Network access control
First Claim
1. A device comprising:
- memory that stores computer-executable instructions; and
at least one processor configured to access the memory and execute the computer-executable instructions to;
receive first data that identifies a first device;
receive second data that identifies a second device;
determine a first access configuration for the first device using the first data, wherein the first access configuration comprises a first set of restrictions associated with access to a wireless network by the first device;
determine a second access configuration for the second device using the second data, wherein the second access configuration comprises a second set of restrictions associated with access to the wireless network by the second device, wherein the second access configuration is different than the first access configuration;
determine that the first device is attempting to complete an action that is restricted by the first set of restrictions; and
prevent the action from being completed.
0 Assignments
0 Petitions
Accused Products
Abstract
This disclosure describes methods, apparatus, and systems related to controlled access data allocation. A device may receive a first request from a first device to establish a first connection with a wireless network. The device may receive a second request from a second device to establish a second connection with the wireless network. The device may determine a first access data for the first device, wherein the first access data is associated with a first access configuration. The device may determine a second access data for the second device, wherein the second access data is associated with a second access configuration, wherein the second access configuration is different from the first access configuration. The device may send the first access data to the first device. The device may send the second access data to the second device. The device may establish the first connection with the first device, wherein the first connection is at the first access configuration. The device may establish the second connection with the second device, wherein the second connection is at the second access configuration.
-
Citations
20 Claims
-
1. A device comprising:
-
memory that stores computer-executable instructions; and at least one processor configured to access the memory and execute the computer-executable instructions to; receive first data that identifies a first device; receive second data that identifies a second device; determine a first access configuration for the first device using the first data, wherein the first access configuration comprises a first set of restrictions associated with access to a wireless network by the first device; determine a second access configuration for the second device using the second data, wherein the second access configuration comprises a second set of restrictions associated with access to the wireless network by the second device, wherein the second access configuration is different than the first access configuration; determine that the first device is attempting to complete an action that is restricted by the first set of restrictions; and prevent the action from being completed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving, by a device, first data that identifies a first device; receiving second data that identifies a second device; determining a first access configuration for the first device using the first data, wherein the first access configuration comprises a first set of restrictions associated with access to a wireless network by the first device; determining a second access configuration for the second device using the second data, wherein the second access configuration comprises a second set of restrictions associated with access to the wireless network by the second device, wherein the second access configuration is different than the first access configuration; determining that the first device is attempting to complete an action that is restricted by the first set of restrictions; and preventing the action from being completed. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
determining, by an access point, first data that identifies a first device; receiving second data that identifies a second device; determining a first set of restrictions for the first device using the first data, wherein the first set of restrictions is associated with access to a wireless network by the first device; determining a second set of restrictions for the second device using the second data, wherein the second set of restrictions is associated with access to the wireless network by the second device, and wherein the second set of restrictions is different than the first set of restrictions; determining that the first device is attempting to access content that is restricted by the first set of restrictions; and preventing access to the content. - View Dependent Claims (18, 19, 20)
-
Specification