Security setting system
a security setting and security technology, applied in the field of security setting system, can solve problems such as difficulty in providing perfect security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
first embodiment (
A. First Embodiment (Security setting system)
A-1. Security setting system Overview
A-2. Security setting process
B. Modified Embodiments
first embodiment
A. First Embodiment
A-1. Security Setting System Overview
[0018]FIG. 1 illustrates a hardware configuration that implements a security setting system according to a first embodiment of the present invention. FIG. 2 illustrates the configuration of an access point. FIG. 3 illustrates the configuration of a wireless LAN terminal. The security setting system LH1 includes wireless LAN terminals 50, 60, 70 and an access point 20. After completion of security setting, the wireless LAN terminals and access point use a common WEP key and establish wireless communication within a wireless communication area AR1 while maintaining security.
[0019]As shown in FIG. 1, the access point (wireless base station) 20, which is a wireless LAN repeater, is installed in the wireless communication area AR1. As shown in FIG. 2, the access point 20 includes a CPU 11, a ROM 12, a RAM 13, a WAN port 17, which serves as a network interface, a LAN port 22 for connecting to a wired LAN, a wireless communication int...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


