(19)
(11)EP 2 456 264 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
05.07.2017 Bulletin 2017/27

(21)Application number: 11190017.1

(22)Date of filing:  21.11.2011
(51)Int. Cl.: 
H04W 48/16  (2009.01)

(54)

Apparatus and method for connecting an access point in portable terminal

Vorrichtung und Verfahren zur Verbindung eines Zugangspunkts in einem tragbaren Endgerät

Appareil et procédé de connexion d'un point d'accès dans un terminal portable


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30)Priority: 22.11.2010 KR 20100116329

(43)Date of publication of application:
23.05.2012 Bulletin 2012/21

(73)Proprietor: Samsung Electronics Co., Ltd.
Suwon-si, Gyeonggi-do, 443-742 (KR)

(72)Inventors:
  • Kim, Jong-Seok
    Gyeonggi-do (KR)
  • Jeon, Hyung-Jun
    Seoul (KR)

(74)Representative: HGF Limited 
Saviour House 9 St. Saviourgate
York YO1 8NQ
York YO1 8NQ (GB)


(56)References cited: : 
EP-A1- 1 850 617
WO-A2-2009/134625
EP-A2- 1 592 195
  
      
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description

    TECHNICAL FIELD OF THE INVENTION



    [0001] The present invention relates to an apparatus and method for connecting an Access Point (AP) in a portable terminal. More particularly, the present invention relates to an apparatus and method for designating a group of searched peripheral APs, and attempting an access to an AP corresponding to a group selected by a user in a portable terminal.

    BACKGROUND OF THE INVENTION



    [0002] In recent years, portable terminals, a necessity to modem people, have become widely used. A service provider or a system manufacturer is competitively developing a product (or a service) for the differentiation from other enterprises.

    [0003] For example, the portable terminals evolve into multimedia equipment for a phone book, a game, a Short Message Service (SMS), an Electronic (E)-mail service, a morning call, a MPEG-1 Audio Layer 3 (MP3) player, a schedule management function, a digital camera, and wireless Internet services and provide a variety of services.

    [0004] To use a packet data service including a multimedia message and the wireless Internet, the portable terminal needs to perform connection with an AP of a corresponding service.

    [0005] That is, the portable terminal uses a packet data service by transmitting data to the AP but, in a situation where no AP exists, cannot use the packet data service.

    [0006] To use the packet data service, generally, the portable terminal intends to search peripheral APs and then, connect prioritizing an AP of good signal intensity.

    [0007] In a case where there mixedly exist an AP licensed to a user and an AP not licensed to the user, and a signal of the AP not licensed to the user is good, the portable terminal periodically performs an operation of needlessly attempting to connect to the AP that is not licensed to the user and thus makes connection impossible.

    [0008] In addition, the portable terminal stores a plurality of pieces of personal information, but there is a problem that personal information may be leaked through hacking into the AP.

    [0009] Accordingly, to provide a solution to the above problem, there is a need for an apparatus and method for preventing personal information leakage through an AP and attempting connection with an AP licensed to a user in the portable terminal.

    [0010] WO-2009/134625-A2 discloses a method of establishing a wireless link. The method comprises a user equipment receiving a transmission from a closed subscriber group (CSG) cell. When the CSG cell is associated with a CSG identified in a user defined list of CSGs stored in the user equipment, the method further comprises establishing a wireless link between the user equipment and the CSG cell.

    [0011] EP-1592195-A2 discloses a mobile station and communication control method. When an application is activated, a mobile station detects external devices as candidates for a Bluetooth connection out of external devices existing in the surrounding area, and presents a list of the devices to a user.

    SUMMARY OF THE INVENTION



    [0012] Accordingly, certain embodiments of the present disclosure provide an apparatus and method for grouping and outputting peripheral Access Points (APs) in a portable terminal.

    [0013] Other embodiments of the present disclosure provide an apparatus and method for attempting connection to an AP belonging to a group in a portable terminal.

    [0014] Other embodiments of the present disclosure provide an apparatus and method for attempting connection to an AP corresponding to a level of an executed application in a portable terminal.

    [0015] Yet other embodiments of the present disclosure provide an apparatus and method for solving a problem of information leakage through an AP in a portable terminal.

    [0016] The above embodiments are achieved by providing an apparatus and method for connecting an access point in a portable terminal.

    [0017] According to a first aspect of the present invention, an apparatus configured to connect to an Access Point (AP) in a portable terminal is provided. The apparatus comprises: a group set unit configured to: set APs to groups according to a user selection; and output a list of the groups when an AP use request is generated; and an AP search unit configured to: select one of the groups; search APs of the selected group; and classify at least one AP associated with the selected group and connect to a classified AP; wherein responsive to execution of an application being detected, the AP search unit is further configured to search an AP of a group corresponding to a security level of the application.

    [0018] According to a second aspect of the present invention, a method for connecting an Access Point (AP) in a portable terminal is provided. The method comprising: setting APs to groups according to a user selection; outputting a list of the groups when the AP use request is generated; selecting one of the groups intended for use; searching APs of the selected group; classifying at least one APs associated with the selected group; and connecting to a classified AP; wherein the method further comprises: responsive to detecting execution of an application, searching an AP of a group corresponding to a security level of the application.

    [0019] Also disclosed is an apparatus for connecting an AP in a portable terminal. The apparatus includes a group set unit and an AP search unit. The group set unit sets items of peripheral APs to a group according to user's selection. After searching the peripheral APs at the time of AP connection, the AP search unit classifies an AP belonging to a selected item and connecting to the classified AP.

    [0020] Also disclosed is a method for connecting an AP in a portable terminal. The method includes setting items of peripheral APs to a group according to user's selection, after searching the peripheral APs at the time of AP connection, classifying an AP belonging to a selected item, and connecting to the classified AP.

    [0021] Also disclosed is an apparatus for connecting an AP in a portable terminal. The apparatus includes an input unit, a display unit, an AP management unit, and a controller. The input unit selects a group intending to classify APs. The display unit outputs a list of the grouped APs. After setting items of peripheral APs to a group according to user's selection and searching the peripheral APs at the time of AP connection, the AP management unit classifies an AP belonging to a selected item and connecting to the classified AP. The controller controls the input unit, display unit and AP management unit and controls connection with the grouped APs. The AP management unit comprises a Wireless Fidelity (WiFi) module receiving a signal of a peripheral AP.

    [0022] Also disclosed is an apparatus configured to connect an Access Point (AP) in a portable terminal comprising an input unit configured to select a group intending to classify APs, a display unit configured to output a list of the grouped APs, an AP management unit configured to, after setting items of peripheral APs to a group according to a user selection and searching the peripheral APs at the time of AP connection, classify an AP associated with a selected item and connect to the classified AP, and a controller configured to control the input unit, display unit and AP management unit and control connection with the grouped APs,

    [0023] In certain embodiments, the AP management unit comprises a Wireless Fidelity (WiFi) module configured to receive a signal of a peripheral AP.

    [0024] In certain embodiments, the AP management unit is further configured to determine a group of an AP corresponding to a level of an executed application.

    [0025] In certain embodiments, the level is a security level and wherein the controller is further configured to determine whether the executed application performs a WiFi connection, and determine whether the application performing the WiFi connection corresponds to the security level.

    [0026] In certain embodiments, in responsive to the executed application being executed in a state of connection with an AP not corresponding to the security level, the controller is further configured to release a connection with the AP not corresponding to the security level and connect with an AP corresponding to the security level.

    [0027] In certain embodiments, the controller is further configured to connect to the peripheral APs belonging to the group, according to priority.

    [0028] Before undertaking the DETAILED DESCRIPTION OF THE INVENTION below, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document: the terms "include" and "comprise," as well as derivatives thereof, mean inclusion without limitation; the term "or," is inclusive, meaning and/or; the phrases "associated with" and "associated therewith," as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like. Definitions for certain words and phrases are provided throughout this patent document, those of ordinary skill in the art should understand that in many, if not most instances, such definitions apply to prior, as well as future uses of such defined words and phrases.

    BRIEF DESCRIPTION OF THE DRAWINGS



    [0029] The above and other objects, features and advantages of the present invention will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings in which:

    FIGURE 1 illustrates a construction of a portable terminal for searching Access Points (APs) grouped according to the present disclosure;

    FIGURE 2 illustrates an AP connection process of a portable terminal according to the present disclosure;

    FIGURE 3 illustrates an AP connection process of a portable terminal according to an exemplary embodiment of the present disclosure; and

    FIGURES 4A-4D illustrate AP search screens of a portable terminal according to a desirable exemplary embodiment of the present disclosure.



    [0030] Throughout the drawings, like reference numerals will be understood to refer to like parts, components and structures.

    DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS



    [0031] FIGURES 1 through 4D, discussed below, and the various embodiments used to describe the principles of the present disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the disclosure.

    [0032] Embodiments of the present disclosure provide an apparatus and method for grouping and managing peripheral Access Points (APs) using a portable terminal according to the present disclosure, and attempting a connection prioritizing an AP belonging to a group.

    [0033] FIGURE 1 illustrates a construction of a portable terminal for searching APs grouped according to the present disclosure.

    [0034] Referring to FIGURE 1, the portable terminal can include a controller 100, an AP management unit 102, a memory unit 108, an input unit 110, a display unit 112, and a communication unit 114. The AP management unit 102 can include an AP search unit 104 and a group set unit 106.

    [0035] The controller 100 of the portable terminal controls a general operation of the portable terminal. For instance, the controller 100 performs processing and control for voice call and data communication. In addition, to use a packet data service including the wireless Internet, the controller 100 can process to search peripheral APs and connect with the searched APs. According to the present disclosure, the controller 100 can group and manage the searched APs.

    [0036] Accordingly, the controller 100 processes to attempt connection to APs belonging to a group selected by a user among preset groups.

    [0037] Under the control of the controller 100, the AP management unit 102 searches and groups peripheral APs, and connects with the grouped APs (i.e., the APs belonging to the group selected by the user).

    [0038] The AP search unit 104 of the AP management unit 102 can include a Wireless Fidelity (WiFi) module. The AP search unit 104 searches APs existing around the portable terminal and outputs a list of items of the searched APs. Further, under the control of the AP management unit 102, the AP search unit 104 connects prioritizing an AP of good signal intensity among APs belonging to a group selected by a user.

    [0039] The group set unit 106 of the AP management unit 102 is for setting APs intended for connection among a plurality of APs to one group, and can set a plurality of groups according to user's selection.

    [0040] The memory unit 108 preferably includes, for example, a Read Only Memory (ROM), a Random Access Memory (RAM), a flash ROM, and such. The ROM stores a microcode of a program for processing and controlling the controller 100 and the AP management unit 102 and a variety of reference data.

    [0041] The RAM, a working memory of the controller 100, stores temporary data generated in execution of a variety of programs. The flash ROM stores a diversity of updateable depository data such as a phone book, an outgoing message, an incoming message and such.

    [0042] The input unit 110 includes numeral key buttons '0' to '9', a menu button, a cancel button, an OK button, a talk button, an end button, an Internet button, navigation key (or direction key) buttons, and a plurality of function keys such as a character input key. The input unit 110 provides key input data corresponding to a key pressed by a user to the controller 100.

    [0043] The display unit 112 displays state information generated during operation of the portable terminal, characters, a large amount of moving pictures and still pictures and the like. The display unit 112 outputs a list of APs grouped according to the present disclosure at the time of AP search. The display unit 112 may be a color Liquid Crystal Display (LCD), Active Mode Organic Light Emitting Diode (AMOLED), and such. In an example where the display unit 112 includes a touch input device and is applied to a portable terminal of a touch input scheme, the display unit 112 can be used as an input device of the portable terminal.

    [0044] The communication unit 114 performs a function of transmitting/receiving and processing a wireless signal of data input/output through an antenna (not illustrated). For example, in a transmission mode, the communication unit 114 performs a function of processing original data through channel coding and spreading, converting the original data into a Radio Frequency (RF) signal, and transmitting the RF signal. In a reception mode, the communication unit 114 performs a function of converting a received RF signal into a baseband signal, processing the baseband signal through de-spreading and channel decoding, and restoring the signal to original data.

    [0045] A function of the AP management unit 102 can be implemented by the controller 100 of the portable terminal. However, these are separately constructed and shown in the present disclosure as an exemplary construction for description convenience, and should not limit the scope of the present disclosure. It should be understood by those skilled in the art that various modifications of construction can be made within the scope of the present disclosure. For example, construction may be such that all of these are processed in the controller 100.

    [0046] FIGURE 2 illustrates an AP connection process of a portable terminal according to the present disclosure.

    [0047] Referring to FIGURE 2, after the portable terminal outputs a list of peripheral APs in step 201, the portable terminal proceeds to step 203 and sets a group for each AP. For one example, the portable terminal can set a group based on a security level for a peripheral AP in steps 201 to 203. In the example, the security level for the AP can be a level of an AP open to all users, a level of an AP registering an authentication number to grant only an individual's access, and a level of an AP restricting an access of a specific Internet site.

    [0048] After setting the group for each AP as above, the portable terminal can table and store information of the APs, and the set group.

    [0049] Next, the portable terminal proceeds to step 205 and determines if an AP use request, i.e., an AP access request (e.g., a WiFi network use request) by a user is generated.

    [0050] If the portable terminal determines in step 205 that the AP use request by the user is not generated, the portable terminal proceeds to step 221 and performs a corresponding function (e.g., a standby mode).

    [0051] In contrast, if the portable terminal determines in step 205 that the AP use request by the user is generated, the portable terminal proceeds to step 207 and outputs a list of preset groups. Then the portable terminal proceeds to step 209 and senses user's selection, determining a group of APs that a user intends to use.

    [0052] Next, the portable terminal proceeds to step 211 and searches peripheral APs and then, proceeds to step 213 and determines a group corresponding to the searched APs.

    [0053] To determine the group corresponding to the APs, the portable terminal can compare information of the searched AP with previously stored tabled group information.

    [0054] After that, the portable terminal proceeds to step 215 and classifies APs belonging to the group selected by the user in step 209 among the APs searched in step 211. Next, the portable terminal proceeds to step 217 and sets priorities of the classified APs. Here, the priority of the classified AP can be an intensity of a signal of the AP.

    [0055] Next, the portable terminal proceeds to step 219 and performs AP connection according to priority.

    [0056] As a result, the portable terminal connects with an AP corresponding to a group according to a user's characteristic, thereby being capable of preventing an attempt to access an AP other than an AP that a user intends to access.

    [0057] Thereafter, the portable terminal terminates the algorithm according to the present disclosure.

    [0058] FIGURE 3 illustrates an AP connection process of a portable terminal according to an exemplary embodiment of the present disclosure.

    [0059] Referring to FIGURE 3, the portable terminal connects with an AP in step 301 and then, in step 303, the portable terminal executes an application according to a user's request.

    [0060] Next, the portable terminal proceeds to step 305 and determines if an application that a user intends to execute is an application needing WiFi connection. Here, the application needing the WiFi connection represents an application needing wireless Internet connection such as an electronic mail (e-mail) application and a social media messaging (e.g., Twitter) application.

    [0061] If the portable terminal determines in step 305 that the portable terminal intends to execute an application not needing WiFi connection, the portable terminal proceeds to step 317 and performs a corresponding function (e.g., execution of a requested application).

    [0062] In contrast, if the portable terminal determines in step 305 that the portable terminal intends to execute the application needing the WiFi connection, the portable terminal proceeds to step 307 and determines a level of the application that the user intends to execute. Here, the level of the application, a level representing user's personal information protection, can be divided into an application of a security level (e.g., a financial application, an e-mail application for business use, an e-mail application for individual use and the like) and an application of a general level (e.g., a game application, a messenger application and the like).

    [0063] After that, the portable terminal proceeds to step 309 and determines the level of the application determined in step 307.

    [0064] If the portable terminal determines in step 309 that the determined level of the application is a security level requiring security, the portable terminal proceeds to step 311 and determines a level of an AP being in previous connection. Then the portable terminal proceeds to step 313 and determines if the level of the AP being in previous connection determined in step 311 is a security level. Here, as illustrated in FIGURE 2, the security level of the AP can be a level of an AP open to all users, a level of an AP registering an authentication number to grant only an individual's access, and a level of an AP restricting an access of a specific Internet site. The AP of the security level can be of a level of an AP restricting an access of a specific Internet site.

    [0065] If the portable terminal determines in step 313 that the portable terminal is in connection with the AP of the security level, the portable terminal proceeds to step 315 and processes to drive an application through connection of the AP of the security level, protecting user's personal information.

    [0066] In contrast, if the portable terminal determines in step 313 that the portable terminal is in connection with an AP of a general level (i.e., a non-security level), the portable terminal proceeds to step 319 and releases the connection with the AP of the non-security level. Then the portable terminal proceeds to step 321 and searches an AP of a security level. Here, the portable terminal can search the AP of the security level using group information that is set in FIGURE 2.

    [0067] After that, the portable terminal proceeds to step 315 and processes to drive an application through connection of the AP of the security level, protecting user's personal information.

    [0068] The portable terminal of FIGURE 3 automatically searches and connects an AP of a level of an application executed by a user, thus protecting user's personal information.

    [0069] Next, the portable terminal terminates the algorithm according to the present disclosure.

    [0070] FIGURES 4A-4D illustrate AP search screens of a portable terminal according to a desirable exemplary embodiment of the present disclosure.

    [0071] Referring to FIGURE 4A, when searching peripheral APs, the portable terminal generally outputs (401) a list of the peripheral APs as illustrated in FIGURE 4A. At this time, the portable terminal displays the names (e.g., 'TEAM1', 'TEAM2', 'OFFICE', 'AHN', 'AAA', 'ZZZ') of the searched APs, an intensity of a receive signal, and an access set state (i.e., a password set state) and the like.

    [0072] In addition to this, the portable terminal can set groups for the respective output APs according to the present disclosure.

    [0073] A user of the portable terminal can set a group for each AP. If the group is set as above, the portable terminal displays (402) set levels at the sides of the items of the searched APs.

    [0074] For one example, the user of the portable terminal can divide groups of APs according to security level. That is, as illustrated, the user can set APs (e.g., 'TEAM1', 'TEAM2', 'OFFICE') restricting an access of a specific Internet site, to primary security levels, and set APs (e.g., 'AHN', 'AAA', 'ZZZ') possessed by individual persons, to secondary security levels.

    [0075] The APs set to the primary security levels can be APs with self-security systems for performing anti-spam and blocking an access to a site of low safety. Accordingly, the portable terminal should use the AP that the user sets to the primary security level and, although a signal of the AP included in the secondary security level is good, the portable terminal connects with the AP set to the primary security level.

    [0076] After setting the groups for the APs according to the present disclosure as above, if the user of the portable terminal enters a Wireless Local Area Network (WLAN) set menu in order to perform a WiFi function, the portable terminal outputs a button activating a WiFi function and items of the preset groups of the APs. As illustrated in FIGURE 4B, the portable terminal outputs (403) items of preset primary security level, secondary security level, and general AP level such that the portable terminal searches an AP of a corresponding level according to user's selection. That is, if the user selects the primary security level, the portable terminal will intend to search and connect APs set to the primary security levels as illustrated in FIGURE 4C.

    [0077] If the portable terminal searches and connects the APs set to the primary security levels as above, the portable terminal can prevent AP hacking through an AP whose security against the external Internet is verified and, although using the Internet, the portable terminal can prevent a leakage of main information (i.e., development secret, business secret, confidential document, personal authentication information and the like).

    [0078] Further, if the user selects the secondary security level, the portable terminal will intend to search and connect the APs set to the secondary security levels as illustrated in FIGURE 4D.

    [0079] In addition, if the user intends to search all APs, the portable terminal will intend to search and connect all peripheral APs like an existing portable terminal.

    [0080] As described above, exemplary embodiments of the present disclosure are for grouping and managing APs existing around a portable terminal. In order to attempt connection prioritizing an AP belonging to a group, the exemplary embodiments of the present disclosure can omit a process of unnecessarily attempting connection to an AP not licensed to itself, and can set a group of high security, thus preventing information leakage using an AP.

    [0081] While the invention has been shown and described with reference to certain preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention as defined by the appended claims.


    Claims

    1. An apparatus configured to connect an Access Point, AP, in a portable terminal, the apparatus comprising:

    a group set unit (106) configured to:

    set APs to groups according to a user selection; and

    output (207) a list of the groups when an AP use request is generated; and

    an AP search unit (104) configured to:

    select (209) one of the groups;

    search (211) APs of the selected group; and

    classify (215) at least one AP associated with the selected group and connect (219) to a classified AP;

    wherein responsive to execution (303) of an application being detected, the AP search unit (104) is further configured to search an AP of a group corresponding to a security level of the application.


     
    2. The apparatus of claim 1, wherein the AP search unit (104) is further configured to: determine (305) whether the application whose execution is detected performs a WiFi connection; and determine (309) whether the application performing the WiFi connection corresponds to the security level.
     
    3. The apparatus of claim 2, wherein, responsive to the application corresponding to the security level being executed in a state of connection with an AP not corresponding to the security level, the AP search unit (104) is further configured to release (319) a connection with the AP not corresponding to the security level and connect with an AP corresponding to the security level.
     
    4. The apparatus of claim 1, wherein the group set unit (106) is further configured to set APs of high security as one group.
     
    5. The apparatus of claim 1, wherein the AP search unit (104) is further configured to connect to the APs belonging to the selected group, according to priority.
     
    6. A method for connecting an Access Point, AP, in a portable terminal, the method comprising:

    setting (203) APs to groups according to a user selection;

    outputting (207) a list of the groups when the AP use request is generated;

    selecting (209) one of the groups intended for use;

    searching (211) APs of the selected group;

    classifying (215) at least one APs associated with the selected group; and

    connecting (219) to a classified AP;

    wherein the method further comprises:

    responsive to detecting execution (303) of an application, searching an AP of a group corresponding to a security level of the application.


     
    7. The method of claim 6, wherein searching the AP of the group corresponding to the security level of the application comprises:

    determining (305) whether the application whose execution is detected performs a WiFi connection; and

    determining (309) whether the application performing the WiFi connection corresponds to the security level.


     
    8. The method of claim 7, comprising, responsive to the application corresponding to the security level being executed in a state of connection with an AP not corresponding to the security level, releasing (319) a connection with the AP not corresponding to the security level and connecting with an AP corresponding to the security level.
     
    9. The method of claim 6, wherein setting (203) the items of the APs to the group sets APs of high security as one group.
     
    10. The method of claim 6, wherein connecting to the classified AP connects to the APs belonging to the selected group, according to priority.
     


    Ansprüche

    1. Vorrichtung, die konfiguriert ist, sich mit einem Zugangspunkt, AP, in einem tragbaren Endgerät zu verbinden, wobei die Vorrichtung umfasst:

    Eine Gruppen-Einstelleinheit (106), die konfiguriert ist, Folgendes zu tun:

    Einstellen von Zugangspunkten nach Gruppen gemäß einer Benutzerauswahl; und

    Ausgeben (207) einer Liste von Gruppen, wenn eine Zugangspunkt-Verwendungsanforderung generiert wird; und

    eine Zugangspunkt-Sucheinheit (104) konfiguriert ist, Folgendes zu tun:

    Auswählen (209) einer der Gruppen;

    Suchen (211) von Zugangspunkten der ausgewählten Gruppe; und

    Klassifizieren (215) mindestens eines Zugangspunkts, der mit der ausgewählten Gruppe assoziiert ist und Verbinden (219) mit einem klassifizierten Zugangspunkt;

    wobei reagierend auf die Ausführung (303) einer detektierten Anwendung, die Zugangspunkt-Sucheinheit (104) ferner konfiguriert ist, einen Zugangspunkt einer Gruppe zu suchen, der einem Sicherheitsgrad der Anwendung entspricht.


     
    2. Vorrichtung nach Anspruch 1, wobei die Zugangspunkt-Sucheinheit (104) ferner konfiguriert ist, Folgendes zu tun: Ermitteln (305), ob die Anwendung, deren Ausführung detektiert wird, eine WiFi-Verbindung durchführt; und Ermitteln (309), ob die Anwendung, welche die WiFi-Verbindung durchführt, dem Sicherheitsgrad entspricht.
     
    3. Vorrichtung nach Anspruch 2, wobei, reagierend auf die Anwendung, die dem Sicherheitsgrad entsprechend in einem Verbindungszustand mit einem Zugangspunkt ausgeführt wird, der nicht dem Sicherheitsgrad entspricht, die Zugangspunkt-Sucheinheit (104) ferner konfiguriert ist, eine Verbindung mit dem Zugangspunkt zu lösen (319), der nicht dem Sicherheitsgrad entspricht und mit einem Zugangspunkt zu verbinden, der dem Sicherheitsgrad entspricht.
     
    4. Vorrichtung nach Anspruch 1, wobei die Gruppen-Einstelleinheit (106) ferner konfiguriert ist, Zugangspunkte hoher Sicherheit als eine Gruppe einzustellen.
     
    5. Vorrichtung nach Anspruch 1, wobei die Zugangspunkt-Sucheinheit (104) ferner konfiguriert ist, gemäß Priorität, Verbindung mit den Zugangspunkten herzustellen, die zur ausgewählten Gruppe gehören.
     
    6. Verfahren zur Verbindung eines Zugangspunkts, AP, in einem tragbaren Endgerät, wobei das Verfahren umfasst:

    Einstellen (203) von Zugangspunkten nach Gruppen gemäß einer Benutzerauswahl;

    Ausgeben (207) einer Liste von Gruppen, wenn die Zugangspunkt-Verwendungsanforderung generiert wird;

    Auswählen (209) einer der zur Verwendung beabsichtigten Gruppen;

    Suchen (211) von Zugangspunkten der ausgewählten Gruppe;

    Klassifizieren (215) mindestens eines Zugangspunkts, der mit der ausgewählten Gruppe assoziiert ist; und

    Verbinden (219) mit einem klassifizierten Zugangspunkt;

    wobei das Verfahren ferner umfasst:

    Reagierend auf das Detektieren von Ausführung (303) einer Anwendung, Suchen eines Zugangspunkts einer Gruppe, der einem Sicherheitsgrad der Anwendung entspricht.


     
    7. Verfahren nach Anspruch 6, wobei das Suchen des Zugangspunkts der Gruppe, der dem Sicherheitsgrad der Anwendung entspricht, umfasst:

    Ermitteln (305), ob die Anwendung, deren Ausführung detektiert wird, eine WiFi-Verbindung durchführt; und

    Ermitteln (309), ob die Anwendung, welche die WiFi-Verbindung durchführt, dem Sicherheitsgrad entspricht.


     
    8. Verfahren nach Anspruch 7, umfassend: Reagierend auf die Anwendung, die dem Sicherheitsgrad entsprechend in einem Verbindungszustand mit einem Zugangspunkt ausgeführt wird, der nicht dem Sicherheitsgrad entspricht, Lösen (319) einer Verbindung mit dem Zugangspunkt, der nicht dem Sicherheitsgrad entspricht und Verbinden mit einem Zugangspunkt, der dem Sicherheitsgrad entspricht.
     
    9. Verfahren nach Anspruch 6, wobei das Einstellen (203) der Posten der Zugangspunkte nach der Gruppe, Zugangspunkte hoher Sicherheit als eine Gruppe einstellt.
     
    10. Verfahren nach Anspruch 6, wobei das Verbinden des klassifizierten Zugangspunkts, gemäß Priorität, Verbindung mit den zur ausgewählten Gruppe gehörenden Zugangspunkten herstellt.
     


    Revendications

    1. Un appareil configuré de façon à se connecter à un point d'accès, AP, dans un terminal portatif, l'appareil comprenant :

    une unité de définition de groupes (106) configurée de façon à :

    définir des AP en groupes en fonction d'une sélection d'utilisateur, et

    produire en sortie (207) une liste des groupes lorsqu'une demande d'utilisation d'AP est générée, et

    une unité de recherche d'AP (104) configurée de façon à :

    sélectionner (209) un des groupes,

    rechercher (211) des AP du groupe sélectionné, et

    classer (215) au moins un AP associé au groupe sélectionné et se connecter (219) à un AP classé,

    où, en réponse à l'exécution (303) d'une application qui est détectée, l'unité de recherche d'AP (104) est configurée en outre de façon à rechercher un AP d'un groupe correspondant à un niveau de sécurité de l'application.


     
    2. L'appareil selon la Revendication 1, où l'unité de recherche d'AP (104) est configurée en outre de façon à : déterminer (305) si l'application dont l'exécution est détectée exécute une connexion WiFi et déterminer (309) si l'application exécutant la connexion WiFi correspond au niveau de sécurité.
     
    3. L'appareil selon la Revendication 2, où, en réponse à l'exécution de l'application correspondant au niveau de sécurité dans un état de connexion avec un AP ne correspondant pas au niveau de sécurité, l'unité de recherche d'AP (104) est configurée en outre de façon à libérer (319) une connexion avec l'AP ne correspondant pas au niveau de sécurité et se connecter à un AP correspondant au niveau de sécurité.
     
    4. L'appareil selon la Revendication 1, où l'unité de définition de groupes (106) est configurée en outre de façon à définir des AP de haute sécurité sous la forme d'un groupe.
     
    5. L'appareil selon la Revendication 1, où l'unité de recherche d'AP (104) est configurée en outre de façon à se connecter aux AP appartenant au groupe sélectionné en fonction d'une priorité.
     
    6. Un procédé de connexion à un point d'accès, AP, dans un terminal portatif, le procédé comprenant :

    la définition (203) d'AP en groupes en fonction d'une sélection d'utilisateur,

    la production en sortie (207) d'une liste des groupes lorsque la demande d'utilisation d'AP est générée,

    la sélection (209) d'un des groupes en vue d'une utilisation,

    la recherche (211) d'AP du groupe sélectionné,

    le classement (215) d'au moins un AP associé au groupe sélectionné, et

    la connexion (219) à un AP classé,

    où le procédé comprend en outre :

    en réponse à la détection d'une exécution (303) d'une application, la recherche d'un AP d'un groupe correspondant à un niveau de sécurité de l'application.


     
    7. Le procédé selon la Revendication 6, où la recherche de l'AP du groupe correspondant au niveau de sécurité de l'application comprend :

    la détermination (305) si l'application dont l'exécution est détectée exécute une connexion WiFi, et

    la détermination (309) si l'application exécutant la connexion WiFi correspond au niveau de sécurité.


     
    8. Le procédé selon la Revendication 7, comprenant, en réponse à l'exécution de l'application correspondant au niveau de sécurité dans un état de connexion avec un AP ne correspondant pas au niveau de sécurité, la libération (319) d'une connexion avec l'AP ne correspondant pas au niveau de sécurité et la connexion à un AP correspondant au niveau de sécurité.
     
    9. Le procédé selon la Revendication 6, où la définition (203) des éléments des AP en groupes définit des AP de haute sécurité sous la forme d'un groupe.
     
    10. Le procédé selon la Revendication 6, où la connexion à l'AP classé connecte aux AP appartenant au groupe sélectionné en fonction d'une priorité.
     




    Drawing















    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description