PROXY-ENCRYPTED AUTHENTICATION FOR TETHERED DEVICES
First Claim
Patent Images
1. A method for enforcing encrypted proxy authentication of terminal equipment coupled to a wireless unit, comprising:
- intercepting in the wireless unit a link control protocol configuration request message directed to the terminal equipment;
determining if an authentication protocol indicated in the link control protocol configuration request message is unacceptable to the wireless unit;
generating in the wireless unit an appropriate response to the link control protocol configuration request message if the indicated authentication protocol is unacceptable to the wireless unit.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus are presented herein for allowing a wireless communication device to perform a proxy authentication on behalf of a tethered device and ensure the authentication is encrypted.
-
Citations
39 Claims
-
1. A method for enforcing encrypted proxy authentication of terminal equipment coupled to a wireless unit, comprising:
-
intercepting in the wireless unit a link control protocol configuration request message directed to the terminal equipment;
determining if an authentication protocol indicated in the link control protocol configuration request message is unacceptable to the wireless unit;
generating in the wireless unit an appropriate response to the link control protocol configuration request message if the indicated authentication protocol is unacceptable to the wireless unit. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus within a wireless unit for performing a proxy encrypted authentication of terminal equipment coupled to the wireless unit, comprising:
-
at least one memory element; and
at least one processing element configured to execute a set of instructions stored upon the at least one memory element, the set of instructions for;
intercepting in the wireless unit a link control protocol configuration request message directed to the terminal equipment;
determining if an authentication protocol indicated in the link control protocol configuration request message is unacceptable to the wireless unit;
generating in the wireless unit an appropriate response to the link control protocol configuration request message if the indicated authentication protocol is unacceptable to the wireless unit. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. Apparatus for performing a proxy authentication of terminal equipment coupled to a wireless unit, comprising:
-
means for intercepting in the wireless unit a link control protocol configuration request message directed to the terminal equipment;
means for determining if an authentication protocol indicated in the link control protocol configuration request message is unacceptable to the wireless unit;
means for generating in the wireless unit an appropriate response to the link control protocol configuration request message if the indicated authentication protocol is unacceptable to the wireless unit. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A processor readable memory unit having stored thereon processor executable instructions configured to cause a processor to perform steps comprising:
-
intercepting in the wireless unit a link control protocol configuration request message directed to the terminal equipment;
determining if an authentication protocol indicated in the link control protocol configuration request message is unacceptable to the wireless unit;
generating in the wireless unit an appropriate response to the link control protocol configuration request message if the indicated authentication protocol is unacceptable to the wireless unit. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. A method for negotiating encrypted proxy authentication of terminal equipment coupled to a wireless unit, comprising:
-
intercepting in the wireless unit a link control protocol message directed to the terminal equipment;
determining if an authentication protocol value in the link control protocol message indicates an authentication protocol that is unacceptable to the wireless unit;
generating in the wireless unit an appropriate response to the link control protocol message;
forwarding a challenge message to the terminal equipment; and
ignoring a challenge response received from the terminal equipment. - View Dependent Claims (30, 31, 32, 33)
-
-
34. A method for performing a proxy encrypted authentication of a device tethered to a wireless unit, comprising:
-
intercepting a link control protocol configuration request directed to the tethered device;
determining if an authentication protocol value in the configuration request is acceptable;
generating an appropriate response to the link control protocol configuration request without forwarding the link control protocol configuration request to the tethered device;
intercepting a challenge directed to the tethered device;
generating an appropriate response to the challenge without waiting for input from the tethered device;
forwarding the challenge to the tethered device; and
ignoring a challenge response received from the tethered device. - View Dependent Claims (35, 36, 37)
-
-
38. An apparatus within a wireless unit for performing a proxy encrypted authentication of a device tethered to the wireless unit, comprising:
-
at least one memory element; and
at least one processing element configured to execute a set of instructions stored upon the at least one memory element, the set of instructions for;
intercepting a link control protocol configuration request directed to the tethered device;
determining if an authentication protocol value in the configuration request is acceptable;
generating an appropriate response to the link control protocol configuration request without forwarding the link control protocol configuration request to the tethered device;
intercepting a challenge directed to the tethered device;
generating an appropriate response to the challenge without waiting for input from the tethered device;
forwarding the challenge to the tethered device; and
ignoring a challenge response received from the tethered device.
-
-
39. Apparatus for performing a proxy authentication of a device tethered to a wireless unit, comprising:
-
means for intercepting a link control protocol configuration request directed to the tethered device;
means for determining if an authentication protocol value in the configuration request is acceptable;
means for generating an appropriate response to the link control protocol configuration request without forwarding the link control protocol configuration request to the tethered device;
means for intercepting a challenge directed to the tethered device;
means for generating an appropriate response to the challenge without waiting for input from the tethered device;
means for forwarding the challenge to the tethered device; and
means for determining to ignore a challenge response received from the tethered device.
-
Specification