Techniques for providing secure access to a communication system
First Claim
1. A method of providing secure access to a communication system comprising:
- receiving user data from an information appliance via an information appliance cradle associated with a telephone connected to a network, wherein the cradle and the telephone are separately connected to the network;
authenticating the information appliance based on the user data;
opening a port for use by the associated telephone to communicate voice data over the network provided the authentication is successful; and
closing the port in response to detecting an operational variation associated with the information appliance that is unfamiliar to the network.
5 Assignments
0 Petitions
Accused Products
Abstract
A public telephone and Internet access system that comprises Personal Digital Assistants (PDA) that are connected to an Ethernet or other Local Area Network by a network cradle, and a number of Ethernet telephones connected to the same Local Area Network. The PDAs store encrypted information about their owners, including the owner'"'"'s name, their phone forwarding preferences, access permissions to the network, and charging/billing information. When a PDA is attached to a network cradle, this information is automatically transferred to the gatekeeper, which is a server that performs management tasks for the Ethernet phone network. These tasks include deciding whether or not a user is allowed to sign up and use a public Ethernet phone, maintaining billing and charging information, and forwarding incoming calls for a given user to the Ethernet phone at the user'"'"'s current location. This invention provides a secure method for the PDA and the gatekeeper to exchange authentication information.
-
Citations
12 Claims
-
1. A method of providing secure access to a communication system comprising:
-
receiving user data from an information appliance via an information appliance cradle associated with a telephone connected to a network, wherein the cradle and the telephone are separately connected to the network; authenticating the information appliance based on the user data; opening a port for use by the associated telephone to communicate voice data over the network provided the authentication is successful; and closing the port in response to detecting an operational variation associated with the information appliance that is unfamiliar to the network. - View Dependent Claims (2, 3, 4)
-
-
5. A compound network apparatus comprising:
-
a telephone to communicate voice data; and a cradle, associated with the telephone, to receive a portable computer system; a server, communicatively coupled through a network to the telephone and separately to the cradle, to authenticate data received from the portable computer system, to open a port for use by the telephone provided the authentication is successful, and to close the port in response to detecting an operational variation, associated with the portable computer system, that is unfamiliar to the network. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
Specification