Method and equipment for accessing a telecommunication network
First Claim
Patent Images
1. A method, comprising:
- storing information sets describing settings used to access wireless local area networks and their security settings in a terminal;
wherein the security settings comprise at least a one of key length, key mode, default key or information on one or more keys for authentication and/or encryption;
scanning for information related to names of available wireless local area networks using the at least one terminal;
determining available information sets by comparing the information related to names of available wireless local area networks to the stored information sets; and
accessing at least one wireless local area network based on settings described in an available information set, andwherein the storing stores network names of wireless local area networks associated with the stored information sets, the scanning sends network identity requests and searches for network identity responses, and the determining available information sets determines the available information sets by comparing the stored network names to the scanned information related to names of available wireless local area networks.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for accessing a network in a telecommunication system which comprises at least one terminal and a plurality of networks in which information sets describing settings needed to access networks and their resources are stored in the terminal. The terminal scans for information about available networks. Available information sets are determined by comparing the information about available networks to the stored information sets. At least one network is accessed based on the settings defined in the available information sets.
-
Citations
20 Claims
-
1. A method, comprising:
-
storing information sets describing settings used to access wireless local area networks and their security settings in a terminal; wherein the security settings comprise at least a one of key length, key mode, default key or information on one or more keys for authentication and/or encryption; scanning for information related to names of available wireless local area networks using the at least one terminal; determining available information sets by comparing the information related to names of available wireless local area networks to the stored information sets; and accessing at least one wireless local area network based on settings described in an available information set, and wherein the storing stores network names of wireless local area networks associated with the stored information sets, the scanning sends network identity requests and searches for network identity responses, and the determining available information sets determines the available information sets by comparing the stored network names to the scanned information related to names of available wireless local area networks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code; said at least one memory and said computer program code configured to, with said at least one processor, cause said apparatus to perform at least the following; store information sets relating to settings used to access wireless local area networks and their security settings, including information relating to names of the wireless local area networks, wherein the security settings comprise at least one of key length, key mode, default key or information on one or more keys for authentication and/or encryption; and scan information related to identifying names of available wireless local area networks at least by sending network identity requests and searching for network identity responses; determine available information sets by comparing the information related to names of the available wireless networks to information sets stored in the memory and by comparing the stored network names to the scanned information identifying the names of the available wireless local area networks; and arrange access to at least one wireless local area network based on settings described in one or more of the available information sets. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transistory computer readable memory comprising a computer program code which, when executed by an apparatus including a processor and a memory, is configured to cause the apparatus to
store information sets relating to settings used to access wireless local area networks and their security settings, including information relating to names of the wireless local area networks, wherein the security settings comprise at least one of key length, key mode, default key or information on one or more keys for authentication and/or encryption; - and
scan information related to identifying names of available wireless local area networks at least by sending network identity requests and searching for network identity responses; determine available information sets by comparing the information related to names of the available wireless networks to information sets stored in the memory and by comparing the stored network names to the scanned information identifying the names of the available wireless local area networks; and arrange access to at least one wireless local area network based on settings described in one or more of the available information sets. - View Dependent Claims (18, 19, 20)
- and
Specification