Wireless Linked Computer Communications
First Claim
1. A method for computer communications having the steps of:
- a) establishing a wireless link between computer apparatus and a receiving network implementing two protocols at least one of which is for encrypting messages, one of the two protocols being a virtual private network (VPN) protocol suitable for securing wire-linked communications and the other of the other two protocols being a wireless-linking protocol of a kind suitable for securing wireless-linked communications;
b) applying both protocols to a message to render it doubly secured;
c) sending the doubly secured message over the wireless link; and
d) processing the doubly secured message to recover the message.
1 Assignment
0 Petitions
Accused Products
Abstract
Computer communications with security marked information use a wireless link between a receiving network (RN) and a computer (WLT1) each running VPN wire-link security software and wireless-link security software. A physical LAN in the network (RN) is subdivided into logical management and communications LANs. The management LAN manages a switch (L3S), access point (AP), RADIUS server (RS) and Certificate server (CS). The access point (AP) is managed only by management LAN items. The switch (L3S) ensures message traffic from management LAN ports goes only to other such ports; it and the access point (AP) are managed only by the RADIUS server via SSH. The access point (AP) contacts the RADIUS server (RS) to authenticate user certificates and receives SSH traffic only. The management LAN is synchronized to an NTP server. The communications LAN allows an authenticated computer (WLT1) to communicate with a classified WAN (N1). Message traffic does not go to the RADIUS server (RS) or Certificate server (CS).
28 Citations
45 Claims
-
1. A method for computer communications having the steps of:
-
a) establishing a wireless link between computer apparatus and a receiving network implementing two protocols at least one of which is for encrypting messages, one of the two protocols being a virtual private network (VPN) protocol suitable for securing wire-linked communications and the other of the other two protocols being a wireless-linking protocol of a kind suitable for securing wireless-linked communications; b) applying both protocols to a message to render it doubly secured; c) sending the doubly secured message over the wireless link; and d) processing the doubly secured message to recover the message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. Apparatus for computer communications incorporating:
-
a) wireless linking apparatus for establishing a wireless link between computer apparatus and a receiving network implementing two protocols at least one of which is for encrypting messages, one of the two protocols being a VPN protocol suitable for securing wire-linked communications and the other of the two protocols being a wireless-linking protocol of a kind suitable for securing wireless-linked communications; b) means for applying both protocols to a message to render it doubly secured; c) means for sending the doubly secured message over the wireless link; and d) means for processing the doubly secured message to recover the message. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A computer program product for computer communications and comprising a computer-readable medium embodying program code instructions for execution by a computer processor wherein the instructions are for controlling a computerised communications network to execute the steps of:
-
a) establishing a wireless link between computer apparatus and a receiving network implementing two protocols at least one of which is for encrypting messages, one of the two protocols being a VPN protocol suitable for securing wire-linked communications and the other of the two protocols being a wireless-linking protocol of a kind suitable for securing wireless-linked communications; b) applying both protocols to a message to render it doubly secured; c) sending the doubly secured message over the wireless link; and d) processing the doubly secured message to recover the message. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
Specification