This invention relates generally to communications and, in particular, to controlling flow of communication traffic between communication devices.
Some level of control of communication traffic flow in a communication system is generally desirable, such as to prevent unsolicited or malicious communication traffic from compromising system security or affecting system reliability or performance, for example. In so-called Denial of Service attacks, for instance, communication equipment is flooded with traffic to the point that communication system operation is degraded and often completely interrupted.
Communication traffic control or filtering mechanisms that currently exist tend to be tailored towards fixed networks, where a centralized device or system is responsible for making decisions with respect to the type of traffic that traverses a communication system. A firewall within a corporate network, for example, controls the entry of communication traffic into the network. The same communication traffic filtering rules, established at the firewall by a network administrator, are typically applied to all communication traffic destined for all network equipment.
Although this type of conventional communication traffic control may work well in fixed networks, Denial of Service attacks and other communication traffic-related issues can be as much a problem for wireless mobile communication devices as they are for their wired counterparts. In fact, for mobile communication devices, unwanted traffic in general can be even more detrimental, given their relatively limited communication, power, and processing resources and capabilities. A further challenge for mobile communication devices is providing continued firewall or communication traffic filtering functionality as a user or mobile communication device roams between communication networks. For example, a filtering device that initially protects a mobile communication device may no longer be in the data path used by the device when it roams to a different communication network.
One attempt to address communication traffic concerns for mobile communication devices involves relying on a firewall in a wired backbone of a communication system. The firewall implements access control rules for both wired and wireless stations operating in the communication system. While this approach offers a generic set of rules to be applied across network elements, additional flexibility and granularity may be desirable.
Communication, power, and processing resources of mobile communication devices may not only be limited, as described above, but also vary with time. For example, fluctuations in received communication signal strength affect the communication resources available to a mobile communication device, and both communication and processing resources may be dependent upon battery power level, which also fluctuates with time. As such, while a generic set of rules configured at a firewall may handle Denial of Service and other malicious communication traffic, conventional firewall implementations do not support further specific communication traffic filtering or control which may be desirable to limit other unwanted traffic for particular communication devices. A user of a mobile communication device, for example, may wish to filter non-malicious communication traffic based on various criteria, such as to receive only a particular type of communication traffic or communication traffic from only particular sources in order to conserve battery power or airtime charges.
Middlebox communications (MIDCOM) architecture and framework proposals, in RFC-3303 and RFC-3304 for instance, are intended to enable seamless communications for complex software applications through so-called middleboxes, and represent another possible approach to communication traffic control. A variety of these intermediate Internet devices, which require application intelligence for their operation, is currently available. For example, datagrams pertaining to real-time streaming applications such as Session Initiation Protocol (SIP) and H.323, and peer-to-peer applications such as Napster™ and NetMeeting™, cannot be identified by merely examining packet headers and thus require embedded intelligence at communication system components for correct processing during transfer. Whereas middleboxes implementing firewall and network address translator services would thus typically require embedded software application intelligence, trusted third parties can be delegated in the MIDCOM architecture and framework to assist the middleboxes in performing their operation without resorting to embedding application intelligence at the middleboxes. This allows a middlebox to continue to provide services while keeping the middlebox application-agnostic. Thus, a trusted third party such as an application server may control middlebox firewall services.
MIDCOM thereby provides for firewall service configuration by a third party. However, as described above for conventional firewall implementations, the same firewall configuration is applied to all communication traffic destined for all communication devices served by a middlebox. Targeted control of communication traffic on a device-, user-, or subscription-specific basis, for example, and end user-initiated configuration of communication traffic control functions, which may be of particular use in conjunction with mobile communication devices, for example, are not supported in MIDCOM.
Many existing radio link protocols and mobile communication systems support location of and radio link establishment with mobile communication devices that are in a power saving mode and hence are not actively listening for delivery of communication traffic all the time or are not listening on the radio channels normally associated with delivering traffic. When communication traffic destined for a mobile communication device is received at a mobile communication network element such as a base station, a paging message is transmitted to the mobile communication device through paging channels which are typically different from traffic channels. If the mobile communication device responds to the paging message, the received traffic is forwarded.
This alerting functionality allows mobile communication devices to reduce power consumption and also decreases signalling load on the network for tracking devices that are not actively participating in traffic generation or reception. Communication traffic flow to communication devices is thereby controlled in that traffic is transmitted to a device only after the device responds to a paging message. Like the techniques described above, however, this mechanism is generally configured by administration personnel and does not provide any measure of differentiated communication traffic control. The same rule, i.e., page before forwarding, is applied to all communication traffic received by a network element. In addition, operation of this mechanism is dependent upon both the network element, which sends the paging message, and the communication device, which must respond in order to receive communication traffic.
There remains a need for configurable communication traffic control methods and systems which provide communication device-specific control of communication traffic.
In mobile communication networks, transfer of communication traffic control rules between network elements such that communication traffic control rules effectively “follow” a mobile communication device as it is moved, may also be preferred.
A further need remains for a configurable traffic control mechanism which would minimize the signalling load introduced into a communication system.
According to one aspect of the invention, a communication traffic control method for a mobile communication device is provided. The method includes determining that a mobile communication device is operating within a service area of a traffic control system, generating at the mobile communication device a traffic control rule for controlling communication traffic destined for or originating from the mobile communication device where the mobile communication device is operating within a service area of a traffic control system, and outputting the traffic control rule for transmission to the traffic control system to establish targeted traffic control at the traffic control system in accordance with the traffic control rule.
A mobile communication device is also provided. The mobile communication device determines that it is operating within a service area of a traffic control system, generates a traffic control rule for controlling communication traffic, if it is operating within a service area of a traffic control system, and outputs the traffic control rule for transmission to the traffic control system to establish targeted traffic control at the traffic control system in accordance with the traffic control rule.
In accordance with a further aspect of the invention, a method of controlling communication traffic destined for or originating at a mobile communication device includes receiving from a mobile communication device, which has been determined to be operating within a service area of a traffic control system, a traffic control rule for controlling communication traffic destined for or originating at the communication device, and establishing at the traffic control system targeted traffic control in accordance with the traffic control rule.
A related system for controlling transmission of communication traffic receives a traffic control rule and establishes at the traffic control system targeted traffic control in accordance with the traffic control rule.
A method of controlling flow of communication traffic in accordance with a traffic control rule established at a traffic control system, according to yet another aspect of the invention, includes detecting that a mobile communication device has moved from a communication system service area served by the traffic control system to a new service area served by a new traffic control system, and establishing at the new traffic control system, responsive to the detecting, communication traffic control in accordance with the traffic control rule for communication traffic destined for or originating at the mobile communication device.
In another aspect, the invention provides a system for controlling flow of communication traffic in accordance with a traffic control rule established at a traffic control system. The system detects that a mobile communication device has moved from a communication system service area served by the traffic control system to a new service area served by a new traffic control system, and establishes at the new traffic control system, responsive to the detecting, communication traffic control in accordance with the traffic control rule for communication traffic destined for or originating at the communication device.
A communication traffic control method in accordance with a still further aspect of the invention includes receiving a plurality of traffic control rules for controlling communication traffic, aggregating the respective traffic control rules, and outputting the aggregated traffic control rules for transmission to a plurality of traffic control systems to establish communication traffic control at the plurality of traffic control systems in accordance with the plurality of traffic control rules.
A related system for establishing communication traffic control receives a plurality of traffic control rules for controlling communication traffic, aggregates the respective traffic control rules, and outputs the aggregated traffic control rules for transmission to a plurality of traffic control systems to establish communication traffic control at the plurality of traffic control systems in accordance with the plurality of traffic control rules.
Another aspect of the invention provides method of establishing communication traffic control at a traffic control system. The method involves receiving at a traffic control system aggregated traffic control rules for controlling communication traffic. The aggregated traffic control rules may include traffic control rules which are received from at least one communication device, aggregated, and transmitted to a plurality of traffic control systems by an intermediate system. The method also includes establishing communication traffic control for communication traffic received at the traffic control system in accordance with at least one of the traffic control rules.
Other aspects and features of embodiments of the present invention will become apparent to those ordinarily skilled in the art upon review of the following description of specific illustrative embodiments of the invention.
Examples of embodiments of the invention will now be described in greater detail with reference to the accompanying drawings, in which:
The communication device 10 represents communication equipment configured to at least receive and possibly send communication traffic through the communication network 12. Thus, communication traffic control as disclosed herein may be applied to communication traffic destined for a communication device, transmitted by a communication device, or both.
In one embodiment, the communication device 10 is a mobile communication device and the communication network 12 is a mobile communication network. A mobile communication device generally incorporates a receiver and possibly a transmitter connected to one or more antennas. The same antenna(s) may be used by both a receiver and a transmitter, or separate receive and transmit antennas may be provided. Electromagnetic communication signals which propagate through the air and excite the receive antenna(s) are detected and processed by the receiver, whereas the transmitter outputs to the transmit antenna(s) signals to be transmitted. The signals are then converted by the transmit antenna(s) into electromagnetic signals which propagate from the communication device. Those skilled in the art of communications will be familiar with the operation of many different types of mobile communication devices having the above general structure.
GSM, GPRS, CDMA and UMTS represent examples of known wireless communication schemes for which communication devices and networks have been developed, although other types of devices and networks, including wired and wireless devices and networks, are also contemplated.
The traffic control system 14 is an element of the communication system which receives communication traffic destined for and possibly transmitted by the communication device 10, and thereby provides a gateway between the communication device 10 and one or more traffic sources. As those skilled in the art will appreciate, communication traffic destined for or originating with the communication device 10 normally traverses equipment operated by a communication service provider. Therefore, in one embodiment, the traffic control system 14 is implemented within the communication network 12 by a service provider which provides communication services to the communication device 10.
It should be appreciated, however, that providing communication traffic control for communication devices in accordance with embodiments of the invention may instead involve communication traffic control at the communication device 10 itself. This approach may benefit from a faster reaction time in that traffic control rules are established directly at a communication device, but may also increase battery power consumption, processor load, and communication resource consumption at the communication device and the communication network 12.
Thus, the traffic control system 14 may be implemented at a communication system component, illustratively an Access Point (AP), Base Transceiver Station (BTS), wireless switch, or Gateway GPRS (General Packet Radio Service) Support Node (GGSN) of the communication network 12, within the communication device 10, or as a stand-alone device or system.
The communication network 12 may be virtually any type of communication network. For example, where the communication device 10 is a wireless communication device, then the communication network 12 is a wireless communication network, such as a GPRS network. In a preferred embodiment, the communication network 12 is coupled to communication traffic sources in a further communication network, such as the Internet, through the traffic control system 14.
Communications between the communication device 10, the traffic control system 14, and communication traffic sources may involve many different types of connection over which communication signals are exchanged. As those skilled in the art will appreciate, these connections may include wired connections, wireless connections, or some combination thereof. The particular types of communication connections may be dependent upon the type of the communication network 12 and the protocols used therein, the services offered by service providers using the communication network 12, and the types of equipment at the communication device 10, the traffic control system 14, and the communication traffic sources, for instance.
In operation, the traffic control system 14 controls communication traffic destined for or originating at the communication device 10 in accordance with traffic control rules generated at the communication device 10, as described in further detail below.
The method proceeds at 20 with an operation of generating, at a communication device, a traffic control rule which specifies a traffic control condition for controlling communication traffic destined for or originating at the communication device. The rule is output at 22 for transmission to a traffic control system to establish targeted traffic control at the traffic control system in accordance with the traffic control rule.
Targeted traffic control may be communication device-specific, user-specific, or subscription-specific, for example. Communication-device specific traffic control would control communication traffic which is destined for or originates with a particular communication device, whereas user-specific traffic control would control communication traffic which is destined for or originates with a particular user identified by a user name for instance, and subscription-specific traffic control would control communication traffic which is destined for or originates with a particular subscription such as an e-mail account. In the cases of user-specific and subscription-specific traffic control, traffic control rules may be applied to communication traffic which is destined for or originates with not only the communication device, but also other communication devices used by the same user or in conjunction with the same subscription.
Further targeted traffic control schemes may also be apparent to those skilled in the art, and the invention is in no way limited to any particular traffic control targeting scheme.
If a traffic control system supports different types of targeted traffic control, a communication device may include in a traffic control rule an indication of the type of targeting to be used by the traffic control system in applying the rule.
At 24, the traffic control rule is transmitted to the traffic control system. As shown, the rule might not be transmitted immediately after it is generated. The rule may be stored for later transmission or different components of a communication device may be responsible for generating and transmitting traffic control rules, for example. However, substantially immediate transmission of a traffic control rule may be preferred in order to avoid delays in establishing the traffic control rule at a traffic control system.
References herein to traffic control rules are not intended to imply any particular format or expression of such rules. For example, a rule as generated at communication device may be formatted into a traffic control request or message for transmission to a traffic control system. A rule which is generated and expressed in one particular format at a communication device may thus be transmitted to a traffic control system in a somewhat different format. Establishment of a traffic control rule at a traffic control system may similarly involve processing of a rule to convert the rule into a format which is usable by a traffic controller or filter, for instance. Thus, although the term “rule” is used consistently herein to indicate a criterion on the basis of which communication traffic is to be controlled, it should be appreciated that a rule need not necessarily be maintained in any particular format within a communication system or expressed in the same way at all communication system components.
A traffic control rule may include, for instance, a permissive traffic control rule or a blocking traffic control rule. Communication traffic which satisfies a permissive traffic control rule is transmitted from a traffic control system to a communication device or another destination if the communication traffic originated with a communication device, whereas communication traffic which satisfies a blocking traffic control rule is not transmitted from the traffic control system. Traffic control at a traffic control system may thereby be established to permit or block communication traffic on the basis of traffic control rules.
Illustrative examples of information which may be specified in a traffic control rule include identifiers of particular sources of communication traffic, types of communication traffic, and priorities of communication traffic. Other criteria upon which traffic control rules may be based are also possible.
The method of
At 28, responsive to receiving the traffic control rule, the traffic control system establishes the traffic control rule to thereby implement targeted traffic control for communication traffic destined for or originating the communication device.
The operation of establishing the traffic control rule at 28 may involve extracting the traffic control rule from a received traffic control request or message, depending upon the transfer mechanism used to transmit rules. The traffic control rule is then implemented at the traffic control system, by storing the traffic control rule in a memory for subsequent access during communication traffic processing, for example.
The traffic control system thereafter determines whether received communication traffic should be transmitted or blocked. In the event that communication traffic is blocked, the traffic control system may simply drop the communication traffic. The traffic control system may also perform further operations, including acknowledging that communication traffic has been transmitted and notifying a source of the communication traffic that the communication traffic has been blocked, for example.
The foregoing description relates primarily to establishing a traffic control rule at a traffic control system responsive to receiving the rule from a communication device. It should be appreciated, however, that communication traffic control in accordance with embodiments of the invention need not be exclusive of other types of communication traffic control. For example, a traffic control system may also provide for more generic traffic control for multiple communication devices. In this case, a traffic control system is configurable by both a system administrator and communication device users.
At 38, the communication device 10 sends a traffic control rule to the traffic control system 14 through the communication network 12. The traffic control rule specifies that all communication traffic except video calls from xyz@domain.com are to be blocked. All other communication traffic is to be blocked. The traffic control system 14, responsive to receiving the rule, establishes the traffic control rule to allow video calls from xyz@domain.com at 40. The communication traffic source 30 attempts a call to the communication device 10 at 42. In accordance with the traffic control rule received from the communication device 10, however, the traffic control system drops the call from the source abc@domain2.com 30 at 44, and also transmits at 46 a notification to the source 30 that the communication device 10 is unreachable.
Although not explicitly shown in
As described briefly above, a traffic control system may be implemented either within a communication device or externally, at a separate component of a communication system.
Transmission of traffic control rules generated at the communication device 50 to the traffic control system 58 is represented at 57. As described above, communication traffic destined for or originating with the communication device 50 is controlled by the traffic control system 58 on the basis of traffic control rules received from the communication device 50. Communication traffic received by the traffic control system 58 is either dropped or transmitted in accordance with any traffic control rules which have been established.
The system of
In
Therefore, embodiments of the invention may enable a communication device to request that targeted traffic control be implemented in any of two ways. One approach involves direct communication between the communication device and a traffic control system, which may be a firewall, a Short Message Service (SMS) filter, or a Multimedia Message Service (MMS) filter, for example. The communication device interacts directly with the traffic control system, and thus addresses the traffic control rules or messages containing the rules to the communication system element responsible for implementing communication traffic control. There are no specialized intermediary software or hardware components in this configuration, as the communication device communicates directly with a traffic control system.
In the second approach, an example of which is shown in
The intermediate system 70 may forward a traffic control rule to the traffic control system 72 without substantially affecting the content or format of the rule. This may be accomplished by changing a destination address of a message which contains the rule or incorporating the rule or message into a further message, for example. More substantive processing of a traffic control rule by an intermediate system is also contemplated, as described in further detail below. References herein to an intermediate system forwarding a traffic control rule to a traffic control system should be interpreted accordingly.
It will now be apparent that the operation at 24 in
The transceiver 82 enables the communication device 80 for communication in a communication network. In one embodiment, the transceiver 82 is a wireless transceiver which is controlled by the processor 89 and software stored in the memory 86 for operation in a wireless communication network. Many different types of transceiver 82 may be implemented in the communication device 80. Although a communication device may include a single transceiver for communication with both a traffic control system or intermediate system and communication traffic sources through the same communication network, embodiments of the invention may be applied to communication devices having multiple transceivers.
The user interface 84 represents one or more elements for receiving inputs from a user. A keyboard and a mouse are examples of elements for receiving user inputs, whereas a touchscreen display provides both input and output functionality. Other types of user interface elements will be apparent.
The memory 86 represents a local memory device, and may include, for example, any of solid state memory devices, disk drives, and other memory devices adapted to operate with fixed or removable memory media. Mobile communication devices, for instance, typically include solid state memory devices as the memory 86.
In the embodiment shown in
The traffic control rule generator 88 is operative to generate and output a traffic control rule for controlling communication traffic destined for or originating with the communication device 80, in the manner described above. The traffic control rule is transmitted by the transceiver 82 to a traffic control system or an intermediate system. When implemented in a processor as shown in
The user interface 84 provides a mechanism for a user to input traffic control rules or information for use in generating traffic control rules. For example, a user might select from an address book or contact list stored in the memory 86 an address or identifier of a particular communication source and invoke a “block” or analogous function or command to cause a blocking traffic control rule to be generated. Other traffic control rule generation scenarios and input mechanisms are also possible.
The traffic control system 90 includes one or more transceivers 92 to enable the traffic control system to communicate with both a communication device and communication traffic sources. Where other communication system components handle any interoperability issues between a communication device and communication traffic sources, a single transceiver 92 will generally suffice. Separate transceivers may be provided to support communication in different types of communication networks, for example.
A mobile cellular network generally includes a wireless communication devices that communicate directly with a wireless access network, referred to herein as a RAN, which communicates with a wired backbone network, also known as the mobile core network. The mobile core network communicates with the Internet. The mobile core network is generally specific to the type of technology being used. For example, a mobile core of UMTS cannot in principle work with a wireless network of CDMA and vice-versa. The mobile core network therefore acts the “glue” between the wireless access network and the Internet, performing functions of address management, connection management, and the like.
In a WLAN network, there is generally no RAN but wireless communication devices communicate directly to APs which are then connected to the wired backbone. Wired backbone networks are not mobile-aware, unlike cellular networks, but include general network elements such as routers/switches in a fixed network. Therefore, irrespective of the wireless access technology, the wired backbone networks do not change and are agnostic to the wireless technology. Although there is typically no RAN in a WLAN access network, APs can be further connected to WLAN switches and thus, in a way, there is a small access network which then connects to the wired backbone.
The RAN therefore has two types interfaces, including one to the wired backbone (generally wired interface) and the other to wireless communication devices (wireless interface). The wired backbone also has two interfaces, including one to the RAN (generally wired) and the other to the Internet (wired interface). Accordingly, traffic control system may include multiple transceivers 92 or interfaces, depending upon where it is implemented.
Although shown in
The memory 94, like the memory 86 (
In
The processor 98 and the memory 94 may or may not be dedicated to communication traffic control. Embodiments of the invention which are based in software, for instance, are particularly suited to integration with other functions of communication system components. In the above example of a GGSN, implementation of an embodiment of the invention may involve installing new software at the GGSN without any additional hardware. Thus, the traffic control system 90 may be implemented using components which are shared with other systems but configured by software to operate in a particular manner.
The traffic controller 96 is operative to receive a traffic control rule and to establish, responsive to receiving the traffic control rule, targeted traffic control in accordance with the traffic control rule for communication traffic destined for or originating at the communication device. In the traffic control system 90, the operation of establishing may involve storing information relating to the traffic control rule and targeting information in the memory 94. As described above, communication traffic control may be communication device-, user-, or subscription-specific, for example, and accordingly the targeting information may identify a communication device, a user, or a subscription. The traffic controller 96 may then access the memory 94 to determine whether communication traffic destined for or originating at the communication device should be transmitted or blocked.
The traffic control rule handler 106 receives traffic control rules from one or more communication devices and establishes the traffic control rules at a traffic control system. The operation of establishing communication traffic control at the traffic control system may entail transmitting each traffic control rule or a processed version thereof to the traffic control system, as described above.
Although embodiments of the invention may be implemented with or without an intermediate system, an intermediate system implementation may be advantageous. For example, an intermediate system may propagate traffic control rules to multiple traffic control systems and/or aggregate multiple traffic control rules for transmission to one or more traffic control systems.
The intermediate system 118 receives from the communication device 110 a traffic control rule, represented at 130, and sends the traffic control rule to multiple traffic control systems at 132, 134, 136, 138. Each of the SMS spam filter 120, the firewalls 122 and 126, and the MMS spam filter 124 then establishes communication traffic control in accordance with the traffic control rule originally received by the intermediate system 118. In this manner, the intermediate system 118 effectively acts as a proxy for the communication device 110 to establish traffic control rules at multiple traffic control systems responsive to a single transmission of the traffic control rule from the communication device 110.
Many different mechanisms may be implemented at the intermediate system 118 to support traffic control rule propagation. For example, the intermediate system may simply forward received traffic control rules to all known traffic control systems. The intermediate system 118 may instead process a received traffic control rule to determine to which traffic control systems the rule may be applicable. A priority-based rule, for instance, may be applicable only to certain types of communication traffic. As described above, the intermediate system 118 may also perform processing operations which affect the content or format of traffic control rules.
One type of substantive traffic control rule processing which may be performed by the intermediate system 118 is format or protocol conversion. An advantage of this approach is that the communication device 110 does not deal with interoperability issues, since it is only the intermediate system 118 which communicates with various traffic control systems, i.e., the SMS/MMS filters 120, 124 and the firewalls 122, 126 in
An additional advantage of an intermediate system such as 118 is the relative ease of establishing trust between traffic control systems and an intermediate system or a communication system component which implements intermediate system functionality within an access network or a home network. Establishing trust between each communication device and the traffic control system(s) which are to be configured by the communication device may be significantly more difficult.
For example, if a communication device is associated with a particular AP and WLAN switch, then some authentication mechanism has been performed between the AP/switch and the communication device, such that the AP/switch trusts the communication device. The AP/switch and a traffic control system would be parts of the same infrastructure and a pre-established trust, such as a Security Association, would thus normally exist between the AP/switch and the traffic control system. Therefore, traffic control rules sent by the AP/switch on behalf of communication device can be viewed by the traffic control system to be authentic, and no trust relationship need exist between the communication device and the traffic control system. Since the number of communication devices served by a traffic control system could be in the hundreds of thousands or even more, scalability could become an issue if communication devices were required to have direct Security Associations with traffic control systems. The intermediate system approach may thereby reduce scalability concerns.
At 140, a communication traffic control rule for a mobile communication device is established at a traffic control system. The establishment of the traffic control rule at 140 may, but need not necessarily, be as described above.
Next, at 142, movement of the mobile communication device from a service area served by the traffic control system to a new service area served by a new traffic control system or intermediate system is detected. Where a traffic control system or intermediate is implemented at a GGSN as described above, then traffic control system or intermediate system service areas are substantially the same as mobile communication network coverage areas. However, it should be appreciated that traffic control systems, intermediate systems, and other communication system components may have different service areas.
If the new service area is served by a new intermediate system, then any traffic control rules which were established at 140 are transmitted to the new intermediate system at 144. At 146, the traffic control rule is established at the new traffic control system if the new service area is served by a new traffic control system. Of course, if multiple traffic control rules had been established for the communication device at 140, all of the rules are preferably transmitted at 144 and/or established at 146.
The method of
In a communication system which supports direct communication between communication devices and traffic control systems, either the communication device or a current traffic control system may detect that the communication device has entered, or is about to enter, a new service area. Many techniques for detecting handoffs or imminent handoffs of communications within a mobile communication network are known and would be suitable to accomplish the detection at 142 where mobile network coverage areas overlap traffic control system and intermediate system service areas.
Similarly, either the communication device or the current traffic control system may transfer traffic control rules to the new traffic control system. However, it should be noted that detection and context transfer need not necessarily be performed by the same device or system. For example, a mobile communication device might detect that a handoff to a new communication network element is imminent and advise a current traffic control system accordingly. The traffic control system may then establish any traffic control rules at another traffic control system.
Where a communication system also includes intermediate systems, a communication device, an intermediate system, or a traffic control system might track the location of a mobile communication device. If the mobile communication device moves between the service areas of two intermediate systems, then information is preferably transferred to a new intermediate system by the mobile communication device, a current intermediate system, or possibly a current traffic control system. Communication traffic control rules are then established at a new traffic control system, if necessary, by transmitting the traffic control rules from the new intermediate system for instance. In some cases, a current service area and a new service area with different intermediate systems may be served by the same traffic control system, and as such, communication traffic control for the new service area is already provided by the current traffic control system.
A mobile communication device may also move between service areas which are served by the same intermediate system but different traffic control systems. The intermediate system may establish communication traffic control rules at a new traffic control system substantially as described above.
Thus, in some embodiments, communication traffic control context transfer operations may involve components other than a traffic control system at which communication traffic control rules have been established. As such, traffic control rules may be stored at a mobile communication device, an intermediate system, or both, for retransmission to a new intermediate system or traffic control system when the mobile communication device moves between service areas. A mechanism which provides for retrieval of established traffic control rules from a traffic control system represents one possible alternative to local storage of traffic control rules by a communication device or an intermediate system. Traffic control rules may then be retrieved from a current traffic control system and transmitted to a new intermediate system and/or traffic control system when a communication device is moved into a new service area.
When the communication device accesses the WLAN 160 through AP2154, communication traffic control rules are established at the traffic control system 164 by the communication device 150 through the intermediate system 158, as shown at 182, 184. The communication device 150 is then moved and accesses the WLAN 176 through AP3168. As the intermediate systems 156, 158, 172, 174 are provided at the APs 156, 158, 172, 174, the communication device 150 has also effectively been moved from a service area of the intermediate system 158 and the traffic control system 164 to a service area of the intermediate system 172 and the traffic control system 180, as represented at 186. AP2154, or possibly the intermediate system 158, detects that the communication device 150 has moved, and the intermediate system 158 transmits the traffic control rules to the intermediate system 172, as shown at 188, which then establishes the traffic control rules at the traffic control system 180, at 189. This transfer of traffic control rules may be implemented as a “push” scheme, in which the intermediate system 158 is configured to automatically transmit the traffic control rules to the intermediate system 172 on having detected or being notified about the movement of the mobile communication device from its coverage, or a “pull” scheme, in which the intermediate system 172 retrieves or requests the rules on having detected or being notified about the movement of the mobile communication device into its coverage from the intermediate system 158.
As shown in
In the case of IEEE 802.11 WLANs, intermediate systems may reside on the AP as shown or on the Access Router/Switch as shown in
A call request 196 from the call initiator 190 is blocked by the traffic control system 164 and dropped at 198. The traffic control system 164 notifies the call initiator 190 that the communication device 150 is not reachable at 200.
At some time after the traffic control rule is transmitted at 192, the communication device 150 is handed off from AP2154 to AP3168 at 202. The handoff is detected in this example by AP1154 or the intermediate system 158, which transmits the traffic control rule to AP3168, at which the intermediate system 172 is implemented, as shown at 204. The intermediate system 172 then establishes the traffic control rule at the traffic control system 180 at 206. A subsequent call request from the call initiator 190 at 208 is blocked by the traffic control system 180, which notifies the call initiator 190 at 210 that the communication device is unreachable.
In the situation where a communication device moves from a service area of an intermediate system which interacts with a traffic control system to a service area of a new intermediate system which interacts with the same traffic control system, communication traffic control context transfer to the new intermediate system may still be important. For example, with reference again to
In terms of a system for transferring communication traffic control context, context transfer may involve operations at any of a communication device, an intermediate system, and a traffic control system. The structure of these components when adapted for context transfer may be substantially similar to the examples shown in
Adaptation of a communication device and/or traffic control system for context transfer will also be apparent from the foregoing.
At 220, multiple traffic control rules are received at an intermediate system. The received traffic control rules may include traffic control rules from a single communication device or multiple communication devices in a service area of the intermediate system.
The traffic control rules are aggregated at 222 and output at 224 for transmission to a traffic control system. The aggregated traffic control rules may be transmitted at 226 at a predetermined time or after a predetermined number of traffic control rules have been aggregated, for instance. In one embodiment, the traffic control rules are aggregated into a single message or request which is transmitted to the traffic control system. The aggregated traffic control rules may be transmitted to multiple traffic control systems in some embodiments.
When a traffic control system receives a transmission of aggregated traffic control rules, it establishes at 228 communication traffic control in accordance with at least one of the traffic control rules which have been aggregated. A traffic control system may process aggregated rules to identify and implement only the traffic control rules which are applicable to the traffic control system. This feature may be particularly useful if an intermediate system communicates with more than one type of traffic control system. In this case, traffic control rules intended for different types of traffic control system may be aggregated and sent to all traffic control systems.
Communication traffic control rules which are aggregated at an intermediate system may include generic traffic control rules, communication device-specific traffic control rules which are applied only to communication traffic destined for particular communication devices, or both.
At 230, the communication device 60 transmits a traffic control rule to block HTTP requests coming from an address abc, illustratively an IP address. The communication device 61 transmits a similar traffic control rule to block HTTP requests coming another IP address, xyz, at 232. The intermediate system 70 aggregates the rules and transmits the aggregated rules to the traffic control system 72. The traffic control system 72 then implements the traffic control rules at 236 and, in the illustrated embodiment, sends an acknowledgement to the intermediate system 70 at 238. At 240 and 242, the intermediate system 70 transmits acknowledgements to each of the communication devices 60, 61.
An intermediate system which has been enabled for aggregation may have substantially the same structure as shown in
A traffic control system capable of processing aggregated traffic control rules may also be similar to the traffic control system 90 of
Mobile communication devices often support an idle or sleep mode in order to conserve power and radio resources. These devices can take advantage of communication traffic control as disclosed herein by requesting that a Paging Agent in the mobile communication network wake them up only when certain communication traffic arrives. Normally, the communication network would page a communication device every time it receives communication traffic destined for the communication device. As illustrated in
In
At 254, the communication device 150, which is associated with an address mc1@domain.com, prepares to enter an idle or sleep mode, in which it only monitors a paging channel and not other control or data channels. Before entering the idle/sleep mode, the communication device 150 transmits a traffic control rule to the intermediate system 158 at 256. The traffic control rule specifies that only video calls from the communication traffic source xyz@domain1.com (250) are to be transmitted. The intermediate system 158 may either implement the traffic control rule at the paging agent, if the paging agent is configured to provide traffic control functions, or convey the traffic control rule to the traffic control system 164 as shown at 260. The traffic control rule is established at the traffic control system 164 at 262.
A subsequent call request from the communication traffic source abc@domain2.com (252) at 264 to the communication device 150 is dropped at the traffic control system 164 at 266, since the traffic control system 164 has been explicitly instructed to transmit only video calls from xyz@domain1.com. The dropped call therefore does not cause the Paging Agent at the intermediate system 158 to page (wake-up) the communication device 150. The traffic control system 164 may, however, send a response to abc@domain2.com as shown at 268, to convey that the communication device 150 would not like to be disturbed. Such a notification may be sent, for example, if the traffic control system 164 is paging-aware.
A video call request from xyz@domain1.com (250) for the communication device 150 arrives at the Paging Agent at the intermediate system 158 as shown at 270, as the traffic control system 164 allows this call request to proceed to the intermediate system 158 in accordance with the rule established at 262. The paging agent then pages for the communication device 150 at 272 within a paging area, which is associated with the APs 152, 154 in
At 273, a paging response is received at the intermediate system 158 from an AP 152, 154 serving the communication device 150, and the video call request is forwarded to the communication device 150 at 274.
One further potential application of communication traffic control techniques in accordance with embodiments of the invention is parental or supervisory control. Traffic control rules that restrict the flow of electronic content which is not suitable for children can be configured manually by a subscriber. For example, an adult can configure a subscription or communication device so that adult content is blocked from reaching a child, and/or a child cannot order services that are not meant for them. This could entail rules that block adult services from adult websites, dynamic call blocking from strangers, etc. These rules could be initiated by a parent or a guardian, and need not be limited to controlling access to content by children.
Embodiments of the invention as described in detail above propose a mechanism for communication devices to request targeted control or filtering of communication traffic. Where the communication device is a mobile communication device, traffic control rules are preferably transferred within a communication network so that the traffic control rules effectively follow the communication device or user as the user roams. Mobile communication network access providers, for example, may thereby offer virtual traffic control services that both move with an end user and are under the user's control. Service discovery techniques provide one mode of offering traffic control services to and subsequently enabling these services for communication service subscribers.
With the growing use of mobile communication devices emerges the need for this type customized control of communication traffic destined to, or possibly originating from, such devices. These communication devices tend to have limited processing and power resources. There is currently a wide variety of mobile communication equipment in use, including laptops, smart phones, and PDAs, for example, each with its own functionality and network deployment (e.g., GSM, UMTS, WLAN) and associated bandwidth restrictions. Embodiments of the invention are applicable to virtually any type of communication device, and may be especially advantageous where traffic control processing is implemented upstream of a constrained communication device in a communication system.
What has been described is merely illustrative of the application of the principles of the invention. Other arrangements and methods can be implemented by those skilled in the art without departing from the scope of the present invention.
For example, the foregoing description considers in detail the establishment of communication traffic control. Further functions may also be supported. It may be desirable to provide for temporary suspension and/or cancellation of communication traffic control rules established at a traffic control system, for instance.
It should also be appreciated that many features of embodiments of the invention are not necessarily exclusive. For example, a communication device may be configured for both direct communication with some traffic control systems and indirect communication with other traffic control systems through an intermediate system.
In addition, although described primarily in the context of methods and systems, other implementations of the invention are also contemplated, as instructions stored on a machine-readable medium for example.