Securing communications over a first communication link with encryption managed by a second communication link
First Claim
1. A method for securing a communication link, the method comprising:
- establishing a first wireless communication link between a user equipment device (UE) and a communication network, wherein the first wireless communication link is an unsecured communication link and is established under a first air interface protocol;
communicating unencrypted data between the UE and the Internet over the first unsecured wireless communication link;
transmitting, by the UE, a request to engage in a secure communication, wherein the request includes a request to engage in a hypertext transfer protocol secure (HTTPS) communication over the first wireless communication link;
establishing, responsive to the UE transmitting the request to engage in the secure communication, a second wireless communication link between the UE and the communication network, wherein the second wireless communication link is a secured communication link and is established under a second air interface protocol;
transmitting, responsive to the UE transmitting the request to engage in the secure communication, an encryption key to the UE over the second wireless communication link;
encrypting data, by the UE, using the encryption key; and
communicating the encrypted data over the first wireless communication link from the UE to the communication network.
6 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are a method, apparatus, and system for securing a communication link between a user equipment device (UE) and a communication network. A first wireless communication link is established between the UE and the communication network. The first wireless communication link is an unsecured communication link and is established under a first air interface protocol. A second wireless communication link is established between the UE and the communication network. The second wireless communication link is a secured communication link and is established under a second air interface protocol. An encryption key is transmitted to the UE over the second wireless communication link, the UE encrypts data using the encryption key, and the encrypted data is communicated over the first wireless communication link from the UE to the communication network.
-
Citations
17 Claims
-
1. A method for securing a communication link, the method comprising:
-
establishing a first wireless communication link between a user equipment device (UE) and a communication network, wherein the first wireless communication link is an unsecured communication link and is established under a first air interface protocol; communicating unencrypted data between the UE and the Internet over the first unsecured wireless communication link; transmitting, by the UE, a request to engage in a secure communication, wherein the request includes a request to engage in a hypertext transfer protocol secure (HTTPS) communication over the first wireless communication link; establishing, responsive to the UE transmitting the request to engage in the secure communication, a second wireless communication link between the UE and the communication network, wherein the second wireless communication link is a secured communication link and is established under a second air interface protocol; transmitting, responsive to the UE transmitting the request to engage in the secure communication, an encryption key to the UE over the second wireless communication link; encrypting data, by the UE, using the encryption key; and communicating the encrypted data over the first wireless communication link from the UE to the communication network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A user equipment device (UE) comprising:
-
a first radio for establishing a first wireless communication link between the UE and a communication network, wherein the first radio operates under a first air interface protocol; a second radio for establishing a second wireless communication link between the UE and the communication network, wherein the second radio operates under a second air interface protocol; and control logic operable to; establish the first wireless communication link under the first air interface protocol, communicate unencrypted data between the UE and the Internet over the first wireless communication link, transmit a request to engage in a secure communication, wherein the request is to engage in a hypertext transfer protocol secure (HTTPS) communication over the first wireless communication link, establish, responsive to transmitting the request, the second wireless communication link under the second air interface protocol, and wherein the control logic is further operable to receive an encryption key over the second wireless communication link in response to transmitting the request, to encrypt data using the encryption key, and to communicate the encrypted data over the first wireless communication link. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A communication network comprising:
-
a user equipment device (UE); a wireless local area network (WLAN) access point; a base station; and an encryption node, wherein the UE is configured to communicate with the WLAN access point to establish a first communication link between the UE and the communication network, wherein the first communication link is established under a WLAN protocol, wherein the UE is configured to communicate unencrypted data between the UE and the Internet over the first communication link, wherein the UE is configured to transmit a request for the UE to engage in a secure communication, wherein the request includes a request for the UE to engage in a hypertext transfer protocol secure (HTTPS) communication over the first communication link, wherein the UE is configured to communicate, responsive to the UE transmitting the request to engage in the secure communication, with the base station to establish a second communication link between the UE and the communication network, wherein the second communication link is established under a cellular network protocol, wherein the encryption node is configured to transmit, responsive to identifying the transmitted request, an encryption key to the UE over the second communication link, wherein the UE is configured to encrypt data using the encryption key and to communicate the encrypted data to the encryption node over the first communication link. - View Dependent Claims (14, 15, 16, 17)
-
Specification