US20160112400A1 - Simplified configuration of a network device - Google Patents
Simplified configuration of a network device Download PDFInfo
- Publication number
- US20160112400A1 US20160112400A1 US14/979,133 US201514979133A US2016112400A1 US 20160112400 A1 US20160112400 A1 US 20160112400A1 US 201514979133 A US201514979133 A US 201514979133A US 2016112400 A1 US2016112400 A1 US 2016112400A1
- Authority
- US
- United States
- Prior art keywords
- client device
- network
- customer premise
- premise equipment
- equipment device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0806—Configuration setting for initial configuration or provisioning, e.g. plug-and-play
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/084—Configuration by using pre-existing information, e.g. using templates or copying from other elements
- H04L41/0846—Configuration by using pre-existing information, e.g. using templates or copying from other elements based on copy from other elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0886—Fully automatic configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Definitions
- the security and efficiency involved in the pairing of these devices in the home to a whole-home network becomes increasingly more important.
- the user When a user wants to connect a device to a whole-home network, the user generally must identify a network or access point to connect to, and must further input a password associated with the identified network or access point.
- the password requirement can preclude users or devices that are not subscribed to a service from receiving said service, and the preclusion of unsubscribed users or devices can improve a user's quality of experience associated with a service and can provide security against an aftermarket or grey market in network devices owned by service providers.
- Wi-Fi protected setup is a network security standard that attempts to provide an efficient and user-friendly method for connecting a device to a whole-home network.
- the WPS standard temporarily opens an access point so that any device, including devices that are not provisioned to use the access point, can connect to the access point.
- This window of vulnerability may present security challenges. Therefore, it is desirable to improve upon systems and methods for pairing devices to a network.
- FIG. 5 is a flowchart illustrating an example process operable to facilitate the pairing of a client device with a network service while minimizing user-input.
- this disclosure describes a configuration for devices associated with a whole-home network that enables an optimization of subscriber self-installation of client devices.
- flow-through provisioning of a device can be enabled by retrieving a network password through an unencrypted, wireless network connection.
- FIG. 1 is a block diagram illustrating an example network environment 100 operable to facilitate the pairing of a client device with a network service while minimizing user-input.
- a customer premise equipment (CPE) device 105 can route communications to and from one or more client devices 110 .
- the one or more client devices 110 can be provisioned to receive video service(s) and/or data service(s) through one or more CPE devices 105 .
- a CPE device 105 can include a gateway, a cable modem, a wireless router including an embedded cable modem, a digital subscriber line (DSL) modem, a mobile hot-spot router, a multimedia over coaxial alliance (MoCA) node, and any other device that is operable to route communications to and from a client device 110 .
- a gateway a cable modem
- a wireless router including an embedded cable modem
- DSL digital subscriber line
- MoCA multimedia over coaxial alliance
- client devices 110 can include a wide variety of devices such as televisions, mobile devices, tablets, IP set-top boxes, computers, and any other device that is capable of utilizing a video or data service.
- the client devices 110 can be provided to a subscriber by a service provider or can be a device that is provided by a source other than the service provider.
- the client devices 110 can communicate with a CPE device 105 via a whole-home network 115 (e.g., MoCA network, wireless local area network (WLAN), etc.).
- a whole-home network 115 e.g., MoCA network, wireless local area network (WLAN), etc.
- a CPE device 105 can route communications between client device(s) 110 and a wide area network (WAN) 120 via an access network 125 .
- the access network 125 can include various networks such as coaxial cable, optical fiber, twisted pairs, wireless networks including 4G and LTE, and others.
- a WAN 120 can operate using internet protocol (IP), directing data packets to and receiving data packets from a CPE device 105 .
- IP internet protocol
- one or more video and/or data sources may provide streaming data through the WAN 120 to a CPE device 105 .
- a CPE device 105 or a client device 110 can retrieve information from a configuration server 130 via a WAN 120 .
- information retrieved from a configuration server 130 can include service set identifiers (SSIDs), passwords, information identifying client devices 110 having permission to access a specific CPE device 105 , information associating a client device 110 with a specific CPE device 105 , instructions for choosing a CPE device 105 to connect to, and other information.
- configuration information can be controlled and operated by service or content providers through billing or customer management systems. For example, billing or customer management systems can update configuration information within a configuration server 130 to inform a CPE device 105 as to specific services that a client is subscribed or authorized to receive.
- a CPE device 105 can provide one or more wireless networks with one or more SSIDs for client devices 110 to access.
- Each of the one or more SSIDs can have various characteristics, requirements, and limitations depending on the intended function of the SSID.
- a CPE device 105 can provide one or more of the following SSID types: general use SSID, configuration SSID, video SSID, hot-spot SSID, as well as others.
- Each of the one or more SSIDs can be either encrypted or unencrypted depending on the intended function of the SSID.
- one or more SSIDs can be rate-limited.
- an SSID can be rate-limited such that the SSID has only enough capacity to support traffic from the client devices 110 that have permission to use the SSID. Such a rate limitation can provide an added security measure for unencrypted SSIDs.
- a CPE device 105 can have a single configuration SSID that is unencrypted and rate-limited. Such a configuration SSID can support flow-through provisioning of a client device 110 by allowing the client device 110 to access a configuration server 130 . In embodiments, traffic received through a configuration SSID can be scrutinized within a CPE device 105 to limit the client devices 110 that are allowed to use the CPE device 105 . For example, a CPE device 105 can require a specific option or sub-option to be included within a request received from a client device 110 before allowing the client device 110 to use or connect to the CPE device 105 .
- a configuration SSID can be rate-limited to accommodate only the amount of traffic needed by a client device 110 to retrieve configuration information.
- a CPE device 105 can disable an associated configuration SSID when all of the client devices 110 that are provisioned to use the CPE device 105 have retrieved configuration information.
- FIG. 2 is a block diagram illustrating an example CPE device 105 operable to facilitate the pairing of a client device with a network service while minimizing user-input.
- the CPE device 105 can include a home interface 205 , an access interface 210 , a configuration module 215 , and a configuration data store 220 .
- the CPE device 105 can route communications to and from a client device 110 through a home interface 205 , via a whole-home network 115 .
- the CPE device 105 can receive a request from a client device 110 to join a SSID associated with the CPE device 105 .
- the CPE device 105 can receive a request from a client device 110 to join a MoCA network.
- the home interface 205 can include one or more SSIDs.
- the CPE device 105 can retrieve configuration information from a configuration server 130 of FIG. 1 through an access interface 210 , via an access network 125 .
- Configuration information can include, for example, SSIDs, passwords associated with SSIDs, MoCA network configuration parameters, MoCA network security password parameters, information identifying client devices 110 having permission to access the CPE device 105 , information associating a client device 110 with the CPE device 105 , and other information.
- configuration information received through the access interface 210 can be stored within a configuration data store 220 .
- a configuration module 215 can allow or deny a request from a client device 110 to join a SSID associated with the CPE device 105 .
- the client device 110 can send a password associated with the encrypted SSID to the CPE device 105 .
- the configuration module 215 can compare the password received from the client device 110 to the password associated with the SSID that the client device 110 is attempting to join.
- the configuration module 215 can retrieve a password associated with a SSID from the configuration data store 220 .
- a configuration module 215 can make a determination whether a client device 110 is provisioned to use the CPE device 105 . For example, when a client device 110 attempts to join a SSID associated with the CPE device 105 , the configuration module 215 can identify the client device 110 and can search for client device 110 within a list of devices that are provisioned to use the specific SSID. The list of devices that are provisioned to use the SSID can be stored, for example, within the configuration data store 220 . Where the requesting client device 110 is not found within the list of devices provisioned to use the SSID, the configuration module 215 can deny or ignore the request to join the SSID. In embodiments, where the configuration data store 220 does not contain needed configuration information associated with a client device 110 , the configuration module 215 can access the configuration server 130 of FIG. 1 to attempt to discover the client device's authorization or configuration.
- FIG. 3 is a flowchart illustrating an example process 300 operable to facilitate the connection of a client device to a secured whole-home network.
- the process 300 can be completed by a CPE device 105 of FIG. 1 .
- the process 300 can begin at 305 , when a CPE device 105 of FIG. 1 is connected to an access network 125 of FIG. 1 .
- configuration information associated with the CPE device 105 can be retrieved.
- a configuration server e.g., configuration server 130 of FIG. 1
- the CPE device 105 can retrieve configuration information from the identified configuration server. For example, when the CPE device 105 is connected to an access network 125 , the CPE device 105 can receive the location of a configuration server upon joining a WAN 120 of FIG. 1 . The CPE device 105 can then retrieve a configuration file (e.g., file containing configuration information for the CPE device 105 ) from the identified configuration server.
- a configuration file e.g., file containing configuration information for the CPE device 105
- a CPE device 105 can configure one or more whole-home networks.
- the CPE device 105 can configure one or more whole-home networks 115 using the retrieved configuration information.
- the CPE device 105 can configure one or more SSIDs on a wireless LAN home network according to the retrieved configuration information.
- SSIDs and passwords associated with the SSIDs can be configured using a random algorithm or they can be tied to a specific algorithm that uses an account number associated with a subscriber, a serial number associated with a device, or some other readily available seed.
- SSIDs or other home networks may be configured as unsecured networks.
- the CPE device 105 can identify a client device attempting to join a configured whole-home network.
- the CPE device 105 can identify the client device (e.g., client device 110 of FIG. 1 ) and can identify a service the client device is requesting and/or a SSID on a wireless LAN the client device is attempting to join.
- a determination can be made whether the client device is provisioned to use the configured whole-home network.
- the determination whether the client device is provisioned to use the configured whole-home network can be made, for example, by a configuration module 215 of FIG. 2 .
- the CPE device 105 associated with an access point that is associated with the SSID can verify, using the configuration information, whether the client device 105 is attached to a specific subscriber's account and to what services the client device 105 is entitled.
- the client device 110 when a client device 110 makes a request to join an encrypted SSID associated with the configured whole-home network, the client device 110 can use a password associated with the encrypted SSID, and where the client's password matches the password configured for the specific SSID, the determination can be made that the client device 110 is provisioned to use the whole-home network.
- the configuration module 215 can search for the client device 110 within a list of devices that are provisioned to use the configured whole-home network. Where the client device 110 is found within the list of devices that are provisioned to use the whole-home network, the determination can be made that the client device 110 is provisioned to use the whole-home network.
- the CPE device 105 can reject the client device's attempt to join the network at 330 even if it has used the correct password for that SSID.
- the process 300 can proceed to 335 .
- a connection between the client device 110 and the CPE device 105 can be established according to the configuration information.
- the client device 110 can be allowed to access one or more services that the client device 110 has permission to use over the provisioned SSID.
- the CPE device 105 can be configured to provide a level of quality of service (QoS) to a client device 110 based upon a status of the device.
- QoS quality of service
- the CPE device 105 can be configured to provide a higher level of QoS to devices that are provided to a subscriber by a service-provider and a lower level of QoS to devices provided to a subscriber by a source other than the service provider.
- FIG. 4 is a flowchart illustrating an example process 400 operable to facilitate the connection of a client device capable of multiple home networking technologies to a secured whole-home network while minimizing user involvement.
- the process 400 can begin at 405 when a client device attempts to join a secured whole-home network.
- a client device e.g., client device 110 of FIG. 1
- can seek a connection to a CPE device e.g., CPE device 105 of FIG. 1
- a secured whole-home network e.g., MoCA network, WLAN, personal area network (PAN), etc.
- a client device may be required to receive a network password before joining a secured whole-home network.
- one or more networks that are available to the client device can be identified.
- the client device can identify secured and unsecured networks that the client device is within range of.
- the unsecured home network can be a configuration network.
- the client device can join a configuration network that is secured.
- a client device may be capable of connecting to both a MoCA network and a WLAN network, either of which may have secured or unsecured choices.
- a user can be presented with the option to connect to either or both the MoCA network and the WLAN network.
- a WLAN SSID can be encrypted or unencrypted.
- the client device can join the WLAN SSID without first receiving a password associated with the SSID. If the determination is made that an unsecured network is not available for the client device to join, a network password associated with the secured whole-home network (e.g., MoCA whole-home network) can be received from a user input at 420 .
- a network password associated with the secured whole-home network e.g., MoCA whole-home network
- the process 400 can proceed to 425 .
- the client device can retrieve configuration information from a configuration server (e.g., configuration server 130 of FIG. 1 ) via a connection to the unsecured network.
- the configuration information can include a network password associated with a MoCA whole-home network that the client device is attempting to join.
- a subscriber can be precluded from changing a network password associated with a CPE device.
- a factory reset mode can be implemented within the CPE device such that the network password can be reset to the CPE device's original password.
- the client device After receiving the network password, the client device can join the secured whole-home network at 430 .
- FIG. 5 is a flowchart illustrating an example process 500 operable to facilitate the pairing of a client device with a network service while minimizing user involvement.
- the process 500 can begin at 505 when a client device initializes.
- a client device e.g., client device 110 of FIG. 1
- the client device can search for the availability of one or more networks.
- the client device can search for encrypted and unencrypted networks of which the client device is within range.
- the client device can search for and identify one or more configuration SSIDs associated with one or more WLANs of which the client device is within range.
- the available configuration network can be an unencrypted configuration network or an encrypted configuration network for which the client device has registration information (e.g., a password associated with the encrypted configuration network, etc.).
- the client device can retrieve configuration information from a configuration server (e.g., configuration server 130 of FIG. 1 ) through the unencrypted configuration network connection at 520 .
- the client device can identify an appropriate configuration server from information stored on the client device, or a CPE device can identify an appropriate configuration server for the client device.
- the unencrypted network connection can be a SSID on a WLAN, a PAN connection (e.g., Bluetooth connection, ZigBee connection, etc.) without security, or any other open network connection.
- the client device can select the SSID having the strongest signal through which to retrieve configuration information.
- the client device can select the configuration choice having the lowest amount of traffic through which to retrieve configuration information.
- the configuration information can include information identifying services that the client device is provisioned to receive, one or more SSIDs or other network identifiers and one or more CPE devices through which the client device may receive services, password(s) associated with specific SSIDS and/or home networks, as well as other information.
- a determination can be made whether the client device is connected to an acceptable CPE device and home network.
- the CPE device to which a client device is connected can be a gateway or an access point associated with a gateway, or any other device that is operable to route communications to and from a client device (e.g., a cable modem, a wireless router including an embedded cable modem, a digital subscriber line (DSL) modem, a mobile hot-spot router, a MoCA node, etc.).
- the home networking choices can include Wi-Fi, ZigBee, Bluetooth, MoCA among many others.
- the client device can be connected to a CPE device through an unencrypted configuration SSID through which the client device retrieves the configuration information.
- the determination whether the client device is connected to an acceptable CPE device can be based upon the configuration information received by the client device.
- an acceptable CPE device can be a CPE device that the client device is provisioned to use.
- an acceptable CPE device can be a CPE device that has been identified as having sufficient spare capacity to support another client device.
- the process 500 can proceed to 530 .
- the client device can connect to an acceptable CPE device.
- the client device can search for one or more of the WLAN SSIDs or other home networks that are identified in the received configuration information.
- the client device can join the CPE device having the strongest signal.
- the process 500 can proceed to 535 .
- the device can connect to a service home network (e.g., video SSID, data SSID, hot-spot SSID, etc.) associated with the CPE device that the client device is connected to.
- a service home network e.g., video SSID, data SSID, hot-spot SSID, etc.
- the client device can join an SSID that the client device is provisioned to join according to the configuration information.
- the CPE device can examine a request from a client device to determine whether the client device is provisioned to receive the service that is requested.
- the client device can join the SSID by outputting a password to the associated CPE device.
- the password can be received by a client device within the configuration information.
- a list of available home networking connections (e.g., SSIDs that were identified by the client device at 510 ) can be displayed.
- the displayed home networking connections can include encrypted and unencrypted SSIDs associated with CPE devices of which the client device is within range. For example, SSIDs having an acceptable signal level can be displayed within the list of available SSIDs.
- the list of available SSIDs can be displayed to a user of the client device.
- a selection of an available home network connection from the displayed list of available home network connections can be received by the client device.
- the client device can prompt a user to select one of the home network connections from the displayed list of home network connections. For example, a user can be instructed to check a label or sticker on a CPE device to determine a SSID and an associated password for a desired service. The user can then select the appropriate SSID from a displayed list of SSIDs.
- a password associated with the selected home network connection can be received by the client device.
- the client device can prompt a user to input a password associated with the selected SSID, and the user can input the password associated with the selected SSID.
- the client device can prompt a user to input a password associated with a MoCA network, and the user can input the password associated with a selected MoCA network.
- the client device can join the selected home network at 555 .
- FIG. 6 is a block diagram of a hardware configuration 600 operable to facilitate the pairing of a client device with a network service while minimizing user-input.
- the hardware configuration 600 can exist in various types of devices.
- the hardware configuration 600 can include a processor 610 , a memory 620 , a storage device 630 , and an input/output device 640 .
- Each of the components 610 , 620 , 630 , and 640 can, for example, be interconnected using a system bus 650 .
- the processor 610 can be capable of processing instructions for execution within the hardware configuration 600 .
- the processor 610 can be a single-threaded processor.
- the processor 610 can be a multi-threaded processor.
- the processor 610 can be capable of processing instructions stored in the memory 620 or on the storage device 630 .
- the memory 620 can store information within the hardware configuration 600 .
- the memory 620 can be a computer-readable medium.
- the memory 620 can be a volatile memory unit.
- the memory 620 can be a non-volatile memory unit.
- the storage device 630 can be capable of providing mass storage for the hardware configuration 600 .
- the storage device 630 can be a computer-readable medium.
- the storage device 630 can, for example, include a hard disk device, an optical disk device, flash memory or some other large capacity storage device.
- the storage device 630 can be a device external to the hardware configuration 600 .
- the input/output device 640 provides input/output operations for the hardware configuration 600 .
- the input/output device 640 can include one or more of a network interface device (e.g., an Ethernet card), a serial communication device (e.g., an RS-232 port), one or more universal serial bus (USB) interfaces (e.g., a USB 2.0 port) and/or a wireless interface device (e.g., an 802.11 card).
- the input/output device can include driver devices configured to send communications to, and receive communications from one or more networks (e.g., whole-home network 115 of FIG. 1 , access network 125 of FIG. 1 , etc.).
- the invention improves upon methods and apparatuses for pairing a client device with a CPE device.
- the methods, systems and apparatuses described in this disclosure enable the pairing of a client device with a CPE device upon a connection of the client device to a whole-network associated with the CPE device.
- the methods, systems and apparatuses described in this disclosure enable the secure pairing of a client device with a CPE device with little to no user-input.
- Such instructions can, for example, comprise interpreted instructions, such as script instructions, e.g., JavaScript or ECMAScript instructions, or executable code, or other instructions stored in a computer readable medium.
- Implementations of the subject matter and the functional operations described in this specification can be provided in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them.
- Embodiments of the subject matter described in this specification can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a tangible program carrier for execution by, or to control the operation of, data processing apparatus.
- a computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, or declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
- a computer program does not necessarily correspond to a file in a file system.
- a program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code).
- a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
- the processes and logic flows described in this specification are performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output thereby tying the process to a particular machine (e.g., a machine programmed to perform the processes described herein).
- the processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
- Computer readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices (e.g., EPROM, EEPROM, and flash memory devices); magnetic disks (e.g., internal hard disks or removable disks); magneto optical disks; and CD ROM and DVD ROM disks.
- semiconductor memory devices e.g., EPROM, EEPROM, and flash memory devices
- magnetic disks e.g., internal hard disks or removable disks
- magneto optical disks e.g., CD ROM and DVD ROM disks.
- the processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- This application is a continuation patent application claiming the benefit of U.S. patent application Ser. No. 14/196,681, entitled “Simplified Configuration of a Network Device,” filed on Mar. 4, 2014, which is hereby incorporated herein by reference in its entirety. U.S. patent application Ser. No. 14/196,681 is a non-provisional application claiming the benefit of U.S. Provisional Application Ser. No. 61/772,242, entitled “MoCA Setup and WiFi Pairing,” which was filed on Mar. 4, 2013, the entirety of which is hereby incorporated by reference.
- This disclosure relates to configuring a network device.
- As more and more devices become reliant on access to a network to provide services, the security and efficiency involved in the pairing of these devices in the home to a whole-home network becomes increasingly more important. When a user wants to connect a device to a whole-home network, the user generally must identify a network or access point to connect to, and must further input a password associated with the identified network or access point. The password requirement can preclude users or devices that are not subscribed to a service from receiving said service, and the preclusion of unsubscribed users or devices can improve a user's quality of experience associated with a service and can provide security against an aftermarket or grey market in network devices owned by service providers.
- Wi-Fi protected setup (WPS) is a network security standard that attempts to provide an efficient and user-friendly method for connecting a device to a whole-home network. The WPS standard temporarily opens an access point so that any device, including devices that are not provisioned to use the access point, can connect to the access point. This window of vulnerability may present security challenges. Therefore, it is desirable to improve upon systems and methods for pairing devices to a network.
-
FIG. 1 is a block diagram illustrating an example network environment operable to facilitate the pairing of a client device with a network service while minimizing user-input. -
FIG. 2 is a block diagram illustrating an example CPE device operable to facilitate the pairing of a client device with a network service while minimizing user-input. -
FIG. 3 is a flowchart illustrating an example process operable to facilitate the secure connection of a client device to a whole-home network. -
FIG. 4 is a flowchart illustrating an example process operable to facilitate the connection of a client device to a whole-home network while minimizing user-input. -
FIG. 5 is a flowchart illustrating an example process operable to facilitate the pairing of a client device with a network service while minimizing user-input. -
FIG. 6 is a block diagram of a hardware configuration operable to facilitate the pairing of a client device with a network service while minimizing user-input. - Like reference numbers and designations in the various drawings indicate like elements.
- In embodiments, methods, systems, and computer readable media can be operable to pair a client device with a CPE device. The methods, systems and computer readable media described in this disclosure can enable the pairing of a client device with a CPE device upon a connection of the client device to a whole-network associated with the CPE device. Further, methods, systems and computer readable media can enable the secure pairing of a client device with a CPE device with little to no user-input.
- In embodiments, this disclosure describes a configuration for devices associated with a whole-home network that enables an optimization of subscriber self-installation of client devices. In embodiments, flow-through provisioning of a device can be enabled by retrieving a network password through an unencrypted, wireless network connection.
-
FIG. 1 is a block diagram illustrating anexample network environment 100 operable to facilitate the pairing of a client device with a network service while minimizing user-input. In embodiments, a customer premise equipment (CPE)device 105 can route communications to and from one ormore client devices 110. For example, the one ormore client devices 110 can be provisioned to receive video service(s) and/or data service(s) through one ormore CPE devices 105. In embodiments, aCPE device 105 can include a gateway, a cable modem, a wireless router including an embedded cable modem, a digital subscriber line (DSL) modem, a mobile hot-spot router, a multimedia over coaxial alliance (MoCA) node, and any other device that is operable to route communications to and from aclient device 110. - In embodiments,
client devices 110 can include a wide variety of devices such as televisions, mobile devices, tablets, IP set-top boxes, computers, and any other device that is capable of utilizing a video or data service. Theclient devices 110 can be provided to a subscriber by a service provider or can be a device that is provided by a source other than the service provider. In embodiments, theclient devices 110 can communicate with aCPE device 105 via a whole-home network 115 (e.g., MoCA network, wireless local area network (WLAN), etc.). - In embodiments, a
CPE device 105 can route communications between client device(s) 110 and a wide area network (WAN) 120 via anaccess network 125. In embodiments, theaccess network 125 can include various networks such as coaxial cable, optical fiber, twisted pairs, wireless networks including 4G and LTE, and others. - In embodiments, a
WAN 120, for example, can operate using internet protocol (IP), directing data packets to and receiving data packets from aCPE device 105. In further examples, one or more video and/or data sources may provide streaming data through theWAN 120 to aCPE device 105. - In embodiments, a
CPE device 105 or aclient device 110 can retrieve information from aconfiguration server 130 via a WAN 120. For example, information retrieved from aconfiguration server 130 can include service set identifiers (SSIDs), passwords, information identifyingclient devices 110 having permission to access aspecific CPE device 105, information associating aclient device 110 with aspecific CPE device 105, instructions for choosing aCPE device 105 to connect to, and other information. In embodiments, configuration information can be controlled and operated by service or content providers through billing or customer management systems. For example, billing or customer management systems can update configuration information within aconfiguration server 130 to inform aCPE device 105 as to specific services that a client is subscribed or authorized to receive. - In embodiments, a
CPE device 105 can provide one or more wireless networks with one or more SSIDs forclient devices 110 to access. Each of the one or more SSIDs can have various characteristics, requirements, and limitations depending on the intended function of the SSID. For example, aCPE device 105 can provide one or more of the following SSID types: general use SSID, configuration SSID, video SSID, hot-spot SSID, as well as others. Each of the one or more SSIDs can be either encrypted or unencrypted depending on the intended function of the SSID. In embodiments, one or more SSIDs can be rate-limited. For example, an SSID can be rate-limited such that the SSID has only enough capacity to support traffic from theclient devices 110 that have permission to use the SSID. Such a rate limitation can provide an added security measure for unencrypted SSIDs. - In embodiments, a
CPE device 105 can have a single configuration SSID that is unencrypted and rate-limited. Such a configuration SSID can support flow-through provisioning of aclient device 110 by allowing theclient device 110 to access aconfiguration server 130. In embodiments, traffic received through a configuration SSID can be scrutinized within aCPE device 105 to limit theclient devices 110 that are allowed to use theCPE device 105. For example, aCPE device 105 can require a specific option or sub-option to be included within a request received from aclient device 110 before allowing theclient device 110 to use or connect to theCPE device 105. As a further security measure, a configuration SSID can be rate-limited to accommodate only the amount of traffic needed by aclient device 110 to retrieve configuration information. In embodiments, aCPE device 105 can disable an associated configuration SSID when all of theclient devices 110 that are provisioned to use theCPE device 105 have retrieved configuration information. -
FIG. 2 is a block diagram illustrating anexample CPE device 105 operable to facilitate the pairing of a client device with a network service while minimizing user-input. TheCPE device 105 can include ahome interface 205, anaccess interface 210, aconfiguration module 215, and aconfiguration data store 220. - In embodiments, the
CPE device 105 can route communications to and from aclient device 110 through ahome interface 205, via a whole-home network 115. For example, theCPE device 105 can receive a request from aclient device 110 to join a SSID associated with theCPE device 105. In embodiments, theCPE device 105 can receive a request from aclient device 110 to join a MoCA network. In embodiments, thehome interface 205 can include one or more SSIDs. - In embodiments, the
CPE device 105 can retrieve configuration information from aconfiguration server 130 ofFIG. 1 through anaccess interface 210, via anaccess network 125. Configuration information can include, for example, SSIDs, passwords associated with SSIDs, MoCA network configuration parameters, MoCA network security password parameters, information identifyingclient devices 110 having permission to access theCPE device 105, information associating aclient device 110 with theCPE device 105, and other information. In embodiments, configuration information received through theaccess interface 210 can be stored within aconfiguration data store 220. - In embodiments, a
configuration module 215 can allow or deny a request from aclient device 110 to join a SSID associated with theCPE device 105. For example, when aclient device 110 makes a request to join an encrypted SSID, theclient device 110 can send a password associated with the encrypted SSID to theCPE device 105. Theconfiguration module 215 can compare the password received from theclient device 110 to the password associated with the SSID that theclient device 110 is attempting to join. For example, theconfiguration module 215 can retrieve a password associated with a SSID from theconfiguration data store 220. - In embodiments, a
configuration module 215 can make a determination whether aclient device 110 is provisioned to use theCPE device 105. For example, when aclient device 110 attempts to join a SSID associated with theCPE device 105, theconfiguration module 215 can identify theclient device 110 and can search forclient device 110 within a list of devices that are provisioned to use the specific SSID. The list of devices that are provisioned to use the SSID can be stored, for example, within theconfiguration data store 220. Where the requestingclient device 110 is not found within the list of devices provisioned to use the SSID, theconfiguration module 215 can deny or ignore the request to join the SSID. In embodiments, where theconfiguration data store 220 does not contain needed configuration information associated with aclient device 110, theconfiguration module 215 can access theconfiguration server 130 ofFIG. 1 to attempt to discover the client device's authorization or configuration. -
FIG. 3 is a flowchart illustrating anexample process 300 operable to facilitate the connection of a client device to a secured whole-home network. In embodiments, theprocess 300 can be completed by aCPE device 105 ofFIG. 1 . Theprocess 300 can begin at 305, when aCPE device 105 ofFIG. 1 is connected to anaccess network 125 ofFIG. 1 . - At 310, configuration information associated with the
CPE device 105 can be retrieved. In embodiments, a configuration server (e.g.,configuration server 130 ofFIG. 1 ) associated with theCPE device 105 can be identified, and theCPE device 105 can retrieve configuration information from the identified configuration server. For example, when theCPE device 105 is connected to anaccess network 125, theCPE device 105 can receive the location of a configuration server upon joining aWAN 120 ofFIG. 1 . TheCPE device 105 can then retrieve a configuration file (e.g., file containing configuration information for the CPE device 105) from the identified configuration server. - At 315, a
CPE device 105 can configure one or more whole-home networks. In embodiments, theCPE device 105 can configure one or more whole-home networks 115 using the retrieved configuration information. For example, theCPE device 105 can configure one or more SSIDs on a wireless LAN home network according to the retrieved configuration information. In embodiments, SSIDs and passwords associated with the SSIDs can be configured using a random algorithm or they can be tied to a specific algorithm that uses an account number associated with a subscriber, a serial number associated with a device, or some other readily available seed. In embodiments, SSIDs or other home networks may be configured as unsecured networks. - At 320, the
CPE device 105 can identify a client device attempting to join a configured whole-home network. In embodiments, theCPE device 105 can identify the client device (e.g.,client device 110 ofFIG. 1 ) and can identify a service the client device is requesting and/or a SSID on a wireless LAN the client device is attempting to join. - At 325, a determination can be made whether the client device is provisioned to use the configured whole-home network. The determination whether the client device is provisioned to use the configured whole-home network can be made, for example, by a
configuration module 215 ofFIG. 2 . For example, when aclient device 110 attempts to join a wireless SSID, theCPE device 105 associated with an access point that is associated with the SSID can verify, using the configuration information, whether theclient device 105 is attached to a specific subscriber's account and to what services theclient device 105 is entitled. In embodiments, when aclient device 110 makes a request to join an encrypted SSID associated with the configured whole-home network, theclient device 110 can use a password associated with the encrypted SSID, and where the client's password matches the password configured for the specific SSID, the determination can be made that theclient device 110 is provisioned to use the whole-home network. In embodiments, theconfiguration module 215 can search for theclient device 110 within a list of devices that are provisioned to use the configured whole-home network. Where theclient device 110 is found within the list of devices that are provisioned to use the whole-home network, the determination can be made that theclient device 110 is provisioned to use the whole-home network. In embodiments, where the determination is made that theclient device 110 is not provisioned to use the configured whole-home network, theCPE device 105 can reject the client device's attempt to join the network at 330 even if it has used the correct password for that SSID. - If, at 325, the determination is made that the
client device 110 is provisioned to use the configured whole-home network, theprocess 300 can proceed to 335. At 335, a connection between theclient device 110 and theCPE device 105 can be established according to the configuration information. For example, theclient device 110 can be allowed to access one or more services that theclient device 110 has permission to use over the provisioned SSID. In embodiments, theCPE device 105 can be configured to provide a level of quality of service (QoS) to aclient device 110 based upon a status of the device. For example, theCPE device 105 can be configured to provide a higher level of QoS to devices that are provided to a subscriber by a service-provider and a lower level of QoS to devices provided to a subscriber by a source other than the service provider. -
FIG. 4 is a flowchart illustrating anexample process 400 operable to facilitate the connection of a client device capable of multiple home networking technologies to a secured whole-home network while minimizing user involvement. Theprocess 400 can begin at 405 when a client device attempts to join a secured whole-home network. In embodiments, a client device (e.g.,client device 110 ofFIG. 1 ) can seek a connection to a CPE device (e.g.,CPE device 105 ofFIG. 1 ) via a secured whole-home network (e.g., MoCA network, WLAN, personal area network (PAN), etc.). In embodiments, a client device may be required to receive a network password before joining a secured whole-home network. - At 410, one or more networks that are available to the client device can be identified. In embodiments, the client device can identify secured and unsecured networks that the client device is within range of.
- At 415, a determination can be made whether an unsecured home network is available for the client device to join. For example, the unsecured home network can be a configuration network. It should be understood that the client device can join a configuration network that is secured. In embodiments, a client device may be capable of connecting to both a MoCA network and a WLAN network, either of which may have secured or unsecured choices. Where a client device can connect to both a MoCA network and a WLAN network, a user can be presented with the option to connect to either or both the MoCA network and the WLAN network. In embodiments, a WLAN SSID can be encrypted or unencrypted. Where the WLAN SSID is unencrypted, the client device can join the WLAN SSID without first receiving a password associated with the SSID. If the determination is made that an unsecured network is not available for the client device to join, a network password associated with the secured whole-home network (e.g., MoCA whole-home network) can be received from a user input at 420.
- If, at 415, the determination is made that an unsecured network is available for the client device to join, the
process 400 can proceed to 425. At 425, the client device can retrieve configuration information from a configuration server (e.g.,configuration server 130 ofFIG. 1 ) via a connection to the unsecured network. In embodiments, the configuration information can include a network password associated with a MoCA whole-home network that the client device is attempting to join. In embodiments, a subscriber can be precluded from changing a network password associated with a CPE device. In embodiments, where the subscriber is given the ability to change a network password associated with a CPE device, a factory reset mode can be implemented within the CPE device such that the network password can be reset to the CPE device's original password. After receiving the network password, the client device can join the secured whole-home network at 430. -
FIG. 5 is a flowchart illustrating anexample process 500 operable to facilitate the pairing of a client device with a network service while minimizing user involvement. Theprocess 500 can begin at 505 when a client device initializes. In embodiments, a client device (e.g.,client device 110 ofFIG. 1 ) can initialize when the client device is powered on or otherwise reset. - At 510, the client device can search for the availability of one or more networks. In embodiments, the client device can search for encrypted and unencrypted networks of which the client device is within range. In embodiments, the client device can search for and identify one or more configuration SSIDs associated with one or more WLANs of which the client device is within range.
- At 515, a determination can be made whether a configuration network is available for the client device to join. For example, the available configuration network can be an unencrypted configuration network or an encrypted configuration network for which the client device has registration information (e.g., a password associated with the encrypted configuration network, etc.). Where the determination is made that an unencrypted configuration network is available, the client device can retrieve configuration information from a configuration server (e.g.,
configuration server 130 ofFIG. 1 ) through the unencrypted configuration network connection at 520. For example, the client device can identify an appropriate configuration server from information stored on the client device, or a CPE device can identify an appropriate configuration server for the client device. In embodiments, the unencrypted network connection can be a SSID on a WLAN, a PAN connection (e.g., Bluetooth connection, ZigBee connection, etc.) without security, or any other open network connection. In embodiments, where more than one unencrypted configuration SSIDs are available, the client device can select the SSID having the strongest signal through which to retrieve configuration information. In embodiments, where more than one unencrypted configuration network choice is available, the client device can select the configuration choice having the lowest amount of traffic through which to retrieve configuration information. In embodiments, the configuration information can include information identifying services that the client device is provisioned to receive, one or more SSIDs or other network identifiers and one or more CPE devices through which the client device may receive services, password(s) associated with specific SSIDS and/or home networks, as well as other information. - At 525, a determination can be made whether the client device is connected to an acceptable CPE device and home network. In embodiments, the CPE device to which a client device is connected can be a gateway or an access point associated with a gateway, or any other device that is operable to route communications to and from a client device (e.g., a cable modem, a wireless router including an embedded cable modem, a digital subscriber line (DSL) modem, a mobile hot-spot router, a MoCA node, etc.). In embodiments, the home networking choices can include Wi-Fi, ZigBee, Bluetooth, MoCA among many others. For example, the client device can be connected to a CPE device through an unencrypted configuration SSID through which the client device retrieves the configuration information. In embodiments, the determination whether the client device is connected to an acceptable CPE device can be based upon the configuration information received by the client device. For example, an acceptable CPE device can be a CPE device that the client device is provisioned to use. In embodiments, an acceptable CPE device can be a CPE device that has been identified as having sufficient spare capacity to support another client device.
- If, at 525, the determination is made that the client device is not connected to an acceptable CPE device, the
process 500 can proceed to 530. At 530, the client device can connect to an acceptable CPE device. In embodiments, the client device can search for one or more of the WLAN SSIDs or other home networks that are identified in the received configuration information. In embodiments, where more than one acceptable CPE device is available for the client device to join, the client device can join the CPE device having the strongest signal. - If, at 525, the determination is made that the client device is connected to a correct CPE device, the
process 500 can proceed to 535. At 535, the device can connect to a service home network (e.g., video SSID, data SSID, hot-spot SSID, etc.) associated with the CPE device that the client device is connected to. In embodiments, the client device can join an SSID that the client device is provisioned to join according to the configuration information. For example, the CPE device can examine a request from a client device to determine whether the client device is provisioned to receive the service that is requested. In embodiments, the client device can join the SSID by outputting a password to the associated CPE device. For example, the password can be received by a client device within the configuration information. - Returning to 515, if the determination is made that an unencrypted configuration home network is not available, the
process 500 can proceed to 540. At 540, a list of available home networking connections (e.g., SSIDs that were identified by the client device at 510) can be displayed. In embodiments, the displayed home networking connections can include encrypted and unencrypted SSIDs associated with CPE devices of which the client device is within range. For example, SSIDs having an acceptable signal level can be displayed within the list of available SSIDs. In embodiments, the list of available SSIDs can be displayed to a user of the client device. - At 545, a selection of an available home network connection from the displayed list of available home network connections can be received by the client device. In embodiments, the client device can prompt a user to select one of the home network connections from the displayed list of home network connections. For example, a user can be instructed to check a label or sticker on a CPE device to determine a SSID and an associated password for a desired service. The user can then select the appropriate SSID from a displayed list of SSIDs.
- At 550, a password associated with the selected home network connection can be received by the client device. In embodiments, the client device can prompt a user to input a password associated with the selected SSID, and the user can input the password associated with the selected SSID. In embodiments, the client device can prompt a user to input a password associated with a MoCA network, and the user can input the password associated with a selected MoCA network. After the correct password is received by the CPE device associated with the selected home network connection, the client device can join the selected home network at 555.
-
FIG. 6 is a block diagram of ahardware configuration 600 operable to facilitate the pairing of a client device with a network service while minimizing user-input. It should be understood that thehardware configuration 600 can exist in various types of devices. Thehardware configuration 600 can include aprocessor 610, amemory 620, astorage device 630, and an input/output device 640. Each of thecomponents system bus 650. Theprocessor 610 can be capable of processing instructions for execution within thehardware configuration 600. In one implementation, theprocessor 610 can be a single-threaded processor. In another implementation, theprocessor 610 can be a multi-threaded processor. Theprocessor 610 can be capable of processing instructions stored in thememory 620 or on thestorage device 630. - The
memory 620 can store information within thehardware configuration 600. In one implementation, thememory 620 can be a computer-readable medium. In one implementation, thememory 620 can be a volatile memory unit. In another implementation, thememory 620 can be a non-volatile memory unit. - In some implementations, the
storage device 630 can be capable of providing mass storage for thehardware configuration 600. In one implementation, thestorage device 630 can be a computer-readable medium. In various different implementations, thestorage device 630 can, for example, include a hard disk device, an optical disk device, flash memory or some other large capacity storage device. In other implementations, thestorage device 630 can be a device external to thehardware configuration 600. - The input/
output device 640 provides input/output operations for thehardware configuration 600. In embodiments, the input/output device 640 can include one or more of a network interface device (e.g., an Ethernet card), a serial communication device (e.g., an RS-232 port), one or more universal serial bus (USB) interfaces (e.g., a USB 2.0 port) and/or a wireless interface device (e.g., an 802.11 card). In embodiments, the input/output device can include driver devices configured to send communications to, and receive communications from one or more networks (e.g., whole-home network 115 ofFIG. 1 ,access network 125 ofFIG. 1 , etc.). - Those skilled in the art will appreciate that the invention improves upon methods and apparatuses for pairing a client device with a CPE device. The methods, systems and apparatuses described in this disclosure enable the pairing of a client device with a CPE device upon a connection of the client device to a whole-network associated with the CPE device. The methods, systems and apparatuses described in this disclosure enable the secure pairing of a client device with a CPE device with little to no user-input.
- The subject matter of this disclosure, and components thereof, can be realized by instructions that upon execution cause one or more processing devices to carry out the processes and functions described above. Such instructions can, for example, comprise interpreted instructions, such as script instructions, e.g., JavaScript or ECMAScript instructions, or executable code, or other instructions stored in a computer readable medium.
- Implementations of the subject matter and the functional operations described in this specification can be provided in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them. Embodiments of the subject matter described in this specification can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a tangible program carrier for execution by, or to control the operation of, data processing apparatus.
- A computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, or declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program does not necessarily correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
- The processes and logic flows described in this specification are performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output thereby tying the process to a particular machine (e.g., a machine programmed to perform the processes described herein). The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
- Computer readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices (e.g., EPROM, EEPROM, and flash memory devices); magnetic disks (e.g., internal hard disks or removable disks); magneto optical disks; and CD ROM and DVD ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
- While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features that may be specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a sub combination.
- Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
- Particular embodiments of the subject matter described in this specification have been described. Other embodiments are within the scope of the following claims. For example, the actions recited in the claims can be performed in a different order and still achieve desirable results, unless expressly noted otherwise. As one example, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some implementations, multitasking and parallel processing may be advantageous.
Claims (20)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/979,133 US20160112400A1 (en) | 2013-03-04 | 2015-12-22 | Simplified configuration of a network device |
US16/527,945 US10887304B2 (en) | 2013-03-04 | 2019-07-31 | Simplified configuration of a network device |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361772242P | 2013-03-04 | 2013-03-04 | |
US14/196,681 US9258298B2 (en) | 2013-03-04 | 2014-03-04 | Simplified configuration of a network device |
US14/979,133 US20160112400A1 (en) | 2013-03-04 | 2015-12-22 | Simplified configuration of a network device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/196,681 Continuation US9258298B2 (en) | 2013-03-04 | 2014-03-04 | Simplified configuration of a network device |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/527,945 Continuation US10887304B2 (en) | 2013-03-04 | 2019-07-31 | Simplified configuration of a network device |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160112400A1 true US20160112400A1 (en) | 2016-04-21 |
Family
ID=51421718
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/196,681 Active US9258298B2 (en) | 2013-03-04 | 2014-03-04 | Simplified configuration of a network device |
US14/979,133 Abandoned US20160112400A1 (en) | 2013-03-04 | 2015-12-22 | Simplified configuration of a network device |
US16/527,945 Active US10887304B2 (en) | 2013-03-04 | 2019-07-31 | Simplified configuration of a network device |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/196,681 Active US9258298B2 (en) | 2013-03-04 | 2014-03-04 | Simplified configuration of a network device |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/527,945 Active US10887304B2 (en) | 2013-03-04 | 2019-07-31 | Simplified configuration of a network device |
Country Status (1)
Country | Link |
---|---|
US (3) | US9258298B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10887304B2 (en) * | 2013-03-04 | 2021-01-05 | Arris Enterprises Llc | Simplified configuration of a network device |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9531704B2 (en) | 2013-06-25 | 2016-12-27 | Google Inc. | Efficient network layer for IPv6 protocol |
US9191209B2 (en) | 2013-06-25 | 2015-11-17 | Google Inc. | Efficient communication for devices of a home network |
US9819698B2 (en) * | 2014-07-24 | 2017-11-14 | Maxlinear, Inc. | Method and apparatus for MoCA network with protected set-up |
US11695804B2 (en) | 2014-07-24 | 2023-07-04 | Entropie Communications, LLC | Method and apparatus for MoCA network with protected set-up |
US9655151B2 (en) * | 2014-10-06 | 2017-05-16 | Adtran, Inc. | Wireless mesh network auto-forming in a multi-tenant environment |
DE102014117290A1 (en) * | 2014-11-26 | 2016-06-02 | Deutsche Telekom Ag | In-building base station |
WO2017115145A1 (en) | 2015-12-31 | 2017-07-06 | Delta Faucet Company | Water sensor |
CN106028326B (en) * | 2016-05-10 | 2019-12-06 | 北京奇虎科技有限公司 | WiFi configuration method and device of smart watch |
CN109150568B (en) * | 2017-06-27 | 2021-12-14 | 阿里巴巴集团控股有限公司 | Network management method, device, system, equipment and storage medium |
US11038757B2 (en) | 2017-12-14 | 2021-06-15 | Arris Enterprises Llc | Soft configuration and data exchange for in-home devices |
US11281794B2 (en) * | 2019-09-26 | 2022-03-22 | Microsoft Technology Licensing, Llc | Fine grained access control on procedural language for databases based on accessed resources |
US11153748B2 (en) | 2019-10-31 | 2021-10-19 | Arris Enterprises Llc | Secure system and method for onboarding router |
CN110831112B (en) * | 2019-11-07 | 2022-05-03 | 深圳市欧瑞博科技股份有限公司 | Network connection method, intelligent household equipment, intelligent gateway and electronic equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040052216A1 (en) * | 2002-09-17 | 2004-03-18 | Eung-Seok Roh | Internet protocol address allocation device and method |
US20060183477A1 (en) * | 2005-02-15 | 2006-08-17 | Research In Motion Limited | Network selection user interface for wireless devices |
US7269653B2 (en) * | 2003-11-07 | 2007-09-11 | Hewlett-Packard Development Company, L.P. | Wireless network communications methods, communications device operational methods, wireless networks, configuration devices, communications systems, and articles of manufacture |
US20080248794A1 (en) * | 2007-04-03 | 2008-10-09 | Ricoh Company, Ltd. | Configuration and management of wireless network devices |
US20090163195A1 (en) * | 2007-12-24 | 2009-06-25 | Woo Seong Kim | Mobile terminal and communication method thereof |
US20130272164A1 (en) * | 2012-04-17 | 2013-10-17 | Econais Ae | Systems and methods of wi-fi enabled device configuration |
US20140310602A1 (en) * | 2005-09-16 | 2014-10-16 | Microsoft Corporation | Connecting to different network types through a common user interface |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1532766A2 (en) | 2002-07-16 | 2005-05-25 | Haim Engler | Automated network security system and method |
US8108920B2 (en) | 2003-05-12 | 2012-01-31 | Microsoft Corporation | Passive client single sign-on for web applications |
US8255681B2 (en) | 2005-03-10 | 2012-08-28 | Ibahn General Holdings Corporation | Security for mobile devices in a wireless network |
US8418234B2 (en) | 2005-12-15 | 2013-04-09 | International Business Machines Corporation | Authentication of a principal in a federation |
US8798671B2 (en) | 2006-07-26 | 2014-08-05 | Motorola Mobility Llc | Dual mode apparatus and method for wireless networking configuration |
GB0805803D0 (en) * | 2008-03-31 | 2008-04-30 | British Telecomm | Method of installing a wireless network |
US20110265151A1 (en) | 2010-04-22 | 2011-10-27 | John Furlan | Method of adding a client device or service to a wireless network |
US20120203824A1 (en) * | 2011-02-07 | 2012-08-09 | Nokia Corporation | Method and apparatus for on-demand client-initiated provisioning |
US8763094B1 (en) | 2011-09-14 | 2014-06-24 | Google Inc. | Network configuration and authorization |
US9100382B2 (en) | 2012-03-20 | 2015-08-04 | Qualcomm Incorporated | Network security configuration using short-range wireless communication |
US9979710B2 (en) | 2012-07-26 | 2018-05-22 | Stmicroelectronics, Inc. | Single SSID and dual-SSID enhancements |
US9258298B2 (en) * | 2013-03-04 | 2016-02-09 | Arris Enterprises, Inc. | Simplified configuration of a network device |
US9420331B2 (en) * | 2014-07-07 | 2016-08-16 | Google Inc. | Method and system for categorizing detected motion events |
-
2014
- 2014-03-04 US US14/196,681 patent/US9258298B2/en active Active
-
2015
- 2015-12-22 US US14/979,133 patent/US20160112400A1/en not_active Abandoned
-
2019
- 2019-07-31 US US16/527,945 patent/US10887304B2/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040052216A1 (en) * | 2002-09-17 | 2004-03-18 | Eung-Seok Roh | Internet protocol address allocation device and method |
US7269653B2 (en) * | 2003-11-07 | 2007-09-11 | Hewlett-Packard Development Company, L.P. | Wireless network communications methods, communications device operational methods, wireless networks, configuration devices, communications systems, and articles of manufacture |
US20060183477A1 (en) * | 2005-02-15 | 2006-08-17 | Research In Motion Limited | Network selection user interface for wireless devices |
US20140310602A1 (en) * | 2005-09-16 | 2014-10-16 | Microsoft Corporation | Connecting to different network types through a common user interface |
US20080248794A1 (en) * | 2007-04-03 | 2008-10-09 | Ricoh Company, Ltd. | Configuration and management of wireless network devices |
US20090163195A1 (en) * | 2007-12-24 | 2009-06-25 | Woo Seong Kim | Mobile terminal and communication method thereof |
US20130272164A1 (en) * | 2012-04-17 | 2013-10-17 | Econais Ae | Systems and methods of wi-fi enabled device configuration |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10887304B2 (en) * | 2013-03-04 | 2021-01-05 | Arris Enterprises Llc | Simplified configuration of a network device |
Also Published As
Publication number | Publication date |
---|---|
US20190356646A1 (en) | 2019-11-21 |
US9258298B2 (en) | 2016-02-09 |
US10887304B2 (en) | 2021-01-05 |
US20140250509A1 (en) | 2014-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10887304B2 (en) | Simplified configuration of a network device | |
EP3912374B1 (en) | Improved handling of unique identifiers for stations | |
US10498611B1 (en) | System architecture and methods for controlling and managing networking devices and expediting new service delivery in a subscriber's home network using micro-domains | |
US10020988B2 (en) | Auto-configuration of wireless network extender | |
US9912667B2 (en) | Managing private and public service set utilization | |
WO2017031664A1 (en) | Wireless setup procedure enabling modification of wireless credentials | |
US20170272951A1 (en) | Authentication between wireless client and access point utilizing smart client detection | |
US9848319B2 (en) | Service set determination based upon device type identifier | |
US20230246998A1 (en) | Generation of a unique device identifier for a client device in a wireless network | |
US10034204B2 (en) | Virtual overlay network for routing wireless communications | |
CA3046823C (en) | Service set steering based upon device identifier | |
EP3289809A1 (en) | Service set determination based upon device type identifier | |
EP3178244A1 (en) | Managing private and public service set utilization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ARRIS ENTERPRISES LLC, PENNSYLVANIA Free format text: CHANGE OF NAME;ASSIGNOR:ARRIS ENTERPRISES INC;REEL/FRAME:041995/0031 Effective date: 20151231 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
AS | Assignment |
Owner name: ARRIS ENTERPRISES LLC, GEORGIA Free format text: CHANGE OF NAME;ASSIGNOR:ARRIS ENTERPRISES, INC.;REEL/FRAME:049586/0470 Effective date: 20151231 |
|
AS | Assignment |
Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATE Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:ARRIS ENTERPRISES LLC;REEL/FRAME:049820/0495 Effective date: 20190404 Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK Free format text: ABL SECURITY AGREEMENT;ASSIGNORS:COMMSCOPE, INC. OF NORTH CAROLINA;COMMSCOPE TECHNOLOGIES LLC;ARRIS ENTERPRISES LLC;AND OTHERS;REEL/FRAME:049892/0396 Effective date: 20190404 Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK Free format text: TERM LOAN SECURITY AGREEMENT;ASSIGNORS:COMMSCOPE, INC. OF NORTH CAROLINA;COMMSCOPE TECHNOLOGIES LLC;ARRIS ENTERPRISES LLC;AND OTHERS;REEL/FRAME:049905/0504 Effective date: 20190404 Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL AGENT, CONNECTICUT Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:ARRIS ENTERPRISES LLC;REEL/FRAME:049820/0495 Effective date: 20190404 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |