Dynamic passcodes in association with a wireless access point
First Claim
1. A method comprising:
- during a usage period of a first passcode that enables access to a network and for an initial access request during the usage period for each user device that sends a valid access request to access the network based on the first passcode during the usage period, adding, at an access point, an identifier of the user device to a device list for the first passcode;
after expiration of the first passcode, receiving, at the access point, a first access request from a first device, the first access request encrypted based on the first passcode;
in response to the first access request and before expiration of a usage time of the device list for the first passcode, determining at the access point, whether an identifier of the first device is included in the device list for the first passcode; and
in response to the determining indicating that the identifier of the first device is included in the device list for the first passcode;
generating, at the access point, data representing a second passcode by encrypting the second passcode based on the first passcode;
sending the data representing the second passcode to the first device from the access point; and
removing, at the access point, the identifier for the first device from the device list for the first passcode.
2 Assignments
0 Petitions
Accused Products
Abstract
A method includes, after expiration of a first passcode, receiving, at an access point, a first access request from a first device. The first access request may be encrypted based on the first passcode. The method further includes determining whether an identifier of the first device is included in a device list associated with the first passcode. The device list includes identifiers of devices that accessed the access point using encryption based on the first passcode before the expiration of the first passcode. The method also includes, in response to a determination that the identifier of the first device is included in the device list generating, at the access point, data representing a second passcode by encrypting the second passcode using the first passcode. The method further includes sending the data representing the second passcode to the first device from the access point.
25 Citations
20 Claims
-
1. A method comprising:
-
during a usage period of a first passcode that enables access to a network and for an initial access request during the usage period for each user device that sends a valid access request to access the network based on the first passcode during the usage period, adding, at an access point, an identifier of the user device to a device list for the first passcode; after expiration of the first passcode, receiving, at the access point, a first access request from a first device, the first access request encrypted based on the first passcode; in response to the first access request and before expiration of a usage time of the device list for the first passcode, determining at the access point, whether an identifier of the first device is included in the device list for the first passcode; and in response to the determining indicating that the identifier of the first device is included in the device list for the first passcode; generating, at the access point, data representing a second passcode by encrypting the second passcode based on the first passcode; sending the data representing the second passcode to the first device from the access point; and removing, at the access point, the identifier for the first device from the device list for the first passcode. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a processor of an access point; a memory coupled to the processor, the memory including instructions executable by the processor to perform operations, the operations including; during a usage period of a first passcode that enables access to a network and for an initial access request during the usage period for each user device that sends a valid access request to access the network based on the first passcode during the usage period, adding an identifier of the user device to a device list for the first passcode; after expiration of the first passcode, receiving, from a first device, a first access request to access a local area network, the first access request encrypted based on the first passcode; in response to the first access request and before expiration of a usage time of the device list for the first passcode, determining whether an identifier of the first device is included in the device list for the first passcode; and in response to the determining indicating that the identifier of the first device is included in the device list for the first passcode; generating data representing a second passcode by encrypting the second passcode based on the first passcode; sending the data representing the second passcode to the first device; and removing, at the access point, the identifier for the first device from the device list for the first passcode. - View Dependent Claims (12, 13, 14)
-
-
15. A processor-readable storage device storing instructions that, when executed by a processor of an access point, cause the processor to perform operations, the operations comprising:
-
during a usage period of a first passcode that enables access to a network and for an initial access request during the usage period for each user device that sends a valid access request to access the network based on the first passcode during the usage period, adding an identifier of the user device to a device list for the first passcode; after expiration of the first passcode, receiving a first access request from a first device, the first access request encrypted based on the first passcode; in response to the first access request and before expiration of a usage time of the device list for the first passcode, determining whether that an identifier of the first device is included in the device list for the first passcode; and in response to the determining indicating that the identifier of the first device is included in the device list for the first passcode; generating data representing a second passcode by encrypting the second passcode based on the first passcode; sending the data representing the second passcode to the first device; and removing, at the access point, the identifier for the first device from the device list for the first passcode. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification