Re-login time duration allowing hotspot user to sign up for additional access time without disconnecting from secured wireless network
First Claim
1. A method of authorizing secured wireless access at a hotspot, the method comprising:
- providing an open wireless network having no network-level encryption and allowing open association therewith by a client device;
establishing an encrypted connection between the client device and a login portal of the hotspot over the open wireless network;
requiring a user of the client device to perform a predetermined sign-up process at the login portal in order to obtain a user-specific access credential with a predetermined access expiry time;
providing a secure wireless network employing network-level encryption and requiring successful completion of an authentication process before allowing association therewith by the client device;
receiving the user-specific access credential from the client device as a part of the authentication process, and allowing the client device is to successfully associate with the secure wireless network prior to the predetermined access expiry time being reached;
allowing the client device to access a resource over the secure wireless network while the client device is successfully associated with the secure wireless network until the predetermined access expiry time is reached;
in response to the predetermined access expiry time being reached, preventing the client device from accessing the resource over the secure wireless network and starting a re-login time duration; and
automatically disconnecting the client device from the secure wireless network in response to the re-login time duration expiring unless the user signs up for additional access time at the login portal;
wherein, during the re-login time duration, the user of the client device may access the login portal without needing to disconnect from the secure wireless network.
2 Assignments
0 Petitions
Accused Products
Abstract
A hotspot provides an open wireless network and a secure wireless network. The open wireless network has no network-level encryption and allows open association therewith. The secure wireless network employs network-level encryption and requires authentication of a received access credential from a client device before allowing association therewith. A system for authorizing the client device for secured access at the hotspot includes an access controller configured to establish an encrypted connection between the client device and a login portal of the hotspot over the open wireless network, and to store a user-specific access credential transmitted via the encrypted connection as a valid access credential in a credential database. The credential database is accessed by wireless access points of the hotspot to authenticate the received access credential from the client device in response to a request from the client device to associate with the secure wireless network.
-
Citations
20 Claims
-
1. A method of authorizing secured wireless access at a hotspot, the method comprising:
-
providing an open wireless network having no network-level encryption and allowing open association therewith by a client device; establishing an encrypted connection between the client device and a login portal of the hotspot over the open wireless network; requiring a user of the client device to perform a predetermined sign-up process at the login portal in order to obtain a user-specific access credential with a predetermined access expiry time; providing a secure wireless network employing network-level encryption and requiring successful completion of an authentication process before allowing association therewith by the client device; receiving the user-specific access credential from the client device as a part of the authentication process, and allowing the client device is to successfully associate with the secure wireless network prior to the predetermined access expiry time being reached; allowing the client device to access a resource over the secure wireless network while the client device is successfully associated with the secure wireless network until the predetermined access expiry time is reached; in response to the predetermined access expiry time being reached, preventing the client device from accessing the resource over the secure wireless network and starting a re-login time duration; and automatically disconnecting the client device from the secure wireless network in response to the re-login time duration expiring unless the user signs up for additional access time at the login portal; wherein, during the re-login time duration, the user of the client device may access the login portal without needing to disconnect from the secure wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for authorizing secured wireless access at a hotspot, the system comprising:
-
one or more access points providing an open wireless network having no network-level encryption and allowing open association therewith by a client device; one or more processors executing software in order to provide a login portal; one or more access points providing a secure wireless network employing network-level encryption and requiring successful completion of an authentication process before allowing association therewith by the client device; and a firewall coupled to the one or more access points providing the secure wireless network; wherein the login portal is operable to establish an encrypted connection with the client device over the open wireless network and require a user of the client device to perform a predetermined sign-up process in order to obtain a user-specific access credential with a predetermined access expiry time; the one or more access points providing the secure wireless network are operable to receive the user-specific access credential from the client device as a part of the authentication process, and allow the client device to successfully associate with the secure wireless network prior to the predetermined access expiry time being reached; the firewall is operable to allow the client device to access a resource over the secure wireless network while the client device is successfully associated with the secure wireless network until the predetermined access expiry time is reached; the one or more processors are further operable to automatically reconfigure the firewall to prevent the client device from accessing the resource over the secure wireless network in response to the predetermined access expiry time being reached; the one or more processors are further operable to start a re-login time duration in response to the predetermined access expiry time being reached; the one or more processors are further operable to send a command to the one or more access points providing the secure wireless network in response to the re-login time duration expiring unless the user signs up for additional access time at the login portal, the command causing the client device to be disconnected from the secure wireless network; and during the re-login time duration, the client device may access the login portal without needing to disconnect from the secure wireless network. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium comprising computer executable instructions that when executed by a computer cause the computer to perform a method of authorizing secured wireless access at a hotspot, the method comprising:
-
providing an open wireless network having no network-level encryption and allowing open association therewith by a client device; establishing an encrypted connection between the client device and a login portal of the hotspot over the open wireless network; requiring a user of the client device to perform a predetermined sign-up process at the login portal in order to obtain a user-specific access credential with a predetermined access expiry time; providing a secure wireless network employing network-level encryption and requiring successful completion of an authentication process before allowing association therewith by the client device; receiving the user-specific access credential from the client device as a part of the authentication process, and allowing the client device to successfully associate with the secure wireless network prior to the predetermined access expiry time being reached; allowing the client device to access a resource over the secure wireless network while the client device is successfully associated with the secure wireless network until the predetermined access expiry time is reached; in response to the predetermined access expiry time being reached, preventing the client device from accessing the resource over the secure wireless network and starting a re-login time duration; and automatically disconnecting the client device from the secure wireless network in response to the re-login time duration expiring unless the user signs up for additional access time at the login portal; wherein, during the re-login time duration, the user of the client device may access the login portal without needing to disconnect from the secure wireless network. - View Dependent Claims (20)
-
Specification