Network access via telephony services
First Claim
1. A method comprising:
- receiving a token at a first device via a second device, the token received by the second device from a computing system responsive to a request for access to a first wireless network secured with a network encryption key, the request sent from the second device to the computing system via a second wireless network, the second wireless network different than the first wireless network, and wherein the computing system generates and sends the token to the second device and to a registration device in response to a determination by the computing system that a user account associated with the second device permits access to the first wireless network;
sending, from the first device to the registration device via the first wireless network, a hash value based on the token; and
responsive to the hash value matching a second hash value generated by the registration device from the token received by the registration device from the computing system, receiving, at the first device, configuration data to enable the first device to access the first wireless network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes receiving a token at a first device via a second device. The token is received by the second device from a computing system responsive to a request for access to a first wireless network secured with a network encryption key. The request is sent from the second device via a second wireless network. The computing system generates and sends the token to the second device and to a registration device in response to a determination that a user account associated with the second device permits access to the first wireless network. The method includes sending, from the first device to the registration device via the first wireless network, a hash value based on the token. Responsive to the hash value matching a second hash value generated by the registration device, the method includes receiving configuration data to enable the first device to access the first wireless network.
47 Citations
20 Claims
-
1. A method comprising:
-
receiving a token at a first device via a second device, the token received by the second device from a computing system responsive to a request for access to a first wireless network secured with a network encryption key, the request sent from the second device to the computing system via a second wireless network, the second wireless network different than the first wireless network, and wherein the computing system generates and sends the token to the second device and to a registration device in response to a determination by the computing system that a user account associated with the second device permits access to the first wireless network; sending, from the first device to the registration device via the first wireless network, a hash value based on the token; and responsive to the hash value matching a second hash value generated by the registration device from the token received by the registration device from the computing system, receiving, at the first device, configuration data to enable the first device to access the first wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable memory device storing instructions executable by a processor to perform operations comprising:
-
causing a first transmitter to send a request to access a first wireless network secured with a network encryption key to a computing system, the request sent via a second wireless network different than the first wireless network; in response to a determination by the computing system that a user account associated with the processor permits access to the first wireless network, receiving a token from the computing system via the second wireless network, wherein the computing system sends the token to a registration device; and causing a second transmitter to send the token to a device, wherein possession of the token by the device enables the device to send a hash value based on the token to the registration device via the first wireless network, and wherein, based on the hash value matching a second hash value generated by the registration device from the token received from the computing system, the registration device enables the device to determine the network encryption key for access to the first wireless network. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system comprising:
-
a processor; and a memory device accessible to the processor, the memory device storing instructions executable by the processor to cause the processor to perform operations comprising; causing a transmitter to send a request to access a first wireless network secured with a network encryption key to a computing system, the request sent via a second wireless network different than the first wireless network; in response to a determination by the computing system that a user account associated with the processor permits access to the first wireless network, receiving a token from the computing system via the second wireless network, wherein the computing system sends the token to a registration device; and displaying the token to a display device, wherein display of the token enables a user to provide the token to a device via user input, wherein possession of the token by the device enables the device to send a hash value based on the token to the registration device via the first wireless network, and wherein, based on the hash value matching a second hash value generated by the registration device from the token received from the computing system, the registration device enables the device to determine the network encryption key for access to the first wireless network. - View Dependent Claims (17, 18, 19, 20)
-
Specification