Systems and methods for creating a wireless network
First Claim
1. A method of providing network access, comprising:
- receiving a first request from a first wireless device to access a network via a first wireless access point at a first customer premises operated by a first operator, wherein the first wireless device is registered with the first operator;
forwarding the first request from the first wireless access point to a gateway located within the network, wherein the gateway is located at a location different from the first customer premises;
at the gateway, determining to provide the first wireless device access to the network and recording information about the first wireless device;
transmitting a set of data from the first wireless access point to the network, wherein the set of data includes data from the first wireless device and data from a second wireless device, and wherein the second wireless device is not registered with the first operator;
recognizing undesirable activity by the first wireless device and recording information at the gateway that identifies the first wireless device as a suspicious device;
receiving a second request from the first wireless device to access the network via a second wireless access point at a second customer premises operated by a second operator;
forwarding the second request from the second wireless access point to the gateway, wherein the gateway is located at a location different from the second customer premises; and
at the gateway, determining to deny access to the network by the first wireless device based on the identification of the first wireless device as a suspicious wireless device.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for transferring information are described herein. Some of the systems include one or more wireless access points providing access to a network for wireless client devices. In addition, the systems can include a modem coupling the wireless access point(s) to a network that includes a central gateway operable to authorize access to the network via the wireless access point. In some cases, the wireless access point is located at a customer premises. Various methods are also described for transferring information over a wireless network. Such methods can include receiving a request from a wireless client device at a central gateway via a wireless access point located at a customer premises, and authorizing access to a network associated with the central gateway. Other methods can include receiving multiple requests from the same wireless client device via different access points as the wireless client device moves from location to location.
36 Citations
16 Claims
-
1. A method of providing network access, comprising:
-
receiving a first request from a first wireless device to access a network via a first wireless access point at a first customer premises operated by a first operator, wherein the first wireless device is registered with the first operator; forwarding the first request from the first wireless access point to a gateway located within the network, wherein the gateway is located at a location different from the first customer premises; at the gateway, determining to provide the first wireless device access to the network and recording information about the first wireless device; transmitting a set of data from the first wireless access point to the network, wherein the set of data includes data from the first wireless device and data from a second wireless device, and wherein the second wireless device is not registered with the first operator; recognizing undesirable activity by the first wireless device and recording information at the gateway that identifies the first wireless device as a suspicious device; receiving a second request from the first wireless device to access the network via a second wireless access point at a second customer premises operated by a second operator; forwarding the second request from the second wireless access point to the gateway, wherein the gateway is located at a location different from the second customer premises; and at the gateway, determining to deny access to the network by the first wireless device based on the identification of the first wireless device as a suspicious wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for providing network access, comprising:
-
a first wireless access point, wherein; the first wireless access point is located at a first customer premises operated by a first operator; the first wireless access point is configured to receive a first request from a first wireless device to access a network via the first wireless access point, wherein the first wireless device is registered with the first operator; and the first wireless access point is further configured to transmit a set of data from the first wireless access point to the network, wherein the set of data includes data from the first wireless device and data from a second wireless device, and wherein the second wireless device is not registered with the first operator; a second wireless access point, wherein; the second wireless access point is located at a second customer premises operated by a second operator; and the second wireless access point is configured to receive a second request from the first wireless device to access the network via a second wireless access point; and a gateway, wherein; the gateway is located within the network; the gateway is located at a location different from the first customer premises and the second customer premises; the gateway is configured to receive the first request from the first wireless access point; the gateway is further configured to determine whether to provide the first wireless device access to the network and record information about the first wireless device; the gateway is further configured to recognize undesirable activity by the first wireless device via the first wireless access point and record information at the gateway that identifies the first wireless device as a suspicious device; the gateway is further configured to receive the second request from the second wireless access point; and the gateway is further configured to determine to deny access to the network via the second wireless access point by the first wireless device based on the identification of the first wireless device as a suspicious wireless device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification