Server-paid internet access service
First Claim
Patent Images
1. A method of operating an access point, the method comprising:
- receiving a first request from a device associated with a user to access a first web server operated by a first entity that has agreed with a second entity operating the access point to incur costs associated with a connection to a network provided by the access point;
sending a response to the device associated with the user, the response including an address of an authentication program accessible via a secure port of a second web server different from the first web server, the response to cause the device associated with the user to securely communicate with the secure port for a period of time sufficient for the device associated with the user to attempt to be authenticated via the authentication program, the second web server to provide a one-time encryption key to the device associated with the user via the secure port such that the second entity associated with the access point is unable to access the one-time encryption key;
receiving an acknowledgment indicative of a result of the attempt to be authenticated via the authentication program; and
when the received acknowledgement indicates that the device associated with the user is authentic, operating, by executing an instruction with at least one processor, an access controller of the access point to route traffic to and from the device associated with the user based on an access control profile associated with the first web server, wherein the access control profile restricts the device associated with the user to an access range of addresses.
3 Assignments
0 Petitions
Accused Products
Abstract
An embodiment of a system for providing Internet access free of charge to a user utilizes an Internet service provider for connecting a user to the Internet, a zone creation means, and a zone organizer. Free zones of servers are created, wherein the free zones are groups of at least one server to which at least one user can connect. The zone organizer can be in communication with the ISP. The zone organizer can be a traffic monitor, a traffic controller, an authentication protocol, a bookkeeping protocol, a fee collection and dispersal module, and/or an indexing and listing function.
43 Citations
18 Claims
-
1. A method of operating an access point, the method comprising:
-
receiving a first request from a device associated with a user to access a first web server operated by a first entity that has agreed with a second entity operating the access point to incur costs associated with a connection to a network provided by the access point; sending a response to the device associated with the user, the response including an address of an authentication program accessible via a secure port of a second web server different from the first web server, the response to cause the device associated with the user to securely communicate with the secure port for a period of time sufficient for the device associated with the user to attempt to be authenticated via the authentication program, the second web server to provide a one-time encryption key to the device associated with the user via the secure port such that the second entity associated with the access point is unable to access the one-time encryption key; receiving an acknowledgment indicative of a result of the attempt to be authenticated via the authentication program; and when the received acknowledgement indicates that the device associated with the user is authentic, operating, by executing an instruction with at least one processor, an access controller of the access point to route traffic to and from the device associated with the user based on an access control profile associated with the first web server, wherein the access control profile restricts the device associated with the user to an access range of addresses. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable medium comprising instructions stored thereon that, when executed, cause a machine to at least:
-
respond to a first request from a device associated with a user to access a first web server operated by a first entity that has agreed with a second entity operating an access point to incur costs associated with a connection to a network provided by the access point by sending a response to the device associated with the user, the response including an address of an authentication program accessible via a secure port of a second web server, the response to cause the device associated with the user to securely communicate with the secure port to attempt to be authenticated via the authentication program, the second web server to provide a one-time encryption key to the device associated with the user via the secure port such that the second entity associated with the access point is unable to access the one-time encryption key; and access an acknowledgment indicative that the device associated with the user is authentic, operate an access controller of the access point to route traffic to and from the device associated with the user based on an access control profile associated with the first web server, the access control profile to restrict the device associated with the user to and access range of addresses. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An access point, comprising:
-
a communication interface to receive a first request from a device associated with a user, the first request requesting access to a first web server operated by a first entity that has agreed with a second entity operating the access point to incur costs associated with a connection to a network provided by the access point, the communication interface to send a response to the device associated with the user, the response including an address of an authentication program accessible via a secure port of a second web server, the response to cause the device associated with the user to securely communicate with the secure port to attempt to be authenticated via the authentication program, the second web server to provide a one-time encryption key to the device associated with the user via the secure port such that the second entity associated with the access point is unable to access the one-time encryption key, the communication interface to receive an acknowledgment indicative of a result of the attempt to be authenticated via the authentication program; and an access controller to, when the received acknowledgement indicates that the device associated with the user is authentic, route traffic to and from the device associated with the user based on an access control profile associated with the first web server, the access control profile to restrict the device associated with the user to an access range of addresses, the access controller implemented by a processor. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification