The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 11, 2015

Filed:

Feb. 22, 2008
Applicants:

Hui Shen, Sammamish, WA (US);

Amer A. Hassan, Kirkland, WA (US);

Yi LU, Sammamish, WA (US);

Thomas W. Kuehnel, Seattle, WA (US);

Andrew T. Baron, Redmond, WA (US);

Deyun Wu, Issaquah, WA (US);

Inventors:

Hui Shen, Sammamish, WA (US);

Amer A. Hassan, Kirkland, WA (US);

Yi Lu, Sammamish, WA (US);

Thomas W. Kuehnel, Seattle, WA (US);

Andrew T. Baron, Redmond, WA (US);

Deyun Wu, Issaquah, WA (US);

Assignee:
Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06Q 30/02 (2012.01); H04W 12/10 (2009.01); H04L 9/32 (2006.01); H04W 48/08 (2009.01); H04W 48/16 (2009.01);
U.S. Cl.
CPC ...
G06Q 30/02 (2013.01); H04L 9/3263 (2013.01); H04L 9/3271 (2013.01); H04L 63/12 (2013.01); H04W 12/10 (2013.01); G06Q 30/0251 (2013.01); G06Q 30/0267 (2013.01); H04L 2209/56 (2013.01); H04L 2209/60 (2013.01); H04L 2209/805 (2013.01); H04W 48/08 (2013.01); H04W 48/16 (2013.01);
Abstract

Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.


Find Patent Forward Citations

Loading…