Technique for secure wireless LAN access
First Claim
1. A method for enabling a mobile communications device to securely access a wireless Local Area Network (LAN), comprising the steps of:
- receiving in the wireless LAN a request for access from the mobile communications device;
authenticating the mobile communications device;
establishing for the mobile communications device an encryption key;
notifying the mobile communications device to invoke a user-executable program, which upon execution, configures the device with the encryption key so that communications traffic originated by the mobile communications device becomes encrypted with the encryption key.
2 Assignments
0 Petitions
Accused Products
Abstract
An access arrangement (11) provides secure access by at least one mobile communications device (121-123) by first authenticating the device itself, and thereafter authenticating the traffic therefrom. To authenticate the traffic from the mobile communications device, an authentication server (24) associated with the access arrangement (11) establishes a Wired Equivalent Privacy (WEP) encryption key for both the access arrangement and the mobile communications device. The authentication server provides the WEP encryption key to the device in connection with a command to cause the device to execute a resident ActiveX control to encrypt traffic with the WEP encryption key. Utilizing the Active X control within the mobile communications device to encrypt traffic with the WEP encryption key provides a simple, easy-to-implement method to achieve secure access.
-
Citations
18 Claims
-
1. A method for enabling a mobile communications device to securely access a wireless Local Area Network (LAN), comprising the steps of:
-
receiving in the wireless LAN a request for access from the mobile communications device;
authenticating the mobile communications device;
establishing for the mobile communications device an encryption key;
notifying the mobile communications device to invoke a user-executable program, which upon execution, configures the device with the encryption key so that communications traffic originated by the mobile communications device becomes encrypted with the encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for enabling a mobile communications device to securely access a wireless LAN, comprising the steps of:
-
receiving in the wireless LAN a request for access from a mobile communications device;
authenticating the mobile communications device upon the receipt therefrom of user credentials;
establishing for the mobile communications device a Wired Equivalent Privacy encryption key;
sending a command together with Wired Equivalent Privacy encryption key to the mobile communications device, the command causing the device to invoke an ActiveX control to configure the device with the Wired Equivalent Privacy encryption key so that communications traffic originated by the mobile communications device becomes encrypted. - View Dependent Claims (10, 11)
-
-
12. A wireless Local Area Network (LAN) for providing secure access to at least one mobile communications device, comprising:
-
at least one access point for receiving an access request from a mobile communications device;
an authenticating server for;
(1) authenticating the mobile communications device, (2) establishing for the mobile communications device an encryption key, and (3) notifying the mobile communications device to invoke a user-executable program, which upon execution, configures the device with the encryption key so that communications traffic originated by the mobile communications device becomes encrypted with the encryption key; and
a core network for linking the access point and the authenticating server. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. In a wireless Local Area Network (LAN) for providing secure access to at least one mobile communications device,
at least one access point for: - (1) receiving an access request from a mobile communications device;
(2) authenticating the mobile communications device, (3) establishing for the mobile communications device an encryption key, and (4) notifying the mobile communications device to invoke a user-executable program, which upon execution, configures the device with the encryption key so that communications traffic originated by the mobile communications device becomes encrypted with the encryption key
- (1) receiving an access request from a mobile communications device;
Specification