US20220086611A1 - Connected Vehicle Network Access Optimization Using an Intermediary Platform - Google Patents
Connected Vehicle Network Access Optimization Using an Intermediary Platform Download PDFInfo
- Publication number
- US20220086611A1 US20220086611A1 US17/536,996 US202117536996A US2022086611A1 US 20220086611 A1 US20220086611 A1 US 20220086611A1 US 202117536996 A US202117536996 A US 202117536996A US 2022086611 A1 US2022086611 A1 US 2022086611A1
- Authority
- US
- United States
- Prior art keywords
- access
- vehicle
- network
- communication service
- network communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/48—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/086—Access security using security domains
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
Definitions
- communications networks were relegated to providing communicative coupling between communication equipment that was stationary and thus associated with a fixed or otherwise constant geographical location.
- communicative coupling with a communications network and/or peer devices may occur from a variety of locations.
- the implementation of communicative coupling into vehicles can facilitate the advancement of autonomous vehicles that customers may use in their daily commutes along roadways, highways, and/or any other thoroughfare.
- the communications network may limit network access only to recognized vehicles. In some instances, vehicles may attempt to communicate with the communications network irrespective of whether a particular vehicle is authorized to use that communications network.
- the communications network may consume additional network resources to accommodate or otherwise support communicative coupling.
- the amount of communications generated by vehicles may contribute to network congestion, which in turn can also affect end-to-end network latency.
- a system can include a core server, a machine-to-machine server, and/or a telematics control unit.
- the system can include a processor and a memory.
- the memory can store computer-executable instructions that, in response to execution by the processor, cause the processor to perform operations.
- the operations can include receiving an access probe message from a telematics control unit of a vehicle.
- the operations can include determining that the telematics control unit is not authorized to access a network communication service.
- the operations can include generating an access redirect command that instructs a head unit of the vehicle to bypass a machine-to-machine platform so as to enable access to the network communication service via a network service portal.
- the operations can include providing the access redirect command to the telematics control unit of the vehicle.
- the access probe message comprises a probe uniform resource locator that is associated with the network communication service. In some embodiments, the access probe message requests forwarding of the access probe message to a core server associated with the network communication service. In some embodiments, the operations can further include preventing the access probe message from being forwarded to a core server associated with the network communication service. In some embodiments, the operations can further include generating an authorized access policy map associated with the network communication service, where the authorized access policy map is based on an access policy from a core server that supports the network communication service.
- determining that the telematics control unit is not authorized to access the network communication service can be based on the telematics control unit having a telematics control unit identifier that does not correspond with an authorized identifier of the authorized access policy map.
- the operations can further include receiving an access update message from the core server that supports the network communication service and instantiating an instance of an authorized identifier on the authorized access policy map for the telematics control unit of the vehicle.
- the method can include receiving, by a server of a serving network, an access probe message from a telematics control unit of a vehicle.
- the method can include determining, by the server, that the telematics control unit is not authorized to access a network communication service.
- the method can include generating, by the server, an access redirect command that instructs a head unit of the vehicle to bypass a machine-to-machine platform so as to enable access to the network communication service via a network service portal.
- the method can further include providing, by the server, the access redirect command to the telematics control unit of the vehicle.
- the access probe message can include a probe uniform resource locator that is associated with the network communication service. In some embodiments, the access probe message requests forwarding of the access probe message to a core server associated with the network communication service. In some embodiments, the method can further include preventing, by the server, the access probe message from being forwarded to a core server associated with the network communication service. The method can further include generating, by the server, an authorized access policy map associated with the network communication service, where the authorized access policy map can be based on an access policy from a core server that supports the network communication service.
- determining that the telematics control unit is not authorized to access the network communication service is based on the telematics control unit having a telematics control unit identifier that does not correspond with an authorized identifier of the authorized access policy map.
- the method can further include receiving, by the server, an access update message from the core server that supports the network communication service.
- the method can further include instantiating, by the server, an instance of an authorized identifier on the authorized access policy map for the telematics control unit of the vehicle.
- a computer storage medium can have computer-executable instructions stored thereon that, in response to execution by a processor, cause the processor to perform operations.
- the operations can include receiving an access probe message from a telematics control unit of a vehicle.
- the operations can include determining that the telematics control unit is not authorized to access a network communication service.
- the operations can include generating an access redirect command that instructs a head unit of the vehicle to bypass a machine-to-machine platform so as to enable access to the network communication service via a network service portal.
- the operations can include providing the access redirect command to the telematics control unit of the vehicle.
- the access probe message can include a probe uniform resource locator that is associated with the network communication service, and the access probe message requests forwarding of the access probe message to a core server associated with the network communication service.
- the operations further can include preventing the access probe message from being forwarded to a core server associated with the network communication service.
- the operations can further include generating an authorized access policy map associated with the network communication service, where the authorized access policy map is based on an access policy from a core server that supports the network communication service.
- determining that the telematics control unit is not authorized to access the network communication service is based on the telematics control unit having a telematics control unit identifier that does not correspond with an authorized identifier of the authorized access policy map.
- the operations further can include receiving an access update message from the core server that supports the network communication service, instantiating an instance of an authorized identifier on the authorized access policy map for the telematics control unit of the vehicle.
- FIG. 1 is a block diagram illustrating an example operating environment for implementing connected vehicle network access optimization, according to an illustrative embodiment.
- FIG. 2 is a block diagram illustrating aspects of a vehicle capable of implementing aspects of the embodiments disclosed herein.
- FIG. 3 is a flow diagram illustrating aspects of a method for network access optimization to support vehicle communications, according to an illustrative embodiment.
- FIG. 4 is a flow diagram illustrating aspects of another method for network access optimization to support vehicle communications, according to an illustrative embodiment.
- FIG. 5 is a diagram illustrating an example network capable of implementing aspects of the embodiments discussed herein.
- FIG. 6 is a block diagram illustrating an example computer system capable of implementing aspects of the embodiments presented and described herein.
- FIG. 7 is a diagram illustrating an example user equipment capable of implementing aspects of the concepts and technologies described herein according to embodiments of the present disclosure.
- Vehicles may be manufactured with various computer systems that can execute vehicle applications. Some vehicle applications may be configured to rely on network access so that certain functions, operations, and/or user interfaces and graphics may be presented to a user within the vehicle.
- a vehicle application may be considered an over-the-top (“OTT”) application based on the OTT application relying on network infrastructure to deliver audio, video, information, calls, a combination thereof, or other content to and/or from a service and/or platform on a network.
- OTT over-the-top
- an instance of an OTT application that is implemented or otherwise included for operation in and/or with a vehicle may be referred to as a “vehicle OTT application.”
- a developer of a vehicle OTT application may be pre-loaded and/or installed onto a vehicle head unit.
- Some vehicle OTT applications may operate with a configuration that assumes the state of network access is “always on” (i.e., the vehicle OTT application always has access to a network connection via the vehicle communication equipment) or “always denied” (i.e., the vehicle OTT application is always denied network access via the vehicle's communication equipment, such as a telematics control unit).
- a vehicle OTT application may assume that access to a network is available because a connection to a network can be found. If a network connection is found (or assumed to be present), the vehicle OTT application may attempt to connect with a network service. Yet the connection and/or access to the network service may be denied due to the vehicle not being registered or otherwise authorized to use the network service. As more vehicles send and receive communications to/from the network, the communications network may consume additional network resources to accommodate or otherwise support attempts at network access to utilize a network service, despite the vehicle OTT application not being authorized for access via the vehicle. As such, the amount of communications generated by vehicles may contribute to network congestion, which may burden network infrastructure and in turn can also affect end-to-end network latency.
- embodiments of the disclosure can provide connected vehicle network access optimization that enables various vehicle OTT applications to access a network service, while mitigating back-end network traffic that may burden or otherwise decrease network efficiency.
- Embodiments of the present disclosure provide a machine-to-machine platform that intercepts messages from a vehicle that are directed to a core server and/or an OTT server associated with execution of the vehicle OTT application.
- all and/or any communications may initially be routed through the machine-to-machine platform irrespective of where the message is targeted or directed.
- the machine-to-machine platform can enable a vehicle communications to bypass the machine-to-machine platform by creating and providing an access redirect command to the vehicle.
- embodiments of the present disclosure can enable the vehicle head unit to be informed that the vehicle is currently not authorized to use the network communication service (i.e., blocked) despite the vehicle being within a functioning service area of the serving network (i.e., within range of send/receiving communications with the serving network).
- Embodiments of the present disclosure can prevent the vehicle from receiving service from the OTT server via the serving network until the vehicle is authorized by the core server to use the network communications service.
- the machine-to-machine server can provide, to the vehicle, an access redirect command that causes the vehicle's telematics control unit to directly contact the core server—without being routed through the machine-to-machine platform—so that the vehicle can access a network service portal and become authorized to utilize the network communication service so as to contact the OTT server through the machine-to-machine platform.
- the vehicle head unit will not merely present “no service” when a vehicle is within communicative coupling range of the serving network but not authorized to use the network communication service, but rather the vehicle head unit and the vehicle telematics control unit can be configured to bypass the machine-to-machine platform so as to obtain authorization to use the network communication service.
- communications e.g., messages, media content streams, etc.
- the vehicle will be intercepted and rerouted through the machine-to-machine platform, and allowed to pass through (e.g., released, forwarded, routed, or otherwise provided) to the target destination, such as the OTT server associated with the vehicle OTT application.
- program modules include routines, programs, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types in response to execution on a processor so as to transform the processor into a particular machine.
- FIG. 1 aspects of an operating environment 100 for implementing various embodiments of the concepts and technologies disclosed herein pertaining to connected vehicle network access optimization will be described, according to an illustrative embodiment. It should be understood that the operating environment 100 and the various components thereof have been illustrated for clarity purposes to simplify the manner of discussion. Accordingly, additional and/or alternate components can be made available or otherwise implemented within the operating environment 100 without departing from the embodiments described herein. As such, the manner of discussion is provided such that one of ordinary skill in the technology can implement one or more embodiments described herein.
- the operating environment 100 shown in FIG. 1 includes one or more instance of a serving network 102 , one or more instances of a network access point 104 , a machine-to-machine platform (“M2M platform”) 108 , a machine-to-machine server (“M2M server”) 110 , a connected vehicle (“vehicle”) 120 , a communications network (“network”) 130 , one or more instances of a network access point 132 , and one or more instance of a core server 134 .
- M2M platform machine-to-machine platform
- M2M server machine-to-machine server
- vehicle connected vehicle
- network communications network
- the number of instances shown in FIG. 1 is for illustration purposes only and should not be construed as limiting in any way. Therefore, it is understood that zero, one, two, or more instances of each of the elements of the operating environment 100 shown in FIG. 1 may be provided in various embodiments.
- an instance of the serving network 102 can refer to a radio access network that directly connects an instance of the vehicle 120 to the M2M platform 108 , where the M2M platform 108 controls and manages whether a device (e.g., the vehicle 120 ) can access and utilize servers and services, such as but not limited to, an over-the-top server (“OTT server”) 131 , the core server 134 , and/or a network communication service 138 , which are discussed in further detail below.
- the serving network 102 can include network infrastructure devices that can facilitate communication and messaging to and/or from an instance of the vehicle 120 and/or the network 130 .
- the serving network 102 can include one or more instance of the network access point 104 .
- the network access point 104 can include, but should not be limited to, one or more of a base transceiver station, a wireless router, a femtocell, a Node B, an eNodeB, a gNodeB (i.e., an access point that incorporates New Radio access technology, such as LTE Advanced, and other 5G technology), a multi-standard metro cell node, an optical network terminal, and/or other network nodes or combinations thereof that are capable of providing communication to and/or from the serving network 102 .
- the serving network 102 may provide an initial point of contact for the vehicle 120 .
- the M2M platform 108 serves as an intermediary that enforces an access policy 144 for use of, and access to, any of the network 130 , the OTT server 131 , the core server 134 , and/or the network communication service 138 .
- the serving network 102 may direct communications from the vehicle 120 to the M2M platform 108 to ensure network service compliance with access policy restrictions pertaining to the use of the network communication service 138 , such as only allowing devices to use the network communication service 138 provided that they are identified in an authorized access policy map discussed below.
- the M2M platform 108 can include a connectivity management and handling system for supporting communications by various machine-to-machine and Internet of Things (“IoT”) devices, such as the vehicle 120 and other wireless communication devices that can connect to, and interact with, the serving network 102 .
- IoT Internet of Things
- the M2M platform 108 may be referred to as an IoT platform that supports the serving network 102 .
- the M2M platform 108 can include one or more instances of an M2M server, such as the M2M server 110 .
- a communication service provider associated with the network communication service 138 may use the M2M platform 108 to control network traffic that is directed to the network 130 (and/or a core server, such as the core server 134 of the network 130 ) so that network access and exposure of the network communication service 138 is limited to only those devices that are subscribed or otherwise authorized to utilize and access the network communication service 138 .
- the M2M platform 108 can include various virtualized and/or non-virtualized non-generic network infrastructure devices that support and provide functionality for the M2M platform 108 , such as the M2M server 110 .
- An example of a computer system that can be configured as an embodiment of the M2M server 110 is discussed with respect to FIG. 6 .
- an instance of the M2M server 110 can include one or more instances of a processing unit and a memory storage device, such as a processor 111 and a memory 112 , respectively.
- the processor 111 can include one or more instance of a processing unit and/or processing circuitry, which may execute to provide virtualized and/or non-virtualized processing.
- the processor 111 can include a central processing unit, a graphics processing unit, a system-on-chip, a combination thereof, of the like.
- the processor 111 can be configured substantially similar to a processing unit discussed with respect to FIG.
- the memory 112 can include volatile and/or non-volatile memory implemented in any method or technology for storage of information such as computer-executable instructions, data structures, software program modules, or other data disclosed herein. It is understood that, use of the term “memory” and “computer storage medium” and variations thereof in the claims does not include, and shall not be construed to include, a wave or a signal per se and/or communication media.
- the memory 112 can include a computer storage device that is configured substantially similar to memory discussed further below with respect to FIG. 6 . It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the memory 112 can store an authorized access policy map (“AAPM”) 114 and a network exposure manager application (“NEMA”) 118 .
- AAPM authorized access policy map
- NEMA network exposure manager application
- the AAPM 114 can be generated and stored within the M2M platform 108 based on the access policy 144 that corresponds to the network communication service 138 .
- the NEMA 118 can control which devices (e.g., instances of a telematics control unit) are authorized to access the network communication service 138 , and in turn the NEMA 118 can control whether one or more instances of a vehicle over-the-top application (“vehicle OTT application”) 124 can operate, execute, and/or function on a vehicle head unit (“head unit”) 122 of the vehicle 120 , specifically because the vehicle OTT application 124 relies on the network communication service 138 to function and maintain execution.
- vehicle OTT application vehicle over-the-top application
- the vehicle OTT application 124 Without access by the vehicle OTT application 124 to the network communication service 138 (provided at least in part by the network 130 and/or the serving network 102 ), execution of the vehicle OTT application 124 cannot be sustained because the vehicle OTT application 124 cannot contact an OTT server, such as the OTT server 131 . Further discussion of the AAPM 114 and the NEMA 118 will be provided below. It is understood that any of the serving network 102 , the M2M platform 108 , and the M2M server 110 may communicate with the vehicle 120 , the network 130 , and any devices included therein. In some embodiments, the M2M platform 108 may be associated with third party communication providers so as to provide IoT management for the network communication service 138 .
- service is intended to correspond with one or more network operations that support handling of communications and messages (e.g., messages to and/or from the vehicle 120 ) over the serving network 102 and/or the network 130 . Therefore, any use of the term “service” in the claims shall not be construed or interpreted as being direct to, involving, or otherwise including a judicial exception (e.g., an abstract idea, etc.) or any other non-patentable subject matter. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- an instance of the vehicle 120 is represented as a car driving along a paved roadway, although this may not necessarily be the case for all embodiments.
- vehicle and “connected vehicle” (e.g., the vehicle 120 ) refers to any ground-based vehicle that includes communication components and/or user equipment capable of sending and/or receiving communications with a network (e.g., the serving network 102 and/or the network 130 ), where the ground-based vehicle can be configured to transport, carry, direct, and/or facilitate movement of one or more passengers, cargo, and/or objects.
- an instance of the vehicle 120 can be configured as a car, a truck, a van, a sport utility vehicle, a cross-over vehicle, a motorcycle, a motorized tricycle, a scooter, a go-kart, a golf cart, a fork lift, a bus, a semi-trailer truck, a racing vehicle, a snow-capable vehicle, earth-moving equipment, farming/agriculture equipment, single or multi-wheeled vehicle, combinations thereof, or the like.
- instances of vehicles may use various power/engine mechanisms to provide movement and/or functionality, such as but not limited to motors and/or engines that employ the use of fuel, oil, batteries, combinations thereof, or the like.
- FIG. 1 Although one instance of a vehicle (i.e., the vehicle 120 ) is illustrated in FIG. 1 , it is understood that less than two or more than two instances of a vehicle can be included in various embodiments of the operating environment 100 . It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- an instance of the vehicle 120 can be driven, controlled, directed, or otherwise operated by a person. In some embodiments, an instance of the vehicle 120 may be configured to operate in at least a partially autonomous control mode. In some embodiments, an instance of the vehicle 120 may be configured to operate as a fully autonomous vehicle. In some embodiments, an instance of the vehicle 120 can operate as a “level 3” or “level 4” vehicle as defined by the National Highway Traffic Safety Administration (“NHTSA”).
- the NHTSA defines a level 3 vehicle as a limited self-driving automation vehicle that enables a driver to cede full control of all safety-critical functions under certain traffic or environmental conditions, and in those conditions to rely heavily on the vehicle to monitor for changes that require transition back to driver control.
- a level 3 vehicle the driver is expected to be available for occasional control, but with sufficiently comfortable transition time.
- a limited self-driving automation vehicle may be available from WAYMO LLC, a subsidiary of ALPHABET INC.; TESLA INC.; and/or the VOLVO CARS CORPORATION. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the NHTSA defines a level 4 vehicle as a fully self-driving automation vehicle that is designed to perform all safety-critical driving functions and monitor roadway conditions for an entire trip to a destination.
- a level 4 vehicle may include both occupied and unoccupied vehicles.
- Instances of the vehicle 120 can include any combination of the aforementioned vehicle types and can have any combination of capabilities with regard to autonomy. It is understood that the aforementioned discussion of standards defined by the NHTSA are provided for illustration purposes only, and therefore should not be construed as limiting in any way.
- an instance of the vehicle 120 can include a vehicle head unit (“head unit”), such as the vehicle head unit 122 , and a telematics control unit (“TCU”) 128 .
- the head unit 122 can include one or more instances of a display device (“display”) for presenting a user interface that can provide visual images.
- the head unit 122 also can include (and/or be communicatively coupled to) input and output components that provide audio output and receive input from a user, such as via one or more speakers and/or microphones.
- an input 127 can be provided to the head unit 122 via audio input, visual input, touch input, combinations thereof, or the like.
- the head unit 122 can be configured to include (and/or be communicatively coupled to) a heads up display, a vehicle information display, a console display, safety mechanisms (e.g., blind-spot sensors, crash avoidance, lane detection, auto-steering, etc.), a combination thereof, or any other audio, visual, and/or haptic feedback mechanism that can communicate or convey information to a user associated with the vehicle 120 .
- safety mechanisms e.g., blind-spot sensors, crash avoidance, lane detection, auto-steering, etc.
- the head unit 122 and/or the TCU 128 can be configured at least similar to a user equipment discussed with respect to FIG. 7 .
- various embodiments of the head unit 122 and/or the TCU 128 can include elements discussed therein, such as one or more instance of a processor, memory, communications components, and the like.
- the head unit 122 and/or the TCU 128 can be configured substantially similar to a vehicle head unit and a TCU discussed with respect to FIG. 2 .
- FIGS. 2 and 7 aspects of elements from a user equipment that can be included within the head unit 122 and/or the TCU 128 will be provided with respect to FIGS. 2 and 7 . It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the head unit 122 can include one or more instances of a vehicle OTT application, such as the vehicle OTT application 124 .
- the vehicle OTT application 124 can be stored in, and executed from, a memory storage device, such as a vehicle memory discussed with respect to FIG. 2 .
- Examples of an instance of the vehicle OTT application 124 can include, but should not be limited to, applications pertaining to social media, visual and/or audio calls, messaging, streaming media content (audio and/or video), geolocation mapping and/or traffic, news, weather, vehicle information, safety, or any other OTT application that can interact with and/or utilize a network communication service, such as the network communication service 138 , which will be discussed below in further detail.
- An instance of the vehicle OTT application 124 can be associated with an application identifier 126 .
- Each instance of the application identifier 126 can be a unique string that is associated with the particular vehicle OTT application 124 .
- the application identifier 126 can be included in messages to/from the vehicle 120 .
- the application identifier 126 can be used to determine whether the corresponding vehicle OTT application 124 is authorized to access the network communication service 138 via the vehicle 120 .
- the input 127 can trigger the head unit 122 to launch and/or execute an instance of the vehicle OTT application 124 .
- the input 127 can be provided to the head unit 122 while the vehicle OTT application 124 is already executing.
- the vehicle OTT application 124 may seek to connect and communicate with the OTT server 131 because the OTT server 131 may provide data, content, interfaces, and any other packet information that allows use and operation of the vehicle OTT application 124 . Further discussion of an instance of the OTT server 131 is provided below. It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the TCU 128 can be configured substantially similar to a TCU discussed with respect to FIG. 2 .
- the TCU 128 can send, receive, and/or control communication flow to/from the head unit 122 .
- the TCU 128 can include communication components and circuitry that provide and support communicative coupling with other devices and networks, such as but not limited to, the serving network 102 , the network 130 , the M2M platform 108 , and the core server 134 .
- the TCU 128 can indicate an amount of signal strength, available network connections, and other information pertaining to communication to/from the vehicle 120 .
- information provided by the TCU 128 can be presented to a user via the head unit 122 .
- the TCU 128 can expose one or more network communication interfaces that provide communication links to various network access points, such as the network access points 104 and/or 132 .
- the TCU 128 can provide and be associated with a TCU identifier 128 A.
- the TCU identifier 128 A can be unique to the vehicle 120 and/or the TCU 128 , and therefore be used by network infrastructure of the serving network 102 and/or the network 130 to determine whether the vehicle 120 is authorized to access and utilize OTT applications and network services, such as the vehicle OTT application 124 and/or the network communication service 138 .
- the TCU identifier 128 A may include and/or correspond with an international mobile equipment identity, a subscriber identity module number, an electronic serial number, a combination thereof, or another identifier assigned or associated with the TCU 128 . It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- an instance of the network 130 can be in communication with one or more instances of the serving network 102 , the vehicle 120 , user equipment, other network devices, combinations thereof, or the like.
- the network 130 can include one or more instances of the network access point 132 and other network infrastructure devices.
- the network access point 132 can be configured at least similar to one or more embodiments of the network access point 104 discussed above.
- the network 130 can refer to and/or include a core network that has network devices, servers, services, applications, and functions that support legacy, current, and/or future standards, such as 3G, 4G, LTE, 5G, or later architecture.
- the network 130 can include, support, and/or provide one or more of an evolved universal mobile telecommunications system (“UMTS”), an evolved packet core (“EPC”), a terrestrial radio access (“E-UTRAN”) device, a mobility management entity (“MME”), a serving/packet data network (“PDN) gateway (“S/PGW”), a home subscriber server (“HSS”), a mobile edge computing (“MEC”) unit, a Policy & Charging rules function (“PCRF”), an Internet Protocol Multimedia Subsystem (“IMS”), a combination thereof, and/or any other systems, devices, and/or functions that may be included in one or more of 3G, 4G, LTE, 5G, or later network architecture and standards.
- UMTS evolved universal mobile telecommunications system
- EPC evolved packet core
- E-UTRAN terrestrial radio access
- MME mobility management entity
- PDN serving/packet data network gateway
- HSS home subscriber server
- MEC mobile edge computing
- PCRF Policy & Charging rules function
- the network 130 may be referred to as a “core network” that provides a software defined network (“SDN”) architecture to support functionality and communication via 5G, New Radio, and/or other standards and protocols via the implementation of centralized and/or distributed network host devices (which may be virtualized and/or non-virtualized).
- SDN software defined network
- the network 130 can include one or more instance of a core server, such as the core server 134 .
- the core server 134 can include a processor 135 and a memory 136 .
- the processor 135 can include one or more instance of a processing unit and/or processing circuitry, which may execute to provide virtualized and/or non-virtualized processing.
- the processor 135 can include a central processing unit, a graphics processing unit, a system-on-chip, a combination thereof, of the like.
- the processor 135 can be configured substantially similar to a processing unit discussed with respect to FIG. 6 .
- the memory 136 can include volatile and/or non-volatile memory implemented in any method or technology for storage of information such as computer-executable instructions, data structures, software program modules, or other data disclosed herein. It is understood that, use of the term “memory” and “computer storage medium” and variations thereof in the claims does not include, and shall not be construed to include, a wave or a signal per se and/or communication media.
- the memory 136 can include a computer storage device that is configured substantially similar to memory discussed further below with respect to FIG. 6 . It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the core server 134 can reside in, and/or form a portion of, the network 130 and can, at least partially, support, host, or otherwise provide the network communication service 138 so as to enable various devices (e.g., the TCU 128 of the vehicle 120 ) to access and communicate with the OTT server 131 via the serving network 102 and/or the network 130 .
- the core server 134 can be configured to provide and/or support a policy control function (“PCF”) 145 and an access and mobility function (“AMF”) 146 .
- PCF policy control function
- AMF access and mobility function
- the network 130 and/or the core server 134 can, at least partially, support, host, or otherwise provide access to one or more of a session management function, an access and mobility management entity, an authentication server function, a user data management function, a user plane function, a network exposure function, unified data management (“UDM”), an application function (“AF”), an enhanced mobile broadband system (“eMBBS”), a combination thereof, and/or other applications, systems, and/or functions that may support a network architecture.
- a session management function an access and mobility management entity
- an authentication server function e.g., a user data management function
- AF application function
- eMBBS enhanced mobile broadband system
- the core server 134 can store an instance of computer readable instructions so as to configure one or more processors to perform operations.
- the computer readable instructions can be provided by a control application 140 that is stored in the memory 136 .
- the core server 134 can be associated with a communication service provider that supports and/or facilitates the operation of the network communication service 138 .
- the network communication service 138 enables user equipment and devices (e.g., the TCU 128 of the vehicle 120 ) to communicate over the serving network 102 and/or the network 130 so as to provide access and communicative coupling to devices and services associated with the vehicle OTT application 124 , such as the OTT server 131 .
- the network communication service 138 can provide and include transport layer functionality across a network, such as the serving network 102 and/or the network 130 , so that user equipment and devices (e.g., the vehicle 120 ) can engage in wireless and/or wired communication coupling to access services and devices associated with the vehicle OTT application 124 , such as the OTT server 131 that can provide a content data stream (“content stream”) 166 to the vehicle OTT application 124 executing on the vehicle 120 .
- the content stream 166 can include a successive, associated group of data packets that uniquely configure and transform a processor, display device, and other hardware resources of the vehicle 120 (e.g., the head unit 122 and any other elements discussed with respect to FIG. 2 ) for continued execution of the vehicle OTT application 124 .
- the content stream 166 can provide one-way and/or two-way audio, video, images, user interfaces, text, combinations thereof, or any other information within data packets for operation by the vehicle 120 and/or the head unit 122 .
- the content stream 166 may be provided to a corresponding instance of the vehicle OTT application 124 only after the M2M platform 108 has determined that the corresponding vehicle 120 (and thus the TCU 128 and/or head unit 122 ) is authorized to use the network communication service 138 .
- the AAPM 114 can be updated (i.e., reconfigured and instantiated with an authorization identifier that reflects the TCU 128 ), thereby authorizing the vehicle OTT application 124 to contact the OTT server 131 via the M2M platform 108 (which can intercept all communications as an intermediary to determine which communications should be allowed to pass through the serving network 102 and which communications should be blocked based on the particular vehicle from which the communication is sent).
- the content stream 166 can be generated by the OTT server 131 , routed through the M2M platform 108 , and to the TCU 128 and the head unit 122 of the vehicle 120 . It is understood that the vehicle 120 can continue to use the network communication service 138 while the vehicle 120 is within communicative coupling range of a corresponding network (e.g., the serving network 102 and/or the network 130 ) and while the vehicle 120 is authorized on the AAPM 114 to use the network communication service 138 , thereby allowing for pass-through communications via the M2M platform 108 .
- a communication service provider associated with the network communication service 138 can limit, manage, and/or control the use of, and access to, the serving network 102 and/or network 130 that provides a network path to the OTT server 131 .
- the network 130 also can include one or more instance of the OTT server 131 .
- the OTT server 131 can be associated with an instance of the vehicle OTT application 124 .
- the OTT server 131 can provide content and data (e.g., a content stream of data packets and/or individual responses to requests) to the vehicle OTT application 124 via the M2M platform 108 because the M2M platform 108 may enforce the access policy 144 on behalf of the core server 134 .
- the vehicle OTT application 124 may execute streaming audio content that is provided by the OTT server 131 .
- any of the head unit 122 , the vehicle OTT application 124 , and the TCU 128 may seek to communicate with the OTT server 131 so that the vehicle OTT application 124 can execute and/or maintain functionality for providing output within the vehicle 120 .
- access to the OTT server 131 may depend on the vehicle 120 (and/or one or more devices therein such as the TCU 128 , the head unit 122 , etc.) being authorized to use the network communication service 138 so that communications from the vehicle 120 can be routed to the OTT server 131 , which in turn may be hosted by the network 130 .
- Use of the network communication service 138 that enables access to the OTT server 131 may be enforced by the M2M platform 108 and/or the M2M server 110 based on the AAPM 114 and/or an access policy, such as the access policy 144 .
- the control application 140 can create and/or define an instance of the access policy 144 , where the access policy 144 corresponds with access to the network communication service 138 .
- the access policy 144 can be stored in network-accessible memory, such as the memory 136 .
- the access policy 144 may be defined and stored in a format that is readable by the control application 140 , such as a data structure format, an executable routine, or other computer-executable and/or readable instructions.
- the access policy 144 can indicate parameters, rules, and/or instructions that must be met in order to allow and/or authorize use of the network communication service 138 .
- the access policy 144 can instruct or otherwise configure network infrastructure (e.g., the network access point 104 , the M2M platform 108 , etc.) such that communications (e.g., messages and data) to and/or from any of the vehicle OTT application 124 , the head unit 122 , the TCU 128 , the vehicle 120 , and/or the OTT server 131 are to be routed through the M2M platform 108 so that exposure and use of the network communication service 138 can be controlled to maintain network security.
- network infrastructure e.g., the network access point 104 , the M2M platform 108 , etc.
- communications e.g., messages and data
- the access policy 144 may require that in order for a device to be authorized for ongoing communicative coupling with the serving network 102 and/or the network 130 (including communicating with the OTT server 131 ), the device must have or otherwise be associated with an instance of an equipment profile 148 that reflects an active subscription with the communication service provider.
- An instance of the equipment profile 148 can indicate that a user equipment and/or device (e.g., personal mobile phones, tablets, the TCU 128 of the vehicle 120 etc.) is authorized to use and/or have access to the network communication service 138 by having and recording an identifier associated with the device, such as an instance of a known TCU identifier 149 .
- a user associated with the vehicle 120 may have a user equipment (e.g., a personal mobile phone) that is subscribed to the network communication service 138 .
- a network service portal 142 can be associated with the network communication service 138 .
- the network service portal 142 can be hosted by the core server 134 (or any other computer system associated with the network communication service 138 ).
- the network service portal 142 can provide a web page, application, or other user interface by which the vehicle 120 can obtain or otherwise become permitted or otherwise authorized to use the network communication service 138 .
- a user associated with the vehicle 120 may have to provide an instance of the input 127 to the head unit 122 so as to confirm that the vehicle 120 will abide by the access policy 144 , thereby causing the control application 140 to create an instance of an equipment profile 148 for the TCU 128 of the vehicle 120 . If an equipment profile, such as the equipment profile 148 , associated with the user of the vehicle 120 already exists, then the control application 140 can obtain that instance of the equipment profile 148 and instantiate an identifier that reflects the identity of the TCU 128 (or another device) of the vehicle 120 , such as the known TCU identifier 149 . Instances of the equipment profile 148 can be stored on the memory 136 .
- the equipment profile 148 may be part of a user account profile and/or can be linked to a subscription associated with the user and one or more devices that are authorized and permitted to engage in communicative coupling via the network communication service 138 .
- An instance of the equipment profile 148 can be associated with one or more corresponding device that is authorized to use the network communication service 138 . For example, if a user has a mobile phone that is subscribed and authorized to use the network communication service 138 , then the mobile phone will have (or be associated with) an instance of the equipment profile 148 that provides an identifier associated with the user's mobile phone (e.g., a subscriber identity module identifier).
- one instance of the equipment profile 148 may store and identify multiple devices which are associated with a shared network account and/or subscription to the network communication service 138 .
- the user may also be associated with the vehicle 120 , where the vehicle 120 is capable of wireless communication via use of the TCU 128 .
- the user may visit a network representative of the customer service provider and may initiate authorization to setup access to the network communication service 138 before the vehicle 120 is in operation.
- a user may desire to enable the vehicle 120 to engage in communicative coupling (e.g., to allow the vehicle OTT application 124 to connect with the OTT server 131 ) without going to see a network representative to manually setup the network communication service 138 .
- an instance of the equipment profile 148 may not initially include an instance of a known TCU identifier 149 for the TCU 128 (at the time in which the vehicle OTT application 124 was launched via an instance of the input 127 ), and therefore the M2M platform 108 and/or the core server 134 may limit or otherwise prevent the TCU 128 of the vehicle 120 from accessing and using the network communication service 138 , thereby preventing the vehicle OTT application 124 from making contact with the OTT server 131 .
- the TCU 128 of the vehicle 120 may be permitted to access and use the network communication service 138 only after an instance of the equipment profile 148 stores an instance of the known TCU identifier 149 for the TCU 128 , and the M2M platform 108 becomes aware that the vehicle 120 is authorized to use the network communication service 138 (e.g., the NEMA 118 instantiating the AAPM 114 with an instance of an authorized identifier 116 that reflects the TCU identifier 128 A, and thus the TCU 128 of the vehicle 120 , as further discussed below).
- the known TCU identifier 149 may be substantially similar to the TCU identifier 128 A, and therefore can identify the vehicle 120 and/or the TCU 128 associated with the vehicle 120 .
- the TCU identifier 128 A (and thus also an instance of the known TCU identifier 149 ) can refer to a unique identifier (e.g., an equipment identifier) for the TCU 128 that operates in the vehicle 120 .
- the M2M platform 108 can enforce the access policy 144 by confirming whether a device is authorized to use the network communication service 138 .
- the access policy 144 can indicate that the network communication service 138 is allowed to be accessed and/or utilized only by devices (e.g., the TCU 128 of the vehicle 120 ) that have an instance of an identifier (e.g., the known TCU identifier 149 ) that is associated with an instance of the equipment profile 148 .
- the M2M platform 108 can know, and/or be informed, of the state of the instance of the equipment profile 148 via the AAPM 114 .
- the AAPM 114 can indicate which devices should be allowed to use the M2M platform 108 to access the network communication service 138 based on whether an instance of an authorized identifier 116 is present within the AAPM 114 .
- An instance of the authorized identifier 116 provides an identity of a device that is authorized to access the network communication service 138 through the M2M platform 108 .
- Instances of authorized identifiers e.g., any of authorized identifiers 116 A-N
- an authorized identifier e.g., any of authorized identifiers 116 A-N
- the M2M platform 108 can allow the corresponding device (e.g., the TCU 128 of the vehicle 120 ) to use the network communication service 138 and M2M platform 108 in order to connect with the OTT server 131 .
- the M2M platform 108 if a message that is received by the M2M platform 108 has an identifier (e.g., the TCU identifier 128 A) that matches one of the authorized identifiers 116 A-N of the AAPM 114 , then the corresponding device which sent the message (e.g., the TCU 128 of the vehicle 120 ) would be authorized to use the network communication service 138 and access the OTT server 131 via the M2M platform 108 .
- an identifier e.g., the TCU identifier 128 A
- the message includes an identifier that does not match any of the authorized identifiers 116 A-N of the AAPM 114 , then the corresponding device which sent the message would not be authorized to use the network communication service 138 , thereby blocking messages from the device from being routed through the M2M platform 108 to the OTT server 131 .
- FIG. 1 For clarity, a brief discussion of an example communication flow will be provided with respect to FIG. 1 . It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the user of the vehicle 120 may desire to execute the vehicle OTT application 124 to provide output (e.g., audio and/or video data) via the head unit 122 .
- the user can provide an instance of the input 127 to the head unit 122 to initiate execution of the vehicle OTT application 124 .
- the head unit 122 can determine that the vehicle OTT application 124 relies on a network connection to receive data for the vehicle OTT application 124 (e.g., media data associated with an over-the-top service provided by the OTT server 131 ).
- the head unit 122 can generate an instance of an access probe message 150 that requests access to the network communication service 138 .
- the access probe message 150 can include a probe uniform resource locator (“probe URL”) 152 .
- the probe URL 152 can refer to a network address string that is directed to a target destination that facilitates network communication for execution and operation of the vehicle OTT application 124 .
- Examples of the target destination can include the network communication service 138 , the core server 134 associated with the network communication service 138 , and/or the OTT server 131 .
- the access probe message 150 can also include the TCU identifier 128 A associated with the TCU 128 of the vehicle 120 .
- the head unit 122 may not be aware of network reachability—that is, whether the TCU 128 of the vehicle 120 is authorized or otherwise permitted to use the network communication service 138 .
- the head unit 122 can pass or otherwise provide the access probe message 150 to the TCU 128 .
- the TCU 128 can establish a connection with the serving network 102 , and provide the access probe message 150 to the serving network 102 .
- the network access point 104 can relay the access probe message 150 to the M2M platform 108 of the serving network 102 .
- the NEMA 118 may be executing on one or more servers of the M2M platform 108 (e.g., the M2M server 110 ).
- the NEMA 118 may receive and analyze the access probe message 150 .
- the NEMA 118 may determine that the access probe message 150 is requesting forwarding to a target destination, such as one or more of the core server 134 , the network communication service 138 , and/or the OTT server 131 . Instead of forwarding the access probe message 150 as requested, the NEMA 118 may prevent the access probe message 150 from being forwarded in order to confirm whether the TCU 128 of the vehicle 120 is authorized to access the network communication service 138 .
- the NEMA 118 may access the AAPM 114 and compare the TCU identifier 128 A against the authorized identifiers 116 A-N to determine whether a match exists. In some embodiments, if the AAPM 114 indicates that one of the authorized identifiers 116 A-N matches or otherwise corresponds with the TCU identifier 128 A from the access probe message 150 , then the TCU 128 of the vehicle 120 is authorized to use the network communication service 138 , so the NEMA 118 permits the access probe message 150 (or any other message) to be forwarded on from the M2M platform 108 to the target destination. In another embodiment, if none of the authorized identifiers 116 A-N from the AAPM 114 match or otherwise correspond with the TCU identifier 128 A, then the TCU 128 is not authorized to access the network communication service 138 .
- the NEMA 118 can generate an access redirect command 154 .
- the access redirect command 154 can instruct, via a redirect instruction, the head unit 122 of the vehicle 120 to bypass the M2M platform 108 so as to enable access to the network communication service 138 via the network service portal 142 .
- the access redirect command 154 can include a redirect instruction 156 .
- the access redirect command 154 can conform to a Hypertext Transfer Protocol (HTTP) specification status code, such as but not limited to one or more of HTTP status code 302 , 303 , 307 , or another status code discussed with respect to a standards document as understood by one of skill in the technology.
- HTTP Hypertext Transfer Protocol
- the redirect instruction 156 can include a redirect URL 158 that points to the network service portal 142 associated with the network communication service 138 .
- the redirect instruction 156 can impart the redirect URL 158 to the head unit 122 and/or the TCU 128 so that the M2M platform 108 is bypassed and access to the network communication service 138 can be enabled or otherwise obtained directly from the core server 134 via the network service portal 142 , without being routed through the M2M platform 108 .
- the NEMA 118 can provide the access redirect command 154 to the TCU 128 of the vehicle 120 .
- the access redirect command 154 (and/or any other message discussed herein that is sent from and/or received by the vehicle 120 ) can be configured according to a vehicle-to-network message format, such as but not limited to one or more of messaging in conformance with PC5, 802.11p, UU, LTE-V2X, or another standard that conforms with vehicle communications standards as understood by one of ordinary skill in the technology.
- the access redirect command 154 can provide the vehicle 120 (and thus the TCU 128 ) with a one-time bypass of the M2M platform 108 so as to enable the vehicle 120 to become authorized to use the network communication service 138 by contacting the core server 134 directly to access the network service portal 142 by bypassing the M2M platform 108 .
- any communications from the vehicle 120 can be intercepted and rerouted to the M2M platform 108 so as to block and/or prevent the communications from reaching the target destination (e.g., the OTT server 131 ), thereby preventing the OTT server 131 from providing the content stream 166 to the head unit 122 until the AAPM 114 indicates that the vehicle 120 is authorized to use the network communication service 138 .
- the target destination e.g., the OTT server 131
- the TCU 128 may receive the access redirect command 154 . In some embodiments, the TCU 128 may relay or otherwise inform the head unit 122 of the access redirect command 154 and any data included therein, such as the redirect instruction 156 and the redirect URL 158 .
- the TCU 128 and/or the head unit 122 can generate an access redirect request message (“access redirect request”) 160 based on the access redirect command 154 and the redirect instruction 156 from the M2M platform 108 .
- the access redirect request 160 can include the redirect URL 158 that redirects the TCU 128 to contact the network service portal 142 so as to bypass the M2M platform 108 and enable the network communication service 138 .
- the TCU 128 can send or otherwise provide the access redirect request 160 to the core server 134 of the network 130 that hosts the network service portal 142 .
- the access redirect request 160 can be routed from a network access point (e.g., any of the network access points 104 , 132 ) to the core server 134 such that the access redirect request 160 is not intercepted by the M2M platform 108 and M2M server 110 , thereby allowing the TCU 128 to obtain access and authorization to the network communication service 138 via the network service portal 142 .
- the network service portal 142 can provide one or more user interfaces to the head unit 122 as to enable the vehicle 120 to obtain authorization to use and access the network communication service 138 .
- the one or more user interfaces may be provided to the TCU 128 and/or the head unit 122 in one or more instance of a network service portal response 162 .
- the access redirect request 160 can include an instance of the TCU identifier 128 A associated with the TCU 128 .
- the user can provide an instance of input to the head unit 122 (and/or the TCU 128 ) that indicates permission for the control application 140 (on the core server 134 ) to add the vehicle 120 (and/or the TCU 128 ) to a corresponding instance of the equipment profile 148 so as to indicate that the TCU 128 is an authorized device that is permitted to use the network communication service 138 .
- the user may also grant a communication service provider permission to change and/or upgrade a data plan for use of the vehicle 120 with the network communication service 138 .
- control application 140 can receive input from the user (e.g., via the TCU 128 and/or the control application 140 engaging in one or more instances of the access redirect request 160 and/or the network service portal response 162 ) requesting access to and use of the network communication service 138 by the vehicle 120 .
- the control application 140 can grant and enable the TCU 128 of the vehicle 120 to access the network communication service 138 by instantiating the known TCU identifier 149 within the equipment profile 148 associated with the vehicle 120 and/or user of the vehicle 120 .
- the known TCU identifier 149 that is recorded in the equipment profile 148 matches, corresponds to, or otherwise reflects the TCU identifier 128 A associated with the TCU 128 and the vehicle 120 which is being granted permission to use the network communication service 138 .
- an instance of the known TCU identifier 149 that identifies (or otherwise corresponds with) the vehicle 120 (and/or the TCU 128 ) did not exist (or was not stored) in the equipment profile 148 when the vehicle 120 was unauthorized to use the network communication service 138 (i.e., prior to the TCU 128 of the vehicle 120 being permitted to engage in use of the network communication service 138 , and thus yet not permitted to contact the OTT server 131 ).
- the presence of the known TCU identifier 149 within the equipment profile 148 indicates that a corresponding device (e.g., the TCU 128 of the vehicle 120 ) is permitted and authorized to use the network communication service 138 .
- the TCU 128 may be informed that the vehicle 120 is authorized to access the network communication service 138 via the network service portal response 162 .
- the control application 140 may send an access update message 170 to the NEMA 118 of the M2M platform 108 .
- the NEMA 118 can extract and analyze the known TCU identifier 149 from the access update message 170 , and create an instance of the authorized identifier 116 within the AAPM 114 (e.g., any of the authorized identifiers 116 A-N) to correspond with, and identify, the known TCU identifier 149 .
- each instance of the authorized identifiers 116 A-N can correspond with and represent an identifier stored in an instance of the equipment profile 148 (e.g., the authorized identifier 116 B being created and/or configured to represent the known TCU identifier 149 that is associated with the TCU 128 , the TCU identifier 128 A, and the vehicle 120 ).
- the NEMA 118 may not recognize the vehicle 120 because the AAPM 114 does not indicate that any of the authorized identifiers 116 A-N belong to the TCU 128 of the vehicle 120 .
- the M2M platform 108 may deny the vehicle 120 access to the network communication service 138 and prevent the vehicle OTT application 124 from using the M2M platform 108 to access the OTT server 131 . Yet once one of the authorized identifiers 116 A-N within the AAPM 114 matches or otherwise corresponds with the TCU identifier 128 A provided by the TCU 128 , then the M2M platform 108 may allow messages from the vehicle 120 to pass through the M2M platform 108 and use the network communication service 138 .
- the TCU 128 may send a subsequent access probe message 150 ′.
- the subsequent access probe message 150 ′ may include another instance of the probe URL 152 , which is illustrated as probe URL 152 ′.
- the subsequent access probe message 150 ′ may include the TCU identifier 128 A that is associated with the TCU 128 and the vehicle 120 .
- the M2M platform 108 can determine that one of the authorized identifiers 116 A-N within the AAPM 114 corresponds with the TCU identifier 128 A, and therefore the M2M platform 108 can grant the vehicle 120 access to the network communication service 138 .
- the subsequent access probe message 150 ′ can be forwarded on to a target destination, such as one or more of the core server 134 and/or the OTT server 131 via the M2M platform 108 .
- the core server 134 and/or OTT server 131 can receive the message sent from the vehicle 120 via the M2M platform 108 (e.g., the access probe message 150 and/or the subsequent access probe message 150 ′) and, in response, generate an access probe response 164 that informs the vehicle 120 that the TCU 128 and the vehicle OTT application 124 are permitted or otherwise authorized to connect with the OTT server 131 because the vehicle 120 is authorized to use the network communication service 138 .
- the access probe response 164 can be sent from the core server 134 and/or the OTT server 131 to the vehicle 120 via the M2M platform 108 (i.e., by the M2M platform 108 being an intermediary point of access policy enforcement).
- an instance of the access probe response 164 can be provided directly to the vehicle 120 so as to bypass the M2M platform 108 , where the access probe response 164 can inform the vehicle 120 that the head unit 122 and/or the TCU 128 is authorized to use the network communication service 138 .
- the content stream 166 may be provided to the vehicle OTT application 124 after a subsequent instance of the access probe message 150 is sent (e.g., an instance of the subsequent access probe message 150 ′) to the M2M platform 108 , which determines that the vehicle 120 is now authorized to use the network communication service 138 .
- a subsequent instance of the access probe message 150 is sent (e.g., an instance of the subsequent access probe message 150 ′) to the M2M platform 108 , which determines that the vehicle 120 is now authorized to use the network communication service 138 .
- any previous and/or current communications that are directed a target destination e.g., to the OTT server 131
- the M2M platform 108 can continue to intercept communications (e.g., the content stream 166 ) that are directed to and/or sent from the vehicle 120 associated with the vehicle OTT application 124 , thereby enabling enforcement of the access policy and optimization of network resources because communications are routed to their final destination only when the corresponding vehicle 120 is authorized to use the network communication service 138 .
- communications e.g., the content stream 166
- the control application 140 may lock or otherwise prevent the vehicle 120 from using the network communication service 138 by removing the known TCU identifier 149 from the equipment profile 148 .
- the NEMA 118 may remove the corresponding authorized identifier from the AAPM 114 so that when the vehicle 120 attempts to contact the OTT server 131 and/or the core server 134 to use the network communication service 138 , the M2M platform 108 can provide an access denied response 153 to inform the vehicle 120 that access to the network communication service 138 has been withdrawn. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- FIG. 1 illustrates the operating environment 100 having one instance of the serving network 102 , the network access point 104 , the M2M platform 108 , the M2M server 110 , the processor 111 , the memory 112 , the AAPM 114 , the authorized identifiers 116 A-N, the NEMA 118 , the vehicle 120 , the head unit 122 , the vehicle OTT application 124 , the application identifier 126 , the input 127 , the TCU 128 , the TCU identifier 128 A, the network 130 , the OTT server 131 , the network access point 132 , the core server 134 , the processor 135 , the memory 136 , the network communication service 138 , the control application 140 , the network service portal 142 , the access policy 144 , the PCF 145 , the AMF 146 , the equipment profile 148 , the known TCU identifier 149 , the access probe message 150 , the probe URL 152 , the subsequent
- the illustrated embodiment of the operating environment 100 is understood to be illustrative and should not be construed as being limiting in any way.
- FIG. 2 a block diagram 200 illustrating an instance of a vehicle 201 and aspects thereof will be described, according to an illustrative embodiment. It is understood that one or more instances of the vehicle 120 illustrated and discussed with respect to FIG. 1 can be configured substantially similar to the vehicle 201 shown and discussed with respect to FIG. 2 .
- the vehicle 201 shown in FIG. 2 is illustrated for purposes of clarity of discussion, and therefore is provided as an example. It is understood that zero, one, or more than one instances of the components discussed herein with respect to the vehicle 201 may be implemented in various embodiments. As such, the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the illustrated vehicle 201 includes vehicle mechanical/electrical function components 202 , a vehicle processor 203 , a vehicle memory 204 , a vehicle firmware 206 , a vehicle operating system 208 , a telematics control unit 209 , one or more vehicle software application 210 , a vehicle head unit 211 , a display 211 A, an input/output component 211 B, a vehicle wireless communications component 212 , an instance of a vehicle communication interface 218 that supports a direct transmission mode 219 , an instance of the network communication interface 220 that supports the network transmission mode 221 , a vehicle dedicated short-range communications (“DSRC”) component 214 , and a cellular vehicle-to-anything (“C-V2X”) component 216 .
- vehicle mechanical/electrical function components 202 includes vehicle mechanical/electrical function components 202 , a vehicle processor 203 , a vehicle memory 204 , a vehicle firmware 206 , a vehicle operating system 208 , a telematics control unit 209
- V2X vehicle-to-anything
- vehicle-to-anything refers to a vehicle's communication ability (e.g., the vehicle 201 ) through components (e.g., a telematics control unit) that are configured to communicate with one or more network or network infrastructure, such as the serving network 102 , the M2M platform 108 , the network 130 , the OTT server 131 , the core server 134 , or the like.
- V2X vehicle-to-everything
- V2X vehicle-to-everything
- V2X vehicle-to-everything
- V2V vehicle-to-vehicle
- V2I vehicle-to-infrastructure
- V2N vehicle-to-network
- V2P vehicle-to-pedestrian
- the vehicle mechanical/electrical function components 202 can include mechanisms, circuitry, elements, and/or components of the vehicle 201 that enable the vehicle to function and operate.
- one or more instances of the vehicle mechanical/electrical function components 202 can include, an engine, a transmission, a braking system, a transmission control unit, an engine control unit, a battery, an electrical system, a safety system, a heating ventilation and air conditioning system, a lighting system, a sensor system (e.g., a lane detection system, crash avoidance system, etc.), or any other component or element that may facilitate function of the vehicle 201 and/or support one or more of the operations discussed herein.
- the vehicle processor 203 can include one or more hardware components that perform computations to process data, and/or to execute computer-executable instructions of one or more application programs such as the vehicle software application(s) 210 , one or more operating systems such as the vehicle operating system 208 , other software, and/or the vehicle firmware 206 .
- the vehicle processor 203 can include one or more central processing units (“CPUs”) and/or engine control units (“ECU”) configured with one or more processing cores.
- the vehicle processor 203 can include one or more graphics processing unit (“GPU”) configured to accelerate operations performed by one or more CPUs, and/or to perform computations to process data, and/or to execute computer-executable instructions of one or more application programs, operating systems, and/or other software that may or may not include instructions particular to graphics computations.
- the vehicle processor 203 can include one or more discrete GPUs.
- the vehicle processor 203 can include CPU, ECU, and/or GPU components that are configured in accordance with a co-processing CPU/GPU computing model, wherein the sequential part of an application executes on the CPU and the computationally-intensive part is accelerated by the GPU.
- the vehicle processor 203 can include one or more system-on-chip (“SoC”) components along with one or more other components illustrated as being part of the vehicle 201 , including, for example, the vehicle memory 204 , the vehicle wireless communications component 212 , the DSRC component 214 , or some combination thereof.
- SoC system-on-chip
- the vehicle processor 203 can be or can include one or more SNAPDRAGON SoCs, available from QUALCOMM of San Diego, Calif.; one or more TEGRA SoCs, available from NVIDIA of Santa Clara, Calif.; one or more HUMMINGBIRD SoCs, available from SAMSUNG of Seoul, South Korea; one or more Open Multimedia Application Platform (“OMAP”) SoCs, available from TEXAS INSTRUMENTS of Dallas, Tex.; one or more customized versions of any of the above SoCs; and/or one or more proprietary SoCs.
- the vehicle processor 203 can be or can include one or more hardware components architected in accordance with an ARM architecture, available for license from ARM HOLDINGS of Cambridge, United Kingdom.
- the vehicle processor 203 can be or can include one or more hardware components architected in accordance with an x86 architecture, such an architecture available from INTEL CORPORATION of Mountain View, Calif., and others. Those skilled in the technology will appreciate the implementation of the vehicle processor 203 can utilize various computation architectures, and as such, the vehicle processor 203 should not be construed as being limited to any particular computation architecture or combination of computation architectures, including those explicitly disclosed herein.
- the vehicle memory 204 can include one or more hardware components that perform storage operations, including temporary or permanent storage operations.
- the vehicle memory 204 includes volatile and/or non-volatile memory implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, the vehicle operating system 208 , the vehicle firmware 206 , the vehicle software application(s) 210 , and/or other software, firmware, and/or other data disclosed herein.
- Computer storage media includes, but is not limited to, random access memory (“RAM”), read-only memory (“ROM”), Erasable Programmable ROM (“EPROM”), Electrically Erasable Programmable ROM (“EEPROM”), flash memory or other solid state memory technology, CD-ROM, digital versatile disks (“DVD”), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store data and which can be accessed by the vehicle processor 203 .
- the vehicle memory 204 may be configured substantially similar to memory 604 discussed with respect to FIG. 6 . It is understood that one or more instances of the vehicle memory 204 can be included in one or more of the components of the vehicle 201 (and/or the vehicle 120 from FIG.
- vehicle memory does not include waves or signals per se and/or communication media.
- the vehicle firmware 206 which in some embodiments may also be known as microcode, can be written onto a ROM of the vehicle memory 204 .
- the vehicle firmware 206 can be written on the ROM at the time of manufacturing and is used to execute programs on the vehicle processor 203 .
- the vehicle firmware 206 includes the vehicle operating system 208 .
- the vehicle firmware 206 is the vehicle operating system 208 .
- the vehicle firmware 206 and the vehicle operating system 208 are closely integrated for performance of operations of the vehicle 201 .
- the vehicle operating system 208 can control the operation of at least a portion of the vehicle 201 .
- the vehicle operating system 208 includes the functionality of the vehicle firmware 206 and/or the vehicle software application(s) 210 .
- the vehicle operating system 208 can be executed by the vehicle processor 203 to cause the vehicle 201 to perform various operations.
- the vehicle operating system 208 can include, by way of example without limitation, a member of the SYMBIAN OS family of operating systems from SYMBIAN LIMITED; a member of the WINDOWS OS, WINDOWS MOBILE OS, and/or WINDOWS PHONE OS families of operating systems from MICROSOFT CORPORATION; a member of the PALM WEBOS family of operating systems from HEWLETT PACKARD CORPORATION; a member of the BLACKBERRY OS family of operating systems from RESEARCH IN MOTION LIMITED; a member of the IOS family of operating systems, a memory of the CARPLAY family of operating systems, and/or a member of the OS X family of operating systems from APPLE INC.; a member of the ANDROID OS family and/or the ANDROID AUTO family of operating systems from GOOGLE INC.; an open-source software operating system build around the LINUX kernel; a member of a real-time operating system; a member of a portable operating system interface automotive open system architecture and/
- the vehicle software application(s) 210 can execute on top of the vehicle operating system 208 .
- the vehicle software application(s) 210 can be executed by the vehicle processor 203 to cause the vehicle 201 (and/or components thereof, such as the vehicle head unit 211 and/or the telematics control unit 209 ) to perform various operations described herein.
- the vehicle software application(s) 210 can be part of a vehicle entertainment system, a vehicle navigation system, a vehicle “ECU”, and/or another computing system of the user vehicle.
- the vehicle software application(s) 210 can include one or more instances of the vehicle OTT application 124 of FIG. 1 .
- the telematics control unit 209 may be configured substantially similar to the TCU 128 discussed with respect to FIG. 1 .
- the telematics control unit 209 may include and/or control the vehicle wireless communications components 212 discussed below.
- the telematics control unit 209 can include one or more instances of the vehicle processor 203 , the vehicle memory 204 , the vehicle operating system 208 , and/or the vehicle firmware 206 .
- the telematics control unit 209 may be configured to control the inflow and/or outflow of communications to and/or from the vehicle 201 via one or more of the vehicle wireless communications components 212 .
- the telematics control unit 209 can control, provide, and/or facilitate wireless tracking, wireless diagnostics, device pairing, crash notification, and other communication to/from the vehicle 201 .
- the telematics control unit 209 can include circuitry that operates as a network interface controller and can provide communication to the vehicle head unit 211 and/or one or more vehicle software applications 210 .
- the telematics control unit 209 can perform one or more functions and/or operations discussed herein, such as but not limited to operations discussed with respect to FIG. 1 , FIG. 3 , and/or FIG. 4 .
- the vehicle head unit 211 may be configured substantially similar to the head unit 122 discussed above with respect to FIG. 1 .
- the vehicle head unit 211 can include the display 211 A that can be configured to present and/or provide audio output and/or video output via one or more user interface.
- the display 211 A of the vehicle head unit 211 can have a display device that presents various user interfaces, requests, messages, and/or any other information (e.g., any of the messages, commands, requests, responses, and/or identifiers from FIG. 1 ) to a user or other occupant associated with the vehicle 120 and/or the vehicle 201 .
- the input/output component 211 B can provide a user touch-screen, audio speakers, microphones, haptic feedback system, or other input and/or output device or component that can alert a user to various communications.
- an instance of the input/output component 211 B and/or the display 211 A can be implemented to enable the input 127 to be provided to the head unit 122 of the vehicle 120 .
- the vehicle wireless communications component 212 can include one or more wireless wide area network (“WWAN”) components (e.g., radio transceivers, antenna, etc.) capable of facilitating communication with one or more WWANs, such as the serving network 102 and/or the network 130 .
- WWAN wireless wide area network
- one or more instances of the vehicle wireless communications component 212 can be configured to provide multi-mode wireless connectivity.
- the vehicle wireless communications component 212 may be configured to provide connectivity to the serving network 102 and/or the network 130 and may provide functions in accordance with UMTS, LTE, 5G and New Radio standards, or via some other combination of technologies, and more particularly, one or more technologies that support cell broadcast functionality.
- the vehicle wireless communications component 212 can include one or more instances of a transceiver, sensors, cameras, circuitry, antennas, and any other components that can support and facilitate sending and/or receiving communications over the vehicle communication interface 218 using the direct transmission mode 219 and/or the network communication interface 220 using the network transmission mode 221 .
- the vehicle communication interface 218 can be provided and/or hosted by the DSRC component 214 and/or the C-V2X component 216 .
- the direct transmission mode 219 refers to a communication routine (which may be executed by the telematics control unit 209 ) by which a vehicle can communicate messages to/from another device (while within each other's communication range) without the messages being passed through an intermediary device of the network (e.g., without being handled by any of the network access points 104 , 132 , the core server 134 , the M2M platform 108 , etc.).
- the direct transmission mode 219 can be provided over an 802.11x protocol (e.g., 802.11p or protocol within the 802.11 family of wireless local area network standards), which in some embodiments may be referred to as protocols and/or standards for dedicated short-range communications (“DSRC”).
- 802.11x protocol e.g., 802.11p or protocol within the 802.11 family of wireless local area network standards
- DSRC dedicated short-range communications
- the direct transmission mode 219 can be provided using specifications pertaining to cellular V2X (“C-V2X”), which is initially defined by the Third Generation Partnership Project (“3GPP”) Release 14, discussed in Release 15 and later.
- C-V2X cellular V2X
- standards and protocols of C-V2X may allow communication components to be configured to support the direct transmission mode 219 (e.g., via a PC5 interface) and the network transmission mode 221 (e.g., via a Uu interface).
- the vehicle communication interface 218 can be configured to use, support, and provide the direct transmission mode 219
- the network communication interface 220 can be configured to use, support, and provide the network transmission mode 221 .
- the network transmission mode 221 refers to a vehicle communication routine (which may be executed by the telematics control unit 209 ) by which the vehicle wireless communications component 212 uses and communicates with network infrastructure (e.g., network devices of the serving network 102 and/or the network 130 ) to transmit various communications that are directed to one or more device through a device of the network (i.e., network infrastructure), such as any of the network access points 104 , 132 , the M2M platform 108 , and/or the core server 134 .
- network infrastructure e.g., network devices of the serving network 102 and/or the network 130
- one or more instances of a communication may be generated and/or received with a configuration that facilitates and supports the use of the network transmission mode 221 .
- the DSRC component 214 can be a radio communications device and/or circuitry that can send and receive various communications (not shown) using the direct transmission mode 219 .
- the DSRC component 214 is configured to operate within a 5.9 GHz radio frequency band as defined by the United States Department of Transportation.
- the DSRC component 214 is configured to operate within other radio frequency bands.
- the DSRC component 214 can operate using 802.11p or other technology.
- the C-V2X component 216 can be a radio communications device and/or circuitry that can send and receive V2X communications using the direct transmission mode 219 and/or the network transmission mode 221 .
- the C-V2X component 216 can operate in accordance with 3GPP Release 14 or later.
- the C-V2X component 216 can support and provide the vehicle communication interface 218 and/or the network communication interface 220 .
- the C-V2X component 216 can be configured to support 5G New Radio transmissions and direct communication transmissions so that communications may occur within and/or outside of a direct communication range.
- the C-V2X component 216 can transmit and receive communications over the direct transmission mode 106 within an ITS spectrum, such as a 5.9 GHz ITS band. In some embodiments, the C-V2X component 216 can provide transmission latency that is no more than a defined amount of milliseconds (e.g., less than 10 milliseconds). In some embodiments, the TCU 128 can include, and/or be configured to invoke, the C-V2X component 216 and/or the vehicle DSRC component 214 . It should be understood that the embodiment of the vehicle 201 illustrated in FIG. 2 is provided as an example of a possible implementation of the vehicle 120 discussed with respect to FIG. 1 . The examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- FIGS. 3 and 4 aspects of a method 300 and a method 400 for embodiments pertaining to aspects of connected vehicle network access optimization will be described in detail, according to various illustrative embodiments. It should be understood that each of the operations of the one or more methods disclosed herein (e.g., the method 300 and/or the method 400 discussed below) are not necessarily presented in any particular order and that performance of some or all of the operations in an alternate order(s) is possible and is contemplated. It is also understood that any of the operations from the methods disclosed herein may be combined or otherwise arranged to yield another embodiment of a method that is within the scope of the concepts and technologies discussed herein.
- module refers to a defined, callable set of computer-readable and executable instructions that, upon execution by a processor, configure at least a processor to perform at least a portion of one or more operations and functions discussed herein so as to transform, upon execution, processing resources and/or memory resources into a particular, non-generic, machine.
- Computer-readable instructions can be implemented on various system configurations including but not limited to one or more of single-processor or multiprocessor systems, minicomputers, user equipment, mainframe computers, personal computers, network servers, hand-held computing devices, microprocessor-based, programmable consumer electronics, a network platform, edge devices, vehicles, combinations thereof, and the like.
- the logical operations described herein are implemented (1) as a sequence of computer implemented acts or program modules running on a computing system and/or (2) as interconnected machine logic circuits or circuit modules within the computing system so as to provide a particular, non-generic machine device.
- the implementation is a matter of choice dependent on the performance and other requirements of the computing system.
- the logical operations described herein are referred to variously as states, operations, structural devices, acts, functions, instructions, and/or modules. These states, operations, structural devices, acts, functions, instructions, and/or modules may be implemented in software, in firmware, in special purpose digital logic, and any combination thereof.
- the phrase “cause a processor to perform operations” and variants thereof is used to refer to causing and transforming a processor of a computing system or device, such as any component within one or more of the vehicle 120 , serving network 102 , the M2M platform 108 , the M2M server 110 , the network 130 , the OTT server 131 , and/or the core server 134 , to perform one or more operations and/or causing one or more instances of a processor to direct other components of a computing system or device, to perform one or more of the operations.
- a processor of a computing system or device such as any component within one or more of the vehicle 120 , serving network 102 , the M2M platform 108 , the M2M server 110 , the network 130 , the OTT server 131 , and/or the core server 134 , to perform one or more operations and/or causing one or more instances of a processor to direct other components of a computing system or device, to perform one or more of the operations.
- one or more of the operations of methods disclosed herein are described as being performed by one or more instance of the TCU 128 and/or the head unit 122 of the vehicle 120 , the M2M server 110 of the M2M platform 108 , the core server 134 associated with the network communication service 138 , or a combination thereof, via execution of one or more computer-readable instructions configured so as to instruct and transform a processor.
- additional and/or alternative devices and/or network infrastructure devices can, in some embodiments, provide the functionality described herein via execution of one or more routines, applications, and/or other software including, but not limited to, the vehicle OTT application 124 , the NEMA 118 , the control application 140 , the vehicle software application 210 , the vehicle firmware 206 , the vehicle operating system 208 , and/or any other computer executable instructions that can configure a device discussed herein, such as but not limited to one or more of the M2M platform 108 , the M2M server 110 , the vehicle 120 , the OTT server 131 , and/or the core server 134 .
- the illustrated embodiments are illustrative, and should not be viewed as being limiting in any way.
- any computer system of the M2M platform 108 can execute an instance of the NEMA 118 so as to cause one or more processor (e.g., an instance of the processor 111 ) to perform at least a portion of one or more operations discussed herein.
- execution of the control application 140 can cause one or more instances of a core server 134 and/or the M2M server 110 to perform one or more operations discussed herein. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. The method 300 and the method 400 will be described with reference to one or more of the FIGS. 1 and 2 .
- the method 300 can be performed by a computer system of the M2M platform 108 (e.g., the M2M server 110 that executes the processor 111 ) that is configured by the NEMA 118 to perform one or more operation discussed herein.
- the M2M server 110 can communicatively couple to the network 130 and the vehicle 120 . It is understood that one or more operations of the method 300 may be performed by, and/or in response to, any operation from another device and/or application, such as the control application 140 of the core server 134 and/or the TCU 128 of the vehicle 120 .
- the method 300 can begin at operation 302 , where the NEMA 118 can identify the access policy 144 associated with the network communications service 138 .
- the NEMA 118 can enforce the access policy 144 by instructing one or more network infrastructure devices of the serving network 102 (e.g., the network access point 104 ) to route instances of messages or communications from the vehicle 120 (e.g., the access probe message 150 ) to the M2M server 110 so that the M2M platform 108 serves as an intermediary device for access policy enforcement.
- the method 300 can proceed to operation 304 , where the NEMA 118 may enforce the access policy 144 by generating an instance of the AAPM 114 for use by the M2M platform 108 .
- the AAPM 114 can be associated with the network communication service 138 .
- the AAPM 114 can be based on the access policy 144 from the core server 134 that supports the network communication service 138 .
- the access policy 144 can indicate or otherwise require that the vehicle 120 be authorized to use the network communication service 138 before one or more applications on the vehicle 120 (e.g., the vehicle OTT application 124 ) are permitted to use or otherwise maintain ongoing communicative coupling with the serving network 102 and/or the network 130 to access devices on and/or in communication with the network 130 (e.g., the OTT server 131 ).
- applications on the vehicle 120 e.g., the vehicle OTT application 124
- the access policy 144 can indicate or otherwise require that the vehicle 120 be authorized to use the network communication service 138 before one or more applications on the vehicle 120 (e.g., the vehicle OTT application 124 ) are permitted to use or otherwise maintain ongoing communicative coupling with the serving network 102 and/or the network 130 to access devices on and/or in communication with the network 130 (e.g., the OTT server 131 ).
- the method 300 can proceed to operation 306 , where the NEMA 118 can populate the AAPM 114 with one or more authorized identifiers (e.g., the authorized identifiers 116 A-N) based on which identifiers (e.g., instances of the known TCU identifier 149 ) are currently present within one or more equipment profiles (e.g., the equipment profile 148 ) associated with the network communication service 138 .
- identifiers e.g., instances of the known TCU identifier 149
- equipment profiles e.g., the equipment profile 148
- any device that is authorized to access and use the network communication service 138 will have a corresponding identifier (e.g., the known TCU identifier 149 ) stored in an instance of an equipment profile associated with the device (e.g., instances of the equipment profile 148 ).
- the control application 140 can provide, to the NEMA 118 , the identifiers associated with devices (e.g., the known TCU identifier 149 ) that are authorized and permitted to use the network communication service 138 . Therefore, if the vehicle 120 sends, to the M2M server 110 , a message having an identifier included therein (e.g., the access probe message 150 having the TCU identifier 128 A), but the AAPM 114 does not have an authorized identifier (e.g., any of the authorized identifiers 116 A-N) matching or otherwise corresponding with the identifier from the vehicle 120 , then messages from the vehicle 120 will not be permitted to pass through, or otherwise be routed via, the M2M platform 108 to a target destination, such as the OTT server 131 , the core server 134 , and/or any other device of network 130 and/or the serving network 102 .
- a target destination such as the OTT server 131 , the core server 134 , and/or
- the method 300 can proceed to operation 308 , where the NEMA 118 can receive an instance of the access probe message 150 from the TCU 128 of the vehicle 120 .
- the access probe message 150 can include the probe URL 152 .
- the probe URL 152 can be associated with, or otherwise be directed to, the core server 134 and/or the network communication service 138 .
- the access probe message 150 can request forwarding to the core server 134 associated with the network communication service 138 .
- the access probe message 150 can include the TCU identifier 128 A associated with the TCU 128 that sent the access probe message 150 .
- the probe URL 152 may be associated with the OTT server 131 and request access to the OTT server 131 , where the OTT server 131 is associated with the vehicle OTT application 124 of the vehicle 120 .
- the access probe message 150 may be routed to the M2M platform 108 so that the M2M platform 108 intercepts the access probe message 150 before it can reach a target destination, such as the core server 134 and/or the OTT server 131 .
- the method 300 can proceed to operation 310 , where the NEMA 118 can prevent the access probe message 150 from being forwarded on to a target destination, such as the core server 134 and/or the OTT server 131 .
- the NEMA 118 can suspend execution of the request to forward the access probe message 150 on to a subsequent device so as to enable confirmation that the vehicle 120 which sent the access probe message 150 (specifically the TCU 128 ) is authorized and permitted to use the network communication service 138 .
- the NEMA 118 can improve the performance of network devices by reducing the amount of traffic that is routed to the core server 134 from the M2M platform 108 .
- the NEMA 118 and the M2M platform 108 can provide optimization of limited processing resources and memory resources (e.g., available via one or more instance of the M2M server 110 ), while also improving the speed with which the vehicle 120 can obtain network access and authorized to use the network communication service 138 .
- the method 300 can proceed to operation 312 , where the NEMA 118 can determine whether the device which sent the message (e.g., the TCU 128 of the vehicle 120 that sent the access probe message 150 ) is authorized to access and use (i.e., engage in ongoing communicative coupling) the network communication service 138 .
- the device which sent the message e.g., the TCU 128 of the vehicle 120 that sent the access probe message 150
- the network communication service 138 e.g., the TCU 128 of the vehicle 120 that sent the access probe message 150
- the NEMA 118 may determine whether an identifier is provided in the received message (e.g., the TCU identifier 128 A provided in the access probe message 150 ) that matches, identifies, or otherwise corresponds with at least one authorized identifier of an authorized access policy map (e.g., at least one of the authorized identifiers 116 A-N of the AAPM 114 ). If the TCU identifier 128 A does not match one of the authorized identifiers 116 A-N of the AAPM 114 , then the TCU 128 is not authorized to access and use the network communication service 138 .
- an identifier is provided in the received message (e.g., the TCU identifier 128 A provided in the access probe message 150 ) that matches, identifies, or otherwise corresponds with at least one authorized identifier of an authorized access policy map (e.g., at least one of the authorized identifiers 116 A-N of the AAPM 114 ). If the TCU identifier 128 A
- the TCU identifier 128 A is found or otherwise reflected by at least one of the authorized identifiers 116 A-N of the AAPM 114 , then the TCU 128 of the vehicle 120 is authorized to access the network communication service 138 , and thus permitted to contact a target destination via the M2M platform 108 (e.g., engaging in communication with the OTT server 131 using the network communication service 138 ).
- the NEMA 118 can determine that the TCU 128 is not authorized to access the network communication service 138 , such as based on the TCU 128 having a TCU identifier 128 A (which was included in the access probe message 150 ) that does not correspond with any of the authorized identifiers 116 A-N of the AAPM 114 .
- the method 300 can proceed along the NO path to operation 314 .
- the method 300 can proceed along the YES path to operation 324 . For clarity, a discussion of the method 300 proceeding along the NO path to operation 314 will be provided first, followed by a discussion proceeding along the YES path to operation 324 .
- the NEMA 118 can generate the access redirect command 154 that can include the redirect instruction 156 .
- the redirect instruction 156 can instruct the head unit 122 and/or the TCU 128 to bypass the M2M platform 108 so as to enable access to the network communication service 138 by contacting the network service portal 142 directly, that is without attempting to seek authorization for use of the network communication service 138 via the M2M platform 108 .
- the redirect instruction 156 can include the redirect URL 158 that points to the core server 134 and/or the network service portal 142 associated with the network communication service 138 .
- the redirect instruction 156 can instruct a network access point (e.g., any of the network access points 104 , 132 ) to permit a one-time bypass of the M2M platform 108 so that the vehicle 120 can contact the core server 134 and the network service portal 142 despite not yet being authorized to use the network communication service 138 .
- a network access point e.g., any of the network access points 104 , 132
- the method 300 can proceed to operation 316 , where the NEMA 118 can provide the access redirect command 154 to the TCU 128 of the vehicle 120 .
- the method 300 can proceed from operation 316 to one or more operations discussed with respect to FIG. 4 , such as operation 408 which are discussed below in further detail.
- the method 300 can proceed from operation 316 to operation 328 , where the method 300 can end.
- the method 300 can proceed to operation 318 , where the NEMA 118 can receive the access update message 170 from the core server 134 that supports the network communication service 138 .
- the access update message 170 may be provided by the core server 134 to the M2M platform 108 in response to one of the equipment profiles being updated with an identifier to indicate a corresponding device is authorized and permitted to use the network communication service 138 .
- the TCU 128 may generate the access redirect request 160 based on the redirect instruction 156 , where the access redirect request 160 can include the TCU identifier 128 A of the TCU 128 and the redirect URL 158 that points to the network service portal 142 .
- the TCU 128 can send the access redirect request 160 to the core server 134 so as to enable the vehicle 120 to gain permission to use the network communication service 138 via the network service portal 142 .
- the user may provide an instance of the input 127 to the network service portal 142 to instruct the control application 140 of the core server 134 to allow the TCU 128 to access the network communication service 138 .
- the core server 134 can grant the TCU 128 access to the network communication service 138 by referencing the TCU identifier 128 A within the equipment profile 148 associated with the vehicle 120 , specifically by instantiating and recording an instance of the known TCU identifier 149 (which corresponds with and reflects the TCU identifier 128 A) within the equipment profile 148 associated with the vehicle 120 .
- control application 140 of the core server 134 can inform the M2M platform 108 of the TCU's 128 ability to use the network communication service 138 by providing the access update message 170 to the NEMA 118 , where the access update message 170 can include the known TCU identifier 149 .
- the access update message 170 can indicate that the known TCU identifier 149 pertains to the AAPM 114 associated with the network communication service 138 .
- the method 300 can proceed to operation 320 , where the NEMA 118 can obtain or otherwise access the AAPM 114 that is associated with the network communication service 138 .
- the method 300 can proceed to operation 322 , where the NEMA 118 can instantiate an instance of an authorized identifier within the AAPM 114 so as to reflect the TCU 128 of the vehicle 120 .
- the authorized identifier 116 B may not yet exist within the AAPM 114 .
- the NEMA 118 can create and configure the authorized identifier 116 B to reflect (and thus correspond with) the known TCU identifier 149 from the access update message 170 .
- the authorized identifier 116 B will now also correspond with the TCU identifier 128 A that identifies the TCU 128 .
- the NEMA 118 can update the AAPM 114 by instantiating the authorized identifier 116 B for the TCU 128 in the AAPM 114 .
- the method 300 can proceed to operation 328 , where the method 300 can end.
- the method 300 can proceed from operation 322 to operation 323 , where the NEMA 118 can receive a subsequent access probe message 150 ′.
- the subsequent access probe message 150 ′ may be configured substantially similar to the access probe message 150 , and thus include an instance of the probe URL 152 ′ and the TCU identifier 128 A.
- the subsequent access probe message 150 ′ may be received by the NEMA 118 of the M2M platform 108 subsequent to the AAPM 114 being updated by the core server 134 based on the TCU 128 being granted authorization by the core server 134 to use the network communication service 138 .
- the method 300 can proceed to another iteration of the operation 312 , where, in an embodiment, the NEMA 118 can analyze the subsequent access probe message 150 ′ and the AAPM 114 to determine whether the TCU 128 is authorized to access and use the network communication service 138 .
- the NEMA 118 can determine that one of the authorized identifiers (e.g., the authorized identifier 116 B) corresponds with the TCU identifier 128 A of the TCU 128 , where the TCU identifier 128 A was included in the subsequent access probe message 150 ′.
- the authorized identifiers e.g., the authorized identifier 116 B
- the NEMA 118 can determine that the TCU 128 (and thus also the vehicle 120 ) is now authorized to access and use the network communication service 138 , which allows the method 300 to proceed along the YES path from operation 312 to operation 324 .
- the method 300 may proceed from operation 323 back to operation 312 and then along the YES from operation 312 to operation 326 .
- a discussion of operation 324 will be provided first, followed by a discussion of operation 326 .
- the NEMA 118 may seek to obtain an access probe response 164 from a target destination with which the vehicle 120 is attempting to communicate.
- the subsequent access probe message 150 ′ may include the probe URL 152 ′ that is directed towards the core server 134 so as to confirm that the vehicle OTT application 124 can begin communicating with the OTT server 131 via the M2M platform 108 while using the network communication service 138 .
- the control application 140 of the core server 134 may send the access probe response 164 to the NEMA 118 to confirm that the vehicle 120 and TCU 128 are permitted to use the network communication service 138 and route messages to the OTT server 131 via the M2M platform 108 .
- the subsequent access probe message 150 ′ may also, and/or additionally, seek confirmation from the OTT server 131 that the vehicle OTT application 124 is authorized to engage in a content stream (or other communication data stream) with the TCU 128 of the vehicle 120 .
- the OTT server 131 can indicate approval and authorization via the same, or another, instance of the access probe response 164 . From operation 324 , the method 300 can proceed to operation 326 .
- the M2M platform 108 can enable and permit the TCU 128 to access the network communication service 138 for engaging in ongoing and/or sustained communications to and/or from the vehicle OTT application 124 via the M2M platform 108 .
- the NEMA 118 may instruct the TCU 128 that the access policy 144 associated with the network communication service 138 requires or otherwise mandates that communications to and/or from the vehicle 120 pertaining to the vehicle OTT application 124 must be routed or otherwise directed through the M2M platform 108 in order to maintain authorization and permission to use the network communication service 138 .
- the vehicle OTT application 124 may now be authorized to communicate with the OTT server 131 based on the TCU 128 directing or otherwise routing communications to via the M2M platform 108 so as to maintain use of the network communications service 138 .
- the control application 140 and/or the NEMA 118 may revoke the permission of the TCU 128 to use the network communication service 138 by removing the authorized identifier associated with the TCU 128 (e.g., the authorized identifier 116 B) from the AAPM 114 .
- the NEMA 118 may send the vehicle 120 an instance of the access denied response 153 based on violation of the access policy 144 due to an attempt to bypass the M2M platform 108 after access to the network communication service 138 has already (or initially) been granted.
- the method 300 can proceed to operation 328 , where the method 300 can end. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the method 400 for connected vehicle network access optimization is disclosed, according to an illustrative embodiment.
- the method 400 can be performed by the TCU 128 and/or the head unit 122 executing an instance of a processor. It is understood that, in various embodiments, one or more of the operations may be performed by the head unit 122 , the TCU 128 , and/or another computer system or user equipment of the vehicle 120 . It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the method 400 can begin at operation 402 , where the TCU 128 can receive an instance of the input 127 from the head unit 122 of the vehicle 120 .
- the instance of the input 127 can be associated with the vehicle OTT application 124 , and thus trigger the head unit 122 to launch the vehicle OTT application 124 .
- the vehicle OTT application 124 can request the TCU 128 to establish a network connection so that the vehicle OTT application 124 can communicate with the OTT server 131 .
- the method 400 can proceed to operation 404 , where the TCU 128 can identify the vehicle OTT application 124 based on the application identifier 126 .
- the TCU 128 can confirm that the vehicle OTT application 124 is requesting access to the OTT server 131 by engaging in wireless communicative coupling.
- the method 400 can proceed to operation 406 , where the TCU 128 can generate the access probe message 150 that is directed to the core server 134 to probe for access and authorization to the network communication service 138 so that the vehicle OTT application 124 can communicate with the OTT server 131 .
- the access probe message 150 can be sent to the M2M platform 108 , which may perform one or more operations discussed with respect to FIG. 3 .
- the method 400 can proceed to operation 408 , where the TCU 128 can receive a message from the M2M platform 108 , such as the access redirect command 154 that includes the redirect instruction 156 .
- the method 400 can proceed to operation 410 , where the TCU 128 can determine whether the message that is received (e.g., the access redirect command 154 ) authorizes the TCU 128 to access the network communication service 138 .
- the TCU 128 can determine that the message (e.g., the access redirect command 154 ) includes the redirect instruction 156 but does not yet indicate that access to the network communication service 138 has been authorized. If access to the network communication service 138 has not been authorized, the method 400 can proceed along the NO path to operation 412 . If access to the network communication service 138 is indicated as being authorized, then the method 400 can proceed along the YES path to operation 422 .
- the TCU 128 can determine whether the message that is received (e.g., the access redirect command 154 ) authorizes the TCU 128 to access the network communication service 138 .
- the TCU 128 can determine that the message (e.g., the access redirect command 154 ) includes the redirect instruction 156 but does not yet indicate that access to
- the method 400 can proceed along the NO path to operation 412 , where the TCU 128 can invoke the redirect instruction 156 from the access redirect command 154 so as to bypass the M2M platform 108 .
- the method 400 can proceed to operation 414 , where the TCU 128 can generate the access redirect request 160 based on the redirect instruction 156 .
- the access redirect request 160 can include the redirect URL 158 and the TCU identifier 128 A associated with the TCU 128 .
- the access redirect request 160 can be directed to the core server 134 associated with the network communication service 138 .
- the redirect URL 158 can point or otherwise direct the access redirect request 160 to the network service portal 142 so as to request access and authorization to use the network communication service 138 .
- the method 400 can proceed to operation 416 , where the TCU 128 can provide the access redirect request 160 to the core server 134 associated with the network communication service 138 .
- the access redirect request 160 can request access and authorization of the network communication service 138 via the network service portal 142 .
- the method 400 can proceed to operation 418 , where the TCU 128 can obtain access to the network communication service 138 via the network service portal 142 .
- the control application 140 can update the equipment profile 148 by using the TCU identifier 128 A to record, in the equipment profile 148 , the known TCU identifier 149 associated with the TCU 128 .
- the TCU 128 can receive the network service portal response 162 indicating that access to the network communication service 138 has been granted and that communicative coupling can proceed via the M2M platform 108 .
- the method 400 can proceed to operation 420 , where the TCU 128 can generate the subsequent access probe message 150 ′.
- the access probe message 150 may be referred to as a “first” access probe message and the subsequent access probe message 150 ′ may be referred to as a “second” access probe message.
- first and second are provided for clarification purposes only, and therefore should not be construed as requiring a preference, importance, hierarchy, sequence, or the like.
- the method 400 can proceed from operation 420 to operation 424 , where the method 400 can end.
- the method 400 can proceed to another iteration of the operation 410 .
- the TCU 128 can determine whether access to the network communication service 138 has been authorized by analyzing the network service portal response 162 . If the access to the network communication service 138 is granted, the TCU 128 may proceed along the YES path to operation 422 .
- the TCU 128 can initiate contact with the OTT server 131 via the M2M platform 108 by sending the subsequent access probe message 150 ′ to the M2M platform 108 .
- the TCU 128 can receive the access probe response 164 that confirms that M2M platform 108 authorizes the TCU 128 to use the network communication service 139 and contact the OTT server 131 via the M2M platform 108 .
- the TCU 128 can then permit the vehicle OTT application 124 to send a request (not shown) to the OTT server 131 by way of the M2M platform 108 so as to maintain execution of the vehicle OTT application 124 on the head unit 122 . From operation 422 , the method 400 can proceed to operation 424 , where the method 400 can end.
- the serving network 102 and/or the network 130 shown in FIG. 1 can be configured substantially similar to include at least some of the elements of the network 500 .
- the network 500 can include a cellular network 502 , a packet data network 504 , for example, the Internet, and a circuit switched network 506 , for example, a publicly switched telephone network (“PSTN”).
- PSTN publicly switched telephone network
- the cellular network 502 includes various components such as, but not limited to, base transceiver stations (“BTSs”), node-B's (“NBs”), e-Node-B's (“eNBs”), g-Node-B's (“gNBs”), base station controllers (“BSCs”), radio network controllers (“RNCs”), mobile switching centers (“MSCs”), mobile management entities (“MMEs”), short message service centers (“SMSCs”), multimedia messaging service centers (“MMSCs”), home location registers (“HLRs”), home subscriber servers (“HSSs”), visitor location registers (“VLRs”), charging platforms, billing platforms, voicemail platforms, GPRS core network components, location service nodes, an IP Multimedia Subsystem (“IMS”), 5G core components, 5G NR components, functions, applications, and the like.
- the cellular network 502 also includes radios and nodes for receiving and transmitting voice, data, and combinations thereof to and from radio transceivers, networks, the packet data network 504
- a mobile communications device 508 such as, for example, a cellular telephone, a user equipment, a mobile terminal, a PDA, a laptop computer, a handheld computer, and combinations thereof, can be operatively connected to the cellular network 502 .
- the cellular network 502 can be configured as a 2G GSM network and can provide data communications via GPRS and/or EDGE. Additionally, or alternatively, the cellular network 502 can be configured as a 3G UMTS network and can provide data communications via the HSPA protocol family, for example, HSDPA, EUL (also referred to as HSDPA), and HSPA+.
- the cellular network 502 also can be compatible with mobile communications standards such as but not limited to 4G, LTE, LTE Advanced, and/or 5G NR, as well as evolved and future mobile standards.
- the packet data network 504 includes various devices, for example, servers, computers, databases, and other devices in communication with one another, as is generally understood.
- the network 130 may be configured as an instance of the packet data network 504 so as to support the network communication service 138 .
- the packet data network 504 devices are accessible via one or more network links.
- the servers often store various files that are provided to a requesting device such as, for example, a computer, a terminal, a smartphone, or the like.
- the requesting device includes software (a “browser”) for executing a web page in a format readable by the browser or other software.
- Other files and/or data may be accessible via “links” and/or “pointers” in the retrieved files, as is generally understood.
- the packet data network 504 includes or is in communication with the Internet.
- the circuit switched network 506 includes various hardware and software for providing circuit switched communications.
- the circuit switched network 506 may include, or may be, what is often referred to as a plain old telephone system (POTS).
- POTS plain old telephone system
- the functionality of a circuit switched network 506 or other circuit-switched network are generally known and will not be described herein in detail.
- the illustrated cellular network 502 is shown in communication with the packet data network 504 and a circuit switched network 506 , though it should be appreciated that this is not necessarily the case.
- One or more Internet-capable devices 510 can communicate with one or more cellular networks 502 , and devices connected thereto, through the packet data network 504 . It also should be appreciated that the Internet-capable device 510 can communicate with the packet data network 504 through the circuit switched network 506 , the cellular network 502 , and/or via other networks (not illustrated).
- a communications device 512 for example, a telephone, facsimile machine, modem, computer, or the like, can be in communication with the circuit switched network 506 , and therethrough to the packet data network 504 and/or the cellular network 502 .
- the communications device 512 can be an Internet-capable device, and can be substantially similar to the Internet-capable device 510 .
- the mobile communications device 508 , the Internet-capable device 510 , and/or the communication device 512 can correspond with one or more computer systems discussed with respect to FIG.
- the serving network 102 , the network 130 , /or the network 500 can refer broadly to, in some embodiments, any combination of the networks 502 , 504 , 506 . It should be appreciated that substantially all of the functionality described with reference to devices of the serving network 102 , the network 130 , and/or the network 500 can, in some embodiments, be performed by the cellular network 502 , the packet data network 504 , and/or the circuit switched network 506 , alone or in combination with other networks, network elements, and the like.
- FIG. 6 is a block diagram illustrating a computer system 600 can be configured to provide the functionality described herein related to connected vehicle network access optimization, in accordance with various embodiments of the concepts and technologies disclosed herein.
- at least a portion of one or more of the M2M server 110 , the network access point 104 , the network access point 132 , the OTT server 131 , and/or the core server 134 illustrated and described herein can be configured as and/or can have an architecture similar or identical to the computer system 600 .
- the head unit 122 and/or the TCU 128 of the vehicle 120 , and/or at least a portion of the vehicle 201 can be configured as and/or have an architecture that is similar or identical to the computer system 600 .
- the computer system 600 includes a processing unit 602 , a memory 604 , one or more user interface devices 606 , one or more input/output (“I/O”) devices 608 , and one or more network devices 610 , each of which is operatively connected to a system bus 612 .
- the system bus 612 enables bi-directional communication between the processing unit 602 , the memory 604 , the user interface devices 606 , the I/O devices 608 , and the network devices 610 .
- the processor 111 and/or the processor 135 can be configured substantially similar to the processing unit 602 .
- one or more instances of the processing unit 602 can be implemented within one or more devices and/or components of the operating environment 100 , such as but not limited to one or more of the head unit 122 , the TCU 128 , the network access point 104 , the serving network 102 , the M2M platform 108 , the M2M server 110 , the network 130 , the OTT server 131 , the network access point 132 , and/or the core server 134 .
- the vehicle processor 203 can be configured substantially similar to an instance of the processing unit 602 .
- the memory 112 , the memory 136 , and/or the vehicle memory 204 can be configured substantially similar to the memory 604 .
- one or more instances of the memory 604 can be implemented within one or more devices and/or components of the operating environment 100 , such as but not limited to one or more of the head unit 122 , the TCU 128 , the network access point 104 , the serving network 102 , the M2M platform 108 , the M2M server 110 , the network 130 , the OTT server 131 , the network access point 132 , and/or the core server 134 .
- the processing unit 602 may be a standard central processor that performs arithmetic and logical operations, a more specific purpose programmable logic controller (“PLC”), a programmable gate array, or other type of processor known to those skilled in the art and suitable for controlling the operation of the server computer.
- PLC programmable logic controller
- the word “processor” and/or the phrase “processing unit” when used with regard to any architecture or system can include multiple processors or processing units distributed across and/or operating in parallel in a single machine or in multiple machines.
- processors and/or processing units can be used to support virtual processing environments.
- Processors and processing units also can include state machines, application-specific integrated circuits (“ASICs”), combinations thereof, or the like. Because processors and/or processing units are generally known to one of ordinary skill, the processors and processing units disclosed and discussed herein will not be described in further detail herein.
- the memory 604 communicates with the processing unit 602 via the system bus 612 .
- the memory 604 is operatively connected to a memory controller (not shown) that enables communication with the processing unit 602 via the system bus 612 .
- the memory 604 includes an operating system 614 and one or more program modules 616 .
- the operating system 614 can include, but is not limited to, members of the WINDOWS, WINDOWS CE, and/or WINDOWS MOBILE families of operating systems from MICROSOFT CORPORATION, the LINUX family of operating systems, the SYMBIAN family of operating systems from SYMBIAN LIMITED, the BREW family of operating systems from QUALCOMM CORPORATION, the MAC OS, iOS, and/or LEOPARD families of operating systems from APPLE CORPORATION, the FREEBSD family of operating systems, the SOLARIS family of operating systems from ORACLE CORPORATION, other operating systems, and the like.
- the program modules 616 may include various software, program modules, or other computer readable and/or executable instructions that configure hardware resources of the computer system 600 , such as but not limited to the processing unit 602 described herein.
- Use of the term “module” refers to a defined set of computer readable instructions that transform a processor and/or other computing hardware upon execution by a processing unit, such as the processing unit 602 .
- the program modules 616 can include the NEMA 118 , the control application 140 , and/or other computer-readable instructions. These and/or other programs can be embodied in computer-readable media containing instructions that, when executed by the processing unit 602 , perform one or more of the operations and functions discussed with respect to FIG.
- the program modules 616 may be embodied in hardware, software, firmware, or any combination thereof. It should be understood that the memory 604 also can be configured to store one or more instance of information and data discussed with respect to FIGS.
- the AAPM 114 the authorized identifiers 116 A-N, the network communication service 138 , the network service portal 142 , the access policy 144 , one or more instance of the equipment profile 148 , one or more instance of the known TCU identifier 149 , the access probe message 150 , the access denied response 153 , the access redirect command 154 , the network service portal response 162 , the access probe response 164 , the PCF 145 , the AMF 146 , or any other communication, message, data instance, instruction, and/or other data, if desired.
- Computer-readable media may include any available computer storage media or communication media that can be accessed by the computer system 600 .
- Communication media includes computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any delivery media.
- modulated data signal means a signal that has one or more of its characteristics changed or set in a manner as to encode information in the signal.
- communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer-readable media.
- Computer storage media includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data.
- Computer storage media includes, but is not limited to, RAM, ROM, Erasable Programmable ROM (“EPROM”), Electrically Erasable Programmable ROM (“EEPROM”), flash memory or other solid state memory technology, CD-ROM, digital versatile disks (“DVD”), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer system 600 .
- the phrases “memory”, “computer storage medium” and variations thereof does not include waves or signals per se and/or communication media.
- the user interface devices 606 may include one or more devices with which a user accesses the computer system 600 .
- the user interface devices 606 may include, but are not limited to, computers, servers, personal digital assistants, cellular phones, or any suitable computing devices that can communicate with the computer system 600 .
- the I/O devices 608 enable a user to interface with the program modules 616 .
- the I/O devices 608 are operatively connected to an I/O controller (not shown) that enables communication with the processing unit 602 via the system bus 612 .
- the I/O devices 608 may include one or more input devices, such as, but not limited to, a keyboard, a mouse, or an electronic stylus. Further, the I/O devices 608 may include one or more output devices, such as, but not limited to, a display screen or a printer.
- the network devices 610 enable the computer system 600 to communicate with other networks or remote systems via a network 618 , which may be configured substantially similar to one or more of the serving network 102 , the network 130 , and/or the network 500 .
- Examples of the network devices 610 include, but are not limited to, a modem, a radio frequency (“RF”) or infrared (“IR”) transceiver, a telephonic interface, a bridge, a router, or a network card.
- RF radio frequency
- IR infrared
- the network 618 may include a wireless network such as, but not limited to, a Wireless Local Area Network (“WLAN”) such as a WI-FI network, a Wireless Wide Area Network (“WWAN”), a Wireless Personal Area Network (“WPAN”) such as BLUETOOTH, a Wireless Metropolitan Area Network (“WMAN”) such a WiMAX network, or a cellular network.
- the network 180 may be a wired network such as, but not limited to, a Wide Area Network (“WAN”) such as the Internet, a Local Area Network (“LAN”) such as the Ethernet, a wired Personal Area Network (“PAN”), or a wired Metropolitan Area Network (“MAN”).
- WAN Wide Area Network
- LAN Local Area Network
- PAN personal Area Network
- MAN wired Metropolitan Area Network
- the head unit 122 , the TCU 128 , and/or other devices illustrated and described herein can be configured as and/or can have an architecture similar or identical to the user equipment 700 described herein in FIG. 7 .
- an instance of the user equipment 700 can be associated with a user of the vehicle 120 .
- the various devices illustrated and described herein may or may not include the functionality described herein with reference to FIG. 7 . While connections are not shown between the various components illustrated in FIG. 7 , it should be understood that some, none, or all of the components illustrated in FIG. 7 can be configured to interact with one other to carry out various device functions.
- the components are arranged so as to communicate via one or more busses (not shown).
- busses not shown
- the user equipment 700 can include a display 702 for presenting data and information.
- the display 702 can be configured to present various graphical user interface (“GUI”) elements for presenting and/or modifying information associated with audiovisual content, an media content data stream, presenting text, images, video, virtual keypads and/or keyboards, messaging data, notification messages, metadata, internet content, device status, time, date, calendar data, device preferences, map and location data, combinations thereof, and/or the like.
- GUI graphical user interface
- the user equipment 700 also can include a processor 704 and a memory or other data storage device (“memory”) 706 .
- the processor 704 can be configured to process data and/or can execute computer-executable instructions stored in the memory 706 .
- the computer-executable instructions executed by the processor 704 can include, for example, an operating system 708 , one or more applications 710 such as a vehicle OTT application 124 and/or a display application (not shown) that can present communications, data, and/or other computer-executable instructions stored in a memory 706 , and/or received by the user equipment 700 .
- the applications 710 also can include a user interface application (not illustrated in FIG. 7 ).
- the UI application can interface with the operating system 708 to facilitate any of the operations discussed herein and functionality for presenting audiovisual content and/or data stored at the user equipment 700 and/or stored elsewhere. It is understood that one or more instances of the operating system 708 may be included and operate within one or more systems discussed with respect to the operating environment 100 , such as but not limited to the vehicle 120 , the head unit 122 , and/or the TCU 128 .
- the operating system 708 can include a member of the SYMBIAN OS family of operating systems from SYMBIAN LIMITED, a member of the WINDOWS MOBILE OS and/or WINDOWS PHONE OS families of operating systems from MICROSOFT CORPORATION, a member of the PALM WEBOS family of operating systems from HEWLETT PACKARD CORPORATION, a member of the BLACKBERRY OS family of operating systems from RESEARCH IN MOTION LIMITED, a member of the IOS family of operating systems from APPLE INC., a member of the ANDROID OS family of operating systems from GOOGLE INC., and/or other operating systems.
- These operating systems are merely illustrative of some contemplated operating systems that may be used in accordance with various embodiments of the concepts and technologies described herein and therefore should not be construed as being limiting in any way.
- the vehicle OTT application 124 can be executed by the processor 704 to aid a user in presenting content, obtaining network access to use the network communication service 138 , providing feedback, presenting an identifier (e.g., the TCU identifier 128 A), configuring settings, manipulating address book content and/or settings, multimode interaction, interacting with other applications 710 , and otherwise facilitating user interaction with the operating system 708 , the applications 710 , and/or other types or instances of data 712 that can be stored at the user equipment 700 , such as stored by the memory 706 .
- an identifier e.g., the TCU identifier 128 A
- configuring settings manipulating address book content and/or settings, multimode interaction, interacting with other applications 710 , and otherwise facilitating user interaction with the operating system 708 , the applications 710 , and/or other types or instances of data 712 that can be stored at the user equipment 700 , such as stored by the memory 706 .
- the data 712 can include, for example, instances of the application identifier 126 , the TCU identifier 128 A, the access probe message 150 , the probe URL 152 , the access redirect command 154 , the redirect instruction 156 , the redirect URL 158 , the access redirect request 160 , the network service portal response 162 , the content stream 166 , the access denied response 153 , the input 127 , any other elements discussed with respect to FIG. 1 and FIG.
- the applications 710 , the data 712 , and/or portions thereof can be stored in the memory 706 and/or in a firmware 714 , and can be executed by the processor 704 .
- the firmware 714 also can store code for execution during device power up and power down operations. It can be appreciated that the firmware 714 can be stored in a volatile or non-volatile data storage device including, but not limited to, the memory 706 and/or a portion thereof.
- the user equipment 700 also can include an input/output (“I/O”) interface 716 .
- I/O interface 716 can be included any computer system and/or device discussed in FIG. 1 (e.g., the head unit 122 , the TCU 128 , the M2M server 110 , the OTT server 131 , the core server 134 , etc.).
- the I/O interface 716 can be configured to support the input/output of data such as a communication and/or message sent to and/or from the vehicle 120 (and/or any data that can be sent within the vehicle 120 ), and/or any other information or elements discussed with respect to FIGS.
- the I/O interface 716 can include a hardwire connection such as a universal serial bus (“USB”) port, a mini-USB port, a micro-USB port, an audio jack, a PS2 port, an IEEE 1394 (“FIREWIRE”) port, a serial port, a parallel port, an Ethernet (RJ45) port, an RJ11 port, a proprietary port, combinations thereof, or the like.
- USB universal serial bus
- FIREWIRE IEEE 1394
- the user equipment 700 can be configured to synchronize with another device to transfer content to and/or from the user equipment 700 .
- the user equipment 700 can be configured to receive updates to one or more of the applications 710 via the I/O interface 716 , though this is not necessarily the case.
- the I/O interface 716 accepts I/O devices such as keyboards, keypads, mice, interface tethers, printers, plotters, external storage, touch/multi-touch screens, touch pads, trackballs, joysticks, microphones, remote control devices, displays, projectors, medical equipment (e.g., stethoscopes, heart monitors, and other health metric monitors), modems, routers, external power sources, docking stations, combinations thereof, and the like. It should be appreciated that the I/O interface 716 may be used for communications between the user equipment 700 and a network device or local device.
- the user equipment 700 also can include a communications component 718 .
- the communications component 718 can be configured to interface with the processor 704 to facilitate wired and/or wireless communications with one or more networks such as the network 180 and/or the RAN 182 described herein.
- other networks include networks that utilize non-cellular wireless technologies such as WI-FI or WIMAX.
- the communications component 718 includes a multimode communications subsystem for facilitating communications via the cellular network and one or more other networks.
- the communications component 718 in some embodiments, includes one or more transceivers. The one or more transceivers, if included, can be configured to communicate over the same and/or different wireless technology standards with respect to one another.
- one or more of the transceivers of the communications component 718 may be configured to communicate using GSM, CDMAONE, CDMA2000, LTE, and various other 2G, 3G, 4G, 5G, LTE, LTE Advanced, and greater generation technology standards.
- the communications component 718 may facilitate communications over various channel access methods (which may or may not be used by the aforementioned standards) including, but not limited to, TDMA, FDMA, W-CDMA, OFDMA, SDMA, and the like.
- the communications component 718 may facilitate data communications using GPRS, EDGE, the HSPA protocol family including HSDPA, EUL or otherwise termed HSDPA, HSPA+, and various other current and future wireless data access standards.
- the communications component 718 can include a first transceiver (“TxRx”) 720 A that can operate in a first communications mode (e.g., GSM).
- the communications component 718 also can include an N th transceiver (“TxRx”) 720 N that can operate in a second communications mode relative to the first transceiver 720 A (e.g., UMTS).
- transceivers 720 While two transceivers 720 A-N (hereinafter collectively and/or generically referred to as “transceivers 720 ”) are shown in FIG. 7 , it should be appreciated that less than two, two, and/or more than two transceivers 720 can be included in the communications component 718 .
- the communications component 718 also can include an alternative transceiver (“Alt TxRx”) 722 for supporting other types and/or standards of communications.
- the alternative transceiver 722 can communicate using various communications technologies such as, for example, WI-FI, WIMAX, BLUETOOTH, infrared, infrared data association (“IRDA”), near field communications (“NFC”), other RF technologies, combinations thereof, and the like.
- the communications component 718 also can facilitate reception from terrestrial radio networks, digital satellite radio networks, internet-based radio service networks, combinations thereof, and the like.
- the communications component 718 can process data from a network such as the Internet, an intranet, a broadband network, a WI-FI hotspot, an Internet service provider (“ISP”), a digital subscriber line (“DSL”) provider, a broadband provider, combinations thereof, or the like.
- the communications component 718 can support one or more communication modes discussed with respect to FIG. 2 , such as the network transmission mode 221 over a Uu interface and/or the direct transmission mode 219 over a PC5 interface.
- the user equipment 700 also can include one or more sensors 724 .
- the sensors 724 can include temperature sensors, light sensors, air quality sensors, movement sensors, orientation sensors, noise sensors, proximity sensors, or the like. As such, it should be understood that the sensors 724 can include, but are not limited to, accelerometers, magnetometers, gyroscopes, infrared sensors, noise sensors, microphones, combinations thereof, or the like.
- audio capabilities for the user equipment 700 may be provided by an audio I/O component 726 .
- the audio I/O component 726 of the user equipment 700 can include one or more speakers for the output of audio signals, one or more microphones for the collection and/or input of audio signals, and/or other audio input and/or output devices.
- the audio I/O component 726 maybe included as a component of the display 702 .
- the display 702 can provide and present visual images and/or audio input and/or audio output.
- the I/O interface 716 can include direct communicative coupling with the display 702 and/or the audio I/O component 726 so as to provide transfer and input and/or output of visual images (e.g., from the display 702 ) and/or audio clips (e.g., from the audio I/O component 726 ) to and/or from the user equipment 700 .
- the illustrated user equipment 700 also can include a subscriber identity module (“SIM”) system 728 .
- SIM system 728 can include a universal SIM (“USIM”), a universal integrated circuit card (“UICC”) and/or other identity devices.
- the SIM system 728 can include and/or can be connected to or inserted into an interface such as a slot interface 730 .
- the slot interface 730 can be configured to accept insertion of other identity cards or modules for accessing various types of networks. Additionally, or alternatively, the slot interface 730 can be configured to accept multiple subscriber identity cards. Because other devices and/or modules for identifying users and/or the user equipment 700 are contemplated, it should be understood that these embodiments are illustrative, and should not be construed as being limiting in any way.
- the user equipment 700 also can include an image capture and processing system 732 (“image system”).
- image system 732 can be configured to capture or otherwise obtain photos, videos, and/or other visual information.
- the image system 732 can include cameras, lenses, charge-coupled devices (“CCDs”), combinations thereof, or the like.
- CCDs charge-coupled devices
- the user equipment 700 may also include a video system 734 .
- the video system 734 can be configured to capture, process, record, modify, and/or store video content. Photos and videos obtained using the image system 732 and the video system 734 , respectively, may be added as message content to an MMS message, email message, and sent to another user equipment.
- the video and/or photo content also can be shared with other devices via various types of data transfers via wired and/or wireless user equipment as described herein.
- the user equipment 700 also can include one or more location components 736 .
- the location components 736 can be configured to send and/or receive signals to determine a geographic location of the user equipment 700 .
- the location components 736 can send and/or receive signals from global positioning system (“GPS”) devices, assisted-GPS (“A-GPS”) devices, WI-FI/WIMAX and/or cellular network triangulation data, combinations thereof, and the like.
- GPS global positioning system
- A-GPS assisted-GPS
- WI-FI/WIMAX WI-FI/WIMAX and/or cellular network triangulation data, combinations thereof, and the like.
- the location component 736 also can be configured to communicate with the communications component 718 to retrieve triangulation data for determining a location of the user equipment 700 .
- the location component 736 can interface with cellular network nodes, telephone lines, satellites, location transmitters and/or beacons, wireless network transmitters and receivers, combinations thereof, and the like.
- the location component 736 can include and/or can communicate with one or more of the sensors 724 such as a compass, an accelerometer, and/or a gyroscope to determine the orientation of the user equipment 700 .
- the user equipment 700 can generate and/or receive data to identify its geographic location, or to transmit data used by other devices to determine the location of the user equipment 700 .
- the location component 736 may include multiple components for determining the location and/or orientation of the user equipment 700 .
- the illustrated user equipment 700 also can include a power source 738 .
- the power source 738 can include one or more batteries, power supplies, power cells, and/or other power subsystems including alternating current (“AC”) and/or direct current (“DC”) power devices.
- the power source 738 also can interface with an external power system or charging equipment via a power I/O component 740 .
- the above embodiment should be understood as being illustrative of one possible operating environment for various embodiments of the concepts and technologies described herein.
- the described embodiment of the user equipment 700 is illustrative, and therefore should not be construed as being limiting in any way.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Concepts and technologies directed to connected vehicle network access optimization are disclosed herein. Embodiments can include a system that includes a processor and a memory storing computer-executable instructions that configure a processor to perform operations. The operations can include receiving an access probe message from a telematics control unit of a vehicle. The operations can include determining that the telematics control unit is not authorized to access a network communication service. The operations can further include generating an access redirect command that instructs a head unit of the vehicle to bypass a machine-to-machine platform so as to enable access to the network communication service via a network service portal. The operations can include providing the access redirect command to the telematics control unit of the vehicle.
Description
- This application is a continuation of and claims priority to U.S. Patent Application No. 16/283,316, entitled “Connected Vehicle Network Access Optimization Using an Intermediary Platform,” filed Feb. 22, 2019, now allowed, which is incorporated herein by reference in its entirety.
- Historically, communications networks were relegated to providing communicative coupling between communication equipment that was stationary and thus associated with a fixed or otherwise constant geographical location. With the rise of portable user equipment with wireless communication functionality, communicative coupling with a communications network and/or peer devices may occur from a variety of locations. The implementation of communicative coupling into vehicles can facilitate the advancement of autonomous vehicles that customers may use in their daily commutes along roadways, highways, and/or any other thoroughfare. Yet, as more vehicles are equipped with communication functionality, the communications network may limit network access only to recognized vehicles. In some instances, vehicles may attempt to communicate with the communications network irrespective of whether a particular vehicle is authorized to use that communications network. As more vehicles send communications between each other and/or with the communications network, the communications network may consume additional network resources to accommodate or otherwise support communicative coupling. As such, the amount of communications generated by vehicles may contribute to network congestion, which in turn can also affect end-to-end network latency.
- The present disclosure is directed to connected vehicle network access optimization, according to various embodiments. According to one aspect of the concepts and technologies disclosed herein, a system is disclosed. In some embodiments, the system can include a core server, a machine-to-machine server, and/or a telematics control unit. In some embodiments, the system can include a processor and a memory. The memory can store computer-executable instructions that, in response to execution by the processor, cause the processor to perform operations. In some embodiments, the operations can include receiving an access probe message from a telematics control unit of a vehicle. The operations can include determining that the telematics control unit is not authorized to access a network communication service. The operations can include generating an access redirect command that instructs a head unit of the vehicle to bypass a machine-to-machine platform so as to enable access to the network communication service via a network service portal. The operations can include providing the access redirect command to the telematics control unit of the vehicle.
- In some embodiments, the access probe message comprises a probe uniform resource locator that is associated with the network communication service. In some embodiments, the access probe message requests forwarding of the access probe message to a core server associated with the network communication service. In some embodiments, the operations can further include preventing the access probe message from being forwarded to a core server associated with the network communication service. In some embodiments, the operations can further include generating an authorized access policy map associated with the network communication service, where the authorized access policy map is based on an access policy from a core server that supports the network communication service. In some embodiments, determining that the telematics control unit is not authorized to access the network communication service can be based on the telematics control unit having a telematics control unit identifier that does not correspond with an authorized identifier of the authorized access policy map. In some embodiments, the operations can further include receiving an access update message from the core server that supports the network communication service and instantiating an instance of an authorized identifier on the authorized access policy map for the telematics control unit of the vehicle.
- According to another aspect of the concepts and technologies disclosed herein, a method is disclosed according to an embodiment. In some embodiments, the method can include receiving, by a server of a serving network, an access probe message from a telematics control unit of a vehicle. The method can include determining, by the server, that the telematics control unit is not authorized to access a network communication service. The method can include generating, by the server, an access redirect command that instructs a head unit of the vehicle to bypass a machine-to-machine platform so as to enable access to the network communication service via a network service portal. The method can further include providing, by the server, the access redirect command to the telematics control unit of the vehicle.
- In some embodiments, the access probe message can include a probe uniform resource locator that is associated with the network communication service. In some embodiments, the access probe message requests forwarding of the access probe message to a core server associated with the network communication service. In some embodiments, the method can further include preventing, by the server, the access probe message from being forwarded to a core server associated with the network communication service. The method can further include generating, by the server, an authorized access policy map associated with the network communication service, where the authorized access policy map can be based on an access policy from a core server that supports the network communication service. In some embodiments, determining that the telematics control unit is not authorized to access the network communication service is based on the telematics control unit having a telematics control unit identifier that does not correspond with an authorized identifier of the authorized access policy map. The method can further include receiving, by the server, an access update message from the core server that supports the network communication service. The method can further include instantiating, by the server, an instance of an authorized identifier on the authorized access policy map for the telematics control unit of the vehicle.
- According to another aspect of the concepts and technologies disclosed herein, a computer storage medium is disclosed according to an embodiment. The computer storage medium can have computer-executable instructions stored thereon that, in response to execution by a processor, cause the processor to perform operations. The operations can include receiving an access probe message from a telematics control unit of a vehicle. The operations can include determining that the telematics control unit is not authorized to access a network communication service. The operations can include generating an access redirect command that instructs a head unit of the vehicle to bypass a machine-to-machine platform so as to enable access to the network communication service via a network service portal. The operations can include providing the access redirect command to the telematics control unit of the vehicle.
- In some embodiments, the access probe message can include a probe uniform resource locator that is associated with the network communication service, and the access probe message requests forwarding of the access probe message to a core server associated with the network communication service. In some embodiments, the operations further can include preventing the access probe message from being forwarded to a core server associated with the network communication service. The operations can further include generating an authorized access policy map associated with the network communication service, where the authorized access policy map is based on an access policy from a core server that supports the network communication service. In some embodiments, determining that the telematics control unit is not authorized to access the network communication service is based on the telematics control unit having a telematics control unit identifier that does not correspond with an authorized identifier of the authorized access policy map. In some embodiments, the operations further can include receiving an access update message from the core server that supports the network communication service, instantiating an instance of an authorized identifier on the authorized access policy map for the telematics control unit of the vehicle.
- It should be appreciated that the above-described subject matter may be implemented as a computer-controlled apparatus, a computer process, a computing system, a method, or as an article of manufacture such as a computer storage medium. These and various other features will be apparent from a reading of the following Detailed Description and a review of the associated drawings. This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended that this Summary be used to limit the scope of the claimed subject matter. Furthermore, the claimed subject matter is not limited to implementations that solve any or all disadvantages noted in any part of this disclosure.
-
FIG. 1 is a block diagram illustrating an example operating environment for implementing connected vehicle network access optimization, according to an illustrative embodiment. -
FIG. 2 is a block diagram illustrating aspects of a vehicle capable of implementing aspects of the embodiments disclosed herein. -
FIG. 3 is a flow diagram illustrating aspects of a method for network access optimization to support vehicle communications, according to an illustrative embodiment. -
FIG. 4 is a flow diagram illustrating aspects of another method for network access optimization to support vehicle communications, according to an illustrative embodiment. -
FIG. 5 is a diagram illustrating an example network capable of implementing aspects of the embodiments discussed herein. -
FIG. 6 is a block diagram illustrating an example computer system capable of implementing aspects of the embodiments presented and described herein. -
FIG. 7 is a diagram illustrating an example user equipment capable of implementing aspects of the concepts and technologies described herein according to embodiments of the present disclosure. - The following detailed description is directed to connected vehicle network access optimization, according to various embodiments. Vehicles may be manufactured with various computer systems that can execute vehicle applications. Some vehicle applications may be configured to rely on network access so that certain functions, operations, and/or user interfaces and graphics may be presented to a user within the vehicle. In some instances, a vehicle application may be considered an over-the-top (“OTT”) application based on the OTT application relying on network infrastructure to deliver audio, video, information, calls, a combination thereof, or other content to and/or from a service and/or platform on a network. In some embodiments, an instance of an OTT application that is implemented or otherwise included for operation in and/or with a vehicle (e.g., executing on a vehicle head unit) may be referred to as a “vehicle OTT application.” In some embodiments, a developer of a vehicle OTT application may be pre-loaded and/or installed onto a vehicle head unit. Some vehicle OTT applications may operate with a configuration that assumes the state of network access is “always on” (i.e., the vehicle OTT application always has access to a network connection via the vehicle communication equipment) or “always denied” (i.e., the vehicle OTT application is always denied network access via the vehicle's communication equipment, such as a telematics control unit). In some instances, a vehicle OTT application may assume that access to a network is available because a connection to a network can be found. If a network connection is found (or assumed to be present), the vehicle OTT application may attempt to connect with a network service. Yet the connection and/or access to the network service may be denied due to the vehicle not being registered or otherwise authorized to use the network service. As more vehicles send and receive communications to/from the network, the communications network may consume additional network resources to accommodate or otherwise support attempts at network access to utilize a network service, despite the vehicle OTT application not being authorized for access via the vehicle. As such, the amount of communications generated by vehicles may contribute to network congestion, which may burden network infrastructure and in turn can also affect end-to-end network latency.
- Therefore, embodiments of the disclosure can provide connected vehicle network access optimization that enables various vehicle OTT applications to access a network service, while mitigating back-end network traffic that may burden or otherwise decrease network efficiency. Embodiments of the present disclosure provide a machine-to-machine platform that intercepts messages from a vehicle that are directed to a core server and/or an OTT server associated with execution of the vehicle OTT application. In various embodiments, all and/or any communications may initially be routed through the machine-to-machine platform irrespective of where the message is targeted or directed. In some embodiments, the machine-to-machine platform can enable a vehicle communications to bypass the machine-to-machine platform by creating and providing an access redirect command to the vehicle. If the vehicle (and thus also a telematics control unit of the vehicle) is not authorized to use the network communications service, embodiments of the present disclosure can enable the vehicle head unit to be informed that the vehicle is currently not authorized to use the network communication service (i.e., blocked) despite the vehicle being within a functioning service area of the serving network (i.e., within range of send/receiving communications with the serving network). Embodiments of the present disclosure can prevent the vehicle from receiving service from the OTT server via the serving network until the vehicle is authorized by the core server to use the network communications service. As such, the machine-to-machine server can provide, to the vehicle, an access redirect command that causes the vehicle's telematics control unit to directly contact the core server—without being routed through the machine-to-machine platform—so that the vehicle can access a network service portal and become authorized to utilize the network communication service so as to contact the OTT server through the machine-to-machine platform. By this, the vehicle head unit will not merely present “no service” when a vehicle is within communicative coupling range of the serving network but not authorized to use the network communication service, but rather the vehicle head unit and the vehicle telematics control unit can be configured to bypass the machine-to-machine platform so as to obtain authorization to use the network communication service. Once the machine-to-machine platform is updated to reflect the authorization for the vehicle, then communications (e.g., messages, media content streams, etc.) to/from the vehicle will be intercepted and rerouted through the machine-to-machine platform, and allowed to pass through (e.g., released, forwarded, routed, or otherwise provided) to the target destination, such as the OTT server associated with the vehicle OTT application. These and other aspects of the concepts and technologies disclosed herein will be illustrated and described in more detail below.
- While some of the subject matter described herein may occasionally be presented in the general context of program modules that execute in conjunction with the execution of an operating system and application programs on a computer system, those skilled in the art will recognize that other implementations may be performed in combination with other types of program modules. Generally, program modules include routines, programs, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types in response to execution on a processor so as to transform the processor into a particular machine. Moreover, those skilled in the art will appreciate that the subject matter described herein may be practiced with other computer system configurations, including hand-held devices, vehicle computer systems, network access nodes, network servers, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and other particularized, non-generic machines.
- Referring now to
FIG. 1 , aspects of an operatingenvironment 100 for implementing various embodiments of the concepts and technologies disclosed herein pertaining to connected vehicle network access optimization will be described, according to an illustrative embodiment. It should be understood that the operatingenvironment 100 and the various components thereof have been illustrated for clarity purposes to simplify the manner of discussion. Accordingly, additional and/or alternate components can be made available or otherwise implemented within the operatingenvironment 100 without departing from the embodiments described herein. As such, the manner of discussion is provided such that one of ordinary skill in the technology can implement one or more embodiments described herein. - The operating
environment 100 shown inFIG. 1 includes one or more instance of aserving network 102, one or more instances of anetwork access point 104, a machine-to-machine platform (“M2M platform”) 108, a machine-to-machine server (“M2M server”) 110, a connected vehicle (“vehicle”) 120, a communications network (“network”) 130, one or more instances of anetwork access point 132, and one or more instance of acore server 134. The number of instances shown inFIG. 1 is for illustration purposes only and should not be construed as limiting in any way. Therefore, it is understood that zero, one, two, or more instances of each of the elements of the operatingenvironment 100 shown inFIG. 1 may be provided in various embodiments. - In the operating
environment 100 shown inFIG. 1 , an instance of the servingnetwork 102 can refer to a radio access network that directly connects an instance of thevehicle 120 to theM2M platform 108, where theM2M platform 108 controls and manages whether a device (e.g., the vehicle 120) can access and utilize servers and services, such as but not limited to, an over-the-top server (“OTT server”) 131, thecore server 134, and/or anetwork communication service 138, which are discussed in further detail below. The servingnetwork 102 can include network infrastructure devices that can facilitate communication and messaging to and/or from an instance of thevehicle 120 and/or thenetwork 130. For example, the servingnetwork 102 can include one or more instance of thenetwork access point 104. Thenetwork access point 104 can include, but should not be limited to, one or more of a base transceiver station, a wireless router, a femtocell, a Node B, an eNodeB, a gNodeB (i.e., an access point that incorporates New Radio access technology, such as LTE Advanced, and other 5G technology), a multi-standard metro cell node, an optical network terminal, and/or other network nodes or combinations thereof that are capable of providing communication to and/or from the servingnetwork 102. In some embodiments, the servingnetwork 102 may provide an initial point of contact for thevehicle 120. TheM2M platform 108 serves as an intermediary that enforces anaccess policy 144 for use of, and access to, any of thenetwork 130, theOTT server 131, thecore server 134, and/or thenetwork communication service 138. As such, the servingnetwork 102 may direct communications from thevehicle 120 to theM2M platform 108 to ensure network service compliance with access policy restrictions pertaining to the use of thenetwork communication service 138, such as only allowing devices to use thenetwork communication service 138 provided that they are identified in an authorized access policy map discussed below. - The
M2M platform 108 can include a connectivity management and handling system for supporting communications by various machine-to-machine and Internet of Things (“IoT”) devices, such as thevehicle 120 and other wireless communication devices that can connect to, and interact with, the servingnetwork 102. In some embodiments, theM2M platform 108 may be referred to as an IoT platform that supports the servingnetwork 102. In some embodiments, theM2M platform 108 can include one or more instances of an M2M server, such as theM2M server 110. In some embodiments, a communication service provider associated with thenetwork communication service 138 may use theM2M platform 108 to control network traffic that is directed to the network 130 (and/or a core server, such as thecore server 134 of the network 130) so that network access and exposure of thenetwork communication service 138 is limited to only those devices that are subscribed or otherwise authorized to utilize and access thenetwork communication service 138. It is understood that theM2M platform 108 can include various virtualized and/or non-virtualized non-generic network infrastructure devices that support and provide functionality for theM2M platform 108, such as theM2M server 110. An example of a computer system that can be configured as an embodiment of theM2M server 110 is discussed with respect toFIG. 6 . It is understood that other network infrastructure devices can support theM2M platform 108, such as but not limited to, routers, switches, and any other device discussed with respect to theserving network 102. In various embodiments, an instance of theM2M server 110 can include one or more instances of a processing unit and a memory storage device, such as a processor 111 and amemory 112, respectively. The processor 111 can include one or more instance of a processing unit and/or processing circuitry, which may execute to provide virtualized and/or non-virtualized processing. The processor 111 can include a central processing unit, a graphics processing unit, a system-on-chip, a combination thereof, of the like. The processor 111 can be configured substantially similar to a processing unit discussed with respect toFIG. 6 . In some embodiments, thememory 112 can include volatile and/or non-volatile memory implemented in any method or technology for storage of information such as computer-executable instructions, data structures, software program modules, or other data disclosed herein. It is understood that, use of the term “memory” and “computer storage medium” and variations thereof in the claims does not include, and shall not be construed to include, a wave or a signal per se and/or communication media. Thememory 112 can include a computer storage device that is configured substantially similar to memory discussed further below with respect toFIG. 6 . It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In various embodiments, the
memory 112 can store an authorized access policy map (“AAPM”) 114 and a network exposure manager application (“NEMA”) 118. In some embodiments, theAAPM 114 can be generated and stored within theM2M platform 108 based on theaccess policy 144 that corresponds to thenetwork communication service 138. TheNEMA 118 can control which devices (e.g., instances of a telematics control unit) are authorized to access thenetwork communication service 138, and in turn theNEMA 118 can control whether one or more instances of a vehicle over-the-top application (“vehicle OTT application”) 124 can operate, execute, and/or function on a vehicle head unit (“head unit”) 122 of thevehicle 120, specifically because thevehicle OTT application 124 relies on thenetwork communication service 138 to function and maintain execution. Without access by thevehicle OTT application 124 to the network communication service 138 (provided at least in part by thenetwork 130 and/or the serving network 102), execution of thevehicle OTT application 124 cannot be sustained because thevehicle OTT application 124 cannot contact an OTT server, such as theOTT server 131. Further discussion of theAAPM 114 and theNEMA 118 will be provided below. It is understood that any of the servingnetwork 102, theM2M platform 108, and theM2M server 110 may communicate with thevehicle 120, thenetwork 130, and any devices included therein. In some embodiments, theM2M platform 108 may be associated with third party communication providers so as to provide IoT management for thenetwork communication service 138. It is understood that the use of the term “service” is intended to correspond with one or more network operations that support handling of communications and messages (e.g., messages to and/or from the vehicle 120) over the servingnetwork 102 and/or thenetwork 130. Therefore, any use of the term “service” in the claims shall not be construed or interpreted as being direct to, involving, or otherwise including a judicial exception (e.g., an abstract idea, etc.) or any other non-patentable subject matter. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In the operating
environment 100 shown inFIG. 1 , an instance of thevehicle 120 is represented as a car driving along a paved roadway, although this may not necessarily be the case for all embodiments. As used herein, the terms “vehicle” and “connected vehicle” (e.g., the vehicle 120) refers to any ground-based vehicle that includes communication components and/or user equipment capable of sending and/or receiving communications with a network (e.g., the servingnetwork 102 and/or the network 130), where the ground-based vehicle can be configured to transport, carry, direct, and/or facilitate movement of one or more passengers, cargo, and/or objects. By way of example without limitation, an instance of thevehicle 120 can be configured as a car, a truck, a van, a sport utility vehicle, a cross-over vehicle, a motorcycle, a motorized tricycle, a scooter, a go-kart, a golf cart, a fork lift, a bus, a semi-trailer truck, a racing vehicle, a snow-capable vehicle, earth-moving equipment, farming/agriculture equipment, single or multi-wheeled vehicle, combinations thereof, or the like. It is understood that instances of vehicles may use various power/engine mechanisms to provide movement and/or functionality, such as but not limited to motors and/or engines that employ the use of fuel, oil, batteries, combinations thereof, or the like. Although one instance of a vehicle (i.e., the vehicle 120) is illustrated inFIG. 1 , it is understood that less than two or more than two instances of a vehicle can be included in various embodiments of the operatingenvironment 100. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In some embodiments, an instance of the
vehicle 120 can be driven, controlled, directed, or otherwise operated by a person. In some embodiments, an instance of thevehicle 120 may be configured to operate in at least a partially autonomous control mode. In some embodiments, an instance of thevehicle 120 may be configured to operate as a fully autonomous vehicle. In some embodiments, an instance of thevehicle 120 can operate as a “level 3” or “level 4” vehicle as defined by the National Highway Traffic Safety Administration (“NHTSA”). The NHTSA defines a level 3 vehicle as a limited self-driving automation vehicle that enables a driver to cede full control of all safety-critical functions under certain traffic or environmental conditions, and in those conditions to rely heavily on the vehicle to monitor for changes that require transition back to driver control. In a level 3 vehicle, the driver is expected to be available for occasional control, but with sufficiently comfortable transition time. By way of example, a limited self-driving automation vehicle may be available from WAYMO LLC, a subsidiary of ALPHABET INC.; TESLA INC.; and/or the VOLVO CARS CORPORATION. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. The NHTSA defines a level 4 vehicle as a fully self-driving automation vehicle that is designed to perform all safety-critical driving functions and monitor roadway conditions for an entire trip to a destination. Such fully self-driving design anticipates that a user will provide destination or navigation input, but the user is not expected to be available for control at any time during the trip. As such, a level 4 vehicle may include both occupied and unoccupied vehicles. Instances of thevehicle 120 can include any combination of the aforementioned vehicle types and can have any combination of capabilities with regard to autonomy. It is understood that the aforementioned discussion of standards defined by the NHTSA are provided for illustration purposes only, and therefore should not be construed as limiting in any way. It is understood that alternate standards, specifications, and/or definitions used to describe levels of autonomous driving modes may be developed and/or adopted by various industry groups and/or companies, such as but not limited to the Society of Automotive Engineers (“SAE”) International, the Federal Communications Commission (“FCC”), the Institute of Electrical and Electronics Engineers (“IEEE”), or other industry group. Therefore, it should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In some embodiments, an instance of the
vehicle 120 can include a vehicle head unit (“head unit”), such as thevehicle head unit 122, and a telematics control unit (“TCU”) 128. Thehead unit 122 can include one or more instances of a display device (“display”) for presenting a user interface that can provide visual images. Thehead unit 122 also can include (and/or be communicatively coupled to) input and output components that provide audio output and receive input from a user, such as via one or more speakers and/or microphones. In some embodiments, aninput 127 can be provided to thehead unit 122 via audio input, visual input, touch input, combinations thereof, or the like. In some embodiments, thehead unit 122 can be configured to include (and/or be communicatively coupled to) a heads up display, a vehicle information display, a console display, safety mechanisms (e.g., blind-spot sensors, crash avoidance, lane detection, auto-steering, etc.), a combination thereof, or any other audio, visual, and/or haptic feedback mechanism that can communicate or convey information to a user associated with thevehicle 120. In some embodiments, one or more instances of information and/or commands can be presented to a user of thevehicle 120 through visual presentation and/or audio presentation via one or more instance of thehead unit 122. In some embodiments, thehead unit 122 and/or theTCU 128 can be configured at least similar to a user equipment discussed with respect toFIG. 7 . For example, various embodiments of thehead unit 122 and/or theTCU 128 can include elements discussed therein, such as one or more instance of a processor, memory, communications components, and the like. In some embodiments, thehead unit 122 and/or theTCU 128 can be configured substantially similar to a vehicle head unit and a TCU discussed with respect toFIG. 2 . For clarity, aspects of elements from a user equipment that can be included within thehead unit 122 and/or theTCU 128 will be provided with respect toFIGS. 2 and 7 . It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In various embodiments, the
head unit 122 can include one or more instances of a vehicle OTT application, such as thevehicle OTT application 124. Thevehicle OTT application 124 can be stored in, and executed from, a memory storage device, such as a vehicle memory discussed with respect toFIG. 2 . Examples of an instance of thevehicle OTT application 124 can include, but should not be limited to, applications pertaining to social media, visual and/or audio calls, messaging, streaming media content (audio and/or video), geolocation mapping and/or traffic, news, weather, vehicle information, safety, or any other OTT application that can interact with and/or utilize a network communication service, such as thenetwork communication service 138, which will be discussed below in further detail. It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. An instance of thevehicle OTT application 124 can be associated with anapplication identifier 126. Each instance of theapplication identifier 126 can be a unique string that is associated with the particularvehicle OTT application 124. Theapplication identifier 126 can be included in messages to/from thevehicle 120. Theapplication identifier 126 can be used to determine whether the correspondingvehicle OTT application 124 is authorized to access thenetwork communication service 138 via thevehicle 120. In some embodiments, theinput 127 can trigger thehead unit 122 to launch and/or execute an instance of thevehicle OTT application 124. In some embodiments, theinput 127 can be provided to thehead unit 122 while thevehicle OTT application 124 is already executing. Thevehicle OTT application 124 may seek to connect and communicate with theOTT server 131 because theOTT server 131 may provide data, content, interfaces, and any other packet information that allows use and operation of thevehicle OTT application 124. Further discussion of an instance of theOTT server 131 is provided below. It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In various embodiments, the
TCU 128 can be configured substantially similar to a TCU discussed with respect toFIG. 2 . TheTCU 128 can send, receive, and/or control communication flow to/from thehead unit 122. TheTCU 128 can include communication components and circuitry that provide and support communicative coupling with other devices and networks, such as but not limited to, the servingnetwork 102, thenetwork 130, theM2M platform 108, and thecore server 134. TheTCU 128 can indicate an amount of signal strength, available network connections, and other information pertaining to communication to/from thevehicle 120. In some embodiments, information provided by theTCU 128 can be presented to a user via thehead unit 122. TheTCU 128 can expose one or more network communication interfaces that provide communication links to various network access points, such as thenetwork access points 104 and/or 132. TheTCU 128 can provide and be associated with aTCU identifier 128A. TheTCU identifier 128A can be unique to thevehicle 120 and/or theTCU 128, and therefore be used by network infrastructure of the servingnetwork 102 and/or thenetwork 130 to determine whether thevehicle 120 is authorized to access and utilize OTT applications and network services, such as thevehicle OTT application 124 and/or thenetwork communication service 138. In some embodiments, theTCU identifier 128A may include and/or correspond with an international mobile equipment identity, a subscriber identity module number, an electronic serial number, a combination thereof, or another identifier assigned or associated with theTCU 128. It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In the operating
environment 100 shown inFIG. 1 , an instance of thenetwork 130 can be in communication with one or more instances of the servingnetwork 102, thevehicle 120, user equipment, other network devices, combinations thereof, or the like. Thenetwork 130 can include one or more instances of thenetwork access point 132 and other network infrastructure devices. Thenetwork access point 132 can be configured at least similar to one or more embodiments of thenetwork access point 104 discussed above. In some embodiments, thenetwork 130 can refer to and/or include a core network that has network devices, servers, services, applications, and functions that support legacy, current, and/or future standards, such as 3G, 4G, LTE, 5G, or later architecture. For example, in some embodiments, thenetwork 130 can include, support, and/or provide one or more of an evolved universal mobile telecommunications system (“UMTS”), an evolved packet core (“EPC”), a terrestrial radio access (“E-UTRAN”) device, a mobility management entity (“MME”), a serving/packet data network (“PDN) gateway (“S/PGW”), a home subscriber server (“HSS”), a mobile edge computing (“MEC”) unit, a Policy & Charging rules function (“PCRF”), an Internet Protocol Multimedia Subsystem (“IMS”), a combination thereof, and/or any other systems, devices, and/or functions that may be included in one or more of 3G, 4G, LTE, 5G, or later network architecture and standards. In some embodiments, thenetwork 130 may be referred to as a “core network” that provides a software defined network (“SDN”) architecture to support functionality and communication via 5G, New Radio, and/or other standards and protocols via the implementation of centralized and/or distributed network host devices (which may be virtualized and/or non-virtualized). - In some embodiments, the
network 130 can include one or more instance of a core server, such as thecore server 134. Thecore server 134 can include aprocessor 135 and amemory 136. Theprocessor 135 can include one or more instance of a processing unit and/or processing circuitry, which may execute to provide virtualized and/or non-virtualized processing. Theprocessor 135 can include a central processing unit, a graphics processing unit, a system-on-chip, a combination thereof, of the like. Theprocessor 135 can be configured substantially similar to a processing unit discussed with respect toFIG. 6 . In some embodiments, thememory 136 can include volatile and/or non-volatile memory implemented in any method or technology for storage of information such as computer-executable instructions, data structures, software program modules, or other data disclosed herein. It is understood that, use of the term “memory” and “computer storage medium” and variations thereof in the claims does not include, and shall not be construed to include, a wave or a signal per se and/or communication media. Thememory 136 can include a computer storage device that is configured substantially similar to memory discussed further below with respect toFIG. 6 . It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In some embodiments, the
core server 134 can reside in, and/or form a portion of, thenetwork 130 and can, at least partially, support, host, or otherwise provide thenetwork communication service 138 so as to enable various devices (e.g., theTCU 128 of the vehicle 120) to access and communicate with theOTT server 131 via theserving network 102 and/or thenetwork 130. In some embodiments, thecore server 134 can be configured to provide and/or support a policy control function (“PCF”) 145 and an access and mobility function (“AMF”) 146. In some embodiments, thenetwork 130 and/or thecore server 134 can, at least partially, support, host, or otherwise provide access to one or more of a session management function, an access and mobility management entity, an authentication server function, a user data management function, a user plane function, a network exposure function, unified data management (“UDM”), an application function (“AF”), an enhanced mobile broadband system (“eMBBS”), a combination thereof, and/or other applications, systems, and/or functions that may support a network architecture. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In some embodiments, the
core server 134 can store an instance of computer readable instructions so as to configure one or more processors to perform operations. In some embodiments, the computer readable instructions can be provided by acontrol application 140 that is stored in thememory 136. Thecore server 134 can be associated with a communication service provider that supports and/or facilitates the operation of thenetwork communication service 138. Thenetwork communication service 138 enables user equipment and devices (e.g., theTCU 128 of the vehicle 120) to communicate over the servingnetwork 102 and/or thenetwork 130 so as to provide access and communicative coupling to devices and services associated with thevehicle OTT application 124, such as theOTT server 131. Thenetwork communication service 138 can provide and include transport layer functionality across a network, such as the servingnetwork 102 and/or thenetwork 130, so that user equipment and devices (e.g., the vehicle 120) can engage in wireless and/or wired communication coupling to access services and devices associated with thevehicle OTT application 124, such as theOTT server 131 that can provide a content data stream (“content stream”) 166 to thevehicle OTT application 124 executing on thevehicle 120. Thecontent stream 166 can include a successive, associated group of data packets that uniquely configure and transform a processor, display device, and other hardware resources of the vehicle 120 (e.g., thehead unit 122 and any other elements discussed with respect toFIG. 2 ) for continued execution of thevehicle OTT application 124. In various embodiments, thecontent stream 166 can provide one-way and/or two-way audio, video, images, user interfaces, text, combinations thereof, or any other information within data packets for operation by thevehicle 120 and/or thehead unit 122. Thecontent stream 166 may be provided to a corresponding instance of thevehicle OTT application 124 only after theM2M platform 108 has determined that the corresponding vehicle 120 (and thus theTCU 128 and/or head unit 122) is authorized to use thenetwork communication service 138. For example, after theM2M platform 108 redirects thevehicle 120 to the network service portal 142 (e.g., via an access redirect request discussed below) so as to bypass theM2M platform 108 and cause theTCU 128 to obtain authorization to thenetwork communications service 138, theAAPM 114 can be updated (i.e., reconfigured and instantiated with an authorization identifier that reflects the TCU 128), thereby authorizing thevehicle OTT application 124 to contact theOTT server 131 via the M2M platform 108 (which can intercept all communications as an intermediary to determine which communications should be allowed to pass through the servingnetwork 102 and which communications should be blocked based on the particular vehicle from which the communication is sent). As such, if thevehicle 120 is authorized to use the network communication service 138 (e.g., based on thevehicle 120 being identified in the AAPM 114), then thecontent stream 166 can be generated by theOTT server 131, routed through theM2M platform 108, and to theTCU 128 and thehead unit 122 of thevehicle 120. It is understood that thevehicle 120 can continue to use thenetwork communication service 138 while thevehicle 120 is within communicative coupling range of a corresponding network (e.g., the servingnetwork 102 and/or the network 130) and while thevehicle 120 is authorized on theAAPM 114 to use thenetwork communication service 138, thereby allowing for pass-through communications via theM2M platform 108. A communication service provider associated with thenetwork communication service 138 can limit, manage, and/or control the use of, and access to, the servingnetwork 102 and/ornetwork 130 that provides a network path to theOTT server 131. - In various embodiments, the
network 130 also can include one or more instance of theOTT server 131. TheOTT server 131 can be associated with an instance of thevehicle OTT application 124. TheOTT server 131 can provide content and data (e.g., a content stream of data packets and/or individual responses to requests) to thevehicle OTT application 124 via theM2M platform 108 because theM2M platform 108 may enforce theaccess policy 144 on behalf of thecore server 134. For example, in an embodiment, thevehicle OTT application 124 may execute streaming audio content that is provided by theOTT server 131. Any of thehead unit 122, thevehicle OTT application 124, and theTCU 128 may seek to communicate with theOTT server 131 so that thevehicle OTT application 124 can execute and/or maintain functionality for providing output within thevehicle 120. However, access to theOTT server 131 may depend on the vehicle 120 (and/or one or more devices therein such as theTCU 128, thehead unit 122, etc.) being authorized to use thenetwork communication service 138 so that communications from thevehicle 120 can be routed to theOTT server 131, which in turn may be hosted by thenetwork 130. - Use of the
network communication service 138 that enables access to theOTT server 131 may be enforced by theM2M platform 108 and/or theM2M server 110 based on theAAPM 114 and/or an access policy, such as theaccess policy 144. Thecontrol application 140 can create and/or define an instance of theaccess policy 144, where theaccess policy 144 corresponds with access to thenetwork communication service 138. Theaccess policy 144 can be stored in network-accessible memory, such as thememory 136. Theaccess policy 144 may be defined and stored in a format that is readable by thecontrol application 140, such as a data structure format, an executable routine, or other computer-executable and/or readable instructions. Theaccess policy 144 can indicate parameters, rules, and/or instructions that must be met in order to allow and/or authorize use of thenetwork communication service 138. For example, in some embodiments, theaccess policy 144 can instruct or otherwise configure network infrastructure (e.g., thenetwork access point 104, theM2M platform 108, etc.) such that communications (e.g., messages and data) to and/or from any of thevehicle OTT application 124, thehead unit 122, theTCU 128, thevehicle 120, and/or theOTT server 131 are to be routed through theM2M platform 108 so that exposure and use of thenetwork communication service 138 can be controlled to maintain network security. - In various embodiments, the
access policy 144 may require that in order for a device to be authorized for ongoing communicative coupling with the servingnetwork 102 and/or the network 130 (including communicating with the OTT server 131), the device must have or otherwise be associated with an instance of anequipment profile 148 that reflects an active subscription with the communication service provider. An instance of theequipment profile 148 can indicate that a user equipment and/or device (e.g., personal mobile phones, tablets, theTCU 128 of thevehicle 120 etc.) is authorized to use and/or have access to thenetwork communication service 138 by having and recording an identifier associated with the device, such as an instance of a knownTCU identifier 149. For example, a user associated with thevehicle 120 may have a user equipment (e.g., a personal mobile phone) that is subscribed to thenetwork communication service 138. Anetwork service portal 142 can be associated with thenetwork communication service 138. Thenetwork service portal 142 can be hosted by the core server 134 (or any other computer system associated with the network communication service 138). Thenetwork service portal 142 can provide a web page, application, or other user interface by which thevehicle 120 can obtain or otherwise become permitted or otherwise authorized to use thenetwork communication service 138. In some embodiments, a user associated with thevehicle 120 may have to provide an instance of theinput 127 to thehead unit 122 so as to confirm that thevehicle 120 will abide by theaccess policy 144, thereby causing thecontrol application 140 to create an instance of anequipment profile 148 for theTCU 128 of thevehicle 120. If an equipment profile, such as theequipment profile 148, associated with the user of thevehicle 120 already exists, then thecontrol application 140 can obtain that instance of theequipment profile 148 and instantiate an identifier that reflects the identity of the TCU 128 (or another device) of thevehicle 120, such as the knownTCU identifier 149. Instances of theequipment profile 148 can be stored on thememory 136. In some embodiments, theequipment profile 148 may be part of a user account profile and/or can be linked to a subscription associated with the user and one or more devices that are authorized and permitted to engage in communicative coupling via thenetwork communication service 138. An instance of theequipment profile 148 can be associated with one or more corresponding device that is authorized to use thenetwork communication service 138. For example, if a user has a mobile phone that is subscribed and authorized to use thenetwork communication service 138, then the mobile phone will have (or be associated with) an instance of theequipment profile 148 that provides an identifier associated with the user's mobile phone (e.g., a subscriber identity module identifier). In some embodiments, one instance of theequipment profile 148 may store and identify multiple devices which are associated with a shared network account and/or subscription to thenetwork communication service 138. For example, in some embodiments, the user may also be associated with thevehicle 120, where thevehicle 120 is capable of wireless communication via use of theTCU 128. In some embodiments, prior to launching thevehicle OTT application 124, the user may visit a network representative of the customer service provider and may initiate authorization to setup access to thenetwork communication service 138 before thevehicle 120 is in operation. However, a user may desire to enable thevehicle 120 to engage in communicative coupling (e.g., to allow thevehicle OTT application 124 to connect with the OTT server 131) without going to see a network representative to manually setup thenetwork communication service 138. Although the user may launch thevehicle OTT application 124 and desire to access and use thenetwork communication service 138 with thevehicle 120, an instance of theequipment profile 148 may not initially include an instance of a knownTCU identifier 149 for the TCU 128 (at the time in which thevehicle OTT application 124 was launched via an instance of the input 127), and therefore theM2M platform 108 and/or thecore server 134 may limit or otherwise prevent theTCU 128 of thevehicle 120 from accessing and using thenetwork communication service 138, thereby preventing thevehicle OTT application 124 from making contact with theOTT server 131. TheTCU 128 of thevehicle 120 may be permitted to access and use thenetwork communication service 138 only after an instance of theequipment profile 148 stores an instance of the knownTCU identifier 149 for theTCU 128, and theM2M platform 108 becomes aware that thevehicle 120 is authorized to use the network communication service 138 (e.g., theNEMA 118 instantiating theAAPM 114 with an instance of an authorizedidentifier 116 that reflects theTCU identifier 128A, and thus theTCU 128 of thevehicle 120, as further discussed below). The knownTCU identifier 149 may be substantially similar to theTCU identifier 128A, and therefore can identify thevehicle 120 and/or theTCU 128 associated with thevehicle 120. TheTCU identifier 128A (and thus also an instance of the known TCU identifier 149) can refer to a unique identifier (e.g., an equipment identifier) for theTCU 128 that operates in thevehicle 120. - The
M2M platform 108 can enforce theaccess policy 144 by confirming whether a device is authorized to use thenetwork communication service 138. Specifically, theaccess policy 144 can indicate that thenetwork communication service 138 is allowed to be accessed and/or utilized only by devices (e.g., theTCU 128 of the vehicle 120) that have an instance of an identifier (e.g., the known TCU identifier 149) that is associated with an instance of theequipment profile 148. TheM2M platform 108 can know, and/or be informed, of the state of the instance of theequipment profile 148 via theAAPM 114. TheAAPM 114 can indicate which devices should be allowed to use theM2M platform 108 to access thenetwork communication service 138 based on whether an instance of an authorizedidentifier 116 is present within theAAPM 114. An instance of the authorizedidentifier 116 provides an identity of a device that is authorized to access thenetwork communication service 138 through theM2M platform 108. Instances of authorized identifiers (e.g., any of authorizedidentifiers 116A-N) can point to, or otherwise identify, a corresponding instance of the knownTCU identifier 149 that is present and recorded within theequipment profile 148 on thecore server 134. The presence of an authorized identifier (e.g., any of authorizedidentifiers 116A-N) within theAAPM 114 indicates that a corresponding device is authorized to use thenetwork communication service 138, and therefore theM2M platform 108 can allow the corresponding device (e.g., theTCU 128 of the vehicle 120) to use thenetwork communication service 138 andM2M platform 108 in order to connect with theOTT server 131. Therefore, if a message that is received by theM2M platform 108 has an identifier (e.g., theTCU identifier 128A) that matches one of the authorizedidentifiers 116A-N of theAAPM 114, then the corresponding device which sent the message (e.g., theTCU 128 of the vehicle 120) would be authorized to use thenetwork communication service 138 and access theOTT server 131 via theM2M platform 108. If, however, the message includes an identifier that does not match any of the authorizedidentifiers 116A-N of theAAPM 114, then the corresponding device which sent the message would not be authorized to use thenetwork communication service 138, thereby blocking messages from the device from being routed through theM2M platform 108 to theOTT server 131. For clarity, a brief discussion of an example communication flow will be provided with respect toFIG. 1 . It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In various embodiments, the user of the
vehicle 120 may desire to execute thevehicle OTT application 124 to provide output (e.g., audio and/or video data) via thehead unit 122. The user can provide an instance of theinput 127 to thehead unit 122 to initiate execution of thevehicle OTT application 124. Thehead unit 122 can determine that thevehicle OTT application 124 relies on a network connection to receive data for the vehicle OTT application 124 (e.g., media data associated with an over-the-top service provided by the OTT server 131). Thehead unit 122 can generate an instance of anaccess probe message 150 that requests access to thenetwork communication service 138. Theaccess probe message 150 can include a probe uniform resource locator (“probe URL”) 152. Theprobe URL 152 can refer to a network address string that is directed to a target destination that facilitates network communication for execution and operation of thevehicle OTT application 124. Examples of the target destination can include thenetwork communication service 138, thecore server 134 associated with thenetwork communication service 138, and/or theOTT server 131. Theaccess probe message 150 can also include theTCU identifier 128A associated with theTCU 128 of thevehicle 120. At the time theinput 127 is received by thehead unit 122, thehead unit 122 may not be aware of network reachability—that is, whether theTCU 128 of thevehicle 120 is authorized or otherwise permitted to use thenetwork communication service 138. Thehead unit 122 can pass or otherwise provide theaccess probe message 150 to theTCU 128. TheTCU 128 can establish a connection with the servingnetwork 102, and provide theaccess probe message 150 to theserving network 102. - The
network access point 104 can relay theaccess probe message 150 to theM2M platform 108 of the servingnetwork 102. TheNEMA 118 may be executing on one or more servers of the M2M platform 108 (e.g., the M2M server 110). TheNEMA 118 may receive and analyze theaccess probe message 150. TheNEMA 118 may determine that theaccess probe message 150 is requesting forwarding to a target destination, such as one or more of thecore server 134, thenetwork communication service 138, and/or theOTT server 131. Instead of forwarding theaccess probe message 150 as requested, theNEMA 118 may prevent theaccess probe message 150 from being forwarded in order to confirm whether theTCU 128 of thevehicle 120 is authorized to access thenetwork communication service 138. TheNEMA 118 may access theAAPM 114 and compare theTCU identifier 128A against the authorizedidentifiers 116A-N to determine whether a match exists. In some embodiments, if theAAPM 114 indicates that one of the authorizedidentifiers 116A-N matches or otherwise corresponds with theTCU identifier 128A from theaccess probe message 150, then theTCU 128 of thevehicle 120 is authorized to use thenetwork communication service 138, so theNEMA 118 permits the access probe message 150 (or any other message) to be forwarded on from theM2M platform 108 to the target destination. In another embodiment, if none of the authorizedidentifiers 116A-N from theAAPM 114 match or otherwise correspond with theTCU identifier 128A, then theTCU 128 is not authorized to access thenetwork communication service 138. - In embodiments where the
NEMA 118 determines that theTCU 128 of thevehicle 120 is not authorized to use thenetwork communication service 138, theNEMA 118 can generate anaccess redirect command 154. Theaccess redirect command 154 can instruct, via a redirect instruction, thehead unit 122 of thevehicle 120 to bypass theM2M platform 108 so as to enable access to thenetwork communication service 138 via thenetwork service portal 142. Theaccess redirect command 154 can include aredirect instruction 156. In some embodiments, theaccess redirect command 154 can conform to a Hypertext Transfer Protocol (HTTP) specification status code, such as but not limited to one or more ofHTTP status code 302, 303, 307, or another status code discussed with respect to a standards document as understood by one of skill in the technology. Theredirect instruction 156 can include aredirect URL 158 that points to thenetwork service portal 142 associated with thenetwork communication service 138. Theredirect instruction 156 can impart theredirect URL 158 to thehead unit 122 and/or theTCU 128 so that theM2M platform 108 is bypassed and access to thenetwork communication service 138 can be enabled or otherwise obtained directly from thecore server 134 via thenetwork service portal 142, without being routed through theM2M platform 108. TheNEMA 118 can provide theaccess redirect command 154 to theTCU 128 of thevehicle 120. In some embodiments, the access redirect command 154 (and/or any other message discussed herein that is sent from and/or received by the vehicle 120) can be configured according to a vehicle-to-network message format, such as but not limited to one or more of messaging in conformance with PC5, 802.11p, UU, LTE-V2X, or another standard that conforms with vehicle communications standards as understood by one of ordinary skill in the technology. In some embodiments, theaccess redirect command 154 can provide the vehicle 120 (and thus the TCU 128) with a one-time bypass of theM2M platform 108 so as to enable thevehicle 120 to become authorized to use thenetwork communication service 138 by contacting thecore server 134 directly to access thenetwork service portal 142 by bypassing theM2M platform 108. Thus, if theM2M platform 108 determines (after previously providing theaccess redirect command 154 to the vehicle 120) that thevehicle 120 continues to be unauthorized to use thenetwork communication service 138, then any communications from thevehicle 120 can be intercepted and rerouted to theM2M platform 108 so as to block and/or prevent the communications from reaching the target destination (e.g., the OTT server 131), thereby preventing theOTT server 131 from providing thecontent stream 166 to thehead unit 122 until theAAPM 114 indicates that thevehicle 120 is authorized to use thenetwork communication service 138. - In various embodiments, the
TCU 128 may receive theaccess redirect command 154. In some embodiments, theTCU 128 may relay or otherwise inform thehead unit 122 of theaccess redirect command 154 and any data included therein, such as theredirect instruction 156 and theredirect URL 158. TheTCU 128 and/or thehead unit 122 can generate an access redirect request message (“access redirect request”) 160 based on theaccess redirect command 154 and theredirect instruction 156 from theM2M platform 108. Theaccess redirect request 160 can include theredirect URL 158 that redirects theTCU 128 to contact thenetwork service portal 142 so as to bypass theM2M platform 108 and enable thenetwork communication service 138. TheTCU 128 can send or otherwise provide theaccess redirect request 160 to thecore server 134 of thenetwork 130 that hosts thenetwork service portal 142. Theaccess redirect request 160 can be routed from a network access point (e.g., any of thenetwork access points 104, 132) to thecore server 134 such that theaccess redirect request 160 is not intercepted by theM2M platform 108 andM2M server 110, thereby allowing theTCU 128 to obtain access and authorization to thenetwork communication service 138 via thenetwork service portal 142. In some embodiments, thenetwork service portal 142 can provide one or more user interfaces to thehead unit 122 as to enable thevehicle 120 to obtain authorization to use and access thenetwork communication service 138. In various embodiments, the one or more user interfaces may be provided to theTCU 128 and/or thehead unit 122 in one or more instance of a network serviceportal response 162. For example, in some embodiments, theaccess redirect request 160 can include an instance of theTCU identifier 128A associated with theTCU 128. In some embodiments, while thevehicle 120 is connected with thenetwork service portal 142, the user can provide an instance of input to the head unit 122 (and/or the TCU 128) that indicates permission for the control application 140 (on the core server 134) to add the vehicle 120 (and/or the TCU 128) to a corresponding instance of theequipment profile 148 so as to indicate that theTCU 128 is an authorized device that is permitted to use thenetwork communication service 138. In some embodiments, the user may also grant a communication service provider permission to change and/or upgrade a data plan for use of thevehicle 120 with thenetwork communication service 138. In various embodiments, thecontrol application 140 can receive input from the user (e.g., via theTCU 128 and/or thecontrol application 140 engaging in one or more instances of theaccess redirect request 160 and/or the network service portal response 162) requesting access to and use of thenetwork communication service 138 by thevehicle 120. Thecontrol application 140 can grant and enable theTCU 128 of thevehicle 120 to access thenetwork communication service 138 by instantiating the knownTCU identifier 149 within theequipment profile 148 associated with thevehicle 120 and/or user of thevehicle 120. The knownTCU identifier 149 that is recorded in theequipment profile 148 matches, corresponds to, or otherwise reflects theTCU identifier 128A associated with theTCU 128 and thevehicle 120 which is being granted permission to use thenetwork communication service 138. To clarify, an instance of the knownTCU identifier 149 that identifies (or otherwise corresponds with) the vehicle 120 (and/or the TCU 128) did not exist (or was not stored) in theequipment profile 148 when thevehicle 120 was unauthorized to use the network communication service 138 (i.e., prior to theTCU 128 of thevehicle 120 being permitted to engage in use of thenetwork communication service 138, and thus yet not permitted to contact the OTT server 131). As such, the presence of the knownTCU identifier 149 within theequipment profile 148 indicates that a corresponding device (e.g., theTCU 128 of the vehicle 120) is permitted and authorized to use thenetwork communication service 138. In some embodiments, theTCU 128 may be informed that thevehicle 120 is authorized to access thenetwork communication service 138 via the network serviceportal response 162. - In various embodiments, when the
equipment profile 148 is updated to store an identifier (e.g., the known TCU identifier 149) of a device that is now authorized to access thenetwork communication service 138, thecontrol application 140 may send anaccess update message 170 to theNEMA 118 of theM2M platform 108. TheNEMA 118 can extract and analyze the knownTCU identifier 149 from theaccess update message 170, and create an instance of the authorizedidentifier 116 within the AAPM 114 (e.g., any of the authorizedidentifiers 116A-N) to correspond with, and identify, the knownTCU identifier 149. As such, each instance of the authorizedidentifiers 116A-N can correspond with and represent an identifier stored in an instance of the equipment profile 148 (e.g., the authorizedidentifier 116B being created and/or configured to represent the knownTCU identifier 149 that is associated with theTCU 128, theTCU identifier 128A, and the vehicle 120). When thevehicle 120 initially sends theaccess probe message 150 to theM2M platform 108, theNEMA 118 may not recognize thevehicle 120 because theAAPM 114 does not indicate that any of the authorizedidentifiers 116A-N belong to theTCU 128 of thevehicle 120. Therefore, theM2M platform 108 may deny thevehicle 120 access to thenetwork communication service 138 and prevent thevehicle OTT application 124 from using theM2M platform 108 to access theOTT server 131. Yet once one of the authorizedidentifiers 116A-N within theAAPM 114 matches or otherwise corresponds with theTCU identifier 128A provided by theTCU 128, then theM2M platform 108 may allow messages from thevehicle 120 to pass through theM2M platform 108 and use thenetwork communication service 138. - In some embodiments, once the
vehicle 120 is granted permission to use and engage in thenetwork communication service 138, theTCU 128 may send a subsequentaccess probe message 150′. The subsequentaccess probe message 150′ may include another instance of theprobe URL 152, which is illustrated asprobe URL 152′. The subsequentaccess probe message 150′ may include theTCU identifier 128A that is associated with theTCU 128 and thevehicle 120. TheM2M platform 108 can determine that one of the authorizedidentifiers 116A-N within theAAPM 114 corresponds with theTCU identifier 128A, and therefore theM2M platform 108 can grant thevehicle 120 access to thenetwork communication service 138. In some embodiments, the subsequentaccess probe message 150′ can be forwarded on to a target destination, such as one or more of thecore server 134 and/or theOTT server 131 via theM2M platform 108. In some embodiments, thecore server 134 and/orOTT server 131 can receive the message sent from thevehicle 120 via the M2M platform 108 (e.g., theaccess probe message 150 and/or the subsequentaccess probe message 150′) and, in response, generate anaccess probe response 164 that informs thevehicle 120 that theTCU 128 and thevehicle OTT application 124 are permitted or otherwise authorized to connect with theOTT server 131 because thevehicle 120 is authorized to use thenetwork communication service 138. In some embodiments, theaccess probe response 164 can be sent from thecore server 134 and/or theOTT server 131 to thevehicle 120 via the M2M platform 108 (i.e., by theM2M platform 108 being an intermediary point of access policy enforcement). In some embodiments, an instance of theaccess probe response 164 can be provided directly to thevehicle 120 so as to bypass theM2M platform 108, where theaccess probe response 164 can inform thevehicle 120 that thehead unit 122 and/or theTCU 128 is authorized to use thenetwork communication service 138. In some embodiments, thecontent stream 166 may be provided to thevehicle OTT application 124 after a subsequent instance of theaccess probe message 150 is sent (e.g., an instance of the subsequentaccess probe message 150′) to theM2M platform 108, which determines that thevehicle 120 is now authorized to use thenetwork communication service 138. In some embodiments, when one or more of theM2M platform 108 determines that thevehicle 120 is authorized to use thenetwork communication service 138, any previous and/or current communications that are directed a target destination (e.g., to the OTT server 131) will no longer be blocked, but instead can be released, routed, and provided to the target destination (e.g., the OTT server 131). TheM2M platform 108 can continue to intercept communications (e.g., the content stream 166) that are directed to and/or sent from thevehicle 120 associated with thevehicle OTT application 124, thereby enabling enforcement of the access policy and optimization of network resources because communications are routed to their final destination only when thecorresponding vehicle 120 is authorized to use thenetwork communication service 138. - In some embodiments, if the
vehicle 120 and/orTCU 128 violates one or more parameters of the access policy 144 (e.g., exceed network usage, non-payment of service fee, nefarious network attacks from thevehicle 120, etc.), thecontrol application 140 may lock or otherwise prevent thevehicle 120 from using thenetwork communication service 138 by removing the knownTCU identifier 149 from theequipment profile 148. In turn, theNEMA 118 may remove the corresponding authorized identifier from theAAPM 114 so that when thevehicle 120 attempts to contact theOTT server 131 and/or thecore server 134 to use thenetwork communication service 138, theM2M platform 108 can provide an access deniedresponse 153 to inform thevehicle 120 that access to thenetwork communication service 138 has been withdrawn. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. -
FIG. 1 illustrates the operatingenvironment 100 having one instance of the servingnetwork 102, thenetwork access point 104, theM2M platform 108, theM2M server 110, the processor 111, thememory 112, theAAPM 114, the authorizedidentifiers 116A-N, theNEMA 118, thevehicle 120, thehead unit 122, thevehicle OTT application 124, theapplication identifier 126, theinput 127, theTCU 128, theTCU identifier 128A, thenetwork 130, theOTT server 131, thenetwork access point 132, thecore server 134, theprocessor 135, thememory 136, thenetwork communication service 138, thecontrol application 140, thenetwork service portal 142, theaccess policy 144, thePCF 145, theAMF 146, theequipment profile 148, the knownTCU identifier 149, theaccess probe message 150, theprobe URL 152, the subsequentaccess probe message 150′, theprobe URL 152′, theaccess redirect command 154, theredirect instruction 156, theredirect URL 158, theaccess redirect request 160, and the network serviceportal response 162, andaccess probe response 164, and acontent stream 166. It should be understood, however, that some implementations of the operatingenvironment 100 can include zero, one, or more than one instances of the above listed elements shown inFIG. 1 . As such, the illustrated embodiment of the operatingenvironment 100 is understood to be illustrative and should not be construed as being limiting in any way. - Turning now to
FIG. 2 with continued reference toFIG. 1 , a block diagram 200 illustrating an instance of avehicle 201 and aspects thereof will be described, according to an illustrative embodiment. It is understood that one or more instances of thevehicle 120 illustrated and discussed with respect toFIG. 1 can be configured substantially similar to thevehicle 201 shown and discussed with respect toFIG. 2 . Thevehicle 201 shown inFIG. 2 is illustrated for purposes of clarity of discussion, and therefore is provided as an example. It is understood that zero, one, or more than one instances of the components discussed herein with respect to thevehicle 201 may be implemented in various embodiments. As such, the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. The illustratedvehicle 201 includes vehicle mechanical/electrical function components 202, avehicle processor 203, avehicle memory 204, avehicle firmware 206, avehicle operating system 208, atelematics control unit 209, one or morevehicle software application 210, avehicle head unit 211, adisplay 211A, an input/output component 211B, a vehiclewireless communications component 212, an instance of avehicle communication interface 218 that supports adirect transmission mode 219, an instance of the network communication interface 220 that supports thenetwork transmission mode 221, a vehicle dedicated short-range communications (“DSRC”)component 214, and a cellular vehicle-to-anything (“C-V2X”)component 216. Each of these components will now be described in detail. It is understood that the term vehicle-to-anything (“V2X”) refers to a vehicle's communication ability (e.g., the vehicle 201) through components (e.g., a telematics control unit) that are configured to communicate with one or more network or network infrastructure, such as the servingnetwork 102, theM2M platform 108, thenetwork 130, theOTT server 131, thecore server 134, or the like. In some embodiments, a communication that is sent to and/or from a vehicle may be referred to as the implementation of vehicle-to-everything (“V2X”) communications, which can include one or more of vehicle-to-vehicle (“V2V”) communications, vehicle-to-infrastructure (“V2I”) communications, vehicle-to-network (“V2N”) communications, and/or vehicle-to-pedestrian (“V2P”) communications, and may facilitate communicative coupling between vehicles, infrastructure, a network, and/or pedestrians, respectively. It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - The vehicle mechanical/electrical function components 202 can include mechanisms, circuitry, elements, and/or components of the
vehicle 201 that enable the vehicle to function and operate. For example, one or more instances of the vehicle mechanical/electrical function components 202 can include, an engine, a transmission, a braking system, a transmission control unit, an engine control unit, a battery, an electrical system, a safety system, a heating ventilation and air conditioning system, a lighting system, a sensor system (e.g., a lane detection system, crash avoidance system, etc.), or any other component or element that may facilitate function of thevehicle 201 and/or support one or more of the operations discussed herein. - The
vehicle processor 203 can include one or more hardware components that perform computations to process data, and/or to execute computer-executable instructions of one or more application programs such as the vehicle software application(s) 210, one or more operating systems such as thevehicle operating system 208, other software, and/or thevehicle firmware 206. Thevehicle processor 203 can include one or more central processing units (“CPUs”) and/or engine control units (“ECU”) configured with one or more processing cores. Thevehicle processor 203 can include one or more graphics processing unit (“GPU”) configured to accelerate operations performed by one or more CPUs, and/or to perform computations to process data, and/or to execute computer-executable instructions of one or more application programs, operating systems, and/or other software that may or may not include instructions particular to graphics computations. In some embodiments, thevehicle processor 203 can include one or more discrete GPUs. In some other embodiments, thevehicle processor 203 can include CPU, ECU, and/or GPU components that are configured in accordance with a co-processing CPU/GPU computing model, wherein the sequential part of an application executes on the CPU and the computationally-intensive part is accelerated by the GPU. Thevehicle processor 203 can include one or more system-on-chip (“SoC”) components along with one or more other components illustrated as being part of thevehicle 201, including, for example, thevehicle memory 204, the vehiclewireless communications component 212, theDSRC component 214, or some combination thereof. In some embodiments, thevehicle processor 203 can be or can include one or more SNAPDRAGON SoCs, available from QUALCOMM of San Diego, Calif.; one or more TEGRA SoCs, available from NVIDIA of Santa Clara, Calif.; one or more HUMMINGBIRD SoCs, available from SAMSUNG of Seoul, South Korea; one or more Open Multimedia Application Platform (“OMAP”) SoCs, available from TEXAS INSTRUMENTS of Dallas, Tex.; one or more customized versions of any of the above SoCs; and/or one or more proprietary SoCs. Thevehicle processor 203 can be or can include one or more hardware components architected in accordance with an ARM architecture, available for license from ARM HOLDINGS of Cambridge, United Kingdom. Alternatively, thevehicle processor 203 can be or can include one or more hardware components architected in accordance with an x86 architecture, such an architecture available from INTEL CORPORATION of Mountain View, Calif., and others. Those skilled in the technology will appreciate the implementation of thevehicle processor 203 can utilize various computation architectures, and as such, thevehicle processor 203 should not be construed as being limited to any particular computation architecture or combination of computation architectures, including those explicitly disclosed herein. - The
vehicle memory 204 can include one or more hardware components that perform storage operations, including temporary or permanent storage operations. In some embodiments, thevehicle memory 204 includes volatile and/or non-volatile memory implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, thevehicle operating system 208, thevehicle firmware 206, the vehicle software application(s) 210, and/or other software, firmware, and/or other data disclosed herein. Computer storage media includes, but is not limited to, random access memory (“RAM”), read-only memory (“ROM”), Erasable Programmable ROM (“EPROM”), Electrically Erasable Programmable ROM (“EEPROM”), flash memory or other solid state memory technology, CD-ROM, digital versatile disks (“DVD”), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store data and which can be accessed by thevehicle processor 203. Thevehicle memory 204 may be configured substantially similar tomemory 604 discussed with respect toFIG. 6 . It is understood that one or more instances of thevehicle memory 204 can be included in one or more of the components of the vehicle 201 (and/or thevehicle 120 fromFIG. 1 ), such as the vehicle head unit 211 (and/or the head unit 122) and/or the telematics control unit 209 (and/or the telematics control unit 128). As such, in the claims, the use of the phrase “vehicle memory” (or variations thereof) does not include waves or signals per se and/or communication media. - The
vehicle firmware 206, which in some embodiments may also be known as microcode, can be written onto a ROM of thevehicle memory 204. Thevehicle firmware 206 can be written on the ROM at the time of manufacturing and is used to execute programs on thevehicle processor 203. In some embodiments, thevehicle firmware 206 includes thevehicle operating system 208. In some embodiments, thevehicle firmware 206 is thevehicle operating system 208. In some embodiments, thevehicle firmware 206 and thevehicle operating system 208 are closely integrated for performance of operations of thevehicle 201. - The
vehicle operating system 208 can control the operation of at least a portion of thevehicle 201. In some embodiments, thevehicle operating system 208 includes the functionality of thevehicle firmware 206 and/or the vehicle software application(s) 210. Thevehicle operating system 208 can be executed by thevehicle processor 203 to cause thevehicle 201 to perform various operations. Thevehicle operating system 208 can include, by way of example without limitation, a member of the SYMBIAN OS family of operating systems from SYMBIAN LIMITED; a member of the WINDOWS OS, WINDOWS MOBILE OS, and/or WINDOWS PHONE OS families of operating systems from MICROSOFT CORPORATION; a member of the PALM WEBOS family of operating systems from HEWLETT PACKARD CORPORATION; a member of the BLACKBERRY OS family of operating systems from RESEARCH IN MOTION LIMITED; a member of the IOS family of operating systems, a memory of the CARPLAY family of operating systems, and/or a member of the OS X family of operating systems from APPLE INC.; a member of the ANDROID OS family and/or the ANDROID AUTO family of operating systems from GOOGLE INC.; an open-source software operating system build around the LINUX kernel; a member of a real-time operating system; a member of a portable operating system interface automotive open system architecture and/or other operating systems. These operating systems are merely illustrative of some contemplated operating systems that may be used in accordance with various embodiments of the concepts and technologies described herein and therefore should not be construed as being limiting in any way. The vehicle software application(s) 210 can execute on top of thevehicle operating system 208. The vehicle software application(s) 210 can be executed by thevehicle processor 203 to cause the vehicle 201 (and/or components thereof, such as thevehicle head unit 211 and/or the telematics control unit 209) to perform various operations described herein. For example, the vehicle software application(s) 210 can be part of a vehicle entertainment system, a vehicle navigation system, a vehicle “ECU”, and/or another computing system of the user vehicle. In some embodiments, the vehicle software application(s) 210 can include one or more instances of thevehicle OTT application 124 ofFIG. 1 . - The
telematics control unit 209 may be configured substantially similar to theTCU 128 discussed with respect toFIG. 1 . In some embodiments, thetelematics control unit 209 may include and/or control the vehiclewireless communications components 212 discussed below. Thetelematics control unit 209 can include one or more instances of thevehicle processor 203, thevehicle memory 204, thevehicle operating system 208, and/or thevehicle firmware 206. Thetelematics control unit 209 may be configured to control the inflow and/or outflow of communications to and/or from thevehicle 201 via one or more of the vehiclewireless communications components 212. In various embodiments, thetelematics control unit 209 can control, provide, and/or facilitate wireless tracking, wireless diagnostics, device pairing, crash notification, and other communication to/from thevehicle 201. In various embodiments, thetelematics control unit 209 can include circuitry that operates as a network interface controller and can provide communication to thevehicle head unit 211 and/or one or morevehicle software applications 210. In various embodiments, thetelematics control unit 209 can perform one or more functions and/or operations discussed herein, such as but not limited to operations discussed with respect toFIG. 1 ,FIG. 3 , and/orFIG. 4 . - The
vehicle head unit 211 may be configured substantially similar to thehead unit 122 discussed above with respect toFIG. 1 . In some embodiments, thevehicle head unit 211 can include thedisplay 211A that can be configured to present and/or provide audio output and/or video output via one or more user interface. Thedisplay 211A of thevehicle head unit 211 can have a display device that presents various user interfaces, requests, messages, and/or any other information (e.g., any of the messages, commands, requests, responses, and/or identifiers fromFIG. 1 ) to a user or other occupant associated with thevehicle 120 and/or thevehicle 201. In some embodiments, the input/output component 211B can provide a user touch-screen, audio speakers, microphones, haptic feedback system, or other input and/or output device or component that can alert a user to various communications. As such, an instance of the input/output component 211B and/or thedisplay 211A can be implemented to enable theinput 127 to be provided to thehead unit 122 of thevehicle 120. - The vehicle
wireless communications component 212 can include one or more wireless wide area network (“WWAN”) components (e.g., radio transceivers, antenna, etc.) capable of facilitating communication with one or more WWANs, such as the servingnetwork 102 and/or thenetwork 130. In some embodiments, one or more instances of the vehiclewireless communications component 212 can be configured to provide multi-mode wireless connectivity. For example, the vehiclewireless communications component 212 may be configured to provide connectivity to theserving network 102 and/or thenetwork 130 and may provide functions in accordance with UMTS, LTE, 5G and New Radio standards, or via some other combination of technologies, and more particularly, one or more technologies that support cell broadcast functionality. In various embodiments, the vehiclewireless communications component 212 can include one or more instances of a transceiver, sensors, cameras, circuitry, antennas, and any other components that can support and facilitate sending and/or receiving communications over thevehicle communication interface 218 using thedirect transmission mode 219 and/or the network communication interface 220 using thenetwork transmission mode 221. In some embodiments, thevehicle communication interface 218 can be provided and/or hosted by theDSRC component 214 and/or the C-V2X component 216. - The
direct transmission mode 219 refers to a communication routine (which may be executed by the telematics control unit 209) by which a vehicle can communicate messages to/from another device (while within each other's communication range) without the messages being passed through an intermediary device of the network (e.g., without being handled by any of thenetwork access points core server 134, theM2M platform 108, etc.). In some embodiments, thedirect transmission mode 219 can be provided over an 802.11x protocol (e.g., 802.11p or protocol within the 802.11 family of wireless local area network standards), which in some embodiments may be referred to as protocols and/or standards for dedicated short-range communications (“DSRC”). In some embodiments, thedirect transmission mode 219 can be provided using specifications pertaining to cellular V2X (“C-V2X”), which is initially defined by the Third Generation Partnership Project (“3GPP”) Release 14, discussed in Release 15 and later. In various embodiments, standards and protocols of C-V2X may allow communication components to be configured to support the direct transmission mode 219 (e.g., via a PC5 interface) and the network transmission mode 221 (e.g., via a Uu interface). Thevehicle communication interface 218 can be configured to use, support, and provide thedirect transmission mode 219, and the network communication interface 220 can be configured to use, support, and provide thenetwork transmission mode 221. In various embodiments, thenetwork transmission mode 221 refers to a vehicle communication routine (which may be executed by the telematics control unit 209) by which the vehiclewireless communications component 212 uses and communicates with network infrastructure (e.g., network devices of the servingnetwork 102 and/or the network 130) to transmit various communications that are directed to one or more device through a device of the network (i.e., network infrastructure), such as any of thenetwork access points M2M platform 108, and/or thecore server 134. In some embodiments, one or more instances of a communication (e.g., any of theaccess probe message 150, theaccess probe message 150′, the access deniedresponse 153, theaccess redirect command 154, theaccess redirect request 160, the network serviceportal response 162, and/or the access probe response 164) may be generated and/or received with a configuration that facilitates and supports the use of thenetwork transmission mode 221. - The
DSRC component 214 can be a radio communications device and/or circuitry that can send and receive various communications (not shown) using thedirect transmission mode 219. In some embodiments, theDSRC component 214 is configured to operate within a 5.9 GHz radio frequency band as defined by the United States Department of Transportation. In some embodiments, theDSRC component 214 is configured to operate within other radio frequency bands. In some embodiments, theDSRC component 214 can operate using 802.11p or other technology. - The C-
V2X component 216 can be a radio communications device and/or circuitry that can send and receive V2X communications using thedirect transmission mode 219 and/or thenetwork transmission mode 221. In some embodiments, the C-V2X component 216 can operate in accordance with 3GPP Release 14 or later. The C-V2X component 216 can support and provide thevehicle communication interface 218 and/or the network communication interface 220. In various embodiments, the C-V2X component 216 can be configured to support 5G New Radio transmissions and direct communication transmissions so that communications may occur within and/or outside of a direct communication range. In some embodiments, the C-V2X component 216 can transmit and receive communications over the direct transmission mode 106 within an ITS spectrum, such as a 5.9 GHz ITS band. In some embodiments, the C-V2X component 216 can provide transmission latency that is no more than a defined amount of milliseconds (e.g., less than 10 milliseconds). In some embodiments, theTCU 128 can include, and/or be configured to invoke, the C-V2X component 216 and/or thevehicle DSRC component 214. It should be understood that the embodiment of thevehicle 201 illustrated inFIG. 2 is provided as an example of a possible implementation of thevehicle 120 discussed with respect toFIG. 1 . The examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - Turning now to
FIGS. 3 and 4 with continued references toFIGS. 1 and 2 , aspects of amethod 300 and amethod 400 for embodiments pertaining to aspects of connected vehicle network access optimization will be described in detail, according to various illustrative embodiments. It should be understood that each of the operations of the one or more methods disclosed herein (e.g., themethod 300 and/or themethod 400 discussed below) are not necessarily presented in any particular order and that performance of some or all of the operations in an alternate order(s) is possible and is contemplated. It is also understood that any of the operations from the methods disclosed herein may be combined or otherwise arranged to yield another embodiment of a method that is within the scope of the concepts and technologies discussed herein. The operations have been presented in the demonstrated order for ease of description and illustration, and therefore should not be construed as limiting the various embodiments disclosed herein. Operations may be added, omitted, and/or performed simultaneously and/or sequentially, without departing from the scope of the concepts and technologies disclosed herein. - It also should be understood that the methods disclosed herein can be ended at any time and need not be performed in its entirety. Some or all operations of the methods, and/or substantially equivalent operations, can be performed by execution of computer-readable instructions stored and included on a computer storage medium, as defined herein. The phrases “computer executable instructions,” and variants thereof (e.g., “computer-readable instructions”), as used herein, is used expansively to include routines, applications, modules, scripts, programs, plug-ins, data structures, algorithms, and the like. It is understood that any use of the term “module” (in the specification and claims) refers to a defined, callable set of computer-readable and executable instructions that, upon execution by a processor, configure at least a processor to perform at least a portion of one or more operations and functions discussed herein so as to transform, upon execution, processing resources and/or memory resources into a particular, non-generic, machine. Computer-readable instructions can be implemented on various system configurations including but not limited to one or more of single-processor or multiprocessor systems, minicomputers, user equipment, mainframe computers, personal computers, network servers, hand-held computing devices, microprocessor-based, programmable consumer electronics, a network platform, edge devices, vehicles, combinations thereof, and the like.
- Thus, it should be appreciated that the logical operations described herein are implemented (1) as a sequence of computer implemented acts or program modules running on a computing system and/or (2) as interconnected machine logic circuits or circuit modules within the computing system so as to provide a particular, non-generic machine device. The implementation is a matter of choice dependent on the performance and other requirements of the computing system. Accordingly, the logical operations described herein are referred to variously as states, operations, structural devices, acts, functions, instructions, and/or modules. These states, operations, structural devices, acts, functions, instructions, and/or modules may be implemented in software, in firmware, in special purpose digital logic, and any combination thereof. As used herein, the phrase “cause a processor to perform operations” and variants thereof is used to refer to causing and transforming a processor of a computing system or device, such as any component within one or more of the
vehicle 120, servingnetwork 102, theM2M platform 108, theM2M server 110, thenetwork 130, theOTT server 131, and/or thecore server 134, to perform one or more operations and/or causing one or more instances of a processor to direct other components of a computing system or device, to perform one or more of the operations. - For purposes of illustrating and describing the concepts of the present disclosure, one or more of the operations of methods disclosed herein are described as being performed by one or more instance of the
TCU 128 and/or thehead unit 122 of thevehicle 120, theM2M server 110 of theM2M platform 108, thecore server 134 associated with thenetwork communication service 138, or a combination thereof, via execution of one or more computer-readable instructions configured so as to instruct and transform a processor. It should be understood that additional and/or alternative devices and/or network infrastructure devices can, in some embodiments, provide the functionality described herein via execution of one or more routines, applications, and/or other software including, but not limited to, thevehicle OTT application 124, theNEMA 118, thecontrol application 140, thevehicle software application 210, thevehicle firmware 206, thevehicle operating system 208, and/or any other computer executable instructions that can configure a device discussed herein, such as but not limited to one or more of theM2M platform 108, theM2M server 110, thevehicle 120, theOTT server 131, and/or thecore server 134. Thus, the illustrated embodiments are illustrative, and should not be viewed as being limiting in any way. - In various embodiments, any computer system of the M2M platform 108 (e.g., the M2M server 110) can execute an instance of the
NEMA 118 so as to cause one or more processor (e.g., an instance of the processor 111) to perform at least a portion of one or more operations discussed herein. In various embodiments, execution of thecontrol application 140 can cause one or more instances of acore server 134 and/or theM2M server 110 to perform one or more operations discussed herein. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. Themethod 300 and themethod 400 will be described with reference to one or more of theFIGS. 1 and 2 . - Turning now to
FIG. 3 , themethod 300 for connected vehicle network access optimization is disclosed, according to an illustrative embodiment. In an embodiment, themethod 300 can be performed by a computer system of the M2M platform 108 (e.g., theM2M server 110 that executes the processor 111) that is configured by theNEMA 118 to perform one or more operation discussed herein. TheM2M server 110 can communicatively couple to thenetwork 130 and thevehicle 120. It is understood that one or more operations of themethod 300 may be performed by, and/or in response to, any operation from another device and/or application, such as thecontrol application 140 of thecore server 134 and/or theTCU 128 of thevehicle 120. In various embodiments, themethod 300 can begin atoperation 302, where theNEMA 118 can identify theaccess policy 144 associated with thenetwork communications service 138. TheNEMA 118 can enforce theaccess policy 144 by instructing one or more network infrastructure devices of the serving network 102 (e.g., the network access point 104) to route instances of messages or communications from the vehicle 120 (e.g., the access probe message 150) to theM2M server 110 so that theM2M platform 108 serves as an intermediary device for access policy enforcement. - From
operation 302, themethod 300 can proceed tooperation 304, where theNEMA 118 may enforce theaccess policy 144 by generating an instance of theAAPM 114 for use by theM2M platform 108. TheAAPM 114 can be associated with thenetwork communication service 138. TheAAPM 114 can be based on theaccess policy 144 from thecore server 134 that supports thenetwork communication service 138. Theaccess policy 144 can indicate or otherwise require that thevehicle 120 be authorized to use thenetwork communication service 138 before one or more applications on the vehicle 120 (e.g., the vehicle OTT application 124) are permitted to use or otherwise maintain ongoing communicative coupling with the servingnetwork 102 and/or thenetwork 130 to access devices on and/or in communication with the network 130 (e.g., the OTT server 131). - From
operation 304, themethod 300 can proceed tooperation 306, where theNEMA 118 can populate theAAPM 114 with one or more authorized identifiers (e.g., the authorizedidentifiers 116A-N) based on which identifiers (e.g., instances of the known TCU identifier 149) are currently present within one or more equipment profiles (e.g., the equipment profile 148) associated with thenetwork communication service 138. For example, any device that is authorized to access and use thenetwork communication service 138 will have a corresponding identifier (e.g., the known TCU identifier 149) stored in an instance of an equipment profile associated with the device (e.g., instances of the equipment profile 148). In turn, thecontrol application 140 can provide, to theNEMA 118, the identifiers associated with devices (e.g., the known TCU identifier 149) that are authorized and permitted to use thenetwork communication service 138. Therefore, if thevehicle 120 sends, to theM2M server 110, a message having an identifier included therein (e.g., theaccess probe message 150 having theTCU identifier 128A), but theAAPM 114 does not have an authorized identifier (e.g., any of the authorizedidentifiers 116A-N) matching or otherwise corresponding with the identifier from thevehicle 120, then messages from thevehicle 120 will not be permitted to pass through, or otherwise be routed via, theM2M platform 108 to a target destination, such as theOTT server 131, thecore server 134, and/or any other device ofnetwork 130 and/or the servingnetwork 102. - From
operation 306, themethod 300 can proceed tooperation 308, where theNEMA 118 can receive an instance of theaccess probe message 150 from theTCU 128 of thevehicle 120. Theaccess probe message 150 can include theprobe URL 152. In some embodiments, theprobe URL 152 can be associated with, or otherwise be directed to, thecore server 134 and/or thenetwork communication service 138. In some embodiments, theaccess probe message 150 can request forwarding to thecore server 134 associated with thenetwork communication service 138. In some embodiments, theaccess probe message 150 can include theTCU identifier 128A associated with theTCU 128 that sent theaccess probe message 150. In some embodiments, theprobe URL 152 may be associated with theOTT server 131 and request access to theOTT server 131, where theOTT server 131 is associated with thevehicle OTT application 124 of thevehicle 120. In some embodiments, theaccess probe message 150 may be routed to theM2M platform 108 so that theM2M platform 108 intercepts theaccess probe message 150 before it can reach a target destination, such as thecore server 134 and/or theOTT server 131. - From
operation 308, themethod 300 can proceed tooperation 310, where theNEMA 118 can prevent theaccess probe message 150 from being forwarded on to a target destination, such as thecore server 134 and/or theOTT server 131. TheNEMA 118 can suspend execution of the request to forward theaccess probe message 150 on to a subsequent device so as to enable confirmation that thevehicle 120 which sent the access probe message 150 (specifically the TCU 128) is authorized and permitted to use thenetwork communication service 138. By preventing theaccess probe message 150 from being forwarded, theNEMA 118 can improve the performance of network devices by reducing the amount of traffic that is routed to thecore server 134 from theM2M platform 108. By this, theNEMA 118 and theM2M platform 108 can provide optimization of limited processing resources and memory resources (e.g., available via one or more instance of the M2M server 110), while also improving the speed with which thevehicle 120 can obtain network access and authorized to use thenetwork communication service 138. - From
operation 310, themethod 300 can proceed tooperation 312, where theNEMA 118 can determine whether the device which sent the message (e.g., theTCU 128 of thevehicle 120 that sent the access probe message 150) is authorized to access and use (i.e., engage in ongoing communicative coupling) thenetwork communication service 138. In some embodiments, to determine whether theTCU 128 is authorized to access and use thenetwork communication service 138, theNEMA 118 may determine whether an identifier is provided in the received message (e.g., theTCU identifier 128A provided in the access probe message 150) that matches, identifies, or otherwise corresponds with at least one authorized identifier of an authorized access policy map (e.g., at least one of the authorizedidentifiers 116A-N of the AAPM 114). If theTCU identifier 128A does not match one of the authorizedidentifiers 116A-N of theAAPM 114, then theTCU 128 is not authorized to access and use thenetwork communication service 138. If, however, theTCU identifier 128A is found or otherwise reflected by at least one of the authorizedidentifiers 116A-N of theAAPM 114, then theTCU 128 of thevehicle 120 is authorized to access thenetwork communication service 138, and thus permitted to contact a target destination via the M2M platform 108 (e.g., engaging in communication with theOTT server 131 using the network communication service 138). - In some embodiments, the
NEMA 118 can determine that theTCU 128 is not authorized to access thenetwork communication service 138, such as based on theTCU 128 having aTCU identifier 128A (which was included in the access probe message 150) that does not correspond with any of the authorizedidentifiers 116A-N of theAAPM 114. In response to determining that theTCU 128 is not authorized to access thenetwork communication service 138, themethod 300 can proceed along the NO path tooperation 314. In response to determining that theTCU 128 is authorized to access thenetwork communication service 138, themethod 300 can proceed along the YES path tooperation 324. For clarity, a discussion of themethod 300 proceeding along the NO path tooperation 314 will be provided first, followed by a discussion proceeding along the YES path tooperation 324. - At
operation 314, theNEMA 118 can generate theaccess redirect command 154 that can include theredirect instruction 156. Theredirect instruction 156 can instruct thehead unit 122 and/or theTCU 128 to bypass theM2M platform 108 so as to enable access to thenetwork communication service 138 by contacting thenetwork service portal 142 directly, that is without attempting to seek authorization for use of thenetwork communication service 138 via theM2M platform 108. Theredirect instruction 156 can include theredirect URL 158 that points to thecore server 134 and/or thenetwork service portal 142 associated with thenetwork communication service 138. In some embodiments, theredirect instruction 156 can instruct a network access point (e.g., any of thenetwork access points 104, 132) to permit a one-time bypass of theM2M platform 108 so that thevehicle 120 can contact thecore server 134 and thenetwork service portal 142 despite not yet being authorized to use thenetwork communication service 138. - From
operation 314, themethod 300 can proceed tooperation 316, where theNEMA 118 can provide theaccess redirect command 154 to theTCU 128 of thevehicle 120. In some embodiments, themethod 300 can proceed fromoperation 316 to one or more operations discussed with respect toFIG. 4 , such asoperation 408 which are discussed below in further detail. In some embodiments, themethod 300 can proceed fromoperation 316 tooperation 328, where themethod 300 can end. - In some other embodiments, from
operation 316, themethod 300 can proceed tooperation 318, where theNEMA 118 can receive theaccess update message 170 from thecore server 134 that supports thenetwork communication service 138. Theaccess update message 170 may be provided by thecore server 134 to theM2M platform 108 in response to one of the equipment profiles being updated with an identifier to indicate a corresponding device is authorized and permitted to use thenetwork communication service 138. For example, theTCU 128 may generate theaccess redirect request 160 based on theredirect instruction 156, where theaccess redirect request 160 can include theTCU identifier 128A of theTCU 128 and theredirect URL 158 that points to thenetwork service portal 142. TheTCU 128 can send theaccess redirect request 160 to thecore server 134 so as to enable thevehicle 120 to gain permission to use thenetwork communication service 138 via thenetwork service portal 142. The user may provide an instance of theinput 127 to thenetwork service portal 142 to instruct thecontrol application 140 of thecore server 134 to allow theTCU 128 to access thenetwork communication service 138. Thecore server 134 can grant theTCU 128 access to thenetwork communication service 138 by referencing theTCU identifier 128A within theequipment profile 148 associated with thevehicle 120, specifically by instantiating and recording an instance of the known TCU identifier 149 (which corresponds with and reflects theTCU identifier 128A) within theequipment profile 148 associated with thevehicle 120. In turn, thecontrol application 140 of thecore server 134 can inform theM2M platform 108 of the TCU's 128 ability to use thenetwork communication service 138 by providing theaccess update message 170 to theNEMA 118, where theaccess update message 170 can include the knownTCU identifier 149. In some embodiments, theaccess update message 170 can indicate that the knownTCU identifier 149 pertains to theAAPM 114 associated with thenetwork communication service 138. - From
operation 318, themethod 300 can proceed tooperation 320, where theNEMA 118 can obtain or otherwise access theAAPM 114 that is associated with thenetwork communication service 138. - From
operation 320, themethod 300 can proceed tooperation 322, where theNEMA 118 can instantiate an instance of an authorized identifier within theAAPM 114 so as to reflect theTCU 128 of thevehicle 120. For example, prior to receiving theaccess update message 170, the authorizedidentifier 116B may not yet exist within theAAPM 114. TheNEMA 118 can create and configure the authorizedidentifier 116B to reflect (and thus correspond with) the knownTCU identifier 149 from theaccess update message 170. As such, the authorizedidentifier 116B will now also correspond with theTCU identifier 128A that identifies theTCU 128. TheNEMA 118 can update theAAPM 114 by instantiating the authorizedidentifier 116B for theTCU 128 in theAAPM 114. In some embodiments, fromoperation 322, themethod 300 can proceed tooperation 328, where themethod 300 can end. - In some other embodiments, the
method 300 can proceed fromoperation 322 tooperation 323, where theNEMA 118 can receive a subsequentaccess probe message 150′. In some embodiments, the subsequentaccess probe message 150′ may be configured substantially similar to theaccess probe message 150, and thus include an instance of theprobe URL 152′ and theTCU identifier 128A. The subsequentaccess probe message 150′ may be received by theNEMA 118 of theM2M platform 108 subsequent to theAAPM 114 being updated by thecore server 134 based on theTCU 128 being granted authorization by thecore server 134 to use thenetwork communication service 138. Fromoperation 323, themethod 300 can proceed to another iteration of theoperation 312, where, in an embodiment, theNEMA 118 can analyze the subsequentaccess probe message 150′ and theAAPM 114 to determine whether theTCU 128 is authorized to access and use thenetwork communication service 138. This time, when theNEMA 118 analyzes theAAPM 114, theNEMA 118 can determine that one of the authorized identifiers (e.g., the authorizedidentifier 116B) corresponds with theTCU identifier 128A of theTCU 128, where theTCU identifier 128A was included in the subsequentaccess probe message 150′. As such, theNEMA 118 can determine that the TCU 128 (and thus also the vehicle 120) is now authorized to access and use thenetwork communication service 138, which allows themethod 300 to proceed along the YES path fromoperation 312 tooperation 324. In some embodiments, themethod 300 may proceed fromoperation 323 back tooperation 312 and then along the YES fromoperation 312 tooperation 326. For clarity, a discussion ofoperation 324 will be provided first, followed by a discussion ofoperation 326. - At
operation 324, theNEMA 118 may seek to obtain anaccess probe response 164 from a target destination with which thevehicle 120 is attempting to communicate. For example, in an embodiment, the subsequentaccess probe message 150′ may include theprobe URL 152′ that is directed towards thecore server 134 so as to confirm that thevehicle OTT application 124 can begin communicating with theOTT server 131 via theM2M platform 108 while using thenetwork communication service 138. Thecontrol application 140 of thecore server 134 may send theaccess probe response 164 to theNEMA 118 to confirm that thevehicle 120 andTCU 128 are permitted to use thenetwork communication service 138 and route messages to theOTT server 131 via theM2M platform 108. In some embodiments, the subsequentaccess probe message 150′ may also, and/or additionally, seek confirmation from theOTT server 131 that thevehicle OTT application 124 is authorized to engage in a content stream (or other communication data stream) with theTCU 128 of thevehicle 120. TheOTT server 131 can indicate approval and authorization via the same, or another, instance of theaccess probe response 164. Fromoperation 324, themethod 300 can proceed tooperation 326. - Whether the
method 300 proceeds tooperation 326 fromoperation operation 326, theM2M platform 108 can enable and permit theTCU 128 to access thenetwork communication service 138 for engaging in ongoing and/or sustained communications to and/or from thevehicle OTT application 124 via theM2M platform 108. TheNEMA 118 may instruct theTCU 128 that theaccess policy 144 associated with thenetwork communication service 138 requires or otherwise mandates that communications to and/or from thevehicle 120 pertaining to thevehicle OTT application 124 must be routed or otherwise directed through theM2M platform 108 in order to maintain authorization and permission to use thenetwork communication service 138. As such, thevehicle OTT application 124 may now be authorized to communicate with theOTT server 131 based on theTCU 128 directing or otherwise routing communications to via theM2M platform 108 so as to maintain use of thenetwork communications service 138. - In some embodiments, if the
TCU 128 has already been granted authorization to use thenetwork communication service 138, and subsequently attempts to bypass theM2M platform 108 in routing communications to theOTT server 131, thecontrol application 140 and/or theNEMA 118 may revoke the permission of theTCU 128 to use thenetwork communication service 138 by removing the authorized identifier associated with the TCU 128 (e.g., the authorizedidentifier 116B) from theAAPM 114. TheNEMA 118 may send thevehicle 120 an instance of the access deniedresponse 153 based on violation of theaccess policy 144 due to an attempt to bypass theM2M platform 108 after access to thenetwork communication service 138 has already (or initially) been granted. - From
operation 326, themethod 300 can proceed tooperation 328, where themethod 300 can end. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - Turning now to
FIG. 4 , themethod 400 for connected vehicle network access optimization is disclosed, according to an illustrative embodiment. In an embodiment, themethod 400 can be performed by theTCU 128 and/or thehead unit 122 executing an instance of a processor. It is understood that, in various embodiments, one or more of the operations may be performed by thehead unit 122, theTCU 128, and/or another computer system or user equipment of thevehicle 120. It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In some embodiments, the
method 400 can begin atoperation 402, where theTCU 128 can receive an instance of theinput 127 from thehead unit 122 of thevehicle 120. In some embodiment, the instance of theinput 127 can be associated with thevehicle OTT application 124, and thus trigger thehead unit 122 to launch thevehicle OTT application 124. Thevehicle OTT application 124 can request theTCU 128 to establish a network connection so that thevehicle OTT application 124 can communicate with theOTT server 131. - From
operation 402, themethod 400 can proceed tooperation 404, where theTCU 128 can identify thevehicle OTT application 124 based on theapplication identifier 126. TheTCU 128 can confirm that thevehicle OTT application 124 is requesting access to theOTT server 131 by engaging in wireless communicative coupling. - From
operation 404, themethod 400 can proceed tooperation 406, where theTCU 128 can generate theaccess probe message 150 that is directed to thecore server 134 to probe for access and authorization to thenetwork communication service 138 so that thevehicle OTT application 124 can communicate with theOTT server 131. In various embodiments, theaccess probe message 150 can be sent to theM2M platform 108, which may perform one or more operations discussed with respect toFIG. 3 . - From
operation 406, themethod 400 can proceed tooperation 408, where theTCU 128 can receive a message from theM2M platform 108, such as theaccess redirect command 154 that includes theredirect instruction 156. - From
operation 408, themethod 400 can proceed tooperation 410, where theTCU 128 can determine whether the message that is received (e.g., the access redirect command 154) authorizes theTCU 128 to access thenetwork communication service 138. In some embodiments, theTCU 128 can determine that the message (e.g., the access redirect command 154) includes theredirect instruction 156 but does not yet indicate that access to thenetwork communication service 138 has been authorized. If access to thenetwork communication service 138 has not been authorized, themethod 400 can proceed along the NO path tooperation 412. If access to thenetwork communication service 138 is indicated as being authorized, then themethod 400 can proceed along the YES path tooperation 422. For clarity, as discussion of the operations proceeding from the NO path tooperation 412 will be discussed first, followed by a discussion of theoperation 422 that proceeds from the YES path. - From
operation 410, themethod 400 can proceed along the NO path tooperation 412, where theTCU 128 can invoke theredirect instruction 156 from theaccess redirect command 154 so as to bypass theM2M platform 108. - From
operation 412, themethod 400 can proceed tooperation 414, where theTCU 128 can generate theaccess redirect request 160 based on theredirect instruction 156. Theaccess redirect request 160 can include theredirect URL 158 and theTCU identifier 128A associated with theTCU 128. Theaccess redirect request 160 can be directed to thecore server 134 associated with thenetwork communication service 138. Theredirect URL 158 can point or otherwise direct theaccess redirect request 160 to thenetwork service portal 142 so as to request access and authorization to use thenetwork communication service 138. - From
operation 414, themethod 400 can proceed tooperation 416, where theTCU 128 can provide theaccess redirect request 160 to thecore server 134 associated with thenetwork communication service 138. Theaccess redirect request 160 can request access and authorization of thenetwork communication service 138 via thenetwork service portal 142. - From
operation 416, themethod 400 can proceed tooperation 418, where theTCU 128 can obtain access to thenetwork communication service 138 via thenetwork service portal 142. Thecontrol application 140 can update theequipment profile 148 by using theTCU identifier 128A to record, in theequipment profile 148, the knownTCU identifier 149 associated with theTCU 128. TheTCU 128 can receive the network serviceportal response 162 indicating that access to thenetwork communication service 138 has been granted and that communicative coupling can proceed via theM2M platform 108. - From
operation 418, themethod 400 can proceed tooperation 420, where theTCU 128 can generate the subsequentaccess probe message 150′. In some embodiments, theaccess probe message 150 may be referred to as a “first” access probe message and the subsequentaccess probe message 150′ may be referred to as a “second” access probe message. Use of the terms “first” and “second” are provided for clarification purposes only, and therefore should not be construed as requiring a preference, importance, hierarchy, sequence, or the like. In some embodiments, themethod 400 can proceed fromoperation 420 tooperation 424, where themethod 400 can end. - In some other embodiments, from
operation 420, themethod 400 can proceed to another iteration of theoperation 410. For example, in an embodiment, when theoperation 410 is preceded byoperation 420, theTCU 128 can determine whether access to thenetwork communication service 138 has been authorized by analyzing the network serviceportal response 162. If the access to thenetwork communication service 138 is granted, theTCU 128 may proceed along the YES path tooperation 422. Atoperation 422, theTCU 128 can initiate contact with theOTT server 131 via theM2M platform 108 by sending the subsequentaccess probe message 150′ to theM2M platform 108. TheTCU 128 can receive theaccess probe response 164 that confirms thatM2M platform 108 authorizes theTCU 128 to use the network communication service 139 and contact theOTT server 131 via theM2M platform 108. TheTCU 128 can then permit thevehicle OTT application 124 to send a request (not shown) to theOTT server 131 by way of theM2M platform 108 so as to maintain execution of thevehicle OTT application 124 on thehead unit 122. Fromoperation 422, themethod 400 can proceed tooperation 424, where themethod 400 can end. - Turning now to
FIG. 5 , a discussion of anetwork 500 is illustrated, according to an illustrative embodiment. The servingnetwork 102 and/or thenetwork 130 shown inFIG. 1 can be configured substantially similar to include at least some of the elements of thenetwork 500. Thenetwork 500 can include acellular network 502, apacket data network 504, for example, the Internet, and a circuit switchednetwork 506, for example, a publicly switched telephone network (“PSTN”). Thecellular network 502 includes various components such as, but not limited to, base transceiver stations (“BTSs”), node-B's (“NBs”), e-Node-B's (“eNBs”), g-Node-B's (“gNBs”), base station controllers (“BSCs”), radio network controllers (“RNCs”), mobile switching centers (“MSCs”), mobile management entities (“MMEs”), short message service centers (“SMSCs”), multimedia messaging service centers (“MMSCs”), home location registers (“HLRs”), home subscriber servers (“HSSs”), visitor location registers (“VLRs”), charging platforms, billing platforms, voicemail platforms, GPRS core network components, location service nodes, an IP Multimedia Subsystem (“IMS”), 5G core components, 5G NR components, functions, applications, and the like. Thecellular network 502 also includes radios and nodes for receiving and transmitting voice, data, and combinations thereof to and from radio transceivers, networks, thepacket data network 504, and the circuit switchednetwork 506. - A
mobile communications device 508, such as, for example, a cellular telephone, a user equipment, a mobile terminal, a PDA, a laptop computer, a handheld computer, and combinations thereof, can be operatively connected to thecellular network 502. Thecellular network 502 can be configured as a 2G GSM network and can provide data communications via GPRS and/or EDGE. Additionally, or alternatively, thecellular network 502 can be configured as a 3G UMTS network and can provide data communications via the HSPA protocol family, for example, HSDPA, EUL (also referred to as HSDPA), and HSPA+. Thecellular network 502 also can be compatible with mobile communications standards such as but not limited to 4G, LTE, LTE Advanced, and/or 5G NR, as well as evolved and future mobile standards. - The
packet data network 504 includes various devices, for example, servers, computers, databases, and other devices in communication with one another, as is generally understood. Thenetwork 130 may be configured as an instance of thepacket data network 504 so as to support thenetwork communication service 138. Thepacket data network 504 devices are accessible via one or more network links. The servers often store various files that are provided to a requesting device such as, for example, a computer, a terminal, a smartphone, or the like. Typically, the requesting device includes software (a “browser”) for executing a web page in a format readable by the browser or other software. Other files and/or data may be accessible via “links” and/or “pointers” in the retrieved files, as is generally understood. In some embodiments, thepacket data network 504 includes or is in communication with the Internet. The circuit switchednetwork 506 includes various hardware and software for providing circuit switched communications. The circuit switchednetwork 506 may include, or may be, what is often referred to as a plain old telephone system (POTS). The functionality of a circuit switchednetwork 506 or other circuit-switched network are generally known and will not be described herein in detail. - The illustrated
cellular network 502 is shown in communication with thepacket data network 504 and a circuit switchednetwork 506, though it should be appreciated that this is not necessarily the case. One or more Internet-capable devices 510, for example, a PC, a laptop, a portable device, theTCU 128 of thevehicle 120, or another suitable device, can communicate with one or morecellular networks 502, and devices connected thereto, through thepacket data network 504. It also should be appreciated that the Internet-capable device 510 can communicate with thepacket data network 504 through the circuit switchednetwork 506, thecellular network 502, and/or via other networks (not illustrated). - As illustrated, a
communications device 512, for example, a telephone, facsimile machine, modem, computer, or the like, can be in communication with the circuit switchednetwork 506, and therethrough to thepacket data network 504 and/or thecellular network 502. It should be appreciated that thecommunications device 512 can be an Internet-capable device, and can be substantially similar to the Internet-capable device 510. In some embodiments, themobile communications device 508, the Internet-capable device 510, and/or thecommunication device 512 can correspond with one or more computer systems discussed with respect toFIG. 1 , such as but not limited to theTCU 128 of thevehicle 120, theM2M server 110 of theM2M platform 108, theOTT server 131, and/or thecore server 134. In the specification, the servingnetwork 102, thenetwork 130, /or thenetwork 500 can refer broadly to, in some embodiments, any combination of thenetworks network 102, thenetwork 130, and/or thenetwork 500 can, in some embodiments, be performed by thecellular network 502, thepacket data network 504, and/or the circuit switchednetwork 506, alone or in combination with other networks, network elements, and the like. -
FIG. 6 is a block diagram illustrating acomputer system 600 can be configured to provide the functionality described herein related to connected vehicle network access optimization, in accordance with various embodiments of the concepts and technologies disclosed herein. In some embodiments, at least a portion of one or more of theM2M server 110, thenetwork access point 104, thenetwork access point 132, theOTT server 131, and/or thecore server 134 illustrated and described herein can be configured as and/or can have an architecture similar or identical to thecomputer system 600. In some embodiments, thehead unit 122 and/or theTCU 128 of thevehicle 120, and/or at least a portion of thevehicle 201 can be configured as and/or have an architecture that is similar or identical to thecomputer system 600. Thecomputer system 600 includes aprocessing unit 602, amemory 604, one or more user interface devices 606, one or more input/output (“I/O”)devices 608, and one ormore network devices 610, each of which is operatively connected to a system bus 612. The system bus 612 enables bi-directional communication between theprocessing unit 602, thememory 604, the user interface devices 606, the I/O devices 608, and thenetwork devices 610. In some embodiments, the processor 111 and/or theprocessor 135 can be configured substantially similar to theprocessing unit 602. In various embodiments, one or more instances of theprocessing unit 602 can be implemented within one or more devices and/or components of the operatingenvironment 100, such as but not limited to one or more of thehead unit 122, theTCU 128, thenetwork access point 104, the servingnetwork 102, theM2M platform 108, theM2M server 110, thenetwork 130, theOTT server 131, thenetwork access point 132, and/or thecore server 134. In some embodiments, thevehicle processor 203 can be configured substantially similar to an instance of theprocessing unit 602. In some embodiments, thememory 112, thememory 136, and/or thevehicle memory 204 can be configured substantially similar to thememory 604. As such, one or more instances of thememory 604 can be implemented within one or more devices and/or components of the operatingenvironment 100, such as but not limited to one or more of thehead unit 122, theTCU 128, thenetwork access point 104, the servingnetwork 102, theM2M platform 108, theM2M server 110, thenetwork 130, theOTT server 131, thenetwork access point 132, and/or thecore server 134. - The
processing unit 602 may be a standard central processor that performs arithmetic and logical operations, a more specific purpose programmable logic controller (“PLC”), a programmable gate array, or other type of processor known to those skilled in the art and suitable for controlling the operation of the server computer. As used herein, the word “processor” and/or the phrase “processing unit” when used with regard to any architecture or system can include multiple processors or processing units distributed across and/or operating in parallel in a single machine or in multiple machines. Furthermore, processors and/or processing units can be used to support virtual processing environments. Processors and processing units also can include state machines, application-specific integrated circuits (“ASICs”), combinations thereof, or the like. Because processors and/or processing units are generally known to one of ordinary skill, the processors and processing units disclosed and discussed herein will not be described in further detail herein. - The
memory 604 communicates with theprocessing unit 602 via the system bus 612. In some embodiments, thememory 604 is operatively connected to a memory controller (not shown) that enables communication with theprocessing unit 602 via the system bus 612. Thememory 604 includes anoperating system 614 and one ormore program modules 616. Theoperating system 614 can include, but is not limited to, members of the WINDOWS, WINDOWS CE, and/or WINDOWS MOBILE families of operating systems from MICROSOFT CORPORATION, the LINUX family of operating systems, the SYMBIAN family of operating systems from SYMBIAN LIMITED, the BREW family of operating systems from QUALCOMM CORPORATION, the MAC OS, iOS, and/or LEOPARD families of operating systems from APPLE CORPORATION, the FREEBSD family of operating systems, the SOLARIS family of operating systems from ORACLE CORPORATION, other operating systems, and the like. - The
program modules 616 may include various software, program modules, or other computer readable and/or executable instructions that configure hardware resources of thecomputer system 600, such as but not limited to theprocessing unit 602 described herein. Use of the term “module” refers to a defined set of computer readable instructions that transform a processor and/or other computing hardware upon execution by a processing unit, such as theprocessing unit 602. In some embodiments, for example, theprogram modules 616 can include theNEMA 118, thecontrol application 140, and/or other computer-readable instructions. These and/or other programs can be embodied in computer-readable media containing instructions that, when executed by theprocessing unit 602, perform one or more of the operations and functions discussed with respect toFIG. 1 and/or themethods 300 and/or 400 described in detail above with respect toFIGS. 3 and 4 . According to some embodiments, theprogram modules 616 may be embodied in hardware, software, firmware, or any combination thereof. It should be understood that thememory 604 also can be configured to store one or more instance of information and data discussed with respect toFIGS. 1, 2, 3 , and/or 4, such as but not limited to theAAPM 114, the authorizedidentifiers 116A-N, thenetwork communication service 138, thenetwork service portal 142, theaccess policy 144, one or more instance of theequipment profile 148, one or more instance of the knownTCU identifier 149, theaccess probe message 150, the access deniedresponse 153, theaccess redirect command 154, the network serviceportal response 162, theaccess probe response 164, thePCF 145, theAMF 146, or any other communication, message, data instance, instruction, and/or other data, if desired. - By way of example, and not limitation, computer-readable media may include any available computer storage media or communication media that can be accessed by the
computer system 600. Communication media includes computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics changed or set in a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer-readable media. - Computer storage media includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data. Computer storage media includes, but is not limited to, RAM, ROM, Erasable Programmable ROM (“EPROM”), Electrically Erasable Programmable ROM (“EEPROM”), flash memory or other solid state memory technology, CD-ROM, digital versatile disks (“DVD”), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the
computer system 600. In the claims, the phrases “memory”, “computer storage medium” and variations thereof does not include waves or signals per se and/or communication media. - The user interface devices 606 may include one or more devices with which a user accesses the
computer system 600. The user interface devices 606 may include, but are not limited to, computers, servers, personal digital assistants, cellular phones, or any suitable computing devices that can communicate with thecomputer system 600. The I/O devices 608 enable a user to interface with theprogram modules 616. In one embodiment, the I/O devices 608 are operatively connected to an I/O controller (not shown) that enables communication with theprocessing unit 602 via the system bus 612. The I/O devices 608 may include one or more input devices, such as, but not limited to, a keyboard, a mouse, or an electronic stylus. Further, the I/O devices 608 may include one or more output devices, such as, but not limited to, a display screen or a printer. - The
network devices 610 enable thecomputer system 600 to communicate with other networks or remote systems via anetwork 618, which may be configured substantially similar to one or more of the servingnetwork 102, thenetwork 130, and/or thenetwork 500. Examples of thenetwork devices 610 include, but are not limited to, a modem, a radio frequency (“RF”) or infrared (“IR”) transceiver, a telephonic interface, a bridge, a router, or a network card. Thenetwork 618 may include a wireless network such as, but not limited to, a Wireless Local Area Network (“WLAN”) such as a WI-FI network, a Wireless Wide Area Network (“WWAN”), a Wireless Personal Area Network (“WPAN”) such as BLUETOOTH, a Wireless Metropolitan Area Network (“WMAN”) such a WiMAX network, or a cellular network. Alternatively, the network 180 may be a wired network such as, but not limited to, a Wide Area Network (“WAN”) such as the Internet, a Local Area Network (“LAN”) such as the Ethernet, a wired Personal Area Network (“PAN”), or a wired Metropolitan Area Network (“MAN”). It should be understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - Turning now to
FIG. 7 , anillustrative user equipment 700 and components thereof will be described. In some embodiments, thehead unit 122, theTCU 128, and/or other devices illustrated and described herein can be configured as and/or can have an architecture similar or identical to theuser equipment 700 described herein inFIG. 7 . In some embodiments, an instance of theuser equipment 700 can be associated with a user of thevehicle 120. It should be understood, however, that the various devices illustrated and described herein may or may not include the functionality described herein with reference toFIG. 7 . While connections are not shown between the various components illustrated inFIG. 7 , it should be understood that some, none, or all of the components illustrated inFIG. 7 can be configured to interact with one other to carry out various device functions. In some embodiments, the components are arranged so as to communicate via one or more busses (not shown). Thus, it should be understood thatFIG. 7 and the following description are intended to provide a general understanding of a suitable environment in which various aspects of embodiments can be implemented, and should not be construed as being limiting in any way. - As illustrated in
FIG. 7 , theuser equipment 700 can include adisplay 702 for presenting data and information. According to various embodiments, thedisplay 702 can be configured to present various graphical user interface (“GUI”) elements for presenting and/or modifying information associated with audiovisual content, an media content data stream, presenting text, images, video, virtual keypads and/or keyboards, messaging data, notification messages, metadata, internet content, device status, time, date, calendar data, device preferences, map and location data, combinations thereof, and/or the like. Theuser equipment 700 also can include aprocessor 704 and a memory or other data storage device (“memory”) 706. Theprocessor 704 can be configured to process data and/or can execute computer-executable instructions stored in thememory 706. The computer-executable instructions executed by theprocessor 704 can include, for example, anoperating system 708, one ormore applications 710 such as avehicle OTT application 124 and/or a display application (not shown) that can present communications, data, and/or other computer-executable instructions stored in amemory 706, and/or received by theuser equipment 700. In some embodiments, theapplications 710 also can include a user interface application (not illustrated inFIG. 7 ). - The UI application can interface with the
operating system 708 to facilitate any of the operations discussed herein and functionality for presenting audiovisual content and/or data stored at theuser equipment 700 and/or stored elsewhere. It is understood that one or more instances of theoperating system 708 may be included and operate within one or more systems discussed with respect to the operatingenvironment 100, such as but not limited to thevehicle 120, thehead unit 122, and/or theTCU 128. In some embodiments, theoperating system 708 can include a member of the SYMBIAN OS family of operating systems from SYMBIAN LIMITED, a member of the WINDOWS MOBILE OS and/or WINDOWS PHONE OS families of operating systems from MICROSOFT CORPORATION, a member of the PALM WEBOS family of operating systems from HEWLETT PACKARD CORPORATION, a member of the BLACKBERRY OS family of operating systems from RESEARCH IN MOTION LIMITED, a member of the IOS family of operating systems from APPLE INC., a member of the ANDROID OS family of operating systems from GOOGLE INC., and/or other operating systems. These operating systems are merely illustrative of some contemplated operating systems that may be used in accordance with various embodiments of the concepts and technologies described herein and therefore should not be construed as being limiting in any way. - The
vehicle OTT application 124 can be executed by theprocessor 704 to aid a user in presenting content, obtaining network access to use thenetwork communication service 138, providing feedback, presenting an identifier (e.g., theTCU identifier 128A), configuring settings, manipulating address book content and/or settings, multimode interaction, interacting withother applications 710, and otherwise facilitating user interaction with theoperating system 708, theapplications 710, and/or other types or instances ofdata 712 that can be stored at theuser equipment 700, such as stored by thememory 706. According to various embodiments, thedata 712 can include, for example, instances of theapplication identifier 126, theTCU identifier 128A, theaccess probe message 150, theprobe URL 152, theaccess redirect command 154, theredirect instruction 156, theredirect URL 158, theaccess redirect request 160, the network serviceportal response 162, thecontent stream 166, the access deniedresponse 153, theinput 127, any other elements discussed with respect toFIG. 1 andFIG. 2 , presence applications, visual voice mail applications, messaging applications, text-to-speech and speech-to-text applications, add-ons, plug-ins, email applications, music and/or streaming applications, video applications, camera applications, location-based service applications, power conservation applications, game applications, productivity applications, entertainment applications, enterprise applications, combinations thereof, and the like. Theapplications 710, thedata 712, and/or portions thereof can be stored in thememory 706 and/or in afirmware 714, and can be executed by theprocessor 704. Thefirmware 714 also can store code for execution during device power up and power down operations. It can be appreciated that thefirmware 714 can be stored in a volatile or non-volatile data storage device including, but not limited to, thememory 706 and/or a portion thereof. - The
user equipment 700 also can include an input/output (“I/O”)interface 716. One or more instances of the I/O interface 716 can be included any computer system and/or device discussed inFIG. 1 (e.g., thehead unit 122, theTCU 128, theM2M server 110, theOTT server 131, thecore server 134, etc.). The I/O interface 716 can be configured to support the input/output of data such as a communication and/or message sent to and/or from the vehicle 120 (and/or any data that can be sent within the vehicle 120), and/or any other information or elements discussed with respect toFIGS. 1, 2, 3, and 4 , user information, organization information, presence status information, user IDs, passwords, and application initiation (start-up) requests. In some embodiments, the I/O interface 716 can include a hardwire connection such as a universal serial bus (“USB”) port, a mini-USB port, a micro-USB port, an audio jack, a PS2 port, an IEEE 1394 (“FIREWIRE”) port, a serial port, a parallel port, an Ethernet (RJ45) port, an RJ11 port, a proprietary port, combinations thereof, or the like. In some embodiments, theuser equipment 700 can be configured to synchronize with another device to transfer content to and/or from theuser equipment 700. In some embodiments, theuser equipment 700 can be configured to receive updates to one or more of theapplications 710 via the I/O interface 716, though this is not necessarily the case. In some embodiments, the I/O interface 716 accepts I/O devices such as keyboards, keypads, mice, interface tethers, printers, plotters, external storage, touch/multi-touch screens, touch pads, trackballs, joysticks, microphones, remote control devices, displays, projectors, medical equipment (e.g., stethoscopes, heart monitors, and other health metric monitors), modems, routers, external power sources, docking stations, combinations thereof, and the like. It should be appreciated that the I/O interface 716 may be used for communications between theuser equipment 700 and a network device or local device. - The
user equipment 700 also can include acommunications component 718. Thecommunications component 718 can be configured to interface with theprocessor 704 to facilitate wired and/or wireless communications with one or more networks such as the network 180 and/or the RAN 182 described herein. In some embodiments, other networks include networks that utilize non-cellular wireless technologies such as WI-FI or WIMAX. In some embodiments, thecommunications component 718 includes a multimode communications subsystem for facilitating communications via the cellular network and one or more other networks. Thecommunications component 718, in some embodiments, includes one or more transceivers. The one or more transceivers, if included, can be configured to communicate over the same and/or different wireless technology standards with respect to one another. For example, in some embodiments one or more of the transceivers of thecommunications component 718 may be configured to communicate using GSM, CDMAONE, CDMA2000, LTE, and various other 2G, 3G, 4G, 5G, LTE, LTE Advanced, and greater generation technology standards. Moreover, thecommunications component 718 may facilitate communications over various channel access methods (which may or may not be used by the aforementioned standards) including, but not limited to, TDMA, FDMA, W-CDMA, OFDMA, SDMA, and the like. - In addition, the
communications component 718 may facilitate data communications using GPRS, EDGE, the HSPA protocol family including HSDPA, EUL or otherwise termed HSDPA, HSPA+, and various other current and future wireless data access standards. In the illustrated embodiment, thecommunications component 718 can include a first transceiver (“TxRx”) 720A that can operate in a first communications mode (e.g., GSM). Thecommunications component 718 also can include an Nth transceiver (“TxRx”) 720N that can operate in a second communications mode relative to thefirst transceiver 720A (e.g., UMTS). While twotransceivers 720A-N (hereinafter collectively and/or generically referred to as “transceivers 720”) are shown inFIG. 7 , it should be appreciated that less than two, two, and/or more than two transceivers 720 can be included in thecommunications component 718. - The
communications component 718 also can include an alternative transceiver (“Alt TxRx”) 722 for supporting other types and/or standards of communications. According to various contemplated embodiments, thealternative transceiver 722 can communicate using various communications technologies such as, for example, WI-FI, WIMAX, BLUETOOTH, infrared, infrared data association (“IRDA”), near field communications (“NFC”), other RF technologies, combinations thereof, and the like. In some embodiments, thecommunications component 718 also can facilitate reception from terrestrial radio networks, digital satellite radio networks, internet-based radio service networks, combinations thereof, and the like. Thecommunications component 718 can process data from a network such as the Internet, an intranet, a broadband network, a WI-FI hotspot, an Internet service provider (“ISP”), a digital subscriber line (“DSL”) provider, a broadband provider, combinations thereof, or the like. In some embodiments, thecommunications component 718 can support one or more communication modes discussed with respect toFIG. 2 , such as thenetwork transmission mode 221 over a Uu interface and/or thedirect transmission mode 219 over a PC5 interface. - The
user equipment 700 also can include one ormore sensors 724. Thesensors 724 can include temperature sensors, light sensors, air quality sensors, movement sensors, orientation sensors, noise sensors, proximity sensors, or the like. As such, it should be understood that thesensors 724 can include, but are not limited to, accelerometers, magnetometers, gyroscopes, infrared sensors, noise sensors, microphones, combinations thereof, or the like. Additionally, audio capabilities for theuser equipment 700 may be provided by an audio I/O component 726. The audio I/O component 726 of theuser equipment 700 can include one or more speakers for the output of audio signals, one or more microphones for the collection and/or input of audio signals, and/or other audio input and/or output devices. In some embodiments, the audio I/O component 726 maybe included as a component of thedisplay 702. For example, in some embodiments, thedisplay 702 can provide and present visual images and/or audio input and/or audio output. In some embodiments, the I/O interface 716 can include direct communicative coupling with thedisplay 702 and/or the audio I/O component 726 so as to provide transfer and input and/or output of visual images (e.g., from the display 702) and/or audio clips (e.g., from the audio I/O component 726) to and/or from theuser equipment 700. - The illustrated
user equipment 700 also can include a subscriber identity module (“SIM”)system 728. TheSIM system 728 can include a universal SIM (“USIM”), a universal integrated circuit card (“UICC”) and/or other identity devices. TheSIM system 728 can include and/or can be connected to or inserted into an interface such as aslot interface 730. In some embodiments, theslot interface 730 can be configured to accept insertion of other identity cards or modules for accessing various types of networks. Additionally, or alternatively, theslot interface 730 can be configured to accept multiple subscriber identity cards. Because other devices and/or modules for identifying users and/or theuser equipment 700 are contemplated, it should be understood that these embodiments are illustrative, and should not be construed as being limiting in any way. - The
user equipment 700 also can include an image capture and processing system 732 (“image system”). Theimage system 732 can be configured to capture or otherwise obtain photos, videos, and/or other visual information. As such, theimage system 732 can include cameras, lenses, charge-coupled devices (“CCDs”), combinations thereof, or the like. Theuser equipment 700 may also include avideo system 734. Thevideo system 734 can be configured to capture, process, record, modify, and/or store video content. Photos and videos obtained using theimage system 732 and thevideo system 734, respectively, may be added as message content to an MMS message, email message, and sent to another user equipment. The video and/or photo content also can be shared with other devices via various types of data transfers via wired and/or wireless user equipment as described herein. - The
user equipment 700 also can include one ormore location components 736. Thelocation components 736 can be configured to send and/or receive signals to determine a geographic location of theuser equipment 700. According to various embodiments, thelocation components 736 can send and/or receive signals from global positioning system (“GPS”) devices, assisted-GPS (“A-GPS”) devices, WI-FI/WIMAX and/or cellular network triangulation data, combinations thereof, and the like. Thelocation component 736 also can be configured to communicate with thecommunications component 718 to retrieve triangulation data for determining a location of theuser equipment 700. In some embodiments, thelocation component 736 can interface with cellular network nodes, telephone lines, satellites, location transmitters and/or beacons, wireless network transmitters and receivers, combinations thereof, and the like. In some embodiments, thelocation component 736 can include and/or can communicate with one or more of thesensors 724 such as a compass, an accelerometer, and/or a gyroscope to determine the orientation of theuser equipment 700. Using thelocation component 736, theuser equipment 700 can generate and/or receive data to identify its geographic location, or to transmit data used by other devices to determine the location of theuser equipment 700. Thelocation component 736 may include multiple components for determining the location and/or orientation of theuser equipment 700. - The illustrated
user equipment 700 also can include apower source 738. Thepower source 738 can include one or more batteries, power supplies, power cells, and/or other power subsystems including alternating current (“AC”) and/or direct current (“DC”) power devices. Thepower source 738 also can interface with an external power system or charging equipment via a power I/O component 740. Because theuser equipment 700 can include additional and/or alternative components, the above embodiment should be understood as being illustrative of one possible operating environment for various embodiments of the concepts and technologies described herein. The described embodiment of theuser equipment 700 is illustrative, and therefore should not be construed as being limiting in any way. - Based on the foregoing, it should be appreciated that concepts and technologies directed to connected vehicle network access optimization have been disclosed herein. Although the subject matter presented herein has been described in language specific to computer structural features, methodological and transformative acts, specific computing machinery, and computer-readable mediums, it is to be understood that the concepts and technologies disclosed herein are not necessarily limited to the specific features, acts, or mediums described herein. Rather, the specific features, acts and mediums are disclosed as example forms of implementing the concepts and technologies disclosed herein.
- The subject matter described above is provided by way of illustration only and should not be construed as limiting. Various modifications and changes may be made to the subject matter described herein without following the example embodiments and applications illustrated and described, and without departing from the true spirit and scope of the embodiments of the concepts and technologies disclosed herein.
Claims (20)
1. A telematics control unit comprising:
a processor; and
a memory storing computer-executable instructions that, in response to execution by the processor, cause the processor to perform operations comprising:
generating an access probe message directed to a core server associated with a network communication service that supports operation of a vehicle over-the-top application executing on a head unit of a vehicle, wherein the access probe message requests access to the network communication service,
sending the access probe message,
receiving, in response to the access probe message, an access redirect command from a machine-to-machine platform that controls access to the network communication service, wherein the access redirect command provides the head unit of the vehicle with a one-time bypass of the machine-to-machine platform so as to enable the vehicle to bypass the machine-to-machine platform and access the core server associated with the network communication service directly via a network service portal to become authorized to access the network communication service, and
generating, in response to the access redirect command, an access redirect request directed to the core server associated with the network communication service, wherein the access redirect request requests authorization to use the network communication service.
2. The telematics control unit of claim 1 , wherein the access probe message comprises a probe uniform resource locator that is associated with the network communication service.
3. The telematics control unit of claim 1 , wherein the access redirect command comprises a redirect uniform resource locator that points to the network service portal.
4. The telematics control unit of claim 3 , wherein the access redirect request comprises the redirect uniform resource locator from the access redirect command.
5. The telematics control unit of claim 1 , wherein receiving the access redirect command from the machine-to-machine platform is in response to the machine-to-machine platform determining that the telematics control unit is not authorized to access the network communication service.
6. The telematics control unit of claim 5 , wherein determining that the telematics control unit is not authorized to access the network communication service is based on the telematics control unit having a telematics control unit identifier that does not correspond with an authorized identifier of an authorized access policy map.
7. The telematics control unit of claim 1 , wherein the operations further comprise providing the access redirect request to the core server, wherein the access redirect request is not intercepted by the machine-to-machine platform.
8. A method comprising:
generating, by a telematics control unit, an access probe message directed to a core server associated with a network communication service that supports operation of a vehicle over-the-top application executing on a head unit of a vehicle, wherein the access probe message requests access to the network communication service;
sending, by the telematics control unit, the access probe message;
receiving, by the telematics control unit in response to the access probe message, an access redirect command from a machine-to-machine platform that controls access to the network communication service, wherein the access redirect command provides the head unit of the vehicle with a one-time bypass of the machine-to-machine platform so as to enable the vehicle to bypass the machine-to-machine platform and access the core server associated with the network communication service directly via a network service portal to become authorized to access the network communication service; and
generating, by the telematics control unit, in response to the access redirect command, an access redirect request directed to the core server associated with the network communication service, wherein the access redirect request requests authorization to use the network communication service.
9. The method of claim 8 , wherein the access probe message comprises a probe uniform resource locator that is associated with the network communication service.
10. The method of claim 8 , wherein the access redirect command comprises a redirect uniform resource locator that points to the network service portal.
11. The method of claim 10 , wherein the access redirect request comprises the redirect uniform resource locator from the access redirect command.
12. The method of claim 8 , wherein receiving the access redirect command from the machine-to-machine platform is in response to the machine-to-machine platform determining that the telematics control unit is not authorized to access the network communication service.
13. The method of claim 12 , wherein determining that the telematics control unit is not authorized to access the network communication service is based on the telematics control unit having a telematics control unit identifier that does not correspond with an authorized identifier of an authorized access policy map.
14. The method of claim 8 , wherein the method further comprises providing the access redirect request to the core server, wherein the access redirect request is not intercepted by the machine-to-machine platform.
15. A computer storage medium having computer-executable instructions stored thereon that, in response to execution by a processor of a telematics control unit, causes the processor to perform operations comprising:
generating an access probe message directed to a core server associated with a network communication service that supports operation of a vehicle over-the-top application executing on a head unit of a vehicle, wherein the access probe message requests access to the network communication service;
sending the access probe message;
receiving, in response to the access probe message, an access redirect command from a machine-to-machine platform that controls access to the network communication service, wherein the access redirect command provides the head unit of the vehicle with a one-time bypass of the machine-to-machine platform so as to enable the vehicle to bypass the machine-to-machine platform and access the core server associated with the network communication service directly via a network service portal to become authorized to access the network communication service; and
generating, in response to the access redirect command, an access redirect request directed to the core server associated with the network communication service, wherein the access redirect request requests authorization to use the network communication service.
16. The computer storage medium of claim 15 , wherein the access probe message comprises a probe uniform resource locator that is associated with the network communication service.
17. The computer storage medium of claim 15 , wherein the access redirect command comprises a redirect uniform resource locator that points to the network service portal.
18. The computer storage medium of claim 17 , wherein the access redirect request comprises the redirect uniform resource locator from the access redirect command.
19. The computer storage medium of claim 15 , wherein receiving the access redirect command from the machine-to-machine platform is in response to the machine-to-machine platform determining that the telematics control unit is not authorized to access the network communication service, and wherein determining that the telematics control unit is not authorized to access the network communication service is based on the telematics control unit having a telematics control unit identifier that does not correspond with an authorized identifier of an authorized access policy map.
20. The computer storage medium of claim 15 , wherein the operations further comprise providing the access redirect request to the core server, wherein the access redirect request is not intercepted by the machine-to-machine platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/536,996 US20220086611A1 (en) | 2019-02-22 | 2021-11-29 | Connected Vehicle Network Access Optimization Using an Intermediary Platform |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/283,316 US11190916B2 (en) | 2019-02-22 | 2019-02-22 | Connected vehicle network access optimization using an intermediary platform |
US17/536,996 US20220086611A1 (en) | 2019-02-22 | 2021-11-29 | Connected Vehicle Network Access Optimization Using an Intermediary Platform |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/283,316 Continuation US11190916B2 (en) | 2019-02-22 | 2019-02-22 | Connected vehicle network access optimization using an intermediary platform |
Publications (1)
Publication Number | Publication Date |
---|---|
US20220086611A1 true US20220086611A1 (en) | 2022-03-17 |
Family
ID=72142848
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/283,316 Active 2040-01-25 US11190916B2 (en) | 2019-02-22 | 2019-02-22 | Connected vehicle network access optimization using an intermediary platform |
US17/536,996 Abandoned US20220086611A1 (en) | 2019-02-22 | 2021-11-29 | Connected Vehicle Network Access Optimization Using an Intermediary Platform |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/283,316 Active 2040-01-25 US11190916B2 (en) | 2019-02-22 | 2019-02-22 | Connected vehicle network access optimization using an intermediary platform |
Country Status (1)
Country | Link |
---|---|
US (2) | US11190916B2 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11190916B2 (en) * | 2019-02-22 | 2021-11-30 | At&T Mobility Ii Llc | Connected vehicle network access optimization using an intermediary platform |
WO2020175604A1 (en) * | 2019-02-27 | 2020-09-03 | パナソニックIpマネジメント株式会社 | Wireless communication terminal device, and wireless communication method therefor |
US11019052B2 (en) * | 2019-03-25 | 2021-05-25 | Uber Technologies, Inc. | Vehicle integration platform (VIP) security integration |
KR102241296B1 (en) * | 2019-08-26 | 2021-04-16 | 엘지전자 주식회사 | Method and apparatus for data sharing using mec server in autonomous driving system |
US11388598B2 (en) * | 2019-12-19 | 2022-07-12 | Intel Corporation | Recover from vehicle security breach via vehicle to anything communication |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110307119A1 (en) * | 2009-10-28 | 2011-12-15 | Intelligent Mechatronic Systems Inc. | Web portal system for managing vehicle usage and mobility |
US20140334447A1 (en) * | 2011-12-23 | 2014-11-13 | Samsung Electronics Co. Ltd. | Apparatus and method for performing handover in radio local access network communication system |
US20150298705A1 (en) * | 2014-04-22 | 2015-10-22 | Hitachi, Ltd. | Program product, portable device, vehicle driving characteristic diagnosis system, and vehicle acceleration calculation method |
US20160101785A1 (en) * | 2014-10-09 | 2016-04-14 | Hitachi, Ltd. | Driving characteristics diagnosis device, driving characteristics diagnosis system, driving characteristics diagnosis method, information output device, and information output method |
US20160309527A1 (en) * | 2015-04-14 | 2016-10-20 | General Motors Llc | Vehicle connectivity using a desired access point name |
US20170105171A1 (en) * | 2015-10-07 | 2017-04-13 | Mcafee, Inc. | Multilayer access control for connected devices |
US20180218034A1 (en) * | 2017-01-31 | 2018-08-02 | Moj.Io Inc. | Processing telemetry data streams based on an operating state of the data source |
US20190044737A1 (en) * | 2018-01-11 | 2019-02-07 | Ashish Singhi | Secure wireless network association |
US20190239155A1 (en) * | 2016-07-27 | 2019-08-01 | Sumitomo Electric Industries, Ltd. | Wireless communication system, information acquiring terminal, computer program, method for determining whether to adopt provided information |
US20200005644A1 (en) * | 2017-02-08 | 2020-01-02 | Sumitomo Electric Industries, Ltd. | Information providing system, server, mobile terminal, and computer program |
US20200275246A1 (en) * | 2019-02-22 | 2020-08-27 | At&T Mobility Ii Llc | Connected Vehicle Network Access Optimization |
US20200402406A1 (en) * | 2018-02-23 | 2020-12-24 | Sumitomo Electric Industries, Ltd. | Passage possibility determination apparatus, passage possibility determination method, and computer program |
US20200402397A1 (en) * | 2018-02-23 | 2020-12-24 | Sumitomo Electric Industries, Ltd. | Traffic signal control apparatus, traffic signal control method, and computer program |
US20210014643A1 (en) * | 2017-05-30 | 2021-01-14 | Sumiltomo Electric Industries, Ltd. | Communication control device, communication control method, and computer program |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7336943B2 (en) | 2003-11-19 | 2008-02-26 | General Motors Corporation | Establishing mobile terminated connections with dynamically assigned wireless IP terminals in automotive telematics applications |
KR100716890B1 (en) | 2005-07-05 | 2007-05-09 | 주식회사 현대오토넷 | Telematics system with multiple service provision server selection and various content service provision methods |
US8219710B2 (en) | 2006-10-28 | 2012-07-10 | General Motors Llc | Method of establishing a data connection with a telematics-equipped vehicle |
US10027805B2 (en) | 2007-11-26 | 2018-07-17 | General Motors Llc | Connection management for a vehicle telematics unit |
US8447465B2 (en) | 2010-02-24 | 2013-05-21 | Denso International America, Inc. | Method of activating a telematics device |
US9756669B2 (en) | 2012-11-14 | 2017-09-05 | General Motors Llc | Method of establishing a mobile-terminated packet data connection |
US9371004B2 (en) | 2014-09-16 | 2016-06-21 | Ford Global Technologies, Llc | Internal vehicle telematics data access |
KR101681146B1 (en) | 2015-06-19 | 2016-11-30 | 이민휘 | A method of URL control management service for securing reliability of Internet service |
KR101655822B1 (en) | 2015-06-29 | 2016-09-22 | 현대자동차주식회사 | Method and program for accessing internet protocol, and telematics device and computer readable medium for performing the same |
US10142420B2 (en) | 2015-08-25 | 2018-11-27 | Ford Global Technologies, Llc | On-board web server telematics systems and methods |
US10616176B2 (en) | 2016-05-20 | 2020-04-07 | Ford Global Technologies, Llc | Virtual DNS record updating method for dynamic IP address change of vehicle hosted server |
-
2019
- 2019-02-22 US US16/283,316 patent/US11190916B2/en active Active
-
2021
- 2021-11-29 US US17/536,996 patent/US20220086611A1/en not_active Abandoned
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110307119A1 (en) * | 2009-10-28 | 2011-12-15 | Intelligent Mechatronic Systems Inc. | Web portal system for managing vehicle usage and mobility |
US20140334447A1 (en) * | 2011-12-23 | 2014-11-13 | Samsung Electronics Co. Ltd. | Apparatus and method for performing handover in radio local access network communication system |
US20150298705A1 (en) * | 2014-04-22 | 2015-10-22 | Hitachi, Ltd. | Program product, portable device, vehicle driving characteristic diagnosis system, and vehicle acceleration calculation method |
US20160101785A1 (en) * | 2014-10-09 | 2016-04-14 | Hitachi, Ltd. | Driving characteristics diagnosis device, driving characteristics diagnosis system, driving characteristics diagnosis method, information output device, and information output method |
US20160309527A1 (en) * | 2015-04-14 | 2016-10-20 | General Motors Llc | Vehicle connectivity using a desired access point name |
US20170105171A1 (en) * | 2015-10-07 | 2017-04-13 | Mcafee, Inc. | Multilayer access control for connected devices |
US20190239155A1 (en) * | 2016-07-27 | 2019-08-01 | Sumitomo Electric Industries, Ltd. | Wireless communication system, information acquiring terminal, computer program, method for determining whether to adopt provided information |
US20180218034A1 (en) * | 2017-01-31 | 2018-08-02 | Moj.Io Inc. | Processing telemetry data streams based on an operating state of the data source |
US20200005644A1 (en) * | 2017-02-08 | 2020-01-02 | Sumitomo Electric Industries, Ltd. | Information providing system, server, mobile terminal, and computer program |
US20210014643A1 (en) * | 2017-05-30 | 2021-01-14 | Sumiltomo Electric Industries, Ltd. | Communication control device, communication control method, and computer program |
US20190044737A1 (en) * | 2018-01-11 | 2019-02-07 | Ashish Singhi | Secure wireless network association |
US20200402406A1 (en) * | 2018-02-23 | 2020-12-24 | Sumitomo Electric Industries, Ltd. | Passage possibility determination apparatus, passage possibility determination method, and computer program |
US20200402397A1 (en) * | 2018-02-23 | 2020-12-24 | Sumitomo Electric Industries, Ltd. | Traffic signal control apparatus, traffic signal control method, and computer program |
US20200275246A1 (en) * | 2019-02-22 | 2020-08-27 | At&T Mobility Ii Llc | Connected Vehicle Network Access Optimization |
Also Published As
Publication number | Publication date |
---|---|
US20200275246A1 (en) | 2020-08-27 |
US11190916B2 (en) | 2021-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11657705B2 (en) | Integrated telecommunications roadside unit | |
US20220086611A1 (en) | Connected Vehicle Network Access Optimization Using an Intermediary Platform | |
US11025607B2 (en) | V2X certificate management | |
US10171953B2 (en) | Vehicle event notification via cell broadcast | |
US12167500B2 (en) | Methods to leverage non-cellular device capabilities | |
US20220224766A1 (en) | Evolved Packet Core Applications Microservices Broker | |
US11601429B2 (en) | Network service control for access to wireless radio networks | |
US10172009B1 (en) | System and method for a vehicular network service over a 5G network | |
US11677275B2 (en) | Wireless power transfer network management | |
US20220224695A1 (en) | Anchoring Client Devices for Network Service Access Control | |
US9497729B2 (en) | Integrating in-vehicle access-point with cellular offloading system | |
KR102355746B1 (en) | Service layer registration | |
US9811786B2 (en) | Reservations-based intelligent roadway traffic management | |
US20170325092A1 (en) | Discovery mechanism for service server connection | |
US11218491B2 (en) | Security de-escalation for data access | |
US20170325097A1 (en) | Managing licensed and unlicensed communications using cellular protocols | |
US20230208856A1 (en) | Encrypted Applications Verification | |
US20200092366A1 (en) | Peer Packet Transport | |
CN112469000A (en) | System and method for vehicle network service on 5G network | |
US10433136B2 (en) | Wireless network enhancements via inductance loops as antennas | |
WO2025004374A1 (en) | Network node and control method | |
CN119450477A (en) | A communication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AT&T MOBILITY II LLC, GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CROFT, JOHN MICHAEL;REEL/FRAME:058234/0770 Effective date: 20190225 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |