COMMUNICATION APPARATUS AND CONTROL METHOD
First Claim
1. A communication apparatus comprising:
- a participation unit configured to participate in a first group which communicates using a first encryption key, as a slave station; and
a forming unit configured to form, when the participation unit participates in the first group, a second group which communicates using a second encryption key which differs from the first encryption key.
0 Assignments
0 Petitions
Accused Products
Abstract
This invention allows connection of an apparatus with a low security level without lowering the security level of a network even when such apparatus issues a connection request. This invention is directed to an access point which makes wireless communications with a station using an encryption method (AES). Upon reception of a connection request message including information indicating an encryption method (WEP) that can be used by a station, the access point checks if the encryption method (WEP) recognized based on the received connection request message is different from the encryption method (AES). When it is determined that the two encryption methods are different, the access point launches a controller which makes wireless communications with the station using that encryption method (WEP).
39 Citations
11 Claims
-
1. A communication apparatus comprising:
-
a participation unit configured to participate in a first group which communicates using a first encryption key, as a slave station; and a forming unit configured to form, when the participation unit participates in the first group, a second group which communicates using a second encryption key which differs from the first encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A control method in a communication apparatus, comprising:
-
participating in a first group which communicates using a first encryption key, as a slave station; and forming, when communication apparatus is participated in the first group in the participating step, a second group which communicates using a second encryption key which differs from the first encryption key.
-
-
11. An non-transitory computer-readable storage medium storing a program which causes a computer to execute a control method, the method comprising:
-
participating in a first group which communicates using a first encryption key, as a slave station; and forming, when communication apparatus is participated in the first group in the participating step, a second group which communicates using a second encryption key which differs from the first encryption key.
-
Specification