AUTHENTICATION MECHANISMS FOR WIRELESS NETWORKS
First Claim
1. A method of operating a client device to display advertisement information relating to a commercial service, the method comprising:
- (A) obtaining trust information for a wireless access point;
(B) verifying, based on the trust information, the authenticity of a control transmission from the wireless access point; and
(C) selectively displaying to a user an advertisement for at least one commercial service contained within the control message based at least in part on the act of verifying.
2 Assignments
0 Petitions
Accused Products
Abstract
Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.
140 Citations
20 Claims
-
1. A method of operating a client device to display advertisement information relating to a commercial service, the method comprising:
-
(A) obtaining trust information for a wireless access point; (B) verifying, based on the trust information, the authenticity of a control transmission from the wireless access point; and (C) selectively displaying to a user an advertisement for at least one commercial service contained within the control message based at least in part on the act of verifying. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. The method of claim 11, wherein the environment information is a location for the wireless access point transmitting the control transmission and/or a time the control transmission was transmitted.
-
12. At least one computer-readable medium encoded with computer-executable instructions which, when executed, cause a computer to execute a method for confirming authenticity of a control transmission from a wireless access point associated with an entity, the method comprising:
-
(A) obtaining trust information for the entity; (B) verifying, using the trust information, the authenticity of a control transmission from the wireless access point; and (C) selectively using contents of the control transmission based at least in part on the act of verifying. - View Dependent Claims (13, 14, 15, 16)
-
-
17. An apparatus for transmitting control messages in a wireless network, the apparatus comprising:
-
at least one data store storing trust information and contents; at least one processor adapted to construct a control transmission comprising the contents and to encrypt at least a portion of the control transmission using the trust information; and a communication circuit to transmit the control transmission. - View Dependent Claims (18, 19, 20)
-
Specification