This invention relates to a technique for managing a secure connection between a wireless device and a network.
Many individuals increasingly make use of one or more portable communication devices in the course their daily pursuits. Such portable devices include lap top computers, Personal Digital Assistants (PDAs) and wireless telephones. These portable communications devices offer the capability of accessing a communications network via a wireless connection. Wireless telephones, as well as some types of PDAs allow a user to access a public wireless telephony network. Present day public wireless telephony networks typically make use of one of several well-known wireless standards, such as Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), Global Standard for Mobile (GSM) and the third generation cellular phone standard. Many lap top computers offer wireless connectivity through public networks that make use of the IEEE 802.11i standard. For many users, access to a public wireless network enables subsequent access to an enterprise network, the intended destination for communications.
In the past, most enterprise networks relied on leased line connections with one or more public networks to enable user access. Leased line connections offer high security, but at a high cost. With advent of the Internet, public network providers now offer enterprise network operators the ability to create a Virtual Private Network (VPN) within the public network. Such VPNs use virtual connections to simulate the equivalent of a private leased-line network, but at a reduced cost.
Within a given public network, several VPNs can share a common communications path. Thus, security remains important to make sure that unintended recipients cannot access data destined for a particular enterprise network. Various security techniques exist within VPN networks. Such techniques often make use of different encryption techniques, including symmetric key and public key encryption. Some VPNs make use of the Internet Protocol Security Protocol (IPSEC). To enable a portable communications device to establish an end-to-end connection via a VPN to an enterprise network, the communications device must include a VPN client, which takes the form of hardware and/or software necessary to implement the various security protocols. While some portable communications devices such as lap top computers possess the ability to incorporate a VPN client, many smaller devices, such as wireless telephones and PDAs do not. Thus, such smaller portable communications devices cannot readily establish a connection to an enterprise network across a VPN.
Thus a need exists for a technique for enabling a portable communications device to establish a connection with an enterprise network at least in part across a VPN.
Briefly, in accordance with a preferred embodiment of the present principles, there is provided a method for establishing connection between a portable communications device and an enterprise network. The method commences upon the receipt at a wireless access point of a request by the portable communications device for access to an enterprise network. Responsive to the access request, the wireless access point determines the identity of the enterprise network, which the portable communications device seeks to access. The wireless access point authenticates the portable communications device using a wireless authentication protocol. Upon successful authentication of the portable communications device, the wireless access point establishes a Virtual Private Network with the identified enterprise network to facilitate communications between the portable communications device and the enterprise network. In this way, the wireless access point establishes a connection utilizing the wireless LAN security mechanism as between the portable device and the access point, and a VPN connection between the access point and the enterprise network.
To best understand the technique of the present principles for facilitating communications between a portable communications device and an enterprise network in part across a VPN without the need for a VPN client at the portable communications device, a brief discussion of the prior art technique will prove helpful.
In order for the portable communications device 12 to establish an end-to-end communications link with the enterprise network 14 through the VPN 16, the portable communications device 12 must possess a VPN Client 26. The VPN client 26 takes the form of one or more programs and associated data, and possibly one or more hardware elements (not shown) that enable the portable communications device 12 to interface with the VPN 16, taking into account the applicable security protocol(s). While some portable communications devices such as lap top computers possess the ability to incorporate the VPN client 22, other portable communications devices with lesser resources, such as a wireless telephone device do not possess such capability. Thus, portable communications devices with limited resources lack the capability of establishing a communications link with the enterprise network 14 across the VPN 16.
The network 100 of
Once one of the portable communications devices 12a and 12b has established a communications link with the wireless access point 20, the wireless access point then seeks to identify the enterprise network that the portable communications device seeks to access to enable authentication. The wireless access point 20 identifies the enterprise network 14 in at least one of two ways. For example, the credentials associated with the user of the portable communications device can identify the enterprise network 14. For example, a user's credential contains will include the user's name, i.e., bob@thomson.net, with the domain portion of the user name specifying the enterprise network. The user could also specifically identify the enterprise network 14 that he or she seeks to access.
The wireless access point 20 authenticates the user of the portable communication device by consulting the enterprise network 14, which can verify the user's credential. Such authentication can occur through using the IEEE 802.11i communications protocol between the wireless access point 20 and the portable communications device. As between the wireless access point 20 and the enterprise network 14, the RADIUS communications protocol could be used. Upon successful authentication, the wireless access point 20 builds a secure session with one of the portable communications devices 12a and 12b using the wireless LAN security mechanism e.g. Temporal Key Integrity protocol, (TKIP), Wi-Fi Protected Access (WPA) or Advanced Encryption standard (AES).
The wireless access point 20 also builds a VPN between itself and the enterprise network 14 on behalf of the portable communications device, using the regular VPN model, such as through IPSEC. The wireless access point 20 bridges these two secure connections to build an end-to-end connection between the portable device and the enterprise network. Note that the VPN connection between the wireless access point 20 and the enterprise network 14 can be pre-built as a single VPN session. Note that the wireless access point 20 must have the trust of the enterprise network 14, thus introducing an additional level of complexity as compared to the end-to-end VPN solution of
The foregoing describes a technique for enabling a communications device to establish a with an enterprise network without the need for the portable computing device to possess a VPN client.
This application claims priority under 35 U.S.C. 119(e) to U.S. Provisional Patent Application Ser. No. 60/571742, filed on May 17, 2004, the teachings of which are incorporated herein.
| Filing Document | Filing Date | Country | Kind | 371c Date |
|---|---|---|---|---|
| PCT/US05/16378 | 5/10/2005 | WO | 9/20/2007 |
| Number | Date | Country | |
|---|---|---|---|
| 60571742 | May 2004 | US |