DYNAMIC PASSCODES IN ASSOCIATION WITH A WIRELESS ACCESS POINT
First Claim
1. A method comprising:
- after expiration of a first passcode, receiving, at an access point, a first access request from a first device, the first access request encrypted based on the first passcode;
determining whether an identifier of the first device is included in a device list associated with the first passcode, wherein the device list includes identifiers of devices that accessed the access point using encryption based on the first passcode before the expiration of the first passcode; and
in response to a determination that the identifier of the first device is included in the device list;
generating, at the access point, data representing a second passcode by encrypting the second passcode using the first passcode; and
sending the data representing the second passcode to the first device from the access point.
2 Assignments
0 Petitions
Accused Products
Abstract
A method includes, after expiration of a first passcode, receiving, at an access point, a first access request from a first device. The first access request may be encrypted based on the first passcode. The method further includes determining whether an identifier of the first device is included in a device list associated with the first passcode. The device list includes identifiers of devices that accessed the access point using encryption based on the first passcode before the expiration of the first passcode. The method also includes, in response to a determination that the identifier of the first device is included in the device list generating, at the access point, data representing a second passcode by encrypting the second passcode using the first passcode. The method further includes sending the data representing the second passcode to the first device from the access point.
21 Citations
20 Claims
-
1. A method comprising:
-
after expiration of a first passcode, receiving, at an access point, a first access request from a first device, the first access request encrypted based on the first passcode; determining whether an identifier of the first device is included in a device list associated with the first passcode, wherein the device list includes identifiers of devices that accessed the access point using encryption based on the first passcode before the expiration of the first passcode; and in response to a determination that the identifier of the first device is included in the device list; generating, at the access point, data representing a second passcode by encrypting the second passcode using the first passcode; and sending the data representing the second passcode to the first device from the access point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a processor; a memory coupled to the processor, the memory including instructions executable by the processor to perform operations including; after expiration of a first passcode, receiving, from a first device, a first access request to access a local area network, the first access request encrypted based on the first passcode; determining whether an identifier of the first device is included in a device list associated with the first passcode, wherein the device list includes identifiers of devices that accessed the local area network using encryption based on the first passcode before the expiration of the first passcode; and in response to a determination that the identifier of the first device is included in the device list; generating data representing a second passcode by encrypting the second passcode using the first passcode; and sending the data representing the second passcode to the first device. - View Dependent Claims (12, 13, 14)
-
-
15. A processor-readable storage device storing instructions that, when executed by a processor of an access point, cause the processor to perform operations comprising:
-
after expiration of a first passcode, receiving a first access request from a first device, the first access request encrypted based on the first passcode; determining whether an identifier of the first device is included in a device list associated with the first passcode, wherein the device list includes identifiers of devices that accessed the access point using encryption based on the first passcode before the expiration of the first passcode; and in response to a determination that the identifier of the first device is included in the device list; generating data representing a second passcode by encrypting the second passcode using the first passcode; and sending the data representing the second passcode to the first device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification