WO2007127162A2 - Provisioned configuration for automatic wireless connection - Google Patents

Provisioned configuration for automatic wireless connection Download PDF

Info

Publication number
WO2007127162A2
WO2007127162A2 PCT/US2007/009836 US2007009836W WO2007127162A2 WO 2007127162 A2 WO2007127162 A2 WO 2007127162A2 US 2007009836 W US2007009836 W US 2007009836W WO 2007127162 A2 WO2007127162 A2 WO 2007127162A2
Authority
WO
WIPO (PCT)
Prior art keywords
wireless device
configuration
wireless
provisioned
user
Prior art date
Application number
PCT/US2007/009836
Other languages
French (fr)
Other versions
WO2007127162A8 (en
WO2007127162A3 (en
Inventor
Bo-Chieh Yang
Ming Sheu
Ted Tsei Kuo
Tian-Yuan Lin
Tyan-Shu Jou
Original Assignee
Ruckus Wireless, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruckus Wireless, Inc. filed Critical Ruckus Wireless, Inc.
Priority to CN2007800190748A priority Critical patent/CN101455063B/en
Priority to EP07755913.6A priority patent/EP2014067B1/en
Publication of WO2007127162A2 publication Critical patent/WO2007127162A2/en
Publication of WO2007127162A8 publication Critical patent/WO2007127162A8/en
Publication of WO2007127162A3 publication Critical patent/WO2007127162A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Definitions

  • the present invention generally relates to information network security. More specifically, the present invention relates to user-friendly systems for configuring wireless devices for access to restricted wireless networks.
  • each organization may have specialized needs with respect to security for its wireless networks. For example, different departments within an organization may require different protocols. Some individuals, however, may require access to multiple networks, which requires that their wireless device be configured with multiple protocols. Further, some individuals may require access to particular networks but may not be authorized to access those networks. As such, many commercial organizations (e.g., small- and medium-sized businesses) have difficulties implementing security systems for wireless networks because of their lack of expertise and/or full-time professional technical support. [0005] For example, a network administrator may have the requisite technical knowledge to implement such security systems but may have to configure every wireless client station individually. This is in addition to instructing each user on how to configure their wireless device to conform to certain wireless connection parameters. Further, various technical complications may arise for users and network administrator personnel including different wireless devices and interfaces, different requirements for access, and different restrictions on access.
  • Exemplary systems and methods of the present invention provide for provisioned configuration of wireless devices to allow access to restricted wireless networks.
  • a user of a wireless device may be authenticated.
  • An executable application which includes the parameters and policies of a provisioned configuration, is generated, transferred to, and executed on the wireless device.
  • the wireless device is allowed to access the restricted wireless network within the parameters and policies of the provisioned configuration as provided through the executable application.
  • the executable applications providing such provisioned configurations may be generated based on authentication information concerning the user and/or the wireless device. Some embodiments include determining from a provisioned configuration database which parameters and policies are associated with the user and/or wireless device. In some embodiments of the present invention, the application may provide a plurality of provisioned configurations for the wireless device. Each of the plurality of provisioned configurations may include parameters and policies for a plurality of wireless networks. The executable application may be capable of configuring a wireless device for access to a variety of different wireless networks.
  • Embodiments of the present invention may include systems for provisioned configuration of wireless devices. Such systems may include an authentication module, a processor, and a provisioning module. Some embodiments further include a provisioned configuration database and/or an application generation module.
  • Some embodiments of the present invention include computer readable storage media and instructions for provisioned configuration of wireless devices. Some embodiments further include instructions for generating configuration applications based on authentication information concerning the user and/or the wireless device. BRIEF DESCRIPTION OF FIGURES
  • FIGURE 1 is an illustration of a system for provisioned configuration of wireless devices to access a restricted wireless network in accordance with an exemplary embodiment of the present invention.
  • FIGURE 2 is a flowchart illustrating a method for generating a configuration application in accordance with an exemplary embodiment of the present invention.
  • FIGURE 3 is a flowchart illustrating a method for wireless devices to access a restricted wireless network in accordance with an exemplary embodiment of the present invention.
  • FIGURE 4 is a flowchart illustrating a method for provisioned configuration of a wireless device to access a restricted wireless network in accordance with an exemplary embodiment of the present invention.
  • Embodiments of the present invention include systems and methods for user- friendly, low-maintenance configuration of wireless devices for accessing restricted wireless networks.
  • a user of a wireless device is allowed to connect to an open wireless or wired network.
  • an application may be generated that would allow the wireless device to connect to a secured or restricted wireless network.
  • the application after being transferred to and executed on the wireless device, configures the wireless device so that it may access the restricted wireless network.
  • the configuration which may also referred to as a provisioned configuration, may be based on user information,, wireless device information, or both.
  • the application may be able to configure the wireless device so that it may access a plurality of wireless networks.
  • FIGURE 1 is an illustration of a system for provisioned configuration of wireless devices to access a restricted wireless network 160 in accordance with an exemplary embodiment of the present invention.
  • Authentication server 100 includes an authentication module 110, a provisioned configuration database 120, an application generation module 130, a processor 140, a provisioning module 150, and policy management module 180.
  • the authentication server 100 may be used to maintain security in network 160.
  • Various client devices, such as wireless workstation 170a, laptop 170b, and mobile device 170c belong to potential users of network 160.
  • a module (or application), as referenced in the present invention, should be generally understood as a collection of routines that perform various system-level functions and may be dynamically loaded and unloaded by hardware and device drivers as required.
  • the modular software components described herein may also be incorporated as part of a larger software platform or integrated as part of an application specific component.
  • Authentication module 110 authenticates a user (e.g., laptop 170b) and verifies that the user is who they purport to be and that they are otherwise authorized to access network 160.
  • the authentication module 110 may be used to verify a user name and password supplied by the user over a wired or wireless network. Verification may occur through comparison with user names and passwords stored in an authentication database, which may be independent of or incorporated into authentication module 110.
  • authentication module 110 may access data and perform actions within network 160 based on the user's security clearance level, the parameters of the user's role in the organization, as defined by a network administrator, and as may be further governed by the parameters and policies of a provisioned configuration.
  • Authentication module 110 may implement certain authentication policies disclosed in U.S. patent application number 11/788,371 filed April 18, 2007 and entitled “Dynamic Authentication in Secured Wireless Networks," the disclosure of which has previously been incorporated herein by reference.
  • Provisioned configuration database 120 stores information concerning various sets of parameters and policies that may be used to configure a wireless device for access to network 160. Provisioned configured database 120 may further store certificates, shared secrets, private keys, and a variety of other information. These parameters and policies may include information used to configure a wireless device for connection to a restricted wireless network and access policies related to the same , such as a wireless network name, wireless device parameters, adapter configurations, security-related parameters, access constraints, quality of service parameters, security-related parameters, and the like. Provisioned configuration database 120 may further store information concerning the users and/or wireless devices associated with one or more provisioned configurations.
  • an authenticated user may request access to a restricted wireless network.
  • a provisioned configuration associated with that user and/or the wireless device belonging to the user may be found by searching provisioned configuration database 120. Once that provisioned configuration is located and subsequently installed on the wireless device belonging to the user, the user is allowed to access the wireless network 160 using the wireless device. Further, the provisioned configuration restricts the user from accessing any portion or sub-sets of the network for which the user is not authorized.
  • Provisioned configuration database 120 may operate in conjunction with and provide provisioned configuration information to other components of authentication server 100, including (but not limited to) application generation module 130, provisioning module 150, and optional policy management module 180.
  • provisioned configuration database 120 may operate in conjunction with application generation module 130.
  • application generation module 130 uses a provisioned configuration provided by provisioned configuration database 120 to generate an application for configuring a wireless device according to the provisioned configuration.
  • the application may then be transferred to the wireless device via provisioning module 150 as discussed in further detail herein.
  • the application may execute automatically, or the application may be manually executed by the user. Once executed, the application may survey the wireless device, configure the wireless device, and/or connect the wireless device to the restricted wireless network 160. Configuring the wireless device may include installing any or all of the parameters, policies, and the like included in the provisioned configuration acquired from database 120.
  • Processor 140 is configured to execute a variety of operations. For example, by using authentication information concerning the user and/or the wireless device, the processor 140 may search provisioned configuration database 120 for a provisioned configuration that is associated with the user and/or the wireless device. Processor 140, by executing instructions and/or applying data sets related to and/or provided by application generation module 130, may then generate the aforementioned configuration application. Processor 140, by executing instructions and/or applying data sets related to and/or provided by provisioning module 150, may provide for the transfer of the configuration application to a wireless device over network 160.
  • a user submits a request for authentication and access to restricted wireless network 160.
  • the request may include user information ⁇ e.g., user name and password) and/or wireless device information.
  • processor 140 uses the information from the request to search provisioned configuration database 120 for parameters and policies associated with the user and/or wireless device. That information concerning the aforementioned parameters and policies may then be provided to application generation module 120 for generation of a provisioned configuration application.
  • Provisioning module 150 is configured to deliver (or allow for the delivery/transfer) the self-configuring application generated by the application generation module 130 to a wireless device. This delivery may occur over an open access network as part of a wireless download operation. Transfer may also occur over a wired network.
  • the parameters and policies, as included in the provisioned configuration determine whether a user may access a particular wireless network and to what extent. For example, a user may be authorized to access only one wireless network and/or only for certain operations.
  • the provisioned access application provided by provisioning module 150 may implement certain security and/or access policies disclosed in U.S.
  • Network 160 may be configured to transmit various electromagnetic waves, including, for example, radio signals.
  • Network 160 may be an IEEE 802.11 (Wi-Fi or Wireless LAN) network, IEEE 802.16 (WiMAX) network, IEEE 802.16c network, or the like.
  • Network 160 may convey various kinds of information to interface devices, such as client interface devices 180a-c.
  • Network 160 may be a local, proprietary network or may be a part of a larger wide-area network.
  • Network 160 may reside within the realm of greater network 160 such as peer-to-peer or wireless mesh networks. Portions of network 160 may be "open” to allow for provisioning prior to a device being allowed to access "closed” portions of the same. Network 160, in some embodiments, may include a wired network for devices 170a-c (described below) to-be authenticated and to download the executable application with provisioned configuration. Certain portions of network 160 may be devoted to authentication and downloading an executable provisioning application whereas other portions may be dedicated for general wireless usage.
  • Client wireless-interface devices 170a-c illustrate a variety of wireldss-capable devices, including desktop computers, laptop computers, handheld computers, and the like.
  • a user wishing to access the wireless network 160 through wireless device 170a may do so by copying, downloading; or otherwise transferring to wireless device 170a a copy of the application generated by application generation module 130 and made available by provisioning module 150.
  • the application configures wireless device 170a so that wireless device 170a can access the wireless network 160 within the parameters of a provisioned configuration.
  • Wireless device 170b and wireless device 170c may be configured in similar fashion.
  • Optional policy management module 180 may also be included as a part of authentication server 100. Policy management module 180 may be responsible for management and enforcement of parameters and polices of access for a device access network 160. The parameters and policies may include those implemented as a part of the provisioned configuration process. These- parameters and policies may further include what users are allowed to access to particular network and to what extent (e.g., particular operations, limited access, etc.). Some wireless networks may implement policy management and enforcement through a separate server dedicated to policy management and enforcement.
  • FIGURE 2 is a flowchart illustrating a method 200 for generating a configuration application in accordance with an exemplary embodiment of the present invention. In method 200, a wireless device is allowed to connect to an open wireless network.
  • an open wireless network is accessed by a wireless device.
  • the open wireless network is unsecured so that an unauthenticated user and/or wireless device belonging to the user may form a connection.
  • the user and/or wireless device may be allowed to perform various operations, including authentication. Direct wired access may also occur in step 210.
  • step 220 it is determined whether the user has been successfully authenticated.
  • the user may be authenticated using authentication module 110 using information from the user and/or the wireless device. Initial authentication may include providing a user name and password identifying the user as a particular user.
  • Determining whether the user is successfully authenticated may include verifying that the authentication information from the user and/or wireless device corresponds with the authentication information from the authentication database or authentication module 110. [0032] In step 230, the user was not authenticated. This may occur where the user is not currently authorized to access the restricted wireless network, the user entered incorrect authenticated information, or the like. If a user cannot be authenticated, the user may not be allowed to access the restricted wireless network 160.
  • step 240 the user has been successfully authenticated.
  • the authentication information from the user and/or wireless device may be used to locate the provisioned configuration associated with the user and/or wireless device.
  • Provisioned configuration database 120 may be searched and a provisioned configuration associated with the user and/or wireless device is retrieved.
  • certificates may be generated.
  • shared secrets like those described in co- pending U.S. application 11/788,371 for "Dynamic Authentication in Secured Wireless Networks"
  • private keys may be generated.
  • These certificates and so forth may be generated by application generation module 130 or in conjunction with another optional application dedicated to certificate generation and so forth.
  • an application including the provisioned configuration is generated by application generation module 130.
  • This application may include the certificates and so forth generated in.optional step 245.
  • the generation operations of step 245 and 250 may be consolidated into a single operation.
  • application generation module 130 uses the provisioned configuration located in step 240, application generation module 130 generates an application that, when executed, will configure the wireless device or another wireless device so that the wireless device can access restricted wireless network 160 within the parameters and policies for the user and/or wireless device.
  • FIGURE 3 is a flowchart illustrating a method 300 for wireless devices to access a restricted wireless network 160 in accordance with an exemplary embodiment of the present invention.
  • a request for access by a wireless device to the restricted wireless network is received. It is then determined whether the user is successfully authenticated. If the user cannot be successfully authenticated, the request for access is denied. If the user has been successfully authenticated, it is then determined whether the wireless device has a provisioned configuration that would allow for access to the restricted wireless network 160. If the wireless device has no such provisioned configuration, the request for access to the restricted wireless network 160 is denied. If the wireless device does have a provisioned configuration allowing for access, the request is granted. Further, the parameters and policies of the particular provisioned configuration are enforced for the user, wireless device, and their operations within the restricted wireless network.
  • step 310 a request for access to a restricted wireless network 160 is received from a wireless device belonging to a user.
  • the request for access may be received through an open wireless network, a wired connection, or the like.
  • step 320 it is determined whether the user has been successfully authenticated. The determination may be performed in a manner similar to that of step 220. If the determination is that the user has been successfully authenticated, the method proceeds to step 330. If the determination is that the user has not been successfully authenticated, the method proceeds to step 340.
  • step 330 it has been determined that the user was not successfully authenticated and the request for access to the restricted wireless network 160 is rejected. This may occur where the user is not currently authorized to access the restricted wireless network, the user entered incorrect authenticated information, or the like. Rejection of the access request may include terminating the connection, enforcing various security measures (e.g., identifying the illicit or unauthorized access attempt by date, time, and indicia of the user attempting access), or the like.
  • various security measures e.g., identifying the illicit or unauthorized access attempt by date, time, and indicia of the user attempting access
  • step 340 it has been determined that the user was successfully authenticated.
  • step 350 it is determined whether the wireless device is configured for access to the restricted wireless network. The determination may be made by surveying the wireless device, information from the authentication request, comparing the configuration of the wireless device with the provisioned configuration in provisioned configuration database 120, or the like. If the wireless device has been configured for access to the restricted wireless network 160, the method proceeds to step 350. If it is determined that the wireless device is not configured, the method proceeds to step 330. Determinations made in step 350 may utilize those techniques disclosed in U.S. patent application number 11/788,371 filed April 18, 2007 and entitled "Dynamic Authentication in Secured Wireless Networks," the disclosure of which has previously been incorporated herein by reference.
  • step 350 the wireless device has been determined to have been configured for access to the restricted wireless network 160, and the request for access is granted.
  • the wireless device may be automatically connected to the restricted wireless network 160. Alternatively, the connection may be made manually.
  • step 360 access by the wireless device to restricted wireless network 160 is governed by the parameters and policies of the provisioned configuration.
  • Optional policy enforcement module 180 may enforce those parameters and policies, so that the user may only access the network or networks for which the user is authorized.
  • FIGURE 4 is a flowchart illustrating a method for provisioned configuration of a wireless device to access a restricted wireless network 160 in accordance with an exemplary embodiment of the present invention.
  • a wireless device belonging to a user is allowed to connect to an open wireless network.
  • the user is authenticated.
  • a configuration application is generated.
  • the application is then transferred to the wireless device.
  • the application provides a provisioned configuration for the wireless device.
  • the wireless device may be allowed to access the restricted wireless network 160.
  • step 410 the wireless device belonging to the user is allowed to access an open wireless network.
  • the connection to the open wireless network may be similar to that of step 210. Also like step 210, direct wired access may be provided.
  • step 420 the user is authenticated using authentication module UO.
  • Authentication of the user and/or wireless device may occur by comparing various information such as user names and passwords against information in an authentication database or authentication module 110. Techniques disclosed in U.S. patent application number 11/788,371 filed April 18, 2007 and entitled "Dynamic Authentication in Secured Wireless Networks," the disclosure of which has previously been incorporated herein by reference / may also be utilized. [0046] In step 430, an application including the provisioned configuration is generated by application generation module 130. The generation of the application may occur similarly to the generation of the application in step 250.
  • the application is transferred to the wireless device via provisioning module 150.
  • the application may be copied, downloaded, or otherwise transferred to the wireless device.
  • the application may be automatically transferred to the wireless device after the application is generated in step 430.
  • the application may be made available for the user to copy, download, or otherwise transfer over the open wireless network.
  • the application may also be provided as a part of a computer-readable medium such as an installation CD or via portable flash memory cards.
  • step 450 the application as provided by provisioning module 150 is executed and provides a provisioned configuration for the wireless device to access restricted wireless network 160.
  • the application transferred in step 440 may be executed automatically or by the user to install the provisioned configuration, including the various parameters and policies associated with the user and/or wireless device.
  • the wireless device becomes capable of accessing the restricted wireless network 160
  • step 460 the wireless device connects to and accesses the restricted wireless network 160.
  • the wireless device may be connected to the restricted wireless network 160 either automatically or manually.
  • the access to restricted wireless network 160 is governed by the parameters and policies of the provisioned configuration installed on the wireless device and other security measures as may be implemented server-side to maintain to the security of the network 160.

Abstract

Systems and methods for provisioned configuration of wireless devices to allow access to restricted wireless networks are provided. Using an open wireless or wired network, a user of a wireless device may be authenticated. A configuration application, which includes the parameters and policies of the provisioned configuration, is generated, transferred to, and executed on the wireless device. Following configuration by the application, the wireless device is allowed to access the restricted wireless network within the parameters and policies of the provisioned configuration.

Description

PROVISIONED CONFIGURATION FOR AUTOMATIC WIRELESS CONNECTION
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] The present application is a continuation-in-part of U.S. patent application number 11/788,371 filed April 18, 2007 and entitled "Dynamic Authentication in Secured Wireless Networks," which claims the priority benefit of U.S. provisional patent application number 60/794,625 filed April 24, 2006 and entitled "Mechanisms and Apparatus to Provide Pre-Shared Key Authentication with Dynamic Secret on Wireless Networks" and U.S. provisional patent application number 60/796,845 filed May 2, 2006 and entitled "Mechanisms and Apparatus for Automatic Wireless Connection Based on Provisioned Configuration." The disclosures of the aforementioned applications are incorporated herein by reference.
BACKGROUND OF THE INVENTION
Field of the Invention
10002] The present invention generally relates to information network security. More specifically, the present invention relates to user-friendly systems for configuring wireless devices for access to restricted wireless networks.
Description of Related Art
[0003] A variety of user authentication and security measures for wireless networks have been proposed by a number of professional organizations. These professional organizations include the Institute of Electrical and Electronics Engineers (IEEE) 802.11 Working Group, the Wi-Fi Alliance, and the Internet Engineering Task Force (IETF). Various other groups such as wireless equipment vendors offer their own proprietary wireless security protocols. Depending on the particular source, implementing these protocols has generally been complicated, difficult to maintain, and requires a high level of technical knowledge by those implementing a particular protocol.
[0004] Another complication is that each organization may have specialized needs with respect to security for its wireless networks. For example, different departments within an organization may require different protocols. Some individuals, however, may require access to multiple networks, which requires that their wireless device be configured with multiple protocols. Further, some individuals may require access to particular networks but may not be authorized to access those networks. As such, many commercial organizations (e.g., small- and medium-sized businesses) have difficulties implementing security systems for wireless networks because of their lack of expertise and/or full-time professional technical support. [0005] For example, a network administrator may have the requisite technical knowledge to implement such security systems but may have to configure every wireless client station individually. This is in addition to instructing each user on how to configure their wireless device to conform to certain wireless connection parameters. Further, various technical complications may arise for users and network administrator personnel including different wireless devices and interfaces, different requirements for access, and different restrictions on access.
[0006] Notwithstanding the many measures available for securing a wireless network, implementing any one of these measures may be complicated, difficult, and/or require extensive maintenance. There is, therefore/ a need in the art for improved systems and methods that provide for restricted access to secured wireless networks that are user-friendly and easily maintained without requiring a high degree of technical expertise and/or ongoing technical support. SUMMARY OF THE INVENTION
[0007] Exemplary systems and methods of the present invention provide for provisioned configuration of wireless devices to allow access to restricted wireless networks. Using an open wireless or wired network, a user of a wireless device may be authenticated. An executable application, which includes the parameters and policies of a provisioned configuration, is generated, transferred to, and executed on the wireless device. Following configuration by the application, the wireless device is allowed to access the restricted wireless network within the parameters and policies of the provisioned configuration as provided through the executable application.
[0008] The executable applications providing such provisioned configurations may be generated based on authentication information concerning the user and/or the wireless device. Some embodiments include determining from a provisioned configuration database which parameters and policies are associated with the user and/or wireless device. In some embodiments of the present invention, the application may provide a plurality of provisioned configurations for the wireless device. Each of the plurality of provisioned configurations may include parameters and policies for a plurality of wireless networks. The executable application may be capable of configuring a wireless device for access to a variety of different wireless networks.
[0009] Embodiments of the present invention may include systems for provisioned configuration of wireless devices. Such systems may include an authentication module, a processor, and a provisioning module. Some embodiments further include a provisioned configuration database and/or an application generation module.
[0010Ϊ Some embodiments of the present invention include computer readable storage media and instructions for provisioned configuration of wireless devices. Some embodiments further include instructions for generating configuration applications based on authentication information concerning the user and/or the wireless device. BRIEF DESCRIPTION OF FIGURES
10011] FIGURE 1 is an illustration of a system for provisioned configuration of wireless devices to access a restricted wireless network in accordance with an exemplary embodiment of the present invention.
[0012] FIGURE 2 is a flowchart illustrating a method for generating a configuration application in accordance with an exemplary embodiment of the present invention.
[0013] FIGURE 3 is a flowchart illustrating a method for wireless devices to access a restricted wireless network in accordance with an exemplary embodiment of the present invention.
[0014] FIGURE 4 is a flowchart illustrating a method for provisioned configuration of a wireless device to access a restricted wireless network in accordance with an exemplary embodiment of the present invention.
DETAILED DESCRIPTION
[0015] Embodiments of the present invention include systems and methods for user- friendly, low-maintenance configuration of wireless devices for accessing restricted wireless networks. A user of a wireless device is allowed to connect to an open wireless or wired network. After the user is authenticated, an application may be generated that would allow the wireless device to connect to a secured or restricted wireless network. The application, after being transferred to and executed on the wireless device, configures the wireless device so that it may access the restricted wireless network. The configuration, which may also referred to as a provisioned configuration, may be based on user information,, wireless device information, or both. In some embodiments, the application may be able to configure the wireless device so that it may access a plurality of wireless networks.
[0016] FIGURE 1 is an illustration of a system for provisioned configuration of wireless devices to access a restricted wireless network 160 in accordance with an exemplary embodiment of the present invention. Authentication server 100, as illustrated in FIGURE 1, includes an authentication module 110, a provisioned configuration database 120, an application generation module 130, a processor 140, a provisioning module 150, and policy management module 180. The authentication server 100 may be used to maintain security in network 160. Various client devices, such as wireless workstation 170a, laptop 170b, and mobile device 170c belong to potential users of network 160.
[0017] A module (or application), as referenced in the present invention, should be generally understood as a collection of routines that perform various system-level functions and may be dynamically loaded and unloaded by hardware and device drivers as required. The modular software components described herein may also be incorporated as part of a larger software platform or integrated as part of an application specific component. [0018] Authentication module 110 authenticates a user (e.g., laptop 170b) and verifies that the user is who they purport to be and that they are otherwise authorized to access network 160. The authentication module 110 may be used to verify a user name and password supplied by the user over a wired or wireless network. Verification may occur through comparison with user names and passwords stored in an authentication database, which may be independent of or incorporated into authentication module 110. Once authenticated by authentication module 110, the user may access data and perform actions within network 160 based on the user's security clearance level, the parameters of the user's role in the organization, as defined by a network administrator, and as may be further governed by the parameters and policies of a provisioned configuration. Authentication module 110 may implement certain authentication policies disclosed in U.S. patent application number 11/788,371 filed April 18, 2007 and entitled "Dynamic Authentication in Secured Wireless Networks," the disclosure of which has previously been incorporated herein by reference.
[00191 Provisioned configuration database 120 stores information concerning various sets of parameters and policies that may be used to configure a wireless device for access to network 160. Provisioned configured database 120 may further store certificates, shared secrets, private keys, and a variety of other information. These parameters and policies may include information used to configure a wireless device for connection to a restricted wireless network and access policies related to the same , such as a wireless network name, wireless device parameters, adapter configurations, security-related parameters, access constraints, quality of service parameters, security-related parameters, and the like. Provisioned configuration database 120 may further store information concerning the users and/or wireless devices associated with one or more provisioned configurations.
[0020] In an exemplary embodiment, an authenticated user may request access to a restricted wireless network. A provisioned configuration associated with that user and/or the wireless device belonging to the user may be found by searching provisioned configuration database 120. Once that provisioned configuration is located and subsequently installed on the wireless device belonging to the user, the user is allowed to access the wireless network 160 using the wireless device. Further, the provisioned configuration restricts the user from accessing any portion or sub-sets of the network for which the user is not authorized. Provisioned configuration database 120 may operate in conjunction with and provide provisioned configuration information to other components of authentication server 100, including (but not limited to) application generation module 130, provisioning module 150, and optional policy management module 180.
[0021] In some embodiments, and as referenced above, provisioned configuration database 120 may operate in conjunction with application generation module 130. Using a provisioned configuration provided by provisioned configuration database 120, application generation module 130 generates an application for configuring a wireless device according to the provisioned configuration. The application may then be transferred to the wireless device via provisioning module 150 as discussed in further detail herein. The application may execute automatically, or the application may be manually executed by the user. Once executed, the application may survey the wireless device, configure the wireless device, and/or connect the wireless device to the restricted wireless network 160. Configuring the wireless device may include installing any or all of the parameters, policies, and the like included in the provisioned configuration acquired from database 120. Once configured, the wireless device can access the wireless network 160 within the parameters and policies of the provisioned configuration. 10022] Processor 140 is configured to execute a variety of operations. For example, by using authentication information concerning the user and/or the wireless device, the processor 140 may search provisioned configuration database 120 for a provisioned configuration that is associated with the user and/or the wireless device. Processor 140, by executing instructions and/or applying data sets related to and/or provided by application generation module 130, may then generate the aforementioned configuration application. Processor 140, by executing instructions and/or applying data sets related to and/or provided by provisioning module 150, may provide for the transfer of the configuration application to a wireless device over network 160. [0023] In an exemplary embodiment of the present invention, a user submits a request for authentication and access to restricted wireless network 160. The request may include user information {e.g., user name and password) and/or wireless device information. Following an optional authentication operation, processor 140 uses the information from the request to search provisioned configuration database 120 for parameters and policies associated with the user and/or wireless device. That information concerning the aforementioned parameters and policies may then be provided to application generation module 120 for generation of a provisioned configuration application.
[0024] Provisioning module 150 is configured to deliver (or allow for the delivery/transfer) the self-configuring application generated by the application generation module 130 to a wireless device. This delivery may occur over an open access network as part of a wireless download operation. Transfer may also occur over a wired network. The parameters and policies, as included in the provisioned configuration, determine whether a user may access a particular wireless network and to what extent. For example, a user may be authorized to access only one wireless network and/or only for certain operations. The provisioned access application provided by provisioning module 150 may implement certain security and/or access policies disclosed in U.S. patent application number 11/788,371 filed April 18, 2007 and entitled "Dynamic Authentication in Secured Wireless Networks," the disclosure of which has previously been incorporated herein by reference. [0025] Network 160 may be configured to transmit various electromagnetic waves, including, for example, radio signals. Network 160 may be an IEEE 802.11 (Wi-Fi or Wireless LAN) network, IEEE 802.16 (WiMAX) network, IEEE 802.16c network, or the like. Network 160 may convey various kinds of information to interface devices, such as client interface devices 180a-c. Network 160 may be a local, proprietary network or may be a part of a larger wide-area network.
[0026] Various subsidiary networks may reside within the realm of greater network 160 such as peer-to-peer or wireless mesh networks. Portions of network 160 may be "open" to allow for provisioning prior to a device being allowed to access "closed" portions of the same. Network 160, in some embodiments, may include a wired network for devices 170a-c (described below) to-be authenticated and to download the executable application with provisioned configuration. Certain portions of network 160 may be devoted to authentication and downloading an executable provisioning application whereas other portions may be dedicated for general wireless usage.
[0027] Client wireless-interface devices 170a-c illustrate a variety of wireldss-capable devices, including desktop computers, laptop computers, handheld computers, and the like. A user wishing to access the wireless network 160 through wireless device 170a, for example, may do so by copying, downloading; or otherwise transferring to wireless device 170a a copy of the application generated by application generation module 130 and made available by provisioning module 150. The application configures wireless device 170a so that wireless device 170a can access the wireless network 160 within the parameters of a provisioned configuration. Wireless device 170b and wireless device 170c may be configured in similar fashion.
[0028] Optional policy management module 180 may also be included as a part of authentication server 100. Policy management module 180 may be responsible for management and enforcement of parameters and polices of access for a device access network 160. The parameters and policies may include those implemented as a part of the provisioned configuration process. These- parameters and policies may further include what users are allowed to access to particular network and to what extent (e.g., particular operations, limited access, etc.). Some wireless networks may implement policy management and enforcement through a separate server dedicated to policy management and enforcement. [0029] FIGURE 2 is a flowchart illustrating a method 200 for generating a configuration application in accordance with an exemplary embodiment of the present invention. In method 200, a wireless device is allowed to connect to an open wireless network. It is then determined whether the user is successfully authenticated. If the user is not authenticated, the user and wireless device are refused access to the restricted wireless network. If the user is successfully authenticated, a provisioned configuration associated with the authenticated user and/or the wireless device is located. An application for configuration of the wireless device based on the provisioned configuration is generated.
[0030] In step 210, an open wireless network is accessed by a wireless device. The open wireless network is unsecured so that an unauthenticated user and/or wireless device belonging to the user may form a connection. Once the wireless device is connected to the open wireless network, the user and/or wireless device may be allowed to perform various operations, including authentication. Direct wired access may also occur in step 210. [0031] In step 220, it is determined whether the user has been successfully authenticated. The user may be authenticated using authentication module 110 using information from the user and/or the wireless device. Initial authentication may include providing a user name and password identifying the user as a particular user. Determining whether the user is successfully authenticated may include verifying that the authentication information from the user and/or wireless device corresponds with the authentication information from the authentication database or authentication module 110. [0032] In step 230, the user was not authenticated. This may occur where the user is not currently authorized to access the restricted wireless network, the user entered incorrect authenticated information, or the like. If a user cannot be authenticated, the user may not be allowed to access the restricted wireless network 160.
[0033] In step 240, the user has been successfully authenticated. The authentication information from the user and/or wireless device may be used to locate the provisioned configuration associated with the user and/or wireless device. Provisioned configuration database 120 may be searched and a provisioned configuration associated with the user and/or wireless device is retrieved.
[0034] In optional step 245, certificates, shared secrets (like those described in co- pending U.S. application 11/788,371 for "Dynamic Authentication in Secured Wireless Networks"), and/or private keys may be generated. These certificates and so forth may be generated by application generation module 130 or in conjunction with another optional application dedicated to certificate generation and so forth.
[0035] In step 250, an application including the provisioned configuration is generated by application generation module 130. This application may include the certificates and so forth generated in.optional step 245. In some embodiments; the generation operations of step 245 and 250 may be consolidated into a single operation. Using the provisioned configuration located in step 240, application generation module 130 generates an application that, when executed, will configure the wireless device or another wireless device so that the wireless device can access restricted wireless network 160 within the parameters and policies for the user and/or wireless device.
[00361 FIGURE 3 is a flowchart illustrating a method 300 for wireless devices to access a restricted wireless network 160 in accordance with an exemplary embodiment of the present invention. In method 300, a request for access by a wireless device to the restricted wireless network -is received. It is then determined whether the user is successfully authenticated. If the user cannot be successfully authenticated, the request for access is denied. If the user has been successfully authenticated, it is then determined whether the wireless device has a provisioned configuration that would allow for access to the restricted wireless network 160. If the wireless device has no such provisioned configuration, the request for access to the restricted wireless network 160 is denied. If the wireless device does have a provisioned configuration allowing for access, the request is granted. Further, the parameters and policies of the particular provisioned configuration are enforced for the user, wireless device, and their operations within the restricted wireless network.
[0037] In step 310, a request for access to a restricted wireless network 160 is received from a wireless device belonging to a user. The request for access may be received through an open wireless network, a wired connection, or the like. [0038] In step 320, it is determined whether the user has been successfully authenticated. The determination may be performed in a manner similar to that of step 220. If the determination is that the user has been successfully authenticated, the method proceeds to step 330. If the determination is that the user has not been successfully authenticated, the method proceeds to step 340.
[0039] In step 330, it has been determined that the user was not successfully authenticated and the request for access to the restricted wireless network 160 is rejected. This may occur where the user is not currently authorized to access the restricted wireless network, the user entered incorrect authenticated information, or the like. Rejection of the access request may include terminating the connection, enforcing various security measures (e.g., identifying the illicit or unauthorized access attempt by date, time, and indicia of the user attempting access), or the like.
[0040] In step 340, it has been determined that the user was successfully authenticated.
It is then determined whether the wireless device is configured for access to the restricted wireless network. The determination may be made by surveying the wireless device, information from the authentication request, comparing the configuration of the wireless device with the provisioned configuration in provisioned configuration database 120, or the like. If the wireless device has been configured for access to the restricted wireless network 160, the method proceeds to step 350. If it is determined that the wireless device is not configured, the method proceeds to step 330. Determinations made in step 350 may utilize those techniques disclosed in U.S. patent application number 11/788,371 filed April 18, 2007 and entitled "Dynamic Authentication in Secured Wireless Networks," the disclosure of which has previously been incorporated herein by reference.
[0041] In step 350, the wireless device has been determined to have been configured for access to the restricted wireless network 160, and the request for access is granted. In some embodiments, the wireless device may be automatically connected to the restricted wireless network 160. Alternatively, the connection may be made manually. [0042] In step 360, access by the wireless device to restricted wireless network 160 is governed by the parameters and policies of the provisioned configuration. Optional policy enforcement module 180 may enforce those parameters and policies, so that the user may only access the network or networks for which the user is authorized.
[0043] FIGURE 4 is a flowchart illustrating a method for provisioned configuration of a wireless device to access a restricted wireless network 160 in accordance with an exemplary embodiment of the present invention. A wireless device belonging to a user is allowed to connect to an open wireless network. The user is authenticated. Using information from authentication, a configuration application is generated. The application is then transferred to the wireless device. The application provides a provisioned configuration for the wireless device. Once the wireless device is configured, the wireless device may be allowed to access the restricted wireless network 160.
[0044] In step 410, the wireless device belonging to the user is allowed to access an open wireless network. The connection to the open wireless network may be similar to that of step 210. Also like step 210, direct wired access may be provided.
[0045] In step 420, the user is authenticated using authentication module UO.
Authentication of the user and/or wireless device may occur by comparing various information such as user names and passwords against information in an authentication database or authentication module 110. Techniques disclosed in U.S. patent application number 11/788,371 filed April 18, 2007 and entitled "Dynamic Authentication in Secured Wireless Networks," the disclosure of which has previously been incorporated herein by reference/ may also be utilized. [0046] In step 430, an application including the provisioned configuration is generated by application generation module 130. The generation of the application may occur similarly to the generation of the application in step 250.
[0047] In step 440, the application is transferred to the wireless device via provisioning module 150. The application may be copied, downloaded, or otherwise transferred to the wireless device. In some embodiments, the application may be automatically transferred to the wireless device after the application is generated in step 430. Alternatively, the application may be made available for the user to copy, download, or otherwise transfer over the open wireless network. The application may also be provided as a part of a computer-readable medium such as an installation CD or via portable flash memory cards.
[0048] In step 450, the application as provided by provisioning module 150 is executed and provides a provisioned configuration for the wireless device to access restricted wireless network 160. The application transferred in step 440 may be executed automatically or by the user to install the provisioned configuration, including the various parameters and policies associated with the user and/or wireless device. After the provisioned configuration is installed, the wireless device becomes capable of accessing the restricted wireless network 160 [0049] In step 460, the wireless device connects to and accesses the restricted wireless network 160. The wireless device may be connected to the restricted wireless network 160 either automatically or manually. The access to restricted wireless network 160 is governed by the parameters and policies of the provisioned configuration installed on the wireless device and other security measures as may be implemented server-side to maintain to the security of the network 160. Parameters and polices may be enforced by policy management module 180. [0050] While the present invention has been described in connection with a series of preferred embodiment, these descriptions are not intended to limit the scope of the invention to the particular forms set forth herein. To the contrary, the present descriptions are intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims and otherwise appreciated by one of ordinary skill in the art.

Claims

CLAIMSWHAT IS CLAIMED IS:
1. A method for provisioned configuration of a wireless device comprising: authenticating a user of the wireless device; transferring an executable application to the wireless device, wherein execution of the executable application configures the wireless device to allow the wireless device access to a restricted wireless network, wherein the configuration includes parameters and policies governing access to the restricted wireless network; controlling access of the wireless device to the wireless network based on at least the parameters and policies installed on the wireless device as a part of the wireless device configuration.
2. The method of claim 1, wherein the configuration further includes a certificate.
3. The method of claim 1, wherein the configuration further includes a shared secret.
4. The method of claim 1, wherein the configuration further includes a private key.
5. The method of claim 1 , wherein authenticating the user of the wireless devices occurs over an open wireless network.
6. The method of claim 1, wherein authentication the user of the wireless device occurs over a wired network.
7. The method of claim 1, further comprising generating the executable application based on at least authentication information provided by the wireless device.
8. The method of claim 7, wherein the authentication information is associated with provisioned configuration information in a provisioned configuration database.
9. The method of claim 7, further comprising associating the configuration settings for the wireless device with the authentication information in a provisioned configuration database.
10. The method of claim 7, wherein the authentication information comprises information concerning the user.
11. The method of claim 7, wherein the authentication information comprises information concerning the wireless device.
12. The method of claim 1, wherein the executable application includes a plurality of configuration settings for the wireless device.
13. The method of claim 12, wherein each of the plurality of configuration settings includes parameters and policies for a different wireless network.
14. The method of claim 12, wherein each of the plurality of configuration settings includes a certificate.
15. The method of claim 12, wherein each of the plurality of configuration settings includes a shared secret.
16. The method of claim 12, wherein each of the plurality of configuration settings includes a private key.
17. A system for provisioned configuration of a wireless device comprising: an authentication module configured to authenticate a user of the wireless device; a provisioned configuration database including a provisioned configuration for the wireless device, the provisioned configuration based on at least authentication information identified by the authentication module, wherein the provisioned configuration includes parameters and policies of access by the wireless device to a wireless network; and an application generation module configured to generate an executable application for the wireless device that configures the wireless device for access to thei wireless network based on at least the provisioned configuration.
18. The system of claim 17, wherein the authentication information comprises information concerning the user.
19. The system of claim 17, wherein the authentication information comprises information concerning the wireless device.
20. The system of claim 17, wherein the provisioned configuration database is further configured to store information concerning a plurality of parameters and policies of access to wireless networks, associations with users, and associations with wireless devices.
21. The system of claim 17, wherein the provisioned configuration database is further configured to store information concerning certificates.
22. The system of claim 17, wherein the provisioned configuration database is further configured to store shared secrets.
23. The system of claim 17, wherein the provisioned configuration database is further configured to store private keys.
24. The system of claim 17, further comprising a provisioning module configured to deliver the generated executable application to the wireless device.
25. The system of claim 24, wherein the executable application is transferred to the wireless device over an open wireless network.
26. The system of claim 24, wherein the executable application is transferred to the wireless device over a wired network.
27. The system of claim 24, wherein the executable application provides a plurality of provisioned configurations.
28. The system of claim 27, wherein each of the plurality of provisioned configurations includes parameters and policies for a different wireless network.
29. A computer-readable storage medium having embodied thereon a program, the program being executable by a computer processor to perform a method for provisioned configuration of a wireless device comprising: authenticating a user of the wireless device; transferring an executable application to the wireless device, wherein execution of the executable application configures the wireless device to allow the wireless device access to a restricted wireless network, wherein the configuration includes parameters and policies governing access to the restricted wireless network; controlling access of the wireless device to the wireless network based on at least the parameters and policies installed on the wireless device as a part of the wireless device configuration.
30. The computer-readable storage medium of claim 18, wherein the method further comprises generating the executable application based on at least authentication information provided by the wireless device.
PCT/US2007/009836 2006-04-24 2007-04-23 Provisioned configuration for automatic wireless connection WO2007127162A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2007800190748A CN101455063B (en) 2006-04-24 2007-04-23 Provisioned configuration for automatic wireless connection
EP07755913.6A EP2014067B1 (en) 2006-04-24 2007-04-23 Provisioned configuration for automatic wireless connection

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US79462506P 2006-04-24 2006-04-24
US60/794,625 2006-04-24
US79684506P 2006-05-02 2006-05-02
US60/796,845 2006-05-02
US11/788,371 US7788703B2 (en) 2006-04-24 2007-04-18 Dynamic authentication in secured wireless networks
US11/788,371 2007-04-18

Publications (3)

Publication Number Publication Date
WO2007127162A2 true WO2007127162A2 (en) 2007-11-08
WO2007127162A8 WO2007127162A8 (en) 2008-09-18
WO2007127162A3 WO2007127162A3 (en) 2008-11-20

Family

ID=38656104

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/US2007/009503 WO2007127120A2 (en) 2006-04-24 2007-04-18 Dynamic authentication in secured wireless networks
PCT/US2007/009836 WO2007127162A2 (en) 2006-04-24 2007-04-23 Provisioned configuration for automatic wireless connection

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/US2007/009503 WO2007127120A2 (en) 2006-04-24 2007-04-18 Dynamic authentication in secured wireless networks

Country Status (4)

Country Link
US (5) US7788703B2 (en)
EP (2) EP2013758B1 (en)
CN (1) CN103441984B (en)
WO (2) WO2007127120A2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8923265B2 (en) 2005-12-01 2014-12-30 Ruckus Wireless, Inc. On-demand services by wireless base station virtualization
US9071583B2 (en) 2006-04-24 2015-06-30 Ruckus Wireless, Inc. Provisioned configuration for automatic wireless connection
US9179399B2 (en) 2008-05-12 2015-11-03 Blackberry Limited Methods and apparatus for use in facilitating access to a communication service via a WLAN hotspot
US9769655B2 (en) 2006-04-24 2017-09-19 Ruckus Wireless, Inc. Sharing security keys with headless devices
US9792188B2 (en) 2011-05-01 2017-10-17 Ruckus Wireless, Inc. Remote cable access point reset
US10182350B2 (en) 2012-04-04 2019-01-15 Arris Enterprises Llc Key assignment for a brand
US10952263B2 (en) 2016-12-30 2021-03-16 British Telecommunications Public Limited Company Automatic device pairing
US11190942B2 (en) 2016-12-30 2021-11-30 British Telecommunications Public Limited Company Automatic pairing of devices to wireless networks
US11418959B2 (en) 2016-12-30 2022-08-16 British Telecommunications Public Limited Company Automatic pairing of devices to wireless networks

Families Citing this family (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7669233B2 (en) * 1999-09-10 2010-02-23 Metavante Corporation Methods and systems for secure transmission of identification information over public networks
WO2007127120A2 (en) 2006-04-24 2007-11-08 Ruckus Wireless, Inc. Dynamic authentication in secured wireless networks
US8948046B2 (en) * 2007-04-27 2015-02-03 Aerohive Networks, Inc. Routing method and system for a wireless network
US8135384B2 (en) * 2007-11-29 2012-03-13 Microsoft Corporation Policy enforcement for multi-radio transmission and reception
US8218502B1 (en) 2008-05-14 2012-07-10 Aerohive Networks Predictive and nomadic roaming of wireless clients across different network subnets
US9674892B1 (en) * 2008-11-04 2017-06-06 Aerohive Networks, Inc. Exclusive preshared key authentication
US8483194B1 (en) 2009-01-21 2013-07-09 Aerohive Networks, Inc. Airtime-based scheduling
US11115857B2 (en) 2009-07-10 2021-09-07 Extreme Networks, Inc. Bandwidth sentinel
US9900251B1 (en) 2009-07-10 2018-02-20 Aerohive Networks, Inc. Bandwidth sentinel
TWI401979B (en) * 2009-10-14 2013-07-11 Ind Tech Res Inst Access authorization method and apparatus for a wireless sensor network
CN102055728B (en) * 2009-11-02 2013-11-06 中华电信股份有限公司 System login method for avoiding account number from being falsely used
US8683196B2 (en) * 2009-11-24 2014-03-25 Red Hat, Inc. Token renewal
US8671187B1 (en) 2010-07-27 2014-03-11 Aerohive Networks, Inc. Client-independent network supervision application
US8484724B2 (en) * 2010-07-29 2013-07-09 Bank Of America Corporation User permissions in computing systems
JP5053424B2 (en) * 2010-07-29 2012-10-17 株式会社バッファロー RELAY DEVICE, WIRELESS COMMUNICATION DEVICE, NETWORK SYSTEM, PROGRAM, AND METHOD
US9002277B2 (en) 2010-09-07 2015-04-07 Aerohive Networks, Inc. Distributed channel selection for wireless networks
US8948382B2 (en) 2010-12-16 2015-02-03 Microsoft Corporation Secure protocol for peer-to-peer network
US8971841B2 (en) 2010-12-17 2015-03-03 Microsoft Corporation Operating system supporting cost aware applications
US8422540B1 (en) 2012-06-21 2013-04-16 CBF Networks, Inc. Intelligent backhaul radio with zero division duplexing
US8467363B2 (en) 2011-08-17 2013-06-18 CBF Networks, Inc. Intelligent backhaul radio and antenna system
US10091065B1 (en) 2011-10-31 2018-10-02 Aerohive Networks, Inc. Zero configuration networking on a subnetted network
US8756668B2 (en) 2012-02-09 2014-06-17 Ruckus Wireless, Inc. Dynamic PSK for hotspots
EP2862301B1 (en) 2012-06-14 2020-12-02 Extreme Networks, Inc. Multicast to unicast conversion technique
CN102791014A (en) * 2012-07-18 2012-11-21 诚迈科技(南京)有限公司 Short-distance pairing method of wifi (wireless fidelity) mobile terminal
US9088891B2 (en) 2012-08-13 2015-07-21 Wells Fargo Bank, N.A. Wireless multi-factor authentication with captive portals
US9619017B2 (en) * 2012-11-07 2017-04-11 Qualcomm Incorporated Techniques for utilizing a computer input device with multiple computers
US9622075B2 (en) 2013-01-31 2017-04-11 Dell Products L.P. System and method for adaptive multifactor authentication
US10389650B2 (en) 2013-03-15 2019-08-20 Aerohive Networks, Inc. Building and maintaining a network
US9413772B2 (en) 2013-03-15 2016-08-09 Aerohive Networks, Inc. Managing rogue devices through a network backhaul
US20150026330A1 (en) * 2013-07-16 2015-01-22 Cellco Partnership D/B/A Verizon Wireless Generating unique identifiers for mobile devices
US9763094B2 (en) * 2014-01-31 2017-09-12 Qualcomm Incorporated Methods, devices and systems for dynamic network access administration
CN105376735A (en) * 2014-07-02 2016-03-02 北京奇虎科技有限公司 Password acquiring method, wireless network supplying equipment and network system
WO2016015311A1 (en) 2014-07-31 2016-02-04 SZ DJI Technology Co., Ltd. System and method for enabling virtual sightseeing using unmanned aerial vehicles
CN105389319A (en) * 2014-09-09 2016-03-09 中兴通讯股份有限公司 Database operation method and device
CN105635039B (en) 2014-10-27 2019-01-04 阿里巴巴集团控股有限公司 A kind of secure communication of network method and communication device
US9686676B2 (en) * 2015-01-16 2017-06-20 Nokia Technologies Oy Method, apparatus, and computer program product for a server controlled device wakeup
CN104754563A (en) * 2015-03-06 2015-07-01 广东欧珀移动通信有限公司 Wireless hotspot access sharing method, mobile terminals and system
CN104777752A (en) * 2015-03-20 2015-07-15 云丁网络技术(北京)有限公司 Intelligent household system and quick pairing method thereof
CN105635097A (en) * 2015-06-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Wi-Fi connection method, terminal, Wi-Fi device, Wi-Fi connection control method and server
WO2017031343A1 (en) 2015-08-19 2017-02-23 Shen Winifred Systems and methods for authenticating users accessing a secure network with one-session-only, on-demand login credentials
CN105263194A (en) * 2015-09-18 2016-01-20 北京金山安全软件有限公司 Method and device for establishing communication connection between mobile equipment and fixed equipment
CN105187452A (en) * 2015-10-20 2015-12-23 上海斐讯数据通信技术有限公司 Wireless network authentication method and system based on APP control
CN105282163B (en) * 2015-10-29 2020-04-07 广州视睿电子科技有限公司 Network access method and equipment
CN105516970B (en) * 2015-11-17 2019-07-09 上海礼源网络科技有限公司 A kind of WIFI authentication method and intelligent router, connecting internet system
US20170238235A1 (en) 2016-02-17 2017-08-17 Zitovault, Inc. Wireless router and router management system
WO2017165043A1 (en) * 2016-03-25 2017-09-28 Zitovault, Inc. Mac address-bound wlan password
US10097996B2 (en) 2016-08-01 2018-10-09 At&T Intellectual Property I, L.P. Method and system to dynamically authenticate and grant access to non-trusted anonymous Wi-Fi
US11044240B2 (en) 2016-08-01 2021-06-22 At&T Intellectual Property I, L.P. Method and system to manage access to a wireless local area network
CN106131830A (en) * 2016-08-30 2016-11-16 林昌盛威(北京)科技有限公司 A kind of data processing method, Apparatus and system
CN106936854A (en) * 2017-05-09 2017-07-07 成都市宏山科技有限公司 For the safety system of router
CN107426161A (en) * 2017-05-09 2017-12-01 成都市宏山科技有限公司 A kind of home router login validation method
US10932129B2 (en) 2017-07-24 2021-02-23 Cisco Technology, Inc. Network access control
CN107277808B (en) * 2017-07-27 2023-01-03 浩鲸云计算科技股份有限公司 Method for wireless terminal to access wireless network by using independent dynamic key
US10666628B2 (en) * 2017-08-04 2020-05-26 Apple Inc. Secure authentication of device identification for low throughput device to-device wireless communication
US11089475B2 (en) * 2018-11-06 2021-08-10 Red Hat, Inc. Booting and operating computing devices at designated locations
US11561606B2 (en) * 2018-11-21 2023-01-24 Johnson Controls Tyco IP Holdings LLP Systems and methods for reducing wi-fi station power
US11640455B2 (en) 2021-05-27 2023-05-02 Bank Of America Corporation Systems and methods for dynamic polychrome lattice image security
TWI789142B (en) * 2021-12-03 2023-01-01 新唐科技股份有限公司 Controller, computing device, bios recovery and backup method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050228874A1 (en) 2004-04-08 2005-10-13 Edgett Jeff S Method and system for verifying and updating the configuration of an access device during authentication

Family Cites Families (267)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4176356A (en) 1977-06-27 1979-11-27 Motorola, Inc. Directional antenna system including pattern control
US4193077A (en) * 1977-10-11 1980-03-11 Avnet, Inc. Directional antenna system with end loaded crossed dipoles
GB1578469A (en) * 1977-11-05 1980-11-05 Marconi Co Ltd Tropospheric scatter radio communications systems
FR2445036A1 (en) 1978-12-22 1980-07-18 Thomson Csf ELECTRONIC SCANNING MICROWAVE DEPHASER AND ANTENNA HAVING SUCH A PHASER
US4513412A (en) * 1983-04-25 1985-04-23 At&T Bell Laboratories Time division adaptive retransmission technique for portable radio telephones
US4814777A (en) * 1987-07-31 1989-03-21 Raytheon Company Dual-polarization, omni-directional antenna system
US5095535A (en) 1988-07-28 1992-03-10 Motorola, Inc. High bit rate communication system for overcoming multipath
US5097484A (en) * 1988-10-12 1992-03-17 Sumitomo Electric Industries, Ltd. Diversity transmission and reception method and equipment
US5173711A (en) 1989-11-27 1992-12-22 Kokusai Denshin Denwa Kabushiki Kaisha Microstrip antenna for two-frequency separate-feeding type for circularly polarized waves
US5203010A (en) * 1990-11-13 1993-04-13 Motorola, Inc. Radio telephone system incorporating multiple time periods for communication transfer
US5373548A (en) 1991-01-04 1994-12-13 Thomson Consumer Electronics, Inc. Out-of-range warning system for cordless telephone
JP3038933B2 (en) 1991-01-31 2000-05-08 ソニー株式会社 System controller for video signal processor
AU638379B2 (en) 1991-08-28 1993-06-24 Motorola, Inc. Cellular system sharing of logical channels
US5220340A (en) * 1992-04-29 1993-06-15 Lotfollah Shafai Directional switched beam antenna
US5507035A (en) * 1993-04-30 1996-04-09 International Business Machines Corporation Diversity transmission strategy in mobile/indoor cellula radio communications
WO1994028595A1 (en) * 1993-05-27 1994-12-08 Griffith University Antennas for use in portable communications devices
US5559800A (en) 1994-01-19 1996-09-24 Research In Motion Limited Remote control of gateway functions in a wireless data communication network
US5802312A (en) 1994-09-27 1998-09-01 Research In Motion Limited System for transmitting data files between computers in a wireless environment utilizing a file transfer agent executing on host system
US5973601A (en) * 1995-12-06 1999-10-26 Campana, Jr.; Thomas J. Method of radio transmission between a radio transmitter and radio receiver
CA2173304C (en) * 1995-04-21 2003-04-29 Anthony J. Dezonno Method and system for establishing voice communications using a computer network
US5964830A (en) 1995-08-22 1999-10-12 Durrett; Charles M. User portal device for the world wide web to communicate with a website server
GB9517241D0 (en) * 1995-08-23 1995-10-25 Philips Electronics Uk Ltd Printed antenna
US5767809A (en) * 1996-03-07 1998-06-16 Industrial Technology Research Institute OMNI-directional horizontally polarized Alford loop strip antenna
JPH11163621A (en) * 1997-11-27 1999-06-18 Kiyoshi Yamamoto Plane radiation element and omnidirectional antenna utilizing the element
WO1999060483A1 (en) * 1998-05-21 1999-11-25 Equifax Inc. System and method for authentication of network users
US6345043B1 (en) * 1998-07-06 2002-02-05 National Datacomm Corporation Access scheme for a wireless LAN station to connect an access point
US20020170064A1 (en) 2001-05-11 2002-11-14 Monroe David A. Portable, wireless monitoring and control station for use in connection with a multi-media surveillance system having enhanced notification functions
US6100843A (en) * 1998-09-21 2000-08-08 Tantivy Communications Inc. Adaptive antenna for use in same frequency networks
US6404386B1 (en) * 1998-09-21 2002-06-11 Tantivy Communications, Inc. Adaptive antenna for use in same frequency networks
US7116707B1 (en) 1998-11-05 2006-10-03 Cisco Technology, Inc. Modem failover without call loss
US6266528B1 (en) * 1998-12-23 2001-07-24 Arraycomm, Inc. Performance monitor for antenna arrays
US6442507B1 (en) 1998-12-29 2002-08-27 Wireless Communications, Inc. System for creating a computer model and measurement database of a wireless communication network
JP2001036337A (en) * 1999-03-05 2001-02-09 Matsushita Electric Ind Co Ltd Antenna system
US6356905B1 (en) * 1999-03-05 2002-03-12 Accenture Llp System, method and article of manufacture for mobile communication utilizing an interface support framework
US6498589B1 (en) 1999-03-18 2002-12-24 Dx Antenna Company, Limited Antenna system
CA2270302A1 (en) * 1999-04-28 2000-10-28 Superpass Company Inc. High efficiency printed antennas
CZ20014168A3 (en) * 1999-05-21 2002-05-15 International Business Machines Corporation Process and apparatus for initialization of safeguarded communication and for creating exclusive couples pairs of wireless devices
US6772331B1 (en) * 1999-05-21 2004-08-03 International Business Machines Corporation Method and apparatus for exclusively pairing wireless devices
US6317599B1 (en) 1999-05-26 2001-11-13 Wireless Valley Communications, Inc. Method and system for automated optimization of antenna positioning in 3-D
US6493679B1 (en) 1999-05-26 2002-12-10 Wireless Valley Communications, Inc. Method and system for managing a real time bill of materials
EP1188291B1 (en) 1999-06-11 2005-04-27 Microsoft Corporation General api for remote control of devices
US6892230B1 (en) 1999-06-11 2005-05-10 Microsoft Corporation Dynamic self-configuration for ad hoc peer networking using mark-up language formated description messages
US6910068B2 (en) * 1999-06-11 2005-06-21 Microsoft Corporation XML-based template language for devices and services
US6725281B1 (en) * 1999-06-11 2004-04-20 Microsoft Corporation Synchronization of controlled device state using state table and eventing in data-driven remote device control model
JP3672770B2 (en) * 1999-07-08 2005-07-20 株式会社国際電気通信基礎技術研究所 Array antenna device
US6499006B1 (en) 1999-07-14 2002-12-24 Wireless Valley Communications, Inc. System for the three-dimensional display of wireless communication system performance
WO2001013461A1 (en) * 1999-08-13 2001-02-22 Rangestar Wireless, Inc. Diversity antenna system for lan communication system
JP2001057560A (en) 1999-08-18 2001-02-27 Hitachi Kokusai Electric Inc Radio lan system
US6292153B1 (en) 1999-08-27 2001-09-18 Fantasma Network, Inc. Antenna comprising two wideband notch regions on one coplanar substrate
SE515047C2 (en) 1999-10-01 2001-06-05 Tryggit Ab Method and system for verification of service order
SE0002617D0 (en) * 1999-10-29 2000-07-11 Allgon Ab An antenna device for transmitting and / or receiving RF waves
US6307524B1 (en) 2000-01-18 2001-10-23 Core Technology, Inc. Yagi antenna having matching coaxial cable and driven element impedances
US7505762B2 (en) 2004-02-27 2009-03-17 Fusionone, Inc. Wireless telephone data backup system
US6356242B1 (en) * 2000-01-27 2002-03-12 George Ploussios Crossed bent monopole doublets
US20040193900A1 (en) * 2000-03-17 2004-09-30 Mark Nair System, method and apparatus for controlling the dissemination of digital works
GB0006955D0 (en) * 2000-03-23 2000-05-10 Koninkl Philips Electronics Nv Antenna diversity arrangement
US7266369B2 (en) 2000-04-04 2007-09-04 Samsung Electronics Co., Ltd. System and method for provisioning or updating a mobile station using over-the-air transfer of interpreted byte-code program
US6701522B1 (en) * 2000-04-07 2004-03-02 Danger, Inc. Apparatus and method for portal device authentication
US20020022483A1 (en) * 2000-04-18 2002-02-21 Wayport, Inc. Distributed network communication system which allows multiple wireless service providers to share a common network infrastructure
US6785816B1 (en) 2000-05-01 2004-08-31 Nokia Corporation System and method for secured configuration data for programmable logic devices
US8355912B1 (en) 2000-05-04 2013-01-15 International Business Machines Corporation Technique for providing continuous speech recognition as an alternate input device to limited processing power devices
JP3386439B2 (en) 2000-05-24 2003-03-17 松下電器産業株式会社 Directivity switching antenna device
EP1158605B1 (en) * 2000-05-26 2004-04-14 Sony International (Europe) GmbH V-Slot antenna for circular polarization
JP4501230B2 (en) * 2000-05-30 2010-07-14 株式会社日立製作所 IPv4-IPv6 multicast communication method and apparatus
US6326922B1 (en) 2000-06-29 2001-12-04 Worldspace Corporation Yagi antenna coupled with a low noise amplifier on the same printed circuit board
FI111208B (en) * 2000-06-30 2003-06-13 Nokia Corp Arrangement of data encryption in a wireless telecommunication system
US6356243B1 (en) * 2000-07-19 2002-03-12 Logitech Europe S.A. Three-dimensional geometric space loop antenna
US6625454B1 (en) 2000-08-04 2003-09-23 Wireless Valley Communications, Inc. Method and system for designing or deploying a communications network which considers frequency dependent effects
DE60031893T2 (en) 2000-08-10 2007-06-21 Fujitsu Ltd., Kawasaki COMMUNICATION DEVICE WITH TRANSMISSION DIVERSITY
US7043633B1 (en) * 2000-08-28 2006-05-09 Verizon Corporation Services Group Inc. Method and apparatus for providing adaptive self-synchronized dynamic address translation
US6445688B1 (en) 2000-08-31 2002-09-03 Ricochet Networks, Inc. Method and apparatus for selecting a directional antenna in a wireless communication system
US6807577B1 (en) 2000-09-14 2004-10-19 International Business Machines Corporation System and method for network log-on by associating legacy profiles with user certificates
AU2001288934A1 (en) 2000-09-22 2002-04-02 Widcomm Inc. Wireless network and method for providing improved handoff performance
US6973622B1 (en) 2000-09-25 2005-12-06 Wireless Valley Communications, Inc. System and method for design, tracking, measurement, prediction and optimization of data communication networks
US6950523B1 (en) 2000-09-29 2005-09-27 Intel Corporation Secure storage of private keys
US6975834B1 (en) 2000-10-03 2005-12-13 Mineral Lassen Llc Multi-band wireless communication device and method
US6770395B2 (en) * 2000-10-23 2004-08-03 Materials And Systems Research, Inc. Internally manifolded, planar solid oxide fuel cell (SOFC) stack with an inexpensive interconnect
DE20019677U1 (en) 2000-11-20 2001-02-15 Hirschmann Electronics Gmbh Antenna system
US7171475B2 (en) * 2000-12-01 2007-01-30 Microsoft Corporation Peer networking host framework and hosting API
ATE298913T1 (en) 2000-12-07 2005-07-15 Raymond Bellone WARNING SYSTEM WITH TRANSMITTER-CONTROLLED MULTIPLE TRIGGER AND PORTABLE RECEIVER VIBRATOR
JP4531969B2 (en) * 2000-12-21 2010-08-25 三菱電機株式会社 Adaptive antenna receiver
KR100353623B1 (en) * 2000-12-22 2002-09-28 주식회사 케이티프리텔 Applying Method for Small Group Multicast in Mobile IP
US6400332B1 (en) * 2001-01-03 2002-06-04 Hon Hai Precision Ind. Co., Ltd. PCB dipole antenna
US6888893B2 (en) * 2001-01-05 2005-05-03 Microsoft Corporation System and process for broadcast and communication with very low bit-rate bi-level or sketch video
US6931429B2 (en) 2001-04-27 2005-08-16 Left Gate Holdings, Inc. Adaptable wireless proximity networking
US7916794B2 (en) * 2001-04-28 2011-03-29 Microsoft Corporation System and process for broadcast and communication with very low bit-rate bi-level or sketch video
US6864852B2 (en) * 2001-04-30 2005-03-08 Ipr Licensing, Inc. High gain antenna for wireless applications
US6606057B2 (en) 2001-04-30 2003-08-12 Tantivy Communications, Inc. High gain planar scanned antenna array
US7444513B2 (en) 2001-05-14 2008-10-28 Nokia Corporiation Authentication in data communication
US20040152492A1 (en) 2001-05-14 2004-08-05 Andrew Gray Antenna interface protocol
US8284739B2 (en) * 2001-05-24 2012-10-09 Vixs Systems, Inc. Method and apparatus for affiliating a wireless device with a wireless local area network
US20040030900A1 (en) 2001-07-13 2004-02-12 Clark James R. Undetectable watermarking technique for audio media
US6781999B2 (en) * 2001-07-23 2004-08-24 Airvana, Inc. Broadcasting and multicasting in wireless communication
CA2456446C (en) 2001-08-07 2010-03-30 Tatara Systems, Inc. Method and apparatus for integrating billing and authentication functions in local area and wide area wireless data networks
US6836254B2 (en) * 2001-08-10 2004-12-28 Antonis Kalis Antenna system
WO2003023955A1 (en) 2001-09-06 2003-03-20 Matsushita Electric Industrial Co., Ltd. Array antenna apparatus
US7697523B2 (en) * 2001-10-03 2010-04-13 Qualcomm Incorporated Method and apparatus for data packet transport in a wireless communication system using an internet protocol
JP4135861B2 (en) * 2001-10-03 2008-08-20 日本電波工業株式会社 Multi-element planar antenna
US6674459B2 (en) * 2001-10-24 2004-01-06 Microsoft Corporation Network conference recording system and method including post-conference processing
WO2003038946A1 (en) * 2001-10-31 2003-05-08 Lockheed Martin Corporation Broadband starfish antenna and array thereof
US7181620B1 (en) * 2001-11-09 2007-02-20 Cisco Technology, Inc. Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach
US6774854B2 (en) * 2001-11-16 2004-08-10 Galtronics, Ltd. Variable gain and variable beamwidth antenna (the hinged antenna)
US7363354B2 (en) 2001-11-29 2008-04-22 Nokia Corporation System and method for identifying and accessing network services
US7986937B2 (en) * 2001-12-20 2011-07-26 Microsoft Corporation Public access point
US7050809B2 (en) * 2001-12-27 2006-05-23 Samsung Electronics Co., Ltd. System and method for providing concurrent data transmissions in a wireless communication network
JP2003198437A (en) * 2001-12-28 2003-07-11 Matsushita Electric Ind Co Ltd Multi-antenna system, receiving method and transmitting method for multi-antenna
US6888504B2 (en) * 2002-02-01 2005-05-03 Ipr Licensing, Inc. Aperiodic array antenna
US7146433B2 (en) 2002-02-01 2006-12-05 Lenovo Singapore Pte. Ltd Extending an allowable transmission distance between a wireless device and an access point by communication with intermediate wireless devices
US6842141B2 (en) 2002-02-08 2005-01-11 Virginia Tech Inellectual Properties Inc. Fourpoint antenna
US7966497B2 (en) * 2002-02-15 2011-06-21 Qualcomm Incorporated System and method for acoustic two factor authentication
US6781544B2 (en) 2002-03-04 2004-08-24 Cisco Technology, Inc. Diversity antenna for UNII access point
JP3843027B2 (en) 2002-03-12 2006-11-08 日東電工株式会社 Method for manufacturing printed wiring board
US6819287B2 (en) 2002-03-15 2004-11-16 Centurion Wireless Technologies, Inc. Planar inverted-F antenna including a matching network having transmission line stubs and capacitor/inductor tank circuits
US20030184490A1 (en) 2002-03-26 2003-10-02 Raiman Clifford E. Sectorized omnidirectional antenna
US6711678B2 (en) 2002-04-05 2004-03-23 Expand Beyond Corporation Pre-authenticated communication within a secure computer network
US6809691B2 (en) 2002-04-05 2004-10-26 Matsushita Electric Industrial Co., Ltd. Directivity controllable antenna and antenna unit using the same
FI121519B (en) 2002-04-09 2010-12-15 Pulse Finland Oy Directionally adjustable antenna
CN1414731A (en) * 2002-04-11 2003-04-30 深圳汇丰信息技术开发有限公司 Dynamic word command identification method and its system
WO2003088571A1 (en) 2002-04-12 2003-10-23 Karbon Systems, Llc System and method for secure wireless communications using pki
US6753825B2 (en) * 2002-04-23 2004-06-22 Broadcom Printed antenna and applications thereof
US7006467B2 (en) 2002-04-29 2006-02-28 Hereuare Communications, Inc. Method and system for simulating multiple independent client devices in a wired or wireless network
ATE380424T1 (en) * 2002-05-01 2007-12-15 Ericsson Telefon Ab L M SYSTEM, APPARATUS AND METHOD FOR SIM BASED AUTHENTICATION AND ENCRYPTION WHEN ACCESSING A WIRELESS LOCAL NETWORK
GB0211644D0 (en) 2002-05-21 2002-07-03 Wesby Philip B System and method for remote asset management
TW557604B (en) 2002-05-23 2003-10-11 Realtek Semiconductor Corp Printed antenna structure
US7026993B2 (en) * 2002-05-24 2006-04-11 Hitachi Cable, Ltd. Planar antenna and array antenna
JP2004064743A (en) * 2002-06-05 2004-02-26 Fujitsu Ltd Adaptive antenna device
JP3835404B2 (en) * 2002-06-24 2006-10-18 株式会社村田製作所 High frequency switch and electronic device using the same
US6753814B2 (en) * 2002-06-27 2004-06-22 Harris Corporation Dipole arrangements using dielectric substrates of meta-materials
US6750813B2 (en) * 2002-07-24 2004-06-15 Mcnc Research & Development Institute Position optimized wireless communication
US20040017860A1 (en) * 2002-07-29 2004-01-29 Jung-Tao Liu Multiple antenna system for varying transmission streams
ES2221535B1 (en) 2002-07-31 2006-03-01 Airtel Movil, S.A. A MOBILE TELEPHONY DEVICE AND A DATA MANAGEMENT METHOD.
US20040097217A1 (en) * 2002-08-06 2004-05-20 Mcclain Fred System and method for providing authentication and authorization utilizing a personal wireless communication device
US7522906B2 (en) 2002-08-09 2009-04-21 Wavelink Corporation Mobile unit configuration management for WLANs
US20040036654A1 (en) * 2002-08-21 2004-02-26 Steve Hsieh Antenna assembly for circuit board
US7234063B1 (en) * 2002-08-27 2007-06-19 Cisco Technology, Inc. Method and apparatus for generating pairwise cryptographic transforms based on group keys
US6941143B2 (en) 2002-08-29 2005-09-06 Thomson Licensing, S.A. Automatic channel selection in a radio access network
US7046989B2 (en) 2002-09-12 2006-05-16 Broadcom Corporation Controlling and enhancing handoff between wireless access points
TW560107B (en) * 2002-09-24 2003-11-01 Gemtek Technology Co Ltd Antenna structure of multi-frequency printed circuit
US6963314B2 (en) * 2002-09-26 2005-11-08 Andrew Corporation Dynamically variable beamwidth and variable azimuth scanning antenna
US7212499B2 (en) * 2002-09-30 2007-05-01 Ipr Licensing, Inc. Method and apparatus for antenna steering for WLAN
US7882346B2 (en) * 2002-10-15 2011-02-01 Qualcomm Incorporated Method and apparatus for providing authentication, authorization and accounting to roaming nodes
JP2004140458A (en) * 2002-10-15 2004-05-13 Toshiba Corp Electronic apparatus having radio communicating function and antenna unit for radio communication
US7562393B2 (en) 2002-10-21 2009-07-14 Alcatel-Lucent Usa Inc. Mobility access gateway
US7705782B2 (en) * 2002-10-23 2010-04-27 Southern Methodist University Microstrip array antenna
US20040121749A1 (en) 2002-11-06 2004-06-24 Engim, Inc. System throughput enhancement using an intelligent channel association in the environment of multiple access channels
US6762723B2 (en) * 2002-11-08 2004-07-13 Motorola, Inc. Wireless communication device having multiband antenna
US20050152305A1 (en) * 2002-11-25 2005-07-14 Fujitsu Limited Apparatus, method, and medium for self-organizing multi-hop wireless access networks
US9237514B2 (en) 2003-02-28 2016-01-12 Apple Inc. System and method for filtering access points presented to a user and locking onto an access point
US6961028B2 (en) 2003-01-17 2005-11-01 Lockheed Martin Corporation Low profile dual frequency dipole antenna structure
US20040153647A1 (en) 2003-01-31 2004-08-05 Rotholtz Ben Aaron Method and process for transmitting video content
JP4214793B2 (en) 2003-02-19 2009-01-28 日本電気株式会社 Wireless communication system, server, base station, mobile terminal, and retransmission timeout time determination method used for them
GB2398707B (en) * 2003-02-21 2005-03-30 Schlumberger Holdings Authentication method for enabling a user of a mobile station to access to private data or services
ITRM20030100A1 (en) 2003-03-06 2004-09-07 Telecom Italia Mobile Spa TECHNIQUE OF MULTIPLE ACCESS TO THE NETWORK BY USER TERMINAL INTERCONNECTED TO A LAN AND RELATED REFERENCE ARCHITECTURE.
US20060179305A1 (en) * 2004-03-11 2006-08-10 Junbiao Zhang WLAN session management techniques with secure rekeying and logoff
KR20060053003A (en) * 2003-03-14 2006-05-19 톰슨 라이센싱 Wlan session management techniques with secure rekeying and logoff
US7269174B2 (en) 2003-03-28 2007-09-11 Modular Mining Systems, Inc. Dynamic wireless network
BRPI0409352A (en) 2003-04-15 2006-04-25 Thomson Licensing techniques for providing continuous access to business hot spots for both guest users and local users
US7142851B2 (en) 2003-04-28 2006-11-28 Thomson Licensing Technique for secure wireless LAN access
JP2004343448A (en) 2003-05-15 2004-12-02 Matsushita Electric Ind Co Ltd Authentication system for wireless lan access
US7421578B1 (en) * 2003-07-22 2008-09-02 Cisco Technology, Inc. Method and apparatus for electing a leader node in a computer network
US20050042988A1 (en) * 2003-08-18 2005-02-24 Alcatel Combined open and closed loop transmission diversity system
US7185204B2 (en) 2003-08-28 2007-02-27 International Business Machines Corporation Method and system for privacy in public networks
JP2005078493A (en) * 2003-09-02 2005-03-24 Renesas Technology Corp Microcomputer
US20060016815A1 (en) * 2003-11-03 2006-01-26 Hajo Rieck Anti rotation bead
US20050100166A1 (en) * 2003-11-10 2005-05-12 Parc Inc. Systems and methods for authenticating communications in a network medium
US7239696B2 (en) 2003-12-15 2007-07-03 International Business Machines Corporation Automatic reset for DSL lines
US20050138137A1 (en) * 2003-12-19 2005-06-23 Microsoft Corporation Using parameterized URLs for retrieving resource content items
US7668939B2 (en) * 2003-12-19 2010-02-23 Microsoft Corporation Routing of resource information in a network
US7292870B2 (en) 2003-12-24 2007-11-06 Zipit Wireless, Inc. Instant messaging terminal adapted for Wi-Fi access points
DE10361634A1 (en) * 2003-12-30 2005-08-04 Advanced Micro Devices, Inc., Sunnyvale Powerful low-cost monopole antenna for radio applications
US7860978B2 (en) 2004-01-22 2010-12-28 Toshiba America Research, Inc. Establishing a secure tunnel to access router
US7440764B2 (en) 2004-02-12 2008-10-21 Motorola, Inc. Method and apparatus for improving throughput in a wireless local area network
US7197502B2 (en) 2004-02-18 2007-03-27 Friendly Polynomials, Inc. Machine-implemented activity management system using asynchronously shared activity data objects and journal data items
US7600113B2 (en) 2004-02-20 2009-10-06 Microsoft Corporation Secure network channel
US7477894B1 (en) 2004-02-23 2009-01-13 Foundry Networks, Inc. Methods and apparatus for handling wireless roaming among and across wireless area networks
US7565529B2 (en) * 2004-03-04 2009-07-21 Directpointe, Inc. Secure authentication and network management system for wireless LAN applications
EP1724691A1 (en) 2004-03-08 2006-11-22 Global Friendship Inc. Electronic terminal device protection system
KR20050097674A (en) 2004-04-02 2005-10-10 삼성전자주식회사 Internet connection service method of mobile node and system thereof
CN100413368C (en) * 2004-04-23 2008-08-20 华为技术有限公司 A method for verifying user card validity
WO2005107137A2 (en) 2004-04-23 2005-11-10 Passmark Security, Inc. Method and apparatus for authenticating users using two or more factors
US20050250472A1 (en) 2004-05-04 2005-11-10 Silvester Kelan C User authentication using a wireless device
US20050261970A1 (en) 2004-05-21 2005-11-24 Wayport, Inc. Method for providing wireless services
US7043277B1 (en) * 2004-05-27 2006-05-09 Autocell Laboratories, Inc. Automatically populated display regions for discovered access points and stations in a user interface representing a wireless communication network deployed in a physical environment
CN100438681C (en) 2004-06-04 2008-11-26 上海环达计算机科技有限公司 Identification method and system for mobile equipment
JP2005354249A (en) 2004-06-09 2005-12-22 Matsushita Electric Ind Co Ltd Network communication terminal
JP4095585B2 (en) 2004-06-17 2008-06-04 株式会社東芝 Wireless communication method, wireless communication device, and wireless communication system
JP2006050267A (en) 2004-08-04 2006-02-16 Matsushita Electric Ind Co Ltd IPsec COMMUNICATION METHOD, COMMUNICATION CONTROLLER AND NETWORK CAMERA
JP2006060408A (en) 2004-08-18 2006-03-02 Nippon Telegr & Teleph Corp <Ntt> Radio packet communication method and radio station
US20060080415A1 (en) * 2004-08-27 2006-04-13 Tu Edgar A Methods and apparatuses for automatically synchronizing a profile across multiple devices
US7355998B2 (en) * 2004-09-01 2008-04-08 Interdigital Technology Corporation Support for multiple access point switched beam antennas
EP1638261A1 (en) 2004-09-16 2006-03-22 Matsushita Electric Industrial Co., Ltd. Configuring connection parameters in a handover between access networks
EP1814057A4 (en) * 2004-10-08 2009-07-01 Panasonic Corp Authentication system
US7263076B1 (en) * 2004-10-09 2007-08-28 Radiuz Networks Llc System and method for managing a wireless network community
US7644272B2 (en) * 2004-10-22 2010-01-05 Broadcom Corporation Systems and methods for providing security to different functions
US20060089123A1 (en) * 2004-10-22 2006-04-27 Frank Edward H Use of information on smartcards for authentication and encryption
US7606187B2 (en) * 2004-10-28 2009-10-20 Meshnetworks, Inc. System and method to support multicast routing in large scale wireless mesh networks
US7512379B2 (en) * 2004-10-29 2009-03-31 Hien Nguyen Wireless access point (AP) automatic channel selection
US8272874B2 (en) 2004-11-22 2012-09-25 Bravobrava L.L.C. System and method for assisting language learning
US20060123455A1 (en) * 2004-12-02 2006-06-08 Microsoft Corporation Personal media channel
US8913625B2 (en) 2004-12-17 2014-12-16 Verizon Patent And Licensing Inc. System and method for providing service-agnostic network resources
US8885539B2 (en) 2005-01-26 2014-11-11 Hewlett-Packard Development Company, L.P. Configurable quality-of-service support per virtual access point (VAP) in a wireless LAN (WLAN) access device
US7640329B2 (en) 2005-02-15 2009-12-29 Microsoft Corporation Scaling and extending UPnP v1.0 device discovery using peer groups
US7647394B2 (en) 2005-02-15 2010-01-12 Microsoft Corporation Scaling UPnP v1.0 device eventing using peer groups
TWI262342B (en) 2005-02-18 2006-09-21 Au Optronics Corp Device for fastening lighting unit in backlight module
TWI275810B (en) 2005-03-02 2007-03-11 Askey Computer Corp Inspection system of cable modem
US8725138B2 (en) 2005-03-30 2014-05-13 Alcatel Lucent Methods for network selection and discovery of service information in public wireless hotspots
US20060225107A1 (en) 2005-04-01 2006-10-05 Microsoft Corporation System for running applications in a resource-constrained set-top box environment
US7761601B2 (en) 2005-04-01 2010-07-20 Microsoft Corporation Strategies for transforming markup content to code-bearing content for consumption by a receiving device
US8532304B2 (en) 2005-04-04 2013-09-10 Nokia Corporation Administration of wireless local area networks
US7636300B2 (en) 2005-04-07 2009-12-22 Microsoft Corporation Phone-based remote media system interaction
US7562385B2 (en) * 2005-04-20 2009-07-14 Fuji Xerox Co., Ltd. Systems and methods for dynamic authentication using physical keys
TWI274511B (en) 2005-04-25 2007-02-21 Benq Corp Channel selection method over WLAN
US7505434B1 (en) 2005-06-23 2009-03-17 Autocell Laboratories, Inc. VLAN tagging in WLANs
US7427941B2 (en) * 2005-07-01 2008-09-23 Microsoft Corporation State-sensitive navigation aid
FI120254B (en) * 2005-07-07 2009-08-31 Nixu Oy A method of storing a training performance for a user of an exercise device as well as an exercise device
US7599300B2 (en) 2005-08-31 2009-10-06 Time Warner Cable, Inc. Cable modem analysis system and method therefor for an HFC cable network
US20070055752A1 (en) 2005-09-08 2007-03-08 Fiberlink Dynamic network connection based on compliance
US9167053B2 (en) 2005-09-29 2015-10-20 Ipass Inc. Advanced network characterization
US20080119165A1 (en) * 2005-10-03 2008-05-22 Ajay Mittal Call routing via recipient authentication
US7512677B2 (en) 2005-10-20 2009-03-31 Uplogix, Inc. Non-centralized network device management using console communications system and method
CN101322346A (en) 2005-12-01 2008-12-10 鲁库斯无线公司 On-demand services by wireless base station virtualization
US20070130294A1 (en) 2005-12-02 2007-06-07 Leo Nishio Methods and apparatus for communicating with autonomous devices via a wide area network
US7613482B2 (en) * 2005-12-08 2009-11-03 Accton Technology Corporation Method and system for steering antenna beam
US8005459B2 (en) * 2005-12-16 2011-08-23 Research In Motion Limited System and method of authenticating login credentials in a wireless communication system
US8091120B2 (en) * 2005-12-21 2012-01-03 At&T Intellectual Property I, L.P. Adaptive authentication methods, systems, devices, and computer program products
EP1802155A1 (en) * 2005-12-21 2007-06-27 Cronto Limited System and method for dynamic multifactor authentication
US20070150736A1 (en) * 2005-12-22 2007-06-28 Cukier Johnas I Token-enabled authentication for securing mobile devices
WO2007071009A1 (en) 2005-12-23 2007-06-28 Bce Inc. Wireless device authentication between different networks
US20070165582A1 (en) * 2006-01-18 2007-07-19 Puneet Batta System and method for authenticating a wireless computing device
US7886346B2 (en) * 2006-02-13 2011-02-08 Vmware, Inc. Flexible and adjustable authentication in cyberspace
CN1859098A (en) * 2006-03-08 2006-11-08 华为技术有限公司 Method for realizing EAP identification relay in radio cut-in system
US7873573B2 (en) 2006-03-30 2011-01-18 Obopay, Inc. Virtual pooled account for mobile banking
WO2007127120A2 (en) 2006-04-24 2007-11-08 Ruckus Wireless, Inc. Dynamic authentication in secured wireless networks
US9071583B2 (en) 2006-04-24 2015-06-30 Ruckus Wireless, Inc. Provisioned configuration for automatic wireless connection
US8260278B2 (en) 2006-05-12 2012-09-04 The Mitre Corporation Framework for agile mobile applications
JP4684946B2 (en) 2006-05-30 2011-05-18 株式会社日立産機システム Monitoring device
US7881474B2 (en) 2006-07-17 2011-02-01 Nortel Networks Limited System and method for secure wireless multi-hop network formation
US8549588B2 (en) 2006-09-06 2013-10-01 Devicescape Software, Inc. Systems and methods for obtaining network access
US9326138B2 (en) 2006-09-06 2016-04-26 Devicescape Software, Inc. Systems and methods for determining location over a network
US8743778B2 (en) 2006-09-06 2014-06-03 Devicescape Software, Inc. Systems and methods for obtaining network credentials
EP2070252A2 (en) 2006-09-21 2009-06-17 InterDigital Technology Corporation Group-wise secret key generation
JP2008088633A (en) 2006-09-29 2008-04-17 Taiheiyo Cement Corp Burying type form made of polymer cement mortar
US8108904B1 (en) 2006-09-29 2012-01-31 Juniper Networks, Inc. Selective persistent storage of controller information
TWI327036B (en) 2006-10-05 2010-07-01 Ind Tech Res Inst Load balancing apparatus and method in wireless network hotspots
US7599380B2 (en) 2006-10-13 2009-10-06 Cox Communications, Inc. Resetting a multimedia terminal adapter
US8060916B2 (en) 2006-11-06 2011-11-15 Symantec Corporation System and method for website authentication using a shared secret
US8645948B2 (en) 2006-12-12 2014-02-04 Qualcomm Incorporated Apparatus and methods for client-driven server-side installation
EP2208311B1 (en) 2007-06-19 2012-08-22 Sand Holdings, LLC An autonomous, automatic-reset/restore client and a monitoring system
US8463238B2 (en) 2007-06-28 2013-06-11 Apple Inc. Mobile device base station
JP4881813B2 (en) 2007-08-10 2012-02-22 キヤノン株式会社 COMMUNICATION DEVICE, COMMUNICATION DEVICE COMMUNICATION METHOD, PROGRAM, AND STORAGE MEDIUM
US7941663B2 (en) 2007-10-23 2011-05-10 Futurewei Technologies, Inc. Authentication of 6LoWPAN nodes using EAP-GPSK
US8347355B2 (en) 2008-01-17 2013-01-01 Aerohive Networks, Inc. Networking as a service: delivering network services using remote appliances controlled via a hosted, multi-tenant management system
US8326958B1 (en) 2009-01-28 2012-12-04 Headwater Partners I, Llc Service activation tracking system
US8351898B2 (en) 2009-01-28 2013-01-08 Headwater Partners I Llc Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US8732451B2 (en) 2009-05-20 2014-05-20 Microsoft Corporation Portable secure computing network
US20110035624A1 (en) 2009-08-07 2011-02-10 Green Networks, Inc. Intelligent power control
JP5053424B2 (en) 2010-07-29 2012-10-17 株式会社バッファロー RELAY DEVICE, WIRELESS COMMUNICATION DEVICE, NETWORK SYSTEM, PROGRAM, AND METHOD
JP5348094B2 (en) 2010-08-31 2013-11-20 ブラザー工業株式会社 Support device and computer program
US8918393B2 (en) 2010-09-29 2014-12-23 International Business Machines Corporation Identifying a set of candidate entities for an identity record
US8699379B2 (en) 2011-04-08 2014-04-15 Blackberry Limited Configuring mobile station according to type of wireless local area network (WLAN) deployment
WO2012151224A2 (en) 2011-05-01 2012-11-08 Ruckus Wireless, Inc. Remote cable access point reset
US20120284785A1 (en) 2011-05-05 2012-11-08 Motorola Mobility, Inc. Method for facilitating access to a first access nework of a wireless communication system, wireless communication device, and wireless communication system
US8590023B2 (en) 2011-06-30 2013-11-19 Intel Corporation Mobile device and method for automatic connectivity, data offloading and roaming between networks
US9220065B2 (en) 2012-01-16 2015-12-22 Smith Micro Software, Inc. Enabling a mobile broadband hotspot by an auxiliary radio
US8756668B2 (en) 2012-02-09 2014-06-17 Ruckus Wireless, Inc. Dynamic PSK for hotspots
US9092610B2 (en) 2012-04-04 2015-07-28 Ruckus Wireless, Inc. Key assignment for a brand
US9258704B2 (en) 2012-06-27 2016-02-09 Advanced Messaging Technologies, Inc. Facilitating network login

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050228874A1 (en) 2004-04-08 2005-10-13 Edgett Jeff S Method and system for verifying and updating the configuration of an access device during authentication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2014067A4

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8923265B2 (en) 2005-12-01 2014-12-30 Ruckus Wireless, Inc. On-demand services by wireless base station virtualization
US9071583B2 (en) 2006-04-24 2015-06-30 Ruckus Wireless, Inc. Provisioned configuration for automatic wireless connection
US9769655B2 (en) 2006-04-24 2017-09-19 Ruckus Wireless, Inc. Sharing security keys with headless devices
US9179399B2 (en) 2008-05-12 2015-11-03 Blackberry Limited Methods and apparatus for use in facilitating access to a communication service via a WLAN hotspot
US9888437B2 (en) 2008-05-12 2018-02-06 Blackberry Limited Methods and apparatus for use in facilitating access to a communication service via a WLAN hotspot
US10477468B2 (en) 2008-05-12 2019-11-12 Blackberry Limited Methods and apparatus for use in facilitating access to a communication service via a WLAN hotspot
US9792188B2 (en) 2011-05-01 2017-10-17 Ruckus Wireless, Inc. Remote cable access point reset
US10182350B2 (en) 2012-04-04 2019-01-15 Arris Enterprises Llc Key assignment for a brand
US10952263B2 (en) 2016-12-30 2021-03-16 British Telecommunications Public Limited Company Automatic device pairing
US11190942B2 (en) 2016-12-30 2021-11-30 British Telecommunications Public Limited Company Automatic pairing of devices to wireless networks
US11418959B2 (en) 2016-12-30 2022-08-16 British Telecommunications Public Limited Company Automatic pairing of devices to wireless networks

Also Published As

Publication number Publication date
WO2007127120A3 (en) 2008-05-08
EP2014067B1 (en) 2019-10-02
EP2013758B1 (en) 2016-08-03
US7788703B2 (en) 2010-08-31
US20120317625A1 (en) 2012-12-13
US8607315B2 (en) 2013-12-10
US7669232B2 (en) 2010-02-23
EP2014067A2 (en) 2009-01-14
EP2013758A4 (en) 2012-01-25
US20140068724A1 (en) 2014-03-06
US20070249324A1 (en) 2007-10-25
US9131378B2 (en) 2015-09-08
CN103441984A (en) 2013-12-11
US20110055898A1 (en) 2011-03-03
US8272036B2 (en) 2012-09-18
CN103441984B (en) 2017-09-05
WO2007127162A8 (en) 2008-09-18
WO2007127120A2 (en) 2007-11-08
EP2014067A4 (en) 2010-01-06
US20090092255A1 (en) 2009-04-09
EP2013758A2 (en) 2009-01-14
WO2007127162A3 (en) 2008-11-20

Similar Documents

Publication Publication Date Title
EP2014067B1 (en) Provisioned configuration for automatic wireless connection
US9071583B2 (en) Provisioned configuration for automatic wireless connection
US9769655B2 (en) Sharing security keys with headless devices
US8839354B2 (en) Mobile enterprise server and client device interaction
RU2523113C1 (en) System and method for target installation of configured software
US8474031B2 (en) Access control method and apparatus
EP2063378B1 (en) Telecommunications device security
US20140109179A1 (en) Multiple server access management
US20050254652A1 (en) Automated network security system and method
US20070266421A1 (en) System, method and computer program product for centrally managing policies assignable to a plurality of portable end-point security devices over a network
EP3930289B1 (en) Associating user accounts with enterprise workspaces
US9081982B2 (en) Authorized data access based on the rights of a user and a location
JPWO2006040806A1 (en) Encryption key distribution system
CN101669128A (en) Cascading authentication system
KR101133210B1 (en) Mobile Authentication System and Central Control System
US20230079795A1 (en) Device to device migration in a unified endpoint management system
US10412097B1 (en) Method and system for providing distributed authentication
CN101455063B (en) Provisioned configuration for automatic wireless connection
CN114363892B (en) Back-clip peripheral distribution and authentication system and method based on mobile intelligent terminal

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200780019074.8

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07755913

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2007755913

Country of ref document: EP