Network access control
First Claim
1. A method comprising:
- receiving, by an access point comprising at least one processor, a first request to establish a first Wi-Fi connection with the access point, from an Internet of Things (IoT) device;
receiving, by the access point, a second request to establish a second Wi-Fi connection from a mobile device;
sending, by the access point, to an administration device a first pre-shared key (PSK) request associated with the first request;
sending, by the access point, to the administration device a second PSK request associated with the second request;
receiving, by the access point and from the administration device, a first PSK comprising a first access configuration to connect to the access point, wherein the first access configuration includes first data that causes the access point to limit at least one of network access duration, time of day access, predetermined data usage limits, bandwidth allocation, relative device priority, Internet access limits, or parental controls;
receiving, by the access point, from the administration device a second PSK with a second access configuration to connect to the access point, wherein the second access configuration includes second data that causes the access point to limit at least one of network access duration, time of day access, predetermined data usage limits, bandwidth allocation, relative device priority, Internet access limits, or parental controls;
sending, by the access point, to the IoT device a first response including at least in part the first PSK;
sending, by the access point, to the mobile device a second response including at least in part, the second PSK;
receiving, by the access point, a first login request from the IoT device, wherein the first login request includes the first PSK;
receiving, by the access point, a second login request from the mobile device, wherein the second login request includes the second PSK;
establishing, by the access point, the first Wi-Fi connection with the first access configuration; and
establishing, by the access point, the second Wi-Fi connection with the second access configuration.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure describes methods, apparatus, and systems related to controlled access data allocation. A device may receive a first request from a first device to establish a first connection with a wireless network. The device may receive a second request from a second device to establish a second connection with the wireless network. The device may determine a first access data for the first device, wherein the first access data is associated with a first access configuration. The device may determine a second access data for the second device, wherein the second access data is associated with a second access configuration, wherein the second access configuration is different from the first access configuration. The device may send the first access data to the first device. The device may send the second access data to the second device. The device may establish the first connection with the first device, wherein the first connection is at the first access configuration. The device may establish the second connection with the second device, wherein the second connection is at the second access configuration.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by an access point comprising at least one processor, a first request to establish a first Wi-Fi connection with the access point, from an Internet of Things (IoT) device; receiving, by the access point, a second request to establish a second Wi-Fi connection from a mobile device; sending, by the access point, to an administration device a first pre-shared key (PSK) request associated with the first request; sending, by the access point, to the administration device a second PSK request associated with the second request; receiving, by the access point and from the administration device, a first PSK comprising a first access configuration to connect to the access point, wherein the first access configuration includes first data that causes the access point to limit at least one of network access duration, time of day access, predetermined data usage limits, bandwidth allocation, relative device priority, Internet access limits, or parental controls; receiving, by the access point, from the administration device a second PSK with a second access configuration to connect to the access point, wherein the second access configuration includes second data that causes the access point to limit at least one of network access duration, time of day access, predetermined data usage limits, bandwidth allocation, relative device priority, Internet access limits, or parental controls; sending, by the access point, to the IoT device a first response including at least in part the first PSK; sending, by the access point, to the mobile device a second response including at least in part, the second PSK; receiving, by the access point, a first login request from the IoT device, wherein the first login request includes the first PSK; receiving, by the access point, a second login request from the mobile device, wherein the second login request includes the second PSK; establishing, by the access point, the first Wi-Fi connection with the first access configuration; and establishing, by the access point, the second Wi-Fi connection with the second access configuration. - View Dependent Claims (2, 3, 4)
-
-
5. A device, comprising:
-
at least one memory that stores computer-executable instructions; and at least one processor configured to access the at least one memory, wherein the at least one processor is configured to execute the computer-executable instructions to; receive a first request from a first device to establish a first connection with a wireless network; receive a second request from a second device to establish a second connection with the wireless network; determine first access data for the first device, wherein the first access data is associated with a first access configuration that includes one or more first restrictions associated with access to the wireless network by the first device; determine second access data for the second device, wherein the second access data is associated with a second access configuration that includes one or more second restrictions associated with access to the wireless network by the second device, wherein the second access configuration is different from the first access configuration; send the first access data to the first device; send the second access data to the second device; establish the first connection with the first device, wherein the first connection is at the first access configuration; and establish the second connection with the second device, wherein the second connection is at the second access configuration. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
receiving, by a first device, a request for access data associated with establishing a wireless connection between a second device and a third device; determining the access data configured for the second device to authenticate data received wirelessly from the third device, wherein the access data includes one or more restrictions associated with the wireless connection between the second device and the third device; and sending to the second device the access data. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification