Method and apparatus for authenticating users of an emergency communication network
First Claim
1. A method of providing access to an emergency communication network, the method comprising the steps of:
- authenticating a user to authorize the user to access a public communication network, the emergency communication network being implemented as a priority access system to the public communication network to enable authorized users of the emergency communication network to obtain preferential access to network resources of the public communication network during an emergency ahead of non-authorized users, the preferential access enabling the authorized user to place or receive telephone calls on the public communication network or to initiate a request for data over the public communication network;
collecting multiple authentication factors associated with the user, no single factor being sufficient to authenticate the user sufficiently to enable the user to access the emergency communication network;
applying the multiple authentication factors to a weighted authentication process; and
determining, from the weighted authentication process, a level of access to the emergency communication network to be provided to the user.
6 Assignments
0 Petitions
Accused Products
Abstract
An authentication system is configured to weight multiple available network supplied and user supplied authentication factors to determine whether a user should be provided with access to an Emergency Communication Network (ECN). The multiple factors may include the location of the user, MIN, short PIN, token, biometric information, and other information. The level of access to be provided to the user may be tiered based on the authentication level achieved during the weighting process. Authentication information may be shared between groups of individuals, so that the authentication requirements for group members may be reduced as other members of the group supply authentication information to the ECN. Group authentication may be used to enable group services such as conferencing and push-to-talk to be set up automatically for the group.
64 Citations
18 Claims
-
1. A method of providing access to an emergency communication network, the method comprising the steps of:
-
authenticating a user to authorize the user to access a public communication network, the emergency communication network being implemented as a priority access system to the public communication network to enable authorized users of the emergency communication network to obtain preferential access to network resources of the public communication network during an emergency ahead of non-authorized users, the preferential access enabling the authorized user to place or receive telephone calls on the public communication network or to initiate a request for data over the public communication network; collecting multiple authentication factors associated with the user, no single factor being sufficient to authenticate the user sufficiently to enable the user to access the emergency communication network; applying the multiple authentication factors to a weighted authentication process; and determining, from the weighted authentication process, a level of access to the emergency communication network to be provided to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of enabling in-bound calls to an emergency communication network, the method comprising the steps of:
-
receiving, by the emergency communication network, authentication information associated with an authorized user of the emergency communication network, the emergency communication network being implemented as a priority access system to a public communication network to enable authorized users of the emergency communication network to obtain preferential access to network resources on the public communication network during an emergency ahead of non-authorized users; associating, by the emergency communication network, telephone information with the authorized user; receiving, by the emergency communication network, a setup request from a second user, the setup request identifying the authorized user of the emergency communication network and requesting establishment of a communication session with the authorized user of the emergency communication network; and enabling the communication session associated with the setup request to be established using at least some of the resources associated with the emergency communication network based on the authentication information associated with the authorized user without requiring the second user to authenticate with the emergency communication network or have authorization to use the emergency communication network.
-
-
14. A method of authenticating a group of users of an emergency communication network, the method comprising the steps of:
-
authenticating a plurality of users to authorize each of the plurality of users to access a public communication network, the emergency communication network being implemented as a priority access system to the public communication network to enable authorized users of the emergency communication network to obtain preferential access to network resources of the public communication network during an emergency ahead of non-authorized users; establishing a group association between a plurality of potential users of the emergency communication network; receiving authentication information from at least one of the potential users of the group association in connection with a request for access by the at least one potential user to the emergency communication network; authenticating the at least one of the potential users using the authentication information on the emergency communication network; and using the authentication information from the at least one of the potential users in connection with authenticating other potential users of the emergency communication network; wherein the step of using the authentication information comprises using the authentication information in a weighted authentication process; and wherein the step of authenticating the at least one of the potential users using the authentication information further comprises enabling access to the emergency communication network for the potential users in the group association without requiring authentication by the other potential users. - View Dependent Claims (15, 16, 17, 18)
-
Specification