Wireless service points having unique identifiers for secure communication
First Claim
1. A method for providing access to resources via a secure wireless communication network, comprising:
- providing a Service Point Network (SPN) comprising a plurality of Service Points;
as each of the Service Points joins the SPN, dynamically assigning an SPN-unique identifier to the Service Point;
connecting each of a plurality of Utilizing Devices to a corresponding one or more of the Service Points;
providing first and second Utilizing Devices with access to each other via secure communication through the SPN between the corresponding Service Points, said secure communication based at least partly on the unique identifiers of the first and second Utilizing Devices.
11 Assignments
0 Petitions
Accused Products
Abstract
System, apparatus, and methods are disclosed wherewith a group of independent wireless routing devices known as Service Points work cooperatively to form an ad hoc mesh communication network. The resulting Service Point Network is used to provide reliable address-directed communication services between devices attached by conventional means (wired or wireless) to respective Service Ports on any of the Service Points. Attached Utilizing Devices are not considered a part of the Service Point Network and need not contain any custom software or hardware related to the operations of the Service Point Network. Consequently, the networking technology used to form the Service Point Network is independent of the technology used for connecting devices to Service Points. Services for Utilizing Devices include both point-to-point as well as point-to-multi-point communication. To protect the security of network communications and the integrity of the network, the Service Points are assigned internal IP addresses and unique identifiers that need not be disclosed to the Utilizing Devices. The unique identifiers in turn are used to derive public and private encryption key pairs for each Service Point.
86 Citations
14 Claims
-
1. A method for providing access to resources via a secure wireless communication network, comprising:
-
providing a Service Point Network (SPN) comprising a plurality of Service Points;
as each of the Service Points joins the SPN, dynamically assigning an SPN-unique identifier to the Service Point;
connecting each of a plurality of Utilizing Devices to a corresponding one or more of the Service Points;
providing first and second Utilizing Devices with access to each other via secure communication through the SPN between the corresponding Service Points, said secure communication based at least partly on the unique identifiers of the first and second Utilizing Devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for providing access to resources via a secure wireless communication network, comprising:
-
providing a Service Point Network (SPN) comprising a plurality of Service Points;
assigning an internal SPN-unique identifier to the Service Point;
connecting each of a plurality of Utilizing Devices to a corresponding one or more of the Service Points, without revealing the internal identifiers of the Service Points to the Utilizing Devices;
providing first and second Utilizing Devices with access to each other via secure communication through the SPN between the corresponding Service Points, said secure communication based at least partly on the unique identifiers of the first and second Utilizing Devices.
-
-
13. A method for providing access to resources via a secure wireless communication network, comprising:
-
providing a Service Point Network (SPN) comprising a plurality of Service Points;
connecting each of a plurality of Utilizing Devices to a corresponding one or more of the Service Points;
providing first and second of the Utilizing Devices with access to each other via secure communication through the SPN between an Entry Service Point connected to the first Utilizing Device and a Terminal Service Point connected to the second Utilizing Device; and
encrypting said secure communication at the Entry Service Point, in such a manner that the communication can only be decrypted by the Terminal Service Point. - View Dependent Claims (14)
-
Specification