System and method for user certificate initiation, distribution, and provisioning in converged WLAN-WWAN interworking networks
First Claim
1. A method comprising:
- generating a security key pair in a personal computer, wherein the security key pair comprises a public key and a private key, the public key stored in a secure storage of the personal computer;
sending the public key from the personal computer to a mobile terminal and sending the public key from the mobile terminal to a cellular operator;
receiving a first instance of a user certificate, from the cellular operator, at the mobile terminal;
sending a second instance of the user certificate from the mobile terminal to the personal computer;
sending a plurality of instances of the user certificate respectively from the mobile terminal to a plurality of personal computers;
utilizing the mobile terminal on a wireless wide-area network (WWAN) based on the first instance while simultaneously utilizing the personal computer on a wireless local-area network (WLAN) based on the second instance and simultaneously utilizing the plurality of personal computers on the WLAN based on the plurality of instances of the user certificate;
wherein the mobile terminal includes the first instance of the user certificate while simultaneously the personal computer includes a second instance of the user certificate and the plurality of personal computers include the plurality of instances of the user certificate;
wherein the user certificate was generated by the cellular operator based on the public key sent from the mobile terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for user certificate initiation, distribution, and provisioning in converged WLAN-WWAN interworking networks. A computing device operable in a wireless local area network sends a public key to a mobile device operable in a wireless cellular wide area network. The mobile device performs a bootstrapping procedure with a cellular operator in the wireless cellular wide area network to obtain a user certificate based on the public key. The mobile device sends the user certificate to the computing device for installation on the computing device. The user certificate may be used for digital signature, verification, and encryption purposes. The user certificate is also used in both the wireless local area network and the wireless wide area network for authenticating a subscriber when accessing services from both networks.
-
Citations
17 Claims
-
1. A method comprising:
-
generating a security key pair in a personal computer, wherein the security key pair comprises a public key and a private key, the public key stored in a secure storage of the personal computer; sending the public key from the personal computer to a mobile terminal and sending the public key from the mobile terminal to a cellular operator; receiving a first instance of a user certificate, from the cellular operator, at the mobile terminal; sending a second instance of the user certificate from the mobile terminal to the personal computer; sending a plurality of instances of the user certificate respectively from the mobile terminal to a plurality of personal computers; utilizing the mobile terminal on a wireless wide-area network (WWAN) based on the first instance while simultaneously utilizing the personal computer on a wireless local-area network (WLAN) based on the second instance and simultaneously utilizing the plurality of personal computers on the WLAN based on the plurality of instances of the user certificate; wherein the mobile terminal includes the first instance of the user certificate while simultaneously the personal computer includes a second instance of the user certificate and the plurality of personal computers include the plurality of instances of the user certificate; wherein the user certificate was generated by the cellular operator based on the public key sent from the mobile terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. At least one non-transitory storage medium having instructions stored thereon for causing a system to perform operations comprising:
-
generating a security key pair in a first computing node, the security key pair comprising a public key and a private key; sending the public key from the first computing node to a mobile second computing node; sending the public key from the second computing node to a cellular operator network; receiving a second instance of a user certificate, from the cellular operator network, at the second computing node; sending a first instance of the user certificate from the second computing node to the first computing node; sending a plurality of instances of the user certificate respectively from the second computing node to a plurality of computing nodes; simultaneously utilizing (a) the second computing node on a wireless wide-area network (WWAN) based on the second instance, (b) the first computing node on a wireless local-area network (WLAN) based on the first instance, and (c) the plurality of computing nodes on the WLAN based on the plurality of instances; wherein simultaneously the first computing node includes the first instance, the second computing node includes the second instance, and the plurality of computing nodes includes the plurality of instances; wherein the second instance was generated by the cellular operator based on the public key sent. - View Dependent Claims (11, 12, 13)
-
-
14. At least one non-transitory storage medium having instructions stored thereon for causing a system to perform operations comprising:
-
sending a public key from a first computing node (node) to a cellular operator network; receiving an instance of a user certificate, from the cellular operator network, at the first node; sending a plurality of instances of the user certificate from the first node to a plurality of nodes; simultaneously utilizing (a)(i) the first node on a wireless wide-area network (WWAN) based on the instance, and (a)(ii) a first plurality of the plurality of nodes on a wireless local-area network (WLAN) based on the plurality of instances; wherein simultaneously the first node includes the instance while the plurality of nodes include the plurality of instances. - View Dependent Claims (15, 16, 17)
-
Specification