Method and system for enhanced wireless network security
First Claim
1. A method for secure wireless communications, comprising the steps of:
- requesting a connection with a wireless device;
determining whether the wireless device is trusted;
determining a security policy of the wireless device; and
establishing a connection with the wireless device if the wireless device is trusted and if the security policy of the wireless device is as expected.
10 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and computer program product for securing wireless network devices improves the security of wireless networks and devices, such as Bluetooth networks and devices, to prevent security attacks on and hacking of such networks and devices. A method for secure wireless communications, comprises the steps of requesting a connection with a wireless device, determining whether the wireless device is trusted, determining a security policy of the wireless device, and establishing a connection with the wireless device if the wireless device is trusted and if the security policy of the wireless device is as expected.
-
Citations
30 Claims
-
1. A method for secure wireless communications, comprising the steps of:
-
requesting a connection with a wireless device; determining whether the wireless device is trusted; determining a security policy of the wireless device; and establishing a connection with the wireless device if the wireless device is trusted and if the security policy of the wireless device is as expected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for secure wireless communications comprising:
-
a processor operable to execute computer program instructions; a memory operable to store computer program instructions executable by the processor; and computer program instructions stored in the memory and executable to perform the steps of; requesting a connection with a wireless device; determining whether the wireless device is trusted; determining a security policy of the wireless device; and establishing a connection with the wireless device if the wireless device is trusted and if the security policy of the wireless device is as expected. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program product for secure wireless communications comprising:
-
a computer readable storage medium; computer program instructions, recorded on the computer readable storage medium, executable by a processor, for performing the steps of requesting a connection with a wireless device; determining whether the wireless device is trusted; determining a security policy of the wireless device; and establishing a connection with the wireless device if the wireless device is trusted and if the security policy of the wireless device is as expected. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification