최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
SAI
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0458602 (1999-12-08) |
등록번호 | US-8713641 (2014-04-29) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 102 인용 특허 : 688 |
A system and method for authorizing, authenticating and accounting users having transparent access to a destination network, wherein the users otherwise have access to a home network through home network settings resident on the user's computers, and wherein the users can access the destination netw
A system and method for authorizing, authenticating and accounting users having transparent access to a destination network, wherein the users otherwise have access to a home network through home network settings resident on the user's computers, and wherein the users can access the destination network without altering the home network settings and without installing software on the user's computer. The system includes a gateway device for receiving a request from a user for access to the destination network, and means for identifying an attribute associated with the user based upon a packet received by the gateway device, wherein the packet is transmitted from the user's computer, and wherein the user's computer is configured for accessing the home network.
1. A method of managing access to network resources, the method being performed by a network management system in communication with a portable communication device, the method comprising: receiving, at a communications port of a wireless access point of the network management system from a portable
1. A method of managing access to network resources, the method being performed by a network management system in communication with a portable communication device, the method comprising: receiving, at a communications port of a wireless access point of the network management system from a portable communication device, a connection request for an external server, the connection request comprising one or more network packets;transmitting the connection request from the wireless access point to a controller of the network management system;determining, using the controller, whether to provide the portable communication device with access to the external server, the determination being based at least in part on comparing an attribute included in the connection request to a user profile database; andupon determining that the portable communication device is not at that time permitted with access to the external server, redirecting the portable communication device to an authentication system, the redirection including: sending transmission control protocol handshake completion data from the communications port of the wireless access point to the portable communication device in response to the connection request, said transmission control protocol handshake completion data configured to indicate that it was sent by the external server;receiving at the controller via the wireless access point a request from the portable communication device for a network resource of the external server;receiving, at the wireless access point from the controller, the redirection data comprising resource identification data that identifies the authentication system, the redirection data configured to cause the portable communication device to be redirected to the authentication system; andsending, from the communications port of the wireless access point to the portable communication device, a browser redirect message based upon the redirection data;whereby the portable communication device provides authentication-related information wherein the portable communication system can be provided access to the network resource, wherein the network management system need not communicate with the external server to redirect the portable communication device. 2. The method of claim 1, further comprising updating the user profile database upon determining that the portable communication device is to be provided with access to the network resource. 3. The method of claim 1, further comprising maintaining in the user profile database a historical log of the portable communication device's access to the network resource. 4. The method of claim 1, wherein the connection request comprises a TCP packet. 5. The method of claim 1, wherein determining whether to provide the portable communication device with access to the network resource further comprises denying the portable communication device access where the user profile database indicates that the portable communication device may not access the network resource. 6. The method of claim 1, wherein the determination of whether to provide the portable communication device with access to the requested network is based at least in part on one of a port, circuit ID, VLAN ID or MAC address. 7. The method of claim 1, further comprising: receiving, from the portable communication device, a second request to access a second network resource; anddetermining that the portable communication device is authorized to access the second network resource, based at least upon a MAC address included in the second request. 8. The method of claim 1, wherein the portable communication device is redirected to the authentication system by further storing the request to access the network resource. 9. The method of claim 1, wherein the portable communication device is redirected to the authentication system by further communicating request data to a redirection server, the request data being based on the connection request. 10. The method of claim 1, wherein determining whether to provide the portable communication device with access to the network resource comprises determining whether the portable communication device is authorized to access the requested network resource. 11. The method of claim 1, wherein the connection request is configured with network settings that do not correspond to the network. 12. The method of claim 1, further comprising storing the connection request to access a network resource. 13. The method of claim 1, further comprising communicating a modified request to a redirection server, the modified request being based upon the connection request to access the network resource. 14. The method of claim 1, wherein the redirection data comprises a browser redirect message. 15. The method of claim 1, wherein the method is performed by single device. 16. The method of claim 1, wherein the method is performed by multiple devices in communication with each other. 17. The method of claim 1, wherein the network management system is a gateway device. 18. The method of claim 1, wherein the request for the network resource includes header and body data, wherein request for the network resource is configured with attributes including a source address, a checksum, and a port number, wherein the checksum is calculated based at least in part on header and body data of one or more network packets, and wherein the browser redirect message comprises attributes in which at least one of a source address, a checksum, and a port number differs from those attributes of the request for the network resource. 19. The method of claim 1, wherein the authentication-related information is related to an agreement to access network resources. 20. A network management system configured to manage access to a network resource, the system comprising: a wireless access point configured to receive, from a portable communication device, a connection request for an external server, the connection request comprising one or more network packets; anda controller configured to receive the connection request from the wireless access point and determine whether to allow the portable communication device to access the external server, the determination being based at least in part on comparing one or more attributes included in the connection request to a user profile database;the network management system further configured to redirect the portable communication device to an authentication system, upon determining not to allow the portable communication device to access the external server at that time, the redirect including: sending transmission control protocol handshake completion data from the communications port of the wireless access point to the portable communication device in response to the connection request, said transmission control protocol handshake completion data configured to indicate that it was sent by the external server;receiving at the controller via the wireless access point a request from the portable communication device for a network resource of the external server;receiving, at the wireless access point from the controller, redirection data comprising resource identification data that identifies the authentication system, the redirection data configured to cause the portable communication device to be redirected to the authentication system; andsending, from the communications port of the wireless access point to the portable communication device, a browser redirect message based upon the redirection data;whereby the portable communication device submits authentication-related information wherein the portable communication system can be allowed to access the network resource, wherein the network management system need not communicate with the external server to redirect the portable communication device. 21. The network management system of claim 20, wherein the controller is further configured to maintain, in the user profile database, a historical log of the portable communication device's access to the network resource. 22. The network management system of claim 20, wherein the connection request comprises a TCP packet. 23. The network management system of claim 20, wherein determining whether to allow the portable communication device to access the network resource further comprises denying the portable communication device access where the user profile database indicates that the portable communication device may not access the network resource. 24. The network management system of claim 20, wherein the determination of whether to allow the portable communication device to access the network resource is based at least in part on one of a port, circuit ID, VLAN ID or MAC address. 25. The network management system of claim 20, wherein the wireless access point is further configured to receive, from the portable communication device, a second request to access a second network resource, and wherein the controller is further configured to determine that the portable communication device is authorized to access the second network resource, based at least upon a MAC address included in the second request. 26. The network management system of claim 20, wherein the user profile database further stores information relating to a time period associated with the portable communication device, and wherein the determination of whether to allow the portable communication device to access the network resource is further based on an amount of time that has elapsed in relation to the time period stored in the user profile database. 27. The network management system of claim 20, wherein the attribute included in the connection request comprises a link-layer header of a network packet, and wherein the determination of whether to allow the portable communication device to access the network resource is based both on the link-layer header of the network packet and on identification information provided automatically by a browser of the portable communication device. 28. The network management system of claim 20, wherein the connection request is configured with network settings that do not correspond to the network. 29. The network management system of claim 20, wherein the controller is further configured to store the connection request to access the network resource. 30. The network management system of claim 20, wherein the controller is further configured to communicate a modified request to a redirection server, the modified request being based upon the connection request to access the network resource. 31. The network management system of claim 20, wherein the redirection data comprises a browser redirect message. 32. The network management system of claim 20, wherein the controller is further configured to determine whether the portable communication device is authorized to access the network resource. 33. The network management system of claim 20, wherein the network management system is a gateway device. 34. The network management system of claim 20, wherein the request for the network resource is configured with attributes including a source address, a checksum, and a port number, wherein the checksum allows for verifying correct data transmission, and wherein the browser redirect message comprises attributes in which at least one of a source address, a checksum, and a port number differs from those attributes of the request for the network resource. 35. The network management system of claim 20, wherein the authentication-related information is related to an agreement to access network resources. 36. A method of accessing a network resource of an external server by a portable communication device, the method performed by a network management system in communication with the portable communication device, the method comprising: receiving, at a communications port of a wireless access point of the network management system from a portable communication device, a connection request for an external server, the connection request comprising one or more network packets;transmitting the connection request from the wireless access point to a controller of the network management system;determining, using the controller, whether to provide the portable communication device with access to the external server, the determination being based at least in part on comparing one or more attributes included in the connection request to a user profile database;sending transmission control protocol handshake completion data from the communications port of the wireless access point to the portable communication device in response to the connection request, said transmission control protocol handshake completion data configured to indicate that it was sent by the external server;receiving, at the wireless access point from the controller, redirection data comprising resource identification data that identifies an authentication system, the redirection data configured to cause the portable communication device to be redirected to the authentication system; andsending, from the communications port of the wireless access point to the portable communication device, a browser redirect message based upon the redirection data, the browser redirect message being sent upon a determination not to provide the portable communication device with access to the external server at that time;whereby the portable communication device transmits authentication-related information wherein the portable communication system can be provided access to a network resource of the external server, wherein the network management system need not communicate with the external server to redirect the portable communication device. 37. The method of claim 36, further comprising updating the user profile database upon determining to provide the portable communication device with access to the network resource. 38. The method of claim 36, further comprising maintaining in the user profile database a historical log of the portable communication device's access to the network resource. 39. The method of claim 36, wherein the connection request comprises a TCP packet. 40. The method of claim 36, wherein determining whether to provide the portable communication device with access to the network resource further comprises denying the portable communication device access where the user profile database indicates that the portable communication device may not access the network resource. 41. The method of claim 36, wherein the determination of whether to provide the portable communication device with access to the network resource is one of a port, circuit ID, VLAN ID or MAC address. 42. The method of claim 36, further comprising: receiving, from the portable communication device, a second request to access a second network resource; anddetermining to provide the portable communication device with access to the second network resource, based at least upon a MAC address included in the second request. 43. The method of claim 36, further comprising storing the request to access the network resource. 44. The method of claim 36, wherein receiving, from a portable communication device, a connection request to access a network resource comprises receiving, from a portable communication device via a network, a request to access a network resource. 45. The method of claim 36, wherein the determination of whether to provide the portable communication device with access to the network resource is based at least in part on a port. 46. The method of claim 36, wherein the determination of whether to provide the portable communication device with access to the network resource is based at least in part on a circuit ID. 47. The method of claim 36, wherein the determination of whether to provide the portable communication device with access to the network resource is based at least in part on a VLAN ID. 48. The method of claim 36, wherein the determination of whether to provide the portable communication device with access to the network resource is based at least in part on a MAC address. 49. The method of claim 36, further comprising communicating request-related data to a redirection server, the request-related data being based on the connection request. 50. The method of claim 36, wherein the resource identification data is a URL. 51. The method of claim 36, wherein the resource identification data is a network address. 52. The method of claim 36, wherein the step of determining whether to provide the portable communication device with access to the network resource precedes the step of receiving the redirection data. 53. The method of claim 36, wherein determining whether to provide the portable communication device with access to the network resource comprises determining whether the portable communication device is authorized to access the requested network resource. 54. The method of claim 36, further comprising redirecting, upon determining that the portable communication device is not authorized to access the requested network resource, the portable communication device to an authentication system. 55. The method of claim 36, further comprising communicating a modified request to a redirection server, the modified request being based upon the request to access the network resource. 56. The method of claim 36, wherein the redirection data comprises a browser redirect message. 57. The method of claim 36, wherein the method is performed by single device. 58. The method of claim 36, wherein the method is performed by multiple devices in communication with each other. 59. The method of claim 36, wherein the network management system is a gateway device. 60. The method of claim 36, wherein the request for the network resource comprises attributes including a source address, a checksum, and a port number, wherein the checksum allows for verifying correct data transmission, and wherein the browser redirect message comprises attributes in which at least one of a source address, a checksum, and a port number differs from those attributes of the request for the network resource. 61. The method of claim 36, wherein the authentication-related information is related to an agreement to access network resources. 62. A network management system configured to manage access of a portable communication device to a network resource of an external server, the system comprising: a wireless access point configured to receive, from a portable communication device, a connection request for an external server, the connection request comprising one or more network packets; anda controller configured to receive the connection request from the wireless access point and determine whether to allow the portable communication device to access the external server, the determination being based at least in part on comparing an attribute included in the connection request to a user profile database;the network management system further configured to redirect the portable communication device to an authentication system, by performing operations comprising: sending transmission control protocol handshake completion data from the communications port of the wireless access point to the portable communication device in response to the connection request, said transmission control protocol handshake completion data configured to indicate that it was sent by the external server;receiving, at the wireless access point from the controller, redirection data comprising resource identification data that identifies the authentication system, the redirection data configured to cause the portable communication device to be redirected to the authentication system; andsending, from the communications port of the wireless access point to the portable communication device, a browser redirect message based upon the redirection data, the browser redirect message being sent as a result of the determination not to allow the portable communication device to access the network resource;whereby the portable communication device transmits authentication-related information wherein the portable communication system can be allowed to access a network resource of the external server, wherein the network management system need not communicate with the external server to redirect the portable communication device. 63. The network management system of claim 62, wherein the controller is further configured to maintain, in the user profile database, a historical log of the portable communication device's access to the network resource. 64. The network management system of claim 62, wherein the connection request comprises a TCP packet. 65. The network management system of claim 62, wherein determining whether to allow the portable communication device to access the network resource further comprises denying the portable communication device access where the user profile database indicates that the portable communication device may not access the network resource. 66. The network management system of claim 62, wherein the determination of whether to allow the portable communication device to access the network resource is based at least in part on one of a port, circuit ID, VLAN ID or MAC address. 67. The network management system of claim 62, wherein the wireless access point is further configured to receive, from the portable communication device, a second request to access a second network resource, and wherein the controller is further configured to determine that the portable communication device is allowed to access the second network resource, based at least upon a MAC address included in the second request. 68. The system of claim 62, wherein the user profile database further stores information relating to a time period associated with the portable communication device, and wherein the determination of whether the portable communication device is allowed to access the network resource is further based on an amount of time that has elapsed in relation to the time period stored in the user profile database. 69. The system of claim 62, wherein the connection request comprises a link-layer header of a network packet, and wherein the determination of whether the portable communication device is allowed to access the network resource is based both on the link-layer header of the network packet and on identification information provided automatically by a browser of the portable communication device. 70. The system of claim 62, wherein the controller further configured to store the connection request to access the network resource. 71. The system of claim 62, wherein the portable communication device communicates with the wireless access point via a network. 72. The network management system of claim 62, wherein the controller is configured to determine whether to allow the portable communication device to access the requested network resource based at least in part on a port. 73. The network management system of claim 62, wherein the controller is configured to determine whether to allow the portable communication device to access the requested network resource based at least in part on a circuit ID. 74. The network management system of claim 62, wherein the controller is configured to determine whether to allow the portable communication device to access the requested network resource based at least in part on a VLAN ID. 75. The network management system of claim 62, wherein the controller is configured to determine whether to provide the portable communication device with access to the requested network is based at least in part on a MAC address. 76. The network management system of claim 62, wherein the controller is further configured to communicate request-related to a redirection server, the request-related data being based on the connection request. 77. The network management system of claim 62, wherein the resource identification data is a URL. 78. The network management system of claim 62, wherein the resource identification data is a network address. 79. The network management system of claim 62, wherein the controller is further configured to determine whether to provide the portable communication device with access to the network resource prior to receiving the redirection data. 80. The network management system of claim 62, wherein the controller is further configured to determine whether the portable communication device is authorized to access the network resource. 81. The network management system of claim 62, wherein the controller is further configured to redirect upon determining that the portable communication device is not authorized to access the requested network resource. 82. The network management system of claim 62, wherein the controller is further configured to communicate a modified request to a redirection server, the modified request being based upon the request to access the network resource. 83. The network management system of claim 62, wherein the redirection data comprises a browser redirect message. 84. The network management system of claim 62, wherein the controller is comprised in the same housing. 85. The network management system of claim 62, wherein the controller is comprised in the separate housings. 86. The network management of claim 62, wherein the network management system is a gateway device. 87. The network management system of claim 62, wherein the request for the network resource comprises a source address, a checksum allowing for verification of correct data transmission, a port number, and a resource locator that identifies the network resource, and wherein the browser redirect message includes at least one of a source address, a checksum, and a port number that differs from those attributes of the request for the network resource. 88. The network management system of claim 62, wherein the authentication-related information is related to an agreement to access network resources.
해당 특허가 속한 카테고리에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
IPC | Description |
---|---|
A | 생활필수품 |
A62 | 인명구조; 소방(사다리 E06C) |
A62B | 인명구조용의 기구, 장치 또는 방법(특히 의료용에 사용되는 밸브 A61M 39/00; 특히 물에서 쓰이는 인명구조 장치 또는 방법 B63C 9/00; 잠수장비 B63C 11/00; 특히 항공기에 쓰는 것, 예. 낙하산, 투출좌석 B64D; 특히 광산에서 쓰이는 구조장치 E21F 11/00) |
A62B-1/08 | .. 윈치 또는 풀리에 제동기구가 있는 것 |
내보내기 구분 |
|
---|---|
구성항목 |
관리번호, 국가코드, 자료구분, 상태, 출원번호, 출원일자, 공개번호, 공개일자, 등록번호, 등록일자, 발명명칭(한글), 발명명칭(영문), 출원인(한글), 출원인(영문), 출원인코드, 대표IPC 관리번호, 국가코드, 자료구분, 상태, 출원번호, 출원일자, 공개번호, 공개일자, 공고번호, 공고일자, 등록번호, 등록일자, 발명명칭(한글), 발명명칭(영문), 출원인(한글), 출원인(영문), 출원인코드, 대표출원인, 출원인국적, 출원인주소, 발명자, 발명자E, 발명자코드, 발명자주소, 발명자 우편번호, 발명자국적, 대표IPC, IPC코드, 요약, 미국특허분류, 대리인주소, 대리인코드, 대리인(한글), 대리인(영문), 국제공개일자, 국제공개번호, 국제출원일자, 국제출원번호, 우선권, 우선권주장일, 우선권국가, 우선권출원번호, 원출원일자, 원출원번호, 지정국, Citing Patents, Cited Patents |
저장형식 |
|
메일정보 |
|
안내 |
총 건의 자료가 검색되었습니다. 다운받으실 자료의 인덱스를 입력하세요. (1-10,000) 검색결과의 순서대로 최대 10,000건 까지 다운로드가 가능합니다. 데이타가 많을 경우 속도가 느려질 수 있습니다.(최대 2~3분 소요) 다운로드 파일은 UTF-8 형태로 저장됩니다. ~ |
Copyright KISTI. All Rights Reserved.
AI-Helper는 오픈소스 모델을 사용합니다. 사용하고 있는 오픈소스 모델과 라이센스는 아래에서 확인할 수 있습니다.
AI-Helper uses Open Source Models. You can find the source code of these open source models, along with applicable license information below. (helpdesk@kisti.re.kr)
OpenAI의 API Key를 브라우저에 등록하여야 ChatGPT 모델을 사용할 수 있습니다.
등록키는 삭제 버튼을 누르거나, PDF 창을 닫으면 삭제됩니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.