Network Access Via Telephony Services
First Claim
1. A method, comprising:
- receiving a request to access a wireless network secured with at least one network encryption key;
associating, via a mobile telephone wireless network, a first mobile device with a user account;
determining that access, associated with the user account, to the wireless network secured with the at least one network encryption key is permitted;
providing, to a registrar, a token that is utilizable by a second mobile device to access the at least one network encryption key;
providing, via the mobile telephone wireless network, the token to the first mobile device;
receiving, from the second mobile device, at least one hash value based on the token;
determining, based on the at least one hash value, that the second mobile device has possession of the token; and
providing, via the registrar, the at least one network encryption key to the second mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
A network provider can receive a request, via a first mobile device and a mobile wireless telephone network, for access to a wireless network secured with at least one encryption key and implemented by at least one wireless access point. In response to the request, the network provider can associate the first mobile device with a user account of a user and can provide a token to a registrar and to the first mobile device via the mobile wireless telephone network. The registrar can receive, from the first mobile device or a second mobile device associated the user via the wireless access point. After determining, based on the one or more hash values, that the first or second mobile device has possession of the token, the registrar can provide the encryption key to that mobile device.
93 Citations
30 Claims
-
1. A method, comprising:
-
receiving a request to access a wireless network secured with at least one network encryption key; associating, via a mobile telephone wireless network, a first mobile device with a user account; determining that access, associated with the user account, to the wireless network secured with the at least one network encryption key is permitted; providing, to a registrar, a token that is utilizable by a second mobile device to access the at least one network encryption key; providing, via the mobile telephone wireless network, the token to the first mobile device; receiving, from the second mobile device, at least one hash value based on the token; determining, based on the at least one hash value, that the second mobile device has possession of the token; and providing, via the registrar, the at least one network encryption key to the second mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer readable memory medium comprising instructions, which when executed on a processing system, cause the processing system to perform:
-
receiving a request to access a wireless network secured with at least one network encryption key; associating, via a mobile telephone wireless network, a first mobile device with a user account; determining that access, associated with the user account, to the wireless network secured with the at least one network encryption key is permitted; providing, to a registrar, a token that is utilizable by a second mobile device to access the at least one network encryption key; providing, via the mobile telephone wireless network, the token to the first mobile device; receiving, from the second mobile device, at least one hash value based on the token; determining, based on the at least one hash value, that the second mobile device has possession of the token; and providing, via the registrar, the at least one network encryption key to the second mobile device. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A system, comprising:
-
an access computing device; a registrar coupled to the access computing device via a wide area network; at least one wireless access point coupled to the registrar and to the wide area network and that implements a first wireless network secured with at least one network encryption key; wherein the access computing device; receives a request, via a second wireless network and a first mobile device, to access first wireless network secured with at least one network encryption key; associates, via the second wireless network, the first mobile device with a user account; provides, to the registrar, a token that is utilizable by a second mobile device to access the first wireless network; and provides, via the second wireless network, the token to the first mobile device; wherein the registrar; receives, from the second mobile device, at least one hash value based on the token; determines, based on the at least one hash value, that the second mobile device has possession of the token; and provides the at least one network encryption key to the second mobile device; and wherein the at least one wireless access point provides access to the first wireless network via the at least one network encryption key. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification