发明名称 Controlling access to an operator network by non-conforming devices
摘要 A device is configured to receive an alarm message from a particular device that received a radio resource control request from a client device. The alarm message may indicate that a threshold access limit to an operator network is satisfied by the client device or that a particular protocol is being used by the client device. The device may determine a policy associated with the client device. The policy may indicate a policy rule associated with a policy action to be taken if the policy rule is violated. The device may determine the policy rule is violated based on the alarm message received from the particular device. The device may instruct the particular device to perform the policy action, by accepting or rejecting the radio resource control request, based on the policy rule being violated.
申请公布号 US9450983(B2) 申请公布日期 2016.09.20
申请号 US201414325666 申请日期 2014.07.08
申请人 Verizon Patent and Licensing Inc. 发明人 Huang Ye;Vo Loc Ba;Chan Yee Sin
分类号 H04L29/06;H04W12/08 主分类号 H04L29/06
代理机构 代理人
主权项 1. A device, comprising: a memory; and one or more processors, operatively connected to the memory, to: receive an alarm message from a particular device that received a radio resource control request from a client device, the alarm message being provided by the particular device based on the particular device detecting a first alarm condition corresponding to the client device, and the first alarm condition indicating that the client device has satisfied a first threshold access limit to an operator network, the first threshold access limit identifying a first quantity of radio resource control requests that the client device is permitted to send per an amount of time, andthe first alarm condition being different from a second alarm condition that corresponds to another client device capable of providing a radio resource control request to the particular device;determine, in response to receiving the alarm message, that the client device is a machine-to-machine (M2M) device;apply, based on determining that the client device is a M2M device, a first policy rule corresponding to the client device, the first policy rule identifying a second threshold access limit that identifies a second quantity of radio resource control requests that the client device is permitted to send per an amount of time,the second threshold access limit being different from the first threshold access limit, andthe first policy rule being different from a second policy rule that corresponds to the other client device;determine that the first policy rule is violated based on the alarm message received from the particular device; andinstruct the particular device to reject the radio resource control request based on the first policy rule being violated.
地址 Basking Ridge NJ US