Authentication for Ad Hoc network setup
First Claim
Patent Images
1. A method for authentication for use in a first node, the method comprising the steps of:
- receiving a first security configuration into the first node;
receiving a second security configuration based on location into the first node after the first security configuration is verified; and
authenticating at least a second node already having both the first and the second security configurations, wherein both the first and the second security configurations are used in the authenticating step in order to form a network with the at least a second node.
13 Assignments
0 Petitions
Accused Products
Abstract
A device (110) performs a method 200 for authentication and Ad Hoc network setup. The device (110) receives (210) a first security configuration; receives (220) a second security configuration based on location; authenticates (230) at least a second node (110) having the first security configuration and the second security configuration; and forms (240) a network with the at least a second node (110).
50 Citations
19 Claims
-
1. A method for authentication for use in a first node, the method comprising the steps of:
-
receiving a first security configuration into the first node; receiving a second security configuration based on location into the first node after the first security configuration is verified; and authenticating at least a second node already having both the first and the second security configurations, wherein both the first and the second security configurations are used in the authenticating step in order to form a network with the at least a second node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus for authenticating wireless nodes, the apparatus comprising:
-
means for receiving a first security configuration into the apparatus; means for receiving a second security configuration based on location into the apparatus after the first security configuration is verified; and means for authenticating at least a first wireless node already having both the first and second security configurations, wherein both the first and the second security configurations are used in the authenticating step in order to form a network with the at least a first wireless node. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for authenticating wireless nodes, the system comprising:
-
at least a first and second apparatus each comprising; means for receiving a first security configuration; means for receiving a second security configuration based on location after the first security configuration is verified; means for authenticating at least one wireless node already having both the first and second security configurations, wherein both the first and the second security configurations used in the authenticating step to form a network with the at least one wireless node.
-
Specification