System and method for effecting the secure deployment of networks
First Claim
Patent Images
1. A network, comprising:
- at least one active node having access to the network;
at least one secondary node; and
a key, adapted to store information that is readable by the active node, and being further adapted to be associated with the secondary node such that the active node, upon verifying a validity of the information when the key is associated with the secondary node, permits the secondary node to gain access to the network.
14 Assignments
0 Petitions
Accused Products
Abstract
A system and method for allowing network users to securely administer and deploy network nodes (102). These networks (100) may comprise wired and/or wireless connections. Examples would include wired networks (104) with shared infrastructure in an office building, as well as ad-hoc multi-hopping peer-to-peer network applications for the home. The system and method provides a key (130) that allows new nodes (102) and thus new devices (124, 126, 132) to gain access to a network (100) via an existing node (122) of that network (100).
64 Citations
20 Claims
-
1. A network, comprising:
-
at least one active node having access to the network;
at least one secondary node; and
a key, adapted to store information that is readable by the active node, and being further adapted to be associated with the secondary node such that the active node, upon verifying a validity of the information when the key is associated with the secondary node, permits the secondary node to gain access to the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for deploying a network, comprising:
-
deploying at least one active node having access to the network;
deploying at least one secondary node;
providing a key, adapted to store information that is readable by the active node, and associating the key with the secondary node; and
operating the active node verify a validity of the information when the key is associated with the secondary node, so that the active node permits the secondary node to gain access to the network. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification