. . "A conventional computing device identifies wireless access points only by the SSID. By storing additional information such as MAC address and attribute information and associating the additional information with a particular SSID, the computing device can utilize wireless security software to authenticate wireless access points." . .