NOT APPLICABLE
NOT APPLICABLE
NOT APPLICABLE
Public wireless networks have become a popular way for consumers to access the internet. Networks that operate in accordance with IEEE (Institute of Electrical and Electronics Engineers) standards 802.11a, 802.11b, 802.11g and 802.11n are often referred to as “WiFi”, and are now frequently found in many locations accessible to the public, such as airports, coffee shops, and hotels. In some locations, public wireless networks may be used free of charge, and in other locations the user may be charged a fee by the operator in order to access the network.
Public networks are expected to expand even further with recent efforts to build and operate municipal or metropolitan networks that operate under similar IEEE standards. In such networks (sometimes referred to as “WiMax”), access points are located throughout a municipal, metropolitan or other large geographical area, so that consumers will have wireless access to the internet anywhere within that area.
Unfortunately, identity thieves and hackers have recognized the opportunity to use WiFi networks to steal personal information from users. For example, a thief will set up an unauthorized access point (sometimes referred to as an “evil twin”) near the network, sometimes with a name or ID that appears to be related to the authorized network. The user connects to the unauthorized access point, and may see a screen that has been designed by the thief to look like the authorized access point. For example, screen may have a logo and other graphics that are similar to those found when accessing the authorized access point, such as the name of the coffee shop or hotel that operates the network or “hotspot.” The thief may request personal information from the user, and also capture information sent by the user when using the unauthorized access point during an internet session.
There is provided, in accordance with embodiments of the present invention, a network/system and method for detecting unauthorized access points (e.g., so-called “evil twins”) operating near a public or private wireless network.
In one embodiment, a system for detecting unauthorized access points is associated with a public wireless network for connecting users to the internet. The system includes an authentication server and a secure link over which a user connects to the authentication server. The user is prompted to provide a user password to the authentication server over the secure link prior to connecting to the network through a located access point. The authentication server provides the password to each authorized wireless access point, so that if a located access point does not have the password, such access point may be identified as unauthorized.
A more complete understanding of the present invention may be derived by referring to the detailed description of the invention and to the claims, when considered in connection with the attached Figures.
There are various embodiments and configurations for implementing the present invention. One such implementation is shown in
AP 130 is connected through a modem 140 (such as a DSL modem, cable modem, etc.) to an access network 150, which may be a PSTN (public switched telephone network) employing DSL technology, a high speed cable network, or other broadband or high speed data network. The user is provided connectivity to the internet through an Internet Service Provider (ISP) 160. The ISP maintains servers for providing various applications (email, security, etc.), including an authentication server 170 (and its associated database or memory store 172), which authenticates approved users and provides features (to be described later) for identifying and handling unauthorized access points, such as an unauthorized AP 180.
As described earlier, a person setting up a unauthorized AP may do so for the purpose of “spoofing” or imitating an authorized AP (such as the WiFi AP 130) in order to steal data or obtain personal information from one of the users 110. Such a scheme may include setting up an access point in a nearby building or from a mobile location (e.g., automobile) within range of the area served by the AP 130. The unauthorized AP 180 may be set up to have the “look and feel” of an authorized access point. Among other things, it may be set up to have a name, MAC (media access control) address, or SSID (service set identifier) confusingly similar to the name, address or identifier of the network 100. It may be programmed with a portal or “splash” page that resembles the portal or page set up by the operator of the network 100.
As an example, if the network 100 is located at a coffee shop, a user that has a WiFi enabled laptop computer and that is visiting the coffee shop may see several APs visually displayed on the computer screen when the computer is turned on, and mistakenly pick one that has a name similar to the name of the coffee shop but that is in fact unauthorized AP 180. The user thus unwittingly selects unauthorized AP 180 and then sees an opening or “splash” page that bears the name or logo of the coffee shop (or something similar to that name or logo). Thereafter, any data being entered by the user is monitored by the unauthorized AP 180 (and the person operating that AP). The unauthorized AP may connect the user to the internet, so that the user goes to a trusted site (e.g., a banking site, or another site where personal data is entered), and while at the site has all of his or her data monitored by the unauthorized AP. The unauthorized AP may also connect to a private “unauthorized” network or system 192, which runs applications and displays screens soliciting personal information from the user 110.
In one embodiment, and as illustrated in
The operation of the system, and program steps for implementing one embodiment of the invention, are illustrated in
The user or client 110 first receives authentication software (step 202), which is executed on the device (e.g., laptop) of the client or user 110, and which initiates the process for protecting against unauthorized access points. The software may be provided in advance to the user in the form of computer media such as a diskette when the user first makes arrangements for accessing the network 100. For example, a coffee shop that offers an internet hotspot may require any new user to first register, and provides the software as part of the registration. Alternatively, a user may be provided a hardwired or similar secure physical link to the network at the hotspot (e.g., a cabled connection at the AP 130 or modem 140) from which the authentication software may be downloaded. Of course, other methods of obtaining the software are possible.
Once the client has the authentication software, the client connects (step 204) to the secure link at the network 100 (assuming the client is not already connected in as part of step 202), and the client is prompted to enter a key or password or at step 206 (the password can be any string of characters selected by the user, although it should be appreciated that in some embodiments a pre-selected password may already be stored in the user device, or loaded into the user device as part of the authentication software). At this point, in the described embodiment, the client is now in communication with the authentication server 170, and this and subsequent steps are carried out by the authentication software at the user device in conjunction with programming in the authentication server 170.
The use of a secure link at step 204 (the link illustrated in
When the user 110 attempts a wireless connection to AP 130, the authentication software in the user device queries the AP 130 for the password (step 218). The authorized AP 130 will provide the password to the client and thereafter a communication session between the user and the network 100 proceeds. On the other hand, if the access point located by the user is unable to provide the password (such as would happen if a connection has been made to the unauthorized AP 180), the authentication software at the user device alerts the user that the access point is not authorized or valid (step 220) and prevents further communications (or advises the users that further communications may put data at risk).
While not illustrated in
Also, while not illustrated in
While a detailed description of presently preferred embodiments of the invention has been given above, various alternatives, modifications, and equivalents will be apparent to those skilled in the art without varying from the spirit of the invention. As an example, the network 100 could be a metropolitan network (e.g., operated on behalf of a municipality) covering a relatively large geographical area, having numerous authorized access points 130, and operating in accordance with so-called WiMax or WiFi standards (e.g., IEEE Standard 802.16 or 802.11 respectively).
As another example, while the authentication server 170 is illustrated as a device separate from AP 130, the functions described herein relating to authentication of any AP could be implemented by programming within AP 130 without the need for server 170.
As yet another example, the password from the user for purposes of authenticating the AP 130 can be a word, numbers, PIN, key or any other string of characters (chosen by the user or generated by the system), and could be alpha-numeric or in other forms (e.g., user biometric measurements, or an image).
Therefore, the above description should not be taken as limiting the scope of the invention, which is defined by the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
6112078 | Sormunen et al. | Aug 2000 | A |
6870822 | Balogh | Mar 2005 | B2 |
6970705 | Yoshimoto et al. | Nov 2005 | B2 |
7050789 | Kallio et al. | May 2006 | B2 |
7068999 | Ballai | Jun 2006 | B2 |
7075912 | Suda et al. | Jul 2006 | B2 |
7103359 | Heinonen et al. | Sep 2006 | B1 |
7133526 | Whelan et al. | Nov 2006 | B2 |
7158777 | Lee et al. | Jan 2007 | B2 |
7203481 | Nakao | Apr 2007 | B2 |
7231203 | Marcelli | Jun 2007 | B2 |
7283820 | Kamijo et al. | Oct 2007 | B2 |
7342906 | Calhoun | Mar 2008 | B1 |
7346338 | Calhoun et al. | Mar 2008 | B1 |
7395050 | Tuomi et al. | Jul 2008 | B2 |
7453840 | Dietrich et al. | Nov 2008 | B1 |
20020157090 | Anton, Jr. | Oct 2002 | A1 |
20030048174 | Stevens et al. | Mar 2003 | A1 |
20030186679 | Challener et al. | Oct 2003 | A1 |
20040003285 | Whelan et al. | Jan 2004 | A1 |
20040090930 | Lee et al. | May 2004 | A1 |
20040249961 | Katsube et al. | Dec 2004 | A1 |
20050114649 | Challener et al. | May 2005 | A1 |
20050202800 | Wang | Sep 2005 | A1 |
20060064588 | Tidwell et al. | Mar 2006 | A1 |
20060209700 | Sundar et al. | Sep 2006 | A1 |
20070077916 | Saito | Apr 2007 | A1 |
20080059804 | Shah et al. | Mar 2008 | A1 |
20080066157 | Stevens et al. | Mar 2008 | A1 |
20080295159 | Sentinelli | Nov 2008 | A1 |
Entry |
---|
Article from American Banker entitled “Wachovia Mulling ID Authentication Tools”, by Daniel Wolfe. |
U.S. Appl. No. 11/467,495, Office Action dated Oct. 13, 2009, 11 pages. |
U.S. Appl. No. 11/467,495, Final Rejection dated May 4, 2010, 12 pages. |
U.S. Appl. No. 11/467,495 Office Action dated Mar. 30, 2011, 16 pages. |
U.S. Appl. No. 11/467,495; Advisory Action dated Nov. 28, 2011; 3 pages. |
U.S. Appl. No. 11/467,495; Final Office Action dated Oct. 3, 2011; 12 pages. |
Number | Date | Country | |
---|---|---|---|
20080052512 A1 | Feb 2008 | US |