Remotely configurable bridge system and method for use in secure wireless networks
First Claim
Patent Images
1. A system, comprising:
- a bridge capable of communication with a non-wireless capable device and a wireless network;
wherein the bridge incorporates security functionality for remotely and automatically securing the non-wireless capable device during use of the wireless network by;
exchanging a first key between a granting node and a requesting node via a peer-to-peer wireless network;
generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key;
comparing the human-perceptible hashes via an out-of-band communication channel,wherein the out-of-band communication channel refers to any channel other than a channel by which the first key was exchanged between the granting node and the requesting node; and
transmitting a second key to the requesting node for providing access to the wireless network based on the comparison.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product are provided. Included is a bridge capable of communication with a non-wireless capable device and a wireless network. In use, such bridge incorporates security functionality for remotely and automatically securing the non-wireless capable device during use of the wireless network.
67 Citations
20 Claims
-
1. A system, comprising:
-
a bridge capable of communication with a non-wireless capable device and a wireless network; wherein the bridge incorporates security functionality for remotely and automatically securing the non-wireless capable device during use of the wireless network by; exchanging a first key between a granting node and a requesting node via a peer-to-peer wireless network; generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key; comparing the human-perceptible hashes via an out-of-band communication channel, wherein the out-of-band communication channel refers to any channel other than a channel by which the first key was exchanged between the granting node and the requesting node; and transmitting a second key to the requesting node for providing access to the wireless network based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising:
-
establishing communication between a bridge, and a non-wireless capable device and a wireless network; and utilizing the bridge to incorporate security functionality for remotely and automatically securing the non-wireless capable device during use of the wireless network by; exchanging a first key between a granting node and a requesting node via a peer-to-peer wireless network; generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key; comparing the human-perceptible hashes via an out-of-band communication channel, wherein the out-of-band communication channel refers to any channel other than a channel by which the first key was exchanged between the granting node and the requesting node; and transmitting a second key to the requesting node for providing access to the wireless network based on the comparison.
-
-
20. A computer program product embodied on a tangible computer readable medium, comprising:
-
computer code for establishing communication between a bridge, and a legacy device and a wireless network; and computer code for utilizing the bridge to incorporate security functionality for remotely and automatically securing the legacy device during use of the wireless network by; exchanging a first key between a granting node and a requesting node via a peer-to-peer wireless network; generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key; comparing the human-perceptible hashes via an out-of-band communication channel, wherein the out-of-band communication channel refers to any channel other than a channel by which the first key was exchanged between the granting node and the requesting node; and transmitting a second key to the requesting node for providing access to the wireless network based on the comparison.
-
Specification