Wireless network system
First Claim
Patent Images
1. A method of granting network access to a wireless computing device, said method comprising the steps of:
- receiving data encrypted using predetermined encryption key data from a wireless computing device via a wireless connection;
said encryption key data corresponds to a predetermined user class; and
assigning an Internet protocol (IP) address to said wireless computing device that is indicative of said predetermined user class, based upon said encryption key data.
2 Assignments
0 Petitions
Accused Products
Abstract
A wireless network system provides for a wireless access point. The wireless access point is configured to receive data, from a wireless computing device, that is encrypted using encryption key data and to determine if the encryption key data corresponds to a home computing device or a visitor computing device. An IP address is assigned to the wireless computing device to identify it on the network system. The IP address is assigned based upon the encryption key data.
-
Citations
24 Claims
-
1. A method of granting network access to a wireless computing device, said method comprising the steps of:
-
receiving data encrypted using predetermined encryption key data from a wireless computing device via a wireless connection; said encryption key data corresponds to a predetermined user class; and assigning an Internet protocol (IP) address to said wireless computing device that is indicative of said predetermined user class, based upon said encryption key data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
- 9. A wireless access point configured to receive data, encrypted using predetermined encryption key data that corresponds to a predetermined user class, from a wireless device and to assign an Internet Protocol (IP) address based on the predetermined encryption key data to said wireless device to identify the wireless device on a network, the IP address indicative of the predetermined user class.
-
13. A wireless access point comprising:
-
a controller; a memory; a wireless transceiver for exchanging data with a wireless computing device; a connector for connecting to a network; and wherein said controller is configured to receive data, encrypted using predetermined encryption key data that corresponds to a predetermined user class, from said wireless computing device and to assign an Internet Protocol (IP) address to said wireless computing device based on the predetermined encryption key data to identify said wireless computing device on said network, the IP address indicative of the predetermined user class. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method of granting network access to a wireless computing device, said method comprising the steps of:
-
receiving data encrypted using predetermined encryption key data from a wireless computing device via a wireless connection; determining whether the encryption key data is a visitor encryption key or a home encryption key; and assigning an Internet protocol (IP) address to said wireless computing device based upon said encryption key data, wherein assigning the IP address comprises assigning a visitor IP address to the wireless computing device in response to determining that the encryption key data is a visitor encryption key, and wherein assigning the IP address comprises assigning a home IP address to the wireless computing device in response to determining that the encryption key data is a home encryption key. - View Dependent Claims (20)
-
-
21. A wireless access point configured to receive data, encrypted using predetermined encryption key data, from a wireless device and to assign an Internet Protocol (IP) address based on the predetermined encryption key data to said wireless device to identify the wireless device on a network, the wireless access point further configured to:
-
determine whether the encryption key data is a visitor encryption key or a home encryption key, wherein the assigned IP address is a visitor IP address in response to the encryption key data being a visitor encryption key, and wherein the assigned IP address is a home IP address in response to the encryption key data being a home encryption key.
-
-
22. A wireless access point comprising:
-
a controller; a memory; a wireless transceiver for exchanging data with a wireless computing device; a connector for connecting to a network; and wherein said controller is configured to receive data, encrypted using predetermined encryption key data, from said wireless computing device and to assign an Internet Protocol (IP) address to said wireless computing device based on the predetermined encryption key data to identify said wireless computing device on said network, wherein the controller is configured to further; determine whether the encryption key data is a visitor encryption key or a home encryption key, wherein the assigned IP address is a visitor IP address in response to the encryption key data being a visitor encryption key, and wherein the assigned IP address is a home IP address in response to the encryption key data being a home encryption key.
-
-
23. A computer-readable medium containing instructions that when executed cause a system to:
-
receive, from a wireless computing device, data encrypted using encryption key data; determine whether the encryption key data is a visitor encryption key or a home encryption key; in response to determining that the encryption key data is a visitor encryption key, assign a visitor Internet Protocol (IP) address to the wireless computing device; and in response to determining that the encryption key data is a home encryption key, assign a home IP address to the wireless computing device, the home IP address being different from the visitor IP address. - View Dependent Claims (24)
-
Specification