User and Device Authentication in Broadband Networks
First Claim
1. A network component comprising:
- at least one processor configured to implement a method comprising;
granting a user restricted access at a reduced rate without authenticating the user;
attempting to authenticate the user; and
granting the user unrestricted access at a full rate if the user authentication is successful.
2 Assignments
0 Petitions
Accused Products
Abstract
A network component comprising at least one processor configured to implement a method comprising granting a user restricted access at a reduced rate without authenticating the user, attempting to authenticate the user, and granting the user unrestricted access at a full rate if the user authentication is successful. Included is a method comprising authenticating a user device, a user line, or both using a first communication, and authenticating a user using a second communication separate from the first communication. Also included is an apparatus comprising an access node (AN) configured to couple to an access network and communicate with a user equipment (UE) via the access network, wherein the UE is authenticated using either line authentication or device authentication based on the access network.
-
Citations
20 Claims
-
1. A network component comprising:
-
at least one processor configured to implement a method comprising; granting a user restricted access at a reduced rate without authenticating the user; attempting to authenticate the user; and granting the user unrestricted access at a full rate if the user authentication is successful. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
authenticating a user device, a user line, or both using a first communication; and authenticating a user using a second communication separate from the first communication. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. An apparatus comprising:
-
an access node (AN) configured to couple to an access network and communicate with a user equipment (UE) via the access network, wherein the UE is authenticated using either line authentication or device authentication based on the access network. - View Dependent Claims (17, 18, 19, 20)
-
Specification