Unlock instant, AI-driven research and patent intelligence for your innovation.

Audible authentication for wireless network registration

A technology of wireless network, wireless device, applied in the field of audible authentication

Inactive Publication Date: 2015-09-23
INTEL CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, the normal process still requires users to perform important manual steps

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Audible authentication for wireless network registration
  • Audible authentication for wireless network registration
  • Audible authentication for wireless network registration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Described herein is one or more techniques for registering on a secure wireless network using audible authentication of a wireless device. With one or more of the described techniques, an unauthorized wireless device audibly transmits a unique identifier code (eg, a personal identification number or PIN). In some implementations, the audible code is heard by the user and entered manually via the web registration user interface. In other implementations, a network authorization device (eg, a wireless access point) automatically captures the audible code and verifies the code. If the code is verified, the wireless device is registered to the secure wireless network.

[0013] The technology operates as part of, and enhances the usability of, existing and future user-friendly, interoperable, secure network registration schemes for wireless local area networks (WLANs). An example of an existing solution suitable for use with one or more of the implementations described her...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An audible authentication of a wireless device for enrollment onto a secure wireless network includes an unauthorized wireless device that audibly emits a uniquely identifying secret code (e.g., a personal identification number (PIN)). In some implementations, the audible code is heard by the user and manually entered via a network-enrollment user interface. In other implementations, a network-authorizing device automatically picks up the audible code and verifies the code. If verified, the wireless device is enrolled onto the wireless network.

Description

technical field [0001] The present invention relates to audible authentication for wireless network registration. Background technique [0002] Wireless local area networks (WLANs) are becoming ubiquitous, and not just by personal computers. There is an emerging trend for consumer devices to become wireless and connect to WLANs. As wireless connectivity and availability increases with more devices and users, so does the security risk from unauthorized intruders. However, the added security countermeasures often confuse unskilled wireless users. [0003] Fortunately, some general user-friendly WLAN interoperability security schemes are available. For example, according to the Wi-Fi Alliance's certification (certification) standards (eg, Wi-Fi CERTIFIED TM ) to demonstrate that devices are interoperable (regardless of the manufacturer of the device). In addition, the Wi-Fi Alliance introduced Wi-Fi Protected Setup TM (WPS) protocol that describes how secure WLANs can be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/08
CPCG06F21/335H04L63/102H04L63/0861H04W12/06G06F2221/2129H04W12/08H04W12/50H04W12/65
Inventor M·梅莱曼斯G·A·小马茨
Owner INTEL CORP