WO2008149126A2 - Methods, apparatuses and software for initiating a circuit switched call to a key server, for receiving incoming circuit switched calls and for attaching a computer peripheral device - Google Patents

Methods, apparatuses and software for initiating a circuit switched call to a key server, for receiving incoming circuit switched calls and for attaching a computer peripheral device Download PDF

Info

Publication number
WO2008149126A2
WO2008149126A2 PCT/GB2008/001984 GB2008001984W WO2008149126A2 WO 2008149126 A2 WO2008149126 A2 WO 2008149126A2 GB 2008001984 W GB2008001984 W GB 2008001984W WO 2008149126 A2 WO2008149126 A2 WO 2008149126A2
Authority
WO
WIPO (PCT)
Prior art keywords
computing device
peripheral device
data
remote
key
Prior art date
Application number
PCT/GB2008/001984
Other languages
French (fr)
Other versions
WO2008149126A3 (en
Inventor
Charlie Debney
Matthew Vizor
Chris Bryant
Original Assignee
Vodaphone Group Plc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vodaphone Group Plc filed Critical Vodaphone Group Plc
Publication of WO2008149126A2 publication Critical patent/WO2008149126A2/en
Publication of WO2008149126A3 publication Critical patent/WO2008149126A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier

Definitions

  • This invention relates to a computer peripheral device. More particularly, the present invention relates to a peripheral device for use with a portable computing device. According to another aspect, the present invention relates to establishing a secure remote user connection, particularly a secure remote user connection for use with a computer peripheral device.
  • Portable computer users are becoming accustomed to having information at their fingertips, and in particular, ready access to the internet, such as via wireless internet access hubs like the so-called "Wi-Fi hotspots”.
  • a new portable modem has been developed for portable computers and is being offered by wireless network providers to computer users.
  • the portable modem allows a user to access the Internet wherever they would normally gain access to the mobile phone network.
  • One currently available portable modem establishes 3G HSDPA downloads of the order of 1.8Mbps.
  • the modem can also make use of GSM/GPRS and UMTS connections when out of range of an HSDPA-enabled network.
  • the modem has a slot for a SIM card, and connects to a portable computer via a USB port.
  • the portable modem operates like land-line connected modems, with the exception that broadband network access is obtained wirelessly via the mobile telecommunications network.
  • Wireless modems are becoming a key component of a portable computer user's paraphernalia, as they provide users with enhanced communications capabilities.
  • a converse factor is that computer users are also becoming weighted down with a multitude of such add-on devices and their associated power supplies and cables.
  • a portable computer user has multiple computer peripheral devices to carry around, the chances of the user forgetting or losing any or all of these peripherals increase.
  • a further problem is that some portable computing devices only have one USB socket. Therefore, for these users, to use the modem in conjunction with another peripheral that connects to the computing device via a USB connection, a USB hub is required. This, in turn, is yet another required ancillary device. There is therefore a need for an improved computer peripheral device.
  • a further problem relates to establishing secure data communications between computing devices. Whilst keys can be used to encrypt the communications between the devices, the keys need to be exchanged in an environment of trust. For instance, if a first user is to set up a secure data connection with a second user, the first user needs to be sure of the identity of the second user, in order to ensure that the second user is trusted, and for instance, will not attempt to maliciously attack the first user's computer once the secure data connection is established. Such a secure data connection would be particularly useful for computer maintenance to be performed remotely. There is therefore also a need for an improved method of establishing a secure remote user connection, particularly in relation to the exchange of keys.
  • the present invention provides a computer peripheral device configured for attachment to a computing device, the peripheral device including modem means configured to provide a connection between the computer device and a wireless network; authorisation means associated with the modem means, the authorisation means configured to: receive an incoming circuit switched data call from a remote computing device; determine an identity of the remote computer device in the incoming data; and determine whether or not to communicate with the remote computing device based on the determined identity.
  • the authorisation means is configured to use the determined identity to determine whether or not to exchange keys for a subsequent secure communication with the remote computing device. It is also preferable that the subsequent secure communication is a secure communication at least partially over a 3G network. Additionally, it is preferable that the identity of the remote computer device is a Calling Line Identity (CLI).
  • CLI Calling Line Identity
  • the present invention provides a computer peripheral device configured for attachment to a computing device, the peripheral device including: a modem means configured to provide a connection to a wireless network; a secure data store including data encrypted with a key; and an authorisation means, associated with the mode means, the authorisation means configured to request the key from a remote key server by initiating a circuit switched data call to the key server, such that the circuit switched data call includes Calling Line Identification data usable by the key server to authenticate the key request.
  • the computer peripheral device is able to provide enhanced security to the data store.
  • the data store may be integral with the peripheral device, or be associated with a removable component, such as a SIM.
  • the security aspects of circuit switched data calls are utilised, such as the unspoofable CLI enabled through GSM technology.
  • the key server is therefore able to utilise these security features in providing the correct key to the verified peripheral device.
  • This aspect of the invention means that the store cannot be accessed merely by having the peripheral device at hand and even the PIN for the SIM (where the store is associated with a SIM). Unless the remote key server provides the encryption/decryption key, the user of the device will not be able to access the data store. This allows a user of the device greater security of their data, particularly where the device is lost or stolen. In such a situation, the user may contact the provider of the key server to disable their key, and SIM, as appropriate.
  • the present invention provides a computer peripheral device configured for attachment to a computing device, the peripheral device including: modem means configured to provide a connection to a cellular network; mouse means configured to provide the computing device with a navigational function; and a connection hub located within the computer peripheral device to which the modem means and the mouse means are connected, wherein the connection hub enables the mouse means and the modem means to communicate with the computing device via a single connection point.
  • Figure 1 illustrates a schematic diagram of a computer peripheral device according to a first embodiment of the invention, when connected to a computing device
  • Figure 2 illustrates a schematic diagram of a computer peripheral device according to a second embodiment of the invention
  • Figure 3 illustrates a schematic diagram of a computer peripheral device according to a third embodiment of the invention.
  • Figure 4 illustrates a schematic diagram relating to the functionality of the computer peripheral device
  • Figure 5 illustrates a timing diagram for connecting multiple USB functionalities within the device, to a computing device according to an embodiment of the invention
  • Figure 6 illustrates an example network configuration in relation to a third party computer seeking to establish a connection with the computer peripheral device according to a further embodiment of the invention
  • Figure 7 illustrates an example network configuration in relation to the computer peripheral device having an established high speed VPN connection with a third party, according to the further embodiment of the invention also shown in Figure 6;
  • Figure 8 illustrates the emulation functionality according to the further embodiment of the invention also shown in Figures 6 and 7.
  • a computer peripheral device 10 is illustrated in Figure 1, connected to computing device such as a laptop or portable computer 11.
  • the peripheral device 10 includes a controller 15, which is in communication with a motion detector (not shown), such as an infrared or laser detector.
  • a motion detector such as an infrared or laser detector.
  • the detector detects two dimensional motion relative to an adjacent surface.
  • the controller 15 forwards data relating to this motion to the computing device 11 , such that that the motion of the peripheral device 10 translates to the motion of a visual pointer on a screen of the computing device 11, allowing the peripheral device to be used to navigate the pointer about the screen.
  • the peripheral device consists of a small case, held under one of the user's hands.
  • the peripheral device 10 typically, but not essentially, has "wheels” or ball-bearings (not shown) or other glidable means, which allow the user to freely and evenly move the device about a surface.
  • the peripheral device 10 also includes a cellular modem 12, which is in communication with the computing device 11 via a buffer memory 13.
  • the computing device 11 typically sends data to the cellular modem 12 at a rate faster than the modem can transmit, and hence the buffer memory is used to store data until it is required.
  • the device controller 15 will instruct the buffer memory to forward data to the modem 12 at an appropriate rate, typically being the maximum data rate that the modem is capable of.
  • the cellular modem 12 is configured to receive as well as transmit data.
  • a further use of the buffer memory is in relation to storing data, such as email messages, that the user wishes to transmit from the cellular modem, where the data is stored independently of the computing device 11.
  • data such as email messages
  • the user may switch the computing device off, pending the data transmission to be completed.
  • the modem 12 has a radio connection, it will commence transmitting the data immediately, however, as this transmission process, and the storage of the data is independent of the computer operation, the user need not maintain the computing device powered up for the data transmission to be completed. This is in complete contrast to current cellular modems, where the user needs to wait for the computing device to send the data to external servers before shutting the computing device down.
  • the data being transmitted may relate to actual email communications, or to other synchronisation data, for instance, data to synchronise the user's calendar and email on a portable computing device with a remote server.
  • a particular advantage of this aspect of the invention is that the user is able to shut their computing device down sooner after the end of a working session, thereby increasing their mobility.
  • the peripheral device also includes battery 14, which is connected to both the buffer memory 13 and the cellular modem 12. As just described, the battery is able to supply the peripheral device with power when the computing device is shut down.
  • the peripheral device 10 When the computing device is switched on, however, the peripheral device 10 typically uses the power provided by the computing device's battery or mains connection. However, continuous, unconstrained use of the cellular modem 12 can significantly shorten the battery life of the computing device when it is not connected to a mains supply. To address this problem, the peripheral device is provided with two different power management modes.
  • the first power management mode is an automatic mode. In this mode the device controller 15 monitors the connectivity required by the computing device. That is, the controller 15 monitors when the computing device has a radio connection. When the modem functions are not required by the computing device, the device controller 15 will enter the device into a power- saving mode.
  • the second power management mode is a manual mode.
  • one or more buttons are typically provided on the housing of the peripheral device in order to manually control entering and exiting the power- saving mode.
  • This second power management mode may be an alternative to the first mode, or they may be used in conjunction.
  • controller 15 of the peripheral device is configured to sense when the USB power supply voltage from the computing device drops below the required USB specification level. When a drop occurs, the controller 15 instructs its internal battery 14 to provide power to its internal USB devices 22, such as the cellular modem 12, in order to restore the voltage level to that required.
  • the controller may also implement this functionality in the situation of the peripheral device sharing a USB connection with one or more other USB devices, such as via an external USB hub that is not externally powered.
  • the power available through the single socket on the computing device must be shared between the hub and each of the connected USB devices.
  • the controller 15 may be configured to reduce the power required by the peripheral device through the USB connector 21, by using its internal battery 14, thereby allowing the peripheral device 10 to better share the external hub with the other USB devices.
  • a further function that the controller may perform is in relation to recharging the internal battery 14 of die peripheral device.
  • the controller 15 senses that the power available from the computing device's USB connector 21 exceeds that required by all devices attached to the USB connector, then the controller 15 is configured to use the surplus power to recharge the battery 14.
  • the user may disable this functionality. This may be desirable when the computing device does not have a mains connection, and is operating off its own batteries. In these circumstances, the user may not want the peripheral device to be a drain on the computing device's own battery.
  • both of the mouse functionality 40 and the modem functionality 41 are provided through a single USB hub 42, thereby allowing the two functionalities to be provided simultaneously.
  • the device of the present invention is preferably configured so that the device controller 15 consecutively enables the connections of the mouse functionality 40 and the modem functionality 41, with a delay between each of the connections. This is illustrated in Figure 5. This serves to stagger the rate that the operating system is exposed to new USB devices, and accordingly assists in circumventing confusion of the operating system.
  • USB device controller 15 when power is first applied to the device, by the insertion of the USB connector 43 into a computing device, all of the device's internal USB functionalities are disabled. The device controller will then firstly set about enabling the USB hub 42. After time delay tl, the device controller 15 will then set about enabling USB device 1, which could be the mouse USB device, or the modem USB device. Then after time delay t2, the device controller 15 will enable the remaining USB device 2.
  • the delays tl ...tn are chosen so that the operating system of the computing device can acknowledge the appearance of each device in turn and fully configure itself before the next device is activated. Without these delays, when the computing device's operating system was configuring itself for USB device 1 , the appearance of USB device 2 would be likely to fatally disturb the configuration process.
  • the controller To enable each device, the controller first connects power from the USB cable to the device. It will then pause to allow the device to initialise. The controller then proceeds to measure the USB supply voltage, in order to determine if there is sufficient power available to operate the new device. If the voltage is not within the USB specification, the power is disconnected from the device and the enabling sequence terminates. If however the supply voltage is within a predetermined specification, the device's USB signal lines are connected. The controller will then again pause to allow the operating system to configure itself.
  • This staggered enablement functionality may be implemented in the peripheral device as hardware and/or software.
  • the functionality may be implemented as part of the computing device's driver software/hardware. That is, the driver, upon recognising multiple devices at the same USB port, would introduce each device to the operating system consecutively, after a suitable delay between each.
  • FIG. 3 Another feature of the device 10 is shown in relation to Figure 3, whereby the antenna or antennae 30 is incorporated into the cable 31 connecting the device 10 to a computing device.
  • the size of the peripheral device 10 may be minimised the size without unduly affecting the operation of the antenna(e).
  • computer peripherals such as data cards and modems are as small as possible.
  • Antennae that are shoehorned into small spaces become progressively more ineffective, as the size of the antenna is reduced.
  • the spacing between the antennae is critical.
  • the antenna(e) 30 can also be made larger, thereby improving any radio connection signal strength. Further, where multiple antennae are utilised, it becomes possible to choose spacings between each antenna, which better meet the requirements of diversity operation.
  • An additional benefit that results from moving the antenna out of the main body of the device 10, is that the screening effect from a user's hand operating the device is reduced.
  • the device 10 when the device 10 is being used as a mouse, it is standard for a user to place their hand entirely over the device when navigating with the mouse functionality.
  • the antennae incorporated into the body of the device 10 the user's hand would screen and/or detune the antenna for the cellular modem that also may be operating within the device at the same time.
  • the cable 31 may be retractable, so that when not in use, the cable can be stored inside the peripheral device. This feature has the advantage of further minimising the additional paraphernalia that a computer user needs to remember to carry around, thereby reducing the chances of the user forgetting or losing the cable.
  • the device includes indicators, such as indicator lights to show the status of the IP connection. These indicators may indicate only that a cellular network has been found and that a radio connection has been established. Alternatively, or in addition, a status indicator may be provided which indicates the signal strength of the radio connection. The inclusion of tiiis signal strength indicator further enhances the information available to a user and accordingly improves their experience when using the peripheral device.
  • the device controller 15 of the peripheral device is configurable so that it can show the status of the radio connection on the auxiliary display.
  • the peripheral device can show the status of the radio connection and/or the signal strength of the radio connection.
  • a further application of this embodiment of the invention is in relation to providing on the auxiliary display the progress of data being sent via the cellular modem 12. This feature may be implemented once the computing device has been shut down, and the modem is transmitting data previously stored in the buffer memory of the peripheral device 10, as well when the computing device is still on.
  • the peripheral device 10 includes a confidential data store.
  • This data store may be a component of the buffer memory 13 or separate.
  • the data in the store may be encrypted and preferably the keys for encryption and decryption are provided and managed by the cellular network or by another responsible body.
  • the peripheral device 10 may make a GSM circuit- switched call to a key server.
  • the key server may either be located within the cellular operator's network or within a key management device external to the operator's network but containing GSM modem functionality.
  • the key server will authenticate the request before providing the requested key.
  • the key server since the request was made via a GSM circuit-switched call, the key server is able to authenticate the key request on the basis of the MSISDN presented by the peripheral device at set-up of the call, and pre-existing knowledge of the ownership of the SIM card with the peripheral device. Authentication, encryption and identity are thus ensured on account of the GSM radio security.
  • Various types of data may be stored in the confidential data store including, cellular data such as phone number lists, network passwords, security keys, tokens and cellular data transmission functions such as Short Message Service (SMS) and Multimedia Message Service (MMS).
  • SMS Short Message Service
  • MMS Multimedia Message Service
  • the confidential data store may be associated with a removable element, such as a SIM.
  • a SIM such as a SIM.
  • the SIM will have a PIN in order to access the confidential store, and the SIM's encryption engine can be utilised in order to ensure that the SIM is a trusted store.
  • GSM-radio-based security may be used to authorise release of further security keys (for example for public key encryption) from within the SIM card itself.
  • the data may be kept secure, and also accessible by the cellular modem, in order to extract the necessary functionality to interact with the cellular network.
  • the peripheral device 65 is able to effect a secure remote user connection 60, which, for instance, may provide a remotely located IT support (ITS) person 61 with access to the computing device 62.
  • the peripheral device is Circuit Switched Data (CSD) compatible, such as with 2G GSM Circuit Switched Data (CSD).
  • CSD Circuit Switched Data
  • 3G CSD may also be utilised, although data calls in 3G are generally not enabled by the network operators.
  • the remotely located person 61 makes a CSD call to the peripheral device 65 from a computing device with includes an appropriate connection card, such as a Vodafone Mobile Connect Card (VMCC) 63.
  • VMCC Vodafone Mobile Connect Card
  • This call would be carried out within a 2G network 64, such as the GSM cellular network, where the usual GSM security applies.
  • the GSM number space for addressing communications endpoints ensures unique identity, and also country-level geographic marking is implicit within the number space.
  • the peripheral device 65 Upon the remotely located person 61 requesting a key the peripheral device 65 will authenticate the request before providing the requested key.
  • the peripheral device since the request was made via a GSM circuit-switched data call, the peripheral device is able to authenticate the key request on the basis of the MSISDN presented by the remotely located person at set-up of the call.
  • GSM is sufficiently secure to the extent that it is not possible to spoof the Call Line Identification (CLI), and so checking the MSISDN of an incoming GSM call is a suitable security check. This authentication may be performed by any appropriate control or authentication component of the peripheral device 65.
  • the peripheral device 65 contains, or has access to, a list of acceptable incoming MSISDNs, and will only accept a CSD call from one of these numbers. This prevents any unauthorised person attempting to "dial into” the peripheral device 65, and its associated computing device 62.
  • a secure Virtual Private Network (VPN) connection may be established over a 3G network, or indeed any other network, using the exchanged keys.
  • the key exchange mechanism could replace the secureID tags used for remote access over ADSL, 3G or any other IP network.
  • the remotely located person 61 is able to gain authorised access to the user's computing device 62 and for instance to diagnose any computing problems that the user may have.
  • VPN Virtual Private Network
  • the two computing devices may use CSD as described above to exchange security keys and then both may use wired connections to the Internet 72 for the VPN.
  • the peripheral device 65 is also provided with the necessary functionality to emulate a computing device keyboard and graphics display in addition to its usual mouse function. These functions are made available via the VPN to the remotely located person, so that they can operate the laptop remotely.
  • Figure 8 shows the main components that provide the emulation functionality.
  • the peripheral device 65 includes a keyboard/mouse emulator 81 and a graphics emulator 82.
  • the keyboard/mouse emulator provides the remote ITS computing device 61 with a replica of the keyboard/mouse of the user's computing device 62.
  • the graphics emulator provides the remote ITS computing device 61 with a replica of the graphics interface/display of the user's computing device 62.
  • emulators 81, 82 are managed by the device controller 15 which connects them via the cellular modem 12 to a program running on the ITS computing device 61.
  • This program controls the mouse/keyboard/display emulation via a protocol which runs over the VPN established between ITS computing device 61 and the peripheral device 65.
  • This program typically produces a window on the screen of the ITS computing device 61 which displays the replica graphical interface, being the graphical interface that is, or would have been shown on the display of the user's computing device 62.
  • the keyboard and mouse of the ITS computing device 61 can be connected to the emulated mouse and keyboard, in order to provide the keyboard of the ITS computing device 61 with the ability to control those peripherals of the user's computing device 62.
  • the IT support person can thus operate the remote computing device as if they were sitting in front of it.
  • remote management programs In terms of corporate networks, there are several remote management programs that will implement this functionality on computing device 61 when run inside a corporate network. However, such remote management programs generally cannot run over cellular networks because many corporate networks will not allow incoming requests at the modem end of computing device 61, and/or will not allow the type of network traffic required. In addition, these remote management programs require that the remote user's computing device 62 be running a "client" program which communicates with the ITS program, so if the laptop operating system is defective and no programs will run on the remote computing device 62, then access is impossible. To address these problems, the peripheral device controller 15 is configured to run the client program. Thence, since the peripheral device 65 also emulates the physical peripherals of computing device 62, the IT Support person can control the remote computing device 62 from an initial power-on start-up and can therefore repair or reload the operating system, if necessary.
  • this embodiment of the invention may be used by the user of the peripheral device 65 to dial out and gain computing access to another remote computing device 61.
  • the peripheral device preferably only has access to remote computers with an acceptable MSISDN.
  • This embodiment of the invention is not to be considered as limited to use in relation to the peripheral device as claimed.
  • the embodiment may readily be applied to cellular communication devices, particularly so-called "smart phones".
  • the embodiment may in general be applied to any device with a CSD capability that can be securely connected to another similarly equipped device so that one can control the other and/or can communicate securely.
  • this embodiment may be applied to any pair of computing devices to which GSM cellular network connectivity is available. This includes:
  • IP network infrastructure such as switches, routers and firewalls
  • the embodiments of the invention may be applied to any computing device with an operating system, such as Personal Digital Assistants (PDAs) and the like.
  • PDAs Personal Digital Assistants
  • the embodiments of the invention have been described in relation to two different USB functionalities within the peripheral device, however a greater number may be incorporated if required.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A computer peripheral device configured for attachment to a computing device, the peripheral device including: modem means configured to provide a connection to a wireless network; a secure data store including data encrypted with a key; and an authorisation means, associated with the modem means, the authorisation means configured to request the key from a remote key server by initiating a circuit switched data call to the key server, such that the circuit switched data call includes Calling Line Identification data usable by the key server to authenticate the key request. Alternatively or in addition, the authorisation means is configured to: receive an incoming circuit switched data call from a remote computing device; determine an identity of the remote computer device in the incoming data; and determine whether or not to communicate with the remote computing device based on the determined identity. The incoming data call is typically a GSM data call, and may be used to exchange keys for establishing a subsequent secure communication over a higher data rate network, such as a 3 G network. Ideally the computer peripheral device is associated with a mouse navigational functionality.

Description

COMPUTER PERIPHERAL DEVICE
This invention relates to a computer peripheral device. More particularly, the present invention relates to a peripheral device for use with a portable computing device. According to another aspect, the present invention relates to establishing a secure remote user connection, particularly a secure remote user connection for use with a computer peripheral device.
Background
Portable computer users are becoming accustomed to having information at their fingertips, and in particular, ready access to the internet, such as via wireless internet access hubs like the so-called "Wi-Fi hotspots".
A new portable modem has been developed for portable computers and is being offered by wireless network providers to computer users. The portable modem allows a user to access the Internet wherever they would normally gain access to the mobile phone network.
One currently available portable modem establishes 3G HSDPA downloads of the order of 1.8Mbps. The modem can also make use of GSM/GPRS and UMTS connections when out of range of an HSDPA-enabled network. The modem has a slot for a SIM card, and connects to a portable computer via a USB port. The portable modem operates like land-line connected modems, with the exception that broadband network access is obtained wirelessly via the mobile telecommunications network.
Wireless modems are becoming a key component of a portable computer user's paraphernalia, as they provide users with enhanced communications capabilities. However, a converse factor is that computer users are also becoming weighted down with a multitude of such add-on devices and their associated power supplies and cables. When a portable computer user has multiple computer peripheral devices to carry around, the chances of the user forgetting or losing any or all of these peripherals increase.
A further problem is that some portable computing devices only have one USB socket. Therefore, for these users, to use the modem in conjunction with another peripheral that connects to the computing device via a USB connection, a USB hub is required. This, in turn, is yet another required ancillary device. There is therefore a need for an improved computer peripheral device.
A further problem relates to establishing secure data communications between computing devices. Whilst keys can be used to encrypt the communications between the devices, the keys need to be exchanged in an environment of trust. For instance, if a first user is to set up a secure data connection with a second user, the first user needs to be sure of the identity of the second user, in order to ensure that the second user is trusted, and for instance, will not attempt to maliciously attack the first user's computer once the secure data connection is established. Such a secure data connection would be particularly useful for computer maintenance to be performed remotely. There is therefore also a need for an improved method of establishing a secure remote user connection, particularly in relation to the exchange of keys.
Summary of the Invention
According to a first aspect, the present invention provides a computer peripheral device configured for attachment to a computing device, the peripheral device including modem means configured to provide a connection between the computer device and a wireless network; authorisation means associated with the modem means, the authorisation means configured to: receive an incoming circuit switched data call from a remote computing device; determine an identity of the remote computer device in the incoming data; and determine whether or not to communicate with the remote computing device based on the determined identity.
Preferably the authorisation means is configured to use the determined identity to determine whether or not to exchange keys for a subsequent secure communication with the remote computing device. It is also preferable that the subsequent secure communication is a secure communication at least partially over a 3G network. Additionally, it is preferable that the identity of the remote computer device is a Calling Line Identity (CLI).
In this way it is possible to provide a simplified yet secure mechanism of communicating between two devices. For instance, it is possible to utilise the security aspects of circuit switched data calls, such as the unspoofable CLI enabled through GSM technology, and utilise those security features in exchanging data with a known or verified source before setting up a secure communication. The secure communication is ideally set up over a network with a higher data rate than GSM, such as a 3G network.
According to a second aspect, the present invention provides a computer peripheral device configured for attachment to a computing device, the peripheral device including: a modem means configured to provide a connection to a wireless network; a secure data store including data encrypted with a key; and an authorisation means, associated with the mode means, the authorisation means configured to request the key from a remote key server by initiating a circuit switched data call to the key server, such that the circuit switched data call includes Calling Line Identification data usable by the key server to authenticate the key request.
In this way the computer peripheral device is able to provide enhanced security to the data store. The data store may be integral with the peripheral device, or be associated with a removable component, such as a SIM. As with the previous aspect of the invention, the security aspects of circuit switched data calls are utilised, such as the unspoofable CLI enabled through GSM technology. The key server is therefore able to utilise these security features in providing the correct key to the verified peripheral device.
This aspect of the invention means that the store cannot be accessed merely by having the peripheral device at hand and even the PIN for the SIM (where the store is associated with a SIM). Unless the remote key server provides the encryption/decryption key, the user of the device will not be able to access the data store. This allows a user of the device greater security of their data, particularly where the device is lost or stolen. In such a situation, the user may contact the provider of the key server to disable their key, and SIM, as appropriate.
According to a still further aspect, the present invention provides a computer peripheral device configured for attachment to a computing device, the peripheral device including: modem means configured to provide a connection to a cellular network; mouse means configured to provide the computing device with a navigational function; and a connection hub located within the computer peripheral device to which the modem means and the mouse means are connected, wherein the connection hub enables the mouse means and the modem means to communicate with the computing device via a single connection point.
In this way, better management of computer peripheral components can be achieved. Further, these aspects of the invention provide a computer user with enhanced ease of use, convenience, and user efficiency.
Further aspects of the invention are provided in the additional independent claims as defined in the attached set of claims.
Brief Description of the Drawings
Figure 1 illustrates a schematic diagram of a computer peripheral device according to a first embodiment of the invention, when connected to a computing device; Figure 2 illustrates a schematic diagram of a computer peripheral device according to a second embodiment of the invention;
Figure 3 illustrates a schematic diagram of a computer peripheral device according to a third embodiment of the invention;
Figure 4 illustrates a schematic diagram relating to the functionality of the computer peripheral device;
Figure 5 illustrates a timing diagram for connecting multiple USB functionalities within the device, to a computing device according to an embodiment of the invention;
Figure 6 illustrates an example network configuration in relation to a third party computer seeking to establish a connection with the computer peripheral device according to a further embodiment of the invention;
Figure 7 illustrates an example network configuration in relation to the computer peripheral device having an established high speed VPN connection with a third party, according to the further embodiment of the invention also shown in Figure 6; and
Figure 8 illustrates the emulation functionality according to the further embodiment of the invention also shown in Figures 6 and 7.
Detailed Description of Embodiments of the Invention
According to a first embodiment of the invention, a computer peripheral device 10 is illustrated in Figure 1, connected to computing device such as a laptop or portable computer 11.
The peripheral device 10 includes a controller 15, which is in communication with a motion detector (not shown), such as an infrared or laser detector. The detector detects two dimensional motion relative to an adjacent surface. The controller 15 forwards data relating to this motion to the computing device 11 , such that that the motion of the peripheral device 10 translates to the motion of a visual pointer on a screen of the computing device 11, allowing the peripheral device to be used to navigate the pointer about the screen.
Physically, the peripheral device consists of a small case, held under one of the user's hands. The peripheral device 10 typically, but not essentially, has "wheels" or ball-bearings (not shown) or other glidable means, which allow the user to freely and evenly move the device about a surface. The peripheral device 10 also includes a cellular modem 12, which is in communication with the computing device 11 via a buffer memory 13. In use, the computing device 11 typically sends data to the cellular modem 12 at a rate faster than the modem can transmit, and hence the buffer memory is used to store data until it is required. In this regard, the device controller 15 will instruct the buffer memory to forward data to the modem 12 at an appropriate rate, typically being the maximum data rate that the modem is capable of. The cellular modem 12 is configured to receive as well as transmit data.
A further use of the buffer memory is in relation to storing data, such as email messages, that the user wishes to transmit from the cellular modem, where the data is stored independently of the computing device 11. Advantageously, in view of the buffer memory being associated with battery 14 and controller 15, once the user has loaded the data from the computing device into the buffer memory, the user may switch the computing device off, pending the data transmission to be completed. Where the modem 12 has a radio connection, it will commence transmitting the data immediately, however, as this transmission process, and the storage of the data is independent of the computer operation, the user need not maintain the computing device powered up for the data transmission to be completed. This is in complete contrast to current cellular modems, where the user needs to wait for the computing device to send the data to external servers before shutting the computing device down. It is to be appreciated that the data being transmitted may relate to actual email communications, or to other synchronisation data, for instance, data to synchronise the user's calendar and email on a portable computing device with a remote server.
A particular advantage of this aspect of the invention is that the user is able to shut their computing device down sooner after the end of a working session, thereby increasing their mobility.
As indicated above, the peripheral device also includes battery 14, which is connected to both the buffer memory 13 and the cellular modem 12. As just described, the battery is able to supply the peripheral device with power when the computing device is shut down.
When the computing device is switched on, however, the peripheral device 10 typically uses the power provided by the computing device's battery or mains connection. However, continuous, unconstrained use of the cellular modem 12 can significantly shorten the battery life of the computing device when it is not connected to a mains supply. To address this problem, the peripheral device is provided with two different power management modes.
The first power management mode is an automatic mode. In this mode the device controller 15 monitors the connectivity required by the computing device. That is, the controller 15 monitors when the computing device has a radio connection. When the modem functions are not required by the computing device, the device controller 15 will enter the device into a power- saving mode.
The second power management mode is a manual mode. In this regard, one or more buttons (not shown) are typically provided on the housing of the peripheral device in order to manually control entering and exiting the power- saving mode.
This second power management mode may be an alternative to the first mode, or they may be used in conjunction.
A further feature of the peripheral device is illustrated in relation to Figure 2, where the peripheral device is connected to a computing device via a USB connector 21. In this regard, some computing devices do not meet the USB specification for the power they should make available from a USB connector. Therefore, according to this embodiment of the invention, controller 15 of the peripheral device is configured to sense when the USB power supply voltage from the computing device drops below the required USB specification level. When a drop occurs, the controller 15 instructs its internal battery 14 to provide power to its internal USB devices 22, such as the cellular modem 12, in order to restore the voltage level to that required.
The controller may also implement this functionality in the situation of the peripheral device sharing a USB connection with one or more other USB devices, such as via an external USB hub that is not externally powered. In this situation, the power available through the single socket on the computing device must be shared between the hub and each of the connected USB devices. As this may result in insufficient power being provided to the peripheral device 10, the controller 15 may be configured to reduce the power required by the peripheral device through the USB connector 21, by using its internal battery 14, thereby allowing the peripheral device 10 to better share the external hub with the other USB devices.
Alternatively, or in addition, a further function that the controller may perform is in relation to recharging the internal battery 14 of die peripheral device. In this regard, whenever the controller 15 senses that the power available from the computing device's USB connector 21 exceeds that required by all devices attached to the USB connector, then the controller 15 is configured to use the surplus power to recharge the battery 14.
The user, however, may disable this functionality. This may be desirable when the computing device does not have a mains connection, and is operating off its own batteries. In these circumstances, the user may not want the peripheral device to be a drain on the computing device's own battery.
With reference to Figure 4, it is to be appreciated that both of the mouse functionality 40 and the modem functionality 41 are provided through a single USB hub 42, thereby allowing the two functionalities to be provided simultaneously.
A problem with providing multiple device options through one USB port, however, is that some operating systems malfunction, such as by "hanging". To address this problem, when several USB devices are connected simultaneously, the device of the present invention is preferably configured so that the device controller 15 consecutively enables the connections of the mouse functionality 40 and the modem functionality 41, with a delay between each of the connections. This is illustrated in Figure 5. This serves to stagger the rate that the operating system is exposed to new USB devices, and accordingly assists in circumventing confusion of the operating system.
To more specifically describe the solution, when power is first applied to the device, by the insertion of the USB connector 43 into a computing device, all of the device's internal USB functionalities are disabled. The device controller will then firstly set about enabling the USB hub 42. After time delay tl, the device controller 15 will then set about enabling USB device 1, which could be the mouse USB device, or the modem USB device. Then after time delay t2, the device controller 15 will enable the remaining USB device 2. The delays tl ...tn are chosen so that the operating system of the computing device can acknowledge the appearance of each device in turn and fully configure itself before the next device is activated. Without these delays, when the computing device's operating system was configuring itself for USB device 1 , the appearance of USB device 2 would be likely to fatally disturb the configuration process.
To enable each device, the controller first connects power from the USB cable to the device. It will then pause to allow the device to initialise. The controller then proceeds to measure the USB supply voltage, in order to determine if there is sufficient power available to operate the new device. If the voltage is not within the USB specification, the power is disconnected from the device and the enabling sequence terminates. If however the supply voltage is within a predetermined specification, the device's USB signal lines are connected. The controller will then again pause to allow the operating system to configure itself.
This staggered enablement functionality may be implemented in the peripheral device as hardware and/or software. In an alternative to this embodiment of the invention, rather than implementing the functionality in the peripheral device, the functionality may be implemented as part of the computing device's driver software/hardware. That is, the driver, upon recognising multiple devices at the same USB port, would introduce each device to the operating system consecutively, after a suitable delay between each.
Another feature of the device 10 is shown in relation to Figure 3, whereby the antenna or antennae 30 is incorporated into the cable 31 connecting the device 10 to a computing device. By integrating the antenna(e) into the cable, the size of the peripheral device 10 may be minimised the size without unduly affecting the operation of the antenna(e). In this regard, current trends dictate that computer peripherals, such as data cards and modems are as small as possible. Antennae that are shoehorned into small spaces become progressively more ineffective, as the size of the antenna is reduced. Furthermore, where multiple diversity antennae are used, the spacing between the antennae is critical. These problems are addressed in the device 10 of the present embodiment of the invention by removing the antenna(e) 30 from the main body of the device 10, and integrating it into the cable 31. By doing this, the antennae can also be made larger, thereby improving any radio connection signal strength. Further, where multiple antennae are utilised, it becomes possible to choose spacings between each antenna, which better meet the requirements of diversity operation.
An additional benefit that results from moving the antenna out of the main body of the device 10, is that the screening effect from a user's hand operating the device is reduced. In this regard, when the device 10 is being used as a mouse, it is standard for a user to place their hand entirely over the device when navigating with the mouse functionality. Were the antennae incorporated into the body of the device 10, the user's hand would screen and/or detune the antenna for the cellular modem that also may be operating within the device at the same time.
Further, the cable 31 may be retractable, so that when not in use, the cable can be stored inside the peripheral device. This feature has the advantage of further minimising the additional paraphernalia that a computer user needs to remember to carry around, thereby reducing the chances of the user forgetting or losing the cable.
According to an additional embodiment of the invention, the device includes indicators, such as indicator lights to show the status of the IP connection. These indicators may indicate only that a cellular network has been found and that a radio connection has been established. Alternatively, or in addition, a status indicator may be provided which indicates the signal strength of the radio connection. The inclusion of tiiis signal strength indicator further enhances the information available to a user and accordingly improves their experience when using the peripheral device.
According to a still further embodiment of the invention, where the peripheral device is used in conjunction with a computing device with an auxiliary display, such as a laptop with an auxiliary display on the outside of its lid, the device controller 15 of the peripheral device is configurable so that it can show the status of the radio connection on the auxiliary display. In this regard, the peripheral device can show the status of the radio connection and/or the signal strength of the radio connection.
A further application of this embodiment of the invention is in relation to providing on the auxiliary display the progress of data being sent via the cellular modem 12. This feature may be implemented once the computing device has been shut down, and the modem is transmitting data previously stored in the buffer memory of the peripheral device 10, as well when the computing device is still on.
In a further embodiment of the invention, the peripheral device 10 includes a confidential data store. This data store may be a component of the buffer memory 13 or separate.
The data in the store may be encrypted and preferably the keys for encryption and decryption are provided and managed by the cellular network or by another responsible body. For example, to obtain a key, the peripheral device 10 may make a GSM circuit- switched call to a key server. The key server may either be located within the cellular operator's network or within a key management device external to the operator's network but containing GSM modem functionality. The key server will authenticate the request before providing the requested key. In this regard, since the request was made via a GSM circuit-switched call, the key server is able to authenticate the key request on the basis of the MSISDN presented by the peripheral device at set-up of the call, and pre-existing knowledge of the ownership of the SIM card with the peripheral device. Authentication, encryption and identity are thus ensured on account of the GSM radio security.
Various types of data may be stored in the confidential data store including, cellular data such as phone number lists, network passwords, security keys, tokens and cellular data transmission functions such as Short Message Service (SMS) and Multimedia Message Service (MMS). These data transmission functions by their nature contain data that is confidential to the user. Where this data is stored on personal computers, it is notoriously difficult to keep the information secure, as the user generally has the ability to access all areas of the computer memory, and therefore may be able to find where the operating system has kept the data, including any temporary copies made.
The confidential data store may be associated with a removable element, such as a SIM. Where the data store is located on a SIM for the peripheral device 10, the SIM will have a PIN in order to access the confidential store, and the SIM's encryption engine can be utilised in order to ensure that the SIM is a trusted store.
Alternatively, or in addition, the above-described GSM-radio-based security may be used to authorise release of further security keys (for example for public key encryption) from within the SIM card itself.
In the present embodiment of the invention, by storing the confidential data on the peripheral device 10, the data may be kept secure, and also accessible by the cellular modem, in order to extract the necessary functionality to interact with the cellular network.
With reference to Figures 6, 7 and 8, in a still further embodiment of the invention, the peripheral device 65 is able to effect a secure remote user connection 60, which, for instance, may provide a remotely located IT support (ITS) person 61 with access to the computing device 62. To implement this embodiment of the invention, the peripheral device is Circuit Switched Data (CSD) compatible, such as with 2G GSM Circuit Switched Data (CSD). 3G CSD may also be utilised, although data calls in 3G are generally not enabled by the network operators.
To obtain a key for the secure remote user connection 60, the remotely located person 61 makes a CSD call to the peripheral device 65 from a computing device with includes an appropriate connection card, such as a Vodafone Mobile Connect Card (VMCC) 63. This call would be carried out within a 2G network 64, such as the GSM cellular network, where the usual GSM security applies.
In this regard, the GSM number space for addressing communications endpoints ensures unique identity, and also country-level geographic marking is implicit within the number space.
Upon the remotely located person 61 requesting a key the peripheral device 65 will authenticate the request before providing the requested key. In this regard, since the request was made via a GSM circuit-switched data call, the peripheral device is able to authenticate the key request on the basis of the MSISDN presented by the remotely located person at set-up of the call. GSM is sufficiently secure to the extent that it is not possible to spoof the Call Line Identification (CLI), and so checking the MSISDN of an incoming GSM call is a suitable security check. This authentication may be performed by any appropriate control or authentication component of the peripheral device 65.
The peripheral device 65 contains, or has access to, a list of acceptable incoming MSISDNs, and will only accept a CSD call from one of these numbers. This prevents any unauthorised person attempting to "dial into" the peripheral device 65, and its associated computing device 62. Once the remotely located person 61 has been verified, and keys exchanged via the GSM CSD call, a secure Virtual Private Network (VPN) connection may be established over a 3G network, or indeed any other network, using the exchanged keys. In this regard the key exchange mechanism could replace the secureID tags used for remote access over ADSL, 3G or any other IP network.
In this way, the remotely located person 61 is able to gain authorised access to the user's computing device 62 and for instance to diagnose any computing problems that the user may have.
By establishing a secure Virtual Private Network (VPN) using a cellular 3G data or other network connection to a mobile network operator 71 and thence to the Internet 72, as shown in Figures 7 and 8, it is possible to access higher speed data channels, which are more suited to remote support requirements.
Alternatively the two computing devices may use CSD as described above to exchange security keys and then both may use wired connections to the Internet 72 for the VPN.
In this embodiment of the invention, the peripheral device 65 is also provided with the necessary functionality to emulate a computing device keyboard and graphics display in addition to its usual mouse function. These functions are made available via the VPN to the remotely located person, so that they can operate the laptop remotely. Figure 8 shows the main components that provide the emulation functionality. The peripheral device 65 includes a keyboard/mouse emulator 81 and a graphics emulator 82. The keyboard/mouse emulator provides the remote ITS computing device 61 with a replica of the keyboard/mouse of the user's computing device 62. Similarly the graphics emulator provides the remote ITS computing device 61 with a replica of the graphics interface/display of the user's computing device 62.
These emulators 81, 82 are managed by the device controller 15 which connects them via the cellular modem 12 to a program running on the ITS computing device 61. This program controls the mouse/keyboard/display emulation via a protocol which runs over the VPN established between ITS computing device 61 and the peripheral device 65. This program typically produces a window on the screen of the ITS computing device 61 which displays the replica graphical interface, being the graphical interface that is, or would have been shown on the display of the user's computing device 62.
The keyboard and mouse of the ITS computing device 61 can be connected to the emulated mouse and keyboard, in order to provide the keyboard of the ITS computing device 61 with the ability to control those peripherals of the user's computing device 62. The IT support person can thus operate the remote computing device as if they were sitting in front of it.
In terms of corporate networks, there are several remote management programs that will implement this functionality on computing device 61 when run inside a corporate network. However, such remote management programs generally cannot run over cellular networks because many corporate networks will not allow incoming requests at the modem end of computing device 61, and/or will not allow the type of network traffic required. In addition, these remote management programs require that the remote user's computing device 62 be running a "client" program which communicates with the ITS program, so if the laptop operating system is defective and no programs will run on the remote computing device 62, then access is impossible. To address these problems, the peripheral device controller 15 is configured to run the client program. Thence, since the peripheral device 65 also emulates the physical peripherals of computing device 62, the IT Support person can control the remote computing device 62 from an initial power-on start-up and can therefore repair or reload the operating system, if necessary.
Similarly, this embodiment of the invention may be used by the user of the peripheral device 65 to dial out and gain computing access to another remote computing device 61. In this alternative, in view of security issues, the peripheral device preferably only has access to remote computers with an acceptable MSISDN.
This embodiment of the invention is not to be considered as limited to use in relation to the peripheral device as claimed. For instance, the embodiment may readily be applied to cellular communication devices, particularly so-called "smart phones". The embodiment may in general be applied to any device with a CSD capability that can be securely connected to another similarly equipped device so that one can control the other and/or can communicate securely. Further, this embodiment may be applied to any pair of computing devices to which GSM cellular network connectivity is available. This includes:
- IP network infrastructure such as switches, routers and firewalls;
- intelligent remote sensors; and
- equipment where remote and secure charging/billing control is required, for example Pay-per-View systems and networked games.
Whilst the embodiments of the invention have been described in relation to portable computing devices, the embodiments of the invention may readily be applied to desktop computers.
Further, the embodiments of the invention may be applied to any computing device with an operating system, such as Personal Digital Assistants (PDAs) and the like. The embodiments of the invention have been described in relation to two different USB functionalities within the peripheral device, however a greater number may be incorporated if required.
Various features have been described in this specification. Except where explicitly indicated, all of these features are to be considered as separate embodiments of the peripheral device. However, each of these embodiments may be readily combined in any order or combination.

Claims

1. A computer peripheral device configured for attachment to a computing device, the peripheral device including: modem means configured to provide a connection to a wireless network; a secure data store including data encrypted with a key; and an authorisation means, associated with the modem means, the authorisation means configured to request the key from a remote key server by initiating a circuit switched data call to the key server, such that the circuit switched data call includes Calling Line Identification data usable by the key server to authenticate the key request.
2. A computer peripheral device configured for attachment to a computing device, the peripheral device including: modem means configured to provide a connection between the computer device and a wireless network; authorisation means associated with the modem means, the authorisation means configured to: receive an incoming circuit switched data call from a remote computing device; determine an identity of the remote computer device in the incoming data; and determine whether or not to communicate with the remote computing device based on the determined identity.
3. A computer peripheral device configured for attachment to a computing device, the peripheral device including: modem means configured to provide a connection to a wireless network; mouse means configured to provide the computing device with a navigational function; and a first control means being configured to: determine when the peripheral device is connected to a computing device; register either one of the modem means or the mouse means with the computing device; and then register the other one of the modem means or the mouse means with the computing device after a time delay.
4. The peripheral device of claim 1 wherein the authorisation means is configured to initiate a GSM circuit switched data call.
5. The peripheral device of claim 1 or 4 wherein the authorisation means, once the key is obtained from the remote server, is further configured to use the key to decrypt data in the secure data store.
6. The peripheral device of claim 2 wherein the identity of the remote computing device that the authorisation means is configured to determined is a Calling Line Identification.
7. The peripheral device of claim 2 or 6 wherein the authorisation means is configured to determine whether or not to communicate, by comparing the Calling Line Identification of the remote computing device with a list of acceptable Calling Line Identifications.
8. The peripheral device of claim 2, 6 or 7 wherein the authorisation means, when it is determined to communicate with the remote computing device, is further configured to exchange security keys with the remote computing device, in order to establish a subsequent secure communication.
9. The peripheral device of claim 8 wherein the authorisation means is configured to establish the subsequent secure communication at least partially over a 3G wireless network.
10. The peripheral device of any one of claims 2 or 6-9 further including an emulation means configured to emulate one or more functionalities of the first computing device, in order to allow the remote computing device to remotely operate the first computing device with which the peripheral device is associated, when a secure communication has been established with the remote computing device.
11. The peripheral device of claim 10 wherein the emulation means is configured to emulate one or more of the following functionalities: a mouse functionality; a graphical display functionality; a keyboard functionality.
12. The peripheral device of any one of claims 2 or 6-11 further comprising a first control means configured to run a client program, the client program configured to communicate with a corresponding program running on the remote computing device, when a secure communication has been established with the remote computing device.
13. The peripheral device of claim 3 further including a first control means configured to: measure the supply voltage received from the peripheral device, once connected; and only register the modem means and/or the mouse means with the computing device when the supply voltage is not less than a required operating voltage level.
14. The peripheral device of any one preceding claim further including a cable means configured to connect the peripheral device to the computing device, the cable means including at least one antenna in communicable relation with the modem means.
15. The peripheral device of any one preceding claim, further including a memory means configured to buffer data for transmission to the modem means at an appropriate rate.
16. The peripheral device of any one preceding claim, further including a battery means configured to provide power to the modem means, so that the modem means can continue operating even once the computing means has been switched off.
17. The peripheral device of any one preceding claim, wherein the modem means is further configured to transmit and/or receive data independently of the status of the computing device.
18. The peripheral device of claim 17 wherein the modem means is further configured to transmit and/or receive data even once the computing device has been switched off.
19. The peripheral device of any one preceding claim further including a first control means, when connected to the computing device, being configured to: monitor a power supply voltage received from the computing device; determine when the received voltage falls below a predetermined voltage level required for the modem means and/or a mouse means; and when the received voltage falls below the required voltage level, use an internal battery to provide a voltage in order to restore the required voltage level to the modem means and/or the mouse means.
20. A method of a computer peripheral device obtaining a key from a key server, for encrypting/decrypting data of a secure data store the method including: requesting the key from the remote key server by initiating a circuit switched data call to the key server, such that the circuit switched data call includes Calling Line Identification usable by the key server to authenticate the key request.
21. A method of a first computing device exchanging one or more encryption/decryption keys with a second computing device, the method including: the first computing device initiating a circuit switched data call to the second computing device; the second computing device verifying the identity of the first computing device using Identification data transmitted in the circuit switched data call; and exchanging keys upon the second computing device verifying the identity of the first computing device using the identification data.
22. A method of operating a computer peripheral device the method including: receiving an incoming circuit switched data call from a remote computing device; determining identification data of the remote computer device from the incoming data; and determining whether or not to communicate with the remote computing device based on the determined Identification data.
23. The method of any one of claims 20 to 22 wherein the circuit switched data call is effected across a GSM network.
24. The method of claim 20 further including receiving the key and using the key to decrypt data in the secure data store.
25. The method of claim 22 wherein it is determined whether or not to communicate with the remote computing device by comparing the determined identification data with a list of acceptable identification data.
26. The method of claim 22 or 25 wherein once it is determined to communicate with the remote computing device: exchanging security keys with the remote computing device; and using the exchanged keys to establish a secure communication with the remote computing device.
27. The peripheral device of claim 26 wherein the secure communication is at least partially established over a 3G wireless network.
28. The method of any one of claims 21 to 27 wherein the identification data determined is a Calling Line Identification (CLI).
29. The method of any one of claims 21 to 28 wherein the identification data is an MSISDN.
30. A method of establishing a secure data communication between a first computing device and a second computing device, the method including: exchanging one or more encryption/decryption keys according to the method of claim 21 ; establishing the secure communication at least partially across a 3 G telecommunications network using the encryption/decryption keys.
31. A method of operating a computer peripheral device including a first functionality component and a second functionality component: determining that the computer peripheral device has been connected to a computing device; registering either the first functionality component with the computing device; and then registering the second functionality component with the computing device after a time delay.
32. The method of operating a computer peripheral device of claim 31 wherein the first and second functionality components comprise a mouse functionality and a modem functionality.
33. A method of operating a driver of a computing device, the driver configured to: receive a connection communication from a peripheral device, when the peripheral device is connected to the computing device; determine that the connection communication relates to a plurality of component devices of the peripheral device; register a first of the plurality of component devices with the computing device; register a second of the plurality of component devices with the computing device after a time delay.
34. A driver application for use on a computing device, the driver application configured to: receive a connection communication from a peripheral device, when the peripheral device is connected to the computing device; determine that the connection communication relates to a plurality of component devices of the peripheral device; register a first of the plurality of component devices with the computing device; and register a second of the plurality of component devices with the computing device after a time delay.
35. A remote management gateway configuration configured for use with a first device in a communications network, the gateway configuration comprising: a receiver configured to receive an incoming circuit switched data call from a remote computing device; control means configured to extract an MSISDN from the incoming data and determine whether or not to communicate with the remote computing device initiating the incoming data call.
36. The management gateway of claim 35 wherein the control means is further configured to determine whether or not to communicate by comparing the MSISDN of the remote computing device with a list of acceptable MSISDNs.
37. The gateway configuration of claim 35 or 36, wherein the control means is further configured to exchange security keys with the remote computing device, when it is determined to accept the communication, in order to establish a separate secure communication at least partially over a 3G wireless network.
38. The gateway configuration of any one of claims 35 to 37 further including an emulation means configured to emulate one or more functionalities of the first device, in order to allow the remote computing device to remotely operate the first device, when a secure communication has been established with the remote computing device.
39. The gateway configuration of claim 38 wherein the emulation means is further configured to emulate one or more of the following functionalities: a mouse functionality; a graphical display functionality; a keyboard functionality.
40 A computer peripheral device substantially as hereinbefore described with reference to and/or substantially as illustrated in the accompanying drawings.
41. A method of operating a computer peripheral device, substantially as hereinbefore described with reference to and/or substantially as illustrated in the accompanying drawings.
42. A remote management gateway substantially as hereinbefore described with reference to and/or substantially as illustrated in the accompanying drawings.
PCT/GB2008/001984 2007-06-07 2008-06-09 Methods, apparatuses and software for initiating a circuit switched call to a key server, for receiving incoming circuit switched calls and for attaching a computer peripheral device WO2008149126A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0710860.8 2007-06-07
GB0710860.8A GB2450080B (en) 2007-06-07 2007-06-07 Computer peripheral device

Publications (2)

Publication Number Publication Date
WO2008149126A2 true WO2008149126A2 (en) 2008-12-11
WO2008149126A3 WO2008149126A3 (en) 2009-05-14

Family

ID=38318833

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2008/001984 WO2008149126A2 (en) 2007-06-07 2008-06-09 Methods, apparatuses and software for initiating a circuit switched call to a key server, for receiving incoming circuit switched calls and for attaching a computer peripheral device

Country Status (2)

Country Link
GB (1) GB2450080B (en)
WO (1) WO2008149126A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2323334A1 (en) 2009-11-13 2011-05-18 Vodafone Holding GmbH Approval of a connection through a firewall of a network access device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010013079A1 (en) * 1998-03-20 2001-08-09 Luke David D. Universal serial bus peripheral bridge with sequencer
US20020087875A1 (en) * 2000-12-22 2002-07-04 Adams Thomas Lee Method and system for calling line authentication
US20020159419A1 (en) * 2001-04-27 2002-10-31 Martin Morris System and method for connecting bluetooth-enabled devices to a personal computer
US20040246967A1 (en) * 2003-02-06 2004-12-09 Udo Killermann Conveying data between computing devices
US20060045268A1 (en) * 2000-12-22 2006-03-02 Sbc Technology Resources, Inc. Method and system for calling line authenticated key distribution

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5706031A (en) * 1994-11-14 1998-01-06 Lucent Technologies Inc. Computing and telecommunications interface system
KR0143812B1 (en) * 1995-08-31 1998-08-01 김광호 Cordless telephone for mouse
US6647254B1 (en) * 1999-07-19 2003-11-11 Gemtek Technology Co., Ltd. Computer peripheral device with the functions of a radio, a microphone, and a mouse
DE20301184U1 (en) * 2003-01-29 2003-04-17 Haas Eric Mobile phone computer mouse
US20060007151A1 (en) * 2004-06-08 2006-01-12 Pranil Ram Computer Apparatus with added functionality
US7643850B2 (en) * 2005-10-11 2010-01-05 Sony Ericsson Mobile Communications Ab Cellular communication terminals and methods that sense terminal movement for cursor control

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010013079A1 (en) * 1998-03-20 2001-08-09 Luke David D. Universal serial bus peripheral bridge with sequencer
US20020087875A1 (en) * 2000-12-22 2002-07-04 Adams Thomas Lee Method and system for calling line authentication
US20060045268A1 (en) * 2000-12-22 2006-03-02 Sbc Technology Resources, Inc. Method and system for calling line authenticated key distribution
US20020159419A1 (en) * 2001-04-27 2002-10-31 Martin Morris System and method for connecting bluetooth-enabled devices to a personal computer
US20040246967A1 (en) * 2003-02-06 2004-12-09 Udo Killermann Conveying data between computing devices

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SIMPSON W ET AL: "The Point-to-Point Protocol (PPP); rfc1661.txt" IETF STANDARD, INTERNET ENGINEERING TASK FORCE, IETF, CH, 1 July 1994 (1994-07-01), pages 1-62, XP015007448 ISSN: 0000-0003 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2323334A1 (en) 2009-11-13 2011-05-18 Vodafone Holding GmbH Approval of a connection through a firewall of a network access device
DE102009044525A1 (en) 2009-11-13 2011-05-19 Vodafone Holding Gmbh Releasing a connection through a firewall of a network access device

Also Published As

Publication number Publication date
GB2450080B (en) 2012-04-18
GB0710860D0 (en) 2007-07-18
GB2450080A (en) 2008-12-17
WO2008149126A3 (en) 2009-05-14

Similar Documents

Publication Publication Date Title
US10645581B2 (en) Method and apparatus for remote portable wireless device authentication
US20220330029A1 (en) Method for mutual recognition or mutual trust between bluetooth devices
CN106663162B (en) Securely pairing computing devices
US8200281B2 (en) Secure removable card and a mobile wireless communication device
EP2041690B1 (en) Method, system and smart card reader for management of access to a smart card
JP5015112B2 (en) Removable card and mobile radio communication device
US20080081611A1 (en) Method and apparatus for sharing cellular account subscription among multiple devices
CN113132091B (en) Method for sharing equipment and electronic equipment
WO2019206201A1 (en) Method for transmitting configuration file, related device and storage medium
US20080004039A1 (en) Portable computer system having wireless communication functionality and global geographic positioning functionality
US7979717B2 (en) Secure removable card having a plurality of integrated circuit dies
CN108881103B (en) Network access method and device
CN105704712B (en) Network resource sharing method, mobile terminal and server
CN109219043B (en) Network access method and equipment
CN105325021B (en) Method and apparatus for remote portable wireless device authentication
US20100312926A1 (en) Switch for a two way connection between a removable card, a mobile wireless communication device, or a computer
US20140122879A1 (en) Secure computing system
US20140047231A1 (en) Secure Sub-Joined Computing Device
WO2008149126A2 (en) Methods, apparatuses and software for initiating a circuit switched call to a key server, for receiving incoming circuit switched calls and for attaching a computer peripheral device
KR100538924B1 (en) Method for providing Web Service, Remote Storage Service and Remote Control Service based on Peer-to-Peer between a Plurality of Client Terminals and Personal Computers Operated as Server
WO2020193965A1 (en) A computing device, method and system for controlling the accessibility of data
CN115174043B (en) Method for sharing equipment and electronic equipment
Alshehri et al. The Potential of Utilizing Mobile Cloud Computing in Mobile Devices
CN115206003A (en) Bluetooth-based unlocking method, terminal device, intelligent lock and storage medium

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08762320

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 08762320

Country of ref document: EP

Kind code of ref document: A2