Firewall protection for wireless users
First Claim
1. A method in a base station for providing protection for wireless access units using a firewall application comprising:
- obtaining profile information associated with a first wireless access unit;
establishing a first firewall configuration for the first wireless access unit at the firewall application from the obtained profile information associated with the first wireless access unit;
obtaining profile information associated with a second wireless access unit; and
establishing a second firewall configuration for the second wireless access unit at the firewall application from the obtained profile information associated with the second wireless access unit.
0 Assignments
0 Petitions
Accused Products
Abstract
In a computer telecommunications network, firewalls protect a machine or network from undesired message transmissions. In the case of a firewall employed on a user side of the wireless link, a message rejected by the firewall has already consumed the wireless resources required to transmit. A system for protecting a mobile wireless user via a firewall employed at the wired line, or ISP side, of the wireless link in a wireless network allows a specific user profile to be provided for each user that is indicative of a desired firewall configuration corresponding to the mobile user. A firewall configuration is established at a firewall application in a wireless transceiver corresponding to the current location of the mobile user, and the same firewall configuration is established, via a wireless handoff, at a second wireless transceiver when the user is located in the area corresponding to the second wireless transceiver, thereby protecting a plurality of wireless users prior to wasteful wireless transmission of undesired messages.
-
Citations
10 Claims
-
1. A method in a base station for providing protection for wireless access units using a firewall application comprising:
-
obtaining profile information associated with a first wireless access unit; establishing a first firewall configuration for the first wireless access unit at the firewall application from the obtained profile information associated with the first wireless access unit; obtaining profile information associated with a second wireless access unit; and establishing a second firewall configuration for the second wireless access unit at the firewall application from the obtained profile information associated with the second wireless access unit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification