Securing Communications of a Wireless Access Point and a Mobile Device
First Claim
1. A method, comprising:
- receiving, from a mobile device coupled to a first network implemented by at least one wireless access point, a request to access a second network;
receiving, from the mobile device via an unsecured wireless communication from the mobile device to the at least one wireless access point, first encrypted data, via a hypertext transfer protocol secure (HTTPS), that includes an encryption key utilizable for secure wireless communications between the mobile device and the at least one wireless access point; and
providing the encryption key to the wireless access point to be used by the at least one wireless access point for the secure wireless communications between the mobile device and the at least one wireless access point.
1 Assignment
0 Petitions
Accused Products
Abstract
In one or more embodiments, a network provider can receive a request to access a public network via a wireless network implemented via one or more wireless access points. The network provider can receive, via an unsecured wireless communication from a mobile device utilizing the wireless network and via a hypertext transfer protocol secure (HTTPS), an encryption key usable to secure wireless communications from the mobile device utilizing the wireless network. The encryption key can be encrypted via a public encryption key, received from the network provider or previously stored by the mobile device, associated with the network provider. The network provider can decrypt the encryption key and can provide the encryption key to a wireless access point implementing the wireless network and communicating with the mobile device. The wireless access point and the mobile device can communicate in a secure fashion based on the encryption key.
84 Citations
20 Claims
-
1. A method, comprising:
-
receiving, from a mobile device coupled to a first network implemented by at least one wireless access point, a request to access a second network; receiving, from the mobile device via an unsecured wireless communication from the mobile device to the at least one wireless access point, first encrypted data, via a hypertext transfer protocol secure (HTTPS), that includes an encryption key utilizable for secure wireless communications between the mobile device and the at least one wireless access point; and providing the encryption key to the wireless access point to be used by the at least one wireless access point for the secure wireless communications between the mobile device and the at least one wireless access point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
an access controller that receives, from a mobile device via an unsecured wireless communication from the mobile device to at least one wireless access point coupled to the access controller and via a hypertext transfer protocol secure (HTTPS), first encrypted data that includes an encryption key utilizable for secure wireless communications between the mobile device and the at least one wireless access point and that provides the encryption key to the at least one wireless access point. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
20. A computer readable memory device comprising instructions, which when executed by a processor of an access controller, the access controller receives, from a mobile device via an unsecured wireless communication from the mobile device to at least one wireless access point coupled to the access controller and via a hypertext transfer protocol secure (HTTPS), first encrypted data that includes an encryption key utilizable for secure wireless communications between the mobile device and the at least one wireless access point and provides the encryption key to the at least one wireless access point.
Specification