×

Dynamic authentication in secured wireless networks

  • US 7,788,703 B2
  • Filed: 04/18/2007
  • Issued: 08/31/2010
  • Est. Priority Date: 04/24/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for pairing secrets in a secured wireless network, the method comprising:

  • receiving an access request from a wireless interface device, the access request regarding access to the secured wireless network;

    identifying that the wireless interface device belongs to an authenticated user having an access profile in the secured wireless network, wherein identification is based on the access request;

    determining that the wireless interface device is associated with a valid security key derived from a secret, the secret associated with the access profile belonging to the authenticated user, wherein determining that the wireless interface device is associated with the valid security key comprises;

    initially identifying that the wireless interface device is associated with at least one invalid security key, wherein the secret associated with the invalid security key is identified as being expired,updating the expired secret associated with the access profile by;

    generating a new random secret unique to the authenticated user, wherein the new secret is associated with the access profile belonging to the authenticated user;

    deriving one or more security keys from the new secret; and

    updating a table of unassociated security keys with the one or more security keys derived from the new secret;

    obtaining the valid security key from the table of unassociated security keys, andproviding the valid security key to the wireless interface device, wherein execution of an executable on the wireless interface device configures the wireless interface device to access the secured wireless network using the access profile and the valid security key; and

    permitting use of the valid security key to access the secured wireless network, wherein the use of the valid security key is restricted to the wireless interface device belonging to the user as identified by the access profile.

View all claims
  • 13 Assignments
Timeline View
Assignment View
    ×
    ×