×

Method of securely pairing devices with an access point for an IP-based wireless network

  • US 8,484,457 B2
  • Filed: 03/10/2009
  • Issued: 07/09/2013
  • Est. Priority Date: 03/10/2009
  • Status: Active Grant
First Claim
Patent Images

1. A wireless router system that facilitates the installation and pairing of a wireless router to create an access point to an IP-based wireless telecommunications network, the wireless router solution comprising:

  • a wireless router comprising;

    a communication component for wirelessly communicating Internet Protocol (IP) formatted data with a remote device,wherein the remote device is configured to transmit and receive communications via a wireless connection;

    a security component coupled to the communication component for encrypting the IP-formatted data in accordance with a security key;

    a first key storage area containing a pre-determined security key that is chosen by a manufacturer of the wireless router;

    a second key storage area which is suitable for storing a user-created security key that is received from a user, andwherein the user-created security key differs from the pre-determined security key;

    a first control that allows a user to select whether the pre-determined security key or the user-created security key is used as the security key to encrypt the IP-formatted data by the security component, andwherein selection of the first control enables use of the user-created security key;

    a second control that when enabled, causes the selected security key to be transmitted to the remote device to permit the remote device to pair with the wireless router and to communicate with the wireless router in a secure fashion,wherein the first control is selected prior to selecting the second control; and

    a label associated with the wireless router that contains a passphrase that corresponds to the pre-determined security key stored in the first key storage area,wherein the passphrase allows the pre-determined security key to be generated by the remote device when the passphrase is used in a key derivation function that is executed by the remote device.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×