US 11,711,719 B2
Systems and methods for device-anonymous performance monitoring in a wireless network
Brian Matthew White, Port Murray, NJ (US); Ning Zhang, Warren, NJ (US); and Andrew F. Patka, Holliston, MA (US)
Assigned to Verizon Patent and Licensing Inc., Basking Ridge, NJ (US)
Filed by Verizon Patent and Licensing Inc., Basking Ridge, NJ (US)
Filed on Aug. 16, 2021, as Appl. No. 17/402,928.
Prior Publication US 2023/0048092 A1, Feb. 16, 2023
Int. Cl. H04W 28/02 (2009.01); H04W 28/24 (2009.01); H04L 67/30 (2022.01); H04W 12/06 (2021.01); H04W 24/10 (2009.01)
CPC H04W 28/0268 (2013.01) [H04L 67/30 (2013.01); H04W 12/06 (2013.01); H04W 24/10 (2013.01); H04W 28/24 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A device, comprising:
one or more processors configured to:
maintain information associating a plurality of applications with a plurality of identifiers;
receive a first request from a User Equipment (“UE”) for an identifier associated with a particular application;
determine that the requested identifier is a particular identifier, of the plurality of identifiers, that is associated with the particular application;
provide the identifier to the UE in response to the first request, wherein the UE monitors Key Performance Indicator (“KPI”) information associated with the UE based on execution of the particular application;
receive the monitored KPI information from the UE, wherein the monitored KPI information is provided in conjunction with the identifier;
provide a token, associated with at least one of the particular application or the particular identifier, to an application provider associated with the particular application;
receive a second request from the application provider for the monitored KPI information, wherein the second request includes the token;
authenticate the second request based on the token included in the second request; and
provide the received monitored KPI information to the application provider, wherein providing the monitored KPI information to the application provider is further based on authenticating the second request.