System and method for decentralized trust-based service provisioning
First Claim
Patent Images
1. A method comprising:
- transmitting a first message to a server from an authorized user in order to provision access to a network by a guest user without any need of centralized control by an administrator, the first message including a guest identifier;
receiving a guest password from the server for subsequent use by a guest user;
authenticating the guest user using the guest identifier and the guest password; and
allowing the guest user access to the network if the guest user is authenticated.
6 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment of the invention, a network is adapted with a wireless network switch in communication with a plurality of access points, which are in communication with one or more wireless units. A guest user is provided access to the network by a wireless unit of an authorized user transmitting a first message to a targeted server of the network. The first message is configured to provision access to a network for the guest user. After generation of the guest password, it is subsequently provided to the guest user for authentication purposes. This enables guest access to be provisioned without any need of centralized control by an administrator.
-
Citations
18 Claims
-
1. A method comprising:
-
transmitting a first message to a server from an authorized user in order to provision access to a network by a guest user without any need of centralized control by an administrator, the first message including a guest identifier;
receiving a guest password from the server for subsequent use by a guest user;
authenticating the guest user using the guest identifier and the guest password; and
allowing the guest user access to the network if the guest user is authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for provisioning services through trust-based operations, comprising:
-
initiating a request for a service to be provisioned for a guest user, the request including a guest identifier and an access time period being a parameter to identify a period of time that the guest user is provisioned the service;
receiving a guest password in response to the request;
requesting the service by the guest user by providing the guest identifier and the password; and
authenticating the guest user using the guest identifier and the guest password with the guest user provisioned with the services upon authentication. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
notification of a server of a location of an authorized user of a network; and
programming a wireless network switch to restrict network access by a guest user to one or more access points physically proximate to the location of the user. - View Dependent Claims (17, 18)
-
Specification