Offering and provisioning secured wireless virtual private network services
First Claim
1. A method of securing a network connection comprising:
- determining when at least one network is available for a connection;
presenting a user interface for making a selection corresponding to the at least one network;
receiving an indication of a selected network;
determining when the selected network is unsecured;
presenting a user interface corresponding to a service for securing the network connection;
receiving a response to offering the service; and
storing a value corresponding to one of the service and the selected network for use during a subsequent network session.
2 Assignments
0 Petitions
Accused Products
Abstract
An electronic device may present a user interface for making selections related to connecting to a network or selecting a network from a plurality of available networks. Additionally, a user interface may give a user an opportunity to secure to an open, unsecure, connection, for example, an ad-hoc wireless connection, such as may be found at a coffee shop. A selection of security offerings may be made from a user interface screen including pre-populated service providers. A user may be allowed to save preferences for connecting to new networks, as well as preferences related to previously used networks. Further, the user may save preferences for invoking security services on a per-network or pan-network basis. The security service may a known tunneling protocol (i.e. VPN), such as L2TP or PPTP.
31 Citations
16 Claims
-
1. A method of securing a network connection comprising:
-
determining when at least one network is available for a connection;
presenting a user interface for making a selection corresponding to the at least one network;
receiving an indication of a selected network;
determining when the selected network is unsecured;
presenting a user interface corresponding to a service for securing the network connection;
receiving a response to offering the service; and
storing a value corresponding to one of the service and the selected network for use during a subsequent network session. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable medium storing computer executable instructions for implementing a wireless connection manager in an electronic device comprising:
-
a network monitor module for determining availability of a wireless network;
a presentation manager module coupled to the network monitor for presenting the availability of the wireless network and for presenting network security offerings;
a link manager module for activating a security offering responsive to the presentation manager receiving a selection of the wireless network and the security offering. - View Dependent Claims (10, 11, 12)
-
-
13. A method of managing wireless connections to unsecured network providers on an electronic device comprising:
-
installing a secured connection manager on the electronic device;
installing a client for a network security service;
presenting a user interface for receiving a preference for securing a connection to a selected one of the unsecured network providers;
storing the preference for securing the connection to a selected unsecured network provider;
attaching to the selected unsecured network provider using an unsecured connection;
invoking the secured connection manager to connect to the network security service according to the preference stored. - View Dependent Claims (14, 15, 16)
-
Specification