×

System, method and computer program product for updating security criteria in wireless networks

  • US 7,606,370 B2
  • Filed: 02/21/2006
  • Issued: 10/20/2009
  • Est. Priority Date: 04/05/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method, comprising:

  • distributing a key to a plurality of nodes of a wireless network for use in securing the nodes during use of the wireless network; and

    automatically updating the key at the nodes in the wireless network based on predetermined criteria;

    wherein the key is updated utilizing a software application downloaded by;

    advertising a peer-to-peer wireless network utilizing a granting node;

    allowing connection to the peer-to-peer wireless network utilizing a requesting node;

    in response to any request received from the requesting node, automatically redirecting the requesting node to a portal including a captive portal; and

    downloading the software application to the requesting node via the peer-to-peer wireless network utilizing the portal, the key being updated utilizing the downloaded software application;

    wherein the portal includes a graphical user interface;

    wherein the graphical user interface allows a user of the requesting node to download the software application;

    wherein the software application is downloaded to the requesting node in response to the user selection of a button displayed as part of the graphical user interface;

    wherein the portal includes a web page stored at the granting node;

    wherein the software application carries out a process including;

    exchanging a first key between the granting node and the requesting node via another peer-to-peer wireless network;

    generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key;

    comparing the human-perceptible hashes via an out-of-band communication channel; and

    transmitting a second key to the requesting node for providing access to a centrally-based wireless network based on the comparison.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×