Home
Offering and provisioning secured wireless virtual private network
Contents
1. 40 45 65 4 between elements within electronic device 110 such as dur ing start up is typically stored in ROM 131 RAM 132 typi cally contains data and or program modules that are imme diately accessible to and or presently being operated on by processing unit 120 By way of example and not limitation FIG 1 illustrates operating system 134 application programs 135 other program modules 136 and program data 137 The electronic device 110 may also include other remov able non removable volatile nonvolatile computer storage media By way of example only FIG 1 illustrates a hard disk drive 141 that reads from or writes to non removable non volatile magnetic media a magnetic disk drive 151 that reads from or writes to a removable nonvolatile magnetic disk 152 and an optical disk drive 155 that reads from or writes to a removable nonvolatile optical disk 156 such as a CD ROM DVD or other optical media Other removable non remov able volatile nonvolatile computer storage media that can be used in the exemplary operating environment include but are not limited to magnetic tape cassettes flash memory cards digital versatile disks digital video tape solid state RAM solid state ROM and the like The hard disk drive 141 is typically connected to the system bus 121 through a non removable memory interface such as interface 140 and mag netic disk drive 151 and optical disk drive 155 are typically connected to the sy
2. 35 40 45 50 55 60 65 2 FIG 2 depicts a network topology showing a variety of network connections FIG 3 depicts a simplified block diagram showing physi cal and logical connections between an electronic device and a server FIG 4 depicts a representative user interface screen for selecting a network FIG 5 depicts a representative user interface screen pre senting network information FIG 6 depicts a representative user interface screen show ing connection status FIG 7 depicts a representative user interface screen show ing additional status FIG 8 depicts a representative user interface screen show ing status and offering a secure option FIG 9 depicts a representative user interface screen offer ing selections for secure network services FIG 10 depicts a representative user interface screen for connecting to a secure network service FIG 11 depicts a representative user interface screen for activating an account with a secure network service FIG 12 depicts a representative user interface screen for storing secure network service settings FIG 13 depicts a representative user interface screen for storing network connection settings FIG 14 depicts a flowchart of an exemplary method for selecting and securing network connections and storing related preferences DETAILED DESCRIPTION Although the following text sets forth a detailed descrip tion of numerous different embodiments it sh
3. LGL A1SVAOWSY JIAYAOWIY NON sna WALSAS S6L O61 ozi Leb YSTIONLNOD SOIHdVeD LINN ONISSAIOUd LINN OLdANO z tri SNAYHY9OYd WALSAS NOILVONdd 9NILYY JdO BEL SITNAOWN WvYS0ud YSHLO BEL SWYYDOYd NOILVOIIddv vel WALSAS ONILVYSdO Cer wya TEL wow U S Patent Mar 5 2013 Sheet 2 of 14 US 8 392 560 B2 Fig 2 U S Patent Mar 5 2013 Sheet 3 of 14 US 8 392 560 B2 U S Patent Mar 5 2013 Sheet 4 of 14 US 8 392 560 B2 400 402 O Connect to a Network Select the network you want to connect to 404 Information sent over this network may be visible to others W Home_net ii Oe 408 Patrick_meeting Security enabled network 406 Hotel Fiat 410 Other connection options 412 Connect Cancel 414 Manage wireless networks 416 Fig 4 U S Patent Mar 5 2013 Sheet 5 of 14 US 8 392 560 B2 on QO 502 504 Connect to a Network aia HotelFiat is an unsecured network 506 Help make my network secure Connect to this network but show me how to make it secure 508 Connect anyway Connect to different network Cancel Fig 5 U S Patent Mar 5 2013 Sheet 6 of 14 US 8 392 560 B2 D Q 602 O men Connecting to HotelFiat Cancel Fig 6 U S Patent Mar 5 2013 Sheet 7 of 14 US 8 392 560 B2 N Q o 02 7 Connect to a Network aa Connecting to HotelFiat Acquiring IP Address Cancel Fi
4. tions data structures program modules or other data Com puter storage media includes but is not limited to RAM ROM EEPROM FLASH memory or other memory technol ogy CD ROM digital versatile disks DVD or other optical disk storage magnetic cassettes magnetic tape magnetic disk storage or other magnetic storage devices or any other medium which can be used to store the desired information and which can accessed by electronic device 110 Commu nication media typically embodies computer readable instructions data structures program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media The term modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal By way of example and not limitation communication media includes wired media such as a wired network or direct wired connec tion and wireless media such as acoustic radio frequency infrared and other wireless media Combinations of any of the above should also be included within the scope of computer readable media The system memory 130 includes computer storage media in the form of volatile and or nonvolatile memory suchas read only memory ROM 131 and random access memory RAM 132 A basic input output system 133 BIOS con taining the basic routines that help to transfer information
5. vendor or security requirement e g a request for a VPN A setting manager module for saving settings correspond ing to repeating selected behaviors when the network monitor determines subsequent availability of the wireless network A pre load manager module may store one or more network security offerings As discussed below one implementation of the pre load manager may be an OEM pre installation kit A setting manager module may operate in conjunction with the presentation manager for saving settings corresponding to automatically securing all future network connections when a response collected by the presentation manager indicates the user prefers to use a security service for unsecured net work connections FIG 4 depicts a user interface screen for selecting a net work Window 400 shows a series of networks have been detected as being available specifically a network 402 with an indication 404 that the connection may not be secure a network 406 with an indication 408 that the host electronic device such as electronic device 302 of FIG 3 is already connected and a network 410 for example an ad hoc peer to peer network group with an indication 412 that the net work is available and has security enabled Additional selec US 8 392 560 B2 7 tions may include an option for other connections for hundred 14 and an option to manage wireless network 416 Connect 418 and cancel 420 buttons may be used to navigate from the
6. window 400 For the purpose of our example the user selects the HotelFiat network 402 FIG 5 a representative user interface screen 500 present ing network information is discussed and described After receiving a selection of network for example at FIG 4 a connection manager on the electronic device 302 may present information about the selected network The interface screen 500 may notify a user via message 502 that the selected network in this case HotelFiat is unsecured Options may be presented for example an offer to secure the network 504 an option to connect without security 506 and an offer to con nect to another network 508 Selecting the offer to connect to another network 508 may in effect return the user to the screen of FIG 4 To continue the example the first selection 504 is chosen FIG 6 depicts a representative user interface screen 600 showing status 602 Similarly FIG 7 depicts a representative user interface screen 700 showing additional status 702 FIG 8 shows a representative user interface screen 800 showing status 802 indicating the network connection has been completed Because at FIG 5 selection 504 was made requesting help in securing the connection selection 804 may be presented Selection 804 allows the user to continue secur ing the network For this exemplary embodiment selection 804 is chosen FIG 9 shows a representative user interface screen 900 offering selections for secure netwo
7. 229 709 227 370 338 370 252 726 4 726 6 701 1 713 168 57 ABSTRACT 58 Field of Classification Search ee 709 225 An electronic device may present a user interface for making See application file for complete search history selections related to connecting to a network or selecting a network from a plurality of available networks Additionally 56 References Cited a user interface may give a user an opportunity to secure to an open unsecure connection for example an ad hoc wireless U S PATENT DOCUMENTS connection such as may be found at a coffee shop A selection 5 875 394 A 2 1999 Daly et al of security offerings may be made from a user interface AEN a Da T al 709 227 SOreen including pre populated service providers A user may 6 463 534 BI 10 2002 Geigeretal 713 168 be allowed to save preferences for connecting to new net 6 529 727 Bl 3 2003 Findikli et al works as well as preferences related to previously used net 6 628 934 B2 9 2003 Rosenberg et al works Further the user may save preferences for invoking z 39 5 33 B5 2 Sah reat E Be S security services on a per network or pan network basis The 4 5 ALCKAL CU AL co cc eee eee ee 2002 0095602 Al 7 2002 Pherson et al security service may a known tunneling protocol i e VPN 2003 0028805 A1 2 2003 Lahteenmaki 713 201 Such as L2TP or PPTP 2003 0050918 A1 3 2003 Pilkington et al 707 1 2003 0061364 A1 3 2
8. client side of the tunneling protocol when the service provider is present and a secure trusted connection between endpoint computer 314 and service provider 312 exists the secure communication connection 316 may termi nate at the service provider 312 The service provider 312 may be a commercial service a free service or a service offered by an enterprise associated with its own users Client side application software from more than one service pro vider may be preinstalled on an electronic device 302 and presented for selection by user at the time a network connec tion is made As will be discussed both network selection and secure service preferences may be stored for future use In another embodiment a series of software modules may support the operations associated with both connecting to a network monitoring the security of the connection and acti vating the services necessary to support a VPN connection A network monitor module may be implemented to determine availability of a network especially a wireless network A presentation manager module may operate in conjunction with the network monitor and present the available networks The presentation manager may also present network security offerings A link manager module may be used to activate a selected security offering when the presentation manager receives selections from a user The selections may include both a selection ofa network and a selection security offering e g
9. network level connection to be automatically secured using the VPN 10 A client device comprising a processor and storage the processor determining at the client device using a wire less network interface of the client device that at least one wireless network is in range the processor determining at the client device when at least one existing wireless network is available for connecting with the processor presenting a user interface 1 showing the at least one existing wireless network and ii enabling the user to make a selection for connecting to the at least one existing wireless network US 8 392 560 B2 11 12 the processor receiving an indication ofa selected wireless the processor receiving a user input indicating selection of network with which to connect the service provider and the processor determining that the selected wireless net in accordance with the user input the storage storing on the work is unsecured client device security information such that a next time the wireless network interface connecting to the selected 5 the client device forms a next network level connection wireless network to form a network level connection to the wireless network the security information causes after the connecting based on the determining that the the next network level connection to be automatically selected wireless network is unsecured the processor secured using the VPN presenting a user interface indicating a serv
10. only and are not limiting upon the scope of the invention We claim 1 A method of securing a network connection between a client device and an endpoint server comprising determining at a client device using a wireless network interface of the client device that at least one wireless network is in range determining at the client device when at least one existing wireless network is available for connecting with presenting a user interface i showing the at least one existing wireless network and ii enabling the user to make a selection for connecting to the at least one exist ing wireless network receiving an indication of a selected wireless network with which to connect determining that the selected wireless network is unse cured connecting to the selected wireless network to form a net work level connection after the connecting based on the determining that the selected wireless network is unsecured presenting a user interface indicating a service provider that secures network connections using a virtual private network VPN receiving a user input indicating selection of the service provider and in accordance with the user input storing on the client device security information such that a next time the client device forms a next network level connection to the wireless network the security information causes the next network level connection to be automatically secured using the VPN 2 The method of c
11. 003 Banerjee et al 0 0 0 709 229 10 Claims 14 Drawing Sheets 900 902 Connect to a Network Select the network you want to connect to 904 MSN Secure Secure your wireless connection with MSN Secure a free 906 Get 6 months of free secure Woodgrove Establish a secure WiFi connection 908 F US 8 392 560 B2 Page 2 OTHER PUBLICATIONS Microsoft Add edit or remove wireless network connections on a client computer Jan 2005 Microsoft all pages Microsoft Security information for wireless networks Jan 2005 Microsoft all pages International Search Report for PCT US2007 010568 mailed Nov 13 2007 Written Opinion for PCT US2007 010568 mailed Nov 13 2007 Fazel et al Tackling Security Vulnerabilities in VPN based Wire less Deployments IEEE Communications Society pp 100 104 2004 Mghazli et al Framework for PPVPN Operations and Manage ment Internet Draft Memo pp 1 25 2003 cited by examiner US 8 392 560 B2 Sheet 1 of 14 Mar 5 2013 U S Patent 081 LLL YILNANOD SLOWSY MYOMLIN WAYV 1V907 OLL maa ia eae cee ee col aQuYvOdA3y wane gn eee ROM J vV3Y3LNI MYOMLAN SS3T3qIM JOVSYSLNI WduaHdldad Andino SOVSYALNI LNdNi YISN Bis orl Gpl sIIMNdOWN WYY90Yd Y3HLO JOV4YJLNI AOVAYALNI AYOWSW IOA NON AYOWAW IOA NON
12. 1204 Prompt me each time connect to a new network 1206 _ Automatically update the MSN Secure service More Close Fig 12 1208 U S Patent Mar 5 2013 Sheet 13 of 14 US 8 392 560 B2 Successfully connected 1302 Choose your preferences for HotelFiat SS 1304 Next time am in range of HotelFiat automatically connect Other user on this computer can also connect to HotelFiat 1306 Automatically secure my connection Close 1308 Fig 13 U S Patent Mar 5 2013 Sheet 14 of 14 US 8 392 560 B2 12 Discover available network s Automatic connectio preference for available network 16 36 ee Display available networks Connect to network using selected security settings 18 Receive selection 20 Connection Preference for elected network 22 Connection Preference for any network 34 24 ee Connect and display security status Activate selected 26 network security if Present secure connection providers 28 bE save preferences 30 Validate account Fig 14 any US 8 392 560 B2 1 OFFERING AND PROVISIONING SECURED WIRELESS VIRTUAL PRIVATE NETWORK SERVICES BACKGROUND Computer security and the security of data communica tions with a computer have been a concern for some time The proliferation of portable computing devices laptops PDAs and the like have increased the opportunities for security breaches Addition
13. US008392560B2 az United States Patent 10 Patent No US 8 392 560 B2 Jones et al 45 Date of Patent Mar 5 2013 54 OFFERING AND PROVISIONING SECURED See R 3200 ree et al sas AIYA Vere Eaa WIRELESS VIRTUAL PREVATE NETWORK 2003 0200299 Al 10 2003 Jamison III SERVICES 2004 0097259 Al 5 2004 Toor et al 2004 0120260 A1 6 2004 Bernier etal eee 370 252 75 Inventors David Jones Seattle WA US Thomas 2004 0122960 Al 6 2004 Hall et al 2004 0242228 Al 12 2004 Lee etal W Kiehinel Seattle Ness 2004 0247126 Al 12 2004 McClellan 2005 0022001 A1 1 2005 Bahl etal 73 Assignee Microsoft Corporation Redmond WA 2005 0184145 A1 8 2005 Law S a US 2005 0195667 Al 9 2005 DiSanto et al Notice Subject to any disclaimer the term of this FOREIGN PATENT DOCUMENTS patent is extended or adjusted under 35 JP 2009 507853 6 2005 U S C 154 b by 1446 days WO WO 2005 034465 Al 4 2005 OTHER PUBLICATIONS 21 Appl No 11 413 573 Netgear Reference Manual for the 54 Mbps Wireless Router aad WGR614 v6 Apr 21 2005 Netgear all pages 22 Filed Apr 28 2006 Sweex IEEE 802 1g Wireless Router User s Manual Oct 21 R eo heed 2003 Sweex all pages 65 Prior Publication Data John Howie VPN Enabled Wireless Routers May 2003 Windows US 2007 0255840 Al Nov 1 2007 amp Net Magzine all pages 51 Int Cl Continued GO6F 15 173 2006 01 Primary Examiner Hua Fan 52 U S Cl 709 225 709
14. ally the widespread availability of open network access points particularly wireless access points have also increase the opportunities for security breaches Mobile workers routinely use portable electronic devices in coffee shops airport lounges automobile rest stops or even when visiting other corporation s networks during a business trip Often such mobile workers are faced with a choice of not completing their work or risking exposure of valuable or confidential data Given such a choice mobile workers often choose the latter and hope for the best Secure sockets SSL or SSL2 may be used at an applica tion level to secure communications between two applica tions for example a web browser and a payment server However an SSL connection is only effective for the single application level session Secure network services or virtual private networks VPN such as layer two tunneling protocol L2TP and point to point tunneling protocol PPTP allow security for all com munication between endpoints over open i e unsecure net works But the set up and maintenance of such connections are cumbersome and often require either specific knowledge or administrator access SUMMARY Electronic devices may be equipped with a connection manager for managing connections to available networks especially wireless networks The connection manager may monitor the available networks and evaluate their relative security A user interface
15. any structure it is not intended that the scope of any claim element be interpreted based on the application of 35 U S C 112 sixth paragraph Much of the inventive functionality and many of the inven tive principles are best implemented with or in software pro grams or instructions and integrated circuits ICs such as application specific ICs It is expected that one of ordinary skill notwithstanding possibly significant effort and many design choices motivated by for example available time current technology and economic considerations when US 8 392 560 B2 3 guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation Therefore in the interest of brevity and minimization of any risk of obscuring the principles and concepts in accordance to the present invention further discussion of such software and ICs if any will be limited to the essentials with respect to the principles and concepts of the preferred embodiments FIG 1 provides a structural basis for an electronic device suitable for performing the methods and hosting the com puter readable media related to the instant disclosure The electronic device 110 may be a standard computer but may also be a portable device suitable for use by a mobile worker Exemplary electronic devices may include a laptop computer a handheld computer a personal digital assista
16. bsequently con necting to the same network or for further use when deter mining to secure connections to other new networks When required an account validation process may be com pleted at block 30 and the network may be secured for example using a L2TP or PPTP tunneling protocol at block 34 When preferences for network connection are found at blocks 14 20 or 22 a connection to the preferred network may be made at block 36 and when so indicated the con nection secured Although the forgoing text sets forth a detailed description of numerous different embodiments of the invention it should be understood that the scope of the invention is defined by the words of the claims set forth at the end of this patent The detailed description is to be construed as exemplary only and does not describe every possibly embodiment of the invention because describing every possible embodiment would be impractical if not impossible Numerous alterna tive embodiments could be implemented using either current technology or technology developed after the filing date of this patent which would still fall within the scope of the claims defining the invention Thus many modifications and variations may be made in the techniques and structures described and illustrated herein without departing from the spirit and scope of the present invention Accordingly it should be understood that the meth ods and apparatus described herein are illustrative
17. ction 306 The computer 304 may be an access point a local access server LAS gateway or the like The network connection 306 may be wired or wireless as shown in FIG 2 The computer 304 may be connected to a wide area network 308 such as the Internet or network connection 310 The wide area network 308 in turn may be connected to a service 20 25 30 35 40 45 50 55 60 65 6 provider 312 and further to an endpoint computer 314 In some embodiments the service provider 312 may not be present and the physical and logical connections may directly couple to endpoint computer 314 A logical connection 316 may be made between electronic device 302 and the endpoint computer 314 even though the physical connection is via networks 306 310 and intermediate points 304 308 and optionally 312 The logical connection 316 may use one of several specialized protocols for securing communication between end points For example a layer two tunneling protocol L2TP known in the art encapsulates data coming from either endpoint 302 or 314 and passes it through the various physical networks in a secure fashion until it reaches the other endpoint and is the encapsulated in presented to the protocol stack of the receiving endpoint Another such protocol is point to point tunneling protocol PPTP In one embodiment a client may be installed on the elec tronic device 302 for supporting set up operation and tear down of the
18. e with other devices The communications con nection 170 is an example of communication media The communication media typically embodies computer readable instructions data structures program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media A modulated data signal may be a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal By way of example and not limitation communication media includes wired media such as a wired network or direct wired connection and wireless media such as acoustic RF infrared and other wireless media Computer readable media may include both storage media and communication media FIG 2 depicts a network topology showing a variety of network connections An electronic device 202 is shown coupled through a number of networks protocols and media to a wide area network 204 such as the Internet a corporate network or an Internet service provider ISP The electronic device 202 may be the same or similar to the electronic device 110 of FIG 1 The connections illustrated are not necessarily all available at the same time nor is the electronic device 202 necessarily connected to more than one network at once if connected at all FIG 2 shows the electronic device 202 connected to a home network 206 via a wired connection 208 although wireless c
19. er vice Icon one for each entry CustomVPNdescription Customizes description offer information CustomVPNlocation Configures a custom shell execute path to launch the custom wireless VPN service installer website FIG 10 depicts a representative user interface screen 1000 for connecting to a secure network service allowing presen tation of additional details 1002 by the offer provider and confirmation 1004 of the selected service by the user the text string 0 25 30 35 40 45 50 55 60 8 FIG 11 depicts a representative user interface screen 1100 for activating an account with a secure network service After confirming the selection of the service at FIG 10 interface screen 1100 may be presented to allow the user to complete registration fields 1102 and select a language using drop down box 1104 When completed the button 1106 allows proceeding to the next screen FIG 12 depicts a representative user interface screen 1200 for storing secure network service settings Several selections may be chosen by a user for subsequent use when connecting to networks including wireless networks Selection 1202 allows a user to automatically secure all future network con nections When selection 1202 is chosen selection 1204 allows the user to require the presentation of prompts related to securing networks that have not been previously accessed Selection 1206 allows the particular secure service to p
20. erform automatic updates When selections have been completed selection button 1208 may be used close the window and proceed FIG 13 is a representative user interface screen 1300 for storing network connection settings for a particular network Selection 1302 specifies that the currently selected network in the exemplary embodiment the network HotelFiat should be automatically connected whenever it is available in the future Selection 1304 allows the user to specify that other users of the same electronic device 302 can also connect to the selected network Selection 1306 allows a user to specify automatically securing future all connections with the selected network in this example HotelFiat The button 1308 may be used to close the window and continue normal operation The selections made in FIGS 12 and 13 may be used by future sessions for determining how to handle known networks as they become available FIG 14 depicts a flowchart of an exemplary method 10 for selecting and securing network connections and storing related preferences At block 12 a connection manager or similar component may discover one or more networks and determine when at least one network is available for a con nection At block 14 a value corresponding to network set tings may be read to determine if instructions or preferences are available related to any of the networks discovered at block 12 If prior instructions or preferences are found t
21. g 7 U S Patent Mar 5 2013 Sheet 8 of 14 US 8 392 560 B2 802 Oe Successfully connected Choose preferences for HotelFiat ico iO oO 804 Help secure my wireless connection Fig 8 U S Patent Mar 5 2013 Sheet 9 of 14 US 8 392 560 B2 Co io 902 e Connect to a Network Select the network you want to connect to 203 MSN Secure Secure your wireless connection with MSN Secure a free 906 Get 6 months of free secure Woodgrove Establish a secure WiFi connection 908 Fig 9 U S Patent Mar 5 2013 Sheet 10 of 14 US 8 392 560 B2 1004 Ce Secure your wireless connection using MSN secure VPN service Search Browse Shop Stay in touch Securely Conduct on line transactions without disclosing Fig 10 U S Patent Mar 5 2013 Sheet 11 of 14 US 8 392 560 B2 O Network Security Enter your information to sign up for MSN Secure Firstname C o oS lastname Ld Organization CO Language Already have an account Fig 11 U S Patent Mar 5 2013 Sheet 12 of 14 US 8 392 560 B2 Network security Successfully configured your MSN Secure account Congratulations you have successfully created your new secure account This service can protect your wireless connection and prevent unauthorized access to your data 1202 Choose preferences for MSN Secure Automatically secure all wireless connections More
22. hey may be followed and may specify that one of the networks is to automatically be connected and perhaps automatically secured If no instructions are available at block 14 a user interface may be invoked at block 16 to display the available networks and at block 18 to receive a selection of a network to connect with or to receive a selection to not connect with any net work When a network is selected preferences may again be checked at block 20 to determine if a connection preference has been made for that particular selected network for example to always secure a connection to that particular network When no preferences are found for the particular selected network at block 22 a determination may be made whether there is a connection preference for any network in general obviously including the currently selected network When no general connection preference is found the selected network may be connected and the security status displayed at block 24 If the user requested help in securing the network connec tion at either block 18 or at block 24 a user interface may be displayed at block 26 offering to secure the network connec tion When more than one secure network service provider has been provisioned the user may make a selection from the choices available and the selection received at block 28 US 8 392 560 B2 9 When indicated by the user the selections made at block 28 may be saved for future reference when su
23. ice provider that secures network connections using a virtual private network VPN a E ee ae
24. laim 1 further comprising reading the security information after determining when at least one existing wireless network connection is available 3 The method of claim 1 further comprising installing a network connection manager that determines using the wire less network interface of the client device when one or more 0 30 40 45 55 65 10 wireless networks are available for connection selects the wireless network with which to connect presents information about the selected network and activates the VPN without action on the part of the user 4 The method of claim 1 further comprising securing the network level connection when the receiving a response to an offering of a plurality of service providers including the ser vice provider 5 The method of claim 4 wherein the VPN uses either a layer two tunneling protocol L2TP or a point to point tun neling protocol PPTP 6 The method of claim 1 wherein the stored security information causes the client device to use the VPN to secure any network connection 7 The method of claim 1 wherein the stored security information includes information indicating a user selection regarding a preference for use of the VPN with respect to future network connections 8 A method according to claim 1 wherein the security information causing the next network level connection to be automatically secured using the VPN occurs after the wireless network has again been pre
25. nt PDA a smart phone anda voice over Internet protocol VoIP appli ance FIG 1 illustrates a computing device in the form of an electronic device 110 Components of the electronic device 110 may include but are not limited to a processing unit 120 a system memory 130 and a system bus 121 that couples various system components including the system memory to the processing unit 120 The system bus 121 may be any of several types of bus structures including a memory bus or memory controller a peripheral bus and a local bus using any of a variety of bus architectures By way of example and not limitation such architectures include Industry Standard Architecture ISA bus Micro Channel Architecture MCA bus Enhanced ISA EISA bus Video Electronics Standards Association VESA local bus and Peripheral Component Interconnect PCI bus also known as Mezzanine bus Electronic device 110 typically includes a variety of com puter readable media Computer readable media can be any available media that can be accessed by electronic device 110 and includes both volatile and nonvolatile media removable and non removable media By way of example and not limi tation computer readable media may comprise computer storage media and communication media Computer storage media includes volatile and nonvolatile removable and non removable media implemented in any method or technology for storage of information such as computer readable instruc
26. onnections in home environments are increasingly common A coffee shop 212 illustrates another network access location in this exemplary embodiment the connec tion between electronic device 202 and coffee shop 212 is over wireless connection 214 The coffee shop may be con nected to the wide area network 204 over connection 216 Another access point may be represented by the airport 218 A wireless connection 220 may be used to couple the elec tronic device 202 with the airport 218 and subsequently to the wide area network 204 over connection 222 When the electronic device 202 is in range of a wireless network e g networks 214 220 or is physically connected to a wired network e g network 208 a user interface may be presented on the electronic device 202 to invite a user to select a network and when the selected network is not secure to add security to the network The user interface and selection pro cesses are discussed in more detail below with respect to FIGS 4 13 Network security may include one or all of the elements of AAA that is authentication authorization and accounting For example a secure network connection or VPN may guarantee that packets are not tampered or sniffed while enroute between endpoints FIG 3 is a simplified and representative block diagram showing physical and logical connections between an elec tronic device and a network An electronic device 302 may connect to a computer 304 over a network conne
27. ould be under stood that the legal scope of the description is defined by the words of the claims set forth at the end of this disclosure The detailed description is to be construed as exemplary only and does not describe every possible embodiment since describ ing every possible embodiment would be impractical if not impossible Numerous alternative embodiments could be implemented using either current technology or technology developed after the filing date of this patent which would still fall within the scope of the claims It should also be understood that unless a term is expressly defined in this patent using the sentence As used herein the term is hereby defined to mean or a similar sentence there is no intent to limit the meaning of that term either expressly or by implication beyond its plain or ordi nary meaning and such term should not be interpreted to be limited in scope based on any statement made in any section of this patent other than the language of the claims To the extent that any term recited in the claims at the end of this patent is referred to in this patent in a manner consistent with a single meaning that is done for sake of clarity only so as to not confuse the reader and it is not intended that such claim term by limited by implication or otherwise to that single meaning Finally unless a claim element is defined by recit ing the word means and a function without the recital of
28. presenting the network selections to a user may indicate the nature of the connection with respect to security When a selection of an open network is made the user may be presented with an option to establish a secure network connection using a secure network service e g VPN One or more secure network service offerings may be preprogrammed into the electronic device for selection by the user The connection manager may be able to activate the selected secure network service resulting in a secure connec tion with little or no action on the part of the user User selections with respect to a particular network may be stored and automatically invoked when subsequently encountering that network Similarly user selections with respect to secur ing network connections may be stored and automatically invoked when using the particular network again or maybe automatically invoked for any network subsequently selected For example an electronic device may always connect to its own business network when available and will not use other network options The business network may not require a secure network service while the electronic device may prefer a particular coffee shop network to a gas station net work when both are available but may opt to use a secure network service when connecting to either BRIEF DESCRIPTION OF THE DRAWINGS FIG 1 depicts a simplified and representative block dia gram of an electronic device 20 25 30
29. rk connection As dis cussed above client software may be installed on the elec tronic device 302 supporting secure connections The client software may be preinstalled at the time of manufacture or initial programming may be downloaded post manufacture or even post delivery to a consumer Three exemplary net work security selections are shown in FIG 9 first provider 902 second provider 904 and third provider 906 At least one button 908 may be used to proceed When the client software is preinstalled it may be prein stalled through an original equipment manufacturer OEM pre installation kit such as one available through Microsoft or an equivalent tool The OEM pre installation kit allows a product vendor to specify the kind of offer being made to a user as well as specific text and graphics associated with the offer Exemplary categories for offer pre installation are shown below To provide OEMs the ability to alter the default behavior of the secure networks they may provide an XML binary large object blob that contains the following or similar informa tion CustomVPNOffer Determines option s for presentation to the user When set to 1 the offer is presented when set the 0 the offer is not presented CustomVPNTitleText Customizes the text string descrip tion for the VPN offer page replaces default string To sign up now select a wireless security provider CustomVPNIconPath Location of the custom VPN s
30. sented and selected by the user using the user interface 9 One or more computer readable storage media wherein the storage media is not a signal the storage media storing information to enable a computing device to perform a pro cess the process comprising determining at a client device using a wireless network interface of the client device that at least one wireless network is in range determining at the client device when at least one existing wireless network is available for connecting with presenting a user interface i showing the at least one existing wireless network and ii enabling the user to make a selection for connecting to the at least one exist ing wireless network receiving an indication of a selected wireless network with which to connect determining that the selected wireless network is unse cured connecting to the selected wireless network to form a net work level connection after the connecting based on the determining that the selected wireless network is unsecured presenting a user interface indicating a service provider that secures network connections using a virtual private network VPN receiving a user input indicating selection of the service provider and in accordance with the user input storing on the client device security information such that a next time the client device forms a next network level connection to the wireless network the security information causes the next
31. stem bus 121 by a removable memory interface such as interface 150 The drives and their associated computer storage media discussed above and illustrated in FIG 1 provide storage of computer readable instructions data structures program modules and other data for the electronic device 110 In FIG 1 for example hard disk drive 141 is illustrated as storing operating system 144 application programs 145 other pro gram modules 146 and program data 147 Note that these components can either be the same as or different from oper ating system 134 application programs 135 other program modules 136 and program data 137 Operating system 144 application programs 145 other program modules 146 and program data 147 are given different numbers here to illus trate that at a minimum they are different copies A user may enter commands and information into the electronic device 110 through input devices such as a keyboard 162 and cursor control device 161 commonly referred to as a mouse track ball or touch pad Other input devices not shown may include a microphone joystick game pad satellite dish scanner or the like These and other input devices are often connected to the processing unit 120 through an input inter face 160 that is coupled to the system bus but may be con nected by other interface and bus structures such as a parallel port game port or a universal serial bus USB A display device 191 is also connected to the s
32. ystem bus 121 via an interface such as a graphics controller 190 In addition to the display 191 external electronic devices or peripherals may be connected to the electronic device 110 via output peripheral interface 195 Such peripheral output devices may include speakers or a printer not depicted although they are not generally used during mobile operation The electronic device 110 may operate in a networked environment using logical connections to one or more remote computers such as a remote computer 180 The remote com puter 180 may be a personal computer a server a router a network PC a peer device or other common network node and typically includes many or all of the elements described above relative to the electronic device 110 The logical con nections depicted in FIG 1 include a local area network LAN 171 but may also include other networks such as a wide area network or the Internet Such networking environ US 8 392 560 B2 5 ments are commonplace in offices enterprise wide computer networks intranets and peer to peer networks When used in a LAN networking environment the elec tronic device 110 may be connected to the LAN 171 through a network interface or adapter 170 In a networked environ ment program modules not depicted relevant to the elec tronic device 110 or portions thereof may be stored in the remote memory storage device The communications connection 170 allows the device to communicat
Download Pdf Manuals
Related Search
Related Contents
XM-GTX6041 User`s Manual Bedienungsanleitung Operating instructions Mode d'emploi Zebra DS6878 KL-50W1 MONOPRICE 10594 Windows User`s Manual 00055222 / Sansa e140 1GB MP3 Player Modèle LCR7W Norstone Tolke Radio Control Basics Copyright © All rights reserved.
Failed to retrieve file