Audible authentication for wireless network registration
A technology of wireless network, wireless device, applied in the field of audible authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0012] Described herein is one or more techniques for registering on a secure wireless network using audible authentication of a wireless device. With one or more of the described techniques, an unauthorized wireless device audibly transmits a unique identifier code (eg, a personal identification number or PIN). In some implementations, the audible code is heard by the user and entered manually via the web registration user interface. In other implementations, a network authorization device (eg, a wireless access point) automatically captures the audible code and verifies the code. If the code is verified, the wireless device is registered to the secure wireless network.
[0013] The technology operates as part of, and enhances the usability of, existing and future user-friendly, interoperable, secure network registration schemes for wireless local area networks (WLANs). An example of an existing solution suitable for use with one or more of the implementations described her...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 