Authorizing stations into a centrally managed network
First Claim
Patent Images
1. A method for authorizing a station, the method comprising:
- generating, by a first station, a network membership key request;
communicating, via a first network, the network membership key request to an authorization server, the network membership key request including a unique identifier associated with the first station;
receiving a network membership key based, at least in part, on the network membership key request, wherein the network membership key is received in a first encrypted format based, at least in part, upon a device access key, wherein the network membership key is utilized by the first station to indicate the first station is authorized to join or participate as a member of a sub-network coupled to the first network, wherein the sub-network comprises one of an AV sub-cell or a BPL sub-cell;
communicating, by the first station, a network encryption key request , the network encryption key request encrypted utilizing the network membership key; and
receiving a network encryption key in a second encrypted format, wherein the second encrypted format is based, at least in part, upon the network membership key.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for connecting new stations to a secure network. New stations can send connection requests to a headend device. The headend device can retrieve a device access key associated with the new station and can provide a network membership key to the new station based upon authentication of the new station using the device access key.
-
Citations
25 Claims
-
1. A method for authorizing a station, the method comprising:
-
generating, by a first station, a network membership key request; communicating, via a first network, the network membership key request to an authorization server, the network membership key request including a unique identifier associated with the first station; receiving a network membership key based, at least in part, on the network membership key request, wherein the network membership key is received in a first encrypted format based, at least in part, upon a device access key, wherein the network membership key is utilized by the first station to indicate the first station is authorized to join or participate as a member of a sub-network coupled to the first network, wherein the sub-network comprises one of an AV sub-cell or a BPL sub-cell; communicating, by the first station, a network encryption key request , the network encryption key request encrypted utilizing the network membership key; and receiving a network encryption key in a second encrypted format, wherein the second encrypted format is based, at least in part, upon the network membership key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for authorizing a station, the method comprising:
-
receiving, via a first network, an encrypted network membership key request from a first station, wherein the encrypted network membership key request is associated with an unencrypted unique identifier; determining whether the encrypted network membership key request is authentic based, at least in part, upon the unencrypted unique identifier; encrypting a network membership key using a device access key associated with the first station, wherein the network membership key is utilized by the first station to indicate the first station is authorized to join or participate as a member of a sub-network coupled to the first network, wherein the sub-network comprises one of an AV sub-cell or a BPL sub-cell; communicating the encrypted network membership key to the first station; receiving a network encryption key request, the network encryption key request encrypted utilizing a key; encrypting a network encryption key using the network membership key; and communicating the encrypted network encryption key to the first station. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An authentication system comprising:
a processor; and a storage medium comprising program instructions that, when executed by the processor, cause the authentication system to; receive, from a first station via a first network, an encrypted network membership key request; identify a device access key stored by the authentication system based, at least in part, on an unencrypted unique identifier associated with the encrypted network membership key request; authenticate the first station based, at least in part, on utilizing the device access key to successfully decrypt the encrypted network membership key request; encrypt a network membership key for the first station using the device access key, wherein the network membership key is utilized by the first station to indicate the first station is authorized to join or participate as a member of a sub-network coupled to the first network, wherein the sub-network comprises one of an AV sub-cell or a BPL sub-cell; communicate the encrypted network membership key to the first station based, at least in part, on authenticating the first station; receive a network encryption key request, the network encryption key request encrypted utilizing the network membership key; encrypt a network encryption key using the network membership key; and communicate the encrypted network encryption key to the first station. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25)
Specification