US 12,231,889 B2
Network authentication using monitored traffic activity
Dana J. Dymek, Vernon Hills, IL (US); and Matthew Frank, Chicago, IL (US)
Assigned to GOGO BUSINESS AVIATION LLC, Broomfield, CO (US)
Filed by GOGO BUSINESS AVIATION LLC, Broomfield, CO (US)
Filed on Oct. 1, 2021, as Appl. No. 17/491,631.
Claims priority of provisional application 63/093,400, filed on Oct. 19, 2020.
Prior Publication US 2022/0124498 A1, Apr. 21, 2022
Int. Cl. H04L 29/06 (2006.01); H04W 12/08 (2021.01); H04W 12/69 (2021.01); H04W 24/08 (2009.01); H04W 24/10 (2009.01)
CPC H04W 12/08 (2013.01) [H04W 12/69 (2021.01); H04W 24/08 (2013.01); H04W 24/10 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for re-authenticating an electronic device, the method comprising:
receiving, by one or more processors and from an electronic device, a request to access a local access network on-board a vehicle, the request including a device identifier of the electronic device;
querying, by the one or more processors and using the device identifier, an access profile assigned to the electronic device to determine that the electronic device has previously been authenticated during a first communication session, wherein the access profile is assigned to the electronic device based upon an indication of a user selection received from the electronic device;
monitoring, by the one or more processors, network usage associated with the electronic device during a second communication session, wherein monitoring network usage comprises:
routing, by the one or more processors and from the electronic device, a first set of data packets to respective locations external to the local access network during the second communication session in accordance with the access profile, and
querying, by the one or more processors, a usage profile assigned to the electronic device, wherein the usage profile includes a usage behavior-based metric based upon monitoring traffic received from the electronic device during the first communication session; and
automatically re-authenticating, by the one or more processors, the electronic device based on the monitoring via determining, by the one or more processors, whether at least a portion of the first set of data packets satisfies the usage behavior-based metric indicated in the usage profile.