Methods and apparatus for solicited activation for protected wireless networking

作者: Philip F. Kearney , Christopher B. Zimmermann , Robert Bradley

DOI:

关键词: Computer networkService discoveryWireless networkUser experience designCryptographic protocolNetwork detectorProtocol (object-oriented programming)Computer science

摘要: Methods and apparatus that enable solicited access to a secure wireless network having complex security protocols. In one embodiment, such is performed using streamlined or reduced number of steps includes an exemplary active/passive scanning protocol use optimized service discovery (SDP). Furthermore, multiple aspects the invention are directed improving enhancing user experience, including reduction “human” interaction requirements for operation (such as changing settings, entering addresses, etc.), furthermore, integrated utilization human readable text.

参考文章(74)
Mark E. Peters, Steven M. Miller, Sudhakar Nagarajan, Wireless Public Network Access ,(2007)
Howard Jeffrey Locker, Philip John Jakes, Daryl Carvis Cromer, Ronald John Griffiths, System and method for passive scanning of authorized wireless channels ,(2003)
Anup Kuzhiyil, Luiza Timariu, Lalit Yerramilli Raju, Saravana Krishnan Kannan, Srinivasan Balasubramanian, Amit Gil, Wlan system scanning and selection ,(2007)
Michael Montemurro, Brian Oliver, Sherif Abdel-Kader, Determining a WLAN regulatory domain ,(2007)
Patrice R. Calhoun, Rohit Kumar Suri, Scott G. Kelly, Light-weight access point protocol RFC. ,vol. 5412, pp. 1- 125 ,(2003)
Nancy Cam Winget, Richard D. Rebo, Victor J. Griswold, Robert Meier, Douglas Smith, Wireless local area network context control protocol ,(2005)