Network access via telephony services
First Claim
1. A method comprising:
- receiving, by a computing system of a mobile communication wireless network from a first mobile device, a request to access via an access point a wireless network secured with a network encryption key, wherein the mobile communication wireless network is different from the wireless network;
identifying, at the computing system, a user account associated with the first mobile device;
determining, at the computing system, that the user account permits access to the wireless network secured with the network encryption key;
sending, from the computing system to a registration device, a token that is usable by a second mobile device to access the network encryption key; and
sending, by the computing system via the mobile communication wireless network, the token to the first mobile device for transmission of the token to the second mobile device to enable the second mobile device to demonstrate possession of the token to access the wireless network via the access point, wherein the second mobile device demonstrates possession of the token by sending to the access point hash values based on portions of the token, and wherein the hash values are compared to hash values generated from the token received by the registration device.
1 Assignment
0 Petitions
Accused Products
Abstract
A network provider can receive a request, via a first mobile device and a mobile wireless telephone network, for access to a wireless network secured with at least one encryption key and implemented by at least one wireless access point. In response to the request, the network provider can associate the first mobile device with a user account of a user and can provide a token to a registrar and to the first mobile device via the mobile wireless telephone network. The registrar can receive, from the first mobile device or a second mobile device associated the user via the wireless access point. After determining, based on the one or more hash values, that the first or second mobile device has possession of the token, the registrar can provide the encryption key to that mobile device.
41 Citations
32 Claims
-
1. A method comprising:
-
receiving, by a computing system of a mobile communication wireless network from a first mobile device, a request to access via an access point a wireless network secured with a network encryption key, wherein the mobile communication wireless network is different from the wireless network; identifying, at the computing system, a user account associated with the first mobile device; determining, at the computing system, that the user account permits access to the wireless network secured with the network encryption key; sending, from the computing system to a registration device, a token that is usable by a second mobile device to access the network encryption key; and sending, by the computing system via the mobile communication wireless network, the token to the first mobile device for transmission of the token to the second mobile device to enable the second mobile device to demonstrate possession of the token to access the wireless network via the access point, wherein the second mobile device demonstrates possession of the token by sending to the access point hash values based on portions of the token, and wherein the hash values are compared to hash values generated from the token received by the registration device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer readable memory device comprising instructions, which when executed by a processing system, cause the processing system to perform operations comprising:
-
receiving, via a mobile communication wireless network from a first mobile device, a request to access via an access point a wireless network secured with a network encryption key, wherein the mobile communication wireless network is different from the wireless network; identifying a user account associated with the first mobile device; determining that the user account permits access to the wireless network secured with the network encryption key; sending a token to a registration device, the token usable by a second mobile device to access the network encryption key; and sending the token via the mobile communication wireless network to the first mobile device for transmission of the token to the second mobile device to enable the second mobile device to demonstrate possession of the token to access the wireless network via the access point, wherein the second mobile device demonstrates possession of the token by sending to the access point hash values based on portions of the token, and wherein the hash values are compared to hash values generated from the token received by the registration device. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. A system comprising:
-
a processor; and a memory device accessible to the processor, the memory device storing instructions that are executable by the processor to cause the processor to perform operations comprising; receiving, via a mobile communication wireless network from a first mobile device, a request to access via an access point a wireless network secured with a network encryption key, wherein the mobile communication wireless network is different from the wireless network; identifying a user account associated with the first mobile device; determining that the user account permits access to the wireless network secured with the network encryption key; sending a token to a registration device, the token usable by a second mobile device to access the network encryption key; and sending the token via the mobile communication wireless network to the first mobile device for transmission of the token to the second mobile device to enable the second mobile device to demonstrate possession of the token to access the wireless network via the access point, wherein the second mobile device demonstrates possession of the token by sending to the access point hash values based on portions of the token, and wherein the hash values are compared to hash values generated from the token received by the registration device. - View Dependent Claims (27, 28, 29, 30, 31, 32)
-
Specification