System, method and computer program product for updating security criteria in wireless networks
First Claim
Patent Images
1. A method, comprising:
- distributing a key to a plurality of nodes of a wireless network for use in securing the nodes during use of the wireless network; and
automatically updating the key at the nodes in the wireless network based on predetermined criteria;
wherein the key is updated utilizing a software application downloaded by;
advertising a peer-to-peer wireless network utilizing a granting node;
allowing connection to the peer-to-peer wireless network utilizing a requesting node;
in response to any request received from the requesting node, automatically redirecting the requesting node to a portal including a captive portal; and
downloading the software application to the requesting node via the peer-to-peer wireless network utilizing the portal, the key being updated utilizing the downloaded software application;
wherein the portal includes a graphical user interface;
wherein the graphical user interface allows a user of the requesting node to download the software application;
wherein the software application is downloaded to the requesting node in response to the user selection of a button displayed as part of the graphical user interface;
wherein the portal includes a web page stored at the granting node;
wherein the software application carries out a process including;
exchanging a first key between the granting node and the requesting node via another peer-to-peer wireless network;
generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key;
comparing the human-perceptible hashes via an out-of-band communication channel; and
transmitting a second key to the requesting node for providing access to a centrally-based wireless network based on the comparison.
8 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product are provided. In use, a key is distributed to a plurality of nodes of a wireless network for use in securing the nodes during use of the wireless network. Further, the key is automatically updated at the nodes in the wireless network based on predetermined criteria.
96 Citations
28 Claims
-
1. A method, comprising:
-
distributing a key to a plurality of nodes of a wireless network for use in securing the nodes during use of the wireless network; and automatically updating the key at the nodes in the wireless network based on predetermined criteria; wherein the key is updated utilizing a software application downloaded by; advertising a peer-to-peer wireless network utilizing a granting node; allowing connection to the peer-to-peer wireless network utilizing a requesting node; in response to any request received from the requesting node, automatically redirecting the requesting node to a portal including a captive portal; and downloading the software application to the requesting node via the peer-to-peer wireless network utilizing the portal, the key being updated utilizing the downloaded software application; wherein the portal includes a graphical user interface; wherein the graphical user interface allows a user of the requesting node to download the software application; wherein the software application is downloaded to the requesting node in response to the user selection of a button displayed as part of the graphical user interface; wherein the portal includes a web page stored at the granting node; wherein the software application carries out a process including; exchanging a first key between the granting node and the requesting node via another peer-to-peer wireless network; generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key; comparing the human-perceptible hashes via an out-of-band communication channel; and transmitting a second key to the requesting node for providing access to a centrally-based wireless network based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A computer program product embodied on a computer readable medium, comprising:
-
computer code for distributing a key to a plurality of nodes of a 802.11 wireless network for use in securing the nodes during use of the 802.11 wireless network; and computer code for automatically updating the key at the nodes in the 802.11 wireless network based on predetermined criteria; wherein the key is updated utilizing computer code for a software application downloaded utilizing; computer code for advertising a peer-to-peer wireless network utilizing a granting node; computer code for connecting to the peer-to-peer wireless network utilizing a requesting node; computer code for automatically redirecting the requesting node to a portal including a captive portal, in response to any request received from the requesting node; and computer code for downloading the software application to the requesting node via the peer-to-peer wireless network utilizing the portal, the key being updated utilizing the downloaded software application; wherein the portal includes a graphical user interface; wherein the graphical user interface allows a user of the requesting node to download the software application; wherein the software application is downloaded to the requesting node in response to the user selection of a button displayed as part of the graphical user interface; wherein the portal includes a web page stored at the granting node; wherein the software application carries out a process including; exchanging a first key between the granting node and the requesting node via another peer-to-peer wireless network; generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key; comparing the human-perceptible hashes via an out-of-band communication channel; and transmitting a second key to the requesting node for providing access to a centrally-based wireless network based on the comparison.
-
-
28. A system, comprising:
-
a processor for distributing a key to a plurality of nodes of a 802.11 wireless network for use in securing the nodes during use of the 802.11 wireless network; wherein the key is automatically updated at the nodes in the 802.11 wireless network; wherein the key is updated utilizing a software application downloaded by; advertising a peer-to-peer wireless network utilizing a granting node; connecting to the peer-to-peer wireless network utilizing a requesting node; in response to any request received from the requesting node, automatically redirecting the requesting node to a portal including a captive portal; and downloading the software application to the requesting node via the peer-to-peer wireless network utilizing the portal, the key being updated utilizing the downloaded software application; wherein the portal includes a graphical user interface; wherein the graphical user interface allows a user of the requesting node to download the software application; wherein the software application is downloaded to the requesting node in response to the user selection of a button displayed as part of the graphical user interface; wherein the portal includes a web page stored at the granting node; wherein the software application carries out a process including; exchanging a first key between the granting node and the requesting node via another peer-to-peer wireless network; generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key; comparing the human-perceptible hashes via an out-of-band communication channel; and transmitting a second key to the requesting node for providing access to a centrally-based wireless network based on the comparison.
-
Specification