Browse Prior Art Database

Authenticating a Customer Using a Network Provided by Another Service Provider

IP.com Disclosure Number: IPCOM000207133D
Publication Date: 2011-May-17

Publishing Venue

The IP.com Prior Art Database

Abstract

A system, method, and computer program are provided for authenticating a customer using a network provided by another service provider. In use, a message associated with a customer of a second network service provider is received from a first network service provider. Further, the message indicates usage by the customer of a network provided by the first network service provider. Additionally, in response to the receipt of the message, a request is sent from the second network service provider to the customer for authentication information. In addition, it is determined whether a valid response to the request is received by the second network service provider. Furthermore, based on the determination, the usage by the customer of the network provided by the first network service provider is conditionally blocked.

This text was extracted from a Microsoft Word document.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 10% of the total text.

SYSTEM, METHOD, AND COMPUTER PROGRAM FOR AUTHENTICATING A CUSTOMER USING A NETWORK PROVIDED BY ANOTHER SERVICE PROVIDER

Field of the Invention

[0001]           The present invention relates to customer authentication, and more particularly to authenticating customers roaming on another network.

Background

[0002]           To date, a customer device can be used for roaming on networks external to the customer’s home network.  Typically, when the customer device is used for roaming on an external network, the external network performs a validation of an identifier associated with the customer device being used to access the external network.  Unfortunately, the identifier associated with the customer device may be fraudulently copied or stolen, and subsequently used in another device, thereby deceiving the external network into allowing the other device with the fraudulent number access to the external network.

[0003]           There is thus a need for addressing these and/or other issues associated with the prior art.

SUMMARY

[0004]           A system, method, and computer program are provided for authenticating a customer using a network provided by another service provider.  In use, a message associated with a customer of a second network service provider is received from a first network service provider.  Further, the message indicates usage by the customer of a network provided by the first network service provider.  Additionally, in response to the receipt of the message, a request is sent from the second network service provider to the customer for authentication information.  In addition, it is determined whether a valid response to the request is received by the second network service provider.  Furthermore, based on the determination, the usage by the customer of the network provided by the first network service provider is conditionally blocked.

 


Brief Description of the Drawings

[0005]           Figure 1 illustrates a network architecture in which systems and methods consistent with aspects of the present invention may be implemented. 

[0006]           Figure 2 is a block diagram of components of a device in which systems and methods consistent with aspects of the present invention may be implemented.

[0007]           Figure 3 illustrates a method for authenticating a customer using a network provided by another service provider, in accordance with one implementation consistent with aspects of the present invention.

[0008]           Figure 4 illustrates a system for authenticating a customer using a network provided by another service provider, in accordance with another implementation consistent with aspects of the present invention.

 


Detailed Description

[0009]           Figure 1 illustrates a network architecture 100, in which systems and methods consistent with aspects related to the present invention may be implemented.  As shown, network architecture 100 includes at least one network 102.  The network 102 may take any form including, but not limited to...