SECURING CREDENTIAL DISTRIBUTION
First Claim
1. A computer-implemented method for securing credential distribution, comprising:
- receiving, by a cloud system, notification from a credential management system that a wireless device is associated with an authenticated user of the credential management system, wherein the credential management system stores private network credentials of the authenticated user, and wherein the cloud system further receives an identifier of the wireless device with the notification;
receiving, by the cloud system, the private network credentials of the authenticated user;
storing, by the cloud system, the private network credentials and the identifier of the wireless device;
receiving, by the cloud system, an authentication request from a router, wherein the router received the authentication request from the wireless device, wherein the authentication request was automatically requested by the wireless device, wherein the wireless device is preconfigured with device credentials;
returning, by the cloud system, a response to the authentication request to the router, wherein the response includes internet domains and connection bandwidths the wireless device is allowed to use;
authenticating, by the cloud system, the wireless device, ensuring that the wireless device is authorized to receive private network credentials; and
distributing, by the cloud system, the private network credentials to the wireless device, thereby allowing the wireless device to obtain local network access with the private network credentials.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems and apparatus for securing credential distribution are disclosed. One method includes receiving notification from a credential management system that a wireless device is associated with an authenticated user of the credential management system. The method further includes receiving the private network credentials of the authenticated user, storing the private network credentials and the identifier of the wireless device, receiving an authentication request from a router, returning a response to the authentication request to the router, wherein the response includes internet domains and connection bandwidths the wireless device is allowed to use, authenticating the wireless device, ensuring that the wireless device is authorized to receive private network credentials; and distributing, by the cloud system, the private network credentials to the wireless device, thereby allowing the wireless device to obtain local network access with the private network credentials.
-
Citations
21 Claims
-
1. A computer-implemented method for securing credential distribution, comprising:
-
receiving, by a cloud system, notification from a credential management system that a wireless device is associated with an authenticated user of the credential management system, wherein the credential management system stores private network credentials of the authenticated user, and wherein the cloud system further receives an identifier of the wireless device with the notification; receiving, by the cloud system, the private network credentials of the authenticated user; storing, by the cloud system, the private network credentials and the identifier of the wireless device; receiving, by the cloud system, an authentication request from a router, wherein the router received the authentication request from the wireless device, wherein the authentication request was automatically requested by the wireless device, wherein the wireless device is preconfigured with device credentials; returning, by the cloud system, a response to the authentication request to the router, wherein the response includes internet domains and connection bandwidths the wireless device is allowed to use; authenticating, by the cloud system, the wireless device, ensuring that the wireless device is authorized to receive private network credentials; and distributing, by the cloud system, the private network credentials to the wireless device, thereby allowing the wireless device to obtain local network access with the private network credentials. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method for securing credential distribution, comprising:
-
receiving, by a cloud system, notification from a credential management system that a wireless device is associated with an authenticated user of the credential management system, wherein the credential management system stores private network credentials of the authenticated user, and wherein the cloud system further receives an identifier of the wireless device with the notification; receiving, by the cloud system, the private network credentials of the authenticated user; storing, by the cloud system, the private network credentials and the identifier of the wireless device; communicating, by the cloud system, with the wireless device through internet access provided by a public network; authenticating, by the cloud system, the wireless device, ensuring that the wireless device is authorized to receive private network credentials; and distributing, by the cloud system, the private network credentials to the wireless device, thereby allowing the wireless device to obtain local network access with the private network credentials. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A cloud system, comprising a plurality of servers, wherein at least one of the servers is operative to:
-
receive notification from a credential management system that a wireless device is associated with an authenticated user of the credential management system, wherein the credential management system stores private network credentials of the authenticated user, and wherein the cloud system further receives an identifier of the wireless device with the notification; receive the private network credentials of the authenticated user; store the private network credentials and the identifier of the wireless device; receive an authentication request from a router, wherein the router received the authentication request from the wireless device, wherein the authentication request was automatically requested by the wireless device, wherein the wireless device is preconfigured with device credentials; return a response to the authentication request to the router, wherein the response includes internet domains and connection bandwidths the wireless device is allowed to use; authenticate the wireless device, ensuring that the wireless device is authorized to receive private network credentials; and distribute the private network credentials to the wireless device, thereby allowing the wireless device to obtain local network access with the private network credentials. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A cloud system, comprising a plurality of servers, wherein at least one of the servers is operative to:
-
receive notification from a credential management system that a wireless device is associated with an authenticated user of the credential management system, wherein the credential management system stores private network credentials of the authenticated user, and wherein the cloud system further receives an identifier of the wireless device with the notification; receive the private network credentials of the authenticated user; store the private network credentials and the identifier of the wireless device; communicate with the wireless device through internet access provided by a public network; authenticate the wireless device, ensuring that the wireless device is authorized to receive private network credentials; and distribute the private network credentials to the wireless device, thereby allowing the wireless device to obtain local network access with the private network credentials. - View Dependent Claims (19, 20, 21)
-
Specification