×

Apparatus and method for accessing wireless networks

  • US 9,883,399 B2
  • Filed: 09/25/2015
  • Issued: 01/30/2018
  • Est. Priority Date: 12/06/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method utilized by a wireless device for accessing a secure wireless network, comprising, in a wireless device:

  • accessing, by the wireless device, a social network account that provides member information about a plurality of social network members, wherein the member information includes network detection data and security data to access a secure wireless network of a member of the social network;

    retrieving, by the wireless device, the network detection data from the social network to generate a network identifier of the secure wireless network of the member;

    retrieving, by the wireless device, the security data from the social network to generate a security key for the secure wireless network of the member; and

    accessing, by the wireless device, the secure wireless network of the member using the network identifier and security key;

    wherein the security key generated by retrieving the security data from the social network is a first security key, the method further comprising;

    detecting, by the wireless device, a change to the security data from the social network;

    retrieving, by the wireless device, the changed security data from the social network;

    initiating, by the wireless device, a change to the first security key to generate a second security key by utilizing the changed security data to derive the second security key;

    transmitting, by the wireless device, the second security key to a network node of the secure wireless network;

    maintaining, by the wireless device, communication with the secure wireless network using the first security key for a transition time period to allow the network node of the secure wireless network to acquire the second security key, wherein the transition time period is based at least in part on latency characteristics of the secure wireless network; and

    accessing, by the wireless device, the secure wireless network using the second security key after the transition time period.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×