When an authenticated wireless computer loses connectivity to a wireless access point of a network and roams to another access point, the wireless computer (e.g., a hypervisor in the computer) determines whether the new access point is authorized for secure communication and if so, releases access to secure data on the network through the new access point.

 
Web www.patentalert.com

< Security containers for document components

> Secure and reliable document delivery using routing lists

> Progressive image quality control using watermarking

~ 00559