摘要:
Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the security settings on the access point based on the security key, and saving the security key in a profile data file on a removable memory device along with a portable configuration utility for using the profile data file for configuring other nodes on the network. The removable memory device can then be inserted into other nodes and the portable configuration utility can be run to match the same key on the other network nodes based on the information stored in the profile data file on the removable memory device.
摘要:
Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the security settings on the access point based on the security key, and saving the security key in a profile data file on a removable memory device along with a portable configuration utility for using the profile data file for configuring other nodes on the network. The removable memory device can then be inserted into other nodes and the portable configuration utility can be run to match the same key on the other network nodes based on the information stored in the profile data file on the removable memory device.
摘要:
Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the security settings on the access point based on the security key, and saving the security key in a profile data file on a removable memory device along with a portable configuration utility for using the profile data file for configuring other nodes on the network. The removable memory device can then be inserted into other nodes and the portable configuration utility can be run to match the same key on the other network nodes based on the information stored in the profile data file on the removable memory device.
摘要:
A wireless network security method comprises a first communications device generating configuration settings for wireless access and transferring that information to a second communications device through a removable storage device or directly through a physical electrical interface.
摘要:
Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the security settings on the access point based on the security key, and saving the security key in a profile data file on a removable memory device along with a portable configuration utility for using the profile data file for configuring other nodes on the network. The removable memory device can then be inserted into other nodes and the portable configuration utility can be run to match the same key on the other network nodes based on the information stored in the profile data file on the removable memory device.
摘要:
An assay test device comprises a cup container having a detachable top cover that has a volume-reducing internal structure. A pocket shaped and dimensioned to nest a chromatographic test strip cartridge is mounted against a flattened transparent portion of the cup side wall. The cartridge is held in a vertical position with an aperture near the top edge of the cup. A splash shield projects for the brim region of the cup over that aperture preventing any part of the sample fluid poured into the cup from entering the cartridge and contacting the test strips prematurely. When the lid is installed and the cup flipped upside-down, the internally projecting structure raises the level of sample fluid for better access to the cartridge aperture. The structure can be adapted to extend all the way through the inside of the cup to contact its closed bottom. A central cavity in the structure having a open end captures a small volume of fluid and preserves it for later confirmatory analysis. In one embodiment of the invention the central cavity is created by a well secured to the bottom of the cup that is telescopically engage by a cap secured to an undersurface portion of the internally projecting structure.
摘要:
A Universal Serial Bus (USB) modem/Wireless Wide Area Network (WWAN) device is provided that when connected to a host device, presents itself as an Ethernet endpoint to the host device, without requiring additional software/drivers to be downloaded to the host device. Embedded in the USB modem/WWAN device are various modules that provide functionality allowing either automatic connection to the Internet or redirection to a local Web User Interface (UI) that a user may employ to configure the USB modem/WWAN device and/or manually connect to the Internet. Additionally, the USB modem/WWAN device employs predetermined rules to determine whether or not/how the redirection occurs, including in scenarios where wireless connectivity to the Internet is unavailable.
摘要:
An apparatus comprises a first interface module configured to interface with one or more user devices through a wireless local area network (WLAN) connection; a second interface module configured to interface with a wireless communication network through a wireless wide area network (WWAN) connection; and a controller. The controller is configured to detect availability of carrier hotspots; if no carrier hotspot is detected, route traffic to and from the one or more user devices through the WWAN connection; and if a carrier hotspot is detected, route traffic to and from the one or more user devices through the detected carrier hotspot.
摘要:
A method for conducting encrypted communication in a network and a network having a plurality of nodes organized into a plurality of groups which initiates encrypted communication between a first one of the plurality of nodes of a first one of the plurality of groups and a second one of the plurality of nodes of the first one of the plurality of groups different from the first one of the plurality of groups using a group key and initiates encrypted communication between a third one of the plurality of nodes of the first one of the plurality of groups and a fourth one of the plurality of nodes of a second one of the plurality groups different from the first one of the plurality of groups using a session key.
摘要:
An apparatus comprises a first interface module configured to wirelessly interface with one or more user devices; a second interface module configured to interface with a wireless communication network; and a controller. The controller is configured to detect a signal received through the second interface module, the signal including a command; and execute the command. Executing the command causes one or more components of the apparatus to exit a power conservation mode and enter a full operation mode.