Communication apparatus and control method
First Claim
1. A first communication apparatus comprising:
- a receiver configured to receive a connection request from a second communication apparatus to the first communication apparatus, while the first communication apparatus forms a first network using a first encryption method and;
a controller configured to request a third communication apparatus to be activated as a base station to form a second network using a second encryption method designated based on the connection request, when the second encryption method which is requested by the second communication apparatus is different from a first encryption method used.
1 Assignment
0 Petitions
Accused Products
Abstract
This invention allows connection of an apparatus with a low security level without lowering the security level of a network even when such apparatus issues a connection request. This invention is directed to an access point which makes wireless communications with a station using an encryption method (AES). Upon reception of a connection request message including information indicating an encryption method (WEP) that can be used by a station, the access point checks if the encryption method (WEP) recognized based on the received connection request message is different from the encryption method (AES). When it is determined that the two encryption methods are different, the access point launches a controller which makes wireless communications with the station using that encryption method (WEP).
29 Citations
9 Claims
-
1. A first communication apparatus comprising:
- a receiver configured to receive a connection request from a second communication apparatus to the first communication apparatus, while the first communication apparatus forms a first network using a first encryption method and;
a controller configured to request a third communication apparatus to be activated as a base station to form a second network using a second encryption method designated based on the connection request, when the second encryption method which is requested by the second communication apparatus is different from a first encryption method used. - View Dependent Claims (2, 3, 4, 5, 6, 9)
- a receiver configured to receive a connection request from a second communication apparatus to the first communication apparatus, while the first communication apparatus forms a first network using a first encryption method and;
-
7. A control method in a first communication apparatus, comprising:
- receiving a connection request from a second communication apparatus to the first communication apparatus, while the first communication apparatus forms a first network using a first encryption method; and
requesting a third communication apparatus to be activated as a base station to form a second network using a second encryption method designated based on the connection request, when the second encryption method which is requested by the second communication apparatus is different from a first encryption method.
- receiving a connection request from a second communication apparatus to the first communication apparatus, while the first communication apparatus forms a first network using a first encryption method; and
-
8. A non-transitory computer-readable storage medium storing a program which causes a computer to execute a control method, the method comprising:
-
receiving a connection request from a second communication apparatus to the first communication apparatus, while the first communication apparatus forms a first network using a first encryption method; and requesting a third communication apparatus to be activated as a base station to form a second network using a second encryption method designated based on the connection request, when the second encryption method which is requested by the second communication apparatus is different from a first encryption method.
-
Specification