Method and system for providing secure user access to public or private telephone and internet systems
First Claim
1. A data system comprising:
- a local area network (LAN) comprising a hub/switch and coupled to a server, said LAN for coupling with a Public Switched Telephone Network for communication therewith;
an ethernet phone coupled to communicate with said LAN;
a cradle for receiving a portable computer system and also coupled to communicate with said LAN without going through said phone;
wherein said hub/switch is for detecting a connection to a portable computer system and for performing authentication in response thereto;
wherein said cradle is for receiving user authentication data from said portable computer system and transmitting said user authentication data to said server; and
wherein said server is for opening a port on said hub/switch allowing said ethernet phone to communicate voice data over said LAN and also allowing said cradle access to said LAN provided said authentication is successful and otherwise for causing said hub/switch to block said ethernet phone and said cradle from accessing said LAN and said server for closing said port in response to detecting operational variations that are unfamiliar to said LAN.
5 Assignments
0 Petitions
Accused Products
Abstract
A public telephone and Internet access system that comprises Personal Digital Assistants (PDA) that are connected to an ethernet or other Local Area Network by a network cradle, and a number of ethernet telephones connected to the same Local Area Network. The PDAs store encrypted information about their owners, including the owner'"'"'s name, their phone forwarding preferences, access permissions to the network, and charging/billing information. When a PDA is attached to a network cradle, this information is automatically transferred to the gatekeeper, which is a server that performs management tasks for the ethernet phone network. These tasks include deciding whether or not a user is allowed to sign up and use a public ethernet phone, maintaining billing and charging information, and forwarding incoming calls for a given user to the ethernet phone at the user'"'"'s current location. This invention provides a secure method for the PDA and the gatekeeper to exchange authentication information.
-
Citations
18 Claims
-
1. A data system comprising:
-
a local area network (LAN) comprising a hub/switch and coupled to a server, said LAN for coupling with a Public Switched Telephone Network for communication therewith; an ethernet phone coupled to communicate with said LAN; a cradle for receiving a portable computer system and also coupled to communicate with said LAN without going through said phone; wherein said hub/switch is for detecting a connection to a portable computer system and for performing authentication in response thereto; wherein said cradle is for receiving user authentication data from said portable computer system and transmitting said user authentication data to said server; and wherein said server is for opening a port on said hub/switch allowing said ethernet phone to communicate voice data over said LAN and also allowing said cradle access to said LAN provided said authentication is successful and otherwise for causing said hub/switch to block said ethernet phone and said cradle from accessing said LAN and said server for closing said port in response to detecting operational variations that are unfamiliar to said LAN. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of performing authentication within a data system comprising the steps of:
-
a) placing a portable computer system into a cradle, said cradle associated with an Ethernet phone; b) detecting a connection to said portable computer system in response to said step a), said step b) performed by a hub/switch of a local area network (LAN) that is connected to a Public Switched Telephone Network; c) in response to said step b), a server of said LAN causing said cradle to access user authentication data of said portable computer system and to transmit said user authentication data to said server; d) performing user authentication based on said user authentication data; e) provided said user authentication is successful, said server opening a port on said hub/switch for allowing said Ethernet phone to communicate voice data over said LAN and also allowing said cradle access to said LAN and said server for closing said port in response to detecting operational variations that are unfamiliar to said LAN; and f) provided said user authentication is not successful, said server blocking said Ethernet phone and said cradle from accessing said LAN. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification