METHOD AND APPARATUS FOR SECURITY CONFIGURATION AND VERIFICATION OF WIRELESS DEVICES IN A FIXED/MOBILE CONVERGENCE ENVIRONMENT
First Claim
1. A system comprising:
- an information server storing network and related security configuration information for a plurality of networks; and
an administrative domain comprising a handoff server, the handoff server operating in response to an event notification from a domain device to access the information server and selectively forward connectivity information and security configuration information for a selected network to the domain device.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method is described that enables autonomic discovery of wireless network security mechanisms by mobile devices. Stateful monitoring of wireless devices facilitates identification of pending network connectivity loss, enabling a handoff server to proactively advertise new points of access and their associated security mechanisms to devices before connectivity is lost. As a result, devices may seamlessly transition between secure networks. Stateful monitoring of device reachability may be used together with device certificates and/or tokens to decrease the potential of MAC spoofing and further secure the network. Stateful monitoring of device connectivity status during network transitions facilitates the identification of rogue access points. The token or certificate on the device may be used to authenticate the device while transitioning between networks by a centralized entity, managing the initiation and the execution of the handover for the device.
44 Citations
20 Claims
-
1. A system comprising:
-
an information server storing network and related security configuration information for a plurality of networks; and an administrative domain comprising a handoff server, the handoff server operating in response to an event notification from a domain device to access the information server and selectively forward connectivity information and security configuration information for a selected network to the domain device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for autonomously deploying security configuration information to a device of an administrative domain includes the steps of:
-
receiving notification of an event trigger from the device; retrieving, from an information store that stores network and related security configuration parameters, a point of access to a new network and security information associated with the new network; and
selectively forwarding the point of access and related security information to the device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification