Admission of an individual session in a network
First Claim
Patent Images
1. A method of obtaining access to network resources for a mobile device, the method comprising:
- receiving a request, at an authentication and authorization function (AAF), from a Radio Access Network (RAN) device, for access for a mobile device;
authenticating, at the AAF, the mobile device;
responsive to failing authorization to access each of a plurality of virtual networks, authorizing at the AAF, the mobile device to access a limited access service;
wherein authorizing the mobile device to access the limited access service comprises;
requesting authorization from a blacklist authorization function; and
transmitting an authorization message to the RAN device;
wherein the AAF is instantiated in the core network with subscription information supplied by a virtual network operator.
1 Assignment
0 Petitions
Accused Products
Abstract
An aspect of the disclosure provides a method for session admission at a node in an infrastructure provider network. The method includes receiving a connection request from a user equipment not associated with a network with which the infrastructure provider network is associated and obtaining from the user equipment, an identification of a service provider with which the infrastructure provider network is associated. Access authorization is then requested from the identified service provider. Embodiments allow such a process to provide government mandated free access, or for some other service provider to pay for the service.
8 Citations
21 Claims
-
1. A method of obtaining access to network resources for a mobile device, the method comprising:
-
receiving a request, at an authentication and authorization function (AAF), from a Radio Access Network (RAN) device, for access for a mobile device; authenticating, at the AAF, the mobile device; responsive to failing authorization to access each of a plurality of virtual networks, authorizing at the AAF, the mobile device to access a limited access service; wherein authorizing the mobile device to access the limited access service comprises; requesting authorization from a blacklist authorization function; and transmitting an authorization message to the RAN device; wherein the AAF is instantiated in the core network with subscription information supplied by a virtual network operator. - View Dependent Claims (2, 3, 7, 8, 9, 10, 11, 12)
-
-
4. A method of obtaining access to network resources for a mobile device, the method comprising:
-
receiving a request, at an authentication and authorization function (AAF), from a Radio Access Network (RAN) device, for access for a mobile device; authenticating, at the AAF, the mobile device; responsive to failing authorization to access each of a plurality of virtual networks, authorizing at the AAF, the mobile device to access a limited access service; wherein authorizing the mobile device to access the limited access service comprises; requesting authorization from a blacklist authorization function; and transmitting an authorization message to the RAN device wherein the AAF is instantiated in the RAN. - View Dependent Claims (5, 6)
-
-
13. A method of obtaining authorization for access to network resources for a mobile device in a radio access network (RAN) in a network architecture including the RAN having a first administrative domain, and a VN implemented using a core network having a second administrative domain, the method comprising:
-
receiving, at an authentication and authorization function (AAF), a request for access for a mobile device from a node in the first administrative domain of the RAN; authenticating, at the AAF, the mobile device; responsive to failing authorization to access the VN, authorizing, at the AAF, the mobile device to access a limited access service supplied by the core network having the second administrative domain; wherein responsive to failing authorization to access the VN, authorizing the mobile device to access a limited access service comprises; failing to authorize the mobile device for network access according to a subscriber database of the AAF; requesting authorization from a blacklist authorization function; and transmitting an authorization message to the RAN. - View Dependent Claims (14, 15, 16)
-
-
17. A method of providing a third party offered service via a telecommunications connectivity service provider (TCSP), the method comprising:
-
receiving, at a third party server, a request from the TCSP for a communication session on behalf of a user without a subscription to a network associated with the TCSP; requesting authorization, by the third party server, on behalf of the user from a blacklist authorization function; transmitting, from the third party server, an authorizing response to the TCSP; and providing, by the third party server, the third party service using the communication session. - View Dependent Claims (18, 19)
-
-
20. A node comprising:
-
a processor; machine readable memory storing machine executable instructions for implementing an authentication and authorization function (AAF) comprising instructions to cause the AAF to; receive a request, from a Radio Access Network (RAN) device, for access for a mobile device; authenticate the mobile device; and responsive to failing authorization to access each of a plurality of virtual networks, authorize the mobile device to access a limited access service; wherein authorizing the mobile device to access the limited access service comprises; requesting authorization from a blacklist authorization function; and transmitting an authorization message to the RAN device wherein the AAF is instantiated in the core network with subscription information supplied by a virtual network operator.
-
-
21. A node for use in a network, the network including a Radio Access Network (RAN) having a first administrative domain and a VN implemented using a core network having a second administrative domain, the node comprising:
-
a processor; machine readable memory storing machine executable instructions for implementing an authentication and authorization function (AAF) comprising instructions to cause the AAF to; receive a request for access for a mobile device from a node in the first administrative domain of the RAN; authenticate the mobile device; responsive to failing authorization to access the VN, authorize the mobile device to access a limited access service supplied by the core network having the second administrative domain; wherein responsive to failing authorization to access the VN, authorizing the mobile device to access a limited access service comprises; failing to authorize the mobile device for network access according to a subscriber database of the AAF; requesting authorization from a blacklist authorization function; and transmitting an authorization message to the RAN.
-
Specification