WO2015197563A1 - Procédé de récupération d'un code d'authentification requis par une borne de contrôle et système correspondant - Google Patents
Procédé de récupération d'un code d'authentification requis par une borne de contrôle et système correspondant Download PDFInfo
- Publication number
- WO2015197563A1 WO2015197563A1 PCT/EP2015/064006 EP2015064006W WO2015197563A1 WO 2015197563 A1 WO2015197563 A1 WO 2015197563A1 EP 2015064006 W EP2015064006 W EP 2015064006W WO 2015197563 A1 WO2015197563 A1 WO 2015197563A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- authentication code
- control
- control terminal
- control terminals
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the present invention relates to the field of communication systems and relates more specifically to a method and a system for recovering an authentication code required by a control terminal, such as a network access point. sharing.
- connection of a terminal or any other peripheral device to a computer network is preceded by an authentication procedure or identification of the terminal at this access point.
- a computer network such as, for example, the Internet or a shared local network
- an access point or gateway serves as an interface to allow or not the terminal to access the computer network.
- Such an access point can in particular be affiliated with a wired or wireless community network meeting the specifications of standards such as, for example, IEEE 802.1 1 (better known under the name of Wi-Fi® for “Wireless Fidelity” in the English terminology). -Saxon), or IEEE 802.15 (better known as Bluetooth®), or IEEE 802.1 6 (better known as WiMAX® for Worldwide Interoperability for Microwave Access), or RFID (acronym for "Radio Frequency Identification”) ”) Or CPL (acronym for" line carrier ").
- Wi-Fi hotspot also called Wi-Fi hotspot or Wi-Fi hotspot
- the authentication procedure of the terminal is reflected in particular by sending a code of authentication by the terminal at the Wi-Fi access point.
- This authentication code can be in the form of a secure key (for example of type WEP for "Wired Equivalent Privacy” or of type WPA "Wi-Fi Protected Access ”) Or in the form of an identifier followed by a password.
- the terminal such as a mobile phone equipped with a module capable of communicating with the Wi-Fi access point, initiates a discovery phase of all Wi-Fi access points located near the terminal. Indeed, as part of the Wi-Fi radio communication technology, each access point periodically sends a frame containing a beacon (or "beacon" in English) to identify it among the other access points of the device. network.
- a beacon or "beacon" in English
- the terminal or the user selects the access point to which he wishes to connect from the list of access points discovered. Then begins an exchange between the terminal and the chosen access point in which the access point requests the terminal the corresponding authentication code, for example a secure key type WPA, code that the user has previously acquired from the owner of the access point.
- WPA secure key type
- some service providers offer free access to all their Wi-Fi access points subject to prior registration, usually via the Internet.
- the authentication code usually in the form of an identifier and a password, is then valid for all access points belonging to the same provider.
- some users sometimes forget to make such a registration. Therefore, during a trip, the user is therefore without an authentication code to connect to one of the access points of the provider, and therefore unable to access the Internet through its network. terminal.
- the mobile phone user may end up in a geographical area without a Wi-Fi access point for which he has an authentication code.
- the user may also have forgotten to memorize these authentication codes or may be in possession of authentication codes that are no longer valid, in the case of time-limited codes for example. The user is then unable to connect to the Internet through these Wi-Fi access points.
- the present invention therefore proposes to remedy these situations by proposing an alternative solution for recovering such an authentication code.
- the object of the invention is in particular to extend the possibilities recovering an authentication code corresponding to an access point to the Internet network.
- the present invention relates to a remote method of recovery by a terminal of at least one authentication code required by a control terminal, such as an access point to a shared network.
- this method comprises:
- this request being a request for at least one authentication code corresponding to at least one control terminal selected from among the control terminals identified;
- the recovery process is therefore equivalent to an exchange mechanism whose purpose is authentication in the context of access to a shared network.
- the particularity of this recovery method is that the communication protocol used between the terminal and the control terminal is different from the communication protocol used between the terminal and the remote server.
- the first and second communication protocols respond to very different communication standards.
- the terminal uses two different communication channels, one to exchange with the control terminal, the other to exchange with the remote server.
- this recovery method can be initiated at any time by the terminal, and in particular at the time of the authentication process with the control terminal.
- the terminal can retrieve at any time an authentication code required by an already known or newly discovered control terminal.
- the authentication code according to the present invention is not only limited to a secure key or an identifier, and may in particular include all information that the terminal must provide to the control terminal to authenticate with said control terminal.
- Terminal means any device coupled to hardware and / or software means for communicating with the control terminal and the remote server according to the respective communication protocols.
- a terminal may be fixed or mobile, and may for example be in the form of a mobile station, a computer, a mobile phone, a smartphone, a tablet, a card, etc.
- the hardware and / or software means may be integrated directly into the terminal or may be external modules connected to the terminal, for example via a connection conforming to the USB standard (acronym for "Universal Serial Bus”).
- these hardware and / or software means may be in the form of a hardware key (commonly referred to as a "dongle") formed of integrated circuits coupled to a radio antenna compatible with one of the wireless radiocommunication technologies.
- These hardware and / or software means can also be a network card compatible with one of the existing communication technologies.
- the terminal, the remote server and the control terminal can be located in different geographical areas, for example in different buildings, on different floors, or separated by a few meters or even more.
- the control terminal may be an access point to a computer network such as the Internet, corporate network, or any other local network, but may also be a terminal for verifying and authorizing access to a computer network. a building.
- control terminal is an access point to a shared network, the authentication code being required by the access point to allow terminal access to said shared network.
- the network in which the remote server is integrated is different from the network to which the access point is affiliated, for example in terms of infrastructure and / or in terms of implemented communication technology.
- the network to which the access point belongs may be in accordance with a medium-range broadband communication technology, for example a hundred meters, whereas the network to which the remote server belongs may be in accordance with a communication technology that allows only long-range low-bandwidth communications, such as Ultra Narrow Band, with a range of several tens of kilometers, for example.
- the server may be affiliated with a private local area network and the control terminal may be affiliated with a shared community network.
- the second communication protocol is compatible with one of the existing radiocommunication standards, which may be wireless or wired, such as for example Ethernet, IEEE 802.1 1 (Wi-Fi) group standards, IEEE 802.15 (Bluetooth , ZigBee), IEEE 802.1 6 (WiMAX), RFID, PLC, NFC (Near Field Communication Technology), etc.
- the first communication protocol is compatible with an ultra narrowband radio technology.
- ultra narrow band radio technology is better known by the acronym UNB for "Ultra-Narrow Band”.
- This UNB technology uses, in particular, rights-free bands (that is, those which do not require a prior authorization request from the authorities) to transmit data on a very narrow spectrum to or from devices connected.
- very narrow spectrum is meant that the width of said spectrum is less than two kilohertz, or even less than one kilohertz.
- low-speed wireless radio communications typically of the order of 10b / s to 1 kb / s
- M2M Machine-to-Machine
- Internet of Things An example of a communication system implementing such a UNB technology is described in particular in the international patent application published under the number WO 2013/068559.
- the step of identification by the terminal control terminals may include a phase of discovery of all or part of the control terminals located in the geographical area surrounding the terminal, and a step of recovering the identifier of at least one of the control terminals discovered.
- the extent of the geographical area depends on the means implemented to initiate this phase of discovery.
- the scope of the communication modules according to one of the standards of the group IEEE 802.1 1 can be a hundred meters.
- the set of surrounding control terminals can be obtained by a method of geolocation, by mapping, or by listening to beacons sent by each of the control terminals in accordance with one of the wireless radiocommunications standards.
- step of identification by the terminal of the control terminals may further comprise steps of:
- the method described above may further include a step of checking additional conditions associated with the control terminal selected by the remote server for sending to the terminal of the corresponding authentication code.
- each control terminal is characterized by an identifier of its own.
- the table stored in the database of data coupled to the remote server preferably includes a list of these identifiers and the associated authentication codes.
- this list may not be fixed, and it is possible to provide an update of this list based on the newly discovered control terminals by the terminal.
- the identifier of a control terminal may be the MAC address (or "MAC address” in English), MAC being the acronym for "Media Access Control”).
- This MAC address assigned by ⁇ is the unique physical identifier of the control terminal, typically a network card or similar network interface.
- This MAC address is sometimes called Ethernet address, UAA (for “Universally Administered Address”), BIA (for "Burned-ln Address”), etc.
- This MAC address has the advantage of being unique.
- the identifier of a control terminal can also be an SSID type identifier, acronym for "Service Set Identifier”.
- This SSID corresponds to the name of the wireless network according to the IEEE 802.1 1 standard to which the control terminal is affiliated.
- the identifier of the device can also be defined by its geographical position, which can be obtained via geolocation means embedded in the terminal for example.
- the identifier can also be an IP address (acronym for "Internet Protocol").
- This IP address is an identification number assigned to each device connected to a network. This IP address has the advantage of being unique when it is public.
- this identifier can be completed by an additional identifier, and in particular the geographical position mentioned above.
- each control terminal can be identified in the table using one of the information listed above, namely its MAC address, its SSID, its IP address, its geographical position, or via a combination of all or part of this information.
- the server can implement a method of discriminating the different control terminals located in a predefined geographical area.
- This discrimination method can for example use the IP address and information relating to the geographical position of the control terminal selected by the terminal.
- the invention also relates to a system for remote retrieval of at least one authentication code, comprising:
- a remote server coupled to a table stored in a database and comprising a list of control terminals associated with respective authentication codes
- a terminal coupled to a first communication module able to exchange with the remote server according to a first communication protocol, and coupled to a second communication module able to exchange with a control terminal according to a second communication protocol.
- the terminal is able to:
- the server is able to:
- At least one of the first and second modules is integrated in the terminal.
- the first module implements all or part of the recovery process steps defined above.
- FIG. 1 is a partial schematic representation of the communication system implementing the recovery method according to one embodiment of the invention.
- FIG. 2 represents, by way of illustration, a flowchart of a few steps of the method according to one embodiment of the invention.
- FIG. 1 schematically represents an example of a communication system adapted for the implementation of a particular embodiment of the invention.
- This system includes control terminals 30a, 30b, 30c affiliated with a shared network 3. These control terminals 30a, 30b, 30c are distinct from each other and are input ports to the shared network 3.
- each of the control terminals 30a, 30b, 30c serves as an interface for authorizing or not allowing access to the shared network 3.
- each of the control terminals comprises hardware and / or software communication means 32a, 32b, 32c to communicate with a terminal according to a predefined communication protocol.
- access to the shared network 3 is conditioned by an authentication code, for example a secure key, an identifier and a password, etc.
- the system further includes a remote server coupled to a database 22 in which a table 220 is stored.
- This table 220 contains in particular a list of predefined control terminals, as well as the authentication codes associated with each of these control terminals listed.
- the control terminals can be listed in table 220 as an identifier of their own.
- the terminals of control can also be listed in table 220 as a combination of useful information for discriminating a control terminal of another control terminal.
- the remote server 20 also integrates hardware and / or communication software means 21 for communicating with a terminal according to another communication protocol.
- system further comprises a terminal 10, for example a mobile telephone, coupled to communication modules 11, 12 adapted to ensure data exchange between the remote server 20 on the one hand and the control terminals 30a. , 30b, 30c on the other hand, according to the respective communication protocols.
- a terminal 10 for example a mobile telephone
- communication modules 11, 12 adapted to ensure data exchange between the remote server 20 on the one hand and the control terminals 30a. , 30b, 30c on the other hand, according to the respective communication protocols.
- control terminals 30a, 30b, 30c are affiliated with a wireless community network conforming to the specifications of the Wi-Fi standard, and where the remote server 20 is compatible with a so-called UNB radio technology (for "Ultra-Narrow Band").
- UNB radio technology for "Ultra-Narrow Band”
- the terminal therefore comprises a first communication module 1 1 radio compatible with UNB technology to communicate with the remote server according to the protocol defined by this UNB technology, and a second radio communication module 12 compatible with the Wi-Fi standard to communicate with Wi-Fi terminals according to the Wi-Fi communication protocol.
- each Wi-Fi control terminal 30a, 30b, 30c (hereinafter referred to as the Wi-Fi terminal) periodically transmits a signal (or beacon) to signal its presence, and to broadcast information such as its radio characteristics and its own identifier that differentiates it from other network access points.
- a signal or beacon
- Such an identifier is commonly called a MAC address.
- the terminal 10 to connect to the Wi-Fi network, initiates via its second communication module 12, a phase of discovery of Wi-Fi terminals 30a, 30b, 30c that are within range, by listening to these tags.
- the terminal can for example be coupled to a database containing a list of Wi-Fi kiosks listed by location.
- the terminal can simply use a geolocation tool to determine its geographical position and query this database to establish all the Wi-Fi terminals located nearby.
- the terminal or the user selects the Wi-Fi terminal to which he wishes to connect among the identified Wi-Fi terminals 30a, 30b, 30c.
- the terminal 10 then performs the steps illustrated in FIG. 2 to retrieve from the remote server the authentication codes associated with one or more identified Wi-Fi terminals 30a, 30b, 30c.
- the terminal 10 sends (step B) a request to the remote server 20 via the first communication module 11.
- the remote server interrogates (step C) the table 220 to determine if the Wi-Fi terminal or terminals selected by the terminal 10 are stored in the table 220 and, if so, extracted (step D) and sends (step E) to the terminal 10 the corresponding authentication codes. Once these codes have been received, the terminal 10 can send (step F) the authentication code corresponding to one of the selected Wi-Fi terminals via the second communication protocol.
- the sending of authentication codes by the server to the terminal may be subject to special conditions such as acceptance of advertising, payment, etc.
- control terminals can be used to authorize or not access to a building, or the opening of a building door with an access code.
- the terminal for example a badge or even a smartphone, obviously integrates different means of communication with the remote server and the control terminals according to the respective communication protocols.
- the terminal can integrate an RFID antenna to communicate with the control terminals and an antenna according to UNB technology to communicate with the remote server.
- the RFID control terminal may periodically transmit a signal containing its unique identifier number, for example defined according to the EPC standard (acronym Anglo-Saxon for "Electronic Product Code").
- the terminal retrieves this identification number and queries the remote server to retrieve the corresponding access code.
- the remote server consults its database and, after checking the registered permissions, may decide to return or not the corresponding access code to the terminal.
- the solution of the invention can be implemented independently of the size of the network. This solution can particularly apply in industrial situation but also in an individual.
- the method of the invention to ensure the exchange of information between a home appliance and a maintenance service.
- the domestic appliance such as a washing machine, a cooking appliance, etc.
- the remote server of the invention may be equipped with the various communication modules described above allowing it to recover from the remote server of the invention, a authentication code to automatically connect to an available Wi-Fi hotspot.
- This connection may especially be useful for the exchange of information, such as failure, defect, necessary updating of the device, etc., with a remote maintenance service or a terminal of the owner of the device.
- the alternative solution proposed above provides the possibility for the user of a terminal to connect to the Internet through the use of two different communication channels, one to retrieve remotely and at any time the necessary authentication codes, the other to connect to the desired network.
- the first communication channel may be in accordance with UNB technology optimized for low-speed long-distance communications and the second communication channel may conform to one of the high-speed wireless radio communication standards such as than Wi-Fi.
- the terminal can retrieve the authentication code at any time to connect to a Wi-Fi terminal
- the recovery of such an authentication code can be performed remotely, ie far from the remote server, since the UNB technology allows communications over distances of several tens, or even hundreds of kilometers.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP15732584.6A EP3158708A1 (fr) | 2014-06-23 | 2015-06-22 | Procédé de récupération d'un code d'authentification requis par une borne de contrôle et système correspondant |
CN201580033640.5A CN106664295A (zh) | 2014-06-23 | 2015-06-22 | 用于取回控制端所需的认证码的方法及相应系统 |
US15/318,881 US20170118644A1 (en) | 2014-06-23 | 2015-06-22 | Method for recovery of an authentication code required by a control terminal and corresponding system |
JP2016575036A JP2017530571A (ja) | 2014-06-23 | 2015-06-22 | 制御端末により要求される認証コードのリカバリー方法及びシステム |
AU2015279373A AU2015279373A1 (en) | 2014-06-23 | 2015-06-22 | Method for recovery of an authentication code required by a control terminal and corresponding system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1455817A FR3022665B1 (fr) | 2014-06-23 | 2014-06-23 | Procede de recuperation d'un code d'authentification requis par une borne de controle et systeme correspondant |
FR1455817 | 2014-06-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015197563A1 true WO2015197563A1 (fr) | 2015-12-30 |
Family
ID=51298866
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2015/064006 WO2015197563A1 (fr) | 2014-06-23 | 2015-06-22 | Procédé de récupération d'un code d'authentification requis par une borne de contrôle et système correspondant |
Country Status (7)
Country | Link |
---|---|
US (1) | US20170118644A1 (fr) |
EP (1) | EP3158708A1 (fr) |
JP (1) | JP2017530571A (fr) |
CN (1) | CN106664295A (fr) |
AU (1) | AU2015279373A1 (fr) |
FR (1) | FR3022665B1 (fr) |
WO (1) | WO2015197563A1 (fr) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11496902B2 (en) * | 2017-09-29 | 2022-11-08 | Plume Design, Inc. | Access to Wi-Fi networks via two-step and two-party control |
EP3893043A4 (fr) * | 2018-06-12 | 2022-01-26 | Pauvazal, S.L. | Lunettes géolocalisables |
US11388596B2 (en) * | 2019-09-03 | 2022-07-12 | International Business Machines Corporation | Secure transmittal of wireless local area network access codes |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060227972A1 (en) * | 2005-03-31 | 2006-10-12 | Jacco Brok | Selecting a hidden network to connect a user to a wireless local area network |
WO2013068559A1 (fr) | 2011-11-10 | 2013-05-16 | Sigfox | Réseau d'accès de système de télécommunications numériques et procédé de télécommunications numériques |
US20140128102A1 (en) * | 2012-11-05 | 2014-05-08 | Qualcomm Incorporated | Systems and methods for utilizing hidden access points |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7508799B2 (en) * | 2002-01-29 | 2009-03-24 | Arch Wireless Operating Company, Inc. | Managing wireless network data |
JP3683569B2 (ja) * | 2003-01-30 | 2005-08-17 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | 端末装置及びプログラム並びにセンタ装置 |
US7359449B2 (en) * | 2004-10-05 | 2008-04-15 | Kamilo Feher | Data communication for wired and wireless communication |
US7421004B2 (en) * | 2004-10-05 | 2008-09-02 | Kamilo Feher | Broadband, ultra wideband and ultra narrowband reconfigurable interoperable systems |
JP2006332863A (ja) * | 2005-05-24 | 2006-12-07 | Fujitsu Ltd | 情報携帯端末装置、及び無線通信システム |
US7653037B2 (en) * | 2005-09-28 | 2010-01-26 | Qualcomm Incorporated | System and method for distributing wireless network access parameters |
US8040858B2 (en) * | 2005-12-20 | 2011-10-18 | At&T Intellectual Property I, Lp | Method for enabling communications between a communication device and a wireless access point |
JP4926994B2 (ja) * | 2008-01-30 | 2012-05-09 | ソフトバンクモバイル株式会社 | 無線通信システム |
WO2009135175A2 (fr) * | 2008-05-01 | 2009-11-05 | Starscriber Corporation | Communications mobiles facilitées par des menus interactifs |
US8635335B2 (en) * | 2009-01-28 | 2014-01-21 | Headwater Partners I Llc | System and method for wireless network offloading |
US8943552B2 (en) * | 2009-04-24 | 2015-01-27 | Blackberry Limited | Methods and apparatus to discover authentication information in a wireless networking environment |
WO2011039572A1 (fr) * | 2009-09-30 | 2011-04-07 | Nokia Corporation | Appareil et procédé de fourniture d'accès à un réseau local |
US8374670B2 (en) * | 2010-01-22 | 2013-02-12 | Biosense Webster, Inc. | Catheter having a force sensing distal tip |
FI20100056A0 (fi) * | 2010-02-12 | 2010-02-12 | Notava Oy | Menetelmä ja palvelinjärjestelmä hallittuun verkonvalintaan ja dataliikenteen uudelleenohjaukseen |
US9717074B2 (en) * | 2010-04-01 | 2017-07-25 | Hon Hai Precision Industry Co., Ltd. | Relay user equipment device and status announcement method thereof |
US8467359B2 (en) * | 2010-05-13 | 2013-06-18 | Research In Motion Limited | Methods and apparatus to authenticate requests for network capabilities for connecting to an access network |
US8644276B2 (en) * | 2010-05-13 | 2014-02-04 | Research In Motion Limited | Methods and apparatus to provide network capabilities for connecting to an access network |
US8570993B2 (en) * | 2010-05-20 | 2013-10-29 | At&T Mobility Ii Llc | Wi-Fi intelligent selection engine |
US8976657B2 (en) * | 2011-03-08 | 2015-03-10 | Medium Access Systems Private Ltd. | Method and system for data offloading in mobile communications |
EP2709418B1 (fr) * | 2011-05-31 | 2020-03-25 | Huawei Technologies Co., Ltd. | Dispositif de point de déchargement, équipement utilisateur et procédés correspondants |
US8594628B1 (en) * | 2011-09-28 | 2013-11-26 | Juniper Networks, Inc. | Credential generation for automatic authentication on wireless access network |
EP2642795A1 (fr) * | 2012-03-20 | 2013-09-25 | Giesecke & Devrient GmbH | Procédés et dispositifs pour accéder à un réseau local sans fil |
CN103582071A (zh) * | 2012-07-30 | 2014-02-12 | 中兴通讯股份有限公司 | 实现未知接入密钥终端接入网络的方法、系统以及终端 |
US20140073288A1 (en) * | 2012-09-11 | 2014-03-13 | Wavemax Corp. | Mobile device authorization, authentication and data usage accounting for mobile data offload in a network of shared protected/locked wifi access points |
US20140160937A1 (en) * | 2012-12-06 | 2014-06-12 | Telefonaktiebolaget L M Ericsson (Publ) | Common radio resource control for cellular radio and wifi |
US9160515B2 (en) * | 2013-04-04 | 2015-10-13 | Intel IP Corporation | User equipment and methods for handover enhancement using scaled time-to-trigger and time-of-stay |
-
2014
- 2014-06-23 FR FR1455817A patent/FR3022665B1/fr active Active
-
2015
- 2015-06-22 JP JP2016575036A patent/JP2017530571A/ja active Pending
- 2015-06-22 WO PCT/EP2015/064006 patent/WO2015197563A1/fr active Application Filing
- 2015-06-22 AU AU2015279373A patent/AU2015279373A1/en not_active Abandoned
- 2015-06-22 US US15/318,881 patent/US20170118644A1/en not_active Abandoned
- 2015-06-22 EP EP15732584.6A patent/EP3158708A1/fr not_active Withdrawn
- 2015-06-22 CN CN201580033640.5A patent/CN106664295A/zh active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060227972A1 (en) * | 2005-03-31 | 2006-10-12 | Jacco Brok | Selecting a hidden network to connect a user to a wireless local area network |
WO2013068559A1 (fr) | 2011-11-10 | 2013-05-16 | Sigfox | Réseau d'accès de système de télécommunications numériques et procédé de télécommunications numériques |
US20140128102A1 (en) * | 2012-11-05 | 2014-05-08 | Qualcomm Incorporated | Systems and methods for utilizing hidden access points |
Non-Patent Citations (1)
Title |
---|
KLAUS DOPPLER ET AL: "On efficient discovery of next generation local area networks", 2011 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2011) : CANCUN, MEXICO, 28 - 31 MARCH 2011, IEEE, PISCATAWAY, NJ, 28 March 2011 (2011-03-28), pages 269 - 274, XP031876259, ISBN: 978-1-61284-255-4, DOI: 10.1109/WCNC.2011.5779139 * |
Also Published As
Publication number | Publication date |
---|---|
FR3022665A1 (fr) | 2015-12-25 |
FR3022665B1 (fr) | 2016-07-15 |
US20170118644A1 (en) | 2017-04-27 |
CN106664295A (zh) | 2017-05-10 |
AU2015279373A1 (en) | 2017-01-12 |
EP3158708A1 (fr) | 2017-04-26 |
JP2017530571A (ja) | 2017-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2004006532A1 (fr) | Procede et organe pour controler l'acces a un systeme cellulaire de radiocommunication a travers un reseaju local sans fil | |
CN104468291A (zh) | WiFi模块通信的方法和装置 | |
EP2822285B1 (fr) | Appariement de dispositifs au travers de réseaux distincts | |
EP3158708A1 (fr) | Procédé de récupération d'un code d'authentification requis par une borne de contrôle et système correspondant | |
EP3241202B1 (fr) | Procédé d'association d'un objet avec un utilisateur, dispositif, objet et produit programme d'ordinateur correspondant | |
EP2976915B1 (fr) | Procédé et dispositif de gestion de la connectivité d'un terminal par un serveur mobile dans un réseau de télécommunications | |
US10200849B1 (en) | Systems and methods for auto-pair via a plurality of protocols | |
EP2348763B1 (fr) | Procédé d'authentification d'un terminal mobile pour accéder à un serveur d'applications | |
EP1905194A1 (fr) | Detection de double attachement entre un reseau filaire et au moins un reseau sans-fil | |
WO2019186006A1 (fr) | Procédé de connexion sans fil d'un objet communicant à un réseau de communication local, programme d'ordinateur et équipement d'accès correspondant | |
EP2608591B1 (fr) | Auto-configuration d'un terminal mobile pour la connexion à un réseau sans fil sécurisé | |
EP2337388A2 (fr) | Procédé d'accès sécurisé d'au moins un terminal visiteur à un réseau hote | |
EP2870817B1 (fr) | Procede de traitement d'une requête de connexion a un reseau d'acces sans fil | |
CN105792205A (zh) | 一种客户端发起验证接入点合法性的方法 | |
EP3149920A1 (fr) | Technique de médiation dans un réseau résidentiel | |
FR3046325A1 (fr) | Systeme pour la connexion securisee d'un equipement terminal client a un reseau etendu, par exemple internet | |
EP3530036B1 (fr) | Procédé d'appairage auprès d'une passerelle | |
EP2260640B1 (fr) | Etablissement d'une communication par paquets entre un serveur et une entite de service d'un reseau de radiocommunication | |
EP3957093B1 (fr) | Procédé et dispositif de communication pour véhicule dans un réseau sans fil de type ad hoc | |
FR2985402A1 (fr) | Procede de connexion a un reseau local d'un terminal mettant en oeuvre un protocole de type eap et systeme de communication associe | |
FR3032083A1 (fr) | Differentiation de classes de services de proximite dans des messages entre terminaux mobiles | |
FR3052004B1 (fr) | Procede d'echange de donnees entre un objet connecte et un serveur central. | |
EP3706502A1 (fr) | Procédé de connexion d'un répéteur de réseau, et ensemble d'accès comprenant un répéteur de réseau et un équipement d'accés | |
FR2934101A1 (fr) | Procede, systeme, serveur et terminal d'authentification hybride | |
FR3091100A1 (fr) | Procédé D’IDENTIFICATION DE nœud DE COMMUNICATION |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15732584 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15318881 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2016575036 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2015279373 Country of ref document: AU Date of ref document: 20150622 Kind code of ref document: A |
|
REEP | Request for entry into the european phase |
Ref document number: 2015732584 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2015732584 Country of ref document: EP |