SECURE REMOTE ACCESS USING WIRELESS NETWORK
First Claim
Patent Images
1. A method comprising:
- receiving a request from a mobile device to attach to a private wireless network;
determining if a subscriber identifier is in a security database;
determining if a mobile device equipment identifier is in the security database;
authenticating the mobile device using the subscriber identifier and the mobile device equipment identifier;
granting access to the private wireless network only if the mobile device is authenticated;
securely passing data between an isolated computer system and a mobile device to monitor and control a remote monitoring and control system.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes receiving a request from a mobile device to attach to a private wireless network, determining if a subscriber identifier is in a security database, determining if a mobile device equipment identifier is in the security database, authenticating the phone using the subscriber identifier and the mobile device equipment identifier, granting access to the private wireless network only if the phone is authenticated, and passing data between a computer system and a mobile device to monitor and control a remote monitoring and control system.
86 Citations
20 Claims
-
1. A method comprising:
-
receiving a request from a mobile device to attach to a private wireless network; determining if a subscriber identifier is in a security database; determining if a mobile device equipment identifier is in the security database; authenticating the mobile device using the subscriber identifier and the mobile device equipment identifier; granting access to the private wireless network only if the mobile device is authenticated; securely passing data between an isolated computer system and a mobile device to monitor and control a remote monitoring and control system. - View Dependent Claims (2, 3, 4, 5, 7, 8, 9, 10)
-
-
6. The method of claim 6 and further comprising:
-
rejecting requests where invalid additional credentials are provided; tracking the number of sequential rejected requests; and determining whether to lock the phone out of the network as a function of an excess number of sequential rejected requests.
-
-
11. A computer readable storage device having instructions for causing a computer to perform a method, the method comprising:
-
receiving a request from a mobile device to attach to a private wireless network; determining if a subscriber identifier is in a security database; determining if a mobile device equipment identifier is in the security database; authenticating the mobile device using the subscriber identifier and the mobile device equipment identifier; granting access to the private wireless network only if the phone is authenticated; and passing data between a computer system and a mobile device to monitor and control an isolated remote monitoring and control system. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a security center having a security database to determine if a subscriber identifier and a mobile device equipment identifier provided by a mobile device are in the security database and to authenticate the mobile device; a process monitor and automation controller to interact with the security center and receive communications from the authenticated mobile device; and a media server to provide a private wireless network to communication with authenticated mobile devices, the security center, and the process monitor and automation controller, wherein data is passed between the isolated system and a mobile device to remotely monitor and control the process monitor and automation controller. - View Dependent Claims (18, 19, 20)
-
Specification