Validating presence of a communication device using a wireless local area network
First Claim
1. A method for validating presence of a device in a confined area using a wireless local area network (WLAN) operable in the confined area, the method comprising:
- sending, by the device to a server, a first handshake message including a first key generated by the device over a connection in a second network that is a wireless wide area network;
generating, by the server, a random second key to be returned to the device in a second handshake message over the second network connection in response to receiving the first handshake message;
sending a WLAN probe request that has been modified to include the second key back to the server via the WLAN; and
validating whether the device is present within the confined area by the server by determining whether the second key generated by the server is the same as the second key returned to the server in the modified WLAN probe request by the device;
whereaftertaking an action by the server in response to the validating step.
12 Assignments
0 Petitions
Accused Products
Abstract
A method and system for validating presence of a communication device in a confined area using a wireless local area network (WLAN) includes sending a first handshake message including a generated first key over a second network connection different from the WLAN connection by a device. A next step includes generating a second key to be returned to the device in a second handshake message over the same connection. A next step includes sending a WLAN probe request that has been modified to include the second key via the WLAN. A next step includes validating whether the device is present within the confined area using a second communication network; whereafter allowing communication access over the second network using both the first and second keys if the device is validated as being present within the confined area, and taking appropriate action if the device is not validated as being present within the confined area.
15 Citations
17 Claims
-
1. A method for validating presence of a device in a confined area using a wireless local area network (WLAN) operable in the confined area, the method comprising:
-
sending, by the device to a server, a first handshake message including a first key generated by the device over a connection in a second network that is a wireless wide area network; generating, by the server, a random second key to be returned to the device in a second handshake message over the second network connection in response to receiving the first handshake message; sending a WLAN probe request that has been modified to include the second key back to the server via the WLAN; and validating whether the device is present within the confined area by the server by determining whether the second key generated by the server is the same as the second key returned to the server in the modified WLAN probe request by the device;
whereaftertaking an action by the server in response to the validating step. - View Dependent Claims (2)
-
-
3. A system for validating presence of a device in a confined area using a wireless local area network (WLAN) operable in the confined area, the system comprising:
-
the device operable to send a first handshake message including a first key generated by the device over a connection in a second network that is a wireless wide area network; and a server operable to receive, from the device over the second network, the first handshake message, and in response generate a random second key to be returned to the device in a second handshake message over the second network connection, wherein the device is further operable to send a WLAN probe request that has been modified to include the second key back to the server via an access point of the WLAN, wherein the server further operable to validate whether the device is present within the confined area using the second key received from the access point by determining whether the second key generated by the server is the same as the second key returned to the server in the modified WLAN probe request by the device, and take an action in response to the validation of the device. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for validating presence of a device in a confined area using a wireless local area network (WLAN) operable in the confined area, the system comprising:
-
a plurality of identification tags configured to be disposed at mapped locations within the confined area and operable to periodically broadcast or respond to interrogation requests with unique identity information; a device operable to read identity information broadcast from identification tags in proximity to the device and send a first handshake message including a first key generated by the device and a tag identity over a packet cellular network; and a server operable to receive, from the device over the cellular network, the first handshake message, and in response generate a random second key to be returned to the device along with the tag identity in a second handshake message over the same cellular network connection, wherein the device is further operable to send a WLAN probe request that has been modified to include the second key and the tag identity back to the server via an access point of the WLAN that forwards the second key and the tag identity to the server, wherein the server further operable to validate whether the device is present within the confined area using the second key and the tag identity received from the access point by determining whether the second key generated by the server is the same as the second key returned to the server in the modified WLAN probe request by the device and whether the tag identity in the first handshake message and the tag identity from the WLAN probe request are the same, and deliver a WLAN probe response modified with a validation status back to the device via the access point;
whereinif the device is validated as being present within the confined area, the device is then allowed access to send location update messages to the server over the cellular network using the first and second keys and the tag identity, and if the device is not validated as being present within the confined area, the device is disallowed communication access to send messages to the server.
-
Specification