专利摘要:
A portable computing device for configuring wireless network settings based on received network configuration information includes an input device configured to receive wireless network information from a network device independent of whether the portable computing device is connected to a wireless network that is implemented by the network device and a network configuration application for configuring one or more wireless network settings to initiate wireless network communication through the network device based on the received network information. The network configuration application is configured to facilitate communication of the received wireless network information to a client device. The network information may include a security key and may be entered into a client device either manually after being displayed on the portable computing device or by being transmitted to client device. WIRELESS SECURITY 110 KEY DISPLAY COMPUTER 120NFC TRANSCEIVER 114 NETWORK P I ENETWORK HONE - DEVICE NTO n GAME CONSOLE14 140 TELEVISION 130
公开号:AU2013216599A1
申请号:U2013216599
申请日:2013-08-13
公开日:2014-03-13
发明作者:Michael Clegg
申请人:Netgear Inc;
IPC主号:H04W8-00
专利说明:
P/00/01 1 Regulation 3.2 AUSTRALIA Patents Act 1990 COMPLETE SPECIFICATION STANDARD PATENT Invention Title: System and method for providing wireless network configuration information The following statement is a full description of this invention, including the best method of performing it known to us: 1000348658 SYSTEM AND METHOD FOR PROVIDING WIRELESS NETWORK CONFIGURATION INFORMATION FIELD OF INVENTION 5 [00011 This invention generally relates to the field of wireless network security. At least one embodiment is directed to a system and method for displaying wireless network configuration information in a secure form on a first wireless network component for communication to a second wireless network component. BACKGROUND OF THE INVENTION ) [00021 The increasing portability of computing devices has also increased the demand for wireless communication networks by a wide range of users of various levels of sophistication. The portable computing devices increasingly depend on connection to a wireless network to provide the functionality desired by users. Wireless networks are increasingly prevalent, being used both for home and business networking needs. 5 [00031 However, wireless networks are associated with a number of unique security issues. For example, since any user with a networking receiver could detect and communicate with the network resulting in unauthorized use of network resources or even gaining access to sensitive information communicated by or stored on devices on the network. Accordingly, wireless networks typically include one or more of a wide variety of ) security protocols, such as Wired Equivalency Privacy (WEP) and/or Wi-Fi Protected Access (WPA). [00041 The security protocols are implemented by and configured in a network device that may be hub and/or gateway such as a wireless router or a wireless access point. Using a configuration interface to such a network device, an administrator sets network 5 information, such as the security parameters. These settings include, for example, user access settings, firewall settings, access limit settings, wireless network settings, communication protocols, network type, IP settings, subnet settings, etc. The administrator can further set a wireless security key in the network device that restricts access to that device to client devices having the same key. Client devices may, for 0 example, be desk-top or laptop computers, tablets, gaming systems, e-readers, 2 1000348658 televisions, etc. After the security key is set in a router or other network device, the key must be entered into each included client device prior to allowing that client device to access the wireless network. [0005] The security key is typically a relatively lengthy character string, most typically an 5 alpha-numeric character string, selected by the administrator. The most secure type of wireless network key is one that consists of a randomly-generated series of letters and numbers. However, the network key is, by design, difficult to remember. Users often write the security key on a note or make a screen shot of the device's configuration page displaying the security key, but such documents are easily destroyed or ) misplaced. Conversely, leaving them in an easy-to-find location increases the risk of compromising the network's security. [00061 A lost or forgotten wireless network key can be a problem, particularly on a network with multiple client devices, each of which may be accessed by multiple users. For example, resetting a security key for even a single router or other network device in a 5 home or small office situation requires locating the original paperwork for the router to determine the proper reset procedure and thereafter resetting each client device. The resetting procedure requires that the network security key be re-entered in each client device. When the network includes a large number end users or client devices, this can become an especially time-consuming process. ) [00071 It is known to use a QR reader on, for example, a smartphone to connect to a broadband router. However, the user often must reacquire the security information from the back of the security device, which can be difficult if (as is often the case) the security device is located in a relatively dark, difficult to access location and/or access to the back of the security device is hindered by cables and the like. In addition, the 5 resulting information is only displayed. There is no mechanism for transmitting it to another device. [0008] Further, security keys often need to be handwritten for transport to another device for the purpose of configuring the other device to communicate using the wireless network. Handwriting security keys increases security risk, introduces the possibility 0 of transcription errors, etc. One example requiring transportation of a security key 3 1000348658 includes configuration of a network ready large screen television that cannot be positioned and/or transported to within proximity of the network device or computer displaying networking information. [00091 What is needed is a system and method for easily communicating wireless network 5 information including, for example, a security key from a network device to one or more client devices for communication to at least one additional client device. What is further needed is such a system and method configured to maintain the confidentiality of the wireless security key. [000101 It is not admitted that any background information presented or referred to in this 3 specification forms part of the common general knowledge in Australia or any other jurisdiction. SUMMARY [00011] According to one aspect of the invention, a portable computing device for configuring wireless network settings based on received network configuration information 5 includes an input device configured to receive wireless network information from a network device independent of whether the portable computing device is connected to a wireless network that is implemented by the network device and a network configuration application for configuring one or more wireless network settings to initiate wireless network communication through the network device based on the 0 received network information. The network configuration application is configured to facilitate communication of the received wireless network information to a client device. [00012] In one embodiment, the input device may include a camera with imbedded QR code interpretation software or other de-encryption software. In another embodiment, the 5 input device may be a near field communication transceiver, and the network configuration application may be configured to transmit the received wireless network information to a client computing device using the near field communication transceiver. The network configuration application may also be configured to receive a network configuration confirmation from at least one of the network device and the 4 1000348658 client device based on the transmittal of the wireless network information to the client device. [00013] In yet another embodiment, the network configuration application is configured to facilitate communication of the received wireless network information by displaying a 5 wireless security key on a display of the portable computing device. The network configuration application may further be configured to delete the wireless security key from the display and from a memory of the portable computing device based on expiration of a timer. [00014] According to another aspect of the invention, a computer-implemented method, ) implemented by an application stored in non-transitory memory of a portable computing device, is used for configuring wireless network settings based on received network configuration information. The method includes the steps of 1) receiving wireless network information from a network device independent of whether or not the portable computing device is connected to a wireless network implemented by the 5 network device, 2) configuring one or more wireless network settings to initiate wireless network communication through the network device based on the received network information, and 3) transmitting the received wireless network information to a client device using the near field communication transceiver. [00015] According to another aspect of the invention, a portable computing device is used for ) configuring wireless network settings based on received network configuration information. The device may include a code reader configured to receive a QR code or other encrypted code displayed on a network device using a camera of the portable computing device, the code including an encrypted wireless security key and a network configuration application for configuring one or more wireless network 5 settings. The network configuration application may also be configured to display a user interface for configuring one or more wireless network settings of the network device based on the received code and transmit the received wireless network information to a client device using the near field communication transceiver. 5 1000348658 [00015a] As used herein, except where the context requires otherwise the term 'comprise' and variations of the term, such as 'comprising', 'comprises' and 'comprised', are not intended to exclude other additives, components, integers or steps. 5 [000161 Other features and advantages of the invention will become apparent to those skilled in the art upon review of the following detailed description and drawings in which like numerals are used to designate like features. BRIEF DESCRIPTION OF THE DRAWINGS [000171 FIG. 1 schematically illustrates a networking environment for securely promulgating D wireless network configuration information, according to an exemplary embodiment; [00018] FIG. 2 illustrates an embodiment of the network device and portable computing devices of FIG. 1, shown in greater detail according to an exemplary embodiment; and [00019] FIG. 3 is a flowchart illustrating a method for configuring one or more devices in a wireless network using a security key displayed by a network device, according to an 5 exemplary embodiment. [000201 Before the embodiments of the invention are explained in detail, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of the components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced !0 or being carried out in various ways. Also, it is to be understood that the phraseology and terminology used herein are for the purpose of description and should not be regarded as limiting. The use of "including" and "comprising" and variations thereof is meant to encompass the items listed thereafter and equivalents thereof as well as additional items and equivalents thereof. 5 DETAILED DESCRIPTION [000211 Referring now to FIG. 1, a networking environment 100 for securely promulgating wireless security key or other wireless network configuration information for an 6 1000348658 internal network 110 implemented by a network device 120 is shown, according to an exemplary embodiment. The wireless network key may be promulgated using an encrypted wireless security key display 122 on the network device 120. [000221 Internal network 110 of this embodiment is a local area network (LAN) configured to 5 convey information between an external network such as the Internet and one or more client devices in relatively close proximity to each other, such as within a home, school, office building, etc. The client devices may, for example include a personal computing device 112 such as a desktop computer, a laptop computer, a tablet, etc, a smartphone 114, a game console 116, and/or a television computing device 118. It 0 should be understood that although FIG. 1 shows specific client devices, these are merely provided as examples. Any or all of these or other client devices could be present in a given internal network. Internal network 110 may further include one or more additional network communication devices to provide intercommunication between devices on the network and communication with network device 120. 5 [000231 Communication to, from, and between the client devices on internal network 110 is provided by the network device 120. The link between devices 112-118 and network device 120 may be a wired connection, such as an Ethernet cable, or a wireless connection, such as Wi-Fi. Devices 112-118 may also be configured for intercommunication, for example using the Bluetooth communication protocol. 20 [000241 Network device 120 may be any device configured to manage the flow of data to, from, and/or between client devices on internal network 110 and/or with an external network 140. Functionality described herein as being associated with network appliance may be implemented using one or more devices. For example, network device 120 may be configured to include a router in communication with a network Z5 switch, either of which can be configured to perform some or all of the functions described herein. Network device 120 may further be implemented using a plurality of network devices in communication with each other, such as a wireless access point in communication with a gateway router. 7 1000348658 [00025] Network device 120 is configured to forward information, such as data packets, between the two computer networks 110 and 140 and/or between client devices 112 118. Where network device 120 is a router, when a data packet is received from either internal network 110 or external network 140, device (router) 120 reads address 5 information in the packet to determine the packet's ultimate destination. In a packet switched network, a "router" is a device which receives packets on one or more input interfaces and which outputs those packets on one of a plurality of output interfaces so as to move those packets within the network from a source device to a destination device. Each packet also includes header information which indicates the destination ) device in either internal network 110 or external network 140. The router includes routing information, which associates an output interface with information about the destination device, such as one or more of the client devices 112-118. The router can also perform other operations on packets, such as rewriting the packets' headers according to their routing protocol, or re-encapsulating the packets from a first routing 5 protocol to a second routing protocol. [000261 The packet headers may further include a wireless security key, and device 120 may further read the security key information to determine whether the device sending the packet is authorized to communicate through device 120. Each client device on network 120 can be configured to encrypt transmitted data packets using, for example, 3 a 256 bit security key. The security key may, for example, be a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 printable ASCII characters. Alternatively, the wireless security key may be any type of security or pairing key, for example a password, a VPN security key, a Bluetooth or DECT pairing code, etc. [000271 Communication of the security key to the client's device may be implemented by a 5 display 22. The security key and/or other networking information may be displayed on the network drive in an encrypted or coded format such that the security key is not easily discernible by a person viewing the display 122. For example, wireless security key display 122 may be a printed barcode, such as clear text, a QR code, or a UPC label, affixed as a label to the network device 120. 8 1000348658 [000281 In an alternative embodiment, display 122 may be a dynamic display configured to display wireless security key information provided by a processor of network device 120, such as an LCD display, an active matrix display, etc. Advantageously, where display 122 is a dynamic display, display 122 may be configured to only display the 5 wireless security key based on a received PIN number communicated to the network device 120 or based on a signal from the network device 120 processor. The key may alternatively only be displayed, for example, only upon receipt of a control signal from an external system, such as an administrator computing system. Further, the information displayed on display 122 may also be dynamic, such as a time stamped 3 security key, a security key specific to a client device being configured, etc. Network device 120 may be configured to periodically update the security key, customize the security key to a particular client computing device, etc. [000291 Instead of or in addition to displaying the security key, the display may be configured to display wireless network configuration information identifying one or more 5 attributes of the network device 120, such as network type, security settings, IP settings, subnet settings, etc. Display 122 may be configured such that a client computing device, receiving the information displayed by the display 122, receives all of the information needed to communicate through network device 120. [00030] Portable computing device 120 is configured to include components typically 3 associated with computing devices such as a processor, memory, a display, one or more input devices, one or more output devices, etc. Portable computing device 130 is portable such that it may be carried and used in close proximity of the network device 120 to receive the wireless security key from the network device 120. It may, for example, comprise a tablet computer, a smartphone, or a laptop computer. It includes 5 an input device acting as a bar code reader, such as an integrated camera, for receiving the security key and/or other network information from the network device 120. For example, where the barcode is a QR code, the integrated camera can receive a 2 dimensional digital image and then digitally analyze the image. The digital analysis locates three distinctive squares at the corners of the image, and normalizes image 0 size, orientation, and angle of viewing. The small dots are then converted to binary 9 1000348658 numbers and validity checked with an error-correcting code. The binary number may then be analyzed to determine the security key integrated into the QR code. Portable computing device 130 may be used as a security key transport device to facilitate configuration of client devices as discussed in further detail below with reference to FIGs 2-3. [000311 Alternatively, portable computing device 130 may be configured to receive the wireless network information from network device 120 using a wired or direct connection. For example, portable computing device 130 may be plugged directly into network device 120 using an ethernet cable. According to an alternative example, a ) USB device may be used to transfer the wireless network information from network device 122 portable computing device 130. [00032] Network device 120 may be a gateway device that is the exclusive communication channel between internal network 110 and external network 140. Accordingly, all content provided to or from the internal network 110 can be monitored using the 5 network device 120 to confirm that the sending computing device is authorized to communication through the network device 120. [000331 External network 140 may be a wide area telecommunication network (WAN) covering a broad area, such as the Internet. External network 140 may be connected to network device 120 using a wired or wireless connection. For example, a router 0 network device 120 may be connected to a high-bandwidth connection such as a cable modem, a Digital Subscriber Line (DSL) modem, or an Integrated Services Digital Network (ISDN) connection to send and receive data with systems through external network 140. [000341 Referring now to FIG. 2, network device 120 and portable computing device 130 are 5 shown in greater detail, according to an exemplary embodiment. Although devices 120 and 130 are shown in FIG. 2 as including specific components in exemplary configurations, it is important to recognize that devices 120 and 130 may include more, fewer, and/or a different configuration of components to implement the functions described herein. 10 1000348658 [000351 The functional components of network devices 120 and 130 may be implemented using hardware including a processing unit, a system memory, and a system bus that couples various system components, including the system memory, to the processing unit. The system bus may be any of several types of bus structures including a memory 5 bus or a memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. Further, the described components may be implemented using hardware and/or software. [000361 The processing unit of each device 120, 130 may be any type of computer processor configured to implement the functionality described herein including the steps of ) communicating wireless network configuration information including a wireless network security key between devices 120 and device 130 by displaying the wireless security key in an encrypted form using display 122 of device 120. The processing unit may be a MIPS, ARM, x86, or other processor as are known in the art or later developed. 5 [000371 The system memory of each device 120, 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) and random access memory (RAM). A basic input/output system (BIOS), containing the basic routines that help to transfer information between elements within devices 120 and 130, such as during start-up or networking operations, is typically stored in ROM. ) RAM typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by the processing unit. The device 120 may also include other removable/non-removable, volatile/nonvolatile computer storage media, such as flash memory. [000381 Although network device 120 may be any of a variety of types of network appliances, 5 for clarity device 120 is further described herein with reference to a router type network appliance configured to facilitate promulgation of wireless network configuration information. In addition to including the above-described key display 122, network device 120 may further be configured to include a near field communication transmitter 124. 11 1000348658 1000391 As discussed briefly above, network device 120 may further and/or alternatively include a near field communication transmitter 124. The near field communication transmitter may be configured to convey the same and/or complementary information to the information of display 122. For example, near field communication may be implemented in the network device 120 portable computing device 130 and/or the client. Accordingly, the transfer between components could be made using a variety of different methods including, but not limited to, 1) QR to portable computing device 130 and NFC to client device, 2) NFC to portable computing device 130 and NFC to client device, 3) NFC or QR code to portable computing device 130 and manual entry ) to client device, and 4) USB/Ethernet to portable computing device 130 and manual or NFC to client device. [000401 Portable computing device 130 or "PCD" includes a security key reader 132, such as a camera, configured to receive the QR code or other code including the wireless security key displayed on display 122. Portable computing device 130 may also 5 include a near field communication transceiver for communicating using this protocol with both network device 120 and client devices 112-118, as further described hereinbelow. [000411 Portable computing device 130 may additionally include wireless networking configuration application 136. Application 136 may be configured to operate in ) conjunction with the above described hardware to perform one or more functions related to wireless network configuration. In one embodiment, application 136 is configured to include a QR code reader application 137, a network configuration application 138, and a security key transport application 139. Each application could comprise software, hardware, or a combination thereof and could be provided in stand 5 alone fashion or could e combined with one or more other applications. [000421 Bar code reader application 137 is configured to receive a 2-dimensional digital image from security key reader 132 and to digitally analyze the received digital image. Where the received digital image includes a QR code, the digital analysis includes locating three distinctive squares at the corners of the image and normalizing image 12 1000348658 size, orientation, and angle of viewing. The small dots are then converted to binary numbers and validity checked with an error-correcting code. The binary number may then be analyzed to determine the security key and/or other network information integrated into the QR code. [00043] Network configuration application 138 may perform a plurality of different wireless network tasks based on the network information received by bar code reader application 137. Alternatively, application 138 may receive the network information from another source, such as an USB memory stick or an Ethernet connection. In a first task, application 138 may use the received network information to configure the ) wireless network settings for the portable computing device 130. Advantageously, application 136, in communication with bar code reader application 137, may detect the wireless network capabilities of the device 130 and receive the wireless network information to facilitate successful network configuration. [00044] According to one exemplary information, network configuration application 138 may 5 be configured to launch a wireless network configuration user interface allowing configuration of the network device 120 based on receipt of wireless network information from reader application 137. The interface may be displayed in a web browser on the portable computing device 130. The interface displayed may be a standard router interface that would have typically been displayed in a web browser of ) computer connected to network device 120 based upon entry of the network device's IP number, such as 192.168.1.1. Using the interface described herein, the IP number interface may be disabled in favor of the QR code-initiated interface to increase network security. Without this disabling, a user, such a person driving past a home having a wireless network or a customer in a business offering a hotspot to its 5 customers, may be able to access a router configuration page based upon receipt of a wireless signal. However, using the QR code initiated interface, only a user having direct access to a network device can access a configuration page for that network device. 13 1000348658 [000451 Portable computing device 130 may additionally have a security key transport application 139 that can be used to securely communicate security key information between network device 120 and one or more client devices, such as any or all of the device 112-118 shown in Fig. 1. As with the other applications, this application may 5 be implemented via hardware, software, or a combination of both and may be modular or integrated with one or more applications. Using this security key transport application, portable computing device 130 may be used to convey security key information from a router or other network device to stationary computing devices, such as a large screen television having networking capabilities, without requiring ) close proximity between the devices and without requiring the user to write down the security key or even without ever providing the security key in a user readable format. [00046] Using a first method, transport application 139 is configured to receive wireless network information from application 137 or another source and display the information on a display of the portable computing device 130. For example, where device 130 is a smartphone, a user uses an integrated camera to capture a QR code image that is interpreted by application 138 to display a wireless security key on the display of device 130 such that the security key does not need to be written down by the user. The user can then carry device 130 to a client device and type in the wireless security key from the display. Transport application 139 may be configured such that ) the security key will only be displayed for a limited amount of time and will be deleted from memory thereafter to increase security for the wireless network. [00047] According to an alternative embodiment, transport application 139 may be configured such that the security key need not be displayed by the portable computing device 120 in a humanly discernible manner. For example, transport application 139 may be 5 configured to generate a display of a QR code or other indicia that may be scanned by a client device to convey the security key or other network information without ever directly displaying that network information. Alternatively, transport application 139 may utilize the NFC transceiver 134 to transmit the security key to a NFC receiver of a client device without ever using the display of device 130. 14 1000348658 [000481 Referring now to Fig. 3, a flowchart 300 illustrating an exemplary method for configuring one or more devices in a wireless network using a security key displayed by a network device is shown, according to an exemplary embodiment. The method of flowchart 300 may be implemented using portable computing device 130 in 5 combination with network device 120. [000491 In a first step 302, a user can access wireless configuration application 136, resident in memory of the portable computing device 130, to initiate a wireless communication configuration method with a network device 120. In a step 304, the application searches for a wireless signal transmitted by network device 120. When the signal is 3 found, device 130 determines whether its network configuration settings, including the wireless security key, are configured to allow communication through network device 120 using the wireless signal in a step 306. [000501 If portable computing device 130 is not configured to communicate through network device 120, application 136 may be configured to implement the network 5 configuration application 136, described above with reference to Fig. 2, in a step 308. Application 136 is configured to display instructions to the user to scan information displayed by network device 120, that information is a QR code in this example. The scanned QR code may be analyzed and interpreted by QR code reader application 137 in a step 310 to receive at least a wireless security key and possibly additional wireless 3 configuration information specific to network device 120 and/or the wireless signal transmitted by network device 120. In a step 312, portable computing device 130 is configured to modify one or more wireless network settings for device 130 based on the information received in step 310 to initiate wireless communication through network device 120. 5 [000511 If it is determined in step 306 that the portable computing device 130 is already configured to communicate through network device 120, or following configuration of device 130 in step 312, device 130 may display a client configuration screen allowing the user to configure one or more client devices in a step 314. In a step 316, the determination of the security settings for application 136 is made to determine how to 15 1000348658 communication a wireless security key to a client device. In a low-security environment and/or in an environment requiring manual entry of the security key into the client device, device 130 may be configured to display a wireless security key that can be manually entered into a keypad or other input device of the client device by a 5 user in a step 318. [000521 In order to provide more secure communication of the wireless security key, if the client device is capable of receiving wireless signals from the portable computing device 130, device 130 may be configured to display instructions prompting the user to place device 130 in close proximity to the client computing device such that the ) client computing device can receive wireless security or other networking information using at least one of near field communication and displaying a QR code on the display of device 134 capture by a QR code scanner of the client computing device in a step 320. Alternatively, device 130 may be configured to require entry of a sign-in password that is also associated with network device 120. 5 [000531 According to another alternative embodiment, computing device 130 may be registered with a cloud based portal when the wireless network configuration software is installed. The cloud based portal can receive device details as well as the encrypted security key. Thereafter, in order to display or otherwise transfer the wireless network information using device 130, the user must sign into their portal to enable the display. ) Advantageously, using this method adds a layer of password protection specific to device 130, tying the security key read by device 130 back to the device 130 as a validation without specifically displaying the information. [000541 In a step 322, portable computing device 130 determine whether the client device was successful configured based on feedback from one or more of a network device 120, 5 and one or more client computing devices indicative of successful wireless network configuration. Based on receipt of the feedback, device 130 may clear wireless security key and other wireless network information from the memory of device 130 in a step 324. Alternatively, even without receiving such confirmation, in a step 326, device 130 may be configured to clear the wireless security key and other wireless 16 1000348658 network information from the memory of device 130 in step 324 based on expiration of a timer regardless of whether feedback has been received. If the timeout function has not elapsed, device 130 can continue searching for either confirmation and/or lapse of the timeout function in a loop of steps 322 and 326. 5 [000551 Advantageously, portable computing device 130 can convey wireless configuration information from a network device 120 to one or more client devices, such as one or more of devices 112-118. The wireless configuration information can include a wireless security key allowing users of devices 112-118 to communicate wirelessly through network device 120 with an external network 140, such as the Internet. 3 Device 130 thus may be used to convey wireless network information without requiring the user to write down potentially sensitive information such as the wireless security key. Further, in at least one embodiment, wireless security information may be promulgated to any or all of a plurality of client devices without ever displaying the wireless security information in an unencrypted form. 5 [00056] Certain terminology is used herein for purposes of reference only, and thus is not intended to be limiting. For example, terms such as "network device" refer to any system receiving and retransmitting information packets in a computer network. Examples can include a network router, a network switch, a wireless access point, a gateway router, etc. 0 [00057] References to "a processor" can be understood to include one or more controllers or processors that can communicate in a stand-alone and/or a distributed environment(s), and can thus be configured to communicate via wired or wireless communications with other processors, where such one or more processor can be configured to operate on one or more processor-controlled devices that can be similar or different devices. 5 Furthermore, references to memory, unless otherwise specified, can include one or more processor-readable and accessible memory elements and/or components that can be internal to the processor-controlled device, external to the processor-controlled device, and can be accessed via a wired or wireless network. It should be understood 17 1000348658 that a computer program may embrace constituent programs and that multiple programs may be implemented as a single or multiple programs. [000581 Various features of the invention are set forth in the following claims. It should be understood that the invention is not limited in its application to the details of 5 construction and arrangements of the components set forth herein. The invention is capable of other embodiments and of being practiced or carried out in various ways. Variations and modifications of the foregoing are within the scope of the present invention. It also being understood that the invention disclosed and defined herein extends to all alternative combinations of two or more of the individual features 0 mentioned or evident from the text and/or drawings. All of these different combinations constitute various alternative aspects of the present invention. The embodiments described herein explain the best modes known for practicing the invention and will enable others skilled in the art to utilize the invention. 18
权利要求:
Claims (19)
[1] 1. A portable computing device for configuring wireless network settings based on received network configuration information, comprising: 5 an input device configured to receive wireless network information from a network device independent of whether the portable computing device is connected to a wireless network that is implemented by the network device; and a network configuration application for configuring one or more wireless network settings to initiate wireless network communication through the network device based on 0 the received network information, wherein the network configuration application is configured to facilitate communication of the received wireless network information to a client device.
[2] 2. The device of claim 1, wherein the input device is a camera used in combination 5 with barcode interpretation software.
[3] 3. The device of claim 1, wherein the input device is a near field communication transceiver.
[4] 4. The device of claim 1, wherein the network configuration application is configured to facilitate communication of the received wireless network information to the client .0 device using the near field communication transceiver.
[5] 5. The device of claim 4, wherein the network configuration application is configured to receive a network configuration confirmation from at least one of the network device and the client device based on the transmittal of the wireless network information to the client computing device. 25
[6] 6. The device of claim 1, wherein the network configuration application is configured to facilitate communication of the received wireless network information to the client device by displaying a wireless security key on a display of the portable computing device. 10( 1000348658
[7] 7. The device of claim 6, wherein the network configuration application is configured to delete the wireless security key from the display and from a memory of the portable computing device based on expiration of a timer.
[8] 8. A computer-implemented method, implemented by an application stored in non 5 transitory memory of a portable computing device, for configuring wireless network settings based on received network configuration information, comprising: receiving wireless network information from a network device independent of whether the portable computing device is connected to a wireless network implemented by the network device; 0 configuring one or more wireless network settings to initiate wireless network communication through the network device based on the received network information; and transmitting the received wireless network information to a client device using the near field communication transceiver. 5
[9] 9. The method of claim 8, wherein receiving wireless network information from a network device includes activating a camera of the portable computing device to receive a bar code.
[10] 10. The method of claim 8, wherein receiving wireless network information from a 0 network device includes receiving a signal on a near field communication transceiver of the portable computing device.
[11] 11. The method of claim 8, further including receiving a network configuration confirmation from at least one of the network device and the client computing device based on the transmittal of the wireless network information to the client device. 25
[12] 12. The method of claim 8, further including displaying a wireless security key on a display of the portable computing device.
[13] 13. The method of claim 12, further including deleting the wireless security key from the display and from a memory of the portable computing device based on expiration of a timer. 1000348658
[14] 14. A portable computing device for configuring wireless network settings based on received network configuration information, comprising: a bar code reader configured to read a bar code displayed on a network device using a camera of the portable computing device, the bar code including an encrypted 5 wireless security key; and a network configuration application for configuring one or more wireless network settings, including setting the received wireless security key, wherein the network configuration application is configured to facilitate communication of the received wireless security key to a client device. 0
[15] 15. The device of claim 14, further including a near field communication transceiver, wherein the network configuration application is configured to facilitate communication of the received wireless security key to a client device by transmitting the wireless security key using the near field communication transceiver. 5
[16] 16. The device of claim 15, wherein the network configuration application is configured to receive a network configuration confirmation from at least one of the network device and the client device based on the transmittal of the wireless security key to the client computing device.
[17] 17. The device of claim 14, wherein the network configuration application is 0 configured to facilitate communication of the received wireless security key by displaying the wireless security key on a display of the portable computing device.
[18] 18. The device of claim 17, wherein the network configuration application is configured to delete the wireless security key from the display and from a memory of the portable computing device based on expiration of a timer. 25
[19] 19. The device of claim 14, wherein the network configuration application is configured to display a user interface for configuring one or more wireless network settings of the network device based on the received bar code.
类似技术:
公开号 | 公开日 | 专利标题
AU2013216599B2|2017-01-12|System and method for providing wireless network configuration information
US20130318587A1|2013-11-28|Authentication method and wireless connection device
CN104363250B|2018-02-09|A kind of method and system for equipment connection
EP3072352B1|2020-10-07|Network connection method and user equipment
US8909196B2|2014-12-09|Systems and methods for facilitating communication between mobile devices and wireless access points
US9635022B2|2017-04-25|Method of allowing establishment of a secure session between a device and a server
US9473493B2|2016-10-18|Secure data communication
US9904778B2|2018-02-27|Function performing apparatus and portable device
US9143939B2|2015-09-22|Controlling device
US10637650B2|2020-04-28|Active authentication session transfer
US10771457B2|2020-09-08|System and method for providing a one-time key for identification
US20130318352A1|2013-11-28|Communication setup method and wireless connection device
WO2013176491A1|2013-11-28|Method for authenticating web service user
US8867060B2|2014-10-21|Information processing apparatus that prevents unauthorized access, method of controlling the same, and storage medium
US20090154701A1|2009-06-18|On device number lock driven key generation for a wireless router in wireless network security systems
WO2010119427A2|2010-10-21|Method and system for deployment of software applications to mobile computing devices
JP2003338814A|2003-11-28|Communication system, administrative server, control method therefor and program
CN106954214B|2020-05-26|Electronic device and control method thereof
CN104038940A|2014-09-10|Quick and secure online building method and wireless access point device
JP2009009235A|2009-01-15|Mutual authentication system and mutual authentication method
US20210320800A1|2021-10-14|Authorization method and authorization system
US20210256111A1|2021-08-19|Systems and methods for password managers
JP2009099128A|2009-05-07|Portable terminal and portable terminal management system
CN111698682A|2020-09-22|Data transmission method based on public WiFi network environment, server and storage medium
TW201543938A|2015-11-16|Rapid and secure method of establishing connection and wireless access point device
同族专利:
公开号 | 公开日
GB201315147D0|2013-10-09|
GB2506519A|2014-04-02|
AU2013216599B2|2017-01-12|
US20140056171A1|2014-02-27|
GB2506519B|2018-02-14|
US8953491B2|2015-02-10|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
US8606851B2|1995-06-06|2013-12-10|Wayport, Inc.|Method and apparatus for geographic-based communications service|
US20020032028A1|2000-07-06|2002-03-14|Arthur Kaupe|Method and apparatus for automatic collection and loading of configuration data into equipment by installers using wireless technology|
US8244179B2|2005-05-12|2012-08-14|Robin Dua|Wireless inter-device data processing configured through inter-device transmitted data|
US8228198B2|2005-08-19|2012-07-24|Adasa Inc.|Systems, methods, and devices for commissioning wireless sensors|
US7861933B2|2006-11-06|2011-01-04|Ikan Technologies Inc.|Methods and systems for network configuration|
US7793108B2|2007-02-27|2010-09-07|International Business Machines Corporation|Method of creating password schemes for devices|
US7957528B2|2007-08-21|2011-06-07|Sony Corporation|Near field registration of home system audio-video device|
US8401681B2|2008-06-08|2013-03-19|Apple Inc.|System and method for placeshifting media playback|
US8215541B2|2008-12-30|2012-07-10|Dell Products, L.P.|Automated proximity-related network authorization|
EP2364043B1|2010-02-26|2016-04-20|BlackBerry Limited|Methods and devices for transmitting and receiving data used to activate a device to operate with a server|
US20120037700A1|2010-08-12|2012-02-16|Walji Riaz|Electronic device and method for image files with embedded inventory data|
US20120158919A1|2010-12-16|2012-06-21|Google Inc.|Changing device configuration based on machine-readable codes|
US20120240191A1|2011-03-14|2012-09-20|Jordan Husney|Wireless device nearfield security configuration|
WO2013032483A1|2011-09-01|2013-03-07|Intel Corporation|Secure peer-to-peer network setup|
US9143402B2|2012-02-24|2015-09-22|Qualcomm Incorporated|Sensor based configuration and control of network devices|
US20130227647A1|2012-02-28|2013-08-29|Apple Inc.|Shared network access via a peer-to-peer link|
US9031050B2|2012-04-17|2015-05-12|Qualcomm Incorporated|Using a mobile device to enable another device to connect to a wireless network|CN103516674B|2012-06-21|2016-10-12|棣南股份有限公司|Quickly and the method for network device online and control device|
JP5675747B2|2012-10-18|2015-02-25|オリンパス株式会社|Wireless communication system, portable terminal, digital camera, communication method and program|
US9154297B2|2012-12-18|2015-10-06|Nagravision S.A.|Method for granting a plurality of electronic communication devices access to a local area network|
US20140298024A1|2012-12-18|2014-10-02|Nagravision S.A.|Method for granting access to a network and device for implementing this method|
US10129743B2|2013-03-13|2018-11-13|Xerox Corporation|Method and apparatus for establishing a secure communication link between a mobile endpoint device and a networked device|
US10735408B2|2013-03-14|2020-08-04|Samsung Electronics Co., Ltd.|Application connection for devices in a network|
US10284657B2|2013-03-14|2019-05-07|Samsung Electronics Co., Ltd.|Application connection for devices in a network|
DE102013106121A1|2013-06-12|2014-12-18|Appbyyou Gmbh|Method for encrypting data|
JP2017526222A|2014-06-18|2017-09-07|トムソン ライセンシングThomson Licensing|Use of scanable codes associated with access devices|
US9578511B2|2014-06-30|2017-02-21|Libre Wireless Technologies, Inc.|Systems and techniques for wireless device configuration|
JP6413495B2|2014-08-29|2018-10-31|セイコーエプソン株式会社|Information processing method and recording system|
JP6444200B2|2015-02-09|2018-12-26|キヤノン株式会社|COMMUNICATION DEVICE, COMMUNICATION DEVICE CONTROL METHOD, PROGRAM|
US10257176B2|2015-03-04|2019-04-09|Ssh Communications Security Oyj|Replacing keys in a computer system|
CN106161515A|2015-03-31|2016-11-23|腾讯科技(深圳)有限公司|Equipment configuration method, device and system|
TWI571159B|2015-07-31|2017-02-11|Push Hands Media Inc|Use the near field communication device to share the internet connection method|
US20170033983A1|2015-07-31|2017-02-02|At&T Intellectual Property I, L.P.|Wireless terminal, configurable network device and method for use therewith|
KR102115104B1|2015-10-09|2020-06-17|웨이 쑤|Information processing network system based on issuance of integrated code, method and sensing access device|
DE102015222395A1|2015-11-13|2017-05-18|TRUMPF Maschinen Grüsch AG|A method of configuring a wireless measurement sensor attached to a machine, and a measurement sensor and machine therefor|
US10659442B1|2015-12-21|2020-05-19|Marvell International Ltd.|Security in smart configuration for WLAN based IOT device|
法律状态:
2017-05-11| FGA| Letters patent sealed or granted (standard patent)|
优先权:
申请号 | 申请日 | 专利标题
US13/593,729|US8953491B2|2012-08-24|2012-08-24|System and method for providing wireless network configuration information|
US13/593,729||2012-08-24||
[返回顶部]