Relating to communications
First Claim
1. A method of controlling access to a communication network, comprising:
- receiving a request from a communication device to connect to the communication network, the request including a substantially unique identifier of the communication device;
determining whether the identifier is contained in a local device database of the network; and
where the identifier is not contained in the local device database;
authorizing the communication device to connect to the network;
at a subsequent update of the local device database, determining a status of the identifier from a shared device database; and
updating the status of the identifier in the local device database, wherein the local device database comprises;
a white-list of device identifiers authorized to connect to the network;
a black list of device identifiers not authorized to connect to the network; and
a gray-list of device identifiers authorized to connect to the network but to be monitored;
in which authorizing the communication device to connect to the network comprises determining whether the communication device is authorized to connect to the network by way of the identifier.
3 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment of present invention, there is provided a method of controlling access to a communication network. The method includes receiving a request from a communication device to connect to the communication network, the request including a substantially unique identifier of the device, and determining whether the identifier is contained in a local device database of the network. Where it is determined that the identifier is not contained in the local database, the method further includes authorizing the device to connect to the network, and at a subsequent update of the local device database, determining the status of the identifier from a shared device database, and updating the status of the determined identifier in the local device database with the determined status.
-
Citations
17 Claims
-
1. A method of controlling access to a communication network, comprising:
-
receiving a request from a communication device to connect to the communication network, the request including a substantially unique identifier of the communication device; determining whether the identifier is contained in a local device database of the network; and where the identifier is not contained in the local device database;
authorizing the communication device to connect to the network;at a subsequent update of the local device database, determining a status of the identifier from a shared device database; and updating the status of the identifier in the local device database, wherein the local device database comprises; a white-list of device identifiers authorized to connect to the network; a black list of device identifiers not authorized to connect to the network; and
a gray-list of device identifiers authorized to connect to the network but to be monitored;in which authorizing the communication device to connect to the network comprises determining whether the communication device is authorized to connect to the network by way of the identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A communication system, comprising:
-
a processor; and a data storage device communicatively coupled to the processor, the data storage device comprising computer executable code that, when executed by the at least one processor, causes the at least one processor to; receive a request from a communication device to connect to the communication network, the request including a substantially unique identifier of the communication device; determine whether the identifier is contained in a local device database of the network; and where the identifier is not contained in the local device database; authorize the communication device to connect to the network; at a subsequent update of the local device database, determine a status of the identifier from a shared device database; and update the status of the identifier in the local device database, wherein the local device database comprises; a white-list of device identifiers authorized to connect to the network; a black list of device identifiers not authorized to connect to the network; and a gray-list of device identifiers authorized to connect to the network but to be monitored; in which authorizing the communication device to connect to the network comprises determining whether the communication device is authorized to connect to the network by way of the identifier. - View Dependent Claims (10, 11, 12)
-
-
13. A communication system comprising:
- an equipment identity register (EIR); and
a data storage device communicatively coupled to the EIR comprising; a database of a number of equipment identity register (EIR) entries, the EIR entries comprising a number of international mobile equipment identities (IMEIs), in which, if an IMEI is not contained in the database upon receipt of a request from a communication device to connect to a communication network, the communication system;
authorizes the communication device to connect to the network;at a subsequent update of the EIR, determines a status of the IMEI from the database; and updates the status of the identifier in the EIR and handles future connection of the communication device to the network according to the updated status of the identifier, wherein the database comprises; a white-list of IMEIs authorized to connect to the network; a black list of IMEIs not authorized to connect to the network; and a gray-list of IMEIs authorized to connect to the network but to be monitored; in which authorizing the communication device to connect to the network comprises determining whether the communication device is authorized to connect to the network by way of the IMEI. - View Dependent Claims (14, 15, 16, 17)
- an equipment identity register (EIR); and
Specification