METHOD AND APPARATUS FOR SECURE IMMEDIATE WIRELESS ACCESS IN A TELECOMMUNICATIONS NETWORK
First Claim
1. A bootstrap process for secure immediate wireless access by at least one non-active wireless device for exchange of information via one or more existing networks, comprising the steps of:
- upon being powered on, said at least one non-active wireless device automatically requesting access to a wireless network, and, if said access request is accepted, being issued a limited profile from an enrollment server on said wireless network;
using said limited profile, said at least one non-active wireless device automatically registering on said wireless network;
from said wireless network said at least one wireless device automatically requesting access to an IP (internet protocol) network, wherein said at least one wireless device is assigned an IP address and granted access to said IP network, wherein said access to said IP network is limited to an activation realm for said non-active wireless device;
said non-active wireless device having limited access to said activation realm automatically initiating contact with an enrollment server on said activation realm; and
during an interaction with said enrollment server, assigning and programming device parameters to said wireless device;
wherein when said assigning and programming are complete, said at least one non-active wireless device is activated.
5 Assignments
0 Petitions
Accused Products
Abstract
A wireless telephone and messaging system provides Secure Immediate Wireless Access (SIWA) to wireless telephones onto existing wireless networks. The SIWA protocol uses existing wireless network messaging to exchange information between wireless devices and a network server, referred to herein as an Intelligent Service Manager (ISM). The ISM acts as a gateway between wireless devices and wireless service provider, and provides the wireless devices with an immediate limited or unlimited access to the wireless network. The ISM can also deny access to the wireless network from unauthorized wireless devices.
-
Citations
23 Claims
-
1. A bootstrap process for secure immediate wireless access by at least one non-active wireless device for exchange of information via one or more existing networks, comprising the steps of:
-
upon being powered on, said at least one non-active wireless device automatically requesting access to a wireless network, and, if said access request is accepted, being issued a limited profile from an enrollment server on said wireless network;
using said limited profile, said at least one non-active wireless device automatically registering on said wireless network;
from said wireless network said at least one wireless device automatically requesting access to an IP (internet protocol) network, wherein said at least one wireless device is assigned an IP address and granted access to said IP network, wherein said access to said IP network is limited to an activation realm for said non-active wireless device;
said non-active wireless device having limited access to said activation realm automatically initiating contact with an enrollment server on said activation realm; and
during an interaction with said enrollment server, assigning and programming device parameters to said wireless device;
wherein when said assigning and programming are complete, said at least one non-active wireless device is activated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A secure immediate access wireless apparatus that enables at least one non-active wireless device to activate itself on a wireless network comprising:
-
at least one server managing an activation session of said at least one non-active wireless device, means for said non-active wireless device to generate at least one temporary mandatory network identifier at the beginning of activation to be granted a limited profile for said wireless network with which said non-active wireless device gains access to an IP network from said wireless network;
wherein upon gaining access to said IP network, said non-active wireless device is assigned an IP address and granted access to said IP network limited only to an activation realm for said non-active wireless device;
means for securely exchanging information between said at least one non-active wireless device and an enrollment server during said activation session;
wherein activation comprises the steps of;
said non-active device detecting that it is not active generating at least one temporary mandatory network identifier;
said non-active device gaining access to said wireless network using said limited profile, wherein said non-active device accesses said IP network by means of an interface between said wireless network and said IP network;
said non-active device being assigned an IP address and given limited access only to an activation realm for said device on said IP network;
said non-active wireless device authenticating said enrollment server;
said enrollment server authenticating said non-active wireless device;
said enrollment manager server allocating at least one mandatory network identifier for said non-active wireless device;
wherein activation further comprises any of the steps of;
said enrollment server programming said non-active wireless device with mandatory network identifiers and security key;
said enrollment server interacting with a user via said wireless device immediately after authentication;
said enrollment server triggering an additional network provisioning process; and
said enrollment server providing feedback to said user.
-
Specification