H04L12/1496

SPECIAL HANDLING OF A LANDING PAGE
20170230478 · 2017-08-10 ·

A device intercepts a request that includes a network address or a universal resource locator (URL) for a landing page and determines whether special handling is applicable when forwarding the landing page to the requesting device. When the special handling is applicable, the request is automatically redirected to a validation device, which determines whether the requesting device is eligible for the special handling. The validation device signs based on the determination and returns the signed request to the requesting device. The requesting device forwards the signed request to request the landing page and the special handling is selectively applied based on the signed request.

System and method for permitting use of content using transfer rights

Apparatus, method, and media for permitting use of content. An exemplary method comprises associating a transfer right with content, the transfer right specifying that the content is permitted to be transferred from a first computing device to a second computing device, transferring the content from the first computing device to the second computing device in accordance with the transfer right, updating information associated with the transfer right based on the transfer of the content from the first computing device to the second computing device, and associating a usage right with the content, the usage right corresponding to a utilization of the content, wherein the first computing device includes at least a server mode of operation, and wherein the second computing device includes both a requester mode of operation and a server mode of operation.

Efficient policy enforcement using network tokens for services C-plane approach

A device establishes flows associated with one or more applications using control plane signaling. A gateway device obtains a request for a network token during the control plane signaling. The gateway device derives the network token and sends it to the device and/or an access node during the control plane signaling. The device and/or access node obtain the network token, where the network token is associated with a first flow of the one or more flows, a first application of the one or more applications, and provisioned to the device or access node via the control plane signaling. The network token may be included in a packet sent in the user plane from the device. The network token may be verified at the access node and/or the gateway device using a cryptographic function and sent to its destination based on the results of the verification.

MANAGING METERING FOR DISTRIBUTED IOT APPLICATIONS
20170257223 · 2017-09-07 ·

The present disclosure relates to methods of metering, and in particular to methods of metering activities of applications in distributed networks. More particular, the disclosure concerns a method for metering the operation of distributed Internet of Things, IoT devices. This disclosure relates to a method for metering activities of an application in a data processing system, wherein said data processing system comprises resource nodes configured to perform activities executed as actors in the respective resource nodes; and wherein the actors are controlled by one or more runtimes in the data processing system. The method comprises tracing, by a runtime, information related to activities executed by actors controlled by the runtime, and metering, by the runtime, the operation of the application based on the part of the traced information, which is related to activities of actors being used by the metered application. Furthermore, the disclosure relates to corresponding apparatuses and computer programs.

Capillary device charging

The present application describes a user equipment including a processor and a memory, where the memory stores computer-executable instructions that, when executed by the processor, cause the user equipment to perform a set of instructions. The instructions include transmitting, to a network, a message requesting to modify or establish flow that is not to be charged to the user equipment. The instructions also include receiving, from the network, an indication based on the message request. The instructions further include determining, based on the indication, whether to make the flow being associated with the message.

Loading a Web Page in a Telecommunication Network Using an Access Point Server
20210367996 · 2021-11-25 ·

An internet protocol (IP) access point sends, to a requesting device, a modified version of a first web page comprising first modifications made in accordance with policy handling information, and receives, from the requesting device, a request for a second web page. Responsive to detecting that the request for the second web page comprises one or more of the first modifications, the IP access point sends a modified version of the second web page comprising second modifications made in accordance with the policy handling information to the requesting device.

Determining a time to permit a communications session to be conducted
11171864 · 2021-11-09 · ·

A system and method to facilitate communication between telecommunications participants in a telecommunications network is disclosed. In one aspect, a method of determining a time to permit a communication session by telecommunications participants to be conducted includes causing a telecommunications processor to retrieve, from a data storage: a free time value that is representative of a free time attributed to a participant in the communications session, a funds balance held by the participant, a pre-stored cost per unit time value, and a representation of a billing pattern for the participant. The method also includes causing the telecommunications processor to determine a maximum time to permit the communication session to be conducted as a function of the free time value, the funds balance, the cost per unit time value and the billing pattern. The telecommunications processor initiates ending the communication session when the time to permit the communication session to be conducted expires.

Device-assisted services for protecting network capacity

Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity.

Determining a Time to Permit a Communications Session to Be Conducted
20220070088 · 2022-03-03 ·

A process and apparatus to facilitate communication between callers and callees in a system comprising a plurality of nodes with which callers and callees are associated is disclosed. In response to initiation of a call by a calling subscriber, a caller identifier and a callee identifier are received. Call classification criteria associated with the caller identifier are used to classify the call as a public network call or a private network call. A routing message identifying an address, on the private network, associated with the callee is produced when the call is classified as a private network call and a routing message identifying a gateway to the public network is produced when the call is classified as a public network call.

System for improved traffic handling in a network

There is provided a system comprising a user device, a network and a service provider, wherein the user device communicates with a server operated by the service provider using the network. The system is arranged such that in response to receipt of user input requesting initiation of communication with the service provider, the user device sends a policy enforcement request to policy contact point in the network. The system is further arranged such that the network receives the policy enforcement request at the policy contact point and applies at least one policy rule to the communication between the user device and the service provider.