IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0359119
(2006-02-21)
|
등록번호 |
US-7606370
(2009-11-10)
|
발명자
/ 주소 |
- Lillie, Terrance L.
- Wiedmann, Christian
- Zeljko, Robert
- Sneiderman, Richard P.
- Wiedmann, Ulrich
- Chu, Gigi C.
- Lynch, Sean R.
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
21 인용 특허 :
33 |
초록
▼
A system, method and computer program product are provided. In use, a key is distributed to a plurality of nodes of a wireless network for use in securing the nodes during use of the wireless network. Further, the key is automatically updated at the nodes in the wireless network based on predetermi
A system, method and computer program product are provided. In use, a key is distributed to a plurality of nodes of a wireless network for use in securing the nodes during use of the wireless network. Further, the key is automatically updated at the nodes in the wireless network based on predetermined criteria.
대표청구항
▼
What is claimed is: 1. A method, comprising: distributing a key to a plurality of nodes of a wireless network for use in securing the nodes during use of the wireless network; and automatically updating the key at the nodes in the wireless network based on predetermined criteria; wherein the key is
What is claimed is: 1. A method, comprising: distributing a key to a plurality of nodes of a wireless network for use in securing the nodes during use of the wireless network; and automatically updating the key at the nodes in the wireless network based on predetermined criteria; wherein the key is updated utilizing a software application downloaded by: advertising a peer-to-peer wireless network utilizing a granting node; allowing connection to the peer-to-peer wireless network utilizing a requesting node; in response to any request received from the requesting node, automatically redirecting the requesting node to a portal including a captive portal; and downloading the software application to the requesting node via the peer-to-peer wireless network utilizing the portal, the key being updated utilizing the downloaded software application; wherein the portal includes a graphical user interface; wherein the graphical user interface allows a user of the requesting node to download the software application; wherein the software application is downloaded to the requesting node in response to the user selection of a button displayed as part of the graphical user interface; wherein the portal includes a web page stored at the granting node; wherein the software application carries out a process including: exchanging a first key between the granting node and the requesting node via another peer-to-peer wireless network; generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key; comparing the human-perceptible hashes via an out-of-band communication channel; and transmitting a second key to the requesting node for providing access to a centrally-based wireless network based on the comparison. 2. The method as recited in claim 1, wherein the wireless network includes a 802.11 wireless network. 3. The method as recited in claim 1, wherein the securing includes authenticating the nodes. 4. The method as recited in claim 1, wherein the securing includes encrypting communications between a plurality of the nodes. 5. The method as recited in claim 1, wherein the predetermined criteria requires that the key be automatically updated with a new key. 6. The method as recited in claim 1, wherein the predetermined criteria requires that the key be automatically updated based on rotation of a plurality of predetermined keys. 7. The method as recited in claim 1, wherein the predetermined criteria requires that the key be automatically updated based on a predetermined schedule. 8. The method as recited in claim 1, wherein the predetermined criteria requires that the key be automatically updated periodically. 9. The method as recited in claim 1, wherein the predetermined criteria requires that the key be automatically updated based on a random number. 10. The method as recited in claim 1, wherein the predetermined criteria requires that the key be automatically updated based on a pseudo-random number. 11. The method as recited in claim 10, wherein the pseudo-random number is generated utilizing a pseudo-random process capable of being carried out utilizing each of the nodes. 12. The method as recited in claim 11, wherein the pseudo-random process utilizes a seed value distributed to each of the nodes. 13. The method as recited in claim 1, wherein the predetermined criteria requires that the key be automatically updated in response to an instruction. 14. The method as recited in claim 13, wherein the instruction is received from an access point. 15. The method as recited in claim 1, wherein the predetermined criteria requires that the key be automatically updated utilizing a hint. 16. The method as recited in claim 15, wherein the hint includes a service set identifier. 17. The method as recited in claim 1, wherein the key includes a wireless equivalency privacy (WEP) key. 18. The method as recited in claim 1, wherein the redirecting occurs in response to an opening of a network browser utilizing the requesting node. 19. The method as recited in claim 1, wherein the redirecting is carried out in response to the request from the requesting node to access the centrally-based wireless network. 20. The method as recited in claim 19, wherein the centrally-based wireless network includes a network operating in an infrastructure mode. 21. The method as recited in claim 19, wherein the centrally-based wireless network requires that the software application be installed on the requesting node for allowing the access thereto. 22. The method as recited in claim 21, wherein the human-perceptible hash has less precision than the first key and can be traced back to the first key to determine that the first key is identical for the granting node and the requesting node. 23. The method as recited in claim 1, wherein the granting node redirects the requesting node to the portal. 24. The method as recited in claim 1, wherein the software application includes an applet. 25. The method as recited in claim 1, wherein the software application requires a separate installation process on the requesting node. 26. The method as recited in claim 1, wherein the portal includes another web page stored at an access point. 27. A computer program product embodied on a computer readable medium, comprising: computer code for distributing a key to a plurality of nodes of a 802.11 wireless network for use in securing the nodes during use of the 802.11 wireless network; and computer code for automatically updating the key at the nodes in the 802.11 wireless network based on predetermined criteria; wherein the key is updated utilizing computer code for a software application downloaded utilizing: computer code for advertising a peer-to-peer wireless network utilizing a granting node; computer code for connecting to the peer-to-peer wireless network utilizing a requesting node; computer code for automatically redirecting the requesting node to a portal including a captive portal, in response to any request received from the requesting node; and computer code for downloading the software application to the requesting node via the peer-to-peer wireless network utilizing the portal, the key being updated utilizing the downloaded software application; wherein the portal includes a graphical user interface; wherein the graphical user interface allows a user of the requesting node to download the software application; wherein the software application is downloaded to the requesting node in response to the user selection of a button displayed as part of the graphical user interface; wherein the portal includes a web page stored at the granting node; wherein the software application carries out a process including: exchanging a first key between the granting node and the requesting node via another peer-to-peer wireless network; generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key; comparing the human-perceptible hashes via an out-of-band communication channel; and transmitting a second key to the requesting node for providing access to a centrally-based wireless network based on the comparison. 28. A system, comprising: a processor for distributing a key to a plurality of nodes of a 802.11 wireless network for use in securing the nodes during use of the 802.11 wireless network; wherein the key is automatically updated at the nodes in the 802.11 wireless network; wherein the key is updated utilizing a software application downloaded by: advertising a peer-to-peer wireless network utilizing a granting node; connecting to the peer-to-peer wireless network utilizing a requesting node; in response to any request received from the requesting node, automatically redirecting the requesting node to a portal including a captive portal; and downloading the software application to the requesting node via the peer-to-peer wireless network utilizing the portal, the key being updated utilizing the downloaded software application; wherein the portal includes a graphical user interface; wherein the graphical user interface allows a user of the requesting node to download the software application; wherein the software application is downloaded to the requesting node in response to the user selection of a button displayed as part of the graphical user interface; wherein the portal includes a web page stored at the granting node; wherein the software application carries out a process including: exchanging a first key between the granting node and the requesting node via another peer-to-peer wireless network; generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key; comparing the human-perceptible hashes via an out-of-band communication channel; and transmitting a second key to the requesting node for providing access to a centrally-based wireless network based on the comparison.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.