Authentication mechanisms for wireless networks
First Claim
1. A method performed on a client computing device, the method comprising:
- obtaining, by the client computing device, trust information related to a wireless access point from a source other than the wireless access point;
receiving, by the client computing device from the wireless access point while the client computing device is not connected to any network to which access is provided by the wireless access point, an unrequested message that is encrypted;
decrypting, by the client computing device based on the obtained trust information, the received unrequested message;
verifying, by the client computing device based on successful decryption of the received unrequested message, the received unrequested message or an identity of the wireless access point; and
accepting, by the client computing device in response to the verifying, the decrypted message.
2 Assignments
0 Petitions
Accused Products
Abstract
Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.
161 Citations
20 Claims
-
1. A method performed on a client computing device, the method comprising:
-
obtaining, by the client computing device, trust information related to a wireless access point from a source other than the wireless access point; receiving, by the client computing device from the wireless access point while the client computing device is not connected to any network to which access is provided by the wireless access point, an unrequested message that is encrypted; decrypting, by the client computing device based on the obtained trust information, the received unrequested message; verifying, by the client computing device based on successful decryption of the received unrequested message, the received unrequested message or an identity of the wireless access point; and accepting, by the client computing device in response to the verifying, the decrypted message. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a client computing device configured to obtain trust information related to a wireless access point from a source other than the wireless access point; a network adapter configured to receive, from the wireless access point while the client computing device is not connected to any network to which access is provided by the wireless access point, an unrequested message that is encrypted; a processor configured to decrypt, device based on the obtained trust information, the received unrequested message; the client computing device further configured to verify, based on successful decryption of the received unrequested message, the received unrequested message or an identity of the wireless access point; and the client computing device further configured to accept, in response to the verified message or the verified identity of the wireless access point, the decrypted message. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. At least one computer-readable medium comprising:
memory that comprises computer-executable instructions that, based on execution by a client computing device, configure the client computing device to; obtain trust information related to a wireless access point from a source other than the wireless access point; receive, from the wireless access point while the client computing device is not connected to any network to which access is provided by the wireless access point, an unrequested message that is encrypted; decrypt, based on the obtained trust information, the received unrequested message; verify, based on successful decryption of the received unrequested message, the received unrequested message or an identity of the wireless access point; and accept, based on the verified successful decryption of the received unrequested message or the verified identity of the wireless access point, the decrypted message. - View Dependent Claims (16, 17, 18, 19, 20)
Specification