Connecting to Wi-Fi network based off approval from another user device
First Claim
1. A computer-implemented method for sharing an authentication profile between a plurality of computing devices for accessing a particular Wi-Fi network, the method comprising:
- obtaining, at a first computing device of the computing devices, a list of Wi-Fi networks that are in a range of the first computing device, the computing devices associated with a user;
receiving, by the first computing device, an access request from the user to access the particular Wi-Fi network from the list of Wi-Fi networks on the first computing device, the particular Wi-Fi network being an access restricted Wi-Fi network;
determining, by the first computing device and in response to the receiving the access request, whether any of the computing devices can approve the access request, the determining including;
sending an approval request to a set of the computing devices that are in proximity to the first computing device for approving the access request, the sending the approval request using a short range wireless communication;
responsive to a determination that a second computing device of the set of computing devices can approve the access request, obtaining an approval from the second computing device for accessing the particular Wi-Fi network on the first computing device, the obtaining including;
presenting, by the second computing device, a notification on the second computing device requesting the user to approve the access request, andobtaining, upon approval of the access request by the user, the authentication profile containing authentication information for accessing the particular Wi-Fi network from the second computing device, the obtaining using the short range wireless communication, the obtaining including requesting, by the second computing device, a server computer to verify whether the first computing device is a member of a trusted devices group of which the second computing device is a member; and
accessing, by the first computing device, the particular Wi-Fi network using the authentication profile obtained from the second computing device.
4 Assignments
0 Petitions
Accused Products
Abstract
Technology is disclosed for sharing an authentication profile for accessing a Wi-Fi network between multiple devices. To access a particular Wi-Fi network on a first device and a second device, authentication information, e.g., a password for the Wi-Fi network, may have to be input on both the devices. In some embodiments, the technology facilitates obtaining an approval for accessing the Wi-Fi network on the second device from the first device. Upon receiving a request from a user of the second device to access the Wi-Fi network on the second device, the second device requests if any of the devices, e.g., devices in proximity, can approve the access request. A notification is displayed on the first device regarding the access request. The user associated with first device can then approve the access request, which causes authentication information for accessing the Wi-Fi network to be transmitted to the second device.
-
Citations
24 Claims
-
1. A computer-implemented method for sharing an authentication profile between a plurality of computing devices for accessing a particular Wi-Fi network, the method comprising:
-
obtaining, at a first computing device of the computing devices, a list of Wi-Fi networks that are in a range of the first computing device, the computing devices associated with a user; receiving, by the first computing device, an access request from the user to access the particular Wi-Fi network from the list of Wi-Fi networks on the first computing device, the particular Wi-Fi network being an access restricted Wi-Fi network; determining, by the first computing device and in response to the receiving the access request, whether any of the computing devices can approve the access request, the determining including; sending an approval request to a set of the computing devices that are in proximity to the first computing device for approving the access request, the sending the approval request using a short range wireless communication; responsive to a determination that a second computing device of the set of computing devices can approve the access request, obtaining an approval from the second computing device for accessing the particular Wi-Fi network on the first computing device, the obtaining including; presenting, by the second computing device, a notification on the second computing device requesting the user to approve the access request, and obtaining, upon approval of the access request by the user, the authentication profile containing authentication information for accessing the particular Wi-Fi network from the second computing device, the obtaining using the short range wireless communication, the obtaining including requesting, by the second computing device, a server computer to verify whether the first computing device is a member of a trusted devices group of which the second computing device is a member; and accessing, by the first computing device, the particular Wi-Fi network using the authentication profile obtained from the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method for sharing an authentication profile between a plurality of computing devices, using a server, for accessing a particular Wi-Fi network, the method comprising:
-
obtaining, at a first computing device of the computing devices, a list of Wi-Fi networks that are in range of the first computing device, the computing devices associated with one or more users, the first computing device associated with a first user of the one or more users; receiving, by the first computing device, an access request from the first user to access the particular Wi-Fi network from the list of Wi-Fi networks on the first computing device, the particular Wi-Fi network being an access restricted Wi-Fi network; sending, by the first computing device and in response to receiving the access request, an approval request to the server, the server facilitating obtaining access to the particular Wi-Fi network to approve the access request; causing the server to determine whether the server can approve the access request, the determining including; causing the server to determine whether any of a remaining set of the computing devices have the authentication profile, the authentication profile containing authentication information for accessing the particular Wi-Fi network, and causing the server to receive a response from a second computing device of the remaining set of the computing devices indicating that the second computing device contains the authentication profile; responsive to a determination that the server can approve the access request, obtaining an approval from the server for accessing the particular Wi-Fi network on the first computing device, the obtaining including; causing, by the second computing device, the server to determine whether the first computing device is a member of a trusted devices group of which the second computing device is a member, wherein the sharing of the authentication profile is restricted to a group of the computing devices that are members of the trusted devices group, and responsive to a determination that the first computing device is a member of the trusted devices group, causing the server to obtain the authentication profile from the second computing device; and accessing, by the first computing device, the particular Wi-Fi network using the authentication profile obtained from the server. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computing device for obtaining access to a particular Wi-Fi network, comprising:
-
a processor; an access request engine that works in co-operation with the processor to obtain a list of Wi-Fi networks that are in a range of the computing device, the computing device associated with a first user, and receive an access request from the first user to access the particular Wi-Fi network from the list of Wi-Fi networks on the computing device, the particular Wi-Fi network being an access restricted Wi-Fi network; an authentication profile discovery engine to determine, in response to the receiving the access request, whether any of a plurality of computing devices that are in proximity to the computing device can approve the access request, the computing devices associated with one or more users, the determining including; sending an approval request to the computing devices for approving the access request, the sending the approval request using a short range wireless communication, and receiving a response from a second computing device of the computing devices indicating that the second computing device can approve the access request, the second computing device associated with a second user of the one or more users; responsive to a determination that the second computing device can approve the access request, obtain an approval from the second computing device for accessing the particular Wi-Fi network on the computing device, the obtaining including; causing the second computing device to display a notification on the second computing device requesting the second user to approve the access request, the causing including obtaining, by the second computing device, a verification that the first computing device is a member of a trusted devices group of which the second computing device is a member, and obtaining, upon approval of the access request by the second user, an authentication profile containing authentication information for accessing the particular Wi-Fi network from the second computing device, the obtaining using the short range wireless communication; and an authentication engine to provide the computing device access to the particular Wi-Fi network using the authentication profile obtained from the second computing device. - View Dependent Claims (21, 22)
-
-
23. A server for facilitating sharing of an authentication profile between multiple computing devices to access a particular Wi-Fi network, comprising:
-
a processor; a profile sharing request engine that works in cooperation with the processor to receive a request from a first computing device to approve an access request for accessing the particular Wi-Fi network, the first computing device associated with a first user; an authentication profile discovery engine to determine whether any of a plurality of computing devices have an authentication profile of the particular Wi-Fi network, the authentication profile containing authentication information for accessing the particular Wi-Fi network, the computing devices associated with one or more users, and receive a response from a second computing device of the computing devices indicating that the second computing device contains the authentication profile, determine whether the first computing device is a member of a trusted devices group of which the second computing device is a member, wherein the sharing of the authentication profile is restricted to a group of the computing devices that are members of the trusted devices group, responsive to a determination that the first computing device is a member of the trusted devices group, obtain the authentication profile from the second computing device; and a network engine to provide the authentication profile obtained from the second computing device to the first computing device. - View Dependent Claims (24)
-
Specification