Dynamic authentication in secured wireless networks
First Claim
Patent Images
1. A method for pairing secrets in a secured wireless network, the method comprising:
- receiving an access request from a wireless interface device, the access request regarding access to the secured wireless network;
identifying that the wireless interface device belongs to an authenticated user having an access profile in the secured wireless network, wherein identification is based on the access request;
determining that the wireless interface device is associated with a valid security key derived from a secret, the secret associated with the access profile belonging to the authenticated user, wherein determining that the wireless interface device is associated with the valid security key comprises;
initially identifying that the wireless interface device is associated with at least one invalid security key, wherein the secret associated with the invalid security key is identified as being expired,updating the expired secret associated with the access profile by;
generating a new random secret unique to the authenticated user, wherein the new secret is associated with the access profile belonging to the authenticated user;
deriving one or more security keys from the new secret; and
updating a table of unassociated security keys with the one or more security keys derived from the new secret;
obtaining the valid security key from the table of unassociated security keys, andproviding the valid security key to the wireless interface device, wherein execution of an executable on the wireless interface device configures the wireless interface device to access the secured wireless network using the access profile and the valid security key; and
permitting use of the valid security key to access the secured wireless network, wherein the use of the valid security key is restricted to the wireless interface device belonging to the user as identified by the access profile.
13 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authentication using paired dynamic secrets in secured wireless networks are provided. Each authenticated user is assigned a random secret generated so as to be unique to the user. The secret is associated with a wireless interface belonging to the user, so that no other wireless interface may use the same secret to access the network. The secret may be updated either periodically or at the request of a network administrator, and reauthentication of the wireless network may be required.
207 Citations
11 Claims
-
1. A method for pairing secrets in a secured wireless network, the method comprising:
-
receiving an access request from a wireless interface device, the access request regarding access to the secured wireless network; identifying that the wireless interface device belongs to an authenticated user having an access profile in the secured wireless network, wherein identification is based on the access request; determining that the wireless interface device is associated with a valid security key derived from a secret, the secret associated with the access profile belonging to the authenticated user, wherein determining that the wireless interface device is associated with the valid security key comprises; initially identifying that the wireless interface device is associated with at least one invalid security key, wherein the secret associated with the invalid security key is identified as being expired, updating the expired secret associated with the access profile by; generating a new random secret unique to the authenticated user, wherein the new secret is associated with the access profile belonging to the authenticated user; deriving one or more security keys from the new secret; and updating a table of unassociated security keys with the one or more security keys derived from the new secret; obtaining the valid security key from the table of unassociated security keys, and providing the valid security key to the wireless interface device, wherein execution of an executable on the wireless interface device configures the wireless interface device to access the secured wireless network using the access profile and the valid security key; and permitting use of the valid security key to access the secured wireless network, wherein the use of the valid security key is restricted to the wireless interface device belonging to the user as identified by the access profile. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for pairing secrets in a secured wireless network comprising:
-
an authentication module stored in memory and executable by a processor to authenticate a user of a wireless interface device, the authenticated user having an access profile in the secured wireless network; a secret database for storing information concerning an updated secret, the secret database including a table concerning at least one valid security key derived from the updated secret, the updated secret associated with the access profile belonging to the authenticated user; a secret generation module stored in memory and executable by a processor to update a secret when the secret is identified as being expired, wherein updating the secret comprises; generating a new random secret unique to the authenticated user, wherein the new secret is associated with the access profile belonging to the authenticated user, and deriving one or more security keys from the new secret, wherein the table is updated with the one or more security keys derived from the new secret; an executable generation module stored in memory and executable by the processor to generate an executable for using the access profile and the updated secret to configure the wireless interface device to access the secured wireless network; and an interface that receives requests to access the secured wireless network, wherein use of the valid security key to access the secured wireless network is restricted to the wireless interface device belonging to the user as identified by the access profile. - View Dependent Claims (8, 9, 10, 11)
-
Specification