, and this OS performs on deviceAnd/or (such as, hold safely at CPU, APU, SIM chip collection, modem, modem in protected executable portionOther hardware capabilitys on row subregion, SIM, device and/or above any combination) perform.
In some embodiments, network service uses enumerator to be embedded in (such as, the use of a device modemMeasure some V, VI and/or in fig. 12 other measure points) secure execution environments in (such as, be in nextport modem card NextPortAnd/or the device on modem chip applies the program in not accessible secure non-volatile memory to store, for countingNot can skip according to the device application being used for the program that performs and/or defence program operation of path monitoring and/or control thus obtainThe safe CPU environment connected to the modem of network).In some embodiments, service uses enumerator according to networkService activity is classified (such as, by application, destination/source, port, discharge pattern, content type, temporal information, network busyState and/or any other standard/measurement) by data traffic (such as, byte and/or service use any other measure,Such as file transactions, message transaction, Connection Time, Connection Time or connection duration and/or for given QoS or network capacityManaged service priority level the flow of process or the transaction of process), flow be counted as the function of time, flow.At someIn embodiment, service uses enumerator coordinating as such as layer-III (such as, IPSEC) and layer-II (such as, L2TP Tunnel)The two and set up VPN layer time, data traffic (such as, as discussed above) is counted, so that the most aerialDownload service use be measured as billing mediation and/or network service use charge (such as, billing clients, by service and/or anyThe service bill that other charges or charging are supported) and count.In some embodiments, service use enumerator with accelerationTo data traffic, (such as, counting as discussed above), this adds device software (such as, compression/de-compression engine) universal time coordinatedSpeed device software is the most aerial download propagation and transformation frame.As discussed similarly above, with the service processing of accelerator layerDevice is coordinated to assist accurate aerial download service to use and is measured, and uses charge for billing mediation and/or network service.OneIn a little embodiments, service uses enumerator when with both VPN layer and accelerator software layer universal time coordinated to data traffic (such as,As discussed above) count, thus assist accurate aerial download service to use and measure, for billing mediation and/or netNetwork service uses charge.
In some embodiments, service use enumerator to network element (such as, service controller, charging gateway, PCRF,AAA, HA, charge system, mediation system, charge on traffic data base, base station or base station controller and/or another network element/functionOr central authorities' network element/function) report services use.In some embodiments, the information to network element report is encryption or uses netCorresponding key signature known to unit.In some embodiments, the leading to network element of counting is used for the service of transmittingLetter link is carried out on wireless network particular channel (e.g., SMS, MMS, SS-7 or another special control channel).At someIn embodiment, for transmit service use counting to network element communication link network channel (such as, by IP, TCP,UDP, HTTP, HTTPS, TLS, SSL, TLS or SSL point-to-point signature variant or by network control channel be connected to fillAnother data network channel put) on carry out.In some embodiments, data network is controlled channel flow and be injected into tuneIn the PPP stream of modulator-demodulator.In some embodiments, data network is controlled channel flow and is transferred up to device networkingStack, for the connection to network.In some embodiments, coordinate from modem subsystem signature or encryptionService uses the count to provide service to use counting into a period of time, and this service uses counting also to be used for including that service makes with oneThe period being similar to the service processor heart beating report measured or count is corresponding.Such as, this be service controller or anotherIndividual network element provides the secondary set of information, and the secondary set of this information can be used for checking and/or protection by service processor reportThe service accused uses measures.Various technology can be used for using counting and service processor service to make to use tricks for modem serviceNumber synchronizes the period.Such as, service processor can ask a most recent count message from modem, disappears in this most recent countIn breath, modem is to since all services of the previous request to the most recent count request to most recent count up till nowUse counts, and encryption state-of-the-art technology message is so that service processor or other application softwaries on device or OS are softPart can not decode and/or distort message, and modem service uses enumerator to send the message of encryption to clothes subsequentlyBusiness processor.Service processor the service of the in the future encryption of automodulation demodulator subsequently can use count message to be sent to service controlDevice processed, used together with charging message with one or more service processor service in the same or like period.Service controlDevice processed can decode these two the service count message from secure modem subsystem and service processor subsequently, and willThe two measurement is associated and may indicate that service uses control or error in charging or device service processor to usurp by such as lookupThe difference changed is carried out the service for checking credentials and is used report.In some embodiments, secure modem subsystem is to crossfire (such as,And/or stream, socket connect or the combination of IP destination/source/port) record byte counting, potentially with temporal information, netNetwork busy state, QoS grade and/or other standards/measurement together, and for having traffic activity during current reporting intervalEach crossfire report that these count.Such as, service controller can be subsequently by stream service use information and by the service processor heartThe service that the service of jumping uses report to be provided uses information to be associated, thus service for checking credentials processor service uses report and adjustingThe independence manufactured in modulator-demodulator subsystem is measured consistent.In some embodiments, service use be reported on device and/Or network is (such as, the using one or more network element/function, such as service controller) being associated.
In some embodiments, can modem subsystem service use counting in carry out flow deeper intoAnalyze.Such as, can be to flow through HTTP or the HTTPS flow of modem to carry out the layer 7 that service uses and analyze, wherein modulatedemodulateTune device Subsystem Service use enumerator carries out the analysis of the HTTP grade of flow, thus by webpage traffic income and other biographiesSend the greater degree given with classification of service (such as, Advertisement Server, content server, proxy server and/orFlow by the local host indication providing webpage) it is associated.In some embodiments, can flow for HTTPS, SSL or TLSAmount is by including that the proxy server of a trust being embedded in modem system increases modem subsystemService uses counting.Such as, device stack trust proxy server, so that proxy server is known for HTTPS, TLSOr the key of SSL, it is allowed to it is similar to one for instance in the proxy server based on modem in secure execution environmentsMode as described above carries out analyzing the layer 7 of encryption flow.In some embodiments, the proxy server of embedding is for arrivingThat each connection of specific distance host is trusted based on device (such as, and/or network service use activity, such as application) andThe Ticket Granting Ticket that the proxy server embedded also is trusted generates Server SSL voucher in real time, and proxy server becomes subsequentlyBecome to emulate on side long-range SSL main frame and on another side simulator (such as, and/or network service use activity, as answeredWith), deciphering flow, analyze it and transferring it to or the go-between of re-encryption before distance host forwards.Similarly, asIn the case of modem service uses the counting layer 3 that carries out of subsystem and layer 4 flow analysis, it is possible to use technical information pairLayer 7 service are encrypted and send it to service controller by each channel.In some embodiments, layer 7 modulation /demodulationDevice Subsystem Service uses number system to be that a reporting period record service uses counting, this report period and service processorThe reporting period used is similar to, so that service controller can be by service processor charging message and the tune with layer 7 informationModulator-demodulator charging message reverse correlation.
In some embodiments, security service uses reporting system element to be in the safety including that modem drivesPerform in environment.In some embodiments, it is desired to the most controlled or charging all arrival for network traffics are modulatedThe flow of demodulator is driven by secure modem, so that can generate a separate counts and be reportedService controller, as described above, uses counting and Reports component to be embedded into modem without by security serviceIn.
In some embodiments, security service use reporting system element is in and includes that modem drives and modulationDemodulator hardware interface controller drives the safety of (such as, the USB controller for 2/3/4G and the SDIO for WiFi) to holdIn row environment.In some embodiments, it is desired to the most controlled or all arrival modulatedemodulates for network traffics of chargingThe flow adjusting device is driven by secure modem and modem hardware interface controller drives (such as, for 2/The USB controller of 3/4G and the SDIO for WiFi) so that can by or modem drive and/or modulation /demodulationDevice hardware interface controller drives (such as, the USB controller by 2/3/4G and the SDIO by WiFi) to generate based on accurateNumber, and be sent to security service use Reports component thus send it to service controller for charge customers/charging.ThisScheme is when ensureing to use counting (owing to it belongs to billing clients) to occur safely, it is provided that motility (such as, major part dressPut software and operating system and service/application needs not be at/performs in secure execution environments).
In some embodiments, for process HTTPS, TLS and SSL flow layer 7 proxy server charge on traffic andReporting techniques (as discussed above) is also used in the detailed of layer 7 flow that service processor allows device to encrypt in himselfCharging.In some embodiments, the information being achieved in that is filtered, so that user's personal information is not transferred, to network(such as, service controller, PCRF and/or any other network element/function), and the most enough use in view of service programCharging thus service for checking credentials control strategy are implemented or are come the service that service for checking credentials charging policy implements and use information to be sent to netNetwork (such as, service controller, PCRF and/or any other network element/function).In some embodiments, it is used for processing safetyOr layer 7 proxy server of the charging message in clearly device service uses is in the safety of device application processor firmlyPart performs in environment or in the fail-safe software subregion of operating system.
Various technology can be used for checking and/or protection service uses control or service to use charge report.Such as, if secondaryLevel service use report instruction service use be intended to the service that comes into force use strategy (such as, based on service program and/or with dressPut the service strategy being associated) limit outside, then service controller may indicate that an error flag, for further analyzing andAction (such as, implements various checking as the described herein and responder action, as used various additional DAS and/or network auxiliaryThe monitoring technology helped is to block activity, throttling activity, isolating device, renewal/replacement service processor and/or supervising device).As another example, the service if from service processor uses report not use report to match, then with secondary serviceService controller may indicate that an error flag, for further analyzing and action.Such as, association can use based on serviceBig measurement (such as, given period total byte from the beginning to the end), or use to service program charge record chargeService use finer granulometry (such as, verify one group service use activity between charging, as application, destination/Source, port, content type, temporal information, network busy state, QoS grade and/or other standards/measurement) to anotherThe charging of another group service use activity of service program charge record charge.In some embodiments, owing to have received clothesBusiness charging report, carries out using between charging report two services on all device flows in real time or the most persistentlyAssociation process.In some embodiments, store after a while and analyze or associate use charging report (such as, periodically, baseIn request or audit, and/or based on some event, as thresholding network service use event and/or based on each standard/measurement itsHis any event).In some embodiments, the most part-time audit uses charging report, its example for association twoAs the network processing load in network traffics and/or service controller can be reduced.
In some embodiments, service controller association technology compares two different services and uses measurement,One or more based in the following as described above: data total amount (such as, for file transmission, session and/orOther measure byte), time per unit data volume, always access number, time per unit access number or access frequency, when oneBetween be spaced the access of (such as, during peak) period, access in network busy state, access request and at a time pointIndividual vs group transmission (such as, is each used for a given destination or destination and discharge pattern set).
In some embodiments, service uses monitoring to include using various technology as the described herein and/or as rightThis area ordinary person significantly other or similar technology are detected and/or other by crossfire, stream, destination/port, bagService is used active characteristics by standard/measurement.In some embodiments, service uses monitoring to include by crossfire, stream, meshGround/port, bag detection and/or other standards/measurements by service use active characteristics, and subsequently associate find knowledgeThe network service usage behavior pattern associated of not same behavior and one or more service activitys being just managed.
In some embodiments, the DAS controlled for network capacity include flow is carried out classification to determine which orWhich network service use activity is just causing flow (such as, network capacity/resource used and increase to above a thresholding), andAnd (such as, service uses strategy it is later determined that any rule is the most just being violated in the service use activity of one or more access networkOr the service program being associated with device/user is arranged).In some embodiments, the DAS controlled for network capacity includesGenerating a list for network capacity managed service, this list makes by each managed network service based on Access Control PolicyWith activity to one or more have desired access limit network service use activities indicate behavior characteristics (such as, based onService uses strategy or the service program setting being associated with device/user).In some embodiments, for network capacityThe DAS controlled includes monitoring based on restriction and/or controlling network service use activity, and limiting such as can be based in the followingOne or more: total access flow enumerator, the enumerator of different types of access flow, destination, port, access frequencyRate, the behavior that accesses during a given time, access behavior during a given busy state, for many groupsMovable access behavior (such as, checking clumping) and/or other standards/measurement.
Therefore, in some embodiments, it is provided that the service of a second safe trust uses measures, Service controllDevice (such as, or another network element/function) can use this service use to be measured as service processor and verifies or protect serviceControl or service charge report.In some embodiments, the service of the safest trust uses to measure and also carriesFor the checking strengthened and Services-Security, wherein situation is such as, and network service uses measures for additional with serviceProcessor service uses the association of report to be available.The most network service uses measures or unavailable or only dilute(such as, not there is service based on timely network and use the WWW measured in the case of can use in the time interval of white-out rowNetwork or other networks), these technology are that device assistant service controls and real-time or approximate real time checking or safety are assisted in chargeProperty.
In some embodiments, SIM carries out the process of part or all of security context as described above, by directlyPick the device modem flow for charge on traffic and report toward SIM secure subsystem, or device modemThe copy of flow.In some embodiments, SIM is for using active storage QoS classification and/or network capacity for each serviceManaged service is classified, so that the user behavior in some the network service use activity just used and/or positive controlUser preference in a little network service use activities need not be relearned or re-download, because user is at different devicesBetween exchange SIM.In some embodiments, SIM be multiple user of belonging to or subscriber household plan device keep service makeWith movable local record, so that the service that can directly update on a given device uses notice and strategy, becauseUser exchanges SIM from device to device.In some embodiments, this service is used historical storage mode on SIMIt is safety, so that it can not be tampered.In some embodiments, SIM be used for implementing various application management and/orFlow control technique described herein.In some embodiments, SIM is used for checking flow, classifies flow, createsBuild report (such as, certification service activity use report), report is encrypted, report is sent to a network element/function,And this network element/function association report (such as, uses network assistance measurement to be used for comparing and/or using as the described hereinVarious other technologies).In some embodiments, SIM uses one or more modems measurement point to carry out a partOr all of security context as described above processes.Such as, the flow needing to be classified can be routed through SIM and with modulationContent measured by demodulator is associated.In some embodiments, network assistance/network network service useActivity classification compares with the classification of based on SIM/SIM auxiliary, be used for servicing use monitoring/reporting authentication (for example, it is possible toIt is inconsistent, as based on total flow, crossfire/stream/set that identification detects in the network service use activity being monitored/being reportedConnect word activity and/or other standards/measurement).In some embodiments, report includes a sequence through checking, thusMake the report can not be counterfeiting and/or can determine that the report of loss.
In some embodiments, apply that security context as described above processes part or all of implement and/Or checking is for the QoS of DAS technology and/or as the described herein for the DAS technology of network capacity managed service.
In some embodiments, what report included in the following is one or more: device is repeatedly from modemIn rebooting status start the cycle over or be recycled to the rebooting status in modem, in time window or network busy state phaseBetween repeatedly, restart the number of times of the crossfire that vs initiates during circulating and restart the crossfire transmitted during circulating.OneIn a little embodiments, device reboot event triggers the generation of report.
In some embodiments, checking for network capacity managed service monitoring, report, control, charging, charge,And/or strategy enforcement (such as, using various verification technique described herein).If any determine or assist determine that network holdsAmount managed service monitor, reports, controls, charging and/or charge and/or measure the verification technique of enforcement be tampered, disable,And/or be not suitably carried out or work, then can carry out responder action, such as, device (such as, and/or suspicious service) canUnder a cloud, isolate, inactivate/terminate and/or labelling is for further analyzing/carefully studying, determine that device the most just occursFault, need to update, be tampered or cracked, infected with malware and/or whether there is any other problem.
In some embodiments, the network recovery use activity of service processor supervising device.In some embodimentsIn, monitoring service use activity includes (such as, determining which network is available and/or available net for multiple network monitoringsThe network busy state of network).In some embodiments, carried out by service cloud and/or assist monitoring network service to useMovable (such as, it is provided that one or more network elements of this type of service).In some embodiments, monitoring network service use activityIncluding identifying that network service use activity, the network service of Measurement Network service use activity use and/or made by network serviceWith movable network service use characterization (such as, use device auxiliary/technology based on device, network assistance/based on netThe technology of network, test/monitored off-line/analytical technology and/or a combination thereof).
In some embodiments, service processor implements difference Network access control (such as, for network appearance on deviceAmount managed service), network service use charging, network service use charge and/or network service use notice assist DAS,To protect network capacity.
In some embodiments, updated by network element (such as, service controller 122), communicate with, arrange and/or controlledService processor processed (such as, service processor 115).In some embodiments, service processor receives clothes from network functionBusiness policy information, this network function is selected from base station (such as, base station 125), RAN gateway, core gateway, DPI gateway, home agent(HA), aaa server (such as, aaa server 121), service controller and/or another network function or as retouched at thisThe combination of the network function stated and/or now will be bright to those of ordinary skill in the art in view of each embodiment described hereinShow.In some embodiments, service processor by aerial download or network O/S software updates or application software updates orDevice firmware is more newly arrived renewal.In some embodiments, service processor is that the control channel with service controller usesIP connects, SMS connects and/or MMS connects.In some embodiments, service processor inquiry service controller determines instituteThe network service use activity of monitoring uses associating between control strategy with network service.In some embodiments, device(such as, service processor) is one or more to be classified as the activation service of network capacity managed service (such as, activelyPerform and/or previously installed/downloaded to device) one network capacity managed service list of maintenance and/or network capacity controlledService strategy (such as, owing to the quantity of application continues to rise, and can use, and maintains often by the myriad applications on some platformFor individual application a unique list/specific or specific group policy and be insufficient to).In this embodiment, whenOne new application be activate/start and/or when downloading to device, therefore device can ask a network capacity updatedThe network capacity managed service strategy of managed service list and/or renewal (such as, and/or periodically refresh this type of list/Strategy).
In some embodiments, for protecting the difference Network access control of network capacity to include based on network clothesMake sure and control to be controlled by device (such as, network capacity managed service) with control strategy (such as, network capacity managed service strategy)The network service flow of the service creation of system.In some embodiments, for protecting the different network insertion of network capacityControl includes providing between control device according to various thresholdings and/or the guaranteed grade of service, network capacity managed service (exampleAs, application, OS operation/function and be classified as other network service use activities various of network capacity managed service) betweenThe auxiliary of distribution of bandwidth, the offer of difference QoS service, capacity fair share, high user load network performance and/or stopMuch more so one or more device consumption network capacity makes other devices can not receive suitable performance or performance.At someIn embodiment, for protecting the difference Network access control of network capacity to include, application strategy is to determine that service activity should connectReceive which network (such as, 2G, 3G, 4G, this locality or roaming, WiFi, cable, DSL, optical fiber, wired WAN and/or anotherWired or wireless or access network), and apply difference network insertion rule (such as, traffic control rule), which depends onWhich service activity individual network is connected to.In some embodiments, for protecting the difference Network access control of network capacityControl strategy and user's input (such as, user selects or user preference) difference is used to control network service and make including based on serviceWith activity.In some embodiments, for protecting the difference Network access control of network capacity to include based on service use controlSystem strategy and device and the network service network that it accessed of activity and difference controls network service use activity.
In some embodiments, network service uses control strategy to be dynamic based on one or more in the following: network busy state, temporal information, which network service activity is connected to, service activity is connected to which base station or communicationChannel, user's input, user preference selection, the service program being associated, service program change, application behavior, message transfer layerBehavior, random back-off, installation's power source state, device use state, time-based standard (such as, time/sky/week/moon, forFollowing time slot keeps/postpones/postpones, keep/postpone/postpone and keep/postpone/postpone arriving for scheduled time slotTo a busy/upstate/QoS state), the mutual monitoring of user and service activity, the mutual prison of user and deviceControl, UI priority state to service activity, the monitoring of electrical source consumption behavior of service activity, modem mains cycle orThe change of power supply controlled state, modem communication session establishment or dismounting and/or carry out the policy update/amendment/change of automatic networkChange.In some embodiments, network service uses the service of control strategy renewal based on network service usage behavior to useBehavior analysis.In some embodiments, network service uses control strategy to classify based in response to network capacity managed serviceThe crawler behavior of renewal.In some embodiments, network service uses control strategy based on the user's input/preference updated(such as, relevant to strategy/control for network capacity managed service).In some embodiments, network service uses and controlsStrategy is based on the renewal to service program state.In some embodiments, network service uses control strategy based on to serviceThe renewal of planning strategy.In some embodiments, network service uses control strategy availability based on alternative network.In some embodiments, network service uses control strategy based on the policing rule for selecting alternative network.OneIn a little embodiments, network service uses control strategy based on for alternative network of network busy state or available characterState.In some embodiments, network service uses control strategy movable or networking based on the network service given toThe special network of network service activity selects or preference strategy.
In some embodiments, network service use activity is used control strategy or a net with a network serviceNetwork service use notification strategy be associated include based in the following one or more dynamically association: network busy shapeState, temporal information, user's input/preference, be associated user plan (such as, 25MB data plan, 5G data plan or nothingLimit user plan or other data/service application plan), apply behavior, message transfer layer behavior, the power supply status of device,Device uses state, time-based standard, the availability of alternative network and is used for selecting and/or controlling at oneOr a group policy rule of the flow on multiple alternative network.
In some embodiments, a network service uses control strategy (such as, network capacity managed service strategy)Use control strategy including for one or more service programs definition network service, be in single or multi-user's sightOr multiple devices or many groups device definition network insertion policing rule (such as family and enterprise plan), for one or more users orMany group users define network insertion policing rule, permission or do not allow network insertion event or trial, modulating network access eventsOr attempt number, network insertion event or trial are aggregated into a group of access event or trial, to network insertion event or tasteExamination carry out time windowing, based on the network insertion time or attempt the application that just servicing or function to network insertion event or attempt intoThe windowing of row time, network insertion time or trial are carried out time windowing to predetermined time window, to the network insertion timeOr attempt carrying out the time windowing measurement to network busy state time window in the range of, the access of distribution license typeTime or trial, allow network insertion event or the function of trial or application, the one or more network of distribution of distribution license connectDuration, definition network insertion event or trial are permitted in incoming event or the priority of trial, definition network insertion event or trialLicense speed, for network insertion event or attempt definition license network destination, for network insertion event or attempt definition permittedCan application, for one or more network insertion events or attempt definition QoS rule, for one or more application definitions or settingAccess strategy rule, for one or more network purposes definition or arrange access strategy rule, define for one or more devicesOr arrange access strategy rule, for one or more network service definitions or arrange access strategy rule, for one or more flowAmount type definition or arrange access strategy rule, for one or more QoS classes definition or arrange access strategy rule and based onAny combination definition of device, application, network destination, network service, discharge pattern, QoS class and/or other standards/measurementOr access strategy rule is set.
In some embodiments, network service uses control strategy (such as, network capacity managed service strategy) to includeFlow control policy.In some embodiments, flow control policy includes that flow-control is arranged.In some embodiments,Flow control policy includes flow-control/layer, and this flow-control/layer includes that flow-control is arranged.In some embodimentsIn, it is one or more that flow control policy includes in the following: block/allow arrange, throttling is arranged, adaptability throttling setsThe QoS class putting, including packet error rate arranges, shakes and postpones setting, queue is arranged and label is arranged (such as, in order to wrapSome traffic flow of labelling).In some embodiments, QoS class arranges include in the following one or more: throttling etc.The level priority queueing relevant to other device flows, time window parameter and ought be by flow accumulation or be aggregated to bigger stringKeep time in stream/serial data/packet/mono-group packet or postpone.In some embodiments, flow control policy includes makingThe filter (such as, use cascaded filter technology) being implemented in for index in different strategy setting lists, wherein strategy mistakeIt is one or more that filter includes in the following: network, service program, application, temporal information and network busy state.Such as, network busy state and/or temporal information can be used as the index entered in flow control policy, it is provided that a two dimensionPattern is implemented in flow-control, and (such as, the priority level of certain application can increase based on network busy state and/or temporal informationAdd or reduce).In some embodiments, flow control policy is for selecting network, until shape from the list of available networkBecome before the connection of an alternative network to block or reduction accesses and/or revises or a network stack of alternative connectsMouth provides the detection of the web socket interface message being given to application or OS function or discontinuous.
In some embodiments, control strategy is used to select flow-control to arrange based on network service.Implement at someIn scheme, use control strategy to implement flow-control on device based on network service and arrange.In some embodiments, institute is realThe flow-control executed arranges the flow/traffic flow controlling network capacity managed service.In some embodiments, based on followingOne or more selection flow-control in Xiang is arranged: temporal information, the some day in one week, special time/date (exampleAs, vacation or network operation time/date), network busy state and network service use the priority etc. of moving phase associationLevel and network service use the activity of the QoS class (such as, urgent flow) of moving phase association, network service from which network obtainsAccess, which network be available, which network network service is movably attached to, which base station network service is movably attached to orThe network relevant episode of communication channel and flow control policy (can be depending on service activity from which network obtain access and notWith) (such as, and/or as the described herein other standards/measurement).In some embodiments, flow-control arranges and includesOne or more in the following: allow/block, postpone, throttle, the enforcement of QoS class, queue, label, one user of generation are led toKnow, random back-off, removing with send received from network element content, keep as scheduled transmission timeslot, select from available networkNetwork and obstruction or minimizing access until establishing the connection of an alternative network.In some embodiments, baseNetwork capacity managed service priority state and network busy condition selecting flow-control in network service use activity are arranged.In some embodiments, network capacity managed service priority state based on network service use activity and network busy shapeState select flow-control arrange, and flow-control arrange for all-network capacity managed service activity be overall (such as,Identical), or based on network service use active priority, user preference or option selection, application, time-based standard,Service program, device or service activity obtain the network of access, after having adapted to a previously determined network busy stateNetwork congestion condition heavily determine and/or other standard/measurements described herein and different.
In some embodiments, network capacity managed service flow (such as, traffic flow) differentially controls, and is used forProtection network capacity.It is, for example possible to use various technology described herein and differentially control for the OS on device andThe various software upgradings of one or more application.As another example, safety/anti-malware software (such as, antiviral,Fire wall, content protecting, intrusion detect/prevent and/or other safety/anti-malwares) can use described herein respectivelyKind of technology and differentially control.Still as another example, it is possible to use various technology described herein and differentially controlNetwork backup/reflection, content download (such as, individually and/or polymerization ground more than a thresholding, as image, music, regardedFrequently, eBook content, e-mail attachment, content/media subscription, RSS/ news subscription, text/image/Video chat, softwareUpdate and/or other guide is downloaded).
Such as, the DAS technology for protecting network capacity described herein is used, it is possible to provide be used for protecting network capacityAdaptive strategy control.Can be generated, update, report and/or receive a network capacity managed service list by device, andStorage (service program that such as, this list can be associated with device based on adaptation) on the apparatus.If one is monitoredNetwork service use activity is not in list, then to network element, device can report that this institute monitors network service use activity and (such as, usesIn also exceeding the network service use activity monitored of certain thresholding, based on network busy state, according to time-based markStandard and/or other standards/measurement).As an example, if/when the network service use activity monitored is more than a numberAccording to usage threshold, (such as, every day, 50MB total data used, socket open frequency/rate, and the data at a time instant useSpeed, to the time, the more complicated thresholding of peak period, by content and time, by other parameter/thresholdings various) time,Monitored network service use activity can be reported.As another example, open based on network service usage behavior and/or applicationThe test of originator characterization input, can report monitored network service use activity.Report can include identifying that network service makesThe information of parameter is used with movable and various network services.
In some embodiments, notification strategy is used to select notice to arrange based on service.In some embodiments, logicalKnow that setting includes that user notifies to arrange (such as, as notified to arrange various users as described above) about Figure 18.
In some embodiments, activity classification is used to farther include to divide network service use activity network serviceOne or more in (such as, use a usage threshold filter and/or cascaded filter technology) multiple notice classifications of classThus for difference Network access control, thus protect network capacity.In some embodiments, by network service use activityClassification farther include to use network service activity classification in one or more network capacity managed service, wherein these netsIt is one or more that network capacity managed service includes in the following: application requires data network to access, application software updates, shouldWith requiring that the network information, application require GPS or physical location, operation system software update, security software update, networkIt is controlled that what backup, email download and one group were inputted based on service profiles and/or user is configured to network capacityThe behavior of service activity (such as, and/or various other kinds of network service use activity as the described herein, and such asNow will significantly to those of ordinary skill in the art).Such as, what network capacity managed service can include for OS and application is softPart renewal, the access of OS background network, cloud synchronous service, RSS subscribe to and the subscription of other background information, browser/application/device rowFor report, backstage email download, content subscription service update and download (such as, music/video download, news subscription),Text/voice/video chat client, safety update (such as, anti-malware updates), point-to-point working application updates,Restart frequently or invalid network insertion sequence during power down mode circulation, a large amount of download or other high bandwidths access andConstantly/repeatedly access network has a small amount of transmission to information or the greedy application program of request.Implement at someIn scheme, network capacity managed service list is static, adaptive, use service processor generation, from network element (exampleAs, service controller or service cloud) receive, receive from network element (such as, service controller or service cloud) and at least partlyGround is based on the device activity reports received from service processor, based on the behavior characteristics carried out by pretest, application developerChange report regular set and/or be based at least partially on user input.In some embodiments, the controlled clothes of network capacityBusiness list includes one or more network service activity backstage (QoS) class.
In some embodiments, the classification to network service use activity farther includes based in the followingOr multinomial network service use activity is classified: application or small routine (such as, Outlook, Skype, iTunes, peaceTall and erect (Android) Email, weather channel weather small routine, iCal, red fox (Firefox) browser etc.), application type(such as, user's application, system application/utility program/function/process, OS application/utility program/function/process, electronics postalPart, browser, small routine, Malware (such as virus or suspicious process), RSS subscription, device synchronous service, download application, netThe chat of network backup/imaging applications, voice/video, point-to-point content application or other point-to-point application, Streaming Media are subscribed to or broadcastReceive/transmit application, Web conference application, chat application or session and/or other any application or procedure identification or classification),OS/ systemic-function (such as, any system application/utility program/function/process and/or OS application/utility program/function/mistakeJourney, as OS updates and/or OS error reporting), modem feature, network communicating function (such as, Network finding or signaling,Ethernet type message, connect stream/crossfire/session establishment or dismounting, network authentication or authorization sequence, IP seismic acquisition andDNS service), URL and/or territory, destination/source IP address, agreement, discharge pattern, socket (such as, IP address, agreement and/Or port), socket addresses/label/identifier (such as, port address/port numbers), content type is (such as, under EmailLoad, e-mail text, video, music, e-book, small routine update crossfire and download crossfire), port (such as, portNumber), QoS classification grade, temporal information, peak or non-peak, network time, network busy state, the access network of selection, choosingService program, user preference, device voucher, user's voucher and/or the state selected, modem is restarted or power supply status changesChange, modem authentication process, modem link are set up or dismounting, modem management communication, modemSoftware or firmware renewal, modem power management message, installation's power source state and modem power supply status.?In some embodiments, the classification of network service use activity is farther included by the network service use activity classified withOne ID (such as, applying ID, it can be for example a unique number, name and/or signature) is associated.Implement at someIn scheme, the classification to network service use activity farther includes to use multiple sorting parameter to divide network service use activityClass, one or more including in the following: application ID, remote I P (such as, URL, territory and/or IP address), remote portMouth, agreement, content type, filter action class (such as, network busy state class, QoS class, temporal information, network busy state,And/or other standards/measurement) and the access network of selection.In some embodiments, to network service use activityClassification farther includes the combination using parameter as discussed above to determine the classification of network service use activity.
In some embodiments, the classification to network service use activity farther includes network service use activityBe categorized as network capacity managed service, non-network capacity managed service, obstruction or unallowed service and/or do not dividedThe service of class/identification (such as, unknown/classification of not being determined or the classification that waits).In some embodiments, whenDevice has been inactive (such as, or at power down mode) within a period of time, and application connects, OS connects and/or other servicesActivity be classified as network capacity managed service activity (such as, when user does not interacts within a period of time with it, whenAlso no display user's notification strategy and/or user's input are not received within a period of time and/or are entered power down mode for theyTime).In some embodiments, connect for more than one application when the network service use activity monitored has exceeded,OS connects and/or other service activitys, or connect for specific application a data usage threshold time (such as, poly-Close data and used more than data usage threshold), application connects, OS connects and/or other service activitys are classified as network and holdAmount managed service activity.In some embodiments, exceeded based on one or many when the network service use activity monitoredIndividual data use the predetermined list limited, and based on the list received from network element, use time restriction (such as,The a period of time limited is used based on having exceeded), and/or other use data of relevant standard/measurement based on someDuring usage threshold, application connects, OS connects and/or other service activitys are classified as network capacity managed service activity.OneIn a little embodiments, the classification of network service use activity is farther included based on network peak time, network busy state or lowThe network to device in certain performance rate connects and (such as, distributes based on these class standards various/other input/factorsHigher/lower priority), it is network capacity managed service that network service uses activity classification.
In some embodiments, one or more network capacity managed service with for one or more networks and/orOne different network insertion set of strategies of one or more alternative networks is associated.In some embodiments, oneOr multiple network capacity managed service with for one of one or more networks and/or one or more alternative network notSame notification strategy collection is associated.In some embodiments, the list of network capacity managed service is stored on device.At someIn embodiment, receive/be updated periodically network capacity managed service list from a network element, and store it in deviceOn.In some embodiments, the list of network capacity managed service includes network capacity managed service, the controlled clothes of non-network capacityBusiness (such as, foreground services or is not classified as the service of network capacity managed service based on various possible dynamic standards),And the unfiled collection of service is (such as, including waiting one or more networks based on the classification analyzed further and/or inputThe gray list of service activity, as from network element, service provider and/or user).In some embodiments, network capacity is subject toOne or more based in the following of control service list: predefined/preassigned (such as, network, service meterDraw, tested in advance and/or characterization by application developer) standard;Device auxiliary/monitoring based on device (such as, uses serviceProcessor);Network monitoring (such as, uses DPI gateway);The analysis of network assistance is (such as, based on DAS activity analysisDevice report).Such as, device can be to network service use activity (such as, the net of all monitoring of network element annunciator monitoringNetwork service use activity or subset based on configuration, thresholding, service program, network and/or user input).Real as anotherExample, the list of renewal is also sent to device by network element renewable network capacity managed service list.Still as another example, netUnit can be based on device and/or network service and use activity monitoring/report, carries out the network through multiple devicesThe statistical analysis of service activity.In some embodiments, network service use activity is defined as one activate application orProcess is (such as, mutual, such as pop-up and/or other standards/survey based on the user with device and/or network service use activityAmount).
In some embodiments, using various technology is that network capacity managed service implements flow-control.Real at someExecuting in scheme, device includes that a service processor agency or function intercept, block, revise, remove or replace UI message, lead toOther UI communication known or generated by network service activity, the movable network service of this network service use just controlled orManagement (such as, uses shown in Figure 12 and Figure 13 and the various measurement points of associated description).Such as, this technology can be used forThere is provided the Consumer's Experience improved (such as, in order to stop the most controlled application for protecting network capacity raw for userBecome message/alarm that is that repeat and/or that obscure).In some embodiments, replace or revise the network stack interface of device come forApplication or OS function or other functions/software provide the interception of web socket interface message or discontinuous.
In some embodiments, using various technology is that the network capacity managed service using DAS technology implements flowControlling, wherein network service use activity does not knows that network capacity control (such as, is not supported for implementing what network capacity controlledAPI or other interfaces).Such as, technology based on network service application message transmission interface can be used for implementing flow-control.ExampleNetwork service application message transmits interface and includes the following: network stack API, network service crossfire/stream interface, network stack APIMessage, ethernet type message, ARP message and/or other message transmission or other or similar technology, as now in view ofThis described each embodiment will be obvious to those of ordinary skill in the art.In some embodiments, based on flow controlSet of strategies processed or to be applied to network service movable and cause minimizing by service activity due to network capacity managed service strategyOr the service activity message of user's notice of amendment, select network service use activity control strategy or network service activity to disappearBreath.In some embodiments, based on flow control policy collection or owing to network capacity managed service strategy is applied to network clothesBusiness activity and cause the service activity message of the destruction of the minimizing of plant running, select network service use activity control strategy orNetwork service alive messages.In some embodiments, based on flow control policy collection or due to network capacity managed service planThe service activity message of the destruction of the minimizing being slightly applied to network service activity and cause network service activity to run, selects networkService use activity controls to measure or network service alive messages.In some embodiments, open/connect by interception/writeAnd be that network capacity managed service implements flow-control.In some embodiments, disappeared by interception stack API Quality or applicationBreath transport layer request (such as, socket opens/send request) is that network capacity managed service implements flow-control.Such as, instituteThe request intercepted can be replicated (such as, to memorizer) and queues up (such as, postpone or throttle) or terminate (such as, resistancePlug).As another example, the request intercepted can be copied to memorizer and the part transmitted subsequently can be from memorizerRecover and refill (such as, throttling).Still as another example, feasible interior parsing also allows transmission (such as, it is allowed to) to blockCut message and transmit transmission, and transmission or part transmission can be copied to memorizer for flow flow point class.Real at someExecute in scheme, by intercepting or controlling or modulation UI notice, implement flow-control for network capacity managed service.Implement at someIn scheme, movable by inactivation or suspection network service, implement flow-control for network capacity managed service.Some embodiment partyIn case, by the one or more processes being associated with service activity being gone priorization (such as, priorization is gone in CPU scheduling), forNetwork capacity managed service implements flow-control.
In some embodiments, it is transmitted as not knowing the net that network capacity controls by artificial network API messageThe network capacity managed service using DAS technology of network service use activity is implemented flow-control and (such as, is effectively provided oneIndividual personation or artificial network API).Such as, artificial network API can intercept, revises, blocks, remove and/or alternative networks socketWord application interface message and/or ethernet type message (such as, EWOULDBLOCK, ENETDOWN, ENETUNREACH,EHOSTDOWN、EHOSTUNREACH、EALRADY、EINPROGRESS、ECONNREFUSED、EINPROGRESS、ETIMEDOUT and/other these type of message).As another example, artificial network API can revise, exchanges and/or injectWeb socket application interface message (socket (socket ()), connect (connect ()), read (read ()), write (write ()),Close (close ()) and other this type of message), these web socket application interface message provides movable for network serviceThe control of service usage behavior or management.Still as another example, (such as, open at socket allowing connection to openBefore), transmission or initiate before stream/crossfire, it is to block and sent back by a piece of news application (such as, in response to synchronizing to askAsk or apply it will be appreciated that and can intercept thus indicate network insertion attempt do not allow/blocked, network is unavailable and/or afterReplacement message for the another a piece of news that the network insertion asked again attempts to).Still as another example, set can be allowedConnect word open but after sometime (such as, based on network service use, network busy state, time-based standard,And/or some other standards/measurements), crossfire is blocked or socket is terminated.Still as another example, can implement based onThe flow control technique (such as, in non-peak period, non-network busy state time) of time window, as by permitting within a period of timePermitted network insertion, at a period of time internal congestion, and repeat subsequently the most effectively by network insertion or the most randomly or definitivenessBlaze abroad.Use these technology, it is not known that the flow-control controlled based on network capacity can send and accept standard messageTransmit application and device can based on network capacity control strategy use network service use activity (such as, application or OS orSoftware function) it is appreciated that and will be with the most predictable mode of one (as now the most obvious to those of ordinary skill in the art)The message transmission carrying out responding is to implement flow-control.
In some embodiments, using various technology is that the network capacity managed service using DAS technology implements flowControlling, wherein network service use activity knows that (such as, network service uses Activity supporting to be used for implementing net in network capacity controlThe API of network volume control or other interfaces).Such as, network insertion API as the described herein can be used for as network capacity controlledFlow-control is implemented in service.In some embodiments, API assists one or more following communications: network insertion condition,Individual or multiple networks or alternative network of network busy state or network availability state, one or more network capacity are controlledService strategy (such as, network service can be that current network accesses and arranges, as allowed/block, throttle, queuing up, scheduling time/Time slot and/or postponement, these can be based on such as current network, current network busy state, time-based standard, service meterDraw, network service classification and/or other standards/measurement), from the movable network insertion request of network service, to network serviceMovable inquiry/polling request, the network insertion mandate that network service is movable (such as, is arranged and/or network including priorityThe classification of capacity managed service, scheduling time/time slot, alternative network and/or other standards/measurement), network busy stateOr network availability state or network QoS state.
In some embodiments, use various technology be use network assistance/network of network technology holdsAmount managed service implements flow-control, and wherein network service use activity does not knows that network capacity control (such as, is not supported to be used forImplement API or other interfaces that network capacity controls).In some embodiments, technology based on DPI is used for controlling network appearanceAmount managed service (such as, DPI gateway block or throttle network capacity managed service).
In some embodiments, use various technology be use network assistance/network of network technology holdsAmount managed service implements flow-control, and wherein network service use activity knows that network capacity control (such as, is supported to be used for implementingThe API of network capacity control or other interfaces).In some embodiments, application/message transfer layer is (such as, as retouched at thisNetwork AP I stated) for communicate with network service activity provide the network capacity managed service classification being associated and/orPriority, one or more network or alternative network of network busy state information or network availability, network insertion pleaseSummation response and/or as this similarly described in other standards/measurement.
In some embodiments, for protecting the DAS of network capacity to include, based on network service use activity be differenceA service program (such as, including network capacity managed service) is implemented in charge.In some embodiments, service program includesDifferential charge to network capacity managed service.In some embodiments, service program includes for the controlled clothes of network capacityOne upper limit network service of business uses.In some embodiments, service program includes that when exceeding this upper limit is led toKnow.In some embodiments, service program includes the excess of rates when exceeding this upper limit.In some embodiments, clothesBusiness plan includes revising charge based on user's input, and (such as, as described in this, user rewrites selection, the most such as, exceeds the quataCharge for network capacity managed service and/or be different based on priority level and/or based on present access network).?In some embodiments, service program include the time-based standard to network capacity managed service limit (such as, have orNot there is the temporal information restriction rewriteeing option).In some embodiments, service program includes network capacity managed serviceStandard based on network busy state limit (such as, with or without rewrite option).In some embodiments, servicePlan offer is used for rewriteeing (such as, once, time window, usage amount or permanent) network service activity and controls (such as, for rewriteeingDifferential charge, for rewrite difference cover, use UI based on action notice option rewrite and/or use UI rewriting is set).?In some embodiments, service program includes family planning or multi-user's plan (such as, different network to different usersCapacity managed service is arranged).In some embodiments, service program includes that the plan of many devices is (such as, to different devicesDifferent network capacity managed service plans, such as smart phone v. laptop computer v. net book v. e-book) implement at someIn scheme, it is free that service program includes for some time in one day, network busy state and/or other standards/measurementNetwork capacity managed service use.In some embodiments, service program includes that the network controlling network capacity is correlated withCharge.In some embodiments, service program includes the network preference/priorization controlling network capacity.Implement at someIn scheme, service program includes arbitrating charging, is to be supplied to connecing of destination, application or other network capacity managed serviceEnter operator partners or service partner's charging of being supported.In some embodiments, service program includes arbitrating charging,It is that the access being supplied to destination, application or other network capacity managed service is to application developer charging.
In some application scenario, extra network capacity requirements can be changed by the modem power supply status on deviceCause.Such as, application or OS function be that any reason attempts to connect to network (wherein when modem is at power down modeModem is not connected to network) in the case of, modem can be caused to change power down mode, reconnect to netNetwork and subsequently initiation application network connect.In some cases, this can also result in network and again initiates a modulation /demodulationDevice connects session (such as, PPP session), and in addition to fundamental modulation demodulator connects the network capacity consumed, this modem is evenConnect session also consumption of network resources for setting up PPP session.Therefore, in some embodiments, implement limit or control application,OS function and/or other network service use activities (such as, network capacity managed service) change modem power supply and controlThe network service use activity control strategy of the ability of state or network connection state.In some embodiments, until arrivingOne given time window just stops or limits a service use activity and wakes up modem up, changes the electricity of modemSource state or cause modem to be connected to network.In some embodiments, limit permission one service use activity to call outWake up modem, change the power supply status of modem or cause the frequency of modem.In some embodimentsIn, until elapsed time delay just stops a service use activity to wake up modem up, change the electricity of modemSource state or cause modem.In some embodiments, until multiple network services use Operations Requirements modulation /demodulationBefore this type of of device state changes or until network service use activity polymerization is increased network capacity and/or Internet resources makeJust stop a network service use activity wake up modem, the power supply status changing modem up or draw by efficiencyPlay modem.In some embodiments, the power supply status of network service use activity change modem is limitedAbility includes not allowing activity to be shut down by modem, modem being placed into sleep pattern or disconnects modulation /demodulationDevice is to the connection of network.In some embodiments, wake up modem up, change the power supply status of modem or drawPlay modem and be connected to these restrictions of network of network service use activity by (such as, the service control of central network functionDevice processed or other network element/functions) ipsec communication arranges modem.In some embodiments, these power supplys control shapeState strategy is by this central network function renewal.
Figure 24 depicts the figure of a network capacity protection system 2400 using device assistant service (DAS).System2400 include that wireless device 2402-1 to 2402-N (collectively known as wireless device 2402), wireless network 2404-1 arrive2404-N (collectively known as wireless network 2404), 2406, network service of a network traffic analysis engine use and divideClass engine 2408 and a difference Network access control engine 2410.
Wireless device 2402 by minimum include a processor, memorizer (although memorizer may be implemented in processor),One broadcasting equipment and a broadcasting equipment interface are (although broadcasting equipment interface can be as nothing" a part of " of line electricity broadcasting equipment and implement).In order to make wireless device 2402 useful, they will typically have at least oneInput equipment and at least one output device, if can apply, including input and output interface.
Wireless device 2402 can be implemented as station.Station can be referred to as having medium education as used in this(MAC) address and the device of physical layer (PHY) interface to the wireless media observing such as IEEE 802.11 standard.When withStation, when the compatibility of IEEE 802.11 standard is intended to clear and definite, can be described as " compatible IEEE 802.11 ".(that is, deviceAt least one part as mentioned as IEEE 802.11 standard.) it will be recognized by those of ordinary skills nowWhat and IEEE 802.11 standard convertible time IEEE 802.11 standard include, and if being made that applicatoryChange, the compatible technology of future version with IEEE 802.11 standard that will expect that application is described herein as.By quotingBy ieee standard 802.11TM-2007 (revised editions of ieee standard 802.11-1999) are combined in this.Also by quoting IEEE802.11k-2008、IEEE 802.11n-2009、IEEE 802.11p-2010、IEEE 802.11r-2008、IEEE802.11w-2009 and IEEE 802.11y-2008 is combined in this.
In alternative embodiment, device 2402 one or more observe a certain other standards or entirely withoutStandard, and the different interface can having to wireless or other mediums.It should be noted that, not every standard all will be without traditional thread bindingPut and referred to as " stand ", but the place of this term used herein, it should be understood that and an analogue unit will be presented on all ofOn applicable wireless network.So, the use that term " is stood " is not construed as wireless device is described as station by oneThe scope of embodiment be limited to a standard using this term significantly, unless this type of is limited in the context of discussionIt is suitable.
Wireless network 2404 will typically comprise a networked unit (IWU), and this networked unit will be wirelessThe wireless device on a related radio network in network 2404 is mutually connected to another network, such as wired lan.SometimesIWU is referred to as WAP (WAP).In IEEE 802.11 standard, WAP is also defined as station.So, stand can make non-WAP station or WAP station.In cellular networks, WAP is commonly referred to as base station.
Wireless network 2404 can use any applicable technology implementation, and these technology are by network type or in its other partyFace and different.Wireless network 2404 can have any suitable size (such as, Metropolitan Area Network (MAN) (MAN), personal area network (PAN)Deng).Broadband wireless MAN may or may not be compatible with IEEE 802.16, and this is incorporated herein by reference.Wireless PAN canWith or can not be compatible with IEEE 802.15, this is incorporated herein by reference.Wireless network 2404 can be recognizable, by network type (such as, 2G, 3G, WiFi), service provider, WAP/ base station identifier (such as, WiFi SSID, baseStand and sector ID), geographical position or other criterion of identification.
Wireless network 2404 may or may not be linked together by go-between.This go-between almost can include appointingThe communication network of what type, as by way of example but be not limited to the Internet, PSTN (PSTN) or infrastructure network(such as, privately owned LAN).Term " the Internet " refers to the network being made up of multiple networks as used herein, and this network makesWith some agreement such as ICP/IP protocol, and other agreements are such as used for forming the HTML of WWW (net) possibly(HTML) HTML (Hypertext Markup Language) (HTTP) of file.
In the example of Figure 24, network traffic analysis engine 2406 is connected on wireless device 2402-1.At one especiallyEnforcement in, network traffic analysis engine 2406 is implemented on the server, and is connected through the internet to wireless device 2402-On 1.But, can being alternately implemented at least partially on wireless device 2402-1 of network traffic analysis engine 2406,With or without the connection to server, this server includes another part (such as, clothes of network traffic analysis engine 2406Business device part).
As used in this article, engine includes server that is special or that share, and typically comprises by serverThe firmware performed or software module.Depending on implementing specific or other considerations, engine can be to concentrate or its functional pointCloth.Engine can include specific hardware, firmware or the software being included in computer-readable medium, for being performed by processor.As used in this article, computer-readable medium is intended to include legal (such as, in the U.S., under 35U.S.C.101) instituteThere is a medium, and especially to get rid of be substantially that non-legal all mediums are (in this eliminating for including that computer-readable medium is to haveThe claim of effect is in required degree).Known legal computer-readable medium include hardware (such as, depositor, withMachine accesses memorizer (RAM), non-volatile (NV) memorizer, only enumerates several at this), but may or may not be limited to hardPart.
The subset of the flow between wireless device 2402-1 and source or destination analyzed by network traffic analysis engine 2406.The flow analyzed may or may not be limited to network segment, as between cell phone and base station.Network traffic analysis engine2406 can be that a device subset in wireless network 2404-1 coverage analyzes flow.The flow analyzed can or canTo be not limited to user.
In the example of Figure 24, network service uses classification engine 2408 to be connected to network traffic analysis engine 2406.?In one special enforcement, network service uses classification engine 2408 to implement on the server, and this server may or may notIt it is the identical server implementing network traffic analysis engine 2406 thereon.But, network service uses classification engine 2408Can alternately be implemented at least partially on wireless device 2402-1, with or without the connection to server, shouldServer includes that network service uses another part (such as, server section) of classification engine 2408.
Network service use classification engine 2408 can be (such as, right based on that asked service or required service classWords, streaming media, mutual, backstage or some other service classes) flow is sorted out.This classification assists to give at oneThe identification of the snapshot that the service class fixed time uses, and in some implementations, (such as, make future service based on this snapshotClass use the most a little to the service class of the snapshot relevant hypothesis of use), historical data analysis (such as, some in a dayThe service class of some day in time/mono-week uses), the making for assisting not of the identification of trend or some other Predicting TechniquesService the prediction that class uses.
In the example of Figure 24, difference Network access control engine 2410 is connected to network service and uses classification engine 2408On.In a special enforcement, Network access control engine 2410 is implemented on the server, and this server may or may notIt is to implement network traffic analysis engine 2406 and/or the identical server of network service use classification engine 2408 thereon.But, can being alternately implemented at least partially on wireless device 2402-1 of Network access control engine 2410, haveOr not there is the connection to server, this server includes another part (such as, server of Network access control engine 2410Part).
Difference Network access control engine 2410 uses the clothes predicted using classification engine 2408 from network serviceBusiness class makes for dynamically adjusting the resource being assigned to service class.Such as, difference Network access control engine 2410 can takeBusiness class availability assessment determines whether the service class capacity for the service class on channel uses for the service predictedIt is sufficient, and if to service class availability and use for the service predicted be insufficient, then add resource, if orIt is excessively sufficient that service class availability uses for the service predicted, then reduce resource.
Alternately, difference Network access control engine 2410 can replace or additionally control the application on device, thusMake to apply and change service service rating or postpone the consumption of Radio Resource (such as, by postponing software upgrading until moreResource is made available by).In one embodiment, on wireless device 2402-1, service implementation uses control strategy.At someIn situation, this can be that the required application ensureing that wireless device 2402-1 adjustable is usually fixed is arranged, based on networkBusy state optimizes network service and uses activation (such as, if network is busy), controls the renewal of aerial downloaded software, throttlingBe badly in need of resource application, management from repeat power down mode network service use request, keep PPP session activation or withOther modes are assisted to service class dynamically and are adjusted or other device behaviors.
In a special enforcement, user can be encouraged by such as changing service to the charge of higher service class is moreClass.Difference Network access control engine 2410 can be that service class sends differential charge notice.Alternately, charge can pass through userAccount setup or preference are implemented.
In the example of Figure 24, being in operation, network traffic analysis engine 2406 is analyzed from one or more devicesFlow, including wireless device 2402-1.Network service uses the stock number needed for classification engine 2408 prediction service class, and poorOther Network access control engine 2410 adjusts for one or more devices based on basis as required dynamically Resources allocationIt it is available service class and/or for the subset adjusting apparatus behavior of one or more devices or indicate the son of one or more deviceCollection carrys out adjusting apparatus behavior, so that device is according to the Access Control plan of the resource being suitable to assigned applicable service classSlightly consume service class specific resources.
Figure 25 depicts the figure of the example of a difference Access Control notice system 2500.In the example of Figure 25, system2500 include that a network service uses 2502, network service of analysis engine to use 2504, difference net of classification engine2506, network service of network Access Control engine uses control strategy data to store 2508, network service and uses notice2510, user interface 2512 of engine and a service program update engine 2514.
In the example of Figure 25, network service uses analysis engine 2502 to analyze network service use activity.This analysis canIncluding to the flow being sent to or sending from device, the application run on device, to the analysis of request serviced, or mistakeGo, currently or useful other that use of future network service are analyzed.Such as, network service use activity can include oneTrial, execution network service activity or network service use activity that application is downloaded or is loaded on communicator are attempted accessingThe trial of network, meet or exceed a network service usage threshold, meet a network service and use prerequisite, to networkThe renewal of capacity managed service activity classification list, to the renewal of a network capacity managed service strategy and be sent to dressPut the internet message of trigger notice, list some by way of example.Analysis can occur at non-WAP station, WAP or base station, serverOn, or partly on one of these devices or some other devices.
In the example of Figure 25, network service uses classification engine 2504 to be connected to network service and uses analysis engine2502.Network service uses classification engine 2504 to be used by the network service analyzed and is categorized into one or more service class.PointClass can occur on non-WAP station, WAP or base station, server, or partly on one of these devices or some other devices.
In the example of Figure 25, difference Network access control engine 2506 is connected to network service and uses classification engine 2504On.Difference Network access control engine 2506 uses and uses the service class of moving phase association with network service and be stored in network clothesMake suring uses control strategy service class to determine network access parameters with the network service in control strategy data storage 2508.DetermineCan occur on non-WAP station, WAP or base station, server, or partly on one of these devices or some other devices.NetNetwork service uses control strategy data storage 2508 to may be implemented on wireless device, but remotely maintains data storage relevant to deviceAlso it is possible (such as, on the server).In a special enforcement, even if remotely maintaining network service to use control planSlightly data storage 2508 is relevant to wireless device, and wireless device will still be implemented network service and use control strategy.
Data can be implemented store such as, as being included in the physical computer readable medium in general or particular machine, solidIn part, in hardware, in a combination thereof or the applicable known or software in device or system easily.Number in this articleIt is intended to include any tissue of data, including form, the file of comma separated value (CSV), traditional database (such as, according to storageOr other applicable known or organized formats easily SQL).The assembly being associated with data storage is (as data base connectsMouthful) " a part of ", a part for some other system assemblies or a combination thereof that data store can be considered, although depositing with dataThe physical location of assembly that storage is associated and other features are for being not crucial in the understanding of techniques described herein.
Data storage can include data structure.As used in this article, data structure is stored up at calculator memory with oneAnd organize the special mode of data to be associated, so that it can be effectively used in given context.Data structure is led toOften based on the computer ability extracting and storing data Anywhere in its memory, by an address, can be by himselfThe Bit String being stored in memorizer is specified and by Programming.So, some data structures are based on using arithmetic operator to calculateThe address of data item;And other data structures are based on storing data items addresses in structure self.Many data structures use thisTwo kinds of principles, sometimes combine in non-trivial mode.The enforcement of data storage usually requires that write batch processing, and these programs are createdBuild and manipulate the example of this structure.
In the example of Figure 25, network service uses notification engine 2510 to be connected to difference Network access control engine 2506And network service uses in control strategy data storage 2508.Network service uses notification engine 2510 to be configured to generate enoughOne notice of the Access Control information that instruction is relevant.Such as, notice may indicate that what network service use activity is that network holdsAmount managed service, the type of network service strategy that one or more network capacity managed service are come into force, a network serviceActivity belongs to the notice of a network capacity managed service classification, a service being classified as the classification of network capacity managed serviceIf movable this service class of notice that this classification can be made to change changes in order to this network service is movable, the network clothes being associatedBusiness cost of use will change, service program upgrading/demote a preferential and discount offered and/or service program of awardIndulgence, thus respond one or more user notice, list some by way of example.
Notice or can also may not include a user preference and selects.Such as, notice can include that a configuration is by oneNetwork service uses control strategy and network service to use moving phase association, for selecting network service to use control strategyRewrite option, select service use the amendment option of control strategy and select the selection option of a new service program, logicalCross citing and list some.Other examples include believing for the network service use activity of one or more network capacity managed serviceBreath, the network service predicted for one or more network capacity managed service use action message, more for obtainingThe option of information of network service use, this network service use activity about this network service use activity may result in and exceedMessage that the network service of one thresholding of one service program being associated with this device uses, check or select one can replaceThe option of the service program in generation, confirmation request and submit the option of this confirmation request to, list some the most again.
In the example of Figure 25, user interface 2512 is connected to network service and uses on notification engine 2510.It may be noted thatNotice (such as, when user's instruction should automatically select maximum performance or least cost) can be processed by counsel user preference.But, unless user preference is set to acquiescence, user is likely to make notice show in UI 2512.Notice can be oneKind applicable known or form easily, such as SMS, Email, pop-up window or similar.In the degree of license response,User can use the input equipment (not shown) input response to notice.
In the example of Figure 25, service program updates engine 2514 and is connected to UI 2512.As mentioned previously, becauseThe user preference that the determination such as provided in notice selects, UI can be skipped.Make in any case and notify the selection that is associated,Service program updates the renewable service program of engine 2514, network service uses control strategy, user preference or according to this selectionOther parameters.If generation expense, service program updates engine 2514 and can also update charging.
Figure 26 depicts the example of a computer system 2600 that may be implemented in technology described herein thereon.MeterCalculation machine system 2600 can be a conventional computer system that can be used as client computer system, such as wireless client orWork station, or server computer system computer system 2600 includes a computer 2602, I/O device 2604, Yi JiyiIndividual display device 2606.Computer 2602 includes 2608, communication interface 2610 of a processor, memorizer 2612, displayController 2614, nonvolatile memory 2616 and I/O controller 2618.Computer 2602 may be connected to or include that I/O fillsPut 2604 and display device 2606.
Computer 2602 is connected with external system by communication interface 2610, and this communication interface can include a modulation /demodulationDevice or network interface.Will be appreciated that device interface 2610 can be considered to be a part or the computer of computer system 2600The part of 2602.Communication interface 2610 can be analog modem, isdn modem, a cable modulation demodulation of lineDevice, token ring interface, satellite transmission interface (such as " direct PC ") or calculate for a computer system being connected to otherOther interfaces of machine system.
Processor 2608 can be that such as one conventional microprocessor such as Intel (Intel) Pentium (Pentium) is micro-Processor or Motorola (Motorola) power PC (power PC) microprocessor.Memorizer 2612 is by a bus 2670It is connected to processor 2608.Memorizer 2612 can be dynamic RAM (DRAM) and may also include static RAM(SRAM).Processor 2608 is connected to memorizer 2612 by bus 2670, and also is connected to nonvolatile memory 2616, arrivesDisplay controller 2614 and to I/O controller 2618.
I/O device 2604 can include a keyboard, disc driver, printer, a scanner and other input andOutput device, including mouse or other pointing devices.Display controller 2614 can control display device 2606 with usual mannerOn display, this display can be such as cathode ray tube (CRT) or liquid crystal display (LCD).Display controller 2614With the technology implementation that I/O controller 2618 can use conventional well known.
Nonvolatile memory 2616 is typically disk, CD or the another form of memorizer for big data quantity.Some of these data often write memorizer by direct memory access process the software of computer 2602 term of execution2612.Those of ordinary skill in the art will would readily appreciate that term " machine-readable medium " or " computer-readable medium " includeAny kind of storage arrangement, this storage arrangement is that processor 2608 can be accessed by and also include the load of encoded data signalRipple.
Computer system 2600 is to have an example of the possible computer system of the many of different framework.Such as, basePersonal computer in Intel (Intel) microprocessor often has multiple bus, these buses one of them can be oneBar is for the I/O bus of ancillary equipment, and is that the bus that processor 2608 is directly connected to memorizer 2612 (is generally claimedMake memory bus).These buses are by carrying out the bridge assembly of any required conversion due to different bus protocols evenIt is connected together.
Network computer is another type of computer system, and it may be incorporated in this teaching provided and uses.NetworkComputer does not the most include hard disk or other mass storages, and executable program is loaded into from a network connection and depositsReservoir 2612 is for being performed by processor 2608.Network television system known in the art is also considered as a department of computer scienceSystem, but it can lack some of feature shown in fig. 26, such as some input or output device.One typical computerSystem will generally include at least one processor, memorizer and memorizer be connected to a bus of processor.
It addition, computer system 2600 is by operating system software control, this operating system software includes a file managementSystem, such as hard disk operation system, this document management system is a part for operating system software.There is its file pipe being associatedOne example of the operating system software of reason systems soft ware is known as covering the Microsoft in city from Washington state Randt'sMicrosoft operation system family, and the file management system being associated.There is its file management being associatedAnother example of the operating system software of systems soft ware is (SuSE) Linux OS and the file management system being associated thereof.Literary compositionPart management system is typically stored in nonvolatile memory 2616, and causes processor 2608 needed for performing operating systemVarious actions, with input and output data and store data in memory, be included on nonvolatile memory 2616Storage file.
Figure 27 depicts the figure of system 2700 example for applying specific difference Network access control.At Figure 27Example in, system 2700 includes that network service consumption applies 2702, network service to use analysis engine 2704,Individual application behavioral data stores 2706, network service and uses 7708, application traffic priorization engine of classification engine2710, a network service uses 2714, one, control strategy data 2712, difference Network access control engine of storage to answerWith 2716, application traffic rewrite engine 2718 of flow buffering and a network interface 2720.System 2700 is intended to representOne concrete enforcement of the technology being previously described herein as, for illustration purposes.These technology may be used on one can, there is the motivation for these devices to control network service in application known or easily (wired or wireless) deviceUse.
In the example of Figure 27, network service consumption application 2702 is the application being implemented on device.A phaseIn the use hoped, this application is the software application being at least partially stored in the memorizer on wireless device, although kernelGrade instruction can be embodied as firmware or even hardware.According to the known use of those terms, this application is referred to alternatively as " RUN "On device or be just " to be performed " by device.Known wireless media has more bandwidth and limits, and this is why wireless deviceIt is a use expected, although this technology can may be used on non-wireless means in some sight.
In the example of Figure 27, network service uses analysis engine 2704 to be connected to network service consumption application 2702.NetNetwork service uses analysis engine 2704 to analyze the flow from network service consumption application 2702, and is stored by related dataIn application behavioral data storage 2706.Data can include all flows sent by application, or the subset of flow (such as, hasCertain QoS classification or priority, high resource consumption that the frequent transmission come with self-application causes, be sent to one especiallyDestination etc.).Data may also include the flow received for application.Application behavioral data storage 2706 can be alternativeGround or be otherwise embodied as the storage of traffic sources/destination data, if difference Access Control be source based on flow and/orDestination, it can be valuable.Application behavioral data storage 2706 includes data structure (such as, the note representing dataRecord), these data use to be implemented specific granularity and organizes.Such as, data-interface can represent frame (L2), packet (L3) orMessage.(it may be noted that be commonly used term " packet " data acquisition system that refers to not be restricted to L3.Granularity needed for) is desirableCertainly use where analysis engine 2704 is in network service.The data structure whether elapsed time and change and (such as, change and oneThe data that individual record is associated), due to record aging and replace or be maintained historical data be also implement specific.
In the example of Figure 27, network service uses classification engine 2708 to be connected to network service and uses analysis engine 2704And application behavioral data storage 2706.Network service uses classification engine 2708 classified and stored to store at application behavioral dataFlow in 2706, based on such as network type, temporal information, connection charge, whether local or roaming, network busy state,Whether QoS and special service use activity be on the mutual foreground of user or on the mutual backstage of user or from network serviceUse other features analyzed or obtained by other means.Classifying rules can include such as checking in the following one orMultinomial generation within one specific period the most: user is mutual with this device, user hands over this service use activityMutually, user has picked up this device, use activity UI content is in the foreground of this device UI, this service use activity is broadcast in serviceBefore a certain amount of data have been transmitted in playback frequency or video information, this service use activity, service use activity is in or be not in oneIn platform or background service list.Defining the rule which service use activity classification is such as background service use activity can beThat user selects, service provider is arranged or by some other applicable means.
Advantageously, network service uses analysis engine 2704 can check a special service use activity, and networkService uses classification engine 2708 to can determine that whether this particularly service use activity meets and one or more this particularly takenMake sure with the set that campaign definitions is the such as classifying rules of background service use activity.
In the example of Figure 27, application traffic priorization engine 2710 uses and is stored in network service use control strategy numberAccording to the strategy in storage 2712 determine for and/or from flow suitably preferential of network service consumption application 2702Change.Priorization can make system 2700 trim network service can consume the amount of network resources that application 2702 consumes, or Internet resourcesConsumption rate.This control strategy can need should be for the network resource consumption that throttles, the use etc. of forbidding some Internet resources applied.
Advantageously, application traffic priorization engine 2710 can determine that a special service with a special featureUse activity, as used activity as background service.This can include checking whether to meet a condition.
In the example of Figure 27, difference Network access control engine 2714 is connected to application traffic priorization engine 2710 HeNetwork service uses in control strategy data storage 2712.Difference Network access control engine 2714 causes network service consumption to answerQueue up in application traffic caching 2716 with 2702 flows.If (need not throttling to follow control strategy, certain flow is notNeed except typically caching Anywhere, as in output buffer.) application traffic caching 2716 is intended to represent a realityExecute at output buffer or the caching on the top of other standards buffer storage, and made by difference Network access control engine 2714It is used for assisting to control " rogue " apply, have the application of Deviant Behavior or must otherwise be controlled to meet control planApplication slightly.
Advantageously, when meeting a condition (as when servicing use activity and being a background activity), difference network connectsEnter to control engine and can limit particularly service movable network insertion on probation.
In the example of Figure 27, application traffic rewrite engine 2718 be connected to difference Network access control engine 2714 andApplication traffic caching 2716.Application traffic rewrite engine 2718 enables user or device to run counter to control strategy.This type of is run counter to canPointed out by the notice such as encouraging indulgence or expense.
In an illustrative example, the chat to the application of a running background of device 2700 clog needle, this application is justAttempt annunciator or user behavior.Application traffic priorization engine 2710 determines that this chat has zero priority, so thatStop the network service consumption application 2702 any resource of consumption.One can be sent by application traffic rewrite engine 2718 to user to lead toKnowing, its control strategy forbids applying consumption of network resources, but if the user desired that the resource by being consumed is paid, they are optionalSelect and run counter to control strategy.If the user desired that for resource pay, can by network interface 2720 from application traffic caching 2716 withCertain speed transmitted traffic, or application traffic caching 2716 transmission may not be used.
As another illustrative example, application traffic can be identified as software upgrading by device 2700.Difference network insertionControl engine 2714 to can determine that and can receive software upgrading (may even sort out slower than minimum QoS) with throttle rate.ShouldCan be from user with flow rewrite engine 2718, from user preference, service provider arranges or renewal can be a special application(or being all application) is ignored the analog of control strategy and is received an instruction.
Advantageously, control strategy can be set up a priority and to communicate with the element of caching, arranges minimum renewal frequentlyRate, it is provided that control strategy rewrites (typically for pay), or the like finely tune difference network access control policy.This can makeSystem 2700 can encourage some behavior, as sent low QoS flow amount when it is less expensive (such as, when network does not have busy shapeDuring state, in one day during the history low use time, when on the network such as WiFi of certain type, as contrary with another such as honeybeeDuring socket, etc.).
In terms of the algorithm of the operation of the data bit in computer storage and symbolic notation, present detailed descriptionSome parts.These algorithmic descriptions and represent be data processing field technical staff use instrument with more effectively by itJob content is communicated to others skilled in the art.Here, having an algorithm is considered as normally that a generation is wishedHope the self-congruent sequence of operations of result.These operations are those operations of the physical manipulation of requirement physical quantity.Generally, althoughUnnecessary, these numerical value uses the shape of the electrical or magnetic signal that can store, transmit, combine, compare or otherwise manipulateFormula.This be proved to sometimes (mainly due to the reason of public use) relate to as bit, numerical value, element, symbol, character, term,Numeral or these similar etc. signals are convenient.
However, it should be understood that all these and similar terms can be associated with suitable physical quantity and is only applicationConvenient label to these numerical value.Unless otherwise specifically stated from following discussion, it should be understood that in this manual,The content of the discussions utilizing term such as " process " or " computing " or " calculating " or " determination " or " display " etc. refers to computer systemOr physics (electronics) amount that manipulation is shown as in the RS of computer system with map table is expressed as to similarThe similar electronics of other data of computer system memory or depositor or the storage of other this type of informations, transmission or display deviceCalculate action and the process of device.
In some embodiments, the present invention is also relevant to for carrying out the device of operation in this.This device can be specialGround constructs for required purpose, or it can include or weight selectively activated by a computer program of storage in computerOne general purpose computer of configuration.This type of computer program is storable in computer-readable memory medium, such as, but not limited to,Read only memory (ROM), random access storage device (RAM), EPROM, EEPROM, magnetically or optically card, any kind of hard disk (includeFloppy disk, CD, CD-ROM and magnetooptical disc) or any kind of medium being suitable for storing e-command, and eachIt is connected to computer system bus.
The algorithm represented at this and display are not inherently related to any special computer or other devices.Various logicalCan be used by program according to teaching in this by system, or it is provable, and to be conveniently constructed more special device required to carry outMethod step.Will occur from description below for the structure needed for this type of system multiple.It addition, the present invention does not joinsAppoint by examination what specific programming language and describe, and therefore each embodiment can use multiple programming language to implement.
Although in order to understand purpose clearly, aforesaid embodiment having been had been described in considerable detail, the present invention does not limitMake in the details provided.There is the many alternative mode implementing the present invention.Disclosed embodiment is schematicRather than it is restrictive.