The present invention relates to authenticating service to a wireless communications device. The invention relates particularly to authenticating use of hotspot wireless communications device services provided by a wireless network.
It has been predicted that wireless local area networks (WLANs) will soon provide a significant proportion of the wireless access to computer networks and/or the Internet via “hotspots”, which enable a user to have wireless connection by radio frequency (RF) communication to a computer network when the user is in a designated area forming the “hotspot”. The hotspots may form part of a cellular telecommunications network and may be an extension of the existing cellular telecommunication networks already widely available.
A problem with accessing WLANs via hotspots is that a user may be unaware of the suitability of the provider of a particular hotspot. Similarly, the provider of a hotspot may have problems in determining whether a request for use of the hotspot by a user should be accepted.
In the following a hotspot is an area where a wireless communication to a WLAN can take place, the area being geographically limited to being approximately tens of meters in size. Several hotspots may be created together in a cluster to serve a site having a size larger than a single hotspot, such as an airport, hotel, conference centre, office building or the like. A hotspot typically allows access to services or information etc on the Internet.
According to a first aspect, the present invention provides a method wherein a cellular communications service provider authenticates a provider of a service running at a wireless hotspot. The method comprises receiving an indication of potential use of a specified wireless hotspot from a user. The trustworthiness of the provider of the service is verified with a party independent from said service provider. On successful verification of the provider of the service, the user is provided with a confirmation that the provider of the service is authenticated by the cellular communications service provider.
According to a second aspect, the invention provides a computer system for a cellular telecommunications provider. The system comprises a processor adapted to: (1) receive an indication of potential use of a specified wireless hotspot from a user; (2) identify services available at the specified wireless hotspot; (3) authenticate providers of the services available at the specified wireless hotspot; and (4) prepare authentication information for use to the user.
According to a third aspect, the invention provides a method wherein a cellular telecommunications provider authorises a user to use a location-dependent service. The method comprises: tracking the location of a user via a wireless communications device of the user; determining that the user is or will be within an operating range of the location-dependent service; authenticating a provider of the service; and providing authentication of the provider of the service to the user.
In further aspects, the invention provides appropriate apparatus, and provides suitably programmed computers and data carriers carrying code adapted to program computers suitably.
For a better understanding of the invention and to show how the same may be brought into effect, specific embodiments will now be described, by way of example, and with reference to the accompanying drawings, in which:
It is predicted that wireless local area networks (WLANs) will soon provide a significant proportion of the wireless access to the Internet via hotspots. A method is described herein with reference to
The method described in relation to
The method works as follows.
In
The request for certification of the service can be initiated in other ways than manual confirmation of the user as described above. As will be described below, awareness of the existence of a local service may be enough to trigger a certification/authentication step from the cellular telecommunications service provider. Alternatively, the user's cellphone may be adapted such that it cannot use WLAN services (any WLAN services, or WLAN services of a particular type) without confirmation from the cellular telecommunications service provider or its designate if the service provider verifies that the WLAN service concerned is legitimate. This confirmation can be provided, for example, in the form of a key to activate the relevant functionality at the cell phone (use of keys in such authentication is described further below). The cell phone may be adapted so that such confirmation of certification or authentication is always required before use of a WLAN service of the relevant type, or may be adapted so that this could be overridden by the user (who would then, in effect, be taking responsibility for making the security decision about the WLAN services himself or herself).
The trusted cellular telecommunications service provider is aware of the location of the user by virtue of the request made, since the user location is an integral part of cellular telecommunications. Furthermore, more specific location information can be obtained to give the position of a user within a particular cell using signal strength in adjacent cells to triangulate a user's location. More detail of this can be obtained from Cambridge Positioning Systems (UK) (see www.cursor-system.com/sitefiles/cursor/tech_eotd.htm), Signalsoft (see www.signalsoftcorp.com/products/index.html), or Cell-loc (see www.cell-loc.com/how_tech.html). Thus the movements of a user or potential user can be tracked.
It is also likely that the trusted cellular telecommunications service provider has details of the location of the hotspot, particularly if there is an information sharing agreement between the cellular telecommunications service provider and the hotspot provider. The information is typically tabulated to show a hotspot name, an owner/operator and a location on a suitable database. Thus, the cellular telecommunications service provider, knowing the location of the hotspot can vet the WLAN hotspot as being offered by a trusted WLAN hotspot provider, by cross-referencing user location with known hotspot location information.
By using this information, a user is provided in advance with information relating to the location of known hotspots that have previously been vetted by a user's cellular telecommunications or hotspot service provider. The cell phone and the cellular provider know the whereabouts of a given cell phone using location finding technology referred to above. Knowing the location of a cell phone (as described above) the cellular provider lets the user know about hotspots in his/her vicinity. In a more advanced system the cellular operator senses the direction a user is moving (e.g. down a road/motorway) and predictively alert the user to upcoming hotspots.
Also, information can be provided to a user giving the direction or location of a nearest (or a list of nearest) hotspots that a user may wish to use. This information could easily be derived from a user's location information and hotspot location information, with a difference value being calculated.
The certification or vetting of the hotspot by the cellular provider (operation 24) can be carried out by a number of methods, a non-limiting example of which is if the hotspot provider or service provider over the hotspot is in a list of approved hotspot providers or service providers held by the cellular telecommunications service provider. It should be noted that the certification or vetting (which may be a simple authentication, or also require the service provider concerned to meet certain criteria) need not be provided by the cellular telecommunications service provider directly, but simply by a party whom the user ultimately trusts. This may be a party or one of a group of parties identified by the user, or a party trusted by the cellular telecommunications service provider (either directly or indirectly).
If operation 24 positively certifies the hotspot provider, then the trusted cellular telecommunications service provider (during operation 26a) confirms to the user that the user can access the relevant service or services provided at the WLAN hotspot. This can be a simple confirmation, sent (preferably) over a secure cellular telecommunications link to the user (at operation 28a in
Since the cellular telecommunications service provider knows the location of the user and also the hotspot (assuming the information sharing agreement mentioned above is in place) then the vetting of the WLAN hotspot provider and service providers on the WLAN hotspot can be carried out automatically without the user having to make a specific request for verification of the WLAN hotspot. The request for certification would be made automatically as soon as the user requests service from the hotspot.
If the cellular provider of the user does not positively certify the hotspot during operation 24 as having not been a trusted hotspot provider, the cellular provider derives a signal indicating access to the hotspot is denied (operation 26b) and the user is not given the key (indicated by operation 28b) to prevent use of the hotspot by the user.
The method described above gives users security and trust in accessing a WLAN hotspot and in the services provided through the WLAN hotspot and inhibits “rogue” hotspot providers. Also, advance information about hotspots that a user is approaching can provide increased confidence to a user, as well as providing a more efficient service. If the cellular service provider with its location-sensing technology locates a user and his direction then the cellular provider can pre-authenticate the likely hotspots that the user will pass-through on his journey and alert the user to the presence and authenticity of these hotspots.
The user can access the hotspot and a computer network associated therewith with a cellular telecommunications device, which may be a portable computer, or laptop, a personal digital assistant or other mobile computing device.
In the environment of
The hotspot services described herein and the telecommunications networks are performed using computers, such as computers 15 and 17 above, programmed with suitable software.
The system and method can also track a user as described above, prior to allowing entry of the user to a building or the like. The building would correspond to the wireless service in the above embodiments. A user would be tracked as he approached the building, and would be allowed access to the building on making a request. The request (or potential request) would be one about which a controller of the building access would be aware, given the tracking of the user. Authentication and certification issues for building services would then be addressed.
The certification methods described herein address the problem of hotspot services potentially being provided by unknown. Thus a, potentially automatic, method is disclosed whereby vetting, i.e. certifying, of a provider of services at a hotspot is achieved.
Number | Date | Country | Kind |
---|---|---|---|
0220930.2 | Sep 2002 | GB | national |
Number | Name | Date | Kind |
---|---|---|---|
5598459 | Haartsen | Jan 1997 | A |
6259405 | Stewart et al. | Jul 2001 | B1 |
6785729 | Overby, Jr. et al. | Aug 2004 | B1 |
6853729 | Mizikovsky | Feb 2005 | B1 |
6856800 | Henry et al. | Feb 2005 | B1 |
7174564 | Weatherspoon et al. | Feb 2007 | B1 |
20010052083 | Willins et al. | Dec 2001 | A1 |
20020059453 | Eriksson et al. | May 2002 | A1 |
20020077060 | Lehikoinen et al. | Jun 2002 | A1 |
20020087677 | Maeda et al. | Jul 2002 | A1 |
20020174335 | Zhang et al. | Nov 2002 | A1 |
20020191575 | Kalavade et al. | Dec 2002 | A1 |
20020198937 | Diwan et al. | Dec 2002 | A1 |
20030003933 | Deshpande et al. | Jan 2003 | A1 |
20030046541 | Gerdes et al. | Mar 2003 | A1 |
20030051041 | Kalavade et al. | Mar 2003 | A1 |
20030092450 | Juppi et al. | May 2003 | A1 |
20030114158 | Soderbacka et al. | Jun 2003 | A1 |
20040019584 | Greening et al. | Jan 2004 | A1 |
20040029529 | Kobayakawa et al. | Feb 2004 | A1 |
20040058717 | McDonnell et al. | Mar 2004 | A1 |
20040243846 | Aboba et al. | Dec 2004 | A1 |
20040264699 | Meandzija et al. | Dec 2004 | A1 |
20050010824 | Yuan | Jan 2005 | A1 |
20060183467 | Stewart | Aug 2006 | A1 |
Number | Date | Country |
---|---|---|
1 161 031 | May 2001 | EP |
1 081 895 | Jul 2001 | EP |
2 367 213 | Mar 2002 | GB |
Number | Date | Country | |
---|---|---|---|
20040152447 A1 | Aug 2004 | US |