Security token and acess point networking
First Claim
1. A method of securing access to a network (13), the network (13) including at least one first electronic device (18) and at least one access point (20), from a user (16) having a second electronic device (12), said method comprising the steps of:
- transmitting a radio frequency (RF) signal (48) from the first electronic device (18);
detecting the RF signal (48) from the first electronic device (18) with the access point (20);
transmitting a radio frequency (RF) signal (50) from the second electronic device (12);
detecting the RF signal (50) from the second electronic device (12) with the same access point (20);
said method characterized by enabling the first electronic device (18) to allow the user (16) having the second electronic device (12) to access the network (13) and the first electronic device (18) in response to the access point (20) detecting the RF signals (48, 50) from both the first (18) and the second electronic devices (12).
1 Assignment
0 Petitions
Accused Products
Abstract
The method of the subject invention includes the steps of transmitting a radio frequency (RF) signal from a first electronic device (18) and detecting the RF signal (48) from the first electronic device (18) with an access point (20). The method also includes transmitting a RF signal (50) from a second electronic device (12) and detecting the RF signal (50) from the second electronic device (12) with the same access point (20). The method is characterized by enabling the first electronic device (18) to allow the user (16) having the second electronic device (12) to access the network (13) and the first electronic device (18) in response to the access point (20) detecting the RF signals (48, 50) from both the first (18) and the second electronic devices (12). The method further includes steps of measuring a signal strength for the RF signal (48, 50) from both the first (18) and the second electronic devices (12), comparing the signal strengths to a predetermined threshold, enabling the first electronic device (18) in response to both of the signal strengths being above the predetermined threshold.
-
Citations
14 Claims
-
1. A method of securing access to a network (13), the network (13) including at least one first electronic device (18) and at least one access point (20), from a user (16) having a second electronic device (12), said method comprising the steps of:
-
transmitting a radio frequency (RF) signal (48) from the first electronic device (18);
detecting the RF signal (48) from the first electronic device (18) with the access point (20);
transmitting a radio frequency (RF) signal (50) from the second electronic device (12);
detecting the RF signal (50) from the second electronic device (12) with the same access point (20);
said method characterized by enabling the first electronic device (18) to allow the user (16) having the second electronic device (12) to access the network (13) and the first electronic device (18) in response to the access point (20) detecting the RF signals (48, 50) from both the first (18) and the second electronic devices (12). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 12)
-
-
10. A method of securing access to a network (13), the network (13) including at least one first electronic device (18) and at least one access point (20), from a user (16) having a second electronic device (12), said method comprising the steps of:
-
transmitting a radio frequency (RF) signal (50) from the second electronic device (12) to establish communication with at least one access point (20);
detecting the RF signal (50) from the second electronic device (12) with a first (21) and a second access points (23);
measuring the strength of the RF signal (50) from the second electronic device (12) at the first and second access points (21, 23);
comparing a maximum measured RF signal (50) strength by either of the first and second access points (21, 23) to a predetermined threshold;
enabling a predetermined number of first electronic devices (18) in response to the detected RF signal (50) strength being above the predetermined threshold;
said method characterized by transmitting data from the second device through the access point (20) which measures the maximum RF signal (50) strength, to the predetermined number of first electronic devices (18) thereby establishing communication between the first electronic devices (18) and the second electronic device (12). - View Dependent Claims (11, 13, 14)
-
Specification