Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet
First Claim
1. A method of providing an authentication system comprising:
- providing a host network configured to provide access to the Internet from a public location;
providing at least one authentication component communicatively linked with the host network and configured to enable authentication of individual users so that they can access the Internet through the host network, authentication being configured to take place in a manner that is independent of any user affiliation with any Internet Service Providers (ISPs);
providing at least one access module communicatively linked with the one authentication component and configured to enable a user to access the host network; and
providing an authentication database communicatively linked to the host network and containing user information that can be used to authenticate a user.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for providing network access, e.g. Internet access, are described. An architecture includes a host organization network through which network access is provided. The host organization network can be advantageously deployed in public areas such as airports and shopping malls. An authentication/negotiation component is provided for authenticating various users and negotiating for services with service providers on behalf of the system users. The authentication/negotiation component can include one or more specialized servers and a policy manager that contains policies that govern user access to the Internet. An authentication database is provided and authenticates various users of the system. An access module is provided through which individual client computing devices can access the Internet. In one embodiment, the access module comprises individual wireless access points that permit the client computing devices to wirelessly communicate data packets that are intended for the Internet. In one aspect, users are given a variety of choices of different service levels that they can use for accessing the Internet. The service levels can vary in such things as bandwidth allocation and security measures. The various service levels can be purchased by the users using their computing devices.
-
Citations
47 Claims
-
1. A method of providing an authentication system comprising:
-
providing a host network configured to provide access to the Internet from a public location; providing at least one authentication component communicatively linked with the host network and configured to enable authentication of individual users so that they can access the Internet through the host network, authentication being configured to take place in a manner that is independent of any user affiliation with any Internet Service Providers (ISPs); providing at least one access module communicatively linked with the one authentication component and configured to enable a user to access the host network; and providing an authentication database communicatively linked to the host network and containing user information that can be used to authenticate a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of providing an authentication system for providing authentication for users who desire to access the Internet, the method comprising:
-
providing at least one host organization network configured to access the Internet, the host organization network comprising one or more subnets each of which comprising; at least one server configured to receive data packets from individual client computing devices and transmit the data packets to the Internet; and a plurality of public access points each of which configured to receive wireless communication from a user that is using a client computing device to wirelessly transmit data packets that are intended for the Internet and provide the wirelessly transmitted data packets to the one server before the data packets are transmitted to the Internet; and providing at least one globally accessible authentication database that contains information that can be used by the database to authenticate a user without requiring the user to be affiliated with at least one Internet Service Provider (ISP). - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method of providing an authentication system for providing authentication for users who desire to access the Internet, the system comprising:
-
providing multiple wireless nodes through which the Internet can be accessed; providing multiple access points with which the wireless nodes can communicate; providing a server configured to receive wireless communication from the multiple access points, the server configured to enable authentication of various users; and providing at least one global authentication database that contains user information that can be used to authenticate the users without requiring the users to be affiliated with at least one Internet Service Provider (ISP). - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. One or more computer-readable media having computer-readable instructions thereon which, when executed by one or more computers, cause the one or more computer to authenticate a user for Internet access by:
-
establishing a communication link between a mobile computing device and a server that is configured to provide Internet access, wherein the communication link comprises at least one wireless link; contacting a global authentication database that contains user information that can be used to authenticate one or more users; authenticating a user using the information that is contained in the global authentication database, independent of any user affiliation with any Internet Service Providers (ISPs); notifying the server that the user has been authenticated; and issuing a unique token to the user for use when sending data packets to the server for transmission to the Internet. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
-
41. One or more computer-readable media having computer-readable instructions thereon which, when executed by one or more computers, cause the one or more computer to authenticate a user for Internet access by:
-
configuring multiple access points to receive wireless communication from multiple wireless nodes through which the Internet can be accessed, the multiple wireless nodes being capable of communicating data packets that are intended for transmission to the Internet; configuring a server to wirelessly receive the data packets that are communicated to the multiple access points; and configuring a globally accessible database that includes information that can be used to authenticate one or more users that desire to access the Internet, authentication taking place in a manner that does not require the one or more users to be affiliated with at least one Internet Service Provider (ISP). - View Dependent Claims (42, 43, 44, 45, 46, 47)
-
Specification