ENABLING ACCESS TO A SECURED WIRELESS LOCAL NETWORK WITHOUT USER INPUT OF A NETWORK PASSWORD
First Claim
1. A method comprising:
- identifying, at a security device of a secured wireless network, a wireless-enabled device that is not authorized to access the secured wireless network; and
sending, from the security device, an access request message directed to a messaging address in response to identifying the wireless-enabled device, wherein the access request message includes information that identifies the wireless-enabled device, includes a first selectable option to allow the wireless-enabled device access to the secured wireless network without requiring user input of a network password associated with the secured wireless network via the wireless-enabled device, and includes a second selectable option to deny the wireless-enabled device access to the secured wireless network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes identifying, at a security device of a secured wireless network, a wireless-enabled device that is not authorized to access the secured wireless network. The method also includes sending an access request message directed to a messaging address in response to identifying the wireless-enabled device. The access request message includes information that identifies the wireless-enabled device includes a first selectable option to allow access to the secured wireless network without requiring user input of a network password associated with the secured wireless network via the wireless-enabled device. The access request message also and includes a second selectable option to deny access to the secured wireless network.
11 Citations
20 Claims
-
1. A method comprising:
-
identifying, at a security device of a secured wireless network, a wireless-enabled device that is not authorized to access the secured wireless network; and sending, from the security device, an access request message directed to a messaging address in response to identifying the wireless-enabled device, wherein the access request message includes information that identifies the wireless-enabled device, includes a first selectable option to allow the wireless-enabled device access to the secured wireless network without requiring user input of a network password associated with the secured wireless network via the wireless-enabled device, and includes a second selectable option to deny the wireless-enabled device access to the secured wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a processor configured to control access to a secured wireless network; a memory coupled to the processor, the memory comprising instructions executable by the processor to; identify a wireless-enabled device that is not authorized to access the secured wireless network; and send an access request message directed to a messaging address in response to identifying the wireless-enabled device, wherein the access request message includes information that identifies the wireless-enabled device, includes a first selectable option to allow the wireless-enabled device access to the secured wireless network without requiring user input of a network password associated with the secured wireless network via the wireless-enabled device, and includes a second selectable option to deny the wireless-enabled device access to the secured wireless network. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-readable storage device comprising instructions, that when executed by a processor configured to control access to a secured wireless network, cause the processor to perform operations including:
-
identifying a wireless-enabled device that is not authorized to access the secured wireless network; and sending an access request message directed to a messaging address in response to identifying the wireless-enabled device, wherein the access request message includes information that identifies the wireless-enabled device, includes a first selectable option to allow the wireless-enabled device access to the secured wireless network without requiring user input of a network password associated with the secured wireless network via the wireless-enabled device, and includes a second selectable option to deny the wireless-enabled device access to the secured wireless network. - View Dependent Claims (17, 18, 19, 20)
-
Specification