History-based downgraded network identification
First Claim
1. A method of use by a client computer for verifying the identity of a network that identifies itself to the client computer via a unique identifier, the method comprising:
- comparing at least one additional characteristic of the network that identifies itself using the identifier to stored information that identifies at least one expected value for the same at least one additional characteristic for an authentic network identified by the identifier; and
when the at least one additional characteristic of the network matches the stored information that identifies the expected value, allowing the client computer to connect to the network.
2 Assignments
0 Petitions
Accused Products
Abstract
Some embodiments of the invention are directed to increasing security and lowering risk of attack in connecting automatically to networks by enabling client devices to verify the identity of the networks by, for example, confirming the identity of networks and network components such as wireless access points. In some embodiments, a client device may maintain a data store of characteristics of a network—including, for example, characteristics of a wireless access point or other portion of the network and/or characteristics of a connection previously established with the wireless access point and/or network. Stored characteristics may include characteristics other than those minimally necessary to identify a wireless access point and/or wireless network. The stored characteristics may be compared to known good characteristics of a network (including characteristics of a wireless access point or other portion of the wireless network) prior to connection to the network to determine whether the characteristics match.
-
Citations
20 Claims
-
1. A method of use by a client computer for verifying the identity of a network that identifies itself to the client computer via a unique identifier, the method comprising:
-
comparing at least one additional characteristic of the network that identifies itself using the identifier to stored information that identifies at least one expected value for the same at least one additional characteristic for an authentic network identified by the identifier; and when the at least one additional characteristic of the network matches the stored information that identifies the expected value, allowing the client computer to connect to the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus for verifying the identity of a network that identifies itself to the apparatus via a unique identifier, the apparatus comprising:
-
at least one data store; and at least one processor adapted to; compare at least one additional characteristic of the network that identifies itself using an identifier to information, stored in the data store, that identifies at least one expected value for the same at least one additional characteristic for an authentic network identified by the identifier; and when the at least one additional characteristic of the network matches the stored information that identifies the expected value, allowing the apparatus to connect to the network. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method of use by a client computer, the method comprising:
-
receiving information regarding a network, the information comprising a unique identifier that identifies the network and at least one additional characteristic of the network which may be used to identify the network; and storing in a data store the unique identifier and the at least one additional characteristic of the network. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification