System and method for user access to a distributed network communication system using persistent identification of subscribers
First Claim
1. A method for providing access from a first network to a second network coupled to the first network, the method comprising:
- a first network provider sending an embedded file to a plurality of computing devices, wherein the embedded file comprises an identification of a second network provider;
receiving, at a device associated with the first network provider, information from each computing device of the plurality of computing devices coupled to the first network;
determining that the information received from each computing device of the plurality of computing devices comprises the identification of the second network provider;
sending login information to each computing device of the plurality of computing devices, wherein the login information comprises information identifying the second network provider when displayed in a network browser interface of the computing device;
receiving user credentials from each computing device of the plurality of computing devices;
authenticating the user credentials from each computing device of the plurality of computing devices;
determining that the user credentials from each computing device of the plurality of computing devices are authenticated; and
in response to determining that the user credentials from each computing device of the plurality of computing devices are authenticated, granting each computing device of the plurality of computing devices access to the second network through the first network.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for providing network access are disclosed. After connecting to a network at an access point, a user of a computing device registers for network access with a network provider. In response to the registration, the network provider sends a completion page to the computing device. The completion page includes a link to an embedded file such as a small, transparent GIF image. When the computing device retrieves the embedded file, the embedded file is associated with a header than includes an instruction to generate a network system identifier (e.g., a cookie). The network system identifier may be stored by the computing device and later used to identify the computing device as a registrant for network access with the network provider. The embedded file may also be sent at other times, such as after authentication of the user for network access.
102 Citations
48 Claims
-
1. A method for providing access from a first network to a second network coupled to the first network, the method comprising:
-
a first network provider sending an embedded file to a plurality of computing devices, wherein the embedded file comprises an identification of a second network provider; receiving, at a device associated with the first network provider, information from each computing device of the plurality of computing devices coupled to the first network; determining that the information received from each computing device of the plurality of computing devices comprises the identification of the second network provider; sending login information to each computing device of the plurality of computing devices, wherein the login information comprises information identifying the second network provider when displayed in a network browser interface of the computing device; receiving user credentials from each computing device of the plurality of computing devices; authenticating the user credentials from each computing device of the plurality of computing devices; determining that the user credentials from each computing device of the plurality of computing devices are authenticated; and in response to determining that the user credentials from each computing device of the plurality of computing devices are authenticated, granting each computing device of the plurality of computing devices access to the second network through the first network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
a first server associated with a first network provider and configured to send an embedded file to a plurality of computing devices, wherein the embedded file comprises an identification of a second network provider; and a device associated with the first network provider and configured to provide access from a first network to a second network coupled to the first network, the device comprising; a processor; and a memory coupled to the processor; wherein the memory includes instructions executable by the processor, which when executed by the processor, cause the device to perform; receiving, at the device, information from each computing device of the plurality of computing devices coupled to the first network; determining that the information received from each computing device of the plurality of computing devices comprises the identification of the second network provider; sending login information to each computing device of the plurality of computing devices, wherein the login information comprises information identifying the second network provider when displayed in a network browser interface of the computing device; receiving user credentials from each computing device of the plurality of computing devices; authenticating the user credentials from each computing device of the plurality of computing devices; determining that the user credentials from each computing device of the plurality of computing devices are authenticated; and in response to determining that the user credentials from each computing device of the plurality of computing devices are authenticated, granting each computing device of the plurality of computing devices access to the second network through the first network. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer readable memory medium comprising instructions, which when executed on a processing system associated with a first network provider, cause the processing system to perform:
-
receiving, at the processing system, information from each computing device of a plurality of computing devices coupled to a first network, wherein each computing device of a plurality of computing received an embedded file that comprises an identification of a second network provider; determining that the information received from each computing device of the plurality of computing devices comprises the identification of the second network provider; sending login information to each computing device of the plurality of computing devices, wherein the login information comprises information identifying the second network provider when displayed in a network browser interface of the computing device; receiving user credentials from each computing device of the plurality of computing devices; authenticating the user credentials from each computing device of the plurality of computing devices; determining that the user credentials from each computing device of the plurality of computing devices are authenticated; and in response to determining that the user credentials from each computing device of the plurality of computing devices are authenticated, granting each computing device of the plurality of computing devices access to a second network through the first network. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A computer program product, comprising:
-
a first computer readable memory medium comprising first instructions, which when executed on a first processing system associated with a first network provider, cause the first processing system to perform; sending an embedded file to a plurality of computing devices, wherein the embedded file comprises an identification of a second network provider; and a second computer readable memory medium comprising second instructions, which when executed on a second processing system associated with the first network provider, cause the second processing system to perform; receiving, at the second processing system, information from each computing device of the plurality of computing devices coupled to a first network; determining that the information received from each computing device of the plurality of computing devices comprises the identification of the second network provider; sending login information to each computing device of the plurality of computing devices, wherein the login information comprises information identifying the second network provider when displayed in a network browser interface of the computing device; receiving user credentials from each computing device of the plurality of computing devices; authenticating the user credentials from each computing device of the plurality of computing devices; determining that the user credentials from each computing device of the plurality of computing devices are authenticated; and in response to determining that the user credentials from each computing device of the plurality of computing devices are authenticated, granting each computing device of the plurality of computing devices access to a second network through the first network. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
Specification