Wireless network service provision method and system
First Claim
Patent Images
1. A method, comprising:
- performing, by a system comprising a processor, authentication on an object entering a first area, wherein the object is determined to be entering the first area based on determining a location of the object, wherein the determining the location is performed based on information obtained from a signal received from the object, and wherein the signal is determined to have been generated in response to an input received by the system via a determined signal interface, wherein the first area is a physical space where a specific function or action occurs, the specific function or action being intended for a purpose other than authentication of the object to a network service, wherein the object obtains automatic authorization to a network service in the first area after the object successfully completes the specific function or action in the first area; and
in response to the object passing the authentication in the first area being determined to have entered a second area, authorizing the object to obtain a network service in the second area.
1 Assignment
0 Petitions
Accused Products
Abstract
Provision of a wireless network service is described in relation to network security. Automatic authentication is performed on an object entering a first area, and when the object passing the authentication in the first area enters a second area, the object is authorized to obtain a network service. An area (e.g., a first area) where a Wireless Local Area Network (WLAN) is used securely is divided, so that after an object device completes automatic authentication in this area, to the object can be directly authorized in a larger area (a second area) to obtain the network service. In this case, both security and convenience of use of the WLAN are considered.
-
Citations
37 Claims
-
1. A method, comprising:
-
performing, by a system comprising a processor, authentication on an object entering a first area, wherein the object is determined to be entering the first area based on determining a location of the object, wherein the determining the location is performed based on information obtained from a signal received from the object, and wherein the signal is determined to have been generated in response to an input received by the system via a determined signal interface, wherein the first area is a physical space where a specific function or action occurs, the specific function or action being intended for a purpose other than authentication of the object to a network service, wherein the object obtains automatic authorization to a network service in the first area after the object successfully completes the specific function or action in the first area; and in response to the object passing the authentication in the first area being determined to have entered a second area, authorizing the object to obtain a network service in the second area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system, comprising:
-
a memory to store executable components; and a processor, coupled to the memory, that executes or facilitates execution of the executable components, the executable components comprising; in response to receiving, by the processor, a signal from an object, determining, by the processor, an object location based on information determined from the signal, wherein the signal is received by the processor via a signal interface; and an authentication module configured to perform authentication on the object entering a first area, and authorize the object passing the authentication in the first area to obtain a network service in a second area, wherein the object is determined to enter the first area based on the object location, wherein the first area is a physical space where a specific function or action occurs, the specific function or action being intended for a purpose other than authentication of the object to a network service, wherein the object obtains automatic authorization to a network service in the first area after the object successfully completes the specific function or action in the first area. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A non-transitory computer readable storage device comprising executable instructions that, in response to execution, cause a system comprising a processor to perform operations, comprising:
-
in response to receiving a signal from an object via a signal interface, determining a location of the object and determining that the object is entering a first area; authenticating the object in response to the object being determined to be entering the first area, wherein the first area is a physical space where a specific function or action occurs, the specific function or action being intended for a purpose other than authentication of the object to a network service, wherein the object obtains automatic authorization to a network service in the first area after the object successfully completes the specific function or action in the first area; and in response to the object passing the authenticating in the first area being determined to have entered a second area, authorizing the object to obtain a network service in the second area. - View Dependent Claims (36)
-
-
37. A system, comprising:
-
a processor, coupled to a memory that stores executable instructions, that executes or facilitates execution of the executable instructions to at least; perform authentication on an object that is determined to be entering a first area based on a location of the object, wherein the location of the object is determined based on information obtained from a signal received via a signal interface, wherein the first area is a physical space where a specific function or action occurs, the specific function or action being intended for a purpose other than authentication of the object to a network service, wherein the object obtains automatic authorization to a network service in the first area after the object successfully completes the specific function or action in the first area; and authorize the object to obtain a network service in a second area in response to the object being determined to be authenticated to the first area and in response to the object being determined to have entered the second area.
-
Specification