Patent application number | Description | Published |
20080281979 | System and Method for Providing Application Categorization and Quality of Service in a Network With Multiple Users - Internet protocol (IP) data service providers may provide several services over a single communications channel and/or circuit. For example, the provider may deliver public services such as Wi-Fi, content, gaming, etc. as well as business-critical “back-office” services such as credit card processing, VoIP, streaming video, video conferencing, etc. Some applications can very demanding from a quality of service standpoint, whereas other applications are unwanted or unauthorized on the network such as worms, viruses, denial of service attacks and/or certain types of peer-to-peer file sharing applications. Applications sharing the communication channel may be classified into one or more application classifications. The available bandwidth over the communications channel and/or circuit may then be managed via a prioritization system that can be parameterized based on the available bandwidth and/or the desired application behavior for given characterized applications. Many of the above unwanted applications can be suppressed, after being classified. | 11-13-2008 |
20080287094 | AUTHORIZATION AND AUTHENTICATION OF USER ACCESS TO A DISTRIBUTED NETWORK COMMUNICATION SYSTEM WITH ROAMING FEATURE - A system and method for providing roaming access on a network are disclosed. The network includes a plurality of wireless and/or wired access points. A user may access the network by using client software on a client computer (e.g., a portable computing device) to initiate an access procedure. In response, a network management device operated by a network provider may return an activation response message to the client. The client may send the user's username and password to the network provider. The network provider may rely on a roaming partner, another network provider with whom the user subscribes for internet access, for authentication of the user. Industry-standard methods such as RADIUS, CHAP, or EAP may be used for authentication. The providers may exchange pricing and service information and account information for the authentication session. A customer may select a pricing and service option from a list of available options. | 11-20-2008 |
20090019530 | Device-Specific Authorization at Distributed Locations - With the proliferation of wireless devices, seamless authentication of devices at distributed locations (e.g., so-called Wi-Fi hotspots) may be essential for convenient use of various devices at these locations. Previous methods for authentication relied on an account-based method using a username and a password inputted from a user. This method may be awkward for mass-distribution of devices. Various embodiments disclosed may provide an authorization client that communicates with one or more servers that relies on client software and message authentication codes for authorization of network access. | 01-15-2009 |
20090103539 | Probe Insertion for One or More Network Address Translated Addresses - In various embodiments, one or more methods and/or systems described may provide probing and/or data replication capabilities for monitoring a user's computing device and the data the user's computing device transmits and/or receives to and/or from one or more networks. In some embodiments, an authorization signal may be intercepted, where the authorization signal may convey information about the user and/or the user's computing device, and a probe to replicate data to and/or from the user's computing device may be initiated. In various embodiments, the replicated data may be communicated to a mediation computing device, where one or more analyses may be performed. | 04-23-2009 |
20120260320 | Device-Specific Authorization at Distributed Locations - A method includes receiving, at a client device, an authentication seed from a first network. The method also includes receiving a shared secret. The method further includes, in response to receiving the authentication seed, determining a network address of the client device. The method further includes computing a result of a one-way hash function of a combination of the network address, the authentication seed, and the shared secret. The method further includes transmitting the network address and the result of the one-way hash function to a server that provides access control of a second network coupled to the first network. The method further includes receiving permission from the server to access the second network. | 10-11-2012 |
20130096906 | Methods and Systems for Providing Items to Customers Via a Network - In one or more embodiments, a system can emulate one or more physical mobile devices and can allow respective one or more users to utilize respective one or more emulations via a network. In one example, a first user, utilizing a first web browser, can interact with a first emulated mobile device. In another, a second user, utilizing a second web browser, can interact with a second emulated mobile device. In one or more embodiments, the first and second emulated mobile devices can respectively correspond to two different physical mobile devices, and the first and second users can concurrently interact with the first and second emulated mobile devices, respectively. In one or more embodiments, a user can upload a physical mobile device to an emulated mobile device, interact with the emulated device, and download changes made to the emulated mobile device to the physical mobile device. | 04-18-2013 |
20130297281 | METHODS AND SYSTEMS OF PROVIDING ITEMS TO CUSTOMERS VIA A NETWORK - In one or more embodiments, a system can simulate one or more physical mobile devices and can allow respective one or more users to utilize respective one or more simulations via a network. For example, a user, utilizing an application such as a web browser, can interact with a simulated mobile device. For instance, the user can select a function of the simulated mobile device, the simulated mobile device can provide, to the user, a simulation of the function, the first user can manipulate the simulated mobile device, and output of the function can be displayed to the user in accordance with the manipulation of the simulated mobile device. In one or more embodiments, the system can determine and display multiple images, of the simulated mobile, device based on multiple directions of a pointer path. For example, the system can determine the directions based on positions acquired at time intervals. | 11-07-2013 |
20140090031 | Device-Specific Authorization at Distributed Locations - A method includes receiving authentication information for a client device at a server. The authentication information includes a network address of the client device, a geographic location of the client device, and a first result of a one-way hash function based on a combination of the network address, an authentication seed, and a first secret. The method includes computing, with the server, a second result of the one-way hash function based on a combination of the network address, the authentication seed, and a second secret. The method also includes enabling the client device to access a second network in response to a determination by the server that the first result matches the second result and a determination by the server that the client device is authorized to access the second network based on the geographic location. | 03-27-2014 |
20140380435 | DEVICE-SPECIFIC AUTHORIZATION AT DISTRIBUTED LOCATIONS - A method includes receiving authentication information for a client device at a server. The authentication information includes a geographic location of the client device and a first result of a one-way hash function based on a combination including an authentication seed and a first secret. The method includes computing, at the server, a second result of the one-way hash function based on a combination including the authentication seed and a second secret. The method also includes enabling the client device to access a second network in response to a determination by the server that the first result matches the second result and a determination by the server that the client device is authorized to access the second network based on the geographic location. | 12-25-2014 |