CA2264866C - Network access methods, including direct wireless to internet access - Google Patents

Network access methods, including direct wireless to internet access Download PDF

Info

Publication number
CA2264866C
CA2264866C CA002264866A CA2264866A CA2264866C CA 2264866 C CA2264866 C CA 2264866C CA 002264866 A CA002264866 A CA 002264866A CA 2264866 A CA2264866 A CA 2264866A CA 2264866 C CA2264866 C CA 2264866C
Authority
CA
Canada
Prior art keywords
server
authentication
network
internet
digital data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA002264866A
Other languages
French (fr)
Other versions
CA2264866A1 (en
Inventor
Yingchun Xu
Bennett S. Cardwell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
UTStarcom Inc
Original Assignee
UTStarcom Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=25390894&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CA2264866(C) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by UTStarcom Inc filed Critical UTStarcom Inc
Publication of CA2264866A1 publication Critical patent/CA2264866A1/en
Application granted granted Critical
Publication of CA2264866C publication Critical patent/CA2264866C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • H04M3/382Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access

Abstract

A method is provided for connecting a source of digital data to a computer network. The source of digital data transmits data over a wireless transmission medium to a wireless service carrier, the wireless service carrier multiplexing the digital data onto a high speed digital telephone line. The method comprises the steps of receiving the digital data at a communications chassis such as a network access server, extracting, from the digital data, network access authentication data comprising at least one of the following: (a) a telephone number called by the source of digital data, or (b) a telephone number associated with the source of digital data;
transmitting the authentication data over a local area or wide area computer network connected to a network authentication server for the computer network;
determining, in the network authentication server, from the transmitted authentication data whether the remote user is permitted to access the computer network; and the authentication server responsively notifying the network access server the results of the step of determining; and authorizing the source of data to access the computer network if the step of determining results in a positive response.

Description

l015202530CA 02264866 2002-07-1876909-100NETWORK ACCESS METHODS, INCLUDING DIRECT VVIRELESS TOINTERNET ACCESSBACKGROUND OF THE INVENTIONA. Field of the InventionThis invention relates to the field of data communicat:ion and moreparticularly to a method of connecting a wireless user generating digital data (forexample,’ a computer having a cellular telephone modem) to a computer network,such as a corporate backbone LAN or the Internet.B. Description of Related ArtNetwork access servers that provide local or wide area network access forremote users dialing in over the public switched telephone network are known in theart. These devices are available from 3COM Corporation (previously from US.Robotics Access Corp.), the assignee of the present invention. The Total ControlNetwork Enterprise Hub from 3COM is a representative network access server. It isdescribed in U.S. Patent 5,577,105 of Baum et al., entitled “Telephone Call Switchingand Routing Techniques for Data Communications,” and US. Patent 5,528,595 of L‘ Walsh et al., entitled “Modem Input/Output Signal Processing Techniques.”The network access server described in the Walsh et al. and Baum et al.patents provides an interface to a multiplexed digital telephone line, a plurality ofmodems for performing signal conversions for the data fiom the remote users, and anetwork interface for transmitting demodulated firom the modems «onto a local orwide area network. A high speed midplane bus structure comprising a time divisionmultiplexed bus provides a signal path between the channels of the telephone line andthe modems. The high speed midplane also includes a parallel bus that couples themodems to the network interface.This network access server architecture in a single chassis has proven to bevery popular in a variety of applications, particularly corporate network access. The1015202530W0 99/01969CA 02264866 1999-03-02PCT/US98/13858network access server is also particularly popular with Internet service providers forland-based Internet users. With a single network access server, the Internet serviceprovider can handle a large number of simultaneous Internet access calls and providefull duplex communication between the multiple remote users and host computers onthe Internet.The technology for Internet access for wireless users is now emerging. Thereare two competing standards for wireless service, CDMA (Code Division MultipleAccess, described in the standards documents IS-130 and IS-135, incorporated byreference herein) and TDMA (Time Division Multiple Access, described in standardsdocument IS—99, also incorporated by reference herein). These standards specify afeature rich sets of digital wireless communications, for both voice and data. The twostandards differ in how digital data from multiple users are multiplexed on the radiointerface.In accordance with both wireless technologies, a wireless user transmits datato a mobile switching center. The mobile switching center provides connectivity tothe public switched telephonenetwork, certain multiplexing and control functions,and switching functions for the mobile users. Multiplexed digital data from a pluralityof remote wireless users is then capable of being transmitted via high speedcommunication formats (such as Frame Relay) to communication elements in thepublic switched telephone network.The present invention provides for network access methods and apparatus thatare particularly suitable for wireless users. The present invention also provides fornetwork access methods by which a network access server, in combination with one ormore authentication servers, can provide for Internet and corporate networkauthentication and access. The network access server provides for the functionsneeded for terminal equipment connected to a TDMA or CDMA mobile telephone tointer-work with terminal equipment connected to the public switched telephonenetwork (PSTN) and the Internet. Further, the invention provides for Internet accessmethods for a plurality of remote users that are subscribers of more than one Internetservice provider, thereby giving more flexibility in the ability of a particular Internetservice provider to serve diverse Internet users.101520.2530nu: - 7CA 02264866 2002-07-1876909-100SUMMARY OF THE INVENTIONAccording to a first broad aspect, the invention providesa method for connecting a source of digital data to a_computernetwork, the source of digital data generating digital data and communicating over awireless transmission medium to a wireless service carrier. The wireless service carriermultiplexes the digital data onto a high speed digital telephone line for transmission toa communications chassis or sewer providing network access. The method comprisesthe steps of receiving the digital data at the communications chassis and extracting,from the digital data, network access authentication data comprisingat least one of thefollowing: (a) a telephone number called by the source of digital data, or (b)' atelephone number associated with the source of digital data. The communicationschassis transmits the authentication data over a local area or wide area computernetwork connected to the network access sewer to a network authentication server forthe computer network. The network _ authentication server determines from thetransmitted authentication data whether the remote user is permitted to access thecomputer network. The authentication server responsively notifies the network accessserver the results of the step of determining. The remote user‘ is authorizes to accessthe computer network if the step of determining results in a positive response.The method may also comprise the further step of identifying a tunnelingserver linked via a local area or wide area network to the communications chassis tobe used to provide access for the source of digital data to the computer network, androuting digital data from the source to the tunneling server to provide the access to thecomputer network. The identification of the tunneling server is determined from theauthentication data from the remote user, such the remote user’s phone number or thedialed number.determining, in the authentication server, a tunneling protocol for the source of digitalIn this embodiment, the invention may also be practiced bydata for use in tunneling digital data between the communications device and thetunneling server. This step of determining may be practiced, for example, by lookingin a software look up table the tunneling server and required protocol associated withthe remote user (identified, for example by the remote user’s telephone number).The digital data is routed via the tunneling server in accordance with the tunnelingprotocol. Either PPTP or TELNET protocols will be used in accordance with apreferred embodiment of the invention.l015202530MIN. IVCA 02264866 2002-07-1876909-100A second phase of access authentication may beoptionally provided, comprising a password authenticationroutine that takes place between the remote user and theauthentication server or the tunneling server.According to a second broad aspect, the inventionprovides an Internet access method for use by an Internetservice provider having a communications device receivingtelephone calls from a user over a high speed telephoneline. The method includes connecting the communicationsdevice to an authentication server over a local or wide areanetwork. Network access authentication data having at leastone of a telephone number called by the user or a telephonenumber associated with the user is extracted from anincoming call from the user. The network authentication"data is routed to the authentication of the user from thenetwork access authentication data. A tunneling server isidentified for providing network access for the user andnotifying the network access server of the tunneling server.Digital data is tunneled from the network access server tothe tunneling server and the digital data is placed onto theInternet by the tunneling server.According to a third broad aspect, the inventionprovides a method of connecting a computer generatingdigital data to the Internet. The digital data is placedonto a high speed digital telephone line for transmission toan Internet service provider. The method includes the stepof receiving the digital data at a communications device atthe Internet services provider. Internet accessauthentication data having at least one of a telephonenumber called by the source of digital data or a telephonenumber associated with the computer is extracted from thedigital data. The authentication data is transmitted to al015202530CA 02264866 2002-07-1876909-100network authentication server. In the networksauthentication server, whether the remote user is authorizedto access the Internet via the network access server isdetermined from the transmitted authentication data. Theauthentication server responsively notifies the networkaccess server the results from the authorization of thecomputer to access the Internet when the remote server isauthorized.According to a fourth broad aspect, the inventionprovides an Internet service provider system for a wirelessInternet user. The system has a network access serverhaving a high speed digital telephone line interfacereceiving calls from the wireless Internet user and anInternet gateway for placing digital data associated withthe wireless Internet user onto the Internet. An Internetaccess authentication server is linked to the network accessserver via a communications medium. The Internet accessauthentication server is responsive to Internet accessauthentication data extracted from the digital dataassociated with the wireless Internet user received by thenetwork access server and is transmitted from the networkaccess server to the authentication server. Theauthentication server has a memory for determining, from theInternet access authentication data, whether the wirelessInternet user is authorized to access the Internet.Furthermore, the Internet authentication server responsivelypasses an authentication response to the network accessserver. The network access server is responsive to theauthentication response from the authentication server toeither allow the wireless Internet user to access theInternet or to take other action with respect to a call fromthe wireless Internet user.4aHIM. Ii VCA 02264866 2002-07-1876909—lOOA principal object of the invention is thus toprovide direct access to the Internet and other computernetworks for remote users such as wireless users. This, andother objects of the invention will be more apparent fromthe following detailed description.4b W0 99/019691015202530CA 02264866 1999-03-02PCT/US98/13858BRIEF DESCRIPTION OF THE DRAWINGSPresently preferred embodiments of the invention will be described inconjunction with the drawings, in which like reference numerals refer to like elementsin the various views, and in which:FIG. 1 is an illustration of an example of a preferred network access system forwireless users in accordance with an embodiment of the invention;FIG. 2 is a simplified functional block diagram of a preferred form of thecommunications chassis of FIG. 1 that can service not only wireless users but alsousers dialing in over the public switched telephone network;FIG. 2A is a simplified block diagram of a communications chassis suitable inan embodiment in which analog modern calls are not supported;FIG. 3 is an illustration of the protocol stacks for the tunnel interface betweenthe remote user and the tunneling server of FIG. 1;FIG. 4 is an illustration of the protocol stacks for authentication andaccounting interface between the communications chassis and the authenticationserver of FIG. 1;FIG. 5 is an illustration of the protocol stacks for a non—tunneling interfacebetween the remote dial user and the router connecting the user with a destinationterminal equipment;FIG. 6 is a diagram of the call flow for PPTP protocol tunneling for a callacceptance scenario in accordance with a preferred embodiment of the invention;FIG. 7 is a diagram of the call flow for TELNET protocol tunneling for a callacceptance scenario in accordance with a preferred embodiment of the invention;FIG. 8 is a diagram of the call flow for an authentication failure scenario;FIG. 9 is a diagram of the call flow for a tunneling server access rejectionscenario;FIG. 10 is a diagram of the call flow for an authentication failure scenario forthe PPTP protocol in which a log-in password authentication procedure is performedas a second phase of a network access authentication procedure; andFIG. 11 is a diagram of the call flow for an authentication failure scenario forthe TELNET in which a log-in password authentication procedure is performed as asecond phase of a network access authentication procedure.51015202530WO 99/01969CA 02264866 1999-03-02PCT/US98/13858DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTFIG. 1 is an illustration of a preferred network access system 10 for users ofwireless equipment 12, 14 that can be used to practice the invention. Remotedevices such as a laptop computer 12 with a wireless modem or a wireless personaldata assistant (PDA) 14 communicate via wireless modem to a wireless digitalcommunications network 16 in accordance with the TDMA (Time Division MultipleAccess) or the CDMA (Code Division Multiple Access) standards.The wireless network 16 includes a Mobile Switching Center (MSC) (notshown), which is an element within the wireless telecommunications network 16 thatprovides public switched telephone network connectivity, control functions andswitching functions for the wireless users. In the embodiment of FIG. 1, the MSCplaces data from the remote wireless users onto a high speed digital frame relay lineFR for transmission to a communications chassis 20 in the local calling area. In apreferred embodiment, the communications chassis 20 comprises an integratednetwork access server such as the Total Control Network Enterprise Hub of 3ComCorporation (formerly from U.S. Robotics), modified to interface with the frame relayline FR and perform tunneling, authentication and accounting functions as describedbelow.The communications chassis 20 functions as a gateway between theCDMA/TDMA wireless network 16 and an Internet service provider (ISP) backbonenetwork 26, the Internet 22, or other computer network such as a corporate or privateLAN/WAN 24 via an Ethernet or other local area network ETH and the Internetservice provider backbone network 26. The chassis 20 provides the functions neededfor terminal equipment connected to a CDMA or TDMA mobile phone tointercommunicate with terminal equipment connected to the PSTN and Internetnetworks. In one possible and presently preferred embodiment, the communicationschassis 20 is installed at the telephone company central office (TELCO CO) andmanaged by an Internet Service Provider (ISP).- The chassis 20 receives calls fromwireless users 12, 14 via the MSC in the wireless network 16 as local calls on the lineFR.10152025'30HIM! llCA 02264866 2002-07-1876909-100The wireless terminals 12, I4 access the corporate/private network 24 using atunneling protocol over LAN or WAN line 28 between the communications chassis20 and a tunneling server 30. The tunneling server is connected to a corporate/privatenetwork 24 and is connected via a backbone network 26 connected to thecommunications chassis 20. In a preferred embodiment, the tunneling is according toa Point~to—Point Tunneling Protocol (PPTP) described in theInternet Engineering Task Force Request for Comments (RFC)(PPTP) ,2637, entitled Point—to—Point Tunneling ProtocolK. Hamseh et al., July 1999, available on the internet atwww . ietf . org . The tunneling could of course be in accordance with other emergingand equivalent protocols, such as L2TP. Since PPTP and L2TP are not designed tosupport non-PPP (Point-to-Point) Asynchronous protocol, the TELNET protocol isused to tunneling non-PPP asynchronous traffic over line 28. The tunneling server isalso preferably an integrated network access server such as the Total ControlEnterprise Network Hub or the equivalent.With this architecture, it is possible to divorce the location of the initial dial-upserver (communications chassis 20) from the location at which the intermediatenetwork terminates the dial-up protocol connection (PPP) and provides access to thetarget network 22 or 24 at the tunneling server 30. In addition to supporting theInternet 22 as the target network, this architecture also supports access to virtualprivate networks, allowing the remote wireless user to gain secure ac:cess to theircorporate or private network such as the corporate enterprise network 24 illustrated inFIG. 1.The architecture also allows the Internet Service Provider operating the localcommunications chassis 20 at the central office to provide Internet access; for not onlythe ISP’s customers, but also customers of other Internet service providers. This isachieved by use of one ‘or more authentication servers 32A, 32B connected to theInternet service provider’s backbone network 26. The authentication servers 32A,32B perform authentication and access authorization for the first ISP’s customers. Asecond tunneling server 34 is connected" via a dedicated line 36 (or LAN or WAN) orotherwise to a second ISP’s backbone network 38. In this embodiment, theauthentication server 32A has a profile of its customer base for the first ISP managingthe communications chassis 20 and can determine, using a variety of simple(discussed below) whether the the7techniques remote user dialing intoW0 99/019691015202530CA 02264866 1999-03-02PCT/US98/13858communications device 20 is allowed to access the Internet 22 via the ISP’s backbone26. If access is allowed (due to the call originating from one of the first Internetservice provider customers), the call is routed through the network 22 to the Internet.If not, other procedures, described below, can be initiated.The present invention takes advantage of the fact that the call from the remoteuser 12 contains infonnation identifying the telephone number of the call originator,and the telephone number that is dialed. This information is used as a first stageauthentication mechanism. When the authentication server 32A performs the firstphase authentication and determines that the remote user is not one of the first Internetservice provider’s customers (due to, for example, the telephone number not matchingup to a table of customer phone numbers), but rather is a customer of a second Internetservice provider, the authentication server 32A directs the authentication request to asecond authentication server 40 connected to the second Internet service provider’sbackbone 38, and the first phase authentication can take place. This communication isfacilitated by providing a dedicated line 42 (e.g., leased line, POTS line, etc.) betweenthe authentication server 32A and the authentication server 40 managed by a secondInternet service provider.If the authentication results in a positive response, the authentication server 40notifies authentication server 32A of the result and the remote wireless user 12 iseither given Internet 22 access over network 26 or via tunneling server 34, or anoptional second phase pass-word type authentication may take place between theremote user 12 and the second authentication server 40.These combination of features allow the ISP or other entity managing thecommunications chassis 20 and authentication server 32A the ability to significantlyincrease the features it provides to its customers. It also allows the ISP to provideInternet access for other Internet service providers, and in the process presumablygenerate revenue for such services. For the wireless users, the Internet or corporatenetwork access is a matter of a local call through the wireless network 16 to thecommunications device 20.In a preferred form of the invention, the communications chassis 20 is a robustcommunications platform such as the Total Control Enterprise Network Hubincorporating an integral general purpose computing platform, i.e., the EdgeServer TM81015202530I nu ‘ __..CA 02264866 2002-07-18 '76909-100card commercially available fiom 3COM. This product allows the communicationschassis to run a commercially available stand alone operating system, such asWINDOWS NT 7” from Microsoft Corporation, as well as other remote accesssoftware products such as RADIUS (Remote Authentication Dial In User Service). Inthe above-described Internet access methods, the accounting and authenticationfunctions are preferably employed using the RADIUS protocol, which is a widelyknown protocol described in the Internet Engineering TaskForce Request for Comments (RFC) 2058, entitled RemoteAuthentication Dial In User Service (RADIUS), C. Rigney,A. Rubens, W. Simpson, S. Willens, dated January 1997 andavailable on the internet at www.ietf.org, or othercommercially available or known accounting software programs.In accordance with a preferred embodiment of the invention, two phases ofauthentication are implemented in order to control access to the Internet 22 or .corporate/piivate network 24 to those wireless usersthat are permitted access vianetwork 26. The first phase of authentication is based on the called number dialed bythe remote user 12, 14 and the calling number of the wireless user 12, 14 (the user’sphone number associated with the computer '12 or PDA 14). The second phase of the-authentication is based on a test user name and password authentication protocol (forPPP and TELNET tunneling) or Challenge/Response protocol (for PPP tunnelingonly). These authentication procedures are described in further detail below. ,Still referring to FIG. 1, the communications device 20 also preferablysupports non‘-tunneling Internet 22 access directly from an Internet interface in thecommunications device. With this feature, the communications device performs bothphases of authentication, termination of the PPP protocol, and routes Internet Protocoltraffic.One other possible embodiment of the invention is a scenario in which thecommunications device 20 provides direct PSTN (Public Switched TelephoneNetwork) connectivity for mobile or land originated data calls. In this scenario, thecommunications chassis 20, such as the Total Control Network Enterprise Hubdescribed previously, contains the required modems and telephone line interface andprocessing circuitry to perform these functions. This embodiment would be aparticularly advantageous in the case where the Internet service provider is also theI With the present Internet access invention, thelocal telephone company.communications device 20 will extract or screen the called number in the ATD9W0 99/0196910I5202530CA 02264866 1999-03-02PCT/US98/1 3858command issued by the mobile data user during a mobile originated data call. Formost called numbers, the communications device 20 processes the call as a standardPSTN modern call. However, if the called number is associated with Internetaccess, the communications chassis 20 will perform the first phase of authenticationwith an authentication server 32A associated with the called number (either on theISP’s backbone network 26 or connected via dedicated line 36, 42 or other network tothe communications chassis 20). The authentication server 32A determines whetherthe remote user is authorized to access the Internet 22 or network 24 serviced by theauthentication server 32A.FIG. 2 is a simplified functional block diagram of a preferred form of thecommunications chassis or network access server 20 of FIG. 1 that can service notonly wireless users but also users dialing in over the public switched telephonenetwork. As such, the chassis contains features that are not required to practice theinvention, and which perform additional functions due to a particular embodiment ofthe invention in which PSTN connectivity is also enabled. The network access server20 shown in FIG. 2 is essentially the architecture and design of the current model ofthe Total Control Network Enterprise Hub, the commercially available product of theapplicant’s assignee. It will be understood that integrated access servers of othermanufacturers in the industry can be modified as needed to provide the features of thepresent invention, and the invention should not be considered limited to the particularpreferred embodiment described herein.The network access server 20 includes the telephone network interface card 50connected to time division multiplexed digital telephone lines such as T1, El andISDN Primary Rate Interface (PRI) lines as well as a frame relay line. The networkinterface card receives digital data from the wireless remote users via the wirelessservice switch on the Frame Relay line FR. The interface card 50 has connectors thatphysically receive the telephone lines, and a CSU line interface unit to recover clocksignals and data from the incoming signals and perform multiplexing anddemultiplexing functions for outgoing and incoming data streams to place the callsinto the time slots of the carrier. The card 50 transmits the incoming telephonesignals via a NIC/NAC (network interface card/network application card) bus 54 to aT1/E1/ISDN PRI/ network application card 56. The application card 56 provides10l0I520‘2530CA 02264866 2002-07-1876909-100framing for the recovered telephone line data to extract the Frame Relay time divisionmultiplexed data, T1 DSO channel data, or ISDN 2B + D channel data incorporated 6into the ISDN PR1 signal, and then switches with a time/space switch the channeldata to time slots on a time division multiplexed bus 60 that is part of an internalchassis bus midplane 52. IWhere the incoming call is from the wireless service central office and arrivesat the server on the Frame Relay line, the channel data does not need any signalconversion processing ordinarily performed in a modem and is routed over the TDMbus 60 to the routing and LAN/WAN interface card 62. In the Total ControlEnterprise Network Hub, this card 62 is known as the “EdgeServer””‘ card, andcompeting network access devices from Ascend, Livingston and other manufacturershave analogous interfaces. The “Edgeserver” TM card 62 has a pair of Munichs chipsthat assemble packets of data in accordance with TCP/IP protocol for transmission tothe destination directly via the LAN/WAN interface or via a tunneling server.For calls that are originating from users connected to the public switchedtelephone network and signal transformations are required, the TDM. bus 60 directsthe calls to modems in multiple modem modules or cards 64. The internal chassis bus52 further includes a high speed parallel packet bus 58 connecting the modems in thecards , 64 to the Edgeserver “'1 card 62 for transmission of the data afterdemodulation/signal conversion to the routing engine in the Edgeserver card 62. Aplurality of analog network interface cards 63 for connecting the modems up to aserial interface 65 are also provided.The telephone line interface and application cards 50 and 56, respectively.modem cards 63 and 64, intemalchassis buses complex 52 (including TDM andparallel buses 60 and 58, respectively), and computer network interface 66 of theEdgeserver TM card 62 are described in great detail in temis of their componentcircuitry and operation in the above—referenced U.S. Patent 5,577,105 of ‘Baum et al.,entitled “Telephone Call Switching and Routing Techniques for DataCommunications,” and U.S. Patent 5,528,595 of Walsh et al., entitled “ModemInput/Output Signal Processing Techniques”. The detailed structure of a preferredinternal chassis bus is described in U.S. Patent No. 5,416,776 to Panzarella et al.,entitled “Modem Backplane Techniques”, also assigned to 3COM Corporation.11llllll llCA 02264866 2002-07-1876909-10010015202530The management of a chassis by a managementcard is also described in detail in U.S. Patent No. 5,436,614 to Panzarella et al.,entitled “Modem Management Techniques,” which is also assigned to 3COMCorporation . These elements are also describedin the publicly available operators manual for the Total Control Network EnterpriseHub product, which is also incorporated by reference herein.The Edgeserver TM card 62 contains a general purpose computing platform70 runningcommercially available stand-alone or share ware operating system (suchas WINDOWS_ NT TM). The card 62 is described in more detail in -U.S. Patent No. 6,249,527, William Verthein et al.Since the details of the telephone line interface and application cards, modemcards, management cards (not shown) and computer network interface 66 of the card62 exist in publicly available products, are already described elsewhere in publiclyavailable documents, and persons skilled ‘in the art already know how to build anddesign such circuits (or equivalent circuits), a detailed discussion of these componentsof the communication access chassis 10 is not necessary. Additionally, the details asto the architecture or design of the communication chassis 10 is not particularlyimportant.The Edgeserver card 62 includes a TDM interface 72 that receives channeldata from the frame relay FR line via the TDM bus 60. The computing platform 70consists of an off~the shelf IBM compatible personal computer with a integral centralprocessing unit 74, and peripheral interfaces for a keyboard, floppy disk, monitor andmouse. The computing platform also includes an internal storage hard disk drive 76.The computing platform also includes packet assembly and disassembly circuitry 78that assembles packets of data from the modems in the modem modules 64 intoformats suitable for use by the general purpose computing platform 70. The generalpurpose computing platfonn communicates with a conventional network interface 66via a NIC/NAC bus connect 80. l The computing platform also communicates via asecond ISA bus 82 to an external storage expansion bus interface: 84, which isconnected to external disk. drives or other suitable storage devices to increase thememory capacity of the communications chassis 20. In a preferred embodiment, the12WO 99/019691015202530CA 02264866 1999-03-02PCT/US98/13858software for running tunneling and authentication functions described below in thecommunications chassis 20 is loaded in the general purpose computing platform 70 inthe EdgeServer TM card 62.As noted above, the architecture and features provided by the communicationschassis of FIG. 2 provides more features than will ordinarily be necessary tointerconnect the remote users on the wireless network to the ISP backbone, corporatenetwork or Internet. FIG. 2A is simplified schematic diagram of an alternative devicewithout modems which would be suitable for an embodiment in which PSTNtermination functions are not provided for the communications device. In theembodiment of FIG. 2A, a frame relay interface 100 comprising line interface unit,Theinterface 100 places channel data on time slots in a TDM bus complex 102 whichconnects the interface 100 with a LAN/WAN interface 104. The LAN/WANconsists of an off-the-shelf Ethernet or other standarddemultiplexing circuitry and framing circuitry is provided in one module.interface 104 preferablyinterface modified with a general purpose computing platform loaded with software toperform the call routing, authentication, tunneling and other features described herein.With the above FIG.s 1 and 2 and 2A in mind, it will be appreciated that amethod of connecting a source 12 of digital data to a computer network 24, 22 (e.g.,corporate private network, Internet, World Wide Web, etc.) is provided. The source ofdigital data 12 generates digital data and communicates over a wireless transmissionmedium to a wireless service carrier. The carrier multiplexes the digital data onto ahigh speed digital telephone line, e.g., line FR. The method comprises the steps of(1) receiving the digital data at a network access server or communicationschassis 20 and extracting, from the digital data, network access authentication datacomprising at least one of the following: (a) a telephone number called by the source12 of digital data, or (b) a telephone number associated with source of digital data;(2) transmitting the authentication data over a local area or wide areacomputer network connected to the communications device 20 to a networkauthentication server 32A or 32B for the computer network 24 or 22, the networkauthentication server linked via the local area or wide area computer network 26 to thecommunications chassis 20; and13W0 99/019691015202530CA 02264866 1999-03-02PCT/US98/1 3858(3) determining, in the authentication server 32A, from the transmittedauthentication data whether the remote user is permitted to access the computernetwork 22 or 24. The authentication server 32A responsively notifies thecommunications chassis 20 the results of said step of determining and authorizes thesource 12 of data to access the computer network 24 or 22 if the step of determiningresults in a positive response.The method may also comprise the further step of identifying a tunnelingserver 30 or 34 linked via a local area or wide area network 26 to the communicationschassis 20 to be used to provide access for the source 12 of digital data to thecomputer network, and routing digital data from the source 12 of digital data to thetunneling server 30 to provide the access to the computer network 24. Theidentification of the tunneling server is determined, in a preferred embodiment, by theauthentication data extracted from the incoming call (i.e., the dialed number and thedialing number). In this embodiment, the invention may also be practiced bydetermining, in the authentication server 32A or 32B, a tunneling protocol for thesource 12 of digital data for use in tunneling digital data between the communicationsdevice 20 and the tunneling server 30. This step of determining may be practiced, forexample, by looking in a software look up table the tunneling server and requiredprotocol associated with the remote user 12 (identified by the remote user 12telephone number). The digital data is routed via the tunneling server in accordancewith the tunneling protocol. Either PPTP or TELNET protocols will be used inaccordance with a preferred embodiment of the invention.alsoIn a preferred embodiment, communications chassis 20 of FIG. 2provides access to the public switched telephone network via the T1/El/ISDNinterface 50/56. The communications chassis 20 routes digital data to a destination forthe digital data from the remote user 12. In this fashion, the communications chassis20 provides not only direct network access to computer networks 22 and 24 but alsoprovides signal modulation via modems in the chassis to allow the call to transmittedvia the telephone network to a remote terminal such as computer 13 in FIG. 1. Themanner in which the communications chassis 20 provides PSTN connectivity isknown in the art and described in the above-cited Walsh et al. patent.14W0 99/019691015202530CA 02264866 1999-03-02PCT/US98/ 13858In a preferred network access embodiment of the invention, a second phaseauthentication routine is employed to verify that the remote user is authorized toaccess the designated network. This is a accomplished by conducting a passwordauthentication procedure such PAP or CHAP routine, both of which are known in theart, between either (1) the tunneling server 30 or (2) the authentication server 32A andthe remote user, or (3) between authentication server 32A and tunneling server 30/34,thereby providing a second level of authentication.In one specific embodiment of the invention, an Internet access method isprovided for use by an Internet service provider having a network access server orcommunications chassis 20 receiving telephone calls from a user 12 over a high speedtelephone line, comprising the steps of 2(1) connecting the network access server 20 to an authentication server(e.g., 32A or 32B) over a local or wide area network 26;(2) extracting, from an incoming call from the user 12, network accessauthentication data comprising at least one of the following: (a) a telephonenumber called by the user, or (b) a telephone number associated with the user;(3) routing the network authentication data extracted from the incomingcall to the authentication server 32A or 32B for authentication of the user fromthe network access authentication data;(4) identifying a tunneling server (e. g. 34) for providing network access forthe user and notifying the communications chassis 20 of the tunneling server;and(5) tunneling digital data from the communications chassis 20 to thetunneling server 34; and(6) placing said digital data onto the Internet by said tunneling server.In a preferred embodiment, the method is accompanied by a process ofidentifying a tunneling protocol for the user for step of tunneling. For example, theauthentication server 32A or 32 B or 40 may associate the user with a particulartunneling protocol (PPTP or TELNET) by the characteristics of the remote user, therequirements of the designated tunneling server, or otherwise. Such informationwould typically be stored in the memory at the authentication server 32A.15CA 02264866 1999-03-02W0 99/01969 PCT/US98/13858Further, the invention contemplates an Internet Service Provider system forwireless Internet users, comprising a network access server 20 (FIG. 2) comprising(1) a high speed digital telephone line FR interface receiving calls from thewireless Internet user, and an Internet gateway (e.g. WAN interface 66 in5 FIG. 2) for placing digital data associated with said wireless Internet useronto the Internet;(2) an Internet access authentication server (e.g., 32A) linked to the networkaccess server 20 via a communications medium 26 and responsive toInternet access authentication data extracted from the digital data10 associated with the wireless Internet user; and(3) the authentication server 32A further comprising a memory fordetermining from the Internet access authentication data whether thewireless Internet user 12 is authorized to access the Internet, the Intemetauthentication server responsively passing an authentication response to15 the network access server 20. The network access server 20 is responsiveto the authentication response from the authentication server to either allowthe wireless Internet user to access the Internet or to take other action withrespect to a call from the wireless Internet user. For example, the Internetservice provider may forward an authentication inquiry to another20 authentication server (e.g., 40 in FIG. 1) administered by a second Internetservice provider and see if the user a customer of the second Internetservice provider.Further details conceming the implementation of presently preferredembodiments of the invention will be discussed with reference to FIG.s 3-11.25 FIG. 3 is an illustration of the protocol stacks and architecture for the tunnelinterface between the remote user 12, the communications chassis 20, a router (notshown) in the Internet service provider backbone network 26, and the designatedtunneling server 30 or 34 of FIG. 1. In FIG. 3, the legends L1 and L2 indicate lowerlevel protocols (such as the data link layer). IP indicates the Internet Protocol. PPP30 indicates the Point-To—Point Protocol. TCP indicates the transmission controlprotocol. The term Async indicates an asynchronous protocol that may be associatedwith the remote user 12 and the TELNET protocol is used in the communications16W0 99/019691015202530CA 02264866 1999-03-02PCT/US98/ 13858chassis 20 and the tunneling server for asynchronous communications. It can beseen that the communications chassis 20 communicates with the tunneling serer eitherusing PPTP or TELNET running over the IP and lower level protocols.The communications chassis 20 communicates with an authentication server(e.g., 32A) running RADIUS to implement authentication and accounting through theUDP/IP protocol stack, as shown in FIG. 4. FIG. 4 is an illustration of the protocolstacks for authentication and accounting interface between the network access serveror communications chassis 20 and the authentication server 32A of FIG. 1. UDP is aconnection—less oriented protocol built on top of the lntemet Protocol (IP).When the communications chassis 20 communicates with the Internet 22,there is no tunneling protocol. FIG. 5 is an illustration of the protocol stacks for anon—tunneling interface between the remote dial user and the router connecting theuser with a destination terminal equipment.FIG. 6 is a diagram of the call flow for PPTP protocol tunneling for a callacceptance scenario in accordance with a preferred embodiment of the invention. InFIG. 6, the process starts with an incoming call at step 100. The call is associatedwith a particular destination telephone number (1-800-123-4567 in the illustratedexample).At step 102, the communications chassis initiates an first phase authorizationaccess routine with an authentication server (e.g., 32A or 32B) connected to thecommunications chassis over a local area network. This authentication request is asoftware structure that is forwarded to the authentication server that includes fields forthe following information: (1) the telephone number associated with the remote user(which is detected during the incoming call in accordance with known calleridentification techniques or in the manner described in the above-cited Baum et al.patent); (2) the telephone number dialed, e.g., 1-800-123-4567, again extracted inknown fashion, (3) the port id., that is, the particular channel or port number in thecommunications chassis 20 that is associated with the call, and (4) the IP address ofthe communications chassis 20.At step 104, the authentication server 32A issues an Access—Reply message tothe communications chassis 20. If the user is authorized to access the networkserviced by the authentication server 32A, the message includes an identification that17W0 99/019691015202530CA 02264866 1999-03-02PCT/US98/ 13858PPTP is the proper tunneling protocol, an identification of the tunneling server’s IPaddress, and the port number of the tunneling server to receive the call. If the remoteuser is not authorized, the procedure set forth in FIG. 8, described below, is used.At step 106, the communications chassis 20 sends an Incoming-Call-Requestmessage to the tunneling server 34. The message includes an identification of thedialing number of the remote user, the telephone number dialed, and a subaddress. Atstep 108, if the tunneling server 34 is able to accept the call, an Incoming-Call-Replymessage is sent, such as Connect if the result of the access inquiry is affirmative. Ifthe tunneling server cannot accept the call, the procedure of FIG. 9 is used.At step 110, if the Connect message was received from the tunneling server34, the communications chassis 20 sends a call accept message to the remote user overthe Frame Relay line FR and wireless network. An incoming call connect message isthen relayed at step 112 from the communications chassis 20 to the tunneling server34.At step 114, a second phase authentication procedure is preferably (butSteps 116, 118, 120, 122, 124 and 126 are self-explanatory from FIG. 6 and are part of the well known PAP and CHAP passwordoptionally) implemented.authentication protocols, with which those skilled in the art are familiar.At step 128, assuming the password authentication was successful, a messageis sent from the tunneling server 34 to the remote user 12 indicating that a PPP link isestablished via the communications chassis 20 between the remote user 12 and thetunneling server 34. At this time, transfer of packets of data in accordance with theInternet Protocol between the remote user and the host on the network 22 or 24 isaccomplished.FIG. 7 is a diagram of the call flow for TELNET protocol tunneling for a callacceptance scenario in accordance with a preferred embodiment of the invention. Theprocess is largely the same as described in FIG. 6, and self-explanatory from thefigure. The establishment of a TELNET session requires a handshaking andparameter negotiation between the communications chassis 20 and the tunnelingserver 34, as indicated in steps 130 and 132. The second phase authentication usinglogin protocols such as PAP is performed as indicated. After the login acceptancemessage is sent from the tunneling server 34 to the dial user 12, asynchronous data18WO 99/019691015202530CA 02264866 1999-03-02PCT/US98/1 3858transfer takes place via the communications server 20 and the tunneling server 34between the remote user 12 and the host on the computer network (e.g., Internet).It is possible that during the first phase of the access authorization, theauthentication server determines that the remote user is not authorized to access thedesignated network served by the authentication server (due to, for example, theremote user phone number not matching with a data base of Internet customers for theInternet service provider managing the chassis 20). One preferred way of dealing withthis scenario is shown in FIG. 8, which is a diagram of the call flow for anauthentication failure scenario. When the authentication server 32A determines thatthe remote user is not authorized, an Access—Reject message is sent from theauthentication server 32 to the communications chassis 20 This message may includea field setting forth the reason why access was denied. Such reasons may include thewrong number was dialed, the ISP does not recognize the user’s telephone number,the user is in arrears in paying monthly fees, the authentication server is out ofservice, etc. The communications chassis 20 then may either send a message to theremote user 12 to either retry later, treat the call as a PSTN/modem call and try toroute the call on the PSTN system, or simply reject the call and initiate a disconnectsequence.There may also be situations where the authentication server 32A approves theaccess to the network, but the tunneling server 30 or 34 is not able to act as amechanism for transferring data between the remote user 12 and the target network 22or 24. FIG. 9 is a diagram of the call flow for a tunneling server access rejectionscenario. The first steps 100, 102, 104 and 106 are as described above in FIG. 6. Ifthe tunneling server 34 cannot process the call, the tunneling server 30 or 34 issues anIncoming-Call-Reply to the communications chassis 20 with a message or fieldindicating that the call should not be accepted. At this point, the communicationschassis 20 may either send a message to the remote user 12 to either retry later, treatthe call as a PSTN/modem call and try to route the call on the phone system, or simplyreject the call.During the second phase authentication procedure mentioned above inconnection with FIGS. 6 and 7, the user may fail the password authenticationprocedure. FIG. 10is a diagram of the call flow for an authentication failure19WO 99/019691015202530CA 02264866 1999-03-02PCT/US98/13858scenario for the PPTP protocol in which a log-in password authentication procedure isperformed as a second phase of a network access authentication procedure. At step140, an access reject message is sent to the tunneling server 30/34 from theauthentication server 32A. At this point (step 142) the tunneling server sends a loginreject message to the remote user 12.FIG. 11 is a diagram of the call flow for an authentication failure scenario forthe TELNET in which a log-in password authentication procedure is performed as asecond phase of a network access authentication procedure. The process proceedsessentially as described above.Still further details on the presently preferred implementation of PPTP andTELNET tunneling, accounting, and phase 1 and phase two authentication, as set forthherein, are described below.Protocol InterfaceThe communications chassis 20 interfaces with the Dial-user (wirelessterminal), MSC, Router, Authentication Server, and Tunneling Server. Thisspecification is only concerned with the communications chassis interfaces to theAuthentication Server and the Tunneling Server. The other interfaces will be apparentto those skilled in the art.PPTP TunnelingPPTP tunneling is enabled based on the Login-Service attribute from theRADIUS Access—Reply message during the phase one authentication. If the protocoltype has value PPTP (TBD in RFC 2058), a PPTP tunnel will be setup between thecommunications chassis and the Tunneling Server to tunnel further traffic from thecaller.The communications chassis gateway is equivalent to the PAC (PPTP AccessConcentrator) in the PPTP RFC and the Tunneling Server is equivalent to the PNS(PPTP Network Server) in the PPTP RFC. In the following PPTP description, we usethe terms PAC and PNS.20W0 99/0196910152530CA 02264866 1999-03-02PCT/US98/13858For each configured PPTP PAC-PNS pair, the interface between the PAC(communications chassis) and PNS (Tunneling Server) consists of two parallelcomponents:1. A Control connection operating over TCP.2. An IP tunnel that transports encapsulated PPP packets for user sessionsbetween the pair.PPTP Control ConnectionBefore PPP tunneling can occur between a PAC and PNS, a control connectionmust be established between them. The control connection is a standard TCP sessionover which PPTP call control and management information is passed. The controlsession is logically associated with, but separate from, the sessions being tunneledthrough a PPTP tunnel.For each PAC-PNS pair both a tunnel and a control connection exist. Thecontrol connection is responsible for establishment, management, and release ofsessions carried through the tunnel. It is the means by which a PNS is notified of anincoming call at an associated PAC, as well as the means by which a PAC isinstructed to place an outgoing dial call (this scenario is not supported at this time).The PPTP RFC does not specify when to set up each control connection. Thisis up to the implementation. To reduce call setup time, the PAC (communicationschassis) will establish the control connections at initialization.PPTP Tunnel ConnectionPPTP requires the establishment of a tunnel for each communicating PAC-PNS pair. The tunnel is used to carry all user session PPP packets for sessionsinvolving a given PAC-PNS pair. A key which is present in the GRE header indicateswhich session a particular PPP packet belongs to. In this manner, PPP packets aremultiplexed and de-multiplexed over a single tunnel between a given PAC-PNS pair.The value to use in the key field is established by the call establishment procedurewhich takes place on the control connection.21CA 02264866 2002-07-1876909-100PPTP Control Connection MessagesControl Connection Management Messages:These messages consist of the following messages0 Start-Control-Connection—Request5 0 Start-Control-Connectiom Reply0 Stop-Control-Connection—Request0 Stop—Control-Connection—Reply0 Echo-Request0 Echo—Reply 10Call Management Message:These messages consist of the following messages:0 Outgoing—Call—Request (not supported at this time)0 Outgoing—Ca1l-Reply (not supported at this time)15 0 Incoming-Call-Request0 Incoming—Call-Reply- Inc0ming—Ca1l-Connected0 Call-Clear-RequestI" o Ca1l~Disconnect-Notify20Error Reporting ~0 WAN-Error-NotifyPPP Session Control25 0 Set-Link~InfoPPTP Tunnel Connection MessagePPTP Data PDQ:Each PPP frame is encapsulated in a GRE (Generic Routing Encapsulation30 Header, described in the Reouest For Comments (RFC) 1701 (October, 1 994).22l01520'2530— um: _.CA 02264866 2002-07-1876909-100Telnet Tu'nneling _The PPTP and LZTP protocols are not designed to tunnel Asynchronoustraffic. A synchronousitraffic will be tunneled via the Telnet Protocoldescribed in the Internet Engineering Task Force Request forComments (RFC) 843, entitled Telnet Protocol Specification,J. Postel, J.K. Reynolds dated May 1, 1983, available on theinternet at www. ietf . org .The Telnet implementation must support the Telnet commands and options,such as ECHO, linemode, binary, and SUPPRESS GO AHEAD. The TunnelingServer must be able to request on a given Telnet session a switch fro-m one modeanother in the middle of a Telnet connection, such as going from ECHO to NOECHO, linemode and, subsequently, to binary transmission. In addition, the escapefunctionality must be disabled in the communications chassis gateway to prevent thedial user from entering local mode on the communications chassis gateway.Telnet tunneling is enabled based on the Login—Service attribute from theRADIUS Access-Reply message during phase one authentication. If the Login—Service attribute has value Telnet, a Telnet tunnel will be set up between thecommunications chassis and the Tunneling Server to tunnel further traffic from thecaller.RADIUS Authentication InterfaceTwo phases of authentication will be used. The first phase of authentication isbased on calling number, called number, and communications chassis IP address. Thesecond phase authentication is based on user name, password, and/orchallenge/response (optional).This section specifies both the first phase and the second phase RADIUSauthentication exchange. When using one of the tunneling options, the end userauthentication will be done by the Tunneling Server during the second phaseauthentication, which is transparent to the communications chassis. With non-tunneling Internet access, the communications chassis performs both phases ofauthentication (and may optionally skip the first phase).The following general operations apply to the RADIUS interface:1. This document complies with the IETF RADIUS Authentication RFC2058. The Authentication Server provides the RADIUS server functions23101520MIN; llCA 02264866 2002-07-1876909-100specified in the Internet Engineering Task Force RequestfOr Comments (RFC) 2058, entitled Remote AuthenticationDial In User Service (RADIUS), C. Rigney, A. Rubens, W.Simpson, S. Willens, dated January 1997, available on theinternet at www.ietf.org. The communication chassis andTunneling Server implement the RADIUS client; functions.The communications chassis shall be able to associate at least twoAuthentication Servers -with each special Internet access called number.These two (or more) Authentication Servers will provide pn'mary"andsecondary RADIUS authentication server functions. Each AuthenticationServer will be identifiable with a configurable server IP address and UDPport. The Intemet access called numbers may or may not share —Authentication Servers. 1The RADIUS shared secret I to 15 characters) will be configuredadministratively per server. This specification does not address howshared secrets are managed across communications chassis gateways andRADIUS nodes (Authentication Servers), but such details are within thecapability of persons skilled in the art.The communications chassis gateway implements a re—transn1it algorithmthat allows for Access—Requests to be lost. A configurable re—transmissioncounter determines when the Authentication Servers are out of Service for Va particular Internet access called number, in which A case thecommunications chassis optionally follows standard PSTN/modem accessprocedures.Phase 1 Authentication InterfaceAccess—Reguest Message: _The RADIUS Access-Request Message will be sent to the RADIUS server25 (the Authentication Server 32A) by communications chassis 20 to indicate anincoming call. The following list of attributes are sent along with the message:User—‘Name: Set to VENDOR—ID for all incoming calls0 User—Password: Set to null0 NAS-IP.-Address: Set to IP address of the communications chassis30NAS-Port: The port number or any other identifier that can be associatedwith the caller on the communications chassis.24W0 99/0196910152530CA 02264866 1999-03-02PCT/US98/13858Ca11ed—Station-Id: The called number dialed by the user. This will be usedto identify the service desired by the caller.Calling-Station-Id: The caller’s number or telephone identifier. This maybe used for phase I authentication.NAS—Port-Type: Specifies the type of port used by the user on thecommunications chassis switch: (TBD value for wireless access in RFC2058).Access-Accept MessageThe RADIUS Access-Accept Message is sent by RADIUS (AuthenticationServer) to the communications chassis 20 to indicate the acceptance of the incomingcall for the specific service.The following list of attributes are sent from theAuthentication Server to the communications chassis:Service-Type: Set to 1 (Login) for PPTP or Telnet tunneling. Set to 2(Framed) for non-tunneling Internet access using PPP.Login-Service: Set to either 0 - Telnet, or TBD — PPTP. Attribute unusedif Service-Type attribute set to 2 (Framed).Login-IP-Host: The IP Address of the Tunneling Server to which thecaller should be connected. Attribute unused if Service—Type attribute setto 2 (Framed).Login—TCP—Port: The TCP port on the Tunneling Server to which thecaller should be connected. Attribute unused if Service-Type is set to 2(Framed).Reply-Message: Optional, sent only for Telnet users. The communicationchassis should forward this attribute as an async string to the remote userbefore completing the TELNET tunnel to the Tunneling Server.Framed—Protocol: Set to 1 (PPP) if Service-Type attribute set to 2(Framed). Attribute is unused if Servive-Type is set to 1 (Login).Access—Rej ect MessageThe RADIUS Access-Reject message is sent by RADIUS to thecommunications chassis to deny an incoming call to the specific service.The25W0 99/0196910152025CA 02264866 1999-03-02PCT/US98/13858communications chassis, upon receiving this message, will proceed with normalPSTN/modem procedures. The Communications Chassis should forward an ASCIIstring message to the user, if the Reply Message attribute is included in the Access-Reject message. The following attribute may optionally be sent from RADIUS to thecommunications chassis:0 Reply-Message: Optional, sent only for Telnet users. The communicationschassis should forward the contents of this attribute as an async string tothe caller before proceeding with normal PSTN/modem procedures.Phase II Authentication InterfaceThis section specifies the phase two authentication messages between acommunications chassis and Authentication Server using the non-tunneling lntemetaccess option. It also provides an example of a possible phase two authenticationexchange between a Tunneling Server (RADIUS client) and Authentication Server(RADIUS server) based on either of the tunneling options.Access-Reguest MessageThe RADIUS Access-Request Message will be sent to RADIUS by thecommunications chassis to indicate an incoming call. The following list of attributesare sent along with the message:0 User—Name: This attribute indicates the name of the dial-in user to beauthenticated.0 User—Password: This attribute indicates the password of the dial-in user tobe authenticated, or the user’s input following an Access-Challenge.0 NAS-IP-Address: Set to IP address of the communications chassis.0 NAS-Port: The port number or any other identifier that can be associatedwith the caller on the communications chassis.0 Service—Type: Set to 2 (Framed).0 Framed—Protocol: Set to 1 (PPP).26CA 02264866 2002-07-187690941000 Framed-IP-Address: The dial in user 12 may optionally request the use ofits local static configured IP address. This IP address may be overwrittenby the same attribute included in the Access-Accept Message.5 Access-Accept MessageThe RADIUS Accept Message is sent by RADIUS to the communicationschassis to indicate the acceptance of the incoming call for the specific service. Thedial-user is also assigned an IP address by this message. The folllowing attribute issent fiom RADIUS to the communications chassiszi10 0 Framed-IP-Address: This attribute indicates the IP address to beassigned to the user.Access~Reject MessageThe RADIUS Access-Reject message is sent by RADIUS (authentication15 server) to the communications chassis to deny a specific service to an incoming call.a The communications chassis, upon receiving this message, will indicate that therequested service is not available and terminate the user connection.Access—Challenge Message20 The RADIUS Access-Challenge message is optionally sent by RADIUS to the. communications chassis to perform challenge/response authentication procedure toRFC 2058.RADIUS Accounting InterfaceBoth the communications chassis and the Tunneling Server will implementRADIUS accounting client functions as defined in InternetEngineering Task Force Request for Comments (RFC) 2059, entitledRADIUS Accounting, C. Rigney, dated January 1997, available} onthe internet at www.ietf.org. If an AccountingServer is associated with the Authentication Server controlling a call, each RADIUSaccounting client will send the following RADIUS accounting messages as describedin this section. I30» The accounting clients from the communications chassis and the TunnelingSewer will send the accounting Start message upon receiving the Access-Acceptmessage from the RADIUS Authentication Server.27W0 99/019691015202530CA 02264866 1999-03-02PCT/US98/13858Once a call has been dropped, cleared, or disconnect, the accounting clientswill send an accounting Stop message to the RADIUS accounting server.The accounting Start message is conveyed by the RADIUS Accounting-Request message with Acct-Status-Type value set to 1. The accounting Stop messageis conveyed by the RADIUS Accounting-Request message with Acct-Status-Typevalue set to 2.Accounting-Request MessageThe Accounting-Request packets are sent from the client to RADIUSaccounting server and convey information used to provide accounting for a serviceprovided to a user.The following are part of the accounting related attributes which may be sentalong with the message:0 Acct-Status—Type: This attribute indicates whether this Accounting-Request marks the beginning of the user service (Start) or the end (Stop).0 Acct-Delay-Time: This attribute indicates for how many seconds the clienthas been trying to send this record, and can be subtracted from the time ofarrival on the server to find the approximate time of the event generatingthis Accounting-Request.o Acct-Input-Octets: This attribute indicates how many octets have beenreceived from the port over the course of this service being provided, andcan only be present in Accounting-Request records where the Acct-Status-Type is set to Stop.0 Acct—Output-Octets: This attribute indicates how many octets have beensent to the communications chassis in the course of delivering this service,and can only be present in Accounting-Request records where the Acct-Status-Type set to Stop.0 Acct-Session-Id: This attribute is a unique Accounting ID to make it easyto match start and stop records in a log file. The start and stop records fora given session must have the same Acct-Session-Id. It is stronglyrecommended that the Acct-Session-Id be a printable ASCII string.28WO 99101969101520CA 02264866 1999-03-02PCT/US98/l 3858Acct-Authentic: This attribute may be included in an Accounting-Requestto indicate how the user was authenticated, whether by RADIUS, thesender itself, or another remote authentication protocol. Users who aredelivered service without being authenticated should not generateAccounting records.Acct—Session-Time: This attribute indicates for how many seconds theuser has received service, and can only be present in Accounting-Requestrecords where the Acct—Status-Type is set to Stop.Acct-Input-Packets: This attribute indicates how many packets have beenreceived from the port over the course of this service being provided to aFramed User, and can only be present in Accounting-Request recordswhere the Acct—Status-Type is set to Stop.Acct-Output—Packets: This attribute indicates how many packets havebeen sent to the port in the course of delivering this service to a FramedUser, and can only be present in Accounting—Request records where theAcct—Status-Type is set to Stop.Acct-Terminate-Cause: This attribute indicates how the session wasterminated, and can only be present in Accounting-Request records wherethe Acct—Status-Type is set to Stop.Accounting—Response MessageUpon receipt of an Accounting-Request, the RADIUS accounting server mustreply with the Accounting—Response message if it successfully records the accountingpacket, and must not transmit and reply if it fails to record the accounting packet.25GLOSSARYTerms and AcronymsCode Division Multiple Access (CDMA)A North American Standard for digitalvoice and data wireless30 telecommunications in the cellular and PCS spectrum which uses the CDMAtechnique for multiplexing users on the radio interface.29a‘S!,1015202530wlllllt .‘ 1CA 02264866 2002-07-1876909-100Internet Protocol (IP)The Internet Protocol defines an unreliable, connectionless deliver mechanismfor user datagrams through the Internet.IWP-IPAn communications chassis provides the functions needed for terminalequipment connected to a TDMA or CDMA mobile phone to inter-work with terminalequipment connected to the PSTN and Internet networks.Layer Two Tunneling Protocol (LZTP)A protocol defined to pennit the tunneling of the link layer protocol of PPP.This protocol is in draft RFC form at the present time atInternet Engineering Task Force Request for (‘lomments (RFC)2661, entitled Layer Two Tunneling Protocol “L2TP”,dated August 199 9 ,W. Townsleyet al., available on the internet atwww.ietf.org and is expected to be adopted as a standard.Mobile Switching Center_(MSC)A network element within a cellular or PCS wireless telecommunicationsnetwork that provides PSTN connectivity, control functions, and switching functionsfor wireless users.PPTP Access Concentrator (PAC)A device providing external connectivity (typically via one or more PSTN orISDN lines), capable of PP? operation and of handling the PPTP protocol. The PACuses IP to tunnel user traffic to one or more PHSs. It may also tunnel non-IPprotocols.PPTP Network Server (PNS)A PNS is a communications chassis envisioned to operate on general-purposecomputing/server platforms. The PNS handles the server side of the PPTP protocol.Since PPTP relies completely on IP and is independent of the interface hardware, thePNS may use the any combination of IP interface hardware including LAN and WANdevices.30WO 99/019691015202530CA 02264866 1999-03-02PCT/US98/13858Point—to—Point Tunneling Protocol (PPTP)A protocol defined to tunnel PPP traffic between PAC and PNS. It uses GRE-like (Generic Routing Encapsulation) mechanism to provide a flow- and congestion-controlled encapsulated datagram service for carrying PPP packets. The protocol alsosupports a “Tunnel” control and management fimction to setup and tear down acontrol connection as well as setup and tear down a data connection. There is onecontrol connection and one data connection for each pair of PAC and PNS.Public Switched Telephone Network (PSTN)The land-based telecommunications infrastructure that provides 3 KHZ circuitvoice server to fixed endpoints throughout the world today.Remote Authentication Dial In User Service (RADIUS)RADIUS servers are responsible for receiving user connection requests,authenticating the user, and then returning all configuration information necessary forthe client to deliver service to the user. A Radius server can act as a proxy client toRADIUS serversupport PPP PAP or CHAP, UNIX login, and other authentication mechanisms.other RADIUS servers or other kinds of authentication servers.TELNETTelnet was designed to support asynchronous communication between any twonetwork virtual terminals (NVT) over a TCP/IP connection. The NVT is an imaginarydevice from which both ends of the connection, the client and server, map their realterminal to and from.Time Division Multiple Access (TDMA)A North American Standard for digital voice and data wirelesstelecommunications in the cellular and PCS spectrum which uses the TDMAtechnique for multiplexing users on the radio interface.31CA 02264866 1999-03-02W0 99/01969 PCT/US98/13858Transport Control Protocol (TCP)The Transport Control Protocol provides a reliable connection-orientedmechanism for delivery of user data across an IP network.5 TS—IPTunneling Server IP addressUser Datagram Protocol (UDP)A connection-less oriented protocol built on top of IP. The service access10 point (SAP) of UDP is identified by a UDP port and the IP address.Virtual Private Network (VPN)A secure network built upon Internet to deliver secure information access.15 From the foregoing description, it will be appreciated that Variousmodifications and changes may be made to the preferred embodiments disclosedherein, without departure from the true spirit and scope of the invention. This truespirit and scope is set forth in the appended claims, to be interpreted in light of theforegoing.32

Claims (18)

WE CLAIM:
1. A method of connecting a source of digital data to a computer network, the source of digital data communicating over a wireless transmission medium to a wireless service carrier, the wireless service carrier multiplexing said digital data onto a high speed digital telephone line, the method comprising the steps of:
receiving said digital data at a communications device having a telephone line interface and a network interface;
said communications device extracting, from said digital data, network access authentication data comprising at least one of the following: (a) a telephone number called by said source of digital data, or (b) a telephone number associated with said source of digital data;
said communications device transmitting said authentication data over a local area or wide area computer network connected to said network access server to a network authentication server for said computer network;
determining, in said network authentication server, from said transmitted authentication data whether said remote user is permitted to access said computer network;
said authentication server responsively notifying said communications device the results of said step of determining and authorizing said source of data to access said computer network if said step of determining results in a positive response.
2. The method of claim 1, wherein the method further comprises the steps of:
identifying, in said authentication server, a tunneling server linked to said communications device to be used to provide access for said source of digital data to said computer network; and routing digital data from said source of digital data to said tunneling server to provide said access to said computer network.
3. The method of claim 2, further comprising the steps of:

determining, in said authentication server, a tunneling protocol for said sourceof digital data for use in tunneling digital data between said network access server and said tunneling server; and routing digital data from said source of digital data to said tunneling server in according to said tunneling protocol.
4. The method of claim 2, wherein said tunneling protocol is selected from the group of protocols comprising PPTP and TELNET.
5. The method of claim 1, wherein said computer network comprises the Internet.
6. The method of claim 1, wherein said computer network comprises a corporate local area or wide area network.
7. The method of claim 1, wherein said communications device provides access to the public switched telephone network and wherein said communications device attempts to route said digital data to a destination for said digital data via said public switched telephone network in the event that said step of determining results in a negative response.
8. The method of claim 2, further comprising the steps of:
conducting a password authentication routine between either (1) said tunneling server or (2) said authentication server and said source of digital data, thereby providing a second level of authentication between said source of digital data and said computer network.
9. An Internet access method for use by an Internet service provider having a communications device receiving telephone calls from a user over a high speed telephone line, comprising the steps of:
connecting said communications device to an authentication server over a local or wide area network;

extracting, from an incoming call from said user, network access authentication data comprising at least one of the following: (a) a telephone number called by said user, or (b) a telephone number associated with said user;
routing said network authentication data to said authentication server for authentication of said user from said network access authentication data;
identifying a tunneling server for providing network access for said user and notifying said network access server of said tunneling server;
tunneling digital data from said network access server to said tunneling server; and placing said digital data onto the Internet by said tunneling server.
10. The method of claim 9, further comprising the steps of:
identifying a tunneling protocol for said user for said step of tunneling.
11. A method of connecting a computer generating digital data to the Internet, the digital data being placed onto a high speed digital telephone line for transmission to an Internet service provider, the method comprising the steps of:
receiving said digital data at a communications device at said Internet service provider;
extracting, from said digital data, Internet access authentication data comprising at least one of the following: (a) a telephone number called by said source of digital data, or (b) a telephone number associated with said computer;
transmitting said authentication data to a network authentication server;
determining, in said network authentication server, from said transmitted authentication data, whether said remote user is authorized to access the Internet via said network access server;
said authentication server responsively notifying said network access server the results of said step of determining and authorizing said computer to access the Internet if said step of determining results in a positive response.
12 The method of claim 11, wherein the method further comprises the steps of:
identifying, in said authentication server, a tunneling server to be used to provide access for computer to the Internet; and routing digital data from said computer to said tunneling server to provide saidaccess to the Internet.
13. The method of claim 12, further comprising the steps of:
determining, in said authentication server, a tunneling protocol for use in tunneling digital data between said network access server and said tunneling server;
and routing digital data from said computer to said tunneling server in according tosaid tunneling protocol.
14. The method of claim 13, wherein said tunneling protocol is selected from the group of protocols comprising PPTP and TELNET.
15. The method of claim 11, wherein said communications device provides access to the public switched telephone network and wherein said communications device attempts to route said digital data to a destination for said digital data via said public switched telephone network in the event that said step of determining results in a negative response.
16. The method of claim 12, further comprising the steps of:
conducting a password authentication routine between either (1) said tunneling server or (2) said authentication server and said computer, thereby providing a second level of authentication between said source of digital data and said computer network.
17. An Internet service provider system for a wireless Internet user, comprising, in combination:

a network access server comprising a high speed digital telephone line interface receiving calls from said wireless Internet user and an Internet gateway for placing digital data associated with said wireless Internet user onto the Internet;
an Internet access authentication server linked to said network access server via a communications medium and responsive to Internet access authentication data extracted from said digital data associated with said wireless Internet user received by said network access server and transmitted from said network access server to said authentication server;
said authentication server further comprising a memory for determining from said Internet access authentication data whether said wireless Internet user is authorized to access the Internet, said Internet authentication server responsively passing an authentication response to said network access server;
said network access server responsive to said authentication response from said authentication server to either allow said wireless Internet user to access the Internet or to take other action with respect to a call from said wireless Internet user.
18. The Internet service provider system of claim 17, further comprising a second Internet authentication server linked to said network access server over a communications medium and responsive to authentication data from said network access server, and wherein said second Internet authentication server is managed by a second Internet service provider and provides Internet authentication responses for said wireless Internet user to either said network access server or said Internet access authentication server.
CA002264866A 1997-07-03 1998-07-02 Network access methods, including direct wireless to internet access Expired - Fee Related CA2264866C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US08/887,313 1997-07-03
US08/887,313 US6151628A (en) 1997-07-03 1997-07-03 Network access methods, including direct wireless to internet access
PCT/US1998/013858 WO1999001969A1 (en) 1997-07-03 1998-07-02 Network access methods, including direct wireless to internet access

Publications (2)

Publication Number Publication Date
CA2264866A1 CA2264866A1 (en) 1999-01-14
CA2264866C true CA2264866C (en) 2003-10-28

Family

ID=25390894

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002264866A Expired - Fee Related CA2264866C (en) 1997-07-03 1998-07-02 Network access methods, including direct wireless to internet access

Country Status (9)

Country Link
US (2) US6151628A (en)
EP (1) EP0927482B1 (en)
JP (1) JP3515983B2 (en)
KR (1) KR100308073B1 (en)
AU (1) AU8181498A (en)
CA (1) CA2264866C (en)
DE (1) DE69803974T2 (en)
IL (1) IL128656A (en)
WO (1) WO1999001969A1 (en)

Families Citing this family (299)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9100389D0 (en) * 1991-01-09 1991-02-20 Digital Equipment Corp Method and apparatus for transparently bridging traffic across wide area networks
US6137869A (en) * 1997-09-16 2000-10-24 Bell Atlantic Network Services, Inc. Network session management
SE520137C2 (en) * 1997-03-11 2003-06-03 Ericsson Telefon Ab L M Method and device for sending from an Internet-connected computer its telephone number to a dialed telephone by means of a service in a node
US7290288B2 (en) 1997-06-11 2007-10-30 Prism Technologies, L.L.C. Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network
SE509926C2 (en) * 1997-08-29 1999-03-22 Telia Ab Communication system including transmission of internet address by SMS
DE19739981C2 (en) * 1997-09-11 2000-12-14 Siemens Ag Procedure for handling telecommunications connections via a public exchange
SE9703327L (en) * 1997-09-12 1999-03-13 Ericsson Telefon Ab L M Method and apparatus for data communication
US6463475B1 (en) * 1997-09-26 2002-10-08 3Com Corporation Method and device for tunnel switching
NO326260B1 (en) * 1997-09-29 2008-10-27 Ericsson Telefon Ab L M Method of routing calls from a terminal in a first telecommunications network to a terminal in a second telecommunications network
US6675208B1 (en) * 1997-10-14 2004-01-06 Lucent Technologies Inc. Registration scheme for network
US6400722B1 (en) * 1997-10-14 2002-06-04 Lucent Technologies Inc. Optimum routing system
US6421714B1 (en) * 1997-10-14 2002-07-16 Lucent Technologies Efficient mobility management scheme for a wireless internet access system
US6393482B1 (en) * 1997-10-14 2002-05-21 Lucent Technologies Inc. Inter-working function selection system in a network
US6512754B2 (en) * 1997-10-14 2003-01-28 Lucent Technologies Inc. Point-to-point protocol encapsulation in ethernet frame
US6084872A (en) * 1997-10-30 2000-07-04 Ameritech Corporation Trunk and switch architecture for providing switched-circuit connections to on-line data services
IES80915B2 (en) * 1997-12-15 1999-06-30 Tellabs Research Limited Telecommunication systems
US7209457B1 (en) * 1997-12-19 2007-04-24 Cingular Wireless Ii, L.L.C. Methods and systems for managing the routing of packets over a hybrid communication network
US7051004B2 (en) * 1998-04-03 2006-05-23 Macrovision Corporation System and methods providing secure delivery of licenses and content
US7072330B2 (en) 1998-04-03 2006-07-04 Consolidated Ip Holdings, Inc. Systems for voice and data communications having TDM and packet buses and telephony station cards including voltage generators
US6498791B2 (en) 1998-04-03 2002-12-24 Vertical Networks, Inc. Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses and methods for performing telephony and data functions using the same
US6389009B1 (en) 2000-12-28 2002-05-14 Vertical Networks, Inc. Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses
US6154465A (en) 1998-10-06 2000-11-28 Vertical Networks, Inc. Systems and methods for multiple mode voice and data communications using intelligenty bridged TDM and packet buses and methods for performing telephony and data functions using the same
US6202056B1 (en) * 1998-04-03 2001-03-13 Audiosoft, Inc. Method for computer network operation providing basis for usage fees
US6181694B1 (en) 1998-04-03 2001-01-30 Vertical Networks, Inc. Systems and methods for multiple mode voice and data communciations using intelligently bridged TDM and packet buses
US6452915B1 (en) 1998-07-10 2002-09-17 Malibu Networks, Inc. IP-flow classification in a wireless point to multi-point (PTMP) transmission system
US6680922B1 (en) 1998-07-10 2004-01-20 Malibu Networks, Inc. Method for the recognition and operation of virtual private networks (VPNs) over a wireless point to multi-point (PtMP) transmission system
US6590885B1 (en) 1998-07-10 2003-07-08 Malibu Networks, Inc. IP-flow characterization in a wireless point to multi-point (PTMP) transmission system
US6640248B1 (en) 1998-07-10 2003-10-28 Malibu Networks, Inc. Application-aware, quality of service (QoS) sensitive, media access control (MAC) layer
US6628629B1 (en) * 1998-07-10 2003-09-30 Malibu Networks Reservation based prioritization method for wireless transmission of latency and jitter sensitive IP-flows in a wireless point to multi-point transmission system
US6862622B2 (en) 1998-07-10 2005-03-01 Van Drebbel Mariner Llc Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PTMP) transmission system architecture
US6594246B1 (en) 1998-07-10 2003-07-15 Malibu Networks, Inc. IP-flow identification in a wireless point to multi-point transmission system
FI105742B (en) * 1998-08-06 2000-09-29 Nokia Networks Oy Internet / intranet access mechanism
US6535918B1 (en) * 1998-09-22 2003-03-18 Qualcomm Incorporated Interface between standard terminal equipment unit and high speed wireless link
US6119160A (en) * 1998-10-13 2000-09-12 Cisco Technology, Inc. Multiple-level internet protocol accounting
DE59915257D1 (en) * 1998-10-19 2011-04-21 Nokia Siemens Networks Gmbh NETWORK ARCHITECTURE FOR COMMUNICATION AND / OR DATA NETWORKS
CN1292200A (en) * 1998-10-27 2001-04-18 皇家菲利浦电子有限公司 Broadcast network with interactive services
CA2281431A1 (en) * 1998-10-28 2000-04-28 Lucent Technologies Inc. Mobile-tcp and method of establishing and maintaining a mobile-tcp connection
US7418504B2 (en) 1998-10-30 2008-08-26 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
US10511573B2 (en) 1998-10-30 2019-12-17 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
US6502135B1 (en) 1998-10-30 2002-12-31 Science Applications International Corporation Agile network protocol for secure communications with assured system availability
US6839759B2 (en) 1998-10-30 2005-01-04 Science Applications International Corp. Method for establishing secure communication link between computers of virtual private network without user entering any cryptographic information
CA2349520C (en) 1998-10-30 2011-05-17 Science Applications International Corporation An agile network protocol for secure communications with assured system availability
US6845370B2 (en) 1998-11-12 2005-01-18 Accenture Llp Advanced information gathering for targeted activities
US6134548A (en) * 1998-11-19 2000-10-17 Ac Properties B.V. System, method and article of manufacture for advanced mobile bargain shopping
US6609153B1 (en) * 1998-12-24 2003-08-19 Redback Networks Inc. Domain isolation through virtual network machines
US6442608B1 (en) * 1999-01-14 2002-08-27 Cisco Technology, Inc. Distributed database system with authoritative node
US6412007B1 (en) 1999-01-14 2002-06-25 Cisco Technology, Inc. Mechanism for authorizing a data communication session between a client and a server
US6412077B1 (en) * 1999-01-14 2002-06-25 Cisco Technology, Inc. Disconnect policy for distributed computing systems
US6628671B1 (en) 1999-01-19 2003-09-30 Vtstarcom, Inc. Instant activation of point-to point protocol (PPP) connection using existing PPP state
US6466571B1 (en) 1999-01-19 2002-10-15 3Com Corporation Radius-based mobile internet protocol (IP) address-to-mobile identification number mapping for wireless communication
US6707809B1 (en) 1999-02-25 2004-03-16 Utstarcom, Inc. Method for forwarding data to idle mobile nodes, and home agent control node for use in the method
US6356905B1 (en) 1999-03-05 2002-03-12 Accenture Llp System, method and article of manufacture for mobile communication utilizing an interface support framework
US6401085B1 (en) 1999-03-05 2002-06-04 Accenture Llp Mobile communication and computing system and method
US6199099B1 (en) 1999-03-05 2001-03-06 Ac Properties B.V. System, method and article of manufacture for a mobile communication network utilizing a distributed communication network
US7505455B1 (en) * 1999-03-19 2009-03-17 F5 Networks, Inc. Optimizations for tunneling between a bus and a network
US6377955B1 (en) * 1999-03-30 2002-04-23 Cisco Technology, Inc. Method and apparatus for generating user-specified reports from radius information
GB2348778A (en) 1999-04-08 2000-10-11 Ericsson Telefon Ab L M Authentication in mobile internet access
US6647260B2 (en) * 1999-04-09 2003-11-11 Openwave Systems Inc. Method and system facilitating web based provisioning of two-way mobile communications devices
US7340057B2 (en) * 2001-07-11 2008-03-04 Openwave Systems Inc. Method and apparatus for distributing authorization to provision mobile devices on a wireless network
US6298234B1 (en) * 1999-05-18 2001-10-02 Telefonaktiebolaget L M Ericsson (Publ) System and method for providing access to the internet via a radio telecommunications network
US6460081B1 (en) * 1999-05-19 2002-10-01 Qwest Communications International Inc. System and method for controlling data access
EP1067771A1 (en) * 1999-07-05 2001-01-10 CANAL+ Société Anonyme Communications method and apparatus
US6779051B1 (en) * 1999-07-30 2004-08-17 Nortel Networks Corporation Determining an end point of a GRE tunnel
US7174564B1 (en) * 1999-09-03 2007-02-06 Intel Corporation Secure wireless local area network
WO2001029731A1 (en) * 1999-10-21 2001-04-26 3Com Corporation Access control using a personal digital assistant-type
US8463231B1 (en) * 1999-11-02 2013-06-11 Nvidia Corporation Use of radius in UMTS to perform accounting functions
US8117291B1 (en) * 1999-11-02 2012-02-14 Wireless Technology Solutions Llc Use of internet web technology to register wireless access customers
US6865169B1 (en) 1999-11-02 2005-03-08 Ipwireless, Inc. Cellular wireless internet access system using spread spectrum and internet protocol
US6873609B1 (en) * 1999-11-02 2005-03-29 Ipwireless, Inc. Use of internet WEB technology for wireless internet access
US6618370B1 (en) * 1999-11-16 2003-09-09 Bellsouth Intellectual Property Corporation System and method for bandwidth on demand for internet service providers
US6275693B1 (en) * 1999-11-22 2001-08-14 Motorola, Inc. Method and apparatus for performing bearer independent wireless application service provisioning
US6760601B1 (en) * 1999-11-29 2004-07-06 Nokia Corporation Apparatus for providing information services to a telecommunication device user
US6654348B1 (en) * 1999-12-27 2003-11-25 Cisco Technology, Inc. Modem pass through for remote testing
US6826195B1 (en) 1999-12-28 2004-11-30 Bigband Networks Bas, Inc. System and process for high-availability, direct, flexible and scalable switching of data packets in broadband networks
US7190687B1 (en) 2000-01-04 2007-03-13 Qualcomm Incorporated Method and apparatus for requesting point-to-point protocol (PPP) instances from a packet data services network
US7197017B1 (en) * 2000-01-04 2007-03-27 Qualcomm, Incorporated Method and apparatus for channel optimization during point-to-point protocol (PPP) session requests
US20060235945A1 (en) * 2000-01-14 2006-10-19 Frietas Nathaniel X Software architecture for wireless data and method of operation thereof
US7092998B2 (en) 2000-01-14 2006-08-15 Palm, Inc. Software architecture for wireless data and method of operation thereof
WO2001052016A2 (en) * 2000-01-14 2001-07-19 Thin Air Apps Software architecture for wireless data and method of operation thereof
KR100407922B1 (en) * 2000-01-18 2003-12-01 마이크로 인스펙션 주식회사 Certified method on the internet using cellular phone
GB0001025D0 (en) * 2000-01-18 2000-03-08 Hewlett Packard Co Communication initiation method employing an authorisation server
US6684256B1 (en) * 2000-01-27 2004-01-27 Utstarcom, Inc. Routing method for mobile wireless nodes having overlapping internet protocol home addresses
US7933249B2 (en) * 2000-02-08 2011-04-26 Ipr Licensing, Inc. Grade of service and fairness policy for bandwidth reservation system
US6834341B1 (en) 2000-02-22 2004-12-21 Microsoft Corporation Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet
US7032241B1 (en) 2000-02-22 2006-04-18 Microsoft Corporation Methods and systems for accessing networks, methods and systems for accessing the internet
US7444669B1 (en) 2000-05-05 2008-10-28 Microsoft Corporation Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet
US6654792B1 (en) * 2000-02-28 2003-11-25 3Com Corporation Method and architecture for logical aggregation of multiple servers
JP3494610B2 (en) * 2000-02-28 2004-02-09 富士通株式会社 IP router device with TCP termination function and medium
US7054636B1 (en) * 2000-03-01 2006-05-30 Gte Wireless Services Corporation Method and system for communicating data from wireline terminals to mobile terminals
US6466779B1 (en) * 2000-03-07 2002-10-15 Samsung Electronics Co., Ltd. System and method for secure provisioning of a mobile station from a provisioning server using IWF-based firewall
CA2404910C (en) * 2000-03-30 2009-10-13 British Telecommunications Public Limited Company Data networks
JP2001309053A (en) * 2000-04-26 2001-11-02 Nec Corp Ip address assigning system and its processing method
US7149896B1 (en) 2000-05-05 2006-12-12 Microsoft Corporation Methods and systems for providing security for accessing networks, methods and systems for providing security for accessing the internet
US6611526B1 (en) 2000-05-08 2003-08-26 Adc Broadband Access Systems, Inc. System having a meshed backplane and process for transferring data therethrough
US6853680B1 (en) * 2000-05-10 2005-02-08 Bigband Networks Bas, Inc. System and process for embedded cable modem in a cable modem termination system to enable diagnostics and monitoring
JP3597448B2 (en) * 2000-05-12 2004-12-08 住友重機械工業株式会社 Information access method and network system
JP3526435B2 (en) * 2000-06-08 2004-05-17 株式会社東芝 Network system
JP3567980B2 (en) * 2000-06-13 2004-09-22 日本電気株式会社 Transmission capacity control method and mobile communication system
JP3666365B2 (en) * 2000-06-15 2005-06-29 日本電気株式会社 Online time zone reservation system and online time zone reservation method
JP3570501B2 (en) * 2000-06-15 2004-09-29 日本電気株式会社 Network system and packet data transmission method
US8218535B1 (en) * 2000-07-04 2012-07-10 Nokia Corporation Method and device for attaching a user equipment to a telecommunication network
WO2002009458A2 (en) * 2000-07-24 2002-01-31 Bluesocket, Inc. Method and system for enabling seamless roaming in a wireless network
AU784411B2 (en) * 2000-07-27 2006-03-30 Nvidia Corporation Use of radius in UMTS to perform HLR function and for roaming
US6976571B2 (en) * 2000-07-31 2005-12-20 Otis Elevator Company Comb plate for people mover
US7849170B1 (en) * 2000-07-31 2010-12-07 Sprint Communications Company L.P. Dynamically providing communication accounts using a communication account system
US7197046B1 (en) * 2000-08-07 2007-03-27 Shrikumar Hariharasubrahmanian Systems and methods for combined protocol processing protocols
US6836765B1 (en) * 2000-08-30 2004-12-28 Lester Sussman System and method for secure and address verifiable electronic commerce transactions
AU8879601A (en) * 2000-09-07 2002-03-22 A2Q Inc Method and system for high speed wireless data transmission and reception
CN1471783A (en) * 2000-10-26 2004-01-28 ���˹���Ѷ��� Telecommunications routing
US11204729B2 (en) 2000-11-01 2021-12-21 Flexiworld Technologies, Inc. Internet based digital content services for pervasively providing protected digital content to smart devices based on having subscribed to the digital content service
KR100464374B1 (en) * 2000-11-01 2004-12-31 삼성전자주식회사 System and method for giving mobile ip of mobile terminal
US20020059415A1 (en) 2000-11-01 2002-05-16 Chang William Ho Manager for device-to-device pervasive digital output
US10915296B2 (en) * 2000-11-01 2021-02-09 Flexiworld Technologies, Inc. Information apparatus that includes a touch sensitive screen interface for managing or replying to e-mails
US10860290B2 (en) 2000-11-01 2020-12-08 Flexiworld Technologies, Inc. Mobile information apparatuses that include a digital camera, a touch sensitive screen interface, support for voice activated commands, and a wireless communication chip or chipset supporting IEEE 802.11
DE10056088B4 (en) * 2000-11-07 2006-01-12 IQ wireless GmbH, Entwicklungsgesellschaft für Systeme und Technologien der Telekommunikation Method and apparatus for compensating interference by multipath propagation in a radio communication system
DE10056087B4 (en) * 2000-11-07 2005-03-17 IQ wireless GmbH, Entwicklungsgesellschaft für Systeme und Technologien der Telekommunikation Radio communication system
DE10056086C2 (en) * 2000-11-07 2002-12-05 Iq Wireless Gmbh Procedure for synchronization in a radio communication system
WO2002042896A1 (en) 2000-11-20 2002-05-30 Flexiworld Technologies, Inc. tOBILE AND PERVASIVE OUTPUT COMPONENTS
GB0028730D0 (en) * 2000-11-24 2001-01-10 Nokia Oy Ab Improvement in and relating to transaction security
US20030236985A1 (en) * 2000-11-24 2003-12-25 Nokia Corporation Transaction security in electronic commerce
EP1353478A4 (en) * 2000-12-06 2008-07-02 Nec Corp Virtual private network
US7079511B2 (en) * 2000-12-06 2006-07-18 Qualcomm, Incorporated Method and apparatus for handoff of a wireless packet data services connection
US7099475B2 (en) * 2000-12-07 2006-08-29 Road Runner Holdco Llc System and method for password authentication for non-LDAP regions
JP2002185635A (en) * 2000-12-15 2002-06-28 Hitachi Ltd Home server and internet service system
US7188179B1 (en) * 2000-12-22 2007-03-06 Cingular Wireless Ii, Llc System and method for providing service provider choice over a high-speed data connection
KR100360289B1 (en) * 2000-12-29 2002-11-07 에스케이 텔레콤주식회사 A method of confirming a transmitting number by internet protocol address
US6603770B2 (en) * 2001-01-16 2003-08-05 Physical Optics Corporation Apparatus and method for accessing a network
US20020097416A1 (en) 2001-01-19 2002-07-25 Chang William Ho Output controller processor for universal data output
US7127742B2 (en) * 2001-01-24 2006-10-24 Microsoft Corporation Establishing a secure connection with a private corporate network over a public network
US20020116396A1 (en) * 2001-02-22 2002-08-22 Christopher Somers System for providing electronic contact information from a central source and method for updating contact information
DE10117133B4 (en) * 2001-04-05 2005-07-07 T-Mobile Deutschland Gmbh Method and device for path control of IP connections in a subscriber-based communication network
US7475143B2 (en) * 2001-04-05 2009-01-06 International Business Machines Corporation Server display confirmation record response in a connection oriented client/server protocol
US20020157090A1 (en) * 2001-04-20 2002-10-24 Anton, Jr. Francis M. Automated updating of access points in a distributed network
JP2002318786A (en) * 2001-04-24 2002-10-31 Hitachi Ltd Service use controller
WO2002087272A1 (en) * 2001-04-25 2002-10-31 Nokia Corporation Authentication in a communication system
US20020162029A1 (en) * 2001-04-25 2002-10-31 Allen Keith Joseph Method and system for broadband network access
EP1393457A4 (en) * 2001-05-07 2005-01-05 John F King Modem function and usage of a personal digital assistant in wireless mode
US7039033B2 (en) * 2001-05-07 2006-05-02 Ixi Mobile (Israel) Ltd. System, device and computer readable medium for providing a managed wireless network using short-range radio signals
US6795701B1 (en) * 2002-05-31 2004-09-21 Transat Technologies, Inc. Adaptable radio link for wireless communication networks
US7489918B2 (en) * 2003-05-09 2009-02-10 Intel Corporation System and method for transferring wireless network access passwords
US7890129B2 (en) 2001-05-15 2011-02-15 Eric Rosen Method and apparatus for delivering information to an idle mobile station in a group communication network
US7603126B2 (en) * 2001-05-15 2009-10-13 Qualcomm Incorporated Method and apparatus for avoiding simultaneous service origination and paging in a group communication network
JP4501310B2 (en) * 2001-05-28 2010-07-14 株式会社日立製作所 Packet transfer device
US7483411B2 (en) 2001-06-04 2009-01-27 Nec Corporation Apparatus for public access mobility LAN and method of operation thereof
GB2376842A (en) * 2001-06-18 2002-12-24 Ipwireless Inc Integration of network control functions in a wireless network
US8051168B1 (en) * 2001-06-19 2011-11-01 Microstrategy, Incorporated Method and system for security and user account integration by reporting systems with remote repositories
US7590143B2 (en) * 2001-07-05 2009-09-15 Qualcomm Incorporated System and method for voice over IP
US7801941B2 (en) * 2001-07-09 2010-09-21 Palm, Inc. Apparatus and method for exchanging data between two devices
US7668535B2 (en) * 2001-07-09 2010-02-23 Palm, Inc. Notification infrastructure for sending device-specific wireless notifications
WO2003010669A1 (en) * 2001-07-24 2003-02-06 Barry Porozni Wireless access system, method, signal, and computer program product
US7363376B2 (en) * 2001-07-31 2008-04-22 Arraycomm Llc Method and apparatus for generating an identifier to facilitate delivery of enhanced data services in a mobile computing environment
US7173905B1 (en) * 2001-08-02 2007-02-06 Utstarcom, Inc. PDSN fast tunnel lookup
US7295532B2 (en) * 2001-08-17 2007-11-13 Ixi Mobile (R & D), Ltd. System, device and computer readable medium for providing networking services on a mobile device
US20050030917A1 (en) * 2001-08-17 2005-02-10 Amit Haller Device, system, method and computer readable medium obtaining a network attribute, such as a DNS address, for a short distance wireless network
US7016334B2 (en) * 2001-08-17 2006-03-21 Ixi Mobile ( Israel) Ltd. Device, system, method and computer readable medium for fast recovery of IP address change
US20040125762A1 (en) * 2001-08-17 2004-07-01 Amit Haller Device, system, method and computer readable medium for attaching to a device identifited by an access point name in a wide area network providing particular services
US20040081129A1 (en) * 2001-08-17 2004-04-29 Amit Haller Device, system, method and computer readable medium for selectively attaching to a cellular data service
US6982984B1 (en) * 2001-08-28 2006-01-03 Redback Networks Inc. Method and apparatus for virtual private networks
US7127238B2 (en) * 2001-08-31 2006-10-24 Openwave Systems Inc. Method and apparatus for using Caller ID information in a browser of a mobile communication device
US20040066920A1 (en) * 2001-08-31 2004-04-08 Vandermeijden Tom R. Method and apparatus for automatically populating a contact database in a mobile communication device
WO2003024128A1 (en) * 2001-09-12 2003-03-20 Telefonaktiebolaget Lm Ericsson (Publ.) Arrangements and method in mobile internet communications systems
AU2002343424A1 (en) * 2001-09-28 2003-04-14 Bluesocket, Inc. Method and system for managing data traffic in wireless networks
JP4237055B2 (en) * 2001-09-28 2009-03-11 ファイバーリンク コミュニケーションズ コーポレーション Client-side network access policy and management application
US7293096B1 (en) * 2001-09-28 2007-11-06 Cisco Technology, Inc. Maintaining a common AAA session id for a call over a network
US7889742B2 (en) * 2001-09-29 2011-02-15 Qualcomm, Incorporated Method and system for improving data throughput
US8089940B2 (en) * 2001-10-05 2012-01-03 Qualcomm Incorporated Method and system for efficient and reliable data packet transmission
US6957045B2 (en) * 2001-10-26 2005-10-18 Ixi Mobile (Israel) Ltd. Device, system, computer readable medium and method for providing status information of devices in a short distance wireless network
US7149805B2 (en) * 2001-10-31 2006-12-12 Hewlett-Packard Development, L.P. Wireless trusted point of access to a computer network
US6845097B2 (en) 2001-11-21 2005-01-18 Ixi Mobile (Israel) Ltd. Device, system, method and computer readable medium for pairing of devices in a short distance wireless network
US7082121B1 (en) 2001-12-13 2006-07-25 Cisco Technology, Inc. System, device, and method for interworking between a broadband SS7 network and an internet protocol network to provide transport of connection oriented information
US7016648B2 (en) * 2001-12-18 2006-03-21 Ixi Mobile (Israel) Ltd. Method, system and computer readable medium for downloading a software component to a device in a short distance wireless network
US7013112B2 (en) * 2001-12-18 2006-03-14 Ixi Mobile (Israel) Ltd. Method, system and computer readable medium for making a business decision in response to information from a short distance wireless network
KR100876803B1 (en) * 2001-12-19 2009-01-07 삼성전자주식회사 A wireless data communication system and method for accessing an authentication, authorization and accounting server of packet service node therein
JP3842661B2 (en) * 2002-02-06 2006-11-08 株式会社エヌ・ティ・ティ・ドコモ COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD, COMMUNICATION NODE, COMMUNICATION MEDIA NODE, COMMUNICATION MEDIA PROGRAM, SESSION MOVEMENT METHOD, AND SESSION MOVEMENT PROGRAM
KR100438431B1 (en) * 2002-02-23 2004-07-03 삼성전자주식회사 Security system for virtual private network service access in communication network and method thereof
US20030196107A1 (en) * 2002-04-15 2003-10-16 Robertson Samuel A. Protocol, system, and method for transferring user authentication information across multiple, independent internet protocol (IP) based networks
US7082535B1 (en) * 2002-04-17 2006-07-25 Cisco Technology, Inc. System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol
KR100442610B1 (en) * 2002-04-22 2004-08-02 삼성전자주식회사 Flow control method of radius protocol
US20030200299A1 (en) * 2002-04-23 2003-10-23 International Business Machines Corporation Method and system for providing pervasive computing services through a middle tier service provider utilizing public wired and/or wireless communication networks
JP2003318991A (en) * 2002-04-23 2003-11-07 Nec Infrontia Corp Hot spot service system
US6965674B2 (en) 2002-05-21 2005-11-15 Wavelink Corporation System and method for providing WLAN security through synchronized update and rotation of WEP keys
WO2004001520A2 (en) * 2002-06-20 2003-12-31 Nokia Corporation QoS SIGNALING FOR MOBILE IP
WO2004002118A1 (en) * 2002-06-20 2003-12-31 Innovative Solutions, Inc. System and method to access web resources from wireless devices
US7965842B2 (en) 2002-06-28 2011-06-21 Wavelink Corporation System and method for detecting unauthorized wireless access points
KR100562136B1 (en) * 2002-06-29 2006-03-21 주식회사 케이티 Internet Electronic Commercing Method Combining Wireless Local Area Network with Digital Subscriber Line
US7869424B2 (en) 2002-07-01 2011-01-11 Converged Data Solutions Inc. Systems and methods for voice and data communications including a scalable TDM switch/multiplexer
US7706359B2 (en) 2002-07-01 2010-04-27 Converged Data Solutions, Inc. Systems and methods for voice and data communications including a network drop and insert interface for an external data routing resource
US7546372B2 (en) * 2002-07-11 2009-06-09 Ibeam Systems, Inc. System and method for providing to multiple user computers concurrent telephonic access to multiple remote devices
US7606242B2 (en) 2002-08-02 2009-10-20 Wavelink Corporation Managed roaming for WLANS
US7522906B2 (en) 2002-08-09 2009-04-21 Wavelink Corporation Mobile unit configuration management for WLANs
US7602795B1 (en) * 2002-08-20 2009-10-13 Sprint Spectrum L.P. Method and system for identifying a mobile station to a content server
US7545762B1 (en) 2002-08-20 2009-06-09 Sprint Spectrum L.P. Method and system for network presence notification
US6909878B2 (en) * 2002-08-20 2005-06-21 Ixi Mobile (Israel) Ltd. Method, system and computer readable medium for providing an output signal having a theme to a device in a short distance wireless network
US7260714B2 (en) 2002-08-20 2007-08-21 Sony Corporation System and method for authenticating wireless component
DE10244616A1 (en) * 2002-09-25 2004-04-08 Siemens Ag Process for determining the route of a packet-oriented communication
BR0314692A (en) * 2002-09-25 2005-08-02 Telemac Corp System for administering local access control to a computer network
US7356571B2 (en) * 2002-10-07 2008-04-08 Ixi Mobile (R&D), Ltd. System, method and processor readable medium for downloading information within a predetermined period of time to a device in a network responsive to price selection
US8077681B2 (en) * 2002-10-08 2011-12-13 Nokia Corporation Method and system for establishing a connection via an access network
US7701963B2 (en) * 2002-10-15 2010-04-20 Qualcomm Incorporated Method and apparatus for the use of micro-tunnels in a communications system
US7062566B2 (en) 2002-10-24 2006-06-13 3Com Corporation System and method for using virtual local area network tags with a virtual private network
JP4005898B2 (en) * 2002-10-29 2007-11-14 株式会社日立製作所 Communications system
US20040103204A1 (en) * 2002-11-27 2004-05-27 Docomo Communications Laboratories Usa, Inc. Method of connecting a client device with a router in a wireless communication network
DE10259755A1 (en) * 2002-12-19 2004-07-08 Bt Ingnite Gmbh & Co Automatic terminal or user identification in networks
JP4480963B2 (en) * 2002-12-27 2010-06-16 富士通株式会社 IP connection processing device
US7240361B2 (en) * 2003-01-31 2007-07-03 Qwest Communications International Inc. Systems and methods for controlled transmittance in a telecommunication system
US7167680B2 (en) * 2003-02-05 2007-01-23 Ixi Mobile (Israel) Ltd. Method, system and computer readable medium for adjusting output signals for a plurality of devices in a short distance wireless network responsive to a selected environment
DE10310386A1 (en) * 2003-03-07 2004-09-23 Deutsche Telekom Ag Procedure for providing Internet access for use by third parties
CN1759558A (en) * 2003-03-10 2006-04-12 汤姆森特许公司 An identity mapping mechanism in wlan access control with public authentication servers
US7616647B1 (en) 2003-03-11 2009-11-10 Sprint Spectrum L.P. Method and system for wireless local number portability
CN1762127A (en) * 2003-03-18 2006-04-19 汤姆森特许公司 Authentication of a wlan connection using gprs/umts infrastructure
US20040259585A1 (en) * 2003-06-04 2004-12-23 Avi Yitzchak Wireless device having dual bus archeticure for interfacing with cellular signals and short-range radio signals
US20050021868A1 (en) * 2003-07-01 2005-01-27 Sharma Vijay K. Communications server method & apparatus for transacting voice, text, video and graphical data communication sessions from both wireless and wire-line networks
US7697508B2 (en) * 2003-07-31 2010-04-13 University Of Florida Research Foundation, Inc. System, apparatus, and methods for proactive allocation of wireless communication resources
US7366901B2 (en) * 2003-08-01 2008-04-29 Ixi Mobile (R&D), Ltd. Device, system, method and computer readable medium for identifying and authenticating a cellular device using a short-range radio address
US7395341B2 (en) * 2003-08-15 2008-07-01 Fiberlink Communications Corporation System, method, apparatus and computer program product for facilitating digital communications
JP3965382B2 (en) * 2003-11-28 2007-08-29 松下電器産業株式会社 Communication system and communication method
US7640581B1 (en) * 2004-02-27 2009-12-29 Embarq Holdings Company, Llc Method and system for providing secure, centralized access to remote elements
US8676986B2 (en) * 2004-03-10 2014-03-18 Cisco Technology, Inc. Reduced data session establishment time in CDMA-2000 networks
US20070162674A1 (en) * 2004-03-10 2007-07-12 Germano Leichsenring Access control system, and access control device and resource providing device used for the same
US7586922B2 (en) * 2004-03-12 2009-09-08 Telefonaktiebolaget Lm Ericsson (Publ) Providing higher layer packet/frame boundary information in GRE frames
US7328393B2 (en) * 2004-04-13 2008-02-05 Cisco Technology, Inc. Forward error correction in packet networks
US7958546B2 (en) * 2004-06-29 2011-06-07 International Business Machines Corporation Identity access management system
JP3897034B2 (en) * 2004-07-28 2007-03-22 日本電気株式会社 Wireless LAN system, wireless LAN terminal, mobile network access server, and authentication method used therefor
US7725589B2 (en) * 2004-08-16 2010-05-25 Fiberlink Communications Corporation System, method, apparatus, and computer program product for facilitating digital communications
US9124465B1 (en) * 2004-09-30 2015-09-01 Avaya Inc. Methods and apparatus for processing incomplete or invalid dialed numbers
US7512381B1 (en) * 2004-10-15 2009-03-31 Nortel Networks Limited Monitoring mobile terminals via local wireless access points
US20060088026A1 (en) * 2004-10-27 2006-04-27 Microsoft Corporation Message based network configuration of domain name services
US8266631B1 (en) 2004-10-28 2012-09-11 Curen Software Enterprises, L.L.C. Calling a second functionality by a first functionality
US7823169B1 (en) 2004-10-28 2010-10-26 Wheeler Thomas T Performing operations by a first functionality within a second functionality in a same or in a different programming language
US7774789B1 (en) 2004-10-28 2010-08-10 Wheeler Thomas T Creating a proxy object and providing information related to a proxy object
CN100466569C (en) * 2004-11-18 2009-03-04 上海大亚科技有限公司 An ADSL modem and wireless LAN integrated access device
US20060104214A1 (en) * 2004-11-18 2006-05-18 Borella Michael S System and method for automated provisioning of wireless access gateways
US8073971B2 (en) * 2004-12-10 2011-12-06 Microsoft Corporation Message based network configuration of dynamic domain name services
US8195952B2 (en) 2004-12-14 2012-06-05 International Business Machines Corporation System and method of facilitating the identification of a computer on a network
US20060129813A1 (en) * 2004-12-15 2006-06-15 Vidya Narayanan Methods of authenticating electronic devices in mobile networks
US7724742B2 (en) * 2005-01-24 2010-05-25 Cisco Technology, Inc. Communication bonding systems and methods
US7703134B2 (en) * 2005-01-28 2010-04-20 Sony Corporation De-authentication of network component
US20060171365A1 (en) * 2005-02-02 2006-08-03 Utstarcom, Inc. Method and apparatus for L2TP dialout and tunnel switching
US20060171310A1 (en) * 2005-02-03 2006-08-03 Utstarcom, Inc. Method and system of consolidating mobile IP messages within a network
US7861212B1 (en) 2005-03-22 2010-12-28 Dubagunta Saikumar V System, method, and computer readable medium for integrating an original application with a remote application
US7797688B1 (en) 2005-03-22 2010-09-14 Dubagunta Saikumar V Integrating applications in multiple languages
US8578349B1 (en) 2005-03-23 2013-11-05 Curen Software Enterprises, L.L.C. System, method, and computer readable medium for integrating an original language application with a target language application
US7693050B2 (en) * 2005-04-14 2010-04-06 Microsoft Corporation Stateless, affinity-preserving load balancing
US20070055752A1 (en) * 2005-09-08 2007-03-08 Fiberlink Dynamic network connection based on compliance
US20110078764A1 (en) * 2005-09-15 2011-03-31 Guillaume Bichot Tight coupling signaling connection management for coupling a wireless network with a cellular network
US20070083918A1 (en) * 2005-10-11 2007-04-12 Cisco Technology, Inc. Validation of call-out services transmitted over a public switched telephone network
EP1994711A2 (en) * 2005-12-01 2008-11-26 QUALCOMM Incorporated Method and apparatus for supporting different authentication credentials
US20070127420A1 (en) * 2005-12-05 2007-06-07 Paula Tjandra Method, system and apparatus for creating a reverse tunnel
US7849309B1 (en) 2005-12-09 2010-12-07 At&T Intellectual Property Ii, L.P. Method of securing network access radio systems
US7238754B1 (en) * 2005-12-12 2007-07-03 Equistar Chemicals, Lp Solid state process to modify the melt characteristics of polyethylene resins and products
US20070143851A1 (en) 2005-12-21 2007-06-21 Fiberlink Method and systems for controlling access to computing resources based on known security vulnerabilities
US20070143827A1 (en) * 2005-12-21 2007-06-21 Fiberlink Methods and systems for intelligently controlling access to computing resources
US8199731B2 (en) * 2006-01-25 2012-06-12 Motorola Mobility, Inc. Method and apparatus for facilitating switched packet data services on multiple networks
US20070211752A1 (en) * 2006-03-13 2007-09-13 Utstarcom, Incorporated Method of establishing a PPP session over an air interface
US7810140B1 (en) 2006-05-23 2010-10-05 Lipari Paul A System, method, and computer readable medium for processing a message in a transport
US20080008168A1 (en) * 2006-07-07 2008-01-10 Nadeau Thomas D Methods and apparatus for providing optimal identification and processing of layer 3 control channels
US7916682B2 (en) * 2006-07-14 2011-03-29 Symbol Technologies, Inc. Wireless switch network architecture implementing layer 3 mobility domains
US7844759B1 (en) 2006-07-28 2010-11-30 Cowin Gregory L System, method, and computer readable medium for processing a message queue
US8554830B2 (en) * 2006-09-06 2013-10-08 Devicescape Software, Inc. Systems and methods for wireless network selection
US8194589B2 (en) * 2006-09-06 2012-06-05 Devicescape Software, Inc. Systems and methods for wireless network selection based on attributes stored in a network database
US8549588B2 (en) * 2006-09-06 2013-10-01 Devicescape Software, Inc. Systems and methods for obtaining network access
US8743778B2 (en) 2006-09-06 2014-06-03 Devicescape Software, Inc. Systems and methods for obtaining network credentials
US8191124B2 (en) * 2006-09-06 2012-05-29 Devicescape Software, Inc. Systems and methods for acquiring network credentials
US8196188B2 (en) * 2006-09-06 2012-06-05 Devicescape Software, Inc. Systems and methods for providing network credentials
US9326138B2 (en) * 2006-09-06 2016-04-26 Devicescape Software, Inc. Systems and methods for determining location over a network
US9311141B2 (en) 2006-12-22 2016-04-12 Callahan Cellular L.L.C. Survival rule usage by software agents
US8423496B1 (en) 2006-12-22 2013-04-16 Curen Software Enterprises, L.L.C. Dynamic determination of needed agent rules
US7949626B1 (en) 2006-12-22 2011-05-24 Curen Software Enterprises, L.L.C. Movement of an agent that utilizes a compiled set of canonical rules
US7860517B1 (en) 2006-12-22 2010-12-28 Patoskie John P Mobile device tracking using mobile agent location breadcrumbs
US7698243B1 (en) 2006-12-22 2010-04-13 Hauser Robert R Constructing an agent in a first execution environment using canonical rules
US8200603B1 (en) 2006-12-22 2012-06-12 Curen Software Enterprises, L.L.C. Construction of an agent that utilizes as-needed canonical rules
US8132179B1 (en) 2006-12-22 2012-03-06 Curen Software Enterprises, L.L.C. Web service interface for mobile agents
US7970724B1 (en) 2006-12-22 2011-06-28 Curen Software Enterprises, L.L.C. Execution of a canonical rules based agent
US7660780B1 (en) 2006-12-22 2010-02-09 Patoskie John P Moving an agent from a first execution environment to a second execution environment
EP2003858A1 (en) * 2007-06-14 2008-12-17 Nokia Siemens Networks Oy Performing interactive connectivity checks in a mobility environment
US7849499B2 (en) * 2007-08-21 2010-12-07 Cisco Technology, Inc. Enterprise wireless local area network (LAN) guest access
US8478880B2 (en) * 2007-08-31 2013-07-02 Palm, Inc. Device profile-based media management
WO2009030282A1 (en) * 2007-09-07 2009-03-12 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatuses for allowing a nomadic terminal to access a home network on layer 2 level
US8868775B2 (en) * 2008-02-10 2014-10-21 Cisco Technology, Inc. Load balancing manipulation of packet flows within a transport conduit
US8179859B2 (en) * 2008-02-21 2012-05-15 Wang Ynjiun P Roaming encoded information reading terminal
US7940777B2 (en) * 2008-02-26 2011-05-10 Cisco Technology, Inc. Loss-free packet networks
KR101466889B1 (en) * 2008-04-03 2014-12-01 삼성전자주식회사 System and method for searching session id in wireless mobile ip communication system
US8750460B2 (en) * 2008-04-28 2014-06-10 Centurylink Intellectual Property Llc System and method for remote testing of a subscriber loop
US8340667B2 (en) * 2008-06-26 2012-12-25 Lemko Corporation System and method to control wireless communications
WO2010045249A1 (en) * 2008-10-13 2010-04-22 Devicescape Software, Inc. Systems and methods for identifying a network
US9596634B2 (en) * 2008-12-19 2017-03-14 Telefonaktiebolaget Lm Ericsson (Publ) Assist reordering of downlink data at serving GW relocation
US8442527B1 (en) 2009-01-23 2013-05-14 Sprint Communications Company L.P. Cellular authentication for authentication to a service
US8191785B2 (en) * 2009-03-05 2012-06-05 Hand Held Products, Inc. Encoded information reading terminal operating in infrastructure mode and ad-hoc mode
US8301735B1 (en) * 2009-10-02 2012-10-30 Cellco Partnership Variable AAA load distribution for PDSN
EP2676399A4 (en) 2011-02-14 2016-02-17 Devicescape Software Inc Systems and methods for network curation
US8811281B2 (en) 2011-04-01 2014-08-19 Cisco Technology, Inc. Soft retention for call admission control in communication networks
CN102208982A (en) * 2011-04-28 2011-10-05 广州汇智通信技术有限公司 Isolation gateway
CN102202057B (en) * 2011-05-18 2013-11-27 株洲南车时代电气股份有限公司 System and method for safely dumping data of mobile memory
CN102857508B (en) * 2012-09-11 2016-06-22 杭州华三通信技术有限公司 A kind of method of Radius certification
TW201417535A (en) * 2012-10-31 2014-05-01 Ibm Network access control based on risk factor
US8918086B2 (en) 2012-11-29 2014-12-23 Maqsood A. Thange Telecommunications addressing system and method
US20140342693A1 (en) * 2013-05-14 2014-11-20 Alcatel-Lucent Canada Inc. Sd peer selection and routing
US10142172B2 (en) * 2015-07-22 2018-11-27 Facebook, Inc. Internet service provider management platform
CN105759647B (en) * 2016-02-22 2019-03-05 江苏大学 It is a kind of based on routing inspection trolley with borrow address routing algorithm pig farm environment control method

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5528595A (en) * 1974-06-09 1996-06-18 U.S. Robotics, Inc. Modem input/output signal processing techniques
US4991169A (en) * 1988-08-02 1991-02-05 International Business Machines Corporation Real-time digital signal processing relative to multiple digital communication channels
US5418842A (en) * 1990-11-19 1995-05-23 Exxon Research And Engineering Company Reduced time remote access method
GB9223890D0 (en) * 1992-11-13 1993-01-06 Ncr Int Inc Wireless local area network system
GB9226707D0 (en) * 1992-12-22 1993-02-17 Ncr Int Inc Wireless local area network system with mobile station handover
US5325419A (en) * 1993-01-04 1994-06-28 Ameritech Corporation Wireless digital personal communications system having voice/data/image two-way calling and intercell hand-off
JP3512832B2 (en) * 1993-05-26 2004-03-31 富士通株式会社 Inter-LAN communication method and LAN / WAN connection device
FI98687C (en) * 1993-09-20 1997-07-25 Nokia Telecommunications Oy A mobile communication system and method for connecting a remote workstation via a mobile communication network to a data network
US5577105A (en) * 1994-03-11 1996-11-19 U.S. Robotics, Inc. Telephone call routing and switching techniques for data communications
US5519704A (en) * 1994-04-21 1996-05-21 Cisco Systems, Inc. Reliable transport protocol for internetwork routing
US5761309A (en) * 1994-08-30 1998-06-02 Kokusai Denshin Denwa Co., Ltd. Authentication system
FI98586C (en) * 1995-01-10 1997-07-10 Nokia Telecommunications Oy Packet radio system and methods for protocol-independent routing of a data packet in packet radio networks
EP0762261A3 (en) * 1995-09-08 1999-12-22 Cadix Inc. A verification server and authentication method for use in authentication on networks
JP3361661B2 (en) * 1995-09-08 2003-01-07 株式会社キャディックス Authentication method on the network
US5790548A (en) * 1996-04-18 1998-08-04 Bell Atlantic Network Services, Inc. Universal access multimedia data network
US5878127A (en) * 1996-09-30 1999-03-02 Sbc Technology Resources, Inc. Method and apparatus for facilitating remote communications access to multiple locations within a telecommunications network
JPH10178421A (en) * 1996-10-18 1998-06-30 Toshiba Corp Packet processor, mobile computer, packet transferring method and packet processing method
US6496704B2 (en) * 1997-01-07 2002-12-17 Verizon Laboratories Inc. Systems and methods for internetworking data networks having mobility management functions
SE9703327L (en) * 1997-09-12 1999-03-13 Ericsson Telefon Ab L M Method and apparatus for data communication
US6535493B1 (en) * 1998-01-15 2003-03-18 Symbol Technologies, Inc. Mobile internet communication protocol
US6377571B1 (en) * 1998-04-23 2002-04-23 3Com Corporation Virtual modem for dialout clients in virtual private network
US6651105B1 (en) * 1998-11-12 2003-11-18 International Business Machines Corporation Method for seamless networking support for mobile devices using serial communications
US6452920B1 (en) * 1998-12-30 2002-09-17 Telefonaktiebolaget Lm Ericsson Mobile terminating L2TP using mobile IP data
US6366561B1 (en) * 1999-11-03 2002-04-02 Qualcomm Inc. Method and apparatus for providing mobility within a network
US6522880B1 (en) * 2000-02-28 2003-02-18 3Com Corporation Method and apparatus for handoff of a connection between network devices

Also Published As

Publication number Publication date
DE69803974D1 (en) 2002-04-04
KR20010029463A (en) 2001-04-06
AU8181498A (en) 1999-01-25
JP3515983B2 (en) 2004-04-05
US6963582B1 (en) 2005-11-08
IL128656A (en) 2003-05-29
IL128656A0 (en) 2000-01-31
EP0927482A1 (en) 1999-07-07
KR100308073B1 (en) 2001-09-29
DE69803974T2 (en) 2002-11-07
EP0927482B1 (en) 2002-02-27
US6151628A (en) 2000-11-21
WO1999001969A1 (en) 1999-01-14
JP2000503198A (en) 2000-03-14
CA2264866A1 (en) 1999-01-14

Similar Documents

Publication Publication Date Title
CA2264866C (en) Network access methods, including direct wireless to internet access
US6282193B1 (en) Apparatus and method for a remote access server
US7036142B1 (en) Single step network logon based on point to point protocol
US6628671B1 (en) Instant activation of point-to point protocol (PPP) connection using existing PPP state
US7808978B2 (en) Voice over internet protocol (VoIP) telephone apparatus and communication system for carrying VoIP traffic
JP3836272B2 (en) Movement point-to-point protocol
US20020057673A1 (en) Network access device and telecommunication signaling
CN1332542C (en) VoIP wireless telephone system and method utilizing wireless LAN
AU2003230349B2 (en) Method and device for modem relay termination
US20040133679A1 (en) Method, network access server, client and computer software product for dynamic definition of layer 2 tunneling connections
EP1094646B1 (en) Multi channel communication control system and method
CA2484255C (en) Device for modem relay channel termination
US6370132B1 (en) Mobile terminated call routing in a network access server/interworking function
CN100397834C (en) Network for providing multi service application
Cisco Glossary
CN101197835A (en) Virtual special network access method, system and device
CN112751735B (en) Method and device for realizing PPPoA function in broadband access equipment
GB2393355A (en) Multichannel communication bandwidth control

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed