Method and apparatus for location-based white lists in a telecommunications network
First Claim
Patent Images
1. A method of determining whether access to a host requested by a client session connection is permitted, the method comprising the computer-implemented steps of:
- determining attributes of the client session connection;
selecting a list of hosts based on the determined attributes of the client session connection;
using the list of hosts to determine whether access to the requested host is permitted.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is disclosed for determining whether access to a host requested by a client session connection is permitted. After determining attributes of the client session connection, a list of hosts is selected based on the determined attributes of the client session connection. The list of hosts is then used to determine whether access to the requested host is permitted. The disclosed method can be used to allow for location-specific white lists of free URLs for a user at a wireless network hotspot that the user can access before being authenticated.
-
Citations
35 Claims
-
1. A method of determining whether access to a host requested by a client session connection is permitted, the method comprising the computer-implemented steps of:
-
determining attributes of the client session connection;
selecting a list of hosts based on the determined attributes of the client session connection;
using the list of hosts to determine whether access to the requested host is permitted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of determining whether access to a host requested by a client session connection is permitted, the method comprising the computer-implemented steps of:
-
determining attributes of the client session connection;
resolving a location of the client session connection through attributes of the client session connection;
selecting a list of hosts based on the location of the client session connection;
using the list of hosts to determine whether access to the requested host is permitted. - View Dependent Claims (15)
-
-
16. A system for managing a white list service in a telecommunications network, said system comprising:
-
a gateway server, and a edge services manager, wherein said edge services manager comprises a captive portal application;
wherein said gateway server is configurable to redirect a request from a user to a particular port of the captive portal application, said particular port being determined through attributes of the user'"'"'s connection to the telecommunications network. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A computer-readable medium carrying one or more sequences of instructions for determining whether access to a host requested by a client session connection is permitted, which instructions, when executed by one or more processors, cause the one or more processors to carry out the steps of:
-
determining attributes of the client session connection;
selecting a list of hosts based on the determined attributes of the client session connection;
using the list of hosts to determine whether access to the requested host is permitted. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A system for providing a dynamic white list service, comprising:
- a network management system comprising a Captive Portal and a Web Portal, said Captive Portal including a listener port configured to receive requests from unauthenticated users; and
a gateway configured to redirect requests from unauthenticated users to the listener port of the Captive Portal configured to receive requests from unauthenticated users;
wherein for each request redirected by the gateway to the listener port, the Captive Portal determines a location for a request, and selects a white list of hosts based on the determined location. - View Dependent Claims (32, 33)
- a network management system comprising a Captive Portal and a Web Portal, said Captive Portal including a listener port configured to receive requests from unauthenticated users; and
-
34. A method of managing a client session connection in a wireless network, the method comprising the computer-implemented steps of:
-
receiving a request from a user'"'"'s client session for access to a host;
determining attributes of the client session connection;
if the determined attributes indicate that the user has been authenticated for a service, selecting a list of hosts that is associated with the authenticated service;
if the determined attributes indicate that the user has not been authenticated, mapping the determined attributes to a location of the user, and selecting a list of hosts associated with the location; and
using the selected list of hosts to determine whether access to the requested host is permitted.
-
-
35-36. -36. (canceled)
Specification