Securing credential distribution
First Claim
1. A computer-implemented method for securing credential distribution, comprising:
- receiving, by a cloud system, notification from a credential management system that a wireless device is associated with an authenticated user of the credential management system, wherein the credential management system stores private network credentials of the authenticated user, and wherein the cloud system further receives with the notification an identifier of the wireless device and information about the location or environment in which the wireless device is authorized to receive the private network credentials;
authenticating, by the cloud system, the wireless device, ensuring that the wireless device is authorized to receive private network credentials; and
receiving, by the cloud system, the location or environment information from the wireless device; and
comparing, by the cloud system, the location or environment information received from the wireless device with the location or environment in which the wireless device is authorized to receive the private network credentials,receiving, by the cloud system, a request from the wireless device for private network credentials;
receiving, by the cloud system, the private network credentials of the authenticated user; and
distributing, by the cloud system, the private network credentials to the wireless device, thereby allowing the wireless device to obtain local network access with the private network credentials.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems and apparatus for securing credential distribution are disclosed. One method includes receiving, by a cloud system, a notification from a credential management system that a wireless device is associated with an authenticated user of the credential management system, wherein the credential management system stores private network credentials of the authenticated user, and wherein the cloud system further receives an identifier of the wireless device with the notification, authenticating, by the cloud system, the wireless device, receiving, by the cloud system, a request from the wireless device for private network credentials, and distributing, by the cloud system, the private network credentials to the wireless device, thereby allowing the wireless device to obtain local network access with the private network credentials.
293 Citations
18 Claims
-
1. A computer-implemented method for securing credential distribution, comprising:
-
receiving, by a cloud system, notification from a credential management system that a wireless device is associated with an authenticated user of the credential management system, wherein the credential management system stores private network credentials of the authenticated user, and wherein the cloud system further receives with the notification an identifier of the wireless device and information about the location or environment in which the wireless device is authorized to receive the private network credentials; authenticating, by the cloud system, the wireless device, ensuring that the wireless device is authorized to receive private network credentials; and receiving, by the cloud system, the location or environment information from the wireless device; and comparing, by the cloud system, the location or environment information received from the wireless device with the location or environment in which the wireless device is authorized to receive the private network credentials, receiving, by the cloud system, a request from the wireless device for private network credentials; receiving, by the cloud system, the private network credentials of the authenticated user; and distributing, by the cloud system, the private network credentials to the wireless device, thereby allowing the wireless device to obtain local network access with the private network credentials. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method for securing credential distribution, comprising:
-
receiving, by a cloud system, a notification from a credential management system that a wireless device is associated with an authenticated user of the credential management system, wherein the credential management system stores private network credentials of the authenticated user, and wherein the cloud system further receives with the notification an identifier of the wireless device; authenticating, by the cloud system, the wireless device; and receiving, by the cloud system, the location or environment information from the wireless device; and sending, by the cloud system, the location or environment information from the wireless device to the credential management system; and receiving, by the cloud system, a request from the wireless device for private network credentials; receiving, by the cloud system, the private network credentials of the authenticated user; distributing, by the cloud system, the private network credentials to the wireless device, thereby allowing the wireless device to obtain local network access with the private network credentials. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer-implemented method for a credential management system, comprising:
-
receiving, by a cloud system, private network credentials for an authenticated user; receiving, by the cloud system, a command to associate a wireless device with the authenticated user; receiving, by the cloud system, a request to share private network credentials for the wireless device, wherein the message includes location or environment information associated with the wireless device; comparing, by the cloud system, the location or environment information associated with the wireless device with the location or environment information associated with the authenticated user; and sending, by the cloud system, the private network credentials of the authenticated user to a system that distributes the private network credentials to the wireless device after the wireless device is authenticated. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification