Connecting remote and local networks using an identification device associated with the remote network
First Claim
Patent Images
1. A method, comprising:
- upon detecting a portable device within a local network, obtaining information from the portable device, wherein the information identifies a remote network and allows authorized access to the remote network;
transmitting, from the local network, to a network host device located within the remote network, a first authentication credential based on the obtained information from the portable device, wherein the network host device is configured to authenticate the portable device based on the first authentication credential;
authenticating the network host device, based on a second authentication credential communicatively corresponding to the network host device;
upon successfully authenticating the network host device, and further upon the successful authentication of the portable device by the network host device, establishing, from the local network, a secure network connection with the network host device located within the remote network, based on the obtained information from the portable device, whereby the established secure network connection enables a computing device within the local network and that is distinct from the portable device, to access at least one of one or more devices and one or more services connected to the remote network via the established secure network connection so long as the portable device remains within the local network; and
responsive to detecting that the portable device is no longer present within the local network, terminating the secure network connection established with the network host device, such that the computing device can no longer access the remote network devices and services.
1 Assignment
0 Petitions
Accused Products
Abstract
One or more portable identification devices associated with a first smart network can be carried with a user of the first smart network to a second smart network and used to automatically identify the first smart network and allow authorized access to the smart network via the second smart network. The one or more portable identification devices are configured to automatically provision the second smart network with the information necessary for the second smart network to identify the first smart network and the authorization credentials to connect to the first smart network. In some example embodiments, the portable identification devices may be RFID tags.
-
Citations
14 Claims
-
1. A method, comprising:
-
upon detecting a portable device within a local network, obtaining information from the portable device, wherein the information identifies a remote network and allows authorized access to the remote network; transmitting, from the local network, to a network host device located within the remote network, a first authentication credential based on the obtained information from the portable device, wherein the network host device is configured to authenticate the portable device based on the first authentication credential; authenticating the network host device, based on a second authentication credential communicatively corresponding to the network host device; upon successfully authenticating the network host device, and further upon the successful authentication of the portable device by the network host device, establishing, from the local network, a secure network connection with the network host device located within the remote network, based on the obtained information from the portable device, whereby the established secure network connection enables a computing device within the local network and that is distinct from the portable device, to access at least one of one or more devices and one or more services connected to the remote network via the established secure network connection so long as the portable device remains within the local network; and responsive to detecting that the portable device is no longer present within the local network, terminating the secure network connection established with the network host device, such that the computing device can no longer access the remote network devices and services. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable medium including instructions that, when executed by a processing unit, cause the processing unit to perform the steps of:
-
upon detecting a portable device within a local network, obtaining information from the portable device, wherein the information identifies a remote network and allows authorized access to the remote network; transmitting, from the local network, to a network host device located within the remote network, a first authentication credential based on the obtained information from the portable device, wherein the network host device is configured to authenticate the portable device based on the first authentication credential; authenticating the network host device, based on a second authentication credential corresponding to the network host device; upon successfully authenticating the network host device, and further upon the successful authentication of the portable device by the network host device, establishing, from the local network, a secure network connection with the network host device located within the remote network, based on the obtained information from the portable device, whereby the established secure network connection enables a computing device within the local network and that is distinct from the portable device, to access at least one of one or more devices and one or more services communicatively connected to the remote network via the established secure network connection so long as the portable device remains within the local network; and responsive to detecting that the portable device is no longer present within the local network, terminating the secure network connection established with the network host device, such that the computing device can no longer access the remote network devices and services. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system, comprising:
a network host device located within a local network that is configured to; upon detecting a portable device within a local network, obtain information from the portable device, wherein the information identifies a remote network and allows authorized access to the remote network; transmit, from the local network, to a network host device located within the remote network, a first authentication credential based on the obtained information from the portable device, wherein the network host device is configured to authenticate the portable device based on the first authentication credential; authenticate the network host device, based on a second authentication credential corresponding to the network host device; upon successfully authenticating the network host device, and further upon the successful authentication of the portable device by the network host device, establish, from the local network, a secure network connection with the network host device located within the remote network, based on the obtained information from the portable device, whereby the established secure network connection enables a computing device within the local network and that is distinct from the portable device, to access at least one of one or more devices and one or more services communicatively connected to the remote network via the established secure network connection so long as the portable device remains within the local network; and responsive to detecting that the portable device is no longer present within the local network, terminate the secure network connection established with the network host device, such that the computing device can no longer access the remote network devices and services. - View Dependent Claims (14)
Specification