Authorizing secured wireless access at hotspot having open wireless network and secure wireless network
First Claim
1. A method of authorizing secured wireless access at a hotspot, the method comprising:
- providing an open wireless network having no network-level encryption and allowing open association therewith by a client device;
establishing an encrypted connection between the client device and a login portal of the hotspot over the open wireless network;
requiring a user of the client device to perform a predetermined sign-up process at the login portal before adding a user-specific access credential to a credential database;
adding the user-specific access credential as a valid access credential in the credential database, wherein the credential database stores a plurality of valid access credentials acceptable for gaining secure wireless access at the hotspot, and the user-specific access credential is transmitted between the login portal and the client device via the encrypted connection;
providing a secure wireless network employing network-level encryption and requiring successful completion of an authentication process before allowing association therewith by the client device;
receiving a request from the client device to associate with the secure wireless network after the user-specific access credential has been added to the credential database;
receiving the user-specific access credential from the client device as a part of the authentication process performed before the client device is allowed to associate with the secure wireless network;
accessing the credential database to check whether the user-specific access credential received from the client device during the authentication process corresponds to one of the valid access credentials stored in the credential database;
allowing the client device to associate with the secure wireless network only when the user-specific access credential received from the client device during the authentication process corresponds to one of the valid access credentials stored in the credential database;
allowing the client device to access the Internet over the secure wireless network after the client device has successfully associated with the secure wireless network until an Internet access expiry time is reached;
in response to the Internet access expiry time being reached, preventing the client device from accessing the Internet over the secure wireless network and starting a re-login time duration; and
automatically removing the user-specific access credential from the credential database in response to the re-login time duration expiring;
wherein, during the re-login time duration, the user of the client device may sign up for additional Internet access time at the login portal without needing to disconnect from the secure wireless network.
4 Assignments
0 Petitions
Accused Products
Abstract
A hotspot provides an open wireless network and a secure wireless network. The open wireless network has no network-level encryption and allows open association therewith. The secure wireless network employs network-level encryption and requires authentication of a received access credential from a client device before allowing association therewith. A system for authorizing the client device for secured access at the hotspot includes an access controller configured to establish an encrypted connection between the client device and a login portal of the hotspot over the open wireless network, and to store a user-specific access credential transmitted via the encrypted connection as a valid access credential in a credential database. The credential database is accessed by wireless access points of the hotspot to authenticate the received access credential from the client device in response to a request from the client device to associate with the secure wireless network.
-
Citations
16 Claims
-
1. A method of authorizing secured wireless access at a hotspot, the method comprising:
-
providing an open wireless network having no network-level encryption and allowing open association therewith by a client device; establishing an encrypted connection between the client device and a login portal of the hotspot over the open wireless network; requiring a user of the client device to perform a predetermined sign-up process at the login portal before adding a user-specific access credential to a credential database; adding the user-specific access credential as a valid access credential in the credential database, wherein the credential database stores a plurality of valid access credentials acceptable for gaining secure wireless access at the hotspot, and the user-specific access credential is transmitted between the login portal and the client device via the encrypted connection; providing a secure wireless network employing network-level encryption and requiring successful completion of an authentication process before allowing association therewith by the client device; receiving a request from the client device to associate with the secure wireless network after the user-specific access credential has been added to the credential database; receiving the user-specific access credential from the client device as a part of the authentication process performed before the client device is allowed to associate with the secure wireless network; accessing the credential database to check whether the user-specific access credential received from the client device during the authentication process corresponds to one of the valid access credentials stored in the credential database; allowing the client device to associate with the secure wireless network only when the user-specific access credential received from the client device during the authentication process corresponds to one of the valid access credentials stored in the credential database; allowing the client device to access the Internet over the secure wireless network after the client device has successfully associated with the secure wireless network until an Internet access expiry time is reached; in response to the Internet access expiry time being reached, preventing the client device from accessing the Internet over the secure wireless network and starting a re-login time duration; and automatically removing the user-specific access credential from the credential database in response to the re-login time duration expiring; wherein, during the re-login time duration, the user of the client device may sign up for additional Internet access time at the login portal without needing to disconnect from the secure wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for authorizing secured wireless access at a hotspot, the system comprising:
-
one or more access points providing an open wireless network having no network-level encryption and allowing open association therewith by a client device; a computer server having one or more processors executing software in order to provide a login portal; a storage device coupled to the computer server and storing a credential database, the credential database storing a plurality of valid access credentials acceptable for gaining secure wireless access at the hotspot; one or more access points providing a secure wireless network employing network-level encryption and requiring successful completion of an authentication process before allowing association therewith by the client device; and a firewall coupled to the one or more access points providing the secure wireless network and the computer server providing the login portal; wherein the login portal is operable to establish an encrypted connection with the client device over the open wireless network and requires a user of the client device to perform a predetermined sign-up process before adding a user-specific access credential to the credential database;
the login portal is operable to add the user-specific access credential as a valid access credential in the credential database; and
the user-specific access credential is transmitted between the login portal and the client device via the encrypted connection; andwherein;
the one or more access points providing the secure wireless network are operable to;receive a request from the client device to associate with the secure wireless network after the user-specific access credential has been added to the credential database; receive the user-specific access credential from the client device as a part of the authentication process performed before the client device is allowed to associate with the secure wireless network; access the credential database to check whether the user-specific access credential received from the client device during the authentication process corresponds to one of the valid access credentials stored in the credential database; and allow the client device to associate with the secure wireless network only when the user-specific access credential received from the client device during the authentication process corresponds to one of the valid access credentials stored in the credential database; the login portal is further operable to automatically reconfigure the firewall in order to allow the client device to access the Internet over the secure wireless network until an Internet access expiry time is reached; the login portal is further operable to automatically reconfigure the firewall to prevent the client device from accessing the Internet over the secure wireless network in response to the Internet access expiry time being reached; the login portal is further operable to start a re-login time duration in response to the Internet access expiry time being reached; the login portal is further operable to automatically remove the user-specific access credential from the credential database in response to the re-login time duration expiring; and during the re-login time duration, the user of the client device may sign up for additional Internet access time at the login portal without needing to disconnect from the secure wireless network. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification