SECURE COMMUNICATION NETWORK USER MOBILITY APPARATUS AND METHODS
First Claim
Patent Images
1. A method comprising:
- receiving, at a first secure communication network in which a network service is provided, service access information associated with local access to the service by a mobile user, the mobile user being associated with an independently controlled second secure communication network but locally accessing the service from within the first communication network; and
requesting the second communication network to authenticate the mobile user.
4 Assignments
0 Petitions
Accused Products
Abstract
Secure communication network user mobility apparatus and methods are disclosed. A mobile user that is locally connected to a first communication network in which a service is provided, but is associated with an independently controlled second secure communication network, may be authenticated for access to the service by the second communication network. This allows seamless user mobility between networks in a partner extranet or other collection of trusted networks based on existing inter-network user mobility relationships. Access control, monitoring, and reporting, for example, and possibly other functions, may also be provided.
-
Citations
27 Claims
-
1. A method comprising:
-
receiving, at a first secure communication network in which a network service is provided, service access information associated with local access to the service by a mobile user, the mobile user being associated with an independently controlled second secure communication network but locally accessing the service from within the first communication network; and requesting the second communication network to authenticate the mobile user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus comprising:
-
an interface operable to receive service access information associated with local access by a mobile user to a network service that is provided in a first secure communication network, the mobile user being associated with an independently controlled second secure communication network but locally accessing the service from within the first communication network; and an authentication module operatively coupled to the interface and operable to request the second communication network to authenticate the mobile user. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method comprising:
-
receiving, from a first secure communication network in which a network service is provided, a request for an independently controlled second secure communication network, with which a mobile user is associated, to authenticate the mobile user for local access to the service from within the first communication network; authenticating the mobile user according to user identity records at the second communication network; and providing to the first communication network an indication of a result of the authentication. - View Dependent Claims (22, 23)
-
-
24. An apparatus comprising:
-
an interface for exchanging information between a first secure communication network and an independently controlled second secure communication network; and an authentication module operatively coupled to the interface and operable; to receive through the interface a request from the first communication network to authenticate a mobile user associated with the second communication network for local access from within the first communication network to a service provided in the first communication network; to authenticate the mobile user according to user identity records at the second communication network; and to provide an indication of a result of the authentication to the first communication network through the interface. - View Dependent Claims (25)
-
-
26. A machine-readable medium storing a data structure, the data structure comprising:
-
an identifier of a mobile user by whom a service provided in a first secure communication network may be locally accessed from within the first communication network; and an identifier of an independently controlled second secure communication network with which the mobile user is associated and by which the mobile user is to be authenticated for local access to the service. - View Dependent Claims (27)
-
Specification