Dynamic authentication in secured wireless networks
First Claim
Patent Images
1. A method for enabling access to a secured wireless network, the method comprising:
- storing information in memory regarding a plurality of users authorized to access the secured wireless network;
receiving an authentication request from a wireless device; and
executing instructions stored in memory, wherein execution of instructions by a processor;
authenticates a requesting user of the wireless device as one of the users authorized to access the secured wireless network,generates a security key to be associated with the wireless device-used by the requesting user, wherein the security key is derived from a secret unique to the requesting user; and
processes subsequent access requests from the requesting user of the wireless device, wherein the wireless device is granted access to the secured wireless network following a determination that the security key is valid and has not expired.
9 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authentication using paired dynamic secrets in secured wireless networks are provided. Each authenticated user is assigned a random secret generated so as to be unique to the user. The secret is associated with a wireless interface belonging to the user, so that no other wireless interface may use the same secret to access the network. The secret may be updated either periodically or at the request of a network administrator, and reauthentication of the wireless network may be required.
226 Citations
20 Claims
-
1. A method for enabling access to a secured wireless network, the method comprising:
-
storing information in memory regarding a plurality of users authorized to access the secured wireless network; receiving an authentication request from a wireless device; and executing instructions stored in memory, wherein execution of instructions by a processor; authenticates a requesting user of the wireless device as one of the users authorized to access the secured wireless network, generates a security key to be associated with the wireless device-used by the requesting user, wherein the security key is derived from a secret unique to the requesting user; and processes subsequent access requests from the requesting user of the wireless device, wherein the wireless device is granted access to the secured wireless network following a determination that the security key is valid and has not expired. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 16)
-
-
10. A system for enabling access to a secured wireless network, the system comprising:
-
an authentication database for storing information regarding a plurality of users authorized to access the secured wireless network; a network interface for receiving an authentication request from a wireless device; and a processor for executing instructions and modules stored in memory, wherein the processor executes; an authentication module to authenticate a requesting user of the wireless device as one of the users authorized to access the secured wireless network, a secret generation module to generate a security key to be associated with the wireless device used by the requesting user, wherein the security key is derived from a secret unique to the requesting user; and authentication server instructions to process subsequent access requests from the requesting user of the wireless device, wherein the wireless device is granted access to the secured wireless network following a determination that the security key is valid and has not expired. - View Dependent Claims (11, 12, 13, 14, 15, 17, 18, 19)
-
-
20. A non-transitory computer-readable storage medium, having embodied thereon a program executable by a processor to perform a method for enabling access to a secured wireless network, the method comprising:
-
storing information regarding a plurality of users authorized to access the secured wireless network; receiving an authentication request from a wireless device; authenticating a requesting user of the wireless device as one of the users authorized to access the secured wireless network; generating a security key to be associated with the wireless device-used by the requesting user, wherein the security key is derived from a secret unique to the requesting user; and processing subsequent access requests from the requesting user of the wireless device, wherein the wireless device is granted access to the secured wireless network following a determination that the security key is valid and has not expired.
-
Specification