×

Methods, systems and computer program products for managing third party access to a wireless network by a network owner

  • US 8,130,734 B2
  • Filed: 01/19/2007
  • Issued: 03/06/2012
  • Est. Priority Date: 01/19/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of managing access to a wireless local area network, comprising:

  • establishing a communication between a first software intelligent agent and a second software intelligent agent via the wireless local area network, the first software intelligent agent internal to the wireless local area network and the second software intelligent agent associated with a cognitive radio-enabled communications device, the cognitive radio-enabled communications device external to, and within range of, the wireless local area network;

    retrieving a first set of user-configured settings established for designating terms of use of the wireless local area network, the first set of user-configured settings established by, and retrieved via, the first software intelligent agent, the terms of use including time of day based network usage restrictions for the cognitive radio-enabled communications device;

    retrieving a second set of user-configured settings for designating terms of use of the wireless local area network, the second set of user-configured settings established by the second software intelligent agent;

    presenting the terms of use to the second software intelligent agent, and the terms of use established via the second software intelligent agent to the first software intelligent agent; and

    providing the cognitive radio-enabled communications device with access to the wireless local area network upon acceptance of the terms of use by the second software intelligent agent, the acceptance generated from the cognitive radio-enabled communications device automatically based upon configuration capabilities of the cognitive radio-enabled communications device;

    wherein the access is subject to the first set of user-configured settings, and is implemented in response to acceptance, by the first software intelligent agent, of the terms of use established by the second software intelligent agent.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×