US 11,871,225 B2
Mutual authentication between wireless access devices
Warren Hojilla Uy, Randolph, NJ (US); Young R. Choi, Belle Mead, NJ (US); and Samirkumar Patel, Middlesex, NJ (US)
Assigned to Verizon Patent and Licensing Inc., Basking Ridge, NJ (US)
Filed by Verizon Patent and Licensing Inc., Basking Ridge, NJ (US)
Filed on Jun. 17, 2022, as Appl. No. 17/807,393.
Application 17/807,393 is a continuation of application No. 16/191,130, filed on Nov. 14, 2018, granted, now 11,388,594.
Prior Publication US 2022/0322087 A1, Oct. 6, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04W 12/06 (2021.01); H04L 9/40 (2022.01); H04L 9/32 (2006.01); H04W 12/08 (2021.01); H04L 9/08 (2006.01); H04L 9/30 (2006.01); H04W 76/10 (2018.01); H04W 12/04 (2021.01); H04W 84/12 (2009.01)
CPC H04W 12/06 (2013.01) [H04L 9/085 (2013.01); H04L 9/0844 (2013.01); H04L 9/3066 (2013.01); H04L 9/3263 (2013.01); H04L 63/0823 (2013.01); H04L 63/0869 (2013.01); H04L 63/101 (2013.01); H04W 12/04 (2013.01); H04W 12/08 (2013.01); H04W 76/10 (2018.02); H04L 2209/80 (2013.01); H04W 84/12 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
establishing, by a first device associated with a network service provider, a network connection with a second device,
wherein the network connection is associated with a wireless connection to the second device;
providing, by the first device and based on determining that an authentication certificate is no longer valid, limited connectivity to the second device that limits connectivity of the second device to one or more destinations associated with an identifier in a whitelist,
wherein the one or more destinations correspond to a certificate authority;
performing, by the first device and based on providing the limited connectivity to the second device, an authentication procedure with the second device;
determining a keyset from one or more shared secrets that are calculated based on a private ephemeral key and a public key included in a certificate associated with the second device:
encrypting, based on the keyset, communications via the network connection;
maintaining, by the first device and based on the authentication procedure being successful, the network connection; and
providing, by the first device and based on the authentication procedure being successful, wide area network (WAN) access to the second device.