Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic authentication in secured wireless networks

A pre-configured, wireless device technology, applied in the field of information network security, can solve difficult and complex problems

Active Publication Date: 2009-06-10
RUCKUS WIRELESS
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, various technical complications may arise for users and network administrators, including different wireless devices and interfaces, different access requirements, and different access restrictions
[0007] While many of the measures described can be used to secure wireless networks, any of these measures can be complex, difficult, and / or maintenance-intensive to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic authentication in secured wireless networks
  • Dynamic authentication in secured wireless networks
  • Dynamic authentication in secured wireless networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Embodiments of the invention include systems and methods for user-friendly, low-maintenance configuration of wireless devices to access restricted wireless networks. Users of wireless devices are allowed to connect to open wireless or wired networks. After the user is authenticated, an application can be generated that will allow the wireless device to connect to a protected or restricted wireless network. After the application is transmitted to and executed on the wireless device, the application configures the wireless device to access the restricted wireless network. The configuration, also referred to as a provisioning configuration, may be based on user information, wireless device information, or both. In some embodiments, the application is capable of configuring the wireless device to have access to multiple wireless networks.

[0017] 1 is an illustration of a system for provisioning wireless devices to access a restricted wireless network 160, according to a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and methods for authentication using paired dynamic secrets in secured wireless networks are provided. Each authenticated user is assigned a random secret generated so as to be unique to the user. The secret is associated with a wireless interface belonging to the user, so that no other wireless interface may use the same secret to access the network. The secret may be updated either periodically or at the request of a network administrator, and reauthentication of the wireless network may be required.

Description

[0001] Cross References to Related Applications [0002] This application is a continuation-in-part of U.S. Patent Application 11 / 788,371, filed April 18, 2007, and entitled "Dynamic Authentication in Secured Wireless Networks," claiming the benefit of priority to the following patent applications: filed April 24, 2006 U.S. Provisional Patent Application 60 / 794,625, entitled "Mechanisms and Apparatus to Provide Pre-Shared Key Authentication with Dynamic Secret on Wireless Networks," and "Mechanisms and Apparatus for Automatic Wireless Connection Based on Provisioned Configuration," filed May 2, 2006 "U.S. Provisional Patent Application 60 / 796,845. The disclosures of the aforementioned applications are hereby incorporated by reference. technical field [0003] The present invention relates generally to information network security. More specifically, the present invention relates to a user-friendly system for configuring a wireless device to access a restricted wireless netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/66H04M1/68H04M3/00H04M3/16G06F15/177H04L9/00
Inventor 杨博杰舒明郭德才林天元朱延书
Owner RUCKUS WIRELESS
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More