Server-paid internet access service
First Claim
Patent Images
1. A method of operating an access point, comprising:
- receiving a first request from a device associated with a user to access a first web server operated by a first entity that has agreed with a second entity operating the access point to incur costs associated with a connection to a network provided by the access point;
sending a response to the device associated with the user including an address of an authentication program running on a secure port of a second web server different from the first web server, wherein the response causes the device associated with the user to securely communicate with the secure port for a period of time sufficient for the device associated with the user to attempt to be authenticated via the authentication program, wherein the second web server provides a one-time encryption key to the device associated with the user via the secure port such that the second entity associated with the access point is unable to access the one-time encryption key;
receiving an acknowledgment indicative of a result of the attempt to be authenticated via the authentication program; and
when the received acknowledgement indicates that the device associated with the user is authentic, operating an access controller of the access point to route traffic to and from the device associated with the user based on an access control profile associated with the first web server.
3 Assignments
0 Petitions
Accused Products
Abstract
An embodiment of a system for providing Internet access free of charge to a user utilizes an Internet service provider for connecting a user to the Internet, a zone creation means, and a zone organizer. Free zones of servers are created, wherein the free zones are groups of at least one server to which at least one user can connect. The zone organizer can be in communication with the ISP. The zone organizer can be a traffic monitor, a traffic controller, an authentication protocol, a bookkeeping protocol, a fee collection and dispersal module, and/or an indexing and listing function.
51 Citations
18 Claims
-
1. A method of operating an access point, comprising:
-
receiving a first request from a device associated with a user to access a first web server operated by a first entity that has agreed with a second entity operating the access point to incur costs associated with a connection to a network provided by the access point; sending a response to the device associated with the user including an address of an authentication program running on a secure port of a second web server different from the first web server, wherein the response causes the device associated with the user to securely communicate with the secure port for a period of time sufficient for the device associated with the user to attempt to be authenticated via the authentication program, wherein the second web server provides a one-time encryption key to the device associated with the user via the secure port such that the second entity associated with the access point is unable to access the one-time encryption key; receiving an acknowledgment indicative of a result of the attempt to be authenticated via the authentication program; and when the received acknowledgement indicates that the device associated with the user is authentic, operating an access controller of the access point to route traffic to and from the device associated with the user based on an access control profile associated with the first web server. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable medium comprising instructions stored thereon that, when executed, cause a machine to at least:
-
receive a first request from a device associated with a user to access a first web server operated by a first entity that has agreed with a second entity operating an access point to incur costs associated with a connection to a network provided by the access point; send a response to the device associated with the user including an address of an authentication program running on a secure port of a second web server, wherein the response causes the device associated with the user to securely communicate with the secure port to attempt to be authenticated via the authentication program, wherein the second web server provides a one-time encryption key to the device associated with the user via the secure port such that the second entity associated with the access point is unable to access the one-time encryption key; receive an acknowledgment indicative of a result of the attempt to be authenticated via the authentication program; and when the received acknowledgement indicates that the device associated with the user is authentic, operate an access controller of the access point to route traffic to and from the device associated with the user based on an access control profile associated with the first web server. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An apparatus having an access point, comprising:
-
a communication interface to receive a first request from a device associated with a user, the first request being to access a first web server operated by a first entity that has agreed with a second entity operating the access point to incur costs associated with a connection to a network provided by the access point, the communication interface to send a response to the device associated with the user including an address of an authentication program running on a secure port of a second web server, wherein the response causes the device associated with the user to securely communicate with the secure port to attempt to be authenticated via the authentication program, wherein the second web server provides a one-time encryption key to the device associated with the user via the secure port such that the second entity associated with the access point is unable to access the one-time encryption key, the communication interface to receive an acknowledgment indicative of a result of the attempt to be authenticated via the authentication program; and an access controller to, when the received acknowledgement indicates that the device associated with the user is authentic, route traffic to and from the device associated with the user based on an access control profile associated with the first web server, the access controller implemented by a processor. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification