Remote device authentication
First Claim
1. A method of authenticating a wireless device for accessing a first wireless network challenging said device, comprising:
- receiving an authentication challenge from said first wireless network at a first wireless device;
forwarding said authentication challenge from said first wireless device to a second wireless device storing an authentication key;
calculating an authentication response based on said authentication key at said second wireless device;
forwarding said authentication response from said second wireless device to said first wireless device; and
transmitting said authentication response from said first wireless device to said first wireless network.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless local area network authenticates access by a user'"'"'s device utilizing an authentication key provisioned in another of the user'"'"'s devices. The network transmits a challenge to the non-provisioned device. The non-provisioned device forwards the challenge to the provisioned device across a wire-based or wireless interface connecting the two devices, such as a BLUETOOTH network link. The provisioned device calculates a response using the authentication key, and forwards the response to the non-provisioned device. The non-provisioned device then transmits the response to the wireless local area network for authentication.
-
Citations
34 Claims
-
1. A method of authenticating a wireless device for accessing a first wireless network challenging said device, comprising:
-
receiving an authentication challenge from said first wireless network at a first wireless device;
forwarding said authentication challenge from said first wireless device to a second wireless device storing an authentication key;
calculating an authentication response based on said authentication key at said second wireless device;
forwarding said authentication response from said second wireless device to said first wireless device; and
transmitting said authentication response from said first wireless device to said first wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A wireless device comprising:
-
a first interface to communicate with a wireless network;
a second interface to communicate with a provisioned wireless device having an authentication key used to access the wireless network;
a microprocessor connected to said first and second interfaces and programmed to;
forward an authentication challenge received from the wireless network via said first interface to the provisioned wireless device via said second interface;
receive an authentication response from the provisioned wireless device via said second interface; and
forward the authentication response via said first interface to the wireless network. - View Dependent Claims (27, 28, 29, 30)
-
-
31. A wireless device having an authentication key used to access a wireless network comprising:
-
an interface to communicate with a non-provisioned wireless device;
an authentication unit connected to said interface and having a memory for storing the authentication key and a processor for performing calculations using said authentication key, said authentication unit being operative to;
receive an authentication challenge via said interface from the non-provisioned wireless device attempting to access the wireless network, compute an authentication response using the authentication challenge and the authentication key; and
forward the authentication response via the interface to the non-provisioned wireless device to be used by the non-provisioned wireless device to access the wireless network. - View Dependent Claims (32, 33, 34)
-
Specification