System and method for filtering access points presented to a user and locking onto an access point
First Claim
1. A method for connecting to an access point by a mobile computing device, the method comprising:
- determining all available access points for a present location of the mobile computing device;
filtering out access points of the all available access points that do not comply with a predetermined security policy;
making available for connection to the mobile computing device only those access points of the determined said all available access points that comply with the predetermined security policy;
determining a signal profile for at least two of the only those access points that comply with the predetermined security policy;
connecting the mobile computing device to one access point selected from the only those access points that said comply with the predetermined security policy and having a most desirable profile of the at least two determined signal profiles;
locking a computing connection between the mobile computing device and the one access point, wherein said locking is performed by changing an appearance of competing access points; and
maintaining the computing connection as the mobile computing device moves from the present location despite another access point having a presently stronger strength of signal.
8 Assignments
0 Petitions
Accused Products
Abstract
The present invention filters access points presented to a user and locks onto an access point. The present invention includes an access point filtering unit and an access point locking unit. The access point filtering unit determines the access points that are accessible by a client device and then filters them to present only the access points that are acceptable to under a security policy in force. The access point locking unit has a plurality of operating modes and can lock onto a user selected access point, a security policy prescribed access point, or the access point with the best signal profile. The present invention also includes several methods such as: a method for filtering access points for presentation to the user, a method for locking onto an access point selected by the user, a method for locking onto an access point with the best signal profile, and a method for locking onto an access point prescribed by a security policy for a given location.
-
Citations
18 Claims
-
1. A method for connecting to an access point by a mobile computing device, the method comprising:
-
determining all available access points for a present location of the mobile computing device; filtering out access points of the all available access points that do not comply with a predetermined security policy; making available for connection to the mobile computing device only those access points of the determined said all available access points that comply with the predetermined security policy; determining a signal profile for at least two of the only those access points that comply with the predetermined security policy; connecting the mobile computing device to one access point selected from the only those access points that said comply with the predetermined security policy and having a most desirable profile of the at least two determined signal profiles; locking a computing connection between the mobile computing device and the one access point, wherein said locking is performed by changing an appearance of competing access points; and maintaining the computing connection as the mobile computing device moves from the present location despite another access point having a presently stronger strength of signal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for connecting to an access point by a mobile computing device, the method comprising:
-
by a computing device other than the mobile computing device, determining all available access points for a present location of the mobile computing device; by the computing device other than the mobile computing device, filtering the all available access points for the present location to a subset group of permitted access points for the present location that the mobile computing device may be connected to, wherein the filtering comprises filtering out access points of the all available access points that are not permitted access points; providing only the subset group of permitted access points from the computing device to the mobile computing device; determining a signal profile for at least two access points of the subset group of permitted access points; connecting the mobile computing device to one access point from the subset group of permitted access points having a most desirable profile of the at least two determined signal profiles; and locking a computing connection between the mobile computing device and the one access point, wherein said locking is performed by changing an appearance of competing access points. - View Dependent Claims (11, 12, 13)
-
-
14. A mobile computing device comprising one or more processors, and a non-transitory computer readable memory operatively connected to each other, the memory storing instructions for the one or more processors for:
-
determining a present location of the mobile computing device; determining a security policy for the mobile computing device; enforcing the security policy on the mobile computing device based on the present location; determining all accessible access points that are accessible by the mobile computing device; without a user'"'"'s intervention, filtering out access points of the all accessible access points that do not comply with the security policy for the mobile computing device; making available to the user for connecting the mobile computing device only those access points of the all accessible access points that comply with the security policy of the mobile computing device; determining a signal profile for at least two of the only those access points that comply with the security policy; connecting the mobile computing device to one access point selected from the only those access points that comply with the security policy and having a most desirable profile of the at least two determined signal profiles; and locking a computing connection between the mobile computing device and the one access point, wherein said locking is performed by changing an appearance of competing access points. - View Dependent Claims (15)
-
-
16. A mobile computing device comprising one or more processors, and a non-transitory computer readable memory operatively connected to each other, the memory storing instructions for the one or more processors for:
-
determining a present location of the mobile computing device; enforcing a predetermined security policy on the mobile computing device based on the present location, wherein enforcing the predetermined security policy comprises filtering out access points that do not comply with the predetermined security policy; determining a signal profile for at least two of the only available access points complying with the predetermined security policy; connecting the mobile computing device to one access point selected from the only available access points complying with the predetermined security policy and having a most desirable profile of the at least two determined signal profiles; and locking communication between the mobile computing device and one access point of only available access points complying with the predetermined security policy so that the mobile computing device will not connect to another access point of the only available access points complying with the predetermined security policy having a presently stronger signal strength, wherein said locking is performed by changing an appearance of competing access points. - View Dependent Claims (17, 18)
-
Specification