Method for establishing classes within a communication network
First Claim
1. In a communication network having an central controller, said controller having a key generator that utilizes a first password comprising characters to generate an encryption key, a method for establishing hierarchical user classes within said network, said method comprising the steps of:
- generating a number of secondary passwords that when entered into the key generator, will generate the encryption key, said secondary passwords having different characters than the first password;
assigning to each secondary password a user class and associated information;
storing each secondary password and associated user class information in central controller memory; and
assigning at least one secondary password to at least one remote device seeking to communicate with said central controller.
4 Assignments
0 Petitions
Accused Products
Abstract
User device (12) classes are established in a communications network (100). An access point (10) utilizes a first password to create an encryption key, then generates a plurality of secondary passwords for use by devices (12). User device (12) classes are established by assigning a secondary password to a respective class of users, determining the network access permitted the class, determining the network services provided to the class and finally assigning the secondary password to a device (12'"'"') seeking to communicate within the network (100).
-
Citations
9 Claims
-
1. In a communication network having an central controller, said controller having a key generator that utilizes a first password comprising characters to generate an encryption key, a method for establishing hierarchical user classes within said network, said method comprising the steps of:
-
generating a number of secondary passwords that when entered into the key generator, will generate the encryption key, said secondary passwords having different characters than the first password; assigning to each secondary password a user class and associated information; storing each secondary password and associated user class information in central controller memory; and assigning at least one secondary password to at least one remote device seeking to communicate with said central controller. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification