Integration of home security into existing infrastructure

作者: Susann M. Keohane , Johnny M. Shieh , Jessica C. Murillo

DOI:

关键词:

摘要: Embodiments relate to administering access a wireless network by detecting connective proximity of device the network, determining that is an authorized based on information, connecting and causing connection be provided as output status.

参考文章(7)
Joseph Anthony Indriolo, Jeff Bryan Lanza, Edward Perrone Ii Michael, Leveraging online identities to grant access to private networks ,(2015)
Nikhil Deshpande, Johnny Chen, John Sherry, Uttam Sengupta, Method and apparatus for enabling context awareness in a wireless system ,(2004)
Xiangpeng Jing, Aixin Liu, Abhishek Patil, Dipendu Saha, Seungwook Hong, Aravind Asam, Yang Yu, Andy Nguyen, Diung Nguyen, Automated wireless three-dimensional (3D) video conferencing via a tunerless television device ,(2010)
Gloria Lin, Taido L. Nakajima, Pareet Rahul, Systems and methods for identifying unauthorized users of an electronic device ,(2009)
Peter Massam, Badri Nath, Rakesh Kushwaha, System and method for service quality management for wireless devices ,(2006)
Huiqi Lu, Shahin Gheitanchi, Rupert Young, Chris Chatwin, A symbian based mobile user authorization system using mobile networks 2010 Wireless Advanced 2010. pp. 1- 5 ,(2010) , 10.1109/WIAD.2010.5544939