Dynamic authentication in secured wireless networks
First Claim
Patent Images
1. A method for pairing dynamic secrets in a secured wireless network, the method comprising:
- identifying an access profile belonging to an authenticated user, the user having been authenticated as being authorized to access the secured wireless network, the access profile being specific to the authenticated user;
randomly generating a secret for the authenticated user, wherein the secret is unique to the authenticated user;
storing the secret in memory, the secret being stored in association with the identified access profile belonging to the authenticated user;
deriving one or more security keys from the secret;
saving the one or more derived security keys to a table in memory, the table including information concerning the security keys and whether each security key is associated with a wireless interface device;
generating an executable for configuring the wireless interface device to access the secured wireless network;
downloading the executable and at least one of the security keys as a part of the access profile to a wireless interface device belonging to the authenticated user, wherein executing the transferred executable on the wireless interface device configures the wireless interface device to access the secured wireless network using the security key and the access profile belonging to the authenticated user; and
updating the table to include the association between the security key and the wireless interface device belonging to the authenticated user and further associated with the access profile, wherein use of the security key to access the secured wireless network is restricted to the associated wireless interface device belonging to the authenticated user as identified by the associated access profile.
13 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authentication using paired dynamic secrets in secured wireless networks are provided. Each authenticated user is assigned a random secret generated so as to be unique to the user. The secret is associated with a wireless interface belonging to the user, so that no other wireless interface may use the same secret to access the network. The secret may be updated either periodically or at the request of a network administrator, and reauthentication of the wireless network may be required.
-
Citations
13 Claims
-
1. A method for pairing dynamic secrets in a secured wireless network, the method comprising:
-
identifying an access profile belonging to an authenticated user, the user having been authenticated as being authorized to access the secured wireless network, the access profile being specific to the authenticated user; randomly generating a secret for the authenticated user, wherein the secret is unique to the authenticated user; storing the secret in memory, the secret being stored in association with the identified access profile belonging to the authenticated user; deriving one or more security keys from the secret; saving the one or more derived security keys to a table in memory, the table including information concerning the security keys and whether each security key is associated with a wireless interface device; generating an executable for configuring the wireless interface device to access the secured wireless network; downloading the executable and at least one of the security keys as a part of the access profile to a wireless interface device belonging to the authenticated user, wherein executing the transferred executable on the wireless interface device configures the wireless interface device to access the secured wireless network using the security key and the access profile belonging to the authenticated user; and updating the table to include the association between the security key and the wireless interface device belonging to the authenticated user and further associated with the access profile, wherein use of the security key to access the secured wireless network is restricted to the associated wireless interface device belonging to the authenticated user as identified by the associated access profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for pairing dynamic secrets in a secured wireless network, the system comprising:
-
a secret generation module stored in memory and executable by a processor to; randomly generate a secret unique to an authenticated user, the user having been authenticated as being authorized to access the secured wireless network, and derive one or more security secrets from the secret; a secret database configured to store information concerning the secret in association with an access profile identified as belonging to the authenticated user, the access profile being specific to the authenticated user, the secret database comprising a table including information concerning the re security keys and whether each security key is associated with a wireless interface device; an access profile generation module executable by the processor to generate an access profile for the authenticated user; an executable generation module executable by the processor to generate an executable for using the access profile and the security key to configure the wireless interface to access the secured wireless network; and a binding module stored in memory and executable by the processor to download the executable and at least one of the security keys as part of the access profile to a wireless interface device belonging to the authenticated user, wherein executing the transferred executable on the wireless interface device configures the wireless interface device to access the secured wireless network using the security key and the access profile belonging to the authenticated user, and wherein the table is updated to include the association between the security key and the wireless interface device belonging to the authenticated user and further associated with the access profile, wherein use of the security key to access the secured wireless network is restricted to the associated wireless interface device belonging to the authenticated user as identified by the associated access profile. - View Dependent Claims (11)
-
-
12. A computer-readable storage medium having embodied thereon a program, the program being executable by a computer processor to perform a method for pairing dynamic secrets in a secured wireless network, the method comprising:
-
identifying an access profile belonging to an authenticated user, the user having been authenticated as being authorized to access the secured wireless network, the access profile being specific to the authenticated user; randomly generating a secret for the authenticated user, wherein the secret is unique to the authenticated user; storing the secret in memory, the secret being stored in association with the identified access profile belonging to the authenticated user, the access profile; deriving one or more security keys from the secret; saving the one or more derived security keys to a table in memory, the table including information concerning the security keys and whether each security key is associated with a wireless interface device; generating an executable for configuring the wireless interface device to access the secured wireless network; downloading the executable and at least one of the security keys as a part of the access profile to a wireless interface device belonging to the authenticated user, wherein executing the transferred executable on the wireless interface device configures the wireless interface device to access the secured wireless network using the security key and the access profile belonging to the authenticated user; and updating the table to include the association between the security key and the wireless interface belonging to the authenticated user, wherein use of the security key to access the secured wireless network is restricted to the associated wireless interface belonging to the authenticated user as identified by the associated access profile. - View Dependent Claims (13)
-
Specification