Wireless service points having unique identifiers for secure communication
First Claim
1. A method of communication via a secure wireless communication network, the method comprising:
- joining a plurality of Service Points (SPs) to form a Service Point Network (SPN);
connecting each of a plurality of Utilizing Devices (UDs) to a corresponding Service Port of one or more of the SPs, the UDs being distinct from the SPs and not part of the SPN;
associating a unique Service Port identifier with each Service Port of each SP and thereby with each UD;
preparing a communication selectively destined for one or more Destination UDs of the plurality of UDs, the communication originating from an Originator UD of the plurality of UDs, the SP corresponding to the Originator UD being an Entry SP of the communication, and the SPs corresponding to the Destination UDs being Terminal SPs of the communication; and
for each Destination UD, encrypting the communication in the Entry SP to facilitate decryption in the corresponding Terminal SP and in a manner based at least in part on the unique Service Port identifier associated with the Destination UD, the encrypting otherwise securing the communication from general access including securing against decryption by other than the SP corresponding to the Destination UD.
11 Assignments
0 Petitions
Accused Products
Abstract
System, apparatus, and methods are disclosed wherewith a group of independent wireless routing devices known as Service Points work cooperatively to form an ad hoc mesh communication network. The resulting Service Point Network is used to provide reliable address-directed communication services between devices attached by conventional means (wired or wireless) to respective Service Ports on any of the Service Points. Attached Utilizing Devices are not considered a part of the Service Point Network and need not contain any custom software or hardware related to the operations of the Service Point Network. To protect the security of network communications and the integrity of the network, the Service Points are assigned internal IP addresses and unique identifiers that need not be disclosed to the Utilizing Devices. The unique identifiers in turn are used to derive public and private encryption key pairs for each Service Point.
-
Citations
20 Claims
-
1. A method of communication via a secure wireless communication network, the method comprising:
-
joining a plurality of Service Points (SPs) to form a Service Point Network (SPN); connecting each of a plurality of Utilizing Devices (UDs) to a corresponding Service Port of one or more of the SPs, the UDs being distinct from the SPs and not part of the SPN; associating a unique Service Port identifier with each Service Port of each SP and thereby with each UD; preparing a communication selectively destined for one or more Destination UDs of the plurality of UDs, the communication originating from an Originator UD of the plurality of UDs, the SP corresponding to the Originator UD being an Entry SP of the communication, and the SPs corresponding to the Destination UDs being Terminal SPs of the communication; and for each Destination UD, encrypting the communication in the Entry SP to facilitate decryption in the corresponding Terminal SP and in a manner based at least in part on the unique Service Port identifier associated with the Destination UD, the encrypting otherwise securing the communication from general access including securing against decryption by other than the SP corresponding to the Destination UD. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of communication via a secure wireless communication network, the method comprising:
-
joining a plurality of Service Points (SPs) to form a Service Point Network (SPN); assigning an SPN-unique SP-identifier to each SP joined to the SPN; connecting each of a plurality of Utilizing Devices (UDs) to a corresponding Service Port of one or more of the SPs, the UDs being distinct from the SPs and not part of the SPN; and in the SP corresponding to a first UD of the plurality of UDs, encrypting a communication originating from the first UD and destined for a second UD of the plurality of UDs, the encrypting being performed to facilitate decryption in the SP corresponding to the second UD and in a manner based at least in part on a unique Service Port identifier associated with the Service Port corresponding to the second UD, the encrypting otherwise securing the communication from general access including securing against decryption by other than the SP corresponding to the second UD.
-
-
13. A method for providing access to resources via a secure wireless communication network, comprising:
-
providing a Service Point Network (SPN) comprising a plurality of Service Points; connecting each of a plurality of Utilizing Devices to a corresponding one or more of the Service Points, the Utilizing Devices being distinct from the Service Points and not part of the SPN; providing first and second of the Utilizing Devices with access to each other conveyed via dedicated secure communication through the SPN between an Entry Service Point connected to the first Utilizing Device and a Terminal Service Point connected to the second Utilizing Device; and encrypting said secure communication at the Entry Service Point, in such a manner that the communication can only be decrypted by the Terminal Service Point. - View Dependent Claims (14)
-
-
15. A method of communication via a secure wireless communication network, the method comprising:
-
joining a plurality of Service Points (SPs) to form a Service Point Network (SPN); connecting each of a plurality of Utilizing Devices (UDs) to a corresponding Service Port of one or more of the SPs, the UDs being distinct from the SPs and not part of the SPN; associating a unique Service Port identifier with each Service Port of each SP and thereby with each UD; preparing a communication selectively destined for one or more Destination UDs of the plurality of UDs, the communication originating from an Originator UD of the plurality of UDs, the SP corresponding to the Originator UD being an Entry SP of the communication, and the SPs corresponding to the Destination UDs being Terminal SPs of the communication; for each Destination UD, encrypting the communication in the Entry SP to facilitate decrypting the communication in the corresponding Terminal SP and in a manner based at least in part on the unique Service Port identifier associated with the Destination UD, the encrypting otherwise securing the communication from general access including securing against decrypting by other than the SP corresponding to the Destination UD; generating one or more associated encryption keys based on each Service Port identifier; as part of the key generating, creating a public key and a private key associated with each Service Port of each SP; in the Entry SP, using the public key of the Service Port corresponding to each Destination UD to carry out the encrypting; and in each Terminal SP, using the private key of the Service Port corresponding to each Destination UD to carry out the decrypting; and wherein the UDs are client devices that do not actively participate in the encrypting and the decrypting, the communication is one or more instances of client data communications, the encrypting and the decrypting are asymmetric, the client data communications are unrelated to and not used for key distribution related to the encrypting and the decrypting, and only the SPs corresponding to the Destination UDs are capable of performing the decrypting. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification