Intelligent network access controller and method
First Claim
1. An intelligent network access controller (INAC), tangibly embodying a program of instructions readable by the INAC to perform steps of a process that creates a local wireless network and that dynamically controls access by wireless devices to a macro wireless network overlaying or underlying the local wireless network, the steps, comprising:
- registering the wireless devices, wherein the devices are identified and classified, and wherein the devices comprise one of allowed, restricted, and unknown;
dynamically determining characteristic values of the devices;
dynamically granting access by the devices to the macro network based on the dynamically determined characteristics of the devices; and
locking devices to the local wireless network based on the dynamically determined characteristics.
1 Assignment
0 Petitions
Accused Products
Abstract
An intelligent network access controller for use with a wireless network that provides communications services to subscribers having wireless communications devices includes a multi-protocol interface for receiving and sending digital messaging by the wireless communications devices; an identification module that determines an identity of a wireless communications device; an access module that receives the identity and determines an access level for the wireless communications device; and a locking module that locks selected wireless communications devices to the controller based on the determined access level.
-
Citations
35 Claims
-
1. An intelligent network access controller (INAC), tangibly embodying a program of instructions readable by the INAC to perform steps of a process that creates a local wireless network and that dynamically controls access by wireless devices to a macro wireless network overlaying or underlying the local wireless network, the steps, comprising:
-
registering the wireless devices, wherein the devices are identified and classified, and wherein the devices comprise one of allowed, restricted, and unknown; dynamically determining characteristic values of the devices; dynamically granting access by the devices to the macro network based on the dynamically determined characteristics of the devices; and locking devices to the local wireless network based on the dynamically determined characteristics. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method for controlling access by wireless devices to a macro wireless network, comprising the steps of:
-
establishing a local wireless network having a determined RF coverage area as an overlay to the macro wireless network; detecting when the devices enter the RF coverage area of the local wireless network; dynamically determining one or more characteristics of the devices and one or more characteristics of the RF coverage area; and based on the dynamically determined characteristics, either; locking the devices to the local wireless network, or passing the devices to the macro wireless network. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A system for controlling access to existing wireless networks, comprising:
-
RF signal generation equipment that creates a local RF signal receivable by wireless devices, whereby a local wireless network is created; and a controller, implemented on a suitably programmed processor coupled to the RF signal generation equipment, comprising; a location module that creates a limited coverage volume of the local wireless network, wherein the limited coverage volume is a volume less than the effective coverage volume of the local wireless network, an identity module that identifies wireless devices within the limited coverage volume of the local wireless network, an access module that determines a level of access to the existing wireless network, wherein the levels of access comprise one of allowed and blocked, and a locking module that locks wireless devices with a blocked level of access to the local wireless network when the devices with the blocked level of access are within the limited coverage volume of the local wireless network. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification