Unlock instant, AI-driven research and patent intelligence for your innovation.

Security setting system

a security setting and security technology, applied in the field of security setting system, can solve problems such as difficulty in providing perfect security

Inactive Publication Date: 2008-07-24
BUFFALO CORP LTD
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, an attempt can be made, for instance, to wirelessly gain illegal access to a network because wireless communication can be established.
In reality, however, it is difficult to provide perfect security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security setting system
  • Security setting system
  • Security setting system

Examples

Experimental program
Comparison scheme
Effect test

first embodiment (

A. First Embodiment (Security setting system)

A-1. Security setting system Overview

A-2. Security setting process

B. Modified Embodiments

first embodiment

A. First Embodiment

A-1. Security Setting System Overview

[0018]FIG. 1 illustrates a hardware configuration that implements a security setting system according to a first embodiment of the present invention. FIG. 2 illustrates the configuration of an access point. FIG. 3 illustrates the configuration of a wireless LAN terminal. The security setting system LH1 includes wireless LAN terminals 50, 60, 70 and an access point 20. After completion of security setting, the wireless LAN terminals and access point use a common WEP key and establish wireless communication within a wireless communication area AR1 while maintaining security.

[0019]As shown in FIG. 1, the access point (wireless base station) 20, which is a wireless LAN repeater, is installed in the wireless communication area AR1. As shown in FIG. 2, the access point 20 includes a CPU 11, a ROM 12, a RAM 13, a WAN port 17, which serves as a network interface, a LAN port 22 for connecting to a wired LAN, a wireless communication int...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an access point for performing a security setting process for wireless communication with a wireless LAN terminal by means of wireless communication, the access point comprising: an access point side wireless communication unit for establishing wireless communication with the wireless LAN terminal; an access point side start instruction reception unit for receiving a start instruction; a start instruction data reception unit for receiving start instruction data through the access point side wireless communication unit; and an access point side security setting unit, which does not perform the security setting process if the start instruction data is received before the access point side start instruction reception unit receives the start instruction, and which performs the security setting process if the start instruction data is not received before the access point side start instruction reception unit receives the start instruction.

Description

CROSS-REFERENCES TO RELATED APPLICATIONS[0001]The present application claims the benefit of priority of the Japanese Patent Application No. 2005-189061, filed Jun. 28, 2005, and is a Continuation application of a prior U.S. patent application Ser. No. 11 / 198,491, filed Aug. 5, 2005, the entire disclosures of all applications are expressly incorporated by reference in their entirety herein.BACKGROUND OF THE INVENTION[0002](1) Field of the Invention[0003]The present invention relates to a technology for performing setup to provide enhanced security when wireless communication is established between a wireless LAN terminal and an access point.[0004](2) Description of Related Art[0005]Wireless LAN communication has been widespread in recent years because it provides increased user-friendliness with no limitation imposed by the use of physical wiring. However, an attempt can be made, for instance, to wirelessly gain illegal access to a network because wireless communication can be establ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00H04W12/00H04W12/02H04W12/04H04W12/08H04W24/00H04W48/02H04W84/12H04W88/08H04W92/10
CPCH04L63/1466H04L63/20H04W88/08H04W76/02H04W84/12H04W12/12H04W76/10
Inventor ISHIDOSHIRO, TAKASHI
Owner BUFFALO CORP LTD