Cross access login controller
First Claim
1. A method of authorizing network access, comprising:
- by a controller with a processor and memory, the controller in communication with a first network for controlling access to the first network;
receiving via the first network, from a user equipment having a user registered in a visitor network, an access request to access the first network, wherein the access request includes a MAC address of the user equipment;
performing a query, using the received MAC address, in a subscriber repository;
if, based on a result of the query, the received MAC address is not found in the subscriber repository;
sending a credential request to the user equipment;
receiving a credential from the user equipment;
generating a single use code;
causing storage of the single use code in the subscriber repository, correlated to the received MAC address;
sending the single use code to the user equipment via a trusted channel;
receiving a new code and a new credential via the visitor network;
comparing the new code and the single use code; and
based on a result of the comparing, if the new code matches the single use code, registering the new credential for re-use by the user equipment.
9 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods here may be used for authorizing network access including using a controller with a processor and memory, the controller in communication with a first network for controlling access to the first network. From a user equipment having a user registered in a visitor network, an access request to access the first network is received, wherein the access request includes a MAC address of the user equipment. Based on a query performed in a subscriber repository, if the received MAC address is not found, a credential request is sent to the user equipment, and a credential is received from the user equipment. A single use code is generated, stored in the subscriber repository, and sent to the user equipment via a trusted channel. A new code and a new credential are received via the visitor network, and are compared. If the new code and the single use code match, the new credential is registered for re-use by the user equipment.
-
Citations
17 Claims
-
1. A method of authorizing network access, comprising:
by a controller with a processor and memory, the controller in communication with a first network for controlling access to the first network; receiving via the first network, from a user equipment having a user registered in a visitor network, an access request to access the first network, wherein the access request includes a MAC address of the user equipment; performing a query, using the received MAC address, in a subscriber repository; if, based on a result of the query, the received MAC address is not found in the subscriber repository; sending a credential request to the user equipment; receiving a credential from the user equipment; generating a single use code; causing storage of the single use code in the subscriber repository, correlated to the received MAC address; sending the single use code to the user equipment via a trusted channel; receiving a new code and a new credential via the visitor network; comparing the new code and the single use code; and based on a result of the comparing, if the new code matches the single use code, registering the new credential for re-use by the user equipment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A non-transitory computer-readable medium having computer-executable instructions stored thereon which, when executed by one or more computer processors of a controller in communication with a first network for controlling access to the first network, cause the one or more computer processors to perform steps of a method for authorizing network access, the method comprising:
-
receiving via the first network, from a user equipment having a user registered in a visitor network, an access request to access the first network, wherein the access request includes a MAC address of the user equipment; performing a query, using the received MAC address, in a subscriber repository; if, based on a result of the query, the received MAC address is not found in the subscriber repository; sending a credential request to the user equipment; receiving a credential from the user equipment; generating a single use code; causing storage of the single use code in the subscriber repository, correlated to the received MAC address; sending the single use code to the user equipment via a trusted channel; receiving a new code and a new credential via the visitor network; comparing the new code and the single use code; and based on a result of the comparing, if the new code matches the single use code, registering the new credential for re-use by the user equipment. - View Dependent Claims (9, 10)
-
-
11. A system for authorizing network access, comprising
a controller with a processor and memory, the controller in communication with a first network for controlling access to the first network, the controller configured to: -
receive via the first network, from a user equipment having a user registered in a visitor network, an access request to access the first network, wherein the access request includes a MAC address of the user equipment; perform a query, using the received MAC address, in a subscriber repository; if, based on a result of the query, the received MAC address is not found in the subscriber repository; send a credential request to the user equipment; receive a credential from the user equipment; generate a single use code; cause storage of the single use code in the subscriber repository, correlated to the received MAC address; send the single use code to the user equipment via a trusted channel; receive a new code and a new credential via the visitor network; compare the new code and the single use code; and based on a result of the compare, if the new code matches the single use code, register the new credential for re-use by the user equipment. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification