Authentication of mobile devices via proxy device
First Claim
Patent Images
1. A method comprising:
- emulating a mobile terminal, or a group of mobile terminals on a wide area wireless network using a fixed radio terminal;
establishing a communication path passing from the wide area wireless network through the fixed radio terminal over a local network to the mobile terminal or group of mobile terminals, wherein the communications path uses protocols for the wide area wireless network between the fixed radio terminal and the wide area wireless network and local network protocols between the fixed radio terminal and the mobile terminal or terminals that are connected to the local network;
a controller of the fixed radio terminal receiving authentication information from the wide area wireless network;
the controller encapsulating the authentication information in the protocol of the local network and passing the authentication information to the mobile terminal;
the mobile terminal generating an authentication result from the authentication information that is transmitted to the controller using the local network protocol; and
the controller transmitting the authentication result to the wide area wireless network using the wide area network protocol.
6 Assignments
0 Petitions
Accused Products
Abstract
A mechanism to permit the cryptographic authentication of a mobile device in the cellular carrier'"'"'s network when the device is present in the 802.11 network, wireless LAN, served by a Cellular Controller and not connected directly to the cellular carrier'"'"'s network via a radio link is disclosed. The Cellular Controller acts as a proxy for the mobile device when the device is in a building served by an 802.11 wireless LAN. The solutions features the separation of a mobile device'"'"'s radio function from its ANSI-41 authentication mechanism to permit the proxy function to work and to not have to duplicate the ANSI-41 authentication data and CAVE algorithm.
20 Citations
10 Claims
-
1. A method comprising:
-
emulating a mobile terminal, or a group of mobile terminals on a wide area wireless network using a fixed radio terminal; establishing a communication path passing from the wide area wireless network through the fixed radio terminal over a local network to the mobile terminal or group of mobile terminals, wherein the communications path uses protocols for the wide area wireless network between the fixed radio terminal and the wide area wireless network and local network protocols between the fixed radio terminal and the mobile terminal or terminals that are connected to the local network; a controller of the fixed radio terminal receiving authentication information from the wide area wireless network; the controller encapsulating the authentication information in the protocol of the local network and passing the authentication information to the mobile terminal; the mobile terminal generating an authentication result from the authentication information that is transmitted to the controller using the local network protocol; and the controller transmitting the authentication result to the wide area wireless network using the wide area network protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a cellular wireless network; a local area network; mobile cellular terminals capable of communicating over the cellular wireless network and the local area network; and a controller that emulates the mobile terminals on the cellular wireless network using a fixed radio terminal when the mobile terminals are connected to the local area network, the controller establishing a communication path passing from the cellular wireless network through the fixed radio terminal over a local area network to the mobile terminals, wherein the controller uses protocols for the cellular wireless network between the fixed radio terminal and the cellular wireless network and local network protocols to the mobile terminals, wherein the controller receives authentication information from the cellular wireless network and encapsulates the authentication information in the protocol of the local area network, passes the authentication information to the mobile terminals, the mobile terminals generating an authentication result from the authentication information that is transmitted to the controller using the local area network protocol, and the controller transmits the authentication result to the cellular wireless network using the cellular wireless network protocol. - View Dependent Claims (10)
-
Specification