The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Feb. 02, 2021

Filed:

Dec. 26, 2017
Applicant:

Cisco Technology, Inc., San Jose, CA (US);

Inventors:

Gangadharan Byju Pularikkal, San Jose, CA (US);

Mark Grayson, Berkshirem, GB;

Santosh Ramrao Patil, Santa Clara, CA;

Jerome Henry, Pittsboro, NC (US);

Bart Brinckman, Nevele, BE;

Mark Allen Webb, Somerset, WI (US);

Assignee:

Cisco Technology, Inc., San Jose, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04W 76/10 (2018.01); H04W 12/06 (2009.01); H04W 12/08 (2009.01); H04W 88/10 (2009.01); H04W 88/06 (2009.01); H04W 36/14 (2009.01);
U.S. Cl.
CPC ...
H04L 63/10 (2013.01); H04L 63/083 (2013.01); H04W 12/06 (2013.01); H04W 12/08 (2013.01); H04W 76/10 (2018.02); H04L 2463/082 (2013.01); H04W 36/14 (2013.01); H04W 88/06 (2013.01); H04W 88/10 (2013.01);
Abstract

Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network. In some implementations, accessing the second network via the authentication criterion satisfies an operating threshold associated with the mobile device.


Find Patent Forward Citations

Loading…