Method for post-authenticating user equipment, controller and network system
First Claim
1. A method for post-authenticating at least one user equipment, adapted to a controller connected to at least one gateway, comprising:
- the at least one user equipment is connected to at least an access point, determining whether an external channel quality of the at least one gateway is higher than a threshold;
incompletely authenticating the at least one user equipment, and controlling the at least one access point to provide the at least one user equipment with a limited network access ability, wherein the external channel quality is not higher than the threshold;
estimating a future channel capacity of the at least one gateway;
calculating a priority weight of each user equipment of the at least one user equipment according to the user equipment'"'"'s an authentication waiting time, a number of authentication failures and at least one hop count between the at least one access point and the at least one gateway; and
selecting at least one candidate user equipment from the at least one user equipment based on the future channel capacity and the priority weight of the at least one candidate user equipment, and arranging a corresponding authentication mechanism for completely authenticating the at least one candidate user equipment at a time corresponding to the future channel capacity.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for post-authenticating user equipment (UE), a controller and a network system are disclosed. The method includes: determining whether an external channel quality of at least one gateway is higher than a threshold when UE connects to an access point (AP) routed by the gateway; when the external channel quality is not higher than the threshold, authenticating the UE incompletely and controlling the AP to limit a network capability providing to the UE; estimating a future channel capacity of the gateway; calculating a priority weight of each UE; selecting candidate UE from the UEs according to the future channel capacity and the priority weight of each UE; arranging an authenticating mechanism for completely authenticating the candidate UE at a timing point corresponding to the future channel capacity.
15 Citations
33 Claims
-
1. A method for post-authenticating at least one user equipment, adapted to a controller connected to at least one gateway, comprising:
-
the at least one user equipment is connected to at least an access point, determining whether an external channel quality of the at least one gateway is higher than a threshold; incompletely authenticating the at least one user equipment, and controlling the at least one access point to provide the at least one user equipment with a limited network access ability, wherein the external channel quality is not higher than the threshold; estimating a future channel capacity of the at least one gateway; calculating a priority weight of each user equipment of the at least one user equipment according to the user equipment'"'"'s an authentication waiting time, a number of authentication failures and at least one hop count between the at least one access point and the at least one gateway; and selecting at least one candidate user equipment from the at least one user equipment based on the future channel capacity and the priority weight of the at least one candidate user equipment, and arranging a corresponding authentication mechanism for completely authenticating the at least one candidate user equipment at a time corresponding to the future channel capacity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A controller, comprising:
-
a storage unit, storing multiple modules; and a processing unit, connected to the storage unit, accessing and executing the multiple modules, the multiple modules include; a determining module, determining whether an external channel quality of at least one gateway is higher than a threshold, wherein at least one user equipment is connected to at least one access point through the at least one gateway; a controlling module, incompletely authenticating the at least one user equipment, wherein the external channel quality is not higher than the threshold, and controlling the at least one access point to provide the at least one user equipment with a limited network access ability; an estimating module, estimating a future channel capacity of the at least one gateway; a calculating module, calculating a priority weight of each user equipment of the at least one user equipment according to the user equipment'"'"'s an authentication waiting time, a number of authentication failures and at least one hop count between the at least one access point and at least one gateway; and a selecting module, selecting at least one candidate user equipment from the at least one user equipment based on the future channel capacity and the priority weight of the at least one candidate user equipment, and arranging a corresponding authentication mechanism for completely authenticating the at least one candidate user equipment at a time corresponding to the future channel capacity. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A network system, comprising:
-
at least one gateway; at least one access point, connected to the at least one gateway to access a network; and a controller, connected to the at least one gateway and the at least one access point, wherein at least one user equipment is connected to the at least one access point through the at least one gateway, and the controller further including; to determine whether an external channel quality of the at least one gateway is higher than a threshold; to incompletely authenticate the at least one user equipment, and control the at least one access point to provide the at least one user equipment with a limited network access ability, wherein the external channel quality is not higher than the threshold; to estimate a future channel capacity of the at least one gateway; to calculate a priority weight of each user equipment of the at least one user equipment according to the user equipment'"'"'s an authentication waiting time, a number of authentication failures and at least one hop count between the at least one access point and at least one gateway; and to select at least one candidate user equipment from the at least one user equipment based on the future channel capacity and the priority weight of the at least one candidate user equipment, and to arrange a corresponding authentication mechanism for completely authenticating the at least one candidate user equipment at a time corresponding to the future channel capacity. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification