scispace - formally typeset
Search or ask a question
Patent

Providing secure authentication data in a wireless network

11 May 2005-
TL;DR: In this paper, the authors combine both an "Open Security" and "closed Security" model to increase the security of an insecure network (e.g., WLANs).
Abstract: The present invention seeks to combine both an "open security" and "closed security" model to increase the security of an insecure network (e.g. WLANs). An "open security" model which allows a user to access the infrastructure before authentication occurs, which may take the form of a password and username, for example, is insecure as there is no access control on data entering the network. A "closed security" model however works at the radio level to restrict access to the network infrastructure until a successful authentication exchange has been carried out. A user can be connected to a "closed security" model network without their knowledge which is not necessarily desirable. Therefore, by combining both models the security of a network is improved.
Citations
More filters
Patent
07 Apr 2009
TL;DR: In this article, a method and system for authenticating a mobile network node (10) in a wireless Local Area Network WLAN (WLAN) is presented, where the mobile node requests access to the WLAN at an access point (20) at a closed first network region Walled Garden, before authentication all network protocol layers up to the Layer 3 protocol layer L3 are set up.
Abstract: The invention relates to a method and system for authenticating a mobile network node (10) in a Wireless Local Area Network WLAN (31), wherein the mobile network node (10) requests access to the WLAN (31) at an access point (20). Within a closed first network region Walled Garden (32), before authentication all network protocol layers up to the Layer 3 protocol layer L3 are set up. An authenticator (42) based on Extensible Authentication Protocol EAP is generated on the Web server (23) as captive portal and the Layer 3 protocol layer between the authenticator (42) and the mobile network node (10) comprising an EAP peer (41) is extended bidirectionally by means of a defined bit sequence. In case of an access request, the Web server (23) transmits an authentication stimulus to the mobile node (10) by encoding an EAP message request and transmitting it in the Layer 3 protocol layer by means of the defined bit sequence. The mobile node (20) decodes the EAP message request and transmits, in the Layer 3 protocol layer, by means of the defined bit sequence, an encoded EAP response message to the authenticator, the EAP response message comprises authentication data of the mobile network node (10). The Web server (23) decodes the EAP response message from the bit sequence, transmits it to an AAA server (22) including an EAP server (43) by means of an authentication inquiry. On the basis of an authentication response by the AAA Server (22), access is enabled to a second network region (30) for use by the mobile network node (10) by means of a Network Access Server (24).

49 citations

Patent
Susan A. Cannon1, Kevin Lewis1
28 Aug 2006
TL;DR: In this article, a method for interacting with a memory device is provided, where a cryptographic communication application is registered to be associated with a protocol type in a web browser and a message encapsulated in the protocol type from the web browser is received and thereafter transmitted to the memory device.
Abstract: A method for interacting with a memory device is provided. In this method, a cryptographic communication application is registered to be associated with a protocol type in a web browser. A message encapsulated in the protocol type from the web browser is received and thereafter transmitted to the memory device. Here, the message is associated with a cryptographic operation.

23 citations

Patent
13 May 2015
TL;DR: In this paper, a master wireless access point (mAP) connected to one or more slave access points (sAPs), the mAP configured to configure the wireless access password of the sAP(s) and including an open user interface wirelessly accessible by a wireless device, a security gateway and a secure user interface wired by the wireless device.
Abstract: A network system includes a master wireless access point (mAP) connected to one or more slave access points (sAPs), the mAP configured to configure the wireless access password of the sAP(s) and including an open user interface wirelessly accessible by a wireless device, a security gateway and a secure user interface wirelessly accessible by the wireless device. The wireless device connects to the mAP via the open user interface and exchanges security credentials to bypass the security gateway to gain access to the secure user interface. The wireless device is connected to the secure user interface, the mAP is configured to: configure an SSID and/or wireless access password for a sAP and to share the SSID and/or wireless access password with the wireless device, whereupon, the wireless device disconnects from the mAP and re-connects to the network via the sAP using the wireless access password configured by the mAP.

9 citations

Patent
26 Dec 2006
TL;DR: In this article, a base station device and a call connection method for reducing the call connection delay is described. But the authors do not specify the radio resource information required for a service desired by the terminal.
Abstract: Disclosed are a base station device and a call connection method for reducing a call connection delay. According to the device and the method; in ST301, a terminal acquires an identifier managed in a base station (100); in ST302, radio resource information required for a service desired by the terminal is decided; in ST303, by using the identifier acquired in ST301, the terminal transmits a request for establishing RRC connection to the base station (100). In ST304, according to the radio resource information received from the terminal, the base station (100) decides the radio resource to be set for the terminal before authentication by an upper layer node, and the base station (100) extracts information destined to the upper layer node. In ST305, the information destined to the upper layer node is transmitted to the upper layer node. In ST306, the setting contents of the radio resource decided in ST304 are transmitted to the terminal.

3 citations

Patent
Susan A. Cannon1, Kevin Lewis1
14 Apr 2010
TL;DR: In this paper, a method for interacting with a memory device is provided, where a cryptographic communication application is registered to be associated with a protocol type in a web browser and a message encapsulated in the protocol type from the web browser is received and thereafter transmitted to the memory device.
Abstract: A method for interacting with a memory device is provided. In this method, a cryptographic communication application is registered to be associated with a protocol type in a web browser. A message encapsulated in the protocol type from the web browser is received and thereafter transmitted to the memory device. Here, the message is associated with a cryptographic operation.

2 citations

References
More filters
Patent
14 Feb 2003
TL;DR: In this paper, an access point completes authenticating a terminal using an authenticated MAC-ID and a user inputs a password to a password authentication client, and authentication between the password authentication clients and an authenticated server is performed based on the input password.
Abstract: A network access controlling method in a wireless environment is provided. In this method, first, an access point completes authenticating a terminal using an MAC-ID. Next, a user inputs a password to a password authentication client. Then, authentication between the password authentication client and an authentication server is performed based on the input password. Thereafter, the terminal accesses an external/internal network (e.g., Internet/Intranet) if the authentication of terminal and the authentication based on the password are approved. Otherwise, the terminal transmits an authentication failure message to the user.

24 citations