Method and apparatus for configuring nodes in a wireless network

ABSTRACT

Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the security settings on the access point based on the security key, and saving the security key in a profile data file on a removable memory device along with a portable configuration utility for using the profile data file for configuring other nodes on the network. The removable memory device can then be inserted into other nodes and the portable configuration utility can be run to match the same key on the other network nodes based on the information stored in the profile data file on the removable memory device.

FIELD OF THE INVENTION

The present invention relates generally to systems and methods forconfiguring nodes in a wireless network. More particularly, the presentinvention relates to configuring nodes on a wireless network using aremovable memory device.

BACKGROUND OF THE INVENTION

In recent years, wireless networks have emerged as flexible andcost-effective alternatives to conventional wired local area networks(LANs). At the office and in the home, people are gravitating toward useof laptops and handheld devices that they can carry with them while theydo their jobs or move from the living room to the bedroom. This has ledindustry manufacturers to view wireless technologies as an attractivealternative to Ethernet-type LANs for home and office consumerelectronics devices, such as laptop computers, Digital Versatile Disk(“DVD”) players, television sets, and other media devices. Furthermore,because wireless networks obviate the need for physical wires, they canbe installed relatively easily.

Wireless communication systems adapted for use in homes and officebuildings typically include an access point coupled to an interactivedata network (e.g., Internet) through a high-speed connection, such as adigital subscriber line (DSL) or cable modem. The access point isusually configured to have sufficient signal strength to transmit datato and receive data from remote terminals or client devices locatedthroughout the building. For example, a portable computer in a house mayinclude a PCMCIA card with a wireless transceiver that allows it toreceive and transmit data via the access point. Data exchanged betweenwireless client devices and access points is generally sent in packetformat. Data packets may carry information such as source address,destination address, synchronization bits, data, error correcting codes,etc.

A variety of wireless communication protocols for transmitting packetsof information between wireless devices and access points have beenadopted throughout the world. For example, in the United States, IEEEspecification 802.11and the Bluetooth wireless protocol have been widelyused for industrial applications. IEEE specification 802.11, andIndustrial, Scientific, and Medical (ISM) band networking protocolstypically operate in the 2.4 GHz or 5 GHz frequency bands. In Europe, astandard known as HIPERLAN is widely used. The Wireless AsynchronousTransfer Mode (WATM) standard is another protocol under development.This latter standard defines the format of a transmission frame, withinwhich control and data transfer functions can take place. The format andlength of transmission frames may be fixed or dynamically variable

In a manner similar to the wireless router described above, fixedwireless systems involve systems that are capable of enabling wirelesscommunication, however fixed wireless systems also generally connect tothe interactive data network through a broadband wireless connection.Fixed wireless systems are referred to as “fixed” because they aretypically situated in fixed locations. Unlike the mobile devices, suchas portable telephones and personal digital assistants that can beconfigured to connect to a wireless router, fixed wireless devices canbe much larger in size, less mobile, and can include devices such asdesktop personal computers.

Although having an enormous amount of potential, fixed wirelesscommunication has traditionally lagged wired systems in both usefulnessand popularity. A primary contributing factor for this phenomenon hasbeen the fact that data transmission in wired systems has far exceededdata transmission in wireless systems. In the past, data transmissionrates for fixed wireless systems have lagged Integrated Services DigitalNetwork (ISDN) transmission rates or even dial-up transmission ratesacross conventional telephone lines.

However, the obstacles to using fixed wireless systems arc rapidly beingovercome. With the advent of Third Generation Wireless (3G)technologies, Universal Mobile Telecommunications System (UMTS)/WidebandCode Division Multiple Access (WCDMA) technologies in Europe, andEvolution Data Only (1xEVDO) technologies in North America, fixedwireless has become a viable option for wireless broadband access in thehome as part of the overall operator's 3G portfolio. Already, fixedwireless systems are capable of downlink throughput access rates in thehundreds of kilobits per second, and megabit rates will be widelyavailable in the near future. As a result of these advances fixedwireless access through UMTS, High Speed Packet Data Access (HSDPA) or1xEVDO is rapidly becoming a superior choice to ISDN or dial-up systems.In fact, some or all of these systems will equal or surpass thetransmission rates of digital subscriber line (DSL) systems in thenot-too-distant future.

As fixed wireless systems continue to increase in quality andperformance, improved “gateway” products become increasingly important.Wireless gateway products are needed to permit fixed wireless devicessuch as personal computers, peripheral devices and other devices withina local area network (LAN) to access and communicate with larger, widearea networks (WANs). As transmission rates continue to increase,wireless gateway devices must be able to manage more and morewireless-capable devices while maintaining high transmission rates amongthe devices and the larger networks.

Both wireless routers and fixed wireless gateways as well as the mobiledevices which connect to the router or gateway need to be configuredbefore a mobile device can connect to the interactive data networkthrough the router or gateway. This configuration can include settingcertain identification and security information, such as a service setidentifier and security key, on the router or gateway and each mobiledevice

A service set identifier (SSID) is a sequence of characters thatuniquely names a wireless local area network (WLAN). This name allowsmobile devices to connect to the desired network through the router orgateway when multiple independent networks operate in the same physicalarea. Each set of wireless devices communicating directly with eachother is called a basic service set (BSS). Several BSSs can be joinedtogether to form one logical WLAN segment, referred to as an extendedservice set (ESS). A Service Set Identifer (SSID) is typically a 1-32byte alphanumeric name given to each ESS.

For example, a departmental WLAN (ESS) may consist of several accesspoints (APs), such as routers or gateways, and dozens of mobile devices,all using the same SSID. Another organization in the same building mayoperate its own departmental WLAN, composed of APs and mobile devicesusing a different SSID. One purpose of SSID is to help stations indepartment A find and connect to APs in department A, ignoring APsbelonging to department B.

A WLAN can also be configured with security features to protect againstcasual eavesdropping. Wired Equivalent Privacy (WEP) and WiFi ProtectedAccess-Pre-Shared Key (WPA-PSK) are sample methods for securing an IEEE802.11 WLAN. WEP refers to the intent to provide a privacy service toWLAN users similar to that provided by the physical security inherent ina wired LAN. When WEP is active in a WLAN, each packet of information isencrypted separately with an RC4 cipher stream generated by a 64-bit RC4key. RC4 is a symmetric algorithm because it uses the same key for theencryption and decryption of data. This key is composed of a 24-bitinitialization vector (IV) and a 40 bit WEP key. The encrypted packetcan be generated with a bitwise exclusive OR (XOR) of the originalpacket and the RC4 stream. The IV can be chosen by the sender and can bechanged periodically so every packet won't be encrypted with the samecipher stream. The IV can be sent in the clear with each packet. Anadditional 4-byte Integrity Check Value (ICV) can be computed based onthe original packet and appended to the end. The ICV can also beencrypted with the RC4 cipher stream.

Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure(Wi-Fi) computer networks that was created in response to severalperceived weaknesses in previous security systems such as WEP. In the“pre-shared key” (PSK) mode of WPA, every user in a WLAN is given thesame key or passcode. Similar to WEP, data is encrypted using the RC4steam cipher, usually with a 128-bit key and a 48-bit initializationvector. The passcode used by WPA in PSK mode may be from 8 to 63 ASCIIcharacters or 64 hexadecimal digits (256 bits).

Both WEP and WPA-PSK require the operator of a network to set a key orpassphrase on the Access Points (APs) of the WLAN and match the same keyon each client station connected to the AP. Access points (such asrouters and gateways) and client stations (mobile devices) must beprogrammed with the same key. Experts highly recommend that the key besufficiently long and random and be changed frequently to impede hackersfrom cracking the key and gaining unauthorized access to the WLAN. Oneproblem associated with wireless gateways and routers is that set up cansometimes be difficult or confusing to the owner. This can be especiallytrue if the user wishes to set up enhanced security such as WEP orWPA-PSK on the network. Generating a key that is sufficiently long andrandom is not necessarily straight-forward. Configuring every node onthe network with the SSID and key can be a tedious and difficultprocess. Setup usually involves configuring the router or gatewaysettings and then configuring each mobile device the user wishes tocommunicate through the router or gateway with the same settings asconfigured on the router or gateway. Repeating this procedure frequentlycan become very cumbersome.

SUMMARY OF THE INVENTION

The present invention provides for a system and method for setting upnodes of a WLAN. Embodiments of the invention include a method ofconfiguring nodes in a wireless network using a removable memory devicecomprising:

-   -   inserting the removable memory device into a first node in the        network;    -   running a configuration utility configured to automatically and        randomly generate security information for the wireless network;    -   configuring the first node of the network using the generated        security information;    -   copying the security information onto the removable memory        device;    -   removing the programmable memory device from the first node;    -   inserting the programmable memory device into another node of        the wireless network; and    -   configuring the other node of the network using the generated        security information.

This process can be repeated until every node in the wireless networkhas been configured. In one embodiment, the configuration utility can bepreloaded on the first node. Configuration information can be read fromthe first node, stored onto the removable storage medium and used toconfigure the other nodes of the network. The first node can include aconfiguration button configured to run the configuration utility suchthat pressing the configuration button runs the configuration utility. Aportable configuration utility can be copied from the first node ontothe removable storage medium. The portable configuration utility can beused to configure other nodes of the network. The generated securityinformation can comprise, among other things, a security key andconfiguration information can comprise, among other things, a serviceset identifier (SSID).

Another embodiment of the invention includes a wireless router. Thewireless router can comprise an interface for receiving a removableprogrammable memory device, a client utility, a user interface forstarting the client utility, and a server utility. In response toactivation of the user interface, the client utility can generate arandom security key, send the generated security key to the serverutility on the wireless router, generate a configuration profile datafile including the generated security key, and save the configurationprofile data file and a portable utility program on the programmablememory device. The server utility can be configured to receive thegenerated security key and set the generated security key on thewireless router. The client utility can also be configured to read asecurity set identifier (SSID) from the router and generate theconfiguration profile data file to include the SSID. The client utilitycan also generate the configuration profile data file to include othersecurity information. For example, other security information mayinclude an encryption type used by the wireless router.

Still another embodiment of the invention can include a removableprogrammable memory device configured for interfacing with nodes in awireless network. The memory device can comprise a configuration profiledata file including security information related to the nodes in thewireless network, a portable utility program configured for installingthe configuration profile data file onto nodes in the wireless networkand for automatically setting up security settings on a node in thewireless network when the memory device is coupled to the node. Theconfiguration profile data file can also include configurationinformation, such a service set identifier (SSID) for the wirelessnetwork related to the nodes in the wireless network and the securityinformation can include a security key for the wireless network as wellas an encryption type for the wireless network.

A further embodiment of the invention can include a computer programproduct stored on a removable programmable memory device. The computerprogram product can comprise computer code for reading wireless securitysettings from a configuration profile data file stored on the removableprogrammable memory device and computer code for setting wirelesssecurity settings on a node in a wireless network based on the wirelesssecurity settings in the configuration profile data file. The computerprogram product can also include computer code for reading configurationinformation from the configuration profile data file and settingconfiguration settings on the node based on the configurationinformation in the configuration profile data file. The wirelesssecurity settings can include a security key and/or an encryption type.The configuration information can include a service set identifier(SSID) for the wireless network.

Another embodiment includes a system for configuring nodes in a wirelesscommunication network. The system can comprise a removable programmablememory device, at least one client station having an interface foraccepting the removable programmable memory device, and an access point.The access point can comprise an interface for accepting the removableprogrammable memory device, a client utility, a user interface forstarting the client utility, and a server utility. In response toactivation of the user interface, the client utility can generate arandom security key, send the generated security key to the serverutility, generate a configuration profile data file including thegenerated security key, and save the configuration profile data file anda portable utility program on the programmable memory device. The serverutility can be configured to receive the generated security key and setthe generated security key on the access point. The portable utilityprogram on the removable programmable memory device can be configured toset up security settings on the client station(s) based on the generatedsecurity key when the removable programmable memory device is coupled tothe client station(s). The client utility can also be configured to reada security set identifier (SSID) from the access point and generate theconfiguration profile data file to include the SSID. The configurationdata file can include other security information, such as an encryptiontype used by the access point. The portable utility program on theremovable programmable memory device can be configured to set upsecurity setting settings on the client station(s) based on the othersecurity information when the removable programmable memory device iscoupled to the client station. The portable utility program on theremovable programmable memory device can also be configured to set upthe client station(s) based on the SSID when the removable programmablememory device is coupled to the at least one client station.

These and other objects, advantages and features of the invention,together with the organization and manner of operation thereof, willbecome apparent from the following detailed description when taken inconjunction with the accompanying drawings, wherein like elements havelike numerals throughout the several drawings described below.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a representation of a typical wireless local area network(WLAN);

FIG. 2 is a functional diagram showing various types of datatransmission that may occur to and from one embodiment of a wirelessgateway device according to one aspect of the present invention;

FIG. 3 is a function diagram showing the types of devices that maycommunicate through one embodiment of a wireless gateway device of thepresent invention;

FIG. 4 is a representation of one embodiment of a gateway devicearchitecture according to the present invention;

FIG. 5 is a representation of one embodiment of a system for setting upnodes of a WLAN according to the present invention;

FIG. 6 is a representation of one embodiment of a profile data file usedfor setting up the nodes of a WLAN according to the present invention;

FIG. 7 is a flow diagram of one embodiment of a method for setting upnodes of a WLAN according to the present invention;

FIG. 8 is a flow diagram of another embodiment of a method for settingup nodes of a WLAN according to the present invention; and

FIG. 9 is a representation of one embodiment of a system for configuringnodes in a wireless network according to the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The present invention provides systems, methods, and devices for settingup the nodes of a wireless local area network (WLAN). As shown in FIG.1, a WLAN 10 according to the present invention can comprise a pluralityof nodes 12, 14, and 16 arranged to communicate with each other over awireless interface. Nodes typically comprise access points, such asrouter 12 and gateway 14 devices, and mobile client devices 16. A router12 is typically a device configured to communicate with mobile clientdevices 16 over a wireless communications interface. Routers 12 are alsousually coupled, through a wired connection, to an interactive datanetwork 18 (such as a corporate network or the Internet). A gateway 14is also typically configured to communicate with mobile client devices16 over a wireless communication interface. Gateways 14 are usuallycoupled to the interactive data network 18 through a wirelessconnection. Mobile client devices 16 can take many forms including, butnot limited to, portable computers, mobile telephones, Instant MessagingDevices (IMD), Personal Data Assistants (PDA), and other devices thatcan communicate using various wireless transmission technologies.

Router or gateway devices of the present invention can be configured tosupport a wide variety of interface mechanisms. For example, the devicecan be configured to support multiple Ethernet ports for connecting todesktop computers. In addition, the device can support USB ports forconnections to devices such as computer printers. Still further, otherdevices such as cordless telephones using Bluetooth or IEEE 802technology, wireless cameras, or any other wireless sensor can beoperatively connected to the gateway device in various embodiments ofthe present invention. When a gateway device of various embodiments ofthe present invention is in a “router” mode, it is capable of routingvoice, video, and multimedia content back and forth among all of thedevices discussed herein and the Internet over a WWAN link.

A residential gateway device can become the center of convergence amongWLAN/LAN networks, one or more WAN networks, voice/data transfersystems, and VoIP/Voice Over CS systems. In various embodiments of theinvention, such a device can support 802.11 WLAN, Bluetooth pan-accessnetworks (PANs) and/or Ultrawideband PAN/LAN. In this arrangement, datapackets can be routed between the WLAN/LAN networks and the WAN network.

FIG. 2 is a functional diagram showing several types of transmissionmodes that can be used to transmit data and content through a gatewaydevice 100 with a controller according to the present invention. Itshould be noted, however, that gateway and router devices according tothe present invention are not intended to be limited to the types oftransmission modes that are depicted in FIG. 2. Within the local areaside 110 of the gateway device 100, transmission modes such as 802.11 a,b and g; Bluetooth, and ultra-wideband transmission mechanisms may beused for communication between the gateway device 100 and various fixedand nonfixed devices. On the wide area side 120, transmission modes suchas UMTS/HSDPA; DO/Rev. A, DSL, WiMax, and Flarion may be used to providecommunication between the gateway device 100 and the Internet 130.

FIG. 3 is a functional diagram showing various wireless and wireddevices that can communicate through a gateway device 100 of the presentinvention. It should be understood, however, that the devices shown inFIG. 3 are only exemplary in nature, and wide variety of devices notshown in FIG. 3 could also be used. As shown in FIG. 3, a plurality of802.11 enabled laptop computers 200 located within a wireless local areanetwork can communicate with the gateway device 100 through a 802.11 b/gconnection. Video devices, such as video surveillance equipment 205, canuse 802.11 or Bluetooth technology to transmit data to and from thegateway device 100. Similar transmission mechanisms can also be usedwith cordless telephony 210, which can be used for VoIP transmission. Inaddition to wireless devices, a variety of wired devices can alsocommunicate with the gateway device 100. For example, a printer 215 canbe connected to the gateway device 100 through a USB connection. Ananalog fax machine 220 can also be connected to the gateway device 100through a RJ11 connection. In addition, an Ethernet LAN connection canbe used to connect the gateway device 100 to one or more desktopcomputers 225. Still further, an RJ11 connection can exist with ananalog voice telephone 230, which is capable of VoIP transmission whenintegrated with the system. VoIP is also capable using video telephonyequipment 235 when operatively connected to the gateway device 100. Allof these devices are therefore capable of transmitting through thegateway device 100 to the wide area network 120 using HSDPA, UMTS/GSM,3G technology, etc.

FIG. 4 is a representation showing the architecture of a gateway device100 according to one embodiment of the present invention. The gatewaydevice 100 of FIG. 4 includes a WAN module 300 through which WANactivity occurs, as well as a WLAN module 310 for WLAN activity. Thegateway device 100 can also include a fax module 320 for providing acommunication pathway for the analog fax machine 220 of FIG. 3. Inaddition, the gateway device can include a voice module 330 forproviding a VoIP pathway. A router or gateway 340 can also be includedfor routing data or content to and from the appropriate location(s). Thegateway device also includes a power module 350 for powering the device,as well as one or more interface modules 360 for interfacing with thevarious local and wide area network devices in communication with thegateway device 100. The gateway device 100 also includes a processor 370and a memory 380, both of which can be incorporated into othercomponents such as the router or gateway 340.

In one embodiment of the present invention, the gateway device 100 iscapable of supporting both VoIP technology, conventional circuitswitched wired voice technology and/or circuit switched cellulartechnology. In this embodiment, voice traffic is capable of routed overa particular system based upon factors such as system QoS or userpreferences.

As mentioned above, configuring the various nodes (e.g. routers,gateways, mobile client devices) in a WLAN can be a complicated andconfusing process. Each node in the WLAN must be configured with thesame SSID so that the nodes can identify and communicate with eachother. In addition, if security features are desired, each node must beconfigured to operate using the same security method and key. In thepast, each node in the WLAN needed to be manually configured with theWLAN SSID and security mode and key. This process was tedious and proneto errors. Other methods required all of the nodes of a WLAN to bepresent when security is enabled. This solutions makes it difficult toadd new nodes which can not easily be done without resetting all of theother nodes on the WLAN.

In one embodiment of the present invention, shown in FIG. 5, a removablememory device 400 can be used to store the configuration information410, such as the SSID and security key, and a configuration utility 420.The process of configuring the SSID and security information on a nodecan be performed by inserting the removable memory device 400 into anode, such as a router 430 or a mobile client device 440, and runningthe configuration utility 420. Each node 430, 440 includes an interface450 for receiving the removable memory device 400 as well as a processor460 and memory 470. In one embodiment, the removable memory device 400can be a USB dongle and the interface 450 can be a USB connector.

In one embodiment, the configuration information 410 can be stored in aprofile data file which can be in the form of an eXtensibleMarkup-Language (XML) file such as the one shown in FIG. 6. The profiledata file can include the WLAN SSID 510 as well as security informationsuch as the type of encryption used 520 and the encryption key 530. Theconfiguration utility 420 can be a software application comprisingcomputer code for generating an SSID 510 and encryption key 530 and forcopying the configuration information in memory 470 on the node 430, 440into which the removable memory device 400 is inserted.

In an alternative embodiment, a router configuration utility can bestored on the router 430, 440 and can be run in the processor 460 of therouter 430 to generate the configuration information, store theconfiguration information into memory 470 on the router 430 and alsostore the configuration information along with portable configurationutility 420 on the removable memory device 400. The router 430 caninclude a “configuration” button 480 make running the configurationutility very simple. For example, the user could simply plug theremovable memory device 400 into the router 430 and push the“configuration” button 480 which would automatically run the routerconfiguration utility on the router 430. The router configurationutility would automatically and randomly generate the securityinformation and store that information along with the otherconfiguration information 410 and the portable configuration utility 420on the removable memory device 400. The portable configuration utility420 can then be run when the removable memory device 400 is interestedinto the other node(s) 440 of the WLAN so that the generatedconfiguration information 410 can be easily copied into the memory 470of other node(s) in the WLAN.

One embodiment of a method for configuring nodes in a WLAN according tothe present invention is shown in the flow diagram of FIG. 7. Theremovable memory device can be inserted into the router in step 500.Once the removable memory device is inserted into a first node in theWLAN, the configuration utility can be run in step 510. Theconfiguration utility automatically and randomly generates the securityinformation in step 520. In step 530, the configuration utility storesthe security information onto the first node and in step 540, theconfiguration utility saves the security information onto the removablestorage medium. The removable memory device can then be removed fromfirst node in step 550 and inserted into another node in the WLAN instep 560. After the removable memory device is inserted into the othernode, the configuration utility can copy the stored security informationonto the other node in step 570. This process can continue until all ofthe nodes in the WLAN have been configured with the security informationgenerated by the configuration utility.

In another embodiment of the invention, the configuration utility can bepreloaded onto a router in the WLAN. The flow diagram shown in FIG. 8describes another method according to the present invention. In thiscase, the programmable memory device is inserted into the router in step600. Once the programmable memory device is inserted into the router,the user can press a configuration button on the router in step 610which causes the configuration utility to be loaded into memory on andrun by the processor on the router in step 620. In step 630, theconfiguration utility automatically and randomly generates securityinformation, such as the encryption type and network security key. Instep 640, the configuration utility copies the security information ontothe router. The configuration utility can also read the SSID and otherconfiguration information from the router in step 650, generate aprofile data file including the security information and/or otherconfiguration information in step 660, save the profile data file ontothe removable memory device in step 670 and copy portable configurationutility onto the removable memory device in step 680. Once the profiledata file and portable configuration utility are saved onto theremovable memory device, the device can be removed from the router instep 690 and inserted into another node of the WLAN in step 700. Onceinserted into the other node, the portable configuration utility can beloaded and run in step 710, which causes the configuration and securityinformation to be copied onto the other node in step 720 thusconfiguring the other node to operate with the router on the WLAN. Theremovable memory device can then be removed in step 730 and this processcan be repeated until every node on the network is configured.

FIG. 9 illustrates one embodiment of a system 800 according to thepresent invention. The system 800 includes an access point 810, such asa wireless router, and a client station 820, such as a wireless enabledpersonal computer. The access point 810 includes a client utility 830and a server utility 840. A removable portable memory device (not shown)such as a USB memory stick, can be inserted into the access point 810.In response to a configuration button on the access point 810 beingactivated, the client utility 830 generates a random security key, savesthe key, along with other security and/or configuration information suchas the encryption type used by the router and the WLAN SSID, forexample, in profile data along with a portable utility program on theremovable programmable memory device, and sends the security key to theserver utility 840. The server utility 840 receives the security keyfrom the client utility 830 and sets the security settings on the accesspoint 810 based on the security key.

The removable programmable memory device can then be removed from theaccess point 810 and inserted into the client station 820. Once theremovable memory device is inserted into the client station 820, theportable utility program is run which reads the profile data saved onthe removable memory device and matches the same security key on theclient station 820 by adding it to the list of preferred networks on theclient station 820.

The present invention is described in the general context of methodsteps, which may be implemented in one embodiment by a program productincluding computer-executable instructions, such as program code,executed by computers in networked environments. Generally, programmodules include routines, programs, objects, components, datastructures, etc. that perform particular tasks or implement particularabstract data types. Computer-executable instructions, associated datastructures, and program modules represent examples of program code forexecuting steps of the methods disclosed herein. The particular sequenceof such executable instructions or associated data structures representsexamples of corresponding acts for implementing the functions describedin such steps.

Software and web implementations of the present invention could beaccomplished with standard programming techniques with rule based logicand other logic to accomplish the various database searching steps,correlation steps, comparison steps and decision steps. It should alsobe noted that the words “component” and “module,” as used herein and inthe claims, is intended to encompass implementations using one or morelines of software code, and/or hardware implementations, and/orequipment for receiving manual inputs.

The foregoing description of embodiments of the present invention havebeen presented for purposes of illustration and description. It is notintended to be exhaustive or to limit the present invention to theprecise form disclosed, and modifications and variations are possible inlight of the above teachings or may be acquired from practice of thepresent invention. The embodiments were chosen and described in order toexplain the principles of the present invention and its practicalapplication to enable one skilled in the art to utilize the presentinvention in various embodiments and with various modifications as aresuited to the particular use contemplated.

1.-28. (canceled)
 29. A method of configuring a node in a wirelessnetwork, the method comprising: connecting a removable memory device toa first node in the wireless network, the first node including a serviceset identifier (SSID) and security key; automatically copying the SSIDand security key on the removable memory device; disconnecting theremovable memory device from the first node; connecting the removablememory device to another node in the wireless network; automaticallyrunning a configuration utility on the another node; and theconfiguration utility configuring the another node using the copied SSIDand security key.
 30. The method of claim 29 further comprising,automatically storing the configuration utility on the removable memorydevice prior to the disconnecting of the removable memory device fromthe first node.
 31. The method of claim 29, wherein the SSID and thesecurity key are created via execution of the configuration utility atthe first node.
 32. The method of claim 31, wherein the creation of thesecurity key comprises a random generation of the security key.
 33. Themethod of claim 29 further comprising, generating a profile data fileincluding the copied SSID and security key.
 34. The method of claim 33further comprising, saving the profile data file on the removable memorydevice.
 35. The method of claim 33 further comprising, saving additionalconfiguration and security information in the profile data file.
 36. Themethod of claim 35, wherein the addition configuration and securityinformation comprises at least one of an encryption type for thewireless network and an encryption key for the wireless network.
 37. Themethod of claim 29, wherein the first node comprises one of a router, agateway, or a mobile client device.
 38. A wireless router, comprising: aremovable memory device interface; a preloaded configuration utility; aprocessor; and a memory including computer program code, the memory andthe computer program code configured to, with the processor, cause thewireless router to perform at least the following: upon insertion of aremovable memory device in the removable memory device interface,automatically and randomly generate security information through thepreloaded configuration utility; copy the security information onto thewireless router; read configuration information from the wirelessrouter; create a profile data file including at least the configurationinformation and the security information; and store the profile datafile and the preloaded configuration utility onto the removable memorydevice.
 39. The wireless router of claim 38, wherein the security datacomprises an encryption type and network security key of a wirelessnetwork in which the wireless router operates.
 40. The wireless routerof claim 38, wherein the configuration information comprises a serviceset identifier (SSID).
 41. The wireless router of claim 38, wherein theremovable memory device configures a node to operate with the wirelessrouter in a wireless network via transfer of the preloaded configurationutility, the security information, and the configuration information tothe node upon removal of the removable memory device from the wirelessrouter and insertion into the node.
 42. An apparatus, comprising: atleast one processor; and at least one memory unit including computerprogram code, the at least one memory unit and the computer program codeconfigured to, with the at least one processor, cause the apparatus toperform at least the following: receive a removable memory device;automatically copy a service set identifier (SSID) and security key ofthe apparatus to the removable memory device, wherein disconnecting theremovable memory device from the apparatus andconnecting the removablememory device to another apparatus in a wireless network common to theapparatus and the another apparatus effectuates automatically running aconfiguration utility on the another apparatus, the configurationutility configuring the another apparatus to operate with the apparatususing the copied SSID and security key.
 43. The apparatus of claim 42,wherein the at least one memory unit and the computer program codeconfigured to, with the at least one processor, further cause theapparatus to automatically store the configuration utility on theremovable memory device prior to the disconnecting of the removablememory device from the apparatus.
 44. The apparatus of claim 42, whereinthe at least one memory unit and the computer program code configuredto, with the at least one processor, further cause the apparatus toexecute the configuration utility at the apparatus to create the SSIDand the security key.
 45. The apparatus of claim 44, wherein to createthe security key, the configuration utility randomly generates thesecurity key.
 46. The apparatus of claim 42, wherein the at least onememory unit and the computer program code are configured to, with the atleast one processor, further cause the apparatus to generate a profiledata file including the copied SSID and security key.
 47. The apparatusof claim 46, wherein the at least one memory unit and the computerprogram code are configured to, with the at least one processor, furthercause the apparatus to save the profile data file on the removablememory device.
 48. The apparatus of claim 46, wherein the at least onememory unit and the computer program code are configured to, with the atleast one processor, further cause the apparatus to save additionalconfiguration and security information in the profile data file.
 49. Theapparatus of claim 48, wherein the additional configuration and securityinformation comprises at least one of an encryption type for thewireless network and an encryption key for the wireless network.