Communication apparatus
First Claim
1. A communication apparatus comprising:
- a processor; and
a memory storing computer-readable instructions therein, the computer-readable instructions, when executed by the processor, causing the communication apparatus to perform;
receiving a first wireless profile and a second wireless profile from an access point after a wireless connecting operation for establishing a wireless connection with the access point in accordance with a predetermined wireless connection scheme has been performed by a user, the first wireless profile being used in a first wireless network formed by the access point, and the second wireless profile being used in a second wireless network formed by the access point, the first wireless profile and the second wireless profile being used in each network formed by the same access point;
selecting a particular wireless profile from among the first wireless profile and the second wireless profile by comparing a security level of the first wireless profile and a security level of the second wireless profile,the particular wireless profile being;
the first wireless profile in a case where the security level of the first wireless profile is higher than the security level of the second wireless profile, andthe second wireless profile in a case where the security level of the second wireless profile is higher than the security level of the first wireless profile; and
trying to establish the wireless connection with the access point using the selected particular wireless profile,wherein the particular wireless connection scheme is a scheme for establishing the wireless connection with the access point without an identifier for authentication for establishing the wireless connection being inputted by the user to any of the communication apparatus and the access point.
1 Assignment
0 Petitions
Accused Products
Abstract
A communication apparatus may receive a first wireless profile and a second wireless profile from an access point after a wireless connecting operation for establishing a wireless connection in accordance with a predetermined wireless connection scheme has been performed, the first wireless profile being used in a first wireless network, and the second wireless profile being used in a second wireless network; may select a particular wireless profile from among the first wireless profile and the second wireless profile, the particular wireless profile being used in a wireless network having a relatively high security level among the first wireless network and the second wireless network; and may try to establish the wireless connection with the access point using the particular wireless profile. The particular wireless connection scheme may be a scheme for establishing the wireless connection without an identifier for authentication for establishing the wireless connection being inputted.
-
Citations
15 Claims
-
1. A communication apparatus comprising:
-
a processor; and a memory storing computer-readable instructions therein, the computer-readable instructions, when executed by the processor, causing the communication apparatus to perform; receiving a first wireless profile and a second wireless profile from an access point after a wireless connecting operation for establishing a wireless connection with the access point in accordance with a predetermined wireless connection scheme has been performed by a user, the first wireless profile being used in a first wireless network formed by the access point, and the second wireless profile being used in a second wireless network formed by the access point, the first wireless profile and the second wireless profile being used in each network formed by the same access point; selecting a particular wireless profile from among the first wireless profile and the second wireless profile by comparing a security level of the first wireless profile and a security level of the second wireless profile, the particular wireless profile being; the first wireless profile in a case where the security level of the first wireless profile is higher than the security level of the second wireless profile, and the second wireless profile in a case where the security level of the second wireless profile is higher than the security level of the first wireless profile; and trying to establish the wireless connection with the access point using the selected particular wireless profile, wherein the particular wireless connection scheme is a scheme for establishing the wireless connection with the access point without an identifier for authentication for establishing the wireless connection being inputted by the user to any of the communication apparatus and the access point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing computer-readable instructions for a communication apparatus,
wherein the computer-readable instructions, when executed by a processor of the communication apparatus, cause the communication apparatus to perform: -
receiving a first wireless profile and a second wireless profile from an access point after a wireless connecting operation for establishing a wireless connection with the access point in accordance with a predetermined wireless connection scheme has been performed by a user, the first wireless profile being used in a first wireless network formed by the access point, and the second wireless profile being used in a second wireless network formed by the access point, first wireless profile and the second wireless profile being used in each network formed by the same access point; selecting a particular wireless profile from among the first wireless profile and the second wireless profile by comparing a security level of the first wireless profile and a security level of the second wireless profile the particular wireless profile being; the first wireless profile in a case where the security level of the first wireless profile is higher than the security level of the second wireless profile, and the second wireless profile in a case where the security level of the second wireless profile is higher than the security level of the first wireless profile; and trying to establish the wireless connection with the access point using the particular wireless profile, wherein the particular wireless connection scheme is a scheme for establishing the wireless connection with the access point without an identifier for authentication for establishing the wireless connection being inputted by the user to any of the communication apparatus and the access point.
-
Specification