Proxy authentication for tethered devices
First Claim
Patent Images
1. A method for performing a proxy authentication of a device tethered to a wireless unit, comprising:
- intercepting a challenge directed to the tethered device;
generating an appropriate response to the challenge without waiting for input from the tethered device;
forwarding the challenge to the tethered device; and
ignoring a challenge response received from the tethered device.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus are presented herein for allowing a wireless communication device to perform a proxy authentication on behalf of a tethered device.
-
Citations
8 Claims
-
1. A method for performing a proxy authentication of a device tethered to a wireless unit, comprising:
-
intercepting a challenge directed to the tethered device;
generating an appropriate response to the challenge without waiting for input from the tethered device;
forwarding the challenge to the tethered device; and
ignoring a challenge response received from the tethered device. - View Dependent Claims (2, 3, 4)
-
-
5. Apparatus within a wireless unit for performing a proxy authentication of a device tethered to the wireless unit, comprising:
-
at least one memory element; and
at least one processing element configured to execute a set of instructions stored upon the at least one memory element, the set of instructions for;
intercepting a challenge directed to the tethered device;
generating an appropriate response to the challenge without waiting for input from the tethered device;
forwarding the challenge to the tethered device; and
ignoring a challenge response received from the tethered device.
-
-
6. Apparatus for performing a proxy authentication of a device tethered to a wireless unit, comprising:
-
means for intercepting a challenge directed to the tethered device;
means for generating an appropriate response to the challenge without waiting for input from the tethered device;
means for forwarding the challenge to the tethered device; and
means for determining to ignore a challenge response received from the tethered device.
-
-
7. A method for performing a proxy authentication of a device tethered to a wireless unit, comprising:
-
intercepting a challenge directed to the tethered device;
forwarding the challenge to the tethered device;
generating an appropriate response to the challenge without waiting for input from the tethered device; and
ignoring a challenge response received from the tethered device.
-
-
8. Apparatus within a wireless unit for performing a proxy authentication of a device tethered to the wireless unit, comprising:
-
at least one memory element; and
at least one processing element configured to execute a set of instructions stored, upon the at least one memory element, the set of instructions for;
intercepting a challenge directed to the tethered device;
forwarding the challenge to the tethered device;
generating an appropriate response to the challenge without waiting for input from the tethered device; and
ignoring a challenge response received from the tethered device.
-
Specification