×

Secure network enrollment

  • US 9,686,238 B1
  • Filed: 07/07/2016
  • Issued: 06/20/2017
  • Est. Priority Date: 07/07/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method for accessing a second network associated with a mobile cellular network (MCN) communication system, the method comprising:

  • requesting a first access point of a MCN communication system based at least in part on a first access point identifier communicated to the MCN communication system;

    receiving at a user equipment, a first network identifier associated with the first access point from the MCN communication system;

    establishing a first virtual private network tunnel to a first private network based at least in part on the first network identifier and first private network credentials;

    receiving a first private network identifier associated with the first private network;

    communicating identification data to a provisioning device on the first private network based at least in part on the first private network identifier, wherein the provisioning device communicates the identification data to an authentication device on a distinct private network via a distinct virtual private network tunnel and receives encrypted second network access data from the authentication device;

    receiving from the provisioning device the encrypted second network access data;

    decrypting the encrypted second network access data to obtain a second access point identifier for a second access point of the MCN communication system, second private network credentials for a second private network, and third private network credentials for a third private network;

    terminating the first virtual private network tunnel to the first private network;

    requesting the second access point of the communication system based at least in part on the second access point identifier;

    receiving a second network identifier associated with the second access point from the MCN communication system;

    establishing a second virtual private network tunnel to the second private network based at least in part on the second network identifier and the second private network credentials;

    receiving a second private network identifier associated with the second private network;

    establishing a third virtual private network tunnel to the third private network based at least in part on the second private network identifier and the third private network credentials, wherein the third private network is accessed via the second private network; and

    receiving a third private network identifier associated with the third private network.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×