Method for Physically Updating Configuration Information for Devices in a Wireless Network

ABSTRACT

A method for providing configuration information for use in installing a new wireless station to a wireless network that minimizes errors is presented. The configuration information is distributed by storing the configuration information onto a device with a memory and then distributing the device to the users interested in installing new wireless stations. The device is attached to a computer to which the wireless station is coupled, initiating a transfer of the configuration information. The computer uses the configuration information to configure the wireless station. The method also provides a way to limit access to the configuration information through the use of encryption and limiting the number of times the configuration information is retrieved. The method is also an effective way to distribute security keys for encryption systems whose purpose is to secure communications in a wireless network.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a Divisional of and claims priority under 35 U.S.C.Section 121 to U.S. patent application Ser. No. 10/000,982, filed onOct. 24, 2001 and entitled “Method for Physically Updating ConfigurationInformation for Devices in a Wireless Network” by Zeijko John Serceki etal.

FIELD OF THE INVENTION

This invention relates generally to wireless networks, and particularlyto exchanging configuration information of wireless networks using aphysical medium for the data transfer.

BACKGROUND OF THE INVENTION

Wireless networks provide a high level of convenience for their users.Once the wireless networks are properly configured, users can roamfreely within the coverage area of the wireless network without beingencumbered by network connections. Additionally, installation ofwireless networks does not require extensive drops of expensive networkcabling.

However, configuring and installing a wireless network is notnecessarily a simple task. Because the communications medium for awireless network is typically “air”, communications from multiplewireless networks may be present on the communications mediumsimultaneously within a given location. Unique network identifiers areused to distinguish transmissions from one wireless network overanother. A typical installation scenario may require that the installermanually input the unique network identifier into the installationprogram, along with other required information, such as client address,client name, network address, network name, etc. Manual data entry ofthis extensive list of information is at the very least tedious anderror prone. Manual data entry also limits the number of installationsthat can be performed in a day. Compare this to the installation of atypical wired network, where configuration and installation has becomeas simple as plugging an active network drop into a network interfacecard installed on a computer and having the computer automaticallyadding itself to the network and configuring itself.

One solution to the installation problem involves the use of a set ofdefault values. Through the use of default values, wireless networks canautomatically configure themselves during the initially power-on afterthe components have been installed. However, default values do not workvery well when there are multiple wireless networks of the same typeoperating in a given location, due to transmission conflicts between thenetworks and the confusion that results. Additionally, default valuespresent security issues that are open to exploitation by anyone whoknows of their use. For example, a disgruntled employee with knowledgeof the default values may simply park his car outside of the businesslocation and turn his computer and is given full access of the business'computer system.

Another problem facing wireless networks is the inherent insecurity oftheir transmissions. A motivated person with electronic surveillanceequipment can capture the transmissions and can obtain access to theinformation in the transmissions. A solution provided for securingcommunications on a wireless network is to use a built-insecurity/encryption mechanism, such as Wired Equivalent Privacy (WEP)used in IEEE 802.11 wireless local area networks. However, WEP and manyother security mechanisms require that security keys be manuallyinputted during installation or updates. This leads to distribution ofthe security keys via electronic mails with the security keys includedin them, or the security keys are written down on pieces of paper. Suchunsecured methods of security key distribution severely weakens thesecurity system because persons not authorized for access to thesecurity keys may be able to obtain the keys, often times by simplytaking a piece of paper out of a waste-paper basket.

A need has therefore arisen for a method to provide easy exchange ofconfiguration information and at the same time, provide a measure ofsecurity for the information.

SUMMARY OF THE INVENTION

The preferred embodiment of the invention provides a way to distributeconfiguration information to wireless stations via the use of a devicethat stores the configuration information in memory. When a user isprovided the device, he/she can connect it to a computer that isconnected to the wireless station and the computer will read out theconfiguration information and configure the wireless station so that itwill be able to operate in a wireless network. The device can also beused to distribute encryption keys for the wireless network, along withwhatever information deemed important.

In one aspect, the present invention provides a method for physicallyexchanging configuration information and/or encryption keys in awireless network for use in configuring wireless station comprisingsaving the configuration information and/or encryption keys onto aphysical device, coupling the physical device to a wireless station,initiating the download of the information stored on the physical deviceand using the configuration information to configure the wirelessstation that is coupled to the digital device.

The present invention provides a number of advantages. For example, useof the preferred embodiment reduces the change of errors by electronicdistribution of configuration. Because of this, the manual entry ofcomplex information is not required, thus reducing the chance of errors.

Also, because the methods are simple, security information is morelikely to be updated frequently. Other methods that are tedious and/orcumbersome are likely to be neglected.

Aspects of the present invention that utilizes electronic transfer ofconfiguration information have the advantage that a layer of securitycan be added to the configuration and security information. Thisadditional layer of security helps prevent unauthorized users fromobtaining access to the information.

BRIEF DESCRIPTION OF THE DRAWINGS

The above features of the present invention will be more clearlyunderstood from consideration of the following descriptions inconnection with accompanying drawings in which:

FIG. 1 displays a typical implementation of a wireless network;

FIG. 2 displays a device for exchanging configuration informationaccording to a preferred embodiment of the present invention;

FIG. 3 displays another device for exchanging configuration informationaccording to a preferred embodiment of the present invention;

FIG. 4 displays a flow diagram of a typical sequence of steps involvedin the distribution and updating of security keys in a wireless networkaccording to a preferred embodiment of the present invention; and

FIG. 5 a-d display various embodiments of the present invention for adevice for exchanging configuration information.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

The making and use of the various embodiments are discussed below indetail. However, it should be appreciated that the present inventionprovides many applicable inventive concepts which can be embodied in awide variety of specific contexts. The specific embodiments discussedare merely illustrative of specific ways to make and use the invention,and do not limit the scope of the invention.

Networks adhering to the IEEE 802.11 technical standard and its moreadvanced version, IEEE 802.11b, are among the most widely availablewireless networks today. The IEEE 802.11b wireless network operates inthe 2.4 GHz Industrial, Scientific, and Medial (ISM) radio frequency(RF) spectrum band and provides up to 11 Mbps of data transfer rate. TheIEEE 802.11 wireless network is specified in a technical standarddocument, “ANSI/IEEE Std 802.11, 1999 Edition; Informationtechnology—Telecommunications and information exchange betweensystems—Local and metropolitan area networks—Specific requirements. Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)Specifications,” which is incorporated herein by reference. The IEEE802.11b wireless network is specified in a supplement to the IEEE 802.11technical standard, “IEEE Std 802.11b-1999 (Supplement to ANSI/IEEE Std802.11, 1999 Edition) Supplement to IEEE Standard for Informationtechnology—Telecommunications and information exchange betweensystems—Local and metropolitan area networks—Specific requirements—Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)specifications: Higher-Speed Physical Layer Extension in the 2.4 GHzBand” which is also incorporated herein by reference.

For discussion purposes, the focus of this specification is mainly onwireless communications networks that are adherent to the IEEE 802.11technical standard and uses personal computers. However, the ideaspresented in the preferred embodiments of the present invention haveapplicability in other networks where a client must be configured withvarious pieces of configuration information before they can beginoperation. Therefore, the present invention should not be construed asbeing limited to only IEEE 802.11 wireless networks. Examples of suchnetworks include HomeRF, Hiperlan, and other wireless networks thatrequire a client be configured with information or be updatedperiodically with security information.

Referring now to FIG. 1, a diagram (prior art) of a typical wirelessnetwork configuration according to the 802.11 technical standard. Notethat FIG. 1 displays one possible configuration of an 802.11 wirelessnetwork out of the many different configurations that are possible. FIG.1 illustrates a wireless network 100 comprising an access point 110 thatis wirelessly connected to a first wireless station 120 and a secondwireless station 130. The access point 110 can be viewed as a controllerof communications taking place within the wireless network 100.

Prior to use, a wireless station should be configured with a uniquenetwork identifier that is used to identify communications within thewireless network. All communications within a wireless networkcontrolled by the access point 110 are so labeled so that other accesspoints and wireless stations will be able to identify the origination ofsuch communications. In addition, other configuration information suchas device addresses, device names, network addresses, network names,domain names, subnet masks, etc. are required for the proper integrationof the wireless station into the existing wireless network.

If the wireless network uses an encryption mechanism, such as WiredEquivalent Privacy (WEP) in an IEEE 802.11 wireless network, to helpincrease security in the network, then the security keys should also beentered during the installation process. Security keys are typicallylong, random strings of alphanumeric characters, making them verydifficult to remember and to accurately enter. Such security keys areusually distributed by emails, written down on pieces of paper, or knownonly to authorized personnel. Distribution by email or pieces of paperis very insecure since emails are easily intercepted and paper can bereadily retrieved from trash bins. If the security keys are limited toonly a small number of people, then the installation of new wirelessstations is limited to how many stations these trusted people can attendto.

Such distribution methods also make it very difficult to update theconfiguration information and the security keys, since it takes so longto perform the changes. The inertia and inherent inefficiencies in thesystem make it very easy to neglect updating the security keys,therefore, jeopardizing the security of the wireless network.

Rather than requiring the installer to enter all of this information orhaving an information systems support staff member perform all of theinstallations, the configuration information may be stored on a devicethat can be passed around to various users who are installing wirelessstations. The user would then only need to install the hardware portionof the wireless station and when prompted for configuration information,connect the device to the personal computer or the wireless station andthe configuration information would be automatically provided to theinstallation software, negating manual entry of the configurationinformation. Alternatively, after installing the hardware portion of thewireless station, the user can connect the device to the personalcomputer or the wireless station and the software installation initiatesautomatically upon detection of the connection of the device.

Referring now to FIG. 2, a diagram illustrates a device 200 for use inphysically exchanging network configuration information in a wirelessnetwork according to a preferred embodiment of the present invention.The device 200 comprises a storage unit 210 and a connector 215. A cable220 connects the storage unit 210 to the connector 215. Additional gluelogic and interface logic for providing interoperability between thedevice 200 and the personal computer that the device 200 connects to isnot shown in FIG. 2. It is understood, however, that such logic istypically necessary for proper functionality of the device 200 and thepresent invention.

The storage unit 210 comprises a memory 225 and optionally, a processor230. The memory 225 is used for storing the configuration informationand the security keys and any other type of information deemednecessary. The processor 230 can be used to provide an encryptionfunction to the device 200 to help protect the contents of the device200. Additionally, the processor 230 can be used to limit access tocertain specified users and wireless stations or the processor 230 canlimit the number of times the configuration is retrieved from the device200. If the processor 230 is not present in the device, then some of theadded functionality such as encryption and access control are notavailable, unless the installation/update software executing on thepersonal computer supports the added functionality and performs thefunctionality. However, if the encryption and access control isperformed by the installation/update software, then the level ofsecurity provided is not as high as if they were performed by theprocessor 230.

According to a preferred embodiment of the present invention, theconfiguration information may be downloaded (or programmed onto) thedevice 200 by a device programmer (not shown). The device programmerwould be able to couple to the device 200 via a preferred connectionmechanism, typically, the same connection mechanism (the connector 215)that is used to couple the device 200 to the personal computer. Once thedevice 200 is coupled to the device programmer, the configurationinformation and/or encryption keys and any other type of information canbe downloaded onto the device 200. The device programmer may be acomputer (or some other digital device) used by an installer or anetwork administrator.

According to a preferred embodiment of the present invention, theconnector 215 is preferably a Universal Serial Bus (USB) connector.However, any other type of connector that can provide connectivity andexchange of information between a personal computer and the device 200is also operable. Other examples of connectors include, but are notlimited to: IEEE 1394 (FireWire), serial data connectors, parallel dataconnectors, Apple Desktop Bus (ADB) connectors, Small Computer SystemInterface (SCSI) connectors, etc.

According to another preferred embodiment of the present invention, theconnector 215 and the cable 220 are replaced by a wireless connection.The wireless connection would negate the need to use physical connectorsto connect the device 200 to a personal computer. The connector 215 andthe cable 220 are replaced by a wireless transmitter and receiver pair,the pair is commonly referred to as a transceiver. Examples of wirelessconnections include, but are not limited to: radio frequency (RF),infrared, laser light emitting diodes, laser, microwave, etc.

Referring now to FIG. 3, a diagram illustrates a device 300 forphysically exchanging configuration information in a wireless networkaccording to a preferred embodiment of the present invention.Internally, device 300 is similar to device 200 (FIG. 2) in that it hasa memory 325 for storing information and a processor 330 (optional) forproviding additional functionality support. However, rather thanconnecting to a personal computer via a cable or wireless connection,the device 300 features a special connector 315 that adheres to a commoncomputer interface specification. For example, the connector 315 may bea PC Card interface connector (formerly known as PCMCIA), any one of themany memory storage device interfaces, such as Memory Stick, SanDisk,Compact Flash, CF Flash, Smart Media, Secure Digital, MultiMedia Card(MMC), NAND Flash, etc., or a proprietary memory interface.

Referring now to FIG. 4, a flow diagram 400 displays a sequence of stepsinvolved in changing a set of security keys for a wireless networkaccording to a preferred embodiment of the present invention. FIG. 4displays the sequence of steps under the assumption that wirelessstations in the wireless network are already properly configured andoperational. The sequence 400 begins when a network administratordecides to change the security (WEP) keys for the wireless network(410). Depending on internal policies, the network administrator may berequired to change the security keys at regular intervals or afterdetecting a security breach. Regardless of the case, the new securitykeys and other wireless network information are stored onto the device(420). As discussed previously, the information written to the devicemay be encrypted or encoded to reduce illicit distribution.

According to a preferred embodiment of the present invention, thenetwork administrator may create a plurality of the devices to speed thedistribution of the new security keys. After the network administratorcreates the devices, the devices are distributed to users who need them(430). The user then simply inserts the device into a correspondingaccess port (440) on his/her personal computer. A preferred accessmethod is through the personal computer's USB port, though, as discussedpreviously, there are many different ways of interfacing the device tothe personal computer.

With the device connected to the personal computer, the personalcomputer is able to detect the presence of the device (450).Autodetection is a function of the particular type of access port used.For example, more advanced ports such as USB and IEEE 1394 ports canautomatically detect a new device being connected to them. However,older legacy ports such as the standard serial and parallel portscannot. According to another embodiment of the present invention, if thedevice interfaces to the personal computer through a port that does notsupport automatic detection of devices being connected to it, then theuser is required to perform an additional step of executing a programthat will initiate the data exchange sequence. This may be achieved byselecting the program to execute or by pressing a designated button onthe personal computer or entering a particular key sequence on thepersonal computer's keypad.

However, if the port supports automatic detection of devices connectedto it, then the personal computer will be able to detect the insertionof the device (450) and it will automatically execute a program designedto retrieve the information stored in the device. According to anotherpreferred embodiment of the present invention, the device is linked to asingle user and computer and access control will verify if the device isconnected to the authorized computer before permitting the personalcomputer to retrieve the contents. As discussed previously, encryptionand access control can be performed by a processor located inside thedevice or it may be performed by the installation/update softwareexecuting on the personal computer.

According to another preferred embodiment of the present invention, theconfiguration information on the device may be retrieved only one time(or a specified number of retrievals) and the device will allow only asingle retrieval (or up to the specified number of retrievals) of theinformation stored on it. Any attempts at retrieving the informationwhen the number of accesses has exceeded the allowed limit will fail.

After retrieving the information, the personal computer uses theinformation to configure the wireless station connected to the personalcomputer (460) and the personal computer resumes operation, using thenewly supplied network information (470). The user can then return thedevice to the network administrator or pass it onto other users of thewireless network (480).

Referring now to FIGS. 5 a-d, diagrams illustrate different embodimentsof the present invention. FIG. 5 a displays a preferred embodiment ofthe present invention, wherein a personal computer 505 is coupled to awireless station 507. FIG. 5 a displays the wireless station 507 asbeing external to the personal computer 505. However, in mostapplications the wireless station 507 is a computer card that fitsinside a slot in the personal computer 505. In some applications, thewireless station 507 is actually integrated into the personal computer505. The wireless station 507 is only shown to be external to thepersonal computer 505 to show that in the majority of instances, thepersonal computer 505 and the wireless station 507 are separateentities. A device 509 that contains configuration informationinterfaces to the personal computer 505 through an interface slot 511.The interface slot 511 can be, but is not limited to: a PC Cardinterface (formerly known as a PCMCIA interface), a memory storagedevice interface, such as Memory Stick, Compact Flash, CF Flash,SanDisk, Smart Media, Secure Digital, MultiMedia Card (MMC), NAND Flash,etc., or some proprietary memory interface built into the personalcomputer 505. Alternatively, the device 509 may be as simple as a floppydisk, a compact disk, or any other type of removable magnetic/opticalmedia that is capable of containing the configuration information.

Referring now to FIG. 5 b, a diagram illustrates another preferredembodiment of the present invention. FIG. 5 b illustrates a personalcomputer 515 being coupled to a wireless station 517. A device 519containing configuration information is transferring its information tothe personal computer through some wireless connection. The personalcomputer 515 has a wireless transceiver 521 that is capable of receivingand transmitting information to and from the device 519. The personalcomputer 515 and the device 519 may use, but is not limited to, any ofthe following wireless communications methods: radio frequency (RF),microwave, infrared, laser, etc.

Referring now to FIG. 5 c, a diagram illustrates yet another preferredembodiment of the present invention. FIG. 5 c illustrates a personalcomputer 525 being coupled to a wireless station 527. A device 529containing configuration information is coupled to the personal computervia a wired connection through a port 531 on the personal computer 525.Examples of computer ports that may be used for communicating betweenthe personal computer 525 and the device 529 include, but are notlimited to: USB ports, IEEE 1394 ports, serial data ports, parallel dataports, SCSI ports, and any type of proprietary data port.

Referring now to FIG. 5 d, a diagram illustrates another preferredembodiment of the present inventions. Previous described preferredembodiments have involved the use of some connection between a personalcomputer and a device that requires that the personal computer have amatching and compatible connection. FIG. 5 d displays a preferredembodiment wherein a personal computer 535, being coupled to a wirelessstation 537 is not required to possess any type of compatible connectionat all. Rather than requiring the personal computer 535 possess acompatible connection, there is a docking station 539, to which thepersonal computer 535 may connect. There is some connectivity providedbetween the personal computer 535 and the docking station 539 throughthe use of a connector(s) 541. Also coupled to the docking station is anetwork 543. The connection between the docking station 539 and thenetwork 543 may be via one of many various types of network connections,such as a direct-connect local area network connection, a high-speeddigital connections such as a digital subscriber line or a cable modemline, a dial-up modem connection, or even a high-speed wirelessconnection.

When the personal computer 535 is connected to the docking station 539and the connections 541 are made, the personal computer 535 can begindownloading the configuration information stored somewhere on thenetwork 543. An advantage of this preferred embodiment is that there areno devices that require updating and distributing. A company may haveseveral such docking stations strategically located through out theoffice space and users can periodically insert their personal computerto retrieve configuration information updates.

An alternative embodiment to FIG. 5 d exists wherein the docking stationis not connected to a network, but it is connected to or containstherein a device (similar to such devices discussed previously) thatcontains the updated configuration information. Upon insertion of thepersonal computer, the updated configuration information may beretrieved.

In the discussion of preferred embodiments of the present invention, theterm personal computer has been used exclusively. The term personalcomputer is used to represent a wide array of different computers,ranging from the classical desktop personal computer to the portablelaptop, from pen-based computers to personal digital assistants, fromsmart cellular telephones to palm sized organizers. Basically, the termpersonal computer can represent any digital device that can takeadvantage of a digital wireless network connection to distributeinformation and/or multimedia content.

While this invention has been described with reference to illustrativeembodiments, this description is not intended to be construed in alimiting sense. Various modifications and combinations of theillustrative embodiments, as well as other embodiments of the invention,will be apparent to persons skilled in the art upon reference to thedescription. It is therefore intended that the appended claims encompassany such modifications or embodiments.

1-27. (canceled)
 28. A method of configuring a wireless communicationsnetwork, the method comprising: coupling a universal serial bus (USB)connector of a flash device to a first USB port of a first computercoupled to a first wireless station, wherein the flash device comprisesa memory and a processor; downloading wireless network configurationinformation from the first computer into the memory in the flash device,wherein the information comprises a network name and a security key forthe wireless communications network; uncoupling the flash device fromthe first USB port of the first computer; coupling the USB connector ofthe flash device to a second USB port of a second computer coupled to asecond wireless station; transferring the wireless network configurationinformation from the memory of the flash device to the second computer;configuring the second wireless station using the wireless networkconfiguration information; and connecting the second wireless station tothe wireless communications network based on the wireless networkconfiguration information.
 29. The method of claim 28, furthercomprising verifying, before the transferring, that the second wirelessstation is a desired recipient of the wireless network configurationinformation.
 30. The method of claim 28, further comprisingautomatically detecting, by the second computer, the coupling of theflash device to the second USB port.
 31. The method of claim 28, whereinthe wireless communications network is an 802.11 wireless network. 32.The method of claim 28, wherein the security key is a wired equivalentprivacy (WEP) key.
 33. The method of claim 28, further comprisinguncoupling the USB connector of the flash device from the second USBport of the second computer.
 34. The method of claim 28, wherein secondwireless station is integrated into the second computer.
 35. A method ofupdating a configuration of a wireless communications network, wherein asecond wireless station in the network is configured with initialwireless network configuration information, the method comprising:joining a universal serial bus (USB) connector of a flash device to afirst USB port of a first computer coupled to a first wireless station,wherein the flash device comprises a memory and a processor; downloadingupdated wireless network configuration information from the firstcomputer into the memory in the flash device, wherein the updatedwireless network configuration information comprises a network name anda security key for the wireless communications network; uncoupling theflash device from the first USB port of the first computer; coupling theUSB connector of the flash device to a second USB port of a secondcomputer coupled to the second wireless station; transferring theupdated wireless network configuration information from the memory ofthe flash device to the second computer; reconfiguring the secondwireless station from the initial wireless network configurationinformation to the updated wireless network configuration information;and connecting the second wireless station to the wirelesscommunications network based on the updated wireless networkconfiguration information.
 36. The method of claim 35, furthercomprising selectively repeating the coupling, transferring,reconfiguring, and connecting steps for each one of a plurality ofcomputers coupled to respective wireless stations in the wirelesscommunications network.
 37. The method of claim 35, further comprisingverifying, before the transferring, that the second wireless station isa desired recipient of the updated wireless network configurationinformation.
 38. The method of claim 35, wherein the initial wirelessnetwork configuration information and the updated wireless networkconfiguration information are different.
 39. The method of claim 38,wherein specific information that is different is selected from thegroup consisting of the network name, the security key, and both thenetwork name and security key.
 40. The method of claim 35, wherein thesecond wireless station is external to the second computer.
 41. Themethod of claim 35, wherein the wireless communications network is an802.11 wireless network.
 42. A method of configuring a wireless stationin a wireless communications network, the method comprising:automatically detecting, by a computer coupled to the wireless station,a coupling of a universal serial bus (USB) connector of a flash deviceto a USB port of the computer, wherein the flash device comprises amemory and a processor; automatically initiating, by the computer,wireless configuration installation software in response to thedetecting; transferring, by the installation software, wireless networkconfiguration information from the memory of the flash device to thecomputer, wherein the information comprises a network name and asecurity key for the wireless communications network; configuring, bythe installation software, the wireless station using the wirelessnetwork configuration information; and connecting the wireless stationto the wireless communications network based on the wireless networkconfiguration information.
 43. The method of claim 42, furthercomprising verifying, before the transferring, that the wireless stationis a desired recipient of the wireless network configurationinformation.
 44. The method of claim 42, wherein the wireless station isintegrated into the computer.
 45. The method of claim 42, wherein thewireless communications network is an 802.11 wireless network.
 46. Themethod of claim 42, wherein the security key is a wired equivalentprivacy (WEP) key.
 47. A method of configuring a wireless communicationsnetwork, the method comprising: coupling a universal serial bus (USB)connector of a flash device to a first USB port of a first digitaldevice coupled to a first wireless station, wherein the flash devicecomprises a memory and a processor; downloading wireless networkconfiguration information from the first digital device into the memoryin the flash device, wherein the information comprises a network nameand a security key for the wireless communications network; uncouplingthe flash device from the first USB port of the first digital device;coupling the USB connector of the flash device to a second USB port of asecond digital device coupled to a second wireless station; transferringthe wireless network configuration information from the memory of theflash device to the second digital device; configuring the secondwireless station using the wireless network configuration information;and connecting the second wireless station to the wirelesscommunications network based on the wireless network configurationinformation.
 48. The method of claim 47, further comprising verifying,before the transferring, that the second wireless station is a desiredrecipient of the wireless network configuration information.
 49. Themethod of claim 47, further comprising automatically detecting, by thesecond digital device, the coupling of the flash device to the secondUSB port.
 50. The method of claim 47, wherein the wirelesscommunications network is an 802.11 wireless network.
 51. The method ofclaim 47, wherein the security key is a wired equivalent privacy (WEP)key.
 52. The method of claim 47, further comprising uncoupling the USBconnector of the flash device from the second USB port of the seconddigital device.
 53. The method of claim 47, wherein second wirelessstation is integrated into the second digital device.
 54. A method ofupdating a configuration of a wireless communications network, wherein asecond wireless station in the network is configured with initialwireless network configuration information, the method comprising:joining a universal serial bus (USB) connector of a flash device to afirst USB port of a first digital device coupled to a first wirelessstation, wherein the flash device comprises a memory and a processor;downloading updated wireless network configuration information from thefirst digital device into the memory in the flash device, wherein theupdated wireless network configuration information comprises a networkname and a security key for the wireless communications network;uncoupling the flash device from the first USB port of the first digitaldevice; coupling the USB connector of the flash device to a second USBport of a second digital device coupled to the second wireless station;transferring the updated wireless network configuration information fromthe memory of the flash device to the second digital device;reconfiguring the second wireless station from the initial wirelessnetwork configuration information to the updated wireless networkconfiguration information; and connecting the second wireless station tothe wireless communications network based on the updated wirelessnetwork configuration information.
 55. The method of claim 54, furthercomprising selectively repeating the coupling, transferring,reconfiguring, and connecting steps for each one of a plurality ofdigital devices coupled to respective wireless stations in the wirelesscommunications network.
 56. The method of claim 54, further comprisingverifying, before the transferring, that the second wireless station isa desired recipient of the updated wireless network configurationinformation.
 57. The method of claim 54, wherein the initial wirelessnetwork configuration information and the updated wireless networkconfiguration information are different.
 58. The method of claim 57,wherein specific information that is different is selected from thegroup consisting of the network name, the security key, and both thenetwork name and security key.
 59. The method of claim 54, wherein thesecond wireless station is integrated into the second digital device.60. The method of claim 54, wherein the wireless communications networkis an 802.11 wireless network.
 61. A method of configuring a wirelessstation in a wireless communications network, the method comprising:automatically detecting, by a digital device coupled to the wirelessstation, a coupling of a universal serial bus (USB) connector of a flashdevice to a USB port of the digital device, wherein the flash devicecomprises a memory and a processor; automatically initiating, by thedigital device, wireless configuration installation software in responseto the detecting; transferring, by the installation software, wirelessnetwork configuration information from the memory of the flash device tothe digital device, wherein the information comprises a network name anda security key for the wireless communications network; configuring, bythe installation software, the wireless station using the wirelessnetwork configuration information; and connecting the wireless stationto the wireless communications network based on the wireless networkconfiguration information.
 62. The method of claim 61, furthercomprising verifying, before the transferring, that the wireless stationis a desired recipient of the wireless network configurationinformation.
 63. The method of claim 61, wherein the wireless station isintegrated into the digital device.
 64. The method of claim 61, whereinthe wireless communications network is an 802.11 wireless network. 65.The method of claim 61, wherein the security key is a wired equivalentprivacy (WEP) key.