US20130339865A1 - Method and system for controlling network access - Google Patents
Method and system for controlling network access Download PDFInfo
- Publication number
- US20130339865A1 US20130339865A1 US13/915,273 US201313915273A US2013339865A1 US 20130339865 A1 US20130339865 A1 US 20130339865A1 US 201313915273 A US201313915273 A US 201313915273A US 2013339865 A1 US2013339865 A1 US 2013339865A1
- Authority
- US
- United States
- Prior art keywords
- controlled device
- devices
- access
- permission
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/06—Access restriction performed under specific conditions based on traffic conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- This disclosure relates to a method and system for managing an internet connection (LAN, WAN, or other connections) remotely from a connected or wireless device such as a smartphone (e.g., IOS iPhone, Android operating system device etc.), tablet (e.g., iPad), or even a desktop app (e.g., a OSX App via the “App store” or PC App, for example a Windows 8 App).
- a smartphone e.g., IOS iPhone, Android operating system device etc.
- tablet e.g., iPad
- a desktop app e.g., a OSX App via the “App store” or PC App, for example a Windows 8 App.
- More and more devices including game consoles, computers, and laptops to name a few, utilize bandwidth.
- the bandwidth requirements of such systems can become problematic when the devices are all accessing the same network. Accordingly, there is a need to control connections within a local area network and out of a network.
- An example of a connection that may need to be controlled is, a WiFi router for disabling traffic from a specific device or devices on the network via a remote script or other action.
- the present disclosure provides a method and system for disabling traffic from a specific device or devices on a network via a remote script or other action.
- the method is implemented as an application that executes on a device such as a smart phone (e.g., IOS iPhone, Android operating system device), tablet (e.g., iPad) or a desktop app (e.g., a OSX App via the “App store” or PC App, for example a Windows 8 App).
- a smart phone e.g., IOS iPhone, Android operating system device
- tablet e.g., iPad
- a desktop app e.g., a OSX App via the “App store” or PC App, for example a Windows 8 App.
- FIG. 1 illustrates an example of what the user sees and does the first time through the disclosed method in accordance with the present disclosure.
- FIG. 2 illustrates an example of the user experience after the method (implemented via a smartphone, tablet or other WiFi enabled device) is initially set up for use in accordance with the present disclosure.
- FIG. 3 illustrates an example of the disclosed method (i.e., application) in relation to what it controls in accordance with the present disclosure.
- FIG. 4 illustrates an example of a system constructed in accordance with this disclosure, and various controlled devices in accordance with the present disclosure.
- FIG. 5 illustrates an example of a user interface in accordance with the present disclosure.
- the present disclosure provides network control for wireless and connected devices. That is, the disclosure provides a “Network Access Manager.”
- the application has the ability to log into a network, such as via a router, in order to disable/enable traffic from a specific device on the network via a remote action.
- This action may be run from a mobile or wired device running the application, such as, but not limited to, an iOS iPhone/iPad or Android operating system device.
- the application will utilize reconstructed POST form data to login to administrative control pages.
- the application controls the Internet access of devices connected to the network by manipulating access control policies, however implemented on the network (e.g. MAC address filters on a router), via the controlling device's (e.g. the router's) administration pages and/or APIs.
- one embodiment scans for all routers within its range and allows the user to select a router to access and control while another embodiment has the router preconfigured to work with the application and simply requires authentication before administration of devices connected to it.
- the application determines the make and model of the router in order to understand how to turn network access on and off for devices that are connected if access control is not already known by the application.
- the application prompts the user to provide at least one form of authentication, for example, but not limited to, entering the wireless router's administrative login and password. Other authentication methods could easily replace standard login/password combination authentication, for example, but not limited to, biometric identification.
- the application displays the list of devices on the network.
- devices on the network can be named/renamed by the user for easy reference.
- disabling the internet/network access of a device is achieved by clicking on a graphical control switch adjacent to the device label (or on the label itself).
- Reenabling the internet/network access of a device is achieved via the same control switch (or, again, via the device's label itself).
- FIG. 1 illustrates a method 100 of the present disclosure and the steps taken by a user upon initially starting the system.
- a user enables the system (not shown) for instance by selecting an icon via a touch screen or other user interface.
- the system displays a splash screen, such as a screen showing the system's logo and/or other information.
- the system scans the network to locate connected devices. This can include locating one or more routers available to be controlled or may involve identifying devices connected to a preconfigured router.
- the system displays devices available on the network to the user and allows the user to select a particular device, such as a router to connect to and control.
- the controlled device is referred to herein as a router (to distinguish it from devices connected to the router), but it can be any device facilitating a connection to one or more other devices. This step can be skipped if the system is preconfigured to control a particular router.
- the system allows the user to login to the router by receiving login information such a username and password, biometric data, or other identifying data.
- the system displays a list of devices connected to the router.
- the user can select a particular device for instance by selecting an icon via a touch screen or other user interface.
- a device detail screen is displayed showing information about the selected device.
- the user can give the device a name to identify it such as Suzie's PC or Tim's iPad Mini.
- the system allows the user to add the device to a white list, meaning it is allowed to connect to the router. This initialization process is only necessary upon initial log-in or to allow a new device to connect to the router that has not previously been added to the white list. Alternatively, all devices can be allowed to access the internet via the router until such time that the connection is disabled by the user. In this instance the router maintains a list of devices that are not allowed to access the internet as opposed to a list of devices that are allowed to access the internet.
- FIG. 2 illustrates a method 200 of the present disclosure and the steps taken by a user while using the system after the initial set up is complete.
- the system displays a list of devices connected to the router.
- the user can select a device.
- the user can block the selected device. It is also possible to allow access to a previously blocked device by the same process of selecting the device and unblocking it (as opposed to blocking it).
- the blocking and unblocking can be achieved via a simple toggle mechanism, such as a slider or on/off button in the system.
- FIG. 3 shows the various devices used in the system 300 .
- a smart phone 310 running a mobile application provides the mobile control of a router 312 .
- the smart phone can also be a tablet or other device that is capable of running application software.
- the smartphone 310 communicates with router 312 via a mobile internet connection.
- the mobile internet connection can be any known method including, but not limited to, 3G, 4G, LTE, or WiFi.
- FIG. 2 also illustrates three devices 314 , 316 , 318 that are connected to the router 312 , which can be controlled via the systems and methods of the current disclosure.
- Devices 314 , 316 , 318 can be any device connected to the router, for instance mobile phones, computers, tablets, game consoles, etc. Three devices are shown in this example, but more or fewer devices may be connected to the router and controlled by the systems and methods of the current disclosure.
- FIG. 4 shows another embodiment of the invention as implemented in a system 400 .
- a device 410 runs an application 436 that allows for either wireless or wired control of internet/network connections.
- Device 410 can be any device capable of running the application including, but not limited to, a smart phone, tablet, laptop or desktop computer, or other computing device.
- Device 410 includes a processor 430 that is operable to execute computer code such as application 436 .
- Device 410 further includes a memory 432 and a random access memory (RAM) 434 .
- Application 426 can be stored in memory 432 for execution by processor 430 .
- Device 410 also includes an operating system 438 and a display 435 . Operating system 438 can be any operating system depending upon the type of device 410 .
- device 410 is a smart phone or tablet operating system 438 may be an iOS or Android operating system. If device 410 is a laptop or desktop computer, operating system 438 may be a Windows operating system, a Linux based operating system, or OS X, among others.
- display 435 can vary depending upon the type of device 410 . For instance, if device 410 is a smart phone or tablet display 435 may be a touch screen such that it can display data while also serving as an input source for the user. If device 410 is a laptop or desktop computer display 435 may still be a touch screen, but can also be a standard screen used in conjunction with other input devices such as mouse or keyboard (not shown). All of the subcomponents of device 410 are connected and able to communicate via a bus or other communication interconnect 437 .
- Device 410 communicates with a router 412 via communication path 442 to acquire information from the router and to update access control policies.
- Router 412 can be a wireless or wired router or any other type of device allowing connected devices to access the Internet or network.
- Communication path 442 between the device 410 and the router 412 can be a WiFi connection, wired connection, a cellular data network, or any combination of data connections.
- Connected devices 414 , 416 , 418 are connected to the router 412 via communication paths 446 and access the internet or a network via their connection to router 412 .
- Communication paths 446 may connect the connected devices 414 , 416 , 418 to router 412 by wireless or wired connections.
- Device 410 can also communicate with a web service AP via communication path 440 by any known communication technique.
- the web service API uses a router mapping database via communication path 444 to parse data received from the router 412 via the device 410 .
- the device 410 logs into router 412 based on input from a user or based on preconfigured access properties. The device then requests and receives access control information from the router 412 . The device 410 sends the data to the web service API 420 which parses the data for the device 410 . Next the device requests and receives information from the router regarding the connected devices 414 , 416 , 418 . This data is also sent to the web service API 420 for parsing. The device 410 is operable to accept user input regarding access of a new or existing device to the Internet or network via router 412 .
- the user can choose to allow access to a new device, deny access to a new device, disable access of a previously allowed device, or reenable access of a previously disabled device.
- the device 410 then sends updated access control information to the router 412 to enforce the new access policy. In this way the user can readily monitor and control access of devices connected to the internet or network via router 412 .
- the processor 430 executes instructions that are part of application 436 to carry out the various actions discussed above.
- FIG. 5 shows a sample device 505 with a user interface 500 for the presently disclosed systems and methods.
- Device 505 can be any device discussed herein and can include the various subcomponents discussed above relative to device 410 in FIG. 4 .
- the user interface includes a list of connected devices ( 6 devices shown). Each device includes identifying information such as 510 , 514 . The identifying information may include a device name (such as Tim's iPad Mini for device 514 ) as well as a MAC address.
- the user interface includes a toggle switch to enable or disable access to each device. In FIG. 5 toggle switch 512 for Jonathan's Macbook is in the “online” position which means the device is allowed access to the Internet or network.
- Toggle switch 516 is in the “offline” position indicating the internet/network connection for Tim's iPad Mini is disabled.
- the user can control the access of each device by simply changing the positions of the toggle switches.
- the user may simply touch the device identifier to toggle the access permission. In this instance it is possible to color code the device identifiers to indicate which devices have access and which devices do not have access.
- the elements of the embodiments may be essentially the code segments to perform the necessary tasks.
- the non-transitory code segments may be stored in a processor readable medium or computer readable medium, which may include any medium that may store or transfer information. Examples of such media include an electronic circuit, a semiconductor memory device, a read-only memory (ROM), a flash memory or other non-volatile memory, a floppy diskette, a CD-ROM, an optical disk, a hard disk, a fiber optic medium, etc.
- User input may include any combination of a keyboard, mouse, touch screen, voice command input, etc. User input may similarly be used to direct a browser application executing on a user's computing device to one or more network resources, such as web pages, from which computing resources may be accessed.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
- Information Transfer Between Computers (AREA)
- Stored Programmes (AREA)
Abstract
A method and system for disabling traffic from a specific device or devices on a WiFi network via a remote script or other action. In one embodiment, the method is implemented as an application that executes on a device such as a smart phone (e.g., IOS iPhone, Android operating system device) or tablet (e.g., iPad).
Description
- The present disclosure claims priority to Provisional Application 61/657,963 filed Jun. 11, 2012, which is incorporated herein by reference in its entirety for all purposes.
- This disclosure relates to a method and system for managing an internet connection (LAN, WAN, or other connections) remotely from a connected or wireless device such as a smartphone (e.g., IOS iPhone, Android operating system device etc.), tablet (e.g., iPad), or even a desktop app (e.g., a OSX App via the “App store” or PC App, for example a Windows 8 App).
- More and more devices, including game consoles, computers, and laptops to name a few, utilize bandwidth. The bandwidth requirements of such systems can become problematic when the devices are all accessing the same network. Accordingly, there is a need to control connections within a local area network and out of a network. An example of a connection that may need to be controlled is, a WiFi router for disabling traffic from a specific device or devices on the network via a remote script or other action.
- The present disclosure provides a method and system for disabling traffic from a specific device or devices on a network via a remote script or other action. In one embodiment, the method is implemented as an application that executes on a device such as a smart phone (e.g., IOS iPhone, Android operating system device), tablet (e.g., iPad) or a desktop app (e.g., a OSX App via the “App store” or PC App, for example a Windows 8 App).
-
FIG. 1 illustrates an example of what the user sees and does the first time through the disclosed method in accordance with the present disclosure. -
FIG. 2 illustrates an example of the user experience after the method (implemented via a smartphone, tablet or other WiFi enabled device) is initially set up for use in accordance with the present disclosure. -
FIG. 3 illustrates an example of the disclosed method (i.e., application) in relation to what it controls in accordance with the present disclosure. -
FIG. 4 illustrates an example of a system constructed in accordance with this disclosure, and various controlled devices in accordance with the present disclosure. -
FIG. 5 illustrates an example of a user interface in accordance with the present disclosure. - The present disclosure provides network control for wireless and connected devices. That is, the disclosure provides a “Network Access Manager.”
- The application has the ability to log into a network, such as via a router, in order to disable/enable traffic from a specific device on the network via a remote action. This action may be run from a mobile or wired device running the application, such as, but not limited to, an iOS iPhone/iPad or Android operating system device.
- Using the native iOS/Android development languages such as Objective-C or Java, the application will utilize reconstructed POST form data to login to administrative control pages. The application controls the Internet access of devices connected to the network by manipulating access control policies, however implemented on the network (e.g. MAC address filters on a router), via the controlling device's (e.g. the router's) administration pages and/or APIs.
- On initial launch of the application, one embodiment scans for all routers within its range and allows the user to select a router to access and control while another embodiment has the router preconfigured to work with the application and simply requires authentication before administration of devices connected to it. In both embodiments, the application determines the make and model of the router in order to understand how to turn network access on and off for devices that are connected if access control is not already known by the application. In one embodiment, the application prompts the user to provide at least one form of authentication, for example, but not limited to, entering the wireless router's administrative login and password. Other authentication methods could easily replace standard login/password combination authentication, for example, but not limited to, biometric identification. The application then displays the list of devices on the network. In one embodiment, devices on the network can be named/renamed by the user for easy reference. In one embodiment, disabling the internet/network access of a device is achieved by clicking on a graphical control switch adjacent to the device label (or on the label itself). Reenabling the internet/network access of a device is achieved via the same control switch (or, again, via the device's label itself).
-
FIG. 1 illustrates amethod 100 of the present disclosure and the steps taken by a user upon initially starting the system. First a user enables the system (not shown) for instance by selecting an icon via a touch screen or other user interface. Then atstep 110 the system displays a splash screen, such as a screen showing the system's logo and/or other information. During start up, for instance while the splash screen is displayed atstep 110, the system scans the network to locate connected devices. This can include locating one or more routers available to be controlled or may involve identifying devices connected to a preconfigured router. Atstep 112 the system displays devices available on the network to the user and allows the user to select a particular device, such as a router to connect to and control. For clarity the controlled device is referred to herein as a router (to distinguish it from devices connected to the router), but it can be any device facilitating a connection to one or more other devices. This step can be skipped if the system is preconfigured to control a particular router. Once the user has selected a router to control, atstep 114 the system allows the user to login to the router by receiving login information such a username and password, biometric data, or other identifying data. - After
step 114 the system displays a list of devices connected to the router. Atstep 116 the user can select a particular device for instance by selecting an icon via a touch screen or other user interface. Then at step 118 a device detail screen is displayed showing information about the selected device. Atstep 120 the user can give the device a name to identify it such as Suzie's PC or Tim's iPad Mini. Finally atstep 122 the system allows the user to add the device to a white list, meaning it is allowed to connect to the router. This initialization process is only necessary upon initial log-in or to allow a new device to connect to the router that has not previously been added to the white list. Alternatively, all devices can be allowed to access the internet via the router until such time that the connection is disabled by the user. In this instance the router maintains a list of devices that are not allowed to access the internet as opposed to a list of devices that are allowed to access the internet. -
FIG. 2 illustrates amethod 200 of the present disclosure and the steps taken by a user while using the system after the initial set up is complete. Atstep 210 the system displays a list of devices connected to the router. Atstep 212 the user can select a device. Then atstep 214 the user can block the selected device. It is also possible to allow access to a previously blocked device by the same process of selecting the device and unblocking it (as opposed to blocking it). The blocking and unblocking can be achieved via a simple toggle mechanism, such as a slider or on/off button in the system. -
FIG. 3 shows the various devices used in thesystem 300. Asmart phone 310 running a mobile application provides the mobile control of arouter 312. The smart phone can also be a tablet or other device that is capable of running application software. Thesmartphone 310 communicates withrouter 312 via a mobile internet connection. The mobile internet connection can be any known method including, but not limited to, 3G, 4G, LTE, or WiFi.FIG. 2 also illustrates threedevices router 312, which can be controlled via the systems and methods of the current disclosure.Devices -
FIG. 4 shows another embodiment of the invention as implemented in asystem 400. Adevice 410 runs anapplication 436 that allows for either wireless or wired control of internet/network connections.Device 410 can be any device capable of running the application including, but not limited to, a smart phone, tablet, laptop or desktop computer, or other computing device.Device 410 includes aprocessor 430 that is operable to execute computer code such asapplication 436.Device 410 further includes amemory 432 and a random access memory (RAM) 434. Application 426 can be stored inmemory 432 for execution byprocessor 430.Device 410 also includes anoperating system 438 and adisplay 435.Operating system 438 can be any operating system depending upon the type ofdevice 410. For instance, ifdevice 410 is a smart phone ortablet operating system 438 may be an iOS or Android operating system. Ifdevice 410 is a laptop or desktop computer,operating system 438 may be a Windows operating system, a Linux based operating system, or OS X, among others. Similarly, display 435 can vary depending upon the type ofdevice 410. For instance, ifdevice 410 is a smart phone ortablet display 435 may be a touch screen such that it can display data while also serving as an input source for the user. Ifdevice 410 is a laptop ordesktop computer display 435 may still be a touch screen, but can also be a standard screen used in conjunction with other input devices such as mouse or keyboard (not shown). All of the subcomponents ofdevice 410 are connected and able to communicate via a bus orother communication interconnect 437. -
Device 410 communicates with arouter 412 viacommunication path 442 to acquire information from the router and to update access control policies.Router 412 can be a wireless or wired router or any other type of device allowing connected devices to access the Internet or network.Communication path 442 between thedevice 410 and therouter 412 can be a WiFi connection, wired connection, a cellular data network, or any combination of data connections.Connected devices router 412 viacommunication paths 446 and access the internet or a network via their connection torouter 412.Communication paths 446 may connect theconnected devices router 412 by wireless or wired connections.Device 410 can also communicate with a web service AP viacommunication path 440 by any known communication technique. The web service API uses a router mapping database viacommunication path 444 to parse data received from therouter 412 via thedevice 410. - In use the
device 410 logs intorouter 412 based on input from a user or based on preconfigured access properties. The device then requests and receives access control information from therouter 412. Thedevice 410 sends the data to theweb service API 420 which parses the data for thedevice 410. Next the device requests and receives information from the router regarding theconnected devices web service API 420 for parsing. Thedevice 410 is operable to accept user input regarding access of a new or existing device to the Internet or network viarouter 412. The user can choose to allow access to a new device, deny access to a new device, disable access of a previously allowed device, or reenable access of a previously disabled device. Thedevice 410 then sends updated access control information to therouter 412 to enforce the new access policy. In this way the user can readily monitor and control access of devices connected to the internet or network viarouter 412. In general, when in use theprocessor 430 executes instructions that are part ofapplication 436 to carry out the various actions discussed above. -
FIG. 5 shows asample device 505 with auser interface 500 for the presently disclosed systems and methods.Device 505 can be any device discussed herein and can include the various subcomponents discussed above relative todevice 410 inFIG. 4 . The user interface includes a list of connected devices (6 devices shown). Each device includes identifying information such as 510, 514. The identifying information may include a device name (such as Tim's iPad Mini for device 514) as well as a MAC address. The user interface includes a toggle switch to enable or disable access to each device. InFIG. 5 toggle switch 512 for Jonathan's Macbook is in the “online” position which means the device is allowed access to the Internet or network.Toggle switch 516, on the other hand, is in the “offline” position indicating the internet/network connection for Tim's iPad Mini is disabled. The user can control the access of each device by simply changing the positions of the toggle switches. In an alternate embodiment, rather than using toggle switches the user may simply touch the device identifier to toggle the access permission. In this instance it is possible to color code the device identifiers to indicate which devices have access and which devices do not have access. By providing simple toggle switch user interface the user can quickly modify internet/network access policies with little or no typing and minimal required navigation. - In accordance with the practices of persons skilled in the art of computer programming, embodiments of the methods are described with reference to operations that are performed by a computer system or a like electronic system such as a mobile application running on a mobile phone or tablet. Such operations are sometimes referred to as being computer-executed. It will be appreciated that operations that are symbolically represented include the manipulation by a processor, such as a central processing unit, of electrical signals representing data bits and the maintenance of data bits at memory locations, such as in system memory, as well as other processing of signals. The memory locations where data bits are maintained are physical locations that have particular electrical, magnetic, optical, or organic properties corresponding to the data bits.
- When implemented in a programmed device or system, the elements of the embodiments may be essentially the code segments to perform the necessary tasks. The non-transitory code segments may be stored in a processor readable medium or computer readable medium, which may include any medium that may store or transfer information. Examples of such media include an electronic circuit, a semiconductor memory device, a read-only memory (ROM), a flash memory or other non-volatile memory, a floppy diskette, a CD-ROM, an optical disk, a hard disk, a fiber optic medium, etc. User input may include any combination of a keyboard, mouse, touch screen, voice command input, etc. User input may similarly be used to direct a browser application executing on a user's computing device to one or more network resources, such as web pages, from which computing resources may be accessed.
- While various embodiments have been described above, it should be understood that those embodiments have been presented by way of example only and are not meant to limit the claims below. Thus, the breadth and scope of the invention should not be limited by the specific embodiments discussed above, but only according to the claims and their equivalents.
Claims (15)
1. A method of controlling internet access, the method comprising:
displaying on a user interface a list of devices connected to the internet via a controlled device;
receiving input from a user via the user interface regarding the permission of one or more devices to access the internet via the controlled device; and
sending permission information to the controlled device to update the permission of one or more devices to access the internet via the controlled device.
2. The method of claim 1 , wherein the user interface includes a toggle switch indicating the current permission setting for each of the listed devices.
3. The method of claim 2 , wherein receiving input from a user includes recording a change in the position of at least one toggle switch.
4. The method of claim 1 , wherein the user interface is part of a mobile device.
5. The method of claim 4 , wherein the mobile device communicates wirelessly with the controlled device.
6. The method of claim 1 , wherein the controlled device is a network router.
7. The method of claim 1 , wherein the user interface is part of a laptop or desktop computer.
8. The method of claim 7 , wherein the laptop or desktop computer communicates with the controlled device through a wired connection.
9. The method of claim 1 , further comprising prior to the displaying step:
receiving data from the controlled device regarding at least one of access permission and connected devices;
sending the data to a web service api; and
receiving parsed data from the web service api.
10. The method of claim 1 , further comprising:
receiving login information from the user relative to the controlled device; and
verifying the login information before displaying the list of devices connected to the internet via the controlled device.
11. A non-transitory computer readable storage medium with an executable program thereon, the program instructing a device to:
display on a user interface a list of devices connected to a controlled device;
receive input from a user via the user interface regarding the permission of one or more devices to access the internet via the controlled device; and
send permission information to the controlled device to update the permission of one or more devices to access the Internet via the controlled device.
12. The non-transitory computer readable storage medium of claim 11 , the program further instructing the device to display a toggle switch indicating the current permission setting for each of the listed devices.
13. The non-transitory computer readable storage medium of claim 12 , the program further instructing the device to record any changes in the position of the toggle switches and to send the updated position of any changed toggle switch to the controlled device upon the occurrence of the change.
14. The non-transitory computer readable storage medium of claim 11 , the program further instructing the device to:
receive data from the controlled device regarding at least one of access permission and connected devices;
send the data to a web service api; and
receive parsed data from the web service api.
15. The non-transitory computer readable storage medium of claim 11 , the program further instructing the device to:
receive login information from the user relative to the controlled device; and
verify the login information before instructing the device to display the list of devices connected to the internet via the controlled device.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/915,273 US20130339865A1 (en) | 2012-06-11 | 2013-06-11 | Method and system for controlling network access |
US17/060,699 US20210022002A1 (en) | 2012-06-11 | 2020-10-01 | Method and system for controlling network access |
US17/571,480 US20220132314A1 (en) | 2012-06-11 | 2022-01-08 | Method and system for controlling network access |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261657963P | 2012-06-11 | 2012-06-11 | |
US13/915,273 US20130339865A1 (en) | 2012-06-11 | 2013-06-11 | Method and system for controlling network access |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/060,699 Continuation US20210022002A1 (en) | 2012-06-11 | 2020-10-01 | Method and system for controlling network access |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130339865A1 true US20130339865A1 (en) | 2013-12-19 |
Family
ID=49715692
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/915,273 Abandoned US20130339865A1 (en) | 2012-06-11 | 2013-06-11 | Method and system for controlling network access |
US13/915,248 Expired - Fee Related US9306810B2 (en) | 2012-06-11 | 2013-06-11 | WiFi zapper smart phone application |
US15/090,864 Abandoned US20160269977A1 (en) | 2012-06-11 | 2016-04-05 | Wifi zapper smart phone application |
US17/060,699 Abandoned US20210022002A1 (en) | 2012-06-11 | 2020-10-01 | Method and system for controlling network access |
US17/571,480 Abandoned US20220132314A1 (en) | 2012-06-11 | 2022-01-08 | Method and system for controlling network access |
Family Applications After (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/915,248 Expired - Fee Related US9306810B2 (en) | 2012-06-11 | 2013-06-11 | WiFi zapper smart phone application |
US15/090,864 Abandoned US20160269977A1 (en) | 2012-06-11 | 2016-04-05 | Wifi zapper smart phone application |
US17/060,699 Abandoned US20210022002A1 (en) | 2012-06-11 | 2020-10-01 | Method and system for controlling network access |
US17/571,480 Abandoned US20220132314A1 (en) | 2012-06-11 | 2022-01-08 | Method and system for controlling network access |
Country Status (1)
Country | Link |
---|---|
US (5) | US20130339865A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8922590B1 (en) | 2013-10-01 | 2014-12-30 | Myth Innovations, Inc. | Augmented reality interface and method of use |
US20150230085A1 (en) * | 2013-08-15 | 2015-08-13 | Huizhou Tcl Mobile Communication Co., Ltd. | Authentication method and authentication device for wireless router |
US20150350690A1 (en) * | 2014-06-02 | 2015-12-03 | Sonifi Solutions, Inc. | Implementing screen sharing functionality over a communication network |
US9854388B2 (en) | 2011-06-14 | 2017-12-26 | Sonifi Solutions, Inc. | Method and apparatus for pairing a mobile device to an output device |
US10291956B2 (en) | 2015-09-30 | 2019-05-14 | Sonifi Solutions, Inc. | Methods and systems for enabling communications between devices |
US10327035B2 (en) | 2016-03-15 | 2019-06-18 | Sonifi Solutions, Inc. | Systems and methods for associating communication devices with output devices |
US10602212B2 (en) | 2016-12-22 | 2020-03-24 | Sonifi Solutions, Inc. | Methods and systems for implementing legacy remote and keystroke redirection |
US12250539B2 (en) | 2018-03-21 | 2025-03-11 | Samsung Electronics Co., Ltd. | Method and device for authenticating device using wireless LAN service |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103970395A (en) * | 2013-01-30 | 2014-08-06 | 腾讯科技(深圳)有限公司 | Method and device for stopping background programs |
CN104519020B (en) | 2013-09-29 | 2017-10-13 | 阿里巴巴集团控股有限公司 | Manage method, server and the system of wireless network login password sharing function |
US9961079B1 (en) * | 2014-03-21 | 2018-05-01 | Symantec Corporation | Context aware intruder detection using WIFI MAC addresses |
CN104869609A (en) * | 2015-04-27 | 2015-08-26 | 小米科技有限责任公司 | Information providing method and device |
CN105245540B (en) * | 2015-10-27 | 2019-06-14 | 深圳市宏电技术股份有限公司 | Offline WIFI hot spot authentication method and Verification System based on IOS terminal |
WO2017120746A1 (en) * | 2016-01-11 | 2017-07-20 | 华为技术有限公司 | Method for managing network access rights and related device |
DK179494B1 (en) | 2016-06-12 | 2019-01-11 | Apple Inc. | User interface for managing controllable external devices |
CN106779648B (en) * | 2016-12-16 | 2020-10-16 | Oppo广东移动通信有限公司 | Network data sending method and mobile terminal |
EP3769510A1 (en) | 2018-05-07 | 2021-01-27 | Apple Inc. | User interfaces for viewing live video feeds and recorded video |
US11405375B2 (en) * | 2018-09-27 | 2022-08-02 | Lenovo (Singapore) Pte. Ltd. | Device and method for receiving a temporary credit token |
US11683312B2 (en) * | 2018-11-08 | 2023-06-20 | Arris Enterprises Llc | Client device authentication to a secure network |
US11363071B2 (en) * | 2019-05-31 | 2022-06-14 | Apple Inc. | User interfaces for managing a local network |
US10904029B2 (en) | 2019-05-31 | 2021-01-26 | Apple Inc. | User interfaces for managing controllable external devices |
US11513667B2 (en) | 2020-05-11 | 2022-11-29 | Apple Inc. | User interface for audio message |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060236376A1 (en) * | 2005-04-01 | 2006-10-19 | Liu Calvin Y | Wireless security using media access control address filtering with user interface |
US20070130286A1 (en) * | 2004-12-07 | 2007-06-07 | Pure Networks, Inc. | Network device management |
US20070150842A1 (en) * | 2005-12-23 | 2007-06-28 | Imran Chaudhri | Unlocking a device by performing gestures on an unlock image |
US20080289009A1 (en) * | 2005-04-19 | 2008-11-20 | Kyung Ju Lee | Method and Apparatus for Controlling of Remote Access to a Local Network |
US20110126095A1 (en) * | 2009-11-25 | 2011-05-26 | T-Mobile USA, Inc | Router Management via Touch-Sensitive Display |
US20110294502A1 (en) * | 2010-05-31 | 2011-12-01 | Research In Motion Limited | Management of mobile hotspot connections |
US20130326047A1 (en) * | 2012-05-30 | 2013-12-05 | Mesh Networks, Llc | Router and personal device for monitoring and controlling data transfer rates on a local area network |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006063118A2 (en) * | 2004-12-07 | 2006-06-15 | Pure Networks, Inc. | Network management |
US8112794B2 (en) * | 2006-07-17 | 2012-02-07 | Research In Motion Limited | Management of multiple connections to a security token access device |
US8179872B2 (en) | 2007-05-09 | 2012-05-15 | Research In Motion Limited | Wireless router system and method |
US8649297B2 (en) * | 2010-03-26 | 2014-02-11 | Cisco Technology, Inc. | System and method for simplifying secure network setup |
GB2479916A (en) * | 2010-04-29 | 2011-11-02 | Nec Corp | Access rights management of locally held data based on network connection status of mobile device |
US8570993B2 (en) * | 2010-05-20 | 2013-10-29 | At&T Mobility Ii Llc | Wi-Fi intelligent selection engine |
US8776212B2 (en) | 2010-12-14 | 2014-07-08 | Suridx, Inc. | Protecting computers using an identity-based router |
US9462466B2 (en) * | 2011-09-29 | 2016-10-04 | Israel L'Heureux | Gateway router supporting session hand-off and content sharing among clients of a local area network |
-
2013
- 2013-06-11 US US13/915,273 patent/US20130339865A1/en not_active Abandoned
- 2013-06-11 US US13/915,248 patent/US9306810B2/en not_active Expired - Fee Related
-
2016
- 2016-04-05 US US15/090,864 patent/US20160269977A1/en not_active Abandoned
-
2020
- 2020-10-01 US US17/060,699 patent/US20210022002A1/en not_active Abandoned
-
2022
- 2022-01-08 US US17/571,480 patent/US20220132314A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070130286A1 (en) * | 2004-12-07 | 2007-06-07 | Pure Networks, Inc. | Network device management |
US20060236376A1 (en) * | 2005-04-01 | 2006-10-19 | Liu Calvin Y | Wireless security using media access control address filtering with user interface |
US20080289009A1 (en) * | 2005-04-19 | 2008-11-20 | Kyung Ju Lee | Method and Apparatus for Controlling of Remote Access to a Local Network |
US20070150842A1 (en) * | 2005-12-23 | 2007-06-28 | Imran Chaudhri | Unlocking a device by performing gestures on an unlock image |
US20110126095A1 (en) * | 2009-11-25 | 2011-05-26 | T-Mobile USA, Inc | Router Management via Touch-Sensitive Display |
US20110294502A1 (en) * | 2010-05-31 | 2011-12-01 | Research In Motion Limited | Management of mobile hotspot connections |
US20130326047A1 (en) * | 2012-05-30 | 2013-12-05 | Mesh Networks, Llc | Router and personal device for monitoring and controlling data transfer rates on a local area network |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9854388B2 (en) | 2011-06-14 | 2017-12-26 | Sonifi Solutions, Inc. | Method and apparatus for pairing a mobile device to an output device |
US10244375B2 (en) | 2011-06-14 | 2019-03-26 | Sonifi Solutions, Inc. | Method and apparatus for pairing a mobile device to an output device |
US20150230085A1 (en) * | 2013-08-15 | 2015-08-13 | Huizhou Tcl Mobile Communication Co., Ltd. | Authentication method and authentication device for wireless router |
US9578503B2 (en) * | 2013-08-15 | 2017-02-21 | Huizhou Tcl Mobile Communication Co., Ltd. | Authentication method and authentication device for wireless router |
US10769853B2 (en) | 2013-10-01 | 2020-09-08 | Myth Innovations, Inc. | Augmented reality interface and method of use |
US8943569B1 (en) * | 2013-10-01 | 2015-01-27 | Myth Innovations, Inc. | Wireless server access control system and method |
US20150143478A1 (en) * | 2013-10-01 | 2015-05-21 | Myth Innovations, Inc. | Wireless server access control system and method |
US9529512B2 (en) * | 2013-10-01 | 2016-12-27 | Myth Innovations, Inc. | Wireless server access control system and method |
US20170111794A1 (en) * | 2013-10-01 | 2017-04-20 | Myth Innovations, Inc. | Wireless server access control system and method |
US8922590B1 (en) | 2013-10-01 | 2014-12-30 | Myth Innovations, Inc. | Augmented reality interface and method of use |
US11055928B2 (en) | 2013-10-01 | 2021-07-06 | Myth Innovations, Inc. | Augmented reality interface and method of use |
US20150350690A1 (en) * | 2014-06-02 | 2015-12-03 | Sonifi Solutions, Inc. | Implementing screen sharing functionality over a communication network |
US11330326B2 (en) | 2015-09-30 | 2022-05-10 | Sonifi Solutions, Inc. | Methods and systems for enabling communications between devices |
US10631042B2 (en) | 2015-09-30 | 2020-04-21 | Sonifi Solutions, Inc. | Methods and systems for enabling communications between devices |
US10291956B2 (en) | 2015-09-30 | 2019-05-14 | Sonifi Solutions, Inc. | Methods and systems for enabling communications between devices |
US11671651B2 (en) | 2015-09-30 | 2023-06-06 | Sonifi Solutions, Inc. | Methods and systems for enabling communications between devices |
US12101527B2 (en) | 2015-09-30 | 2024-09-24 | Sonifi Solutions, Inc. | Methods and systems for enabling communications between devices |
US10743075B2 (en) | 2016-03-15 | 2020-08-11 | Sonifi Solutions, Inc. | Systems and methods for associating communication devices with output devices |
US10327035B2 (en) | 2016-03-15 | 2019-06-18 | Sonifi Solutions, Inc. | Systems and methods for associating communication devices with output devices |
US10602212B2 (en) | 2016-12-22 | 2020-03-24 | Sonifi Solutions, Inc. | Methods and systems for implementing legacy remote and keystroke redirection |
US11122318B2 (en) | 2016-12-22 | 2021-09-14 | Sonifi Solutions, Inc. | Methods and systems for implementing legacy remote and keystroke redirection |
US11641502B2 (en) | 2016-12-22 | 2023-05-02 | Sonifi Solutions, Inc. | Methods and systems for implementing legacy remote and keystroke redirection |
US12063406B2 (en) | 2016-12-22 | 2024-08-13 | Sonifi Solutions, Inc. | Methods and systems for implementing legacy remote and keystroke redirection |
US12250539B2 (en) | 2018-03-21 | 2025-03-11 | Samsung Electronics Co., Ltd. | Method and device for authenticating device using wireless LAN service |
Also Published As
Publication number | Publication date |
---|---|
US9306810B2 (en) | 2016-04-05 |
US20130331083A1 (en) | 2013-12-12 |
US20160269977A1 (en) | 2016-09-15 |
US20220132314A1 (en) | 2022-04-28 |
US20210022002A1 (en) | 2021-01-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220132314A1 (en) | Method and system for controlling network access | |
US10735434B2 (en) | Configuration management for virtual machine environment | |
CN105282731B (en) | Processing configures the method for profile and the electronic device for supporting this method | |
US9380523B1 (en) | System, method and computer program product for connecting roaming mobile devices to a virtual device platform | |
KR101672227B1 (en) | Multimodal computing device | |
JP6588017B2 (en) | Seamless call transition | |
US9697629B1 (en) | System, method and computer product for user performance and device resolution settings | |
EP3213464B1 (en) | Policy settings configuration with signals | |
JP5904519B2 (en) | Application authentication policy for multiple computing devices | |
KR102092892B1 (en) | Secure network access using streaming devices | |
RU2682379C2 (en) | Authentication and connection into pair of devices using machine-readable code | |
KR20160138510A (en) | Roaming access method and device | |
US11237636B2 (en) | System and method for network configuration and behavior control by proximity enabled devices | |
US20240340195A1 (en) | Contextual application interactions with connected devices | |
US11374792B2 (en) | Techniques for utilizing multiple network interfaces for a cloud shell | |
US20210182440A1 (en) | System for preventing access to sensitive information and related techniques | |
US10567962B1 (en) | Systems and methods for connecting internet-connected devices to wireless access points | |
US11093260B2 (en) | Device provisioning with manufacturer boot environment | |
US10474472B2 (en) | Operating system establishing method and apparatus | |
US20150248550A1 (en) | Increasing access security with time since last access | |
US12106113B2 (en) | Managing deployment model migrations for enrolled devices | |
US20170034307A1 (en) | Method and apparatus for application of configuration settings to remote devices | |
CN110022561B (en) | Information processing method and information processing apparatus | |
KR101521476B1 (en) | Device apparatus and computer-readable recording medium for protective of device | |
US20170270108A1 (en) | System for supporting remote accesses to a host computer from a mobile computing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: WIFIZAPPER, INC., ALABAMA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:OSLUND, MICHAEL;DUDEK, ISAAC;STRIETZEL, JONATHAN;SIGNING DATES FROM 20130605 TO 20130610;REEL/FRAME:030593/0402 |
|
STCV | Information on status: appeal procedure |
Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |