Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network access and profile control

a network access and profile control technology, applied in the field of network access and profile control, can solve the problems of many different network connections, computer connections to unknown or unwanted networks, and connection to such networks, and achieve the effect of slowing down the computer's ability to conn

Active Publication Date: 2016-02-23
MICROSOFT TECH LICENSING LLC
View PDF24 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent discusses ways to prevent unauthorized access to peer-to-peer networks and to protect sensitive information. One solution is to establish a network profile that allows the computer to automatically connect to a suitable network without needing manual input. However, malicious users may use this information to spoof the network, causing the computer to connect in an unwanted way. To address this, the patent also proposes a solution to prevent the computer from trying to connect to more than one network. If the access period expires, the computer will automatically disconnect from the network. Additionally, the patent suggests deleting the network profile to prevent future reconnection attempts. Overall, these solutions enhance the security and efficiency of peer-to-peer networks.

Problems solved by technology

The inventors have appreciated that although storing network profiles on client machines for indefinite periods of time may work well for users that regularly and repeatedly connect to a limited number of networks, problems can arise for users that connect to many different networks.
In some cases this can cause problems, for example where the computer detects the presence of a network having the same name as that in one of the stored network profiles, and in response connects to the network.
However, many wireless networks are established with the same network name (such as the manufacturer name or model of the router), and thus the computer may connect to an unknown or unwanted network.
Connection to such networks may jeopardize the security of the computer, especially if the network is being operated by a person seeking to gain unauthorized access to machines that connect to the network.
A malicious user may use this information to spoof the network, causing the computer to establish a connection in an unwanted way.
A large set of stored network profiles may also slow down the computer's ability to connect to a suitable network, since the computer may cycle through a long list of “preferred” networks in an attempt to connect before finding an appropriate network.
However, if the computer establishes a connection to a network within the two month period, the access period may be reset, causing the computer to retain the network profile for at least another two months.
In another embodiment, exhaustion of the access period may cause the computer to disconnect from the network.
However, after the specified time period passes, the computer may be caused to automatically terminate further participation in the network.
Deletion of the network profile may essentially prevent the computer from attempting reestablishment of the connection to the network, since information needed for reconnection attempts may no longer be accessible to the computer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access and profile control
  • Network access and profile control
  • Network access and profile control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018]Aspects of the invention are described below with reference to illustrative embodiments. However, it should be appreciated that aspects of the invention are not limited to any of the particular embodiments. For example, examples are provided below regarding communication of a computer with one or more wireless networks. However, it should be appreciated that aspects of the invention may be employed in environments in which the computer communicates with one or more wired networks or other arrangements. In addition, the examples below include the computer acting as a client within the network. However, it should be understood that the computer may function as an access point or other similar device in a network, as well as functioning as a client in one or more other networks. Also, as mentioned above, illustrative embodiments are described using the term “computer” to refer to the device on which network profiles or other network access parameters are managed. However, it shou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and apparatus for managing network profiles and / or access to a network. Network profiles stored in a computer may be deleted and / or a connection to a wireless network may be disabled when a corresponding access period for the network has been exhausted. The access period may define an amount of time, a number of connections, a number of bits or packets of information, or other measure of connectivity to a network and / or maintenance of profile information related to the network that may be limited in some fashion.

Description

BACKGROUND[0001]1. Field of Invention[0002]This invention relates to controlling access to a network and / or controlling stored network profiling information, e.g., information used to establish a connection with a wireless network.[0003]2. Related Art[0004]When connecting to a wireless network, such as a wireless network operating according to the IEEE 802.11 standard, client machines need certain parameters regarding the configuration settings of the network. A client machine may obtain this information in the process of establishing a connection with the network, and save the information for later use when reconnecting to the same network. These settings are commonly referred to as network profiles and are usually stored on the client machine indefinitely.SUMMARY OF INVENTION[0005]The inventors have appreciated that although storing network profiles on client machines for indefinite periods of time may work well for users that regularly and repeatedly connect to a limited number o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L29/06G06F21/62
CPCH04L63/102G06F21/6209G06F2221/2137G06F2221/2143
Inventor BARON, ANDREWMANDHANA, TAROONZOHRENEJAD, AMIR
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products