Method and System for Controlling Access to Communication Networks, Related Network and Computer Program Therefor
1 Assignment
0 Petitions
Accused Products
Abstract
A system for controlling access of a mobile terminal to a communication network including a set of terminals, wherein said mobile terminal obtains access to the network as a result of a successful authentication procedure. The system includes an authenticator module for performing the authentication procedure of the mobile terminal and a communication mechanism configured for making the successful outcome of the authentication procedure known to the terminals in the set. The mobile terminal is thus permitted to access the network via any of the terminals in the set based on the authentication procedure.
-
Citations
116 Claims
-
1-58. -58. (canceled)
-
59. A method for controlling access of a mobile terminal to a communication network comprising a set of terminals, wherein said mobile terminal obtains access to said network as a result of a successful authentication procedure, comprising the steps of:
-
performing said authentication procedure of said mobile terminal; and
making the successful outcome of said authentication procedure known to the terminals in said set, whereby said mobile terminal is permitted to access said network via any of the terminals in said set based on said authentication procedure. - View Dependent Claims (60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 116)
-
-
87. A system for controlling access of a mobile terminal to a communication network comprising a set of terminals, wherein said mobile terminal obtains access to said network as a result of a successful authentication procedure, comprising:
-
an authentication server for performing said authentication procedure of said mobile terminal; and
a communication mechanism configured for making the successful outcome of said authentication procedure known to the terminals in said set, whereby said mobile terminal is permitted to access said network via any of the terminals in said set based on said authentication procedure. - View Dependent Claims (88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114)
-
Specification