System and method for the secure recognition of a network device
First Claim
1. A system for the secure recognition of a network device comprising:
- means adapted for receiving a first communication via a first communication network, the first communication inclusive of identification data representative of a network device to be added to a selected network;
means adapted for transmitting, responsive to the identification data, first data key associated with an initial login of the network device;
means adapted for entering the first data key in to the network device;
means adapted for validating identification data entered into the network device;
means adapted for connecting, upon validation of identification data, the network device so as to enable it for initial data communication via a second network;
means adapted for receiving into the network device, via the second network, a second data key; and
means adapted for enabling the network device for further data communication via the second network upon receipt of the second data key.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for the secure recognition of network devices. The method begins with the receiving of a first communication via a first communication network. The first communication includes identification data representing a network device to be added to a selected network. In response to the identification data, a first data key associated with an initial login of the network device is transmitted and entered into the network device. The identification data entered into the network device is validated and upon validation, the network device is connected so as to enable it for initial data communication via a second network. Via the second network, the network device receives a second data key, which enables the network device for further data communication via the second network.
25 Citations
28 Claims
-
1. A system for the secure recognition of a network device comprising:
-
means adapted for receiving a first communication via a first communication network, the first communication inclusive of identification data representative of a network device to be added to a selected network;
means adapted for transmitting, responsive to the identification data, first data key associated with an initial login of the network device;
means adapted for entering the first data key in to the network device;
means adapted for validating identification data entered into the network device;
means adapted for connecting, upon validation of identification data, the network device so as to enable it for initial data communication via a second network;
means adapted for receiving into the network device, via the second network, a second data key; and
means adapted for enabling the network device for further data communication via the second network upon receipt of the second data key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of secure recognition of a network device comprising the steps of:
receiving a first communication via a first communication network, the first communication inclusive of identification data representative of a network device to be added to a selected network;
transmitting, responsive to the identification data, first data key associated with an initial login of the network device;
entering the first data key in to the network device;
validating identification data entered into the network device;
upon validation of identification data, connecting the network device so as to enable it for initial data communication via a second network;
receiving into the network device, via the second network, a second data key; and
enabling the network device for further data communication via the second network upon receipt of the second data key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A computer-readable medium of instructions with computer-readable instructions stored thereon for the secure recognition of a network device comprising:
-
instructions for receiving a first communication via a first communication network, the first communication inclusive of identification data representative of a network device to be added to a selected network;
instructions for transmitting, responsive to the identification data, first data key associated with an initial login of the network device;
instructions for entering the first data key in to the network device;
instructions for validating identification data entered into the network device;
instructions for upon validation of identification data, connecting the network device so as to enable it for initial data communication via a second network;
instructions for receiving into the network device, via the second network, a second data key; and
instructions for enabling the network device for further data communication via the second network upon receipt of the second data key. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A computer-implemented method of secure recognition of a network device comprising the steps of:
-
receiving a first communication via a first communication network, the first communication inclusive of identification data representative of a network device to be added to a selected network;
transmitting, responsive to the identification data, first data key associated with an initial login of the network device;
entering the first data key in to the network device;
validating identification data entered into the network device;
upon validation of identification data, connecting the network device so as to enable it for initial data communication via a second network;
receiving into the network device, via the second network, a second data key; and
enabling the network device for further data communication via the second network upon receipt of the second data key. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
Specification