System and method for ubiquitous network access
First Claim
1. A system, comprising:
- at least one port component through which an end user needs to be authenticated and authorized in order to access a network resource via a network provider'"'"'s network, the port component being able to enforce an access policy and to apply rules of a service provider of the end user during the end user'"'"'s use of the network provider'"'"'s network;
at least one first director component communicatively coupled to the port component to provide the access policy to be used in connection with the network provider'"'"'s grant of access to its network;
at least one second director component communicatively coupled to the first director component to provide the access policy to the first director component in connection with the service provider'"'"'s request for access to the network provider'"'"'s network on behalf of its end user and in connection with authentication and authorization of the end user; and
a home provider register (HPR) component communicatively coupled to the first director component to be used by the first director component in connection with determination of a service provider of the end user.
0 Assignments
0 Petitions
Accused Products
Abstract
Disclosed embodiments significantly increase the power and flexibility of public access network roaming systems. This is accomplished in one or more embodiments by requiring no new software or hardware to be installed by the end user. Further, an end user'"'"'s service provider can be automatically determined. If a pre-negotiated network sharing agreement does not exist between the network provider and service provider, a network sharing agreement can be dynamically facilitated, even if the network provider and the service provider have no prior business relationship; while protecting the business and financial interests of both providers. Embodiments allow for a clearinghouse for revenue assurance. Embodiments contemplate a scalable, distributable system. Embodiments allow for variable access charges among and within venues and a wide variety of service plans for end users. Embodiments remain backward compatible with legacy systems for maximum flexibility.
228 Citations
57 Claims
-
1. A system, comprising:
-
at least one port component through which an end user needs to be authenticated and authorized in order to access a network resource via a network provider'"'"'s network, the port component being able to enforce an access policy and to apply rules of a service provider of the end user during the end user'"'"'s use of the network provider'"'"'s network;
at least one first director component communicatively coupled to the port component to provide the access policy to be used in connection with the network provider'"'"'s grant of access to its network;
at least one second director component communicatively coupled to the first director component to provide the access policy to the first director component in connection with the service provider'"'"'s request for access to the network provider'"'"'s network on behalf of its end user and in connection with authentication and authorization of the end user; and
a home provider register (HPR) component communicatively coupled to the first director component to be used by the first director component in connection with determination of a service provider of the end user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system, comprising:
-
a means for allowing an end user, associated with a service provider, to use a network provider'"'"'s network that is not managed by the service provider;
a means for determining the service provider of the end user of the network provider'"'"'s network; and
a means for automatically and dynamically facilitating network sharing agreements between the network provider and the service provider, including a means for applying the service provider'"'"'s rules to the end user while the end user uses the network provider'"'"'s network. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A method, comprising:
-
authenticating and authorizing a user to access a network resource via a network provider'"'"'s network;
providing an access policy to be used in connection with the authenticating and authorizing;
determining a service provider of the user, the service provider not being substantially involved in managing use of the network provider'"'"'s network; and
enforcing the access policy and applying rules of the service provider during the user'"'"'s use of the network provider'"'"'s network. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. An article of manufacture, comprising:
-
a machine-readable medium having instructions stored thereon to;
authenticate and authorize an end user to access a network resource via a network provider'"'"'s network;
provide an access policy to be used in connection with the authenticating and authorizing;
determine a service provider of the end user, the service provider not being substantially involved in managing use of the network provider'"'"'s network; and
initiate enforcement of the access policy and application of rules of the service provider during the end user'"'"'s use of the network provider'"'"'s network. - View Dependent Claims (54, 55, 56, 57)
-
Specification