AUTHORIZING STATIONS INTO A CENTRALLY MANAGED NETWORK
First Claim
Patent Images
1. A computer implemented authentication method comprising:
- generating a network membership key request;
communicating the network membership key request to an authorization server, the network membership key request including a unique identifier associated with the requesting station, the unique identifier being unencrypted;
receiving the network membership key based on the network membership key request;
wherein the network membership key is received in encrypted format based upon a device access key; and
wherein the network membership key is received based upon a stored device access key associated with the unique identifier matching the device access key used to encrypt the network membership key request.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for connecting new stations to a secure network. New stations can send connection requests to a headend device. The headend device can retrieve a device access key associated with the new station and can provide a network membership key to the new station based upon authentication of the new station using the device access key.
127 Citations
25 Claims
-
1. A computer implemented authentication method comprising:
-
generating a network membership key request; communicating the network membership key request to an authorization server, the network membership key request including a unique identifier associated with the requesting station, the unique identifier being unencrypted; receiving the network membership key based on the network membership key request; wherein the network membership key is received in encrypted format based upon a device access key; and wherein the network membership key is received based upon a stored device access key associated with the unique identifier matching the device access key used to encrypt the network membership key request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer implemented authorization method comprising:
-
receiving an encrypted network membership key request from a station; receiving an unencrypted unique identifier associated with the encrypted network membership key request; determining whether the encrypted network membership key request is authentic based upon the unique identifier; encrypting a network membership key using a device access key associated with the station; and communicating the encrypted network membership key to the station. - View Dependent Claims (11, 12, 13, 14)
-
-
15. An authentication system comprising:
-
a plurality of stations, each of the stations being operable to generate an encrypted network membership key request, the encrypted network membership key requests including an unencrypted unique identifiers respectively associated with the station generating the encrypted network membership key request; an authorization server operable to receive the encrypted network membership key requests and to identify stored device access keys based upon the unique identifiers respectively associated with each of the network membership key requests, the authorization server authenticating the station based upon successful decryption of the network membership key requests based on the stored device access keys respectively associated with each of the unique identifiers, the authorization server being further operable to encrypt a network membership key using the device access key and to communicate the encrypted network membership key to the stations based upon authenticating the station. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification