Technique for managing wireless networks
First Claim
Patent Images
1. A method for managing network connectivity on a device, the method being performed by a processor of the device and comprising:
- performing a general scan to determine an identifier of each network that is available at a given location, wherein determining the identifier is performed without attempting to connect to any available network at the given location;
determining which of the networks that are available at the given location are known to the device by comparing each determined identifier to a list of known identifiers of networks that the device has previously connected to; and
determining one or more hidden networks protected by security features that are known to the device by (i) identifying one or more known identifiers from the list that did not match the determined identifiers from the general scan, and (ii) performing an additional operation using the one or more known identifiers that were not determined from the general scan to detect the one or more hidden networks.
5 Assignments
0 Petitions
Accused Products
Abstract
Network connectivity may be managed on a computing device. An identifier of each wireless access point or network that is available at a given location is determined. The identifier determined without the device attempting to connect to any available wireless access point or network at the given location. Each determined identifier is compared to one or more network identifiers that are known to the device. The device connects to an available wireless access point having the identifier that is known and detected.
47 Citations
17 Claims
-
1. A method for managing network connectivity on a device, the method being performed by a processor of the device and comprising:
-
performing a general scan to determine an identifier of each network that is available at a given location, wherein determining the identifier is performed without attempting to connect to any available network at the given location; determining which of the networks that are available at the given location are known to the device by comparing each determined identifier to a list of known identifiers of networks that the device has previously connected to; and determining one or more hidden networks protected by security features that are known to the device by (i) identifying one or more known identifiers from the list that did not match the determined identifiers from the general scan, and (ii) performing an additional operation using the one or more known identifiers that were not determined from the general scan to detect the one or more hidden networks. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for managing network connectivity on a device, the method being performed by a processor of the device and comprising:
-
performing a general scan to determine an identifier of each network that is available at a given location, wherein determining the identifier is performed without attempting to connect to any available network at the given location; determining which of the networks that are available at the given location are known to the device by comparing each determined identifier to a list of known identifiers of networks that the device has previously connected to; determining one or more hidden networks protected by security features that are known to the device by (i) identifying one or more known identifiers from the list that did not match the determined identifiers from the general scan, and (ii) performing an additional operation using the one or more known identifiers that were not determined from the general scan to detect the one or more hidden networks; and enabling a user to select a network from one of the available networks or the one or more hidden networks protected by security features. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computing device comprising:
-
a display; a wireless communication port; and a processor configured to; perform a general scan to determine an identifier of each network that is available at a given location, wherein determining the identifier is performed without attempting to connect to any available network at the given location; and determine which of the networks that are available at the given location are known to the device by comparing each determined identifier to a list of known identifiers of networks that the device has previously connected to; and determine one or more hidden networks protected by security features that are known to the device by (i) identifying one or more known identifiers from the list that did not match the determined identifiers from the general scan, and (ii) performing an additional operation using the one or more known identifiers that were not determined from the general scan to detect the one or more hidden networks. - View Dependent Claims (14, 15, 16, 17)
-
Specification