System and method for automatic setup of a network device with secure network transmission of setup parameters using a standard remote control
First Claim
1. A local area network (LAN) comprising:
- a network member device comprising a processor, memory coupled to the processor, and a computer program for encrypting, using a cipher key, a network configuration message transmitted via non-secure communication on the network; and
a nonmember device associated with the LAN for non-secure communication prior to transmission of the encrypted configuration message by the member device, the nonmember device comprising a processor, memory coupled to the processor for storing a cipher key input to the nonmember device via out-of-band communication, and a computer program responsive to the cipher key for decrypting the encrypted network configuration message transmitted via non-secure communication on the network by the member device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method allows a user to automatically configure a new device on a local area network (LAN) by pressing a sequence of buttons on a conventional remote control (RC) while pointing the infrared (IR) transmitter of the RC at the new device. The button-sequence includes an arbitrary button-sequence selected by the user, or a pre-established button-sequence stored in an existing network member device, such as the network controller, and displayed to the user. The button-sequence represents a cipher key for an encryption/decryption algorithm. The network member device uses the cipher key to encrypt a configuration message that includes a shared network security key and transmit it over the network. The encrypted configuration message is received by the new device and decrypted using the same cipher key. The decrypted network configuration parameters, including the shared network security key, enable the new device to automatically associate with the network and communicate in a secure manner using the shared network security key.
72 Citations
26 Claims
-
1. A local area network (LAN) comprising:
-
a network member device comprising a processor, memory coupled to the processor, and a computer program for encrypting, using a cipher key, a network configuration message transmitted via non-secure communication on the network; and
a nonmember device associated with the LAN for non-secure communication prior to transmission of the encrypted configuration message by the member device, the nonmember device comprising a processor, memory coupled to the processor for storing a cipher key input to the nonmember device via out-of-band communication, and a computer program responsive to the cipher key for decrypting the encrypted network configuration message transmitted via non-secure communication on the network by the member device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for configuring a device on a local area network (LAN) comprising:
-
a remote control comprising an infrared (IR) transmitter and a button-pad for enabling a user to cause a button-sequence representing a cipher key to be transmitted via IR; and
a device for configuration on the network comprising an IR receiver, a processor, memory coupled to the processor, and a computer program responsive to the button-sequence transmitted by the remote control via IR for decrypting a network configuration message transmitted on the network. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A method for setting up an electronic device on a local area network (LAN) comprising:
-
readying the electronic device for receipt of encrypted network setup parameters via non-secure network transmission;
inputting a digital code to the electronic device via out-of-band communication, the digital code representing a cipher key;
storing the cipher key in the electronic device;
receiving in the electronic device the encrypted network setup parameters via non-secure network transmission; and
decrypting the encrypted network setup parameters in the electronic device using the stored cipher key as the decryption key. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification