Patent Auction lists patented inventions available for sale or licensing. Inventors can list their patented inventions (or patent pending) for sale. New inventions for sale are added on a daily basis !
Home    List your patent    My account     Help     Support us     Contact us    

OPEN & SECURE WIFI-WIRELESS NETWORKS / VPN Level 2

[Category : - SOFTWARES- Security and alarms- Indentification and payment methods]
[Viewed 134 times]

CONTACT US FOR MORE INFORMATION
OVERVIEW:
The patent addresses the technical, legal and business issues in providing and using a distributed WiFi’s network internet access such as identity theft, illegal downloads, wardriving, child protection, corporate BYOD security
BUSINESS VALUE SUMMARY:
The Patent commercial applications covers major markets, operating players and provide major business benefits
- protect and/or add significant value to existing products or services
- provide the foundations to create new competitive business offerings
- create a strong market-entry barrier
- prevent other players to gain a competitive advantage

POTENTIAL B2C and B2B COMMERCIAL APPLICATONS:
WiFi OFF-LOAD:
- Simplified users experience with seamless and automatic access to preferred Wi-Fi networks. Mobile certificates eliminate user passwords during the authentication phase
- Tunneling and encryption deliver privacy and protection against fraud.

COMMERCIAL WIFI SERVICES & NETWORKS
- Ideal infrastructure for premium services with Privacy protection and sophisticated encryption methods linked together for public or commercial WiFi offerings, such as municipal networks, paid subscriptions, mesh networks, etc.

CORPORATE SERVICES / BYOD:
- Address security risks from using corporate laptops onto open networks
- Helps corporate BYOD practices to securely connect devices with a single sign-on to corporate networks and/or when away from the office

EMBEDDED PATENT IN WIRELESS DEVICES:
- Built-In Patent in access point, routers and other hardware devices providing access to WiFi or wireless networks
- Ready-To-Use “patent-enabled” hardware devices from the shelf

WHY IS VALUABLE:
In public areas and open WiFi networks, access and usage can be insecure with the potential security threat of data transmission “in the clear” without encryption making email address, password and webpages visited visible.
Man-in-the-middle attacks are also a common technique to steal data and information. If open networks have little or no client protection, hackers can spoof the wireless access point and talk directly to the client i.e. the user's Wi-Fi-enabled device
Often passwords for secured WiFi access are given away to everybody, without proper registration and/or collection of personal credentials.
The core legal issue is the identification and liability assignment of generated internet traffic. Ease-of-access often means a compromised security and improper or inexistent attribution to the source of traffic generated by the node IP allowing navigation.
The risks and liabilities in a free and unsecured WiFi internet access are identity theft, illegal downloads, wardriving, etc.
Corporate usage and BYOD access ubiquity and security are now reasons for concerns since employee mobility is now anytime-anywhere. Data loss and unauthorized access are at the top of the concerns, but usage of the same mobile devices on other WiFi networks, often open and/or free networks, bears more risks to corporations

HOW IT WORKS:
GUEST connects to a patent-supported WiFi Network Access node HOST using a wireless device such as smartphones, tablets and notebooks
To enforce security, make access legal and safe, the patent encrypts and re-routes the internet traffic generated by GUEST through his/her home trusted IP network.
HOST is now safe because GUEST internet traffic is not generated by his own IP internet address. A patent-supported WiFi Network Access node, does not need to know who GUEST is, nor what websites or traffic GUEST is generating
The internet traffic generated by GUEST comes from GUEST trusted IP as if GUEST was physically accessing internet from his/her home, office or personal cloud account

TECHNICAL ARCHITECTURE:
A method and system for commissioning a wireless connection with a related authentication and the eventual encryption to a remote relay node, whereto an electronic mobile device is connected to a hosting wireless access node for transmitting/receiving data to/from a service provider available on the Internet by means of a commissioned relay access node selected by an authentication and commissioning manager.
The data transfer between the mobile device and the service provider is encapsulated into the tunnel between the hosting wireless access node and the commissioned relay access node and is finally forwarded by the commissioned relay access node to the service provider.
The service provider thereby is exchanging data with the commissioned relay access node and not directly with the hosting wireless access node.