US20230198984A1 - Network Service Control for Access to Wireless Radio Networks - Google Patents
Network Service Control for Access to Wireless Radio Networks Download PDFInfo
- Publication number
- US20230198984A1 US20230198984A1 US18/111,696 US202318111696A US2023198984A1 US 20230198984 A1 US20230198984 A1 US 20230198984A1 US 202318111696 A US202318111696 A US 202318111696A US 2023198984 A1 US2023198984 A1 US 2023198984A1
- Authority
- US
- United States
- Prior art keywords
- network
- guest user
- user equipment
- network access
- guest
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Definitions
- Local area networks including wireless local area networks, are becoming more prevalent both in residential and commercial environments.
- a router In a local area network, at least one router is usually employed to route messages among various devices.
- a router can be communicatively coupled to a wide area network, such as the Internet and/or a provider network, and the router can route messages to and from the wide area network.
- Routers can provide authenticated network access to user devices based, at least in part, upon one or more conventional authentication mechanisms, such as, for example, user-provided login credentials (local or browser-based) and automated setup mechanisms (e.g., Wi-Fi Protected Setup (“WPS”)), or some combination thereof.
- WPS Wi-Fi Protected Setup
- the conventional authentication mechanisms typically require efforts by both the network provider and a user intentionally making a request to access the network by initiation from the guest user device.
- a browser-based login might require the network provider to setup and maintain a login portal so that users can sign up with the network provider, remember his or her login credential, and then sign-in using the login credentials prior to gaining access to a network.
- an access point such as a router.
- the network owner and/or provider may print or email login credentials to guest users.
- this practice can be highly insecure.
- the manual entry of login credentials by guest users can be prone to user error.
- conventional automated setup mechanisms simply require a router be physically accessible so that the guest user can force connect their device, such as via WPS. Yet this requirement of physical access exposes a security flaw that allows anyone with physical access to the router the ability to gain access to the local area network.
- the conventional mechanisms may limit the guest's capacity to control other devices that are also connected to the network for fear of malicious use by the guest.
- conventional authentication mechanisms can exhibit usability concerns, security flaws, and/or the denial of a guest user's request to access the network.
- a system can include a network access point that has a processor and a memory.
- the memory can store computer-executable instructions that, when executed by the processor, cause the processor to perform operations.
- the operations can include detecting a guest user equipment.
- detecting the guest user equipment can include detecting a unique identifier that is being broadcast from the guest user equipment.
- the operations can also include determining that the guest user equipment is not a recognized device. In some embodiments, determining that the guest user equipment is not a recognized device can be based on the unique identifier of the guest user equipment.
- the operations can include creating an identity verification request message.
- the identity verification request message can seek approval from a host device to allow the guest user equipment access to a client network.
- the operations can further include determining that the guest user equipment exceeds a proximity time threshold for being in range of engaging in communication with the client network.
- the identity verification request message is created in response to determining that the guest user equipment exceeds the proximity time threshold.
- the operations can further include providing the identity verification request message to the host device.
- the host device can respond by creating a trigger response message that can include a network access request on behalf of the guest user equipment.
- the operations can include receiving the trigger response message from the host device.
- the network access point can determine whether the guest user equipment satisfies corroborating conditions.
- the corroborating conditions can include at least one or more of authentication of a voice signature detected by the host device, verification that the guest user equipment has visited a defined sequence of locations, verification that the guest user equipment is not on a blacklist in a remote datastore, or a combination thereof.
- the network access point can proceed with creating a network access package.
- a network access package can be created prior to at least one or more, or all, of the corroborating conditions being satisfied. In some embodiments, the network access package can be created in response to receiving the trigger response message and/or the network access request from the host device. In some embodiments, the network access package can provide the guest user equipment with access credentials to access the client network.
- creating the network access package can include creating a service set identifier.
- the service set identifier can be for the client network and can be created based on the unique identifier of the guest user equipment.
- creating the network access package also can include creating a whitelist corresponding to the service set identifier that can, in some embodiments, be for the client network; instantiating the unique identifier within the whitelist; generating access credentials for the guest user equipment; and creating the network access package that can include the access credentials, a notification that the guest user equipment is authorized to use the client network, and a connection acceptance trigger that instructs the guest user equipment to send a reply message using the access credentials.
- the operations can further include providing the network access package to the guest user equipment.
- the network access point can receive a reply message from the guest user equipment. The operations can continue with the network access point providing the guest user equipment access to the client network.
- a method can include detecting, by a network access point that is communicatively coupled to a host device, a guest user equipment.
- detecting the guest user equipment can include detecting a unique identifier that is being broadcast from the guest user equipment.
- the method can include determining, by the network access point, that the guest user equipment is not a recognized device. In some embodiments, determining that the guest user equipment is not a recognized device can be based on the unique identifier.
- the method can also include creating, by the network access point, an identity verification request message that seeks approval from the host device to allow the guest user equipment access to a client network.
- the method can also include determining that the guest user equipment exceeds a proximity time threshold for being in range of engaging in communication with the client network. In some embodiments, creating the identity verification request message can be in response to the network access point determining that the guest user equipment exceeds the proximity time threshold.
- the method can also include providing, by the network access point, the identity verification request message to the host device.
- the method can include receiving, by the network access point, a trigger response message from the host device, where the trigger response message can include a network access request on behalf of the guest user equipment.
- the method can include creating, by the network access point, a network access package.
- the network access package can be created in response to receiving the trigger response message and/or the network access request from the host device.
- the network access package can provide the guest user equipment with access credentials to access the client network.
- creating the network access package can include creating a service set identifier for the client network based on the unique identifier of the guest user equipment; creating a whitelist corresponding to the service set identifier for the client network, instantiating the unique identifier within the whitelist; generating access credentials for the guest user equipment; and creating the network access package that includes the access credentials, a notification that the guest user equipment is authorized to use the client network, and a connection acceptance trigger that instructs the guest user equipment to send a reply message to the network access point using the access credentials.
- creating the network access package can occur in response to determining, by the network access point, that the guest user equipment satisfies corroborating conditions.
- the corroborating conditions can include at least one or more, or all, of authentication of a voice signature detected by the host device, verification that the guest user equipment has visited a defined sequence of locations, and verification that the guest user equipment is not on a blacklist in a remote datastore.
- the method can also include providing the network access package to the guest user equipment.
- the method can include receiving the reply message from the guest user equipment that was sent based on the network access package.
- the method can also include providing, by the network access point, the guest user equipment access to the client network.
- a computer storage medium can have computer-executable instructions stored thereon.
- the processor can perform operations.
- the processor can be included in a network access point.
- the operations can include detecting a guest user equipment.
- detecting the guest user equipment can include detecting a unique identifier that is being broadcast from the guest user equipment.
- the operations also can include determining that the guest user equipment is not a recognized device. In some embodiments, determining that the guest user equipment is not a recognized device can be based on the unique identifier.
- the operations can include creating an identity verification request message that seeks approval from a host device to allow the guest user equipment access to a client network.
- the operations can further include determining that the guest user equipment exceeds a proximity time threshold for being in range of engaging in communication with the client network.
- creating the identity verification request can occur in response to determining that the guest user equipment exceeds the proximity time threshold.
- the operations can further include providing the identity verification request message to the host device.
- the operations can include receiving a trigger response message from the host device, where the trigger response message can include a network access request on behalf of the guest user equipment.
- the operations also can include creating a network access package that provides the guest user equipment with access credentials to access the client network.
- creating the network access package can occur in response to determining that the guest user equipment satisfies corroborating conditions.
- the corroborating conditions can include at least one or more, or all of, authentication of a voice signature detected by the host device, verification that the guest user equipment has visited a defined sequence of locations, and verification that the guest user equipment is not on a blacklist in a remote datastore.
- creating the network access package can include the operations of creating a service set identifier for the client network based on the unique identifier of the guest user equipment; creating a whitelist corresponding to the service set identifier for the client network; instantiating the unique identifier within the whitelist; generating access credentials for the guest user equipment; and creating the network access package that includes the access credentials, a notification that the guest user equipment is authorized to use the client network, and a connection acceptance message that instructs the guest user equipment to send a reply message using the access credentials.
- the operations can include receiving the reply message from the guest user equipment.
- the operations also can include providing the network access package to the guest user equipment.
- FIG. 1 is a block diagram illustrating aspects of an example operating environment for providing network security control for various embodiments of the concepts and technologies described herein.
- FIGS. 2 A- 2 C are user interface diagrams illustrating various graphical user interfaces through which a guest user can access functions of a network according to various embodiments of the concepts and technologies disclosed herein.
- FIGS. 3 A- 3 B are flow diagrams showing aspects of a method for providing network security control using a network access point, according to an illustrative embodiment of the concepts and technologies described herein.
- FIGS. 4 A- 4 B are flow diagrams showing aspects of another method for providing network security control using a network access point, according to another illustrative embodiment of the concepts and technologies described herein.
- FIG. 5 is a block diagram illustrating an example user equipment capable of implementing aspects according to embodiments of the concepts and technologies described herein.
- FIG. 6 is a block diagram illustrating an example computer system configured to provide, implement, and execute operations according to at least some illustrative embodiments of the concepts and technologies described herein.
- FIG. 7 is a block diagram illustrating an example network capable of implementing aspects of the concepts and technologies described herein.
- the following detailed description is directed to network service control for access to wireless radio networks.
- UE user equipment
- users may carry their UEs with them as they travel to work and social events.
- a new location such as a retail establishment and/or to the house of a friend
- the guest user may wish to access a network at the new location.
- the network at the new location can be referred to as a client network, such as a wireless radio network, that is provided by a network access point.
- the network access point can be configured and/or controlled by a host device that belongs, or is otherwise under the control of, a host user.
- Examples of the host device can include, but should not be limited to, a voice communication assistance device that is configured to listen for audible commands from a host user, and in response to the audible commands, perform actions. For example, when the host user says “voice assistant, play a song”, the host device will be triggered by this audible command, and in response, execute a program that plays the song requested by the host user.
- a voice communication assistance device that is configured to listen for audible commands from a host user, and in response to the audible commands, perform actions. For example, when the host user says “voice assistant, play a song”, the host device will be triggered by this audible command, and in response, execute a program that plays the song requested by the host user.
- conventional systems that incorporate host devices may be unaware that the guest user has brought along their UE, also referred to as a guest UE.
- Conventional mechanisms for allowing the guest UE access to the client network may require the host user to physically provide the guest user with login credentials that must be manually entered
- the host user may not object to physically providing the login credentials to one guest user, in some environments (e.g., a sports stadium, a shopping mall, or other retail establishment), it may not be feasible to manually program the guest UEs of every customer that is at the location where the client network is provided. Moreover, uncontrolled distribution of sensitive login credentials can pose a network security risk that may expose the client network to potentially malicious activity of nefarious guest UEs.
- embodiments of the present disclosure can enable guest UEs to connect and access the client network while maintaining network security control for the client network.
- the host device can communicatively couple with a network access point that is configured to provide, at least in part, the client network.
- the network access point can detect when a guest UE is within physical proximity to the network access point such that connection to the client network is possible.
- the network access point can determine whether the guest UE is recognized so as to distinguish between devices that are known to the network access point. If the network access point does not recognize the guest UE, then the network access point can perform operations to determine whether to allow the guest UE to access the client network.
- the network access point can determine whether the guest UE is simply passing by the location where the client network is provided (e.g., a guest UE in a moving car passing outside of a building where the network access point is located or a shopper with a guest UE that is walking past a retail store in a shopping center) or intending to stay within proximity of the client network for at least a designated amount of time (e.g., a shopper entering a retail store where the client network is provided or a party guest desiring to use a guest UE while attending a viewing party that shows a sporting event on a smart television connected to the client network).
- a designated amount of time e.g., a shopper entering a retail store where the client network is provided or a party guest desiring to use a guest UE while attending a viewing party that shows a sporting event on a smart television connected to the client network.
- the network access point when the network access point determines that the guest UE is staying within an area of the client network, the network access point can create an identity verification request message that instructs a host device to ask a host user for permission to grant the guest UE access to the client network and/or other networks and devices accessible via the client network. If the host user grants access, such as via a voice command and/or input via a user interface of the host device, then the network access point can receive a trigger response message from the host device. In some embodiments, the network access point can determine whether any corroborating conditions should be satisfied by the guest UE prior to allowing the guest UE access to the client network.
- the corroborating conditions can include, but should not be limited to, determining that the guest UE is not deemed to be nefarious, determining that the guest user is in control of the guest UE by authenticating a voice signature of the guest user, and/or determining whether a certain sequence of actions has been performed, such as ensuring that the guest user has visited certain locations, possibly in a particular sequence, prior to arriving at the current location so as to authenticate certain guest UEs.
- the network access point can prepare a network access package for the guest UE that enables the guest UE to access the client network.
- the network access point can provide the network access package to the guest UE, thereby providing network access to the guest UE while maintaining network security control of the client network.
- program modules include routines, programs, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types in response to execution on a processor.
- program modules include routines, programs, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types in response to execution on a processor.
- program modules include routines, programs, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types in response to execution on a processor.
- the subject matter described herein may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and other particularized, non-generic machines.
- the operating environment 100 shown in FIG. 1 includes a communications service provider network (“provider network”) 102 that is communicatively coupled with a client network 150 provided, at least in part, by a network access point 152 .
- the client network 150 can be configured as a wireless radio access network.
- the network access point 152 can operate in accordance with any IEEE 802.11 (“Wi-Fi”) standard(s) to provide the client network 150 .
- Wi-Fi IEEE 802.11
- the network access point 152 can be a network edge router that includes a Wi-Fi access point.
- the network access point 152 can provide the client network 150 at a generally fixed location (e.g., by the network access point 152 being located in a house, workplace, retail establishment, etc.) and/or at a variable/mobile location (e.g., the network access point 152 being located in a motor vehicle that is capable of having dynamic geolocations). It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the network access point 152 can include one or more internal transceivers, antennas, modems, or the like, each of which can facilitate and/or otherwise provide connectivity to one or more wide area networks (“WANs”), such as the provider network 102 , that facilitate communications with one or more other networks including the Internet (not shown), for example.
- WANs wide area networks
- the network access point 152 can be connected to one or more external modems of the provider network 102 , thereby allowing for implementation of connectivity to the provider network 102 via one or more wireline (e.g., fiber optic, coaxial, and the like) and/or wireless communication paths, which are embodied as communication path 3 .
- wireline e.g., fiber optic, coaxial, and the like
- the provider network 102 can be associated with an Internet Service Provider (“ISP”) and/or other communications service provider, which might be an individual, a business, or other entity, associated with providing a network service of which a home owner, other individual, or entity can subscribe to access the provider network 102 .
- ISP Internet Service Provider
- the provider network 102 can be supported by one or more compute resources, memory resources, and/or other resources.
- the compute resource(s) can include one or more particular hardware devices that perform computations to process data, and/or to execute computer-executable instructions of one or more application programs, operating systems, and/or other software, including applications that provide access to a remote data store 104 .
- the compute resources can include one or more central processing units (“CPUs”) configured with one or more processing cores, and/or one or more graphics processing unit (“GPU”) configured to accelerate operations performed by one or more CPUs.
- the compute resources can include one or more system-on-chip (“SoC”) components along with one or more other components, including, for example, one or more of the memory resources, and/or one or more of the other resources.
- SoC system-on-chip
- the memory resource(s), such as the remote data store 104 can include one or more hardware components that perform storage operations, including temporary or permanent storage operations.
- the memory resource(s) include volatile and/or non-volatile memory implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data disclosed herein.
- Computer storage media includes, but is not limited to, random access memory (“RAM”), read-only memory (“ROM”), erasable programmable ROM (“EPROM”), electrically erasable programmable ROM (“EEPROM”), flash memory or other solid state memory technology, CD-ROM, digital versatile disks (“DVD”), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store data and which can be accessed by the compute resources.
- RAM random access memory
- ROM read-only memory
- EPROM erasable programmable ROM
- EEPROM electrically erasable programmable ROM
- flash memory or other solid state memory technology
- CD-ROM compact discs
- DVD digital versatile disks
- magnetic cassettes magnetic tape
- magnetic disk storage magnetic disk storage devices
- the other resource(s) can include one or more hardware and/or virtual resources, one or more input and/or output processors (e.g., network interface controller or wireless radio), one or more modems, one or more codec chipset, one or more pipeline processors, one or more fast Fourier transform (“FFT”) processors, one or more digital signal processors (“DSPs”), one or more speech synthesizers, and/or the like.
- the compute resources, the memory resources, and/or the other resources can collectively function to enable network traffic across the provider network 102 so as to support communication services for user equipment. Additional details of aspects of the provider network 102 are illustrated and described below with reference to FIG. 7 .
- the network access point 152 can be owned and/or operated by the communication service provider associated with the provider network 102 . In some embodiments, the network access point 152 may be rented and/or provided to a user as part of a subscription for access to the provider network 102 . For example, a host user 110 might be a home owner or other individual who subscribes to a communication service associated with the provider network 102 , and rents, purchases, or is otherwise provided the network access point 152 . In other embodiments, the network access point 152 may be controlled by the communication service provider of the provider network 102 .
- the host user 110 uses a host device 112 to control, at least in part, operation of the network access point 152 in order to provide the client network 150 and control of access to the client network 150 , the provider network 102 , and/or devices connected thereto, such as a target UE 184 .
- the host device 112 can include a processor 114 , a transceiver 116 , a user interface 118 , and a memory 120 .
- the transceiver 116 can support wireless communicative coupling with the network access point 152 via communication path 1 .
- the user interface 118 can include audio input and output so as to receive audible commands from the host user 110 , such as one or more host voice input 123 .
- the memory 120 stores a voice interface application 122 that can be configured to listen for the host voice input 123 from the host user 110 .
- the voice interface application 122 can interpret the host voice input 123 as an audible command that triggers the host device 112 to provide functionality, such as to control accessibility to the client network 150 via the network access point 152 .
- the host device 112 can be configured as a voice communication assistant device.
- a voice communication assistant device can include, but should not be limited to, the “ECHO” and/or “DOT” by AMAZON DOT COM LLC, the “HOME” and/or “HOME MINI” by ALPHABET INC, or other user equipment that can be configured with voice assistant application(s).
- the host device 112 can be provided by smartphones, tablets, computers, Internet of Things (“IoT”) devices, vehicle computing systems, global positioning system (“GPS”) receivers, GPS navigation devices, wearable computing systems, embedded computing devices for appliances or other systems or structures, smart watches and other “smart” devices, point-of-sale devices, headwear and/or eyewear, augmented reality (“AR”) devices, virtual reality (“VR”) devices, audio systems, video systems, video game systems, combinations thereof, and/or the like.
- IoT Internet of Things
- GPS global positioning system
- AR augmented reality
- VR virtual reality
- the host device 112 will be described according to an embodiment as a voice communication assistant device that can communicatively couple to the network access point 152 . It should be understood that the examples discussed are for illustration purposes only and therefore should not be construed as limiting, in any way, the scope or manner of implementations.
- the network access point 152 can include a processor 154 and one or more transceiver 156 that can provide the client network 150 .
- the transceiver 156 can provide the client network 150 such that the client network is configured as a wireless radio access network.
- the network access point 152 can include at least one antenna and modem that allows for communicative coupling via one or more wired and/or wireless communication paths, such as but not limited to, communication path 1 , communication path 2 , communication path 3 , and communication path 4 .
- the network access point 152 also can include a memory 158 that stores a network access application 160 .
- the network access application 160 can be configured as firmware that resides on hardware components of the network access point 152 and is executable by at least the processor 154 .
- the network access application 160 can be configured to provide, at least in part, a wireless radio network, such as the client network 150 , so as to allow communicatively coupled devices (e.g., the host device 112 ) to communicate with other devices and the provider network 102 .
- a wireless radio network such as the client network 150
- communicatively coupled devices e.g., the host device 112
- FIG. 1 it is understood that multiple instances of the network access point 152 can be included in various embodiments.
- the network access point 152 can provide wired and/or wireless communicative coupling and can include one or more of a base station, a wireless router, a femtocell, an eNode B, a NodeB, a gNode B (i.e., an access point that incorporates new radio access technology, such as LTE-Advanced and other 5G technology) and/or other network nodes that can facilitate communication to and/or from the client network 150 .
- a base station a wireless router, a femtocell, an eNode B, a NodeB, a gNode B (i.e., an access point that incorporates new radio access technology, such as LTE-Advanced and other 5G technology) and/or other network nodes that can facilitate communication to and/or from the client network 150 .
- a base station a wireless router, a femtocell, an eNode B, a NodeB, a gNode B (i.
- the network access application 160 can be configured to detect when a guest UE, such as the guest UE 130 , is within proximity of the network access point 152 so as to be capable of engaging in communication with the client network 150 .
- the operating environment 100 can include one or more instances of a guest UE, such as the guest UE 130 .
- the guest UE 130 can be configured as one or more of smartphones, tablets, computers, Internet of Things (“IoT”) devices, vehicle computing systems, global positioning system (“GPS”) receivers, GPS navigation devices, wearable computing systems, embedded computing devices for appliances or other systems or structures, smart watches and other “smart” devices, point-of-sale devices, headwear and/or eyewear, augmented reality (“AR”) devices, virtual reality (“VR”) devices, audio systems, video systems, video game systems, combinations thereof, and/or the like.
- IoT Internet of Things
- GPS global positioning system
- AR augmented reality
- VR virtual reality
- the guest UE 130 is configured as a mobile communication device in the embodiment illustrated in FIG. 1 , however it is understood that the embodiment is illustrative and should not be construed as limiting the scope of embodiments in any way.
- the guest UE 130 is capable of wireless radio communication (e.g., Wi-Fi, LTE, 5G, etc.), and thus is capable of communicating with the network access point 152 to access a network (e.g., any of the client network 150 and/or the provider network 102 ), and/or one or more devices connected to a network (e.g., the host device 112 and/or the target UE 184 discussed in further detail below).
- a network e.g., any of the client network 150 and/or the provider network 102
- a network e.g., any of the client network 150 and/or the provider network 102
- one or more devices connected to a network e.g., the host device 112 and/or the target UE 184 discussed in further detail below.
- the guest UE 130 can include a processor 132 and a transceiver 134 that provides communicative coupling with the network access point 152 , such as via communication path 2 .
- the guest UE 130 can include a display 136 that can be configured to present a user interface 138 by which a guest user 128 can provide inputs and receive outputs. Examples of embodiments of the user interface 138 will be discussed below with respect to FIGS. 2 A- 2 C .
- the guest UE 130 can also include audio input and output hardware by which to receive audible commands and communications from the guest user 128 (e.g., a guest voice input 129 ).
- Examples of the guest voice input 129 can include, but should not be limited to, audible communications produced by the guest user 128 that can be used for analysis and execution, such as by the guest UE 130 , the host device 112 , or another particular communications device.
- the guest UE 130 also can include a memory 140 that stores a network connection application 142 .
- the memory 140 also can include a unique identifier 144 that is associated with the guest UE 130 .
- the unique identifier 144 can include, but should not be limited to, a media access control (“MAC”) address, a mobile equipment identifier (“MEI”), an international mobile equipment identity (“IMEI”), a Type Allocation Code (“TAC”), an electronic serial number, original equipment manufacturer identity, a telephone number, an email address, a user name, a user identifier, a persona, a combination thereof, or the like.
- the network connection application 142 can broadcast, via the transceiver 134 , the unique identifier 144 that is associated with the guest UE 130 .
- the guest user 128 when the guest user 128 carries the guest UE 130 into the home of the host user 110 , the guest UE 130 may be in proximity (i.e., within communicative coupling range of the network access point 152 ) of the client network 150 provided by the network access point 152 .
- the unique identifier 144 can be detected by the network access application 160 of the network access point 152 .
- the memory 140 also can include a location sequence identification (“LSID”) 146 .
- the LSID 146 can include a string of one or more location indicators (e.g., geocoordinates, geo tags, location names, addresses, or the like) from which the guest UE 130 has visited within a defined period of time (e.g., within the past twenty-four hours). For example, as illustrated in FIG. 1 , the guest UE 130 may have visited locations A, B, D, and E that are indicated within the LSID 146 . The locations identified within the LSID 146 can correspond with physical locations.
- one or more locations stored within the LSID 146 can correspond with a virtual location, such as visitation of a website, media content, or the like, which is stored as a web address and/or virtual marker so as to indicate that the guest UE 130 has performed a task at the virtual location.
- the LSID 146 can be generated by the network connection application 142 when the guest UE 130 arrives at a particular location, such as by using a location component hardware and/or software, which is discussed in further detail with respect to FIG. 5 .
- the locations indicated in the LSID 146 can be generated by the network connection application 142 based on input from the guest user 128 associated with the guest UE 130 . For example, input of location information for the LSID 146 can be provided to the user interface 138 , such as shown in FIGS. 2 B and 2 C which will be discussed in further detail below.
- the network access point 152 can initiate a process by which the guest UE 130 is granted access to the client network 150 and/or provider network 102 .
- the network access application 160 of the network access point 152 can use the unique identifier 144 of the guest UE 130 to determine, via a recognized device list 162 , whether the guest UE 130 is a recognized device.
- the recognized device list 162 can include a data structure stored in the memory 158 of the network access point 152 and/or in the memory of the remote data store 104 of the provider network 102 .
- the recognized device list 162 can include a list of identifiers associated with devices that are connected, and/or have been connected at one time, to the client network 150 via the network access point 152 .
- the network access application 160 can check whether the unique identifier 144 is already stored in the recognized device list 162 . If the unique identifier 144 is already stored in the recognized device list 162 , then the network access application 160 determines that the guest UE 130 is a recognized device. In some embodiments, if the guest UE 130 is considered to be recognized device, then the network access application 160 may, in some embodiments, wait for the network connection application 142 of the guest UE 130 to initiate contact.
- the network access application 160 of the network access point 152 may not attempt to grant the guest UE 130 access to the client network 150 until the guest UE 130 makes a network access request via the network connection application 142 . However, if the network access application 160 of the network access point 152 determines that the unique identifier 144 is not stored in the recognized device list 162 , then the network access application 160 can take further action to act on behalf of the guest UE 130 (i.e., without initiation from the guest UE 130 to begin approval to access the client network 150 ).
- the network access application 160 can identify between devices that are simply passing through the location where the client network 150 is provided and devices that are staying within proximity of the client network 150 .
- the memory 158 of the network access point 152 can store a proximity time threshold 168 that is represented as a time value (e.g., measured in seconds, minutes, etc.).
- the proximity time threshold 168 may indicate a value of ninety seconds.
- the network access application 160 can identify the current time with the time when the unique identifier 144 of the guest UE 130 was first detected by the network access point 152 .
- the network access point 152 detects the guest UE 130 for a greater amount of time than the proximity time threshold 168 (e.g., greater than ninety seconds in an embodiment), then the network access application 160 determines that the guest UE 130 exceeds the proximity time threshold 168 and is within range of engaging in communication to access the client network 150 .
- the memory 158 can store a maximum time limit 167 that is represented as a time value (e.g., thirty minutes, sixty minutes, etc.). The maximum time limit 167 can correspond with a maximum amount of time that the guest UE 130 is allowed to connect with the network access point 152 and/or one or more networks in one timed network session.
- the host voice input 123 of the host user 110 can be translated by the voice interface application 122 to change one or more time value stored as the maximum time limit 167 and/or the proximity time threshold 168 .
- the examples discussed above are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the network access application 160 can create an identity verification request message 170 that is addressed to the host device 112 .
- the identity verification request message 170 can be delivered to the host device 112 via communication path 1 , which can include wired and/or wireless transport mechanisms.
- the identity verification request message 170 can seek approval from the host device 112 so as to allow the guest UE 130 to access to the client network 150 via the network access point 152 .
- the identity verification request message 170 can include the unique identifier 144 of the guest UE 130 .
- the identity verification request message 170 can be configured to instruct the host device 112 to present, via the user interface 118 (e.g., via audible announcements and/or visual presentation), the host user 110 with a notification that the guest UE 130 has been detected and approval is being sought from the host user 110 as to whether access should be granted or denied for the guest UE 130 .
- the host user 110 can respond by providing input via the user interface 118 either granting or denying the guest UE 130 access to the client network 150 , and/or another network provided by the network access point 152 .
- the input provided by the host user 110 can be the host voice input 123 that can be interpreted by the voice interface application 122 .
- the host voice input 123 can be received by the voice interface application 122 of the host device 112 and analyzed (e.g., through voice recognition) to determine that the host user 110 either grants and/or denies the guest UE 130 access to the client network 150 via the network access point 152 .
- the input provided by the host user 110 can be received via a display (not shown) of the host device 112 .
- the host device 112 can create a trigger response message 124 .
- the trigger response message 124 can be addressed to the network access application 160 executed by the network access point 152 and can reference the unique identifier 144 associated with the guest UE 130 so that the network access application 160 understands that the trigger response message 124 pertains to the guest UE 130 .
- the trigger response message 124 can indicate approval of the identity verification request message 170 , thereby informing the network access application 160 that the guest UE 130 is allowed to gain access through the network access point 152 .
- the trigger response message 124 can include a network access request 126 .
- a network access request would typically be generated only by the device that is seeking to gain access to a network.
- the host device 112 creates the network access request 126 on behalf of the guest UE 130 so as to reduce the operations taken by the guest UE 130 to gain access to the client network 150 .
- the guest UE 130 does not need to independently send a network access request from the guest UE 130 to the network access point 152 because the network access request 126 was already included within the trigger response message 124 sent by the host device 112 on behalf of the guest UE 130 .
- the network access application 160 uses the inclusion of the network access request 126 within the trigger response message 124 as a trigger to generate or otherwise create a network access package 172 .
- the network access application 160 can determine whether one or more corroborating conditions, such as corroborating conditions 106 stored on the remote data store 104 , have been satisfied by the guest UE 130 . This determination can be made by the network access application 160 prior to sending the identity verification request message 170 to the host device 112 or after receiving the trigger response message 124 from the host device 112 . In some embodiments, the network access application 160 may require that one or more of the corroborating conditions 106 be satisfied by the guest UE 130 prior to the guest UE 130 being granted access and/or maintaining access to the client network 150 . For example, the remote data store 104 can store the corroborating conditions 106 using one or more memory resources.
- the remote data store 104 can store a blacklist 107 that is provided as a data structure within the remote data store 104 .
- the provider network 102 can be communicatively coupled to a plurality of network access points corresponding to individual subscribers to a communication service of a communication service provider.
- one or more network access points may determine that a particular device should not be permitted to access the provider network 102 and/or a network access point associated with the provider network 102 , such as the network access point 152 . As such, if a device has been banned from use of the provider network 102 , an identifier corresponding to the banned device may be added to the blacklist 107 .
- the unique identifier 144 associated with the guest UE 130 would be stored in the blacklist 107 .
- the network access application 160 can access the blacklist 107 on the remote data store 104 and determine that the blacklist 107 does not include the unique identifier 144 corresponding to the guest UE 130 .
- the network access application 160 can verify that the guest UE 130 is not on the blacklist 107 of the remote data store 104 by determining that the unique identifier 144 of the guest UE 130 is not found within the blacklist 107 at the time that the guest UE 130 is detected by the network access point 152 .
- an example of satisfying a corroborating condition such as one or more of the corroborating conditions 106 , can include verifying that the guest UE 130 is not on the blacklist 107 of the remote data store 104 .
- satisfying one of the corroborating conditions 106 can include verification that the guest UE 130 has visited a defined sequence of locations.
- the memory of the remote data store 104 can include a location sequence authentication string (“LSAS”) 108 .
- the LSAS 108 can be configured to take the same format as the LSID 146 of the guest UE 130 .
- the LSAS 108 can include a string of one or more location indicators (e.g., geocoordinates, geo tags, location names, addresses, or the like) that define a sequence of locations and, in some embodiments, a defined period of time (e.g., twenty-four hours) that set forth the sequence of locations that should be visited.
- the LSAS 108 can be defined, modified, and/or controlled by the host device 112 via the network access point 152 .
- the LSAS 108 can be used to verify whether the guest UE 130 has visited one or more locations in a defined period of time.
- the LSAS 108 may indicate that the sequence of locations needs to be visited in a particular order.
- the client network 150 may be provided in a retail shopping mall, and in order for shoppers to use their device on the client network 150 , the shoppers must visit one or more retail stores within the mall, the location of which is tracked by the shopper's device (e.g., the guest UE 130 ) and indicated by the LSID 146 .
- the guest UE 130 can provide the LSID 146 to the network access point 152 , and the network access application 160 can compare the LSID 146 to the LSAS 108 . In an embodiment, if one or more, or all, of the location indicators of the LSID 146 matches the location indicators of the LSAS 108 , then the network access application 160 verifies that the guest UE 130 has visited the defined sequence of locations as indicated by the LSAS 108 , thereby satisfying one of the corroborating conditions 106 .
- satisfying one of the corroborating conditions 106 can include authentication of a voice signature, where the voice signature can be detected by a device connected to the client network 150 , such as the host device 112 .
- the remote data store 104 can include a voice signature file 109 that provides a digital file representing the unique voice signature for a user.
- the voice signature file 109 is associated with a voice signature of the guest user 128 that corresponds with the guest UE 130 .
- the voice signature file 109 can include sound data corresponding to audible sound frequencies produced by the guest user 128 , such as when the guest user 128 provides the guest voice input 129 .
- the voice signature file 109 can be provided based on a voicemail greeting and/or another voice communication that can be used for comparison with the guest voice input 129 provided by the guest user 128 .
- the guest voice input 129 spoken by the guest user 128 can be received by the voice interface application 122 of the host device 112 via an input, such as a microphone of the host device 112 .
- the guest voice input 129 can be translated into a guest voice message (not shown) and sent to the network access application 160 of the network access point 152 .
- the network access application 160 can compare the guest voice message to the voice signature file 109 , and if at least a defined portion of the audible sound frequencies indicated by each of the guest voice message and the voice signature file 109 match (e.g., greater than ninety five percent), then the voice signature of the guest user 128 is deemed by the network access application 160 to be authentic, thereby satisfying a corroborating condition.
- the network access point 152 can proceed with creating a network access package, such as the network access package 172 .
- corroborating conditions 106 may be satisfied prior to and/or after the guest UE 130 is allowed to communicate via the network access point 152 . It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the network access point 152 can allow the guest UE 130 to connect and/or reconnect to the client network 150 by creating the network access package 172 for the guest UE 130 .
- the network access package 172 can take the form of a digital executable package that can be created and/or managed via the network access application 160 of the network access point 152 .
- the network access package 172 can include a service set identifier 174 that informs the guest UE 130 of which network the guest UE 130 is allowed to connect.
- the service set identifier 174 can correspond with the client network 150 and/or a sub-client network 180 , which will be discussed in further detail below.
- the network access package 172 also can include a set of access credentials 176 .
- the access credentials 176 can include one or more of a key, a passcode, and/or other credentials that can be used to ensure a secure connection with the network access point 152 .
- the access credentials 176 can be used by the guest UE 130 to establish and/or maintain a connection with the network access point 152 .
- the network access package 172 also can include a notification 202 , which is illustrated according to various embodiments in FIGS. 2 A- 2 C .
- the notification 202 can be presented to the guest UE 130 so as to notify the guest user 128 that the guest UE 130 is authorized and/or pre-approved to communicate via the network access point 152 , such as through use of the client network 150 .
- the notification 202 can include a connection acceptance trigger, which will be discussed in further detail with respect to FIGS. 2 A- 2 C .
- the network access package 172 can be configured to instruct the guest UE 130 to send a reply message 148 to the network access point 152 .
- the reply message 148 can include the access credentials 176 , the service set identifier 174 , the LSID 146 , a client network token 181 (discussed below), and/or the unique identifier 144 .
- the network access application 160 can receive the reply message 148 , and determine whether the access credentials 176 included therein match the access credentials sent to the guest UE 130 .
- the network access application 160 of the network access point 152 can provide the guest UE 130 access to the client network 150 based on, at least in part, the access credentials 176 within the reply message 148 .
- the network access application 160 can create a whitelist 164 that is stored in the memory 158 .
- the whitelist 164 can be stored in the remote data store 104 .
- the whitelist 164 can correspond to one or more networks that is provided by the network access point 152 , such as the client network 150 . Therefore, in some embodiments, the whitelist 164 can identify and correspond with the service set identifier 174 that is provided in the network access package 172 .
- the network access application 160 can extract the service set identifier 174 included in the message to identify the whitelist 164 .
- the network access application 160 can instantiate the unique identifier 144 within the whitelist 164 , which is represented as a guest UE identifier 166 .
- the guest UE identifier 166 can be a copy of, and/or based on, the unique identifier 144 of the guest UE 130 .
- the unique identifier 144 is instantiated within the whitelist 164 by storing the guest UE identifier 166 within the whitelist 164 .
- the unique identifier 144 can be instantiated within the whitelist 164 when one or more of the corroborating conditions 106 is satisfied by the guest UE 130 .
- a network provided by the network access point 152 can be used only by devices that are identified on a whitelist, such as the whitelist 164 .
- the whitelist 164 includes identifications of all devices connected to, and/or authorized to connect to, the client network 150 , such as, for example, the host device 112 , the target UE 184 , and/or the guest UE 130 .
- the whitelist 164 can correspond to a sub-client network that is provided by the network access point 152 and is associated with, but distinct from, the client network 150 , such as the sub-client network 180 .
- the sub-client network 180 can be provided by the network access point 152 and/or another access point that is controlled by the network access application 160 of the network access point 152 .
- the sub-client network 180 can include a wireless radio network that operates a unique radio frequency that is different and/or the same as the client network 150 .
- the sub-client network 180 can operate on a radio channel so as not to interfere with communications on the client network 150 .
- the sub-client network 180 can be a virtual network that operates via a hypervisor (not shown) of the network access point 152 .
- the service set identifier 174 can correspond with the sub-client network 180 .
- the service set identifier 174 can be created based on the unique identifier 144 .
- the network access application 160 can create a sub-client network profile 182 corresponding to the sub-client network 180 .
- the sub-client network profile 182 can include network configuration parameters such as, for example, time limits, network proximity and re-entry, port access, IP address range, throttling, download/upload data limit, download/upload time, misbehavior tolerance, combinations thereof, and the like.
- the sub-client network 180 can be designated for use exclusively by the guest UE 130 .
- the sub-client network profile 182 can be bound to the whitelist 164 such that only devices listed on the whitelist 164 are allowed to use the sub-client network 180 .
- the memory 158 of the network access point 152 can include a token, such as a client network token 181 .
- the sub-client network profile 182 and/or the whitelist 164 can indicate whether the client network token 181 should be used by the guest UE 130 to interact with, make requests of, and/or control other devices connected to the network access point 152 .
- the client network token 181 can be created by the network access application 160 based on the unique identifier 144 of the guest UE 130 .
- the network access package 172 can include the client network token 181 .
- the client network token 181 can be used by the network connection application 142 of the guest UE 130 to enable contact with and/or control of other devices connected to the network access point 152 , such as the host device 112 and/or the target UE 184 .
- the client network token 181 only the guest UE 130 and the network access point 152 are privy to and/or store the client network token 181 so that that the guest UE 130 can levy commands on other devices connected to the client network 150 (e.g., the target UE 184 ), however, those other devices (e.g., the target UE 184 ) cannot levy commands on the guest UE 130 .
- the target UE 184 can be configured as a smart television.
- the network access point 152 enables the guest UE 130 to access the sub-client network 180 and/or the client network 150 , then the guest UE 130 can be used to create a UE command 183 .
- the UE command 183 can instruct the target UE 184 to perform one or more output actions 188 .
- Examples of output actions 188 can include, but should not be limited to, changing a media channel, pausing playback of content, muting audio content, skipping content, blocking content, rating content, powering the target UE 184 on and/or off, displaying media content, sending/receiving a file, sending a private communication for display on a user interface 186 of the target UE 184 , a combination thereof, or the like. It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way.
- the guest UE 130 can send the client network token 181 along with the UE command 183 to the target UE 184 via the network access point 152 .
- the network access application 160 can identify whether the client network token 181 matches an instance of the client network token 181 for the guest UE 130 stored in one or more of the whitelist 164 and/or the sub-client network profile 182 of the memory 158 . If the client network token 181 sent by the guest UE 130 is approved by the network access application 160 , then the network access application 160 can relay the UE command 183 to target UE 184 via the client network 150 .
- the sub-client network profile 182 can include the maximum time limit 167 so as to indicate a maximum amount of time that the guest UE 130 is authorized to use the sub-client network 180 and/or the client network 150 .
- access to one or more of the sub-client network 180 and/or the client network 150 can be revoked by the network access point 152 , such as when the guest UE 130 has exceeded the maximum usage time indicated by the maximum time limit 167 .
- the host device 112 can revoke privileges granted to the guest UE 130 , such as by revoking the ability of the guest UE 130 to send commands to the target UE 184 , access the sub-client network 180 , and/or access the client network 150 .
- revoking the privilege to command other devices can occur by the network access application 160 removing the client network token 181 from the sub-client network profile 182 and/or the whitelist 164 . Therefore, if the guest UE 130 were to send the UE command 183 with the client network token 181 to the network access point 152 , but the network access point 152 determines that an instance of the client network token 181 is not stored in and/or has been removed from, the sub-client network profile 182 and/or the whitelist 164 , then the network access point 152 can prevent the UE command 183 from passing to the target UE 184 .
- the network access application 160 of the network access point 152 may require the guest UE 130 to satisfy a new and/or different set of corroborating conditions prior to the client network token 181 being reinstated within the sub-client network profile 182 and/or the whitelist 164 .
- FIG. 1 illustrates one provider network 102 , one remote data store 104 , one set of corroborating conditions 106 , one blacklist 107 , one voice signature file 109 , one location sequence authentication string 108 , one host user 110 , one host device 112 , one processor 114 , one transceiver 116 , one user interface 118 , one memory 120 , one voice interface application 122 , one trigger response message 124 , one network access request 126 , one host voice input 123 , one guest user 128 , one guest voice input 129 , one guest UE 130 , one processor 132 , one transceiver 134 , one display 136 , one user interface 138 , one memory 140 , one unique identifier 144 , one network connection application 142 , one location sequence identification 146 , one reply message 148 , one client network 150 , one network access point 152 , one processor 154 , one transceiver 156 , one memory 158 , one network access application
- the illustrated embodiment of the operating environment 100 should be understood as being illustrative, and should not be construed as being limiting in any way.
- the guest UE 130 is configured as a mobile communications device that includes the display 136 and an embodiment of the user interface 138 .
- the user interface 138 presents a notification 202 that can be included in the network access package 172 discussed above.
- the notification 202 can include selectable software buttons that are configured as triggers for different response and input options.
- the notification 202 can include a connection acceptance trigger button 204 , and a connection rejection trigger button 206 .
- the guest UE 130 can generate and send the reply message 148 that can include the access credentials 176 , the service set identifier 174 , and the unique identifier 144 .
- the reply message 148 can cause the guest UE 130 to inform the network access point 152 , via the reply message 148 , that the guest UE 130 accepts the offer to connect with the network access point 152 , thereby commencing communication via one or more of the client network 150 , the provider network 102 , and/or the sub-client network 180 .
- selection of the connection rejection trigger button 206 can cause the guest UE 130 to ignore the offer to connect from the network access point 152 .
- the user interface 138 presents another embodiment of a notification 203 .
- the notification 203 can be provided to the guest UE 130 so that a location sequence can be verified as part of satisfying the corroborating conditions 106 prior to the network access point 152 allowing the guest UE 130 to access one or more of the networks, such as any of the provider network 102 , the client network 150 , and/or the sub-client network 180 .
- the notification 203 can include a location sequence verification button 208 and the connection rejection trigger button 206 .
- the guest UE 130 can configure the user interface 138 to present a location verification notification 210 , as illustrated in FIG. 2 C .
- the location verification notification 210 can include a plurality of selectable options, such as illustrated as locations A-N.
- the location verification notification 210 can allow a user to provide the location sequence identification 146 discussed above in FIG. 1 .
- the location verification notification 210 can allow a user to modify a name and/or geotag corresponding with the location sequence identification 146 .
- the network connection application 142 can combine the input of the location sequence identification 146 through the location verification notification 210 with one or more geocoordinates, geotags, addresses, or other indicators of one or more locations which the guest UE 130 has visited.
- a user can select a location confirmation button 212 .
- Selection of the location confirmation button 212 can cause the guest UE 130 to send at least the location sequence identification 146 to the network access point 152 , which in turn may be used to verify one or more corroborating conditions 106 , such as discussed above with respect to FIG. 1 .
- the network access point 152 can allow the guest UE 130 to access one or more of the client network 150 , the provider network 102 , and/or the sub-client network 180 based on the particular input provided for the location sequence identification 146 within the location verification notification 210 illustrated in FIG. 2 C . It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting the scope of the concepts and technologies disclosed herein.
- FIGS. 3 A and 3 B aspects of a method 300 for network security control for access to wireless radio networks will be described in detail, according to an illustrative embodiment.
- the operations of the one or more methods disclosed herein e.g., the method 300 and/or a method 400 discussed below
- the operations have been presented in the demonstrated order for ease of description and illustration. Operations may be added, omitted, and/or performed simultaneously, without departing from the scope of the concepts and technologies disclosed herein.
- the logical operations described herein are implemented (1) as a sequence of computer implemented acts or program modules running on a computing system and/or (2) as interconnected machine logic circuits or circuit modules within the computing system.
- the implementation is a matter of choice dependent on the performance and other requirements of the computing system.
- the logical operations described herein are referred to variously as states, operations, structural devices, acts, or modules. These states, operations, structural devices, acts, and modules may be implemented in software, in firmware, in special purpose digital logic, and any combination thereof.
- the phrase “cause a processor to perform operations” and variants thereof is used to refer to causing a processor of a computing system or device, such as the network access point 152 , the guest UE 130 , and/or the host device 112 , to perform one or more operations and/or causing the processor to direct other components of the computing system or device to perform one or more of the operations.
- the methods disclosed herein are described as being performed by the network access point 152 via execution of one or more software modules such as, for example, the network access application 160 that configure one or more processors. It should be understood that additional and/or alternative devices and/or network nodes can, in some embodiments, provide the functionality described herein via execution of one or more modules, applications, and/or other software including, but not limited to, the host device 112 executing the voice interface application 122 . Thus, the illustrated embodiments are illustrative, and should not be viewed as being limiting in any way. The method 300 will be described with reference to FIG. 1 and further reference to FIG. 2 A .
- the method 300 begins at operation 302 , where the network access point 152 can detect the guest UE 130 .
- the guest UE 130 can be detected based on the unique identifier 144 being broadcast to the network access point 152 .
- the method 300 can proceed to operation 304 , where the network access point 152 can determine whether the guest UE 130 is a recognized device.
- the network access application 160 executing on the network access point 152 can use the unique identifier 144 of the guest UE 130 to compare with the recognized device list 162 that identifies a list of devices that are known to the network access point 152 .
- the network access point 152 recognizes the guest UE 130 , and the method 300 can proceed along the YES path to operation 306 .
- the network access point 152 can wait for the guest UE 130 to send a network connection request.
- the network access point 152 may not act on behalf of the guest UE 130 to proactively authorize and/or allow the guest UE 130 connection and access to a network provided by the network access point 152 , such as the client network 150 .
- the method 300 can proceed from operation 306 to operation 325 , where, in an embodiment, the network access point 152 can receive a network connection request that was initiated solely by the guest UE 130 .
- the method 300 can proceed from operation 325 to operation 326 , where the network access point 152 can provide access for the guest UE 130 that was recognized from the recognized device list 162 . From operation 326 , the method 300 can proceed to operation 328 , where the method 300 can end.
- the network access point 152 can determine that the guest UE 130 is not a recognized device, such as by confirming that the unique identifier 144 is not found on the recognized device list 162 . In response to determining that the guest UE 130 is not a recognized device, the method 300 can proceed along the NO path to operation 308 . At operation 308 , the network access point 152 can determine whether the guest UE 130 exceeds the amount of time for being in range of engaging in communication with the client network 150 , which is indicated in the proximity time threshold 168 .
- the network access point 152 can determine that the amount of time that has passed since the guest UE 130 was first detected as being in range of communicating with the client network 150 has not exceeded the proximity time threshold 168 . If the proximity time threshold 168 is not exceeded, then the method 300 can proceed along the NO path, which continues to perform operation 308 and check whether the proximity time threshold 168 has been exceeded. In an embodiment, in response to the network access point 152 determining that the proximity time threshold 168 has been exceeded, the method 300 can proceed from operation 308 to operation 310 . It is understood that in some embodiments, the method 300 can proceed from operation 304 directly to operation 310 .
- the network access point 152 can create the identity verification request message 170 .
- the identity verification request message 170 can be configured to seek approval from the host device 112 as to whether to grant the guest UE 130 access to the client network 150 .
- the identity verification request message 170 can instruct the host device 112 to obtain approval from the host user 110 .
- the method 300 can proceed to operation 312 , where the network access point 152 can provide the identity verification request message 170 to the host device 112 .
- the method 300 can proceed to operation 314 , where the network access point 152 can receive the trigger response message 124 from the host device 112 .
- the trigger response message 124 can indicate approval from the host device 112 for allowing the guest UE 130 access to the client network 150 .
- the trigger response message 124 can include the network access request 126 that was generated by the host device 112 and sent to the network access point 152 on behalf of the guest UE 130 .
- the guest UE 130 does not initiate a request to gain access to the client network 150 (or any other network operated by the network access point 152 ) due to the network access request 126 being sent by the host device 112 to the network access point 152 on behalf of the guest UE 130 .
- the method 300 can proceed to operation 316 , where the network access point 152 can determine whether the guest UE 130 satisfies one or more corroborating conditions, such as one or more of the corroborating conditions 106 .
- the network access point 152 may require that the guest UE 130 satisfy zero, one, or more than one of the corroborating conditions 106 prior to being granted access to the client network 150 .
- Examples of the guest UE 130 satisfying the corroborating condition 106 can include, but should not be limited to, one or more of authentication of a voice signature detected by the host device 112 , verification that the guest UE 130 has visited a defined sequence of locations, verification that the guest UE 130 is not on the blacklist 107 in a remote data store 104 , a combination thereof, or the like.
- the voice signature can be detected by the host device 112 receiving the guest voice input 129 , which can be sent to the network access point 152 to compare with the voice signature file 109 .
- the verification that the guest UE 130 has visited a defined sequence of locations can be obtained by the network access point 152 sending a notification to the guest UE 130 that requests location sequence information (e.g., the LSID 146 ) be sent to the network access point 152 , such as illustrated in the embodiments discussed with respect to FIGS. 2 B- 2 C .
- the LSID 146 can be compared with the location sequence authentication string 108 in order to verify that one or more locations has been visited by the guest UE 130 .
- verification that the guest UE 130 is not on the blacklist 107 can be determined by the network access point 152 confirming that the blacklist 107 does not include the unique identifier 144 associated with the guest UE 130 .
- the method 300 can proceed along the NO path where the network access point 152 can wait and continue to check until the guest UE 130 satisfies one, more than one, and/or all of the corroborating conditions 106 . In an embodiment where the guest UE 130 satisfies one, more than one, and/or all of the corroborating conditions 106 , then the method 300 can proceed along the YES path to operation 318 .
- the network access point 152 can, in an embodiment, perform a process shown in FIG. 3 B to create a network access package, such as the network access package 172 , that can provide the guest UE 130 with access credentials to access the client network 150 .
- the network access point 152 can create a service set identifier for the client network 150 , such as the service set identifier 174 , according to an embodiment. From operation 330 , the method 300 can proceed to operation 332 , where the network access point 152 can create the whitelist 164 that can, in some embodiments, correspond with the service set identifier 174 for the client network 150 .
- the method 300 can proceed to operation 334 , where the network access point 152 can instantiate the unique identifier 144 within the whitelist 164 , such as by creating and storing the guest UE identifier 166 within the whitelist 164 , where the guest UE identifier 166 can include a copy of the unique identifier 144 .
- the method 300 can proceed to operation 336 , where the network access point 152 can generate the access credentials 176 for the guest UE 130 to use in accessing and communicating with the client network 150 .
- the method 300 can proceed to operation 338 , where the network access point 152 can create the network access package 172 that can include, for example, one or more of the access credentials 176 , the notification 202 that indicates the guest UE 130 is authorized to use the client network 150 , and can also include the connection acceptance trigger button 204 that, upon selection, instructs the guest UE 130 to send the reply message 148 to the network access point 152 using the access credentials 176 .
- the process 318 of creating an embodiment of the network access package 172 can end and proceed to operation 320 .
- the method 300 can continue from operation 318 to operation 320 , where the network access point 152 can provide the network access package 172 to the guest UE 130 , such as via the communication path 2 . From operation 320 , the method 300 can proceed to operation 322 , where the network access point 152 can receive the reply message 148 from the guest UE 130 .
- the reply message 148 can include the access credentials 176 that were sent in the network access package 172 . In some embodiments, the reply message 148 also can include the unique identifier 144 of the guest UE 130 .
- the method 300 can proceed to operation 324 , where the network access point 152 can provide access for the guest UE 130 to use the client network 150 based on the reply message 148 including the access credentials 176 . By this, the guest UE 130 can communicate over the client network 150 via the network access point 152 . It is understood that the examples provided herein are for illustration purposes only, and therefore should not be construed as limiting in any way. From operation 324 , the method 300 can proceed to operation 328 , where the method 300 can end.
- FIGS. 4 A- 4 B a method 400 for network security control for access to wireless radio networks will be described, according to another illustrative embodiment of the concepts and technologies disclosed herein.
- the method 400 will be described with additional reference to FIG. 1 and FIGS. 2 B- 2 C .
- the method 400 assumes that the network access point 152 has already detected the guest UE 130 , determined that the guest UE 130 is not a recognized device, and in some embodiments, determined that the proximity time threshold 168 has been exceeded, such as discussed with respect to operations 302 , 304 , and 308 in the method 300 .
- the method 400 begins and proceeds to operation 402 , where the network access point 152 can create the identity verification request message 170 .
- the identity verification request message 170 can include the unique identifier 144 so as to indicate to the host device 112 and the host user 110 the presence of the guest UE 130 in relation to the network access point 152 . From operation 402 , the method 400 can proceed to operation 404 , where the identity verification request message 170 is provided to the host device 112 .
- the identity verification request message 170 can be configured to instruct the host device 112 to seek an approval or rejection from the host user 110 so as to know whether to allow or deny the guest UE 130 access to one or more networks of the network access point 152 , such as one or more of the client network 150 , the sub-client network 180 , and/or the provider network 102 .
- the host user 110 can provide the host voice input 123 that, in some embodiments, indicates approval to allow the guest UE 130 access to use the network access point 152 .
- the host voice input 123 may not indicate which network the guest UE 130 should be allowed to join, but rather may simply indicate approval.
- the voice interface application 122 can transform the host voice input 123 into the trigger response message 124 that can include the network access request 126 that is created on behalf of the guest UE 130 .
- the method 400 can proceed to operation 406 , where the network access point 152 can receive, from the host device 112 via the communication path 2 , the trigger response message 124 that includes the network access request 126 .
- the method 400 can proceed to operation 408 , where the network access point 152 can execute a process shown in FIG. 4 B to create a network access package, such as an embodiment of the network access package 172 .
- the network access point 152 can, at operation 440 , create a service set identifier, such as the service set identifier 174 .
- the service set identifier 174 can be specifically created for, and unique to, the sub-client network 180 .
- the service set identifier 174 can be created specifically for the guest UE 130 to represent the sub-client network 180 .
- the client network 150 may be a hidden network that does not report a service set identifier to the guest UE 130 , and therefore only the sub-client network 180 becomes visible to the guest UE 130 via the service set identifier 174 .
- the service set identifier 174 is generated based on the unique identifier 144 of the guest UE 130 , such as by notifying the guest UE 130 that the sub-client was specifically for their use, and in some embodiments only for their use.
- the service set identifier 174 can be broadcast for display on the guest UE 130 as “NetworkForGuestUEidentification”, or another text indicator that the sub-client network 180 has been and/or will be uniquely created for use by (only) the guest UE 130 .
- the method 400 can be performed for more than one and/or each guest UE, thereby enabling each guest UE access to their own sub-client network.
- the service set identifier 174 corresponds with the sub-client network 180 , but the sub-client network 180 remains hidden from view for all other devices except for the guest UE 130 .
- the network access point 152 may hide the sub-client network 180 from public broadcast and send the service set identifier 174 only to the guest UE 130 so that it appears to the guest UE 130 but does not appear for other guest devices. In some embodiments, this may be accomplished by the network access point 152 initiating a beamforming routine that targets broadcast of the service set identifier 174 to the guest UE 130 , and exposes the sub-client network 180 to the guest UE 130 . It is understood that the examples provided are for illustrative purposes only, and therefore should not be construed as limiting the scope of the concepts and technologies disclosed herein.
- the process 408 can proceed to operation 442 , where the network access point 152 can create the whitelist 164 .
- the whitelist 164 can correspond with the service set identifier 174 associated with the sub-client network 180 .
- the process 408 can proceed to operation 444 , where the network access application 160 of the network access point 152 can instantiate the unique identifier 144 associated with the guest UE 130 within the whitelist 164 .
- the process 408 can proceed to operation 446 , where the network access point 152 can create the sub-client network profile 182 .
- the sub-client network profile 182 can be associated with the sub-client network 180 and include information about the sub-client network 180 .
- the sub-client network profile 182 can include the whitelist 164 and the maximum time limit 167 indicating the length of time that the guest UE 130 is allowed to maintain connection with the sub-client network 180 during a single network session before reauthorization is required form the host device 112 .
- Reauthorization can be provided by resending the identity verification request message 170 to the host device 112 and the host device 112 responding with the trigger response message 124 that includes the network access request 126 .
- the process 408 can proceed to operation 448 , where the network access point 152 can generate the client network token 181 for the guest UE 130 .
- the sub-client network profile 182 can include the client network token 181 that can allow the guest UE 130 to contact and/or control devices on the client network 150 , such as one or more of the target UE 184 and/or the host device 112 .
- the client network token 181 can be stored within the sub-client network profile 182 for comparison purposes when the guest UE 130 seeks to send a command, such as the UE command 183 , to a device on the client network 150 , such as the target UE 184 .
- the process 408 can proceed to operation 450 , where the network access point can generate the access credentials 176 for the guest UE 130 .
- the access credentials 176 correspond with the sub-client network 180 and not the client network 150 .
- the network access point 152 can isolate the guest UE 130 to use the sub-client network 180 and monitor the communications passing to and/or from the guest UE 130 via the sub-client network 180 .
- the network access point 152 can allow communications to/from the guest UE 130 to pass via the client network 150 and the provider network 102 based on the guest UE 130 providing the access credentials 176 to the network access point 152 .
- the access credentials 176 and the client network token 181 are required from the guest UE 130 in order for the guest UE 130 to send commands, such as the UE command 183 , to devices on the client network 150 , such as the target UE 184 and/or the host device 112 .
- the process 408 can proceed to operation 452 , where the network access point 152 can create the network access package 172 for the guest UE 130 .
- the network access package 172 can include the service set identifier 174 associated with the sub-client network 180 , the access credentials 176 , the client network token 181 , and a notification, such as any of the notifications 202 , 203 , and/or 210 .
- the network access package 172 can instruct the guest UE 130 to send the reply message 148 back to the network access point 152 , where the reply message 148 can include the access credentials 176 , the client network token 181 , the LSID 146 , the unique identifier 144 , and any input from one or more of the notifications 202 , 203 , and/or 210 discussed with respect to FIGS. 2 A- 2 C .
- the notifications 203 , 210 can allow the guest UE 130 to send the LSID 146 to the network access point 152 , and the notification 202 can instruct the guest UE to create and send the reply message 148 .
- each of the notifications 202 , 203 , and 210 can be present sequentially and/or concurrently on the user interface 138 of the guest UE 130 .
- the examples illustrated in FIGS. 2 A- 2 C are for illustration purposes only, and should not be construed as limiting the scope of the embodiments in any way.
- the process 408 can end and proceed to operation 410 , which is illustrated on FIG. 4 A .
- the method 400 can proceed to operation 410 , where the network access point 152 can provide the network access package 172 to the guest UE 130 , such as via the communication path 2 .
- the guest UE 130 can receive the network access package 172 and present one or more of the notifications 202 , 203 , and/or 210 on the user interface 138 of the guest UE 130 .
- the guest UE 130 can create the reply message 148 that can include any of the access credentials 176 , the client network token 181 , the unique identifier 144 , and the LSID 146 .
- the method 400 can proceed to operation 411 , where the network access point 152 can receive the reply message 148 from the guest UE 130 .
- the method 400 can proceed to operation 412 , where the network access point 152 can determine whether guest UE 130 has satisfied one or more corroborating conditions 106 .
- the sub-client network profile 182 can indicate whether the guest UE 130 is required to satisfy one or more of corroborating conditions 106 before access to the sub-client network 180 and/or the client network 150 is granted.
- the corroborating conditions 106 can include one or more of authentication of a voice signature that can be detected by the host device 112 , verification that the guest UE 130 has visited a defined sequence of locations, verification that the guest UE 130 is not on a blacklist in a remote datastore, a combination thereof, or the like.
- the network access point 152 can authenticate a voice signature of the guest user 128 that can be detected by the host device 112 and/or the guest UE 130 by receiving a message that includes the guest voice input 129 and comparing the guest voice input 129 with the voice signature file 109 stored in the remote data store 104 . If the guest voice input 129 matches the voice signature file 109 , then one of the corroborating conditions 106 corresponding to authentication of the voice signature has been satisfied. The network access point 152 can verify that the guest UE 130 has visited a defined sequence of locations by comparing the LSID 146 from the guest UE 130 with the location sequence authentication string 108 in the remote data store 104 .
- the network access point 152 can verify that the guest UE 130 is not on a blacklist in a remote datastore by confirming that the unique identifier 144 is not present within the blacklist 107 stored in the remote data store 104 , thereby satisfying one of the corroborating conditions 106 . In some embodiments, if one, more than one, and/or all of the corroborating conditions 106 are not satisfied, then the method 400 can proceed along the NO path and continue to check whether has verified one or more of the corroborating conditions 106 .
- the method 400 can proceed along the NO path to operation 418 , where the network access point 152 can limit or otherwise withhold communication routing for the guest UE 130 , thereby preventing the guest UE 130 from using and accessing one or more of the sub-client network 180 , the client network 150 , and/or the provider network 102 .
- the method 400 can proceed from operation 418 to operation 420 , where the method 400 can end.
- the method 400 can proceed from operation 418 to operation 408 , where the network access point 152 can create a new instance of the network access package 172 so as to allow the guest UE 130 another attempt at gaining access to one or more networks. It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting the scope of the concepts and technologies disclosed herein.
- the method 400 can proceed along the YES path from operation 412 to operation 414 , where the network access point 152 can provide the guest UE 130 with access to one or more network (e.g., the sub-client network 180 , the client network 150 , and/or the provider network 102 ) by routing communications to/from the guest UE 130 .
- the network access point 152 can provide the guest UE 130 with access to one or more network (e.g., the sub-client network 180 , the client network 150 , and/or the provider network 102 ) by routing communications to/from the guest UE 130 .
- the method 400 can proceed to operation 416 , where the network access point 152 can identify the maximum time limit 167 within the sub-client network profile 182 and determine whether the guest UE 130 has been connected to the sub-client network 180 longer than the time allotted by the maximum time limit, thereby exceeding the maximum time limit 167 .
- the network access point 152 can determine that the guest UE 130 has been connected and using the sub-client network 180 longer than the maximum time limit 167 , thereby exceeding the maximum time limit 167 , which causes the method 400 to proceed along the YES path to operation 418 .
- the network access point 152 can limit the guest UE 130 from using the sub-client network 180 and/or the client network 150 by revoking or otherwise removing the unique identifier 144 (and/or the guest UE identifier 166 which is a copy of the unique identifier 144 ) from the whitelist 164 , thereby preventing the guest UE 130 from using a network.
- the network access point 152 can determine that the guest UE 130 has not been connected and using the sub-client network 180 longer than the maximum time limit 167 , thereby not exceeding the maximum time limit 167 , which causes the method 400 to proceed along the NO path from operation 416 to operation 422 .
- the network access point 152 can determine whether the guest UE 130 has sent a command, such as the UE command 183 , that can instruct the target UE 184 to perform an output action 188 . If the network access point 152 determines that the guest UE 130 has not sent a command, then the method 400 can proceed along the NO path to operation 414 where the network access point 152 can continue to provide the guest UE 130 with access to a network.
- the method 400 can proceed along the YES path to operation 426 where the network access point 152 can determine whether the client network token 181 has been included with the UE command 183 .
- the client network token 181 can be used to ensure that the guest UE 130 is authorized to send commands to one or more devices connected to the client network 150 .
- the method 400 can proceed along the NO path to operation 428 , where the network access point 152 can discard the UE command 183 , thereby preventing the UE command 183 from being sent to the target UE 184 for which the UE command 183 is intended. From operation 428 , the method 400 can proceed to operation 414 , where the network access point 152 can continue to provide network access and communication routing for the guest UE 130 .
- the method 400 can proceed from operation 426 to operation 430 , where the network access point 152 can route the UE command 183 from the sub-client network 180 , through the client network 150 , to the target UE 184 based on the UE command 183 being intended for the target UE 184 .
- the UE command 183 can be received by the target UE 184 , which can execute and perform one or more output actions 188 based on the instructions of the UE command 183 .
- the method 400 can proceed from operation 430 to operation 414 , where the network access point 152 can continue to provide network access and communication routing for the guest UE 130 .
- the method 400 can proceed from operation 430 to operation 420 , where the method 400 can end.
- FIG. 5 an illustrative user equipment 500 and components thereof will be described.
- the host device 112 , guest UE 130 and/or the target UE 184 can be configured like the user equipment 500 .
- the user equipment 500 can be configured to take the form of a mobile communication device, a tablet, a wearable computing device, a heads-up display computer system, an augmented reality (“AR”) device, a virtual reality (“VR” device, a vehicle computing system, an attachable computing device, a camera, an appliance (e.g., a refrigerator, an oven, a microwave, etc.), a television, a handheld device, a combination thereof, or other user equipment that can implement network communications.
- AR augmented reality
- VR virtual reality
- vehicle computing system an attachable computing device
- a camera e.g., a refrigerator, an oven, a microwave, etc.
- an appliance e.g., a refrigerator, an oven, a microwave, etc.
- television e.g., a handheld device, a combination thereof, or other user equipment that can implement network communications.
- FIG. 5 can be configured to interact with one other to carry out various device functions.
- the components are arranged so as to communicate via one or more busses (not shown).
- FIG. 5 and the following description are intended to provide a general understanding of a suitable environment in which various aspects of embodiments can be implemented, and should not be construed as being limiting in any way.
- the user equipment 500 can include a display 502 for displaying data.
- the display 502 can be configured to display various graphical user interface (“GUI”) elements, text, images, video, virtual keypads and/or keyboards, messaging data, notification messages, metadata, internet content, device status, time, date, calendar data, device preferences, map and location data, combinations thereof, and/or the like.
- GUI graphical user interface
- the user equipment 500 also can include a processor 504 and a memory or other data storage device (“memory”) 506 .
- the processor 504 can be configured to process data and/or can execute computer-executable instructions stored in the memory 506 .
- the computer-executable instructions executed by the processor 504 can include, for example, an operating system 508 , one or more applications 510 , other computer-executable instructions stored in a memory 506 , or the like.
- the applications 510 also can include a user interface (“UI”) application (not illustrated in FIG. 5 ).
- UI user interface
- the UI application can interface with the operating system 508 to facilitate user interaction with functionality and/or data stored at the user equipment 500 and/or stored elsewhere.
- the operating system 508 can include a member of the SYMBIAN OS family of operating systems from SYMBIAN LIMITED, a member of the WINDOWS MOBILE OS and/or WINDOWS PHONE OS families of operating systems from MICROSOFT CORPORATION, a member of the PALM WEBOS family of operating systems from HEWLETT PACKARD CORPORATION, a member of the BLACKBERRY OS family of operating systems from RESEARCH IN MOTION LIMITED, a member of the IOS family of operating systems from APPLE INC., a member of the ANDROID OS family of operating systems from GOOGLE INC., and/or other operating systems.
- These operating systems are merely illustrative of some contemplated operating systems that may be used in accordance with various embodiments of the concepts and technologies described herein and therefore should not be construed as being limiting in any
- the UI application can be executed by the processor 504 to aid a user in interacting or otherwise entering/deleting data, entering and setting local credentials (e.g., user IDs and passwords) for device access, configuring settings, manipulating address book content and/or settings, multimode interaction, interacting with other applications 510 , and otherwise facilitating user interaction with the operating system 508 , the applications 510 , and/or other types or instances of data 512 that can be stored at the user equipment 500 .
- the data 512 can include, for example, one or more identifiers, and/or other applications or program modules.
- the data 512 can include one or more of the network access package 172 , the unique identifier 144 , the LSID 146 , and the UE command 183 and/or other data sent among and/or between the guest UE 130 , the target UE 184 , the host device 112 , and the network access point 152 .
- the applications 510 can include, for example, presence applications, visual voice mail applications, messaging applications, text-to-speech and speech-to-text applications, add-ons, plug-ins, email applications, music applications, video applications, camera applications, location-based service applications, power conservation applications, game applications, productivity applications, entertainment applications, enterprise applications, combinations thereof, and the like.
- the applications 510 can include the network connection application 142 and the voice interface application 122 .
- the applications 510 , the data 512 , and/or portions thereof can be stored in the memory 506 and/or in a firmware 514 , and can be executed by the processor 504 .
- the firmware 514 also can store code for execution during device power up and power down operations. It can be appreciated that the firmware 514 can be stored in a volatile or non-volatile data storage device including, but not limited to, the memory 506 and/or a portion thereof.
- the user equipment 500 also can include an input/output (“I/O”) interface 516 .
- the I/O interface 516 can be configured to support the input/output of data such as location information, user information, organization information, presence status information, user IDs, passwords, and application initiation (start-up) requests.
- the I/O interface 516 can include a hardwire connection such as USB port, a mini-USB port, a micro-USB port, an audio jack, a PS2 port, an IEEE 1394 (“FIREWIRE”) port, a serial port, a parallel port, an Ethernet (RJ45) port, an RHO port, a proprietary port, combinations thereof, or the like.
- FIREWIRE IEEE 1394
- the user equipment 500 can be configured to synchronize with another device to transfer content to and/or from the user equipment 500 . In some embodiments, the user equipment 500 can be configured to receive updates to one or more of the applications 510 via the I/O interface 516 , though this is not necessarily the case.
- the I/O interface 516 accepts I/O devices such as keyboards, keypads, mice, interface tethers, printers, plotters, external storage, touch/multi-touch screens, touch pads, trackballs, joysticks, microphones, remote control devices, displays, projectors, medical equipment (e.g., stethoscopes, heart monitors, and other health metric monitors), modems, routers, external power sources, docking stations, combinations thereof, and the like. It should be appreciated that the I/O interface 516 may be used for communications between the user equipment 500 and a network device or local device.
- I/O devices such as keyboards, keypads, mice, interface tethers, printers, plotters, external storage, touch/multi-touch screens, touch pads, trackballs, joysticks, microphones, remote control devices, displays, projectors, medical equipment (e.g., stethoscopes, heart monitors, and other health metric monitors), modems, routers, external power sources, docking stations
- the user equipment 500 also can include a communications component 518 .
- the communications component 518 can be configured to interface with the processor 504 to facilitate wired and/or wireless communications with one or more networks such as one or more IP access networks and/or one or more circuit access networks.
- other networks include networks that utilize non-cellular wireless technologies such as WI-FI or WIMAX.
- the communications component 518 includes a multimode communications subsystem for facilitating communications via the cellular network and one or more other networks.
- the communications component 518 includes one or more transceivers.
- the one or more transceivers can be configured to communicate over the same and/or different wireless technology standards with respect to one another.
- one or more of the transceivers of the communications component 518 may be configured to communicate using Global System for Mobile communications (“GSM”), Code Division Multiple Access (“CDMA”) ONE, CDMA2000, Long-Term Evolution (“LTE”), and various other 2G, 2.5G, 3G, 4G, 5G, and greater generation technology standards.
- GSM Global System for Mobile communications
- CDMA Code Division Multiple Access
- LTE Long-Term Evolution
- the communications component 518 may facilitate communications over various channel access methods (which may or may not be used by the aforementioned standards) including, but not limited to, Time-Division Multiple Access (“TDMA”), Frequency-Division Multiple Access (“FDMA”), Wideband CDMA (“W-CDMA”), Orthogonal Frequency-Division Multiplexing (“OFDM”), Space-Division Multiple Access (“SDMA”), and the like.
- TDMA Time-Division Multiple Access
- FDMA Frequency-Division Multiple Access
- W-CDMA Wideband CDMA
- OFDM Orthogonal Frequency-Division Multiplexing
- SDMA Space-Division Multiple Access
- the communications component 518 may facilitate data communications using Generic Packet Radio Service (“GPRS”), Enhanced Data Rates for Global Evolution (“EDGE”), the High-Speed Packet Access (“HSPA”) protocol family including High-Speed Download Packet Access (“HSDPA”), Enhanced Uplink (“EUL”) or otherwise termed High-Speed Upload Packet Access (“HSUPA”), HSPA+, and various other current and future wireless data access standards.
- GPRS Generic Packet Radio Service
- EDGE Enhanced Data Rates for Global Evolution
- HSPA High-Speed Packet Access
- HSPA High-Speed Download Packet Access
- EUL Enhanced Uplink
- HSPA+ High-Speed Upload Packet Access
- the communications component 518 can include a first transceiver (“TxRx”) 520 A that can operate in a first communications mode (e.g., GSM).
- the communications component 518 also can include an N th transceiver (“TxRx”) 520 N that can operate in a second communications mode relative to the first transceiver 520 A (e.g., UMTS). While two transceivers 520 A- 520 N (hereinafter collectively and/or generically referred to as “transceivers 520 ”) are shown in FIG. 5 , it should be appreciated that less than two, two, and/or more than two transceivers 520 can be included in the communications component 518 .
- TxRx N th transceiver
- the communications component 518 also can include an alternative transceiver (“Alt TxRx”) 522 for supporting other types and/or standards of communications.
- the alternative transceiver 522 can communicate using various communications technologies such as, for example, WI-FI, WIMAX, BLUETOOTH, infrared, infrared data association (“IRDA”), near-field communications (“NFC”), ZIGBEE, other radio frequency (“RF”) technologies, combinations thereof, and the like.
- the communications component 518 also can facilitate reception from terrestrial radio networks, digital satellite radio networks, internet-based radio service networks, combinations thereof, and the like.
- the communications component 518 can process data from a network such as the Internet, an intranet, a broadband network, a WI-FI hotspot, an Internet service provider (“ISP”), a digital subscriber line (“DSL”) provider, a broadband provider, combinations thereof, or the like.
- a network such as the Internet, an intranet, a broadband network, a WI-FI hotspot, an Internet service provider (“ISP”), a digital subscriber line (“DSL”) provider, a broadband provider, combinations thereof, or the like.
- ISP Internet service provider
- DSL digital subscriber line
- the user equipment 500 also can include one or more sensors 524 .
- the sensors 524 can include temperature sensors, light sensors, air quality sensors, movement sensors, orientation sensors, noise sensors, proximity sensors, or the like. As such, it should be understood that the sensors 524 can include, but are not limited to, accelerometers, magnetometers, gyroscopes, infrared sensors, noise sensors, microphones, combinations thereof, or the like. Additionally, audio capabilities for the user equipment 500 may be provided by an audio I/O component 526 .
- the audio I/O component 526 of the user equipment 500 can include one or more speakers for the output of audio signals, one or more microphones for the collection and/or input of audio signals, and/or other audio input and/or output devices, which in some embodiments, can be used to capture one or more of the guest voice input 129 and/or the host voice input 123 .
- the illustrated user equipment 500 also can include a subscriber identity module (“SIM”) system 528 .
- SIM system 528 can include a universal SIM (“USIM”), a universal integrated circuit card (“UICC”) and/or other identity devices.
- the SIM system 528 can include and/or can be connected to or inserted into an interface such as a slot interface 530 .
- the slot interface 530 can be configured to accept insertion of other identity cards or modules for accessing various types of networks. Additionally, or alternatively, the slot interface 530 can be configured to accept multiple subscriber identity cards. Because other devices and/or modules for identifying users and/or the user equipment 500 are contemplated, it should be understood that these embodiments are illustrative, and should not be construed as being limiting in any way.
- the user equipment 500 also can include an image capture and processing system 532 (“image system”).
- image system can be configured to capture or otherwise obtain photos, videos, and/or other visual information.
- the image system 532 can include cameras, lenses, charge-coupled devices (“CCDs”), combinations thereof, or the like.
- CCDs charge-coupled devices
- the user equipment 500 may also include a video system 534 .
- the video system 534 can be configured to capture, process, record, modify, and/or store video content. Photos and videos obtained using the image system 532 and the video system 534 , respectively, may be added as message content to an MMS message, email message, and sent to another mobile device.
- the video and/or photo content also can be shared with other devices via various types of data transfers via wired and/or wireless communication devices as described herein.
- the user equipment 500 also can include one or more location components 536 .
- the location components 536 can be configured to send and/or receive signals to determine a geographic location of the user equipment 500 .
- the location components 536 can send and/or receive signals from global positioning system (“GPS”) devices, assisted GPS (“A-GPS”) devices, WI-FI/WIMAX and/or cellular network triangulation data, combinations thereof, and the like.
- GPS global positioning system
- A-GPS assisted GPS
- WI-FI/WIMAX WI-FI/WIMAX and/or cellular network triangulation data, combinations thereof, and the like.
- the location component 536 also can be configured to communicate with the communications component 518 to retrieve triangulation data for determining a location of the user equipment 500 .
- the location component 536 can interface with cellular network nodes, telephone lines, satellites, location transmitters and/or beacons, wireless network transmitters and receivers, combinations thereof, and the like.
- the location component 536 can include and/or can communicate with one or more of the sensors 524 such as a compass, an accelerometer, and/or a gyroscope to determine the orientation of the user equipment 500 .
- the user equipment 500 can generate and/or receive data to identify its geographic location (e.g., the LSID 146 ), or to transmit data used by other devices to determine the location of the user equipment 500 .
- the location component 536 may include multiple components for determining the location and/or orientation of the user equipment 500 .
- the illustrated user equipment 500 also can include a power source 538 .
- the power source 538 can include one or more batteries, power supplies, power cells, and/or other power subsystems including alternating current (“AC”) and/or direct current (“DC”) power devices.
- the power source 538 also can interface with an external power system or charging equipment via a power I/O component 540 .
- the user equipment 500 can include additional and/or alternative components, the above embodiment should be understood as being illustrative of one possible operating environment for various embodiments of the concepts and technologies described herein.
- the described embodiment of the user equipment 500 is illustrative, and should not be construed as being limiting in any way.
- FIG. 6 is a block diagram illustrating a computer system 600 configured to provide the functionality in accordance with various embodiments of the concepts and technologies disclosed herein.
- the systems, devices, and other components disclosed herein can utilize, at least in part, an architecture that is the same as or at least similar to the architecture of the computer system 600 .
- one or more of the network access point 152 and/or the remote data store 104 can be configured like the computer system 600 . It should be understood, however, that modification to the architecture may be made to facilitate certain interactions among elements described herein.
- the computer system 600 includes a processing unit 602 , a memory 604 , one or more user interface devices 606 , one or more input/output (“I/O”) devices 608 , and one or more network devices 610 , each of which is operatively connected to a system bus 612 .
- the system bus 612 enables bi-directional communication between the processing unit 602 , the memory 604 , the user interface devices 606 , the I/O devices 608 , and the network devices 610 .
- the processing unit 602 may be a standard central processor that performs arithmetic and logical operations, a more specific purpose programmable logic controller (“PLC”), a programmable gate array, or other type of processor known to those skilled in the art and suitable for controlling the operation of the server computer. Processing units are generally known, and therefore are not described in further detail herein.
- PLC programmable logic controller
- the memory 604 communicates with the processing unit 602 via the system bus 612 .
- the memory 604 is operatively connected to a memory controller (not shown) that enables communication with the processing unit 602 via the system bus 612 .
- the illustrated memory 604 includes an operating system 614 and one or more program modules 616 .
- the operating system 614 can include, but is not limited to, members of the WINDOWS, WINDOWS CE, and/or WINDOWS MOBILE families of operating systems from MICROSOFT CORPORATION, the LINUX family of operating systems, the SYMBIAN family of operating systems from SYMBIAN LIMITED, the BREW family of operating systems from QUALCOMM CORPORATION, the MAC OS, OS X, and/or iOS families of operating systems from APPLE CORPORATION, the FREEBSD family of operating systems, the SOLARIS family of operating systems from ORACLE CORPORATION, other operating systems, and the like.
- the program modules 616 may include various software and/or program modules to perform the various operations described herein.
- the program modules 616 can include the network access application 160 and/or other program modules.
- These and/or other programs can be embodied in computer-readable medium including instructions that, when executed by the processing unit 602 , in some embodiments, may perform and/or facilitate performance of one or more of the operations discussed with respect to FIGS. 1 , 2 A- 2 C , the methods 300 , and the method 400 , described in detail above with respect to FIGS. 3 A, 3 B, 4 A, and 4 B .
- the program modules 616 may be embodied in hardware, software, firmware, or any combination thereof
- the memory 604 also can be configured to store the corroborating conditions 106 , the whitelist 164 , the sub-client network profile 182 , the recognized device list 162 , the maximum time limit 167 , the proximity time threshold 168 , the network access package 172 , the service set identifier 174 , the client network token 181 , the access credentials 176 , the notification 202 , the notification 203 , the location verification notification 210 , and/or other data, if desired.
- Computer-readable media may include any available computer storage media or communication media that can be accessed by the computer system 600 .
- Communication media includes computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any delivery media.
- modulated data signal means a signal that has one or more of its characteristics changed or set in a manner as to encode information in the signal.
- communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.
- Computer storage media includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data.
- Computer storage media includes, but is not limited to, RAM, ROM, Erasable Programmable ROM (“EPROM”), Electrically Erasable Programmable ROM (“EEPROM”), flash memory or other solid-state memory technology, CD-ROM, digital versatile disks (“DVD”), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer system 600 .
- the phrase “computer storage medium” and variations thereof does not include waves or signals per se and/or communication media.
- the user interface devices 606 may include one or more devices with which a user accesses the computer system 600 .
- the user interface devices 606 may include, but are not limited to, computers, servers, PDAs, cellular phones, or any suitable computing devices.
- the I/O devices 608 enable a user to interface with the program modules 616 .
- the I/O devices 608 are operatively connected to an I/O controller (not shown) that enables communication with the processing unit 602 via the system bus 612 .
- the I/O devices 608 may include one or more input devices, such as, but not limited to, a keyboard, a mouse, or an electronic stylus.
- the I/O devices 608 may include one or more output devices, such as, but not limited to, a display screen or a printer.
- the I/O devices 608 can be used for manual controls for operations to exercise under certain emergency situations.
- the network devices 610 enable the computer system 600 to communicate with other networks or remote systems via a network 618 , such as the provider network 102 , the client network 150 , and/or the sub-client network 180 .
- Examples of the network devices 610 include, but are not limited to, a modem, a radio frequency (“RF”) or infrared (“IR”) transceiver, a telephonic interface, a bridge, a router, or a network card.
- RF radio frequency
- IR infrared
- the network 618 may be or may include a wireless network such as, but not limited to, a Wireless Local Area Network (“WLAN”), a Wireless Wide Area Network (“WWAN”), a Wireless Personal Area Network (“WPAN”) such as provided via BLUETOOTH technology, a Wireless Metropolitan Area Network (“WMAN”) such as a WiMAX network or metropolitan cellular network.
- the network 618 may be or may include a wired network such as, but not limited to, a Wide Area Network (“WAN”), a wired Personal Area Network (“PAN”), a wired Metropolitan Area Network (“MAN”), a VoIP network, an IP/MPLS network, a PSTN network, an IMS network, an EPC network, or any other mobile network and/or wireline network.
- the network 700 includes a cellular network 702 , a packet data network 704 , for example, the Internet, and a circuit switched network 706 , for example, a PSTN.
- the cellular network 702 includes various network components such as, but not limited to, base transceiver stations (“BTSs”), NBs, eNBs, gNBs, base station controllers (“BSCs”), radio network controllers (“RNCs”), mobile switching centers (“MSCs”), MMEs, short message service centers (“SMSCs”), multimedia messaging service centers (“MMSCs”), home location registers (“HLRs”), Home Subscriber Server (“HSSs”), Visitor Location Registers (“VLRs”), charging platforms, billing platforms, voicemail platforms, GPRS core network components, location service nodes, an IP Multimedia Subsystem (“IMS”), and the like.
- BTSs base transceiver stations
- BSCs base station controllers
- RNCs radio network controllers
- MSCs mobile switching centers
- MMEs mobile switching centers
- SMSCs multimedia messaging service centers
- HLRs home location registers
- HSSs Home Subscriber Server
- VLRs Visitor Location Registers
- charging platforms billing platforms
- the cellular network 702 also includes radios and nodes for receiving and transmitting voice, data, and combinations thereof to and from radio transceivers, networks, the packet data network 704 , and the circuit switched network 706 .
- the provider network 102 of FIG. 1 can operate as the packet data network 704
- the client network 150 and sub-client network 180 can operate in cooperation with the cellular network 702 .
- the mobile communications device 708 such as, for example, a cellular telephone, a mobile terminal, a PDA, a laptop computer, a handheld computer, and combinations thereof, can be operatively connected to the cellular network 702 .
- one or more of the guest UE 130 , the host device 112 , and/or the target UE 184 can be configured as the mobile communications device 708 .
- the cellular network 702 can be configured as a 2G GSM network and can provide data communications via GPRS and/or EDGE.
- the cellular network 702 can be configured as a 3G UMTS network and can provide data communications via the HSPA protocol family, for example, HSDPA, EUL (also referred to as HSUPA), and HSPA+.
- HSPA protocol family for example, HSDPA, EUL (also referred to as HSUPA), and HSPA+.
- the cellular network 702 also is compatible with 4G and 5G mobile communications standards such as LTE, or the like, as well as evolved and future mobile standards, including but not limited to LTE-Advanced, LTE-Advanced Pro and 5G.
- the packet data network 704 includes various devices, for example, servers, computers, databases, and other devices in communication with one another, as is generally known.
- the packet data network 704 devices are accessible via one or more network links.
- the servers often store various files that are provided to a requesting device such as, for example, a computer, a terminal, a smartphone, or the like.
- the requesting device includes software (a “browser”) for executing a web page in a format readable by the browser or other software.
- Other files and/or data may be accessible via “links” in the retrieved files, as is generally known.
- the packet data network 704 includes or is in communication with the Internet.
- the at least some of the provider network 102 can be configured as a packet data network, such as the packet data network 704 .
- the circuit switched network 706 includes various hardware and software for providing circuit switched communications.
- the circuit switched network 706 may include, or may be, what is often referred to as a POTS.
- the at least some of the provider network 102 also can be configured as a circuit switched network, such as the circuit switched network 706 .
- the functionality of a circuit switched network 706 or other circuit-switched network are generally known and will not be described herein in detail.
- the illustrated cellular network 702 is shown in communication with the packet data network 704 and a circuit switched network 706 , though it should be appreciated that this is not necessarily the case.
- One or more Internet-capable devices 710 can communicate with one or more cellular networks 702 , and devices connected thereto, through the packet data network 704 . It also should be appreciated that the Internet-capable device 710 can communicate with the packet data network 704 through the circuit switched network 706 , the cellular network 702 , and/or via other networks (not illustrated).
- a communications device 712 for example, a telephone, facsimile machine, modem, computer, or the like, can be in communication with the circuit switched network 706 , and therethrough to the packet data network 704 and/or the cellular network 702 .
- the communications device 712 can be an Internet-capable device, and can be substantially similar to the Internet-capable device 710 .
- the network of FIG. 7 is used to refer broadly to any combination of the networks 702 , 704 , 706 shown in FIG. 7 .
- substantially all of the functionality described with reference to the provider network 102 , the client network 150 , and/or the sub-client network 180 can be performed by the cellular network 702 , the packet data network 704 , and/or the circuit switched network 706 , alone or in combination with other networks, network elements, and the like, according at least to aspects of the features and operations discussed herein.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Concepts and technologies of network service control for remote access to wireless radio networks are provided herein. In an embodiment, a client network can be provided by a network access point that can include a processor that is configured to detect a guest user equipment and determine whether the guest user equipment is a recognized device. In response to determining that the guest user equipment is not a recognized device, the processor can create an identity verification request message that seeks approval from a host device to allow the guest user equipment to access the client network. The processor can provide the identity verification request message to the host device and receive a trigger response message. The processor can create a network access package that provides the guest user equipment with access credentials to access the client network and provide the network access package to the guest user equipment.
Description
- This application is a continuation of and claims priority to U.S. patent application Ser. No. 17/181,055, entitled “Network Service Control for Access to Wireless Radio Networks,” filed Feb. 22, 2021, now allowed, which is incorporated herein by reference in its entirety and which is a continuation of and claims priority to U.S. patent application Ser. No. 15/952,454, entitled “Network Service Control for Access to Wireless Radio Networks,” filed Apr. 13, 2018, now U.S. Pat. No. 10,965,672, which is incorporated herein by reference in its entirety.
- Local area networks, including wireless local area networks, are becoming more prevalent both in residential and commercial environments. In a local area network, at least one router is usually employed to route messages among various devices. In some instances, a router can be communicatively coupled to a wide area network, such as the Internet and/or a provider network, and the router can route messages to and from the wide area network. Routers can provide authenticated network access to user devices based, at least in part, upon one or more conventional authentication mechanisms, such as, for example, user-provided login credentials (local or browser-based) and automated setup mechanisms (e.g., Wi-Fi Protected Setup (“WPS”)), or some combination thereof. The conventional authentication mechanisms typically require efforts by both the network provider and a user intentionally making a request to access the network by initiation from the guest user device. For example, a browser-based login might require the network provider to setup and maintain a login portal so that users can sign up with the network provider, remember his or her login credential, and then sign-in using the login credentials prior to gaining access to a network.
- In some situations, it may be desirable to provide a guest with temporary access to a local area network and/or a wide area network via an access point, such as a router. Conventionally, the network owner and/or provider may print or email login credentials to guest users. However, this practice can be highly insecure. In addition, the manual entry of login credentials by guest users can be prone to user error. Moreover, conventional automated setup mechanisms simply require a router be physically accessible so that the guest user can force connect their device, such as via WPS. Yet this requirement of physical access exposes a security flaw that allows anyone with physical access to the router the ability to gain access to the local area network. Further, in situations where the guest is to be granted only temporary access, the conventional mechanisms may limit the guest's capacity to control other devices that are also connected to the network for fear of malicious use by the guest. Thus, conventional authentication mechanisms can exhibit usability concerns, security flaws, and/or the denial of a guest user's request to access the network.
- The present disclosure is directed to network security control for access to a wireless radio network. According to one aspect of the concepts and technologies disclosed herein, a system is disclosed. In some embodiments, the system can include a network access point that has a processor and a memory. The memory can store computer-executable instructions that, when executed by the processor, cause the processor to perform operations. In some embodiments, the operations can include detecting a guest user equipment. In some embodiments, detecting the guest user equipment can include detecting a unique identifier that is being broadcast from the guest user equipment. The operations can also include determining that the guest user equipment is not a recognized device. In some embodiments, determining that the guest user equipment is not a recognized device can be based on the unique identifier of the guest user equipment. In some embodiments, when the guest user equipment is determined not to be a recognized device, the operations can include creating an identity verification request message. In some embodiments, the identity verification request message can seek approval from a host device to allow the guest user equipment access to a client network. In some embodiments, the operations can further include determining that the guest user equipment exceeds a proximity time threshold for being in range of engaging in communication with the client network. In some embodiments, the identity verification request message is created in response to determining that the guest user equipment exceeds the proximity time threshold.
- The operations can further include providing the identity verification request message to the host device. The host device can respond by creating a trigger response message that can include a network access request on behalf of the guest user equipment. The operations can include receiving the trigger response message from the host device. In some embodiments, the network access point can determine whether the guest user equipment satisfies corroborating conditions. The corroborating conditions can include at least one or more of authentication of a voice signature detected by the host device, verification that the guest user equipment has visited a defined sequence of locations, verification that the guest user equipment is not on a blacklist in a remote datastore, or a combination thereof. In some embodiments, when at least one or more, or all, of the corroborating conditions are satisfied, the network access point can proceed with creating a network access package. In some embodiments, a network access package can be created prior to at least one or more, or all, of the corroborating conditions being satisfied. In some embodiments, the network access package can be created in response to receiving the trigger response message and/or the network access request from the host device. In some embodiments, the network access package can provide the guest user equipment with access credentials to access the client network.
- In some embodiments, creating the network access package can include creating a service set identifier. In some embodiments, the service set identifier can be for the client network and can be created based on the unique identifier of the guest user equipment. In some embodiments, creating the network access package also can include creating a whitelist corresponding to the service set identifier that can, in some embodiments, be for the client network; instantiating the unique identifier within the whitelist; generating access credentials for the guest user equipment; and creating the network access package that can include the access credentials, a notification that the guest user equipment is authorized to use the client network, and a connection acceptance trigger that instructs the guest user equipment to send a reply message using the access credentials. The operations can further include providing the network access package to the guest user equipment. In some embodiments, the network access point can receive a reply message from the guest user equipment. The operations can continue with the network access point providing the guest user equipment access to the client network.
- According to another aspect of the concepts and technologies disclosed herein, a method is disclosed. The method can include detecting, by a network access point that is communicatively coupled to a host device, a guest user equipment. In some embodiments, detecting the guest user equipment can include detecting a unique identifier that is being broadcast from the guest user equipment. The method can include determining, by the network access point, that the guest user equipment is not a recognized device. In some embodiments, determining that the guest user equipment is not a recognized device can be based on the unique identifier. In response to determining that the guest user equipment is not a recognized device, the method can also include creating, by the network access point, an identity verification request message that seeks approval from the host device to allow the guest user equipment access to a client network.
- In some embodiments, the method can also include determining that the guest user equipment exceeds a proximity time threshold for being in range of engaging in communication with the client network. In some embodiments, creating the identity verification request message can be in response to the network access point determining that the guest user equipment exceeds the proximity time threshold.
- In some embodiments, the method can also include providing, by the network access point, the identity verification request message to the host device. In some embodiments, the method can include receiving, by the network access point, a trigger response message from the host device, where the trigger response message can include a network access request on behalf of the guest user equipment. In some embodiments, the method can include creating, by the network access point, a network access package. In some embodiments, the network access package can be created in response to receiving the trigger response message and/or the network access request from the host device. In some embodiments, the network access package can provide the guest user equipment with access credentials to access the client network. In some embodiments, creating the network access package can include creating a service set identifier for the client network based on the unique identifier of the guest user equipment; creating a whitelist corresponding to the service set identifier for the client network, instantiating the unique identifier within the whitelist; generating access credentials for the guest user equipment; and creating the network access package that includes the access credentials, a notification that the guest user equipment is authorized to use the client network, and a connection acceptance trigger that instructs the guest user equipment to send a reply message to the network access point using the access credentials.
- In some embodiments, creating the network access package can occur in response to determining, by the network access point, that the guest user equipment satisfies corroborating conditions. In some embodiments, the corroborating conditions can include at least one or more, or all, of authentication of a voice signature detected by the host device, verification that the guest user equipment has visited a defined sequence of locations, and verification that the guest user equipment is not on a blacklist in a remote datastore. The method can also include providing the network access package to the guest user equipment. In some embodiments, the method can include receiving the reply message from the guest user equipment that was sent based on the network access package. In some embodiments, the method can also include providing, by the network access point, the guest user equipment access to the client network.
- According to yet another aspect, a computer storage medium is disclosed. The computer storage medium can have computer-executable instructions stored thereon. When the computer-executable instructions are executed by a processor, the processor can perform operations. In some embodiments, the processor can be included in a network access point. In some embodiments, the operations can include detecting a guest user equipment. In some embodiments, detecting the guest user equipment can include detecting a unique identifier that is being broadcast from the guest user equipment. The operations also can include determining that the guest user equipment is not a recognized device. In some embodiments, determining that the guest user equipment is not a recognized device can be based on the unique identifier. In response to determining that the guest user equipment is not a recognized device, the operations can include creating an identity verification request message that seeks approval from a host device to allow the guest user equipment access to a client network. In some embodiments, the operations can further include determining that the guest user equipment exceeds a proximity time threshold for being in range of engaging in communication with the client network. In some embodiments, creating the identity verification request can occur in response to determining that the guest user equipment exceeds the proximity time threshold. The operations can further include providing the identity verification request message to the host device.
- In some embodiments, the operations can include receiving a trigger response message from the host device, where the trigger response message can include a network access request on behalf of the guest user equipment. The operations also can include creating a network access package that provides the guest user equipment with access credentials to access the client network. In some embodiments, creating the network access package can occur in response to determining that the guest user equipment satisfies corroborating conditions. In some embodiments, the corroborating conditions can include at least one or more, or all of, authentication of a voice signature detected by the host device, verification that the guest user equipment has visited a defined sequence of locations, and verification that the guest user equipment is not on a blacklist in a remote datastore. In some embodiments, creating the network access package can include the operations of creating a service set identifier for the client network based on the unique identifier of the guest user equipment; creating a whitelist corresponding to the service set identifier for the client network; instantiating the unique identifier within the whitelist; generating access credentials for the guest user equipment; and creating the network access package that includes the access credentials, a notification that the guest user equipment is authorized to use the client network, and a connection acceptance message that instructs the guest user equipment to send a reply message using the access credentials. In some embodiments, the operations can include receiving the reply message from the guest user equipment. The operations also can include providing the network access package to the guest user equipment.
- It should be appreciated that the above-described subject matter may be implemented as a computer-controlled apparatus, a computer process, a computing system, or as an article of manufacture such as a computer-readable storage medium. These and various other features will be apparent from a reading of the following Detailed Description and a review of the associated drawings.
- This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended that this Summary be used to limit the scope of the claimed subject matter. Furthermore, the claimed subject matter is not limited to implementations that solve any or all disadvantages noted in any part of this disclosure.
-
FIG. 1 is a block diagram illustrating aspects of an example operating environment for providing network security control for various embodiments of the concepts and technologies described herein. -
FIGS. 2A-2C are user interface diagrams illustrating various graphical user interfaces through which a guest user can access functions of a network according to various embodiments of the concepts and technologies disclosed herein. -
FIGS. 3A-3B are flow diagrams showing aspects of a method for providing network security control using a network access point, according to an illustrative embodiment of the concepts and technologies described herein. -
FIGS. 4A-4B are flow diagrams showing aspects of another method for providing network security control using a network access point, according to another illustrative embodiment of the concepts and technologies described herein. -
FIG. 5 is a block diagram illustrating an example user equipment capable of implementing aspects according to embodiments of the concepts and technologies described herein. -
FIG. 6 is a block diagram illustrating an example computer system configured to provide, implement, and execute operations according to at least some illustrative embodiments of the concepts and technologies described herein. -
FIG. 7 is a block diagram illustrating an example network capable of implementing aspects of the concepts and technologies described herein. - The following detailed description is directed to network service control for access to wireless radio networks. As the use of user equipment (“UE”), such as mobile communications devices, becomes more prevalent, users may carry their UEs with them as they travel to work and social events. When a user is a guest at a new location, such as a retail establishment and/or to the house of a friend, the guest user may wish to access a network at the new location. The network at the new location can be referred to as a client network, such as a wireless radio network, that is provided by a network access point. The network access point can be configured and/or controlled by a host device that belongs, or is otherwise under the control of, a host user. Examples of the host device can include, but should not be limited to, a voice communication assistance device that is configured to listen for audible commands from a host user, and in response to the audible commands, perform actions. For example, when the host user says “voice assistant, play a song”, the host device will be triggered by this audible command, and in response, execute a program that plays the song requested by the host user. However, in some embodiments, conventional systems that incorporate host devices may be unaware that the guest user has brought along their UE, also referred to as a guest UE. Conventional mechanisms for allowing the guest UE access to the client network may require the host user to physically provide the guest user with login credentials that must be manually entered in a web portal. This can be cumbersome and cause unnecessary stress to the guest user. Although the host user may not object to physically providing the login credentials to one guest user, in some environments (e.g., a sports stadium, a shopping mall, or other retail establishment), it may not be feasible to manually program the guest UEs of every customer that is at the location where the client network is provided. Moreover, uncontrolled distribution of sensitive login credentials can pose a network security risk that may expose the client network to potentially malicious activity of nefarious guest UEs.
- As such, embodiments of the present disclosure can enable guest UEs to connect and access the client network while maintaining network security control for the client network. For example, the host device can communicatively couple with a network access point that is configured to provide, at least in part, the client network. The network access point can detect when a guest UE is within physical proximity to the network access point such that connection to the client network is possible. The network access point can determine whether the guest UE is recognized so as to distinguish between devices that are known to the network access point. If the network access point does not recognize the guest UE, then the network access point can perform operations to determine whether to allow the guest UE to access the client network. For example, in some embodiments, the network access point can determine whether the guest UE is simply passing by the location where the client network is provided (e.g., a guest UE in a moving car passing outside of a building where the network access point is located or a shopper with a guest UE that is walking past a retail store in a shopping center) or intending to stay within proximity of the client network for at least a designated amount of time (e.g., a shopper entering a retail store where the client network is provided or a party guest desiring to use a guest UE while attending a viewing party that shows a sporting event on a smart television connected to the client network).
- In some embodiments, when the network access point determines that the guest UE is staying within an area of the client network, the network access point can create an identity verification request message that instructs a host device to ask a host user for permission to grant the guest UE access to the client network and/or other networks and devices accessible via the client network. If the host user grants access, such as via a voice command and/or input via a user interface of the host device, then the network access point can receive a trigger response message from the host device. In some embodiments, the network access point can determine whether any corroborating conditions should be satisfied by the guest UE prior to allowing the guest UE access to the client network. For example, the corroborating conditions can include, but should not be limited to, determining that the guest UE is not deemed to be nefarious, determining that the guest user is in control of the guest UE by authenticating a voice signature of the guest user, and/or determining whether a certain sequence of actions has been performed, such as ensuring that the guest user has visited certain locations, possibly in a particular sequence, prior to arriving at the current location so as to authenticate certain guest UEs. The network access point can prepare a network access package for the guest UE that enables the guest UE to access the client network. The network access point can provide the network access package to the guest UE, thereby providing network access to the guest UE while maintaining network security control of the client network. These and other aspects of the concepts and technologies disclosed herein will be illustrated and described in more detail below.
- While some of the subject matter described herein may occasionally be presented in the general context of program modules that execute in conjunction with the execution of an operating system and application programs on a computer system, those skilled in the art will recognize that other implementations may be performed in combination with other types of program modules. Generally, program modules include routines, programs, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types in response to execution on a processor. Moreover, those skilled in the art will appreciate that the subject matter described herein may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and other particularized, non-generic machines.
- Referring now to
FIG. 1 , aspects of an operatingenvironment 100 for implementing various embodiments of the concepts and technologies disclosed herein for network security control will be described, according to an illustrative embodiment. The operatingenvironment 100 shown inFIG. 1 includes a communications service provider network (“provider network”) 102 that is communicatively coupled with aclient network 150 provided, at least in part, by anetwork access point 152. In some embodiments, theclient network 150 can be configured as a wireless radio access network. For example, thenetwork access point 152 can operate in accordance with any IEEE 802.11 (“Wi-Fi”) standard(s) to provide theclient network 150. In other embodiments, thenetwork access point 152 can be a network edge router that includes a Wi-Fi access point. In some embodiments, thenetwork access point 152 can provide theclient network 150 at a generally fixed location (e.g., by thenetwork access point 152 being located in a house, workplace, retail establishment, etc.) and/or at a variable/mobile location (e.g., thenetwork access point 152 being located in a motor vehicle that is capable of having dynamic geolocations). It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In some embodiments, the
network access point 152 can include one or more internal transceivers, antennas, modems, or the like, each of which can facilitate and/or otherwise provide connectivity to one or more wide area networks (“WANs”), such as theprovider network 102, that facilitate communications with one or more other networks including the Internet (not shown), for example. In some embodiments, thenetwork access point 152 can be connected to one or more external modems of theprovider network 102, thereby allowing for implementation of connectivity to theprovider network 102 via one or more wireline (e.g., fiber optic, coaxial, and the like) and/or wireless communication paths, which are embodied ascommunication path 3. Those skilled in the art will appreciate the numerous configurations of network connectivity among theclient network 150, thenetwork access point 152, and theprovider network 102, and as such, the examples disclosed herein are merely intended to describe common configurations and do not limit the scope of the concepts and technologies disclosed herein. - The
provider network 102 can be associated with an Internet Service Provider (“ISP”) and/or other communications service provider, which might be an individual, a business, or other entity, associated with providing a network service of which a home owner, other individual, or entity can subscribe to access theprovider network 102. Theprovider network 102 can be supported by one or more compute resources, memory resources, and/or other resources. For example, the compute resource(s) can include one or more particular hardware devices that perform computations to process data, and/or to execute computer-executable instructions of one or more application programs, operating systems, and/or other software, including applications that provide access to aremote data store 104. The compute resources can include one or more central processing units (“CPUs”) configured with one or more processing cores, and/or one or more graphics processing unit (“GPU”) configured to accelerate operations performed by one or more CPUs. The compute resources can include one or more system-on-chip (“SoC”) components along with one or more other components, including, for example, one or more of the memory resources, and/or one or more of the other resources. The memory resource(s), such as theremote data store 104, can include one or more hardware components that perform storage operations, including temporary or permanent storage operations. In some embodiments, the memory resource(s) include volatile and/or non-volatile memory implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data disclosed herein. Computer storage media includes, but is not limited to, random access memory (“RAM”), read-only memory (“ROM”), erasable programmable ROM (“EPROM”), electrically erasable programmable ROM (“EEPROM”), flash memory or other solid state memory technology, CD-ROM, digital versatile disks (“DVD”), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store data and which can be accessed by the compute resources. The other resource(s) can include one or more hardware and/or virtual resources, one or more input and/or output processors (e.g., network interface controller or wireless radio), one or more modems, one or more codec chipset, one or more pipeline processors, one or more fast Fourier transform (“FFT”) processors, one or more digital signal processors (“DSPs”), one or more speech synthesizers, and/or the like. In some embodiments, the compute resources, the memory resources, and/or the other resources can collectively function to enable network traffic across theprovider network 102 so as to support communication services for user equipment. Additional details of aspects of theprovider network 102 are illustrated and described below with reference toFIG. 7 . - In some embodiments, the
network access point 152 can be owned and/or operated by the communication service provider associated with theprovider network 102. In some embodiments, thenetwork access point 152 may be rented and/or provided to a user as part of a subscription for access to theprovider network 102. For example, ahost user 110 might be a home owner or other individual who subscribes to a communication service associated with theprovider network 102, and rents, purchases, or is otherwise provided thenetwork access point 152. In other embodiments, thenetwork access point 152 may be controlled by the communication service provider of theprovider network 102. In some embodiments, thehost user 110 uses ahost device 112 to control, at least in part, operation of thenetwork access point 152 in order to provide theclient network 150 and control of access to theclient network 150, theprovider network 102, and/or devices connected thereto, such as atarget UE 184. - In some embodiments, the
host device 112 can include aprocessor 114, atransceiver 116, a user interface 118, and amemory 120. Thetransceiver 116 can support wireless communicative coupling with thenetwork access point 152 via communication path 1. The user interface 118 can include audio input and output so as to receive audible commands from thehost user 110, such as one or morehost voice input 123. Thememory 120 stores avoice interface application 122 that can be configured to listen for thehost voice input 123 from thehost user 110. Thevoice interface application 122 can interpret thehost voice input 123 as an audible command that triggers thehost device 112 to provide functionality, such as to control accessibility to theclient network 150 via thenetwork access point 152. - In some embodiments, the
host device 112 can be configured as a voice communication assistant device. Examples of a voice communication assistant device can include, but should not be limited to, the “ECHO” and/or “DOT” by AMAZON DOT COM LLC, the “HOME” and/or “HOME MINI” by ALPHABET INC, or other user equipment that can be configured with voice assistant application(s). In some embodiments, thehost device 112 can be provided by smartphones, tablets, computers, Internet of Things (“IoT”) devices, vehicle computing systems, global positioning system (“GPS”) receivers, GPS navigation devices, wearable computing systems, embedded computing devices for appliances or other systems or structures, smart watches and other “smart” devices, point-of-sale devices, headwear and/or eyewear, augmented reality (“AR”) devices, virtual reality (“VR”) devices, audio systems, video systems, video game systems, combinations thereof, and/or the like. For ease of description, and not limitation, thehost device 112 will be described according to an embodiment as a voice communication assistant device that can communicatively couple to thenetwork access point 152. It should be understood that the examples discussed are for illustration purposes only and therefore should not be construed as limiting, in any way, the scope or manner of implementations. - The
network access point 152 can include aprocessor 154 and one ormore transceiver 156 that can provide theclient network 150. Thetransceiver 156 can provide theclient network 150 such that the client network is configured as a wireless radio access network. Thenetwork access point 152 can include at least one antenna and modem that allows for communicative coupling via one or more wired and/or wireless communication paths, such as but not limited to, communication path 1,communication path 2,communication path 3, andcommunication path 4. Thenetwork access point 152 also can include a memory 158 that stores anetwork access application 160. In some embodiments, thenetwork access application 160 can be configured as firmware that resides on hardware components of thenetwork access point 152 and is executable by at least theprocessor 154. Thenetwork access application 160 can be configured to provide, at least in part, a wireless radio network, such as theclient network 150, so as to allow communicatively coupled devices (e.g., the host device 112) to communicate with other devices and theprovider network 102. Although one instance of thenetwork access point 152 is illustrated inFIG. 1 , it is understood that multiple instances of thenetwork access point 152 can be included in various embodiments. Thenetwork access point 152 can provide wired and/or wireless communicative coupling and can include one or more of a base station, a wireless router, a femtocell, an eNode B, a NodeB, a gNode B (i.e., an access point that incorporates new radio access technology, such as LTE-Advanced and other 5G technology) and/or other network nodes that can facilitate communication to and/or from theclient network 150. - In some embodiments, the
network access application 160 can be configured to detect when a guest UE, such as theguest UE 130, is within proximity of thenetwork access point 152 so as to be capable of engaging in communication with theclient network 150. The operatingenvironment 100 can include one or more instances of a guest UE, such as theguest UE 130. Theguest UE 130 can be configured as one or more of smartphones, tablets, computers, Internet of Things (“IoT”) devices, vehicle computing systems, global positioning system (“GPS”) receivers, GPS navigation devices, wearable computing systems, embedded computing devices for appliances or other systems or structures, smart watches and other “smart” devices, point-of-sale devices, headwear and/or eyewear, augmented reality (“AR”) devices, virtual reality (“VR”) devices, audio systems, video systems, video game systems, combinations thereof, and/or the like. For clarity, theguest UE 130 is configured as a mobile communication device in the embodiment illustrated inFIG. 1 , however it is understood that the embodiment is illustrative and should not be construed as limiting the scope of embodiments in any way. In general, theguest UE 130 is capable of wireless radio communication (e.g., Wi-Fi, LTE, 5G, etc.), and thus is capable of communicating with thenetwork access point 152 to access a network (e.g., any of theclient network 150 and/or the provider network 102), and/or one or more devices connected to a network (e.g., thehost device 112 and/or thetarget UE 184 discussed in further detail below). - The
guest UE 130 can include aprocessor 132 and atransceiver 134 that provides communicative coupling with thenetwork access point 152, such as viacommunication path 2. Theguest UE 130 can include adisplay 136 that can be configured to present auser interface 138 by which aguest user 128 can provide inputs and receive outputs. Examples of embodiments of theuser interface 138 will be discussed below with respect toFIGS. 2A-2C . In some embodiments, theguest UE 130 can also include audio input and output hardware by which to receive audible commands and communications from the guest user 128 (e.g., a guest voice input 129). Examples of theguest voice input 129 can include, but should not be limited to, audible communications produced by theguest user 128 that can be used for analysis and execution, such as by theguest UE 130, thehost device 112, or another particular communications device. Theguest UE 130 also can include amemory 140 that stores anetwork connection application 142. - The
memory 140 also can include aunique identifier 144 that is associated with theguest UE 130. Examples of theunique identifier 144 can include, but should not be limited to, a media access control (“MAC”) address, a mobile equipment identifier (“MEI”), an international mobile equipment identity (“IMEI”), a Type Allocation Code (“TAC”), an electronic serial number, original equipment manufacturer identity, a telephone number, an email address, a user name, a user identifier, a persona, a combination thereof, or the like. In some embodiments, thenetwork connection application 142 can broadcast, via thetransceiver 134, theunique identifier 144 that is associated with theguest UE 130. For example, when theguest user 128 carries theguest UE 130 into the home of thehost user 110, theguest UE 130 may be in proximity (i.e., within communicative coupling range of the network access point 152) of theclient network 150 provided by thenetwork access point 152. Theunique identifier 144 can be detected by thenetwork access application 160 of thenetwork access point 152. - The
memory 140 also can include a location sequence identification (“LSID”) 146. In some embodiments, theLSID 146 can include a string of one or more location indicators (e.g., geocoordinates, geo tags, location names, addresses, or the like) from which theguest UE 130 has visited within a defined period of time (e.g., within the past twenty-four hours). For example, as illustrated inFIG. 1 , theguest UE 130 may have visited locations A, B, D, and E that are indicated within theLSID 146. The locations identified within theLSID 146 can correspond with physical locations. In some embodiments, one or more locations stored within theLSID 146 can correspond with a virtual location, such as visitation of a website, media content, or the like, which is stored as a web address and/or virtual marker so as to indicate that theguest UE 130 has performed a task at the virtual location. In some embodiments, theLSID 146 can be generated by thenetwork connection application 142 when theguest UE 130 arrives at a particular location, such as by using a location component hardware and/or software, which is discussed in further detail with respect toFIG. 5 . In some embodiments, the locations indicated in theLSID 146 can be generated by thenetwork connection application 142 based on input from theguest user 128 associated with theguest UE 130. For example, input of location information for theLSID 146 can be provided to theuser interface 138, such as shown inFIGS. 2B and 2C which will be discussed in further detail below. - In some embodiments, the
network access point 152 can initiate a process by which theguest UE 130 is granted access to theclient network 150 and/orprovider network 102. For example, thenetwork access application 160 of thenetwork access point 152 can use theunique identifier 144 of theguest UE 130 to determine, via a recognizeddevice list 162, whether theguest UE 130 is a recognized device. The recognizeddevice list 162 can include a data structure stored in the memory 158 of thenetwork access point 152 and/or in the memory of theremote data store 104 of theprovider network 102. The recognizeddevice list 162 can include a list of identifiers associated with devices that are connected, and/or have been connected at one time, to theclient network 150 via thenetwork access point 152. For example, when thenetwork access application 160 detects theunique identifier 144 of theguest UE 130, thenetwork access application 160 can check whether theunique identifier 144 is already stored in the recognizeddevice list 162. If theunique identifier 144 is already stored in the recognizeddevice list 162, then thenetwork access application 160 determines that theguest UE 130 is a recognized device. In some embodiments, if theguest UE 130 is considered to be recognized device, then thenetwork access application 160 may, in some embodiments, wait for thenetwork connection application 142 of theguest UE 130 to initiate contact. Put differently, thenetwork access application 160 of thenetwork access point 152 may not attempt to grant theguest UE 130 access to theclient network 150 until theguest UE 130 makes a network access request via thenetwork connection application 142. However, if thenetwork access application 160 of thenetwork access point 152 determines that theunique identifier 144 is not stored in the recognizeddevice list 162, then thenetwork access application 160 can take further action to act on behalf of the guest UE 130 (i.e., without initiation from theguest UE 130 to begin approval to access the client network 150). - In some embodiments, the
network access application 160 can identify between devices that are simply passing through the location where theclient network 150 is provided and devices that are staying within proximity of theclient network 150. For example, the memory 158 of thenetwork access point 152 can store aproximity time threshold 168 that is represented as a time value (e.g., measured in seconds, minutes, etc.). For example, in some embodiments, theproximity time threshold 168 may indicate a value of ninety seconds. In some embodiments, thenetwork access application 160 can identify the current time with the time when theunique identifier 144 of theguest UE 130 was first detected by thenetwork access point 152. If thenetwork access point 152 detects theguest UE 130 for a greater amount of time than the proximity time threshold 168 (e.g., greater than ninety seconds in an embodiment), then thenetwork access application 160 determines that theguest UE 130 exceeds theproximity time threshold 168 and is within range of engaging in communication to access theclient network 150. In some embodiments, the memory 158 can store amaximum time limit 167 that is represented as a time value (e.g., thirty minutes, sixty minutes, etc.). Themaximum time limit 167 can correspond with a maximum amount of time that theguest UE 130 is allowed to connect with thenetwork access point 152 and/or one or more networks in one timed network session. In some embodiments, thehost voice input 123 of thehost user 110 can be translated by thevoice interface application 122 to change one or more time value stored as themaximum time limit 167 and/or theproximity time threshold 168. As such, the examples discussed above are for illustration purposes only, and therefore should not be construed as limiting in any way. - In some embodiments, the
network access application 160 can create an identityverification request message 170 that is addressed to thehost device 112. The identityverification request message 170 can be delivered to thehost device 112 via communication path 1, which can include wired and/or wireless transport mechanisms. In some embodiments, the identityverification request message 170 can seek approval from thehost device 112 so as to allow theguest UE 130 to access to theclient network 150 via thenetwork access point 152. According to embodiments, the identityverification request message 170 can include theunique identifier 144 of theguest UE 130. The identityverification request message 170 can be configured to instruct thehost device 112 to present, via the user interface 118 (e.g., via audible announcements and/or visual presentation), thehost user 110 with a notification that theguest UE 130 has been detected and approval is being sought from thehost user 110 as to whether access should be granted or denied for theguest UE 130. In an embodiment, thehost user 110 can respond by providing input via the user interface 118 either granting or denying theguest UE 130 access to theclient network 150, and/or another network provided by thenetwork access point 152. According to embodiments, the input provided by thehost user 110 can be thehost voice input 123 that can be interpreted by thevoice interface application 122. For example, thehost voice input 123 can be received by thevoice interface application 122 of thehost device 112 and analyzed (e.g., through voice recognition) to determine that thehost user 110 either grants and/or denies theguest UE 130 access to theclient network 150 via thenetwork access point 152. According to further embodiments, the input provided by thehost user 110 can be received via a display (not shown) of thehost device 112. - Based on the input received from the host user 110 (e.g., the host voice input 123), in some embodiments, the
host device 112 can create atrigger response message 124. In some embodiments, thetrigger response message 124 can be addressed to thenetwork access application 160 executed by thenetwork access point 152 and can reference theunique identifier 144 associated with theguest UE 130 so that thenetwork access application 160 understands that thetrigger response message 124 pertains to theguest UE 130. In some embodiments, thetrigger response message 124 can indicate approval of the identityverification request message 170, thereby informing thenetwork access application 160 that theguest UE 130 is allowed to gain access through thenetwork access point 152. In some embodiments, thetrigger response message 124 can include anetwork access request 126. Conventionally, a network access request would typically be generated only by the device that is seeking to gain access to a network. However, embodiments of the present disclosure provide that thehost device 112 creates thenetwork access request 126 on behalf of theguest UE 130 so as to reduce the operations taken by theguest UE 130 to gain access to theclient network 150. Thus, theguest UE 130 does not need to independently send a network access request from theguest UE 130 to thenetwork access point 152 because thenetwork access request 126 was already included within thetrigger response message 124 sent by thehost device 112 on behalf of theguest UE 130. In some embodiments, when thenetwork access request 126 is included in thetrigger response message 124, thenetwork access application 160 uses the inclusion of thenetwork access request 126 within thetrigger response message 124 as a trigger to generate or otherwise create anetwork access package 172. - In some embodiments, the
network access application 160 can determine whether one or more corroborating conditions, such ascorroborating conditions 106 stored on theremote data store 104, have been satisfied by theguest UE 130. This determination can be made by thenetwork access application 160 prior to sending the identityverification request message 170 to thehost device 112 or after receiving thetrigger response message 124 from thehost device 112. In some embodiments, thenetwork access application 160 may require that one or more of thecorroborating conditions 106 be satisfied by theguest UE 130 prior to theguest UE 130 being granted access and/or maintaining access to theclient network 150. For example, theremote data store 104 can store the corroboratingconditions 106 using one or more memory resources. For example, in some embodiments, theremote data store 104 can store ablacklist 107 that is provided as a data structure within theremote data store 104. In some embodiments, theprovider network 102 can be communicatively coupled to a plurality of network access points corresponding to individual subscribers to a communication service of a communication service provider. In some embodiments, one or more network access points may determine that a particular device should not be permitted to access theprovider network 102 and/or a network access point associated with theprovider network 102, such as thenetwork access point 152. As such, if a device has been banned from use of theprovider network 102, an identifier corresponding to the banned device may be added to theblacklist 107. Thus, in an embodiment where theguest UE 130 has been banned from using theprovider network 102, theunique identifier 144 associated with theguest UE 130 would be stored in theblacklist 107. It is understood that the example provided is for illustration purposes only. In some embodiments, thenetwork access application 160 can access theblacklist 107 on theremote data store 104 and determine that theblacklist 107 does not include theunique identifier 144 corresponding to theguest UE 130. Thus, thenetwork access application 160 can verify that theguest UE 130 is not on theblacklist 107 of theremote data store 104 by determining that theunique identifier 144 of theguest UE 130 is not found within theblacklist 107 at the time that theguest UE 130 is detected by thenetwork access point 152. Thus, an example of satisfying a corroborating condition, such as one or more of thecorroborating conditions 106, can include verifying that theguest UE 130 is not on theblacklist 107 of theremote data store 104. - In some embodiments, satisfying one of the
corroborating conditions 106 can include verification that theguest UE 130 has visited a defined sequence of locations. For example, the memory of theremote data store 104 can include a location sequence authentication string (“LSAS”) 108. In some embodiments, theLSAS 108 can be configured to take the same format as theLSID 146 of theguest UE 130. TheLSAS 108 can include a string of one or more location indicators (e.g., geocoordinates, geo tags, location names, addresses, or the like) that define a sequence of locations and, in some embodiments, a defined period of time (e.g., twenty-four hours) that set forth the sequence of locations that should be visited. In some embodiments, theLSAS 108 can be defined, modified, and/or controlled by thehost device 112 via thenetwork access point 152. TheLSAS 108 can be used to verify whether theguest UE 130 has visited one or more locations in a defined period of time. In some embodiments, theLSAS 108 may indicate that the sequence of locations needs to be visited in a particular order. For example, in an embodiment, theclient network 150 may be provided in a retail shopping mall, and in order for shoppers to use their device on theclient network 150, the shoppers must visit one or more retail stores within the mall, the location of which is tracked by the shopper's device (e.g., the guest UE 130) and indicated by theLSID 146. Thus, in some embodiments, theguest UE 130 can provide theLSID 146 to thenetwork access point 152, and thenetwork access application 160 can compare theLSID 146 to theLSAS 108. In an embodiment, if one or more, or all, of the location indicators of theLSID 146 matches the location indicators of theLSAS 108, then thenetwork access application 160 verifies that theguest UE 130 has visited the defined sequence of locations as indicated by theLSAS 108, thereby satisfying one of thecorroborating conditions 106. - In some embodiments, satisfying one of the
corroborating conditions 106 can include authentication of a voice signature, where the voice signature can be detected by a device connected to theclient network 150, such as thehost device 112. For example, in some embodiments, theremote data store 104 can include avoice signature file 109 that provides a digital file representing the unique voice signature for a user. For example, in an embodiment, thevoice signature file 109 is associated with a voice signature of theguest user 128 that corresponds with theguest UE 130. In some embodiments, thevoice signature file 109 can include sound data corresponding to audible sound frequencies produced by theguest user 128, such as when theguest user 128 provides theguest voice input 129. In some embodiments, thevoice signature file 109 can be provided based on a voicemail greeting and/or another voice communication that can be used for comparison with theguest voice input 129 provided by theguest user 128. In some embodiments, theguest voice input 129 spoken by theguest user 128 can be received by thevoice interface application 122 of thehost device 112 via an input, such as a microphone of thehost device 112. In some embodiments, theguest voice input 129 can be translated into a guest voice message (not shown) and sent to thenetwork access application 160 of thenetwork access point 152. Thenetwork access application 160 can compare the guest voice message to thevoice signature file 109, and if at least a defined portion of the audible sound frequencies indicated by each of the guest voice message and thevoice signature file 109 match (e.g., greater than ninety five percent), then the voice signature of theguest user 128 is deemed by thenetwork access application 160 to be authentic, thereby satisfying a corroborating condition. In an embodiment, when at least one or more, or all, of thecorroborating conditions 106 are satisfied, thenetwork access point 152 can proceed with creating a network access package, such as thenetwork access package 172. It is understood that zero, one, or more than one of thecorroborating conditions 106 may be satisfied prior to and/or after theguest UE 130 is allowed to communicate via thenetwork access point 152. It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. - In some embodiments, the
network access point 152 can allow theguest UE 130 to connect and/or reconnect to theclient network 150 by creating thenetwork access package 172 for theguest UE 130. Thenetwork access package 172 can take the form of a digital executable package that can be created and/or managed via thenetwork access application 160 of thenetwork access point 152. Thenetwork access package 172 can include a service setidentifier 174 that informs theguest UE 130 of which network theguest UE 130 is allowed to connect. For example, in some embodiments, the service setidentifier 174 can correspond with theclient network 150 and/or asub-client network 180, which will be discussed in further detail below. Thenetwork access package 172 also can include a set ofaccess credentials 176. Theaccess credentials 176 can include one or more of a key, a passcode, and/or other credentials that can be used to ensure a secure connection with thenetwork access point 152. Theaccess credentials 176 can be used by theguest UE 130 to establish and/or maintain a connection with thenetwork access point 152. In some embodiments, thenetwork access package 172 also can include anotification 202, which is illustrated according to various embodiments inFIGS. 2A-2C . Thenotification 202 can be presented to theguest UE 130 so as to notify theguest user 128 that theguest UE 130 is authorized and/or pre-approved to communicate via thenetwork access point 152, such as through use of theclient network 150. In some embodiments, thenotification 202 can include a connection acceptance trigger, which will be discussed in further detail with respect toFIGS. 2A-2C . In some embodiments, thenetwork access package 172 can be configured to instruct theguest UE 130 to send areply message 148 to thenetwork access point 152. In some embodiments, thereply message 148 can include theaccess credentials 176, the service setidentifier 174, theLSID 146, a client network token 181 (discussed below), and/or theunique identifier 144. In some embodiments, thenetwork access application 160 can receive thereply message 148, and determine whether theaccess credentials 176 included therein match the access credentials sent to theguest UE 130. In some embodiments, thenetwork access application 160 of thenetwork access point 152 can provide theguest UE 130 access to theclient network 150 based on, at least in part, theaccess credentials 176 within thereply message 148. - In some embodiments, the
network access application 160 can create awhitelist 164 that is stored in the memory 158. In some embodiments, thewhitelist 164 can be stored in theremote data store 104. Thewhitelist 164 can correspond to one or more networks that is provided by thenetwork access point 152, such as theclient network 150. Therefore, in some embodiments, thewhitelist 164 can identify and correspond with the service setidentifier 174 that is provided in thenetwork access package 172. By this, when thenetwork access application 160 receives a message from theguest UE 130, such as thereply message 148, thenetwork access application 160 can extract the service setidentifier 174 included in the message to identify thewhitelist 164. In some embodiments, thenetwork access application 160 can instantiate theunique identifier 144 within thewhitelist 164, which is represented as aguest UE identifier 166. Theguest UE identifier 166 can be a copy of, and/or based on, theunique identifier 144 of theguest UE 130. In some embodiments, theunique identifier 144 is instantiated within thewhitelist 164 by storing theguest UE identifier 166 within thewhitelist 164. Theunique identifier 144 can be instantiated within thewhitelist 164 when one or more of thecorroborating conditions 106 is satisfied by theguest UE 130. In some embodiments, a network provided by thenetwork access point 152, such as theclient network 150, can be used only by devices that are identified on a whitelist, such as thewhitelist 164. For example, in an embodiment, thewhitelist 164 includes identifications of all devices connected to, and/or authorized to connect to, theclient network 150, such as, for example, thehost device 112, thetarget UE 184, and/or theguest UE 130. In some embodiments, thewhitelist 164 can correspond to a sub-client network that is provided by thenetwork access point 152 and is associated with, but distinct from, theclient network 150, such as thesub-client network 180. - In some embodiments, the
sub-client network 180 can be provided by thenetwork access point 152 and/or another access point that is controlled by thenetwork access application 160 of thenetwork access point 152. Thesub-client network 180 can include a wireless radio network that operates a unique radio frequency that is different and/or the same as theclient network 150. In some embodiments, thesub-client network 180 can operate on a radio channel so as not to interfere with communications on theclient network 150. In some embodiments, thesub-client network 180 can be a virtual network that operates via a hypervisor (not shown) of thenetwork access point 152. In some embodiments, the service setidentifier 174 can correspond with thesub-client network 180. In some embodiments, the service setidentifier 174 can be created based on theunique identifier 144. In some embodiments, thenetwork access application 160 can create asub-client network profile 182 corresponding to thesub-client network 180. In some embodiments, thesub-client network profile 182 can include network configuration parameters such as, for example, time limits, network proximity and re-entry, port access, IP address range, throttling, download/upload data limit, download/upload time, misbehavior tolerance, combinations thereof, and the like. In some embodiments, thesub-client network 180 can be designated for use exclusively by theguest UE 130. For example, thesub-client network profile 182 can be bound to thewhitelist 164 such that only devices listed on thewhitelist 164 are allowed to use thesub-client network 180. - In some embodiments, the memory 158 of the
network access point 152 can include a token, such as aclient network token 181. In some embodiments, thesub-client network profile 182 and/or thewhitelist 164 can indicate whether theclient network token 181 should be used by theguest UE 130 to interact with, make requests of, and/or control other devices connected to thenetwork access point 152. Theclient network token 181 can be created by thenetwork access application 160 based on theunique identifier 144 of theguest UE 130. In some embodiments, thenetwork access package 172 can include theclient network token 181. In some embodiments, if theclient network token 181 is included within thenetwork access package 172, then theclient network token 181 can be used by thenetwork connection application 142 of theguest UE 130 to enable contact with and/or control of other devices connected to thenetwork access point 152, such as thehost device 112 and/or thetarget UE 184. In some embodiments, only theguest UE 130 and thenetwork access point 152 are privy to and/or store theclient network token 181 so that that theguest UE 130 can levy commands on other devices connected to the client network 150 (e.g., the target UE 184), however, those other devices (e.g., the target UE 184) cannot levy commands on theguest UE 130. For example, in some embodiments, thetarget UE 184 can be configured as a smart television. Once thenetwork access point 152 enables theguest UE 130 to access thesub-client network 180 and/or theclient network 150, then theguest UE 130 can be used to create aUE command 183. TheUE command 183 can instruct thetarget UE 184 to perform one or more output actions 188. Examples of output actions 188 can include, but should not be limited to, changing a media channel, pausing playback of content, muting audio content, skipping content, blocking content, rating content, powering thetarget UE 184 on and/or off, displaying media content, sending/receiving a file, sending a private communication for display on a user interface 186 of thetarget UE 184, a combination thereof, or the like. It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting in any way. In some embodiments, when theclient network token 181 is provided to theguest UE 130, then theguest UE 130 can send theclient network token 181 along with theUE command 183 to thetarget UE 184 via thenetwork access point 152. Before thenetwork access point 152 relays theUE command 183 to thetarget UE 184, thenetwork access application 160 can identify whether the client network token 181 matches an instance of theclient network token 181 for theguest UE 130 stored in one or more of thewhitelist 164 and/or thesub-client network profile 182 of the memory 158. If theclient network token 181 sent by theguest UE 130 is approved by thenetwork access application 160, then thenetwork access application 160 can relay theUE command 183 to targetUE 184 via theclient network 150. - In some embodiments, the
sub-client network profile 182 can include themaximum time limit 167 so as to indicate a maximum amount of time that theguest UE 130 is authorized to use thesub-client network 180 and/or theclient network 150. In some embodiments, access to one or more of thesub-client network 180 and/or theclient network 150 can be revoked by thenetwork access point 152, such as when theguest UE 130 has exceeded the maximum usage time indicated by themaximum time limit 167. In some embodiment, thehost device 112 can revoke privileges granted to theguest UE 130, such as by revoking the ability of theguest UE 130 to send commands to thetarget UE 184, access thesub-client network 180, and/or access theclient network 150. In some embodiments, revoking the privilege to command other devices can occur by thenetwork access application 160 removing the client network token 181 from thesub-client network profile 182 and/or thewhitelist 164. Therefore, if theguest UE 130 were to send theUE command 183 with theclient network token 181 to thenetwork access point 152, but thenetwork access point 152 determines that an instance of theclient network token 181 is not stored in and/or has been removed from, thesub-client network profile 182 and/or thewhitelist 164, then thenetwork access point 152 can prevent theUE command 183 from passing to thetarget UE 184. In some embodiments, thenetwork access application 160 of thenetwork access point 152 may require theguest UE 130 to satisfy a new and/or different set of corroborating conditions prior to theclient network token 181 being reinstated within thesub-client network profile 182 and/or thewhitelist 164. -
FIG. 1 illustrates one provider network 102, one remote data store 104, one set of corroborating conditions 106, one blacklist 107, one voice signature file 109, one location sequence authentication string 108, one host user 110, one host device 112, one processor 114, one transceiver 116, one user interface 118, one memory 120, one voice interface application 122, one trigger response message 124, one network access request 126, one host voice input 123, one guest user 128, one guest voice input 129, one guest UE 130, one processor 132, one transceiver 134, one display 136, one user interface 138, one memory 140, one unique identifier 144, one network connection application 142, one location sequence identification 146, one reply message 148, one client network 150, one network access point 152, one processor 154, one transceiver 156, one memory 158, one network access application 160, one recognized device list 162, one whitelist 164, one guest UE identifier 166, one maximum time limit 167, one proximity time threshold 168, one identity verification request message 170, one network access package 172, one service set identifier 174, one access credential 176, one notification 202, one sub-client network 180, one client network token 181, one sub-client network profile 182, one UE command 183, one target UE 184, one user interface 186, and one set of output actions 188. It should be understood, however, that some implementations of the operatingenvironment 100 can include zero, one, or more than one of these elements shown inFIG. 1 . As such, the illustrated embodiment of the operatingenvironment 100 should be understood as being illustrative, and should not be construed as being limiting in any way. - Turning now to
FIG. 2A , with continued reference toFIG. 1 , agraphical user interface 200 is illustrated according to an embodiment. In the illustrated example, theguest UE 130 is configured as a mobile communications device that includes thedisplay 136 and an embodiment of theuser interface 138. In an embodiment, theuser interface 138 presents anotification 202 that can be included in thenetwork access package 172 discussed above. Thenotification 202 can include selectable software buttons that are configured as triggers for different response and input options. For example, in an embodiment, thenotification 202 can include a connectionacceptance trigger button 204, and a connectionrejection trigger button 206. In some embodiments, when the connectionacceptance trigger button 204 is selected, theguest UE 130 can generate and send thereply message 148 that can include theaccess credentials 176, the service setidentifier 174, and theunique identifier 144. Thereply message 148 can cause theguest UE 130 to inform thenetwork access point 152, via thereply message 148, that theguest UE 130 accepts the offer to connect with thenetwork access point 152, thereby commencing communication via one or more of theclient network 150, theprovider network 102, and/or thesub-client network 180. In some embodiments, selection of the connectionrejection trigger button 206 can cause theguest UE 130 to ignore the offer to connect from thenetwork access point 152. - Turning now to
FIGS. 2B-2C , with continued reference toFIG. 1 , agraphical user interface 201 is illustrated according to an embodiment. In the illustrated example, theuser interface 138 presents another embodiment of anotification 203. In some embodiments, thenotification 203 can be provided to theguest UE 130 so that a location sequence can be verified as part of satisfying thecorroborating conditions 106 prior to thenetwork access point 152 allowing theguest UE 130 to access one or more of the networks, such as any of theprovider network 102, theclient network 150, and/or thesub-client network 180. In the illustrated embodiment, thenotification 203 can include a locationsequence verification button 208 and the connectionrejection trigger button 206. Upon selection of the locationsequence verification button 208 illustrated inFIG. 2B , theguest UE 130 can configure theuser interface 138 to present alocation verification notification 210, as illustrated inFIG. 2C . Thelocation verification notification 210 can include a plurality of selectable options, such as illustrated as locations A-N. In an embodiment, thelocation verification notification 210 can allow a user to provide thelocation sequence identification 146 discussed above inFIG. 1 . In some embodiments, thelocation verification notification 210 can allow a user to modify a name and/or geotag corresponding with thelocation sequence identification 146. In some embodiments, thenetwork connection application 142 can combine the input of thelocation sequence identification 146 through thelocation verification notification 210 with one or more geocoordinates, geotags, addresses, or other indicators of one or more locations which theguest UE 130 has visited. Once thelocation sequence identification 146 has been selected via thelocation verification notification 210, a user can select alocation confirmation button 212. Selection of thelocation confirmation button 212 can cause theguest UE 130 to send at least thelocation sequence identification 146 to thenetwork access point 152, which in turn may be used to verify one or morecorroborating conditions 106, such as discussed above with respect toFIG. 1 . In some embodiments, thenetwork access point 152 can allow theguest UE 130 to access one or more of theclient network 150, theprovider network 102, and/or thesub-client network 180 based on the particular input provided for thelocation sequence identification 146 within thelocation verification notification 210 illustrated inFIG. 2C . It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting the scope of the concepts and technologies disclosed herein. - Turning now to
FIGS. 3A and 3B , aspects of amethod 300 for network security control for access to wireless radio networks will be described in detail, according to an illustrative embodiment. It should be understood that the operations of the one or more methods disclosed herein (e.g., themethod 300 and/or amethod 400 discussed below) are not necessarily presented in any particular order and that performance of some or all of the operations in an alternative order(s) is possible and is contemplated. The operations have been presented in the demonstrated order for ease of description and illustration. Operations may be added, omitted, and/or performed simultaneously, without departing from the scope of the concepts and technologies disclosed herein. - It also should be understood that the methods disclosed herein can be ended at any time and need not be performed in its entirety. Some or all operations of the methods, and/or substantially equivalent operations, can be performed by execution of computer-readable instructions included on a computer storage media, as defined herein. The term “computer-readable instructions,” and variants thereof, as used herein, is used expansively to include routines, applications, application modules, program modules, programs, components, data structures, algorithms, and the like. Computer-readable instructions can be implemented on various system configurations including single-processor or multiprocessor systems, minicomputers, user equipment, mainframe computers, personal computers, network servers, hand-held computing devices, microprocessor-based, programmable consumer electronics, combinations thereof, and the like.
- Thus, it should be appreciated that the logical operations described herein are implemented (1) as a sequence of computer implemented acts or program modules running on a computing system and/or (2) as interconnected machine logic circuits or circuit modules within the computing system. The implementation is a matter of choice dependent on the performance and other requirements of the computing system. Accordingly, the logical operations described herein are referred to variously as states, operations, structural devices, acts, or modules. These states, operations, structural devices, acts, and modules may be implemented in software, in firmware, in special purpose digital logic, and any combination thereof. As used herein, the phrase “cause a processor to perform operations” and variants thereof is used to refer to causing a processor of a computing system or device, such as the
network access point 152, theguest UE 130, and/or thehost device 112, to perform one or more operations and/or causing the processor to direct other components of the computing system or device to perform one or more of the operations. - For purposes of illustrating and describing the concepts of the present disclosure, the methods disclosed herein are described as being performed by the
network access point 152 via execution of one or more software modules such as, for example, thenetwork access application 160 that configure one or more processors. It should be understood that additional and/or alternative devices and/or network nodes can, in some embodiments, provide the functionality described herein via execution of one or more modules, applications, and/or other software including, but not limited to, thehost device 112 executing thevoice interface application 122. Thus, the illustrated embodiments are illustrative, and should not be viewed as being limiting in any way. Themethod 300 will be described with reference toFIG. 1 and further reference toFIG. 2A . - The
method 300 begins atoperation 302, where thenetwork access point 152 can detect theguest UE 130. Theguest UE 130 can be detected based on theunique identifier 144 being broadcast to thenetwork access point 152. Fromoperation 302, themethod 300 can proceed tooperation 304, where thenetwork access point 152 can determine whether theguest UE 130 is a recognized device. For example, thenetwork access application 160 executing on thenetwork access point 152 can use theunique identifier 144 of theguest UE 130 to compare with the recognizeddevice list 162 that identifies a list of devices that are known to thenetwork access point 152. - In an embodiment, the
network access point 152 recognizes theguest UE 130, and themethod 300 can proceed along the YES path tooperation 306. Atoperation 306, thenetwork access point 152 can wait for theguest UE 130 to send a network connection request. By waiting for theguest UE 130 to send a network connection request, in some embodiments, thenetwork access point 152 may not act on behalf of theguest UE 130 to proactively authorize and/or allow theguest UE 130 connection and access to a network provided by thenetwork access point 152, such as theclient network 150. Themethod 300 can proceed fromoperation 306 tooperation 325, where, in an embodiment, thenetwork access point 152 can receive a network connection request that was initiated solely by theguest UE 130. In an embodiment, themethod 300 can proceed fromoperation 325 tooperation 326, where thenetwork access point 152 can provide access for theguest UE 130 that was recognized from the recognizeddevice list 162. Fromoperation 326, themethod 300 can proceed tooperation 328, where themethod 300 can end. - Returning to
operation 304, in an embodiment, thenetwork access point 152 can determine that theguest UE 130 is not a recognized device, such as by confirming that theunique identifier 144 is not found on the recognizeddevice list 162. In response to determining that theguest UE 130 is not a recognized device, themethod 300 can proceed along the NO path tooperation 308. Atoperation 308, thenetwork access point 152 can determine whether theguest UE 130 exceeds the amount of time for being in range of engaging in communication with theclient network 150, which is indicated in theproximity time threshold 168. In an embodiment, thenetwork access point 152 can determine that the amount of time that has passed since theguest UE 130 was first detected as being in range of communicating with theclient network 150 has not exceeded theproximity time threshold 168. If theproximity time threshold 168 is not exceeded, then themethod 300 can proceed along the NO path, which continues to performoperation 308 and check whether theproximity time threshold 168 has been exceeded. In an embodiment, in response to thenetwork access point 152 determining that theproximity time threshold 168 has been exceeded, themethod 300 can proceed fromoperation 308 tooperation 310. It is understood that in some embodiments, themethod 300 can proceed fromoperation 304 directly tooperation 310. - At
operation 310, thenetwork access point 152 can create the identityverification request message 170. The identityverification request message 170 can be configured to seek approval from thehost device 112 as to whether to grant theguest UE 130 access to theclient network 150. In some embodiments, the identityverification request message 170 can instruct thehost device 112 to obtain approval from thehost user 110. Fromoperation 310, themethod 300 can proceed tooperation 312, where thenetwork access point 152 can provide the identityverification request message 170 to thehost device 112. Fromoperation 312, themethod 300 can proceed tooperation 314, where thenetwork access point 152 can receive thetrigger response message 124 from thehost device 112. Thetrigger response message 124 can indicate approval from thehost device 112 for allowing theguest UE 130 access to theclient network 150. In some embodiments, thetrigger response message 124 can include thenetwork access request 126 that was generated by thehost device 112 and sent to thenetwork access point 152 on behalf of theguest UE 130. By this, theguest UE 130 does not initiate a request to gain access to the client network 150 (or any other network operated by the network access point 152) due to thenetwork access request 126 being sent by thehost device 112 to thenetwork access point 152 on behalf of theguest UE 130. - From
operation 314, themethod 300 can proceed tooperation 316, where thenetwork access point 152 can determine whether theguest UE 130 satisfies one or more corroborating conditions, such as one or more of thecorroborating conditions 106. For example, in some embodiments, thenetwork access point 152 may require that theguest UE 130 satisfy zero, one, or more than one of thecorroborating conditions 106 prior to being granted access to theclient network 150. Examples of theguest UE 130 satisfying thecorroborating condition 106 can include, but should not be limited to, one or more of authentication of a voice signature detected by thehost device 112, verification that theguest UE 130 has visited a defined sequence of locations, verification that theguest UE 130 is not on theblacklist 107 in aremote data store 104, a combination thereof, or the like. The voice signature can be detected by thehost device 112 receiving theguest voice input 129, which can be sent to thenetwork access point 152 to compare with thevoice signature file 109. The verification that theguest UE 130 has visited a defined sequence of locations can be obtained by thenetwork access point 152 sending a notification to theguest UE 130 that requests location sequence information (e.g., the LSID 146) be sent to thenetwork access point 152, such as illustrated in the embodiments discussed with respect toFIGS. 2B-2C . TheLSID 146 can be compared with the locationsequence authentication string 108 in order to verify that one or more locations has been visited by theguest UE 130. In some embodiments, verification that theguest UE 130 is not on theblacklist 107 can be determined by thenetwork access point 152 confirming that theblacklist 107 does not include theunique identifier 144 associated with theguest UE 130. In some embodiments, when theguest UE 130 does not satisfy one, more than one, and/or all of the corroborating conditions, then themethod 300 can proceed along the NO path where thenetwork access point 152 can wait and continue to check until theguest UE 130 satisfies one, more than one, and/or all of thecorroborating conditions 106. In an embodiment where theguest UE 130 satisfies one, more than one, and/or all of thecorroborating conditions 106, then themethod 300 can proceed along the YES path tooperation 318. Atoperation 318, thenetwork access point 152 can, in an embodiment, perform a process shown inFIG. 3B to create a network access package, such as thenetwork access package 172, that can provide theguest UE 130 with access credentials to access theclient network 150. - Turning briefly to
FIG. 3B , thenetwork access point 152, atoperation 330, can create a service set identifier for theclient network 150, such as the service setidentifier 174, according to an embodiment. Fromoperation 330, themethod 300 can proceed tooperation 332, where thenetwork access point 152 can create thewhitelist 164 that can, in some embodiments, correspond with the service setidentifier 174 for theclient network 150. Fromoperation 332, themethod 300 can proceed tooperation 334, where thenetwork access point 152 can instantiate theunique identifier 144 within thewhitelist 164, such as by creating and storing theguest UE identifier 166 within thewhitelist 164, where theguest UE identifier 166 can include a copy of theunique identifier 144. Fromoperation 334, themethod 300 can proceed tooperation 336, where thenetwork access point 152 can generate theaccess credentials 176 for theguest UE 130 to use in accessing and communicating with theclient network 150. Fromoperation 336, themethod 300 can proceed tooperation 338, where thenetwork access point 152 can create thenetwork access package 172 that can include, for example, one or more of theaccess credentials 176, thenotification 202 that indicates theguest UE 130 is authorized to use theclient network 150, and can also include the connectionacceptance trigger button 204 that, upon selection, instructs theguest UE 130 to send thereply message 148 to thenetwork access point 152 using theaccess credentials 176. Fromoperation 338, theprocess 318 of creating an embodiment of thenetwork access package 172 can end and proceed tooperation 320. - Returning to
FIG. 3A , themethod 300 can continue fromoperation 318 tooperation 320, where thenetwork access point 152 can provide thenetwork access package 172 to theguest UE 130, such as via thecommunication path 2. Fromoperation 320, themethod 300 can proceed tooperation 322, where thenetwork access point 152 can receive thereply message 148 from theguest UE 130. Thereply message 148 can include theaccess credentials 176 that were sent in thenetwork access package 172. In some embodiments, thereply message 148 also can include theunique identifier 144 of theguest UE 130. Fromoperation 322, themethod 300 can proceed tooperation 324, where thenetwork access point 152 can provide access for theguest UE 130 to use theclient network 150 based on thereply message 148 including theaccess credentials 176. By this, theguest UE 130 can communicate over theclient network 150 via thenetwork access point 152. It is understood that the examples provided herein are for illustration purposes only, and therefore should not be construed as limiting in any way. Fromoperation 324, themethod 300 can proceed tooperation 328, where themethod 300 can end. - Turning now to
FIGS. 4A-4B , amethod 400 for network security control for access to wireless radio networks will be described, according to another illustrative embodiment of the concepts and technologies disclosed herein. Themethod 400 will be described with additional reference toFIG. 1 andFIGS. 2B-2C . Themethod 400 assumes that thenetwork access point 152 has already detected theguest UE 130, determined that theguest UE 130 is not a recognized device, and in some embodiments, determined that theproximity time threshold 168 has been exceeded, such as discussed with respect tooperations method 300. Themethod 400 begins and proceeds tooperation 402, where thenetwork access point 152 can create the identityverification request message 170. The identityverification request message 170 can include theunique identifier 144 so as to indicate to thehost device 112 and thehost user 110 the presence of theguest UE 130 in relation to thenetwork access point 152. Fromoperation 402, themethod 400 can proceed tooperation 404, where the identityverification request message 170 is provided to thehost device 112. The identityverification request message 170 can be configured to instruct thehost device 112 to seek an approval or rejection from thehost user 110 so as to know whether to allow or deny theguest UE 130 access to one or more networks of thenetwork access point 152, such as one or more of theclient network 150, thesub-client network 180, and/or theprovider network 102. Thehost user 110 can provide thehost voice input 123 that, in some embodiments, indicates approval to allow theguest UE 130 access to use thenetwork access point 152. In some embodiments, thehost voice input 123 may not indicate which network theguest UE 130 should be allowed to join, but rather may simply indicate approval. Thevoice interface application 122 can transform thehost voice input 123 into thetrigger response message 124 that can include thenetwork access request 126 that is created on behalf of theguest UE 130. Fromoperation 404, themethod 400 can proceed tooperation 406, where thenetwork access point 152 can receive, from thehost device 112 via thecommunication path 2, thetrigger response message 124 that includes thenetwork access request 126. Fromoperation 406, themethod 400 can proceed tooperation 408, where thenetwork access point 152 can execute a process shown inFIG. 4B to create a network access package, such as an embodiment of thenetwork access package 172. - Turning briefly to
FIG. 4B , thenetwork access point 152 can, atoperation 440, create a service set identifier, such as the service setidentifier 174. In some embodiments, the service setidentifier 174 can be specifically created for, and unique to, thesub-client network 180. For example, in some embodiments, the service setidentifier 174 can be created specifically for theguest UE 130 to represent thesub-client network 180. In some embodiments, theclient network 150 may be a hidden network that does not report a service set identifier to theguest UE 130, and therefore only thesub-client network 180 becomes visible to theguest UE 130 via the service setidentifier 174. In some embodiments, the service setidentifier 174 is generated based on theunique identifier 144 of theguest UE 130, such as by notifying theguest UE 130 that the sub-client was specifically for their use, and in some embodiments only for their use. For example, in an embodiment, the service setidentifier 174 can be broadcast for display on theguest UE 130 as “NetworkForGuestUEidentification”, or another text indicator that thesub-client network 180 has been and/or will be uniquely created for use by (only) theguest UE 130. In some embodiments, when multiple guest UE's are present, themethod 400 can be performed for more than one and/or each guest UE, thereby enabling each guest UE access to their own sub-client network. In some embodiments, the service setidentifier 174 corresponds with thesub-client network 180, but thesub-client network 180 remains hidden from view for all other devices except for theguest UE 130. For example, in an embodiment, thenetwork access point 152 may hide thesub-client network 180 from public broadcast and send the service setidentifier 174 only to theguest UE 130 so that it appears to theguest UE 130 but does not appear for other guest devices. In some embodiments, this may be accomplished by thenetwork access point 152 initiating a beamforming routine that targets broadcast of the service setidentifier 174 to theguest UE 130, and exposes thesub-client network 180 to theguest UE 130. It is understood that the examples provided are for illustrative purposes only, and therefore should not be construed as limiting the scope of the concepts and technologies disclosed herein. - From
operation 440, theprocess 408 can proceed tooperation 442, where thenetwork access point 152 can create thewhitelist 164. In some embodiments, thewhitelist 164 can correspond with the service setidentifier 174 associated with thesub-client network 180. Fromoperation 442, theprocess 408 can proceed tooperation 444, where thenetwork access application 160 of thenetwork access point 152 can instantiate theunique identifier 144 associated with theguest UE 130 within thewhitelist 164. Fromoperation 444, theprocess 408 can proceed tooperation 446, where thenetwork access point 152 can create thesub-client network profile 182. Thesub-client network profile 182 can be associated with thesub-client network 180 and include information about thesub-client network 180. In some embodiments, thesub-client network profile 182 can include thewhitelist 164 and themaximum time limit 167 indicating the length of time that theguest UE 130 is allowed to maintain connection with thesub-client network 180 during a single network session before reauthorization is required form thehost device 112. Reauthorization can be provided by resending the identityverification request message 170 to thehost device 112 and thehost device 112 responding with thetrigger response message 124 that includes thenetwork access request 126. - From
operation 446, theprocess 408 can proceed tooperation 448, where thenetwork access point 152 can generate theclient network token 181 for theguest UE 130. In some embodiments, thesub-client network profile 182 can include theclient network token 181 that can allow theguest UE 130 to contact and/or control devices on theclient network 150, such as one or more of thetarget UE 184 and/or thehost device 112. Theclient network token 181 can be stored within thesub-client network profile 182 for comparison purposes when theguest UE 130 seeks to send a command, such as theUE command 183, to a device on theclient network 150, such as thetarget UE 184. Fromoperation 448, theprocess 408 can proceed tooperation 450, where the network access point can generate theaccess credentials 176 for theguest UE 130. In some embodiments, theaccess credentials 176 correspond with thesub-client network 180 and not theclient network 150. By this, thenetwork access point 152 can isolate theguest UE 130 to use thesub-client network 180 and monitor the communications passing to and/or from theguest UE 130 via thesub-client network 180. Thenetwork access point 152 can allow communications to/from theguest UE 130 to pass via theclient network 150 and theprovider network 102 based on theguest UE 130 providing theaccess credentials 176 to thenetwork access point 152. In some embodiments, theaccess credentials 176 and theclient network token 181 are required from theguest UE 130 in order for theguest UE 130 to send commands, such as theUE command 183, to devices on theclient network 150, such as thetarget UE 184 and/or thehost device 112. Fromoperation 450, theprocess 408 can proceed tooperation 452, where thenetwork access point 152 can create thenetwork access package 172 for theguest UE 130. In some embodiments, thenetwork access package 172 can include the service setidentifier 174 associated with thesub-client network 180, theaccess credentials 176, theclient network token 181, and a notification, such as any of thenotifications network access package 172 can instruct theguest UE 130 to send thereply message 148 back to thenetwork access point 152, where thereply message 148 can include theaccess credentials 176, theclient network token 181, theLSID 146, theunique identifier 144, and any input from one or more of thenotifications FIGS. 2A-2C . For example, in some embodiments, thenotifications guest UE 130 to send theLSID 146 to thenetwork access point 152, and thenotification 202 can instruct the guest UE to create and send thereply message 148. In some embodiments, each of thenotifications user interface 138 of theguest UE 130. As such, the examples illustrated inFIGS. 2A-2C are for illustration purposes only, and should not be construed as limiting the scope of the embodiments in any way. Fromoperation 452, theprocess 408 can end and proceed tooperation 410, which is illustrated onFIG. 4A . - Turning back to
FIG. 4A , themethod 400 can proceed tooperation 410, where thenetwork access point 152 can provide thenetwork access package 172 to theguest UE 130, such as via thecommunication path 2. Theguest UE 130 can receive thenetwork access package 172 and present one or more of thenotifications user interface 138 of theguest UE 130. Theguest UE 130 can create thereply message 148 that can include any of theaccess credentials 176, theclient network token 181, theunique identifier 144, and theLSID 146. Fromoperation 410, themethod 400 can proceed tooperation 411, where thenetwork access point 152 can receive thereply message 148 from theguest UE 130. Fromoperation 411, themethod 400 can proceed tooperation 412, where thenetwork access point 152 can determine whetherguest UE 130 has satisfied one or morecorroborating conditions 106. In some embodiments, thesub-client network profile 182 can indicate whether theguest UE 130 is required to satisfy one or more ofcorroborating conditions 106 before access to thesub-client network 180 and/or theclient network 150 is granted. For example, the corroboratingconditions 106 can include one or more of authentication of a voice signature that can be detected by thehost device 112, verification that theguest UE 130 has visited a defined sequence of locations, verification that theguest UE 130 is not on a blacklist in a remote datastore, a combination thereof, or the like. Thenetwork access point 152 can authenticate a voice signature of theguest user 128 that can be detected by thehost device 112 and/or theguest UE 130 by receiving a message that includes theguest voice input 129 and comparing theguest voice input 129 with thevoice signature file 109 stored in theremote data store 104. If theguest voice input 129 matches thevoice signature file 109, then one of thecorroborating conditions 106 corresponding to authentication of the voice signature has been satisfied. Thenetwork access point 152 can verify that theguest UE 130 has visited a defined sequence of locations by comparing theLSID 146 from theguest UE 130 with the locationsequence authentication string 108 in theremote data store 104. If theLSID 146 matches the locationsequence authentication string 108, then one of thecorroborating conditions 106 corresponding to verification that theguest UE 130 has visited a defined sequence of locations has been satisfied. Thenetwork access point 152 can verify that theguest UE 130 is not on a blacklist in a remote datastore by confirming that theunique identifier 144 is not present within theblacklist 107 stored in theremote data store 104, thereby satisfying one of thecorroborating conditions 106. In some embodiments, if one, more than one, and/or all of thecorroborating conditions 106 are not satisfied, then themethod 400 can proceed along the NO path and continue to check whether has verified one or more of thecorroborating conditions 106. - In further embodiments, if one, more than one, and/or all of the
corroborating conditions 106 are not satisfied, then themethod 400 can proceed along the NO path tooperation 418, where thenetwork access point 152 can limit or otherwise withhold communication routing for theguest UE 130, thereby preventing theguest UE 130 from using and accessing one or more of thesub-client network 180, theclient network 150, and/or theprovider network 102. In an embodiment, themethod 400 can proceed fromoperation 418 tooperation 420, where themethod 400 can end. In some embodiments, themethod 400 can proceed fromoperation 418 tooperation 408, where thenetwork access point 152 can create a new instance of thenetwork access package 172 so as to allow theguest UE 130 another attempt at gaining access to one or more networks. It is understood that the examples provided are for illustration purposes only, and therefore should not be construed as limiting the scope of the concepts and technologies disclosed herein. - In some embodiments, if one, more than one, and/or all of the
corroborating conditions 106 are satisfied, then themethod 400 can proceed along the YES path fromoperation 412 tooperation 414, where thenetwork access point 152 can provide theguest UE 130 with access to one or more network (e.g., thesub-client network 180, theclient network 150, and/or the provider network 102) by routing communications to/from theguest UE 130. Fromoperation 414, themethod 400 can proceed tooperation 416, where thenetwork access point 152 can identify themaximum time limit 167 within thesub-client network profile 182 and determine whether theguest UE 130 has been connected to thesub-client network 180 longer than the time allotted by the maximum time limit, thereby exceeding themaximum time limit 167. - In an embodiment, the
network access point 152 can determine that theguest UE 130 has been connected and using thesub-client network 180 longer than themaximum time limit 167, thereby exceeding themaximum time limit 167, which causes themethod 400 to proceed along the YES path tooperation 418. Atoperation 418, thenetwork access point 152 can limit theguest UE 130 from using thesub-client network 180 and/or theclient network 150 by revoking or otherwise removing the unique identifier 144 (and/or theguest UE identifier 166 which is a copy of the unique identifier 144) from thewhitelist 164, thereby preventing theguest UE 130 from using a network. - In an embodiment, the
network access point 152 can determine that theguest UE 130 has not been connected and using thesub-client network 180 longer than themaximum time limit 167, thereby not exceeding themaximum time limit 167, which causes themethod 400 to proceed along the NO path fromoperation 416 tooperation 422. Atoperation 422, thenetwork access point 152 can determine whether theguest UE 130 has sent a command, such as theUE command 183, that can instruct thetarget UE 184 to perform an output action 188. If thenetwork access point 152 determines that theguest UE 130 has not sent a command, then themethod 400 can proceed along the NO path tooperation 414 where thenetwork access point 152 can continue to provide theguest UE 130 with access to a network. If thenetwork access point 152 determines that theguest UE 130 has sent a command which is received by thenetwork access point 152, then themethod 400 can proceed along the YES path tooperation 426 where thenetwork access point 152 can determine whether theclient network token 181 has been included with theUE command 183. Theclient network token 181 can be used to ensure that theguest UE 130 is authorized to send commands to one or more devices connected to theclient network 150. - In some embodiments, if the
client network token 181 is not provided with theUE command 183, then themethod 400 can proceed along the NO path tooperation 428, where thenetwork access point 152 can discard theUE command 183, thereby preventing theUE command 183 from being sent to thetarget UE 184 for which theUE command 183 is intended. Fromoperation 428, themethod 400 can proceed tooperation 414, where thenetwork access point 152 can continue to provide network access and communication routing for theguest UE 130. - In some embodiments, if the
client network token 181 is provided with theUE command 183, then themethod 400 can proceed fromoperation 426 tooperation 430, where thenetwork access point 152 can route theUE command 183 from thesub-client network 180, through theclient network 150, to thetarget UE 184 based on theUE command 183 being intended for thetarget UE 184. TheUE command 183 can be received by thetarget UE 184, which can execute and perform one or more output actions 188 based on the instructions of theUE command 183. In some embodiments, themethod 400 can proceed fromoperation 430 tooperation 414, where thenetwork access point 152 can continue to provide network access and communication routing for theguest UE 130. In some embodiments, themethod 400 can proceed fromoperation 430 tooperation 420, where themethod 400 can end. - Turning now to
FIG. 5 , anillustrative user equipment 500 and components thereof will be described. In some embodiments, one or more of thehost device 112,guest UE 130 and/or the target UE 184 (shown inFIG. 1 ) can be configured like theuser equipment 500. It is understood that theuser equipment 500 can be configured to take the form of a mobile communication device, a tablet, a wearable computing device, a heads-up display computer system, an augmented reality (“AR”) device, a virtual reality (“VR” device, a vehicle computing system, an attachable computing device, a camera, an appliance (e.g., a refrigerator, an oven, a microwave, etc.), a television, a handheld device, a combination thereof, or other user equipment that can implement network communications. It is understood that the examples discussed above are used for illustration purposes only, and therefore should not be construed to limit the scope of the disclosure in any way. While connections are not shown between the various components illustrated inFIG. 5 , it should be understood that some, none, or all of the components illustrated inFIG. 5 can be configured to interact with one other to carry out various device functions. In some embodiments, the components are arranged so as to communicate via one or more busses (not shown). Thus, it should be understood thatFIG. 5 and the following description are intended to provide a general understanding of a suitable environment in which various aspects of embodiments can be implemented, and should not be construed as being limiting in any way. - As illustrated in
FIG. 5 , theuser equipment 500 can include adisplay 502 for displaying data. According to various embodiments, thedisplay 502 can be configured to display various graphical user interface (“GUI”) elements, text, images, video, virtual keypads and/or keyboards, messaging data, notification messages, metadata, internet content, device status, time, date, calendar data, device preferences, map and location data, combinations thereof, and/or the like. Theuser equipment 500 also can include aprocessor 504 and a memory or other data storage device (“memory”) 506. Theprocessor 504 can be configured to process data and/or can execute computer-executable instructions stored in thememory 506. The computer-executable instructions executed by theprocessor 504 can include, for example, anoperating system 508, one ormore applications 510, other computer-executable instructions stored in amemory 506, or the like. In some embodiments, theapplications 510 also can include a user interface (“UI”) application (not illustrated inFIG. 5 ). - The UI application can interface with the
operating system 508 to facilitate user interaction with functionality and/or data stored at theuser equipment 500 and/or stored elsewhere. In some embodiments, theoperating system 508 can include a member of the SYMBIAN OS family of operating systems from SYMBIAN LIMITED, a member of the WINDOWS MOBILE OS and/or WINDOWS PHONE OS families of operating systems from MICROSOFT CORPORATION, a member of the PALM WEBOS family of operating systems from HEWLETT PACKARD CORPORATION, a member of the BLACKBERRY OS family of operating systems from RESEARCH IN MOTION LIMITED, a member of the IOS family of operating systems from APPLE INC., a member of the ANDROID OS family of operating systems from GOOGLE INC., and/or other operating systems. These operating systems are merely illustrative of some contemplated operating systems that may be used in accordance with various embodiments of the concepts and technologies described herein and therefore should not be construed as being limiting in any way. - The UI application can be executed by the
processor 504 to aid a user in interacting or otherwise entering/deleting data, entering and setting local credentials (e.g., user IDs and passwords) for device access, configuring settings, manipulating address book content and/or settings, multimode interaction, interacting withother applications 510, and otherwise facilitating user interaction with theoperating system 508, theapplications 510, and/or other types or instances ofdata 512 that can be stored at theuser equipment 500. Thedata 512 can include, for example, one or more identifiers, and/or other applications or program modules. In some embodiments, thedata 512 can include one or more of thenetwork access package 172, theunique identifier 144, theLSID 146, and theUE command 183 and/or other data sent among and/or between theguest UE 130, thetarget UE 184, thehost device 112, and thenetwork access point 152. According to various embodiments, theapplications 510 can include, for example, presence applications, visual voice mail applications, messaging applications, text-to-speech and speech-to-text applications, add-ons, plug-ins, email applications, music applications, video applications, camera applications, location-based service applications, power conservation applications, game applications, productivity applications, entertainment applications, enterprise applications, combinations thereof, and the like. In some embodiments, theapplications 510 can include thenetwork connection application 142 and thevoice interface application 122. Theapplications 510, thedata 512, and/or portions thereof can be stored in thememory 506 and/or in afirmware 514, and can be executed by theprocessor 504. Thefirmware 514 also can store code for execution during device power up and power down operations. It can be appreciated that thefirmware 514 can be stored in a volatile or non-volatile data storage device including, but not limited to, thememory 506 and/or a portion thereof. - The
user equipment 500 also can include an input/output (“I/O”)interface 516. The I/O interface 516 can be configured to support the input/output of data such as location information, user information, organization information, presence status information, user IDs, passwords, and application initiation (start-up) requests. In some embodiments, the I/O interface 516 can include a hardwire connection such as USB port, a mini-USB port, a micro-USB port, an audio jack, a PS2 port, an IEEE 1394 (“FIREWIRE”) port, a serial port, a parallel port, an Ethernet (RJ45) port, an RHO port, a proprietary port, combinations thereof, or the like. In some embodiments, theuser equipment 500 can be configured to synchronize with another device to transfer content to and/or from theuser equipment 500. In some embodiments, theuser equipment 500 can be configured to receive updates to one or more of theapplications 510 via the I/O interface 516, though this is not necessarily the case. In some embodiments, the I/O interface 516 accepts I/O devices such as keyboards, keypads, mice, interface tethers, printers, plotters, external storage, touch/multi-touch screens, touch pads, trackballs, joysticks, microphones, remote control devices, displays, projectors, medical equipment (e.g., stethoscopes, heart monitors, and other health metric monitors), modems, routers, external power sources, docking stations, combinations thereof, and the like. It should be appreciated that the I/O interface 516 may be used for communications between theuser equipment 500 and a network device or local device. - The
user equipment 500 also can include acommunications component 518. Thecommunications component 518 can be configured to interface with theprocessor 504 to facilitate wired and/or wireless communications with one or more networks such as one or more IP access networks and/or one or more circuit access networks. In some embodiments, other networks include networks that utilize non-cellular wireless technologies such as WI-FI or WIMAX. In some embodiments, thecommunications component 518 includes a multimode communications subsystem for facilitating communications via the cellular network and one or more other networks. - The
communications component 518, in some embodiments, includes one or more transceivers. The one or more transceivers, if included, can be configured to communicate over the same and/or different wireless technology standards with respect to one another. For example, in some embodiments one or more of the transceivers of thecommunications component 518 may be configured to communicate using Global System for Mobile communications (“GSM”), Code Division Multiple Access (“CDMA”) ONE, CDMA2000, Long-Term Evolution (“LTE”), and various other 2G, 2.5G, 3G, 4G, 5G, and greater generation technology standards. Moreover, thecommunications component 518 may facilitate communications over various channel access methods (which may or may not be used by the aforementioned standards) including, but not limited to, Time-Division Multiple Access (“TDMA”), Frequency-Division Multiple Access (“FDMA”), Wideband CDMA (“W-CDMA”), Orthogonal Frequency-Division Multiplexing (“OFDM”), Space-Division Multiple Access (“SDMA”), and the like. - In addition, the
communications component 518 may facilitate data communications using Generic Packet Radio Service (“GPRS”), Enhanced Data Rates for Global Evolution (“EDGE”), the High-Speed Packet Access (“HSPA”) protocol family including High-Speed Download Packet Access (“HSDPA”), Enhanced Uplink (“EUL”) or otherwise termed High-Speed Upload Packet Access (“HSUPA”), HSPA+, and various other current and future wireless data access standards. In the illustrated embodiment, thecommunications component 518 can include a first transceiver (“TxRx”) 520A that can operate in a first communications mode (e.g., GSM). Thecommunications component 518 also can include an Nth transceiver (“TxRx”) 520N that can operate in a second communications mode relative to thefirst transceiver 520A (e.g., UMTS). While twotransceivers 520A-520N (hereinafter collectively and/or generically referred to as “transceivers 520”) are shown inFIG. 5 , it should be appreciated that less than two, two, and/or more than two transceivers 520 can be included in thecommunications component 518. - The
communications component 518 also can include an alternative transceiver (“Alt TxRx”) 522 for supporting other types and/or standards of communications. According to various contemplated embodiments, thealternative transceiver 522 can communicate using various communications technologies such as, for example, WI-FI, WIMAX, BLUETOOTH, infrared, infrared data association (“IRDA”), near-field communications (“NFC”), ZIGBEE, other radio frequency (“RF”) technologies, combinations thereof, and the like. - In some embodiments, the
communications component 518 also can facilitate reception from terrestrial radio networks, digital satellite radio networks, internet-based radio service networks, combinations thereof, and the like. Thecommunications component 518 can process data from a network such as the Internet, an intranet, a broadband network, a WI-FI hotspot, an Internet service provider (“ISP”), a digital subscriber line (“DSL”) provider, a broadband provider, combinations thereof, or the like. - The
user equipment 500 also can include one ormore sensors 524. Thesensors 524 can include temperature sensors, light sensors, air quality sensors, movement sensors, orientation sensors, noise sensors, proximity sensors, or the like. As such, it should be understood that thesensors 524 can include, but are not limited to, accelerometers, magnetometers, gyroscopes, infrared sensors, noise sensors, microphones, combinations thereof, or the like. Additionally, audio capabilities for theuser equipment 500 may be provided by an audio I/O component 526. The audio I/O component 526 of theuser equipment 500 can include one or more speakers for the output of audio signals, one or more microphones for the collection and/or input of audio signals, and/or other audio input and/or output devices, which in some embodiments, can be used to capture one or more of theguest voice input 129 and/or thehost voice input 123. - The illustrated
user equipment 500 also can include a subscriber identity module (“SIM”)system 528. TheSIM system 528 can include a universal SIM (“USIM”), a universal integrated circuit card (“UICC”) and/or other identity devices. TheSIM system 528 can include and/or can be connected to or inserted into an interface such as aslot interface 530. In some embodiments, theslot interface 530 can be configured to accept insertion of other identity cards or modules for accessing various types of networks. Additionally, or alternatively, theslot interface 530 can be configured to accept multiple subscriber identity cards. Because other devices and/or modules for identifying users and/or theuser equipment 500 are contemplated, it should be understood that these embodiments are illustrative, and should not be construed as being limiting in any way. - The
user equipment 500 also can include an image capture and processing system 532 (“image system”). Theimage system 532 can be configured to capture or otherwise obtain photos, videos, and/or other visual information. As such, theimage system 532 can include cameras, lenses, charge-coupled devices (“CCDs”), combinations thereof, or the like. Theuser equipment 500 may also include avideo system 534. Thevideo system 534 can be configured to capture, process, record, modify, and/or store video content. Photos and videos obtained using theimage system 532 and thevideo system 534, respectively, may be added as message content to an MMS message, email message, and sent to another mobile device. The video and/or photo content also can be shared with other devices via various types of data transfers via wired and/or wireless communication devices as described herein. - The
user equipment 500 also can include one ormore location components 536. Thelocation components 536 can be configured to send and/or receive signals to determine a geographic location of theuser equipment 500. According to various embodiments, thelocation components 536 can send and/or receive signals from global positioning system (“GPS”) devices, assisted GPS (“A-GPS”) devices, WI-FI/WIMAX and/or cellular network triangulation data, combinations thereof, and the like. Thelocation component 536 also can be configured to communicate with thecommunications component 518 to retrieve triangulation data for determining a location of theuser equipment 500. In some embodiments, thelocation component 536 can interface with cellular network nodes, telephone lines, satellites, location transmitters and/or beacons, wireless network transmitters and receivers, combinations thereof, and the like. In some embodiments, thelocation component 536 can include and/or can communicate with one or more of thesensors 524 such as a compass, an accelerometer, and/or a gyroscope to determine the orientation of theuser equipment 500. Using thelocation component 536, theuser equipment 500 can generate and/or receive data to identify its geographic location (e.g., the LSID 146), or to transmit data used by other devices to determine the location of theuser equipment 500. Thelocation component 536 may include multiple components for determining the location and/or orientation of theuser equipment 500. - The illustrated
user equipment 500 also can include apower source 538. Thepower source 538 can include one or more batteries, power supplies, power cells, and/or other power subsystems including alternating current (“AC”) and/or direct current (“DC”) power devices. Thepower source 538 also can interface with an external power system or charging equipment via a power I/O component 540. Because theuser equipment 500 can include additional and/or alternative components, the above embodiment should be understood as being illustrative of one possible operating environment for various embodiments of the concepts and technologies described herein. The described embodiment of theuser equipment 500 is illustrative, and should not be construed as being limiting in any way. - Turning now to
FIG. 6 is a block diagram illustrating acomputer system 600 configured to provide the functionality in accordance with various embodiments of the concepts and technologies disclosed herein. The systems, devices, and other components disclosed herein can utilize, at least in part, an architecture that is the same as or at least similar to the architecture of thecomputer system 600. In some embodiments, one or more of thenetwork access point 152 and/or theremote data store 104 can be configured like thecomputer system 600. It should be understood, however, that modification to the architecture may be made to facilitate certain interactions among elements described herein. - The
computer system 600 includes aprocessing unit 602, amemory 604, one or more user interface devices 606, one or more input/output (“I/O”)devices 608, and one ormore network devices 610, each of which is operatively connected to a system bus 612. The system bus 612 enables bi-directional communication between theprocessing unit 602, thememory 604, the user interface devices 606, the I/O devices 608, and thenetwork devices 610. - The
processing unit 602 may be a standard central processor that performs arithmetic and logical operations, a more specific purpose programmable logic controller (“PLC”), a programmable gate array, or other type of processor known to those skilled in the art and suitable for controlling the operation of the server computer. Processing units are generally known, and therefore are not described in further detail herein. - The
memory 604 communicates with theprocessing unit 602 via the system bus 612. In some embodiments, thememory 604 is operatively connected to a memory controller (not shown) that enables communication with theprocessing unit 602 via the system bus 612. The illustratedmemory 604 includes anoperating system 614 and one ormore program modules 616. Theoperating system 614 can include, but is not limited to, members of the WINDOWS, WINDOWS CE, and/or WINDOWS MOBILE families of operating systems from MICROSOFT CORPORATION, the LINUX family of operating systems, the SYMBIAN family of operating systems from SYMBIAN LIMITED, the BREW family of operating systems from QUALCOMM CORPORATION, the MAC OS, OS X, and/or iOS families of operating systems from APPLE CORPORATION, the FREEBSD family of operating systems, the SOLARIS family of operating systems from ORACLE CORPORATION, other operating systems, and the like. - The
program modules 616 may include various software and/or program modules to perform the various operations described herein. In some embodiments, for example, theprogram modules 616 can include thenetwork access application 160 and/or other program modules. These and/or other programs can be embodied in computer-readable medium including instructions that, when executed by theprocessing unit 602, in some embodiments, may perform and/or facilitate performance of one or more of the operations discussed with respect toFIGS. 1, 2A-2C , themethods 300, and themethod 400, described in detail above with respect toFIGS. 3A, 3B, 4A, and 4B . According to some embodiments, theprogram modules 616 may be embodied in hardware, software, firmware, or any combination thereof In some embodiments, thememory 604 also can be configured to store the corroboratingconditions 106, thewhitelist 164, thesub-client network profile 182, the recognizeddevice list 162, themaximum time limit 167, theproximity time threshold 168, thenetwork access package 172, the service setidentifier 174, theclient network token 181, theaccess credentials 176, thenotification 202, thenotification 203, thelocation verification notification 210, and/or other data, if desired. - By way of example, and not limitation, computer-readable media may include any available computer storage media or communication media that can be accessed by the
computer system 600. Communication media includes computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics changed or set in a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media. - Computer storage media includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data. Computer storage media includes, but is not limited to, RAM, ROM, Erasable Programmable ROM (“EPROM”), Electrically Erasable Programmable ROM (“EEPROM”), flash memory or other solid-state memory technology, CD-ROM, digital versatile disks (“DVD”), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the
computer system 600. In the claims, the phrase “computer storage medium” and variations thereof does not include waves or signals per se and/or communication media. - The user interface devices 606 may include one or more devices with which a user accesses the
computer system 600. The user interface devices 606 may include, but are not limited to, computers, servers, PDAs, cellular phones, or any suitable computing devices. The I/O devices 608 enable a user to interface with theprogram modules 616. In one embodiment, the I/O devices 608 are operatively connected to an I/O controller (not shown) that enables communication with theprocessing unit 602 via the system bus 612. The I/O devices 608 may include one or more input devices, such as, but not limited to, a keyboard, a mouse, or an electronic stylus. Further, the I/O devices 608 may include one or more output devices, such as, but not limited to, a display screen or a printer. In some embodiments, the I/O devices 608 can be used for manual controls for operations to exercise under certain emergency situations. - The
network devices 610 enable thecomputer system 600 to communicate with other networks or remote systems via anetwork 618, such as theprovider network 102, theclient network 150, and/or thesub-client network 180. Examples of thenetwork devices 610 include, but are not limited to, a modem, a radio frequency (“RF”) or infrared (“IR”) transceiver, a telephonic interface, a bridge, a router, or a network card. Thenetwork 618 may be or may include a wireless network such as, but not limited to, a Wireless Local Area Network (“WLAN”), a Wireless Wide Area Network (“WWAN”), a Wireless Personal Area Network (“WPAN”) such as provided via BLUETOOTH technology, a Wireless Metropolitan Area Network (“WMAN”) such as a WiMAX network or metropolitan cellular network. Alternatively, thenetwork 618 may be or may include a wired network such as, but not limited to, a Wide Area Network (“WAN”), a wired Personal Area Network (“PAN”), a wired Metropolitan Area Network (“MAN”), a VoIP network, an IP/MPLS network, a PSTN network, an IMS network, an EPC network, or any other mobile network and/or wireline network. - Turning now to
FIG. 7 , details of anetwork 700 are illustrated, according to an illustrative embodiment. In some embodiments, one or more of theprovider network 102, theclient network 150, and/or thesub-client network 180 can be configured, at least in part, as thenetwork 700. Thenetwork 700 includes acellular network 702, apacket data network 704, for example, the Internet, and a circuit switchednetwork 706, for example, a PSTN. Thecellular network 702 includes various network components such as, but not limited to, base transceiver stations (“BTSs”), NBs, eNBs, gNBs, base station controllers (“BSCs”), radio network controllers (“RNCs”), mobile switching centers (“MSCs”), MMEs, short message service centers (“SMSCs”), multimedia messaging service centers (“MMSCs”), home location registers (“HLRs”), Home Subscriber Server (“HSSs”), Visitor Location Registers (“VLRs”), charging platforms, billing platforms, voicemail platforms, GPRS core network components, location service nodes, an IP Multimedia Subsystem (“IMS”), and the like. Thecellular network 702 also includes radios and nodes for receiving and transmitting voice, data, and combinations thereof to and from radio transceivers, networks, thepacket data network 704, and the circuit switchednetwork 706. In some embodiments, theprovider network 102 ofFIG. 1 can operate as thepacket data network 704, and theclient network 150 andsub-client network 180 can operate in cooperation with thecellular network 702. - The
mobile communications device 708, such as, for example, a cellular telephone, a mobile terminal, a PDA, a laptop computer, a handheld computer, and combinations thereof, can be operatively connected to thecellular network 702. In some embodiments, one or more of theguest UE 130, thehost device 112, and/or thetarget UE 184 can be configured as themobile communications device 708. Thecellular network 702 can be configured as a 2G GSM network and can provide data communications via GPRS and/or EDGE. Additionally, or alternatively, thecellular network 702 can be configured as a 3G UMTS network and can provide data communications via the HSPA protocol family, for example, HSDPA, EUL (also referred to as HSUPA), and HSPA+. Thecellular network 702 also is compatible with 4G and 5G mobile communications standards such as LTE, or the like, as well as evolved and future mobile standards, including but not limited to LTE-Advanced, LTE-Advanced Pro and 5G. - The
packet data network 704 includes various devices, for example, servers, computers, databases, and other devices in communication with one another, as is generally known. Thepacket data network 704 devices are accessible via one or more network links. The servers often store various files that are provided to a requesting device such as, for example, a computer, a terminal, a smartphone, or the like. Typically, the requesting device includes software (a “browser”) for executing a web page in a format readable by the browser or other software. Other files and/or data may be accessible via “links” in the retrieved files, as is generally known. In some embodiments, thepacket data network 704 includes or is in communication with the Internet. In some embodiments, the at least some of theprovider network 102 can be configured as a packet data network, such as thepacket data network 704. The circuit switchednetwork 706 includes various hardware and software for providing circuit switched communications. The circuit switchednetwork 706 may include, or may be, what is often referred to as a POTS. In some embodiments, the at least some of theprovider network 102 also can be configured as a circuit switched network, such as the circuit switchednetwork 706. The functionality of a circuit switchednetwork 706 or other circuit-switched network are generally known and will not be described herein in detail. - The illustrated
cellular network 702 is shown in communication with thepacket data network 704 and a circuit switchednetwork 706, though it should be appreciated that this is not necessarily the case. One or more Internet-capable devices 710, for example, a PC, a laptop, a portable device, or another suitable device, can communicate with one or morecellular networks 702, and devices connected thereto, through thepacket data network 704. It also should be appreciated that the Internet-capable device 710 can communicate with thepacket data network 704 through the circuit switchednetwork 706, thecellular network 702, and/or via other networks (not illustrated). - As illustrated, a
communications device 712, for example, a telephone, facsimile machine, modem, computer, or the like, can be in communication with the circuit switchednetwork 706, and therethrough to thepacket data network 704 and/or thecellular network 702. It should be appreciated that thecommunications device 712 can be an Internet-capable device, and can be substantially similar to the Internet-capable device 710. In the specification, the network ofFIG. 7 is used to refer broadly to any combination of thenetworks FIG. 7 . It should be appreciated that, in some embodiments, substantially all of the functionality described with reference to theprovider network 102, theclient network 150, and/or thesub-client network 180 can be performed by thecellular network 702, thepacket data network 704, and/or the circuit switchednetwork 706, alone or in combination with other networks, network elements, and the like, according at least to aspects of the features and operations discussed herein. - Based on the foregoing, it should be appreciated that concepts and technologies directed to network service control for access to wireless radio networks have been disclosed herein. Although the subject matter presented herein has been described in language specific to computer structural features, methodological and transformative acts, specific computing machinery, and computer-readable media, it is to be understood that the concepts and technologies disclosed herein are not necessarily limited to the specific features, acts, or media described herein. Rather, the specific features, acts and mediums are disclosed as example forms of implementing the concepts and technologies disclosed herein.
- The subject matter described above is provided by way of illustration only and should not be construed as limiting. Various modifications and changes may be made to the subject matter described herein without following the example embodiments and applications illustrated and described, and without departing from the true spirit and scope of the embodiments of the concepts and technologies disclosed herein.
Claims (20)
1. A network access point comprising:
a processor; and
a memory that stores computer-executable instructions that, in response to execution by the processor, cause the processor to perform operations comprising:
detecting a unique identifier of a guest user equipment being broadcast from the guest user equipment,
determining, based on the unique identifier of the guest user equipment, that the guest user equipment is not a recognized device,
in response to determining that the guest user equipment is not a recognized device, creating an identity verification request message that seeks approval from a host device to allow the guest user equipment access to a client network provided by the network access point, wherein the network access point is controlled, at least in part, by the host device,
providing the identity verification request message to the host device,
receiving a trigger response message from the host device created by the host device in response to a host user associated with the host device granting the guest user equipment access to the client network via the network access point, wherein the trigger response message created by the host device includes a network access request generated by the host device on behalf of the guest user equipment such that the guest user equipment does not initiate a network access request to gain access to the client network via the network access point,
determining that the guest user equipment satisfies a corroborating condition,
creating, based at least in part on receiving the trigger response message and on determining that the guest user equipment satisfies the corroborating condition, a network access package that provides the guest user equipment with access credentials to access the client network, and
providing the network access package to the guest user equipment.
2. The network access point of claim 1 , wherein the corroborating condition comprises authentication of a voice signature of a guest user associated with the guest user equipment detected by the host device.
3. The network access point of claim 2 , wherein authentication of the voice signature of the guest user associated with the guest user equipment comprises:
comparing the voice signature of the guest user detected by the host device with a voice signature file comprising a digital voice signature of the guest user; and
determining whether at least a portion of the voice signature of the guest user detected by the host device matches at least a portion of the digital voice signature of the guest user of the voice signature file.
4. The network access point of claim 1 , wherein the operations further comprise determining that the guest user equipment exceeds a proximity time threshold for being in range of engaging in communication with the client network.
5. The network access point of claim 4 , wherein creating the identity verification request message is further in response to determining that the guest user equipment exceeds the proximity time threshold.
6. The network access point of claim 1 , wherein creating the network access package comprises:
creating a service set identifier for the client network;
creating a whitelist corresponding to the service set identifier for the client network;
instantiating the unique identifier of the guest user equipment within the whitelist; and
generating the access credentials for the guest user equipment.
7. The network access point of claim 1 , wherein the network access package comprises at least one of the access credentials for the guest user equipment, a notification that the guest user equipment is authorized to use the client network, or a connection acceptance trigger that instructs the guest user equipment to send a reply message using the access credentials.
8. A method comprising:
detecting, by a network access point that is communicatively coupled to a host device, a unique identifier of a guest user equipment being broadcast from the guest user equipment,
determining, by the network access point, based on the unique identifier of the guest user equipment, that the guest user equipment is not a recognized device,
in response to determining that the guest user equipment is not a recognized device, creating, by the network access point, an identity verification request message that seeks approval from the host device to allow the guest user equipment access to a client network provided by the network access point, wherein the network access point is controlled, at least in part, by the host device,
providing, by the network access point, the identity verification request message to the host device,
receiving, by the network access point, a trigger response message from the host device created by the host device in response to a host user associated with the host device granting the guest user equipment access to the client network via the network access point, wherein the trigger response message created by the host device includes a network access request generated by the host device on behalf of the guest user equipment such that the guest user equipment does not initiate a network access request to gain access to the client network via the network access point,
determining, by the network access point, that the guest user equipment satisfies a corroborating condition,
creating, by the network access point, based at least in part on receiving the trigger response message and on determining that the guest user equipment satisfies the corroborating condition, a network access package that provides the guest user equipment with access credentials to access the client network, and
providing, by the network access point, the network access package to the guest user equipment.
9. The method of claim 8 , wherein the corroborating condition comprises authentication of a voice signature of a guest user associated with the guest user equipment detected by the host device.
10. The method of claim 9 , wherein authentication of the voice signature of the guest user associated with the guest user equipment comprises:
comparing the voice signature of the guest user detected by the host device with a voice signature file comprising a digital voice signature of the guest user; and
determining whether at least a portion of the voice signature of the guest user detected by the host device matches at least a portion of the digital voice signature of the guest user of the voice signature file.
11. The method of claim 8 , further comprising determining that the guest user equipment exceeds a proximity time threshold for being in range of engaging in communication with the client network.
12. The method of claim 11 , wherein creating the identity verification request message is further in response to determining that the guest user equipment exceeds the proximity time threshold.
13. The method of claim 8 , wherein creating the network access package comprises:
creating a service set identifier for the client network;
creating a whitelist corresponding to the service set identifier for the client network;
instantiating the unique identifier of the guest user equipment within the whitelist; and
generating the access credentials for the guest user equipment.
14. The method of claim 8 , wherein the network access package comprises at least one of the access credentials for the guest user equipment, a notification that the guest user equipment is authorized to use the client network, or a connection acceptance trigger that instructs the guest user equipment to send a reply message using the access credentials.
15. A computer storage medium having computer-executable instructions stored thereon that, in response to execution by a processor of a network access point, cause the processor to perform operations comprising:
detecting a unique identifier of a guest user equipment being broadcast from the guest user equipment;
determining, based on the unique identifier of the guest user equipment, that the guest user equipment is not a recognized device;
in response to determining that the guest user equipment is not a recognized device, creating an identity verification request message that seeks approval from a host device to allow the guest user equipment access to a client network provided by the network access point, wherein the network access point is controlled, at least in part, by the host device;
providing the identity verification request message to the host device;
receiving a trigger response message from the host device created by the host device in response to a host user associated with the host device granting the guest user equipment access to the client network via the network access point, wherein the trigger response message created by the host device includes a network access request generated by the host device on behalf of the guest user equipment such that the guest user equipment does not initiate a network access request to gain access to the client network via the network access point;
determining that the guest user equipment satisfies a corroborating condition;
creating, based at least in part on receiving the trigger response message and on determining that the guest user equipment satisfies the corroborating condition, a network access package that provides the guest user equipment with access credentials to access the client network; and
providing the network access package to the guest user equipment.
16. The computer storage medium of claim 15 , wherein the corroborating condition comprises authentication of a voice signature of a guest user associated with the guest user equipment detected by the host device.
17. The computer storage medium of claim 16 , wherein authentication of the voice signature of the guest user associated with the guest user equipment comprises:
comparing the voice signature of the guest user detected by the host device with a voice signature file comprising a digital voice signature of the guest user; and
determining whether at least a portion of the voice signature of the guest user detected by the host device matches at least a portion of the digital voice signature of the guest user of the voice signature file.
18. The computer storage medium of claim 15 , wherein the operations further comprise determining that the guest user equipment exceeds a proximity time threshold for being in range of engaging in communication with the client network.
19. The computer storage medium of claim 18 , wherein creating the identity verification request message is further in response to determining that the guest user equipment exceeds the proximity time threshold.
20. The computer storage medium of claim 15 , wherein the network access package comprises at least one of the access credentials for the guest user equipment, a notification that the guest user equipment is authorized to use the client network, or a connection acceptance trigger that instructs the guest user equipment to send a reply message using the access credentials, and wherein creating the network access package comprises:
creating a service set identifier for the client network;
creating a whitelist corresponding to the service set identifier for the client network;
instantiating the unique identifier of the guest user equipment within the whitelist; and
generating the access credentials for the guest user equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/111,696 US20230198984A1 (en) | 2018-04-13 | 2023-02-20 | Network Service Control for Access to Wireless Radio Networks |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/952,454 US10965672B2 (en) | 2018-04-13 | 2018-04-13 | Network service control for access to wireless radio networks |
US17/181,055 US11601429B2 (en) | 2018-04-13 | 2021-02-22 | Network service control for access to wireless radio networks |
US18/111,696 US20230198984A1 (en) | 2018-04-13 | 2023-02-20 | Network Service Control for Access to Wireless Radio Networks |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/181,055 Continuation US11601429B2 (en) | 2018-04-13 | 2021-02-22 | Network service control for access to wireless radio networks |
Publications (1)
Publication Number | Publication Date |
---|---|
US20230198984A1 true US20230198984A1 (en) | 2023-06-22 |
Family
ID=68160594
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/952,454 Active 2038-09-27 US10965672B2 (en) | 2018-04-13 | 2018-04-13 | Network service control for access to wireless radio networks |
US17/181,055 Active 2038-07-24 US11601429B2 (en) | 2018-04-13 | 2021-02-22 | Network service control for access to wireless radio networks |
US18/111,696 Abandoned US20230198984A1 (en) | 2018-04-13 | 2023-02-20 | Network Service Control for Access to Wireless Radio Networks |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/952,454 Active 2038-09-27 US10965672B2 (en) | 2018-04-13 | 2018-04-13 | Network service control for access to wireless radio networks |
US17/181,055 Active 2038-07-24 US11601429B2 (en) | 2018-04-13 | 2021-02-22 | Network service control for access to wireless radio networks |
Country Status (1)
Country | Link |
---|---|
US (3) | US10965672B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230396451A1 (en) * | 2022-06-03 | 2023-12-07 | Apple Inc. | Granting permissions and accesses to devices and third parties |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10965672B2 (en) * | 2018-04-13 | 2021-03-30 | At&T Intellectual Property I, L.P. | Network service control for access to wireless radio networks |
CN109151818B (en) * | 2018-08-07 | 2021-08-17 | 西安易朴通讯技术有限公司 | Terminal verification method, AP (access point) equipment, terminal and system |
EP3864539A4 (en) * | 2018-10-08 | 2022-06-22 | Alkira Software Holdings Pty Ltd | Secure service interaction |
US11165779B2 (en) * | 2018-11-29 | 2021-11-02 | International Business Machines Corporation | Generating a custom blacklist for a listening device based on usage |
US10980069B2 (en) * | 2018-12-20 | 2021-04-13 | Hughes Network Systems, Llc | Wireless connection mode activation |
US11197219B2 (en) * | 2019-02-26 | 2021-12-07 | Ford Global Technologies, Llc | Method and apparatus for providing varied data limits to varied wireless devices using the same vehicle hotspot |
WO2020254903A1 (en) * | 2019-06-15 | 2020-12-24 | Nokia Technologies Oy | Authorization for network function sets in communication system |
WO2021221623A1 (en) * | 2020-04-29 | 2021-11-04 | Hewlett-Packard Development Company, L.P. | Change of operating mode |
CN114040402A (en) * | 2020-07-21 | 2022-02-11 | 艾锐势企业有限责任公司 | Electronic device, method of performing the same, and computer-readable medium |
US11695772B1 (en) * | 2022-05-03 | 2023-07-04 | Capital One Services, Llc | System and method for enabling multiple auxiliary use of an access token of a user by another entity to facilitate an action of the user |
WO2024097562A1 (en) * | 2022-11-02 | 2024-05-10 | Verifi Labs, Inc. | Systems and methods for an incentivized networking ecosystem |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9299386B2 (en) * | 2010-03-25 | 2016-03-29 | Verisign, Inc. | Systems and methods for providing access to resources through enhanced audio signals |
US20160318521A1 (en) * | 2014-01-22 | 2016-11-03 | KHN Solutions, Inc. | Method and system for drunk driving prevention |
US10523437B2 (en) * | 2016-01-27 | 2019-12-31 | Lg Electronics Inc. | System and method for authentication of things |
US20200059797A1 (en) * | 2016-06-15 | 2020-02-20 | Brk Brands, Inc. | System and method for network access point installation and access control |
US10965672B2 (en) * | 2018-04-13 | 2021-03-30 | At&T Intellectual Property I, L.P. | Network service control for access to wireless radio networks |
Family Cites Families (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4164456B2 (en) | 2004-03-05 | 2008-10-15 | キヤノン株式会社 | Wireless communication system, wireless access point device, wireless access point device communication method, and program for controlling wireless access point device |
US7554979B2 (en) | 2005-02-03 | 2009-06-30 | Canon Kabushiki Kaisha | Communication apparatus and method having function of transmitting notification signal while hiding group identification information |
WO2007128134A1 (en) | 2006-05-09 | 2007-11-15 | Travelnet Technologies Inc. | Secure wireless guest access |
US8176536B2 (en) | 2007-04-30 | 2012-05-08 | Hewlett-Packard Development Company, L.P. | Network systems and methods for providing guest access |
US20140355592A1 (en) * | 2012-11-01 | 2014-12-04 | Datavalet Technologies | System and method for wireless device detection, recognition and visit profiling |
US9003488B2 (en) * | 2007-06-06 | 2015-04-07 | Datavalet Technologies | System and method for remote device recognition at public hotspots |
US8769639B2 (en) | 2007-09-04 | 2014-07-01 | Microsoft Corporation | History-based downgraded network identification |
US8848656B2 (en) * | 2007-11-16 | 2014-09-30 | Qualcomm Incorporated | Utilizing broadcast signals to convey restricted association information |
US8763082B2 (en) | 2008-05-13 | 2014-06-24 | At&T Mobility Ii Llc | Interactive client management of an access control list |
US10956867B2 (en) | 2010-03-31 | 2021-03-23 | Airstrip Ip Holdings, Llc | Multi-factor authentication for remote access of patient data |
US8509806B2 (en) | 2010-12-14 | 2013-08-13 | At&T Intellectual Property I, L.P. | Classifying the position of a wireless device |
US9026144B2 (en) * | 2011-01-26 | 2015-05-05 | Mobio Oy | Location tagging |
EP2676399A4 (en) | 2011-02-14 | 2016-02-17 | Devicescape Software Inc | Systems and methods for network curation |
US8943554B2 (en) * | 2011-03-18 | 2015-01-27 | Smith Micro Software, Inc. | Managing tethered data traffic over a hotspot network |
US9402271B2 (en) * | 2011-06-27 | 2016-07-26 | Brocade Communications Systems, Inc. | Converged wireless local area network |
US8813194B2 (en) | 2011-10-27 | 2014-08-19 | At&T Intellectual Property I, L.P. | Enabling access to a secured wireless local network without user input of a network password |
US8732801B2 (en) | 2011-12-09 | 2014-05-20 | Verizon Patent And Licensing Inc. | Wireless connection method and device |
US8756668B2 (en) * | 2012-02-09 | 2014-06-17 | Ruckus Wireless, Inc. | Dynamic PSK for hotspots |
US9497623B2 (en) | 2012-05-25 | 2016-11-15 | Nokia Technologies Oy | Method and apparatus for guest access sharing |
US20140095406A1 (en) | 2012-07-25 | 2014-04-03 | Devicescape Software, Inc. | Systems and Methods for Enhanced Engagement |
US9258712B2 (en) | 2012-09-04 | 2016-02-09 | Nokia Technologies Oy | Method, apparatus, and computer program product for sharing wireless network configurations |
WO2014189262A1 (en) | 2013-05-24 | 2014-11-27 | Strix Inc. | User terminal authentication method of access point apparatus |
US9411978B2 (en) * | 2013-07-11 | 2016-08-09 | Open Text S.A. | System and method for access control using network verification |
CN103596173B (en) | 2013-09-30 | 2018-04-06 | 北京智谷睿拓技术服务有限公司 | Wireless network authentication method, client and service end wireless network authentication device |
CN103532715B (en) | 2013-10-09 | 2016-11-23 | 北京奇虎科技有限公司 | Based on without password or the mthods, systems and devices of the arbitrarily network authorization of password |
GB201319591D0 (en) | 2013-11-06 | 2013-12-18 | Microsoft Corp | Network Access |
US9763094B2 (en) | 2014-01-31 | 2017-09-12 | Qualcomm Incorporated | Methods, devices and systems for dynamic network access administration |
EP2919431B1 (en) * | 2014-03-12 | 2017-11-08 | Accenture Global Services Limited | Secure distribution of electronic content taking into account receiver's location |
US10360362B2 (en) | 2014-04-30 | 2019-07-23 | Qualcomm Incorporated | Apparatuses and methods for fast onboarding an internet-enabled device |
US9900774B2 (en) | 2014-05-30 | 2018-02-20 | Paypal, Inc. | Shared network connection credentials on check-in at a user's home location |
US9369874B2 (en) | 2014-07-26 | 2016-06-14 | Bernard Mallala Otiato | Controlling network access using a wrapper application executing on a mobile device |
CN106211152B (en) | 2015-04-30 | 2019-09-06 | 新华三技术有限公司 | A kind of wireless access authentication method and device |
US10652201B1 (en) * | 2015-05-04 | 2020-05-12 | EMC IP Holding Company LLC | Cloud service registry |
US9843517B2 (en) * | 2015-05-14 | 2017-12-12 | Qualcomm Incorporated | Dynamically adjusting network services stratum parameters based on access and/or connectivity stratum utilization and/or congestion information |
CN105592459B (en) | 2015-07-09 | 2019-06-18 | 中国银联股份有限公司 | Safety certification device based on wireless communication |
US20180183806A1 (en) * | 2015-09-10 | 2018-06-28 | Hewlett Packard Enterprise Development Lp | Guest access provisioning |
US10251128B2 (en) * | 2016-09-09 | 2019-04-02 | Antoine Nguyen | Proximity and low power usage based ad hoc wireless inter-device communication system and method |
US10382436B2 (en) * | 2016-11-22 | 2019-08-13 | Daniel Chien | Network security based on device identifiers and network addresses |
US10771463B2 (en) * | 2017-10-30 | 2020-09-08 | International Business Machines Corporation | Third-party authorization of access tokens |
US10609634B2 (en) * | 2017-12-24 | 2020-03-31 | Cisco Technology, Inc. | Access network selection |
-
2018
- 2018-04-13 US US15/952,454 patent/US10965672B2/en active Active
-
2021
- 2021-02-22 US US17/181,055 patent/US11601429B2/en active Active
-
2023
- 2023-02-20 US US18/111,696 patent/US20230198984A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9299386B2 (en) * | 2010-03-25 | 2016-03-29 | Verisign, Inc. | Systems and methods for providing access to resources through enhanced audio signals |
US20160318521A1 (en) * | 2014-01-22 | 2016-11-03 | KHN Solutions, Inc. | Method and system for drunk driving prevention |
US10523437B2 (en) * | 2016-01-27 | 2019-12-31 | Lg Electronics Inc. | System and method for authentication of things |
US20200059797A1 (en) * | 2016-06-15 | 2020-02-20 | Brk Brands, Inc. | System and method for network access point installation and access control |
US10965672B2 (en) * | 2018-04-13 | 2021-03-30 | At&T Intellectual Property I, L.P. | Network service control for access to wireless radio networks |
US11601429B2 (en) * | 2018-04-13 | 2023-03-07 | At&T Intellectual Property I, L.P. | Network service control for access to wireless radio networks |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230396451A1 (en) * | 2022-06-03 | 2023-12-07 | Apple Inc. | Granting permissions and accesses to devices and third parties |
Also Published As
Publication number | Publication date |
---|---|
US20190319951A1 (en) | 2019-10-17 |
US10965672B2 (en) | 2021-03-30 |
US20210176250A1 (en) | 2021-06-10 |
US11601429B2 (en) | 2023-03-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11601429B2 (en) | Network service control for access to wireless radio networks | |
US9972145B2 (en) | Authenticating a user on behalf of another user based upon a unique body signature determined through bone conduction signals | |
US8831570B2 (en) | Systems and methods for providing location-based application authentication using location token service | |
US20190297054A1 (en) | Single Packet Authorization in a Cloud Computing Environment | |
US11757939B2 (en) | Network-assisted secure data access | |
US10152586B2 (en) | Managing opt-in and opt-out for private data access | |
US11075895B2 (en) | Cloud operation interface sharing method, related device, and system | |
CN112840339A (en) | Progressive access to data and device functionality | |
US11451539B2 (en) | Identity identification and preprocessing | |
US11647389B2 (en) | Network authentication via encrypted network access packages | |
US10110577B2 (en) | Non-native device authentication | |
US12003497B2 (en) | Website verification service | |
US10187420B2 (en) | Local applications and local application distribution | |
US11218491B2 (en) | Security de-escalation for data access | |
KR102071281B1 (en) | Method for intergraged authentication thereof | |
US10582051B2 (en) | Communications network for screening and selectively blocking private calls | |
US20240073689A1 (en) | Seamless Personal Hotspot Connectivity Via Personal Hotspot Tokens | |
US20240340289A1 (en) | Network Access Management | |
US12165197B2 (en) | Providing and using a digital asset delivery service | |
US20220271946A1 (en) | Over-the-Air CBRS Certificate Installation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AT&T INTELLECTUAL PROPERTY I, L.P., GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WEST, EARLE H., III;FU, MARK;REEL/FRAME:062743/0602 Effective date: 20180410 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |