Method to deploy wireless network security with a wireless router
First Claim
1. A method for activating a wireless network security with a wireless host, comprising:
- establishing a communication connection with a client;
in response to the communication connection, automatically requesting from the client a determination of whether to activate the wireless network security;
upon receipt of the determination to activate the wireless security network, automatically requesting an identifier code from the client; and
52 activating the wireless security network to secure the wireless host if the identifier code matches a unique key-code that is physically located on the wireless host.
1 Assignment
0 Petitions
Accused Products
Abstract
A method to deploy wireless network security with a wireless router is disclosed. In one aspect, the present disclosure teaches a method for activating a wireless network security with a wireless host including establishing a communication connection with a client. The method further includes, in response to the communication connection, automatically requesting from the client a determination of whether to activate the wireless network security. The method further includes, upon receipt of the determination to activate the wireless security network, automatically requesting an identifier code from the client. The method further includes activating the wireless security network to secure the wireless host if the identifier code matches a unique key-code that is physically located on the wireless host.
-
Citations
20 Claims
-
1. A method for activating a wireless network security with a wireless host, comprising:
-
establishing a communication connection with a client;
in response to the communication connection, automatically requesting from the client a determination of whether to activate the wireless network security;
upon receipt of the determination to activate the wireless security network, automatically requesting an identifier code from the client; and
52activating the wireless security network to secure the wireless host if the identifier code matches a unique key-code that is physically located on the wireless host. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 15, 16)
-
-
11. A method of accessing a secured wireless network deployed from a wireless router using a client, comprising:
-
establishing a communication connection with a client;
in response to the communication connection, automatically requesting from the client an identifier code to access the secured wireless network; and
allowing access to the secured wireless network on the wireless router if the identifier code matches a unique key-code that is physically located on the wireless router. - View Dependent Claims (12, 13, 14)
-
-
17. A system for deploying a wireless network security with a wireless router, comprising:
-
a wireless router having a unique key-code physically located on the router;
a client operably maintains a communication connection with the router, the client operable to activate a wireless security network to secure the router if the client transmits an identifier code to the router wherein the identifier code matches a unique key-code that is physically located on the router. - View Dependent Claims (18, 19, 20)
-
Specification