WO2014009391A1 - Procédé et système pour transférer des mots de passe de point d'accès - Google Patents

Procédé et système pour transférer des mots de passe de point d'accès Download PDF

Info

Publication number
WO2014009391A1
WO2014009391A1 PCT/EP2013/064530 EP2013064530W WO2014009391A1 WO 2014009391 A1 WO2014009391 A1 WO 2014009391A1 EP 2013064530 W EP2013064530 W EP 2013064530W WO 2014009391 A1 WO2014009391 A1 WO 2014009391A1
Authority
WO
WIPO (PCT)
Prior art keywords
access point
wireless device
wireless
user
password
Prior art date
Application number
PCT/EP2013/064530
Other languages
English (en)
Inventor
Luis CUCALA GARCÍA
Original Assignee
Telefonica, S.A.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonica, S.A. filed Critical Telefonica, S.A.
Publication of WO2014009391A1 publication Critical patent/WO2014009391A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present invention generally relates to the field of wireless communications, in particular, in a first aspect, to a method for transferring access point passwords between devices.
  • a second aspect of the invention relates to a system arranged to implement the method of the first aspect.
  • the current procedure to provide local short to medium range connectivity to wireless devices is the installation of a wireless base station, which depending on the wireless technology is in some cases called Access Point, to which the wireless devices like mobile terminals or computers connect by means of a radio interface.
  • a wireless base station which depending on the wireless technology is in some cases called Access Point, to which the wireless devices like mobile terminals or computers connect by means of a radio interface.
  • a common example of this scenario is a Wi-Fi Access Point that radiates a Wi-Fi radio signal.
  • connection to the wireless base station can be protected by means of some kind of access control and encryption, and the wireless device that requires to connect to the wireless base station needs to provide a string of characters or password in order that the wireless access point grants it the connection right, a password that must be manually entered by the user of the wireless device, or must be previously stored in it.
  • the length of this password depends on the wireless base station access security implementation, but typically consists of a string of 13 or more alphanumerical characters, which must not resemble any known word in order to improve the security of the encryption procedure.
  • Some examples of common encryption procedures are the "Wired Equivalent Privacy” algorithm (WEP, IEEE 802.1 1 standard) and the “Wi-Fi Protected Access” algorithm (WPA, IEEE 802.1 1 i standard).
  • PLMN Public Land Mobile Networks
  • UMTS Universal Mobile Terrestrial Service
  • This procedure is usually called Wi-Fi Offloading, because it enables to offload the traffic load of the PLMN by means of a Wi-Fi Access Point, and is widely used in home or small office scenarios, where the residents of the home or owner of the office usually connect their UE's to the Wi-Fi Access Point to get access to the Internet, e-mail or similar services, instead of receiving those services through the PLMN.
  • Wi-Fi Offloading in home or small office scenarios works well when it is the owner of the access point who connects to the wireless access point, because even though the procedure of introducing a password consisting in a long string of characters is cumbersome, it must be done only once because the wireless connection manager in the UE stores the password and makes the procedure automatic for the next occasions.
  • Another problem with the current procedure for local wireless access point connectivity is the long passwords that are required, which are usually impossible to memorize, and it also happens that in many occasions the access point owner loses its record. If the access point owner loses the password, it will not be possible to connect any new wireless device to the wireless access point.
  • the problem of password availability is solved with authentication protocols like the Extensible Authentication Protocol Method for Subscriber Identity Module, or EAP-SIM, where authentication and encryption is done with the aid of the Subscriber Identity Module (SIM) of the UE, but this procedure is only available for wireless devices that include a SIM card, and even in UE's that include a SIM card it is not commonly used.
  • the invention provides an alternative to the state of the art by providing a procedure for the transfer of the wireless access point identification and password between different devices.
  • the invention provides, in a first aspect, a method that, according to conventional techniques, comprises:
  • the method further comprises:
  • the automatically transmission in step b) is performed by means of the PLMN and using its encryption capabilities, or is performed by using connection capabilities of the wireless access point of the first user and a fixed access line.
  • the identification of the first user comprises an International Mobile Subscriber Identity (IMSI) or an Integrated Services Digital Network Number (MSISDN) which is automatically retrieved from a SIM or USI M card of the first wireless device of the first user.
  • IMSI International Mobile Subscriber Identity
  • MSISDN Integrated Services Digital Network Number
  • a reliable third party such as a telecommunication operator provides information related to the identity of the user and the fixed access line where the access point is connected to. Then, the identification of the wireless access point of the first user is provided to the node located in the PLMN, where the node records it and further identifies the fixed access line identity from which the connection has been performed.
  • the node which in an embodiment is any of a computer device or any other device with storage and processing capabilities, then checks if the first wireless device corresponds to the same user of the fixed access line and it further performs a validation of the connectivity permission of the at least one additional second wireless device to the wireless access point of the first user before performing step c).
  • said step b) further transmits to the node located in the PLMN at least the information about the executable application and/or directly the executable application.
  • the method automatically connects, in another embodiment, the at least one additional second wireless device to the wireless access point of the first user when the at least one additional second wireless device is within the coverage area of the wireless access point of the first user.
  • the method of the present invention keeps encrypted in the at least one additional second wireless device the password of the wireless access point of the first user.
  • a second aspect of the present invention provides a system for transferring access point passwords, which according to conventional techniques comprises:
  • a first wireless device of a first user with a memory for storing a password protecting a wireless access point of the first user;
  • said wireless access point adapted to authenticate the first wireless device by means of the password each time a connection is performed using the wireless access point;
  • the system further comprises:
  • PLMN Public Land Mobile Network
  • the node is adapted to provide, following instructions from the first wireless device, an identification and the password of the wireless access point to any of said plurality of second wireless device, if any of the plurality of second wireless device is within a list of wanted additional users having connectivity permission to the wireless access point.
  • the node in the present invention is any of a computer device or any other device with storage and/or processing capabilities.
  • any of the first or second wireless devices are any of a mobile phone, a portable computer, a tablet, a PDA or any other similar computing device.
  • Figure 1 is a representation of the Automatic identification of the Own Access Node process, according to an embodiment.
  • Figure 2 is a representation of the general description of the full procedure described the present invention, according to an embodiment.
  • Embodiments of the present invention provide a method and a system for the transfer of local wireless access point identification and password between a device (inviting device) that stores the password to an inviting device to which wireless access point connectivity will be granted.
  • Password transfer is done through the PLMN, and the procedure enables an automatic retrieval of the password in the inviting wireless device without the user intervention, the secure transfer of the password and the wireless access point identification through the PLMN, the provision of the password and the wireless access point identification to the invited wireless device, and the automatic connection of the invited wireless device to the wireless access point it is invited to connect to.
  • the owner of the home or small office wireless access point installs a software application, the Inviting Application, in a wireless device, the Inviting Device.
  • This software application can also be pre-installed in the wireless device and thus the owner does not have to install it.
  • This software application will be the same for any wireless device, i.e. it will not be necessary to have any adaptation depending on the wireless access point it will have to connect to.
  • This software application does not have to be downloaded from the wireless access point the wireless device connects to.
  • An example of this wireless device is a mobile terminal or User Equipment (UE) that supports both connectivity to the PLMN and local connectivity to a wireless access point, for example but not precluding any other implementation, an IEEE 802.1 1 Wi-Fi access point.
  • Another example of a wireless device is a portable computer, a tablet or any other similar device.
  • a wireless device that includes PLMN and local wireless access point connectivity always includes with its Operating System (OS) a Wireless Connection Manager.
  • OS Operating System
  • the Wireless Connection Manager stores a list of previously connected wireless access points, identified by means of their ID (for example, in the case of Wi- Fi, but not precluding any other kind of access points, the Service Set IDentifier or SSID), and the password of every wireless access point.
  • ID for example, in the case of Wi- Fi, but not precluding any other kind of access points, the Service Set IDentifier or SSID
  • the owner of the access point can then use the Inviting Application installed in the inviting device to provide a list of mobile telephone numbers of people that he or she wants to invite to have connectivity to the access point.
  • the owner of the access point can be safely identified by means of procedures later described in this invention.
  • the Inviting Application When the Inviting Application is run, it automatically communicates with the wireless device Wireless Connection Manager in the Operating System in order to retrieve the wireless access point password, without the user intervention. This process of automatically retrieving the stored passwords is already implemented in other software applications and is not a preferred embodiment of this invention.
  • the Wireless Connection Manager stores many access points I Ds along with their passwords, and therefore it is necessary for the Inviting Application to determine which is the ID of the user's access point, the Own Access Point.
  • the Inviting Application presents a list of access points IDs to the user, who selects which is his or her access point. This option is feasible but presents a drawback: the user intentionally or unintentionally can select an access point ID than does not correspond to his or her access point, thus inviting connection to an access point that does not belong to him or her.
  • the Inviting Application automatically determines which is the Own Access Point, without any user intervention, thus precluding the possibility of sharing of the passwords of other access points.
  • the Inviting Application does not have any means of determining which is the user's Own Access Point, as all the access points ID's stored in the Operating Systems Wireless Connection Manager are undistinguishable from each other.
  • the Inviting Application is helped by a third party that has the knowledge of who is the owner of the wireless Inviting Device and the owner of the wireless access point, a third party who in many occasions will be a telecommunications operator.
  • the third party will install a node, the Invite Service Node, which can be a computer or any other device with memory and processing capabilities, in its network.
  • the Invite Service Node stores the following data, or can connect to another telecommunication operator's nodes where the data is recorded: i. Identifiers of fixed access lines. For example, but not precluding any other identifier, the fixed phone numbers of its customers. This information can include also if the phone number has associated with it some fixed broadband service.
  • iii Fixed access line owner identification (for example, but not precluding any other possibility, the name of the owner, passport number, fiscal identification, etc.)
  • iii. Identifiers the owners of the mobile terminals or UE's. For example, but not precluding any other identifier, the mobile phone numbers of its customers, the International Mobile Subscriber Identity (IMSI) of every customer, or the Mobile Subscriber Integrated Services Digital Network Number (MSISDN) of the customers.
  • the preferred identifiers are those that cannot be deduced or discovered by the user, for example the IMSI which is only known by the telecom operator, in order to avoid any fraudulent use of the Inviting Application.
  • Customer mobile terminal information can include also if the customer has associated with it some previous subscription to an access point invite service, as an additional security measure to prevent unwanted connection invitations to his or her access point.
  • the data described in points ii) and iii) enables to determine that the owner of the access line and the owner of the mobile terminal are the same person, and thus he or she is entitled to perform inviting operations.
  • the Automatic identification of the Own Access Point process is as follows. In a preferred embodiment of this invention, when the user runs the Inviting Application for the first time he or she is requested to be connected to the access point that is expected to be his or her Own Access Point, in order to check if it is really the Own Access Point. This process can be repeated lately in any other occasion in order to update the Own Access Point Information. The Inviting Application then connects to the access point which is supposed to be the Own Access Point, retrieving the connection password from the Operating System Wireless Connection Manager.
  • the Inviting Application will manage the wireless connection with Access Point, using the Access Point password provided by the user, or retrieved from the Wireless Connection Manager in the Operating System, in the latter case without the user intervention.
  • the password used by the Inviting Application to connect to the Access Point will be the password that Inviting Application will eventually transmit to the Invite Service Node when inviting, and in this way it is possible to ensure that the user will not use the Inviting Application to send erroneous or fraudulent passwords to the Invite Service Node.
  • the Inviting Application connects with the Invite Service Node, through the access node and the fixed access interface where the access node is connected to.
  • the Inviting Application provides to the Invite Service Node the identifier of the owner of the mobile terminal where the Inviting Application is installed and run, for example the I MSI. This information is automatically retrieved from the SIM or USIM card installed in the UE, without any user information, avoiding error and a fraudulent introduction of this identifier.
  • the Invite Service Node records the identifier of the owner of the mobile terminal which is requesting own access point identification by means of the Inviting Application, and subsequently proceeds to identify the fixed access line identity from which the connection has come from, for example the fixed phone number.
  • the identification of the access line identity is a procedure common in the telecommunications industry and implemented by different ways in every operator, and thus is out of the scope of this invention.
  • the Invite Service Node checks if the associated customer to the fixed access line is the same customer than the one associated with the mobile terminal.
  • the Invite Service Node can also check if the customer has also previously subscribed to an access point invite service.
  • the Invite Service Node determines that the same customer is associated with the fixed access line the connection has come from, and with the mobile terminal where the Inviting Application has been run, the Invite Service Node sends an indication through the fixed access line and the access point to the Inviting Application that the access point it has connected to is the Own Access Point. Then, the Inviting Application records that access point as the Own Access Point, the only one which could be shared with other parties by means of the Inviting Application.
  • Figure 1 schematically illustrates the process.
  • the Inviting Application with the help of the Invite Service Node, it can also provide to the Invite Service Node the Own Access Node ID and the Own Access Node password.
  • the Own Access Node password will be the one used by the Inviting Application to connect to the Own Access Node.
  • the Invite Service Node can store this information and associate it with the fixed access line identification, the identification of the owner of the mobile terminal and the customer data.
  • This invention takes also into account the case when the owner of the Own Access Point changes the connection password or the Own Access Point identification of the access point itself. This happens for example when the owner replaces the access point by a new one, or when the owner connects to the access node by means of a computer and running a specific software application of the access node that changes locally the access point identification and / or its password. In this case, it is a process that has been done intentionally by the user, who installs a new access point discarding the old one, or who intentionally changes the identification and or the password of the access point. As it has been an intentional action, when the user then tries to connect to the access point, he or she will use the mobile terminal Wireless Connection Manager to select the appropriate access point and provide its connection password.
  • the Inviting Application cannot know if the new access point corresponds to a new Own Access Point that must be updated, or it is simply a third party access point the mobile terminal is connecting to. In order to solve this ambiguity, the Inviting Application must be always running in the Inviting Device as a background process, regardless it is being used by the Inviting Device user or not. If the always-running Inviting Application detects that the user has provided a connection password to a new access point by means of the Wireless Connection Manager, it will start the Automatic identification of the Own Access Node process that has already been described. It will start by asking the user if the new access point and password are those of his or her Own Access Node, and in the case of a positive answer from the user, it will proceed with all the steps of the Automatic identification of the Own Access Node process.
  • the owner of the Own Access Point can use the Inviting Application to provide a list of mobile telephone numbers that he or she wants to invite to have wireless connectivity to the access point.
  • the Inviting Application will then automatically send the list of the invited numbers, along with the Own Access Point identification and access password to the Invite Service Node.
  • This connection can be done through the Own Access Point and the fixed access line, or through the PLMN, using the encryption capabilities of the PLMN or adding any additional encryption layer.
  • the Invite Service Node receives the invitation from the Inviting Application.
  • This invitation includes the following data:
  • the Own Access Point password This password is not necessarily sent if the Invite Service Node has already stored it during the Own Access Point identification process.
  • Application is installed (e.g. IMSI or MSISDN)
  • the Invite Service Node has also previously recorded the following information: - Identifiers of fixed access lines, and the Own Access Point ID associated to every access line, and the customer identification associated to it.
  • Customer mobile terminal information can include also if the customer has associated with it some previous subscription to an access point invite service, as an additional security measure to prevent unwanted connection invitations to his or her access point.
  • the first action of the Invite Service Node is to check if the invitation has been generated from an Inviting Application installed in a mobile terminal whose identification, as it is sent by the Inviting Application, is the same than the identification the Invite Service Node has previously stored.
  • the Invite Service Node can then proceed in two ways: a) automatically send the access point identification and the access password to every invited mobile telephone number, without any further checking, b) in order to increase the security of the process, the Invite Service Node can check if this invitation is legitimate prior to sending the access point identification and password to the invited telephone numbers.
  • the Invite Service Node checks if the invitation is legitimate prior to sending the access point identification and password to the invited telephone numbers.
  • the Invite Service Node stores, for every customer who has already used the Inviting Application to identify the Own Access Node, a set of data about the associated fixed access line identification and its customer identification, the associated mobile terminal identification and its customer identification, the Own Access Point identification, and optionally the Own Access Point password, and information about if the customer is subscribed to an access point invite service.
  • the Invite Service Node can perform any of the following checks before sending any access point data to the invited telephone numbers:
  • the Invite Access Node can then use two procedures to send the access point data to the invited telephone numbers:
  • the Invite Access Node If the Invite Access Node has not stored previously the Own Access Node identification or the Own Access Node password, it will send the identification and / or the password sent by the Inviting Application during the inviting process.
  • the Invite Access Node If the Invite Access Node has stored previously the Own Access Node identification or the Own Access Node password, it will send the identification and / or the password that are stored in the Invite Service Node. This procedure enables the possibility that the Inviting Application sends the Own Access Point identification and password only once, during the Own Access Point identification process.
  • the Invite Service Node will send the Own Access Node identification and password to the invited telephone numbers.
  • the connection between the Invite Service Node and the invited devices will be done by means of the PLMN.
  • the Invite Service Node can also provide the Own Access Node password to the Inviting Device, in the case the customer forgets it.
  • the customer can use the Inviting Application to request the password, a procedure that can be implemented in two ways:
  • the basic implementation is a request from the Inviting Application to the Operating System Wireless Connection Manager to provide the password, which will be graphically shown to the customer.
  • the mobile terminal user changes by error the access point password recorded in the mobile terminal, which now will not match with the real access point password. It is also possible that the mobile terminal user deletes by error the access point data recorded in the Wireless Connection Manager.
  • the Inviting Application connects with the Invite Service Node through the PLMN, because in these conditions it cannot connect to the Own Access Point, and it will provide to the Invite Service Node the fixed access line identification (i.e. the telephone number the Own Access Point is connected to), the identification of the owner of the mobile terminal, and if available the Own Access Node identification.
  • the Invite Service Node will compare the data that is provided by the Inviting Application with its stored data, and if there is a match between the fixed access line identification, identification of the owner of the mobile terminal and the Own Access Point identification, it will retrieve the stored password to the Inviting Application through the PLMN.
  • the Inviting Application can manage the wireless connection to the Own Access Node by itself, making use of the retrieved password and Own Access
  • Node identification or it can automatically provide these data to the Operating System Wireless Connection Manager.
  • the Invited Application which can be the same software application than the Inviting Application but performing different actions when inviting than when being invited.
  • the Invited Application receives from the Invite Service Node and through the PLMN an access point invitation, which includes the access point identification of the access point the invited device is invited to connect to, and the access point password.
  • the Invited Application stores these data, along with the data of other access points it is invited to connect to.
  • This Invited Application can automatically manage the wireless connection of the invited device to the wireless access point, not needing to use the connection capabilities of the invited device Operating System Wireless Connection Manager.
  • the Invited Application must be always running in the invited device as a background process, regardless it is being used by the invited device user or not. If the always- running Invited Application detects that the invited device is within the coverage area of one of the access points it is invited to connect to, the Invited Application automatically manages the connection, making use of the password that has been provided by the Invite Service Node.
  • the Invited Application in the invited device stores all the passwords but never shows them to the invited device user, keeping them encrypted.
  • the Invited Application cannot disclose the invited access points identifications and passwords with any other software application running in the invited device or running on any processing equipment connected to the invited device.
  • the Invited Application cannot be used to perform invitations to connect to wireless access points different from the Own Access point.
  • FIG. 2 shows a general description of the full procedure followed by the present invention.
  • the owner of a wireless access point can share the access point identification data and its password with other wireless devices users, enabling a simple procedure to provide a PLMN traffic offloading.
  • the owner's access point identification data and its password are transferred between the owner of the access point and the invited person without the need of the owner to retrieve the password or providing the password to the invited person as plain text.
  • the invention automatically determines which is the Own Access Point, not relying on any user input, using the information from a reliable third party who knows the identity of the user and the identity of the fixed access where the wireless access point is connected to.
  • the owner of the access point can use the Inviting Application to share only the access point identification and password of his or her own access point, but not data of other access points.
  • the access point owner can retrieve his or her access point identification and password in the case they are lost, as they can be recorded in a trusted node in the telecommunications operator network.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

L'invention porte sur un procédé qui consiste à : - stocker, par un premier dispositif sans fil d'un premier utilisateur, un mot de passe protégeant un point d'accès sans fil dudit premier utilisateur; - installer une application exécutable dans ledit premier dispositif sans fil de manière à contrôler l'accès audit point d'accès sans fil; et - authentifier, par ledit point d'accès sans fil, ledit premier dispositif sans fil au moyen dudit mot de passe chaque fois qu'une connexion est effectuée à l'aide dudit point d'accès sans fil, et consistant en outre à : a) stocker, par ledit premier utilisateur dans ledit premier dispositifs sans fil, au moyen de ladite application exécutable, une liste d'utilisateurs supplémentaires voulus munis de dispositif sans fil de manière à leur permettre d'avoir une connectivité audit point d'accès sans fil; b) envoyer automatiquement, par ledit premier dispositif sans fil au moyen de ladite application exécutable, ladite liste d'utilisateurs supplémentaires voulus ayant une permission de connectivité, un identificateur du point d'accès sans fil du premier utilisateur et le mot de passe le protégeant, à un nœud se trouvant dans un réseau mobile terrestre public (PLMN); c) fournir, par ledit nœud, à au moins un second dispositif sans fil supplémentaire, au moins des informations concernant ladite application exécutable, et d) fournir en outre par ledit nœud ledit identificateur et le mot de passe automatiquement envoyés à au moins un second dispositif sans fil supplémentaire, si ledit au moins un second dispositif sans fil supplémentaire se trouve sur ladite liste d'utilisateurs supplémentaires voulus. Le système de l'invention est conçu pour mettre en œuvre le procédé selon l'invention.
PCT/EP2013/064530 2012-07-13 2013-07-10 Procédé et système pour transférer des mots de passe de point d'accès WO2014009391A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ES201231109 2012-07-13
ESP201231109 2012-07-13

Publications (1)

Publication Number Publication Date
WO2014009391A1 true WO2014009391A1 (fr) 2014-01-16

Family

ID=48790436

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2013/064530 WO2014009391A1 (fr) 2012-07-13 2013-07-10 Procédé et système pour transférer des mots de passe de point d'accès

Country Status (1)

Country Link
WO (1) WO2014009391A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104484917A (zh) * 2014-11-17 2015-04-01 深圳市科荣实业有限公司 一种保险箱出租系统
ITUB20155599A1 (it) * 2015-11-16 2017-05-16 Leonardo Pellinacci Metodo e sistema per il riconoscimento automatico di un dispositivo elettronico per l_accesso ad una rete locale
DE102022110566B3 (de) 2022-04-29 2023-10-12 Deutsche Telekom Ag Gastzugang zu einem WLAN-Router

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060190991A1 (en) 2005-02-22 2006-08-24 Iyer Pradeep J System and method for decentralized trust-based service provisioning
US20060251256A1 (en) * 2005-04-04 2006-11-09 Nokia Corporation Administration of wireless local area networks
US20070287450A1 (en) 2006-04-24 2007-12-13 Bo-Chieh Yang Provisioned configuration for automatic wireless connection
US20080195741A1 (en) * 2007-02-13 2008-08-14 Devicescape Software, Inc. System and method for enabling wireless social networking
US20100087164A1 (en) * 2008-10-05 2010-04-08 Sony Ericsson Mobile Communications Ab Wlan set up using phone number identification apparatus and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060190991A1 (en) 2005-02-22 2006-08-24 Iyer Pradeep J System and method for decentralized trust-based service provisioning
US20060251256A1 (en) * 2005-04-04 2006-11-09 Nokia Corporation Administration of wireless local area networks
US20070287450A1 (en) 2006-04-24 2007-12-13 Bo-Chieh Yang Provisioned configuration for automatic wireless connection
US20080195741A1 (en) * 2007-02-13 2008-08-14 Devicescape Software, Inc. System and method for enabling wireless social networking
US20100087164A1 (en) * 2008-10-05 2010-04-08 Sony Ericsson Mobile Communications Ab Wlan set up using phone number identification apparatus and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104484917A (zh) * 2014-11-17 2015-04-01 深圳市科荣实业有限公司 一种保险箱出租系统
ITUB20155599A1 (it) * 2015-11-16 2017-05-16 Leonardo Pellinacci Metodo e sistema per il riconoscimento automatico di un dispositivo elettronico per l_accesso ad una rete locale
DE102022110566B3 (de) 2022-04-29 2023-10-12 Deutsche Telekom Ag Gastzugang zu einem WLAN-Router

Similar Documents

Publication Publication Date Title
JP5813790B2 (ja) 分散型無線ネットワークサービスを提供するための方法およびシステム
US9531835B2 (en) System and method for enabling wireless social networking
US8925042B2 (en) Connecting devices to an existing secure wireless network
CN108259164B (zh) 一种物联网设备的身份认证方法及设备
US20240048985A1 (en) Secure password sharing for wireless networks
US9143922B2 (en) Method and system for controlling communication between an UICC and an external application
US20070178881A1 (en) Remotely controlling access to subscriber data over a wireless network for a mobile device
US20130058274A1 (en) Method and system for accessing wireless networks
US9788202B2 (en) Method of accessing a WLAN access point
KR100834270B1 (ko) 이동통신 기반의 가상사설망 서비스 제공 방법 및 시스템과이를 위한 이동단말기
WO2008030527A2 (fr) Systèmes et procédés d'obtention d'authentifiants réseau
CN103517272A (zh) 无线网络用户端认证系统及其无线网络连线方法
KR100763131B1 (ko) 공중 무선랜 서비스를 위한 망접속 및 서비스 등록 방법
US10750363B2 (en) Methods and apparatuses for conditional WiFi roaming
JP2005079975A (ja) 暗号鍵の配信方法及び無線ネットワークシステム
WO2014009391A1 (fr) Procédé et système pour transférer des mots de passe de point d'accès
US20090037979A1 (en) Method and System for Recovering Authentication in a Network
KR20200010417A (ko) 개선된 네트워크 통신
US20080117837A1 (en) Method for setting wireless lan communication system and wireless lan access point
JP2005354136A (ja) 通信端末装置、接続管理サーバおよび通信システム
KR100790496B1 (ko) 인증키를 이용한 이동통신 단말기 제어를 위한 인증 방법,시스템 및 기록매체
KR100923909B1 (ko) 이동 통신 단말기의 원격 제어 방법 및 장치
KR100790495B1 (ko) 암호화 알고리즘을 이용한 이동통신 단말기 제어를 위한인증 방법, 시스템, 서버 및 기록매체
CN113316141B (zh) 无线网络接入方法、共享服务器及无线接入点
CN113316139B (zh) 无线网络接入方法及无线接入点

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13736884

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13736884

Country of ref document: EP

Kind code of ref document: A1