Two-Tier Authentication System Where Clients First Authenticate With Independent Service Providers And Then Automatically Exchange Messages With A Client Controller To Gain Network Access
Dharmender S. Dulai - New York NY Vinod R. Marur - Ridgefield CT Benjamin F. Vitale - New York NY Bruce A. Zenel - New York NY
Assignee:
Juno Online Services, Inc. - Westlake Village CA
International Classification:
G06F 15173
US Classification:
709225, 709229, 709203, 709217
Abstract:
A method and apparatus to control a client in a communication network accessed by the client through a service provider independent of a client controller. A hardware capable Internet Service Provider (ISP) functions as the communications network service provider. A virtual ISP operates the client controller, leases Internet access time from the hardware capable ISP, and resells Internet services to users. A client accesses the network through a two stage authentication process. First, the hardware capable ISP authenticates the client using a user-provided ID and password. After successfully logging on to the hardware capable ISP, the client automatically sends a start session message containing user identity information to the client controller. In response, the client controller sends a control message to the client authorizing use of the network for a predetermined time period. When the client stops accessing the network, the client informs the client controller using an end session message.
Method And Apparatus To Determine User Identity And Limit Access To A Communications Network
Peter Skopp - New York NY Benjamin F. Vitale - New York NY Vinod R. Marur - Ridgefield CT Clifford S.C. Tse - New York NY Dharmender S. Dulai - New York NY
Assignee:
Juno Online Services, Inc. - New York NY
International Classification:
G06F 1130 H04L 900
US Classification:
713201
Abstract:
A method and apparatus to determine user identity and limit access to a communications network. A first message containing user identity information is received from a client computer in accordance with a first protocol. A first network address is determined from the first message. A second message containing an information request is also received from the client in accordance with a second protocol, and a second network address is determined from the second message. The requesting user identity is then determined based on the first network address, the user identity information and the second network address. Based on the requesting user identity, it can be decided whether to grant the information request. If access is granted, the requested information is retrieved using the communications network.
Two-Tier Authentication System Where Clients First Authenticate With Independent Service Providers And Then Automatically Exchange Messages With A Client Controller To Gain Network Access
Dharmender S. Dulai - New York NY Vinod R. Marur - Ridgefield CT Benjamin F. Vitale - New York NY Bruce A. Zenel - New York NY
Assignee:
Juno Online Services, Inc. - New York NY
International Classification:
G06F 15173 G06F 1516
US Classification:
709225
Abstract:
A method and apparatus to control a client in a communication network accessed by the client through a service provider independent of a client controller. In one embodiment, a hardware capable Internet Service Provider (ISP) functions as the communications network service provider. A virtual ISP operates the client controller, leases Internet access time from the hardware capable ISP, and resells Internet services to users. A client accesses the network through a two stage authentication process. First, the hardware capable ISP authenticates the client using a user-provided ID and password. After successfully logging on to the hardware capable ISP, the client automatically sends a start session message containing user identity information to the client controller. In response, the client controller sends a control message to the client authorizing use of the network for a predetermined time period. When the client stops accessing the network, the client informs the client controller using an end session message.
Googleplus
Benjamin Vitale
Benjamin Vitale
Youtube
Paul Slowinski vs Sio Vitale K1 Oceania 2010 ...
Paul Slowinski vs Sio Vitale K1 Oceania 2010 Canberra
Category:
Sports
Uploaded:
11 Jul, 2010
Duration:
5m 5s
Arbor Vitale Chaos Acoustic
Arbor Vitale playing our song Chaos acoustic.
Category:
Music
Uploaded:
30 Jan, 2012
Duration:
4m 23s
Jimmy V Remembered - "Don't Give Up, Don't Ev...
Robin Roberts, Dick Vitale, John Saunders, Ben Roethlisberger, Lance A...
Category:
Shows
Uploaded:
06 Jun, 2011
Duration:
1m 56s
VITALE KUITATA(version complte)
CLIP VIDEO de l'artiste vitale publier par ben fofana communicateur
Category:
Music
Uploaded:
02 Aug, 2011
Duration:
4m 47s
Law of Attraction The Secret Rhonda Byrne Bob...
thehypnoticsecre... Harlan Kilstein reveals why most people never suc...
Category:
Entertainment
Uploaded:
21 Dec, 2009
Duration:
2m 42s
The Secret Law Of Attraction Party
New Book: Official Book Launch February 28th, 2012 Official launch of ...