US20110265151A1 - Method of adding a client device or service to a wireless network - Google Patents
Method of adding a client device or service to a wireless network Download PDFInfo
- Publication number
- US20110265151A1 US20110265151A1 US13/092,082 US201113092082A US2011265151A1 US 20110265151 A1 US20110265151 A1 US 20110265151A1 US 201113092082 A US201113092082 A US 201113092082A US 2011265151 A1 US2011265151 A1 US 2011265151A1
- Authority
- US
- United States
- Prior art keywords
- service
- client device
- network
- identification information
- smart network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2807—Exchanging configuration information on appliance services in a home automation network
- H04L12/2809—Exchanging configuration information on appliance services in a home automation network indicating that an appliance service is present in a home automation network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/14—Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
Definitions
- the present disclosure relates generally to wireless networks and, more specifically, to a method of adding a client device or service to a wireless network.
- a home environment may include one or more computers, a wireless router, a DSL modem, and one or more other client devices capable of connecting to the home network.
- each device in the home network must be individually configured to connect to the network and, once configured, may then communicate with each of the other devices attached to the home network.
- a network user may need to manually reconfigure the home network router, determine a network IP address and/or hostname for each client device, establish network credentials, register the various services for each device, and manually track which network IP address is associated with which client device or service in order to configure client devices to communicate on the home network.
- FIG. 1A is an exemplary illustration of an overarching network system configured to implement one or more aspects of the present invention.
- FIG. 1B illustrates the smart home network of FIG. 1A , according to one example embodiment of the present invention.
- FIG. 1C illustrates the smart home network of FIG. 1A , according to another example embodiment of the present invention.
- FIG. 1D illustrates the smart home network of FIG. 1A , according to yet another example embodiment of the present invention.
- FIG. 1E is a more detailed illustration of the smart network host device of FIG. 1A , according to one example embodiment of the present invention.
- FIG. 1F illustrates a system software architecture for the smart network host device of FIG. 1E , according to one example embodiment of the present invention.
- FIG. 2 illustrates a configuration of the ID device of FIG. 1B , according to an example embodiment of the present invention.
- FIG. 3 is a flowchart of method steps for automatically associating a client device or service with a smart network, according to one example embodiment of the present invention.
- FIG. 4 is a flowchart of method steps for automatically registering a client device or service with a wireless network, according to an example embodiment of the present invention.
- One example embodiment of the present invention sets forth a method that comprises obtaining identification information and an authorization credential associated with a client device or service, receiving a registration request from the client device or service that includes the identification information, wherein the registration request is for registering the client device or service with a wireless home network, in response, determining that the client device or service is currently associated with the wireless home network, initiating a secure password authentication protocol with the client device or service, and, after completing the secure password authentication protocol, registering the client device or service with the wireless home network.
- Another example embodiment of the present invention sets forth a computer-readable medium including instructions that, when executed by a processing unit, cause the processing unit to perform the steps of obtaining identification information and an authorization credential associated with a client device or service, receiving a registration request from the client device or service that includes the identification information, wherein the registration request is for registering the client device or service with a wireless home network, in response, determining that the client device or service is currently associated with the wireless home network, initiating a secure password authentication protocol with the client device or service, and, after completing the secure password authentication protocol, registering the client device or service with the wireless home network.
- Yet another example embodiment of the present invention sets forth a system comprising a smart network host device located within a wireless home network that is configured to obtain identification information and an authorization credential associated with a client device or service, receive a registration request from the client device or service that includes the identification information, wherein the registration request is for registering the client device or service with the wireless home network, in response, determine that the client device or service is currently associated with the wireless home network, initiate a secure password authentication protocol with the client device or service, and, after completing the secure password authentication protocol, register the client device or service with the wireless home network.
- FIG. 1A is an exemplary illustration of an overarching network system 100 configured to implement one or more aspects of the present invention.
- the network system 100 comprises a smart network 102 , an external network 110 , and an applet store 116 .
- the external network 110 may comprise the well-known Internet or any other data network system.
- the smart network 102 includes a smart network host device 120 configured to transmit network data packets between the external network 110 and connected devices within the smart network 102 , such as computer 170 and client devices 130 . Any technically feasible wireless or wired physical transport technology may be implemented to transmit the network data packets.
- the smart network host device 120 maintains a network state model 178 that represents the different entities and related services operating within the smart network 102 .
- the network state model 178 would include an entry for client device 130 ( 0 ), and related attributes for a printer service, scanner service, and file (or block device) service. New devices register with the smart network host device 120 , which then updates the network state model 178 to include the new device.
- a portal application 172 residing within the computer 170 , is configured to access the network state model 178 to determine which client devices 130 are available within the smart network 102 , which services the client devices 130 provide, and to access and use the services.
- the portal application 172 may include one or more applets 174 , configured to extend functionality of the portal application 172 .
- a given applet 174 may be associated with a specific client device 130 and may facilitate specific usage models for the client device 130 via the extended functionality.
- a most recent version of a corresponding applet 174 may not be available within the portal application 172 .
- the portal application 172 may retrieve the corresponding applet 174 or version of the corresponding applet 174 from the applet store 116 .
- the applet store 116 is configured to facilitate access to applets 174 by the portal application 172 .
- the applet store 116 provides storage for applets 174 corresponding to client devices 130 and makes the applets 174 available for download to the portal application 172 via the external network 110 .
- the applet store 116 occupies a well-known location, such as a universal resource locator (URL) associated with the external network 110 .
- URL universal resource locator
- Any technically feasible technique may be used to identify a particular applet 174 as corresponding to a particular client device 130 .
- any technically feasible technique may be used to download the particular applet 174 an incorporate the functionality of the applet 174 to the portal 172 .
- FIG. 1B illustrates the smart home network 102 of FIG. 1A , according to one example embodiment of the present invention.
- the smart network 102 comprises a smart network host device 120 , one or more client devices 130 , and a wide area network (WAN) interface device 112 , coupled to the external network 110 of FIG. 1A .
- the WAN interface device 112 may implement a cable modem, digital subscriber line (DSL) modem, fiber to the home interface, or any other technically feasible device that provides digital network connectivity to the external network 110 .
- the WAN interface device 112 is coupled to the smart network host device 120 via a network interface 118 .
- the network interface 118 implements the well-known Ethernet standard.
- the smart network host device 120 implements a wireless network interface coupled to antenna 122 , which is configured to convert electrical signals to electromagnetic signals for transmitting data packets, and electromagnetic signals to electrical signals for receiving data packets.
- the antenna 122 may comprise plural independent radiator structures, each having a separate radiation pattern for implementing spatial multiplexing.
- the wireless network interface implements one or more well-known standards, such as the Institute of Electrical and Electronics Engineers (IEEE) standard 802.11, which defines a system for wireless local area networking.
- IEEE Institute of Electrical and Electronics Engineers
- the antenna 122 is configured establish wireless client links 134 to antennas 132 coupled to corresponding client devices 130 .
- the smart network host device 120 implements layer 2 forwarding (bridging) for wireless data packets forwarded among client devices 130 as well as Internet protocol (IP) layer 3 routing between an IP domain associated with the smart network 102 and the external network 110 .
- IP Internet protocol
- the smart network host device 120 provides related services and protocols, such as dynamic host configuration protocol (DHCP), network address translation (NAT), and the like.
- DHCP dynamic host configuration protocol
- NAT network address translation
- the smart network host device 120 acts as a central authentication authority for the smart network 102 and implements authentication services for devices registering with the smart network 102 .
- authentication is implemented via Identification (ID) devices 136 that are uniquely paired with corresponding client devices 130 .
- client device 130 ( 0 ) may be uniquely paired with ID device 136 ( 0 ) by a manufacturer of the client device 130 ( 0 ).
- An ID device 136 ( 0 ) is physically presented to the smart network host device 120 as an authentication credential to allow a client device 130 ( 0 ) paired to the ID device 136 ( 0 ) to join the smart network 102 .
- the client device 130 ( 0 ) is able to authenticate the smart network 102 as a trusted network by accessing credentials for the corresponding ID device 136 ( 0 ) specifically via the smart network 102 .
- the ID devices 136 are implemented as near field radio frequency identification (RFID) tags. Each one of the RFID tags is configured to retain authentication credentials necessary to uniquely associate the one RFID tag with one instance of the client device 130 . In this way, an RFID tag may be paired with a given client device 130 .
- RFID radio frequency identification
- the user wishes to add a new device, such as a smart network-enabled printer to the smart network 102 .
- the printer includes an ID device 136 implemented as an RFID tag that is paired to the printer.
- the user places the ID device 136 in close physical proximity to the smart network host device 120 , which is the able to read the ID device 136 and authenticate the printer.
- the printer registers with the smart network host device 120 and is then available for use by devices connected within the smart network 102 .
- the smart network host device 120 may indicate success to the user by flashing a light-emitting diode (LED), or by generating any technically feasible indication.
- LED light-emitting diode
- FIG. 1C illustrates the smart home network 102 of FIG. 1A , according to another example embodiment of the present invention.
- the smart network 102 comprises a smart network host device 120 , a smart network extender device 140 , one or more client devices 130 , and a wide area network (WAN) interface device 112 , coupled to the external network 110 of FIG. 1A .
- the WAN interface device 112 , smart network host device 120 , and one or more client devices 130 are configured to operate as previously described in FIG. 1B .
- Data packets transmitted by client devices 130 ( 1 ) through 130 (N) and destined to the external network 110 are received by the smart network extender device 140 and retransmitted by the smart network extender device 140 via bridge link 128 to the smart network host device 120 , which then forwards the data packets to the external network 110 .
- data packets from the external network 110 that are destined to any of the client devices 130 ( 1 ) through 130 (N) are transmitted via bridge link 128 to the smart network extender device 140 , which retransmits the data packets via wireless client links 134 ( 1 )- 134 (N).
- wireless client links 134 ( 1 )- 134 (N) may each be configured to operate on a separate channel or band, or a common channel or band.
- bridge link 128 may operate on a separate channel or band with respect to the wireless client links 134 .
- each smart network extender device 140 is paired to an ID device 136 , which is presented as an authentication credential to the smart network host device 120 to enable the smart network extender device 140 to participate within the smart network 102 .
- the smart network host device 120 is configured to operate similarly with respect to FIGS. 1B and 1C . However, upon detecting the smart network connector device 150 , the smart network host device 120 is configured to operate as a bridge rather than a router, and the smart network connector device 150 is configured to operate as a router. A backhaul link 158 is established between the smart network host device 120 and the smart network connector device 150 .
- Network data traffic between client device 130 (N) and the external network 110 traverses wireless client link 134 (N), bridge link 128 , and backhaul link 158 .
- This network data traffic is also forwarded by smart network extender device 140 , smart network host device 120 , and smart network connector device 150 .
- a client device 130 may connect directly to any one of the network extender device 140 , smart network host device 120 , or smart network connector device 150 .
- client device 130 ( 0 ) is connected to smart network connector device 150 via wireless client link 134 ( 0 )
- client device 130 ( 1 ) is connected to smart network host device 120 via wireless client link 134 ( 1 )
- client device 130 (N) is connected to smart network extender device 140 via wireless client link 134 (N).
- the smart network connector device 150 is paired to an ID device 136 , which is presented as an authentication credential to the smart network host device 120 to enable the smart network connector device 150 to participate within the smart network 102 .
- the smart network connector device 150 and the smart network host device 120 are paired during a manufacturing step, eliminating the need for a separate ID device 136 .
- FIG. 1E is a more detailed illustration of the smart network host device 120 of FIG. 1A , according to one example embodiment of the present invention.
- the smart network host device 120 comprises a processor complex, 160 , a wireless network interface 162 , an ID device reader 164 , and a wired network interface 166 .
- An interconnect 165 is configured to transmit data among the processor complex 160 , wireless network interface 162 , ID device reader 164 , and wired network interface 166 .
- the wired network interface 166 is configured transmit data packets via network interface 118 , based on data received via the interconnect 165 .
- the processor complex 160 comprises a central processing unit (CPU), non-volatile memory for storing persistent programs, program state, and configuration information, random access memory (RAM) for storing temporary or volatile data, and an interface to the interconnect 165 .
- the processor complex 160 is configured to execute an operating system and applications that provide routing services.
- the routing services may include, for example, data packet forwarding between the network interface 118 and the wireless network interface 162 .
- the packet forwarding services may include, without limitation, bridging among the one or more network devices via the wireless network interface 162 .
- the ID device reader 164 is configured to read data from an associated ID device 136 .
- the ID device reader 164 is configured to read data from RFID tags comprising the ID device 136 .
- the ID device reader 164 may also include a USB reader.
- the ID device reader 164 may be implemented as an optical scanner for reading ID devices 136 that encode data via a printed bar code.
- the ID device reader 164 may be configured to read data from other types of interfaces, such as other types of flash memories like an SD flash card.
- the smart network host device 120 comprises one or more integrated circuits that implement respective functions of the smart network host device 120 .
- the processor complex 160 , wired network interface 166 , and wireless network interface 162 may be integrated into a single integrated circuit.
- the smart network extender device 140 may be implemented using the basic architecture of the smart network host device 120 , with the exception that the ID device reader 164 and wired network interface 166 are not required for the smart network extender device 140 .
- the smart network connector device 150 may be implemented using the basic architecture of the smart network host device 120 , with the exception that the ID device reader 164 is not required for the smart network connector device 150 .
- FIG. 1F illustrates a system software architecture for the smart network host device 120 of FIG. 1E , according to one example embodiment of the present invention.
- the software architecture 104 includes several software modules within the smart network host device 120 .
- Programming instructions stored within the processor complex 160 implement a portion of the system software architecture 104 that includes a runtime server 180 , a product solution space 190 , and a network solution space 196 .
- the product solution space 190 comprises an object model 192 and one or more solution applications 194 .
- the object model 192 provides a standard, consistent abstraction of different network elements and related services within the smart network 102 .
- Exemplary network elements include devices coupled to the smart network 102 , such as printers, cameras, and display devices.
- Exemplary services include device and service discovery, event tracking and generation, and state presentation for the different elements.
- the object model 192 includes a network interface based on the well-known extensible markup language (XML).
- One or more solution applications 194 provide specific functionality, such as a specific view of a storage system, or a specific technique for presenting certain data.
- the network solution space 196 includes software modules configured to provide management of network elements and network services, including device services, local area network services within the smart network 102 , and wide area network services related to connectivity management of the external network 110 .
- smart network connector device 150 and smart network extender device 140 may be implemented using an appropriate subset of the system software architecture 104 described above in conjunction with FIG. 1F .
- the host device obtains the identification information and authorization credential from a network association apparatus that is associated with the specific device or service to be registered with the wireless network.
- the network association apparatus is configured to automatically provide the identification information and the authorization credential in a secure fashion to the host device of the wireless network when brought into close proximity to or physically connected with the host device.
- the network association apparatus comprises one or more of ID devices 136 ( 1 )- 136 (N) described above in conjunction with FIG. 1B
- the host device comprises the smart network host device 120 , described above in conjunction with FIGS. 1A-1F .
- FIG. 2 illustrates the ID device 136 (N) of FIG. 1B configured to provide identification information and an authorization credential in a secure fashion to the smart network host device 120 , according to an example embodiment of the present invention.
- the ID device 136 (N) is a portable apparatus that enables the smart network host device 120 to automatically associate a client device 130 (N) or service with the smart network 102 .
- the ID device 136 (N) may have any of the configurations for the ID devices 130 ( 0 )- 130 (N) described above in conjunction with FIG. 1B .
- the ID device 136 (N) may be any portable information-provisioning device that includes a data storage medium configured with a protected data storage region that retains the requisite identification information and authentication credentials for a specific client device 130 ( 0 )- 130 (N) or service.
- Suitable information-provisioning devices include USB drives that are manufactured with write-protected encrypted bits, writable RFID tags, optical disks with manufactured keys, secure digital (SD) memory cards with digital rights management (DRM) features, and the like.
- ID device 136 (N) may be configured without a storage medium, and includes a bar code, such as a two-dimensional quick response (QR) code. In such an embodiment, identification information and authentication credentials for a client device 130 (N) or service are encoded in the bar code.
- QR two-dimensional quick response
- the ID device 136 (N) includes a controller 210 , an I/O interface 220 , a universally unique identifier (UUID) 230 , and an authorization credential 240 .
- the controller 210 is configured to execute the requisite functions for the operation of the ID device 136 (N), and the I/O interface 220 is configured to enable communication between the ID device 136 (N) and the smart network host device 120 .
- the controller 210 includes an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and performing other specialized functions associated with the operation of the RFID tag.
- RF radio-frequency
- the I/O interface 220 includes an antenna for receiving and transmitting the RF signal, and the UUID 230 and the authorization credential 240 may reside in the integrated circuit included in the controller 210 .
- the UUID 230 and the authorization credential 240 may be stored in a memory that is part of the ID device 136 (N).
- the I/O interface 220 may include a USB port or other technically feasible interface for physically connecting the ID device 136 (N) to the smart network host device 120 .
- the UUID 230 includes a unique reference number used as an identifier for the client device 130 (N) that enables the smart network host device 120 to differentiate the client device 130 (N) from other devices and services found in the network system 100 .
- the UUID 230 is similar in format to globally unique identifiers (GUIDs), however, other formats known in the art suitable for the UUID 230 may be utilized without departing from the scope of the invention.
- the UUID 230 may include the media access control address (MAC address) of the client device 130 (N), in order to uniquely identify the client device 130 (N).
- MAC address media access control address
- the MAC address of the client device 130 (N) is a unique identifier that has no risk of name conflicts with any other devices in the smart network 102 or the network system 100 .
- the ID device 136 (N) can be permanently associated with the client device 130 (N) via the UUID 230 .
- the ID device 136 (N) may be configured such that UUID 230 may be written to the ID device 136 (N) by the smart network host device 120 or other device, and therefore can be associated with a different client device 130 (N) at a later time as desired by the user.
- a UUID associated with the smart network 102 may be written to the ID device 136 (N), and the ID device 136 (N) may then be used to associate the smart network 102 with other smart networks on the network system 100 .
- the authorization credential 240 when obtained from the ID device 136 (N) by the smart network host device 120 , provides a layer of security to the smart network 102 when the smart network host device 120 sets up a secure connection between the smart network 102 and the client device 130 (N).
- the authorization credential 240 may be an encrypted key for device-to-device authentication, in this case between the smart network host device 120 and the client device 130 (N), and may be stored in or permanently written to the ID device 136 (N) when the ID device 136 (N) is manufactured.
- the authorization credential 240 is stored in a write-protected storage medium, such as the write-protected encrypted bits of a USB drive or RFID tag, the manufactured key of an optical disk or SD memory card, or the like.
- the data included in the authorization credential 240 may be stored in any format known in the art suitable for authorization credentials without departing from the scope of the invention.
- the authorization credential 240 includes at least a portion of the MAC address of the client device 130 (N).
- the authorization credential 240 is a high-entropy key, such as a 128-bit key.
- the ID device 136 (N) provides the UUID 230 and the authorization credential 240 to the smart network host device 120 depends on the configuration of the ID device 136 (N). For example, when the ID device 136 (N) comprises a USB drive with write-protected encrypted bits, the ID device 136 (N) is detected by the smart network host device 120 when the ID device 136 (N) is inserted into an appropriate USB port of the smart network host device 120 , and the smart network host device 120 can obtain the UUID 230 and the authorization credential 240 using any technically feasible protocol. When the ID device 136 (N) includes a bar code, the ID device 136 (N) is scanned across a suitable bar code reader coupled to the smart network host device 120 .
- connection to the smart network host device 120 can be as straight-forward as physically presenting the ID device 136 (N) to the smart network host device 120 .
- the smart network host device 120 detects the ID device 136 (N) and reads the UUID 230 and the authorization credential 240 from the ID device 136 (N).
- the RFID reader in the smart network host device 120 may be configured to read information only from an RFID tag that is within the working radius of the RFID reader and also has a prescribed orientation with respect to the smart network host device 120 , or is physically mounted in a specific location on the smart network host device 120 .
- faking of an RFID tag output signal is difficult to simulate, thereby preventing unwanted devices and/or services from being registered on the smart network 102 by the smart network host deice 120 .
- the ID device 136 (N) comprises an RFID tag, a device that is physically connected to the smart network host device 120 , or a bar code that is scanned in to the smart network host device 120 , once the connection is made between the ID device 136 (N) and the smart network host device 120 , user involvement is no longer required for the client device 130 (N) to be associated with the smart network 102 by the smart network host device 120 .
- the ID device 136 (N) includes a visual identifier 250 that is disposed on an outer surface of the ID device 136 (N).
- the visual identifier 250 provide symbolic and/or numeric markings which indicate to the user the specific client device 130 or service that is associated with the ID device 136 (N).
- the visual identifier 250 may include a logo of a company associated with the client device 130 (N) or service associated with the ID device 136 (N), an icon that represents the client device 130 (N) or service, a serial number associated with the client device 130 (N) or service, and/or a bar code that uniquely identifies the client device 130 (N) or service.
- the visual identifier 250 may include both an iconic and a numeric component.
- ID device 136 (N) enables the smart network host device 120 to associate a specific client device 130 (N) with the smart network 102 .
- the ID device 136 (N) is a physical representation of the client device 130 (N) that greatly simplifies the role of a user of the smart network 102 when adding the client device 130 (N) or a service to the smart network 102 , since the UUID 230 and the authorization credential 240 are automatically obtained by the smart network host device 120 . Further, an additional layer of security is provided to the smart network 102 since the UUID 230 and the authorization credential 240 can only be obtained by the smart network host device 120 when a suitable ID device 136 (N) is positioned in close proximity to or physically connected to the smart network host device 120 .
- the smart network host device 120 obtains the UUID 230 and the authorization credential 240 in a convenient and secure fashion, and can automatically associate the client device 130 (N) that is paired to the ID device 136 (N) with the smart network 102 with little risk of the authorization credential 240 being spoofed, or an unauthorized UUID being accepted by the smart network host device 120 .
- the smart network host device 120 is configured to automatically disassociate the client device 130 (N) or service associated with the ID device 136 (N) and the smart network 102 when the ID device 136 (N) is detected to be no longer in close proximity to or physically connected to the smart network host device 120 .
- FIG. 3 is a flowchart of method steps for automatically associating a client device or service with a smart network, according to one example embodiment of the present invention.
- the method steps are described in conjunction with the smart network 102 of FIG. 1 and the configuration of the ID device 136 (N) illustrated in FIG. 2 , persons skilled in the art will understand that any wireless network and ID device configured to perform the method steps, in any order, is within the scope of the invention.
- the method 300 begins at step 301 , where the smart network host device 120 detects the presence of the ID device 136 (N), which is associated with the client device 130 (N) or a service that can be connected to smart network 102 .
- the ID device 136 (N) may be detected when mounted in a prescribed fashion on a surface of the smart network host device 120 and ID device reader 164 in the smart network host device 120 detects the presence of an RFID tag included in the ID device 136 (N) once the ID device 136 (N) is within the near field of the reader.
- the ID device 136 (N) may be swiped near the ID device reader 164 .
- a bar code included in the ID device 136 (N) is read by an optical scanner coupled to the smart network host device 120 .
- the smart network host device 120 automatically obtains from the ID device 136 (N) the UUID 230 and the authorization credential 240 for the client device 130 (N) or service associated with the ID device 136 (N).
- the UUID 230 and the authorization credential 240 may be obtained placing the ID device 136 (N) near the smart network host device 120 , or by physically connecting the ID device 136 (N) to the smart network host device 120 via a USB port or other technically feasible connection mechanism.
- the UUID 230 and the authorization credential 240 may be encoded in a printable medium, such as a bar code, and read by swiping the bar code under an optical scanner included in the smart network host device 120 .
- the smart network host device 120 updates the network state model 178 to include the new device or service for which the smart network host device 120 has obtained the UUID 230 and the authorization credential 240 , thereby associating the client device 130 (N) or service with the smart network 102 .
- FIG. 4 is a flowchart of method steps for automatically registering a client device or service with a wireless network, according to an example embodiment of the present invention.
- the method steps are described in conjunction with the smart network 102 of FIG. 1 and the configuration of the ID device 136 (N) illustrated in FIG. 2 , persons skilled in the art will understand that any wireless network and ID device configured to perform the method steps, in any order, is within the scope of the invention.
- the smart network host device 120 Prior to the first step of method 400 , the smart network host device 120 obtains the UUID 230 and the authorization credential 240 from the ID device 136 (N) via method 300 .
- the method 400 begins at step 401 , where the smart network host device 120 receives a registration request from the client device 130 (N) or a service associated with the ID device 136 (N). Such a registration request may take place when the client device 130 (N) is first powered up, rebooted, etc. within the operational radius of the antenna 122 of the smart network host device 120 .
- the registration request includes the UUID 230 associated with the client device 130 (N).
- the registration request from the client device 130 (N) may be received by any access point of the smart network 102 , including the smart network extender device 140 and the smart network connector device 150 .
- the smart network extender device 140 communicates the registration request to the smart network host device 120 via the bridge link 128
- the smart network connector device 150 communicates the registration request to the smart network host device 120 via the backhaul link 158 .
- step 402 the smart network host device 120 determines whether the client device 130 (N) or service requesting registration with the smart network 102 has been previously associated with the smart network 102 .
- the smart network host device 120 performs the determination of step 402 by confirming that the UUID 230 received from the client device 136 (N) in step 401 matches an entry in the network state model 178 .
- the presence of the UUID 230 in the network state model 178 confirms that a user has previously presented the ID device 136 (N) to the smart network host device 120 , and the smart network host device 120 proceeds to step 403 of method 400 .
- the smart network host device 120 initiates a secure password authentication protocol with the client device 130 (N) or service.
- the secure password authentication protocol is a protocol handshake between the client device 130 (N) and the smart network host device 120 , and is used to set up a secure connection between the smart network host device 120 and the client device 136 (N).
- Such a protocol includes a dual challenge mechanism, in which the authorization credential 240 is never broadcast between the client device 130 (N) and the smart network host device 120 .
- the client device 130 (N) proves to the smart network host device 120 that the client device 130 (N) has the authorization credential 240 and the smart network host device 120 proves to the client device 130 (N) that the smart network host device 120 also has the authorization credential 240 . If either device fails to provide the correct information during such a protocol handshake, the other device terminates the session and no network connection will be established therebetween. Upon successful completion of the secure password authentication protocol, method 400 proceeds to step 404 .
- the smart network host device 120 registers the client device 130 (N) or service with the smart network 102 .
- the smart network host device 120 and the client device 130 (N) each create a session key based on the authorization credential 240 , which is known to both. Since an identical authorization credential 240 is used by both the smart network host device 120 and the client device 130 (N), the session key created by each is identical to the other. Thus, all subsequent messages between the smart network host device 120 and the client device 130 (N) can be encrypted based on this session key, so that a secure connection is maintained between the smart network host device 120 and the client device 130 (N).
- both the smart network host device 120 and the client device 130 (N) only accept messages correctly encrypted with this session key.
- the session key created in step 404 is not broadcast or otherwise transmitted between the smart network host device 120 and the registered client device 130 (N) or service, and is only used as an encryption key for encrypting and decrypting messages between the smart network host device 120 and the registered client device 130 (N) or service.
- example embodiments of the invention provide systems and methods for automatically registering a client device or service with a smart network.
- a network association apparatus automatically provides identification information and an authorization credential that are associated with the client device or service to be connected to a wireless network.
- the network association apparatus advantageously enables the host device of the wireless network to automatically associate the client device or service to the wireless network with little or no user involvement required, while providing an additional layer of security to the process of accessing the wireless network.
- the added security layer stems from the required possession of the network association apparatus and its proximity to the smart network host device in order to associate a client device or service to the smart network.
- One embodiment of the invention may be implemented as a program product for use with a computer system.
- the program(s) of the program product define functions of the embodiments (including the methods described herein) and can be contained on a variety of computer-readable storage media.
- Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, flash memory, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored.
- non-writable storage media e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, flash memory, ROM
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Automation & Control Theory (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
- This application claims benefit of U.S. provisional patent application Ser. No. 61/327,072 (Attorney Docket No. CPOL970592), filed Apr. 22, 2010, which is herein incorporated by reference in its entirety.
- 1. Technical Field
- The present disclosure relates generally to wireless networks and, more specifically, to a method of adding a client device or service to a wireless network.
- 2. Description of the Related Art
- Home networks, in which multiple computing and/or peripheral devices are communicatively linked together in a consumer's home, are becoming increasingly ubiquitous. A home environment may include one or more computers, a wireless router, a DSL modem, and one or more other client devices capable of connecting to the home network. Conventionally, each device in the home network must be individually configured to connect to the network and, once configured, may then communicate with each of the other devices attached to the home network.
- In practice, procedures for associating client devices and provisioning services on a home network are typically too involved for the majority of home network users to implement reliably. For example, a network user may need to manually reconfigure the home network router, determine a network IP address and/or hostname for each client device, establish network credentials, register the various services for each device, and manually track which network IP address is associated with which client device or service in order to configure client devices to communicate on the home network.
- The involved configuration procedures described above make it a challenge for unsophisticated users to reliably setup a home network and associate client devices or services on the home network. Accordingly, there is a need in the art for systems and methods that enable the user of a home network to conveniently and securely connect one or more devices or services to the home network.
- So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention may be had by reference to example embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only example embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
-
FIG. 1A is an exemplary illustration of an overarching network system configured to implement one or more aspects of the present invention. -
FIG. 1B illustrates the smart home network ofFIG. 1A , according to one example embodiment of the present invention. -
FIG. 1C illustrates the smart home network ofFIG. 1A , according to another example embodiment of the present invention. -
FIG. 1D illustrates the smart home network ofFIG. 1A , according to yet another example embodiment of the present invention. -
FIG. 1E is a more detailed illustration of the smart network host device ofFIG. 1A , according to one example embodiment of the present invention. -
FIG. 1F illustrates a system software architecture for the smart network host device ofFIG. 1E , according to one example embodiment of the present invention. -
FIG. 2 illustrates a configuration of the ID device ofFIG. 1B , according to an example embodiment of the present invention. -
FIG. 3 is a flowchart of method steps for automatically associating a client device or service with a smart network, according to one example embodiment of the present invention. -
FIG. 4 is a flowchart of method steps for automatically registering a client device or service with a wireless network, according to an example embodiment of the present invention. - For clarity, identical reference numbers have been used, where applicable, to designate identical elements that are common between figures. It is contemplated that features of one example embodiment may be incorporated in other example embodiments without further recitation.
- In the following description, numerous specific details are set forth to provide a more thorough understanding of various example embodiments of the invention. However, it will be apparent to one of skill in the art that certain embodiments of the invention may be practiced without one or more of these specific details. In other instances, well-known features have not been described in order to avoid obscuring the invention.
- One example embodiment of the present invention sets forth a method that comprises obtaining identification information and an authorization credential associated with a client device or service, receiving a registration request from the client device or service that includes the identification information, wherein the registration request is for registering the client device or service with a wireless home network, in response, determining that the client device or service is currently associated with the wireless home network, initiating a secure password authentication protocol with the client device or service, and, after completing the secure password authentication protocol, registering the client device or service with the wireless home network.
- Another example embodiment of the present invention sets forth a computer-readable medium including instructions that, when executed by a processing unit, cause the processing unit to perform the steps of obtaining identification information and an authorization credential associated with a client device or service, receiving a registration request from the client device or service that includes the identification information, wherein the registration request is for registering the client device or service with a wireless home network, in response, determining that the client device or service is currently associated with the wireless home network, initiating a secure password authentication protocol with the client device or service, and, after completing the secure password authentication protocol, registering the client device or service with the wireless home network.
- Yet another example embodiment of the present invention sets forth a system comprising a smart network host device located within a wireless home network that is configured to obtain identification information and an authorization credential associated with a client device or service, receive a registration request from the client device or service that includes the identification information, wherein the registration request is for registering the client device or service with the wireless home network, in response, determine that the client device or service is currently associated with the wireless home network, initiate a secure password authentication protocol with the client device or service, and, after completing the secure password authentication protocol, register the client device or service with the wireless home network.
-
FIG. 1A is an exemplary illustration of anoverarching network system 100 configured to implement one or more aspects of the present invention. Thenetwork system 100 comprises asmart network 102, anexternal network 110, and anapplet store 116. Theexternal network 110 may comprise the well-known Internet or any other data network system. Thesmart network 102 includes a smartnetwork host device 120 configured to transmit network data packets between theexternal network 110 and connected devices within thesmart network 102, such ascomputer 170 andclient devices 130. Any technically feasible wireless or wired physical transport technology may be implemented to transmit the network data packets. The smartnetwork host device 120 maintains anetwork state model 178 that represents the different entities and related services operating within thesmart network 102. For example, if client device 130(0) implements a printer with an integrated scanner and flash memory reader, then thenetwork state model 178 would include an entry for client device 130(0), and related attributes for a printer service, scanner service, and file (or block device) service. New devices register with the smartnetwork host device 120, which then updates thenetwork state model 178 to include the new device. - A
portal application 172, residing within thecomputer 170, is configured to access thenetwork state model 178 to determine whichclient devices 130 are available within thesmart network 102, which services theclient devices 130 provide, and to access and use the services. Theportal application 172 may include one ormore applets 174, configured to extend functionality of theportal application 172. A givenapplet 174 may be associated with aspecific client device 130 and may facilitate specific usage models for theclient device 130 via the extended functionality. When anew client device 130 registers with thesmart network 102, a most recent version of acorresponding applet 174 may not be available within theportal application 172. However, theportal application 172 may retrieve thecorresponding applet 174 or version of thecorresponding applet 174 from theapplet store 116. - The
applet store 116 is configured to facilitate access toapplets 174 by theportal application 172. Theapplet store 116 provides storage forapplets 174 corresponding toclient devices 130 and makes theapplets 174 available for download to theportal application 172 via theexternal network 110. In one embodiment, theapplet store 116 occupies a well-known location, such as a universal resource locator (URL) associated with theexternal network 110. Any technically feasible technique may be used to identify aparticular applet 174 as corresponding to aparticular client device 130. Furthermore, any technically feasible technique may be used to download theparticular applet 174 an incorporate the functionality of theapplet 174 to the portal 172. -
FIG. 1B illustrates thesmart home network 102 ofFIG. 1A , according to one example embodiment of the present invention. As shown, thesmart network 102 comprises a smartnetwork host device 120, one ormore client devices 130, and a wide area network (WAN)interface device 112, coupled to theexternal network 110 ofFIG. 1A . TheWAN interface device 112 may implement a cable modem, digital subscriber line (DSL) modem, fiber to the home interface, or any other technically feasible device that provides digital network connectivity to theexternal network 110. TheWAN interface device 112 is coupled to the smartnetwork host device 120 via anetwork interface 118. In one embodiment, thenetwork interface 118 implements the well-known Ethernet standard. - The smart
network host device 120 implements a wireless network interface coupled toantenna 122, which is configured to convert electrical signals to electromagnetic signals for transmitting data packets, and electromagnetic signals to electrical signals for receiving data packets. Theantenna 122 may comprise plural independent radiator structures, each having a separate radiation pattern for implementing spatial multiplexing. In one embodiment, the wireless network interface implements one or more well-known standards, such as the Institute of Electrical and Electronics Engineers (IEEE) standard 802.11, which defines a system for wireless local area networking. Theantenna 122 is configured establish wireless client links 134 toantennas 132 coupled tocorresponding client devices 130. The smartnetwork host device 120 implementslayer 2 forwarding (bridging) for wireless data packets forwarded amongclient devices 130 as well as Internet protocol (IP) layer 3 routing between an IP domain associated with thesmart network 102 and theexternal network 110. In this configuration, the smartnetwork host device 120 provides related services and protocols, such as dynamic host configuration protocol (DHCP), network address translation (NAT), and the like. - The smart
network host device 120 acts as a central authentication authority for thesmart network 102 and implements authentication services for devices registering with thesmart network 102. In one embodiment, authentication is implemented via Identification (ID)devices 136 that are uniquely paired withcorresponding client devices 130. For example, client device 130(0) may be uniquely paired with ID device 136(0) by a manufacturer of the client device 130(0). An ID device 136(0) is physically presented to the smartnetwork host device 120 as an authentication credential to allow a client device 130(0) paired to the ID device 136(0) to join thesmart network 102. Furthermore, the client device 130(0) is able to authenticate thesmart network 102 as a trusted network by accessing credentials for the corresponding ID device 136(0) specifically via thesmart network 102. In one embodiment, theID devices 136 are implemented as near field radio frequency identification (RFID) tags. Each one of the RFID tags is configured to retain authentication credentials necessary to uniquely associate the one RFID tag with one instance of theclient device 130. In this way, an RFID tag may be paired with a givenclient device 130. Persons skilled in the art will recognize that any technique may be implemented to generate and represent authentication credentials without departing the scope and spirit of the present invention. For example, in another embodiment, theID devices 136 could be implemented as a physical token that includes a printed bar code on a face of the token. The bar code may encode authentication credentials for acorresponding client device 130. In such an embodiment, the smartnetwork host device 120 may include an optical scanner capable of reading the printed bar code from the physical token. In alternative embodiments, other forms ofID devices 136 may implement storage of the authentication credentials. For example, a universal serial bus (USB) storage device may be used to present authentication credentials to the smartnetwork host device 120 for authenticating a related device, such as thecomputer 170. In other alternative embodiments, a user may manually authenticate aclient device 130 with the smartnetwork host device 120. For example, the user may log onto a management web page generated by the smartnetwork host device 120 and manually enter authentication credentials, such as a printed code associated with theclient device 130. - In one usage scenario involving
ID device 136, the user wishes to add a new device, such as a smart network-enabled printer to thesmart network 102. The printer includes anID device 136 implemented as an RFID tag that is paired to the printer. The user places theID device 136 in close physical proximity to the smartnetwork host device 120, which is the able to read theID device 136 and authenticate the printer. The printer registers with the smartnetwork host device 120 and is then available for use by devices connected within thesmart network 102. Upon successfully reading theID device 136, the smartnetwork host device 120 may indicate success to the user by flashing a light-emitting diode (LED), or by generating any technically feasible indication. -
FIG. 1C illustrates thesmart home network 102 ofFIG. 1A , according to another example embodiment of the present invention. Here, thesmart network 102 comprises a smartnetwork host device 120, a smartnetwork extender device 140, one ormore client devices 130, and a wide area network (WAN)interface device 112, coupled to theexternal network 110 ofFIG. 1A . TheWAN interface device 112, smartnetwork host device 120, and one ormore client devices 130 are configured to operate as previously described inFIG. 1B . - In addition to previously described functionality, the smart
network host device 120 is also configured to detect one or more smartnetwork extender devices 140 and to establish abridge link 128 to each of the one or more smartnetwork extender devices 140. Each smartnetwork extender device 140 is configured to act as a network bridge between aclient device 130 and the smartnetwork host device 120. For example, client devices 130(1) through 130(N) may be physically located such that they are able to connect to the smartnetwork extender device 140, but not to the smartnetwork host device 120. Furthermore, the smartnetwork extender device 140 is able to connect to the smartnetwork host device 120 viabridge link 128. Data packets transmitted by client devices 130(1) through 130(N) and destined to theexternal network 110 are received by the smartnetwork extender device 140 and retransmitted by the smartnetwork extender device 140 viabridge link 128 to the smartnetwork host device 120, which then forwards the data packets to theexternal network 110. Similarly, data packets from theexternal network 110 that are destined to any of the client devices 130(1) through 130(N) are transmitted viabridge link 128 to the smartnetwork extender device 140, which retransmits the data packets via wireless client links 134(1)-134(N). Persons skilled in the art will understand that wireless client links 134(1)-134(N) may each be configured to operate on a separate channel or band, or a common channel or band. Furthermore,bridge link 128 may operate on a separate channel or band with respect to the wireless client links 134. - In one embodiment, each smart
network extender device 140 is paired to anID device 136, which is presented as an authentication credential to the smartnetwork host device 120 to enable the smartnetwork extender device 140 to participate within thesmart network 102. -
FIG. 1D illustrates thesmart home network 102 ofFIG. 1A , according to yet another example embodiment of the present invention. Here, thesmart network 102 comprises a smartnetwork host device 120, a smartnetwork extender device 140, one ormore client devices 130, a smartnetwork connector device 150, and a wide area network (WAN)interface device 112, coupled to theexternal network 110 ofFIG. 1A . TheWAN interface device 112, smartnetwork extender device 140, and one ormore client devices 130 are configured to operate as previously described inFIGS. 1B and 1C . - In this embodiment, the smart
network host device 120 is configured to operate similarly with respect toFIGS. 1B and 1C . However, upon detecting the smartnetwork connector device 150, the smartnetwork host device 120 is configured to operate as a bridge rather than a router, and the smartnetwork connector device 150 is configured to operate as a router. Abackhaul link 158 is established between the smartnetwork host device 120 and the smartnetwork connector device 150. - Network data traffic between client device 130(N) and the
external network 110 traverses wireless client link 134(N),bridge link 128, andbackhaul link 158. This network data traffic is also forwarded by smartnetwork extender device 140, smartnetwork host device 120, and smartnetwork connector device 150. Aclient device 130 may connect directly to any one of thenetwork extender device 140, smartnetwork host device 120, or smartnetwork connector device 150. As shown, client device 130(0) is connected to smartnetwork connector device 150 via wireless client link 134(0), client device 130(1) is connected to smartnetwork host device 120 via wireless client link 134(1), and client device 130(N) is connected to smartnetwork extender device 140 via wireless client link 134(N). - In one embodiment, the smart
network connector device 150 is paired to anID device 136, which is presented as an authentication credential to the smartnetwork host device 120 to enable the smartnetwork connector device 150 to participate within thesmart network 102. In an alternative embodiment, the smartnetwork connector device 150 and the smartnetwork host device 120 are paired during a manufacturing step, eliminating the need for aseparate ID device 136. -
FIG. 1E is a more detailed illustration of the smartnetwork host device 120 ofFIG. 1A , according to one example embodiment of the present invention. As shown, the smartnetwork host device 120 comprises a processor complex, 160, awireless network interface 162, anID device reader 164, and awired network interface 166. Aninterconnect 165 is configured to transmit data among theprocessor complex 160,wireless network interface 162,ID device reader 164, andwired network interface 166. Thewired network interface 166 is configured transmit data packets vianetwork interface 118, based on data received via theinterconnect 165. Thewired network interface 166 is also configured to receive data packets from thenetwork interface 118 and transmit contents of the received data packets to theprocessor complex 160 via theinterconnect 165. Thewireless network interface 162 is configured to transmit data packets, based on data received via theinterconnect 165, to one or more network devices within range. Thewireless network interface 162 is also configured to receive data packets from the one or more network devices and then transmit contents of the received packets to theprocessor complex 160. Thewireless network interface 162 is coupled to anantenna 122. - The
processor complex 160 comprises a central processing unit (CPU), non-volatile memory for storing persistent programs, program state, and configuration information, random access memory (RAM) for storing temporary or volatile data, and an interface to theinterconnect 165. In one embodiment, theprocessor complex 160 is configured to execute an operating system and applications that provide routing services. The routing services may include, for example, data packet forwarding between thenetwork interface 118 and thewireless network interface 162. The packet forwarding services may include, without limitation, bridging among the one or more network devices via thewireless network interface 162. - The
ID device reader 164 is configured to read data from an associatedID device 136. In one embodiment, theID device reader 164 is configured to read data from RFID tags comprising theID device 136. TheID device reader 164 may also include a USB reader. In another embodiment, theID device reader 164 may be implemented as an optical scanner for readingID devices 136 that encode data via a printed bar code. In yet other embodiments, theID device reader 164 may be configured to read data from other types of interfaces, such as other types of flash memories like an SD flash card. - In certain embodiments, the smart
network host device 120 comprises one or more integrated circuits that implement respective functions of the smartnetwork host device 120. For example, theprocessor complex 160, wirednetwork interface 166, andwireless network interface 162 may be integrated into a single integrated circuit. - Persons skilled in the art will recognize that the smart
network extender device 140 may be implemented using the basic architecture of the smartnetwork host device 120, with the exception that theID device reader 164 and wirednetwork interface 166 are not required for the smartnetwork extender device 140. Similarly, the smartnetwork connector device 150 may be implemented using the basic architecture of the smartnetwork host device 120, with the exception that theID device reader 164 is not required for the smartnetwork connector device 150. -
FIG. 1F illustrates a system software architecture for the smartnetwork host device 120 ofFIG. 1E , according to one example embodiment of the present invention. As shown, thesoftware architecture 104 includes several software modules within the smartnetwork host device 120. Programming instructions stored within theprocessor complex 160 implement a portion of thesystem software architecture 104 that includes aruntime server 180, aproduct solution space 190, and anetwork solution space 196. Theproduct solution space 190 comprises anobject model 192 and one ormore solution applications 194. Theobject model 192 provides a standard, consistent abstraction of different network elements and related services within thesmart network 102. Exemplary network elements include devices coupled to thesmart network 102, such as printers, cameras, and display devices. Exemplary services include device and service discovery, event tracking and generation, and state presentation for the different elements. In one embodiment, theobject model 192 includes a network interface based on the well-known extensible markup language (XML). One ormore solution applications 194 provide specific functionality, such as a specific view of a storage system, or a specific technique for presenting certain data. Thenetwork solution space 196 includes software modules configured to provide management of network elements and network services, including device services, local area network services within thesmart network 102, and wide area network services related to connectivity management of theexternal network 110. - The
runtime server 180 comprises anetwork provisioning module 182, a service and discovery provisioning (SDP)module 184, anevent module 186, and a network configuration module 188. Theevent module 186 tracks different network events, such as a network device advertising presence or updating status within thesmart network 102. TheSDP module 184 maintains a persistent view of different network devices and related services, based on data from theevent module 186 and on data from the network devices. Thenetwork provisioning module 182 provides authentication and authorization for network devices within thesmart network 102. Authentication credentials may be presented via a givenID device 136. Thenetwork provisioning module 182 may also facilitate certain network services, such as DHCP leases. The network configuration module 188 includes hardware platform-specific implementation methods for network configuration and management. The persistent view comprises thenetwork state model 178 ofFIG. 1A . - Persons skilled in the art will recognize that the smart
network connector device 150 and smartnetwork extender device 140 may be implemented using an appropriate subset of thesystem software architecture 104 described above in conjunction withFIG. 1F . - Embodiments of the invention provide systems and methods for automatically registering a device or service with a wireless network, such as the
smart network 102. Specifically, a host device obtains identification information and an authorization credential associated with a specific device or service that can be registered with a wireless network. When the host device receives a registration request from the device or service, registration is performed automatically once the host device confirms the device or service has been associated with the wireless network and the secure password authentication protocol is successfully performed by the host device and the device or service. The secure password authentication protocol is based on the authorization credential obtained by the host device prior to the registration request. - The host device obtains the identification information and authorization credential from a network association apparatus that is associated with the specific device or service to be registered with the wireless network. The network association apparatus is configured to automatically provide the identification information and the authorization credential in a secure fashion to the host device of the wireless network when brought into close proximity to or physically connected with the host device. In some example embodiments, the network association apparatus comprises one or more of ID devices 136(1)-136(N) described above in conjunction with
FIG. 1B , and the host device comprises the smartnetwork host device 120, described above in conjunction withFIGS. 1A-1F . -
FIG. 2 illustrates the ID device 136(N) ofFIG. 1B configured to provide identification information and an authorization credential in a secure fashion to the smartnetwork host device 120, according to an example embodiment of the present invention. The ID device 136(N) is a portable apparatus that enables the smartnetwork host device 120 to automatically associate a client device 130(N) or service with thesmart network 102. When configured to provision thesmart network 102 with identification information and authentication credentials for a client device 130(N) or service, the ID device 136(N) may have any of the configurations for the ID devices 130(0)-130(N) described above in conjunction withFIG. 1B . More generally, the ID device 136(N) may be any portable information-provisioning device that includes a data storage medium configured with a protected data storage region that retains the requisite identification information and authentication credentials for a specific client device 130(0)-130(N) or service. Suitable information-provisioning devices include USB drives that are manufactured with write-protected encrypted bits, writable RFID tags, optical disks with manufactured keys, secure digital (SD) memory cards with digital rights management (DRM) features, and the like. In some embodiments, ID device 136(N) may be configured without a storage medium, and includes a bar code, such as a two-dimensional quick response (QR) code. In such an embodiment, identification information and authentication credentials for a client device 130(N) or service are encoded in the bar code. - In the example embodiment illustrated in
FIG. 2 , the ID device 136(N) includes acontroller 210, an I/O interface 220, a universally unique identifier (UUID) 230, and anauthorization credential 240. Thecontroller 210 is configured to execute the requisite functions for the operation of the ID device 136(N), and the I/O interface 220 is configured to enable communication between the ID device 136(N) and the smartnetwork host device 120. In example embodiments in which the ID device 136(N) comprises a near-field RFID tag, thecontroller 210 includes an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and performing other specialized functions associated with the operation of the RFID tag. In such embodiments, the I/O interface 220 includes an antenna for receiving and transmitting the RF signal, and theUUID 230 and theauthorization credential 240 may reside in the integrated circuit included in thecontroller 210. Alternatively, theUUID 230 and theauthorization credential 240 may be stored in a memory that is part of the ID device 136(N). In other example embodiments, in which the ID device 136(N) does not comprise an RFID tag, the I/O interface 220 may include a USB port or other technically feasible interface for physically connecting the ID device 136(N) to the smartnetwork host device 120. - The
UUID 230 includes a unique reference number used as an identifier for the client device 130(N) that enables the smartnetwork host device 120 to differentiate the client device 130(N) from other devices and services found in thenetwork system 100. In some example embodiments, theUUID 230 is similar in format to globally unique identifiers (GUIDs), however, other formats known in the art suitable for theUUID 230 may be utilized without departing from the scope of the invention. For example, theUUID 230 may include the media access control address (MAC address) of the client device 130(N), in order to uniquely identify the client device 130(N). The MAC address of the client device 130(N) is a unique identifier that has no risk of name conflicts with any other devices in thesmart network 102 or thenetwork system 100. Thus, the ID device 136(N) can be permanently associated with the client device 130(N) via theUUID 230. In alternative embodiments, the ID device 136(N) may be configured such thatUUID 230 may be written to the ID device 136(N) by the smartnetwork host device 120 or other device, and therefore can be associated with a different client device 130(N) at a later time as desired by the user. For example, a UUID associated with thesmart network 102 may be written to the ID device 136(N), and the ID device 136(N) may then be used to associate thesmart network 102 with other smart networks on thenetwork system 100. - The
authorization credential 240, when obtained from the ID device 136(N) by the smartnetwork host device 120, provides a layer of security to thesmart network 102 when the smartnetwork host device 120 sets up a secure connection between thesmart network 102 and the client device 130(N). Theauthorization credential 240 may be an encrypted key for device-to-device authentication, in this case between the smartnetwork host device 120 and the client device 130(N), and may be stored in or permanently written to the ID device 136(N) when the ID device 136(N) is manufactured. Thus, in some embodiments, theauthorization credential 240 is stored in a write-protected storage medium, such as the write-protected encrypted bits of a USB drive or RFID tag, the manufactured key of an optical disk or SD memory card, or the like. The data included in theauthorization credential 240 may be stored in any format known in the art suitable for authorization credentials without departing from the scope of the invention. In one example embodiment, theauthorization credential 240 includes at least a portion of the MAC address of the client device 130(N). In some embodiments, theauthorization credential 240 is a high-entropy key, such as a 128-bit key. - How the ID device 136(N) provides the
UUID 230 and theauthorization credential 240 to the smartnetwork host device 120 depends on the configuration of the ID device 136(N). For example, when the ID device 136(N) comprises a USB drive with write-protected encrypted bits, the ID device 136(N) is detected by the smartnetwork host device 120 when the ID device 136(N) is inserted into an appropriate USB port of the smartnetwork host device 120, and the smartnetwork host device 120 can obtain theUUID 230 and theauthorization credential 240 using any technically feasible protocol. When the ID device 136(N) includes a bar code, the ID device 136(N) is scanned across a suitable bar code reader coupled to the smartnetwork host device 120. When the ID device 136(N) comprises an RFID tag, connection to the smartnetwork host device 120 can be as straight-forward as physically presenting the ID device 136(N) to the smartnetwork host device 120. Thus, as soon as the ID device 136(N) is within a working radius ofID device reader 164 disposed in the smartnetwork host device 120, e.g., within about 10 cm, the smartnetwork host device 120 detects the ID device 136(N) and reads theUUID 230 and theauthorization credential 240 from the ID device 136(N). Alternatively, the RFID reader in the smartnetwork host device 120 may be configured to read information only from an RFID tag that is within the working radius of the RFID reader and also has a prescribed orientation with respect to the smartnetwork host device 120, or is physically mounted in a specific location on the smartnetwork host device 120. In such an example embodiment, faking of an RFID tag output signal is difficult to simulate, thereby preventing unwanted devices and/or services from being registered on thesmart network 102 by the smartnetwork host deice 120. Whether the ID device 136(N) comprises an RFID tag, a device that is physically connected to the smartnetwork host device 120, or a bar code that is scanned in to the smartnetwork host device 120, once the connection is made between the ID device 136(N) and the smartnetwork host device 120, user involvement is no longer required for the client device 130(N) to be associated with thesmart network 102 by the smartnetwork host device 120. - In some example embodiments of the invention, the ID device 136(N) includes a
visual identifier 250 that is disposed on an outer surface of the ID device 136(N). Thevisual identifier 250 provide symbolic and/or numeric markings which indicate to the user thespecific client device 130 or service that is associated with the ID device 136(N). Thevisual identifier 250 may include a logo of a company associated with the client device 130(N) or service associated with the ID device 136(N), an icon that represents the client device 130(N) or service, a serial number associated with the client device 130(N) or service, and/or a bar code that uniquely identifies the client device 130(N) or service. Thus, a user can quickly determine frommultiple ID devices 136, which ID device 136(N) is associated with aspecific client device 130. In order to conveniently differentiate between theID devices 136 associated with similar client devices (e.g., multiple digital cameras), thevisual identifier 250 may include both an iconic and a numeric component. - In operation, ID device 136(N) enables the smart
network host device 120 to associate a specific client device 130(N) with thesmart network 102. The ID device 136(N) is a physical representation of the client device 130(N) that greatly simplifies the role of a user of thesmart network 102 when adding the client device 130(N) or a service to thesmart network 102, since theUUID 230 and theauthorization credential 240 are automatically obtained by the smartnetwork host device 120. Further, an additional layer of security is provided to thesmart network 102 since theUUID 230 and theauthorization credential 240 can only be obtained by the smartnetwork host device 120 when a suitable ID device 136(N) is positioned in close proximity to or physically connected to the smartnetwork host device 120. In this way, the smartnetwork host device 120 obtains theUUID 230 and theauthorization credential 240 in a convenient and secure fashion, and can automatically associate the client device 130(N) that is paired to the ID device 136(N) with thesmart network 102 with little risk of theauthorization credential 240 being spoofed, or an unauthorized UUID being accepted by the smartnetwork host device 120. In some example embodiments, as an added layer of security, the smartnetwork host device 120 is configured to automatically disassociate the client device 130(N) or service associated with the ID device 136(N) and thesmart network 102 when the ID device 136(N) is detected to be no longer in close proximity to or physically connected to the smartnetwork host device 120. -
FIG. 3 is a flowchart of method steps for automatically associating a client device or service with a smart network, according to one example embodiment of the present invention. Although the method steps are described in conjunction with thesmart network 102 ofFIG. 1 and the configuration of the ID device 136(N) illustrated inFIG. 2 , persons skilled in the art will understand that any wireless network and ID device configured to perform the method steps, in any order, is within the scope of the invention. - As shown, the
method 300 begins atstep 301, where the smartnetwork host device 120 detects the presence of the ID device 136(N), which is associated with the client device 130(N) or a service that can be connected tosmart network 102. In one embodiment, the ID device 136(N) may be detected when mounted in a prescribed fashion on a surface of the smartnetwork host device 120 andID device reader 164 in the smartnetwork host device 120 detects the presence of an RFID tag included in the ID device 136(N) once the ID device 136(N) is within the near field of the reader. In another example embodiment, the ID device 136(N) may be swiped near theID device reader 164. In yet another example embodiment, a bar code included in the ID device 136(N) is read by an optical scanner coupled to the smartnetwork host device 120. - In
step 302, the smartnetwork host device 120 automatically obtains from the ID device 136(N) theUUID 230 and theauthorization credential 240 for the client device 130(N) or service associated with the ID device 136(N). TheUUID 230 and theauthorization credential 240 may be obtained placing the ID device 136(N) near the smartnetwork host device 120, or by physically connecting the ID device 136(N) to the smartnetwork host device 120 via a USB port or other technically feasible connection mechanism. In an alternative embodiment, theUUID 230 and theauthorization credential 240 may be encoded in a printable medium, such as a bar code, and read by swiping the bar code under an optical scanner included in the smartnetwork host device 120. - In
step 303, the smartnetwork host device 120 updates thenetwork state model 178 to include the new device or service for which the smartnetwork host device 120 has obtained theUUID 230 and theauthorization credential 240, thereby associating the client device 130(N) or service with thesmart network 102. -
FIG. 4 is a flowchart of method steps for automatically registering a client device or service with a wireless network, according to an example embodiment of the present invention. Although the method steps are described in conjunction with thesmart network 102 ofFIG. 1 and the configuration of the ID device 136(N) illustrated inFIG. 2 , persons skilled in the art will understand that any wireless network and ID device configured to perform the method steps, in any order, is within the scope of the invention. Prior to the first step ofmethod 400, the smartnetwork host device 120 obtains theUUID 230 and theauthorization credential 240 from the ID device 136(N) viamethod 300. - As shown, the
method 400 begins atstep 401, where the smartnetwork host device 120 receives a registration request from the client device 130(N) or a service associated with the ID device 136(N). Such a registration request may take place when the client device 130(N) is first powered up, rebooted, etc. within the operational radius of theantenna 122 of the smartnetwork host device 120. The registration request includes theUUID 230 associated with the client device 130(N). In an alternative embodiment, the registration request from the client device 130(N) may be received by any access point of thesmart network 102, including the smartnetwork extender device 140 and the smartnetwork connector device 150. In such an embodiment, the smartnetwork extender device 140 communicates the registration request to the smartnetwork host device 120 via thebridge link 128, and the smartnetwork connector device 150 communicates the registration request to the smartnetwork host device 120 via thebackhaul link 158. - In
step 402, the smartnetwork host device 120 determines whether the client device 130(N) or service requesting registration with thesmart network 102 has been previously associated with thesmart network 102. The smartnetwork host device 120 performs the determination ofstep 402 by confirming that theUUID 230 received from the client device 136(N) instep 401 matches an entry in thenetwork state model 178. The presence of theUUID 230 in thenetwork state model 178 confirms that a user has previously presented the ID device 136(N) to the smartnetwork host device 120, and the smartnetwork host device 120 proceeds to step 403 ofmethod 400. If theUUID 230 is not present in thenetwork state model 178, the smartnetwork host device 120 knows that the client device 130(N) has not been previously associated with thesmart network 102 via a suitable ID device 136(N) and therefore cannot be an authorized client device on thesmart network 102. Consequently, the smartnetwork host device 120 will not respond to the client device 130(N) or service making the registration request, and the client device 130(N) or service will neither be aware of nor have the ability to connect to thesmart network 102. In an alternative example embodiment, the smartnetwork host device 120 also checks for the presence of the ID device 136(N) connected to or in the proximity of the smartnetwork host device 120 before proceeding to step 403 ofmethod 400. The presence of the ID device 136(N) disposed on or near the smartnetwork host device 120 provides an additional layer of security for thesmart network 102 that prevents unauthorized devices from even attempting to access or register with thesmart network 102. - In
step 403, based on the determination that the client device 130(N) or service making the registration request has been previously associated with thesmart network 102 via the ID device 136(N), the smartnetwork host device 120 initiates a secure password authentication protocol with the client device 130(N) or service. The secure password authentication protocol is a protocol handshake between the client device 130(N) and the smartnetwork host device 120, and is used to set up a secure connection between the smartnetwork host device 120 and the client device 136(N). Such a protocol includes a dual challenge mechanism, in which theauthorization credential 240 is never broadcast between the client device 130(N) and the smartnetwork host device 120. Instead, using encryption algorithms known in the art, the client device 130(N) proves to the smartnetwork host device 120 that the client device 130(N) has theauthorization credential 240 and the smartnetwork host device 120 proves to the client device 130(N) that the smartnetwork host device 120 also has theauthorization credential 240. If either device fails to provide the correct information during such a protocol handshake, the other device terminates the session and no network connection will be established therebetween. Upon successful completion of the secure password authentication protocol,method 400 proceeds to step 404. - In
step 404, the smartnetwork host device 120 registers the client device 130(N) or service with thesmart network 102. Upon registration of the client device 130(N), the smartnetwork host device 120 and the client device 130(N) each create a session key based on theauthorization credential 240, which is known to both. Since anidentical authorization credential 240 is used by both the smartnetwork host device 120 and the client device 130(N), the session key created by each is identical to the other. Thus, all subsequent messages between the smartnetwork host device 120 and the client device 130(N) can be encrypted based on this session key, so that a secure connection is maintained between the smartnetwork host device 120 and the client device 130(N). Specifically, for the duration of the session, both the smartnetwork host device 120 and the client device 130(N) only accept messages correctly encrypted with this session key. It is noted that the session key created instep 404 is not broadcast or otherwise transmitted between the smartnetwork host device 120 and the registered client device 130(N) or service, and is only used as an encryption key for encrypting and decrypting messages between the smartnetwork host device 120 and the registered client device 130(N) or service. - In some example embodiments, an
additional step 405 is performed when a user has removed the ID device 136(N) from close proximity to the smartnetwork host device 120 and/or physically disconnected the ID device 136(N) from the smartnetwork host device 120. Instep 405, the smartnetwork host device 120 detects that the ID device 136(N) is no longer present, and, in response, automatically terminates the association of the client device 130(N) with thesmart network 102. Thus, in such example embodiments, a user may disconnect a client device or service by simply removing the associated ID device 136(N) from the smartnetwork host device 120. In other example embodiments, the smartnetwork host device 120 does not terminate the association of the client device 130(N) with thesmart network 102 upon detecting the removal or disconnection of the ID device 136(N) from the smartnetwork host device 120. - In sum, example embodiments of the invention provide systems and methods for automatically registering a client device or service with a smart network. A network association apparatus automatically provides identification information and an authorization credential that are associated with the client device or service to be connected to a wireless network. The network association apparatus advantageously enables the host device of the wireless network to automatically associate the client device or service to the wireless network with little or no user involvement required, while providing an additional layer of security to the process of accessing the wireless network. The added security layer stems from the required possession of the network association apparatus and its proximity to the smart network host device in order to associate a client device or service to the smart network.
- One embodiment of the invention may be implemented as a program product for use with a computer system. The program(s) of the program product define functions of the embodiments (including the methods described herein) and can be contained on a variety of computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, flash memory, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored.
- While the foregoing is directed to certain example embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. Therefore, the scope of the present invention is determined by the claims that follow.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/092,082 US20110265151A1 (en) | 2010-04-22 | 2011-04-21 | Method of adding a client device or service to a wireless network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US32707210P | 2010-04-22 | 2010-04-22 | |
US13/092,082 US20110265151A1 (en) | 2010-04-22 | 2011-04-21 | Method of adding a client device or service to a wireless network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20110265151A1 true US20110265151A1 (en) | 2011-10-27 |
Family
ID=44816711
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/092,082 Abandoned US20110265151A1 (en) | 2010-04-22 | 2011-04-21 | Method of adding a client device or service to a wireless network |
US13/092,049 Expired - Fee Related US8626921B2 (en) | 2010-04-22 | 2011-04-21 | Device and service management based on layer 2 through layer 7 device attributes |
US13/092,079 Expired - Fee Related US8627420B2 (en) | 2010-04-22 | 2011-04-21 | Apparatus for associating a client device or service with a wireless network |
US13/092,054 Active 2032-04-18 US8650311B2 (en) | 2010-04-22 | 2011-04-21 | Client device configured to connect with a home network |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/092,049 Expired - Fee Related US8626921B2 (en) | 2010-04-22 | 2011-04-21 | Device and service management based on layer 2 through layer 7 device attributes |
US13/092,079 Expired - Fee Related US8627420B2 (en) | 2010-04-22 | 2011-04-21 | Apparatus for associating a client device or service with a wireless network |
US13/092,054 Active 2032-04-18 US8650311B2 (en) | 2010-04-22 | 2011-04-21 | Client device configured to connect with a home network |
Country Status (1)
Country | Link |
---|---|
US (4) | US20110265151A1 (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120162538A1 (en) * | 2010-12-28 | 2012-06-28 | Comcast Interactive Media, Llc | Communication, Monitoring and Control Architecture and Method |
US20130219471A1 (en) * | 2012-02-20 | 2013-08-22 | Michael Stephen Brown | Establishing connectivity between an enterprise security perimeter of a device and an enterprise |
US20130241697A1 (en) * | 2012-03-14 | 2013-09-19 | Digi International Inc. | Spatially aware smart device provisioning |
US20130276076A1 (en) * | 2010-09-15 | 2013-10-17 | Vivek Gupta | Mobile device and method for secure on-line sign-up and provisioning for wi-fi hotspots using soap-xml techniques |
WO2014130920A1 (en) * | 2013-02-25 | 2014-08-28 | Actividentity, Inc. | Secure access to secure access module-enable machine using personal security device |
US8857705B2 (en) | 2012-01-13 | 2014-10-14 | Logic PD, Inc. | Methods for embedding device-specific data to enable remote identification and provisioning of specific devices |
US8857704B2 (en) | 2012-01-13 | 2014-10-14 | Logic PD, Inc. | Methods for embedding device-specific data to enable remote access to real time device data |
US20150288670A1 (en) * | 2012-09-28 | 2015-10-08 | Hewlett-Packard Development Company, L.P. | Qr code utilization in self-registration in a network |
US9160693B2 (en) | 2010-09-27 | 2015-10-13 | Blackberry Limited | Method, apparatus and system for accessing applications and content across a plurality of computers |
US9253081B2 (en) | 2012-11-15 | 2016-02-02 | Cisco Technology, Inc. | Trigger message routing according to a service class |
US9258295B1 (en) | 2012-08-31 | 2016-02-09 | Cisco Technology, Inc. | Secure over-the-air provisioning for handheld and desktop devices and services |
US9313099B2 (en) | 2012-01-13 | 2016-04-12 | Logic PD, Inc. | Systems, devices and methods for provisioning, pairing and activating a newly manufactured device for automatic joining of customer's network |
US20160117124A1 (en) * | 2013-12-31 | 2016-04-28 | Yong-Gu KWON | Storage System Having Security Storage Device and Management System Therefor |
DE102015106742A1 (en) | 2015-04-30 | 2016-11-03 | Deutsche Telekom Ag | Control of home automation functions |
US9628990B2 (en) | 2011-09-09 | 2017-04-18 | Intel Corporation | Mobile device and method for secure on-line sign-up and provisioning for Wi-Fi hotspots using SOAP-XML techniques |
US20180210429A1 (en) * | 2015-10-12 | 2018-07-26 | Fisher-Rosemount Systems, Inc. | Determining Device System Tags for Commissioning Portions of a Disconnected Process Control Loop |
US10459418B2 (en) * | 2013-09-04 | 2019-10-29 | Fisher-Rosemount Systems, Inc. | Technology for assessing and presenting field device commissioning information associated with a process plant |
CN114003812A (en) * | 2021-10-29 | 2022-02-01 | 深圳壹账通智能科技有限公司 | Address matching method, system, device and storage medium |
US20220264317A1 (en) * | 2021-02-18 | 2022-08-18 | The Nielsen Company (Us), Llc | Methods and apparatus to recognize metered devices connected to proprietary wifi extenders |
US11714394B2 (en) | 2018-09-28 | 2023-08-01 | Fisher-Rosemount Systems, Inc | Bulk commissioning of field devices within a process plant |
Families Citing this family (87)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110274029A1 (en) * | 2010-05-10 | 2011-11-10 | Comcast Cable Communications, Llc | Wireless Range Extender |
US10586227B2 (en) * | 2011-02-16 | 2020-03-10 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
WO2012112822A2 (en) | 2011-02-16 | 2012-08-23 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
US10223691B2 (en) | 2011-02-22 | 2019-03-05 | Visa International Service Association | Universal electronic payment apparatuses, methods and systems |
US8868694B2 (en) * | 2011-06-08 | 2014-10-21 | Cisco Technology, Inc. | Configuring multiple network devices in a setup flow |
US9198038B2 (en) | 2011-06-13 | 2015-11-24 | Qualcomm Incorporated | Apparatus and methods of identity management in a multi-network system |
US10121129B2 (en) | 2011-07-05 | 2018-11-06 | Visa International Service Association | Electronic wallet checkout platform apparatuses, methods and systems |
KR101276861B1 (en) * | 2011-07-27 | 2013-06-18 | 엘지전자 주식회사 | Appliance and online system including the same |
US10825001B2 (en) | 2011-08-18 | 2020-11-03 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US10242358B2 (en) | 2011-08-18 | 2019-03-26 | Visa International Service Association | Remote decoupled application persistent state apparatuses, methods and systems |
US9710807B2 (en) | 2011-08-18 | 2017-07-18 | Visa International Service Association | Third-party value added wallet features and interfaces apparatuses, methods and systems |
US8838764B1 (en) * | 2011-09-13 | 2014-09-16 | Amazon Technologies, Inc. | Hosted network management |
US10223730B2 (en) | 2011-09-23 | 2019-03-05 | Visa International Service Association | E-wallet store injection search apparatuses, methods and systems |
KR20130069047A (en) * | 2011-12-16 | 2013-06-26 | 삼성전자주식회사 | Communication apparatus and method |
KR101844211B1 (en) | 2011-12-28 | 2018-05-15 | 삼성전자주식회사 | Network system of home appliance and network set up method the same |
AU2013214801B2 (en) | 2012-02-02 | 2018-06-21 | Visa International Service Association | Multi-source, multi-dimensional, cross-entity, multimedia database platform apparatuses, methods and systems |
EP3681131A1 (en) * | 2012-04-27 | 2020-07-15 | Interdigital Patent Holdings, Inc. | Systems and methods for personalizing and/or tailoring a service interface |
CN106879047B (en) | 2012-05-02 | 2020-06-09 | 阿里巴巴集团控股有限公司 | Method for near-field information transfer, information transmission and receiving client and information system |
US9565622B2 (en) * | 2012-07-05 | 2017-02-07 | Qualcomm Incorporated | Detecting services provided by a wireless node before device discovery and connection establishment |
CN102843278B (en) * | 2012-08-31 | 2015-11-25 | 鸿富锦精密工业(深圳)有限公司 | Intelligent domestic network system and registration control device and household appliance registration method thereof |
US9112844B2 (en) | 2012-12-06 | 2015-08-18 | Audible, Inc. | Device credentialing for network access |
CN103906068B (en) * | 2012-12-26 | 2017-07-21 | 华为技术有限公司 | Virtual base station creation method and device |
WO2014117094A2 (en) | 2013-01-25 | 2014-07-31 | Innopath Software, Inc. | Device management service |
US9264905B2 (en) * | 2013-02-21 | 2016-02-16 | Digi International Inc. | Establishing secure connection between mobile computing device and wireless hub using security credentials obtained from remote security credential server |
US20150223059A1 (en) * | 2013-03-01 | 2015-08-06 | Intel Corporation | Techniques for establishing access to a local wireless network |
US9258298B2 (en) | 2013-03-04 | 2016-02-09 | Arris Enterprises, Inc. | Simplified configuration of a network device |
US9535681B2 (en) * | 2013-03-15 | 2017-01-03 | Qualcomm Incorporated | Validating availability of firmware updates for client devices |
CN104079543B (en) * | 2013-03-29 | 2017-06-06 | 珠海格力电器股份有限公司 | Method, device and system for acquiring monitoring authority of intelligent home system |
KR102085114B1 (en) | 2013-07-17 | 2020-03-05 | 삼성전자주식회사 | Method and apparatus for communication using smart module in home network system |
WO2015012749A1 (en) * | 2013-07-26 | 2015-01-29 | Telefonaktiebolaget L M Ericsson (Publ) | Method, alert control device, street light, computer program and computer program product for alerting traffic |
US9451381B2 (en) * | 2013-08-06 | 2016-09-20 | Time Warner Cable Enterprises Llc | Automated provisioning of managed services in a Wi-Fi capable client device |
CN103501501B (en) * | 2013-10-09 | 2017-03-01 | 中磊电子(苏州)有限公司 | Radio area network system, far control network system, wireless network detection and establishing method |
WO2015063146A1 (en) * | 2013-11-01 | 2015-05-07 | Thomson Licensing | Methods for a link recovery of a wireless network and respective devices |
CN103607446B (en) * | 2013-11-15 | 2017-06-27 | 四川长虹电器股份有限公司 | Smart home cloud control system |
US9584631B2 (en) * | 2013-12-03 | 2017-02-28 | Verizon Patent And Licensing Inc. | Providing out-of-band control and backup via a cellular connection |
US9075773B1 (en) | 2014-05-07 | 2015-07-07 | Igneous Systems, Inc. | Prioritized repair of data storage failures |
US9201735B1 (en) | 2014-06-25 | 2015-12-01 | Igneous Systems, Inc. | Distributed storage data repair air via partial data rebuild within an execution path |
US9503965B2 (en) * | 2014-07-14 | 2016-11-22 | Verizon Patent And Licensing Inc. | Set-top box setup via near field communication |
CN105451296A (en) * | 2014-08-25 | 2016-03-30 | 宇龙计算机通信科技(深圳)有限公司 | Network channel selection method and mobile terminal |
US9985799B2 (en) * | 2014-09-05 | 2018-05-29 | Alcatel-Lucent Usa Inc. | Collaborative software-defined networking (SDN) based virtual private network (VPN) |
US9590976B2 (en) | 2014-10-08 | 2017-03-07 | Google Inc. | Network-assisted fabric pairing |
US9410712B2 (en) | 2014-10-08 | 2016-08-09 | Google Inc. | Data management profile for a fabric network |
US10104132B2 (en) * | 2014-10-08 | 2018-10-16 | Google Llc | Network-assisted fabric pairing |
US9098451B1 (en) | 2014-11-21 | 2015-08-04 | Igneous Systems, Inc. | Shingled repair set for writing data |
CN105744594A (en) * | 2014-12-12 | 2016-07-06 | 青岛海尔科技有限公司 | Method and device for accessing network and input device |
CN104540184B (en) * | 2014-12-15 | 2018-09-25 | 小米科技有限责任公司 | Equipment networking method and device |
US10667184B2 (en) | 2015-01-23 | 2020-05-26 | Hewlett-Parckard Development Company, L.P. | Selection of a wireless network for use by a target computing device |
WO2016128491A1 (en) | 2015-02-11 | 2016-08-18 | British Telecommunications Public Limited Company | Validating computer resource usage |
US9276900B1 (en) * | 2015-03-19 | 2016-03-01 | Igneous Systems, Inc. | Network bootstrapping for a distributed storage system |
CN106375932A (en) * | 2015-07-24 | 2017-02-01 | 深圳市道通智能航空技术有限公司 | Unmanned aerial vehicle networking method, unmanned aerial vehicle networking device and unmanned aerial vehicle control system |
US11347876B2 (en) | 2015-07-31 | 2022-05-31 | British Telecommunications Public Limited Company | Access control |
WO2017021155A1 (en) | 2015-07-31 | 2017-02-09 | British Telecommunications Public Limited Company | Controlled resource provisioning in distributed computing environments |
WO2017021153A1 (en) | 2015-07-31 | 2017-02-09 | British Telecommunications Public Limited Company | Expendable access control |
CN106487766B (en) | 2015-08-31 | 2021-10-29 | 微软技术许可有限责任公司 | Routing device with independent service subsystems |
US9572034B1 (en) * | 2015-09-10 | 2017-02-14 | Symantec Corporation | Systems and methods for securing wireless networks |
CN105392138A (en) * | 2015-10-20 | 2016-03-09 | 广东欧珀移动通信有限公司 | Method and system for joining intelligent terminal to network system, and control terminal |
CN105591812A (en) * | 2015-10-29 | 2016-05-18 | 杭州华三通信技术有限公司 | Smart home configuration method and device |
CN105425605A (en) * | 2015-12-22 | 2016-03-23 | 小米科技有限责任公司 | Method, device and system for connecting multiple servers to intelligent household appliance |
US10931477B2 (en) * | 2016-03-18 | 2021-02-23 | Plume Design, Inc. | Layer two network tunnels for Wi-Fi client bridging in a distributed Wi-Fi network |
US11194901B2 (en) | 2016-03-30 | 2021-12-07 | British Telecommunications Public Limited Company | Detecting computer security threats using communication characteristics of communication protocols |
US11159549B2 (en) | 2016-03-30 | 2021-10-26 | British Telecommunications Public Limited Company | Network traffic threat identification |
EP3437007B1 (en) | 2016-03-30 | 2021-04-28 | British Telecommunications public limited company | Cryptocurrencies malware based detection |
US11023248B2 (en) | 2016-03-30 | 2021-06-01 | British Telecommunications Public Limited Company | Assured application services |
US11153091B2 (en) | 2016-03-30 | 2021-10-19 | British Telecommunications Public Limited Company | Untrusted code distribution |
US10334438B2 (en) | 2016-06-21 | 2019-06-25 | ANI Technologies Private Limited | System and method for creating and managing wireless networks |
US11082476B2 (en) * | 2016-11-15 | 2021-08-03 | Verizon Media Inc. | Computerized system and method for automatically providing networked devices non-native functionality |
EP3602380B1 (en) | 2017-03-30 | 2022-02-23 | British Telecommunications public limited company | Hierarchical temporal memory for access control |
EP3382591B1 (en) | 2017-03-30 | 2020-03-25 | British Telecommunications public limited company | Hierarchical temporal memory for expendable access control |
EP3602369B1 (en) | 2017-03-30 | 2022-03-30 | British Telecommunications public limited company | Anomaly detection for computer systems |
US11823017B2 (en) | 2017-05-08 | 2023-11-21 | British Telecommunications Public Limited Company | Interoperation of machine learning algorithms |
EP3622450A1 (en) | 2017-05-08 | 2020-03-18 | British Telecommunications Public Limited Company | Management of interoperating machine leaning algorithms |
WO2018206406A1 (en) | 2017-05-08 | 2018-11-15 | British Telecommunications Public Limited Company | Adaptation of machine learning algorithms |
US10169567B1 (en) * | 2017-11-21 | 2019-01-01 | Lockheed Martin Corporation | Behavioral authentication of universal serial bus (USB) devices |
US11165866B2 (en) * | 2018-01-09 | 2021-11-02 | Stel Life, Inc. | Secure wireless communication platform |
US11038838B2 (en) | 2018-06-15 | 2021-06-15 | At&T Intellectual Property I, L.P. | Prioritizing communication with non network-enabled internet of things devices |
US20200106773A1 (en) * | 2018-09-29 | 2020-04-02 | Fortinet, Inc. | Device integration for a network access control server based on device mappings and testing verification |
US10957132B2 (en) | 2018-11-13 | 2021-03-23 | International Business Machines Corporation | Authenticating access to a physical space |
CN109412911A (en) * | 2018-11-21 | 2019-03-01 | 广东美的制冷设备有限公司 | Equipment distribution method, apparatus, household appliance and server |
CN115380514B (en) | 2020-04-01 | 2024-03-01 | 威睿有限责任公司 | Automatic deployment of network elements for heterogeneous computing elements |
CN111740885B (en) * | 2020-05-25 | 2022-04-12 | 杭州涂鸦信息技术有限公司 | Network distribution method and related equipment and device |
US11803408B2 (en) | 2020-07-29 | 2023-10-31 | Vmware, Inc. | Distributed network plugin agents for container networking |
US11863352B2 (en) | 2020-07-30 | 2024-01-02 | Vmware, Inc. | Hierarchical networking for nested container clusters |
US20230231741A1 (en) * | 2022-01-14 | 2023-07-20 | Vmware, Inc. | Per-namespace ip address management method for container networks |
US20230300133A1 (en) * | 2022-03-21 | 2023-09-21 | Haier Us Appliance Solutions, Inc. | Optical communication based household appliance commissioning |
US11848910B1 (en) | 2022-11-11 | 2023-12-19 | Vmware, Inc. | Assigning stateful pods fixed IP addresses depending on unique pod identity |
US11831511B1 (en) | 2023-01-17 | 2023-11-28 | Vmware, Inc. | Enforcing network policies in heterogeneous systems |
US12101244B1 (en) | 2023-06-12 | 2024-09-24 | VMware LLC | Layer 7 network security for container workloads |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040073797A1 (en) * | 2002-10-08 | 2004-04-15 | Fascenda Anthony C. | Localized network authentication and security using tamper-resistant keys |
US7178034B2 (en) * | 2002-12-31 | 2007-02-13 | Intel Corporation | Method and apparatus for strong authentication and proximity-based access retention |
US20070109103A1 (en) * | 2005-09-07 | 2007-05-17 | California Institute Of Technology | Commercial product activation and monitoring using radio frequency identification (RFID) technology |
US20070152058A1 (en) * | 2006-01-05 | 2007-07-05 | Yeakley Daniel D | Data collection system having reconfigurable data collection terminal |
US7328045B2 (en) * | 2003-12-24 | 2008-02-05 | Robert Bosch Gmbh | Secure and intuitive method for wireless network set-up and associated device and system |
US7360087B2 (en) * | 2003-05-02 | 2008-04-15 | Giritech A/S | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
US20080123557A1 (en) * | 2005-06-09 | 2008-05-29 | Whirlpool Corporation | Appliance network for a networked appliance with a network binder accessory |
US20090016568A1 (en) * | 2007-07-13 | 2009-01-15 | International Business Machines Corporation | Apparatus for observing and capturing latent images on objects, and method for using same |
US20090100153A1 (en) * | 2005-06-09 | 2009-04-16 | Whirlpool Corporation | Method of self servicing an appliance |
US7634802B2 (en) * | 2005-01-26 | 2009-12-15 | Microsoft Corporation | Secure method and system for creating a plug and play network |
US20100063887A1 (en) * | 2008-09-10 | 2010-03-11 | MEK Enterprises, LLC | Method of reusing shipping and packing materials |
US20100101661A1 (en) * | 2008-10-28 | 2010-04-29 | Eco Rebox Llc | Reusable shipping and packing materials and method of use |
US20100153220A1 (en) * | 2008-09-10 | 2010-06-17 | Eco Rebox Llc | Method of reusing shipping and packing materials |
US20100274859A1 (en) * | 2007-05-24 | 2010-10-28 | Asim Bucuk | Method And System For The Creation, Management And Authentication Of Links Between Entities |
US7860254B2 (en) * | 2003-03-13 | 2010-12-28 | Hamdy Soliman | Computer system security via dynamic encryption |
US7890634B2 (en) * | 2005-03-18 | 2011-02-15 | Microsoft Corporation | Scalable session management |
US20110072700A1 (en) * | 2009-09-30 | 2011-03-31 | Dominick Theresa | Color Coded Marking System for all formats of USB Flash Drives and SD Memory Cards |
US20110231659A1 (en) * | 2010-03-19 | 2011-09-22 | Alok Kumar Sinha | Out-of-Band Session Key Information Exchange |
US8290146B2 (en) * | 2007-01-19 | 2012-10-16 | Mitsubishi Electric Corporation | Ciphertext generating apparatus, cryptographic communication system, and group parameter generating apparatus |
US8392702B2 (en) * | 2007-07-27 | 2013-03-05 | General Instrument Corporation | Token-based management system for PKI personalization process |
Family Cites Families (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1717679B1 (en) * | 1998-01-26 | 2016-09-21 | Apple Inc. | Method for integrating manual input |
US6604140B1 (en) * | 1999-03-31 | 2003-08-05 | International Business Machines Corporation | Service framework for computing devices |
CA2305249A1 (en) * | 2000-04-14 | 2001-10-14 | Branko Sarcanin | Virtual safe |
WO2001082246A2 (en) * | 2000-04-24 | 2001-11-01 | Visa International Service Association | Online payer authentication service |
US8131870B1 (en) * | 2001-05-24 | 2012-03-06 | Cisco Technology, Inc. | Method and apparatus for registering a mobile object on a foreign network |
US7499983B2 (en) * | 2002-05-06 | 2009-03-03 | Micron Technology, Inc. | Web dispatch service |
US8616984B2 (en) * | 2002-06-12 | 2013-12-31 | Igt | Intelligent player tracking card and wagering token tracking techniques |
US8037202B2 (en) * | 2002-10-31 | 2011-10-11 | Oracle America, Inc. | Presence detection using mobile agents in peer-to-peer networks |
KR100456636B1 (en) * | 2002-11-25 | 2004-11-10 | 한국전자통신연구원 | Architecture of look-up service in jini-based home network supporting ieee 1394 and tcp/ip and method thereof |
US7633909B1 (en) * | 2002-12-20 | 2009-12-15 | Sprint Spectrum L.P. | Method and system for providing multiple connections from a common wireless access point |
US7756928B1 (en) * | 2002-12-30 | 2010-07-13 | Aol Inc. | Interoperability using a local proxy server |
US7533141B2 (en) * | 2003-01-24 | 2009-05-12 | Sun Microsystems, Inc. | System and method for unique naming of resources in networked environments |
US20050276229A1 (en) * | 2003-03-31 | 2005-12-15 | Mohammad Torabi | Service discovery method in a network |
US7930214B2 (en) * | 2003-05-05 | 2011-04-19 | Intel Corporation | Management and arbitration of mobile service discovery |
WO2005107417A2 (en) * | 2004-05-04 | 2005-11-17 | Price Robert M | System and method for communicating with electronic devices |
US7925729B2 (en) * | 2004-12-07 | 2011-04-12 | Cisco Technology, Inc. | Network management |
US7535880B1 (en) * | 2005-01-13 | 2009-05-19 | 2Wire, Inc. | Method and apparatus for controlling wireless access to a network |
US7647048B2 (en) * | 2005-03-31 | 2010-01-12 | Alcatel-Lucent Usa Inc. | Selecting a hidden network to connect a user to a wireless local area network |
US8116287B2 (en) * | 2005-07-29 | 2012-02-14 | Microsoft Corporation | Transmitting a communication from a wireless access point indicating hidden networks |
US7583684B2 (en) * | 2005-08-24 | 2009-09-01 | The Boeing Corporation | Automatic commandable SSID switching |
US20070159997A1 (en) * | 2006-01-10 | 2007-07-12 | Hsiu-Ping Tsai | Wireless Security Setup between Station and AP Supporting MSSID |
EP2489199A2 (en) * | 2006-02-22 | 2012-08-22 | Elad Barkan | Wireless internet system and method |
US20070205275A1 (en) * | 2006-03-06 | 2007-09-06 | First Data Corporation | Portable point of sale systems and methods |
US8165101B2 (en) * | 2006-09-29 | 2012-04-24 | Microsoft Corporation | Automatic detection of hidden networks |
US7924793B2 (en) * | 2006-11-20 | 2011-04-12 | At&T Intellectual Property I, L.P. | Methods and apparatus to manage bandwidth in a wireless network |
CN101262670B (en) * | 2007-03-09 | 2012-01-25 | 鸿富锦精密工业(深圳)有限公司 | Mobile device, communication system and connection establishment method |
US8898128B2 (en) * | 2007-05-07 | 2014-11-25 | Nokia Corporation | Content storing device query |
US8239479B2 (en) * | 2007-06-22 | 2012-08-07 | Microsoft Corporation | Server-assisted and peer-to-peer synchronization |
WO2009084243A1 (en) * | 2007-12-28 | 2009-07-09 | Panasonic Corporation | Communication device, communication system, image presentation method, and program |
JP4506856B2 (en) * | 2008-03-10 | 2010-07-21 | ソニー株式会社 | Communication apparatus and communication method |
US7996394B2 (en) * | 2008-07-17 | 2011-08-09 | International Business Machines Corporation | System and method for performing advanced search in service registry system |
US8977673B2 (en) * | 2008-08-29 | 2015-03-10 | Red Hat, Inc. | Information on availability of services provided by publish-subscribe service |
US8090616B2 (en) * | 2008-09-08 | 2012-01-03 | Proctor Jr James Arthur | Visual identification information used as confirmation in a wireless communication |
US8627075B2 (en) * | 2008-12-26 | 2014-01-07 | Panasonic Corporation | Communication device that receives external device information from an external device using near field communication |
WO2011006142A1 (en) * | 2009-07-09 | 2011-01-13 | Cubic Corporation | Id application for nfc-enabled mobile device |
WO2011084707A2 (en) * | 2009-12-17 | 2011-07-14 | Pokos Communication Corp. | Method and system for transmitting and receiving messages |
US9220054B2 (en) * | 2009-12-22 | 2015-12-22 | Intel Corporation | Enhanced service discovery mechanism in wireless communication system |
KR20120099782A (en) * | 2009-12-22 | 2012-09-11 | 야스다, 히로시 | User authentication method, user authentication system, and portable communications terminal |
US8380177B2 (en) * | 2010-04-09 | 2013-02-19 | Paydiant, Inc. | Mobile phone payment processing methods and systems |
-
2011
- 2011-04-21 US US13/092,082 patent/US20110265151A1/en not_active Abandoned
- 2011-04-21 US US13/092,049 patent/US8626921B2/en not_active Expired - Fee Related
- 2011-04-21 US US13/092,079 patent/US8627420B2/en not_active Expired - Fee Related
- 2011-04-21 US US13/092,054 patent/US8650311B2/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040073797A1 (en) * | 2002-10-08 | 2004-04-15 | Fascenda Anthony C. | Localized network authentication and security using tamper-resistant keys |
US7178034B2 (en) * | 2002-12-31 | 2007-02-13 | Intel Corporation | Method and apparatus for strong authentication and proximity-based access retention |
US7860254B2 (en) * | 2003-03-13 | 2010-12-28 | Hamdy Soliman | Computer system security via dynamic encryption |
US7360087B2 (en) * | 2003-05-02 | 2008-04-15 | Giritech A/S | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
US7328045B2 (en) * | 2003-12-24 | 2008-02-05 | Robert Bosch Gmbh | Secure and intuitive method for wireless network set-up and associated device and system |
US7634802B2 (en) * | 2005-01-26 | 2009-12-15 | Microsoft Corporation | Secure method and system for creating a plug and play network |
US7890634B2 (en) * | 2005-03-18 | 2011-02-15 | Microsoft Corporation | Scalable session management |
US20090100153A1 (en) * | 2005-06-09 | 2009-04-16 | Whirlpool Corporation | Method of self servicing an appliance |
US20080123557A1 (en) * | 2005-06-09 | 2008-05-29 | Whirlpool Corporation | Appliance network for a networked appliance with a network binder accessory |
US20070109103A1 (en) * | 2005-09-07 | 2007-05-17 | California Institute Of Technology | Commercial product activation and monitoring using radio frequency identification (RFID) technology |
US20070152058A1 (en) * | 2006-01-05 | 2007-07-05 | Yeakley Daniel D | Data collection system having reconfigurable data collection terminal |
US8290146B2 (en) * | 2007-01-19 | 2012-10-16 | Mitsubishi Electric Corporation | Ciphertext generating apparatus, cryptographic communication system, and group parameter generating apparatus |
US20100274859A1 (en) * | 2007-05-24 | 2010-10-28 | Asim Bucuk | Method And System For The Creation, Management And Authentication Of Links Between Entities |
US20090016568A1 (en) * | 2007-07-13 | 2009-01-15 | International Business Machines Corporation | Apparatus for observing and capturing latent images on objects, and method for using same |
US8392702B2 (en) * | 2007-07-27 | 2013-03-05 | General Instrument Corporation | Token-based management system for PKI personalization process |
US20100063887A1 (en) * | 2008-09-10 | 2010-03-11 | MEK Enterprises, LLC | Method of reusing shipping and packing materials |
US20100153220A1 (en) * | 2008-09-10 | 2010-06-17 | Eco Rebox Llc | Method of reusing shipping and packing materials |
US20100101661A1 (en) * | 2008-10-28 | 2010-04-29 | Eco Rebox Llc | Reusable shipping and packing materials and method of use |
US20110072700A1 (en) * | 2009-09-30 | 2011-03-31 | Dominick Theresa | Color Coded Marking System for all formats of USB Flash Drives and SD Memory Cards |
US20110231659A1 (en) * | 2010-03-19 | 2011-09-22 | Alok Kumar Sinha | Out-of-Band Session Key Information Exchange |
Non-Patent Citations (1)
Title |
---|
"USB-IF Logo Trademark License Agreement and Usage Guidelines" published by USB.org retrieved from http://web.archive.org using URL www.usb.org/developers/logo_license archived on Feb 8, 2009 * |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130276076A1 (en) * | 2010-09-15 | 2013-10-17 | Vivek Gupta | Mobile device and method for secure on-line sign-up and provisioning for wi-fi hotspots using soap-xml techniques |
US9258706B2 (en) * | 2010-09-15 | 2016-02-09 | Intel Corporation | Mobile device and method for secure on-line sign-up and provisioning for wi-fi hotspots using SOAP-XML techniques |
US9160693B2 (en) | 2010-09-27 | 2015-10-13 | Blackberry Limited | Method, apparatus and system for accessing applications and content across a plurality of computers |
US20120162538A1 (en) * | 2010-12-28 | 2012-06-28 | Comcast Interactive Media, Llc | Communication, Monitoring and Control Architecture and Method |
US11799683B2 (en) | 2010-12-28 | 2023-10-24 | Comcast Interactive Media, Llc | Communication, monitoring and control architecture and method |
US12101201B2 (en) | 2010-12-28 | 2024-09-24 | Comcast Interactive Media, Llc | Communication, monitoring and control architecture and method |
US10797904B2 (en) * | 2010-12-28 | 2020-10-06 | Comcast Interactive Media, Llc | Communication, monitoring and control architecture and method |
US9628990B2 (en) | 2011-09-09 | 2017-04-18 | Intel Corporation | Mobile device and method for secure on-line sign-up and provisioning for Wi-Fi hotspots using SOAP-XML techniques |
US9313099B2 (en) | 2012-01-13 | 2016-04-12 | Logic PD, Inc. | Systems, devices and methods for provisioning, pairing and activating a newly manufactured device for automatic joining of customer's network |
US8857705B2 (en) | 2012-01-13 | 2014-10-14 | Logic PD, Inc. | Methods for embedding device-specific data to enable remote identification and provisioning of specific devices |
US8857704B2 (en) | 2012-01-13 | 2014-10-14 | Logic PD, Inc. | Methods for embedding device-specific data to enable remote access to real time device data |
US9015809B2 (en) * | 2012-02-20 | 2015-04-21 | Blackberry Limited | Establishing connectivity between an enterprise security perimeter of a device and an enterprise |
US20130219471A1 (en) * | 2012-02-20 | 2013-08-22 | Michael Stephen Brown | Establishing connectivity between an enterprise security perimeter of a device and an enterprise |
US20130241697A1 (en) * | 2012-03-14 | 2013-09-19 | Digi International Inc. | Spatially aware smart device provisioning |
US9351094B2 (en) * | 2012-03-14 | 2016-05-24 | Digi International Inc. | Spatially aware smart device provisioning |
US20160269851A1 (en) * | 2012-03-14 | 2016-09-15 | Digi International Inc. | Spatially aware smart device provisioning |
US9894459B2 (en) * | 2012-03-14 | 2018-02-13 | Digi International Inc. | Spatially aware smart device provisioning |
US9450951B2 (en) | 2012-08-31 | 2016-09-20 | Cisco Technology, Inc. | Secure over-the-air provisioning solution for handheld and desktop devices and services |
US9258295B1 (en) | 2012-08-31 | 2016-02-09 | Cisco Technology, Inc. | Secure over-the-air provisioning for handheld and desktop devices and services |
US20150288670A1 (en) * | 2012-09-28 | 2015-10-08 | Hewlett-Packard Development Company, L.P. | Qr code utilization in self-registration in a network |
US9253081B2 (en) | 2012-11-15 | 2016-02-02 | Cisco Technology, Inc. | Trigger message routing according to a service class |
WO2014130920A1 (en) * | 2013-02-25 | 2014-08-28 | Actividentity, Inc. | Secure access to secure access module-enable machine using personal security device |
US9722999B2 (en) | 2013-02-25 | 2017-08-01 | Assa Abloy Ab | Secure access to secure access module-enabled machine using personal security device |
US10459418B2 (en) * | 2013-09-04 | 2019-10-29 | Fisher-Rosemount Systems, Inc. | Technology for assessing and presenting field device commissioning information associated with a process plant |
US20160117124A1 (en) * | 2013-12-31 | 2016-04-28 | Yong-Gu KWON | Storage System Having Security Storage Device and Management System Therefor |
US9619161B2 (en) * | 2013-12-31 | 2017-04-11 | Sung Gon Cho | Storage system having security storage device and management system therefor |
DE102015106742A1 (en) | 2015-04-30 | 2016-11-03 | Deutsche Telekom Ag | Control of home automation functions |
WO2016173977A1 (en) | 2015-04-30 | 2016-11-03 | Deutsche Telekom Ag | Actuating home automation functions |
US10754329B2 (en) | 2015-10-12 | 2020-08-25 | Fisher-Rosemount Systems, Inc. | Automatic distribution of device parameters for commissioning portions of a disconnected process control loop |
US10528037B2 (en) * | 2015-10-12 | 2020-01-07 | Fisher-Rosemount Systems, Inc. | Determining device system tags for commissioning portions of a disconnected process control loop |
US20180210429A1 (en) * | 2015-10-12 | 2018-07-26 | Fisher-Rosemount Systems, Inc. | Determining Device System Tags for Commissioning Portions of a Disconnected Process Control Loop |
US11714394B2 (en) | 2018-09-28 | 2023-08-01 | Fisher-Rosemount Systems, Inc | Bulk commissioning of field devices within a process plant |
US20220264317A1 (en) * | 2021-02-18 | 2022-08-18 | The Nielsen Company (Us), Llc | Methods and apparatus to recognize metered devices connected to proprietary wifi extenders |
WO2022177639A1 (en) * | 2021-02-18 | 2022-08-25 | The Nielsen Company (Us), Llc | Methods and apparatus to recognize metered devices connected to proprietary wifi extenders |
US11553355B2 (en) * | 2021-02-18 | 2023-01-10 | The Nielsen Company (Us), Llc | Methods and apparatus to recognize metered devices connected to proprietary WiFi extenders |
US12089059B2 (en) * | 2021-02-18 | 2024-09-10 | The Nielsen Company (Us), Llc | Methods and apparatus to recognize metered devices connected to proprietary WiFi extenders |
CN114003812A (en) * | 2021-10-29 | 2022-02-01 | 深圳壹账通智能科技有限公司 | Address matching method, system, device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
US8626921B2 (en) | 2014-01-07 |
US8627420B2 (en) | 2014-01-07 |
US20110282936A1 (en) | 2011-11-17 |
US20110264730A1 (en) | 2011-10-27 |
US8650311B2 (en) | 2014-02-11 |
US20110265154A1 (en) | 2011-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8627420B2 (en) | Apparatus for associating a client device or service with a wireless network | |
US8898750B2 (en) | Connecting remote and local networks using an identification device associated with the remote network | |
US8631471B2 (en) | Automated seamless reconnection of client devices to a wireless network | |
US7797535B2 (en) | Authentication method and system, and information processing method and apparatus | |
US8724515B2 (en) | Configuring a secure network | |
US7607015B2 (en) | Shared network access using different access keys | |
US8917651B2 (en) | Associating wi-fi stations with an access point in a multi-access point infrastructure network | |
US8474020B2 (en) | User authentication method, wireless communication apparatus, base station, and account management apparatus | |
US8665753B2 (en) | Simultaneous setup of a wireless network adapter and a network host device | |
US8868694B2 (en) | Configuring multiple network devices in a setup flow | |
US20080250485A1 (en) | Guest Dongle and Method of Connecting Guest Apparatuses to Wireless Home Networks | |
US20060185001A1 (en) | Methods and apparatus to configure a network device via an authentication protocol | |
JP2009218845A (en) | Communication apparatus, and communication method | |
US11528273B2 (en) | Expended trust for onboarding | |
KR20100044199A (en) | Network and method for initializing a trust center link key | |
KR101757692B1 (en) | Remote control system of home network device using token server authentication and method thereof | |
JP2007129320A (en) | Communication system, communication equipment and communication method, and computer program | |
US20230171097A1 (en) | Securely changing cryptographic strength during reconfiguration | |
WO2018172776A1 (en) | Secure transfer of data between internet of things devices | |
CN113455025A (en) | Method for SSP terminal to interoperate between bundle downloading process and ESIM configuration file downloading process | |
JP5545433B2 (en) | Portable electronic device and operation control method for portable electronic device | |
GB2560895A (en) | Secure transfer of data between internet of things devices | |
CN110024443A (en) | Method for being matched with gateway | |
WO2006129288A1 (en) | Method and devices for individual removal of a device from a wireless network | |
WO2023152059A1 (en) | Early indication for changing cryptographic strength during configuration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CISCO TECHNOLOGY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FURLAN, JOHN;DATTAGUPTA, SIDDHARTHA;BAINER, CHRIS;AND OTHERS;SIGNING DATES FROM 20110421 TO 20110617;REEL/FRAME:026657/0314 |
|
AS | Assignment |
Owner name: CISCO CONSUMER PRODUCTS LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CISCO TECHNOLOGY, INC.;REEL/FRAME:030008/0057 Effective date: 20130314 |
|
AS | Assignment |
Owner name: LINKSYS LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:CISCO CONSUMER PRODUCTS LLC;REEL/FRAME:030091/0889 Effective date: 20130320 |
|
AS | Assignment |
Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS AGENT, Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:CISCO CONSUMER PRODUCTS LLC;REEL/FRAME:030106/0791 Effective date: 20130315 |
|
AS | Assignment |
Owner name: BELKIN INTERNATIONAL, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LINKSYS, LLC;REEL/FRAME:032246/0925 Effective date: 20140115 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |