System and method for effecting the secure deployment of networks
First Claim
Patent Images
1. A network, comprising:
- at least one active node having access to the network;
a plurality of secondary nodes; and
a key, for storing information that is readable by the active node, wherein the key is temporarily physically connected with any one of the plurality of secondary nodes;
the active node validates the plurality of secondary nodes each time the key is physically connected with any one of the plurality of secondary nodes, and permits the any one of the plurality of secondary nodes to access the network after the key has been physically disconnected from the plurality of secondary nodes, wherein the active node and each of the plurality of secondary nodes wirelessly communicate with each other in an ad-hoc multihopping network.
14 Assignments
0 Petitions
Accused Products
Abstract
A system and method for allowing network users to securely administer and deploy network nodes (102). These networks (100) may comprise wired and/or wireless connections. Examples would include wired networks (104) with shared infrastructure in an office building, as well as ad-hoc multi-hopping peer-to-peer network applications for the home. The system and method provides a key (130) that allows new nodes (102) and thus new devices (124, 126, 132) to gain access to a network (100) via an existing node (122) of that network (100).
52 Citations
14 Claims
-
1. A network, comprising:
- at least one active node having access to the network;
a plurality of secondary nodes; and
a key, for storing information that is readable by the active node, wherein the key is temporarily physically connected with any one of the plurality of secondary nodes;
the active node validates the plurality of secondary nodes each time the key is physically connected with any one of the plurality of secondary nodes, and permits the any one of the plurality of secondary nodes to access the network after the key has been physically disconnected from the plurality of secondary nodes, wherein the active node and each of the plurality of secondary nodes wirelessly communicate with each other in an ad-hoc multihopping network. - View Dependent Claims (2, 3, 4, 5, 6)
- at least one active node having access to the network;
-
7. A method for deploying a network by a user, the method comprising:
- deploying at least one active node having access to the network;
deploying a plurality of secondary nodes;
providing a key, for storing information that is readable by the active node, and physically connecting the key with any one of the plurality of secondary nodes; and
operating the active node to validate the plurality of secondary nodes each time the key is physically connected with any one of the plurality of secondary nodes, so that the active node permits the any one of the plurality of secondary nodes to access the network system after the key has been physically disconnected from the plurality of secondary nodes, wherein the active node and the plurality of secondary nodes wirelessly communicate with each other in an ad-hoc multihopping network. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
- deploying at least one active node having access to the network;
Specification