Sign In to Follow Application
View All Documents & Correspondence

Data Traffic Management In Wireless Networks

Abstract: Systems and methods for managing data traffic in wireless networks are described herein. In one implementation, a method for managing data traffic in wireless networks comprises receiving a connection request from a computing system (102) and leasing an internet protocol (IP) address to the computing system (102). The method further comprises receiving the mobile number of the computing system (102) and ascertaining the computing system (102) to be a subscriber of a service provider of the wireless network based on the mobile number. On ascertaining the computing system (102) to be a subscriber, access of internet is provided to the computing system (102), over Wi-Fi network (134).

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
24 April 2013
Publication Number
36/2016
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
iprdel@lakshmisri.com
Parent Application
Patent Number
Legal Status
Grant Date
2022-08-17
Renewal Date

Applicants

Bharti Airtel Limited
Bharti Crescent, 1 Nelson Mandela Road, Vasant Kunj, Phase II, New Delhi- 110070

Inventors

1. VARAPRASAD, Chamakura Venkata Narasimha
Bharti Crescent, 1 Nelson Mandela Road, Vasant Kunj, Phase II, New Delhi- 110070

Specification

CLIAMS:1. A method for managing data traffic in a wireless network, the method comprising:
receiving a connection request from a computing system (102);
leasing an internet protocol (IP) address to the computing system (102) as a response to the connection request;
receiving the mobile number of the computing system (102) on leasing an IP address;
ascertaining the computing system (102) to be a subscriber of a service provider of the wireless network based on the mobile number; and
providing access of internet to the computing system (102), over Wi-Fi network (134), on ascertaining the computing system (102) to be a subscriber.

2. The method as claimed in claim 1, the ascertaining further comprises:
transmitting a onetime password (OTP) over short message service (SMS) to the computing system (102);
prompting a user of the computing system (102) to enter the OTP on a captive portal;
receiving the OTP from the computing system (102);
comparing the received OTP and transmitted OTP to determine a match; and
providing access of internet to the computing system (102) on detecting the match.

3. The method as claimed in claim 1, the method further comprising:
terminating billing of a user of the computing system (102) based on a first accounting profile; and
initiating billing of the user based on a second accounting profile.

4. The method as claimed in claim 1, wherein the ascertaining further comprises querying subscriber data (130) to determine the presence of the mobile number in the subscriber data (130).

5. The method as claimed in claim 1, wherein the computing system (102) runs Android operating system.

6. A method for managing data traffic in a wireless network, the method comprising:
receiving a connection request from a computing system (102);
receiving an authentication request from the computing system (102), wherein the authentication request includes a media access control (MAC) address of the computing system (102);
obtaining authentication details from the computing system(102) wherein the authentication details include at least International Mobile Subscriber Identity (IMSI) of the computing system(102);
validating the computing system (102) to be authentic based on the MAC address and the IMSI;
providing access of internet to the computing system (102) , over Wi-Fi network (134), on validating the computing system (102) to be authentic.

7. The method as claimed in claim 6, the method further comprising:
leasing an internet protocol (IP) address to the computing system (102); and
initiating billing of the computing system (102).

8. The method as claimed in claim 6, the validating further comprises ascertaining the computing system (102) to be a subscriber of a service provider of the wireless network based on at least one of the IMSI and the MAC address.

9. The method as claimed in claim 6, wherein the computing system (102) runs Android operating system.

10. The method as claimed in any of the preceding claims, the method further comprising intercepting the user based on at least one of a mobile number of the user, the International Mobile Subscriber Identity (IMSI) of associated with a subscriber identity module (SIM) of the user and the media access control (MAC) address of the computing system.

11. A data traffic management system (101) for managing data traffic in a wireless network, the data traffic management system (101) comprising:
a processor (104-2);
a subscriber authentication module (124), coupled to the processor (104-2), to:
receive a connection request from a computing system (102);
receive an authentication request from the computing system (102), wherein the authentication request comprises at least one of a media access control (MAC) address of the computing system, an International Mobile Subscriber Identity (IMSI) of the computing system and a mobile number of the computing system;
validate the computing system (102) to be authentic based on the authentication request; and
ascertain the computing system (102) to be a subscriber of a service provider of the wireless network based on the validation; and
a network management module (126), coupled to the processor (104-2), to:
lease an internet protocol (IP) address to the computing system (102); and
provide access of internet to the computing system (102), over Wi-Fi network (134), on ascertaining the computing system (102) to be a subscriber.

12. The data traffic management system (101) as claimed in claim 11, wherein the network management module (126) implements policies for the Wi-Fi network (134) and a cellular network (132).

13. The data traffic management system (101) as claimed in claim 11, wherein the data traffic management system (101) further comprises subscriber data (130) to store details pertaining to the users, wherein the details are used for providing access of at least one of the Wi-Fi network (134) and the cellular network (132) to the users.

14. The data traffic management system (101) as claimed in claim 11, wherein the data traffic management system (101) further comprises an accounting and billing module (128), coupled to the processor (104-2) to:
maintain account of the user of the service provider;
charge the user for usage of the internet services based on at least one accounting profile associated with the user; and
generate charging data records (CDRs) for the user.

15. The data traffic management system (101) as claimed in claim 14, wherein the accounting and billing module (128) further:
retrieves details pertaining to the user from subscriber data (130) storing details pertaining to the users; and
updates the subscriber data (130) based on the IMSI.

16. The data traffic management system (101) as claimed in claim 14, wherein the network management module (126) further determines the location of the computing system (102) based on at least one of a mobile number of the user, the International Mobile Subscriber Identity (IMSI) of associated with a subscriber identity module (SIM) of the user and the media access control (MAC) address of the computing system (102).

17. The data traffic management system (101) as claimed in claim 14, wherein the accounting and billing module (128) further mentions at least one of the determined location of the user on the CDR and the media access control (MAC) address of the computing system (102).

18. The data traffic management system (101) as claimed in claim 11, wherein the data traffic management system (101) further comprises a packet analysis module 125, coupled to the processor (104-2), to perform deep packet analysis of the data packets.

19. The data traffic management system (101) as claimed in claim 11, wherein the backhaul of the Wi-Fi network (134) is implemented using long term evolution (LTE) standard of wireless communication.

20. A method for managing data traffic in a wireless network, the method comprising:
prompting a user of a computing system (102) to enter a coupon code;
receiving the coupon code from the user;
transmitting a security code over short message service (SMS) to the computing system (102);
prompting the user of the computing system (102) to enter the security code on a captive portal;
receiving the security code from the computing system (102);
comparing the received security code and transmitted security code to determine a match; and
providing access of internet to the computing system (102) , over Wi-Fi network (134), on detecting the match.

21. The method as claimed in claim 20, the method further comprising :
retrieving profile data associated with the user based on a mobile number of the user;
ascertaining the computing system (102) to be a subscriber of a service provider of the wireless network based on the mobile number; and
providing access of internet to the computing system (102) on ascertaining the computing system (102) to be a subscriber

22. The method as claimed in claim 20, the method further comprising:
terminating the connection of the computing system (102) based on at least one of an expiry of a pre-specified time period and a user input; and
generating charging data records (CDRs) for billing the user.

23. The method as claimed in claim 20, wherein the generation of CDRs further comprises integrating charges of the user for usage of Wi-Fi network (134) and cellular network (132).

24. The method as claimed in claim 20, the method further comprising intercepting the user based on at least one of a mobile number of the user, the International Mobile Subscriber Identity (IMSI) of associated with a subscriber identity module (SIM) of the user and the media access control (MAC) address of the computing system.
,TagSPECI:As Attached

Documents

Application Documents

# Name Date
1 1207-DEL-2013-IntimationOfGrant17-08-2022.pdf 2022-08-17
1 SPECIFICATION.pdf 2013-04-25
2 FORM 5.pdf 2013-04-25
2 1207-DEL-2013-PatentCertificate17-08-2022.pdf 2022-08-17
3 FORM 3.pdf 2013-04-25
3 1207-DEL-2013-CLAIMS [24-12-2019(online)].pdf 2019-12-24
4 1207-DEL-2013-FER_SER_REPLY [24-12-2019(online)].pdf 2019-12-24
4 FIGURES.pdf 2013-04-25
5 1207-del-2013-GPA-(22-05-2013).pdf 2013-05-22
5 1207-DEL-2013-FER.pdf 2019-06-25
6 1207-del-2013-Form-1-(22-05-2013).pdf 2013-05-22
6 1207-del-2013-Correspondence-Others-(11-06-2013).pdf 2013-06-11
7 1207-del-2013-Form-18-(11-06-2013).pdf 2013-06-11
7 1207-del-2013-Correspondence Others-(22-05-2013).pdf 2013-05-22
8 1207-del-2013-Form-18-(11-06-2013).pdf 2013-06-11
8 1207-del-2013-Correspondence Others-(22-05-2013).pdf 2013-05-22
9 1207-del-2013-Form-1-(22-05-2013).pdf 2013-05-22
9 1207-del-2013-Correspondence-Others-(11-06-2013).pdf 2013-06-11
10 1207-DEL-2013-FER.pdf 2019-06-25
10 1207-del-2013-GPA-(22-05-2013).pdf 2013-05-22
11 1207-DEL-2013-FER_SER_REPLY [24-12-2019(online)].pdf 2019-12-24
11 FIGURES.pdf 2013-04-25
12 FORM 3.pdf 2013-04-25
12 1207-DEL-2013-CLAIMS [24-12-2019(online)].pdf 2019-12-24
13 FORM 5.pdf 2013-04-25
13 1207-DEL-2013-PatentCertificate17-08-2022.pdf 2022-08-17
14 SPECIFICATION.pdf 2013-04-25
14 1207-DEL-2013-IntimationOfGrant17-08-2022.pdf 2022-08-17

Search Strategy

1 2019-06-2416-30-14_24-06-2019.pdf

ERegister / Renewals

3rd: 28 Oct 2022

From 24/04/2015 - To 24/04/2016

4th: 28 Oct 2022

From 24/04/2016 - To 24/04/2017

5th: 28 Oct 2022

From 24/04/2017 - To 24/04/2018

6th: 28 Oct 2022

From 24/04/2018 - To 24/04/2019

7th: 28 Oct 2022

From 24/04/2019 - To 24/04/2020

8th: 28 Oct 2022

From 24/04/2020 - To 24/04/2021

9th: 28 Oct 2022

From 24/04/2021 - To 24/04/2022

10th: 28 Oct 2022

From 24/04/2022 - To 24/04/2023

11th: 28 Oct 2022

From 24/04/2023 - To 24/04/2024

12th: 10 Apr 2024

From 24/04/2024 - To 24/04/2025

13th: 02 Apr 2025

From 24/04/2025 - To 24/04/2026