TRIGGERING USER AUTHENTICATION IN COMMUNICATION NETWORKS
First Claim
Patent Images
1. A method for re-authentication of a communication device connected to a communication network, the method comprising the steps of:
- measuring a volume of data transferred between the communication device and the communication network;
comparing the volume of data with a preset re-authentication threshold value; and
triggering re-authentication of the communication device based on the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
The present subject matter discloses a method for triggering re-authentication of a communication device connected to a communication network. In one implementation, a volume of data transferred between the communication device and the communication network is measured. Further, the volume of data measured is compared with a re-authentication threshold value. Subsequently re-authentication of the communication device is triggered based on the comparison.
13 Citations
12 Claims
-
1. A method for re-authentication of a communication device connected to a communication network, the method comprising the steps of:
-
measuring a volume of data transferred between the communication device and the communication network; comparing the volume of data with a preset re-authentication threshold value; and triggering re-authentication of the communication device based on the comparison. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A radio network controller comprising:
-
a processor; and a data measurement module coupled to the processor, the data measurement module configured to measure a volume of data transferred between a communication device and a communication network; and a data comparison module coupled to the processor, the data comparison module configured to compare the volume of data with a re-authentication threshold value; and triggering re-authentication of the communication device based on the comparison. - View Dependent Claims (7, 8, 9, 11)
-
-
10. (canceled)
-
12. A computer-readable medium having embodied thereon a non-transitory computer program for executing a method of re-authenticating a communication device connected to a communication network, the method comprising:
-
measuring a volume of data transferred between the communication device and the communication network; comparing the volume of data with a preset re-authentication threshold value; and triggering re-authentication of the communication device based on the comparison.
-
Specification