최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0271099 (2011-10-11) |
등록번호 | US-8613053 (2013-12-17) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 7 인용 특허 : 687 |
Systems and methods of authorizing a portable communication device to access a network resource. In an embodiment, a request to access a network resource is received from a portable communication device via a network. A processor is used to dynamically and selectively determine whether the portable
Systems and methods of authorizing a portable communication device to access a network resource. In an embodiment, a request to access a network resource is received from a portable communication device via a network. A processor is used to dynamically and selectively determine whether the portable communication device is authorized to access the requested network resource. The determination may be based on a unique identifying attribute associated with the portable communication device without the unique identifying attribute being predefined in a user profile database and without querying the portable communication device or its user for information. If the portable communication device is authorized, it may be allowed to access the network resource. Otherwise, it may be redirected to an authentication system where it may be enabled to submit authentication-related information so that it may be authorized to access the requested network resource.
1. A method of authorizing a portable communication device to access a network resource, the method being performed at a network management system in communication with the portable communication device via a network, the method comprising: receiving, from a portable communication device via a netwo
1. A method of authorizing a portable communication device to access a network resource, the method being performed at a network management system in communication with the portable communication device via a network, the method comprising: receiving, from a portable communication device via a network, a request to access a network resource;determining, on a processor, whether the portable communication device is authorized to access the requested network resource, the determination being based on a unique identifying attribute associated with the portable communication device without the unique identifying attribute being predefined in a user profile database and without querying the portable communication device or its user for information;if the portable communication device is authorized, allowing the portable communication device to access the network resource; andif the portable communication device is not authorized, redirecting the portable communication device to an authentication system where the portable communication device is configured to submit authentication-related information wherein the portable communication device can be authorized to access the requested network resource, wherein redirecting the portable communication device comprises sending transmission control protocol handshake completion data to the portable communication device in response to the request to access the network resource, the transmission control protocol handshake completion data configured to appear to be from the network resource, wherein the network management system need not communicate with the network resource if the portable communication device is not authorized. 2. The method of claim 1, wherein the portable communication device is one or more of a laptop, handheld device, personal digital assistant (PDAs) and cellphone. 3. The method of claim 1, wherein the network is located in or forms part of one or more of an airport, hotel and cellular telephone network. 4. The method of claim 1, wherein determining whether the portable communication device is authorized to access the requested network resource does not require additional software to be installed on the portable communication device prior to connection with the network. 5. The method of claim 1, wherein the unique identifying attribute associated with the portable communication device is determined from packets received from the portable communication device. 6. The method of claim 1, wherein the unique identifying attribute uniquely indicates the portable communication device used by the user. 7. The method of claim 6, wherein the unique identifying attribute is the media access control (MAC) address of the portable communication device used by the user. 8. The method of claim 1, further comprising using location information to determine whether the portable communication device is authorized to access the requested network resource. 9. The method of claim 1, further comprising storing information about the portable communication device such that subsequent attempts to access the network do not require the user to establish authorization. 10. The method of claim 1, wherein authorization further comprises determining whether the user of the portable communication device has paid for access and authorizing access if it is determined that the user has paid. 11. The method of claim 1, further comprising using the unique identifying attribute to access information stored in a user profile database. 12. The method of claim 1, wherein the processor is included in a gateway device. 13. A computer implemented network management system configured to authorize a portable communication device to access a network resource, the system comprising: a first network interface configured to receive, from a portable communication device via a network, a request to access a network resource;a first software module that, when implemented on one or more processors, is configured to determine whether the portable communication device is authorized to access the requested network resource, the determination being based on a unique identifying attribute associated with the portable communication device without the unique identifying attribute being predefined in a user profile database and without querying the portable communication device or its user for information;a second software module that, when implemented on one or more processors, is configured to allow the portable communication device to access the requested network resource if the portable communication device is authorized;a third software module that, when implemented on one or more processors, is configured to redirect the portable communication device to an authentication system where the portable communication device is configured to submit authentication-related information wherein the portable communication device can be authorized to access the requested network resource if the portable communication device is not authorized, the third software module configured to redirect the portable communication device by sending connection handshake completion data to the portable communication device in response to the request to access the network resource, the connection handshake completion data configured to appear to be from the network resource, wherein the network management system need not communicate with the network resource if the portable communication device is not authorized; andone or more processors configured to implement the first, second and third software modules. 14. A computer implemented network management system configured to authorize a portable communication device to access a network resource, the system comprising: a first network interface configured to receive, from a portable communication device via a network, a request to access a network resource; andone or more processors configured to: determine whether the portable communication device is authorized to access the requested network resource, the determination being based on a unique identifying attribute associated with the portable communication device without the unique identifying attribute being predefined in a user profile database and without querying the portable communication device or its user for information;allow the portable communication device to access the requested network resource if the portable communication device is authorized; andredirect the portable communication device to an authentication system where the portable communication device is configured to submit authentication-related information wherein the portable communication device can be authorized to access the requested network resource if the portable communication device is not authorized, by at least sending connection handshake completion data to the portable communication device in response to the request to access the network resource, the connection handshake completion data configured to appear to be from the network resource, wherein the network management system need not communicate with the network resource if the portable communication device is not authorized. 15. The method of claim 1, wherein the authentication-related information is related to an agreement to access the network resource. 16. The network management system of claim 13, wherein the authentication-related information is related to an agreement to access the network resource. 17. The network management system of claim 13, wherein the unique identifying attribute associated with the portable communication device is determined from packets received from the portable communication device. 18. The network management system of claim 13, further comprising a fourth software module that, when implemented on one or more processors, is configured to use location information to determine whether the portable communication device is authorized to access the requested network resource. 19. The network management system of claim 14, wherein the authentication-related information is related to an agreement to access the network resource. 20. The network management system of claim 14, wherein the unique identifying attribute associated with the portable communication device is determined from packets received from the portable communication device.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.