Providing services to a guest device in a personal network
First Claim
Patent Images
1. A system comprising:
- a proxy associated with a personal network; and
a mobile communications device associated with the personal network, where the mobile communications device is to;
send personal network connection information to a guest device, the personal network connection information including an internet protocol (IP) address for the proxy;
generate authentication credentials, where the authentication credentials include a type of access granted to the guest device, the type of access including a privilege afforded to the guest device, the afforded privilege comprising at least one of a first privilege to receive output data from the personal network using the guest device or a second privilege to input data to the personal network using the guest device; and
send the authentication credentials to the guest device, where the guest device does not communicate with the proxy until the guest device receives both the personal network connection information and the authentication credentials;
where the proxy is to;
receive the authentication credentials from the guest device, andauthenticate the guest device based on the authentication credentials received from the guest device and authorize the guest device to access content stored in the personal network based at least partially on the type of access granted to the guest device,where the authentication credentials are first authentication credentials and include information indicative of a first expiration time,where, prior to the first expiration time, the proxy re-authenticates the guest device based on the first authentication credentials,where, after the first expiration time, the mobile communications device, in response to receiving a request for credentials from the guest device, generates second authentication credentials and transmits the second authentication credentials to the guest device, where the second authentication credentials include a second expiration time after which the second authentication credentials are not valid, andwhere, prior to the second expiration time, the proxy re-authenticates the guest device based on the second authentication credentials.
1 Assignment
0 Petitions
Accused Products
Abstract
A method may include sending personal network connection information from a mobile device to a guest device; sending authentication credentials from the mobile device to the guest device; receiving the authentication credentials in the personal network from the guest device; authenticating the guest device based on the authentication credentials; and granting access to the guest device to content stored in the personal network for a guest session.
56 Citations
22 Claims
-
1. A system comprising:
-
a proxy associated with a personal network; and a mobile communications device associated with the personal network, where the mobile communications device is to; send personal network connection information to a guest device, the personal network connection information including an internet protocol (IP) address for the proxy; generate authentication credentials, where the authentication credentials include a type of access granted to the guest device, the type of access including a privilege afforded to the guest device, the afforded privilege comprising at least one of a first privilege to receive output data from the personal network using the guest device or a second privilege to input data to the personal network using the guest device; and send the authentication credentials to the guest device, where the guest device does not communicate with the proxy until the guest device receives both the personal network connection information and the authentication credentials; where the proxy is to; receive the authentication credentials from the guest device, and authenticate the guest device based on the authentication credentials received from the guest device and authorize the guest device to access content stored in the personal network based at least partially on the type of access granted to the guest device, where the authentication credentials are first authentication credentials and include information indicative of a first expiration time, where, prior to the first expiration time, the proxy re-authenticates the guest device based on the first authentication credentials, where, after the first expiration time, the mobile communications device, in response to receiving a request for credentials from the guest device, generates second authentication credentials and transmits the second authentication credentials to the guest device, where the second authentication credentials include a second expiration time after which the second authentication credentials are not valid, and where, prior to the second expiration time, the proxy re-authenticates the guest device based on the second authentication credentials. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
in response to a proxy server in a personal network requiring information about a guest device; requesting, by a mobile communications device associated with the personal network, connection information from the guest device; receiving, at the mobile communications device, first connection information about the guest device; sending, from the mobile communications device, to the proxy server in the personal network, the first connection information about the guest device, where the first connection information is sent via a link that includes the guest device and that acts as an encrypted channel; sending, by the mobile communications device to the guest device, second connection information about the proxy server in the personal network, the second connection information including an internet protocol (IP) address for the proxy server; generating, by the mobile communications device, authentication credentials for the guest device; sending, by the mobile communications device to the guest device, the authentication credentials, where the authentication credentials are used by the proxy server to authenticate the guest device in the personal network and limit the guest device to access, based on a type of access included in the authentication credentials, content stored in the personal network for a guest session, where the guest device does not communicate with the proxy server until the guest device receives both the second connection information and the authentication credentials, the type of access including a privilege afforded to the guest device, the afforded privilege comprising at least one of a first privilege to receive output data from the personal network using the guest device or a second privilege to input data to the personal network using the guest device; and verifying, by the mobile communications device and via the link, the guest device being added to the personal network, where the authentication credentials are first authentication credentials and include information indicative of a first expiration time, where, prior to the first expiration time, the proxy server re-authenticates the guest device based on the first authentication credentials; and after the first expiration time, in response to receiving a request for credentials from the guest device, generating, by the mobile communications device, second authentication credentials and transmitting the second authentication credentials to the guest device, where the second authentication credentials include a second expiration time after which the second authentication credentials are not valid, where, prior to the second expiration time, the proxy server re-authenticates the guest device based on the second authentication credentials. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium including instructions executable by at least one processor, the computer-readable medium comprising:
-
one or more instructions to determine that a proxy server in a personal network requires information about a guest device not associated with the personal network; one or more instructions to request, by a mobile communications device associated with the personal network, connection information from the guest device; one or more instructions to receive, at the mobile communications device, first connection information about the guest device; one or more instructions to send, from the mobile communications device to the proxy server in the personal network and via a link that includes the guest device and that acts as an encrypted channel, the first connection information about the guest device; one or more instructions to send, from the mobile communications device to the guest device, second connection information about the proxy server in the personal network, the second connection information including an internet protocol (IP) address for the proxy server; one or more instructions to generate, by the mobile communications device authentication credentials for the guest device; one or more instructions to send, from the mobile communications device to the guest device, the authentication credentials, where the authentication credentials are used to authenticate the guest device in the personal network and limit the guest device to access, based on a type of access included in the authentication credentials, content stored in the personal network during a guest session, where the guest device does not communicate with the proxy server until the guest device receives both the second connection information and the authentication credentials, the type of access including a privilege afforded to the guest device, the afforded privilege comprising at least one of a first privilege to receive output data from the personal network using the guest device or a second privilege to input data to the personal network using the guest device; and one or more instructions to receive, from the proxy server in the personal network and via the link, verification regarding whether the guest device is added to the personal network, where the authentication credentials are first authentication credentials and include information indicative of a first expiration time, where, prior to the first expiration time, the proxy server re-authenticates the guest device based on the first authentication credentials; and after the first expiration time, in response to receiving a request for credentials from the guest device, one or more instructions to generate, at the mobile communications device, second authentication credentials and transmit the second authentication credentials to the guest device, where the second authentication credentials include a second expiration time after which the second authentication credentials are not valid, where, prior to the second expiration time, the proxy server re-authenticates the guest device based on the second authentication credentials. - View Dependent Claims (20, 21, 22)
-
Specification