Methods and systems for securing a computer network
First Claim
1. A method of establishing a secure access to a specific proprietary network, the method comprising the steps of:
- establishing a wireless communication link between a first device and a proprietary network believed to be the specific proprietary network using a first level of secure access to the network;
requesting an access code from the proprietary network by the first device;
generating the access code within the proprietary network in response to the request;
receiving the access code from the proprietary network by the first device;
manually entering the access code, as received by the first device, into a second device believed to be communicatively coupled to and in physical proximity with the specific proprietary network, wherein the second device is positioned in a secure location physically accessible only to an authorized user and communicatively coupled to only a specific proprietary network;
comparing the entered access code to the generated access code by the proprietary network;
using a result of the comparison to verify that the wireless communication link established between the first device and the proprietary network is a communication link established between the first device and the specific proprietary network; and
enabling a second level of secure access between the first device and the specific proprietary network if the entered access code matches the generated access code.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for establishing a secure access to a proprietary network is provided. The method includes establishing a communication link between a first device and the proprietary network using a first level of secure access to the network, requesting an access code by the first device. The method further includes generating an access code by the proprietary network in response to the request, receiving the access code by the first device, and entering the access code into a second device communicatively coupled to the proprietary network, wherein the second device is positioned in a secure location physically accessible only to an authorized user. The method also includes comparing the entered access code to the generated access code by the proprietary network, and enabling a second level of secure access between the first device and the proprietary network.
-
Citations
16 Claims
-
1. A method of establishing a secure access to a specific proprietary network, the method comprising the steps of:
-
establishing a wireless communication link between a first device and a proprietary network believed to be the specific proprietary network using a first level of secure access to the network; requesting an access code from the proprietary network by the first device; generating the access code within the proprietary network in response to the request; receiving the access code from the proprietary network by the first device; manually entering the access code, as received by the first device, into a second device believed to be communicatively coupled to and in physical proximity with the specific proprietary network, wherein the second device is positioned in a secure location physically accessible only to an authorized user and communicatively coupled to only a specific proprietary network; comparing the entered access code to the generated access code by the proprietary network; using a result of the comparison to verify that the wireless communication link established between the first device and the proprietary network is a communication link established between the first device and the specific proprietary network; and enabling a second level of secure access between the first device and the specific proprietary network if the entered access code matches the generated access code. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A secure proprietary network access system that provides verification as to availability of network access based on a physical location of a network access device, said system comprising:
-
at least one proprietary network under the physical control of an enterprise; a first device adapted to communicate with proprietary networks such as the at least one proprietary network using a first level of secure access to such proprietary networks; a second device communicatively coupled to and physically proximate a specific proprietary network, wherein the second device is positioned in a secure location physically accessible only to an authorized user, said second device is configured to receive a manually entered access code from a user in physical control of the first device and the second device, said second device operable to transmit the manually entered access code to the specific proprietary network; wherein, upon an accessing of a proprietary network by said first device, said first device is operable to request an access code from the network such that an access code received from said proprietary network by said first device can be subsequently manually entered into said second device for transmission to the specific proprietary network associated with said second device for purposes of verifying that the proprietary network accessed by said first device and the specific proprietary network associated with said second device are the same proprietary network, and if so, the proprietary network enables a second level of secure access between the first device and the proprietary network. - View Dependent Claims (8, 9, 10)
-
-
11. A method of establishing a secure access to a specific proprietary network using a wireless device, the method comprising the steps of:
-
communicating with a proprietary network from the wireless device through a first communication link having a first level of secure access; requesting an access code for a second level of secure access by the wireless device; generating the access code for the second level of secure access by the proprietary network based on said requested access code by the wireless device; transmitting the access code for establishing a communication link having a second level of secure access to the wireless device from the proprietary network through the first communication link; receiving at a second device, as entered by a user, the access code as received by the wireless device, the second device communicatively coupled to a specific proprietary network through a second communication link, the second device located in a physically secure location associated with the specific proprietary network, such that both the first and second devices are physically accessible to the authorized user; and receiving, at the wireless device, an indication as to whether the access code was entered successfully, a successful indication indicating that the proprietary network accessed by the wireless device and the specific proprietary network associated with the second device are the same proprietary network thereby enabling the second level of secure access for the first communication link between the wireless device and the proprietary network. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification