Method of and system for extending the WISPr authentication procedure
First Claim
1. A method of granting a user access to a wireless network comprising:
- validating credential information of a user device at an Intermediary Authentication System by utilizing a Home Authentication System to generate a set of authentication tools, wherein the user device and Home Authentication System are separate from the Intermediary Authentication System; and
on successfully authenticating the credential information, granting the user device a temporary credential by the Intermediary Authentication System in a credential format of the wireless network, thereby allowing the user device to access the wireless network.
6 Assignments
0 Petitions
Accused Products
Abstract
A method and system for completing the authentication process of a user device in a second communication network (such as Wi-Fi or WiMAX) utilizes the user credential (such as a SIM card, a USIM card, or a RUIM card) of a first communication network (such as GSM, CDMA, EDGE, or LTE). A client, such as a software module, executes on the wireless device. An authentication platform retrieves the SIM card credential information in the first communication network and passes the information to the authentication platform of the second communication network, thereby granting the client access to the second communication after the authentication platform validates with the first communication network.
-
Citations
38 Claims
-
1. A method of granting a user access to a wireless network comprising:
-
validating credential information of a user device at an Intermediary Authentication System by utilizing a Home Authentication System to generate a set of authentication tools, wherein the user device and Home Authentication System are separate from the Intermediary Authentication System; and on successfully authenticating the credential information, granting the user device a temporary credential by the Intermediary Authentication System in a credential format of the wireless network, thereby allowing the user device to access the wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of granting a user device access to a wireless network comprising:
-
detecting with a user device that the wireless network does not include an Intermediary Authentication System in a walled garden; initiating a temporary Internet connection with the wireless network with the Intermediary Authentication System using predefined credential rules recognized by the Intermediary Authentication System; validating user credential information at the Intermediary Authentication System by utilizing a Home Authentication System to generate a set of authentication tools over the temporary Internet connection, wherein the user credential information is separate from the predefined credential rules; on successfully validating the user credential information, granting the user device a temporary credential in a credential format of the wireless network; tearing down the temporary Internet connection; and accessing the wireless network using the temporary credential format. - View Dependent Claims (16, 17, 18)
-
-
19. An Authentication System for completing an authentication and registration procedure in a wireless network by utilizing a user credential of a mobile device, the Authentication System comprising a memory containing computer-executable instructions that when executed by a processor perform a method comprising:
-
receiving identifier information of a user credential associated with a wireless device; communicating with a Home Authentication Server to retrieve challenge vectors; transferring the challenge vectors to a client executing on the wireless device; validating a challenge result from the client, at the Authentication System, against a response from the Home Authentication Server, wherein the Home Authentication Server, the Authentication System, and the wireless network are separate from one another; and granting the wireless device access to the wireless network. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method of authenticating a user comprising:
-
verifying authentication requests from a Wi-Fi network by validating credential information of a user device at an Intermediary Authentication System utilizing a Home Authentication System to generate a set of authentication tools; granting a user device access to the Wi-Fi network by issuing different authorization results; and on receiving accounting requests, generating an accounting record for the user device. - View Dependent Claims (29, 30)
-
-
31. A wireless system comprising one or more computer memories containing computer-executable instructions that when executed by a processor perform a method comprising:
-
detecting that the wireless network does not include an Authentication System in a walled garden; initiating a temporary Internet connection with the wireless network with predefined credential rules recognized by an Authentication Gateway; validating, at the Authentication system, user credential information associated with a user device against a Home Authentication System over the temporary Internet connection, wherein the walled garden, the Authentication System, and the Home Authentication System are separate from one another; on successfully validating the user credential information, granting the user device a temporary credential in a credential format of the wireless network; tearing down the temporary Internet connection; and accessing the wireless network using the temporary credential. - View Dependent Claims (32, 33, 34, 35, 36)
-
-
37. A wireless device comprising a computer memory containing computer-executable instructions that when executed by a processor perform a method comprising:
-
retrieving user identification from a user credential; transferring the user identification to a remote Authentication System; receiving a challenge request from the remote Authentication System; generating a challenge response from the user credential using a challenge parameter as input; transferring the challenge response to the remote Authentication System, wherein the challenge response is validated at the remote Authentication System against a challenge response from a Home Authentication System; receiving an authentication result and an authorization result; and transferring the authentication result to the remote Authentication System, wherein the authentication result is validated against a database on the remote Authentication System. - View Dependent Claims (38)
-
Specification