WO2003096554A2 - Seamless public wireless local area network user authentication - Google Patents

Seamless public wireless local area network user authentication Download PDF

Info

Publication number
WO2003096554A2
WO2003096554A2 PCT/US2003/015026 US0315026W WO03096554A2 WO 2003096554 A2 WO2003096554 A2 WO 2003096554A2 US 0315026 W US0315026 W US 0315026W WO 03096554 A2 WO03096554 A2 WO 03096554A2
Authority
WO
WIPO (PCT)
Prior art keywords
wireless communications
mobile wireless
communications device
authentication
request
Prior art date
Application number
PCT/US2003/015026
Other languages
French (fr)
Other versions
WO2003096554A3 (en
Inventor
Charles Chuanming Wang
Sachin Satish Mody
Junbiao Zhang
Kumar Ramaswamy
Original Assignee
Thomson Licensing S.A.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing S.A. filed Critical Thomson Licensing S.A.
Priority to JP2004504401A priority Critical patent/JP4340626B2/en
Priority to KR1020047018276A priority patent/KR101022260B1/en
Priority to EP03724570.1A priority patent/EP1504621B1/en
Priority to US10/514,311 priority patent/US8289936B2/en
Priority to BRPI0309974A priority patent/BRPI0309974B1/en
Priority to AU2003230389A priority patent/AU2003230389A1/en
Publication of WO2003096554A2 publication Critical patent/WO2003096554A2/en
Publication of WO2003096554A3 publication Critical patent/WO2003096554A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

A public wireless LAN (11) permits receipt of non-authentication traffic, such as access information requests, from a mobile wireless communications device (121) prior to device authentication by partially opening a controlled port within an access point (181). The wireless LAN re-directs such non-authentication traffic received at the AP from the mobile wireless communications to a local web server (21). The local web server provides reply to the mobile wireless communications device, enabling a determination by the device whether or not to request access. The device seeks access by way of an access request received at the AP. In response, the AP re-directs the access request through an uncontrolled port in the AP to an access server (26) that authenticates device. Upon successful device authentication, the AP fully opens its controlled port to permit the exchange of traffic through that port with the mobile wireless communications device.

Description

SEAMLESS PUBLIC WIRELESS LOCAL AREA NETWORK USER
AUTHENTICATION
CROSS-REFERENCE TO RELATED APPLICATIONS This is a non-provisional application claiming the benefit under 35 U.S.C. § 119 of provisional application Serial No. 60/376,029, entitled "SEAMLESS PUBLIC WIRELESS LOCAL AREA NETWORK USER AUTHENTICATION", filed on 13 MAY 2002, which is incorporated by reference herein.
TECHNICAL FIELD
This invention relates to a technique for authenticating a mobile wireless communications device in a public wireless Local Area Network (LAN).
BACKGROUND ART
Advances in the field of wireless LAN technology have resulted in the emergence of publicly accessible wireless LANs (e.g., "hot spots") at rest stops, cafes, libraries and similar public facilities. Presently, public wireless LANs offer mobile wireless communications device users access to a private data network, such as a Corporate Intranet, or a public data network such as the Internet. The relatively low cost to implement and operate a public wireless LAN, as well as the available high bandwidth (usually in excess of 10 Megabits/second) makes the public wireless LAN an ideal access mechanism through which users can exchange packets with an external entity. When a user travels into a public wireless LAN coverage area, the public wireless
LAN first authenticates and authorizes the user prior to granting network access. After authentication, the public wireless LAN Access Point (AP) opens a secure data channel to the mobile wireless communications device to protect the privacy of data exchanged with the device. Presently, many manufacturers of wireless LAN equipment have adopted the IEEE 802. Ix protocol for deployed equipment. Hence, the predominant authentication mechanism for wireless LANs utilizes this standard. Unfortunately, the IEEE 802. Ix protocol was a safe authentication procedure, but such mechanisms do not permit setting of a Wired
Equivalent Privacy (WEP) encryption key in the Web browser. Therefore, data transmitted over wireless LAN after authentication remains unprotected.
Thus, there is need for an authentication process for use in a public wireless LAN environment that permits authentication in accordance with the IEEE 802. Ix protocol, thus protecting the privacy of exchanged data, while affording customized interaction mechanisms.
BRIEF SUMMARY OF THE INVENTION
Briefly, in accordance with a preferred embodiment of the present principles, there is provided a method for authenticating the user of a mobile wireless communications device in a public wireless LAN. The method commences upon receipt of a request received from a mobile wireless communications device for non-authentication information, which can include access information, such as the cost of access. In response to such an information request, a controlled port in the public wireless LAN is partially opened to enable transmission of non-authentication (e.g., access) information request through the LAN to a first server that replies with the requested information. Assuming the user of the mobile wireless communications device finds the access terms specified in the reply from the first server acceptable, the user then sends an access request to an authentication server with an authenticating credential, response to the access request, the authentication server authenticates the user and notifies the public wireless LAN to allow the use of wireless LAN services. Upon successful authentication, the public wireless LAN fully opens the controlled port to permit the exchange of data with the mobile wireless communications device through the controlled port.
BRIEF DESCRIPTION OF THE DRAWINGS
FIGURE 1 depicts a block schematic diagram of a communications system for practicing the method of the present principles for authenticating the user of a mobile wireless communications device; and FIGURE 2 depicts a timing chart depicting the sequence of events associated authenticating the user of the mobile wireless communications device in the communications system of FIG. 1.
DETAILED DESCRIPTION
FIGURE 1 depicts a block schematic diagram of a communications network 10 that includes an access arrangement 11 for enabling at least one mobile communication device, and preferably a plurality of mobile communication devices (e.g., mobile communication devices 12ls and 122j) to securely access an external data source 14, which can take the form of a server within a network 15, such as a public data network (e.g., the Internet), or a private data network (e.g., a corporate intranet). In a preferred embodiment, the mobile communication device 12ι comprises a lap top computer that includes a wireless modem or wireless network access card, whereas the mobile communication device 122 comprises a Personal Data Assistant. The access arrangement 11 can also serve other types of mobile wireless communications devices (not shown).
The access arrangement 11 of FIG. 1 includes at least one, and preferably, a plurality of access points (APs), best exemplified by APs 18!-184, via which the mobile wireless communication devices 12i and 122 can access a public wireless Local Area Network (LAN) 20. Although shown separately, the APs 18ι-184 comprise part of the public wireless LAN 20. In the illustrated embodiment, each AP, such as AP 18ι, includes a wireless transceiver (not shown) for exchanging radio frequency signals with a radio transceiver (not shown) within each mobile wireless communication device. To this end, each of the APs I81-I84 employs at least one well-known wireless data exchange protocol, such as the IEEE 802. Ix protocol.
The access arrangement 11 also includes a server 21, in the form of a local web server that stores non-authentication information. Such non-authentication information can include access information, such as access terms and conditions, including the cost to the user. The local web server 21 enables a device user to obtain such non-authentication information without the need to establish an actual communications session with the public wireless LAN 20 and thus undergo authentication. Although shown separately, the local web server 21 could reside within the public wireless LAN 20.
A gateway 22 provides a communication path between the public wireless LAN 20 and a packet data network (PDN) 24 that provides a link to the network 15. The PDN 24 thus permits communications between each mobile wireless communications device and the data source 14. The PDN 24 also links the gateway 22 to an authentication server 26. In practice, the authentication server 26 takes the form of a database containing information about potential users to enable authentication of those seeking access to the wireless LAN 20. Rather than exist as a separate stand-alone entity, the authentication server 26 could reside within the public wireless LAN 20. Further, the PDN 24 provides a link between the public wireless LAN 20 and a billing agent (not shown) to facilitate billing device user for accessing the public wireless LAN. As with the authentication server 24, the functionality of the billing agent could reside within the public wireless LAN 20.
In advance of actually establishing an actual authenticated communications session with the public wireless LAN 20, a device user might wish to obtain certain non- authentication information, such as the terms and conditions of access, as well as the cost. Heretofore, the device user could not obtain such non-authentication information from a public wireless LAN whose access points (APs) employ the IEEE 802. Ix protocol without establishing an authenticated communications session. The access arrangement 11 of the present principles overcomes this disadvantage by enabling a limited connection with the public wireless LAN 20 to obtain non-authentication information, including access information, prior to actually establishing an authenticated communications session.
FIG. 2 depicts the sequence of interactions that occurs over time among a mobile wireless communication device, say device 12χ, the public wireless LAN 20, the local web server 21, and the authentication server 26 to achieve the desired secure access while permitting receipt of certain information without authentication. Referring to FIG. 2, prior to actually establishing an authenticated communications session, the user of the mobile wireless communications device 121 can obtain non-authentication information by first launching an HTTP information request during step 102. The information request is initially received at one of the APs, such as AP 18ι of FIG. 1. When configured with the IEEE 802.1x protocol, the AP 18ι of FIG. 1 maintains a controlled port and an un-controlled port through which the AP exchanges information with the mobile wireless communications device 12ι. The controlled port maintained by the AP 18i serves as the entry way for non-authentication information to pass through the AP between the public wireless LAN 20 and the mobile wireless communications device 12ι. Ordinarily, the AP 18ι keeps its controlled port closed in accordance with the IEEE 802. Ix protocol until authentication of the mobile wireless communications device. The AP 18ι always maintains the uncontrolled port open to permit the mobile wireless communications device 12ι to exchange authentication data with an authentication server, e.g., server 26.
To permit the mobile wireless communications device 12ι to obtain non-authentication information, and particularly, access information, without authentication in accordance with the present principles, the public wireless LAN 20 causes each AP, such as AP 18ι of FIG. 1, to partially open its controlled access port after receiving a request for non-authentication information. Partially opening the controlled port in the AP 18ι enables receipt of such a non- authentication information request in the public wireless LAN 20 through the controlled port during step 104. Upon receipt of the information request, the public wireless LAN 20 redirects the request to the local web server 21 during step 106. Regardless of the destination specified in the information request initially made during step 102, the public wireless LAN
20 always directs the request to the web server 21 of FIG. 1 during step 106. The web server
21 responds to the information request by providing the requested information, (e.g., the access terms and conditions as well as the domain name of the authenticating server 26) to the requesting mobile wireless communications device 12ι during step 108. Assuming the user of the device finds the terms and condition are acceptable (or the user has negotiated acceptable terms and conditions), the mobile wireless communications device 12ι transmits to the AP 18ι an acceptance message during step 110. The acceptance message will identify the authentication server 26 by its name or URL. The mobile wireless device 12ι will automatically transmit such an acceptance message if the access terms and conditions communicated by the web sever 21 match predefined access criteria stored in the device. In absence of such a match, the user might need to trigger the transmission of an acceptance message.
Upon receiving the acceptance message, the AP 18ι requests the mobile wireless communications device 12ι to identify itself during step 112. Assuming the wireless communication device 12i employs an Extensible Authentication Protocol (EAP) as is well known in the art, the AP 18i will seek identification of the device through an EAP identity request, h response to the EAP identity request, the mobile wireless communications device 12ι sends an EAP identity response to the AP 18ι during step 114 for redirection and receipt at the authentication server 26 via the public wireless LAN 20 during step 116. As part of the process of identifying the device, the public wireless LAN 20 typically checks whether the device user has a relationship with a billing agent serving the wireless LAN 20. If the user has a relationship, then the user need not do anything further as the billing agent will account for the access charges. In the absence of a relationship with a billing agent, the user will need to establish such a relationship. With the user's assent, the wireless LAN 20 can seek to dynamically establish such a relationship.
Upon receipt of the EAP identity response, the AP 18ι sends the EAP identity response to the authentication server 26 through the uncontrolled port during step 118. The authentication server 26 replies to the EAP identity response by directing an EAP authentication request to the AP 18ι during step 120 for subsequent transmission via the AP 18i to the mobile wireless communications device 12ι during step 122. The mobile wireless communications device 121 replies during step 124 with an EAP authentication response that is received through the uncontrolled port in the AP 18ι. In turn, the AP 18ι forwards the EAP authentication response to the authentication server 26 during step 126.
Upon successful authentication of the mobile wireless communications device 12l5 the authentication server 26 generates an EAP authentication success message during step 128 for receipt in the AP 18ι. In turn, the AP 18ι sets an authentication key, typically a Wired Equivalent Privacy (WEP) encryption key, for transmission to the mobile wireless communications device 12j during step 130. Lastly, the AP 18ι fully opens its controlled port to permit an exchange of traffic with the mobile wireless communications device 12! through the controlled port.
The foregoing describes a technique for authenticating a mobile wireless communications device in a public wireless LAN that affords the user of the device the opportunity to receive non-authentication information in advance of actually establishing a communications session with the public wireless LAN.

Claims

1. A method for authenticating a mobile wireless communications device in a public wireless Local Area Network (LAN), comprising the steps of: receiving a request for non-authentication information; partially opening a controlled port through which the information request is directed to a first server that responds by providing a reply to the mobile wireless communications device; receiving an access request; authenticating the mobile wireless communications device through an uncontrolled port; and fully opening the controlled port to enable the exchange of traffic with the mobile wireless communications device through the controlled port.
2. The method according to claim 1 wherein the request for non-authentication information is directed to the first server irrespective of a destination specified in the request.
3. The method according to claim wherein authenticating step comprises the steps of: receiving an acceptance from the mobile wireless communications device responsive to the reply to the mobile wireless communications device; transmitting a user identification request to the mobile wireless communications device; receiving a user identification response from the mobile wireless communications device in reply to the user identification request; and re-directing the user identification response to an authentication server.
4. The method according to claim 3 wherein the step of transmitting the user identification request comprises the step of transmitting an Extensible Authentication Protocol (EAP) request.
5. The method according to claim 4 wherein the step of receiving the user identification response comprises the step of receiving an EAP identification response.
6. The method according to claim 1 further comprising the step of setting an authentication key following authentication.
7. The method according to claim 6 wherein the step of setting an authentication key comprises the step of setting a Wired Equivalent Privacy (WEP) encryption key.
8. A communications network for authenticating a mobile wireless communications device, comprising: a first server for storing non-authentication information; a second server for authenticating a mobile wireless communications device; at least one access point (AP) having (a) controlled port via which the AP partially opens in response to a receipt of a request for non-authentication information from a mobile wireless communications device and for directing the information request to the first server which sends a reply for receipt by the mobile wireless communications device, and (b) an uncontrolled port through which the AP directs authentication traffic received from the mobile wireless communications device to the second server which exchanges authentication traffic with the mobile wireless communications device; a public wireless Local Area Network (LAN) coupled to the one AP and said first and second servers.
9. The system according to claim 8 wherein the AP utilizes a communication protocol in conformance with IEEE 802. Ix.
10. The system according to claim 8 wherein the information stored in the first server includes access costs.
11. The system according to claim 8 wherein the second server authenticates the mobile wireless communications device in accordance with an Extensible Authentication Protocol (EAP).
12. The system according to claim 8 wherein the authentication traffic received at the one AP includes an identification of the authentication server.
13. An access point (AP) comprising:
(a) controlled port via which the partially opened in response to a receipt of a request for non-authentication information from a mobile wireless communications device and for directing the information request to a first server which sends a reply for receipt by the mobile wireless communications device, and
(b) an uncontrolled port through which the AP directs authentication traffic received from the mobile wireless communications device to a second server, which exchanges authentication traffic with the mobile wireless communications device.
14. The system according to claim 13 wherein the AP utilizes a communication protocol in conformance with IEEE 802. Ix.
PCT/US2003/015026 2002-05-13 2003-05-13 Seamless public wireless local area network user authentication WO2003096554A2 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
JP2004504401A JP4340626B2 (en) 2002-05-13 2003-05-13 Seamless public wireless local area network user authentication
KR1020047018276A KR101022260B1 (en) 2002-05-13 2003-05-13 Method and communication network system for authenticating a mobile wireless communications device, and access point system
EP03724570.1A EP1504621B1 (en) 2002-05-13 2003-05-13 Seamless user authentication in a public wireless local area network
US10/514,311 US8289936B2 (en) 2002-05-13 2003-05-13 Seamless public wireless local area network user authentication
BRPI0309974A BRPI0309974B1 (en) 2002-05-13 2003-05-13 automatic user authentication of wireless public local area network
AU2003230389A AU2003230389A1 (en) 2002-05-13 2003-05-13 Seamless public wireless local area network user authentication

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US37802902P 2002-05-13 2002-05-13
US60/378,029 2002-05-13

Publications (2)

Publication Number Publication Date
WO2003096554A2 true WO2003096554A2 (en) 2003-11-20
WO2003096554A3 WO2003096554A3 (en) 2004-02-05

Family

ID=29420364

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/015026 WO2003096554A2 (en) 2002-05-13 2003-05-13 Seamless public wireless local area network user authentication

Country Status (8)

Country Link
US (1) US8289936B2 (en)
EP (1) EP1504621B1 (en)
JP (1) JP4340626B2 (en)
KR (1) KR101022260B1 (en)
CN (1) CN100399840C (en)
AU (1) AU2003230389A1 (en)
BR (1) BRPI0309974B1 (en)
WO (1) WO2003096554A2 (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005057827A2 (en) 2003-12-04 2005-06-23 Cisco Technology, Inc. 802.1x authentication technique for share media
WO2005062577A1 (en) * 2003-12-18 2005-07-07 Intel Corporation Method and apparatus to provide secure communication
WO2006115479A1 (en) * 2005-04-22 2006-11-02 Thomson Licensing Method and apparatus for secure, anonymous wireless lan (wlan) access
WO2008042151A1 (en) * 2006-09-29 2008-04-10 Intel Corporation Port access control in a shared link environment
US7421266B1 (en) 2002-08-12 2008-09-02 Mcafee, Inc. Installation and configuration process for wireless network
US7444511B2 (en) * 2000-10-05 2008-10-28 Nec Corporation LAN that allows non-authenticated external terminal station to access a predetermined device in LAN
US7673146B2 (en) 2003-06-05 2010-03-02 Mcafee, Inc. Methods and systems of remote authentication for computer networks
CN102104872A (en) * 2011-02-23 2011-06-22 中兴通讯股份有限公司 Method, device and system for securely accessing WAPI network
US8091116B2 (en) 2008-10-22 2012-01-03 Skype Limited Communication system and method
CN102333309A (en) * 2011-10-27 2012-01-25 华为技术有限公司 Method, equipment system for key transmission in wireless local area network
WO2012035203A1 (en) * 2010-09-16 2012-03-22 Nokia Corporation Dynamic account creation with secured hotspot network
WO2013148565A1 (en) * 2012-03-27 2013-10-03 Intel Corporation Secure and automatic connection to wireless network
US8582542B2 (en) 2008-10-22 2013-11-12 Skype Communication system and method
WO2013134687A3 (en) * 2012-03-08 2013-11-21 Qualcomm Incorporated Systems and methods for establishing a connection setup through relays
CN103686709A (en) * 2012-09-17 2014-03-26 中兴通讯股份有限公司 Method and system for identifying wireless mesh network
US9066287B2 (en) 2012-01-24 2015-06-23 Qualcomm Incorporated Systems and methods of relay selection and setup
US9155101B2 (en) 2012-08-30 2015-10-06 Qualcomm Incorporated Systems and methods for dynamic association ordering based on service differentiation in wireless local area networks
US9510271B2 (en) 2012-08-30 2016-11-29 Qualcomm Incorporated Systems, apparatus, and methods for address format detection
US9794796B2 (en) 2012-06-13 2017-10-17 Qualcomm, Incorporation Systems and methods for simplified store and forward relays
US20200187271A1 (en) * 2008-06-30 2020-06-11 Sovereign Peak Ventures, Llc Wireless base station and wireless communication terminal and wireless communication system

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004027664A1 (en) * 2002-09-18 2004-04-01 Allied Telesis Kabushiki Kaisha Cost settling service method and cost settling service system
JP2005109823A (en) * 2003-09-30 2005-04-21 Nec Corp Layer 2 switch device, radio base station, network system and radio communication method
US8626128B2 (en) * 2011-04-07 2014-01-07 Microsoft Corporation Enforcing device settings for mobile devices
US7974235B2 (en) 2006-11-13 2011-07-05 Telecommunication Systems, Inc. Secure location session manager
US8130734B2 (en) * 2007-01-19 2012-03-06 International Business Machines Corporation Methods, systems and computer program products for managing third party access to a wireless network by a network owner
US8316141B2 (en) * 2007-04-13 2012-11-20 Research In Motion Limited Wireless email communications system providing resource update tracking features and related methods
CN101232378B (en) * 2007-12-29 2010-12-08 西安西电捷通无线网络通信股份有限公司 Authentication accessing method of wireless multi-hop network
CN101222772B (en) * 2008-01-23 2010-06-09 西安西电捷通无线网络通信有限公司 Wireless multi-hop network authentication access method based on ID
US9100381B2 (en) 2008-01-31 2015-08-04 Alcatel Lucent Method and apparatus for providing virtual Wi-Fi access
US8619988B2 (en) * 2008-01-31 2013-12-31 Alcatel Lucent Method and apparatus for virtual Wi-Fi service with authentication and accounting control
US9301191B2 (en) 2013-09-20 2016-03-29 Telecommunication Systems, Inc. Quality of service to over the top applications used with VPN
KR101359600B1 (en) * 2009-07-03 2014-02-07 후아웨이 테크놀러지 컴퍼니 리미티드 Method, device and system for obtaining local domain name
US9479344B2 (en) 2011-09-16 2016-10-25 Telecommunication Systems, Inc. Anonymous voice conversation
US9544271B2 (en) 2011-09-16 2017-01-10 Telecommunication Systems, Inc. Anonymous messaging conversation
CN103079201B (en) * 2011-10-26 2015-06-03 中兴通讯股份有限公司 Fast authentication method, access controller (AC) and system for wireless local area network
WO2013086076A1 (en) * 2011-12-06 2013-06-13 Telecommunication Systems, Inc. Unattended authentication in a secondary authentication service for wireless carriers
US8984591B2 (en) 2011-12-16 2015-03-17 Telecommunications Systems, Inc. Authentication via motion of wireless device movement
CN103188662B (en) * 2011-12-30 2015-07-29 中国移动通信集团广西有限公司 A kind of method and device verifying WAP (wireless access point)
US9384339B2 (en) 2012-01-13 2016-07-05 Telecommunication Systems, Inc. Authenticating cloud computing enabling secure services
US9338153B2 (en) 2012-04-11 2016-05-10 Telecommunication Systems, Inc. Secure distribution of non-privileged authentication credentials
KR20130125276A (en) * 2012-05-08 2013-11-18 한국전자통신연구원 Short probe rosponse
US8843629B2 (en) * 2012-05-14 2014-09-23 Nokia Corporation Method, apparatus, and computer program product for response criteria
CN103516671B (en) * 2012-06-21 2018-08-07 中兴通讯股份有限公司 The access processing method and access device and access terminal of a kind of customer service
US9100395B2 (en) 2013-09-24 2015-08-04 International Business Machines Corporation Method and system for using a vibration signature as an authentication key
US9450682B2 (en) 2013-10-07 2016-09-20 International Business Machines Corporation Method and system using vibration signatures for pairing master and slave computing devices
EP3090510A4 (en) 2013-12-31 2017-11-29 Bandwidthx Inc. Systems and methods for allocating alternative network access resources
WO2017059064A1 (en) * 2015-09-29 2017-04-06 Bandwidthx Inc. Authentication and authorization of mobile devices for usage of access points in an alternative network
CN108811043B (en) * 2017-04-27 2022-06-10 中兴通讯股份有限公司 Access device, authentication server, terminal device access control method and system
US11531747B2 (en) 2019-09-16 2022-12-20 Beijing Didi Infinity Technology And Development Co., Ltd. Method for exchanging data between a web browser and an application

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1161031A2 (en) * 2000-06-01 2001-12-05 Sharp Kabushiki Kaisha Access point device and authentication method thereof
EP1193951A2 (en) * 2000-09-29 2002-04-03 Nokia Corporation Selection of serving network element in mobile telecommunications network
EP1330073A1 (en) * 2002-01-18 2003-07-23 Nokia Corporation Method and apparatus for access control of a wireless terminal device in a communications network

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI106671B (en) * 1995-03-13 2001-03-15 Nokia Mobile Phones Ltd Mobile telephony, mobile terminal and a method of establishing a connection from a mobile terminal
US6233616B1 (en) * 1997-10-24 2001-05-15 William J. Reid Enterprise network management using directory containing network addresses of users obtained through DHCP to control routers and servers
DE19812924A1 (en) 1998-03-24 1999-09-30 Siemens Ag Process for the use of Internet access networks by mobile, internet-enabled communication terminals
US6785823B1 (en) * 1999-12-03 2004-08-31 Qualcomm Incorporated Method and apparatus for authentication in a wireless telecommunications system
US7028186B1 (en) * 2000-02-11 2006-04-11 Nokia, Inc. Key management methods for wireless LANs
US6633761B1 (en) * 2000-08-11 2003-10-14 Reefedge, Inc. Enabling seamless user mobility in a short-range wireless networking environment
JP3419391B2 (en) * 2000-10-05 2003-06-23 日本電気株式会社 LAN that allows access to authentication denied terminals under specific conditions
JP2002232573A (en) * 2001-01-31 2002-08-16 Nec Corp Mobile communication terminal, mobile communication system and service providing device
US20020174335A1 (en) * 2001-03-30 2002-11-21 Junbiao Zhang IP-based AAA scheme for wireless LAN virtual operators
US7171460B2 (en) * 2001-08-07 2007-01-30 Tatara Systems, Inc. Method and apparatus for integrating billing and authentication functions in local area and wide area wireless data networks
US20030084287A1 (en) * 2001-10-25 2003-05-01 Wang Huayan A. System and method for upper layer roaming authentication
US8817757B2 (en) 2001-12-12 2014-08-26 At&T Intellectual Property Ii, L.P. Zero-configuration secure mobility networking technique with web-based authentication interface for large WLAN networks
JP3673231B2 (en) * 2002-03-07 2005-07-20 三菱電機株式会社 Insulated gate semiconductor device and method of manufacturing gate wiring structure
ATE337145T1 (en) 2002-05-08 2006-09-15 Vkr Holding As METHOD FOR TREATING WOOD USING A CARRIER FLUID UNDER HIGH PRESSURE WITHOUT DAMAGE TO THE WOOD
US6954793B2 (en) 2002-05-13 2005-10-11 Thomson Licensing S.A. Pre-paid data card authentication in a public wireless LAN access system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1161031A2 (en) * 2000-06-01 2001-12-05 Sharp Kabushiki Kaisha Access point device and authentication method thereof
EP1193951A2 (en) * 2000-09-29 2002-04-03 Nokia Corporation Selection of serving network element in mobile telecommunications network
EP1330073A1 (en) * 2002-01-18 2003-07-23 Nokia Corporation Method and apparatus for access control of a wireless terminal device in a communications network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1504621A2 *

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7444511B2 (en) * 2000-10-05 2008-10-28 Nec Corporation LAN that allows non-authenticated external terminal station to access a predetermined device in LAN
US7421266B1 (en) 2002-08-12 2008-09-02 Mcafee, Inc. Installation and configuration process for wireless network
US7673146B2 (en) 2003-06-05 2010-03-02 Mcafee, Inc. Methods and systems of remote authentication for computer networks
EP1690356A2 (en) * 2003-12-04 2006-08-16 Cisco Technology, Inc. 802.1x authentication technique for share media
EP1690356A4 (en) * 2003-12-04 2013-12-25 Cisco Tech Inc 802.1x authentication technique for share media
WO2005057827A2 (en) 2003-12-04 2005-06-23 Cisco Technology, Inc. 802.1x authentication technique for share media
WO2005062577A1 (en) * 2003-12-18 2005-07-07 Intel Corporation Method and apparatus to provide secure communication
US7457953B2 (en) 2003-12-18 2008-11-25 Intel Corporation Method and apparatus to provide secure communication
WO2006115479A1 (en) * 2005-04-22 2006-11-02 Thomson Licensing Method and apparatus for secure, anonymous wireless lan (wlan) access
EP3021553A1 (en) * 2005-04-22 2016-05-18 Thomson Licensing Method and apparatuses for secure, anonymous wireless lan (wlan) access
WO2008042151A1 (en) * 2006-09-29 2008-04-10 Intel Corporation Port access control in a shared link environment
US8607058B2 (en) 2006-09-29 2013-12-10 Intel Corporation Port access control in a shared link environment
US11672028B2 (en) * 2008-06-30 2023-06-06 Sovereign Peak Ventures, Llc Wireless base station and wireless communication terminal and wireless communication system
US20200187271A1 (en) * 2008-06-30 2020-06-11 Sovereign Peak Ventures, Llc Wireless base station and wireless communication terminal and wireless communication system
US9210729B2 (en) 2008-10-22 2015-12-08 Skype Communication system and method
US8091116B2 (en) 2008-10-22 2012-01-03 Skype Limited Communication system and method
US8582542B2 (en) 2008-10-22 2013-11-12 Skype Communication system and method
CN103222292A (en) * 2010-09-16 2013-07-24 诺基亚公司 Dynamic account creation with secured hotspot network
US9131373B2 (en) 2010-09-16 2015-09-08 Nokia Technologies Oy Dynamic account creation with secured hotspot network
AP3977A (en) * 2010-09-16 2017-01-04 Nokia Corp Dynamic account creation with secured hotspot network
WO2012035203A1 (en) * 2010-09-16 2012-03-22 Nokia Corporation Dynamic account creation with secured hotspot network
CN102104872A (en) * 2011-02-23 2011-06-22 中兴通讯股份有限公司 Method, device and system for securely accessing WAPI network
CN102333309A (en) * 2011-10-27 2012-01-25 华为技术有限公司 Method, equipment system for key transmission in wireless local area network
CN102333309B (en) * 2011-10-27 2014-12-24 华为技术有限公司 Method, equipment system for key transmission in wireless local area network
US9066287B2 (en) 2012-01-24 2015-06-23 Qualcomm Incorporated Systems and methods of relay selection and setup
WO2013134687A3 (en) * 2012-03-08 2013-11-21 Qualcomm Incorporated Systems and methods for establishing a connection setup through relays
US9237154B2 (en) 2012-03-27 2016-01-12 Intel Corporation Secure and automatic connection to wireless network
US9264433B2 (en) 2012-03-27 2016-02-16 Intel Corporation Secure and automatic connection to wireless network
WO2013148565A1 (en) * 2012-03-27 2013-10-03 Intel Corporation Secure and automatic connection to wireless network
US9794796B2 (en) 2012-06-13 2017-10-17 Qualcomm, Incorporation Systems and methods for simplified store and forward relays
US9510271B2 (en) 2012-08-30 2016-11-29 Qualcomm Incorporated Systems, apparatus, and methods for address format detection
US9155101B2 (en) 2012-08-30 2015-10-06 Qualcomm Incorporated Systems and methods for dynamic association ordering based on service differentiation in wireless local area networks
CN103686709B (en) * 2012-09-17 2017-09-08 中兴通讯股份有限公司 A kind of wireless mesh network authentication method and system
US10129745B2 (en) 2012-09-17 2018-11-13 Shanghai Zhongxing Software Company Limited Authentication method and system for wireless mesh network
CN103686709A (en) * 2012-09-17 2014-03-26 中兴通讯股份有限公司 Method and system for identifying wireless mesh network

Also Published As

Publication number Publication date
JP4340626B2 (en) 2009-10-07
EP1504621A4 (en) 2010-10-06
AU2003230389A1 (en) 2003-11-11
EP1504621A2 (en) 2005-02-09
AU2003230389A8 (en) 2003-11-11
EP1504621B1 (en) 2013-04-17
KR101022260B1 (en) 2011-03-21
KR20040104735A (en) 2004-12-10
BR0309974A (en) 2005-02-22
US8289936B2 (en) 2012-10-16
CN1659909A (en) 2005-08-24
US20050243778A1 (en) 2005-11-03
BRPI0309974B1 (en) 2016-11-16
JP2005525740A (en) 2005-08-25
WO2003096554A3 (en) 2004-02-05
CN100399840C (en) 2008-07-02

Similar Documents

Publication Publication Date Title
US8289936B2 (en) Seamless public wireless local area network user authentication
Koien et al. Security aspects of 3G-WLAN interworking
AU2002304237B2 (en) Wireless radio data protective device for private/public network wireless packet data services and authentication method according to internet connection request of mobile terminals recieving the services
EP1500223B1 (en) Transitive authentication authorization accounting in interworking between access networks
US8285992B2 (en) Method and apparatuses for secure, anonymous wireless LAN (WLAN) access
KR100494558B1 (en) The method and system for performing authentification to obtain access to public wireless LAN
CA2792490C (en) Key generation in a communication system
US7142851B2 (en) Technique for secure wireless LAN access
US7945777B2 (en) Identification information protection method in WLAN inter-working
US20050135624A1 (en) System and method for pre-authentication across wireless local area networks (WLANS)
US20050122941A1 (en) System and method for data communication handoff across heterogeneous wireless networks
US20090028101A1 (en) Authentication method in a radio communication system, a radio terminal device and radio base station using the method, a radio communication system using them, and a program thereof
JP2002314549A (en) User authentication system and user authentication method used for the same
WO2006024969A1 (en) Wireless local area network authentication method
KR100763131B1 (en) Access and Registration Method for Public Wireless LAN Service
WO2004034650A2 (en) Integration of a wireless local area network and a packet data network
KR20040001329A (en) Network access method for public wireless LAN service
JP2006041594A (en) Mobile communication system and authentication method of mobile terminal
KR100549918B1 (en) Roaming service method for public wireless LAN service
Lee Authentication inter-working methods between wireless LAN systems

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2003724570

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 3523/DELNP/2004

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2004504401

Country of ref document: JP

Ref document number: 10514311

Country of ref document: US

Ref document number: 1020047018276

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: 20038133717

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 1020047018276

Country of ref document: KR

WWP Wipo information: published in national office

Ref document number: 2003724570

Country of ref document: EP