Self-managed network access using localized access management
First Claim
1. A method for managing network access of a computing device, which is capable of communicating via one or more networks, where trusted enforcement of the access occurs at the device, comprising the steps of:
- providing software adapted to be installed in the device, the software configured to communicate with a secure tamper-resistant physical token operatively coupled to, local to and removably attachable to the device;
storing a network access parameter in memory of said secure tamper-resistant physical token, said network access parameter being associated with a first network, said secure tamper-resistant physical token comprising a processor configured to execute an application, said application configured to determine if said network access parameter has been met or exceeded; and
granting the device access to the first network if the application determines that the network access parameter has not been met or exceeded.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a method and system for locally tracking network usage and enforcing usage plans at a client device. In an embodiment of the invention, a unique physical key, or token, is installed at a client device of one or more networks. The key comprises a usage application and one or more access parameters designated the conditions and/or limits of a particular network usage plan. Upon initial connection to the network, the usage application grants or denies access to the network based on an analysis of the current values of the access parameters. Therefore, network usage tracking and enforcement is made simple and automatic without requiring any back-end servers on the network while still providing ultimate flexibility in changing billing plans for any number of users at any time.
-
Citations
21 Claims
-
1. A method for managing network access of a computing device, which is capable of communicating via one or more networks, where trusted enforcement of the access occurs at the device, comprising the steps of:
-
providing software adapted to be installed in the device, the software configured to communicate with a secure tamper-resistant physical token operatively coupled to, local to and removably attachable to the device; storing a network access parameter in memory of said secure tamper-resistant physical token, said network access parameter being associated with a first network, said secure tamper-resistant physical token comprising a processor configured to execute an application, said application configured to determine if said network access parameter has been met or exceeded; and granting the device access to the first network if the application determines that the network access parameter has not been met or exceeded. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for managing network access of a computing device, which is capable of communicating via one or more networks, where trusted enforcement of the access occurs at the device, the system comprising:
-
a secure tamper-resistant physical token operatively coupled to, local to and removably attachable to the device; and software adapted to be installed in the device, the software configured to communicate with said secure tamper-resistant physical token, said physical token comprising; a communications interface for communicating data to and from said physical token; a storage including at least one access parameter associated with a first network; and a processor configured to execute an application, said application configured to determine if said access parameter has been met or exceeded, whereby the device is granted access to the first network if said access parameter has not been met or exceeded. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification