Systems, methods and computer program products for authorising ad-hoc access
First Claim
Patent Images
1. A method for granting a requesting device ad-hoc access to a network, said method comprising the steps of:
- sending an access pre-token via an unsecured communication channel to said requesting device;
sending an access token associated with said access pre-token via a secure communications channel to a proxy device having a security association with said requesting device; and
granting ad-hoc network access to said requesting device subject to said requesting device providing information derived from said access token.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems and computer program products for authorizing ad-hoc access are disclosed. A method for ad-hoc authorization comprising the steps of sending a pre-token via an unsecured communication channel to a device requesting ad-hoc authorization, sending a token associated with the pre-token via a secure communications channel to a proxy for the device, receiving evidence of access by the device to the token and determining the ad-hoc authorization based on the evidence. The systems and computer program products disclosed provide means for practicing the methods disclosed.
36 Citations
31 Claims
-
1. A method for granting a requesting device ad-hoc access to a network, said method comprising the steps of:
-
sending an access pre-token via an unsecured communication channel to said requesting device; sending an access token associated with said access pre-token via a secure communications channel to a proxy device having a security association with said requesting device; and granting ad-hoc network access to said requesting device subject to said requesting device providing information derived from said access token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 14)
-
-
8. A system for granting a requesting device ad-hoc access to a network, said system comprising:
-
an authorization authority for authorizing access to said network by said requesting device; and an authorization controller for granting ad-hoc network access to said authorized requesting device; wherein an access token is sent by said authorization controller via a secure channel to a distribution proxy having a secure association with said requesting device; and wherein said authorization is subject to said authorization controller receiving information derived from said access token from said requesting device. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
15. A computer program product comprising a computer readable medium comprising a computer program recorded therein for granting a requesting device ad-hoc access to a network, said computer program product comprising:
-
computer program code for sending an access pre-token via an unsecured communication channel to said requesting device; computer program code for sending an access token associated with said access pre-token via a secure communications channel to a proxy device having a security association with said requesting device; and computer program code for granting ad-hoc network access to said requesting device subject to said requesting device providing information derived from said access token. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method for managing ad-hoc network access, said method comprising the steps of:
-
receiving a request for ad-hoc access from a device, said request comprising a pre-token sent to said device via an unsecured communication channel; sending a token associated with said pre-token via a secure communications channel to a proxy for said device in response to said request; receiving a communication from said device; and determining whether to grant said ad-hoc access based on the content of said communication.
-
-
23. A system for managing ad-hoc network access, comprising:
-
at least one communications interface for transmitting and receiving data; a memory unit for storing data and instructions to be performed by a processing unit; and a processing unit coupled to said at least one communications interface and said memory unit, said processing unit programmed to; receive a request for ad-hoc access from a device, said request comprising a pre-token sent to said device via an unsecured communication channel; send a token associated with said pre-token via a secure communications channel to a proxy for said device in response to said request; receive a communication from said device; and determine whether to grant said ad-hoc access based on the content of said communication.
-
-
24. A computer program product comprising a computer readable medium comprising a computer program recorded therein for managing ad-hoc network access, said computer program product comprising:
-
computer program code for receiving a request for ad-hoc access from a device, said request comprising a pre-token sent to said device via an unsecured communication channel; computer program code for sending a token associated with said pre-token via a secure communications channel to a proxy for said device in response to said request; computer program code for receiving a communication from said device; and computer program code for determining whether to grant said ad-hoc access based on the content of said communication.
-
-
25. A token for granting a requesting device ad-hoc access to an unsecured network, said token comprising:
-
an access pre-token for said requesting device to identify itself to an authorization controller during an ad-hoc request; and an access token for enabling said requesting device to validly respond to a challenge issued by said authorization controller to gain ad-hoc access to said unsecured network. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
Specification