System and method of configuring a network
First Claim
Patent Images
1. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor, cause the processor to:
- detect, during installation of a software program on a computing device, a router coupled to the computing device, wherein the software program is executable by the computing device to initiate a connection to a network provided by an internet service provider via the router based on a security level of the router;
receive security settings of the router including a router configuration password, a network access key, and a level of data encryption of the router;
detect whether the security level of the router satisfies a threshold security level specified by the internet service provider based on the security settings of the router;
in response to the security level of the router not satisfying the threshold security level, modify the security level of the router to satisfy the threshold security level;
monitor one or more properties of the connection; and
in response to detection of a change in the one or more properties, determine whether the router is connected to a different service provider than the service provider.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for configuring a network are described. A method may include detecting, during installation of a software program on a computing device, a router coupled to the computing device. The software program may be executable by a processor to selectively initiate a connection to a network via the router based on a security level of the router The method may also include modifying the security level of the router to satisfy a threshold security level. The threshold security level may be specified by a service provider of the network.
-
Citations
20 Claims
-
1. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor, cause the processor to:
-
detect, during installation of a software program on a computing device, a router coupled to the computing device, wherein the software program is executable by the computing device to initiate a connection to a network provided by an internet service provider via the router based on a security level of the router; receive security settings of the router including a router configuration password, a network access key, and a level of data encryption of the router; detect whether the security level of the router satisfies a threshold security level specified by the internet service provider based on the security settings of the router; in response to the security level of the router not satisfying the threshold security level, modify the security level of the router to satisfy the threshold security level; monitor one or more properties of the connection; and in response to detection of a change in the one or more properties, determine whether the router is connected to a different service provider than the service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 19, 20)
-
-
9. A method comprising:
-
detecting, at a processor during installation of a software program on a computing device, a router coupled to the computing device, wherein the software program is executable by a processor to selectively initiate a connection to a network provided by an internet service provider via the router based on a security level of the router; receiving security settings of the router including a router configuration password, a network access key, and a level of data encryption of the router; detecting whether the security level of the router satisfies a threshold security level specified by the internet service provider based on the security settings of the router; in response to the security level of the router not satisfying the threshold security level, modifying the security level of the router to satisfy the threshold security level; monitoring one or more properties of the connection; in response to detection of a change in the one or more properties, determining whether the router is connected to a different service provider than the service provider; and in response to determining that the router is connected to the different service provider, notifying a user. - View Dependent Claims (10, 11, 12)
-
-
13. A system comprising:
-
a transceiver; a processor coupled to the transceiver; and a memory accessible to the processor, the memory including instructions executable by the processor to; detect, during installation of a software program on a computing device, a router coupled to the computing device, wherein the software program is configured for execution by the processor to selectively initiate a connection to a network provided by an internet service provider via the router based on a security level of the router; receive security settings of the router including a router configuration password, a network access key, and a level of data encryption of the router; detect whether the security level of the router satisfies a threshold security level specified by the internet service provider based on the security settings of the router; in response to the security level of the router not satisfying the threshold security level, modify the security level of the router to satisfy a threshold security level specified by the internet service provider; and in response to a change in the security level of the router, send a router security setting configuration option to a user based on a security capability of the router, wherein the change in the security level of the router indicates that an internet protocol (IP) address of the router has switched from a public IP address to a private IP address. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification