-
公开(公告)号:US20200322801A1
公开(公告)日:2020-10-08
申请号:US16884604
申请日:2020-05-27
Applicant: Cisco Technology, Inc.
Inventor: Shivaji Pundlik Diwane , Hungjen Sean Yang , Sundara Paal Rani Thirumalaiappan , Keith Neil Mark Dsouza , Sendilvadivu Ganesan
Abstract: In one illustrative example, a mobile network extender has a network interface configured to connect with a host router and a cellular modem configured to provide a wireless link for communications via a cellular mobile network. In a pairing process, the extender may establish a secure encrypted channel with the router via the network interface. In a locking process, the extender may receive information from the router and verify the information. Upon verification, the extender may be set in a locked state in which the extender is logically locked to the router. The extender may also receive and store a secret session key from the router, and permit the router to acquire the extender for communications. In the locked state, the extender may permit or deny subsequent router acquisition upon router reconnection based on verifying, using the secret session key, authentication data received via the network interface.
-
公开(公告)号:US20200288317A1
公开(公告)日:2020-09-10
申请号:US16291833
申请日:2019-03-04
Applicant: Cisco Technology, Inc.
Inventor: Shivaji Pundlik Diwane , Hungjen Sean Yang , Sundara Paal Rani Thirumalaiappan , Keith Neil Mark Dsouza , Sendilvadivu Ganesan
Abstract: In one illustrative example, a mobile network extender has a network interface configured to connect with a host router and a cellular modem configured to provide a wireless link for communications via a cellular mobile network. In a pairing process, the extender may establish a secure encrypted channel with the router via the network interface. In a locking process, the extender may receive information from the router and verify the information. Upon verification, the extender may be set in a locked state in which the extender is logically locked to the router. The extender may also receive and store a secret session key from the router, and permit the router to acquire the extender for communications. In the locked state, the extender may permit or deny subsequent router acquisition upon router reconnection based on verifying, using the secret session key, authentication data received via the network interface.
-
公开(公告)号:US11310664B2
公开(公告)日:2022-04-19
申请号:US16884604
申请日:2020-05-27
Applicant: Cisco Technology, Inc.
Inventor: Shivaji Pundlik Diwane , Hungjen Sean Yang , Sundara Paal Rani Thirumalaiappan , Keith Neil Mark Dsouza , Sendilvadivu Ganesan
IPC: H04W12/08 , H04W12/50 , H04W12/069 , H04W12/126 , H04W12/0431
Abstract: In one illustrative example, a mobile network extender has a network interface configured to connect with a host router and a cellular modem configured to provide a wireless link for communications via a cellular mobile network. In a pairing process, the extender may establish a secure encrypted channel with the router via the network interface. In a locking process, the extender may receive information from the router and verify the information. Upon verification, the extender may be set in a locked state in which the extender is logically locked to the router. The extender may also receive and store a secret session key from the router, and permit the router to acquire the extender for communications. In the locked state, the extender may permit or deny subsequent router acquisition upon router reconnection based on verifying, using the secret session key, authentication data received via the network interface.
-
公开(公告)号:US10750368B1
公开(公告)日:2020-08-18
申请号:US16291833
申请日:2019-03-04
Applicant: Cisco Technology, Inc.
Inventor: Shivaji Pundlik Diwane , Hungjen Sean Yang , Sundara Paal Rani Thirumalaiappan , Keith Neil Mark Dsouza , Sendilvadivu Ganesan
Abstract: In one illustrative example, a mobile network extender has a network interface configured to connect with a host router and a cellular modem configured to provide a wireless link for communications via a cellular mobile network. In a pairing process, the extender may establish a secure encrypted channel with the router via the network interface. In a locking process, the extender may receive information from the router and verify the information. Upon verification, the extender may be set in a locked state in which the extender is logically locked to the router. The extender may also receive and store a secret session key from the router, and permit the router to acquire the extender for communications. In the locked state, the extender may permit or deny subsequent router acquisition upon router reconnection based on verifying, using the secret session key, authentication data received via the network interface.
-
-
-