The invention relates to a method for providing configuration changes in a network access point, and in particular, provides a method in a WLAN environment where an access point and a stationary computer or a mobile terminal maintaining a web browser utilizes an ActiveX control or a plug-in to enhance a security mechanism without relying on HTTPS protection during remote management and administration processing.
The context of the present invention is to securely access networks, such as the World Wide Web, through another network, including wireless local area networks or (WLAN) employing the IEEE 802.1x architecture, having an access point that provides access for a stationary computer or a mobile terminal devices and to other networks, such as hard wired local area and global networks, such as the Internet. Advancements in WLAN technology have resulted in the publicly accessible wireless communication at rest stops, cafes, libraries and similar public facilities (“hot spots”). Presently, public WLANs offer mobile communication device users access to a private data network, such as a corporate intranet, or a public data network such as the Internet, peer-to-peer communication and live wireless TV broadcasting. The relatively low cost to implement and operate a public WLAN, as well as the available high bandwidth (usually in excess of 10 Megabits/second) makes the public WLAN an ideal access mechanism, through which, mobile wireless communications device users can exchange packets with an external entity. However as will be discussed below, such open deployment may compromise security unless adequate means for identification and authentication exists during regular communications and in processing remote management and administrative functions.
In a web browser based authentication method, a stationery computer or a mobile terminal communicates with an authentication server, using a web browser operating with the Hyper Text Transfer Protocol Secured Sockets (HTTPS) protocol insures that anyone on the path between the mobile terminal and the authentication server cannot trespass upon or steal confidential user information.
Remote system management/administration is a key requirement on any type of computer systems. Using web browsers (HTTP protocol) as the interface for remote management is becoming an essential management feature. In order to provide secure browser based remote management, HTTPS is the natural choice. However, for embedded systems, such as WLAN access points, the resource requirement on HTTPS may be too great consuming large amounts of storage space and requires corresponding overhead support and CPU power. In fact these limitations have historically prevented the development of a practical solution to a secure browser based administration mechanism. For example, most of today's commercially available wireless access points do not protect the remote administration exchanges between the browsers and the access points. A would be hacker might easily obtain administrator passwords and damage the access points.
HTTPS is designed for communication protocols where neither a browser nor a web server have pre-established authentication codes such as confidential passwords known only by the client terminal and the authentication server. This assumption of confidentiality is absolutely necessary in the web applications in which tens of millions of browsers may access millions of servers, but do not have a prior trust relationship. Thus a large use HTTPS requires a certificate on the server to provide a secure negotiation between the browser and the server, and the establishment of a shared secret code for subsequent HTTP communication. In the remote system administration case, the administrator and the remote device can pre-share a secret, thus removing one source of overhead associated with HTTPS communication. However, since the web browser does not offer the necessary secure communication mechanism based on such a shared secret, it would be a desirable feature for a processor to provide the security through the use of an ActiveX control or functionally equivalent plug-in.
The invention herein provides a method for improving security during a remote administration exchange between a client device using a browser and an access point of a network. In particular, the invention provides a method for securely exchanging administration change requests between a client device and an access point of a wireless network (WLAN). The WLAN may comprise a network that complies with IEEE 802.11 standards. The administration change involves the use of parameters for ensuring that received administration information is received from an appropriate client terminal. Generally, when a request for administration management file, such as a web page, is received, the access point of the network also generates and transmits to the client terminal a first parameter, for example, a random number. The first parameter may be generated in response to a challenge following the request for the administration management file.
Using a predetermined algorithm, such as the MDS hash function, a new parameter is generated from certain parameters. The parameters may include the first parameter, which may be a random number generated by the access point. For greater security, the new parameter may be generated from several parameters, including a password associated with the client terminal, the first parameter, and a string parameter, which may, for example, be generated from the new administration information. The new parameter is transmitted from the client terminal to the access point, which then generates a corresponding new parameter using the parameters used by the client terminal. If the parameters match, the access point accepts the new administration information and implements them. In this manner, greater security is provided by using a verification parameter with the new administration information, which verification parameter is generated using parameters that are known to the client terminal and the access point.
In an embodiment of the present invention an administrator utilizes a browser to request an administrative web page form, typically designed as a Hyper Text Markup Language (HTML) form, from a remote computer, such as a local web server, which contains fields where the administrator can provide information relevant to obtaining a secure communication with the network. The web page form includes fill-in management information, which when complete is submitted to the remote computer by invoking a real time operator, such as may be provided by a Javascript code, to package the information into a string. The real time operator invokes a plug-in security function having a predetermined character string as one parameter; prompting the security function to communicate with a remote system.
Upon receiving the form information, the remote system generates a random number and stores the number for future reference. It also communicates the number to the administrator. The administrator security function concatenates the random number, an administrator password (previously stored in the plug-in) and the string parameter. Thereafter, a digest, such as a Message 5 digest (MD5), is generated for the concatenated result and is returned to the security function. The process includes utilizing the real time operator such as Javascript to then embed the result from the security function into the form containing the management information and sends the form to the remote computer, thereby completing the submission. The remote computer utilizes the stored random number, the password and the received data to generate an MD5 digest. If the digest matches the received digest then the requested administration is granted and the system is appropriately updated. In subsequent communication where management information is to be communicated from the administrator to the remote computer, the remote computer first generates a random number to be thereafter utilized by the administrator in a Message 5 digest (MD5). In each case, the remote system digest is then compared to the received digest and if the digest matches the received digest, then the requested administration request is granted and the system is updated accordingly.
The invention is best understood from the following detailed description when read in connection with the accompanying drawing. The various features of the drawings are not specified exhaustively. On the contrary, the various features may be arbitrarily expanded or reduced for clarity. Included in the drawing are the following figures:
a is a flow diagram of an embodiment of the present invention for securing a communication access.
b is a flow diagram of an embodiment of the present invention for securing a communication access.
In the figures to be discussed the circuits and associated blocks and arrows represent functions of the process according to the present invention which may be implemented as electrical circuits and associated wires or data busses, which transport electrical signals. Alternatively, one or more associated arrows may represent communication (e.g., data flow) between software routines, particularly when the present method or apparatus of the present invention is implemented as a digital process.
The invention provides a method for a web browser based remote administration system to maintain its security by utilizing an ActiveX control or a plug-in, without relying on HTTPS protection to transact management information. The invention does not burden the embedded system and thus is ideally suited for the remote administration of embedded systems. The invention provides a method to calculate a security code base upon identical algorithms in the administrative system having the browser and the embedded system. When the browser-based administrator submits the management information, an operator packages the control information as a string and invokes the security function in the plug-in with the string as a parameter. After the security function returns the result, the operator sends the form data together with a coded digest to the remote system. The digest may be embedded in the form data, for example, as a hidden field.
In accordance with
As further illustrated in
In accordance with the present principles, the an access 160 enables each stationary or mobile terminals 1401-n, to securely access the WLAN 115 by authenticating and thereafter providing a means to create the administrative forms that ensure a secure traffic flow between both the terminal as well as its communication system components, through such gateways 121, firewalls 122 that may exist as part of the larger network and communication paths 152 and 154 which denote HTTP and non-HTTP communication routing. The manner in which the access 160 enables such secure access can best be understood by reference to
The sequence of interactions that occurs over time among a stationary or wireless communication devices, say terminal 140n, the public WLAN 115, the local web server 120, and the authentication server 150 is described under the convention of an IEEE 802.1x protocol, wherein the access point 130n of
More specifically, with reference to
Upon receiving 320 the form information, the remote system 150 generates a random number 330 and stores the number 335 for future reference. It also communicates 340 the number to the administrator 1401-n. The administrator 1401-n security function concatenates 260 the random number, an administrator password (previously stored in the in the plug-in) and the string parameter. Thereafter, a digest, such as a Message 5 digest (MDS), is generated 270 for the concatenated result and is returned to the security function. The process includes utilizing the real time operator such as JavaScript to then embed the result from the security function into the form containing the management information and sends 275 the form to remote computer 150, thereby completing the submission. The remote computer utilizes the stored random number, the password and the received data to generate 350 a MD5 digest. If the digest matches 355 the received digest then the requested administration is granted 360 and the system is appropriately updated. If there is no match access is denied 356. In subsequent communication where management information is to be communicated from the administrator to the remote computer 150, the remote computer 150 first generates a random number to be thereafter utilized by the administrator in a Message 5 digest (MD5). In each case, the remote system digest is then compared to the received digest and if the digest matches the received digest, then the requested administration request is granted and the system is updated accordingly.
It is to be understood that the form of this invention as shown is merely a preferred embodiment. Various changes may be made in the function and arrangement of parts; equivalent means may be substituted for those illustrated and described; and certain features may be used independently from others without departing from the spirit and scope of the invention as defined in the following claims.
This application claims the benefit of U.S. Provisional Application No. 60/454,582, filed Mar. 14, 2003, and incorporated herein by reference.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US04/07411 | 3/11/2004 | WO | 9/14/2005 |