专利摘要:
SYSTEM TO PROVIDE INTELLIGENT NETWORK ACCESS SELECTION FOR A WIRELESS MOBILE DEVICESystems and methods that allow access to the alternative network implemented by a wireless mobile communication device. The method includes receiving information associated with a mobile device; the information comprises information about the location associated with the mobile device. Based on the information associated with the mobile device, when identifying an access point available to provide connectivity services for the mobile device, the access point is not the computing device. The information is provided for the mobile device that is associated with the access point. The alternative access network for a mobile device, having a first radio and a second radio, or in some cases, only one radio may include use of the first radio in a first connection to a first access point.
公开号:BR112014033163A2
申请号:R112014033163-4
申请日:2012-11-21
公开日:2020-11-03
发明作者:Pertti Visuri;Randy Salo;Christian Van Hamersveld
申请人:Bandwidthx Inc.;
IPC主号:
专利说明:

[001] [001] This application claims the benefit of U.S. Provisional Application Series No. 61 / 563,735, filed on November 25, 2011; U.S. Provisional Order No. Series. 61/618, 318, deposited on March 30, 2012; and U.S. Provisional Order No. Series. 61/671, 583, deposited on July 13, 2012; hereby, all of which are incorporated by reference. This application also incorporates by reference the two applications submitted on the same date entitled: MOBILE DEVICE RADIO MANAGEMENT and MOBILE WIRELESS DEVICE WITH INTELLIGENT NETWORK ACCESS SELECTION. BACKGROUND OF THE INVENTION
[002] [002] Related Field
[003] [003] The subject discussed in this document relates generally to wireless communication and, more particularly, to the systems and methods for providing alternative network access for wireless mobile devices and wireless devices.
[004] [004] Related Plea
[005] [005] The rapid growth in mobile devices, such as connected smartphones, tablets and laptops, and the proliferation of applications on these devices created a tremendous need to increase the capacity of wireless data communication.
[006] [006] Mobile devices use wireless communication services, provided by one or more mobile operators and / or technology companies. The demand for wireless communication is often greater than what mobile operators and technology companies can provide. SUMMARY OF THE INVENTION
[007] [007] The subject includes a method to enable alternative network access implemented by a wireless mobile communication device. The method includes receiving information associated with a mobile device; the information comprises information about the location associated with the mobile device. Based on the information associated with the mobile device, when identifying an access point available for providing connectivity services to the mobile device, the access point is not the computing device. The information is provided for the mobile device that is associated with the access point. The information may comprise at least one of the terms of use, conditions of use, costs of use, characteristics of the access point, connection characteristics, access point capacity, and access point to the security access information. Usage information is received from at least one mobile device and the access point.
[008] [008] Also included is the system that implements methods such as the above.
[009] [009] Another aspect includes a method of obtaining alternative network access implemented by a mobile device, having a first radio and a second radio. The method includes: using the first radio in a connection. The throughput of the connection being over a limit is detected. Based on access conditions, an access point for establishing a second connection using a second radio is determined. The second radio is then switched on. A connectivity test is performed with the access point using the second radio. A second connection is established using the second radio.
[0010] [0010] In another aspect, a method for obtaining alternative network access is implemented by a mobile device, having a first radio. The method includes the determination to turn on the first radio based on the end of an activation interval. The activation interval is determined based on one or more predetermined orders being executed, a location on the mobile device, the drop from a previous connection, or a period of time.
[0011] [0011] Another aspect includes a method for obtaining alternative network access for a mobile device, having a first radio and a second radio, or in some cases, only one radio. The method may include using a first radio on a first connection to a first access point. The authorization to establish a second connection to a second access point using a second radio is determined. The determination is based on a first set of access conditions associated with the first access point and a second set of access conditions associated with the second access point. The second connection is established with the second access point using the second radio based on the determination, which indicates the establishment of the second connection.
[0012] [0012] In another aspect includes a method for obtaining alternative network access is implemented by a mobile device, having a first radio. The method includes identifying an available network access point. A determination that to establish a connection with the identified access point is made based on a first set of access conditions associated with the identified access point. A connection to the identified access point is made using the radio based on the determination, which indicates the establishment on the second connection.
[0013] [0013] Additional aspects include the corresponding mobile devices. BRIEF DESCRIPTION OF THE FIGURES
[0014] [0014] FIG. 1A is a functional block diagram of an overview of an example system to provide access to the alternative network.
[0015] [0015] FIG. 1B is the example system for providing alternative network access of FIG. 1h with financial components.
[0017] [0017] FIG. 1D is a function block diagram of the example of an alternate access point configuration.
[0018] [0018] FIG. 1E is a functional block diagram for a wireless mobile device.
[0019] [0019] FIG. 2A is a functional block diagram of another overview of an example system to provide access to the alternative network.
[0020] [0020] FIG. 2B is a functional block diagram of the example system for providing the alternative network access environment of FIG. 2A with financial components.
[0021] [0021] FIG. 3 is a flow chart of an example of the connectivity maintenance process in which the mobile device may be changing position.
[0022] [0022] FIG. 4 is a flow chart of an example of the process of maintaining connectivity in an environment where connectivity information can be provided by access points and points without access.
[0023] [0023] FIG. 5 is a diagram of the process and data flow of the system implementation example to provide access to the alternative network.
[0024] [0024] FIG. 6A-B are data and process flow diagrams from other sample implementations of the system to provide access to the alternative network.
[0025] [0025] FIG. 7 shows an example of the radio management process.
[0026] [0026] FIG. 8 is a block diagram illustrating an example of a wireless communication device.
[0027] [0027] FIG. 9 is a block diagram illustrating an example wired or wireless processor enabled device that can be used
[0028] [0028] FIG. 10 is a functional block diagram of an example computing environment with an example of the appropriate computing device for use in some implementation examples. DETAILED DESCRIPTION
[0029] [0029] The subject described here is taught through the example implementations. Several details have been omitted for the sake of clarity and to avoid darkening the matter. The examples shown below are for structures and functions for implementing systems and methods to provide alternative network access for wireless mobile device connectivity. Other characteristics and advantages of the subject should be apparent from the following description.
[0030] [0030] OVERVIEW
[0031] [0031] FIG. 1A is a functional block diagram of an overview of an example system to provide access to the alternative network. A system for providing alternative network access may include one or more mobile devices (for example, mobile device 110) that use wireless connectivity services and one or more wireless connectivity service providers (for example, connectivity providers 120 -125 and 130).
[0032] [0032] The alternative network access provision system may include similars from one or more selection mechanisms 112 and 152, one or more proposal mechanisms 126 and 156, accounting mechanisms 116 and 128, and an access provider of alternative network (ANAP) 150. The alternative network access provider's environment includes structures and functions that allow the exchange of connectivity services (for example, correspondence connectivity service providers with connectivity service users).
[0033] [0033] The alternative network access provider environment 100A shows, for example, that a mobile device 110 may be inside the
[0034] [0034] 120-125 access points can be owned and / or operated by different entities. Connectivity provider 130 may be one or more cells (e.g., cell towers) from a cellular network. Connectivity providers 120-125 and 130 are equipped and / or configured with the ability to provide connectivity services for mobile device 110 for voice and / or data communication. Each of the 120-125 and 130 connectivity providers can use one or more communication protocols
[0035] [0035] Access point 120 can, for example, be a Wi-Fi access point, owned and / or operated by the user of mobile device 110. Access point 121 can be a free access point (for example, provided in a city library), access point can be a commercial-based access point, access point 123 can be provided (for example, for a fee or subscription) by a supplier or company (for example, a store or internet service provider) and access points 124-125 may be provided by other people, companies, and / or entities. Connectivity provider 130 (for example, a mobile network operator) can be one or more cell network sites that provide the cell phone and other wireless communication services for the mobile device 110. For example, the provider's cell sites connectivity 130 can support 3G and / or 4G protocols (for example, LTE, WiMAX). Services provided by connectivity providers 120-125 and 130 can be "advertised" or transmitted to mobile device 110 and / or alternative network access provider 150 using, for example, bidding mechanisms.
[0036] [0036] Proposal mechanisms can be implemented at access point 120-125 (for example, proposal mechanisms 126 at point
[0037] [0037] The mobile device 110 can use the connectivity services for a new communication or an existing communication (for example, changing and / or adding the connectivity services). For example, when mobile device 110 needs to initiate new communication, the
[0038] [0038] The mobile device 110 can determine, select, or identify one or more available connectivity providers 120-125 and 130 to connect with (for example, for connectivity services) using a selection mechanism. In some implementations, a connectivity provider can be selected exclusively for a specific application (for example, a gaming application). The selection mechanism can be implemented as a module that can work within the mobile device 110 (for example, selection mechanism 112) or in the alternative network access provider computing device 150 (for example, selection mechanism 152) that communicates a selection with the mobile device 110, or as a cooperative combination of functions performed on the mobile device 110 and an alternate network access provider's server computer 150.
[0039] [0039] The selection mechanism may determine a selected connectivity provider based on information associated with the specific access point, as established by the connectivity provider (for example, terms and conditions of connectivity services). The connectivity provider controls and / or manages the access point and its connection to the communication network or the Internet. In some implementations, information associated with an access point currently used can be considered when deciding to select an alternative or additional access point. Once the determination is made to select an access point, the access point can be selected using any identifying information (for example, an SSID, BSSID, MAC address, a unique identifier, a combination of the same or similar).
[0040] [0040] The services used (for example, by mobile device
[0041] [0041] In some cases, the accounting mechanisms 124 at the access control gateway or network or access point are controlled by the connectivity provider that controls and manages the access points. In such cases, they may not report the use of ANAP 150 but prefer to use the usage memories collected by the accounting mechanism 124 as an audit medium of the usage memories collected by the accounting mechanism 116 and reported to ANAP 150. For example, during or after a communication has ended, mobile device 110 can report usage memories 118 to ANAP 150. An access point (for example, access point 124) used by mobile device 110 can present usage memories to ANAP 150 (not shown) or use them for auditing purposes, as mentioned above. ANAP 150 can store usage memories (for example, usage memories 158) for reporting, billing, and / or issuing payments for memory connectivity services (to be described in FIG. 1B below).
[0042] [0042] In some implementations, one or more accounting mechanisms can be implemented outside the mobile device 110 and access points 120-125, such as on a gateway server on the network and / or one or more servers on the network. alternative network access provider
[0043] [0043] An alternative network access provider environment, which
[0044] [0044] The alternative network access provider's environment that allows commerce or micro-commerce to provide data connectivity (for example, bandwidth or connectivity data or transfer service measures such as the number of bytes transferred by each connection or
[0045] [0045] FIG. 1B is the example system for providing alternative network access of FIG. 1A with financial components. One or more wireless operators 170 may sponsor one or more access points owned and / or operated by connectivity providers 120-125, providing connectivity services for mobile devices, contracted
[0046] [0046] FIG. 2A is a functional block diagram of another overview of an example system to provide access to the alternative network. FIG. 2B is a functional block diagram of the example system for providing the alternative network access environment of FIG. 2A with financial components. FIGs. 2A-B are similar to FIGs. 1A-B, except for mobile devices 210, 220, and 222. Mobile devices 210, 220, and 222 are shown with a selection mechanism, a proposal mechanism and an accounting mechanism. In FIGs. 2A-B, mobile devices 210, 220, and 222 may function as providers of connectivity services. For example, as shown, mobile device 210 accesses the connectivity services provided by mobile devices 220 and 222.
[0047] [0047] Selection Mechanism
[0048] [0048] A wireless mobile device that participates in the alternative network access provider system may have the ability to establish
[0049] [0049] In an implementation of the 112 selection mechanism, the rules and policies 114 together with information about access points in the vicinity of the mobile device can be downloaded to the mobile device and are later used to make an initial decision to connect using the 112 selection mechanism when no other network connection of sufficient quality and speed is available. This initial decision can be based on a simpler and less dynamic set of information and rules. When a connection is made to the server and the selection mechanism 152, the rules and policies 154 by the selection mechanism 152 are used in conjunction with other information to revisit and possibly review the initial selection. Rules and policies 154 may be more frequently updated than rules and policies 114. Rules and policies 154 can also be more complex and include more parameters than
[0050] [0050] The rules and policies 114 and / or 154 control which of the available connections will be selected at any time for each of the applications that need a data connection. The level of sophistication in the selection process can vary between different implementations. For example, the following factors can be included in the decision processes (for example, in selecting connections for use). These factors or a subset of these factors can be collected (for example, data associated with the factors) for each connection that the mobile device 110 can detect when selecting the connection to be used for each application. The factors or conditions of access include: º price and other terms and conditions offered to use each connection of the access points of the devices, participating in the ANAP system (the selling price). These can be provided by the proposal mechanism, as described in the next section. The selling price is very specific to the access point and can depend on a number of factors, including the time of day, day of the week or month, the operational parameters of dynamic networks such as the load. It may also depend on the characteristics and parameters associated with the mobile device, for example, the service provider associated with the device. The sale price may also be dependent on the buyer of connectivity services U price and other terms and conditions offered by the buyer of connectivity services for the specific device at the specific time and location (the offer price). The price offered (Offer) may depend on a number of other parameters, including the day of the week or month, the cell tower or other access point that the device is connected to, operational parameters of the dynamic network of the currently used network and other information available for the ANAP 150 system or mobile device.
[0051] [0051] In some implementations, some of the alternative connections may be low cost or free. For example, one or more access points (for example, access point 122), but can be sponsored by a company that provides free wireless access in exchange for accepting commercial messages and advertising. Business entities (for example, gaming companies) may provide free access to certain websites or services; or certain applications (for example, game applications). For example, service providers or suppliers can sponsor connectivity that allows the end user to visit your website and make purchases. Other access points may offer lower cost or free connectivity but require the right to collect information based on the user's location or may require responses to inquiries. An example of information based on useful location would be to collect the location of the devices' GPS system at specific intervals to measure the speed of traffic flows on roads and highways. This could be a compromise on the part of the mobile device user that would be valid even when the system is connected via the normal 3G network, but could still gain privileges to use connections from the alternative network access provider as a form of compensation.
[0052] [0052] The selection mechanism is the function that makes the selections about which data connection they use for each of the applications on the wireless mobile device. In one embodiment, this is done based on momentum in real time based on current rules and policies and information, including price information and possibly other information as listed above, for each available connection. This information can be available directly from the access point, for example, using the newly established 802.11u communication standard, or it can be obtained from the alternative network access provider 150 based on a referral system which is explained in more detail in the section proposal mechanism below.
[0053] [0053] In a modality a selection mechanism uses specific criteria defined by the operator or user of the device that authorizes the use of connections based on a combination of two main parameters: The speed or other parameter of connection quality that is currently available for the device (in the operator's 3G or 4G system) and the cost of an alternative connection (supposedly better or faster) through the alternative network access provider system. The system may have limits for the
[0054] [0054] In a mode where the selection mechanism is hosted on a computer device on the network or accessing the alternative network of the provider system, the mobile device 110 will send the set of selection factors and parameters to the selection mechanism on the system computer and the selection mechanism will return to the mobile device the identification information and authentication information needed to connect to a connectivity provider that will provide the selected connection.
[0055] [0055] In another mode, where the selection mechanism is first hosted by the mobile device, the mobile device will use the selection factors available from the proposal mechanism (as described in the next section) to make the selection of an access point , through which a connection is established. This will then communicate that information to the alternative network access provider 150 and in return receive the authentication information that will allow the connection. Authentication information can, for example, be transmitted and / or exchanged using a protocol (for example, 802.11 x), that is, the same or different from the protocol used in the communication.
[0056] [0056] In another modality, the selection mechanism will compare the offered selling price (selling price) and the offered buying price (offering price), which both depend on a number of parameters, as described above. In cases where the selling price plus a possible commission or other compensation for the ANAP system added to the selection mechanism is less than the offer price, the selection mechanism establishes a compensation price for the connectivity service.
[0057] [0057] Once a connection is selected the selection mechanism will provide the mobile device with any information that is necessary to establish the connection through the selected access point. This authentication and authorization information can include passwords or wireless passwords, account identification information and passwords, can also include credentials for an access control gateway, can include detailed information on how to post the username and password for a page on a captive portal page with access control or can include digital certificates and other more advanced access control tokens and parameters. The selection mechanism controls these authentication and authorization elements, which can be stored in encrypted form, or in the database selection mechanism within the 112 or 152 selection mechanism. In the case of storage in 112 the parameters can be downloaded together with other information about access points in the vicinity of the mobile device. These parameters can have expiration times and can be changed at regular intervals. The parameters are made available for connection functions of the mobile device only at the time of connection and are subsequently deleted from its memory. The end user will not have any access or visibility to the authentication or authorization parameters used by the selection mechanism, except in cases where the end user provides such parameters for the system to use.
[0058] [0058] In a modality based on the selections of connectivity and subsequent data traffic through each connection of the wireless mobile device, it creates a detailed memory about the actual use of each of the alternative connections using another module called the accounting mechanism. At intervals, the accounting mechanism transmits the usage memory to the alternate network access provider 150, including its own identification information and the identification information for each of the “access points that provided connectivity for each use, the identification of the selected buyer of the connection, the price point negotiated for the connection, as well as information on the terms and conditions in force at the time of use. Usage data can be in the form of numbers of bytes of data sent and received, duration of connectivity or any other relevant variable describing the USE. These memory maintenance functions are described in more detail in the section on the accounting mechanism below. The connection parameters can be reported in any way. For example, reports can be run using the RADIUS accounting standard for mobile devices.
[0059] [0059] Usage data collected on the mobile device may also include information about the application that was using the data and about websites or other resources that were accessed by the application during the use of the data. This information can also include other connectivity service parameters, for example, connection speed, instability, latency, or other performance characteristics. It can be collected by the mobile device (for example, using its accounting engine) for all data, including both data provided by alternate connections 120 to 125 and connection 130 including situations where 130 is the service provider. cell data to the mobile device. This data can be communicated to ANAP 150 and used to guide billing to potential wireless connectivity sponsors, for example, game providers or other entertainment or content applications or companies that wish to sponsor visits to their web sites where they can sell goods or services.
[0061] [0061] Other statistics on the device's location, quality signal, productivity, access point performance and other connectivity parameters, such as speed and availability for connection through the 3G or 4G systems of mobile operators and The specific time and location or the cell tower identification used from these observations can be collected and transmitted to the alternative network access provider 150. The alternative network access provider 150 can use this data to compile useful information about the quality of the network. multi-site connectivity and the need for data capacity,
[0062] [0062] It is important to note this selection mechanism that can use several different radio connections simultaneously. These can be chosen individually for different applications running on the mobile device or can be aggregated to provide greater capacity for total data transmission to a single application. In other words, mobile devices can "group" resources to increase the speed of data transmission. This is described in more detail below in the section on resource grouping.
[0063] [0063] The selection mechanism uses a combination of information to implement the rules and conditions for selecting connectivity. For example, he is aware of the calls provided directly by the wireless operator using his own network and is familiar with connectivity through the access points configured by the end user for the wireless device. For example, these include access points to the user's home and office and other locations where free connectivity is available. However, in the alternative network access provider system, an important new source of real-time connectivity information is
[0064] [0064] Proposal mechanism
[0065] [0065] The proposal mechanism (for example, proposal mechanism 126 or 156) can be implemented, for example, as a module for or associated with each access point. A proposal mechanism associated with an access point provides information about the access point (for example, availability, the connectivity services provided, and other information) for mobile devices (for example, the selection mechanisms associated with mobile devices) . This information may include the terms and conditions, including the price (TSs & Cs) of the use of connectivity through the access point and may include detailed information about the characteristics of the connection. Implementations of the proposal mechanism may vary depending on the sophistication and capabilities of the access point device and the organization or individual who owns or controls the access point, as well as technicians and business agreements that provide internet connectivity to the access point. access.
[0066] [0066] In some implementations, a proposal mechanism associated with an access point can be deployed outside the access point (for example, by a computing device on a network, in a cloud computing resource from the network access provider alternative or your partner, etc.). These implementations allow access points that can only transmit your SSID and / or a unique identifier (for example, a BSSID, MAC address, etc.) to be used in an alternative network access provider environment for providing connectivity services to more mobile devices (for example, mobile devices not manually configured to use access points).
[0067] [0067] The mechanisms for selecting the mobile devices that can receive the headlights of the specific access point can obtain the Ts & Cs and other information from the alternative network access provider using the identification information (for example, SSID, a BSSID, MAC address , a unique identifier) of the access point as a reference. In a possible implementation, this is facilitated by including the SSID of the access point of an indication or information about its participation in the alternative network access provider (for example, including a specific string of characters, such as the letters "ANAP" in the SSID). The selection mechanism can check for TS & Cs at an alternative network access provider without having to go through the participants' BSSID lists (or MAC addresses, unique identifiers, etc.). In some implementations, the alternative network access provider provides periodic transfers of BSSIDs (or MAC addresses, unique identifiers, etc.), SSIDs, location, associated Ts & Cs and any other identifying information about the access points of the participants that are located near the current location of the mobile device. This speeds up relevant access to Ts & Cs and makes it possible to have this information available even in situations where the device does not have an open data connection to the internet or alternative network access provider (for example, mobile devices that cannot see a cell phone or Wi-Fi devices only). Location information can be obtained from the GPS system of the mobile device if available or by having the access point transmitting the SSID (or BSSIDs, MAC addresses, unique identifiers, etc.) of the access point (if network access provider) registered alternative or not) in its scale and having the alternative network access provider system correlate these to a database of access point locations. To quickly change locations (mobile device at
[0068] [0068]
[0069] [0069] FIG. 3 is a flow chart of an example of the connectivity maintenance process in which the mobile device may be changing position. In block 310, a mobile device can trigger or request information about available access points (for example, access points are no longer configured or configured for use by the mobile device). For example, a mobile device may provide the location of the current information to an alternate network access provider (ANAP) system or server. In block 315, the ANAP system can compile one or more (for example, a list) of access points (for example, those in the vicinity of the mobile device and / or available for use) that have been registered to provide system connectivity services ANAP. In block 325, the ANAP system can provide (for example, through a transfer) information about the access of one or more points to the mobile device. Information about an AP can include: º the party offering connectivity services (this party can be referred to as a source, supplier, seller, provider) º the price offered, which can be used for all circumstances, at least for the first connectivity for a few minutes, until The device can connect to the server to get an updated price
[0070] [0070] This information is made available by a number of access points within a given radius (for example, 10 km) around the current location of the device (or a location that the owner of the device specified through the user interface. In block 320, the mobile device can compare connectivity options (for example, with other existing access points / using and / or, using current rules and / or policies) then check the access point and obtain the identification information for the interval ones. It also measures the signal strength of each. In block 330, the device then combines the preloaded information and the locally available information from the device to make the determination that the connection is the best. of the rule can be as follows: to define a limit value for the signal strength (this would normally - correspond to a good signal, suitable to obtain a good high speed connection) above this decision of the signal level is taken based on price. The lowest cost wins. Below the limit of the decision to choose the AP is based on the signal strength. While the bid price offered is higher than the bid price offered, the AP with the best signal is selected. Once the connection is established it can be re-evaluated taking into account the rules and information above if the signal strength falls below a defined limit, or it is possible that a time is set to reevaluate specific intervals to see if a lower cost or better signal connection is available. The ranges can be static or they can be dependent on the price of the connection or any other parameter known to the device.
[0071] [0071] In block 340, a connection or communication can be transferred from an existing connection to the newly created connection. For example, the mobile device and / or access point at the other end of the existing connection can decouple the communication. The mobile device and / or access point recently identified at the other end of the new connection can associate the communication. In block 350, the mobile device can inform details of the use of a previous connection (for example, one has been disconnected) the ANAP system (if access to the disconnected access point is facilitated by the ANAP system). In block 355, usage information can be stored by the ANAP system for billing, payment, analysis and / or other purposes.
[0072] [0072] The access point can store the Ts & Cs and other information and provide them directly over the wireless connection to The selection mechanism of each mobile device it is requesting to
[0073] [0073] Ts & Cs can have short validity periods and connectivity can be renegotiated at specific intervals as situations in terms of needs and available capacity vary constantly. In the case of the proposal mechanism for the access point, it is implemented for the 15th alternative network access provider that the validity periods will be automatically loaded to the mobile device along with the other terms and conditions by the selection mechanism. Both in the case of the selection mechanism and the proposal mechanism can be hosted on the servers of the alternative network access provider, that information about Ts & Cs and their validity periods are made available to both within the computer system environment. In some implementations, the alternate network access provider system may instruct a mobile device to immediately terminate a connection to an access point and may temporarily or permanently block the mobile device from the access point.
[0074] [0074] The level of sophistication and conditions in the terms may vary between implementations, but in an implementation (modality) the following factors or conditions of access include: º price of use of the connection. This can vary according to the time of day or the day of the month or year and can depend on other variables, some of which can be quite dynamic, such as the current demand for other selection mechanisms.
[0075] [0075] Other information regarding the terms and conditions of use of the access point may be relevant. For example, some access points may belong to a network of access points controlled by a wireless operator or wireless ISP that offers a flat fee or other special prices for subscribers to their services. In case the mobile device is a subscriber to the network, the terms and conditions are usually stored in the selection mechanism and the hotspot access point would provide identification information that belongs to the group (for example, in its SSID). Alternatively obtaining information about the AP belonging to a specific group of wireless ISP hotspots and its impact on the cost of using it can be communicated through the proposal mechanism as with other access points.
[0076] [0076] There may be special information transmitted over the cellular operator's own network. For example, the convenience of the bearer's point of view to transfer the call to an available Wi-Fi hotspot may depend on the load on the tower or cell phone to which the device is connected. To manage connections optimally, the carrier's bidding mechanism can instruct the selection mechanism on a wireless device at a given time to seek the lowest price alternative, even when the tower or cell phone connection is available, if the tower load or cell phone connection is high.
[0077] [0077] Other parameters that affect the Ts & Cs provided by the proposal mechanism were also illustrated above in the section on which parameters can be used by the selection mechanism to select the connection.
[0078] [0078] Whether all these factors are included in the decision-making processes on the connection will depend on the level of sophistication in the proposal and selection mechanisms. For example, it is possible that the selection mechanism is able to select based on the signal strength and the price. However, more sophisticated decisions are possible, by providing more information and alternatives in terms and conditions through the proposal mechanism and by increasing the capacities in the selection mechanism.
[0079] [0079] Regardless of what level of sophistication is used in the decision-making processes, each mobile device participating in the alternative network access provider system will use connections through different access points at different times. In order to keep track of the current usage of each connection and provide the clearing and settlement information for each mobile device that has an accounting mechanism. Many access points can use an accounting mechanism
[0080] [0080] In one modality, the accounting mechanism can use the RADIUS standard, WRIX (Wireless Roaming Intermediary Exchange) or another standard for authorization of access and accounting to report and monitor the use of mobile devices.
[0081] [0081] Accounting Mechanism
[0082] [0082] The accounting mechanism collects and provides data for the micro-business in bandwidth that is used to reward and encourage all participants in the ecosystem. The accounting mechanism maintains the range of capacity used by the mobile device through each of the connections that are enabled, the alternative network access provider, as well as the specific terms and conditions and the compensation price established between the proposal and O selection mechanism for each specific use of connectivity.
[0083] [0083] As a minimum condition to operate in the alternative network access provider system, for example, each mobile device must have an accounting mechanism or be covered by an accounting mechanism that is implemented on a gateway server connected to the access point. Another implementation (modality) the accounting mechanism is implemented on the mobile device or as a split implementation with one part being implemented on the mobile device to report usage and another part to be implemented on a server computer for the alternative network access provider. . In this case, the accounting engine receives reports on the use of the mobile device and / or the gateway server or access point. At least part of the accounting engine connections receive a report on the use of the mobile device and the gateway server or access point. This provides an opportunity to audit reports from
[0084] [0084] Insofar as the resource is available at access points, they may include an accounting mechanism that can collect information on the use of the data capacity of each mobile device. If such memories are collected and made available to the alternative network access provider, they can be recompiled and used to check the usage memories provided by the accounting mechanisms on mobile devices. In the implementation of the alternative network access provider's system it automatically logs on to the administrator interface of the registered access points (using the credentials provided by the access point owners during the initial registration with the alternative network access provider) to recover information on the use of connectivity from various mobile devices. This capacity and function can be used in a subset of the access points; however, it still provides a very useful audit function to control that communication via mobile devices is accurate.
[0085] [0085] Alternative network access provider
[0086] [0086] The alternative network access provider manages all information to enable micro-commerce between access point owners, ISPs, wireless operators and possible end users of mobile devices. The exchange also manages billing and payments between all parties (See FIG. 1B). In one embodiment, the alternative network access provider is implemented as modules on a server.
[0087] [0087] Terms and Conditions Management
[0088] [0088] Initially when an access point is added for the alternative network access provider it is SSID and other identification information such as the BSSID, MAC address, unique identifier, etc. are registered with the exchange.
[0089] [0089] Note that many access points can have dual SSIDs and can set priorities for traffic on each identity. In this way, a home user can dictate that any traffic routed to the owners' own devices will have priority and only excess capacity in the connection is made available for trade through the alternative network access provider. In other cases, people can set up separate access points connected to the Ethernet ports on their home ports and register these to the alternative network access provider. In still other implementations the systems have provisions and conditions to allocate different priorities for traffic with different devices from the client. In these cases, the owners of the access point can manually select the high priority devices or the system can be programmed to automatically give higher priority to devices with high signal strength and frequent long-term connections (presumably the devices that belong to the owners of the devices). access points).
[0090] [0090] If the access point or gateway has the ability to transmit its price and other proposal information directly to connected devices (for example, using the 802.11u protocol) then this may be the preferred mechanism for trade in automatic negotiation on connectivity. Alternatively, the access point owner can store terms and conditions for the alternative network access provider linked to their specific BSSID, MAC address, unique identifier, etc. and other identifying information. In this alternative, the selection mechanism will have the terms and conditions of the alternative network access provider. As explained in the proposal mechanism section, the alternative network access provider can be proactive and load the SSID, authentication information and
[0091] [0091] Usage Memory Management
[0092] [0092] The second large set of information that manages the alternative network access provider is usage memory. As selection mechanisms make decisions about which connections to use for different applications, the wireless device will transmit and receive data using different access points at different times.
[0093] [0093] The current usage is recorded by the accounting mechanism and detailed information about the usage is transmitted to the alternative network access provider. Usage data can include, for example, the amount of data transmitted and received, which can be divided by the time of use, the application that transmits and receives data, etc. At least in cases where the wireless mobile device received the information from the proposal mechanism directly from the access point, the terms and conditions and compensation price in force at the time of use can be recorded by the accounting mechanism. As explained above, the alternative network access provider can obtain information about the use of access points or access control entry ports that can be connected to multiple access points. This can be used for billing and to verify the correctness of information on mobile devices. An implementation obtaining this information through the administration interface has been described above in the section on accounting mechanism. In another implementation, usage information may be available from gateway servers in the network of access points. These servers can be operated, for example, by wireless ISPs or corporate network operators. Usage information for each subscriber and each access point is then compiled in different ways and used as a basis for establishing compensation for the use of bandwidth with all parties involved.
[0094] [0094] The communication between the accounting mechanism and the alternative network access provider can use any protocols or standards (for example, the RADIUS standard).
[0095] [0095] Provision of Payment and Billing Services to All Parties
[0096] [0096] Depending on the agreements between various parties, that data transmission or bandwidth services may be sold by the alternative network access provider to wireless operators, who in turn will charge their customers for their use in compliance with subscription agreements with each customer. As described above, many other potential buyers of connectivity services may also be involved.
[0097] [0097] Alternatively, the alternative network access provider can establish direct relationships with the end users of mobile devices and sell the alternative network access provider's capacity directly to end users. This can be through fixed price or by use or other creative business agreements using prepaid, postpaid or exchange agreements (for example, the owners of access points are usually the owners of mobile devices and can receive some or all of the your mobile uses of the alternative network access provider's bandwidth in exchange for making your access point's bandwidth available to other mobile devices registered with the alternative network access provider).
[0098] [0098] Third party aggregators can create agreements with - end users of wireless mobile devices (or with access point owners) and negotiate "attacked" terms with the alternative network access provider. Regardless of how the sale of bandwidth is organized, there are, on the other side of trade operations, data transmission capacity providers, owners of access points. The alternative network access provider uses the information provided by the accounting mechanisms to resolve accounts with bandwidth providers. Which may be the hotspot providers (or WISPs) or new types of ISP, in some cases that operate together with the owners of the individual access point or several aggregators of Wi-Fi capacity. The same data as the accounting mechanism, this time aggregated by ISPs, can be used to provide adequate and agreed compensation with ISPs.
[0099] [0099] In practical terms any compensation for individual owners who have registered their access points with the alternative network access provider can be provided through their ISP. In this alternative (modality) the payments received from the alternative network access provider will be applied to the invoice that the ISP should send to the owner of the access point for the ISP's service. The ISP often provides a package of services, including telephone and television services. - Therefore, the total bill can be large enough that this compensation mechanism can be used even for access point owners who have a large amount of traffic from the alternative network access provider flowing through their connection.
[00100] [00100] Another set of participants in the trade are the i sponsors of connectivity. Through agreements with proprietary hotspot organizations or the owners of the same individual access point, several companies may offer to pay for bandwidth in exchange for the ability to deliver advertisements or commercial messages to end users. As mentioned in the section on proposal mechanism, other forms of compensation for end users can be used. It is possible that the use of bandwidth is sponsored to access specific websites or other services. For example, access to websites that offer specific products for sale can be sponsored by website owners. In these cases The alternative network access provider will provide billing for and receive payments from sponsors for the Use of sponsored bandwidth.
[00101] [00101] FIG. 5 is a flow diagram of the process and data from the alternative network provider's implementation example.
[00102] [00102] The alternative network access provider allows local micro-commerce in connectivity and data transfer capacity, making information available to potential buyers (users of wireless mobile devices) of potential sellers (owners of access points) and for the execution of micro-business operations. In the process, the alternative network access provider will accumulate detailed information about the need, at acceptable prices and the availability of connectivity and data transfer capability at different locations and at different times. There are several ways to charge for the service produced by the alternative network access provider. Some preferred the alternatives listed below. º a brokerage fee regime charges a percentage of the value of each transaction mediated through the exchange. In this case, one possibility is to include the brokerage fee in the price offered in the Ts & Cs of the connectivity proposal. The general process for using the alternative network access provider in a brokerage mode is illustrated in FIG. 6A oº a business forming the intermediate market is based on the
[00103] [00103] Grouping of resources through the alternative network access provider
[00104] [00104] The functions of the alternative network access provider have been described as they would be used for the purpose of providing connectivity and capacity for wireless devices through essentially stationary access points with wired connections through ISPs. However, the The same system can be used when using connections that are transmitted via other mobile devices. In this scenario, each of the mobile devices includes a proposal mechanism and can offer to transmit a connection in its essence, acting as a mobile access point. The network connection to this mobile access point can, in this scenario, be provided by the network operator through its infrastructure, or it can be routed through the Wi-Fi access point, for example, using the access provider mechanism to the alternate network, as described above, in cases where more than one Wi-Fi radio system and channel frequency are available on the device. This use of the alternative network access provider for bundling wireless connections is illustrated in FIGs. 2A-2B.
[00105] [00105] There are also market solutions where mobile smartphones act as Wi-Fi access points for other devices. What is added to this mechanism are the functions that make it possible for any device to support other devices in this way and are rewarded for this service in accordance with the terms and conditions negotiated between the devices or although the alternative network access provider with real-time pricing is based on the role of the alternative network access provider. The alternative network access provider can be implemented to handle compensation and agreements between devices.
[00106] [00106] There are rapidly growing numbers of Machine to Machine (M2M) wireless modules deployed for the purpose of providing asset tracking and monitoring services. These systems may be using a fraction of the connection's capacity. Adding the Wi-Fi function and registering the devices with the alternative network access provider can in many cases turn them into sources of revenue.
[00108] [00108] The benefits derived from the transmission of connections between mobile devices include the provision of more connectivity in areas that would otherwise not have sufficient capacity. However, a more frequent and important benefit is the bundling of data connectivity features from multiple devices using "point-to-point" wireless connectivity. Much of the use of the web can include intermittent transfer (of new files, music, web pages or images) and this activity between different devices can be asynchronous. Therefore, bundling the connectivity features in place will increase the speed in user experience of all participants in the connectivity bundle. All of the various radio features (Wi-Fi, Bluetooth and other radio systems) on each device can be used to establish connections between mobile devices and connections to the Internet. Once again, the systems and methods that enable these benefits to be obtained are the functionality of the alternative network access provider as explained above.
[00109] [00109] The connection grouping provides an opportunity for exchange negotiation. As long as the same devices participate in the connection pool, you will be providing connectivity, as well as using the connectivity provided by others, the net cost for each participant can be positive or negative, depending on usage patterns.
[00110] [00110] This same method of grouping resources applies to sharing between fixed access points as well. At the present time in the local area in most cases wireless network speeds are often higher than wide area network connectivity via cable modem, DSL or even fiber connections. In cases where there are multiple radios at each access point, similar point-to-point connectivity can provide access to multiple simultaneous wide area network connections. Situations with at least two wireless radios per access point are becoming more common, as dual band access points (2.4 and 5 GHz) will gradually gain a larger share of the installed base. Again, the micro-business system of the alternative network access provider can handle enabling the access point's resource pool and adequate compensation for each participant in the pool. The remarks about the intermittent transfer and the benefits for the user experience of all participants apply to this stationary case as it did for The case of the furniture. In practice the pooling feature can include both mobile and stationary devices operating in a mixed mode pooling configuration.
[00111] [00111] Authentication, Security and Gateway Connections
[00112] [00112] There may be two or more nested levels of access in a Wi-Fi implementation to access the internet through the alternative network access provider: one reading with wireless access to the access point itself and the other controls access the Internet. Using encryption and access password to protect the connection to the access point is optional on the alternative network access provider system. The most important aspect for the functions of the alternative network access provider is authentication, authorization, access control and usage measurement and memory (accounting) of internet access and data traffic OR, possibly, to the core service system of the Mobile Operator. Similar authentication and access control systems can be used at both levels of access.
[00113] [00113] In some implementations, the accounting and access control functions can be managed using one or more other methods
[00114] [00114] In an implementation when initially registering with the alternative network access provider, each mobile device establishes a public / private key in a standard PKI infrastructure system. The private key resides on the mobile device and is used to authenticate the device for information on how to connect enabled access points from the alternate network provider. Similarly, usage memories can be encrypted using the mobile device's private key and a summary of them can be added, encrypted using the alternative network access provider's public key, to make sure that they have not been changed during the transport and storage. For access points that are capable of handling similar security functions, a corresponding public / private key combination can be established when they register with the alternate network access provider.
[00115] [00115] The security aspect for access control information for the wireless connection can be specifically treated, for example, as follows: in cases where the Ts & Cs of the proposal mechanism are obtained from the network access provider Alternate security control is possible by transmitting the access point's authentication password to the participating mobile device encrypted with its public key after the device has signaled the acceptance of the Ts & Cs to use the connection through the specific access point.
[00116] [00116] In an implementation the alternative network access provider changes the password or access credentials of participating access points at specific intervals and coordinates of these changes with all authorized devices, including the devices of the access point owner's client and the devices to which access is provided through the alternative network access provider's trade arrangement. In this solution, each access point owner registers all authorized customer devices with the alternative network access provider so that they can participate in this continuous password change process.
[00117] [00117] In another implementation the sequence of future passwords is generated using an algorithm that is made available to all authorized devices (devices of the owner of the access point) whose algorithm can be based on time and use randomly generated password tables. The alternate network access provider has the same synchronized password generation system, so it can provide passwords to the devices it is enabling as a result of an alternate network access provider's trade operation.
[00118] [00118] In yet another implementation the alternative network access provider provides limited connectivity for all devices through the access point to an authentication server that can automatically provide access to devices pre-authorized by the owner of the access point or the devices who can enter a password. Then, the same authentication server can be used to manage access to devices that are using the alternate network access provider to gain access through commerce operations.
[00119] [00119] A security implementation provides dual SSID and security measures at participating access points. In this way, owners' devices can continue to use their family register for functionality, and enabled devices from the alternate network access provider will use the security system and secondary SSID.
[00120] [00120] Figures 1C-D show exemplary access point configurations. In a hardware-oriented security implementation, the access point registered by the alternate network access provider is a separate device provided to the owner / user of a wired Internet connection. This device has the proposal mechanism or a reference to it and is registered with the alternative network access provider. Depending on the equipment and the owner's preference, there are different ways to connect the device to the Wide Area Network. These provide a way to maintain the security measures of the owner's original access point and minimize (perceived) security problems. For example, the two access points can be connected to the WAN via a network switch or the alternate network access provider's access point can be connected to a secondary Ethernet port on a gateway device / internet router .
[00121] [00121] It is not the purpose of this description to address the details of authentication, IP tunneling, access to premium services from operators and other matters related to the security of data transmitted through connections of the alternative network access provider. As mentioned in the introductory section, there are already quite a few advanced solutions described in the 15th 3GPP standards and several vendors are offering solutions for the technical aspects of authentication and security issues and those that are used in various modalities.
[00122] [00122] Figure 1E is a block diagram of an exemplary wireless mobile device. The wireless device includes two or more wireless radio systems with their associated antennas (2, 3, 4, Figure 1E). The device includes, for example, a processor (5) capable of running applications and controlling the status of radio and storage or recording systems (6) to store and retrieve data and programs for applications. In addition, the device has a user interface (7) that allows a user of the device to interact with applications and control various functions of the device. For example, the user can use the interface to enable and disable the various radio systems, or he can use it to make the selection that a software application described in this document should control the state of the radio systems.
[00123] [00123] Several applications running on the processor may have communications needs and would use radio systems to satisfy them. This choice of which radio system is used for communication is often made by the processor. In many cases wireless devices have been programmed by the manufacturer to use a specific radio system, for example, the Wi-Fi radio, for data communication needs if an Internet connection can be established through the system.
[00124] [00124] For the wireless device to use a specific radio system the specific radio system needs to be turned on. The radio system can also be switched on and off by the user via the user interface (7) or be automatically switched on and off by the device by running an application on the processor that controls the state of the radio.
[00125] [00125] Once the radio system is turned on, it can try to connect to the Internet or the telephone network over the various radio systems. In some cases the network system will require authentication, for example, a password to allow the connection to work.
[00126] [00126] In the following sections, several methods for automatically managing the state of radio systems and selecting the specific connection for communication are described.
[00127] [00127] Management of the state of radio systems based on the need or speed of data communication
[00128] [00128] The following paragraphs in this section assume that The user of the device made the selection to let a software application manage the state of the radio systems.
[00129] [00129] For clarity, the following examples are written to illustrate the management of the Wi-Fi radio system. However, it should be understood that the same mechanisms and principles can be used to manage the stage of any other radio system as well .
[00130] [00130] In many wireless devices it is customary to have the cellular radio system on at all times whether it is 2G, 3G, or 4G radio, or a packet-based LTE radio. This system manages communication with the mobile service provider, including voice calls and text messages. If no other radio system is available, the cellular radio system will handle any data communication that the device may require. However, in many cases data communication is automatically switched to the Wi-Fi system if an Internet connection or any other back-end system is available via Wi-Fi radio. This is because in most cases it is less expensive and uses less battery power to send data communications over the Wi-Fi system. Some mobile devices may be equipped with a Wi-Fi radio that is able to communicate with two or more access points (for example, using different Wi-Fi protocols).
[00131] [00131] In a solution mode, an application running on the wireless device processor periodically checks the amount of data that is being transferred, or needs to be transferred, through radio systems. If the amount of data transmitted over a specific time interval exceeds a predetermined value, the application will activate the Wi-Fi radio. Otherwise indicated: if the speed of data transmissions exceeds a predetermined limit, the system will activate the Wi radio -Fi.
[00132] [00132] Whenever the Wi-Fi radio is on, it will analyze the environment to see if, if any, Wi-Fi access points are available and if they require a password or other credentials for a connection. If an access point is available or multiple access points, The device will connect to one if the device has information on all passwords that may be required for a connection.
[00133] [00133] Connecting to the Wi-Fi access point may not mean that there is an Internet connection. The device checks whether the connection is available, for example, by requesting a specific website to provide a response and then comparing the response received to a stored copy of the expected response. In this way, the system can determine if any access control gateway has redirected to a connection to a page that may require credentials to be entered.
[00134] [00134] The device, in one mode, continues to monitor the data traffic in the communication system and if it detects that the traffic speed falls below a certain predetermined limit for a predetermined time it will turn off the Wi-Fi radio. In another mode, the device would leave the Wi-Fi radio on, as long as the device maintained a connection to the access point and signal strength, or the signal-to-noise ratio when connecting to the Wi-Fi access point was above of a predetermined limit. If the strength of the connection signal or other quality indicator falls below a predetermined value, the device will disconnect and turn off the Wi-Fi radio.
[00135] [00135] In another modality, the device's processor controls the active applications running on the device and so an application that has significant communication needs to be activated, the system will automatically turn on the Wi-Fi radio. This starts another scan of the environment and, as explained above, possibly a connection via the Wi-Fi access point. A list of applications that may have significant communication needs in this case is stored in the device's memory (6). For example, the list can be pre-configured by a user or it can be determined automatically over time, monitoring data usage and usage patterns for various applications.
[00136] [00136] Another indication of possible data communication needs is the general state of the device and the state of your monitor. In order to conserve the battery, devices automatically enter "s / eep" mode, where the display can be turned off, and any other processes and devices can be suspended. During these moments, the system can turn off its Wi-Fi radio and adjust the interval called activation, as explained later in this description.
[00137] [00137] Management of radio systems based on data communication locations
[00138] [00138] In addition to maintaining the range of data communication speeds and applications that may have data communication needs from the device processor can use the observed current and a set of previous device locations to make the decision to turn on the radio.
[00139] [00139] Although there are proposed solutions in which the device user can program various locations in memory and the system will then turn on the Wi-Fi radio in those locations, these systems are heavy and require significant effort by the user to obtain information on the selection of locations where to turn on the Wi-Fi radio and the locations need to be updated manually according to wireless usage and availability patterns at various location changes.
[00140] [00140] In one mode of the solution, the wireless device stores in memory (6) the location of data communication use, the radio system used for data communication and the total amount of data in each communication session, the session time, as well as the application that uses data communication. This information is then used to allow the device to discover the locations where significant data communication occurs and where a Wi-Fi radio connection (or any other specific radio system) is used for that communication. In one embodiment, the system's ranking sorts the locations based on data usage and possibly based on the percentage of Wi- —Successful use and uses the best locations in the classification as a basis for enabling Wi-Fi or shortening the activation interval. The system can only automatically turn on the Wi-Fi radio whenever it detects that the device is in a location or within a certain distance from the location where the communication over the Wi-Fi radio system was previously used successfully.
[00141] [00141] In order to avoid draining the battery from using the GPS system, the device may first try to establish its location based on triangulation or another method that uses cellular radio stations or access points for Wi-Fi or other radio systems it detects during operation and routine checks. The frequency of location checks and the method of location verification can be selected based on the past history of the frequency of data communications, time of day, day of the week, or other parameters that characterize previous data communications.
[00142] [00142] Sometimes, the device may be in motion, while data usage is happening, for example, in a moving vehicle. In such cases the opportunity to use Wi-Fi connections may be limited because of the time required to establish a new connection and the short time of any particular Wi-Fi access point would be available for the connection. To avoid unnecessary use of Wi-Fi radio in these circumstances, the activation interval may become longer or the Wi-Fi radio may be turned off if the device is detected to be in motion.
[00143] [00143] Time-based management of radio systems
[00144] [00144] In addition to the data communication needs and observed data communication locations, the solution uses time based methods to manage the Wi-Fi radio. There may be several inputs to select times to turn the Wi-Fi radio on and off As mentioned in the previous section, the moments can be based on the observed behavior pattern in relation to data communication or they can be based on user input.
[00145] [00145] Although there are systems that provide the opportunity for the user to enter a time to turn their Wi-Fi radio on and off, these methods provide a partial improvement compared to always having the radio on or always off. They can affect the actual state of the radio to make it on or off.
[00146] [00146] In this solution there is a mechanism through which the Wi-Fi radio is automatically turned on periodically. When turning on the radio, the device performs a reasonably quick scan of the environment and determines whether there are any access points that are available for a connection. If so, the system will associate and can remain associated until degradation in signal quality can result in decoupling. After decoupling, the device will turn off the Wi-Fi radio. If there is no access point through which the device can establish a Wi-Fi connection, it will automatically turn off the Wi-Fi radio for a period of time, which we call "the activation interval".
[00147] [00147] In this solution, the radio's time-based management system may not be simply turning the radio on and off at predetermined times, but this may be affecting the duration of the activation interval. For example, during periods of day and days in a week that the device has had frequent, high-volume data communication, the activation interval may be shorter.
[00148] [00148] The activation interval may depend on the general state of the wireless device and the state of its display. If the device is in so-called sleep mode, the activation interval may be longer. A status change from sleep mode to normal operating mode can trigger an immediate activation of the radio and a scan of the environment for Wi-Fi access points followed by a shorter activation interval if no access point is found. that can provide a Wi-Fi connection.
[00149] [00149] In Wi-Fi access point connections, the strength and quality of the signal can depend on a number of factors, including the distance to the access point, the way the user is holding the device and interference from other devices like microwave ovens. In such cases, the availability of a connection may disappear for a short period of time and return as circumstances change. For this reason, the solution, in one mode, has a short activation interval for the first two attempts after a disconnection and then changes over a longer interval in accordance with the use of device status data and other parameters.
[00150] [00150] Some wireless devices allow the user to configure tasks and applications to run when there is a Wi-Fi connection to the Internet or to a back-end system. For example, uploading photos from the device and syncing any podcasts or other content or performing software updates can be tasks that the user has configured to perform over a Wi-Fi connection. The activation interval can be determined so that it is likely that these tasks will be completed within the time expected by the user after he or she arrives at a location where Wi-Fi is available. Without a time-based Wi-Fi radio activation and management interval, these tasks could not be completed even if a Wi-Fi connection was available. If the only mechanism to turn on the radio was dependent on the observed data communication speed, the radio would not turn on since the applications would not start before it was turned on.
[00151] [00151] Management of radio systems based on the performance characteristics of all radios
[00152] [00152] In addition to the methods described above, the automatic switching on and off of various radio systems can be based on the performance characteristics of the observed for the different systems. Metrics used to measure performance can include relative signal strength, encoding rates automatically selected for each radio communication alternative, the relative battery consumption of various radio systems, or any other metrics that are available to the processor. In this solution the system can perform periodic checks of the performance level, for example, transferring said amounts of data through the radio connection to serve the data communication speed.
[00153] [00153] The system may be performing brief speed tests with several radio systems and has logic that determines that a certain level of speed available in each of the radio systems will cause the connection to be switched over that system. Other characteristics of relative performance can be measured and this can result in a more complex logic to select which radios to use and which to turn off and how long the activation intervals for the radios that have been turned off must have.
[00154] [00154] Cost-based radio systems management
[00155] [00155] In some modalities of the solution, the Wi-Fi radio or other radio systems may have predetermined or known costs associated with the communication of data over the radio link. For example, this cost can be provided through an alternative network access provider facilitator as described in US Provisional Application Serial No. 61 / 618,318, filed on March 30, 2012, entitled "Systems And Methods For Alternative network access provider ", and US Provisional Order No. 61 / 563,735, entitled" Method and System for Real Time Micro-Commerce in Wireless Connectivity ", both of which are hereby incorporated by reference.
[00156] [00156] In case the communication cost is known or can be determined, it can be used to select the communication link between different alternatives. These alternatives may include several Wi-Fi access points and cellular radio, WiMAX and other radio systems. In a solution mode, the selection of the connection to be used is based on cost and possibly a policy provided by the device owner or the communication service provider that is providing cellular communication to the device and has a contract with the owner the device.
[00158] [00158] Management of radio systems based on combinations of factors
[00159] [00159] The previous sections of this order described several factors that can be used in managing the state of radio systems on a wireless device and in managing the selection of the specific communication link.
[00160] [00160] In additional modalities of the solution, various combinations of all or some of the factors can be used to achieve the best management of radio resources with regard to battery power and cost. For example, the activation interval can be defined as being different at different times of the day and at different locations on the device and may depend on which applications are active on the device.
[00161] [00161] Similarly, the activation interval can be created to depend on the past success in establishing a Wi-Fi connection at a given location. For example, if the device has sometimes tried to find an access point available for a Wi-Fi connection at a given location and has failed, the system can make the activation interval longer at that location to avoid unnecessary attempts. For example, the activation interval for that location can be created to be one day or several days, so that the system captures a possible addition of a new access point that can be made available, but will not waste resources in trying to connect to often in places where no connection was available before. Access points may be available for a given device because they do not have password protection or access control entry ports controlling access to the Internet, because the password has been stored in the memory of the wireless device or because they can be accessed through an alternative network access provider.
[00162] [00162] Similarly, other complex combinations of variables explained in the previous sections can be used to precisely adjust radio state management and connection selections to achieve optimal battery savings and cost savings.
[00163] [00163] Software Ecosystem and Component Providers
[00164] [00164] This description introduces a method and system with associated functional descriptions for implementing modalities. Systems and methods can provide the means to take advantage of the enormous wireless capacity already installed in people's homes and businesses. In addition, as a result of the establishment of the alternative network access provider, an entire ecosystem of access point, picocell and femtocell providers will take shape. A large number of these, relatively inexpensive devices, can be deployed and connected to the Internet and through the cloud based service of the alternative network access provider, their capacity can be connected directly to the ecosystem. Their owners and administrators can be compensated through the alternative network access provider for the micro-operations of providing bandwidth to wireless devices in their vicinity. However, in this ecosystem there will be many other participants as well. The central aspect of the alternative network access provider solution is that it provides a platform for a large number of different types of participants to provide products and services that will enable trade.
[00165] [00165] Through the publication of interfaces and APIs for communication with the alternative network access provider for the purpose of providing terms and conditions of use, memories of use and automated payment transactions, the managers of the alternative network access provider can make it possible for third-party companies to write applications for selection mechanisms and proposal mechanisms for various types of mobile devices and access points. Alternatively, the selection and proposal mechanisms can be implemented in the computer systems of an alternative network access provider and the interfaces (APIs) provided to other participants in the ecosystem include specification of the method and format for providing the information described above which is necessary for the selection and proposal engines to operate and a format and method to provide the operator with the specified rules and conditions.
[00166] [00166] The published APIs will make it possible for established companies that provide solutions for secure entry doors and for mobile devices to offload Wi-Fi traffic (offload) to add the functionality of proposal, selection and accounting mechanisms and the secure routing explained above terms and conditions and usage data for the alternate network access provider's cloud-based information system.
[00167] [00167] The published APIs will make it possible for different types of sponsor organizations to create applications for wireless devices to display their ads and collect search results. Due to the nature of the access point's connectivity location, the system will already know in some way the location of the wireless device and its end user, so many advertisements can be local in nature, and refer to products and services that are available in the vicinity of the end user, even in cases where the end user is unwilling to provide accurate location information from the GPS system of wireless devices.
[00168] [00168] These enabling applications can be certified by the alternative network access provider and sold through wired ISPs or directly to access point owners and directly or through wireless operators to end users of wireless devices.
[00169] [00169] There may be service providers and equipment manufacturers that can add a new alternative network access provider based on the characteristics of their existing offerings and thus generate new revenue opportunities and increase the availability of mobile data capacity. Examples include:
[00170] [00170] Municipal outdoor Wi-Fi service providers that can sell their excess capacity at retail through the alternative network access provider
[00171] [00171] Satellite-based Internet connectivity providers. In this case it would be effective to use the installed physical satellite receiver structures, which are already outside buildings and can be located in an elevated and visible location. Adding a high-power outdoor Wi-Fi access point to these structures would provide a large coverage area close to the location of the satellite receiver. To maximize the possibility of mobile device connections and the opportunity for micro-commerce, multiple access points with highly directional sectional antennas could be used in each structure.
[00172] [00172] Internal access point manufacturers can provide a combined access point / client device that can be placed in a window in areas of need for high data connectivity. This device would connect the existing wireless access point as a client and project wireless signals as an external building access point.
[00173] [00173] Companies that launch new 4G networks or operate WiMAX networks are currently limited by the lack of end-user mobile devices that are able to connect directly to these new networks. The alternative network access provider provides a mechanism for these companies to reach a broader customer base immediately. Installing intermediate bridge devices that connect to the Internet using new network technologies (such as 4G, LTE or WIMAX) and on the other hand provide simple local Wi-Fi connectivity that is made available through the alternative network access provider they can serve any Wi-Fi enabled devices.
[00174] [00174] Providers of M2M connectivity modules or services can use a small fraction of the capacity for tracking or monitoring simple assets that can add a Wi-Fi module and get paid for its M2M functionality, selling the excess capacity through the alternative network access provider.
[00175] [00175] As radios continue to become less expensive and more and more radios can be integrated into a single SOCs chip, the opportunities increase for the creation of completely new products that are specifically designed to provide data connectivity services and count with the alternative network access provider to deal with the commercial aspects of its use.
[00176] [00176] Figure 7 shows an exemplary process. The process can be implemented to manage a radio from a device. This example is illustrated with two radios (for example, radios 1 and 2). However, an implementation can include any number of radios. When radio 1 is on and radio 2 is off, process 700 can be used to manage the radios (eg, manage - OS stages - radio on / off) to, for example, minimize power consumption. Process 700 starts with decision block 705 being created to determine if an activation event has occurred. An activation event can be triggered, for example, if a specific application is running, the productivity of radio 1 is above a high limit or below a low limit, the quality of an existing connection to radio 1 has deteriorated ( for example, a low signal-to-noise ratio), the location of the device has changed, etc. If an activation event has occurred, process 700 will flow to block 715 where radio 2 is on. If an activation event has not occurred, determine whether an activation interval has expired in the decision block
[00177] [00177] After radio 2 is turned on, check connectivity access - available (for example, available access points) in block 720. If found in decision block 725, perform a connectivity test in block
[00178] [00178] In block 740, a determination (for example, comparison) is performed to determine whether to use The access point found. The comparison can be based on one or more access conditions (for example, costs, capacity, speed, etc.) as described above. If the determination is positive in decision block 745, establish a connection to the access point found in block 750. If the new connection using radio 2 is created to replace an existing connection (for example, using radio 1), as shown in decision block 755, then communication using radio 1 must be transferred in block 760. After transfer, radio 1 can be turned off or put into energy saving mode in block 765 to conserve energy. If the existing communication using Radio 1 is not transferred, the connection using Radio 2 will be used in parallel with the existing connection, using Radio 1, for example, to speed up communication on Radio 1 or for new communication. When communication on any radio comes to an end, the radio can be turned off or put into a power saving mode. Process 700 flows back to the beginning.
[00179] [00179] If the result in decision block 725, 735, or 745 is "No", process 700 will flow to block 775, where radio 1 will be turned off or placed in an energy saving mode. Then the activation interval can be extended or shortened, in block 780, as described above. The - process 700 flows back to the beginning.
[00180] [00180] In some examples, process 700 can be implemented with different, less or more blocks. Process 700 can be implemented as executable computer instructions, which can be stored on media, loaded onto one or more processors from one or more computing devices and mobile devices, and executed as a computer implemented method.
[00181] [00181] FIG. 8 is a block diagram illustrating an example of a wireless communication device 450 that can be used in various embodiments described herein. For example, wireless communication device 450 can be configured and / or implemented as an access point, a mobile device with a different configuration than that indicated in FIG. 1E, or a device or component used in an alternative network access provider system. However, other wireless communication devices and / or architectures can also be used, as will be clear to those skilled in the art.
[00182] [00182] In the illustrated embodiment, the wireless communication device 450 comprises an antenna system 455, a radio system 460, a baseband system 465, a speaker 470, a microphone 480, a central processing unit ( "CPU") 485, a data storage area 490, and a hardware interface 495. The wireless communication device, 450, radio frequency (“RF”) signals are transmitted and received over the air by the antenna 455 under the management of the radio system 460.
[00183] [00183] In one embodiment, the 455 antenna system may comprise one or more antennas and one or more multiplexers (not shown) that perform a switching function to provide the 455 antenna system with transmitting and receiving signal paths. On the receiving path, the received RF signals can be coupled from a multiplexer to a low noise amplifier (not shown) that amplifies the received RF signal and sends the amplified signal to the 460 radio system.
[00184] [00184] In the alternative modalities, the radio system 460 can comprise one or more radios that are configured to communicate over various frequencies and / or using different wireless communication protocols. In one embodiment, the radio system 460 can combine a demodulator (not shown) and modulator (not shown) in an integrated circuit ("IC"). The demodulator and modulator can also be separate components. On the entry path, the demodulator denudes the RF carrier signal by letting a baseband receive the audio signal, which is sent from the radio system 460 to the baseband system 465.
[00185] [00185] If the received signal contains audio information, then the 465 baseband system decodes the signal and converts it to an analog signal. The signal is then amplified and sent to the speaker
[00186] [00186] The base band system 465 is also communicably coupled with the central processing unit 485. The central processing unit 485 has access to a data storage area 490. The central processing unit 485 can be configured to perform instructions (ie computer programs or software) that can be stored in the 490 data storage area. The computer programs can also be received by the 465 baseband processor and stored in the 490 data storage area or executed on top receipt. Such computer programs, when executed, activate the wireless communication device 450 to perform the various functions of the present invention as described above. For example, data storage area 490 may include several software modules (not shown) described in relation to one or more of FIGs. 3-7.
[00187] [00187] Non-transitory media can be used to provide executable instructions (for example, software and computer programs) for wireless communication device 450 for execution by central processing unit 485. An example of non-transitory media is the data storage 490. The communication device 450 can obtain instructions executable through the microphone 480 (through the baseband system465), the antenna system 455 (also via the baseband system 465), and the hardware interface 495.
[00188] [00188] The central processing unit 485 is configured to receive notifications from the hardware interface 495 when new devices are detected through the hardware interface. The hardware interface 495 can be a combination electromechanical detector with software that communicates with the 485 CPU and interacts with new control devices. The 495 hardware interface can be a firewire port, a Universal Serial Bus ("USB") port, Bluetooth or infrared wireless unit, or any of a variety of wired or wireless access mechanisms. Examples of hardware that can be associated with the 450 device include data storage devices, computing, devices, headphones, microphones and the like.
[00189] [00189] FIG. 9 is a block diagram illustrating an example of a wired or wireless system 550 that can be used in various embodiments described herein. For example, system 550 can be configured and / or implemented as an access point, a mobile device with a different configuration than that indicated in FIG. 1E, or a device or component used in an alternative network access provider system. The 550 system can be a computer, server, laptop, Smartphone, tablet PC, or any other enabled processor device capable of wired or wireless communication. Other computer systems and / or architectures can also be used, as will be clear to those skilled in the art.
[00190] [00190] System 550 may include one or more processors, such as processor 560. Additional processors may be provided, such as an auxiliary processor to manage input / output, an auxiliary processor to perform floating point mathematical operations, a special purpose microprocessor, having an appropriate architecture for the rapid execution of signal processing algorithms (for example, the digital signal processor), a slave slave processor for the main processing system (for example, back-end processor) , an additional microprocessor or systems for multiple or dual processor for controller, or a coprocessor. Such auxiliary processors may be separate processors or may be integrated with the 560 processor.
[00191] [00191] The 560 processor can be connected to a 555 communication bus. The 555 communication bus can include a data channel to facilitate the transfer of information between storage and other peripheral components of the 550 system. The communication bus
[00192] [00192] System 550 can include main memory 565 and can also include secondary memory 570. Main memory 565 provides data storage and instructions for running programs on
[00193] [00193] Secondary memory 570 may optionally include an internal memory 575 and / or removable media 580, for example, a floppy drive, a magnetic tape drive, a compact disc ("CD") drive, a digital versatile disc drive ("DVD"), etc. Removable media 580 is read and / or written in a well-known manner. Removable storage media 580 can be, for example, a floppy disk, magnetic tape, CD, DVD, SD card, etc.
[00194] [00194] Removable storage media 580 represents non-transitory computer-readable media, having the computer's executable code (ie software) and / or data stored in it. Computer software or data stored on removable storage media 580 is read on system 550 for execution by processor 560.
[00195] [00195] In alternative modes, secondary memory 570 may include other similar means, to allow computer programs or other data or instructions to be loaded into the system
[00196] [00196] The other examples of secondary memory 570 may include semiconductor based memory such as programmable read-only memory ("PROM"), erasable programmable read-only memory 15º ("EPROM"), electrically erasable read-only memory ( "(EEPROM") or flash memory (oriented block memory similar to EEPROM). Also included are any other removable storage media 580 and communication interface 590, allowing software and data to be transferred from an external media 595 to the system 550.
[00197] [00197] System 550 can also include an input / output interface ("1/0") 585. Interface 1 / O 585 facilitates input and output for external devices. For example, the 1 / O 585 interface can receive keyboard or mouse input and can provide output for a display. The 1 / O 585 interface is capable of facilitating entry and exit to various alternative types of human interface and - same machine interface devices.
[00198] [00198] System 550 may also include a 590 communication interface. The 590 communication interface allows software and data to be transferred between the 550 system and external devices (for example, printers), networks or information sources. For example, the code
[00199] [00199] The 590 communication interface can implement one or more protocols or standards, such as IEEE 802 Ethernet standards, Fiber Channel, digital subscriber line ("DSL"), Digital Asynchronous Subscriber Line ("ADSL"), frame relay, asynchronous transfer mode ("ATM"), integrated services digital network ("ISDN"), personal communications services ("PCS"), Transmission Control Protocol / Internet Protocol ("TCP / IP") , Internet Serial Line protocol / Point-to-Point protocol ("SLIP / PPP") and so on, but it can also implement non-standard or custom interface protocols as well.
[00200] [00200] The software and data transferred via the communication interface 590 are generally in the form of electrical communication signals 605. These signals 605 can be supplied to the communication interface 590 through a communication channel 600. In a "modality" , communication channel 600 can be a wired or wireless network, or any variety of other communication links. Communication channel 600 carries 605 signals and can be implemented using a variety of wired or wireless communication media, including wire or cable, fiber optics, conventional phone line, cell phone link, wireless data communication link , radio frequency ("RF") link, or infrared link, just to name a few.
[00201] [00201] The computer's executable code (ie computer programs or software) is stored in main memory 565 and / or secondary memory 570. Computer programs can also be received via communication interface 590 and stored in main memory 565 and / or secondary memory 570. Such computer programs, when executed, allow system 550 to perform the various functions of the present invention as described above.
[00202] [00202] In this description, the term "computer-readable media" is used to refer to any transient or non-transient computer-readable media used to deliver computer executable code (for example, software and computer programs) to the system 550. Examples of such media are main memory 565, secondary memory 570 (including internal memory 575, removable media 580, and external storage media 595), and any peripheral device, communicably coupled to the communication interface 590 (including a data server). network information or other network device). These computer readable transient and non-transitory media are media for providing executable code, programming instructions and software for the 550 system.
[00203] [00203] In a mode that is implemented using the software, the software can be stored on a computer-readable medium and loaded into the system 550 through removable media 580, interface / O 585 or communication interface 590. In such mode, the software is loaded into system 550 in the form of electrical communication signals 605.
[00204] [00204] The 550 system also includes optional wireless communication components that facilitate wireless communication, in a voice and over a data network. The wireless communication components comprise an antenna system 610, a radio system 615 and a band system - base 620. In system 550, radio frequency ("RF") signals are transmitted and received over the air by the antenna 610 under the management of the radio system 615.
[00205] [00205] In one embodiment, the 610 antenna system may comprise one or more antennas and one or more multiplexers (not shown) that perform a switching function to provide the 610 antenna system with transmitting and receiving signal paths. On the receiving path, received RF signals can be coupled from a multiplexer to a low noise amplifier (not shown) that amplifies the received RF signal and sends the amplified signal to the 615 radio system.
[00206] [00206] In the alternative modalities, the radio system 615 can comprise one or more radios that are configured to communicate through several frequencies. In one embodiment, the 615 radio system can combine a demodulator (not shown) and modulator (not shown) in an integrated circuit ("IC"). The demodulator and modulator can also be separate components. On the entry path, the demodulator denudes the RF carrier signal by letting a base band receive the audio signal, which is sent from the radio system 615 to the base band system 620.
[00207] [00207] If the received signal contains audio information, then the 620 base band system decodes the signal and converts it to an analog signal. The signal is then amplified and sent to a speaker. The 620 baseband system also receives analog audio signals from a microphone. These analog audio signals are converted to digital signals and encoded by the baseband system 620. The baseband system 620 also encodes digital signals for transmission and generates a baseband transmitter of the audio signal that is routed to the modulator of the 615 radio system. The modulator mixes a baseband transmitter of the audio signal with an RF signal carrier generating an RF signal transmitter that is routed to the antenna system and can pass through a power amplifier (not shown). The power amplifier that amplifies the RF signal transmitter and routes it to the 610 antenna system where the signal is connected to the antenna port for transmission.
[00208] [00208] The baseband system 620 is also communicably coupled with the processor 560. The central processing unit 560 has access to the data storage areas 565 and 570. The central processing unit 560 can be configured to execute the instructions ( (ie, computer programs or software) that can be stored in memory 565 or secondary memory 570. Computer programs can also be received from the baseband processor 610 and stored in data storage area 565, or in secondary memory 570, or executed upon receipt. Such computer programs, when executed, allow the 550 system to perform the various functions of the present invention as described above. For example, data storage areas 565 may include several software modules (not shown) that are executable by the 560 processor.
[00209] [00209] Several modalities can also be implemented mainly in hardware, for example, using components such as application-specific integrated circuits ("ASICsS"), or field programmable port arrays ("FPGAs"). The implementation of a hardware state machine capable of performing the functions described in this document will also be evident to those skilled in the relevant technique. The various modalities can also be implemented using a combination of hardware and software.
[00210] [00210] In addition, those skilled in the art will appreciate that the various illustrative logic blocks, modules, circuits and steps of the method described in connection with the numbers described above and the modalities disclosed in this document, can often be implemented as electronic hardware, computer software or combinations of both. To clearly illustrate this interchangeability of hardware and software, several illustrative components, blocks, modules, circuits and steps have been described above, generally in terms of their functionality. Whether this functionality is implemented as hardware or software depends on the particular application and the design restrictions imposed on the global system. Those skilled in the art can implement the functionality described in different ways for each particular application, but such implementation decisions should not be interpreted as causing the departure of the scope of the invention. In addition, the - grouping of functions within a module, block, circuit or step is for easy description. The specific functions or steps can be moved from one module, block or circuit to another without starting from the invention.
[00211] [00211] In addition, several illustrative logic blocks, modules, and methods described in relation to the modalities disclosed in this document can be implemented or executed with a general purpose processor, a digital signal processor ("DSP"), an ASIC, a FPGA or other programmable logic device, different logic port or transistor, different hardware components or any combination of these designed to perform the functions described in this document. A general purpose processor can be a microprocessor, but in the alternative, the processor can be any processor, controller, micro controller, or state machine. A processor can also be implemented as a combination of device computing, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other configuration.
[00212] [00212] FIG. 10 is an example computing environment with an example computing device suitable for use in some example implementations (for example, a mobile device, access point, a device in an ANAP system). Computing device 1005 in computing environment 1000 may include one or more processing units, cores or processors 1010, memory 1015 (for example, RAM, ROM, and / or the like), internal storage 1020 (for example, state storage magnetic, optical, and / or organic solid), and / or 1I / O 1025 interface, none of which can be coupled to a communication mechanism or bus 1030 to communicate information or incorporated into computing device 1005.
[00213] [00213] Computing device 1005 can be coupled —communicably for input interface / user 1035 and interface / output device 1040. One or both interfaces of input / user 1035 and interface / output device 1040 can be an interface with or wireless and can be detachable. The 1035 input / user interface can include any device, component, sensor or interface, physical or virtual, that can be used to provide input (for example, buttons, touch-screen interface, keyboard, cursor / pointing control, microphone, camera, Braille, motion sensor, optical reader, and / or the like). Interface / output device / 1040 may include a display, TV, monitor, printer, speaker, Braille, or the like. In some example implementations, input / user interface 1035 and interface / output device 1040 can be incorporated with or physically coupled to computing device 1005. In other example implementations, other computing devices can function as or provide the functions of input / user interface 1035 and interface / output device 1040 to a computing device
[00214] [00214] Examples of computing device 1005 may include, but are not limited to, highly mobile devices (e.g., smartphones, devices in vehicles and other machines, devices carried by humans and animals and the like), mobile devices (e.g. , tablets, notebooks, laptops, personal computers, portable televisions, radios and the like) and are not designed for the mobility of devices (for example, desktop computers, other computers, information kiosks, televisions, one or more coupled processors, radios and similar).
[00215] [00215] Computing device 1005 can be coupled communicably (for example, via 1 / O interface 1025) for external storage 1045 and network 1050 to communicate with any number of network components, devices and systems, including a or more computing devices of the same or different configuration. The computing device 1005 or any connected computing device may be functioning as a service provider, or referred to as a server, client, compact server, general machine, special machine or other label.
[00216] [00216] The 1025 1I / O interface may include, but is not limited to, wired or wireless interfaces, using any communication or 1 / O protocols or standards (for example, Ethernet, 802.11 x, modem, Universal System Bus, WiMax, a cellular network protocol and the like) for communicating information and / or at least all connected components, devices and network in a 1000 computing environment. The 1050 network can be any network or the
[00217] [00217] The computing device 1005 can use and / or communicate using computer-readable or computer-based media, including transitory and non-transitory media. Transient media includes means of transmission (for example, metal cables, fiber optics), signals, carrier waves, and the like. Non-transient media includes magnetic media (eg, discs and tapes), optical media (eg, CD-ROM, digital video discs, Blu-ray discs), solid-state media (eg, RAM, ROM, flash memory , solid state storage) and other non-volatile storage or memory.
[00218] [00218] Computing device 1005 can be used to implement executable computer techniques, methods, orders, processes or instructions in some example computing environments. Executable computer instructions can be obtained from transitory media and stored and retrieved from non-transitory media. Executable instructions can originate from one or more of any programming, scripts, and machine languages (for example, C, C ++, CH, Java, Visual Basic, Python, Perl, JavaScript and others).
[00219] [00219] The 1010 processor (s) can run under any operating system (OS) (not shown), in a native or virtual environment. One or more applications that can be deployed that includes logical unit 1060, application programming interface (API) unit 1065, input unit 1070, output unit 1075, mobile device management unit 1080, point management unit access 1085, use management unit 1090, and communication mechanism between units 1095 for the different units to communicate with each other, with the operating system, and with other applications (not shown). For example, mobile device management unit 1080, access point management unit 1085, use management unit 1090 can implement one or more processes shown in FIGs. 3-7. The units described and the elements can be varied in design, function, configuration, or implementation and are not limited to the descriptions provided.
[00220] [00220] In some example implementations, when information or an execution instruction is received per API 1065 unit, it can be communicated to one or more other units (for example, logic unit 1060, input unit 1070, output 1075, mobile device management unit 1080, access point management unit 1085 and usage management unit 1090). In an ANAP implementation, for example, unit entry 1170 can receive location information from a mobile device and pass the information on to mobile device management unit 1080. Access point management unit 1085 can determine one or more access points and provide information about those access points to the mobile device via the 1175 output unit (for example, transmitted to the mobile device using a radio or via another radio communication device connected to the 1150 network). The mobile device and / or an access point can provide usage data that is managed by the use of the 1190 management unit, which can provide billing and / or payment information to the owners and / or operators of the access points and mobile devices.
[00221] [00221] In some cases, logic unit 1060 can be configured to control the flow of information between units and direct services provided by API unit 1065, input unit 1070, output unit 1075, device management unit 1080, access point management unit 1085 and use management unit 1090 in some example implementations described above. For example, the flow of one or more processes or implementations can be controlled by logic unit 1060 alone or in conjunction with API unit 1065.
[00222] [00222] Although some example implementations have been shown and described, these example implementations are provided to convey the subject described here to people who are familiar with this field. It should be understood that the subject described here can be implemented in several ways, without being limited to the example implementations described. The subject described here can be different or practiced without these issues specifically defined or described or with other elements or issues not described. It will be appreciated by those skilled in the art that changes can be made to these example implementations without departing from the subject described in this document, as defined in the added claims and their equivalents.
[00223] [00223] The following table provides definitions of acronyms: ig Be
La CDMAZ000 | Family of wireless standards and protocols, which use CDMA channel access, to send voice, data and signaling between cell phones and cell sites [EPROM erasable programmable memory only EEPROM Electrically Erasable Programmable Memory E-Read Only
Single standard for wireless communication of high data 2 Beloved mncatmc rudder [EEE AR Mm [E ERA
权利要求:
Claims (1)
[1]
CLAIMS 1 Method to enable access to the alternative network for a wireless mobile communication device, characterized by the fact that it comprises: receiving information associated with a mobile device; the information comprises information about the location associated with the mobile device; identification, based on information associated with the mobile device, when identifying an access point available to provide connectivity services for the mobile device, the access point is not the computing device; providing the information associated with the access point to the mobile device, the information comprises at least one of the terms of use, conditions of use, costs of use, access point characteristics, connection characteristics, access point capacity and access information access point security; and receiving information from at least one mobile device and the access point.
2. Method according to claim 1, characterized by the fact that the access point is identified based on the local information associated with the mobile device.
3. Method according to claim 1, characterized by the fact that before supplying the information associated with the access point, selecting the access point for connection with the mobile device based on the information associated with the access point and information Prior information associated with another access point, the prior information comprises at least one of the terms of use, conditions of use, use costs, access point characteristics, connection characteristics, and access point capacity.
4. Method according to claim 1, characterized by the fact that it also comprises a certain billing charge based on information on the use associated with the mobile device.
5. Method according to claim 1, characterized by the fact that it also comprises the determination of a payment amount based on the usage information associated with the access point.
6. At least one computing device, characterized by the fact that it comprises a processor and storage, is configured to perform: receiving information associated with a mobile device; the information comprises information about the location associated with the mobile device; identification, based on information associated with the mobile device, when identifying an access point available to provide connectivity services for the mobile device, the access point is not the computing device; providing the information associated with the access point to the mobile device, the information comprises at least one of the terms of use, conditions of use, costs of use, access point characteristics, connection characteristics, access point capacity and access information access point security; and receiving information from at least one mobile device and the access point.
7. At least one computing device according to claim 6, characterized by the fact that the access point is identified based on the local information associated with the mobile device.
8. At least one computing device according to claim 6, characterized by the fact that before supplying the information associated with the access point, selecting the access point
Ú access for connection to The mobile device based on the information associated with the access point and prior information associated with another access point, the prior information comprises at least one of the terms of use, conditions of use, use costs, characteristics of access point, connection characteristics, and access point capability.
9. At least one computing device according to claim 6, characterized by the fact that it also comprises a certain billing charge based on the usage information associated with the mobile device.
10. At least one computing device according to claim 6, characterized in that it comprises the determination of a payment amount based on the usage information associated with the access point.
11. Method for obtaining access to the implemented alternative network
15. by a mobile device, having a first radio and a second radio, characterized by the fact that the method comprises: using the first radio in a connection; detect that a connection throughput is over the limit; determine, based on access conditions, an access point to establish a second connection using a second radio; turn on the second radio; perform a connectivity test to the access point using the second radio; and establish the second connection using the second radio.
12. Method, according to claim 11, further characterized by the fact that it comprises: transferring a communication using the first radio to use the second radio; and turn off the first radio.
13. Method according to claim 11, characterized in that the first radio communicates using a Wi-Fi access protocol and the second radio communicates using a cellular protocol.
14. Method according to claim 11, characterized by the fact that the first radio communicates using a cellular protocol and the second radio communicates using a Wi-Fi access protocol, and the method further comprises receiving the associated information via least one access point; determining the establishment of a connection using the second radio with at least one access point; and connecting to at least one access point.
15. Method according to claim 11, characterized in that the determination to switch on the second radio is based on the transfer rate of the first radio being below a low limit or above a high limit, the method further comprises: identify an access point to establish a connection using the second radio; establish the connection with the access point; transfer a communication of use from the first radio to the connection; and turn off the first radio.
16. Method according to claim 11, characterized in that the determination to switch on the second radio is based on the expiration of the activation interval, in which the activation interval is shortened to an immediate expiration, based on the application predetermined is being performed.
17. Method according to claim 11, characterized in that the performance of the connectivity test used on the second radio comprises sending a test message to a predetermined destination and determining whether the test message is sent successfully.
18. Mobile device, characterized by the fact that it comprises, a first radio, a second radio, storage, and a processor configured to run: using the first radio, while the second radio is off; determining to turn on the second radio based on a transfer rate of the first radio being below a low limit or above a high limit, or based on an expiration of an activation interval, where the activation interval is configured to be more than a predefined value when the mobile device is detected in motion, the power level of the mobile device is below a power limit, the current time is within a first time period of the day, or the current time is within a first day of the week; and where The activation interval is set to be shorter than the default value when a predetermined application is running, the mobile device has detected a local change, the current time is within a second time period of the day, or the current time is within a second day of the week; turning on the second radio; and conducting a connectivity test using the second radio.
19. Mobile device according to claim 18, characterized - as per understand: transferring a communication using the first radio to use the second radio; and turn off the first radio.
20. Method for obtaining access to the alternative network implemented by a mobile device, having a first radio, characterized by the fact that the method comprises: determination to turn on the first radio based on the expiration of the activation interval, in which the activation interval is determined based on one or more of a predetermined application being executed, at a location on the mobile device, the drop of a previous connection, or a period of time; identifying an access node using the radio; establishing a connection to the access node using the first radio; and conducting a connectivity test to the access point using the first radio.
21. Method for obtaining access to the alternative network implemented by a mobile device, having a first radio and a second radio, characterized by the fact that the method comprises: using a first radio in a first connection with a first access point; determining whether to establish a second connection to a second access point using a second radio, determination based on a first set of access conditions associated with the first access point and a second set of access conditions associated with the second point access; and establishing the second connection to The second access point using the second radio based on the determination, which indicates The establishment of the second connection.
22. Method according to claim 21, characterized by the fact that the first set of access conditions comprises the location information of the mobile device.
23. “Method according to claim 21, characterized by the fact that the first set of access conditions is provided by an information provider is not the access point.
24. Method according to claim 21, characterized by the fact that the first set of access conditions is provided by an information provider, which is the access point.
25. Method according to claim 21, characterized by the fact that when using the first radio you understand the use of the first communication protocol that is different from a second communication protocol that is in use by the second radio in communication with the other point access.
26. Method according to claim 21, characterized by the fact that it also includes information on the use of recording associated with the connection to the access point.
27. Method for obtaining access to the alternative network implemented by a mobile device, having a first radio, characterized by the fact that the method comprises: identifying an available network access point; determining whether to establish a connection with the identified access point based on a first set of access conditions associated with the identified access point; and establishing a connection to the identified access point is made using the radio based on the determination, which indicates the establishment on the second connection.
28. Wireless mobile device, characterized by the fact that it comprises, a first radio, a second radio, storage, and a processor configured to perform: using a first radio in a first connection to a first access point; determining whether to establish a second connection to a second access point using a second radio, determination based on a first set of access conditions associated with the first access point and a second set of access conditions associated with the second point access; and establishing the second connection to the second access point using the second radio based on the determination, which indicates The establishment of the second connection.
& = Ss o fts ts aoo te E a = Ss PIRES: s (FIES y í se: a 1 ESSA Fa! S F FF: õ 38: sm toe E A SE <= 8x8 o NI '1434 ss: i ça s - "EE Es o so | Gm X>” [882 to 1 and 2: EO HEE: if TA "i" as [RE 1 ÉS o 1 ss [E (OE (E Es T 1 to 8a “|! 1 E 28 1 í 3-5 E 1 E to To> -. Ts3 So 1; ESSO! In, ESB ET 1 28 eg im FS 28 '- 5 | Es 188 = =! Vo Ev 1 | 2 is + SWe == - 158 | 83 11 = Il. NEL, o 22 x) 2 at. Well NT ooo & AS ss S sm ”ms É s ú õ% 3
It's Ss Ss
R & fo & ê <sz = 2 S SR << "o 8 v =: ss83i los | In Õ ES os se E ss 3 182 and PS 2 E 15 and g | <c5. = = O = 2 P <TE = a E 112 e =) .88 ss X 2nd ilag5S E 8 5% 8% xe [8 a S + 25 | s Es 3º | es O and 2 s <- a | - 2 | “z E oo too o 2 28 8 ZX 8 as à.
H EO - ss o B go of PN: 2 o g É Ê NX p = LS are:) rs E “ACTS 8 fo EE E ptARA EE E 3 Ss A 28 FA 2 |: = ê ê SEX ET" 1.5 ss Z tó s vs! EEE IS ES a 8 E so 8 23: [$ S - = if e '| 2Go 2 to SS, FS ã [2338 .. 3 8: E & 2 1 3 ã SÊ ÊÔ E o 8 É er = & &. & E o [E ão a, = i- é À 2484 2 8: Fes 21 $ É & Ss IF o E sane 8 IF É 8 o! br a. = E SS ne 1 EW ie pa 1 Ness: 5 | Hi E From ac EEE TO IE: e E Ss H q | 2 NS AE Eos Ss ES THERE at = 1 o 4 and E sads L 4 = = 2 & E 2 SA AND SA s | x EEE) 2 E = af E io SE s E EH Ss A SE PD SA = en SS FE El = E | ss d SH À: oo le Ss h A Be Ja “E bellows 1 1 & S87 ÍTTELC o = Eme 2 ni 8o ff EEE 2 S TER FS 3 Wi-o = 5> | 2 to Ui - H & 8 CO: uo af ns eae “xz AESA TEST m E [4 xo 8 8 8 3 o, 83 | lo Ês & a 3 false L 8 o 5 |> << o le cs 13 8 7% | 11 o o EF 1/3 jl: g | | 28E E & [o Sos are 3 jidf52 '] [288 2 o 2 1180 398 = 8 - 1 es.
类似技术:
公开号 | 公开日 | 专利标题
US9578674B2|2017-02-21|Mobile device radio management
US9826464B2|2017-11-21|Systems and methods for establishing wireless connections based on access conditions
US20090017789A1|2009-01-15|Point of presence on a mobile network
US10045211B2|2018-08-07|Authentication and authorization of mobile devices for usage of access points in an alternative network
US20180213078A1|2018-07-26|Application management for a mobile device
CN113228600A|2021-08-06|Method and apparatus for incentivizing participation in a fog network
TW200926037A|2009-06-16|Method of managing usage of network services
JP5461574B2|2014-04-02|Ubiquitous wireless connection using connection exchange and marketplace for exchanging wireless connection
US20170374071A1|2017-12-28|Systems and methods for controlling access to wireless services
EP3556131A1|2019-10-23|Optimized offloading of wireless devices to alternative wireless networks
Duan et al.2013|Optimal pricing for local and global WiFi markets
TW201507512A|2015-02-16|Toll path routing protocol
Chen et al.2013|SpeedGate: A smart data pricing testbed based on speed tiers
JP2012511874A|2012-05-24|Method and apparatus for joining and accessing a connection exchange
AT&T|
WO2019232540A1|2019-12-05|Optimization across mobile networks
Harishankar et al.2021|Datanet: Enabling Seamless, Metered and Trusted Internet Connectivity without Subscriptions
US20170353610A1|2017-12-07|Bandwidth-sharing, intelligent network switching system
Li et al.2013|Analyzing the Integration of WiMAX and Wi‐Fi Services: Bandwidth Sharing and Channel Collaboration
同族专利:
公开号 | 公开日
US9084179B2|2015-07-14|
WO2013078408A1|2013-05-30|
US9345059B2|2016-05-17|
EP2783535B1|2016-09-14|
US20170156113A1|2017-06-01|
US9578674B2|2017-02-21|
EP2783535A4|2015-08-12|
US20130322401A1|2013-12-05|
US20160262201A1|2016-09-08|
US20130322400A1|2013-12-05|
US20160192289A1|2016-06-30|
US9288831B2|2016-03-15|
EP3131238B1|2018-01-17|
EP2783535A1|2014-10-01|
CN108174435A|2018-06-15|
CN103959863B|2018-01-23|
CN103959863A|2014-07-30|
US20130322329A1|2013-12-05|
US9924559B2|2018-03-20|
EP3131238A1|2017-02-15|
US20150282240A1|2015-10-01|
EP3358792A1|2018-08-08|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

FI109163B|2000-02-24|2002-05-31|Nokia Corp|Method and apparatus for supporting mobility in a telecommunication system|
US7761606B2|2001-08-02|2010-07-20|Ipass Inc.|Method and system to secure a connection application for distribution to multiple end-users|
EP1257090B1|2001-05-08|2004-11-17|Lucent Technologies Inc.|Wireless LAN with dynamic frequency selection|
JP4433126B2|2001-05-17|2010-03-17|日本電気株式会社|Base station selection method, mobile station and base station|
US20030003868A1|2001-06-29|2003-01-02|Ilkka Juurikko|Method and system for short-range radio communication|
US6707425B2|2002-03-21|2004-03-16|Nokia Corporation|Method and system for aligning a point-to-multipoint access terminal|
KR100595870B1|2002-09-18|2006-07-03|주식회사 케이티|Intergrated services management apparatus and method in W-LAN|
US8116285B1|2002-09-19|2012-02-14|Hewlett-Packard Development Company, L.P.|Intelligent wireless access point selection|
KR100494289B1|2002-12-06|2005-06-13|주식회사 케이티|billing system and method in wireless internet system|
US7020438B2|2003-01-09|2006-03-28|Nokia Corporation|Selection of access point in a wireless communication system|
JP2004274310A|2003-03-07|2004-09-30|Sony Ericsson Mobilecommunications Japan Inc|Mobile terminal device|
US20040255008A1|2003-04-21|2004-12-16|International Business Machines Corporation|System for low power operation of wireless LAN|
US20050055371A1|2003-06-05|2005-03-10|Singam Sunder|Method and system to manage a network connection application|
KR100735242B1|2003-12-16|2007-07-03|삼성전자주식회사|Method for providing/notifying interworking information of mobile telecommunication network and wireless local area network and therefor system|
GB0410608D0|2004-05-12|2004-06-16|Nokia Corp|Locating mobile terminals|
US7894823B2|2004-06-07|2011-02-22|Nokia Inc.|System for enhanced capacity and quality over WLAN|
US7539163B2|2004-06-07|2009-05-26|Jeou-Kai Lin|System and method for a handoff in a multimedia mobile network|
US7505795B1|2004-07-07|2009-03-17|Advanced Micro Devices, Inc.|Power save management with customized range for user configuration and tuning value based upon recent usage|
WO2006021784A1|2004-08-25|2006-03-02|Levi Russell|Method of and system for connecting to a network via a wireless local area network|
US20060072493A1|2004-09-28|2006-04-06|Ginzburg Boris E|Roaming techniques for a communications network|
US20060166669A1|2005-01-27|2006-07-27|Holger Claussen|Brokering services between wireless device users and operators|
US20070026866A1|2005-05-27|2007-02-01|Govindarajan Krishnamurthi|Mobile node, method and computer program product for handing off from one type of network to another type of network|
US8886261B2|2005-12-06|2014-11-11|Motorola Mobility Llc|Multi-mode methods and devices utilizing battery power level for selection of the modes|
US8880126B2|2005-12-21|2014-11-04|Ntt Docomo, Inc.|Method and system for wireless LAN network detection|
US8494559B1|2005-12-30|2013-07-23|At&T Intellectual Property I, L.P.|Method and system for selecting a wireless access technology using location based information|
US9369246B2|2005-12-30|2016-06-14|Vtech Telecommunications Limited|System and method of enhancing WiFi real-time communications|
US8521544B2|2006-02-09|2013-08-27|At&T Intellectual Property I, Lp|Method to negotiate for wireless services|
WO2007096884A2|2006-02-22|2007-08-30|Elad Barkan|Wireless internet system and method|
US7933635B2|2006-03-09|2011-04-26|Lg Electronics Inc.|Adjustment of parameters based upon battery status|
US8275377B2|2006-04-20|2012-09-25|Qualcomm Incorporated|Wireless handoffs between multiple networks|
US7808960B1|2006-05-25|2010-10-05|The Hong Kong University Of Science And Technology|Wireless infrastructure and ad hoc network integration|
US7737896B1|2006-08-16|2010-06-15|Kyocera Corporation|System and method for optimized use of a dual mode wireless communication device|
US8472998B2|2006-09-05|2013-06-25|Motorola Mobility Llc|System and method for achieving WLAN communications between access point and mobile device|
US20080075051A1|2006-09-27|2008-03-27|Baris Dundar|Methods, apparatus and articles for radio frequency planning|
US20080089287A1|2006-10-12|2008-04-17|Telefonaktiebolaget Lm Ericsson |Broadcast-based communication in a radio or wireless access network to support mobility|
US8755747B2|2006-10-31|2014-06-17|Qualcomm Incorporated|Techniques to control transmit power for a shared antenna architecture|
US8583057B2|2006-10-31|2013-11-12|Palm, Inc.|Techniques to control a shared antenna architecture for multiple co-located radio modules|
EP1926283A1|2006-11-27|2008-05-28|France Télécom|Data communications|
KR20080068325A|2007-01-19|2008-07-23|삼성전자주식회사|Apparatus and method for decision handover in portable terminal|
US20150257038A1|2007-02-05|2015-09-10|Wefi, Inc.|Devices, systems, and methods for sharing network capacity|
EP2127423B1|2007-03-01|2018-05-09|Thomson Licensing|A method and apparatus for selecting an access point or relay node in a multi-hop wireless network|
US8036367B2|2007-03-19|2011-10-11|Google Inc.|Flexible communication systems and methods|
US8358638B2|2007-05-24|2013-01-22|Wefi, Inc.|Dynamically created and expanded wireless network|
US8179811B2|2007-06-08|2012-05-15|Qualcomm Incorporated|Data attachment point selection|
JP5197999B2|2007-06-18|2013-05-15|株式会社エヌ・ティ・ティ・ドコモ|Access network switching method, access network switching device and mobile device|
KR100891757B1|2007-07-26|2009-04-07|엘지노텔 주식회사|Method and apparatus for providing neighborhood ap information in a wlan system|
GB0718498D0|2007-09-21|2007-10-31|Ubinetics Vpt Ltd|Power saving|
US20090203352A1|2008-02-13|2009-08-13|Xelex Technologies Inc.|Mobile phone/device usage tracking system and method|
US7979097B2|2008-03-18|2011-07-12|Kyocera Corporation|Power management for multimode wireless communication device|
KR20090106810A|2008-04-07|2009-10-12|삼성정밀화학 주식회사|Wax-resin compatibilizer, and wax-resin dispersion comprising the compatibilizer and method for preparing the same|
CN101616463B|2008-06-27|2011-11-16|华为技术有限公司|Method, device and system for realizing pre-certification|
CN101388814B|2008-08-25|2013-03-13|中兴智能交通(无锡)有限公司|Method and system for mobile terminal data transmission|
US8228861B1|2008-09-12|2012-07-24|Nix John A|Efficient handover of media communications in heterogeneous IP networks using handover procedure rules and media handover relays|
KR101495178B1|2008-09-25|2015-02-24|엘지전자 주식회사|Mobile terminal and method for accessing wireless internet network in mobile terminal|
TW201016066A|2008-10-03|2010-04-16|Kuang Sheng Yun Ltd|Method and system for WiFi network high speed mobile voice and multimedia video data communication|
KR101535437B1|2009-01-15|2015-07-09|삼성전자주식회사|Power Saving Method of Portable Device And Portable Device supporting the same|
US20110246281A1|2009-01-21|2011-10-06|Billshrink, Inc.|System and method for providing a savings opportunity in association with a financial account|
US8635335B2|2009-01-28|2014-01-21|Headwater Partners I Llc|System and method for wireless network offloading|
US9155017B2|2009-02-03|2015-10-06|Kyocera Corporation|Access point detection for wireless networking|
US8477670B2|2009-03-06|2013-07-02|Nec Infrontia Corporation|Wireless communication method for wireless LAN system, wireless communication device and wireless terminal|
CN101600240B|2009-05-31|2011-07-20|腾讯科技(北京)有限公司|Method for switching multiple networks, instant messaging client, management server and system|
CN102026165B|2009-09-14|2014-11-05|中兴通讯股份有限公司|Method and system for identifying terminal|
US8595796B2|2009-10-12|2013-11-26|Qualcomm Incorporated|Apparatus and method for authorization for access point name usage in a specific access|
KR20110045885A|2009-10-28|2011-05-04|에스케이 텔레콤주식회사|Handover providing system and method based on mobile IP among heterogeneity network|
EP2341738B1|2009-12-29|2017-03-29|Lg Electronics Inc.|Mobile terminal with Wi-Fi module operating in a power saving mode and providing an AP function and a method for controlling said terminal|
KR101645461B1|2010-01-12|2016-08-12|삼성전자주식회사|Apparatus and method for auto conntecting wlan in portable terminal|
US9526058B2|2010-02-10|2016-12-20|Lantronix, Inc.|Smart roam system and method|
US8570993B2|2010-05-20|2013-10-29|At&T Mobility Ii Llc|Wi-Fi intelligent selection engine|
US8812001B2|2010-05-25|2014-08-19|Electronics And Telecommunications Research Institute|Dual mode terminal for supporting access in different network, network apparatus and operation method thereof|
US20110310840A1|2010-06-22|2011-12-22|Richard Howard Kennedy|Methods and apparatus to reduce network configuration changes|
US8532074B2|2010-07-29|2013-09-10|Microsoft Corporation|Energy-efficient on-the-fly Wi-Fi hotspot using mobile devices|
US9107142B2|2010-08-18|2015-08-11|Blackberry Limited|Network selection methods and apparatus with use of a master service management module and a prioritized list of multiple aggregator service profiles|
US8750188B2|2010-12-01|2014-06-10|Deutsche Telekom Ag|System support for accessing and switching among multiple wireless interfaces on mobile devices|
US8593967B2|2011-03-08|2013-11-26|Medium Access Systems Private Limited|Method and system of intelligently load balancing of Wi-Fi access point apparatus in a WLAN|
JP5692354B2|2011-03-11|2015-04-01|富士通株式会社|Wireless communication apparatus and wireless communication method|
US8977285B2|2011-04-06|2015-03-10|Blackberry Limited|Methods and apparatus for use in establishing a data session via an ad hoc wireless network for a scheduled meeting|
US8861414B2|2011-04-08|2014-10-14|The Regents Of The University Of Michigan|Reducing energy consumption in wireless devices|
US9571952B2|2011-04-22|2017-02-14|Qualcomm Incorporatd|Offloading of data to wireless local area network|
WO2012167194A2|2011-06-01|2012-12-06|Blount, Inc.|Log splitter with two handed operation features|
US9188973B2|2011-07-08|2015-11-17|Restoration Robotics, Inc.|Calibration and transformation of a camera system's coordinate system|
US8767680B2|2011-07-21|2014-07-01|Moxa Inc.|Roaming system using wireless access controller to select access point and method thereof|
US9794848B2|2011-07-25|2017-10-17|Ethertronics, Inc.|Method and system for priority-based handoff|
DE102011109501B3|2011-08-05|2013-01-31|Neoperl Gmbh|aerator|
US20160127152A1|2011-09-26|2016-05-05|Theranos, Inc.|Network connectivity methods and systems|
US9025579B2|2011-10-20|2015-05-05|Futurewei Technologies, Inc.|Wireless connection management procedure|
EP2783535B1|2011-11-25|2016-09-14|Bandwidthx Inc.|System for providing intelligent network access selection for a mobile wireless device|
US9264433B2|2012-03-27|2016-02-16|Intel Corporation|Secure and automatic connection to wireless network|
US9271254B2|2012-10-22|2016-02-23|Qualcomm Incorporated|Network directed system selection using wireless device input|
US9355420B2|2012-11-05|2016-05-31|International Business Machines Corporation|Bandwidth management|US8254915B2|2007-04-17|2012-08-28|Embarq Holdings Company, Llc|System and method for enabling subscribers of a communications carrier to access a network of other subscribers|
FI20100057A0|2010-02-12|2010-02-12|Notava Oy|A method and system for creating a virtual device for redirecting data traffic|
US9134930B2|2011-03-30|2015-09-15|Hewlett-Packard Development Company, L.P.|Delayed content production|
US9323483B2|2011-10-28|2016-04-26|Hewlett-Packard Development Company, L.P.|Location-based print notifications|
EP2783535B1|2011-11-25|2016-09-14|Bandwidthx Inc.|System for providing intelligent network access selection for a mobile wireless device|
CN104247545B|2012-01-16|2019-04-16|新加坡科技研究局|Node, access point and wireless communication system and method for controlling it|
CN103249047B|2012-02-10|2018-11-23|南京中兴新软件有限责任公司|The access authentication method and device of WLAN hot spot|
US9008045B2|2012-04-12|2015-04-14|Time Warner Cable Enterprises Llc|Handoffs between access points in a Wi-Fi environment|
US20130325662A1|2012-05-31|2013-12-05|Red Hat, Inc.|Systems and methods for providing wireless internet connection|
US20140032728A1|2012-07-30|2014-01-30|John Conor O'neil|Location-based task activation|
US8886236B2|2012-07-31|2014-11-11|Aruba Networks, Inc.|Method and system for using a minimum sensitivity threshold for receiving wireless signals|
CN102917406B|2012-08-02|2016-04-06|华为技术有限公司|Data traffic shunt method and equipment|
CN103828442A|2012-09-24|2014-05-28|华为技术有限公司|WLAN access method and device|
CN103813330A|2012-11-15|2014-05-21|中兴通讯股份有限公司|Communication terminal and system and authority management method|
KR20140067476A|2012-11-26|2014-06-05|삼성전기주식회사|Method for operating wireless network, recording medium for operating wireless network, and mobile terminal using the same|
US9531764B1|2012-11-27|2016-12-27|Amazon Technologies, Inc.|History inclusive connection management|
US9584382B2|2012-11-28|2017-02-28|At&T Intellectual Property I, L.P.|Collecting and using quality of experience information|
US9781666B2|2013-01-18|2017-10-03|Kyocera Corporation|Communication control method, base station and user terminal|
US9378437B2|2013-02-27|2016-06-28|Hewlett-Packard Development Company, L.P.|Sending print jobs using trigger distances|
US20150223059A1|2013-03-01|2015-08-06|Intel Corporation|Techniques for establishing access to a local wireless network|
US20140258511A1|2013-03-11|2014-09-11|Bluebox Security Inc.|Methods and Apparatus for Reestablishing Secure Network Communications|
US10007938B2|2013-03-13|2018-06-26|Aeris Communication, Inc.|Real-time pricedcellular service marketplace|
US9769675B2|2013-03-15|2017-09-19|Hewlett Packard Enterprise Development Lp|Cloud-based connectivity|
JP2014187654A|2013-03-25|2014-10-02|Fuji Xerox Co Ltd|Information processing system, information processing device, and program|
US9826464B2|2013-03-26|2017-11-21|Bandwidthx Inc.|Systems and methods for establishing wireless connections based on access conditions|
US9301245B2|2013-06-14|2016-03-29|Qualcomm Incorporated|Toll path routing protocol|
US9276863B2|2013-06-28|2016-03-01|Alcatel Lucent|Traffic detection function based on usage based thresholds|
EP2830366A1|2013-07-23|2015-01-28|Thomson Licensing|Method of management of a wireless interface of a device and corresponding wireless device|
US10038729B1|2013-08-15|2018-07-31|Amazon Technologies, Inc.|Cooperative network access|
JP6280921B2|2013-08-19|2018-02-14|楽天株式会社|Portable device, method for controlling portable device, recording medium, and program|
US20150063329A1|2013-08-28|2015-03-05|General Motors Llc|Selective vehicle wi-fi access|
US20150065178A1|2013-09-03|2015-03-05|Qualcomm Incorporated|Methods and apparatuses for providing positioning assistance data|
US9491678B2|2013-09-04|2016-11-08|At&T Mobility Ii Llc|Cell broadcast for smart traffic steering across radio technologies with improved radio efficiency|
CN103501501B|2013-10-09|2017-03-01|中磊电子(苏州)有限公司|Radio area network system, far control network system, wireless network detection and establishing method|
CN103491649B|2013-10-10|2016-11-02|成都达信通通讯设备有限公司|WIFI synchronizes APN network multi-channel and concurrently surfs the Net and the method for the most preferably WIFI networking|
US20150127436A1|2013-11-04|2015-05-07|David Neil MacDonald|Community wi-fi network|
US9361633B1|2013-11-11|2016-06-07|Amazon Technologies, Inc.|Determining present venue for a user device|
US10292067B2|2013-11-25|2019-05-14|At&T Intellectual Property I, L.P.|Collaborative scheduling of last hop cellular traffic|
US9143626B2|2013-11-26|2015-09-22|International Business Machines Corporation|Subsidizing wireless services in geo-fenced zones|
US9607002B2|2013-12-18|2017-03-28|Intel Corporation|File retrieval from multiple storage locations|
WO2015103322A1|2013-12-31|2015-07-09|Bandwidthx Inc.|Systems and methods for managing offload from one radio access network to another|
WO2015126296A1|2014-02-21|2015-08-27|Telefonaktiebolaget L M Ericsson |A method and nodes for selecting a capillary network gateway|
WO2015126294A1|2014-02-21|2015-08-27|Telefonaktiebolaget L M Ericsson |Method and apparatus for cgw selection|
WO2015126295A1|2014-02-21|2015-08-27|Telefonaktiebolaget L M Ericsson |A method and node for selecting a capillary network gateway|
JP5980258B2|2014-03-11|2016-08-31|キヤノン株式会社|Information processing apparatus, information processing apparatus control method, and program|
BR112016024045A2|2014-04-16|2018-05-15|Huawei Technologies Co., Ltd.|wlan wireless LAN, terminal, and server access method.|
EP2937828A1|2014-04-23|2015-10-28|Fujitsu Limited|Consumer profiling using network connectivity|
WO2015165075A1|2014-04-30|2015-11-05|Hewlett-Packard Development Company, L.P.|Wireless access point selection based on a connection plan|
US20150358046A1|2014-06-04|2015-12-10|Grandios Technologies, Llc|Radio management|
CN105307224B|2014-06-19|2019-01-01|中国移动通信集团公司|A kind of method, apparatus and terminal that terminal intelligently switches between access points|
CN104066153B|2014-06-30|2017-11-03|无锡科本信息科技有限公司|The method that application site sensor realizes mobile device and target device intelligent link|
US9900845B2|2014-09-23|2018-02-20|At&T Intellectual Property I, L.P.|Battery saving with radio control based on cellular condition data|
US10002345B2|2014-09-26|2018-06-19|At&T Intellectual Property I, L.P.|Conferencing auto agenda planner|
US9544395B2|2014-10-10|2017-01-10|At&T Intellectual Property I, L.P.|Facilitating quality of service and security via functional classification of devices in networks|
CN105704836B|2014-11-27|2019-03-01|四零四科技股份有限公司|Automatic switching control equipment identity is to provide the system and method for wireless telecommunications|
US9538441B2|2014-12-18|2017-01-03|At&T Mobility Ii Llc|System and method for offload of wireless network|
EP3241377A4|2014-12-31|2018-05-30|Bandwidthx Inc.|Systems and methods for controlling access to wireless services|
CN107113728A|2014-12-31|2017-08-29|班德韦斯克公司|System and method for optimizing mobile device radio control for Consumer's Experience|
CN105991560B|2015-02-04|2019-07-19|腾讯科技(深圳)有限公司|Audio/video communication method for network access and audio/video communication network access device|
US10171333B2|2015-02-10|2019-01-01|International Business Machines Corporation|Determining connection feasibility and selection between different connection types|
US9674756B2|2015-04-02|2017-06-06|Harman International Industries, Incorporated|Expedited handover between wireless carriers|
US9510149B2|2015-04-08|2016-11-29|Abb Technology Ag|Location estimation within a wireless mesh network utilizing wireless signal signatures|
CN104902582B|2015-04-13|2019-01-11|国网内蒙古东部电力有限公司|A kind of interim cut-in method and system of wireless network|
US9854482B2|2015-04-21|2017-12-26|International Business Machines Corporation|Controlling a delivery of voice communications over a cellular data network or a wireless network based on user's profile|
CN107852662B|2015-05-26|2021-11-05|瑞典爱立信有限公司|Reconfiguration in a wireless mesh network|
JP2017034560A|2015-08-04|2017-02-09|セイコーエプソン株式会社|Radio communication apparatus, radio communication method, and program|
US9832791B2|2015-08-04|2017-11-28|Network Performance Research Group Llc|Method and apparatus for use of simultaneous multiple channels in the dynamic frequency selection band in wireless networks|
US10104665B2|2015-08-10|2018-10-16|Network Performance Research Group Llc|Method and apparatus for providing dynamic frequency selection spectrum access in peer-to-peer wireless networks|
US9439197B1|2015-08-10|2016-09-06|Planetary Network Technologies, Inc.|Method and apparatus for directed adaptive control of dynamic channel selection in wireless networks|
US9807625B2|2015-08-10|2017-10-31|Network Performance Research Group Llc|Method and apparatus for using time shifted analysis based on gathering non-encrypted information from packets|
CN105050145B|2015-08-31|2018-12-25|宇龙计算机通信科技有限公司|Switching method and device is arranged in bandwidth|
EP3148253A1|2015-09-23|2017-03-29|Technische Universität Dresden|Method for managing available communication resource in a communication network and node for a communication network|
WO2017059064A1|2015-09-29|2017-04-06|Bandwidthx Inc.|Authentication and authorization of mobile devices for usage of access points in an alternative network|
US10368247B2|2015-11-25|2019-07-30|Network Performance Research Group Llc|Cloud DFS super master detector location systems and methods|
EP3481112B1|2016-06-30|2021-02-17|Huawei Technologies Co., Ltd.|Method and device for distributing network channel|
CN107567026B|2016-06-30|2021-01-08|上海连尚网络科技有限公司|Method and equipment for determining hot spots in same group|
JP6407212B2|2016-07-28|2018-10-17|キヤノン株式会社|Information processing apparatus, information processing apparatus control method, and program|
US11030590B2|2016-08-24|2021-06-08|Motorola Mobility Llc|Opening a data pipe for an electronic transaction|
EP3507972A1|2016-09-02|2019-07-10|Intel Corporation|Virtual private network|
US10650621B1|2016-09-13|2020-05-12|Iocurrents, Inc.|Interfacing with a vehicular controller area network|
US10187923B2|2016-09-22|2019-01-22|T-Mobile Usa, Inc.|Provisioning access points to mobile devices for emergency calls|
US10200887B2|2016-09-27|2019-02-05|GM Global Technology Operations LLC|Optimizing user experience in vehicles with multiple hotspots|
WO2018118755A1|2016-12-19|2018-06-28|Bandwidthx Inc.|Optimized offloading of wireless devices to alternative wireless networks|
US10194382B2|2016-12-27|2019-01-29|Bandwidthx Inc.|Auto-discovery of amenities|
WO2018125704A1|2016-12-27|2018-07-05|Bandwidthx Inc.|Radio management based on user intervention|
US20180184381A1|2016-12-27|2018-06-28|Bandwidthx Inc.|Radio management|
US10382986B2|2017-03-17|2019-08-13|At&T Mobility Ii Llc|Facilitating mobile device self-optimizing technology selection thresholds in a wireless communication system|
US10708823B2|2017-05-23|2020-07-07|Veniam, Inc.|Systems and methods for cooperative, dynamic, and balanced access to the infrastructure supporting the network of moving things, for example including autonomous vehicles|
US20180352397A1|2017-06-05|2018-12-06|Intel IP Corporation|Synchronizing connectivity in wireless communication networks|
US11240647B2|2017-06-09|2022-02-01|Convida Wireless, Llc|Efficient vehicular services|
US9949232B1|2017-07-28|2018-04-17|Bank Of America Corporation|Network device loss prevention using a distributed wireless network|
CN107392743B|2017-08-01|2021-04-06|安徽大学|McAfe two-way auction privacy protection method and auction method|
KR20190053710A|2017-11-10|2019-05-20|삼성전자주식회사|Electronic device and method for displaying, updating mobile network operation information|
US10609634B2|2017-12-24|2020-03-31|Cisco Technology, Inc.|Access network selection|
US11206412B2|2018-02-20|2021-12-21|Netgear, Inc.|Band steering for a low power device|
US10623994B2|2018-02-22|2020-04-14|Cisco Technology, Inc.|Flash crowd detection and responsive network management|
US10278025B1|2018-03-27|2019-04-30|Intel IP Corporation|Device clustering for enhanced location services|
CN108495075A|2018-03-30|2018-09-04|北京三体云联科技有限公司|Video communication method and device|
EP3557890B1|2018-04-16|2021-01-13|Sony Network Communications Europe B.V.|Establishing a wireless connection to a cellular network|
US10560562B1|2018-05-09|2020-02-11|Darpan Tandon|Multi-mode smartphone or mobile computing device|
USD910608S1|2018-05-09|2021-02-16|Darpan Tandon|Smartphone|
US11184223B2|2018-07-31|2021-11-23|Microsoft Technology Licensing, Llc|Implementation of compliance settings by a mobile device for compliance with a configuration scenario|
US11109308B2|2018-08-28|2021-08-31|Faraday&Future Inc.|Connected vehicle bandwidth-based network selection|
JP6878373B2|2018-09-19|2021-05-26|キヤノン株式会社|Information processing equipment, applications, control methods and programs for information processing equipment|
US10602383B1|2018-10-15|2020-03-24|Microsoft Technology Licensing Llc|Application of machine learning for building predictive models enabling smart fail over between different network media types|
US10715601B2|2018-11-26|2020-07-14|Lockheed Martin Corporation|Enhanced deployment of applications in airborne and spaceborne nodes|
KR20200074732A|2018-12-17|2020-06-25|삼성전자주식회사|Electronic device and method for controlling electronic device|
CN109862583A|2019-01-04|2019-06-07|新华三技术有限公司|A kind of method and device reporting exception information|
WO2020190864A1|2019-03-18|2020-09-24|Telcom Ventures, Llc|Facilitating use of multi-operator, multi-band and unlicensed spectrum for a user equipment using out of band control channels|
US11109309B2|2019-03-29|2021-08-31|Blackberry Limited|Systems and methods for establishing short-range communication links between asset tracking devices|
CN110213731B|2019-04-29|2020-07-03|中国科学院计算技术研究所|Group user network selection method and system based on intelligent pricing|
CN110461031B|2019-08-26|2021-04-13|维沃移动通信有限公司|Terminal device control method and terminal device|
US11140615B2|2019-09-05|2021-10-05|International Business Machines Corporation|Automatically joining a Wi-Fi network with a mobile device based on previous device behavior|
US11228957B2|2019-09-13|2022-01-18|Microsoft Technology Licensing, Llc|Seamless roaming of real time media sessions|
CN110675414B|2019-09-30|2021-08-17|广州极飞科技股份有限公司|Land parcel segmentation method and device, electronic equipment and storage medium|
US11113753B1|2019-12-02|2021-09-07|Inmar Brand Solutions, Inc.|Network access system for a shopping application and related methods|
WO2021126072A1|2019-12-19|2021-06-24|Rutledge Omni Services Pte. Ltd.|System, base station and wireless device for location tracking|
US11165605B2|2020-03-09|2021-11-02|International Business Machines Corporation|Personalized private roaming service set identifiers|
CN111901821B|2020-08-12|2021-10-22|深圳市友恺通信技术有限公司|Network state monitoring management system based on big data|
US20220060864A1|2020-08-20|2022-02-24|Rooster, LLC|Asset Tracking Systems and Methods|
USD941865S1|2021-03-04|2022-01-25|Rooster, LLC|Display screen or portion thereof with graphical user interface|
法律状态:
2020-11-10| B11A| Dismissal acc. art.33 of ipl - examination not requested within 36 months of filing|
2021-01-26| B11Y| Definitive dismissal - extension of time limit for request of examination expired [chapter 11.1.1 patent gazette]|
2021-12-07| B350| Update of information on the portal [chapter 15.35 patent gazette]|
优先权:
申请号 | 申请日 | 专利标题
US201161563735P| true| 2011-11-25|2011-11-25|
US61/563,735|2011-11-25|
US201261618318P| true| 2012-03-30|2012-03-30|
US61/618,318|2012-03-30|
US201261671583P| true| 2012-07-13|2012-07-13|
US61/671,583|2012-07-13|
PCT/US2012/066389|WO2013078408A1|2011-11-25|2012-11-21|System for providing intelligent network access selection for a mobile wireless device|
[返回顶部]