Integration of home security into existing infrastructure
First Claim
Patent Images
1. A method for administering access to a wireless network, comprising:
- detecting a connective proximity of a mobile device being carried by a first person to a wireless network access point device operating at a secure location of a second person;
determining that the mobile device is an authorized device in response to determining that the mobile device has a threshold number of contacts or friends that are in common with a contact list or a social media list for the second person;
determining that the first person is not an intruder to the secure location in response to determining that the mobile device is an authorized device;
connecting the authorized device to the network;
causing the connection of the authorized device to the network to be provided to the second person as a first output status that indicates that the first person is not an intruder to the secure location;
determining that the mobile device is an unauthorized device in response to determining that the mobile device has a threshold number of contacts or friends that are blocked by the second person for the contact list or the social media list;
determining that the first person is an intruder to the secure location in response to determining that the mobile device is an unauthorized device;
detecting an attempt by the unauthorized device to connect to the network; and
causing the attempt by the unauthorized device to connect to the network to be provided to the second person as a second output status that indicates that the first person is an intruder to the secure location.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments relate to administering access to a wireless network by detecting a connective proximity of a device to the network, determining that the device is an authorized device based on information, connecting the authorized device to the network, and causing the connection of the authorized device to the network to be provided as an output status.
-
Citations
20 Claims
-
1. A method for administering access to a wireless network, comprising:
-
detecting a connective proximity of a mobile device being carried by a first person to a wireless network access point device operating at a secure location of a second person; determining that the mobile device is an authorized device in response to determining that the mobile device has a threshold number of contacts or friends that are in common with a contact list or a social media list for the second person; determining that the first person is not an intruder to the secure location in response to determining that the mobile device is an authorized device; connecting the authorized device to the network; causing the connection of the authorized device to the network to be provided to the second person as a first output status that indicates that the first person is not an intruder to the secure location; determining that the mobile device is an unauthorized device in response to determining that the mobile device has a threshold number of contacts or friends that are blocked by the second person for the contact list or the social media list; determining that the first person is an intruder to the secure location in response to determining that the mobile device is an unauthorized device; detecting an attempt by the unauthorized device to connect to the network; and causing the attempt by the unauthorized device to connect to the network to be provided to the second person as a second output status that indicates that the first person is an intruder to the secure location. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product comprising:
a non-transitory computer readable storage medium having program code embodied therewith for administering access to a wireless network, the program code executable by a processing device to; detect a connective proximity of a mobile device being carried by a first person to a wireless network access point device operating at a secure location of a second person; determine that the mobile device is an authorized device in response to determining that the mobile device has a threshold number of contacts or friends that are in common with a contact list or a social media list for the second person; determine that the first person is not an intruder to the secure location in response to determining that the mobile device is an authorized device; connect the authorized device to the network; cause the connection of the authorized device to the network to be provided to the second person as a first output status that indicates that the first person is not an intruder to the secure location; determine that the mobile device is an unauthorized device in response to determining that the mobile device has a threshold number of contacts or friends that are blocked by the second person for the contact list or the social media list; determine that the mobile device is an unauthorized device; detect an attempt by the unauthorized device to connect to the network; and cause the attempt by the unauthorized device to connect to the network to be provided to the second person as a second output status that indicates that the first person is an intruder to the secure location. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. An apparatus comprising:
-
at least one processor; and memory having instructions stored thereon that, when executed by the at least one processor, cause the apparatus to; detect a connective proximity of a mobile device being carried by a first person to a wireless network access point device operating at a secure location of a second person; determine that the mobile device is an authorized device in response to determining that the mobile device has a threshold number of contacts or friends that are in common with a contact list or a social media list for the second person determine that the first person is not an intruder to the secure location in response to determining that the mobile device is an authorized device; connect the authorized device to the network; cause the connection of the authorized device to the network to be provided to the second person as an output status that indicates that the first person is not an intruder to the secure location; determine that the mobile device is an unauthorized device in response to determining that the mobile device does not have the threshold number of contacts or friends that are in common with the contact list or the social media list; determine that the mobile device is an unauthorized device; detect an attempt by the unauthorized device to connect to the network; and cause the attempt by the unauthorized device to connect to the network to be provided to the second person as a second output status that indicates that the first person is an intruder to the secure location. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification