Wireless security configuration
First Claim
Patent Images
1. A computer-implemented method to connect a first device wirelessly to a network comprising:
- at the first device, capturing coded information, wherein the coded information includes a security key and an identifier to connect to a wireless access point hidden from being seen during scanning for available wireless access points, wherein the coded information is at least one of an image, an audio clip, and a video, and wherein the at least one of an image, and audio clip, and a video, is steganographically encoded using a steganographic algorithm that hides the security key and the identifier within the coded information such that the coded information must be decoded using a corresponding steganographic decoding algorithm in order to recover the security key and the identifier;
decoding the coded information by applying the corresponding steganographic decoding algorithm to recover the security key and the identifier; and
using the recovered security key and the recovered identifier to connect the first device to the hidden wireless access point.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, method and computer-readable storage medium to efficiently connect to wireless access point(s). An electronic device may capture coded information. The coded information may include a security key to connect to a wireless access point, and the coded information may be an image, an audio clip, text, or a video. The coded information may be steganographically encoded. The coded information may be captured from a display of a second electronic device. The second electronic device may include the wireless access point.
18 Citations
17 Claims
-
1. A computer-implemented method to connect a first device wirelessly to a network comprising:
-
at the first device, capturing coded information, wherein the coded information includes a security key and an identifier to connect to a wireless access point hidden from being seen during scanning for available wireless access points, wherein the coded information is at least one of an image, an audio clip, and a video, and wherein the at least one of an image, and audio clip, and a video, is steganographically encoded using a steganographic algorithm that hides the security key and the identifier within the coded information such that the coded information must be decoded using a corresponding steganographic decoding algorithm in order to recover the security key and the identifier; decoding the coded information by applying the corresponding steganographic decoding algorithm to recover the security key and the identifier; and using the recovered security key and the recovered identifier to connect the first device to the hidden wireless access point. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method comprising:
-
coding information including a security key and an identifier, wherein the identifier is required to locate a wireless access point hidden from being seen during scanning for available wireless access points, the security key is required to connect to the hidden wireless access point and the coded information is at least one of an image, an audio clip, and a video, and wherein the coding is performed using a steganographic algorithm that hides the security key and the identifier within the coded information such that the coded information must be decoded using a corresponding steganographic decoding algorithm in order to recover the security key and the identifier; and at least one of a) displaying the coded information on a display of an electronic device and b) playing the coded information via at least an audio speaker of the electronic device, wherein the coded information is decoded by applying the corresponding steganographic decoding algorithm to recover the security key and the identifier, and the recovered security key and the recovered identifier are used to connect to the hidden wireless access point.
-
-
8. An apparatus comprising:
-
at least one of a camera and a microphone to capture coded information, wherein the coded information includes a security key and an identifier to connect to a wireless access point hidden from being seen during scanning for available wireless access points, and the coded information is at least one of an image, an audio clip, and a video, and wherein the at least one of an image, an audio clip, and a video is steganographically encoded using a steganographic algorithm that hides the security key and the identifier within the coded information such that the coded information must be decoded using a corresponding steganographic decoding algorithm in order to recover the security key and the identifier; a processor for executing computer instructions, the processor configured to; decode the coded information by applying the corresponding steganographic decoding algorithm to recover the security key and the identifier, and use the recovered security key and the recovered identifier to connect to the hidden wireless access point. - View Dependent Claims (9, 10, 11, 12)
-
-
13. An apparatus comprising:
-
a processor for executing computer instructions, the processor configured to code information including a security key and an identifier, wherein the security key and the identifier are required to connect to a wireless access point hidden from being seen during scanning for available wireless access points, and the coded information is at least one of an image, an audio clip, and a video, and wherein the at least one of an image, an audio clip, and a video is steganographically encoded using a steganographic algorithm that hides the security key and the identifier within the coded information such that the coded information must be decoded using a corresponding steganographic decoding algorithm in order to recover the security key and the identifier; and at least one of a) a display to display the coded information and b) at least an audio speaker to play the coded information, wherein the coded information is decoded by applying the corresponding steganographic decoding algorithm to recover the security key and the identifier, and the recovered security key and the recovered identifier are used to connect to the hidden wireless access point.
-
-
14. A non-transitory computer-readable medium storing computer executable instructions which, when executed, implement operations comprising:
-
capturing coded information, wherein the coded information includes a security key and an identifier to connect to a wireless access point hidden from being seen during scanning for available wireless access points, and the coded information is at least one of an image, an audio clip, and a video, and wherein the at least one of an image, an audio clip, and a video is steganographically encoded using a steganographic algorithm that hides the security key and the identifier within the coded information such that the coded information must be decoded using a corresponding steganographic decoding algorithm in order to recover the security key and the identifier; decoding the coded information by applying the corresponding steganographic decoding algorithm to recover the security key and the identifier; and using the recovered security key and the recovered identifier to connect a device to the hidden wireless access point. - View Dependent Claims (15, 16, 17)
-
Specification