×

Method for multiple configurations of wireless network connection settings

  • US 7,155,437 B2
  • Filed: 07/29/2002
  • Issued: 12/26/2006
  • Est. Priority Date: 07/29/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling a network connection of the terminal in a wireless network system, the terminal capable of wirelessly transmitting and receiving data, the wireless network system comprising a plurality of wireless networks, the different wireless networks having different identities capable of being transmitted wirelessly by each wireless network, the terminal comprising:

  • a plurality of distinct sorting pointers, each distinct sorting pointer representing a unique priority;

    a network database for recording a plurality of predetermined identities, wherein the network database has a plurality of key IDs stored in the database with each of key IDs corresponding to a predetermined identity;

    a plurality of configuration tables, each configuration table for corresponding one predetermined identity to one unique sorting pointer, and each configuration table having at least a unique predetermined identity which corresponds to a sorting pointer; and

    a status pointer for representing an operational location and time;

    the method comprising;

    receiving identities of the plurality of wireless networks via wireless transmission;

    choosing a configuration table from the plurality of configuration tables according to the status pointer;

    comparing the predetermined identity of the chosen configuration table with the identities received, and if any of the plurality of identities received matches the predetermined identity, then choosing an identity according to the sorting pointer corresponding to the status pointer; and

    wirelessly connecting to the wireless network corresponding to the chosen identity, wherein a certification program is first processed, then the data being uploaded or downloaded between the terminal and the wireless network is encrypted according to the key ID which is corresponding to the wireless identity, and data being uploaded or downloaded between the terminal and the wireless network is encrypted according to the key ID corresponding to the network identity.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×