This application claims priority of Taiwanese application no. 094138609, filed on Nov. 3, 2005.
1. Field of the Invention
This invention relates to wireless networks, more particularly to a login method for a wireless network with security settings. This invention also relates to a wireless network system with security settings.
2. Description of the Related Art
Since wireless communications schemes (such as Wi-Fi, 802.11a/b/g, etc.) commonly employed by wireless networks do not use physical transmission lines for communications, it is not possible to prevent the transmission content from being intercepted by a third party. Therefore, in order to meet the requirements of information security and confidentiality, wireless networks usually require security keys for protecting transmission content when connecting thereto. Examples of the security keys include wired-equivalent privacy (WEP) keys and Wi-Fi protected access (WPA) keys used in 802.11a/b/g. These keys are typically a long string of digits with a specific mathematical meaning (such as a prime number), and are applied for communication encryption and decryption. In other words, wireless networks with a security key protection mechanism are configured to reject access, i.e., unable to log in or correctly decode encrypted transmission content, to those users who do not have the correct key value. However, such a protection mechanism often arises in user inconvenience.
In the prior art, when the user of a wireless network device (such as a personal computer, not shown) wishes to log in to a wireless local area network, the user must manually input security settings values for the wireless local area network. Login to the wireless local area network environment is possible only when the correct service set identifier (SSID) and the correct WEP key are inputted by the user through the wireless network device. This conventional scheme, which requires users to remember a long string of digits, not only makes it difficult for users to comprehend the meaning and complexity of such protection, but also makes it hard for users to setup or remember correct keys. Therefore, many users either completely disable key settings or setup very simple keys, which arises in inadequate security protection. Moreover, different settings are required when logging in to different wireless networks, thereby resulting in added user burden.
In the prior art, users may connect a portable storage device (such as a flash memory device) to a universal serial bus (USB) port of a network device that has already been logged in to a wireless network for storing the service set identifier (SSID) and the security key data of the wireless network in the portable storage device. The portable storage device may then be connected to an electronic device that has yet to be logged in to the wireless network so as to provide the SSID and the security key data thereto for decryption. However, this conventional method is not suitable for network devices, such as wireless access points, that are not provided with USB ports or the like. Moreover, this conventional method requires frequent plugging and unplugging of the portable storage device, and increases the likelihood of misplacing the portable storage device.
Broadcom Corporation has recently introduced SecureEasySetup™ technology that involves pushing of buttons on a router and a client to transmit the service set identifier (SSID) and the security key wirelessly from the router to the client, thereby simplifying network configuration and security setup. However, the Broadcom technology requires the two devices to be located close to each other during network configuration and security setup, which is both impractical and inconvenient. Moreover, the technology is available only on products equipped with a proprietary chipset, which limits its applications.
Therefore, the main object of the present invention is to provide a login method for a wireless network with security settings, which dispenses with the need for users to remember long strings of digits, which does not require frequent plugging and unplugging of hardware devices, which can be applied to a wide range of products, and which is fast and convenient.
Another object of the present invention is to provide a wireless network system with security settings to implement the login method of this invention.
According to one aspect of the present invention, there is provided a login method for a wireless network with security settings. The login method is adapted to be implemented by a wireless network system including a first wireless network device that has already been logged in to a wireless local area network, a second wireless network device that has yet to be logged in to the wireless local area network, and a portable wireless device that is capable of two-way wireless transmission with each of the first and second wireless network devices. The login method comprises the steps of:
a) enabling the first wireless network device to output security settings data for the wireless local area network in response to a control signal received from the portable wireless device;
b) enabling the portable wireless device to store the security settings data received from the first wireless network device, and to provide the security settings data to the second wireless network device in response to user manipulation of the portable wireless device; and
c) enabling the second wireless network device to perform security setup with reference to the security settings data received from the portable wireless device, and to log in to the wireless local area network thereafter.
According to another aspect of the present invention, there is provided a login method for a wireless network with security settings. The login method is adapted to be implemented by a wireless network system including a wireless local area network, a wireless network device that has yet to be logged in to the wireless local area network, and a portable wireless device that is capable of two-way wireless transmission with the wireless network device. The login method comprises the steps of:
a) providing security settings data for the wireless local area network in the portable wireless device, and enabling the portable wireless device to provide the security settings data to the wireless network device in response to user manipulation of the portable wireless device; and
b) enabling the wireless network device to decrypt the security settings data received from the portable wireless device, and to log in to the wireless local area network thereafter.
According to yet another aspect of the present invention, there is provided a wireless network system that has security settings, and that comprises a wireless local area network and a portable wireless device. The wireless local area network includes a wireless access point adapted to be connected to a network interface, and a first wireless network device connected to the wireless access point and capable of generating security settings data for the wireless local area network. The portable wireless device is capable of two-way transmission of wireless signals with the first wireless network device. The wireless network system further comprises a second wireless network device that is capable of two-way transmission of wireless signals with the first wireless network device and the portable wireless device. The portable wireless device is operable so as to issue a control signal to the first wireless network device such that the first wireless network device transmits the security settings data to the portable wireless device in response to the control signal from the portable wireless device. The portable wireless device is further operable so as to store the security settings data received from the first wireless network device, and so as to transmit the security settings data to the second wireless network device in response to user manipulation of the portable wireless device. The second wireless network device is operable so as to decrypt the security settings data received from the portable wireless device, and so as to log in to the wireless local area network thereafter.
Other features and advantages of the present invention will become apparent in the following detailed description of the preferred embodiment with reference to the accompanying drawings, of which:
Referring to
The wireless local area network 2 further includes a network interface 20 and a wireless access point 21 (such as a wireless router) connected to the network interface 20. The first wireless network device 22 can be any one of but is not limited to the following devices having two-way wireless transmission functionality: a computer, a personal digital assistant, a digital media adaptor, and a media gateway. In this embodiment, the first wireless network device 22 is exemplified as a media gateway that has a wired or wireless network connection with the wireless access point 21 and that has already been logged in to the wireless local area network 2. The first wireless network device 22 includes a transceiver unit 220 and a first control unit 221 (see
The portable wireless device 5 (such as a remote controller or a personal digital assistant capable of two-way wireless transmission) includes a transceiver unit 50, a second control unit 51, and a storage unit 52. The transceiver unit 50 is capable of two-way transmission of wireless signals with the first wireless network device 22. The second control unit 51 is responsive to user operation so as to issue control signals for access control of the security settings data in a manner to be described hereinafter. The storage unit 52, such as a flash memory, is used for storing data.
The second wireless network device 6 can be any one of but is not limited to the following devices having two-way wireless transmission functionality: a computer, a personal digital assistant, a digital media adaptor, and a media gateway. In this embodiment, the second wireless network device 6 is exemplified as a computer that has yet to be logged in to the wireless local area network 2. The second wireless network device 6 includes a transceiver unit 60 capable of two-way transmission of wireless signals with the first wireless network device 22 and the portable wireless device 5, and a third control unit 61. The third control unit 61 is responsible for decrypting the security settings data received by the second wireless network device 6, and uses the decrypted information to log in to the wireless local area network 2.
The preferred embodiment of the login method for a wireless network with security settings according to this invention will now be described with further reference to
When it is desired to connect the second wireless network device 6 to the wireless local area network 2, the service set identifier (SSID) and the security key data must be first provided to the second wireless network device 6. Hence, in step 704, the portable wireless device 5 is operated (for example, another Setup button thereof is pressed) so as to enable the second control unit 51 to provide the security settings data (D1) stored in the storage unit 52 to the second wireless network device 6 via the transceiver unit 50. Then, in step 705, when the third control unit 61 of the second wireless network device 6 receives the security settings data (D1), the third control unit 61 decrypts the security settings data (D1) and performs security setup based on the decrypted security settings in step 706, and logs in to the wireless local area network 2 thereafter in step 707.
It has thus been shown that, through the method and system of this invention, users are able to easily setup new network devices to be included in a wireless local area network. In particular, users only need to store security settings data in a portable wireless device 5 (such as a remote controller), and to control the portable wireless device 5 so as to provide the security settings data to a new network device for decryption. As a result, users are not required to remember security key data in the form of long strings of digits. Moreover, since the security settings data is transmitted wirelessly, there is no need for frequent plugging and unplugging of hardware devices, and there is no requirement for devices (such as wireless access points) to be provided with USB ports or the like. Furthermore, since the portable wireless device 5 has inherent characteristics of portability and long-range transmission and reception, the first and second wireless network devices 22, 6 need not be placed close to each other during security setup, thereby resulting in added convenience.
While the present invention has been described in connection with what is considered the most practical and preferred embodiment, it is understood that this invention is not limited to the disclosed embodiment but is intended to cover various arrangements included within the spirit and scope of the broadest interpretation so as to encompass all such modifications and equivalent arrangements.
Number | Date | Country | Kind |
---|---|---|---|
094138609 | Nov 2005 | TW | national |