Dynamic Authentication in Secured Wireless Networks
13 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authentication using paired dynamic secrets in secured wireless networks are provided. Each authenticated user is assigned a random secret generated so as to be unique to the user. The secret is associated with a wireless interface belonging to the user, so that no other wireless interface may use the same secret to access the network. The secret may be updated either periodically or at the request of a network administrator, and reauthentication of the wireless network may be required.
114 Citations
15 Claims
-
1. (canceled)
-
2. A method for enabling access to a wireless network, the method comprising:
-
receiving an authentication request from a wireless device; determining that a security key is associated with the wireless device; verifying that the security key is valid; and granting the wireless device access to the wireless network following a determination that the security key is valid and has not expired. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for enabling access to a wireless network, the method comprising:
-
receiving an access request from a wireless device, the access request including a security key; verifying that the security key is valid; determining that the security key has not expired; and granting the wireless interface access to the wireless network only after determining that the security key is valid and has not expired.
-
-
11. A method for enabling access to a wireless network, the method comprising:
-
generating a plurality of unique security keys; associating a first one of the plurality of unique security keys with an account for a user; receiving a request from the user to access the wireless network, the request including the first one of the plurality of unique security keys; determining that the first one of the plurality of unique security keys has not expired; and granting the user access to the wireless network in response to the determination that the first one of the plurality of unique security keys has not expired.
-
-
12. A method for enabling access to a wireless network, the method comprising:
-
generating a plurality of unique security keys for a plurality of users, each user having an account with an access profile type; associating a first one of the plurality of unique security keys to a first account having a first access profile type; associating a second one of the plurality of unique security keys to a second account having a second access profile type; and granting a first level of access to the first account and a second level of access to the second account, wherein each account allows the associated user to access the wireless network, but with different access privileges within the wireless network.
-
-
13. A method for enabling access to a wireless network, the method comprising:
-
generating a plurality of unique security keys for a plurality of users; maintaining the plurality of unique security keys in a database; receiving a request from one of the plurality of users to access the wireless network, the request including a security key; verifying that the security key is valid; determining that the security key has not expired; and granting a wireless device associated with the one of the plurality of users access to the wireless network upon a determination that the security key is valid and has not expired.
-
-
14. A method for enabling access to a wireless network, the method comprising:
-
generating a plurality of unique secret keys at an authentication server communicatively coupled to a wireless network; maintaining the plurality of unique secret keys in a database of secrets, the database communicatively coupled to the authentication server; receiving a request from a user to access the wireless network, the request including a security key and received at the authentication server; verifying that the security key is valid, the verification taking place at the authentication server; determining that the security key has not expired, the determination taking place at the database of secrets in response to a query by the authentication server as to whether the security key has expired; and granting the user access to the wireless network following the determination that the security key is both valid and not expired.
-
-
15. A method for enabling access to a wireless network, the method comprising:
-
generating a plurality of unique secret keys, wherein each secret key has a predetermined expiration; maintaining the unique secret keys in a database of secrets; updating the database of secrets when a secret key has exceeded the predetermined expiration; revoking a secret key prior to a predetermined expiration and updating the database following the revocation; receiving a request from a user to access the wireless network, the request including a security key; verifying that the security key is valid; granting the user access to the wireless network following a determination that the security key has not expired or otherwise been revoked in response to a query to the database of secrets.
-
Specification