System and method of configuring a network
First Claim
Patent Images
1. A computer-implemented method executable by a processor in a computing device, the method comprising:
- installing a software program on the computing device, the software program to provide access to a network;
detecting, during installation of the software program, a router coupled to the computing device;
determining a model number of the router;
determining whether the router includes a wireless communication capability by comparing the model number of the router to router model numbers stored in a database;
when the router includes the wireless communication capability, providing a router security setting configuration option;
receiving security settings of the router including a router configuration password, a network access key, and a level of data encryption of the router;
determining a threshold security level specified by a service provider of the network;
determining whether a security level of the router satisfies the threshold security level based on the security settings of the router;
when the security level of the router does not satisfy the threshold security level, automatically modifying the security level of the router to satisfy the threshold security level; and
transmitting a message indicating the security level of the router to the service provider of the network.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for configuring a network are provided. A method may include monitoring properties of a connection between a computing device and a network. The method may also include detecting a change in the properties of the connection. The method may also include verifying the connection to the network is provided by a service provider when the change in the properties is detected and providing network configuration options based on the change.
-
Citations
16 Claims
-
1. A computer-implemented method executable by a processor in a computing device, the method comprising:
-
installing a software program on the computing device, the software program to provide access to a network; detecting, during installation of the software program, a router coupled to the computing device; determining a model number of the router; determining whether the router includes a wireless communication capability by comparing the model number of the router to router model numbers stored in a database; when the router includes the wireless communication capability, providing a router security setting configuration option; receiving security settings of the router including a router configuration password, a network access key, and a level of data encryption of the router; determining a threshold security level specified by a service provider of the network; determining whether a security level of the router satisfies the threshold security level based on the security settings of the router; when the security level of the router does not satisfy the threshold security level, automatically modifying the security level of the router to satisfy the threshold security level; and transmitting a message indicating the security level of the router to the service provider of the network. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method comprising:
-
monitoring properties of a connection between a computing device and a network in real-time; detecting a change in a security level of a router coupled to the computing device; determining a model number of the router; determining whether the router includes a wireless communication capability by comparing the model number of the router to router model numbers stored in a database; when the router includes the wireless communication capability, providing a router security setting configuration option; receiving security settings of the router including a router configuration password, a network access key, and a level of data encryption of the router; determining a threshold security level specified by a service provider of the network; determining whether the security level of the router satisfies the threshold security level based on the security settings of the router; when the security level of the router does not satisfy the threshold security level, automatically modifying the security level of the router to satisfy the threshold security level; and transmitting a message indicating the security level of the router to a service provider of the network. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A system comprising:
-
a transceiver; a processor coupled to the transceiver; and a memory accessible to the processor, the memory including instructions executable by the processor to; determine a model number of a wireless router that is located between the transceiver and a network; determine a security capability of the wireless router by comparing the model number of the wireless router to router model numbers stored in a database; monitor properties of a connection between the transceiver and the network in real-time; detect a change in a security level of the wireless router; in response to detecting the change in the security level of the wireless router, provide a router security setting configuration option based on the security capability of the wireless router; receive security settings for the wireless router including a router configuration password, a network access key, and a level of data encryption of the router; determine a threshold security level specified by a service provider of the network; determine whether the security level of the wireless router satisfies the threshold security level based on the security settings; when the security level of the wireless router does not satisfy the threshold security level, automatically increase the security level of the wireless router to satisfy the threshold security level; and transmit a message indicating the security level of the router to the service provider of the network. - View Dependent Claims (13)
-
-
14. A non-transitory computer-readable medium having operational instructions that, when executed by a processor, cause the processor to:
-
install a software program on a computing device, the software program to provide access to a network; detect, during installation of the software program, a router coupled to the computing device; determine a model number of the router; determine whether the router includes a wireless communication capability by comparing the model number of the router to router model numbers stored in a database; when the router includes the wireless communication capability, provide a router security setting configuration option; receive security settings of the router including a router configuration password, a network access key, and a level of data encryption of the router; determine a threshold security level specified by a service provider of the network; determine whether a security level of the router satisfies the threshold security level based on the security settings of the router; when the security level of the router is below the threshold security level, automatically modifying the security level of the router to satisfy the threshold security level; and transmit a message indicating the security level of the router to the service provider of the network. - View Dependent Claims (15, 16)
-
Specification