WO2007128134A1 - Secure wireless guest access - Google Patents

Secure wireless guest access Download PDF

Info

Publication number
WO2007128134A1
WO2007128134A1 PCT/CA2007/000821 CA2007000821W WO2007128134A1 WO 2007128134 A1 WO2007128134 A1 WO 2007128134A1 CA 2007000821 W CA2007000821 W CA 2007000821W WO 2007128134 A1 WO2007128134 A1 WO 2007128134A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication interface
identifier
user
server
network
Prior art date
Application number
PCT/CA2007/000821
Other languages
French (fr)
Inventor
Johnny Matta
Philippe Labrosse
Original Assignee
Travelnet Technologies Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Travelnet Technologies Inc. filed Critical Travelnet Technologies Inc.
Priority to CA002647684A priority Critical patent/CA2647684A1/en
Publication of WO2007128134A1 publication Critical patent/WO2007128134A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Definitions

  • the present invention relates generally to IP communication networks and, more particularly, to a solution that enables ad hoc digital certificate provisioning and secure connectivity over wired and wireless IP communication networks while maintaining ease of use for users and control for network providers.
  • IEEE 802.20 have made wireless connectivity ubiquitous. It is now common for users to connect their portable computers such as laptops and personal digital assistants (PDAs) to wireless local area networks (WLANs) at airports, hotels, cafes, corporate offices and so on. As a result of the strong demand for network connectivity, a number of corporations have recognized the need to enable guest access within their IT infrastructure. Most corporations however are reluctant to meet the demand for wireless connectivity mainly because of the perceived security risks posed by the deployment of a wireless infrastructure.
  • wireless networks are more prone to security breaches than their wired counterparts.
  • Data confidentiality is perhaps the most relevant issue with wireless transmissions since tapping onto wired links would necessitate physical access to the telephone and cable infrastructure of an Internet service provider's (ISP) network equipment; on the other hand, a malicious user with a high gain antenna can stand across the street from a corporation's offices and capture WLAN data traffic.
  • ISP Internet service provider's
  • a security breach through a wireless access point may enable malicious hackers to access restricted network resources, read the content of legitimate users' data traffic or even utilize the corporation's network as a platform for illegal activities.
  • corporations may ask for a number of characteristics for their guest access solution. Those include limited burden to their information technology (IT) staff; no risk to the internal network; compliance with applicable government regulations (especially when it comes to liability for unlawful guest behavior or privacy protection of sensitive information); and the ability for guests to self configure their accounts and connectivity without the help of corporation staff.
  • IT information technology
  • corporations regard guest access as a courtesy offering that IT staff needs to have visibility into and control onto should anything go wrong but which they can leave functioning with little or no intervention under otherwise normal circumstances.
  • a number of wireless guest access solutions are presently available to corporations.
  • One of the most popular approaches is to simply open network access to any user, whether known or unknown. While such a scheme enables ease of use and instant connectivity for guests, it does not offer any form of identity verification, and therefore poses security threats to the underlying corporate network.
  • one approach consists in forcing guests who attempt access within a wireless local area network (WLAN) hotspot to go through a web based registration page. Users are instructed to provide varying levels of personal information such as name, email address, telephone number, and others. Users are then granted access through the account that has been created for them by the system based on the information they have provided. While convenient for the users and IT staff, such a setup in fact provides no verification of guest identity since users may intentionally provide false information upon registration and no attempt is made by the system to validate their identity.
  • WLAN wireless local area network
  • Another approach to ensure trust management consists in IT staff on site providing temporary guest identification tokens. This method may provide identity verification since guests may have to at least provide their name to obtain a token. However, it introduces the cost of assigning IT staff to this task and may also not be convenient for a number of users.
  • VLAN virtual local area network
  • Wi-Fi protected access WPA
  • IEEE 802.11i includes IEEE 802.1 x, an authentication protocol which prevents unauthorized access to the network and protects from a number of security attacks.
  • IEEE 802.1x supports several authentication schemes including EAP-TLS. The strength of EAP-TLS lies in the fact that a compromised password is not sufficient to break into the system. EAP-TLS is widely considered as the highest grade civilian security technology available to date and is supported by a large part of major wireless equipment manufacturers.
  • EAP-TLS The IEEE 802.11i technologies and EAP-TLS are well suited to provide network security across a wireless network access solution; however, EAP-TLS requires each user to possess his own digital certificate. This brings into the picture an additional component: the public key infrastructure (PKI).
  • PKI public key infrastructure
  • PKI refers to the set of software, protocols and policies that enable users to communicate securely over a public, non-trusted, network using public key encryption technology.
  • PKI Public Key encryption technology
  • At the heart of PKI is the need to provide each individual user with a private and public key pair.
  • Those keys usually consist of strings of letters and numbers mathematically chosen such that a message encrypted with one of them can only be decrypted using the other.
  • public keys must be unequivocally linked to identities in the real world. This is accomplished using digital certificates.
  • Digital certificates are text files organized in special format (e.g. using the X.509 certificate standard by the International Telecommunication Union) containing a public key and unique identification information of its owner. Certificates are issued by trusted third parties known as certificate authorities and are cryptographically signed by those authorities in a way that does not allow tampering. To issue a trustworthy digital certificate within a secure wireless access system, the PKI component of the system needs to verify the identity of the guest. This is where trust management joins network security and where one of the advantages of the present invention lies.
  • the present invention discloses a network authentication mechanism that enables and facilitates ad hoc and trusted digital certificate provisioning coupled to secure user access to wireless and wired IP communication networks through state of the art security communication standards.
  • the system includes a user equipped with an electronic terminal and a personal characteristic where the electronic terminal initially creates a temporary unsecured connection to the network.
  • the user typically accesses an authentication interface through his electronic terminal to provide a unique identifier associated with his personal characteristic.
  • the authentication interface communicates with a validation entity that verifies the user's privileges based on his unique identifier and if authorized grants the user a digital certificate linking his asymmetric cryptography public key to the unique identifier associated with his personal characteristic.
  • the user's electronic terminal will subsequently utilize the digital certificate to establish a secure connection with the network and gain secure access to network resources.
  • the unique identifier is characterized by the fact that it relates to a personal characteristic whose relationship with the user had previously been established through a trusted third party.
  • a preferred embodiment is for the authentication interface to be one or more web pages and users' personal characteristic to be a cellular telephone account whereby the unique identifier is the cellular telephone's number.
  • the relationship between the user and his cellular telephone account must have been previously established with his mobile telephony provider.
  • the user communicates through a laptop computer, or personal digital assistant (PDA) or IP telephone with a web based authentication interface to provide his cellular telephone number.
  • PDA personal digital assistant
  • the validation entity consists of database servers; authentication, authorization and accounting (AAA) servers and PKI servers.
  • the validation entity will verify the existence of an account indexed by the cellular telephone number. If no account exists, it will create one, and generate a corresponding password. If an account exists, it will retrieve the password. In both cases, the password is then transmitted to the cellular telephone number of the user through SMS.
  • the user will now enter both his cellular telephone number and received password into the web authentication interface. Transparently to the user, his electronic terminal will generate one private key and the corresponding public key as necessitated by the particularities of public key cryptography.
  • the user's electronic terminal will further transmit the public key to the validation entity through the authentication interface.
  • the validation entity will verify that the cellular telephone number and password match those specified in the account.
  • the validation entity will utilize the public key sent by the electronic terminal to generate and digitally sign a digital certificate linking the user's cellular telephone number to his public key.
  • the validation entity then transfers the digital certificate to the authentication interface which in turn seamlessly installs it on the user's electronic terminal.
  • the user's electronic terminal will disconnect the existing unsecured connection with the network and re-authenticate with the authentication interface using the newly acquired digital certificate. As a result, the user will establish a secure connection that enables him to gain access to network resources such as the Internet or other local servers and electronic equipment.
  • a variation of the mechanism detailed above involves a personal characteristic as being a personal relationship between the user and some person affiliated to and trusted by the corporation.
  • a person is also known as a sponsor.
  • users do not provide their cellular telephone number to the authentication interface but instead use as unique identifiers their own email address along with the name, or the email address, or the cellular telephone number of the sponsor.
  • a notification message is sent by the system to the sponsor requesting approval for the user's utilization of network resources. If the sponsor validates the request, a one time password is generated by the system and sent to the user's email address. The user then uses his electronic terminal to retrieve the one time password and provide it to the authentication interface.
  • the user may also be asked to enter again his own email address and that of the sponsor. Transparently to the user, his electronic terminal will generate one private key and the corresponding public key as necessitated by the particularities of public key cryptography.
  • the user's electronic terminal will further transmit the public key to the validation entity through the authentication interface.
  • the validation entity will verify that the user's email address and password match those specified in the account. If they do, the validation entity will utilize the public key sent by the electronic terminal to generate and digitally sign a digital certificate linking the sponsor's name, or email address, or cellular telephone number to the user's public key.
  • the digital certificate will preferentially include other information that may have provided by the user to the authentication interface such as a name.
  • the validation entity then transfers the digital certificate to the authentication interface which in turn seamlessly installs it on the user's electronic terminal.
  • the user's electronic terminal will disconnect the existing unsecured connection with the network and utilize the newly acquired certificate to re-authenticate with the authentication interface.
  • the user will establish a secure connection that enables him to gain access to network resources such as the Internet or other local servers and electronic equipment.
  • the network administrators have established some trust in the identity of the user since a sponsor has vouched for him.
  • FIG. 1 is a system-level block diagram of the ad hoc and secure guest authentication mechanism.
  • FIG. 2 provides a high-level view of the buildings blocks underlying a wireless guest access infrastructure.
  • FIG. 3 provides a high-level view of an alternate way to assemble building blocks within a wireless guest access infrastructure.
  • FIG. 4 provides a flowchart for a user obtaining a digital certificate using a cellular telephone number as unique identifier.
  • FIG. 5 depicts a system-level block diagram of a variation on the ad hoc and secure guest authentication mechanism in FIG. 1.
  • FIG. 6 provides a flowchart for a user obtaining a digital certificate using a sponsor's email address as unique identifier.
  • FIG. 7 illustrates the establishment of a secure wireless session with EAP-TLS.
  • FIG. 8 shows a system-level block diagram of a user accessing internal resources within a corporation's network within the framework of the wireless guest access infrastructure.
  • the present invention discloses an ad hoc and secure guest authentication system 100, for use in a controlled corporation network 201, which is preferentially an IP access network.
  • the ad hoc and secure guest user authentication system 100 includes an authentication interface 104, which allows a user 101 to authenticate with a validation entity 105, install a personal digital certificate on his electronic terminal 103 and use it to gain access to network resources 106 such as the Internet 200.
  • the authentication interface 104 and validation entity 105 exchange information about the user 101.
  • Electronic terminals 103 typically consist of a computing device capable of accessing network resources 106 over a variety of network connections such as wired 216 or wireless 215 links.
  • Various types of electronic terminals 103 are also supported by the system 100 such as laptop computers 213, personal digital assistants (PDAs) 214 or IP telephones 218.
  • PDAs personal digital assistants
  • a user 101 provides a unique identifier associated with his personal characteristic 102 to the authentication interface 104.
  • the authentication interface 104 communicates with the validation entity 105 that verifies the existence of an account associated with the personal characteristic 102, or creates an account and password if no previous one exists.
  • the validation entity 105 then communicates the password to the user 101 using his unique identifier.
  • the user 101 then provides the unique identifier described above and the newly acquired password to the authentication interface 104.
  • the electronic terminal 103 At the same time, and preferentially seamlessly to the user, the electronic terminal 103 generates a private key and the corresponding public key as necessitated by the particularities of public key cryptography.
  • the user's electronic terminal 103 will further transmit the public key to the validation entity 105 through the authentication interface 104.
  • the validation entity 105 will verify that the unique identifier and password match those specified in the account. If they do, the validation entity 105 will utilize the public key sent by the electronic terminal 103 to generate and digitally sign a digital certificate linking the user's unique identifier to his public key.
  • the validation entity 105 then transfers the digital certificate to the authentication interface 104 which in turn installs it on the user's electronic terminal 103.
  • the electronic terminal 103 will utilize the newly acquired certificate to authenticate with the authentication interface 104, create a secure network connection and gain access to network resources 106.
  • the ad hoc guest user authentication system 100 could be used with various types of personal characteristics 102 such as a cellular telephone account or a personal relationship with someone affiliated to and trusted by the corporation network 201 and known as a sponsor. In effect, the trust relationship previously established between the user 101 and her mobile telephony provider or her acquaintance in the corporation network 201 enables the system 100 to issue the user 101 a trustworthy digital certificate.
  • the digital certificate will link the user's public key to the unique identifier associated with her personal characteristic.
  • the user 101 can utilize the digital certificate to authenticate with the system 100 and gain access to network resources such as the Internet 200 or internal resources 217 situated within the internal network 210 of the corporation 201.
  • the user 101 is preferentially a guest user 212 within the guest network 219.
  • the guest user 212 may utilize a variety of electronic terminals
  • the guest user 212 may connect through a wired link 216 or a wireless link 215 powered by an access point 211. Through those links, the guest user 212 can access the Internet 200. The guest user 212 may also use his electronic terminal 103 to connect to his home network 202 over a virtual private network connection or other remote network connection techniques (not illustrated).
  • the authentication interface 104 can be seen as a web interface residing on web server
  • the validation entity 105 is also preferably implemented through a combination of a database server 204, a RADIUS server 206, and a certificate server 207 that all belong to the centralized server farm
  • the database 204, web 205, RADIUS 206, and certificate 207 servers are preferentially centralized in the server farm 203, but can also be distributed across a number of locations communicating over the Internet 200; some or all of the servers may also be located within the corporation network 201 in an internal server farm 304.
  • the servers do not necessarily need to be physically separate entities; furthermore, the RADIUS server which serves at the backbone for authentication, authorization and accounting (AAA) within the system 100 may be replaced by other AAA protocols such as PANA or DIAMETER.
  • AAA authentication, authorization and accounting
  • the user 101 establishes a temporary unsecured connection with the network.
  • connection is preferentially restricted to a dedicated network that does not permit access to the Internet or other network resources; instead, the dedicated network only permits a user to authenticate with the system 100 and obtain a digital certificate.
  • the user 101 initially starts a web browser session on his electronic terminal 103 and requests some web page at step 401.
  • the web server 205 redirects the user's browser request to the authentication web interface at step 402.
  • the user 101 inputs the unique identifier associated with his personal characteristic 102 on the web interface residing on web server 205. This latter then communicates the unique identifier to the RADIUS server 206 at step 404.
  • the RADIUS server 206 verifies with the database server 204 whether an account for this user 101 already exists.
  • the RADIUS server 206 transmits this password to the user 101 using the unique identifier associated with his personal characteristic 102; in a preferred embodiment, the personal characteristic is a cellular telephone account whose unique identifier is the cellular telephone number; the password is sent by the RADIUS server 206 through the short message service (SMS) at step 406.
  • SMS short message service
  • the user 101 inputs his cellular telephone number and the password just received by SMS into the web interface residing on the web server 205.
  • the user's electronic terminal 103 generates a private and public key pair in accordance with the rules of public key cryptography.
  • the electronic terminal 103 further transmits the public key to the authentication interface 104 at step 408.
  • the web server 205 transfers the cellular telephone number and password input by the user 101 to the RADIUS server 206.
  • the RADIUS server validates the credentials with the database server 204 at step 410. If the information matches the existing account, the RADIUS server 206 communicates the cellular telephone number and the user's public key to the certificate server 207 at step 411.
  • the certificate server 207 generates and digitally signs a digital certificate linking the user's public key to his cellular telephone number.
  • the certificate server 207 transmits the certificate to the web server 205 at step 412.
  • the web server 205 installs the certificate on the user's electronic terminal 103 at step 413.
  • the electronic terminal 103 disconnects the temporary unsecured connection and uses the newly acquired digital certificate to authenticate again with the centralized server farm, establish a secure networking session and gain access to network resources 106 such as the Internet 200 through his electronic terminal 103 that is preferentially a laptop 213 or PDA 214 or IP telephone 219.
  • network resources 106 such as the Internet 200
  • the database server 204 may hold the logic necessary to communicate with the certificate server 207 instead of going through the web server 205 and so on.
  • the personal characteristic 102 is a cellular telephone account and the unique identifier is a cellular telephone number.
  • the personal characteristic can also consist in a variety of personal communication accounts with unique identifiers such as pager accounts with unique pager numbers, mobile fax machine accounts with unique cellular fax numbers, email accounts with unique email addresses, mobile IP telephone accounts with unique IP telephone numbers and so on.
  • the personal characteristic 102 of the user 101 is a relationship with a person known both to the user 101 and the corporation 201. Such a person can be referred to as a sponsor 500.
  • the unique identifier is preferentially the email address of the sponsor.
  • the authentication interface 104 asks the user for his unique identifier associated with his personal characteristic, in other words, the authentication interface 104 asks the user for the email address of his sponsor.
  • the authentication interface 104 also asks the user 101 for his email address.
  • the authentication interface 104 transmits the email address of the sponsor and that of the user 101 to the validation entity 105. In turn, the validation entity 105 notifies the sponsor 500 using his email address.
  • the sponsor 500 replies to the email message to recognize or not his relationship with the user 101.
  • the validation entity 105 receives the sponsor's response and if positive generates a one time password and sends it to the user's email address.
  • the user 101 retrieves the one time password and submits it to the authentication interface 104 along with his email address.
  • the user's electronic terminal 103 generates a private and public key pair along the rules of public key cryptography and submits the public key to the authentication interface 104.
  • the email address and password input by the user are then transferred to the validation entity 105. If they match an existing account, the validation entity 105 generates and digitally signs a digital certificate linking the user's public key to the email address of the sponsor.
  • the digital certificate may link the user's public key to the name of the sponsor, or his phone number, or his postal address or any other piece of information that enables the corporation 201 to uniquely identify the sponsor.
  • the digital certificate is generated, it is transferred to the authentication interface 104 which in turn installs it on the electronic terminal 103.
  • the electronic terminal 103 uses the digital certificate to authenticate with the system 100, establish a secure networking session and use it to gain access to network resources 106.
  • the authentication interface 104 can be seen as a web interface residing on web server 205 preferentially located within a centralized server farm 203 but that may also reside within an internal server farm 304. The user
  • the web server 205 redirects the user 101 to the authentication web interface at step 402.
  • the user 101 inputs his email address and unique identifier at step 600; in a preferred embodiment, the personal characteristic is a personal acquaintance with a sponsor 500 and the unique identifier is the email address of the sponsor 500.
  • the web server 205 then communicates the information submitted by the user 101 to the RADIUS server 206 at step 601.
  • the RADIUS server 206 At step 602, the RADIUS server
  • the RADIUS server 206 verifies with the database server 204 whether an account for this user 101 already exists. If not, an account is created at the database server 204 and a password for this account is generated. If an account already exists, the associated password is retrieved. The RADIUS server 206 then transmits this password to the user's email address at step 603.
  • the user 101 inputs his email address and password in the web interface residing on the web server 205.
  • the user's electronic terminal 103 generates a private and public key pair in accordance with the rules of public key cryptography.
  • the electronic terminal 103 further transmits the public key to the web server 205 at step 408. This latter transfers the email address and password input by the user 101 to the RADIUS server 206 at step 605.
  • the RADIUS server 206 validates the credentials with the database server 204 at step 410. If the credentials match the existing account, the RADIUS server 206 communicates the email address of the sponsor 500 and the user's public key to the certificate server 207 at step 606. In turn the certificate server 207 generates and digitally signs a digital certificate linking the public key to the email address of the sponsor 500. The certificate server 207 then transmits the certificate to the web server 205 at step 607. The web server 205 installs the certificate on the user's electronic terminal 103 at step 413.
  • the electronic terminal 103 uses the newly acquired digital certificate to authenticate with the centralized server farm and gain secure network access to resources 106 such as the Internet 200 through his electronic terminal 103 that is preferentially a laptop 213 or PDA 214 or IP telephone 219.
  • resources 106 such as the Internet 200
  • his electronic terminal 103 that is preferentially a laptop 213 or PDA 214 or IP telephone 219.
  • the system 100 may use a different method than email to communicate the one time password to the user 101.
  • the one time password may be sent back by SMS in which case the authentication interface 104 will ask the user 101 for his cellular telephone number, conveyed in person by IT staff in the corporation network 201 and so on.
  • the user 101 uses a personal digital certificate to authenticate over EAP-TLS and secure her wireless session.
  • the user's laptop 213 utilizes an IEEE 802.1x client embedded in its operating system to exchange EAP messages 700 with the access point 211.
  • the access point 211 communicates the information from the EAP messages to the RADIUS server 206; this is accomplished at step 701.
  • the RADIUS server 206 further transmits his own digital certificate to the user 101 at step 702.
  • the user 101 sends to the RADIUS server 206 her personal digital certificate which she obtained from the ad hoc and secure guest authentication system 100 as disclosed above.
  • This certificate exchange between user 101 and RADIUS server 206 enables the creation of a secure link 704 between the user's laptop 213 and the access point 211.
  • the user 101 can utilize the secure link to communicate with the Internet 200 or even access internal resources 217 located within the internal network 210.
  • the guest user 212 may access internal resources 217 located within the internal network 210 which is protected by an internal firewall 209.
  • the user 212 connects through the wired link 216 or wireless link 215 to the internal resource 217.
  • the internal resource 217 requests the user's certificate.
  • the user 212 submits his certificate 900.
  • the internal resource 217 validates the certificate in step 901 by retrieving a certificate revocation list (CRL) from the certificate server 207. This list is a collection of all certificates issued by the certificate server along with their validity status. When system administrators revoke a certificate, the CRL reflects that change.
  • CRL certificate revocation list
  • This list is a collection of all certificates issued by the certificate server along with their validity status.
  • the CRL reflects that change.
  • technologies other than the CRL may be used to validate certificate authenticity including the online certificate status protocol (OCSP). If the certificate is valid, the internal resource 217 may exchange other challenge messages with the user's electronic terminal 103 before finally granting access.
  • 6 and 7 another preferred embodiment would include electronic security verifications of the electronic terminal 103 prior to granting access to network resources 106 at step 704. This will include virus and spyware verification in addition to general observation of electronic terminal behavior on the network to prevent security breaches within the system 100.
  • user 101 would not be a human person, rather an electronic user consisting of software, hardware or combination thereof and residing on the electronic terminal 103.
  • the electronic user will engage with communication with the authentication system 100 through the authentication interface 104.
  • the electronic user must have been previously configured with some unique identifier associated with a personal characteristic such as cellular telephone number or the email address of a sponsor in the corporation network 201.
  • the electronic user will obtain a digital certificate as previously disclosed and will exchange authentication messages 700 in order to secure the wireless link 704.
  • the authentication interface 104 is not a web interface but can consist of one or more software processes running on local or remote servers such as a SMS server, a fax server, a chat server, an email server or others. In those cases the user 101 communicates with the authentication interface 104 through SMS, facsimile, chat or email communication.
  • the authentication interface can consist in a physical security access unit that the user 101 can access through a plurality of components such as a security access card that is inserted into the physical security access unit, or a radio frequency (RF) enabled security access tag that communicates through radio waves with said access unit, or an infrared (IR) enabled security access tag that communicates through infrared waves with said access unit.
  • the components should be capable of storing user credential information such as a password, email addresses and so on; the components should further be capable of communicating the credentials to said access unit.
  • RF radio frequency
  • IR infrared
  • the validation entity 105 does not consist of servers but can be of another nature such as one or more human operators that are enabled to receive the unique identifier from the user 101, validate the user's identity and issue him a personal digital certificate.
  • IT staff within the corporation network 201 may elect to be involved in one or more of the steps in FIGs. 4 and 6 by specifying that all user provisioning requests receive their approval before the system 100 grants the user 101 a digital certificate at step 413.
  • the authentication interface 104 may also (not illustrated) ask the user to specify his affiliation with the corporation network 201. This way IT staff can be notified only in the case of users claiming to belong to a certain group such as interns. This may be because interns for example may have more access privileges to the internal network 210 (while regular users have none) which necessitate further validation of their identity.
  • step 413 can involve the installation of the user's certificate on a USB key or smart card device instead of a laptop 213, PDA 214 or IP telephone 218.
  • a USB key or smart card device instead of a laptop 213, PDA 214 or IP telephone 218.
  • other media external to the user's electronic terminal 103 may also be used to store the certificate and corresponding private key. Such a setup will enable enhanced security protection.
  • the authentication interface 104 may install a client application on the electronic terminal 103.
  • This client application enables the corporation network 201 to control the certificate provisioning steps as well as force the disconnection of the temporary unsecured connection and re-authentication using secure network communication technologies to establish a secure link 704.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

A system and method for providing ad hoc personal digital certificate provisioning and enabling secure user connectivity to wireless and wired IP communication networks through state of the art security mechanisms while maintaining ease of use for users and control for network providers. The method includes an authentication interface accepting user credentials, and a validation entity for credential verification and access authorization. The credentials include a unique identifier, a system generated password and a personal digital certificate associated with the user. The unique identifier is associated with a personal characteristic such a cellular telephone number associated with a cellular account or an email associated with someone known both to the user and the network provider, i.e. a sponsor. The password is preferentially transmitted to the user through a SMS message to his cellular telephone. In another embodiment the password is transmitted to the user's email address after asking a sponsor for authorization. The user also receives a digital certificate that enables him to utilize state of the art wireless security mechanisms to authenticate with the network and maintain confidentiality of his network traffic throughout the session. The system and method therefore permit instant, secure and trusted access for guest users at networks where they were not previously known.

Description

SECURE WIRELESS GUEST ACCESS
FIELD OF THE INVENTION
The present invention relates generally to IP communication networks and, more particularly, to a solution that enables ad hoc digital certificate provisioning and secure connectivity over wired and wireless IP communication networks while maintaining ease of use for users and control for network providers.
BACKGROUND OF THE INVENTION
The continued expansion of digital networks such as the public Internet and local area networks (LANs) coupled to the increasing popularity of digital data communication have, for many users, transformed Internet and LAN connectivity from a mere convenience to a necessity.
In their daily work, professionals have come to rely on applications such as email, access to a home network file server or an online database, in addition to other applications and communication capabilities that cannot function without web access. Those users expect such connectivity at their office but also when they are guests at a corporation with which they have no prior or permanent relation. Examples of guests include a consultant visiting her client's office or a student interning for a few weeks.
Users are now also asking for wireless connectivity. In the early stages of the Internet and LAN expansion, users for the most part connected their personal computer over a wired line using standards such as IEEE Ethernet 802.3. More recently, wireless communications standards such as IEEE 802.11 and the upcoming IEEE 802.16 and
IEEE 802.20 have made wireless connectivity ubiquitous. It is now common for users to connect their portable computers such as laptops and personal digital assistants (PDAs) to wireless local area networks (WLANs) at airports, hotels, cafes, corporate offices and so on. As a result of the strong demand for network connectivity, a number of corporations have recognized the need to enable guest access within their IT infrastructure. Most corporations however are reluctant to meet the demand for wireless connectivity mainly because of the perceived security risks posed by the deployment of a wireless infrastructure.
In several aspects, wireless networks are more prone to security breaches than their wired counterparts. Data confidentiality is perhaps the most relevant issue with wireless transmissions since tapping onto wired links would necessitate physical access to the telephone and cable infrastructure of an Internet service provider's (ISP) network equipment; on the other hand, a malicious user with a high gain antenna can stand across the street from a corporation's offices and capture WLAN data traffic.
A security breach through a wireless access point may enable malicious hackers to access restricted network resources, read the content of legitimate users' data traffic or even utilize the corporation's network as a platform for illegal activities.
Consequently, the corporations' desire to satisfy their guests' demand for wireless connectivity is often outweighed by the risks we just described. This is especially the case for corporations handling medical, legal, financial, or government information since current or upcoming legislation in the United States, Canada and Europe imposes severe penalties for mishandling such data.
Beyond the security considerations for wireless connectivity, corporations often demand a minimum of trust in the identity of the guests to whom they are offering network access. Even if guests are only allowed access to the Internet without any right to use the internal network, those guests are still using the host corporation's resources to access the web. This implies that malicious or illegal behavior on the guest network may raise liability issues for the corporation. For example, a guest user may send spam emails, initiate denial of service attacks or participate in illegal trading. It is therefore imperative to ensure sufficient trails are recorded to permit tracing back a given network traffic pattern to a particular person in real life. In fact, corporations sometimes like to provide some guests with controlled access to some parts of their firewall protected internal network; this is in addition to regular Internet access. Such guests may need to access a file server in the internal network, use the corporation's printers or query some database content. In this case, the need for trusting the guest identity is even more stringent.
From a system perspective, many corporations require two major components for their guest access solution: first, a trust management capability that enables the identification of the guests with some level of confidence; second a network security capability that enables encrypting data traffic and ensuring that only legitimate users have access to information traversing the corporation's network, whether wired or wireless.
From a feature perspective, corporations may ask for a number of characteristics for their guest access solution. Those include limited burden to their information technology (IT) staff; no risk to the internal network; compliance with applicable government regulations (especially when it comes to liability for unlawful guest behavior or privacy protection of sensitive information); and the ability for guests to self configure their accounts and connectivity without the help of corporation staff. Generally speaking, corporations regard guest access as a courtesy offering that IT staff needs to have visibility into and control onto should anything go wrong but which they can leave functioning with little or no intervention under otherwise normal circumstances.
In short, many corporations ask for trust management and network security as the underlying building blocks for their guest access solution. Since those building blocks can be implemented in multiple manners, corporations further ask for a number of features such as the ones listed above, that make some implementations preferred over others.
A number of wireless guest access solutions are presently available to corporations. One of the most popular approaches is to simply open network access to any user, whether known or unknown. While such a scheme enables ease of use and instant connectivity for guests, it does not offer any form of identity verification, and therefore poses security threats to the underlying corporate network.
In terms of trust management, one approach consists in forcing guests who attempt access within a wireless local area network (WLAN) hotspot to go through a web based registration page. Users are instructed to provide varying levels of personal information such as name, email address, telephone number, and others. Users are then granted access through the account that has been created for them by the system based on the information they have provided. While convenient for the users and IT staff, such a setup in fact provides no verification of guest identity since users may intentionally provide false information upon registration and no attempt is made by the system to validate their identity.
Another approach to ensure trust management consists in IT staff on site providing temporary guest identification tokens. This method may provide identity verification since guests may have to at least provide their name to obtain a token. However, it introduces the cost of assigning IT staff to this task and may also not be convenient for a number of users.
In terms of network security, one approach is to restrict guest access to a dedicated virtual local area network (VLAN) or a separate network altogether. Although such a scheme significantly reduces the threat to the internal corporate network, it makes it complicated to enable controlled guest access to specific parts of the internal network.
Still in terms of network security, one method is to use the wired equivalent privacy (WEP) standard to secure wireless communication. Although WEP has been around for a several years, a number of flaws have recently been identified in its key management and encryption techniques. As a result, the WEP authentication and encryption scheme is currently considered insecure by most experts. Another approach to secure wireless links is to use Wi-Fi protected access (WPA) or its more recent version WPA2. Those wireless security standards address the vulnerabilities of WEP and are standardized by the institute of electrical and electronics engineers (IEEE) in standard IEEE 802.11i. IEEE 802.11i includes IEEE 802.1 x, an authentication protocol which prevents unauthorized access to the network and protects from a number of security attacks. IEEE 802.1x supports several authentication schemes including EAP-TLS. The strength of EAP-TLS lies in the fact that a compromised password is not sufficient to break into the system. EAP-TLS is widely considered as the highest grade civilian security technology available to date and is supported by a large part of major wireless equipment manufacturers.
The IEEE 802.11i technologies and EAP-TLS are well suited to provide network security across a wireless network access solution; however, EAP-TLS requires each user to possess his own digital certificate. This brings into the picture an additional component: the public key infrastructure (PKI).
PKI refers to the set of software, protocols and policies that enable users to communicate securely over a public, non-trusted, network using public key encryption technology. At the heart of PKI is the need to provide each individual user with a private and public key pair. Those keys usually consist of strings of letters and numbers mathematically chosen such that a message encrypted with one of them can only be decrypted using the other. In addition, for security purposes, public keys must be unequivocally linked to identities in the real world. This is accomplished using digital certificates.
Digital certificates are text files organized in special format (e.g. using the X.509 certificate standard by the International Telecommunication Union) containing a public key and unique identification information of its owner. Certificates are issued by trusted third parties known as certificate authorities and are cryptographically signed by those authorities in a way that does not allow tampering. To issue a trustworthy digital certificate within a secure wireless access system, the PKI component of the system needs to verify the identity of the guest. This is where trust management joins network security and where one of the advantages of the present invention lies.
SUMMARY OF THE INVENTION
The present invention discloses a network authentication mechanism that enables and facilitates ad hoc and trusted digital certificate provisioning coupled to secure user access to wireless and wired IP communication networks through state of the art security communication standards. The system includes a user equipped with an electronic terminal and a personal characteristic where the electronic terminal initially creates a temporary unsecured connection to the network. The user typically accesses an authentication interface through his electronic terminal to provide a unique identifier associated with his personal characteristic. The authentication interface communicates with a validation entity that verifies the user's privileges based on his unique identifier and if authorized grants the user a digital certificate linking his asymmetric cryptography public key to the unique identifier associated with his personal characteristic. The user's electronic terminal will subsequently utilize the digital certificate to establish a secure connection with the network and gain secure access to network resources. The unique identifier is characterized by the fact that it relates to a personal characteristic whose relationship with the user had previously been established through a trusted third party. A preferred embodiment is for the authentication interface to be one or more web pages and users' personal characteristic to be a cellular telephone account whereby the unique identifier is the cellular telephone's number. The relationship between the user and his cellular telephone account must have been previously established with his mobile telephony provider. The user communicates through a laptop computer, or personal digital assistant (PDA) or IP telephone with a web based authentication interface to provide his cellular telephone number. The validation entity consists of database servers; authentication, authorization and accounting (AAA) servers and PKI servers. The validation entity will verify the existence of an account indexed by the cellular telephone number. If no account exists, it will create one, and generate a corresponding password. If an account exists, it will retrieve the password. In both cases, the password is then transmitted to the cellular telephone number of the user through SMS. The user will now enter both his cellular telephone number and received password into the web authentication interface. Transparently to the user, his electronic terminal will generate one private key and the corresponding public key as necessitated by the particularities of public key cryptography. The user's electronic terminal will further transmit the public key to the validation entity through the authentication interface. The validation entity will verify that the cellular telephone number and password match those specified in the account. If they do, the validation entity will utilize the public key sent by the electronic terminal to generate and digitally sign a digital certificate linking the user's cellular telephone number to his public key. The validation entity then transfers the digital certificate to the authentication interface which in turn seamlessly installs it on the user's electronic terminal. The user's electronic terminal will disconnect the existing unsecured connection with the network and re-authenticate with the authentication interface using the newly acquired digital certificate. As a result, the user will establish a secure connection that enables him to gain access to network resources such as the Internet or other local servers and electronic equipment. An additional result is that the network administrators have established some trust in the identity of the user since he has proven possession of the cellular telephone associated with the cellular telephone number he indicated (otherwise he could not have retrieved the password); moreover, a cellular account is generally granted by mobile telephony operators after a minimum level of user identity verification using utility bills, bank statements, identity cards and so on.
In another embodiment, a variation of the mechanism detailed above involves a personal characteristic as being a personal relationship between the user and some person affiliated to and trusted by the corporation. Such a person is also known as a sponsor. In this case, users do not provide their cellular telephone number to the authentication interface but instead use as unique identifiers their own email address along with the name, or the email address, or the cellular telephone number of the sponsor. In parallel a notification message is sent by the system to the sponsor requesting approval for the user's utilization of network resources. If the sponsor validates the request, a one time password is generated by the system and sent to the user's email address. The user then uses his electronic terminal to retrieve the one time password and provide it to the authentication interface. Depending on the implementation, the user may also be asked to enter again his own email address and that of the sponsor. Transparently to the user, his electronic terminal will generate one private key and the corresponding public key as necessitated by the particularities of public key cryptography. The user's electronic terminal will further transmit the public key to the validation entity through the authentication interface. The validation entity will verify that the user's email address and password match those specified in the account. If they do, the validation entity will utilize the public key sent by the electronic terminal to generate and digitally sign a digital certificate linking the sponsor's name, or email address, or cellular telephone number to the user's public key. The digital certificate will preferentially include other information that may have provided by the user to the authentication interface such as a name. The validation entity then transfers the digital certificate to the authentication interface which in turn seamlessly installs it on the user's electronic terminal. The user's electronic terminal will disconnect the existing unsecured connection with the network and utilize the newly acquired certificate to re-authenticate with the authentication interface. As a result, the user will establish a secure connection that enables him to gain access to network resources such as the Internet or other local servers and electronic equipment. In addition, the network administrators have established some trust in the identity of the user since a sponsor has vouched for him.
Other systems, methods, features and advantages of the invention will be, or will become, apparent to one with skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the following claims.
BRIEF DESCRIPTION OF THE DRAWINGS
The novel features which characterize the invention are set forth in particular in the appended claims. The invention itself both in terms of construction and ways of operations will be best understood from the following description of specific embodiments read in pair with the accompanying drawings.
FIG. 1 is a system-level block diagram of the ad hoc and secure guest authentication mechanism.
FIG. 2 provides a high-level view of the buildings blocks underlying a wireless guest access infrastructure. FIG. 3 provides a high-level view of an alternate way to assemble building blocks within a wireless guest access infrastructure.
FIG. 4 provides a flowchart for a user obtaining a digital certificate using a cellular telephone number as unique identifier.
FIG. 5 depicts a system-level block diagram of a variation on the ad hoc and secure guest authentication mechanism in FIG. 1.
FIG. 6 provides a flowchart for a user obtaining a digital certificate using a sponsor's email address as unique identifier.
FIG. 7 illustrates the establishment of a secure wireless session with EAP-TLS.
FIG. 8 shows a system-level block diagram of a user accessing internal resources within a corporation's network within the framework of the wireless guest access infrastructure.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS OF THE INVENTION
Referring collectively to FIGs. 1 and 2, the present invention discloses an ad hoc and secure guest authentication system 100, for use in a controlled corporation network 201, which is preferentially an IP access network. The ad hoc and secure guest user authentication system 100 includes an authentication interface 104, which allows a user 101 to authenticate with a validation entity 105, install a personal digital certificate on his electronic terminal 103 and use it to gain access to network resources 106 such as the Internet 200. The authentication interface 104 and validation entity 105 exchange information about the user 101. Electronic terminals 103 typically consist of a computing device capable of accessing network resources 106 over a variety of network connections such as wired 216 or wireless 215 links. Various types of electronic terminals 103 are also supported by the system 100 such as laptop computers 213, personal digital assistants (PDAs) 214 or IP telephones 218. In order to access network resources 106, a user 101 provides a unique identifier associated with his personal characteristic 102 to the authentication interface 104. In turn, the authentication interface 104 communicates with the validation entity 105 that verifies the existence of an account associated with the personal characteristic 102, or creates an account and password if no previous one exists. The validation entity 105 then communicates the password to the user 101 using his unique identifier. The user 101 then provides the unique identifier described above and the newly acquired password to the authentication interface 104. At the same time, and preferentially seamlessly to the user, the electronic terminal 103 generates a private key and the corresponding public key as necessitated by the particularities of public key cryptography. The user's electronic terminal 103 will further transmit the public key to the validation entity 105 through the authentication interface 104. The validation entity 105 will verify that the unique identifier and password match those specified in the account. If they do, the validation entity 105 will utilize the public key sent by the electronic terminal 103 to generate and digitally sign a digital certificate linking the user's unique identifier to his public key. The validation entity 105 then transfers the digital certificate to the authentication interface 104 which in turn installs it on the user's electronic terminal 103. Those skilled in the art will recognize that digital certificates may also be installed on other media such as external hard disk drives, USB keys, floppy disc drives, DVD discs, compact discs and others. The electronic terminal 103 will utilize the newly acquired certificate to authenticate with the authentication interface 104, create a secure network connection and gain access to network resources 106. The ad hoc guest user authentication system 100 could be used with various types of personal characteristics 102 such as a cellular telephone account or a personal relationship with someone affiliated to and trusted by the corporation network 201 and known as a sponsor. In effect, the trust relationship previously established between the user 101 and her mobile telephony provider or her acquaintance in the corporation network 201 enables the system 100 to issue the user 101 a trustworthy digital certificate. The digital certificate will link the user's public key to the unique identifier associated with her personal characteristic. The user 101 can utilize the digital certificate to authenticate with the system 100 and gain access to network resources such as the Internet 200 or internal resources 217 situated within the internal network 210 of the corporation 201.
Referring to FIGs. 1 and 2, the user 101 is preferentially a guest user 212 within the guest network 219. The guest user 212 may utilize a variety of electronic terminals
103 such as a laptop 213, a PDA 214 or an IP telephone 218. Those skilled in the art should recognize that other types of electronic terminals may be used as well. The guest user 212 may connect through a wired link 216 or a wireless link 215 powered by an access point 211. Through those links, the guest user 212 can access the Internet 200. The guest user 212 may also use his electronic terminal 103 to connect to his home network 202 over a virtual private network connection or other remote network connection techniques (not illustrated).
Referring collectively to FIGs. 1, 2, 3 and 4, in a preferred embodiment, the authentication interface 104 can be seen as a web interface residing on web server
205 that belongs to a centralized server farm 203. The validation entity 105 is also preferably implemented through a combination of a database server 204, a RADIUS server 206, and a certificate server 207 that all belong to the centralized server farm
203. The database 204, web 205, RADIUS 206, and certificate 207 servers are preferentially centralized in the server farm 203, but can also be distributed across a number of locations communicating over the Internet 200; some or all of the servers may also be located within the corporation network 201 in an internal server farm 304. Those skilled in the art will recognize that the servers do not necessarily need to be physically separate entities; furthermore, the RADIUS server which serves at the backbone for authentication, authorization and accounting (AAA) within the system 100 may be replaced by other AAA protocols such as PANA or DIAMETER. The user 101 establishes a temporary unsecured connection with the network. Such connection is preferentially restricted to a dedicated network that does not permit access to the Internet or other network resources; instead, the dedicated network only permits a user to authenticate with the system 100 and obtain a digital certificate. The user 101 initially starts a web browser session on his electronic terminal 103 and requests some web page at step 401. The web server 205 redirects the user's browser request to the authentication web interface at step 402. At step 403, the user 101 inputs the unique identifier associated with his personal characteristic 102 on the web interface residing on web server 205. This latter then communicates the unique identifier to the RADIUS server 206 at step 404. At step 405, the RADIUS server 206 verifies with the database server 204 whether an account for this user 101 already exists. If not, an account is created at the database server 204 and a password for this account is generated. If an account already exists, the associated password is retrieved. The RADIUS server 206 then transmits this password to the user 101 using the unique identifier associated with his personal characteristic 102; in a preferred embodiment, the personal characteristic is a cellular telephone account whose unique identifier is the cellular telephone number; the password is sent by the RADIUS server 206 through the short message service (SMS) at step 406. At step 407, the user 101 inputs his cellular telephone number and the password just received by SMS into the web interface residing on the web server 205. In parallel, the user's electronic terminal 103 generates a private and public key pair in accordance with the rules of public key cryptography. The electronic terminal 103 further transmits the public key to the authentication interface 104 at step 408. At step 409, the web server 205 transfers the cellular telephone number and password input by the user 101 to the RADIUS server 206. In turn, the RADIUS server validates the credentials with the database server 204 at step 410. If the information matches the existing account, the RADIUS server 206 communicates the cellular telephone number and the user's public key to the certificate server 207 at step 411. In turn the certificate server 207 generates and digitally signs a digital certificate linking the user's public key to his cellular telephone number. The certificate server 207 then transmits the certificate to the web server 205 at step 412. The web server 205 installs the certificate on the user's electronic terminal 103 at step 413. Finally, the electronic terminal 103 disconnects the temporary unsecured connection and uses the newly acquired digital certificate to authenticate again with the centralized server farm, establish a secure networking session and gain access to network resources 106 such as the Internet 200 through his electronic terminal 103 that is preferentially a laptop 213 or PDA 214 or IP telephone 219. Those skilled in the art should recognize that other arrangements between the various servers in the centralized server farm 203 can also be used to achieve the same functionalities disclosed above. For example, the database server 204 may hold the logic necessary to communicate with the certificate server 207 instead of going through the web server 205 and so on.
In the preferred embodiment disclosed above, the personal characteristic 102 is a cellular telephone account and the unique identifier is a cellular telephone number. Those skilled in the art will recognize that the personal characteristic can also consist in a variety of personal communication accounts with unique identifiers such as pager accounts with unique pager numbers, mobile fax machine accounts with unique cellular fax numbers, email accounts with unique email addresses, mobile IP telephone accounts with unique IP telephone numbers and so on.
In another preferred embodiment and referring to FIG. 5, the personal characteristic 102 of the user 101 is a relationship with a person known both to the user 101 and the corporation 201. Such a person can be referred to as a sponsor 500. In this embodiment the unique identifier is preferentially the email address of the sponsor. The authentication interface 104 asks the user for his unique identifier associated with his personal characteristic, in other words, the authentication interface 104 asks the user for the email address of his sponsor. The authentication interface 104 also asks the user 101 for his email address. The authentication interface 104 transmits the email address of the sponsor and that of the user 101 to the validation entity 105. In turn, the validation entity 105 notifies the sponsor 500 using his email address. The sponsor 500 replies to the email message to recognize or not his relationship with the user 101. The validation entity 105 receives the sponsor's response and if positive generates a one time password and sends it to the user's email address. The user 101 retrieves the one time password and submits it to the authentication interface 104 along with his email address. In addition, the user's electronic terminal 103 generates a private and public key pair along the rules of public key cryptography and submits the public key to the authentication interface 104. The email address and password input by the user are then transferred to the validation entity 105. If they match an existing account, the validation entity 105 generates and digitally signs a digital certificate linking the user's public key to the email address of the sponsor. In other preferred embodiments, the digital certificate may link the user's public key to the name of the sponsor, or his phone number, or his postal address or any other piece of information that enables the corporation 201 to uniquely identify the sponsor. Once the digital certificate is generated, it is transferred to the authentication interface 104 which in turn installs it on the electronic terminal 103. Finally, the electronic terminal 103 uses the digital certificate to authenticate with the system 100, establish a secure networking session and use it to gain access to network resources 106.
Referring to FIGs. 2, 3, 5 and 6, the authentication interface 104 can be seen as a web interface residing on web server 205 preferentially located within a centralized server farm 203 but that may also reside within an internal server farm 304. The user
101 initially opens his browser on his electronic terminal 103 and requests some web page at step 401. The web server 205 redirects the user 101 to the authentication web interface at step 402. The user 101 inputs his email address and unique identifier at step 600; in a preferred embodiment, the personal characteristic is a personal acquaintance with a sponsor 500 and the unique identifier is the email address of the sponsor 500. The web server 205 then communicates the information submitted by the user 101 to the RADIUS server 206 at step 601. At step 602, the RADIUS server
206 verifies with the database server 204 whether an account for this user 101 already exists. If not, an account is created at the database server 204 and a password for this account is generated. If an account already exists, the associated password is retrieved. The RADIUS server 206 then transmits this password to the user's email address at step 603. At step 604, the user 101 inputs his email address and password in the web interface residing on the web server 205. In parallel, the user's electronic terminal 103 generates a private and public key pair in accordance with the rules of public key cryptography. The electronic terminal 103 further transmits the public key to the web server 205 at step 408. This latter transfers the email address and password input by the user 101 to the RADIUS server 206 at step 605. In turn, the RADIUS server 206 validates the credentials with the database server 204 at step 410. If the credentials match the existing account, the RADIUS server 206 communicates the email address of the sponsor 500 and the user's public key to the certificate server 207 at step 606. In turn the certificate server 207 generates and digitally signs a digital certificate linking the public key to the email address of the sponsor 500. The certificate server 207 then transmits the certificate to the web server 205 at step 607. The web server 205 installs the certificate on the user's electronic terminal 103 at step 413. Finally, the electronic terminal 103 uses the newly acquired digital certificate to authenticate with the centralized server farm and gain secure network access to resources 106 such as the Internet 200 through his electronic terminal 103 that is preferentially a laptop 213 or PDA 214 or IP telephone 219. Those skilled in the art should recognize that other types of unique identifiers may be used to identify the sponsor such as his cellular telephone number, his landline phone number, his fax number, his postal address and so on. Furthermore, the system 100 may use a different method than email to communicate the one time password to the user 101. For example the one time password may be sent back by SMS in which case the authentication interface 104 will ask the user 101 for his cellular telephone number, conveyed in person by IT staff in the corporation network 201 and so on.
Referring collectively to FIGs. 1, 2 and 7 the user 101 uses a personal digital certificate to authenticate over EAP-TLS and secure her wireless session. The user's laptop 213 utilizes an IEEE 802.1x client embedded in its operating system to exchange EAP messages 700 with the access point 211. In turn, the access point 211 communicates the information from the EAP messages to the RADIUS server 206; this is accomplished at step 701. The RADIUS server 206 further transmits his own digital certificate to the user 101 at step 702. At step 703 the user 101 sends to the RADIUS server 206 her personal digital certificate which she obtained from the ad hoc and secure guest authentication system 100 as disclosed above. This certificate exchange between user 101 and RADIUS server 206 enables the creation of a secure link 704 between the user's laptop 213 and the access point 211. The user 101 can utilize the secure link to communicate with the Internet 200 or even access internal resources 217 located within the internal network 210.
Referring collectively to FIGs. 1, 2 and 8, the guest user 212 may access internal resources 217 located within the internal network 210 which is protected by an internal firewall 209. The user 212 connects through the wired link 216 or wireless link 215 to the internal resource 217. The internal resource 217 requests the user's certificate. The user 212 submits his certificate 900. The internal resource 217 validates the certificate in step 901 by retrieving a certificate revocation list (CRL) from the certificate server 207. This list is a collection of all certificates issued by the certificate server along with their validity status. When system administrators revoke a certificate, the CRL reflects that change. Those skilled in the art will recognize that technologies other than the CRL may be used to validate certificate authenticity including the online certificate status protocol (OCSP). If the certificate is valid, the internal resource 217 may exchange other challenge messages with the user's electronic terminal 103 before finally granting access.
Referring to FIG. 1, 2, 4, 6 and 7 another preferred embodiment would include electronic security verifications of the electronic terminal 103 prior to granting access to network resources 106 at step 704. This will include virus and spyware verification in addition to general observation of electronic terminal behavior on the network to prevent security breaches within the system 100.
Referring to FIGs. 1, 2 and 7, user 101 would not be a human person, rather an electronic user consisting of software, hardware or combination thereof and residing on the electronic terminal 103. The electronic user will engage with communication with the authentication system 100 through the authentication interface 104. The electronic user must have been previously configured with some unique identifier associated with a personal characteristic such as cellular telephone number or the email address of a sponsor in the corporation network 201. The electronic user will obtain a digital certificate as previously disclosed and will exchange authentication messages 700 in order to secure the wireless link 704.
Referring to FIGs. 1 and 2, in other preferred embodiments, the authentication interface 104 is not a web interface but can consist of one or more software processes running on local or remote servers such as a SMS server, a fax server, a chat server, an email server or others. In those cases the user 101 communicates with the authentication interface 104 through SMS, facsimile, chat or email communication. In yet other embodiments (not illustrated), the authentication interface can consist in a physical security access unit that the user 101 can access through a plurality of components such as a security access card that is inserted into the physical security access unit, or a radio frequency (RF) enabled security access tag that communicates through radio waves with said access unit, or an infrared (IR) enabled security access tag that communicates through infrared waves with said access unit. The components should be capable of storing user credential information such as a password, email addresses and so on; the components should further be capable of communicating the credentials to said access unit. Those skilled in the art will recognize that other forms of interfaces capable of transferring information between the user 101 and the validation entity 105 can also be used.
Referring to FIGs. 1 and 2, in other preferred embodiments the validation entity 105 does not consist of servers but can be of another nature such as one or more human operators that are enabled to receive the unique identifier from the user 101, validate the user's identity and issue him a personal digital certificate.
Referring to FIGs. 1, 2, 4 and 6, IT staff within the corporation network 201 may elect to be involved in one or more of the steps in FIGs. 4 and 6 by specifying that all user provisioning requests receive their approval before the system 100 grants the user 101 a digital certificate at step 413. The authentication interface 104 may also (not illustrated) ask the user to specify his affiliation with the corporation network 201. This way IT staff can be notified only in the case of users claiming to belong to a certain group such as interns. This may be because interns for example may have more access privileges to the internal network 210 (while regular users have none) which necessitate further validation of their identity.
Referring to FIGs. 1, 2, 4 and 6, in another preferred embodiment, step 413 can involve the installation of the user's certificate on a USB key or smart card device instead of a laptop 213, PDA 214 or IP telephone 218. Those skilled in the art should recognize that other media external to the user's electronic terminal 103 may also be used to store the certificate and corresponding private key. Such a setup will enable enhanced security protection.
Referring collectively to FIGs. 1, 2, 4, 5, 6, and 7 when the user 101 initially connects to the temporary unsecured network to obtain a personal digital certificate, the authentication interface 104 may install a client application on the electronic terminal 103. This client application enables the corporation network 201 to control the certificate provisioning steps as well as force the disconnection of the temporary unsecured connection and re-authentication using secure network communication technologies to establish a secure link 704.

Claims

WHAT IS CLAIMED IS:
1. A method for enabling ad hoc and secure connectivity for a user so that he can obtain a trusted personal digital certificate and use it to securely access network resources through an electronic terminal, said user being associated with a trusted personal characteristic, said method comprising the steps of:
(a) Said user establishing a temporary unsecured connection to an authentication interface;
(b) Said user providing a unique identifier associated with said trusted personal characteristic to said authentication interface;
(c) Said authentication interface transferring said unique identifier to at least one validation entity;
(d) Identifying said unique identifier as a digital certificate provisioning request at said validation entity by a certificate provisioning application; (e) Said validation entity looking up whether said unique identifier is already registered in an account held at said validation entity: i. If said unique identifier is already registered with said validation entity, retrieving a password associated with said user and sending said password to said user using said unique identifier; ii. If said unique identifier is not registered with said validation entity, said certificate provisioning application creating an account for said user at said validation entity, generating a password for said user and sending said password to said user using said unique identifier. (T) Said user, after retrieving said password, providing said unique identifier and said password to said authentication interface; (g) Said electronic terminal generating a public and private key pair in accordance with the rules of public key cryptography and sending said public key to said authentication interface; (h) Said authentication interface transferring said unique identifier, said password and said public key to said validation entity; (i) Said validation entity generating and digitally signing a personal digital certificate linking said unique identifier to said public key;
(j) Said validation entity transferring said certificate back to said authentication interface; (k) Said authentication interface installing said certificate onto said electronic terminal whereby an application residing on said electronic terminal tears down said unsecured connection and establishes a new secure connection that permits access to network resources through said electronic terminal.
2. A method according to claim 1 , wherein said connectivity is a link to a data network.
3. The method of claim 2, wherein said data network is based on the Internet protocol suite.
4. A method according to claim 1 , wherein said connectivity is a link to a mobile phone network.
5. A method according to claim 1 , wherein said connectivity is a link to a fixed phone network.
6. A method according to claim 1 , wherein said user is a human person or software or hardware or a combination thereof.
7. A method according to claim 1 , wherein said network resources comprise at least one file server, data server, database, printer, fax machine, telephone set, chat server, web server, authentication server, backup server or combination thereof.
8. A method according to claim 1 , wherein said electronic terminal is a mobile terminal or a fixed terminal.
9. The method of claim 8, wherein said mobile terminal is a laptop computer or a personal digital assistant (PDA) or an IP telephone.
10. The method of claim 8, wherein said fixed terminal is a desktop computer, or a mainframe workstation.
11. A method according to claim 1 , wherein said trusted personal characteristic is a cellular telephone account and said unique identifier is a cellular telephone number.
12. A method according to claim 1 , wherein said trusted personal characteristic is a landline telephone account and said unique identifier is a landline telephone number.
13.A method according to claim 1 , wherein said trusted personal characteristic is a fax telephone account and said unique identifier is a fax telephone number.
14. A method according to claim 1 , wherein said authentication interface is a web interface.
15. The method of claim 14, wherein said web interface resides on at least one web server communicating with at least one database server and at least one certificate server.
16. A method according to claim 1 , wherein said authentication interface is software or hardware or at least one human person or a combination thereof.
17. The method of claim 16, wherein said authentication interface is at least one email server, or at least one human call center, or at least one voice server, or at least one IVR server, or at least one SMS server communicating with at least one database server and at least one certificate server.
18. The method of claim 16, wherein said authentication interface is at least one telephone set, or at least one fax machine or a combination thereof.
19. The method of claim 16, wherein said authentication interface is at least one physical security access unit.
20. The method of claim 1 , wherein said user accesses said authentication interface through said electronic terminal.
21. The method of claim 20, wherein said electronic terminal communicates with said authentication interface through at least one data network.
22. The method of claim 20, wherein said electronic terminal communicates with said authentication interface through at least one wired connection of at least one wireless connection of a combination thereof.
23. The method of claim 1 , wherein said user accesses said authentication interface through a security access card and said security access card is inserted into said authentication interface and said unique identifier is an embedded property of the security access card.
24. The method of claim 1 , wherein said user accesses said authentication interface through a radio frequency (RF) enabled security access tag and said radio frequency enabled security access card communicates with said authentication interface through radio waves and said unique identifier is an embedded property of the security access card.
25. The method of claim 1 , wherein said user accesses said authentication interface through an infrared (IR) enabled security access tag and said infrared enabled security access card communicates with said authentication interface through infrared waves and said unique identifier is an embedded property of the security access tag.
26. The method of claim 1 , wherein said user accesses said authentication interface through a biometric scan device and said biometric scan device communicates with said authentication interface and said unique identifier is an embedded property of the human organ scanned by said biometric scan device.
27. The method of claim 26, wherein said biometric scan device communicates with said authentication interface through at least one wired connection or at least one wireless connection of a combination thereof.
28. The method of claim 1 , wherein said step (c) is characterized in that said validation entity is a centralized or decentralized server farm or a combination thereof.
29. The method of claim 1 , wherein said step (c) is characterized in that said validation entity is a server farm containing at least one database server or at least one web server or at least one certificate server or a combination thereof, or said validation entity is at least one human person.
30. The method of claim 1 , wherein said step (b) is characterized in that said unique identifier is sent to said authentication interface by SMS or by email or by pager or by fax or a combination thereof.
31. The method of claim 1 , wherein said step (b) is characterized in that said unique identifier is sent over a network connection.
32. The method of claim 31 wherein, said network connection travels over the Internet or over a local area network (LAN) or over a wireless local area network (WLAN) or over a metropolitan local area network (MAN) or a combination thereof.
33. The method of claim 1 , wherein said step (e) is characterized in that said password is sent to said authentication interface by SMS or by email or by pager or by fax or a combination thereof.
34. The method of claim 1 , wherein said step (e) is characterized in that said password is sent over a network connection.
35. The method of claim 34 wherein, said network connection travels over the Internet or over a local area network (LAN) or over a wireless local area network (WLAN) or over a metropolitan local area network (MAN) or a combination thereof.
36. The method of claim 1 , wherein said step (a) is characterized in that said temporary unsecured connection is a wireless connection or a wired connection or a combination thereof.
37. The method of claim 1 , wherein said step (a) is characterized in that said temporary unsecured connection is achieved through a virtual private area network (VLAN).
38. The method of claim 1 , wherein said step (a) is characterized in that said temporary unsecured connection is achieved through a dedicated data network.
39. The method of claim 1 , wherein said step (a) further involves said authentication interface installing a client application onto said electronic terminal.
40. The method of claim 39, wherein said client application transfers said unique identifier and password to said authentication interface.
41. The method of claim 39, wherein said client application receives said certificate from said authentication interface and installs it onto said electronic terminal.
42. The method of claims 1 and 39, wherein said client application tears down said temporary unsecured connection and established said new secure connection.
43. The method of claim 1 , wherein said step (k) further involves electronic security verifications of said electronic terminal.
44. The method of claim 43, wherein said electronic security verifications consist of spyware scanning, or virus scanning, or malware scanning or operating system verifications, or application verifications or a combination thereof.
45.A method according to claim 1 , wherein network resources are local resources or foreign resources or a combination thereof.
46. The method of claim 1 , wherein step (k) is characterized in that said certificate does not get installed onto said electronic terminal but gets installed onto a separate hardware device.
47. The method of claim 46, wherein said separate hardware device is a USB key, a smart card key, an external hard drive, a floppy disc, a compact disc, a DVD disc, or a combination thereof.
48. A system for enabling ad hoc and secure connectivity so that a user is capable of instantly obtaining a trusted personal digital certificate and using it to secure a network connection and access network resources, said user being associated with a trusted personal characteristic, said personal characteristic having a unique identifier, said system comprising:
(a) An electronic terminal controlled by said user and enabling access to an authentication interface; (b) Said authentication interface being adapted to receive said unique identifier and send said unique identifier to a validation entity; (c) Said validation entity being adapted to receive said unique identifier and retrieve or generate a password associated with said unique identifier and send said password to said user using said unique identifier; (d) Said electronic terminal being adapted to generate a public key and a private key in accordance with the rules of public key cryptography and submit said public key to said authentication interface; (e) Said user submitting said unique identifier and said password to said authentication interface; (f) Whereby said authentication interface is further adapted to receive said unique identifier, said password and said public key; (g) Said authentication interface being further adapted to transfer said unique identifier and said password to said validation entity for verification; (h) Said validation entity being adapted to generate and digitally sign a personal digital certificate associating said unique identifier to said public key; (i) Said validation entity being further adapted to transfer said digital certificate to said authentication interface; (j) Said authentication interface being adapted to install said certificate onto said electronic terminal;
(k) Said electronic terminal being further adapted to establish a secure connection using said certificate.
49.A system according to claim 48, wherein said network resources are Internet services or voice telecommunications services or data telecommunications services or local area network (LAN) resources or wireless local area network (WLAN) resources, or metropolitan area network (MAN) resources, or a combination thereof.
50. A system according to claim 48, wherein said network resources are local or foreign or a combination of local and foreign services to the network said user is connecting to.
51. A system according to claim 48, wherein said personal characteristic is a cellular telephone account and said unique identifier is a cellular telephone number.
52.A system according to claim 48, wherein said trusted personal characteristic is a landline telephone account and said unique identifier is a landline telephone number.
53.A system according to claim 46, wherein said trusted personal characteristic is a fax telephone account and said unique identifier is a fax telephone number.
54.A method for enabling ad hoc and secure connectivity for a user so that he can obtain a trusted personal digital certificate and use it to securely access network resources through an electronic terminal, said user being associated with a trusted entity, said user being further associated with a personal identifier, said method comprising the steps of:
(a) Said user establishing a temporary unsecured connection to an authentication interface;
(b) Said user providing a trust identifier associated with said trusted entity to said authentication interface;
(c) Said user further providing said personal identifier to said authentication interface; (d) Said authentication interface transferring said personal identifier and said trust identifier to at least one validation entity; (e) Identifying said personal identifier and said trust identifier as a digital certificate provisioning request at said validation entity by a certificate provisioning application;
(f) Said validation entity sending an approval request to said trusted entity using said trust identifier;
(g) Said trusted entity notifying said validation entity that said user is authorized to access said network resources;
(h) Said validation entity looking up whether said personal identifier and said trust identifier are already registered in an account held at said validation entity: i. If said personal identifier and said trust identifier are already registered with said validation entity, retrieving a password associated with said user and sending said password to said user using said personal identifier; ii. If said personal identifier and said trust identifier are not registered with said validation entity, said certificate provisioning application creating an account for said user at said validation entity, generating a password for said user and sending said password to said user using said personal identifier. (i) Said user, after retrieving said password, providing said personal identifier and said password and said trust identifier to said authentication interface;
G) Said electronic terminal generating a public and private key pair in accordance with the rules of public key cryptography and sending said public key to said authentication interface;
(k) Said authentication interface transferring said personal identifier and said trust identifier, and said password and said public key to said validation entity;
(I) Said validation entity generating and digitally signing a personal digital certificate linking said trust identifier to said public key;
(m)Said validation entity transferring said certificate back to said authentication interface; (n) Said authentication interface installing said certificate onto said electronic terminal whereby an application residing on said electronic terminal tears down said unsecured connection and establishes a new secure connection that permits access to network resources through said electronic terminal.
55.A method according to claim 54, wherein said trusted entity is a human person or software or hardware or a combination thereof.
56. The method of claim 55, wherein said trusted entity is at least one email server and said trust identifier is an email address, or at least one human call center and said trust identifier is a telephone number, or at least one IVR server and said trust identifier is a telephone number, or at least one SMS server and said trust identifier is a mobile telephone number or at least one database server and said trust identifier is an IP address or at least one fax server and said trust identifier is a fax machine number or at least one web server and said trust identifier is an IP address.
57. The method of claim 55, wherein said trusted entity is at least one human person and said trust identifier is an email address.
58. The method of claim 55, wherein said trusted entity is at least one human person and said trust identifier is a telephone number.
59. The method of claim 55, wherein said trusted entity is at least one human person and said trust identifier is a mobile telephone number.
60. A method according to claim 54, wherein said connectivity is a link to a data network.
61. The method of claim 61 , wherein said data network is based on the Internet protocol suite.
62.A method according to claim 54, wherein said connectivity is a link to a mobile phone network.
63.A method according to claim 54, wherein said connectivity is a link to a fixed phone network.
64.A method according to claim 54, wherein said user is a human person or software or hardware or a combination thereof.
65.A method according to claim 54, wherein said network resources comprise at least one file server, data server, database, printer, fax machine, telephone set, chat server, web server, authentication server, backup server or combination thereof.
66.A method according to claim 54, wherein said electronic terminal is a mobile terminal of fixed terminal.
67. The method of claim 66, wherein said mobile terminal is a laptop computer or a personal digital assistant (PDA) or an IP telephone.
68. The method of claim 66, wherein said fixed terminal is a desktop computer, or a mainframe station.
69.A method according to claim 54, wherein said personal identifier is a cellular telephone number.
70. A method according to claim 54, wherein said personal identifier is a landline telephone number.
71. A method according to claim 54, wherein said personal identifier is a fax telephone number.
72.A method according to claim 54, wherein said authentication interface is a web interface.
73. The method of claim 72, wherein said web interface resides on at least one web server communicating with at least one database server and at least one certificate server.
74.A method according to claim 54, wherein said authentication interface is software or hardware or at least one human person or a combination thereof.
75. The method of claim 74, wherein said authentication interface is at least one email server, or at least one human call center, or at least one voice server, or at least one IVR server, or at least one SMS server communicating with at least one database server and at least one certificate server.
76. The method of claim 74, wherein said authentication interface is at least one telephone set, or at least one fax machine or a combination thereof.
77. The method of claim 74, wherein said authentication interface is at least one physical security access unit.
78. The method of claim 54, wherein said user accesses said authentication interface through said electronic terminal.
79. The method of claim 78, wherein said electronic terminal communicates with said authentication interface through at least one data network.
80. The method of claim 78, wherein said electronic terminal communicates with said authentication interface through at least one wired connection of at least one wireless connection of a combination thereof.
81. The method of claim 54, wherein said user accesses said authentication interface through a security access card and said security access card is inserted into said authentication interface and said personal identifier is an embedded property of the security access card.
82. The method of claim 1 , wherein said user accesses said authentication interface through a radio frequency (RF) enabled security access tag and said radio frequency enabled security access card communicates with said authentication interface through radio waves and said personal identifier is an embedded property of the security access card.
83. The method of claim 1 , wherein said user accesses said authentication interface through an infrared (IR) enabled security access tag and said infrared enabled security access card communicates with said authentication interface through infrared waves and said personal identifier is an embedded property of the security access tag.
84. The method of claim 1 , wherein said user accesses said authentication interface through a biometric scan device and said biometric scan device communicates with said authentication interface and said personal identifier is an embedded property of the human organ scanned by said biometric scan device.
85. The method of claim 84, wherein said biometric scan device communicates with said authentication interface through at least one wired connection or at least one wireless connection or a combination thereof.
86. The method of claim 54, wherein said step (d) is characterized in that said validation entity is a centralized or decentralized server farm or a combination thereof.
87. The method of claim 54, wherein said step (d) is characterized in that said validation entity is a server farm containing at least one database server or at least one web server or at least one certificate server or a combination thereof, or said validation entity is at least one human person.
88. The method of claim 54, wherein said step (c) is characterized in that said personal identifier and said trust identifier are sent to said authentication interface by SMS or by email or by pager or by fax or a combination thereof.
89. The method of claim 54, wherein said step (c) is characterized in that said personal identifier and said trust identifier are sent over a network connection.
90. The method of claim 89 wherein, said network connection travels over the Internet or over a local area network (LAN) or over a wireless local area network (WLAN) or over a metropolitan local area network (MAN) or a combination thereof.
91. The method of claim 54, wherein said step (i) is characterized in that said password is sent to said authentication interface by SMS or by email or by pager or by fax or a combination thereof.
92. The method of claim 54, wherein said step (i) is characterized in that said password is sent over a network connection.
93. The method of claim 92 wherein, said network connection travels over the Internet or over a local area network (LAN) or over a wireless local area network (WLAN) or over a metropolitan local area network (MAN) or a combination thereof.
94. The method of claim 54, wherein said step (a) is characterized in that said temporary unsecured connection is a wireless connection or a wired connection or a combination thereof.
95. The method of claim 54, wherein said step (a) is characterized in that said temporary unsecured connection is achieved through a virtual local area network (VLAN).
96. The method of claim 54, wherein said step (a) is characterized in that said temporary unsecured connection is achieved through a dedicated data network.
97. The method of claim 54, wherein said step (a) further involves said authentication interface installing a client application onto said electronic terminal.
98. The method of claim 97, wherein said client application transfers said personal identifier, and said trust identifier, and said password and said public key to said authentication interface.
99. The method of claim 97, wherein said client application receives said certificate from said authentication interface and installs it onto said electronic terminal.
100. The method of claims 54 and 97, wherein said client application tears down said temporary unsecured connection and established said new secure connection.
101. The method of claim 54, wherein said step (n) further involves electronic security verifications of said electronic terminal.
102. The method of claim 101 , wherein said electronic security verifications consist of spyware scanning, or virus scanning, or malware scanning or operating system verifications, or application verifications or a combination thereof.
103. A method according to claim 54, wherein network resources are local resources or foreign resources or a combination thereof.
104. The method of claim 54, wherein step (n) is characterized in that said certificate does not get installed onto said electronic terminal but gets installed onto a separate hardware device.
105. The method of claim 104, wherein said separate hardware device is a USB key, a smart card key, an external hard drive, a floppy disc, a compact disc, a DVD disc, or a combination thereof.
106. The method of claim 54, wherein step (f) is characterized in that said validation entity sends said approval request to said trusted entity over a network connection.
107. The method of claim 106, wherein said network connection travels over the Internet or over a local area network (LAN) or over a wireless local area network (WLAN) or over a metropolitan area network (MAN) or a combination thereof.
108. The method of claim 54, wherein step (f) is characterized in that said approval request is sent by email and said trust identifier is an email address, or by SMS and said trust identifier is a mobile telephone number, or by pager and said trust identifier is a pager number or by fax and said trust identifier is a fax number or a combination thereof.
109. The method of claim 54, wherein step (g) is characterized in that said trusted entity sends said authorization to said validation entity over a network connection.
110. The method of claim 109, wherein said network connection travels over the Internet or over a local area network (LAN) or over a wireless local area network (WLAN) or over a metropolitan area network (MAN) or a combination thereof.
111. The method of claim 54, wherein step (g) is characterized in that said authorization is sent by email, or by SMS, or by pager or by fax, or a combination thereof.
112. A system for enabling ad hoc and secure connectivity so that a user is capable of instantly obtaining a trusted personal digital certificate and using it to secure a network connection and access network resources, said user being associated with a personal identifier and a trusted entity, said trusted entity having a trust identifier, said system comprising:
(a) An electronic terminal controlled by said user and enabling access to an authentication interface;
(b) Said authentication interface being adapted to receive said personal identifier and said trust identifier and send them to a validation entity;
(c) Said validation entity being adapted to receive said personal identifier and said trust identifier; (d) Said validation entity being adapted to request approval from said trusted entity using said trust identifier;
(e) Said validation entity being further adapted to process the approval response from said trusted entity;
(f) Said validation entity being adapted to retrieve or generate a password associated with said personal identifier and said trust identifier and send said password to said user using said personal identifier; (g) Said electronic terminal being adapted to generate a public key and a private key in accordance with the rules of public key cryptography; (h) Said user submitting said personal identifier and said password and said trust identifier to said authentication interface; (i) Said electronic terminal being adapted to submit said public key to said authentication interface; 0) Said authentication interface being further adapted to transfer said personal identifier and said password and said trust identifier and said public key to said validation entity for verification; (k) Said validation entity being adapted to generate and digitally sign a personal digital certificate associating said trust identifier to said public key; (I) Said validation entity being further adapted to transfer said digital certificate to said authentication interface; (m)Said authentication interface being adapted to install said certificate onto said electronic terminal; (n) Said electronic terminal being further adapted to establish a secure connection using said certificate.
113. A system according to claim 112, wherein said network resources are Internet services or voice telecommunications services or data telecommunications services or local area network (LAN) resources or wireless local area network (WLAN) resources, or metropolitan area network (MAN) resources, or a combination thereof.
114. A system according to claim 112, wherein said network resources are local or foreign or a combination of local and foreign services to the network said user is connecting to.
115. A system according to claim 112, wherein said personal identifier is a cellular telephone number or a landline telephone number of a fax telephone number or an email address.
116. The method of claim 112, wherein said trusted entity is at least one email server and said trust identifier is an email address, or at least one human call center and said trust identifier is a telephone number, or at least one IVR server and said trust identifier is a telephone number, or at least one SMS server and said trust identifier is a mobile telephone number or at least one database server and said trust identifier is an IP address or at least one fax server and said trust identifier is a fax machine number or at least one web server and said trust identifier is an IP address.
117. The method of claim 112, wherein said trusted entity is at least one human person and said trust identifier is an email address.
118. The method of claim 112, wherein said trusted entity is at least one human person and said trust identifier is a telephone number.
119. The method of claim 112, wherein said trusted entity is at least one human person and said trust identifier is a mobile telephone number.
PCT/CA2007/000821 2006-05-09 2007-05-09 Secure wireless guest access WO2007128134A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA002647684A CA2647684A1 (en) 2006-05-09 2007-05-09 Secure wireless guest access

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US79873306P 2006-05-09 2006-05-09
US60/798,733 2006-05-09

Publications (1)

Publication Number Publication Date
WO2007128134A1 true WO2007128134A1 (en) 2007-11-15

Family

ID=38667388

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2007/000821 WO2007128134A1 (en) 2006-05-09 2007-05-09 Secure wireless guest access

Country Status (2)

Country Link
CA (1) CA2647684A1 (en)
WO (1) WO2007128134A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102007056788A1 (en) * 2007-11-23 2009-06-10 T-Mobile Internationale Ag Procedure for access to closed groups in radio access networks
WO2010056208A1 (en) * 2008-11-13 2010-05-20 Twoki Holdings Limited Communication system
EP2086254A3 (en) * 2007-11-21 2011-03-23 Atlas Networking SRL System and method for attaching advertising content through a secure or unsecure wireless connection
WO2010075472A3 (en) * 2008-12-23 2011-10-13 Qualcomm Incorporated In-band provisioning for a closed subscriber group
EP2675130A1 (en) * 2012-05-25 2013-12-18 Nokia Corporation Methods and apparatuses for guest access
US8924714B2 (en) 2008-06-27 2014-12-30 Microsoft Corporation Authentication with an untrusted root
US9853968B2 (en) 2015-08-19 2017-12-26 Winifred Shen Systems and methods for authenticating users accessing a secure network with one-session-only, on-demand login credentials
CN112512047A (en) * 2020-11-19 2021-03-16 四川省肿瘤医院 Detection method for wireless network security authentication
US10965672B2 (en) 2018-04-13 2021-03-30 At&T Intellectual Property I, L.P. Network service control for access to wireless radio networks
US11109229B2 (en) * 2016-08-25 2021-08-31 EMC IP Holding Company LLC Security for network computing environment using centralized security system
CN113661699A (en) * 2019-03-18 2021-11-16 第一资本服务有限责任公司 System and method for pre-authentication of customer support calls
CN114553502A (en) * 2022-01-29 2022-05-27 联想开天科技有限公司 Network authentication method and electronic equipment
FR3116978A1 (en) * 2020-11-27 2022-06-03 Orange Access control to a local communication network, and access gateway implementing such control
EP4037358A1 (en) * 2021-01-29 2022-08-03 Quadient Technologies France Guest access management in a mobile application
US12074910B2 (en) 2019-03-18 2024-08-27 Capital One Services, Llc System and method for second factor authentication to perform services

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020123325A1 (en) * 2001-03-01 2002-09-05 Cooper Gerald M. Method and apparatus for increasing the security of wireless data services
US20030088781A1 (en) * 2001-11-06 2003-05-08 Shamrao Andrew Divaker Systems and methods for ensuring security and convenience
US20040059923A1 (en) * 2002-09-25 2004-03-25 Shamrao Andrew Divaker Systems and methods for authentication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020123325A1 (en) * 2001-03-01 2002-09-05 Cooper Gerald M. Method and apparatus for increasing the security of wireless data services
US20030088781A1 (en) * 2001-11-06 2003-05-08 Shamrao Andrew Divaker Systems and methods for ensuring security and convenience
US20040059923A1 (en) * 2002-09-25 2004-03-25 Shamrao Andrew Divaker Systems and methods for authentication

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2086254A3 (en) * 2007-11-21 2011-03-23 Atlas Networking SRL System and method for attaching advertising content through a secure or unsecure wireless connection
DE102007056788A1 (en) * 2007-11-23 2009-06-10 T-Mobile Internationale Ag Procedure for access to closed groups in radio access networks
US8924714B2 (en) 2008-06-27 2014-12-30 Microsoft Corporation Authentication with an untrusted root
WO2010056208A1 (en) * 2008-11-13 2010-05-20 Twoki Holdings Limited Communication system
CN102484836A (en) * 2008-12-23 2012-05-30 高通股份有限公司 In-band provisioning for a closed subscriber group
US8787828B2 (en) 2008-12-23 2014-07-22 Qualcomm Incorporated In-band provisioning for a closed subscriber group
WO2010075472A3 (en) * 2008-12-23 2011-10-13 Qualcomm Incorporated In-band provisioning for a closed subscriber group
CN102484836B (en) * 2008-12-23 2015-06-24 高通股份有限公司 In-band provisioning for a closed subscriber group
EP2675130A1 (en) * 2012-05-25 2013-12-18 Nokia Corporation Methods and apparatuses for guest access
US9497623B2 (en) 2012-05-25 2016-11-15 Nokia Technologies Oy Method and apparatus for guest access sharing
US10154028B2 (en) 2015-08-19 2018-12-11 Winifred Shen Systems and methods for authenticating users accessing a secure network
US9853968B2 (en) 2015-08-19 2017-12-26 Winifred Shen Systems and methods for authenticating users accessing a secure network with one-session-only, on-demand login credentials
US11109229B2 (en) * 2016-08-25 2021-08-31 EMC IP Holding Company LLC Security for network computing environment using centralized security system
US11601429B2 (en) 2018-04-13 2023-03-07 At&T Intellectual Property I, L.P. Network service control for access to wireless radio networks
US10965672B2 (en) 2018-04-13 2021-03-30 At&T Intellectual Property I, L.P. Network service control for access to wireless radio networks
CN113661699A (en) * 2019-03-18 2021-11-16 第一资本服务有限责任公司 System and method for pre-authentication of customer support calls
US12074910B2 (en) 2019-03-18 2024-08-27 Capital One Services, Llc System and method for second factor authentication to perform services
CN113661699B (en) * 2019-03-18 2024-05-24 第一资本服务有限责任公司 System and method for pre-authentication of customer support calls
CN112512047A (en) * 2020-11-19 2021-03-16 四川省肿瘤医院 Detection method for wireless network security authentication
CN112512047B (en) * 2020-11-19 2022-06-10 四川省肿瘤医院 Detection method for wireless network security authentication
FR3116978A1 (en) * 2020-11-27 2022-06-03 Orange Access control to a local communication network, and access gateway implementing such control
EP4037358A1 (en) * 2021-01-29 2022-08-03 Quadient Technologies France Guest access management in a mobile application
CN114553502B (en) * 2022-01-29 2024-03-29 联想开天科技有限公司 Network authentication method and electronic equipment
CN114553502A (en) * 2022-01-29 2022-05-27 联想开天科技有限公司 Network authentication method and electronic equipment

Also Published As

Publication number Publication date
CA2647684A1 (en) 2007-11-15

Similar Documents

Publication Publication Date Title
US7565547B2 (en) Trust inheritance in network authentication
WO2007128134A1 (en) Secure wireless guest access
KR101202671B1 (en) Remote access system and method for enabling a user to remotely access a terminal equipment from a subscriber terminal
AU2008213766B2 (en) Method and system for registering and verifying the identity of wireless networks and devices
CN1293720C (en) Method and apparatus for initializing secure communications among and for exclusively pairing wireless devices
US7913080B2 (en) Setting information distribution apparatus, method, program, and medium, authentication setting transfer apparatus, method, program, and medium, and setting information reception program
US8515389B2 (en) Method, apparatus, and program product for provisioning secure wireless sensors
JP3869392B2 (en) User authentication method in public wireless LAN service system and recording medium storing program for causing computer to execute the method
US7581096B2 (en) Method, apparatus, and program product for automatically provisioning secure network elements
JP5688087B2 (en) Method and apparatus for reliable authentication and logon
US7454619B2 (en) Method, apparatus, and program product for securely presenting situation information
JP2004274359A (en) Communication network system, communication terminal device, authenticating device, authentication server and electronic authentication method
KR100819942B1 (en) Method for access control in wire and wireless network
JP2017139026A (en) Method and apparatus for reliable authentication and logon
Pashalidis et al. Using GSM/UMTS for single sign-on
Jeong et al. Secure user authentication mechanism in digital home network environments
JP2015111440A (en) Method and apparatus for trusted authentication and log-on
Latze et al. Strong mutual authentication in a user-friendly way in eap-tls
KR100459935B1 (en) A Method For User authentication in Public Wireless Lan Service Network
Kumar ISSUES AND CONCERNS IN ENTITY AUTHENTICATION IN WIRELESS LOCAL AREA NETWORKS (WLANS).
Seigneur et al. Secure user-friendly Wi-Fi access point joining
CN115988496A (en) Access authentication method and device
Stakenburg Managing the Client-side Risks of IEEE 802.11 Networks
Yeun et al. Applications of delegation schemes for securing future reconfigurable terminals

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07719745

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2647684

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07719745

Country of ref document: EP

Kind code of ref document: A1