Automated network security system and method
First Claim
1. In a wireless network comprising a server and server software including an intelligent software agent, a method of automatically providing a secure connection between the wireless network and a user-operated device seeking access to the wireless network, the method comprising:
- in response to an initial request for access to the wireless network by the device—
(a) automatically installing the software agent on the device;
(b) executing the software agent on the device to gather information from the requesting device, including device information and user authentication information;
(c) transmitting the device identification and user authentication information to the server; and
(d) verifying the device identification and user authentication information;
wherein when successfully verified, storing the identification and authentication information on an authorized access list, providing a unique encryption key to the device for storage thereon and granting the requesting device access to the wireless network; and
when unsuccessfully verified, storing the identification and authentication information on an unauthorized access list and denying the device access to the wireless network.
0 Assignments
0 Petitions
Accused Products
Abstract
A method is presented for automatically providing a secure connection between a wireless network including a server and server software installed thereon and a device seeking access to the wireless network. In response to an initial request for access to the wireless network by the device, a software agent is installed on the device which gathers identification information from the device and prompts the user to provide authentication information which is transmitted to the server. If successfully verified, the server stores the identification and authentication information in an authorized access list, provides a unique encryption key to the requesting device and grants the authenticated user and identified device access to the wireless network. The method also includes procedures for when authentication fails and for granting subsequent access to an authenticated device and user.
-
Citations
12 Claims
-
1. In a wireless network comprising a server and server software including an intelligent software agent, a method of automatically providing a secure connection between the wireless network and a user-operated device seeking access to the wireless network, the method comprising:
-
in response to an initial request for access to the wireless network by the device— (a) automatically installing the software agent on the device;
(b) executing the software agent on the device to gather information from the requesting device, including device information and user authentication information;
(c) transmitting the device identification and user authentication information to the server; and
(d) verifying the device identification and user authentication information;
wherein when successfully verified, storing the identification and authentication information on an authorized access list, providing a unique encryption key to the device for storage thereon and granting the requesting device access to the wireless network; and
when unsuccessfully verified, storing the identification and authentication information on an unauthorized access list and denying the device access to the wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification