EP2002636A1 - Procede de controle de la connexion d'un premier et d'un deuxieme dispositif, point d'acces et terminal utilisateur en reseau partage correspondant - Google Patents
Procede de controle de la connexion d'un premier et d'un deuxieme dispositif, point d'acces et terminal utilisateur en reseau partage correspondantInfo
- Publication number
- EP2002636A1 EP2002636A1 EP07731718A EP07731718A EP2002636A1 EP 2002636 A1 EP2002636 A1 EP 2002636A1 EP 07731718 A EP07731718 A EP 07731718A EP 07731718 A EP07731718 A EP 07731718A EP 2002636 A1 EP2002636 A1 EP 2002636A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- pairing
- session key
- access point
- sub
- server device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Definitions
- the invention relates to a method for controlling the connection of a first and a second device, an access point and a shared network user terminal, in particular a WiFi network, forming a server device or a client terminal respectively.
- Wi-Fi shared network communication interfaces are defined by 802.11 (b), (g), (i) and (e) and rely on authentication and data encryption protocols for security and access control such as its protocols WPA - PSK and WPA2 - PSK for "Wifi Protection Access" in English.
- these protocols apply to access points and user terminals requesting a wireless connection to them, via a radio link.
- the solution proposed in this document applicable to an access point and a shared network user terminal is to perform a local initialization command for a certain duration on the access point and the user terminal, and to a temporary pairing of the access point and the user terminal, to exchange the respective initialization duration values of the access points of the user terminal. If the respective initialization durations of the latter differ from a value lower than a threshold value, the connection is continued. Otherwise, the connection is inhibited.
- the present invention aims to overcome the disadvantages and limitations of known prior art.
- an object of the present invention is the implementation of a method of controlling the connection of a first and a second device, such as an access point and a shared network user terminal, WiFi type, in which the tedious introduction and error source of a key value in hexadecimal notation is suppressed.
- Another object of the present invention is in particular the implementation of a method for controlling the connection of an access point and a shared network user terminal, of the WiFi 1 type, in which the transmission of any Cryptographic or wireless value is provided by radio between the access point and the user terminal.
- Another object of the present invention is also the implementation of a method for controlling the connection of a first and a second device, such as an access point and a shared network user terminal, of WiFi type, in which the difference of initialization time duration on the access point respectively on the shared network terminal is made substantially inoperative, through the introduction of an authentication and access control process by exchange of encrypted values over the air.
- a first and a second device such as an access point and a shared network user terminal, of WiFi type
- the method for controlling the connection of a first and a second device provided with cryptographic resources which is the subject of the invention, is remarkable in that it consists at least in executing a local control of initialization during a certain period of time. duration on the first device, and during this time, initiate an identification process on the first device from a first identification value of the first device, execute before the end of this initialization a local initialization command on the second device for temporarily placing the second device and the identification process through the first device, the initialization of the first and second devices being performed according to a common initialization step.
- the method further comprises establishing a common session key to the first and second devices, to encrypt, in the first device, a second local identification value of the first device and a value secret key associated with this first device by means of said common session key according to an encrypted value and transmit this encrypted value from the first to the second device, and, at the latter, decrypt the encrypted value of the second identification value and the secret key value associated with the first device using the common session key, and configure the second device from the second local identification value and the secret key value for pairing connection with the device.
- first device establishing a common session key to the first and second devices, to encrypt, in the first device, a second local identification value of the first device and a value secret key associated with this first device by means of said common session key according to an encrypted value and transmit this encrypted value from the first to the second device, and, at the latter, decrypt the encrypted value of the second identification value and the secret key value associated with the first device using the common session key, and configure the second device from the second local identification value and the secret key value for pairing connection
- the method which is the subject of the invention is remarkable in that it furthermore comprises the transmission by the second device of a public key to ensure the transmission of the common session key in the form of the encrypted value of the first at the second device, the decryption of this encrypted value of the common session key by this second device to restore to the latter the common session key.
- the method which is the subject of the invention is furthermore remarkable in that the first device being a shared network access point forming a server device, this server device executes, following the execution of the local initialization command, by actuating a trigger button and the launching step of an identification process by opening the pairing process from the first identification value, an event waiting stage, these events comprising at least either the transmission of a request for establishment of common session key, or the transmission of a request for reception of pairing data by the second device or the expiration of a pairing delay, and, an end step of the pairing process called either on expiration of the pairing delay or on detection of a number of common session key establishment request greater than unity.
- the method which is the subject of the invention is furthermore remarkable in that the step of processing any common session key establishment request includes at least the control of the reception of a number of key establishment requests. common session superior to the unit.
- the method which is the subject of the invention is furthermore remarkable in that waiting for the transmission of a request for reception of pairing data by the second device is formed by a loop back to the waiting step of The event is conditional upon the expiration of the pairing delay and the failure to receive a common session key establishment request and includes a step of processing any pairing data request.
- the method that is the subject of the invention is furthermore remarkable in that for a number of session key establishment requests greater than unity, the step of processing any request for receiving pairing data includes at least one the transmission, by the server device, of an error message and the call of the end of pairing step.
- the method which is the subject of the invention is furthermore remarkable in that the second device being a shared network terminal, this method includes at least one step of inviting the terminal user to execute the local initialization command.
- this method includes at least one step of inviting the terminal user to execute the local initialization command. on the first device, forming an access point to this shared network, a paired shared network search scanning step, and, upon detection of a server device constituting an access point, a control step of temporary connection of the client terminal to this access point, and, upon successful provisional connection, a transmission control and joint session key establishment request step, and, upon receipt of an acknowledgment of receipt of the request common session key set-up, a polling pairing request data transmission check step, and, upon receiving pairing data, a config control step pairing and connection management of the client terminal to the device server constituting an access point.
- the method which is the subject of the invention is furthermore remarkable in that, on the client terminal side, in the absence of detection of a server device constituting an access point, it comprises a step of returning to the invitation stage of the user of this client terminal conditional on a choice by this user is the repetition of the execution of the local initialization command, or the execution of a conventional connection.
- the method which is the subject of the invention is furthermore remarkable in that, on the client terminal side, on detecting a plurality of server devices constituting a shared network access point, this method comprises another step of returning to the step inviting the user of this client terminal conditional on a timed choice by using either the repetition of the execution of the local initialization command, or the execution of a conventional connection.
- the shared network access point forming a server device, object of the invention is remarkable in that it comprises at least local initialization control means by actuating a trigger button, launching means an identification process by opening the pairing process from a first identification value, means for executing an event waiting stage, these events comprising at least one transmission of a common session key establishment request, ie the transmission of a request for reception of pairing data by a shared network client terminal or the expiry of a pairing delay, closure means of the pairing process ordered either on expiration of the pairing delay or on detection of a number of session key establishment requests greater than unity.
- the shared network client terminal object of the invention is remarkable in that it includes at least means for displaying an invitation message from the user of this client terminal to execute a local initialization command on a shared network access point, forming a server device, means for searching for shared network pairing and temporary connection means of this client terminal to this access point, transmission control means of a common session key establishment request, transmission control means of a polling pairing data request and pairing configuration and connection control means of the client terminal to the server device forming this access point.
- the method of controlling the connection of a first and a second device, the access point and the shared network user terminal, objects of the invention find application to the connection of WiFi terminals to the access terminals.
- the INTERNET network in particular to user terminals of any type, in particular to home peripherals equipped with WiFi, Bluetooth, power line or other line interfaces.
- FIG. 1a represents, by way of illustration, a general flowchart of the essential steps of the method of controlling the connection of a first and a second device according to the subject of the present invention
- FIG. 1b represents an implementation detail of the step of establishing a common session key in a nonlimiting preferential implementation mode when the first and the second device comprise a radio link, such that a WiFi connection for example;
- FIG. 2a represents, by way of illustration, a nonlimiting preferred mode of implementation of the method that is the subject of the invention by the first device, when the latter forming a shared network access point constitutes a server device;
- FIG. 2b represents, as an illustrative example, a nonlimiting preferential embodiment of the method that is the subject of the invention by the second device, when the latter constitutes a client user terminal;
- FIG. 3 represents, by way of illustration, a block diagram of a shared network access point forming a server device allowing the implementation of the method of the invention as shown in Figure 2a.
- FIG. 1a A more detailed description of the method for controlling the connection of a first and a second device, in accordance with the subject of the present invention, will now be given in connection with FIG. 1a and the following figures.
- the first and second devices are provided with cryptographic resources and capable of executing encryption operations - decryption for example.
- the method which is the subject of the invention consists in executing A local initialization command, denoted L! Di for a certain duration on the first device noted Di and during this period, to start an identification process in step B on this first device D- t , the identification process being carried out from a first value identification of this first device and noted ID (SSiD).
- Step B is then followed by a step C consisting in executing, before the end of the initialization executed in step A, a local initialization command on the second device D 2 , this step in step C being noted LI D 2 , to put in temporary communication the second device and the identification process via the first device Di.
- the initialization of the first device Di and the second device D 2 are performed according to a common initialization step, concomitantly or not.
- Step C is then followed by a step D of establishing a session key, denoted CSK, common to the first device Di and the second device D 2 .
- CSK session key
- the concept of establishing a common session key covers both the establishment and the common storage of the same key of session by a secret convention for example, or, where appropriate, restoration of a common session key by the first device D 1 for example, and the communication in encrypted form of this common session key to the second device D 2 and it will be described later in the description.
- Step D is then followed by a step E of encrypting in the first device Di a second local identification value of this first device, denoted ssid, and a secret key value denoted K s i associated with the first device Dt , the corresponding encryption being effected by means of the common session key CSK.
- An encrypted value is thus obtained, which is then transmitted from the first device D 1 to the second device D 2 .
- step E of FIG. 1a is noted by the symbolic relation:
- Step E is then followed by a step F of decrypting the previous encrypted value transmitted V ssldKsX , this transmitted encrypted value being representative of the second local identification value ssid and the value of the associated secret key K s i at the first device. It is decrypted using the common session key CSK which of course has the second device D 2 .
- step F 1 the decryption operation is noted symbolically:
- Step F is then followed by a step G consisting in configuring the second device D 2 from the second local identification value ssid and the secret key value K s i for connection by pairing with the first device Di .
- the method which is the subject of the invention advantageously comprises the transmission by the second device D 2 to the first device Di of a public key K pu2 associated with the second device D 2 to ensure the transmission of the key CSK session common in the form of encrypted value from the first to the second device.
- the decryption of the encrypted value and the session key CSK by the second device D2 is intended to restore the second device common session key CSK
- step D1 0 denotes a generation of the common session key step CSK, which may advantageously consist in generating this key as a sequence of random bits, for example.
- the number of bits chosen may be 64 or 128 bits, for example, without limitation.
- Step D10 is then followed by a step of transmitting the public key represented by the relation:
- the common session key CSK is encrypted and transmitted to the second device in encrypted form according to the symbolic relationship shown in FIG. 1b:
- the decryption operation is then executed at the second device in step D 13 to restore the common session key CSK this decryption operation being represented by the relation:
- K p a designates the private key associated with the second device D 2 and in particular the public key K pU2 associated with the latter.
- connection control method of a first and a second device will now be given in the particular application in which the first device is an access point.
- AP to a shared network, that is to say a WiFi network for example, and where the second device D 2 is a WiFi terminal seeking to connect to the access point AP considered.
- the AP AP constitutes a server device and the terminai seeking to connect to the aforementioned access point is a user terminal UT user.
- the operating mode of the server device represented in FIG. 2a is represented after step A of FIG. 1a, that is to say the local initialization step of the first device D1, in other words of the AP access point forming the server device, has been executed.
- This step may advantageously be performed by actuating a trigger button which makes it possible to execute the local initialization command previously mentioned.
- step 101 the step of launching an identification process by opening the pairing process from the first identification value, identification process noted ID (SSID ) is performed in step 101, which corresponds to step B of Figure 1a at the corresponding server device.
- SSID identification process noted ID
- step 101 is then followed by an event waiting step 102, the server device waiting for events comprising at least one transmission of a common session key establishment request, this operation being noted R_CSK?, or the transmission of a request for reception of pairing data by the second device forming the termina! UT user, this event being noted R_UT_G_D?, or the expiration of a pairing time noted P_D_ ⁇ ?.
- the steps 102a, 102b and 102c represented by a dashed rectangle correspond in fact to the realization of a corresponding event of the event waiting step 102.
- step 102a the transmission of a request for the establishment of a common session code, denoted 3 R_CSK in step 102a, results from the execution of such a transmission and a positive response to the corresponding test executed in step 102.
- step 102b when performing the transmission of a pairing data reception request, by the second device, this operation being noted, 3 R_UT_G_D.
- step 102c the pairing time PJDJE has expired, which makes it possible to go to an end of pairing step 105 called, either on expiration of the pairing delay considered, or on detection of a number of common session die establishment requests greater than the unit, as will be described later in the description.
- the waiting time for the second device to transmit a request for establishing a common session code R_CSK is formed by a feedback loop at step d.
- event waiter 102 including a step of processing any session key setup request, noted 103 in FIG. 2a.
- the step 103 of processing any session key establishment request is represented in the form of a test due to the execution during the aforementioned step 103 of a series of tests which will be explained below.
- waiting for the transmission of a request for reception of pairing data by the second device D 2 is formed by a loop back to the event waiting step 102 conditional on the non-expiration of the pairing delay, P_DJE ⁇ 1, and the absence of receipt of a request d common session key establishment ⁇ R-CSK.
- This return loop further includes a processing step 104 of any request for receiving pairing data R_UT_G_D.
- the return loop represented in FIG. 2a for executing waiting for the transmission of a request for reception of pairing data by the second device comprises the execution of the condition of step 102 of FIG. waiting for existence events of a request receiving the pairing data ⁇ RJJT GJD in step 102b and the processing step 104 of this request by the server device and checking the conditions 104a of non-expiration of the pairing delay, this condition being noted PJDJE ⁇ 1, and of not receiving a request for establishment of common session key noted: ⁇ R_CSK and the verification of pairing data transmitted to the user terminal UT.
- This condition being denoted PD ⁇ 0.
- the step of processing any session key establishment request 103 also includes the control of the reception of a number of common session key establishment requests greater than one. 'unit.
- the step of processing any said pairing data reception request 104 includes transmitting, by the server device, an error message and the call of the end of pairing step 105 above.
- step 101 that is to say after the user has, for example, pressed the trigger button of the access point AP, three events are executed:
- a light flashes on the access point AP forming the server device during the entire pairing period.
- the server device forming the access point AP then switches according to the standard pairing mode on the basis of its main identifier. to say its MAC address.
- the access control is deactivated and any WiFi-type UT user terminal that successfully connects to the AP access point by a WiFt type link is then added as a candidate user terminal for the MAC address considered.
- the main identifier is then broadcast by the access point by the radio interface of the latter.
- the standard pairing mode thus lasts for a determined time ⁇ 0 which can be of the order of 600 seconds for example. However, in the case where this delay expires, the temporary connection procedure based on the MAC address is then reactivated.
- a new local identifier playing the role of first local identifier noted SSlD or pairing identifier is then created.
- This local identifier has no WiFi security measures ie no WEP or WPA security protocol and then provides access to a LAN separate and distinct from the original LAN.
- This separate LAN does not allow access to the Internet and is totally isolated from the original LAN.
- This separate local area network may have, advantageously but without limitation, the following characteristics:
- the IP range of the local network is given by a domain IP address and an IP network mask
- a DHCP server for "Dynamic Host Configuration Protocol" in English makes it possible to deliver IP addresses to client terminals UT from an address range between a start address and an end address;
- a firewall system only allows DHCP or HTTP requests between a UT client user terminal and the AP access point, no WtFi traffic being authorized between the client user terminal;
- an HTTP server having two URLs makes it possible to process the R_CSK or R_UT_G_D common session key transmission requests during the event waiting step. as described previously in the description.
- the corresponding WEB server does not have other access pages;
- the pairing identifier SSiD is valid during a time S 1 for opening the pairing process which is valid for about 60 seconds.
- the first local SSID pairing ID is disabled.
- Step 103 of the processing of a common session key transmission request R CSK is a common session key transmission request.
- the aforementioned step 103 executes the responses to the request for sending common session key launched by the user terminal UT during the common initialization period.
- the server device then tries to read the public key Kp u2 and if an error is detected, the server device returns a 200 code HTTP message and an HTML page containing a string of characters coded Result ⁇ n;
- the processing step 104 executes the responses of the server device to the aforementioned requests transmitted by the user terminal UT.
- the processing step 104 is executed as a verification of the successive conditional constraints:
- step 104b of FIG. 2a This condition is represented in step 104b of FIG. 2a.
- the pairing process of the server device is then terminated by calling the end pairing step 105 which has the effect of deactivating the first local identifier value SSlD.
- the pairing process can be restarted by pressing the pairing trigger button again On the server device playing AP role AP.
- EKeyi, EKey2, EKey3, EiV, EPSK and ESSID are the respective encrypted values of the session key or, more exactly, a combination of a session key value and a public key value such as the key K pU2. associated with the user terminal UT, and where ESSiD designates the value encrypted by a symmetric encryption protocol type DES, for example, the second local identification value of the server device.
- DES symmetric encryption protocol type
- Step 105 end of pairing step.
- the trusted pairing process is terminated.
- any pending HTTP requests are answered but no new HTTP requests are accepted.
- the pairing ID is disabled. The pairing process is not stopped yet and continues until its own pairing time, the standard pairing time S 0, has expired.
- the client terminal UT displays a step of inviting the user of the client terminal on a screen, such as the screen of a PDA or any device with a screen by for example, to execute the local initialization command on the first device, that is to say the server device playing the role of access point AP in shared network.
- a screen such as the screen of a PDA or any device with a screen by for example, to execute the local initialization command on the first device, that is to say the server device playing the role of access point AP in shared network.
- This operation is represented in step 201 in FIG. 2b.
- Step 201 is followed by a step 202 of searching for a paired shared network search, ie searching for the identifier of the access point AP constituted by the MAC address of the latter.
- step 202 On negative response at step 202 that is to say when no access point and in particular no access point MAC address is detected, as represented in step 202a of FIG. 2b, a return is made to the invitation step 201 via a choice step 208 offered to the user between a standard connection 208a or on the contrary a return to the invitation step 201 to make a connection Trusted.
- the choice step 208 is in fact a step back to the user terminal conditional user's invitation stage of choice by this user, either from the repetition of the execution of the local command 201 or from the execution of a conventional connection 208a.
- the detection of a plurality of AP access points can result, for example, from the existence, in an apartment building, of neighboring access points which simultaneously transmit their MAC address, the user terminal then detecting several points of access. AP access on which he does not have to connect.
- step 203 a temporary connection control step of the client terminal UT at the point d said AP access is called at step 203.
- the aforementioned temporary connection is made initially on the basis of the MAC address of the access point AP and then on the basis of the first local identification value of the server device, the value SSID previously described in the description.
- step 203 On a negative response at step 203, an error message at step 203a is sent and a return to step 201 is performed through the choice step 208 and alternative choice 208a previously described in the description.
- a step 204a of transmitting an error message due to the existence of a common session key allows the return to step 201 via the step choice 208 and standard connection choice 208a.
- a polling pairing request request transmission step 205 is executed by the user terminal UT which, in the operation polling still referred to as "Polling" in English, search the encrypted value VssidKsl previously mentioned in the description.
- a step 206 of configuration control of pairing and connection of the client terminal to the server device constituting an access point is executed.
- the step 206 makes it possible, thanks to the decryption G represented in FIG. 1a, to restore the identifier values, the second local value of identifier ssid, and the secret key K s i associated with the server device, acting as a point d AP access.
- a return to the invitation step 201 is performed via the selection step 208 and the standard connection 208a.
- a step 206b is called the execution of the queuing process between the user terminal UT and the server device on the basis of the pairing parameters and in particular the values obtained by decryption at step 206.
- the pairing data correspond to those contained in Table 1 previously described in the description.
- step 203 at the AP access point
- the temporary connection to the AP access point allows the user terminal AP to obtain an IP address seion the DHCP protocol already mentioned.
- step 204
- the client terminal UT transmits its common session key transmission request CSK and public key transmission K pU 2 for example in the form of an HTTP POST message to the server device forming the access point AP .
- step 205 of scanning
- step 206
- the invention furthermore covers a shared network user terminal connection device forming an access point to this shared network, and operating as a server device vis-à-vis client terminals.
- Such a server device comprises, for a WiFi type shared network for example, a module 1 Q WiFi radio link signal interface, a module 1 i software interface for managing the WiFi radio link signal interface and a pairing module 1.2 for executing the reliable pairing in accordance with the method that is the subject of the present invention.
- the pairing module I 2 may be associated with a temporary and permanent database 1 3 and an initialization circuit 1 4 is provided which may consist of a push button placed outside the housing constituting the server device considered.
- a short-range interface 1 5 may be optionally provided, when it is desirable to reduce the scope of the server of the object of the invention as shown in FIG. 3.
- the pairing module 1 2 also comprises a sub-module M 2 end pairing process called either on expiration of the pairing period reliability or on detection of a number of common session key establishment requests greater than the unit as shown for processing 104, 104b of Figure 2a.
- the invention finally covers a computer program recorded on a storage medium comprising a sequence of instructions for execution by a computer or by a server device forming a shared network access point as represented in FIG. 3, this program computer is remarkable in that during the execution of these instructions this program performs the steps of the method of the invention as shown in Figure 1a and Figure 2a in particular.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0602925 | 2006-04-04 | ||
PCT/FR2007/050902 WO2007113408A1 (fr) | 2006-04-04 | 2007-03-09 | Procede de controle de la connexion d'un premier et d'un deuxieme dispositif, point d'acces et terminal utilisateur en reseau partage correspondant |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2002636A1 true EP2002636A1 (fr) | 2008-12-17 |
Family
ID=37487584
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07731718A Ceased EP2002636A1 (fr) | 2006-04-04 | 2007-03-09 | Procede de controle de la connexion d'un premier et d'un deuxieme dispositif, point d'acces et terminal utilisateur en reseau partage correspondant |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2002636A1 (fr) |
WO (1) | WO2007113408A1 (fr) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005032072A2 (fr) * | 2003-09-30 | 2005-04-07 | Koninklijke Philips Electronics N.V. | Affectation automatique d'un identifiant reseau |
JP2005117247A (ja) * | 2003-10-06 | 2005-04-28 | Saxa Inc | 無線lanシステムにおける登録方法 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7607015B2 (en) * | 2002-10-08 | 2009-10-20 | Koolspan, Inc. | Shared network access using different access keys |
-
2007
- 2007-03-09 EP EP07731718A patent/EP2002636A1/fr not_active Ceased
- 2007-03-09 WO PCT/FR2007/050902 patent/WO2007113408A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005032072A2 (fr) * | 2003-09-30 | 2005-04-07 | Koninklijke Philips Electronics N.V. | Affectation automatique d'un identifiant reseau |
JP2005117247A (ja) * | 2003-10-06 | 2005-04-28 | Saxa Inc | 無線lanシステムにおける登録方法 |
Non-Patent Citations (5)
Title |
---|
"Machine Translation in English of JP2005117247 A 20050428 (application JP20030347039 20031006)", KATO TAKASHI; SAITO MINETAKA; WATABE HIROTO; CHIBA TOSHIYUKI; NAKAGAWA TADAYUKI; KOYAMA KENICHI; OKITA NORIMICHI; NAKAYAMA ATSUHIRO, 28 May 2005 (2005-05-28), XP055033501, Retrieved from the Internet <URL:http://dossier-services.internal.epo.org/application/JPO/JP/2003-347039/Description_50301661095/?serveAsMime=application/pdf;overlay=true&language=en&inline=true#view=fitH,0> [retrieved on 20120720] * |
ANTON B ET AL: "Best current practices for wireless internet service provider (WISP) roaming", WIRELESS ISP ROAMING, XX, XX, 1 February 2003 (2003-02-01), pages 1 - 37, XP002963834 * |
L. CAMPAGNOLLE: "(MISE à JOUR) LES 'BOX' DES FAI SèMENT LA PANIQUE DANS LES CENTRES D'APPELS", 01NET, 7 January 2005 (2005-01-07), pages 1 - 2, XP003031388 |
M. CALAIS: "ORANGE MET à PROFIT LES IDéES DE SES SALARIéS", LA TRIBUNE, 13 August 2010 (2010-08-13), pages 1 - 2, XP003031387 |
See also references of WO2007113408A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2007113408A1 (fr) | 2007-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1733533A1 (fr) | Procede et systeme de gestion d'autorisation d'acces d'un utilisateur au niveau d'un domaine administratif local lors d'une connexion de l'utilisateur a un reseau ip | |
EP1393527A1 (fr) | Procede d'authentification entre un objet de telecommunication portable et une borne d'acces public | |
FR3036913A1 (fr) | Procede de controle d'acces a un service | |
WO2006125885A1 (fr) | Procede de controle de la connexion d'un peripherique a un point d'acces, point d'acces et peripherique correspondants | |
EP2822285A1 (fr) | Appariement de dispositifs au travers de réseaux distincts | |
FR2932936A1 (fr) | Procede pour securiser des echanges entre un noeud demandeur et un noeud destinataire, lesdits noeuds appartenant a un reseau de communication. | |
EP2348763B1 (fr) | Procédé d'authentification d'un terminal mobile pour accéder à un serveur d'applications | |
WO2019186006A1 (fr) | Procédé de connexion sans fil d'un objet communicant à un réseau de communication local, programme d'ordinateur et équipement d'accès correspondant | |
EP2608590A1 (fr) | Auto-configuration d'un équipement pour la connexion à un réseau sans fil sécurisé | |
EP2002636A1 (fr) | Procede de controle de la connexion d'un premier et d'un deuxieme dispositif, point d'acces et terminal utilisateur en reseau partage correspondant | |
EP3530036B1 (fr) | Procédé d'appairage auprès d'une passerelle | |
EP4080923B1 (fr) | Dispositif électronique de gestion décentralisée de groupe(s) de communication | |
WO2024184086A1 (fr) | Procede d'appairage automatique d'au moins un dispositif d'appariement a un reseau et systeme associe | |
EP1715690A1 (fr) | Procédé de transmission de données de vidéo téléphonie | |
EP4018554B1 (fr) | Procedes et dispositifs d'appairage dans un reseau sans-fil | |
WO2011073584A1 (fr) | Procede de controle d'acces a un reseau local | |
FR2895816A1 (fr) | Systeme, dispositif portable et procede pour la configuration d'un dispositif communicant dans un reseau | |
FR3052004B1 (fr) | Procede d'echange de donnees entre un objet connecte et un serveur central. | |
EP4256753A1 (fr) | Procédé de détection d'un équipement malveillant dans un réseau de communication, équipement de communication et programme d'ordinateur correspondants | |
EP3970336A1 (fr) | Procede de gestion d'une information de securite dans un reseau de communication, dispositif, equipement d'acces audit reseau et programmes d'ordinateur correspondants | |
WO2022238644A1 (fr) | Procede de defense contre une tentative de deconnexion entre deux entites, systeme associe | |
FR2924294A1 (fr) | Procede de transmission et systeme de telecommunications | |
FR3116978A1 (fr) | Contrôle d’accès à un réseau de communication local, et passerelle d’accès mettant en œuvre un tel contrôle | |
EP4329245A1 (fr) | Procédé et dispositif de connexion sécurisée dans un réseau local | |
FR3110802A1 (fr) | Procédé de contrôle de l’attribution d’une adresse IP à un équipement client dans un réseau de communication local, procédé de traitement d’une requête d’attribution d’une adresse IP à un équipement client dans un réseau de communication local, dispositifs, équipement d’accès, équipement serveur et programmes d’ordinateur correspondants. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20081001 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
17Q | First examination report despatched |
Effective date: 20090710 |
|
DAX | Request for extension of the european patent (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ORANGE |
|
TPAC | Observations filed by third parties |
Free format text: ORIGINAL CODE: EPIDOSNTIPA |
|
TPAC | Observations filed by third parties |
Free format text: ORIGINAL CODE: EPIDOSNTIPA |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20160529 |