Browse Prior Art Database

Method and System for Remotely Authenticating Access to a Wireless Network Disclosure Number: IPCOM000243511D
Publication Date: 2015-Sep-28
Document File: 2 page(s) / 45K

Publishing Venue

The Prior Art Database


A method and system is disclosed for remotely authenticating access to a wireless network.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 2

Method and System for Remotely Authenticating Access to a Wireless Network

Disclosed is a method and system for remotely authenticating access to a wireless network. The method and system manages wireless access point remotely using a trusted mobile device which can receive and respond to requests for access. The access point can be a router. Based on the requests, the trusted mobile device grants access to known requestor devices through an intermediation of time-sensitive and generated password/ Personal Identification Number (PIN) /key. The password/PIN/key can be human readable.

During an initial setup of the access point, a mobile device is registered as a trusted administration device and a dedicated mobile application is installed on the mobile device which is bound to the access point. Any subsequent administrator interaction with the access point for the limited purpose of managing network access is then fully

available through the mobile application. The mobile application is also able to receive any access point notifications and allows the administrator to act upon such notifications.

To simplify the process of obtaining network access, the interaction between a WiFi*-enabled device and an access point through an intermediation of a Captive Portal function is used. The Captive Portal function can be potentially implemented by an access point firmware. The captive portal function drives a notification to the trusted mobile device which is in administrator's custody. Once the access request is received by the access point administrator, the administrator is able to grant or deny access to the WiFi-enabled device. When the requestor attempts to register the WiFi-enabled device with the access point, the requestor is prompted for the authentication element. The access point subsequently forwards the authentication element of the requestor to the trusted mobile device through a notification. The notification can be SMS, and email. The administrator receives the authentication element of the requestor and identifies the requestor. The administrator grants or denies access based on authentication elements provided by a requestor. The authentication element can be requestor's identity attributes such as, but not limited to, email and phone number. The trusted mobile device is used to generate and send a temporary PIN. The administrator returns the temporary PIN through the provided authentication elem...