Methods and apparatus for providing security to a computerized device
First Claim
1. A method, comprising:
- detecting, in a computerized device, a network identification information for the computerized device, where the computerized device receives the network identification information in a wireless local area network transmission from a network identification information source associated with a first network to which the computerized device is to establish a secure wireless data connection;
comparing the detected network identification information with at least one address entry stored in an initiation information table on the computerized device, the at least one address entry having been stored in the initiation information table prior to detecting the network identification information and indicating that the first network requires a secure data connection;
in response to detecting a correspondence between the network identification information and the at least one address entry in the initiation information table, detecting a profile entry, the profile entry being mapped to secure connection instructions for establishing the secure wireless data connection between the computerized device and the first network, retrieving the secure connection instructions indicated by the profile entry, and establishing the secure wireless data connection between the computerized device and the first network; and
in response to detecting a secure connection stop function within the profile entry, where the secure connection stop function is a discontinue command that prevents the computerized device from establishing an unnecessary secure wireless data connection with the first network, selectively establishing a non-secure data connection between the computerized device and the first network.
1 Assignment
0 Petitions
Accused Products
Abstract
When establishing a communications channel to a wireless network, through a wireless connection, a computerized device receives an Internet protocol (IP) address from a Dynamic Host Configuration Protocol (DHCP) server associated with the wireless network. The computerized device is configured with a table or list of IP addresses associated with wireless networks requiring a VPN or secure connection. The computerized device compares the IP address received from the DHCP server with the IP address entries of the table stored by the computerized device. If the computerized device detects a correspondence between the IP address received from the DHCP server and an IP address entry within the table, the computerized device automatically initiates a secure or VPN connection with the wireless network associated with the DHCP server. The computerized device therefore actively establishes a secure connection with the wireless network, prior to user login and without user intervention, based upon the computerized device being a client of the wireless network.
-
Citations
18 Claims
-
1. A method, comprising:
-
detecting, in a computerized device, a network identification information for the computerized device, where the computerized device receives the network identification information in a wireless local area network transmission from a network identification information source associated with a first network to which the computerized device is to establish a secure wireless data connection; comparing the detected network identification information with at least one address entry stored in an initiation information table on the computerized device, the at least one address entry having been stored in the initiation information table prior to detecting the network identification information and indicating that the first network requires a secure data connection; in response to detecting a correspondence between the network identification information and the at least one address entry in the initiation information table, detecting a profile entry, the profile entry being mapped to secure connection instructions for establishing the secure wireless data connection between the computerized device and the first network, retrieving the secure connection instructions indicated by the profile entry, and establishing the secure wireless data connection between the computerized device and the first network; and in response to detecting a secure connection stop function within the profile entry, where the secure connection stop function is a discontinue command that prevents the computerized device from establishing an unnecessary secure wireless data connection with the first network, selectively establishing a non-secure data connection between the computerized device and the first network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. In a client computer, a method for establishing a data connection to an onsite, wireless local area network comprising the steps of:
-
detecting address information for the client computer, the address information transmitted from a Dynamic Host Configuration Protocol server associated with the wireless local area network; comparing the detected address information with at least one address entry stored in an initiation information table on the client computer, the at least one address entry having been stored in the initiation information table prior to detecting the network identification information indicating the corresponding wireless local area network requiring a secure data connection and corresponding to the address information; in response to detecting a correspondence between the network identification information and the at least one address entry in the initiation information table, detecting a profile entry, the profile entry being mapped to secure connection instructions for establishing the secure data connection between the client computer and the wireless local area network, retrieving the secure connection instructions indicated by the profile entry and performing an autoinitiation procedure to establish the secure data connection with the wireless local area network; and in response to detecting a secure connection stop function within the profile entry, where the secure connection stop function is a discontinue command that prevents the client computer from establishing an unnecessary secure connection with the wireless local area network, selectively performing the autoinitiation procedure to establish a non-secure data connection with the wireless local area network.
-
-
9. A computerized device comprising:
-
at least one communications interface; a controller; and an interconnection mechanism coupling the at least one communications interface and the controller; wherein the controller is configured to; detect, in the computerized device, network identification information for the computerized device, the network identification information transmitted from a network identification information source associated with a first network through the at least one communications interface; compare the detected network identification information with at least one address entry stored on the computerized device in an initiation information table, the at least one address entry having been stored in the initiation information table prior to detecting the network identification information and indicating the corresponding first network requires a secure data connection; in response to detecting a correspondence between the network identification information and the at least one address entry in the initiation information table, detect a profile entry, the profile entry being mapped to secure connection instructions for establishing the secure data connection with the first network, retrieve the secure connection instructions indicated by the profile entry, and establish the secure data connection with the first network; and in response to detecting a secure connection stop function within the profile entry, where the secure connection stop function is a discontinue command that prevents the computerized device from establishing an unnecessary secure connection with the first network, selectively establish a non-secure data connection with the first network. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computerized device comprising:
-
at least one communications interface; a controller; and an interconnection mechanism coupling the at least one communications interface and the controller; wherein the controller is configured to; detect address information for the computerized device, the address information transmitted from a Dynamic Host Configuration Protocol server associated with a wireless network; compare the detected address information with at least one address entry stored in an initiation information table on the computerized device table prior to detecting the address information, the at least one address entry indicating the corresponding wireless network requiring a secure data connection and corresponding to the address information; in response to detecting a correspondence between network identification information and the at least one address entry in the initiation information table, detect a profile entry, the profile entry being mapped to secure connection instructions for establishing the secure data connection with the wireless network, retrieve the secure connection instructions indicated by the profile entry, and perform an autoinitiation procedure to establish the secure data connection with the wireless network; and in response to detecting a secure connection stop function within the profile entry, where the secure connection stop function is a discontinue command that prevents the computerized device from establishing an unnecessary secure connection with the wireless network, selectively performing the autoinitiation procedure to establish a non-secure data connection with the wireless network.
-
-
18. A computer program product having a non-transitory computer-readable medium including computer program logic encoded thereon that, when performed on a controller in a computerized device having a coupling to at least one communications interface provides a method for performing the operations of:
-
detecting, in the computerized device, network identification information for the computerized device, the network identification information transmitted from a network identification information source associated with a first network through the at least one communications interface; comparing the detected network identification information with at least one address entry stored on the computerized device in an initiation information table, the at least one address entry having been stored in the initiation information table prior to detecting the network identification information and indicating the corresponding first network requiring a secure data connection and corresponding to the network identification information and detecting a secure connection stop function; in response to detecting a correspondence between the network identification information and the at least one address entry in the initiation information table, detecting a profile entry, the profile entry being mapped to secure connection instructions for establishing the secure data connection between the computerized device and the first network, retrieving the secure connection instructions indicated by the profile entry, and establishing the secure data connection with the first network; and in response to detecting a secure connection stop function within the profile entry, where the secure connection stop function is a discontinue command that prevents the computerized device from establishing an unnecessary secure wireless data connection with the first network, selectively establishing a non-secure data connection with the first network.
-
Specification