摘要 |
Aspects of this disclosure related to a computer-implemented method for using a first device to configure a second device to access a network. The method includes transmitting a request on a channel, the request containing information sufficient to inform a device that the system can configure the device to access a network through an access point. The method further includes receiving a response on the channel, the response sent by the device after the request and transmitting a request for security information from a server. The method further includes receiving security information from the server, using the security information to verify an identity of the device, and transmitting a security profile to the device, the security profile containing information sufficient to allow the device to connect to the access point to access the network. |
主权项 |
1. A computer-implemented method for using a first device to configure a second device to access a network, comprising:
transmitting, by the first device, a first packet on a channel using an associated first media access control address, wherein the first packet comprises a probe request including a service set identifier information element that includes a setup value, wherein the setup value is a value that signals to the second device that the first device is able to configure the second device to access the network; receiving, by the first device, a second packet on the channel from the second device, wherein the second packet comprises a probe response containing a first encrypted challenge text and a sequence number and wherein the second packet includes a second media access control address; extracting, by the first device, from the second packet the second media access control address of the second device; transmitting, by the first device, a request for security information to a server, wherein the request includes the second media access control address and wherein the security information is security information associated with the second device; receiving, by the first device, the security information from the server; deriving, by the first device, a first encryption key using the first media access control address, the security information received from the server, and the sequence number; decrypting, by the first device, the first encrypted challenge text received from the second device into a first decrypted challenge text, wherein the decrypting uses the first encryption key; generating a second encryption key using the first media access control address, the second media access control address, the security information received from the server, and the sequence number; generating an encrypted security profile, using the second encryption key, from a security profile of an access point of the network, wherein the security profile includes attributes for the second device to use to connect to the network via the access point; and transmitting to the second device, by the first device, a third packet on the channel, the third packet comprising the encrypted security profile, wherein the encrypted security profile enables the second device to access the network. |