Network access via telephony services
Abstract:
A method includes receiving a token at a first device via a second device. The token is received by the second device from a computing system responsive to a request for access to a first wireless network secured with a network encryption key. The request is sent from the second device via a second wireless network. The computing system generates and sends the token to the second device and to a registration device in response to a determination that a user account associated with the second device permits access to the first wireless network. The method includes sending, from the first device to the registration device via the first wireless network, a hash value based on the token. Responsive to the hash value matching a second hash value generated by the registration device, the method includes receiving configuration data to enable the first device to access the first wireless network.
Public/Granted literature
Information query
Patent Agency Ranking
0/0