Wireless device synchronization
First Claim
Patent Images
1. A method comprising:
- establishing a default connection between a first device having a first address and a second device having a second address, wherein the default connection is a first secure connection;
exchanging identifying information between the first device and the second device; and
establishing a unique connection between the first device and the second device, wherein the unique connection is a second secure connection, and wherein establishing a unique connection between the first device and the second device comprisesforming a network identifier in the first device from a portion of the first address and a portion of the second address, wherein both the portion of the first address and the portion of the second address are not null;
forming the network identifier in the second device from the portion of the first address and the portion of the second address;
establishing a second connection between the first device and the second device wherein the second connection uses the network identifier as a second connection identifier and uses a common string as a second connection encryption code.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for wireless device synchronization is provided. A default connection is established between a first wireless device and a second wireless using default connection values. Unique address information is exchanged over the default connection. A unique connection is established between the first wireless device and the second wireless device.
-
Citations
24 Claims
-
1. A method comprising:
-
establishing a default connection between a first device having a first address and a second device having a second address, wherein the default connection is a first secure connection; exchanging identifying information between the first device and the second device; and establishing a unique connection between the first device and the second device, wherein the unique connection is a second secure connection, and wherein establishing a unique connection between the first device and the second device comprises forming a network identifier in the first device from a portion of the first address and a portion of the second address, wherein both the portion of the first address and the portion of the second address are not null; forming the network identifier in the second device from the portion of the first address and the portion of the second address; establishing a second connection between the first device and the second device wherein the second connection uses the network identifier as a second connection identifier and uses a common string as a second connection encryption code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus comprising:
-
a memory; a network adapter, the network adapter having a first address; and a processor coupled with the memory and the network adapter, the processor, in response to a user input, to set a first identifier to a first string, to set a first encryption code to a second string, and to read the first address, the processor to establish a first connection with a network device wherein the first connection uses the first string as a first connection identifier and uses the second string as a first connection encryption code, the processor to send the first address to the network device and to receive a second address from the network device, wherein the processor forms a third identifier from a portion of the first address and a portion of the second address, wherein both the portion of the first address and the portion of the second address are not null, and wherein the processor establishes a second connection with the network device, wherein the second connection uses the third identifier as a second connection identifier and uses the second string as a second connection encryption code. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A system comprising:
-
a first device comprising; a first memory; a network adapter, the network adapter having a first address; a first processor coupled with the memory and the network adapter, the first processor configured, in response to a user input, to set a first identifier to a first string, to set a first encryption code to a second string, and to store the first address in the first memory; and a second device comprising; a second memory; a network interface having a second address; a second processor coupled with the second memory and the network interface, the second processor configured, in response to a user input, to set a second identifier to the first string, to set a second encryption code to the second string, and to store the second address in the second memory;
whereinthe first processor and the second processor are configured to establish a first connection between the first device and the second device wherein the first connection uses the first string as a first connection identifier and uses the second string as a first connection encryption code, wherein the first address is transferred from the first device to the second device and the second address is transferred from the second device to the first device, wherein a third identifier is formed in the first device and in the second device from a portion of the first address and a portion of the second address, wherein both the portion of the first address and the portion of the second address are not null, and wherein the first processor and the second processor are further configured to establish a second connection between the first device and the second device wherein the second connection uses the third identifier as a second connection identifier and the second string as a second connection encryption code. - View Dependent Claims (18, 19, 20)
-
-
21. A machine-readable storage medium on a client having instructions stored thereon, which when executed by a processor cause the processor to perform a method, the method comprising:
-
reading a first address; setting a first identifier to a first string, setting a first encryption code to a second string, and establishing a first connection with a server wherein the first connection uses the first string as a first connection identifier and uses the second string as a first connection encryption code; sending the first address to the server; receiving a second address from the server; forming a third identifier in the client from a portion of the first address and a portion of the second address, wherein both the portion of the first address and the portion of the second address are not null; establishing a second connection with the server wherein the second connection uses the third identifier as a second connection identifier and uses the second string as a second connection encryption code.
-
-
22. A machine-readable storage medium on a server having instructions stored thereon, which when executed by a processor cause the processor to perform a method, the method comprising:
-
reading a first address; setting a first identifier to a first string; setting a first encryption code to a second string; establishing a first connection with a client wherein the first connection uses the first string as a first connection identifier and uses the second string as a first connection encryption code; sending the first address to the client; receiving a second address from the client; forming a third identifier in the server from a portion of the first address and a portion of the second address, wherein both the portion of the first address and the portion of the second address are not null; and establishing a second connection with the client wherein the second connection uses the third identifier as a second connection identifier and uses the second string as a second connection encryption code.
-
-
23. A system comprising:
-
means for establishing a first secure connection between a first device and a second device in the absence of information which identifies the first device or the second device; means for exchanging identifying information between the first device and the second device; and means for establishing a second secure connection between the first device and the second device, wherein the second secure connection is a unique connection, and wherein establishing a second secure connection between the first device and the second device comprises forming a network identifier in the first device from a portion of the first identifying information and a portion of the second identifying information, wherein both the portion of the first identifying information and the portion of the second identifying information are not null; forming the network identifier in the second device from the portion of the first identifying information and a portion of the second identifying information; establishing a second connection between the first device and the second device wherein the second connection uses the network identifier as a second connection identifier and uses a common string as a second connection encryption code.
-
-
24. A system comprising:
-
in a first device having a first address; means for setting a first identifier to a first string, means for setting a first encryption code to a second string, and in a second device having a second address; means for setting a second identifier to the first string, means for setting a second encryption code to the second string, and means for establishing a first connection between the first device and the second device wherein the first connection uses the first string as a first connection identifier and uses the second string as a first connection encryption code; means for transferring the first address from the first device to the second device; means for transferring the second address from the second device to the first device; means for forming a third identifier in the first device from a portion of the first address and a portion of the second address, wherein both the portion of the first address and the portion of the second address are not null; means for forming the third identifier in the second device from the portion of the first address and the portion of the second address; means for establishing a second connection between the first device and the second device wherein the second connection uses the third identifier as a second connection identifier and uses the second string as a second connection encryption code.
-
Specification