Movatterモバイル変換


[0]ホーム

URL:


US9271188B2 - Dynamic in-band service control mechanism in mobile network - Google Patents

Dynamic in-band service control mechanism in mobile network
Download PDF

Info

Publication number
US9271188B2
US9271188B2US13/718,815US201213718815AUS9271188B2US 9271188 B2US9271188 B2US 9271188B2US 201213718815 AUS201213718815 AUS 201213718815AUS 9271188 B2US9271188 B2US 9271188B2
Authority
US
United States
Prior art keywords
service
policy
packet header
service control
control parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US13/718,815
Other versions
US20140169172A1 (en
Inventor
Qingmin Hu
Gus Bourg
Terry Figurelle
Jie McKnight
Jeffrey Dean Hjort
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Intellectual Property I LP
Original Assignee
AT&T Intellectual Property I LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AT&T Intellectual Property I LPfiledCriticalAT&T Intellectual Property I LP
Priority to US13/718,815priorityCriticalpatent/US9271188B2/en
Assigned to AT&T INTELLECTUAL PROPERTY I, L.P.reassignmentAT&T INTELLECTUAL PROPERTY I, L.P.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BOURG, GUS, FIGURELLE, TERRY, HU, QINGMIN, MCKNIGHT, JIE
Publication of US20140169172A1publicationCriticalpatent/US20140169172A1/en
Assigned to AT&T INTELLECTUAL PROPERTY I, L.P.reassignmentAT&T INTELLECTUAL PROPERTY I, L.P.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HJORT, JEFFREY DEAN
Priority to US14/984,947prioritypatent/US9584636B2/en
Application grantedgrantedCritical
Publication of US9271188B2publicationCriticalpatent/US9271188B2/en
Priority to US15/443,958prioritypatent/US10291751B2/en
Priority to US16/410,928prioritypatent/US10939226B2/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method, computer readable medium and apparatus for transmitting signaling information within payload traffic. For example, the method parses a certificate received from a service provider to obtain service imprint information associated with a mobile service, inserts a service control parameter derived from the service imprint information into a packet header, and forwards the packet header within payload traffic to a policy charging and enforcing function.

Description

The present disclosure relates generally to communication networks and, more particularly, to a method, computer readable medium and apparatus for providing a dynamic in-band service control mechanism in a mobile network, e.g., in a 3G network, a LTE (long term evolution) wireless network and the like.
BACKGROUND
With the introduction of LTE and wide availability of mobile broadband, there is significant growth in mobile services and applications. These new mobile services and applications pose huge challenges and opportunities to mobile operators in terms of providing network management (such as Quality of Service (QoS)) and control. Traditionally, mobile core network control is achieved by a policy control and charging (PCC) mechanism which is based on Internet Protocol (IP) flow at the network layer. However, most of the mobile services such as Web Real-Time Communication (WebRTC) need to be managed at the application level and these mobile services are mostly transactional and session based. In addition, the time sensitive nature of these transactional services requires a very low latency management solution. The traditional flow based service control does not manage the session based service well.
In addition, multiple ecosystems currently exist to support a diverse array of mobile applications. However, these ecosystems have poor or no interactions with each other. Given the dynamic nature of the mobile environment, it is difficult for these ecosystems to adapt to current conditions experienced by the mobile applications. This can lead to mobile applications not performing well when resources are not correctly allocated to meet the needs of the mobile application, particularly in real time, delay sensitive applications.
SUMMARY OF THE DISCLOSURE
In one embodiment, the present disclosure teaches a method, computer readable medium and apparatus for transmitting signaling information within payload traffic. In addition, the signaling information is transmitted within the user plane traffic flow instead of using out of band signaling as traditionally done. For example, the method parses a certificate received from a service provider to obtain service imprint information associated with a mobile service, inserts a service control parameter derived from the service imprint information into a packet header, and forwards the packet header within payload traffic to a policy charging and enforcing function.
BRIEF DESCRIPTION OF THE DRAWINGS
The teaching of the present disclosure can be readily understood by considering the following detailed description in conjunction with the accompanying drawings, in which:
FIG. 1 illustrates a block diagram depicting an illustrative network related to the current disclosure;
FIG. 2 illustrates how the in band signaling will operate in a high level view;
FIG. 3 illustrates a flowchart of a method for providing a dynamic in-band service control mechanism in a mobile network; and
FIG. 4 depicts a high-level block diagram of a general-purpose computer suitable for use in performing the functions described herein.
To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures.
DETAILED DESCRIPTION
The present disclosure broadly teaches a method, computer readable medium and apparatus for providing a dynamic in-band service control mechanism in a mobile network, e.g., in a 3G network, a LTE (long term evolution) wireless network and the like. Broadly, the teachings of the present disclosure can be applied to any wireless networks, e.g., 2G networks, 3G networks, 4G networks, and the like.
The present disclosure provides an in-band dynamic service control method that will enhance a mobile operator's ability to support a flexible charging model and provide a more dynamic and efficient service control including Quality of Service (QoS) over application level services such as web applications. The present method will be widely applicable to the control of mobile applications and services in general.
Web based services are dynamic and are often time sensitive. For example, web based services often involve the transmission of a short burst of information such as a small banner advertisement (ad) associated with a transaction or an in time and on location transaction. These transactional services require an effective mechanism with extremely low latency in the mobile core network. The traditional out of band signaling method will not be able to keep up with the latency requirement of these transactional services. Another associated issue is the scalability in that out of band signaling method can be limited by the resource constraints in the signaling network elements.
To illustrate, for a service sponsor use case (e.g., a provider of web-based content will sponsor or pay for the network resources that deliver the content to the end user), a service provider will send the service related information through a common Application Programming Interface (API) gateway as part of an application function (AF). The AF then converts the information into Diameter Attribute Value Pairs (AVPs) and then sends the information via standard PCC mechanism to the network to provide network resources to support the services such as bandwidth, charging, sponsor identification (id), QoS, etc. that are required to deliver the service. However, under the traditional mechanism, the signaling traffics are separated from the user plane, e.g., payload traffic. Thus, this traditional mechanism is often referred to as an out of band signaling. This process works well with IP flow based services that are not time and delay sensitive.
The present disclosure provides an in band signaling method (e.g., via hypertext transfer protocol (HTTP) header insertion) to control application level services in a dynamic fashion with very low latency. In one embodiment, the present disclosure provides a mechanism called the dynamic service control engine (DSCE) that inserts service control information in the user traffic plane (e.g., in this case the HTTP headers) and exchanges control information within the payload traffic itself. Thus, the present method is referred to as “in band signaling.”
FIG. 1 is a block diagram depicting anillustrative network100 related to the current disclosure.FIG. 1 illustrates a policy and charging rules function (PCRF)110 and an application function (AF)120, where an out ofband signaling plane112 is illustrated to allow thePCRF110 to interact with theAF120 and a system architecture evolution (SAE) gateway (GW)140 and a dynamic service control engine (DSCE)150.
FIG. 1 also illustrates a user endpoint (UE)130 interacting with the SAE-GW140 that contains a policy charging and enforcing function (PCEF). In one embodiment, the PCEF enforces the policy directives that are received from the policy andcharging rules function110. For example, the policy directives may comprise QoS directives, charging directives, gating directives and the like. These are only a few examples of the various types of policy directives. The PCEF can request the policy directives from the PCRF110, or the policy directives can be pushed to the PCEF. This allows the policy-based admission control to be applied to the user-plane bearer132 (broadly referred to as “user traffic plane” and shown in thicker lines). In turn, the DSCE150 comprising a traffic detection function (TDF) will interact with the PCEF to put service control information in the user plane traffic and exchange control information within the payload traffic. Finally, the DSCE150 will interact with one or more service providers (SPs) orsponsors160 for supporting various mobile services and applications, e.g., a sponsored service, a 1-800 data service and the like. It should be noted that the term “service provider”160 is intended to broadly cover the term “sponsor” in the sense that a sponsor is the service provider that will pay for the transporting of the provided contents.
As shown inFIG. 1, in one embodiment the dynamicservice control engine150 will operate with the application in the UE130 to insert header information (e.g., application information related to the one or more mobile services) that can be processed and enforced on the TDF (traffic detection function or a HTTP proxy). An important aspect ofFIG. 1 is that the in band signaling142 (shown in thinner lines) will be in the same flow as the payload traffic (e.g., bi-directional: uplink (UL) and downlink (DL)). In other words, the in-band signaling is provided within the user-plane bearer. As illustrated inFIG. 1, it is also important to note that the out of band signaling method can still be used in conjunction with the present in band signaling method as further described below.
FIG. 2 illustrates how the in band signaling will operate in a high level view. Specifically,FIG. 2 shows the main functional flows of the in band signaling process, and shows the various illustrative functions performed by the DSCE. On the UE130, there is a software application function for extracting initial service information from the packet header(s) sent at the beginning of the flow packets from the DSCE. The UE also has a software application function for inserting service information into the header, e.g., the HTTP header. In the DSCE, there are functions to extract service information from a SP's certificate (e.g., an X.509 certificate), to parse the information and to format them, if necessary, to translate the information into enforceable policies (broadly referred to as policies) for the PCEF, insert information into packet headers, and enforce policies specified in the service information. It should be noted that the term “certificate” should cover any medium in which the service information can be extracted as discussed in the present disclosure.
In one alternate embodiment, the UE130 will not have to install any special applications to process the in band signaling or to insert headers. Instead, these functions will be performed in the PCEF140 so that there is no impact to the UEs. The PCEF140 will “proxy” the necessary functions for the UE130.
In one embodiment, theDSCE150 can be part of a HTTP proxy gateway, or in another embodiment, theDSCE150 can be part of the TDF or the different combinations of the two. In one embodiment, theDSCE150 is acting both as a signaling function (e.g., service information process/insertion) and enforcement function (e.g., process traffic based on the service information).
FIG. 3 illustrates a flowchart of amethod300 for providing a dynamic in-band service control mechanism in a mobile network. In one embodiment, one or more operations ofmethod300 may be implemented in a user endpoint device and/or a network element, e.g., an application server or policy server, as shown inFIG. 4 below. To assist the reader inunderstanding method300, the operations ofmethod300 will be discussed in the context of a service sponsor use case (e.g., a provider of web-based content will sponsor or pay for the network resources that deliver the content to the end user in exchange for the presentation of an advertisement to the end user) and with respect toFIG. 1. It should be noted that this is only an example, and is not intended to limit the scope of the present invention. Thus, it should be noted that the present disclosure is able to support numerous other mobile services and applications.
Furthermore, althoughmethod300 is discussed in the context of the various modules as depicted inFIG. 1, the present disclosure is not so limited. In other words, the modules ofFIG. 1 can be combined into a lesser amount of modules or even expanded into additional modules based on the requirement of a particular implementation.
Method300 starts instep305 and proceeds to step310. Instep310, theDSCE150 checks for a response for a signed manifest from aSP160 in a certificate, e.g., an X.509 certificate. X.509 is an ITU-T standard for a public key infrastructure (PKI) that employs a system of certificate authorities (CAs) for issuing certificates. A manifest can be signed with the signature becoming part of the manifest. Step310 is performed to ensure that the manifest received from the service provider (SP) is valid before the manifest is parsed and cached by the DSCE. Thus,step310 is broadly an authentication step for authenticating the SP and any number of methods for performing authentication of the certificate can be performed and are within the scope of the present disclosure.
Instep315, the DSCE parses service imprint information from the certificate. In one embodiment, the service imprint information comprises various service control parameters pertaining to service control information associated with a mobile service or application. For example, the various service control parameters may comprise: a sponsor type, a sponsor identification (ID), an application ID, a duration, a type of content, a time, a location, an address, an advertisement ID, authorization parameters, QoS and so on. It should be noted that the above list of service control parameters is not exhaustive. There could be numerous other service control parameters that are not listed. Again, the service control parameters are intended to be used as signaling for use in controlling or providing the mobile service or application.
Using the service sponsor use case as an example, the service parameters may define: 1) the sponsor ID, e.g., an ID representing a particular beverage company, 2) the type of content that is sponsored, e.g., a sports program, 3) an advertisement ID, e.g., the ID for the advertisement that will be played during the sports program in exchange for sponsoring the sports program to be transmitted to the subscriber, 4) a duration, e.g., the length of time for the sports program that is sponsored, the various timestamps as to when the advertisement will be displayed, 5) the location, e.g., the location of subscriber receiving the sports program (e.g., different regions may get different advertisements based on the location of the recipient of the transmitted content), 6) the application ID, e.g., the ID of the software application that will receive the sports program, 7) the QoS, e.g., whether the sports program will be transmitted in high definition mode, and so on. Again, it should be noted that the above example is only illustrative and not exhaustive. In sum, the DSCE parses the service imprint information (broadly a service signature) from a service provider that was imbedded in the X.509 certificate.
Instep320, the DSCE uses the service imprint information and inserts relevant service control parameters into one or more packet headers, e.g., the HTTP headers. It should be noted that the reference to HTTP header is only an illustrative example and the present disclosure is applicable to any other packet protocol. Thus, the signaling information is embedded into the user traffic plane.
Instep325, the DSCE may optionally translate or convert the relevant service parameters into enforcement policies that will be enforced in the TDF or the HTTP proxy gateway, e.g.,PCEF140. In other words, the DSCE may have to perform a translation operation to generate enforcement policies consistent with the relevant service control parameters, if necessary. If the HTTP proxy gateway, e.g.,PCEF140 is capable of performing this translation operation on its own, then step330 can be deemed to be optional. It should be noted that the enforcement policies can be implemented at the TDF of theDSCE150 and/or at thePCEF140.
Instep330, the DSCE may optionally cache the service imprint information. Namely, the DSCE may cache the service imprint information extracted from the certificates for future transactions across the applicable user base. For example, the DSCE may apply the service imprint information to other transactions for this subscriber or a group of subscribers based on a timer (which can be set based on service level agreement (SLA) or other agreements between the various parties). In another embodiment, this feature can also be set on the DSCE. Thus, the caching of the service imprint information allows the DSCE to retain the service imprint information for a period of time so that the DSCE can continually provide mobile service to the subscriber and/or a class of users that includes the subscriber. For example, the subscriber may attempt to access certain functions on the uplink direction and the cached service imprint information will allow the DSCE to determine how to address the subscriber's service requests in accordance with the cached service imprint information.
Instep335, the DSCE forwards the modified packet headers with the embedded relevant service control parameters and any enforceable policies, if any, to thePCEF140.
Instep340, the PCEF applies the enforceable policies and/or remove the service control parameters from the one or more packet headers. For example, the PCEF may use layer 7 deep packet inspection (DPI) and may use the information contained in the packet headers to classify the packet traffic (such as using a sponsor ID, service ID, etc.) for policy control and charging treatment. In one embodiment, the PCEF will enforce and strip the extra inserted header information from the packet headers. This will avoid any impacts to theUE130 that may not be configured to process the extra inserted header information. Thus, in one embodiment the downlink signaling will be executed internal to the PCEF and the PCEF will process the uplink header information and enforce the uplink traffic as well as downlink traffic consistent with the relevant service parameters.
In an alternative embodiment as shown inFIG. 2, theUE130 may have the necessary applications to address the extra inserted header information in the packet headers by itself with respect to certain service control parameters. In fact, in one embodiment, theUE130 may actually have the capability of performing header information insertion as illustrated inFIG. 2.
Instep345, the PCEF forwards the packet headers to the UE. The packet headers may or may not contain the extra inserted header information depending on the implementation, i.e., based on the capability of the UEs that are receiving the packet headers.
Instep350, the UE may optionally apply the relevant service control parameters. For example, if the UE has the proper application to process the extra inserted header information, then it may operate in accordance with the relevant service parameters. For example, the application on the UE may operate to provide certain statistical information back to the service provider that provided the sponsored sports program as a condition of receiving the sports program without having to pay a fee. Alternatively, the application on the UE can switch to non-sponsored header based on an error response such as missing sponsored data information and the like.
However, in oneembodiment step350 is deemed to be optional since the UE may not be loaded with any special application. If that is the case, the PCEF would have stripped the extra inserted header information from the packet headers before the packet headers are sent to the UE. This alternative embodiment would therefore allow existing UEs to continue to operate in the current state without the need for loading any special application, while enjoying the benefit of the present dynamic in band service control mechanism.
Method300 then ends instep355. Alternatively, themethod300 may return to step310.
It should be noted that although not specifically specified, one or more steps or operations ofmethod300 may include a storing, displaying and/or outputting step as required for a particular application. In other words, any data, records, fields, and/or intermediate results discussed in each of the respective methods can be stored, displayed and/or outputted to another device as required for a particular application. Furthermore, steps, blocks, or operations inFIG. 3 that recite a determining operation or involve a decision do not necessarily require that both branches of the determining operation be practiced. In other words, one of the branches of the determining operation can be deemed as an optional step.
FIG. 4 depicts a high-level block diagram of a general-purpose computer, application server or endpoint computing device suitable for use in performing the functions or operations as described herein. As depicted inFIG. 4, thesystem400 comprises a hardware processor element402 (e.g., a CPU), amemory404, e.g., random access memory (RAM) and/or read only memory (ROM), amodule405 for providing dynamic in band service control mechanism in a wireless network, and various input/output devices406 (e.g., storage devices, including but not limited to, a tape drive, a floppy drive, a hard disk drive or a compact disk drive, a receiver, a transmitter, a scanner (e.g., a barcode scanner), a Near Field Communication (NFC) interface, a speaker, a display, a speech synthesizer, an output port, and a user input device (such as a keyboard, a keypad, a mouse, and the like)).
It should be noted that the teachings of the present disclosure can be implemented in software and hardware, e.g., using application specific integrated circuits (ASIC), a general purpose computer or any other hardware equivalents, e.g., computer readable instructions pertaining to the method(s) discussed above can be used to configure a hardware processor to perform operations of the above disclosed methods. For example, a computer-readable medium may be in communication with the processor, where the computer-readable medium having stored thereon a plurality of instructions which, when executed by the hardware processor, cause the hardware processor to perform the operations (e.g., method300) as disclosed above. It should be noted that the processor can be configured or programmed to cause other devices to perform one or more operations as discussed above. In other words, the processor may serve the function of a central controller directing other devices to perform the one or more operations as discussed above. Furthermore, the operations as disclosed in theabove method300 can be implemented in a plurality of different hardware elements, e.g., the UE, PCEF, and DSCE can all be deployed in separate hardware systems that are distinct from each other.
In one embodiment, the present module orprocess405 for providing dynamic in band service control mechanism in a wireless network can be implemented as computer-executable instructions (e.g., a software program comprising computer-executable instructions) and loaded intomemory404 and executed by thehardware processor402 to implement the steps, functions or operations as discussed above. As such, thepresent method405 for providing dynamic in band service control mechanism in a wireless network (including associated data structures) of the present disclosure can be stored on a non-transitory (e.g., tangible or physical) computer readable storage medium, e.g., RAM memory, magnetic or optical drive or diskette and the like.
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.

Claims (16)

What is claimed is:
1. A method for forwarding a packet header within a user-plane bearer, the method comprising:
parsing, via a processor, a certificate received from a service provider to obtain service imprint information associated with a mobile service;
translating, via the processor, the service imprint information into a policy consistent with a service control parameter derived from the service imprint information;
inserting, via the processor, the service control parameter and the policy into the packet header, wherein the service control parameter is intended to be used as an in-band signaling in controlling the mobile service; and
forwarding, via the processor, the packet header within the user-plane bearer to a policy charging and enforcing function.
2. The method ofclaim 1, wherein the policy charging and enforcing function is deployed by a gateway of a wireless communication network.
3. The method ofclaim 1, wherein the packet header comprises a hypertext transfer protocol header.
4. The method ofclaim 2, wherein the certificate is authenticated as being from the service provider.
5. The method ofclaim 1, wherein the certificate comprises a X.509 certificate.
6. The method ofclaim 1, further comprising:
enforcing the policy.
7. The method ofclaim 1, further comprising:
caching the service imprint information.
8. The method ofclaim 1, wherein the service control parameter in the packet header is removed by the policy charging and enforcing function.
9. A tangible computer-readable medium storing a plurality of instructions which, when executed by a processor, cause the processor to perform operations for forwarding a packet header within a user-plane bearer, the operations comprising:
parsing a certificate received from a service provider to obtain service imprint information associated with a mobile service;
translating the service imprint information into a policy consistent with a service control parameter derived from the service imprint information;
inserting the service control parameter and the policy into the packet header, wherein the service control parameter is intended to be used as an in-band signaling in controlling the mobile service; and
forwarding the packet header within the user-plane bearer to a policy charging and enforcing function.
10. The tangible computer-readable medium ofclaim 9, wherein the policy charging and enforcing function is deployed by a gateway of a wireless communication network.
11. The tangible computer-readable medium ofclaim 9, wherein the packet header comprises a hypertext transfer protocol header.
12. The tangible computer-readable medium ofclaim 10, wherein the certificate is authenticated as being from the service provider.
13. The tangible computer-readable medium ofclaim 9, wherein the certificate comprises a X.509 certificate.
14. The tangible computer-readable medium ofclaim 9, further comprising:
enforcing the policy.
15. The tangible computer-readable medium ofclaim 9, further comprising:
caching the service imprint information.
16. An apparatus for forwardinq a packet header within a user-plane bearer, the apparatus comprising:
a processor; and
a computer-readable medium storing a plurality of instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising:
parsing a certificate received from a service provider to obtain service imprint information associated with a mobile service;
translating the service imprint information into a policy consistent with a service control parameter derived from the service imprint information;
inserting the service control parameter and the policy into the packet header, wherein the service control parameter is intended to be used as an in-band signaling in controlling the mobile service; and
forwarding the packet header within the user-plane bearer to a policy charging and enforcing function.
US13/718,8152012-12-182012-12-18Dynamic in-band service control mechanism in mobile networkExpired - Fee RelatedUS9271188B2 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US13/718,815US9271188B2 (en)2012-12-182012-12-18Dynamic in-band service control mechanism in mobile network
US14/984,947US9584636B2 (en)2012-12-182015-12-30Dynamic in-band service control mechanism in mobile network
US15/443,958US10291751B2 (en)2012-12-182017-02-27Dynamic in-band service control mechanism in mobile network
US16/410,928US10939226B2 (en)2012-12-182019-05-13Dynamic in-band service control mechanism in mobile network

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US13/718,815US9271188B2 (en)2012-12-182012-12-18Dynamic in-band service control mechanism in mobile network

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US14/984,947ContinuationUS9584636B2 (en)2012-12-182015-12-30Dynamic in-band service control mechanism in mobile network

Publications (2)

Publication NumberPublication Date
US20140169172A1 US20140169172A1 (en)2014-06-19
US9271188B2true US9271188B2 (en)2016-02-23

Family

ID=50930749

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US13/718,815Expired - Fee RelatedUS9271188B2 (en)2012-12-182012-12-18Dynamic in-band service control mechanism in mobile network
US14/984,947Active2033-01-02US9584636B2 (en)2012-12-182015-12-30Dynamic in-band service control mechanism in mobile network
US15/443,958Active2033-04-27US10291751B2 (en)2012-12-182017-02-27Dynamic in-band service control mechanism in mobile network
US16/410,928ActiveUS10939226B2 (en)2012-12-182019-05-13Dynamic in-band service control mechanism in mobile network

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US14/984,947Active2033-01-02US9584636B2 (en)2012-12-182015-12-30Dynamic in-band service control mechanism in mobile network
US15/443,958Active2033-04-27US10291751B2 (en)2012-12-182017-02-27Dynamic in-band service control mechanism in mobile network
US16/410,928ActiveUS10939226B2 (en)2012-12-182019-05-13Dynamic in-band service control mechanism in mobile network

Country Status (1)

CountryLink
US (4)US9271188B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9491683B2 (en)*2014-10-312016-11-08At&T Intellectual Property I, L.P.Mobile network with software defined networking architecture

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9271188B2 (en)*2012-12-182016-02-23At&T Intellectual Property I, L.P.Dynamic in-band service control mechanism in mobile network
CN104836800B (en)2015-04-172018-10-30华为技术有限公司A kind of method, equipment and the system of service quality control
CN107925620B (en)*2015-07-312022-01-18康维达无线有限责任公司MTC service selection method in (S) GI-LAN
WO2017054844A1 (en)*2015-09-292017-04-06Telefonaktiebolaget Lm Ericsson (Publ)Pcc control of http adaptive bit rate video streaming protocols
EP3190746B1 (en)2016-01-082021-09-15Alcatel LucentDynamic provision of application related sponsored data connectivity
US10033866B2 (en)2016-02-192018-07-24At&T Intellectual Property I, L.P.Facilitation of an internet protocol multimedia platform
JP6872006B2 (en)*2016-10-172021-05-19エスケー テレコム カンパニー リミテッドSk Telecom Co., Ltd. QoS control method for base station equipment and radio sections
JP6979803B2 (en)*2017-06-192021-12-15任天堂株式会社 Information processing system, information processing device, information processing program, and information processing method
US10303555B1 (en)*2017-12-232019-05-28Rubrik, Inc.Tagging data for automatic transfer during backups
US11320552B2 (en)*2018-03-292022-05-03Exxonmobil Upstream Research CompanyEnhanced surveillance of subsurface operation integrity using neural network analysis of microseismic data
US12041168B2 (en)*2022-07-082024-07-16Anon-X, Inc.Internet packet provenance to verify packet validity and control packet usage

Citations (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5548646A (en)*1994-09-151996-08-20Sun Microsystems, Inc.System for signatureless transmission and reception of data packets between computer networks
US6202157B1 (en)*1997-12-082001-03-13Entrust Technologies LimitedComputer network security system and method having unilateral enforceable security policy provision
US6510464B1 (en)*1999-12-142003-01-21Verizon Corporate Services Group Inc.Secure gateway having routing feature
US20030188039A1 (en)*2002-03-262003-10-02Liu James C.Method and apparatus for web service aggregation
US20060048228A1 (en)*2004-08-302006-03-02Kddi Corporation; Keio UniversityCommunication system and security assurance device
US20060090206A1 (en)*2004-10-152006-04-27Ladner Michael VMethod, system and apparatus for assessing vulnerability in Web services
US20060235973A1 (en)*2005-04-142006-10-19AlcatelNetwork services infrastructure systems and methods
US20070033194A1 (en)*2004-05-212007-02-08Srinivas Davanum MSystem and method for actively managing service-oriented architecture
US20090037999A1 (en)*2007-07-312009-02-05Anderson Thomas WPacket filtering/classification and/or policy control support from both visited and home networks
US7509489B2 (en)*2005-03-112009-03-24Microsoft CorporationFormat-agnostic system and method for issuing certificates
US20110270985A1 (en)*2010-04-292011-11-03Electronics And Telecommunications Research InstituteMethod of automatically identifying multiservice and method of providing multiservice using the same
US20120158995A1 (en)*2010-12-162012-06-21Openet Telecom Ltd.Methods, systems and devices for forked routing
US8213408B1 (en)*2005-09-162012-07-03Genband Us LlcProviding security in a multimedia network
US8448228B2 (en)*2010-09-292013-05-21Microsoft CorporationSeparating authorization identity from policy enforcement identity
US8448235B2 (en)*2010-08-052013-05-21Motorola Solutions, Inc.Method for key identification using an internet security association and key management based protocol
US9137739B2 (en)*2009-01-282015-09-15Headwater Partners I LlcNetwork based service policy implementation with network neutrality and user privacy

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5623495A (en)*1995-06-151997-04-22Lucent Technologies Inc.Portable base station architecture for an AD-HOC ATM lan
US7821926B2 (en)*1997-03-102010-10-26Sonicwall, Inc.Generalized policy server
US20030069988A1 (en)*2001-10-092003-04-10Johan RuneIn-band signaling
US7221685B2 (en)*2002-12-132007-05-22Sbc Properties, L.P.Method and system relating to bandwidth utilization
FI20051320A0 (en)*2005-12-222005-12-22Nokia Corp Method of assigning packet flows to transmission paths in a communication system
US8670333B2 (en)*2006-01-202014-03-11Telefonaktiebolaget L M Ericsson (Publ)Policy enforcement within an IP network
US8528059B1 (en)*2008-10-062013-09-03Goldman, Sachs & Co.Apparatuses, methods and systems for a secure resource access and placement platform
KR101626617B1 (en)*2009-09-292016-06-01삼성전자주식회사Apparatus and method for modifying internet protocol connectivity access network session in the internet protocol multimedia subsystem network
US8416780B2 (en)*2009-11-032013-04-09Research In Motion LimitedSystem and method for session initiation protocol header modification
US8793400B2 (en)*2009-12-302014-07-29Verizon Patent And Licensing Inc.Management of inter-provider peer-to-peer based feature network
US8831560B2 (en)*2010-05-032014-09-09Alcatel LucentCharging method selection for service data flows based on the data services being requested
CA2768483C (en)*2011-12-302019-08-20Sandvine Incorporated UlcSystems and methods for managing quality of service
SG11201404248TA (en)*2012-01-202014-10-30Huawei Tech Co LtdMethod, device and system for controlling quality of service
US8528259B1 (en)2012-07-182013-09-10Ford Global Technologies, LlcMethod of adjusting door glass cross car for frameless window systems
US9271188B2 (en)*2012-12-182016-02-23At&T Intellectual Property I, L.P.Dynamic in-band service control mechanism in mobile network

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5548646A (en)*1994-09-151996-08-20Sun Microsystems, Inc.System for signatureless transmission and reception of data packets between computer networks
US6202157B1 (en)*1997-12-082001-03-13Entrust Technologies LimitedComputer network security system and method having unilateral enforceable security policy provision
US6510464B1 (en)*1999-12-142003-01-21Verizon Corporate Services Group Inc.Secure gateway having routing feature
US20030188039A1 (en)*2002-03-262003-10-02Liu James C.Method and apparatus for web service aggregation
US20070033194A1 (en)*2004-05-212007-02-08Srinivas Davanum MSystem and method for actively managing service-oriented architecture
US20060048228A1 (en)*2004-08-302006-03-02Kddi Corporation; Keio UniversityCommunication system and security assurance device
US20060090206A1 (en)*2004-10-152006-04-27Ladner Michael VMethod, system and apparatus for assessing vulnerability in Web services
US7509489B2 (en)*2005-03-112009-03-24Microsoft CorporationFormat-agnostic system and method for issuing certificates
US20060235973A1 (en)*2005-04-142006-10-19AlcatelNetwork services infrastructure systems and methods
US8213408B1 (en)*2005-09-162012-07-03Genband Us LlcProviding security in a multimedia network
US20090037999A1 (en)*2007-07-312009-02-05Anderson Thomas WPacket filtering/classification and/or policy control support from both visited and home networks
US9137739B2 (en)*2009-01-282015-09-15Headwater Partners I LlcNetwork based service policy implementation with network neutrality and user privacy
US20110270985A1 (en)*2010-04-292011-11-03Electronics And Telecommunications Research InstituteMethod of automatically identifying multiservice and method of providing multiservice using the same
US8448235B2 (en)*2010-08-052013-05-21Motorola Solutions, Inc.Method for key identification using an internet security association and key management based protocol
US8448228B2 (en)*2010-09-292013-05-21Microsoft CorporationSeparating authorization identity from policy enforcement identity
US20120158995A1 (en)*2010-12-162012-06-21Openet Telecom Ltd.Methods, systems and devices for forked routing

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9491683B2 (en)*2014-10-312016-11-08At&T Intellectual Property I, L.P.Mobile network with software defined networking architecture
US10412653B2 (en)2014-10-312019-09-10At&T Intellectual Property I, L.P.Mobile network with software defined networking architecture

Also Published As

Publication numberPublication date
US20160119454A1 (en)2016-04-28
US10939226B2 (en)2021-03-02
US9584636B2 (en)2017-02-28
US20140169172A1 (en)2014-06-19
US10291751B2 (en)2019-05-14
US20170171364A1 (en)2017-06-15
US20190268448A1 (en)2019-08-29

Similar Documents

PublicationPublication DateTitle
US10939226B2 (en)Dynamic in-band service control mechanism in mobile network
CN109076399B (en)Flexible QOS strategy for in-stream packet prioritization and data correlation
CN101978677B (en) Enhanced awareness propagation for in-band DPI applications
KR101409626B1 (en)Method for generating and providing a new pcc/qos rule based on an application request message
CN103039094B (en)The system of internet traffic content distribution, Apparatus for () and method therefor
EP2456246A1 (en)Network selection method based on multi-link and apparatus thereof
KR101376020B1 (en)Handling of expired message for generation of policy and charging rules node
WO2019033920A1 (en)Method and device enabling network side to identify and control remote user equipment
WO2019055629A1 (en)Hcpe-based intelligent path selection over a multipath network
CN104471904B (en)Method and apparatus for content optimization
US9876877B2 (en)Special handling of a landing page
US10616185B2 (en)Methods and first, second and network nodes for managing traffic characteristics
US9596606B1 (en)Application programming interface gateway for sponsored data services
US20120324099A1 (en)Content delivery control methods, apparatuses and computer programs
CN113691547B (en) An HTTPS header enhancement method for 5G UPF network elements
WO2017148419A1 (en)Data transmission method and server
CN110870256A (en) Method, system and computer readable medium for operating a telecommunications network using local computing systems and non-local cloud computing systems
CN107113304B (en)Method and module for intermediary delegation on encrypted data exchange
CN104168553A (en)Sending and charging method and device for service messages
CN105577738B (en)A kind of method, apparatus and system of processing terminal information
KR102482444B1 (en)Apparatus for advertising interception and control method thereof
CN103650439B (en) Network entities, systems including network entities, methods of operating network entities, and methods for policy control
US10469363B2 (en)Method for data exchange between web browsers, and routing device, terminal, computer program and storage medium therefor
CN101854334B (en)Admission control system, device and method
US20120233335A1 (en)Auxiliary host and sessions

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:AT&T INTELLECTUAL PROPERTY I, L.P., GEORGIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HU, QINGMIN;BOURG, GUS;FIGURELLE, TERRY;AND OTHERS;SIGNING DATES FROM 20121206 TO 20130125;REEL/FRAME:029734/0577

ASAssignment

Owner name:AT&T INTELLECTUAL PROPERTY I, L.P., GEORGIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HJORT, JEFFREY DEAN;REEL/FRAME:037330/0908

Effective date:20140211

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:4

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20240223


[8]ページ先頭

©2009-2025 Movatter.jp