摘要:
A method, apparatus and computer program product are provided for verifying an access network using for example a trusted protocol such as Hotspot 2.0. In this regard, a method is provided that includes causing at least one available network to be detected. The method may further include determining a fully qualified domain name (FQDN) for the at least one detected available network. The method may further include causing a registry entry to be accessed in a registry that corresponds to the determined FQDN, wherein the registry entry comprises at least one certificate for at least one network entity. The method may further include verifying received configuration information from the connected network, wherein verification comprises determining whether the received configuration information is signed with a digital certificate that corresponds to the at least one certificate in the accessed registry entry.
摘要:
A method, apparatus and computer program product are provided for verifying an access network using for example a trusted protocol such as Hotspot 2.0. In this regard, a method is provided that includes causing at least one available network to be detected. The method may further include determining a fully qualified domain name (FQDN) for the at least one detected available network. The method may further include causing a registry entry to be accessed in a registry that corresponds to the determined FQDN, wherein the registry entry comprises at least one certificate for at least one network entity. The method may further include verifying received configuration information from the connected network, wherein verification comprises determining whether the received configuration information is signed with a digital certificate that corresponds to the at least one certificate in the accessed registry entry.
摘要:
A method, apparatus, and computer program product are provided for facilitating randomized port allocation. An apparatus may include a processor configured to receive a port allocation message from a network management entity. The port allocation message may comprise an encryption key, an initial input value, and a value indicating a number of ports allocated to the apparatus for communication on a network. The processor may be further configured to calculate at least one port allocated to the apparatus with an encryption function based at least in part upon the encryption key and initial input value. Corresponding methods and computer program products are also provided.
摘要:
A security gateway/home agent controller HAC is used to assign one home agent HA from a plurality of HAs and to identify at least one security protocol that is common between a mobile node MN and the assigned HA. Establishment of a security association between the MN and the assigned HA is enabled according to the identified security protocol and utilizing bootstrapping parameters provided over a secure connection between the security gateway/HAC and the MN. The bootstrapping parameters include at least a home address for the MN, an address of the assigned HA and security credentials and security parameters for the identified at least one security protocol. In an exemplary embodiment the home address for the MN may be an IPv6 home address and the MN may have certain capabilities with respect to security protocols and ciphering suites which the MN sends to the security gateway.
摘要:
Systems and techniques for managing local communication between a network access point and a host device. Upon connection by a host device to an access point, a local connection link is established between the access point and the host device. A network connection may be established between the access point and the host device, with the network connection being able to pass through the host device to enable communication with and beyond an access network to which the access point provides a connection. Local messages may be passed between the access point and the host device over the local connection link, separately from and independent of communication that may occur over the network connection.
摘要:
Method, apparatus, and computer program product embodiments of the invention are disclosed to improve the discovery of wireless networks having desired service offerings. In example embodiments of the invention, a method comprises: determining whether to perform passive or active scanning; transmitting a wireless generic advertisement service request specifying one or more required characteristics of a transmitting device, if the determination is to perform active scanning; passively listening for one or more wireless generic advertisement service responses sent to a broadcast address by one or more wireless devices, the responses including one or more required characteristics of a passive listening device, if the determination is to perform passive scanning; and receiving one or more wireless generic advertisement service responses sent to a broadcast address by one or more wireless devices having the characteristics specified in the transmitted request.
摘要:
A method and apparatus are provided for determining a network interface preference policy. An example method may include determining a network address family preference policy signaled to a host apparatus by an access point for a first network interface. The example method may additionally include selecting an interface from the first network interface and a second network interface for network traffic of the host apparatus based at least in part on the signaled preference policy. A corresponding apparatus is also provided.
摘要:
Positioning and/or navigation of an electronic device within a building when GPS signals are unavailable is provided. The electronic device scans for available Wireless Local Area Network (WLAN) Access Points (APs) upon, e.g., entering a building. The electronic device detects a signal (e.g., beacon) from at least one available WLAN AP, whereupon the electronic device retrieves the indoor location of the available WLAN AP. The location information can be directly downloaded from the WLAN AP while in state-1 via, e.g., a Native Query Protocol which includes an extension to currently defined Native Query info elements that returns location information. Alternatively, the Media Access Control (MAC) address of the WLAN AP can be read from the beacon signal, which is then used to retrieve the location of the WLAN AP from an associated database. Additionally, various embodiments may be implemented with or via a mapping application or service, where the mapping application is able to display any floor's floor plan of a building and determine/obtain the position of the electronic device inside the building relative to the floor plan.
摘要:
A secure network access point transmits a beacon transmission. A user device receiving it determines it does not have credentials necessary to attach with the secure network access point oint, and so a preliminary association is formed between the user device and the secure network access point. During the preliminary association, the user device receives or creates credentials necessary to associate with the secure network access point, forms an association with the secure network access point using the received or created credentials, and obtains internet connectivity via the secure network access point. In this embodiment there is only the secure network access point, but in another embodiment there is also a non-secure network access point which transmits a beacon using the same SSID as the secure network access point, and the preliminary association is with the non-secure network access point.
摘要:
In one exemplary and non-limiting aspect thereof this invention provides a method to execute a bootstrapping procedure between a node, such as a MN, and a wireless network (WN). The method includes sending the WN a first message that contains a list of authentication mechanisms supported by the MN; determining in the WN an authentication mechanism to be used for bootstrapping, based at least on the list received from the MN, and including in a first response message to the MN information pertaining to the determined authentication mechanism; and sending a second message to the WN that is at least partially integrity, the second message containing the list of authentication mechanisms that the MN supports in an integrity protected form. If authentication is successful, and if the list received in the second message matches the list received in the first message, the method further includes responding to the MN with a second response message that is at least partially integrity protected, where the second response message contains an indication of the selected authentication mechanism in an integrity protected form; and receiving the successful response message and verifying that the authentication mechanism used by the MN matches the authentication mechanism selected by the WN.