Shared network access using different access keys
First Claim
1. A method of authenticating a computing device on a Wi-Fi communications network comprising the steps of:
- obtaining an access point identifier at a computing device, wherein said access point identifier identifies an access point of a Wi-Fi communications network;
selecting, at said computing device, a set of authentication parameters associated with said access point identifier; and
implementing an authentication process employing said set of authentication parameters.
5 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a secure Wi-Fi communications method and system to enable automatic network roaming without requiring any back-end authentication servers and alleviating the need to handle large numbers of network parameters. In an embodiment of the invention, a client device listens for a “beacon frame” broadcast from a Wi-Fi access point. The beacon frame identifies the basic service set identifier (BSSID) of the access point. A tamper-resistant token, or client key, installed at the client device stores a set of authentication parameters, e.g., cryptographic keys, for each Wi-Fi network the client is permitted to access. Each set of authentication parameters is associated with a particular BSSID. Using the BSSID received from the access point, the client device identifies and implements the appropriate set of authentication parameters necessary to authenticate the client device according to an authentication process generally accepted by all the Wi-Fi networks potentially servicing the client. Accordingly, a consistent authentication and security mechanism is provided to enable a client device to easily roam from one network to another without requiring the client to manually change network configurations.
260 Citations
22 Claims
-
1. A method of authenticating a computing device on a Wi-Fi communications network comprising the steps of:
-
obtaining an access point identifier at a computing device, wherein said access point identifier identifies an access point of a Wi-Fi communications network;
selecting, at said computing device, a set of authentication parameters associated with said access point identifier; and
implementing an authentication process employing said set of authentication parameters. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A communications system comprising:
-
one or more authentication devices, one or more client devices, wherein each client device includes a unique tamper-resistant physical token comprising;
one or more unique sets of authentication parameters, wherein each set of authentication parameters is associated with one or more of said one or more authentication devices;
a random number generator; and
a unique serial number. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification