Telecommunications network and method for time-based network access
DC CAFCFirst Claim
1. A telecommunications network configured for providing access to a plurality of terminals, each terminal associated with a unique identifier for accessing the telecommunications network, wherein the telecommunications network comprises:
- a register configured to store the unique identifier of at least one terminal in combination with identification of at least one associated grant access time interval, the at least one associated grant access time interval being a time period during which telecommunications network access for the terminal is permitted;
one or more processors;
memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including;
an access request operation to receive an access request from the terminal and to determine the unique identifier associated with the terminal;
an access operation to deny access for the terminal if the access request is received outside the time period,wherein the telecommunications network is further configured to monitor a network load of the telecommunications network,wherein the telecommunications network is further configured to adapt the time period depending on the monitored network load, andwherein machine-to-machine applications are executed, and wherein the plurality of terminals for the machine-to-machine applications are denied access to the telecommunications network during peak load time intervals, the time period being outside peak load time intervals.
2 Assignments
Litigations
4 Petitions
Accused Products
Abstract
The invention relates to a telecommunications network configured for providing access to a plurality of terminals is proposed and a method therefore. Each terminal comprises a unique identifier for accessing the telecommunications network. The telecommunications network comprises a register, an access request receiver and an access module. The register is configured for storing the unique identifier of at least one terminal in combination with at least one grant access time interval, or an equivalent thereof, during which access for the terminal is permitted. The access request receiver is configured for receiving the access request and the unique identifier for accessing the telecommunications network from the terminal. The access module is configured for denying access for the terminal if the access request is received outside the time interval, or the equivalent thereof.
22 Citations
36 Claims
-
1. A telecommunications network configured for providing access to a plurality of terminals, each terminal associated with a unique identifier for accessing the telecommunications network, wherein the telecommunications network comprises:
-
a register configured to store the unique identifier of at least one terminal in combination with identification of at least one associated grant access time interval, the at least one associated grant access time interval being a time period during which telecommunications network access for the terminal is permitted; one or more processors; memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including; an access request operation to receive an access request from the terminal and to determine the unique identifier associated with the terminal; an access operation to deny access for the terminal if the access request is received outside the time period, wherein the telecommunications network is further configured to monitor a network load of the telecommunications network, wherein the telecommunications network is further configured to adapt the time period depending on the monitored network load, and wherein machine-to-machine applications are executed, and wherein the plurality of terminals for the machine-to-machine applications are denied access to the telecommunications network during peak load time intervals, the time period being outside peak load time intervals. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 36)
-
-
15. A computer-implemented method of controlling access to a telecommunications network, the telecommunications network being configured for allowing access for a plurality of terminals, each terminal associated with a unique identifier for accessing the telecommunications network, the telecommunications network comprising a register configured to store a first unique identifier associated with a terminal in combination with identification of at least one associated grant access time interval, the at least one associated grant access time interval being a time period during which access for the terminal is permitted, the method comprising the steps of:
-
receiving an access request and the unique identifier from the terminal for access to the telecommunications network; accessing the associated time period using the unique identifier; denying the terminal access to the telecommunications network responsive to the access request being received outside the time period; monitoring a network load of the telecommunications network; and adapting the time period depending on the monitored network load, wherein machine-to-machine applications are executed, and wherein the plurality of terminals for the machine-to-machine applications are denied access to the telecommunications network during peak load time intervals, the time period being outside peak load time intervals. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A tangible, non-transitory computer-readable medium having instructions stored thereon that, when executed by one or more processors of a telecommunications network device of a telecommunications network, cause the telecommunications network device to perform operations comprising:
-
receiving an access request and unique identifier from a terminal for access to the telecommunications network; accessing, using the unique identifier, an identification of at least one associated grant access time interval, the at least one associated grant access time interval being a time period during which access for the terminal is permitted; denying the terminal access to the telecommunications network responsive to the access request being received outside the time period defined by the accessed identification of the at least one associated grant access time interval; monitoring a network load of the telecommunications network; adapting the time period depending on the monitored network load; and denying access to the telecommunications network to one or more terminals attempting to engage in machine-to-machine applications during peak load time intervals, the time period being outside peak load time intervals.
-
-
31. A telecommunications network configured for providing access to a plurality of terminals, each terminal associated with a unique identifier for accessing the telecommunications network, wherein the telecommunications network comprises:
-
a register configured to store the unique identifier of at least one terminal in combination with identification of at least one associated deny access time interval, the at least one associated deny access time interval being a time period during which telecommunications network access for the terminal is denied; one or more processors; memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including; an access request operation to receive an access request from the terminal and to receive or determine the unique identifier associated with the terminal; an access operation to deny access for the terminal if the access request is received within the time period, wherein the telecommunications network is further configured to monitor a network load of the telecommunications network, wherein the telecommunications network is further configured to adapt the time period depending on the monitored network load, and wherein machine-to-machine applications are executed, and wherein the plurality of terminals for the machine-to-machine applications are denied access to the telecommunications network during peak load time intervals, the time period being within peak load time intervals.
-
-
32. A computer-implemented method of controlling access to a telecommunications network, the telecommunications network being configured for allowing access for a plurality of terminals, each terminal associated with a unique identifier for accessing the telecommunications network, the telecommunications network comprising a register configured to store a first unique identifier associated with a terminal in combination with at least one associated deny access time interval, the at least one associated deny access time interval being a time period during which access for the terminal is denied, the method comprising the steps of:
-
receiving an access request and the unique identifier from the terminal for access to the telecommunications network; accessing the identification of at least one associated deny access time interval using the unique identifier; denying the terminal access to the telecommunications network responsive to the access request being received within the time period defined by the accessed identification of at least one associated deny access time interval; monitoring a network load of the telecommunications network; and adapting the time period depending on the monitored network load, wherein machine-to-machine applications are executed, and wherein the plurality of terminals for the machine-to-machine applications are denied access to the telecommunications network during peak load time intervals, the time period being within peak load time intervals.
-
-
33. A tangible, non-transitory computer-readable medium having instructions stored thereon that, when executed by one or more processors of a telecommunications network device of a telecommunications network, cause the telecommunications network device to perform operations comprising:
-
receiving an access request and unique identifier from a terminal for access to the telecommunications network; accessing, using the unique identifier, an identification of at least one associated deny access time interval, the at least one associated deny access time interval being a time period during which access for the terminal is denied; denying the terminal access to the telecommunications network responsive to the access request being received within the time period defined by the accessed identification of at least one associated deny access time interval; monitoring a network load of the telecommunications network; adapting the time period depending on the monitored network load; and denying access to the telecommunications network to one or more terminals attempting to engage in machine-to-machine applications during peak load time intervals, the time period being within peak load time intervals.
-
-
34. A terminal for use in a telecommunications network, wherein the telecommunications network is configured for providing access to a plurality of terminals, each terminal being associated with a unique identifier for accessing the telecommunications network,
wherein the terminal comprises a message receiver configured for receiving a message from the telecommunications network, the message comprising information relating to a grant access time interval, the grant access time interval being a time period during which telecommunications network access for the terminal is permitted, wherein the time period is adapted by the telecommunications network depending on a monitored network load, and wherein the terminal further comprises one or more processors, and memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including: -
an access request operation for transmitting an access request to the telecommunications network in accordance with the grant access time interval, wherein machine-to-machine applications are executed in the telecommunications network, and wherein the terminal for the machine-to-machine applications are denied access to the telecommunications network during peak load time intervals, the time period being outside peak load time intervals.
-
-
35. A terminal for use in a telecommunications network, wherein the telecommunications network is configured for providing access to a plurality of terminals, each terminal being associated with a unique identifier for accessing the telecommunications network,
wherein the terminal comprises a message receiver configured for receiving a message from the telecommunications network, the message comprising information relating to a deny access time interval, the deny access time interval being a time period during which telecommunications network access for the terminal is denied, wherein the time period is adapted by the telecommunications network depending on a monitored network load, and wherein the terminal further comprises one or more processors, and memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including: -
an access request operation for transmitting an access request to the telecommunications network in accordance with the deny access time interval, wherein machine-to-machine applications are executed in the telecommunications network, and wherein the terminal for the machine-to-machine applications are denied access to the telecommunications network during peak load time intervals, the time period being within peak load time intervals.
-
Specification