US20080043689A1 - System and method for location based policy management - Google Patents
System and method for location based policy management Download PDFInfo
- Publication number
- US20080043689A1 US20080043689A1 US11/853,247 US85324707A US2008043689A1 US 20080043689 A1 US20080043689 A1 US 20080043689A1 US 85324707 A US85324707 A US 85324707A US 2008043689 A1 US2008043689 A1 US 2008043689A1
- Authority
- US
- United States
- Prior art keywords
- wireless
- policy
- wireless device
- network
- boundary area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/023—Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
- H04W12/64—Location-dependent; Proximity-dependent using geofenced areas
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0226—Traffic management, e.g. flow control or congestion control based on location or mobility
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/18—Service support devices; Network management devices
Definitions
- This disclosure in general, relates to systems and methods for location based policy management.
- Short-range wireless data networks have become commonplace, being found in homes, coffee shops, and places of business.
- Short-range wireless standards such as 802.11x, and to some extent Bluetooth, provide network users with mobility and easy network access.
- this ease of wireless network access poses problems to network administrators including securing network traffic and preventing unauthorized network access.
- Wi-Fi protected access For example, provides services for wireless devices that include security layers, such as wireless transport layer security (WTLS), that are designed to provide privacy, data integrity and authentication between communicating applications.
- WEP is an algorithm used to protect wireless communications from eavesdropping through data encryption. WEP relies upon a key that is shared between a mobile station and an access point. The key is used to encrypt packets before they are transmitted, and an integrity check is used to verify that the packets are not modified in transit.
- WPA is a security enhancement for Wi-Fi networks that defines the use of the advance encryption standard (AES) as an additional replacement for WEP encryption.
- AES advance encryption standard
- wireless networks tend to extend beyond traditional physical boundaries, allowing users outside the boundaries to gain unauthorized access to networks. As such, improved systems and methods for managing access to short-range wireless networks would be desirable.
- FIGS. 1, 2 , 3 and 4 are general diagrams that depict an exemplary short-range wireless network.
- FIG. 5 is a flow diagram that illustrates an exemplary method for defining a wireless boundary region.
- FIGS. 6 and 7 are general diagrams that depict exemplary computer systems for providing a short-range wireless network.
- FIG. 8 is a block diagram depicting an exemplary policy server.
- FIG. 9 is a block diagram depicting an exemplary wireless device.
- FIGS. 10 and 11 are flow diagrams illustrating exemplary methods for controlling network traffic.
- FIGS. 12 and 13 are flow diagrams illustrating exemplary methods for providing a feature policy.
- a policy server in a particular embodiment, includes a network device interface adapted to communicate with a set of wireless access points via a short range wireless network. Each of the wireless access points has a coverage area.
- the policy server also includes a processor and a memory accessible to the processor.
- the memory includes instructions executable by the processor to determine whether at least one wireless device is located within a boundary area, to apply a first policy when the at least one wireless device is located within the boundary area, and to apply a second policy when the at least one wireless device is located outside of the boundary area.
- the boundary area covers an area that is different from the coverage area of any one wireless access point of the set of wireless access points.
- a method in another particular embodiment, includes receiving location information related to a wireless device from at least one access point of a set of access points providing a short range wireless network and determining a location of the wireless device relative to a boundary area defined within a coverage area of the short range wireless network.
- the boundary area defines a region that is not coextensive with the coverage area.
- the method also includes selectively associating at least one policy with the wireless device based on the determined location.
- a network device in yet another particular embodiment, includes an interface adapted to communicate with a plurality of wireless access points that provide a wireless coverage area and a a network interface adapted to communicate with a network.
- the network device also includes logic adapted to communicate with the interface and the network interface. The logic determines a location of a wireless device relative to a boundary area that is not coextensive with the wireless coverage area. The logic enforces at least one location-based policy with respect to the wireless device based on the determined location.
- the disclosure is directed to a method of controlling network traffic including providing boundary data defining a boundary zone within a short-range wireless network coverage area, determining whether a wireless enabled device is located within the boundary zone, and controlling network traffic received from the wireless enabled device when the wireless enabled device is located outside the boundary zone.
- the disclosure is directed to a policy server including a processor, communication circuitry, and memory.
- the communication circuitry is accessible to the processor and is configured to connect to a set of wireless network access points.
- the set of wireless access points provide a short-range wireless network coverage area.
- the memory is accessible to the processor and includes boundary data and computer-implemented instructions operable by the processor to determine whether a wireless enabled device is located within a boundary zone within the coverage area based on data received from the set of wireless network access points.
- the boundary zone is defined by the boundary data.
- the disclosure is directed to a communications device including long-range wireless communication circuitry configured to access a long-range wireless network, short-range wireless communication circuitry configured to access a short-range wireless network, configurable feature circuitry, and a feature policy driver.
- the feature policy driver is programmed to receive a feature policy via the short-range wireless communication circuitry and is programmed to configure the feature circuitry based on the feature policy.
- the disclosure is directed to a method for managing feature functionality of a wireless enabled device.
- the method includes providing boundary data defining a boundary zone within a short-range wireless network coverage area, determining whether a wireless enabled device is located within the boundary zone, and determining a feature policy to be applied to the wireless enabled device based on determining whether the wireless enabled device is located within the boundary zone.
- the disclosure is directed to a system including a set of access points and a policy server.
- the set of access points establish a coverage area for a short-range wireless network and provide data to the policy server regarding wireless devices within the coverage area.
- the policy server determines the location of the wireless devices and whether the wireless devices are located within a boundary zone. Based on the location of the wireless device or its location within or outside of the boundary zone, a policy, such as a network traffic policy or a feature policy, may be applied to the wireless devices or network traffic transmitted by the network device.
- network traffic policies may define network access and network access parameters based on wireless enabled device location.
- Feature policies may manipulate device features and feature availability based on wireless enabled device location.
- FIG. 1 illustrates an exemplary short-range wireless network.
- the exemplary short-range wireless network 100 includes a set of access points 102 that each provide portions 104 of a coverage area.
- the coverage area portions 104 may extend beyond traditional physical boundaries or desired access areas.
- the coverage area portions 104 extend beyond a physical boundary 106 , such as a building, a room, an office space, a residence, or a shop location.
- the boundaries or desired access areas 106 may include conceptual regions such as patios, balconies, reception areas, gardens, and parks.
- the nature of the short-range wireless network is such that individuals having wireless enabled devices located within the portions 104 of the short-range wireless network coverage area may receive signals from one or more of the access points 102 .
- An individual within a preferred access area such as a user 108 , may receive data emitted by the access points 102 .
- a user located outside the preferred access area such as user 110 , may also receive data transmitted from the access points 102 .
- the access points 102 may provide a short-range. wireless network using standards and protocols, such as Wi-Fi, Wi-Max, Institute of Electrical and Electronics Engineers (IEEE) 802.11x, IEEE 802.15, IEEE 802.16, and Bluetooth.
- a short-range wireless network may, for example, have an effective coverage area portion provided by an access point, wherein the effective coverage area does not exceed 1000 feet in radius, such as not greater than 200 feet, or not greater than about 50 feet in radius.
- the short-range wireless network may, for example, provide wireless data network access in proximity to the access points, such as in and around a building, room, residence, office space, shop, or preferred access area.
- Wireless devices accessing the short-range wireless network may include wireless enabled computational devices, such as portable computers, printers, handheld computational devices, portable digital assistants (PDAs), wireless data network enabled cellular telephones, and other networkable devices.
- a short-range wireless network is not a cellular or pager based network and is an Internet protocol (IP) based wireless data network.
- IP Internet protocol
- long-range wireless networks generally provide wireless networks having a radius greater than about 1000 feet.
- long-range wireless networks include pager networks and cellular telephone networks, such as time division multiple access (TDMA), code division multiple access (CDMA), and global system for mobile communication (GSM) networks.
- TDMA time division multiple access
- CDMA code division multiple access
- GSM global system for mobile communication
- FIG. 2 depicts an exemplary short-range wireless network 200 that includes a set of wireless network access points 202 that each provide portions 204 of a wireless network coverage area. Users having wireless enabled devices such as users 208 and 210 may be located within the coverage area portions 204 and, as such, may receive network transmissions transmitted from access points 202 .
- a boundary 212 that defines a boundary zone 214 may be established for policy management, such as network traffic policies and feature policies.
- a server or other network equipment may include boundary data that defines the boundary zone 214 and the boundaries 212 .
- the boundary zone 214 corresponds closely with a preferred access area such as a room or building 206 .
- the location of a wireless enabled device may be determined using data from the access points.
- a triangulation method uses at least three access points. For example, location may be determined by evaluating timing data associated with a signal reaching several access points.
- Network equipment such as a server or router device may include instructions for determining location based on timing data provided by the access points.
- the triangulation method may use relative power levels of wireless communications received either at the wireless device or at the access points. The network equipment may determine the location relative to the access points based on these power measurements.
- methods may be employed such as power measurement methods to determine location using one or two access points.
- the network equipment may use data from the access points 202 to determine whether wireless devices, such as those co-located with users 208 and 210 are located within the boundary zone 214 .
- the network equipment utilizes triangulation methods based on at least three access points 202 to determine the location of a user and whether the user is located within the boundary 212 or the boundary zone 214 . Using this determination, the network equipment may determine and implement policies associated with the location of the mobile device, the device's traffic, and/or device features. For example, a user having a wireless device, such as user 208 , located within the boundary zone 214 may be provided with or associated with a policy different than a user located outside the boundary zone 214 , such as user 210 .
- user 208 located within the boundary zone 214 may be provided with differing security and network traffic controls than user 210 located outside the boundary zone.
- the user 208 located within the boundary zone 214 may be provided with one feature policy while a user device 210 located outside of the boundary zone 214 may be provided with a second feature policy.
- FIG. 2 depicts a single boundary zone 214
- alternative systems may include multiple boundary zones. Boundary data may be used to establish more than one boundary zone.
- systems having multiple boundary zones may apply different policies to wireless devices located within different boundary zones or different policies to the same wireless enabled device as it traverses the multiple boundary zones. In this manner, the system may implement multiple policy areas or a policy mapping.
- FIG. 3 illustrates an exemplary short-range wireless network 300 that implements location based network management.
- the short-range wireless network 300 may include wireless access points 302 that each provide a portion 304 of a coverage area.
- a boundary 312 may define a boundary zone 314 that represents a preferred access area.
- the preferred access area and boundary zone 314 are located within a physical structure 306 .
- a preferred access region may be located within a building, a room, a residence, an office space, a shop or a patio region.
- wireless enabled devices located within the boundary zone 314 may be provided with network access.
- the set of access points 302 may provide data to network equipment, such as a server or router that determines the location of the user and determines whether the user is within the boundary zone 314 .
- Network packets provided to and received from the wireless device associated with the user 308 may be transmitted across the wireless network and may be given access to external wired networks.
- wireless enabled devices located outside of the boundary zone 314 such as devices co-located with user 310 , may be denied access to the network.
- network equipment may determine the location of the user 310 based on data from a set of access points 302 .
- data packets 316 transmitted from the wireless device 310 located outside of the boundary zone 314 may be dropped, discarded, sent to a holding place or trash 318 , or treated with policies and algorithms differing from those applied to a wireless device located within the boundary zone 314 .
- FIG. 4 illustrates another exemplary short-range wireless network 400 that includes a set of wireless access points 402 that each provide portions 404 of a wireless network coverage area.
- a boundary and a boundary zone may be established using a set of locations within a coverage area. These locations may be used to establish the boundary and boundary zones, such that they conform closely to a preferred access area or region.
- the user 406 having a wireless enabled calibration device, may provide boundary data to network equipment by calibrating at various points along a boundary path 408 .
- the boundary path 408 closely conforms to the physical boundary of a room or building.
- the calibration device may provide a set of points from which a boundary may be extrapolated. For example, two boundary points may be used to create a boundary line or a set of boundary measurements, such as power measurements may be used to create a statistical boundary zone or area.
- boundary data and locations may be determined by triangulation between at least three access points.
- a set of triangulated boundary points may be compared to locations of devices in the coverage area to determine whether the devices are located within a boundary zone. Using this determination, differing network access policies and feature policies may be applied to mobile wireless enabled device.
- FIG. 5 depicts an exemplary method for providing a boundary zone.
- a set of boundary locations is established.
- a wireless calibration device may communicate with network equipment to establish a set of locations along a boundary.
- This set of locations may be converted to boundary data that defines a boundary zone.
- the boundary zone is determined, as shown at step 504 .
- FIG. 6 depicts an exemplary system 600 for establishing a short-range wireless network.
- a device 602 such as a wireless hand-held electronic device, a wireless enabled laptop or a short-range wireless enabled cell phone, may interact with access points 604 when located within the coverage area of the short-range wireless network.
- the access points 604 collect data associated with the location of the wireless device 602 and transfer that data via a router or other network equipment 606 to a policy server 608 .
- the access points 604 may record a time that a signal was received. This signal arrival time may be transferred to the policy server 608 and the policy server 608 may determine the location of the wireless device within a coverage area based on the reported signal arrival times from each access point 604 .
- the policy server 608 compares the location with boundary zone data to determine whether the wireless device 602 is located within a boundary zone.
- the policy server 608 implements and associates policies with the wireless device 602 based on its location relative to a boundary zone.
- the policy server may implement network traffic controls based on the location of the wireless device 602 .
- the policy server 608 manipulates network equipment, such as network equipment 606 , to control network traffic received from the wireless device 602 .
- network traffic received from the wireless device 602 when the wireless device 602 is located within a boundary zone is permitted to pass to external networks.
- network packets transmitted from the wireless device 602 when the wireless is outside of a boundary zone are dropped or discarded.
- the policy server 608 may implement additional security protocols for devices accessing the network based on their location relative to the boundary zone.
- a policy server may implement a network that uses different encryption protocols or different security keys based on the location of the wireless device.
- the policy server 608 may interact with the wireless device 602 and control its features and feature activation based on the location within the coverage area. For example, if wireless device 602 is a short-range wireless enabled cellular telephone, the policy server 608 may interact with the cellular telephone to manipulate features located on the cellular telephone based on the phones location. For example, the policy server may manipulate ring tones, ring volume and vibration modes on a cellular telephone based on the cellular telephone's location. In another exemplary embodiment, the policy server manipulates or deactivates camera features on a camera enabled cellular telephone based on its location within the coverage area. Additional exemplary features and feature policies are described below.
- FIG. 7 depicts an alternate embodiment of a system where a policy server is implemented within network equipment.
- the system 700 includes a set of access points 704 connected to network equipment 706 .
- the access points 704 interact with the wireless device 702 to gather data that may be used in determining the wireless device location.
- the network equipment 706 uses this data to determine the location of the wireless device.
- the network equipment may compare the location of the wireless device to boundary zone data to determine the location of the device relative to the boundary zone.
- the network equipment may implement policies, such as network traffic controls and feature policies, based on the relative location of the device 702 to a boundary zone.
- FIG. 8 depicts an exemplary policy server 800 .
- the policy server 800 may be a separate computational system or may be implemented within other data network equipment.
- the policy server includes processors 802 , network and device interfaces 804 , and storage 806 , such as memory.
- the storage or memory 806 includes boundary data 808 and programs and instructions 812 , and may include policy data and/or algorithms 810 .
- the network and device interfaces 804 interact with access points and network equipment.
- the network and device interfaces 804 include interfaces to a wired network and interfaces to access points that implement a wireless short-range wireless network. Through this interaction with the access points, data associated with the location of a wireless device are transferred to the policy server 800 .
- Programs and instructions 812 are operable by the processors 802 to determine the location of the wireless device within the short-range wireless network coverage area based on the data received from the access points.
- the programs and instructions 812 may include location determination logic.
- the program and instructions 812 may also include software instructions for comparing the location of the wireless device to boundary data 808 . From this comparison, the system determines whether particular wireless devices are located within or outside of the boundary zone.
- the programs and instructions 812 may further include software instructions for implementing policies, such as network traffic controls and feature policies, based on the location of the wireless device.
- software instructions 812 operable by the processors 802 , may be configured to access policy data and algorithms 810 to determine selected policies to implement based on the relative location of the wireless device to a boundary zone.
- the system 800 may implement network traffic controls based on the location of the wireless device.
- the system 800 may implement feature policy controls based on the location of the wireless device.
- the wireless device may be implemented as a cellular telephone or portable hand-held device with cellular telephone functionality.
- the wireless device may be configured to access both a long-range network, such as a pager or cellular network, and a short-range network.
- FIG. 9 depicts an exemplary device that includes both long distance communication circuitry 902 and short-range wireless communication circuitry 904 .
- the long-range communication circuitry 902 may be implemented as a cellular telephone transceiver.
- the short-range wireless communication circuitry 904 may, for example, interact with a short-range wireless network.
- the short-range wireless network includes networks utilizing protocols and standards, such as IEEE 802.11x, IEEE 802.15, IEEE 802.16, Bluetooth, Wi-Fi, and Wi-Max.
- the device 900 includes feature devices and circuitry 906 and a feature policy driver 908 .
- the feature devices and circuitry 906 may include circuitry that enables inbound calling, outbound calling, ringer volume levels, text messaging, voice alert messaging, camera features, web access features, application features, such as JAVA based application, games, voice-over-IP (VoIP).
- the feature policy driver 908 interacts with the feature devices and circuitry 906 to activate, enable, disable, deactivate or manipulate the parameters or policies associated with those devices and circuitry 906 .
- the feature policy driver 908 may deactivate a camera capability or web feature when a device is located within a boundary zone.
- the features policy driver 908 may activate or deactivate application environments such as JAVA application environments based on a location of the device relative to boundary zones.
- the feature policy driver 908 may initiate downloading of applications.
- short-range wireless communications circuitry 904 when the device 900 enters a coverage area of a short-range wireless network, short-range wireless communications circuitry 904 interacts with access points to establish a location of the wireless device 900 .
- a policy server associated with the short-range wireless network determines a feature policy based upon the location of the wireless device within the coverage area relative to boundary zones or a policy mapping.
- the policy server transmits a feature policy to the device via the short-range wireless network.
- the feature policy driver 908 implements feature policies that manipulate the feature devices and circuitry 906 .
- the features policy server may transmit a feature policy that disables or deactivates camera features within camera enabled cell phones.
- a school may implement a policy that disables game features and JAVA-based applications within classrooms.
- the school may establish a short-range wireless network with boundary zones associated with classroom locations.
- wireless enabled devices including a feature policy driver are located within the classroom boundary zones, features such as games, JAVA applications, cameras, and ringer volume may be manipulated, disabled or shut off.
- an establishment may establish a boundary zone closely associated with restrooms and locker rooms. In such boundary zones, features such as cameras may be disabled.
- movie theaters may activate vibration or silent modes within theaters by applying feature policies to features policy enabled devices.
- a policy server may communicate with feature policy enabled devices utilizing voice alert messages and text alert messages.
- the policy server may provide a text alert message indicating that the device is entering a restricted zone or that a certain feature policy will be enacted.
- a similar message may be provided by a voice alert.
- features such as voice over IP capabilities, may be enabled or disabled based on locations within the coverage area relative to the boundary zone.
- FIG. 10 depicts an exemplary method for controlling network traffic.
- the method includes providing boundary data, as shown at step 1002 .
- the boundary data may include a set of boundary locations that are used to establish a boundary zone or region.
- the system determines the location of the wireless device, as shown at step 1004 .
- the system may use a time-based triangulation technique utilizing at least three wireless access points.
- the system may use a power-based technique for determining wireless device location. Determining the location of the wireless device may further include comparing a location to the boundary data to determine whether the location is within a boundary zone.
- the system may control network traffic, as shown at step 1006 . For example, the system may discard packets received from devices located outside of the boundary zone.
- FIG. 11 depicts a method for controlling the network traffic.
- the method 1100 includes receiving a packet from a wireless device, as shown at step 1102 .
- a determination is made as to whether the device is within the boundary zone or region, as shown at step 1104 .
- the system may periodically determine the location of the wireless device relative to the boundary zone.
- the system may, for example, set a flag that indicates whether the device is in or out of the boundary zone. This flag may be checked to determine whether a packet received from the device should be forwarded or discarded.
- the packet is forwarded, as shown at step 1108 . If the device is not within the boundary zone, the packet is dropped or discarded, as shown at step 1106 .
- FIG. 12 depicts an exemplary method for controlling features policies.
- Boundary data is provided, as shown at step 1202 .
- the location of the wireless device is determined, as shown at step 1204 .
- the system may utilize a triangulation technique or a power-based technique to determine the location of the device. Determining the location of the device may further include comparing the location to the boundary data to determine the location of the device relative to a boundary zone. Based on the location of the device relative to the boundary zone, the system determines a feature policy, as shown at step 1206 .
- one feature policy may apply to a device when it is located within a boundary zone and a second feature policy may apply to the device when it is located outside of the boundary zone.
- the system provides the location based feature policy to the wireless device, as shown at step 1208 .
- a device enabled to communicate via the short-range wireless network and including a feature policy driver may receive the feature policy, as shown at step 1302 in FIG. 13 .
- the feature policy may, for example, deactivate features, such as cameras.
- the feature policy driver on the device may enact the feature policy, as shown at step 1304 .
- the feature policy driver may deactivate camera capabilities within the cellular telephone.
- a boundary zone may be determined using long-range networks and policies and features applied based on location within the long-range network. For example, location may be determined by GPS or cellular triangulation and policies applied to devices based on a policy mapping within the cellular network. Policies, such as the feature policy or network policy, may be implemented on a long-range network. In addition, IP-based communications protocols may be implemented that extend beyond the typical range of short-range wireless networks. In one exemplary embodiment a Wi-Max or IEEE 802.16 network that has a long-range coverage area may be used to implement boundary zones.
Abstract
In a particular embodiment, a policy server is disclosed that includes a network device interface adapted to communicate with a set of wireless access points via a short range wireless network. Each of the wireless access points has a coverage area. The policy server also includes a processor and a memory accessible to the processor. The memory includes instructions executable by the processor to determine whether at least one wireless device is located within a boundary area, to apply a first policy when the at least one wireless device is located within the boundary area, and to apply a second policy when the at least one wireless device is located outside of the boundary area. The boundary area covers an area that is different from the coverage area of any one wireless access point.
Description
- This application is a Continuation Patent Application of and claims priority from U.S. patent application Ser. No. 10/890,397, filed on Jul. 13, 2004, entitled “System and method for location based policy management,” which is incorporated herein by reference in its entirety.
- This disclosure, in general, relates to systems and methods for location based policy management.
- Short-range wireless data networks have become commonplace, being found in homes, coffee shops, and places of business. Short-range wireless standards, such as 802.11x, and to some extent Bluetooth, provide network users with mobility and easy network access. However, this ease of wireless network access poses problems to network administrators including securing network traffic and preventing unauthorized network access.
- Manufacturers of short-range wireless equipment have attempted to address the security issues posed by intrusive and unauthorized traffic through protocols, such as wireless application protocol (WAP), and encryption mechanisms such as wired equivalent privacy (WEP) and Wi-Fi protected access (WPA). The WAP protocol, for example, provides services for wireless devices that include security layers, such as wireless transport layer security (WTLS), that are designed to provide privacy, data integrity and authentication between communicating applications. WEP is an algorithm used to protect wireless communications from eavesdropping through data encryption. WEP relies upon a key that is shared between a mobile station and an access point. The key is used to encrypt packets before they are transmitted, and an integrity check is used to verify that the packets are not modified in transit. WPA is a security enhancement for Wi-Fi networks that defines the use of the advance encryption standard (AES) as an additional replacement for WEP encryption.
- However, even with these security methods and mechanisms, wireless networks tend to extend beyond traditional physical boundaries, allowing users outside the boundaries to gain unauthorized access to networks. As such, improved systems and methods for managing access to short-range wireless networks would be desirable.
-
FIGS. 1, 2 , 3 and 4 are general diagrams that depict an exemplary short-range wireless network. -
FIG. 5 is a flow diagram that illustrates an exemplary method for defining a wireless boundary region. -
FIGS. 6 and 7 are general diagrams that depict exemplary computer systems for providing a short-range wireless network. -
FIG. 8 is a block diagram depicting an exemplary policy server. -
FIG. 9 is a block diagram depicting an exemplary wireless device. -
FIGS. 10 and 11 are flow diagrams illustrating exemplary methods for controlling network traffic. -
FIGS. 12 and 13 are flow diagrams illustrating exemplary methods for providing a feature policy. - In a particular embodiment, a policy server is disclosed that includes a network device interface adapted to communicate with a set of wireless access points via a short range wireless network. Each of the wireless access points has a coverage area. The policy server also includes a processor and a memory accessible to the processor. The memory includes instructions executable by the processor to determine whether at least one wireless device is located within a boundary area, to apply a first policy when the at least one wireless device is located within the boundary area, and to apply a second policy when the at least one wireless device is located outside of the boundary area. The boundary area covers an area that is different from the coverage area of any one wireless access point of the set of wireless access points.
- In another particular embodiment, a method is disclosed that includes receiving location information related to a wireless device from at least one access point of a set of access points providing a short range wireless network and determining a location of the wireless device relative to a boundary area defined within a coverage area of the short range wireless network. The boundary area defines a region that is not coextensive with the coverage area. The method also includes selectively associating at least one policy with the wireless device based on the determined location.
- In yet another particular embodiment, a network device is disclosed that includes an interface adapted to communicate with a plurality of wireless access points that provide a wireless coverage area and a a network interface adapted to communicate with a network. The network device also includes logic adapted to communicate with the interface and the network interface. The logic determines a location of a wireless device relative to a boundary area that is not coextensive with the wireless coverage area. The logic enforces at least one location-based policy with respect to the wireless device based on the determined location.
- In a particular embodiment, the disclosure is directed to a method of controlling network traffic including providing boundary data defining a boundary zone within a short-range wireless network coverage area, determining whether a wireless enabled device is located within the boundary zone, and controlling network traffic received from the wireless enabled device when the wireless enabled device is located outside the boundary zone.
- In another embodiment, the disclosure is directed to a policy server including a processor, communication circuitry, and memory. The communication circuitry is accessible to the processor and is configured to connect to a set of wireless network access points. The set of wireless access points provide a short-range wireless network coverage area. The memory is accessible to the processor and includes boundary data and computer-implemented instructions operable by the processor to determine whether a wireless enabled device is located within a boundary zone within the coverage area based on data received from the set of wireless network access points. The boundary zone is defined by the boundary data.
- In a further embodiment, the disclosure is directed to a communications device including long-range wireless communication circuitry configured to access a long-range wireless network, short-range wireless communication circuitry configured to access a short-range wireless network, configurable feature circuitry, and a feature policy driver. The feature policy driver is programmed to receive a feature policy via the short-range wireless communication circuitry and is programmed to configure the feature circuitry based on the feature policy.
- In another embodiment, the disclosure is directed to a method for managing feature functionality of a wireless enabled device. The method includes providing boundary data defining a boundary zone within a short-range wireless network coverage area, determining whether a wireless enabled device is located within the boundary zone, and determining a feature policy to be applied to the wireless enabled device based on determining whether the wireless enabled device is located within the boundary zone.
- In a particular embodiment, the disclosure is directed to a system including a set of access points and a policy server. The set of access points establish a coverage area for a short-range wireless network and provide data to the policy server regarding wireless devices within the coverage area. The policy server determines the location of the wireless devices and whether the wireless devices are located within a boundary zone. Based on the location of the wireless device or its location within or outside of the boundary zone, a policy, such as a network traffic policy or a feature policy, may be applied to the wireless devices or network traffic transmitted by the network device. For example, network traffic policies may define network access and network access parameters based on wireless enabled device location. Feature policies may manipulate device features and feature availability based on wireless enabled device location.
-
FIG. 1 illustrates an exemplary short-range wireless network. The exemplary short-rangewireless network 100 includes a set ofaccess points 102 that each provideportions 104 of a coverage area. Typically, thecoverage area portions 104 may extend beyond traditional physical boundaries or desired access areas. In this exemplary embodiment, thecoverage area portions 104 extend beyond aphysical boundary 106, such as a building, a room, an office space, a residence, or a shop location. In other examples, the boundaries or desiredaccess areas 106 may include conceptual regions such as patios, balconies, reception areas, gardens, and parks. - The nature of the short-range wireless network is such that individuals having wireless enabled devices located within the
portions 104 of the short-range wireless network coverage area may receive signals from one or more of theaccess points 102. An individual within a preferred access area, such as auser 108, may receive data emitted by theaccess points 102. In addition, a user located outside the preferred access area, such asuser 110, may also receive data transmitted from theaccess points 102. - In exemplary embodiments, the
access points 102 may provide a short-range. wireless network using standards and protocols, such as Wi-Fi, Wi-Max, Institute of Electrical and Electronics Engineers (IEEE) 802.11x, IEEE 802.15, IEEE 802.16, and Bluetooth. A short-range wireless network may, for example, have an effective coverage area portion provided by an access point, wherein the effective coverage area does not exceed 1000 feet in radius, such as not greater than 200 feet, or not greater than about 50 feet in radius. The short-range wireless network may, for example, provide wireless data network access in proximity to the access points, such as in and around a building, room, residence, office space, shop, or preferred access area. Wireless devices accessing the short-range wireless network may include wireless enabled computational devices, such as portable computers, printers, handheld computational devices, portable digital assistants (PDAs), wireless data network enabled cellular telephones, and other networkable devices. In general, a short-range wireless network is not a cellular or pager based network and is an Internet protocol (IP) based wireless data network. In contrast, long-range wireless networks generally provide wireless networks having a radius greater than about 1000 feet. For example, long-range wireless networks include pager networks and cellular telephone networks, such as time division multiple access (TDMA), code division multiple access (CDMA), and global system for mobile communication (GSM) networks. -
FIG. 2 depicts an exemplary short-range wireless network 200 that includes a set of wirelessnetwork access points 202 that each provideportions 204 of a wireless network coverage area. Users having wireless enabled devices such asusers coverage area portions 204 and, as such, may receive network transmissions transmitted from access points 202. Aboundary 212 that defines aboundary zone 214 may be established for policy management, such as network traffic policies and feature policies. For example, a server or other network equipment may include boundary data that defines theboundary zone 214 and theboundaries 212. In this exemplary embodiment theboundary zone 214 corresponds closely with a preferred access area such as a room orbuilding 206. - The location of a wireless enabled device may be determined using data from the access points. In one exemplary embodiment, a triangulation method uses at least three access points. For example, location may be determined by evaluating timing data associated with a signal reaching several access points. Network equipment such as a server or router device may include instructions for determining location based on timing data provided by the access points. In another exemplary embodiment, the triangulation method may use relative power levels of wireless communications received either at the wireless device or at the access points. The network equipment may determine the location relative to the access points based on these power measurements. In alternative embodiments, methods may be employed such as power measurement methods to determine location using one or two access points.
- The network equipment may use data from the
access points 202 to determine whether wireless devices, such as those co-located withusers boundary zone 214. In one exemplary embodiment, the network equipment utilizes triangulation methods based on at least threeaccess points 202 to determine the location of a user and whether the user is located within theboundary 212 or theboundary zone 214. Using this determination, the network equipment may determine and implement policies associated with the location of the mobile device, the device's traffic, and/or device features. For example, a user having a wireless device, such asuser 208, located within theboundary zone 214 may be provided with or associated with a policy different than a user located outside theboundary zone 214, such asuser 210. For example,user 208 located within theboundary zone 214 may be provided with differing security and network traffic controls thanuser 210 located outside the boundary zone. In another exemplary embodiment theuser 208 located within theboundary zone 214 may be provided with one feature policy while auser device 210 located outside of theboundary zone 214 may be provided with a second feature policy. - While
FIG. 2 depicts asingle boundary zone 214, alternative systems may include multiple boundary zones. Boundary data may be used to establish more than one boundary zone. In addition, systems having multiple boundary zones may apply different policies to wireless devices located within different boundary zones or different policies to the same wireless enabled device as it traverses the multiple boundary zones. In this manner, the system may implement multiple policy areas or a policy mapping. - In one exemplary embodiment users located outside of the preferred access zone as defined by the boundary zone may be denied network access.
FIG. 3 illustrates an exemplary short-range wireless network 300 that implements location based network management. The short-range wireless network 300 may includewireless access points 302 that each provide aportion 304 of a coverage area. Within the coverage area, aboundary 312 may define aboundary zone 314 that represents a preferred access area. In this exemplary embodiment, the preferred access area andboundary zone 314 are located within aphysical structure 306. For example, a preferred access region may be located within a building, a room, a residence, an office space, a shop or a patio region. In this exemplary embodiment, wireless enabled devices located within theboundary zone 314, such as devices co-located withuser 308 may be provided with network access. For example, the set ofaccess points 302 may provide data to network equipment, such as a server or router that determines the location of the user and determines whether the user is within theboundary zone 314. Network packets provided to and received from the wireless device associated with theuser 308 may be transmitted across the wireless network and may be given access to external wired networks. In contrast, wireless enabled devices located outside of theboundary zone 314, such as devices co-located withuser 310, may be denied access to the network. For example, network equipment may determine the location of theuser 310 based on data from a set of access points 302. Using this location determination,data packets 316 transmitted from thewireless device 310 located outside of theboundary zone 314 may be dropped, discarded, sent to a holding place ortrash 318, or treated with policies and algorithms differing from those applied to a wireless device located within theboundary zone 314. -
FIG. 4 illustrates another exemplary short-range wireless network 400 that includes a set ofwireless access points 402 that each provideportions 404 of a wireless network coverage area. In one exemplary embodiment, a boundary and a boundary zone may be established using a set of locations within a coverage area. These locations may be used to establish the boundary and boundary zones, such that they conform closely to a preferred access area or region. In one exemplary embodiment, theuser 406, having a wireless enabled calibration device, may provide boundary data to network equipment by calibrating at various points along aboundary path 408. In the exemplary embodiment depicted, theboundary path 408 closely conforms to the physical boundary of a room or building. In alternative examples, the calibration device may provide a set of points from which a boundary may be extrapolated. For example, two boundary points may be used to create a boundary line or a set of boundary measurements, such as power measurements may be used to create a statistical boundary zone or area. - In one exemplary embodiment, boundary data and locations may be determined by triangulation between at least three access points. A set of triangulated boundary points may be compared to locations of devices in the coverage area to determine whether the devices are located within a boundary zone. Using this determination, differing network access policies and feature policies may be applied to mobile wireless enabled device.
-
FIG. 5 depicts an exemplary method for providing a boundary zone. As shown atstep 502, a set of boundary locations is established. For example, a wireless calibration device may communicate with network equipment to establish a set of locations along a boundary. This set of locations may be converted to boundary data that defines a boundary zone. In this manner, the boundary zone is determined, as shown atstep 504. -
FIG. 6 depicts anexemplary system 600 for establishing a short-range wireless network. Adevice 602, such as a wireless hand-held electronic device, a wireless enabled laptop or a short-range wireless enabled cell phone, may interact withaccess points 604 when located within the coverage area of the short-range wireless network. The access points 604 collect data associated with the location of thewireless device 602 and transfer that data via a router orother network equipment 606 to apolicy server 608. For example, theaccess points 604 may record a time that a signal was received. This signal arrival time may be transferred to thepolicy server 608 and thepolicy server 608 may determine the location of the wireless device within a coverage area based on the reported signal arrival times from eachaccess point 604. Thepolicy server 608 compares the location with boundary zone data to determine whether thewireless device 602 is located within a boundary zone. Thepolicy server 608 implements and associates policies with thewireless device 602 based on its location relative to a boundary zone. For example, the policy server may implement network traffic controls based on the location of thewireless device 602. In one exemplary embodiment, thepolicy server 608 manipulates network equipment, such asnetwork equipment 606, to control network traffic received from thewireless device 602. In one example, network traffic received from thewireless device 602 when thewireless device 602 is located within a boundary zone is permitted to pass to external networks. In another example, network packets transmitted from thewireless device 602 when the wireless is outside of a boundary zone are dropped or discarded. In another exemplary embodiment, thepolicy server 608 may implement additional security protocols for devices accessing the network based on their location relative to the boundary zone. For example, a policy server may implement a network that uses different encryption protocols or different security keys based on the location of the wireless device. - In another embodiment, the
policy server 608 may interact with thewireless device 602 and control its features and feature activation based on the location within the coverage area. For example, ifwireless device 602 is a short-range wireless enabled cellular telephone, thepolicy server 608 may interact with the cellular telephone to manipulate features located on the cellular telephone based on the phones location. For example, the policy server may manipulate ring tones, ring volume and vibration modes on a cellular telephone based on the cellular telephone's location. In another exemplary embodiment, the policy server manipulates or deactivates camera features on a camera enabled cellular telephone based on its location within the coverage area. Additional exemplary features and feature policies are described below. -
FIG. 7 depicts an alternate embodiment of a system where a policy server is implemented within network equipment. Thesystem 700 includes a set ofaccess points 704 connected tonetwork equipment 706. The access points 704 interact with thewireless device 702 to gather data that may be used in determining the wireless device location. Thenetwork equipment 706 uses this data to determine the location of the wireless device. Using the location, the network equipment may compare the location of the wireless device to boundary zone data to determine the location of the device relative to the boundary zone. In response, the network equipment may implement policies, such as network traffic controls and feature policies, based on the relative location of thedevice 702 to a boundary zone. -
FIG. 8 depicts anexemplary policy server 800. Thepolicy server 800 may be a separate computational system or may be implemented within other data network equipment. The policy server includesprocessors 802, network anddevice interfaces 804, andstorage 806, such as memory. The storage ormemory 806 includesboundary data 808 and programs andinstructions 812, and may include policy data and/oralgorithms 810. - The network and
device interfaces 804 interact with access points and network equipment. For example, the network anddevice interfaces 804 include interfaces to a wired network and interfaces to access points that implement a wireless short-range wireless network. Through this interaction with the access points, data associated with the location of a wireless device are transferred to thepolicy server 800. - Programs and
instructions 812 are operable by theprocessors 802 to determine the location of the wireless device within the short-range wireless network coverage area based on the data received from the access points. For example, the programs andinstructions 812 may include location determination logic. In addition, the program andinstructions 812 may also include software instructions for comparing the location of the wireless device toboundary data 808. From this comparison, the system determines whether particular wireless devices are located within or outside of the boundary zone. The programs andinstructions 812 may further include software instructions for implementing policies, such as network traffic controls and feature policies, based on the location of the wireless device. For example,software instructions 812, operable by theprocessors 802, may be configured to access policy data andalgorithms 810 to determine selected policies to implement based on the relative location of the wireless device to a boundary zone. For example, thesystem 800 may implement network traffic controls based on the location of the wireless device. In another exemplary embodiment thesystem 800 may implement feature policy controls based on the location of the wireless device. - In one particular embodiment, the wireless device may be implemented as a cellular telephone or portable hand-held device with cellular telephone functionality. In another exemplary embodiment, the wireless device may be configured to access both a long-range network, such as a pager or cellular network, and a short-range network.
FIG. 9 depicts an exemplary device that includes both longdistance communication circuitry 902 and short-rangewireless communication circuitry 904. For example, the long-range communication circuitry 902 may be implemented as a cellular telephone transceiver. The short-rangewireless communication circuitry 904 may, for example, interact with a short-range wireless network. In exemplary embodiments, the short-range wireless network includes networks utilizing protocols and standards, such as IEEE 802.11x, IEEE 802.15, IEEE 802.16, Bluetooth, Wi-Fi, and Wi-Max. In addition, to thecommunications circuitry device 900 includes feature devices andcircuitry 906 and afeature policy driver 908. The feature devices andcircuitry 906 may include circuitry that enables inbound calling, outbound calling, ringer volume levels, text messaging, voice alert messaging, camera features, web access features, application features, such as JAVA based application, games, voice-over-IP (VoIP). Thefeature policy driver 908 interacts with the feature devices andcircuitry 906 to activate, enable, disable, deactivate or manipulate the parameters or policies associated with those devices andcircuitry 906. For example, thefeature policy driver 908 may deactivate a camera capability or web feature when a device is located within a boundary zone. In another example, thefeatures policy driver 908 may activate or deactivate application environments such as JAVA application environments based on a location of the device relative to boundary zones. In a further example, thefeature policy driver 908 may initiate downloading of applications. - In one exemplary embodiment, when the
device 900 enters a coverage area of a short-range wireless network, short-rangewireless communications circuitry 904 interacts with access points to establish a location of thewireless device 900. A policy server associated with the short-range wireless network determines a feature policy based upon the location of the wireless device within the coverage area relative to boundary zones or a policy mapping. The policy server transmits a feature policy to the device via the short-range wireless network. Thefeature policy driver 908 implements feature policies that manipulate the feature devices andcircuitry 906. For example, the features policy server may transmit a feature policy that disables or deactivates camera features within camera enabled cell phones. - In one exemplary embodiment, a school may implement a policy that disables game features and JAVA-based applications within classrooms. In this example, the school may establish a short-range wireless network with boundary zones associated with classroom locations. When wireless enabled devices including a feature policy driver are located within the classroom boundary zones, features such as games, JAVA applications, cameras, and ringer volume may be manipulated, disabled or shut off. Similarly, an establishment may establish a boundary zone closely associated with restrooms and locker rooms. In such boundary zones, features such as cameras may be disabled. In a further exemplary embodiment, movie theaters may activate vibration or silent modes within theaters by applying feature policies to features policy enabled devices.
- In another exemplary embodiment, a policy server may communicate with feature policy enabled devices utilizing voice alert messages and text alert messages. For example, the policy server may provide a text alert message indicating that the device is entering a restricted zone or that a certain feature policy will be enacted. A similar message may be provided by a voice alert. In a further example, features, such as voice over IP capabilities, may be enabled or disabled based on locations within the coverage area relative to the boundary zone.
-
FIG. 10 depicts an exemplary method for controlling network traffic. The method includes providing boundary data, as shown atstep 1002. The boundary data may include a set of boundary locations that are used to establish a boundary zone or region. When a wireless device enters the short-range wireless network coverage area, the system determines the location of the wireless device, as shown atstep 1004. For example, the system may use a time-based triangulation technique utilizing at least three wireless access points. In another exemplary embodiment, the system may use a power-based technique for determining wireless device location. Determining the location of the wireless device may further include comparing a location to the boundary data to determine whether the location is within a boundary zone. Based on the location relative to the boundary zone, the system may control network traffic, as shown atstep 1006. For example, the system may discard packets received from devices located outside of the boundary zone. -
FIG. 11 depicts a method for controlling the network traffic. Themethod 1100 includes receiving a packet from a wireless device, as shown atstep 1102. A determination is made as to whether the device is within the boundary zone or region, as shown atstep 1104. For example, the system may periodically determine the location of the wireless device relative to the boundary zone. The system may, for example, set a flag that indicates whether the device is in or out of the boundary zone. This flag may be checked to determine whether a packet received from the device should be forwarded or discarded. - If the device is determined to be in the boundary zone, the packet is forwarded, as shown at
step 1108. If the device is not within the boundary zone, the packet is dropped or discarded, as shown atstep 1106. - Policies may also be implemented as feature policies that manipulate and control features of a device enabled to receive the feature policies.
FIG. 12 depicts an exemplary method for controlling features policies. Boundary data is provided, as shown atstep 1202. When a wireless device enters a coverage area of a short-range wireless network, the location of the wireless device is determined, as shown atstep 1204. For example, the system may utilize a triangulation technique or a power-based technique to determine the location of the device. Determining the location of the device may further include comparing the location to the boundary data to determine the location of the device relative to a boundary zone. Based on the location of the device relative to the boundary zone, the system determines a feature policy, as shown atstep 1206. For example, one feature policy may apply to a device when it is located within a boundary zone and a second feature policy may apply to the device when it is located outside of the boundary zone. The system provides the location based feature policy to the wireless device, as shown atstep 1208. - A device enabled to communicate via the short-range wireless network and including a feature policy driver, may receive the feature policy, as shown at
step 1302 inFIG. 13 . The feature policy may, for example, deactivate features, such as cameras. The feature policy driver on the device may enact the feature policy, as shown atstep 1304. For example, the feature policy driver may deactivate camera capabilities within the cellular telephone. - While the examples depict utilize a boundary that is determined based on data associated with a short-range network, a boundary zone may be determined using long-range networks and policies and features applied based on location within the long-range network. For example, location may be determined by GPS or cellular triangulation and policies applied to devices based on a policy mapping within the cellular network. Policies, such as the feature policy or network policy, may be implemented on a long-range network. In addition, IP-based communications protocols may be implemented that extend beyond the typical range of short-range wireless networks. In one exemplary embodiment a Wi-Max or IEEE 802.16 network that has a long-range coverage area may be used to implement boundary zones.
- The above-disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover all such modifications, enhancements, and other embodiments, which fall within the true scope of the present invention. Thus, to the maximum extent allowed by law, the scope of the present invention is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.
Claims (20)
1. A policy server comprising:
a network device interface adapted to communicate with a set of wireless access points via a short range wireless network, each of the wireless access points having a coverage area;
a processor and a memory accessible to the processor, the memory comprising instructions executable by the processor to:
determine whether at least one wireless device is located within a boundary area, the boundary area covering an area that is different from the coverage area of any one wireless access point of the set of wireless access points; and
apply a first policy when the at least one wireless device is located within the boundary area and apply a second policy when the at least one wireless device is located outside of the boundary area.
2. The policy server of claim 1 , wherein the memory further comprises an instruction executable by the processor to receive location information from the at least one wireless device and to determine a location of the at least one wireless device relative to the boundary area based on the received location information.
3. The policy server of claim 1 , wherein the memory further comprises an instruction executable by the processor to define the boundary area.
4. The policy server of claim 1 , wherein the boundary area is located within a collective wireless coverage area provided by the coverage area of each wireless access point of the set of wireless access points.
5. The policy server of claim 1 , wherein the first policy allows data packets from the at least one wireless device to pass to external networks and wherein the second policy does not allow data packets from the at least one wireless device to pass to external networks.
6. The policy server of claim 1 , wherein the boundary area comprises a portion of a collective wireless coverage area of each of the wireless access points.
7. The policy server of claim 1 , wherein the memory further comprises instructions executable by the processor to:
receive a set of points from a calibration device; and
extrapolate the boundary area from the received set of points.
8. A method comprising:
receiving location information related to a wireless device from at least one access point of a set of access points providing a short range wireless network;
determining a location of the wireless device relative to a boundary area defined within a coverage area of the short range wireless network, the boundary area defining a region that is not coextensive with the coverage area; and
selectively associating at least one policy with the wireless device based on the determined location.
9. The method of claim 8 , wherein selectively associating at least one policy comprises assigning a first policy when the wireless device is determined to be within the boundary area and assigning a second policy when the wireless device is determined to be outside of the boundary area.
10. The method of claim 8 , wherein selectively associating at least one policy comprises controlling the wireless device within the boundary area to use a particular ring tone when the wireless device is located within the boundary area.
11. The method of claim 8 , wherein selectively associating at least one policy comprises communicating using a first encryption protocol when the wireless device is within the boundary area and communicating using a second encryption protocol when the wireless device is outside of the boundary area.
12. The method of claim 8 , wherein selectively associating at least one policy comprises communicating using a first security key when the wireless device is within the boundary area and communicating using a second security key when the wireless device is outside of the boundary area.
13. The method of claim 8 , further comprising:
receiving a plurality of calibration points from one or more calibration devices; and
extrapolating the boundary area from the plurality of calibration points.
14. The method of claim 8 , wherein receiving the location information comprises receiving global positioning system (GPS) location data related to the wireless device.
15. The method of claim 8 , wherein receiving the location information comprises:
receiving location data from at least three access points of the set of access points; and
performing a triangulation operation based on the location data received from the at least three access points.
16. A network device comprising:
an interface adapted to communicate with a plurality of wireless access points that provide a wireless coverage area;
a network interface adapted to communicate with a network; and
logic adapted to communicate with the interface and the network interface, the logic to determine a location of a wireless device relative to a boundary area that is not coextensive with the wireless coverage area, the logic to enforce at least one location-based policy with respect to the wireless device based on the determined location.
17. The network device of claim 16 , wherein the at least one location-based policy comprises a first policy when the wireless device is located within the boundary area and a second policy when the wireless device is outside of the boundary area.
18. The network device of claim 16 , wherein the logic is adapted to determine the location of the wireless device by triangulation using data received from at least three of the plurality of wireless access points.
19. The network device of claim 16 , wherein the logic is adapted to receive boundary point data and to determine the boundary area from the boundary point data.
20. The network device of claim 16 , wherein the boundary point data comprises a set of calibration points associated with a physical dimension of a building.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/853,247 US20080043689A1 (en) | 2004-07-13 | 2007-09-11 | System and method for location based policy management |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/890,397 US7286834B2 (en) | 2004-07-13 | 2004-07-13 | System and method for location based policy management |
US11/853,247 US20080043689A1 (en) | 2004-07-13 | 2007-09-11 | System and method for location based policy management |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/890,397 Continuation US7286834B2 (en) | 2004-07-13 | 2004-07-13 | System and method for location based policy management |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080043689A1 true US20080043689A1 (en) | 2008-02-21 |
Family
ID=35600121
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/890,397 Active 2024-11-18 US7286834B2 (en) | 2004-07-13 | 2004-07-13 | System and method for location based policy management |
US11/853,247 Abandoned US20080043689A1 (en) | 2004-07-13 | 2007-09-11 | System and method for location based policy management |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/890,397 Active 2024-11-18 US7286834B2 (en) | 2004-07-13 | 2004-07-13 | System and method for location based policy management |
Country Status (6)
Country | Link |
---|---|
US (2) | US7286834B2 (en) |
EP (1) | EP1766803A4 (en) |
KR (1) | KR20070032673A (en) |
CA (1) | CA2567596A1 (en) |
MX (1) | MXPA06013986A (en) |
WO (1) | WO2006017071A2 (en) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050008001A1 (en) * | 2003-02-14 | 2005-01-13 | John Leslie Williams | System and method for interfacing with heterogeneous network data gathering tools |
US20070004386A1 (en) * | 2005-06-30 | 2007-01-04 | Singh Munindar P | Methods, systems, and computer program products for role-and locale-based mobile user device feature control |
US20100167718A1 (en) * | 2008-12-31 | 2010-07-01 | Chiussi Fabio M | Femto personal proxy application client |
US20100167694A1 (en) * | 2008-12-31 | 2010-07-01 | Chiussi Fabio M | Femto personal policy server |
US7769394B1 (en) * | 2006-10-06 | 2010-08-03 | Sprint Communications Company L.P. | System and method for location-based device control |
US20110065452A1 (en) * | 2005-07-14 | 2011-03-17 | BINJ Labs. | System and method for detecting and controlling transmission devices |
US20110069188A1 (en) * | 2004-09-24 | 2011-03-24 | Singh Munindar P | Policy-Based Controls For Wireless Cameras |
US20110158090A1 (en) * | 2009-12-31 | 2011-06-30 | Yusun Kim Riley | Methods, systems, and computer readable media for condition-triggered policies |
US20110217979A1 (en) * | 2010-03-03 | 2011-09-08 | Petrus Wilhelmus Adrianus Jacobus Maria Nas | Methods, systems, and computer readable media for managing the roaming preferences of mobile subscribers |
US20120094685A1 (en) * | 2010-10-15 | 2012-04-19 | Peter Joseph Marsico | Methods, systems, and computer readable media for location-based policy enhancement |
US8626156B2 (en) | 2010-10-20 | 2014-01-07 | Tekelec, Inc. | Methods, systems, and computer readable media for selective policy enhancement (PE) for high-usage roamers |
US8681622B2 (en) | 2010-12-17 | 2014-03-25 | Tekelec, Inc. | Policy and charging rules function (PCRF) and performance intelligence center (PIC) based congestion control |
US9106769B2 (en) | 2011-08-10 | 2015-08-11 | Tekelec, Inc. | Methods, systems, and computer readable media for congestion management in a diameter signaling network |
US20160088608A1 (en) * | 2013-04-30 | 2016-03-24 | Telefonaktiebolaget L M Ericsson (Publ) | Radio communication policy allocation in a network node |
US9369910B2 (en) | 2012-07-14 | 2016-06-14 | Tekelec, Inc. | Methods, systems, and computer readable media for dynamically controlling congestion in a radio access network |
US20160234218A1 (en) * | 2015-02-10 | 2016-08-11 | Fu Tai Hua Industry (Shenzhen) Co., Ltd. | Application permission management device and method therefor |
US9473928B2 (en) | 2012-07-14 | 2016-10-18 | Tekelec, Inc. | Methods, systems, and computer readable media for policy-based local breakout (LBO) |
US9589150B2 (en) | 2014-06-12 | 2017-03-07 | Alibaba Group Holding Limited | Managing confidential information |
US9860731B1 (en) | 2005-07-14 | 2018-01-02 | Binj Laboratories, Inc. | Systems and methods for controlling wireless devices |
US9917700B2 (en) | 2010-03-15 | 2018-03-13 | Tekelec, Inc. | Systems, methods, and computer readable media for policy enforcement correlation |
US10003685B2 (en) | 2005-07-14 | 2018-06-19 | Binj Laboratories, Inc. | Systems and methods for detecting and controlling transmission devices |
US10103806B1 (en) | 2017-06-05 | 2018-10-16 | Binj Laboratories, Inc. | System and method for wrist band transmitter and system thereof |
US10477401B1 (en) | 2005-07-14 | 2019-11-12 | Binj Laboratories, Inc. | Systems and methods for detecting and controlling transmission devices |
US10735576B1 (en) | 2005-07-14 | 2020-08-04 | Binj Laboratories, Inc. | Systems and methods for detecting and controlling transmission devices |
US10785593B1 (en) | 2005-07-14 | 2020-09-22 | Binj Laboratories, Inc. | System and method for detecting and controlling transmission devices |
US10868632B1 (en) * | 2005-07-14 | 2020-12-15 | Binj Laboratories, Inc. | System and method for the detection of transmission facilities |
Families Citing this family (119)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2812509B1 (en) * | 2000-07-26 | 2002-12-27 | Gemplus Card Int | METHOD FOR SECURE RECOGNITION BETWEEN TWO DEVICES IN A RADIO FREQUENCY NETWORK |
US7231219B2 (en) * | 2002-12-17 | 2007-06-12 | International Business Machines Corporation | Method, apparatus, and program for automated property adjustment in a cellular network |
US7450937B1 (en) * | 2003-09-04 | 2008-11-11 | Emc Corporation | Mirrored data message processing |
US20050266857A1 (en) * | 2004-05-27 | 2005-12-01 | Nokia Corporation | Location based execution rights |
US7730485B2 (en) | 2004-08-10 | 2010-06-01 | At&T Intellectual Property I, L.P. | System and method for advertising to a Wi-Fi device |
US8571541B2 (en) | 2004-07-15 | 2013-10-29 | Avaya Inc. | Proximity-based authorization |
WO2006017696A2 (en) * | 2004-08-05 | 2006-02-16 | Meshnetworks, Inc. | Autonomous reference system and method for monitoring the location and movement of objects |
US7382804B2 (en) * | 2004-08-05 | 2008-06-03 | Meshnetworks, Inc. | Bandwidth efficient system and method for ranging nodes in a wireless communication network |
US7400891B2 (en) * | 2004-11-10 | 2008-07-15 | At&T Delaware Intellectual Property, Inc. | Methods, systems and computer program products for remotely controlling wireless terminals |
US8594704B2 (en) * | 2004-12-16 | 2013-11-26 | Atc Technologies, Llc | Location-based broadcast messaging for radioterminal users |
US7826835B2 (en) * | 2004-12-16 | 2010-11-02 | Intel Corporation | Mobile phone policy management |
US8831194B2 (en) | 2005-06-30 | 2014-09-09 | Emc Corporation | Telephonic communication redirection and compliance processing |
US8605878B2 (en) * | 2005-06-30 | 2013-12-10 | Emc Corporation | Redirecting and mirroring of telephonic communications |
US8059805B2 (en) * | 2005-06-30 | 2011-11-15 | Emc Corporation | Enhanced services provided using communication redirection and processing |
KR100719118B1 (en) * | 2005-10-27 | 2007-05-17 | 삼성전자주식회사 | Method and system for limitting a function of device in specific perimeters |
US8177632B2 (en) * | 2005-11-09 | 2012-05-15 | Wms Gaming Inc. | Information flow control for gaming machines requiring server support |
NO324541B1 (en) * | 2005-12-12 | 2007-11-19 | Telenor Asa | Method, subscriber identity module and system for providing mobile communication terminal location data |
US20070167175A1 (en) * | 2006-01-17 | 2007-07-19 | Tony Wong | Wireless virtual-network systems and methods to operate the same |
US20070185980A1 (en) * | 2006-02-03 | 2007-08-09 | International Business Machines Corporation | Environmentally aware computing devices with automatic policy adjustment features |
US20070206546A1 (en) * | 2006-03-02 | 2007-09-06 | Alberth William P Jr | Method and apparatus for preventing denial of service attacks on cellular infrastructure access channels |
US7715562B2 (en) * | 2006-03-06 | 2010-05-11 | Cisco Technology, Inc. | System and method for access authentication in a mobile wireless network |
CN101496387B (en) * | 2006-03-06 | 2012-09-05 | 思科技术公司 | System and method for access authentication in a mobile wireless network |
US9251521B2 (en) * | 2006-05-12 | 2016-02-02 | At&T Intellectual Property I, L.P. | Location-based alerting |
US9060071B1 (en) * | 2006-08-01 | 2015-06-16 | Oracle America, Inc. | Bluetooth location identifier and general information broadcaster |
US7414529B2 (en) * | 2006-08-04 | 2008-08-19 | International Business Machines Corporation | Disablement of camera functionality for a portable device |
US7853691B2 (en) * | 2006-11-29 | 2010-12-14 | Broadcom Corporation | Method and system for securing a network utilizing IPsec and MACsec protocols |
US7969930B2 (en) * | 2006-11-30 | 2011-06-28 | Kyocera Corporation | Apparatus, system and method for managing wireless local area network service based on a location of a multi-mode portable communication device |
US7978667B2 (en) * | 2006-11-30 | 2011-07-12 | Kyocera Corporation | Management of WLAN and WWAN communication services to a multi-mode wireless communication device |
US8102825B2 (en) * | 2006-11-30 | 2012-01-24 | Kyocera Corporation | Detection of a multi-mode portable communication device at a mesh network |
US9532399B2 (en) * | 2006-11-30 | 2016-12-27 | Kyocera Corporation | Apparatus, system and method for managing wireless local area network service to a multi-mode portable communication device |
US8103285B2 (en) * | 2007-04-19 | 2012-01-24 | Kyocera Corporation | Apparatus, system and method for determining a geographical location of a portable communication device |
US20080279290A1 (en) * | 2007-05-09 | 2008-11-13 | At&T Knowledge Ventures, Lp | Technique for Operating a Communication System at a Higher Spectral Utilization for Wireless Broadband Applications |
US20090017839A1 (en) * | 2007-07-11 | 2009-01-15 | Broadcom Corporation | Wireless network with enhanced security by real-time identification of a location of a received packet source |
US11212733B2 (en) * | 2007-10-08 | 2021-12-28 | Qualcomm Incorporated | Control of wireless transmission based on node status |
KR101236910B1 (en) | 2007-10-09 | 2013-02-25 | 삼성전자주식회사 | Method for performing operation related with other device through Near Field Communication and apparatus therfor |
US8112785B1 (en) | 2007-12-31 | 2012-02-07 | Symantec Corporation | Systems and methods for administering policies for physical locations |
US8595336B1 (en) | 2008-02-01 | 2013-11-26 | Wimm Labs, Inc. | Portable universal personal storage, entertainment, and communication device |
US20090215400A1 (en) * | 2008-02-26 | 2009-08-27 | Henry Chang | Pilot signal transmission management |
US8233433B2 (en) * | 2008-02-26 | 2012-07-31 | Kyocera Corporation | Apparatus, system and method for initiating WLAN service using beacon signals |
CN101572854A (en) * | 2008-04-28 | 2009-11-04 | 华为技术有限公司 | Method, system and equipment for strategy authorization |
US8340634B2 (en) | 2009-01-28 | 2012-12-25 | Headwater Partners I, Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US8250207B2 (en) | 2009-01-28 | 2012-08-21 | Headwater Partners I, Llc | Network based ambient services |
US8898293B2 (en) | 2009-01-28 | 2014-11-25 | Headwater Partners I Llc | Service offer set publishing to device agent with on-device service selection |
US8635335B2 (en) | 2009-01-28 | 2014-01-21 | Headwater Partners I Llc | System and method for wireless network offloading |
US8548428B2 (en) | 2009-01-28 | 2013-10-01 | Headwater Partners I Llc | Device group partitions and settlement platform |
US8391834B2 (en) | 2009-01-28 | 2013-03-05 | Headwater Partners I Llc | Security techniques for device assisted services |
US8402111B2 (en) | 2009-01-28 | 2013-03-19 | Headwater Partners I, Llc | Device assisted services install |
US8626115B2 (en) | 2009-01-28 | 2014-01-07 | Headwater Partners I Llc | Wireless network service interfaces |
US8346225B2 (en) | 2009-01-28 | 2013-01-01 | Headwater Partners I, Llc | Quality of service for device assisted services |
US8725123B2 (en) | 2008-06-05 | 2014-05-13 | Headwater Partners I Llc | Communications device with secure data path processing agents |
US8924469B2 (en) | 2008-06-05 | 2014-12-30 | Headwater Partners I Llc | Enterprise access control and accounting allocation for access networks |
US8275830B2 (en) | 2009-01-28 | 2012-09-25 | Headwater Partners I Llc | Device assisted CDR creation, aggregation, mediation and billing |
US8924543B2 (en) | 2009-01-28 | 2014-12-30 | Headwater Partners I Llc | Service design center for device assisted services |
US8832777B2 (en) | 2009-03-02 | 2014-09-09 | Headwater Partners I Llc | Adapting network policies based on device service processor configuration |
US8589541B2 (en) | 2009-01-28 | 2013-11-19 | Headwater Partners I Llc | Device-assisted services for protecting network capacity |
US8406748B2 (en) | 2009-01-28 | 2013-03-26 | Headwater Partners I Llc | Adaptive ambient services |
FI20085604A0 (en) * | 2008-06-18 | 2008-06-18 | Elektrobit Wireless Comm Oy | Connection management |
JP4743305B2 (en) * | 2009-01-06 | 2011-08-10 | ソニー株式会社 | Function control method by boundary definition, function control system by boundary definition, function control server and program by boundary definition |
US9980146B2 (en) | 2009-01-28 | 2018-05-22 | Headwater Research Llc | Communications device with secure data path processing agents |
US11218854B2 (en) | 2009-01-28 | 2022-01-04 | Headwater Research Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US10064055B2 (en) | 2009-01-28 | 2018-08-28 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US9565707B2 (en) | 2009-01-28 | 2017-02-07 | Headwater Partners I Llc | Wireless end-user device with wireless data attribution to multiple personas |
US9557889B2 (en) | 2009-01-28 | 2017-01-31 | Headwater Partners I Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US9253663B2 (en) | 2009-01-28 | 2016-02-02 | Headwater Partners I Llc | Controlling mobile device communications on a roaming network based on device state |
US10326800B2 (en) | 2009-01-28 | 2019-06-18 | Headwater Research Llc | Wireless network service interfaces |
US8745191B2 (en) | 2009-01-28 | 2014-06-03 | Headwater Partners I Llc | System and method for providing user notifications |
US9955332B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Method for child wireless device activation to subscriber account of a master wireless device |
US9270559B2 (en) | 2009-01-28 | 2016-02-23 | Headwater Partners I Llc | Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow |
US9706061B2 (en) | 2009-01-28 | 2017-07-11 | Headwater Partners I Llc | Service design center for device assisted services |
US9858559B2 (en) | 2009-01-28 | 2018-01-02 | Headwater Research Llc | Network service plan design |
US10057775B2 (en) | 2009-01-28 | 2018-08-21 | Headwater Research Llc | Virtualized policy and charging system |
US10264138B2 (en) | 2009-01-28 | 2019-04-16 | Headwater Research Llc | Mobile device and service management |
US10779177B2 (en) | 2009-01-28 | 2020-09-15 | Headwater Research Llc | Device group partitions and settlement platform |
US10798252B2 (en) | 2009-01-28 | 2020-10-06 | Headwater Research Llc | System and method for providing user notifications |
US9755842B2 (en) | 2009-01-28 | 2017-09-05 | Headwater Research Llc | Managing service user discovery and service launch object placement on a device |
US9572019B2 (en) | 2009-01-28 | 2017-02-14 | Headwater Partners LLC | Service selection set published to device agent with on-device service selection |
US8893009B2 (en) | 2009-01-28 | 2014-11-18 | Headwater Partners I Llc | End user device that secures an association of application to service policy with an application certificate check |
US10248996B2 (en) | 2009-01-28 | 2019-04-02 | Headwater Research Llc | Method for operating a wireless end-user device mobile payment agent |
US10484858B2 (en) | 2009-01-28 | 2019-11-19 | Headwater Research Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US10715342B2 (en) | 2009-01-28 | 2020-07-14 | Headwater Research Llc | Managing service user discovery and service launch object placement on a device |
US9578182B2 (en) | 2009-01-28 | 2017-02-21 | Headwater Partners I Llc | Mobile device and service management |
US10783581B2 (en) | 2009-01-28 | 2020-09-22 | Headwater Research Llc | Wireless end-user device providing ambient or sponsored services |
US9954975B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Enhanced curfew and protection associated with a device group |
US10200541B2 (en) | 2009-01-28 | 2019-02-05 | Headwater Research Llc | Wireless end-user device with divided user space/kernel space traffic policy system |
US9647918B2 (en) | 2009-01-28 | 2017-05-09 | Headwater Research Llc | Mobile device and method attributing media services network usage to requesting application |
US9351193B2 (en) | 2009-01-28 | 2016-05-24 | Headwater Partners I Llc | Intermediate networking devices |
US9571559B2 (en) | 2009-01-28 | 2017-02-14 | Headwater Partners I Llc | Enhanced curfew and protection associated with a device group |
US10492102B2 (en) | 2009-01-28 | 2019-11-26 | Headwater Research Llc | Intermediate networking devices |
US10841839B2 (en) | 2009-01-28 | 2020-11-17 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US8793758B2 (en) | 2009-01-28 | 2014-07-29 | Headwater Partners I Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US9392462B2 (en) | 2009-01-28 | 2016-07-12 | Headwater Partners I Llc | Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy |
US10237757B2 (en) | 2009-01-28 | 2019-03-19 | Headwater Research Llc | System and method for wireless network offloading |
JP2010178867A (en) * | 2009-02-05 | 2010-08-19 | Fujifilm Corp | Radiography network system and radiographic image capturing system control method |
US8165577B2 (en) * | 2009-03-19 | 2012-04-24 | Kyocera Corporation | Pilot signal transmission management |
US8131846B1 (en) * | 2009-07-06 | 2012-03-06 | Symantec Corporation | Global, location-aware computer security |
US9026813B2 (en) | 2010-11-22 | 2015-05-05 | Qualcomm Incorporated | Establishing a power charging association on a powerline network |
US9154826B2 (en) | 2011-04-06 | 2015-10-06 | Headwater Partners Ii Llc | Distributing content and service launch objects to mobile devices |
US9003492B2 (en) | 2011-06-21 | 2015-04-07 | Qualcomm Incorporated | Secure client authentication and service authorization in a shared communication network |
US9021278B2 (en) | 2011-08-10 | 2015-04-28 | Qualcomm Incorporated | Network association of communication devices based on attenuation information |
US20130078963A1 (en) * | 2011-09-23 | 2013-03-28 | Ford Global Technologies, Llc | Method and Apparatus for Incoming Call Filtration and Message Delivery |
US8886576B1 (en) | 2012-06-22 | 2014-11-11 | Google Inc. | Automatic label suggestions for albums based on machine learning |
US8429103B1 (en) | 2012-06-22 | 2013-04-23 | Google Inc. | Native machine learning service for user adaptation on a mobile platform |
US8510238B1 (en) | 2012-06-22 | 2013-08-13 | Google, Inc. | Method to predict session duration on mobile devices using native machine learning |
US8897811B2 (en) * | 2012-06-29 | 2014-11-25 | Google Inc. | Systems and methods for aggregating missed call data and adjusting telephone settings |
EP3637376B1 (en) * | 2012-08-16 | 2021-10-27 | Schlage Lock Company LLC | Wireless reader system |
US9843603B2 (en) * | 2012-10-16 | 2017-12-12 | Dell Products, L.P. | Techniques for dynamic access control of input/output devices |
WO2014063082A1 (en) * | 2012-10-19 | 2014-04-24 | Mcafee, Inc. | Premises aware security |
WO2014159862A1 (en) | 2013-03-14 | 2014-10-02 | Headwater Partners I Llc | Automated credential porting for mobile devices |
US9414348B2 (en) | 2013-04-22 | 2016-08-09 | Nokia Technologies Oy | Method and apparatus for determining dynamic access tokens for location-based services |
US20150326617A1 (en) * | 2014-05-06 | 2015-11-12 | DoNotGeoTrack, Inc. | Privacy Control Processes for Mobile Devices, Wearable Devices, other Networked Devices, and the Internet of Things |
WO2016015764A1 (en) * | 2014-07-30 | 2016-02-04 | Nec Europe Ltd. | Information dissemination in a multi-technology communication network |
US20160078350A1 (en) * | 2014-09-17 | 2016-03-17 | Mark D. Yarvis | Contextual platform feature recommendations |
US10970405B2 (en) | 2016-07-12 | 2021-04-06 | Samsung Electronics Co., Ltd. | Method and electronic device for managing functionality of applications |
US10972556B1 (en) * | 2017-03-22 | 2021-04-06 | Amazon Technologies, Inc. | Location-based functionality for voice-capturing devices |
US10613191B2 (en) * | 2017-09-07 | 2020-04-07 | Honeywell International Inc. | Object tracking and ranging |
EP3515052A1 (en) * | 2018-01-22 | 2019-07-24 | TP Vision Holding B.V. | Operating method of a mobile communication device |
US10274326B1 (en) * | 2018-08-02 | 2019-04-30 | Mapanything, Inc. | Utilizing a geo-locator service and zone servers to reduce computer resource requirements for determining high quality solutions to routing problems |
US11293770B2 (en) | 2018-08-02 | 2022-04-05 | salesforces.com, Inc. | Geographic routing engine |
US11520908B2 (en) * | 2019-04-17 | 2022-12-06 | Lookout Inc. | Self-management of devices using personal mobile device management |
Citations (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5432842A (en) * | 1991-03-19 | 1995-07-11 | Hitachi, Ltd. | Mobile communication switching across cell boundaries |
US5850444A (en) * | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
US6178506B1 (en) * | 1998-10-23 | 2001-01-23 | Qualcomm Inc. | Wireless subscription portability |
US6236852B1 (en) * | 1998-12-11 | 2001-05-22 | Nortel Networks Limited | Authentication failure trigger method and apparatus |
US6271757B1 (en) * | 1997-12-19 | 2001-08-07 | Invisible Fence, Inc. | Satellite animal containment system with programmable Boundaries |
US20030017826A1 (en) * | 2001-07-17 | 2003-01-23 | Dan Fishman | Short-range wireless architecture |
US20030118015A1 (en) * | 2001-12-20 | 2003-06-26 | Magnus Gunnarsson | Location based notification of wlan availability via wireless communication network |
US20030186710A1 (en) * | 2000-03-13 | 2003-10-02 | Ahti Muhonen | Service provision in a communication system |
US20030207683A1 (en) * | 2002-05-06 | 2003-11-06 | Jarkko Lempio | Location-based services for mobile stations using short range wireless technology |
US20030220116A1 (en) * | 2002-04-23 | 2003-11-27 | Axis Ab | Method and apparatus for determining the position of a portable device |
US20040014422A1 (en) * | 2002-07-19 | 2004-01-22 | Nokia Corporation | Method and system for handovers using service description data |
US20040053645A1 (en) * | 2002-09-13 | 2004-03-18 | Cyril Brignone | Defining a smart area |
US20040137912A1 (en) * | 2002-10-22 | 2004-07-15 | Ie-Hong Lin | Method and apparatus for identifying transmitters in a wireless communication system using power predictions |
US20040162084A1 (en) * | 2003-02-14 | 2004-08-19 | Atheros Communications, Inc. | Positioning with wireless local area networks and WLAN-aided global positioning systems |
US20040166901A1 (en) * | 2003-02-17 | 2004-08-26 | Ntt Docomo, Inc. | Radio communication method and base station |
US20040203856A1 (en) * | 2002-05-16 | 2004-10-14 | Wigren Karl Torbjorn | Altitude determination and distribution in cellular communication systems |
US6813501B2 (en) * | 2000-02-29 | 2004-11-02 | Nokia Mobile Phones, Ltd. | Location dependent services |
US6907254B1 (en) * | 2001-03-08 | 2005-06-14 | Cisco Technology, Inc. | Method and apparatus for controlling a quiet zone for wireless units |
US20050207395A1 (en) * | 2001-02-26 | 2005-09-22 | Jahangir Mohammed | Method for authenticating access to an unlicensed wireless communications system using a licensed wireless communications system authentication process |
US20050239479A1 (en) * | 2004-04-22 | 2005-10-27 | Bednasz Kenneth M | Hands-free reminder for a wireless communications terminal |
US20050260998A1 (en) * | 2004-05-19 | 2005-11-24 | Lorenzo Casaccia | Channel estimation and channel quality indicator (CQI) measurements for a high-speed downlink GPRS |
US20050260972A1 (en) * | 2002-09-12 | 2005-11-24 | Broadcom Corporation | Enabling and controlling access to wireless hot spots |
US20050277428A1 (en) * | 2004-05-13 | 2005-12-15 | International Business Machines Corporation | Location-based control of wireless communications device features |
US20060264211A1 (en) * | 2003-08-26 | 2006-11-23 | Amit Kalhan | System and method for determining when to exit a wireless communication coverage network |
US7591020B2 (en) * | 2002-01-18 | 2009-09-15 | Palm, Inc. | Location based security modification system and method |
US20100220630A1 (en) * | 2003-03-24 | 2010-09-02 | Strix Systems, Inc. | Self-configuring, self-optimizing wireless local area network system |
US20120196670A1 (en) * | 1996-11-14 | 2012-08-02 | Bally Gaming International, Inc. | Network gaming system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ATE391403T1 (en) * | 2000-10-27 | 2008-04-15 | Nokia Corp | METHOD AND DEVICE FOR SECURING A MOBILE ELECTRONIC DEVICE BASED ON LOCATION |
JP2006500657A (en) | 2002-09-23 | 2006-01-05 | クレダント テクノロジーズ インコーポレイテッド | Server, computer memory, and method for supporting security policy maintenance and distribution |
DE602005018213D1 (en) * | 2004-05-24 | 2010-01-21 | Computer Ass Think Inc | SYSTEM AND METHOD FOR AUTOMATIC CONFIGURATION OF A MOBILE DEVICE |
-
2004
- 2004-07-13 US US10/890,397 patent/US7286834B2/en active Active
-
2005
- 2005-07-06 WO PCT/US2005/023788 patent/WO2006017071A2/en not_active Application Discontinuation
- 2005-07-06 MX MXPA06013986A patent/MXPA06013986A/en not_active Application Discontinuation
- 2005-07-06 KR KR1020067025392A patent/KR20070032673A/en not_active Application Discontinuation
- 2005-07-06 EP EP05770975A patent/EP1766803A4/en not_active Withdrawn
- 2005-07-06 CA CA002567596A patent/CA2567596A1/en not_active Abandoned
-
2007
- 2007-09-11 US US11/853,247 patent/US20080043689A1/en not_active Abandoned
Patent Citations (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5432842A (en) * | 1991-03-19 | 1995-07-11 | Hitachi, Ltd. | Mobile communication switching across cell boundaries |
US5850444A (en) * | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
US20120196670A1 (en) * | 1996-11-14 | 2012-08-02 | Bally Gaming International, Inc. | Network gaming system |
US6271757B1 (en) * | 1997-12-19 | 2001-08-07 | Invisible Fence, Inc. | Satellite animal containment system with programmable Boundaries |
US6178506B1 (en) * | 1998-10-23 | 2001-01-23 | Qualcomm Inc. | Wireless subscription portability |
US6236852B1 (en) * | 1998-12-11 | 2001-05-22 | Nortel Networks Limited | Authentication failure trigger method and apparatus |
US6813501B2 (en) * | 2000-02-29 | 2004-11-02 | Nokia Mobile Phones, Ltd. | Location dependent services |
US20030186710A1 (en) * | 2000-03-13 | 2003-10-02 | Ahti Muhonen | Service provision in a communication system |
US20050207395A1 (en) * | 2001-02-26 | 2005-09-22 | Jahangir Mohammed | Method for authenticating access to an unlicensed wireless communications system using a licensed wireless communications system authentication process |
US6907254B1 (en) * | 2001-03-08 | 2005-06-14 | Cisco Technology, Inc. | Method and apparatus for controlling a quiet zone for wireless units |
US20030017826A1 (en) * | 2001-07-17 | 2003-01-23 | Dan Fishman | Short-range wireless architecture |
US20030118015A1 (en) * | 2001-12-20 | 2003-06-26 | Magnus Gunnarsson | Location based notification of wlan availability via wireless communication network |
US7591020B2 (en) * | 2002-01-18 | 2009-09-15 | Palm, Inc. | Location based security modification system and method |
US20030220116A1 (en) * | 2002-04-23 | 2003-11-27 | Axis Ab | Method and apparatus for determining the position of a portable device |
US20030207683A1 (en) * | 2002-05-06 | 2003-11-06 | Jarkko Lempio | Location-based services for mobile stations using short range wireless technology |
US20040203856A1 (en) * | 2002-05-16 | 2004-10-14 | Wigren Karl Torbjorn | Altitude determination and distribution in cellular communication systems |
US20040014422A1 (en) * | 2002-07-19 | 2004-01-22 | Nokia Corporation | Method and system for handovers using service description data |
US20050260972A1 (en) * | 2002-09-12 | 2005-11-24 | Broadcom Corporation | Enabling and controlling access to wireless hot spots |
US20040053645A1 (en) * | 2002-09-13 | 2004-03-18 | Cyril Brignone | Defining a smart area |
US20040137912A1 (en) * | 2002-10-22 | 2004-07-15 | Ie-Hong Lin | Method and apparatus for identifying transmitters in a wireless communication system using power predictions |
US20040162084A1 (en) * | 2003-02-14 | 2004-08-19 | Atheros Communications, Inc. | Positioning with wireless local area networks and WLAN-aided global positioning systems |
US20040166901A1 (en) * | 2003-02-17 | 2004-08-26 | Ntt Docomo, Inc. | Radio communication method and base station |
US20100220630A1 (en) * | 2003-03-24 | 2010-09-02 | Strix Systems, Inc. | Self-configuring, self-optimizing wireless local area network system |
US20060264211A1 (en) * | 2003-08-26 | 2006-11-23 | Amit Kalhan | System and method for determining when to exit a wireless communication coverage network |
US20050239479A1 (en) * | 2004-04-22 | 2005-10-27 | Bednasz Kenneth M | Hands-free reminder for a wireless communications terminal |
US20050277428A1 (en) * | 2004-05-13 | 2005-12-15 | International Business Machines Corporation | Location-based control of wireless communications device features |
US20050260998A1 (en) * | 2004-05-19 | 2005-11-24 | Lorenzo Casaccia | Channel estimation and channel quality indicator (CQI) measurements for a high-speed downlink GPRS |
Cited By (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050008001A1 (en) * | 2003-02-14 | 2005-01-13 | John Leslie Williams | System and method for interfacing with heterogeneous network data gathering tools |
US8660534B2 (en) | 2004-09-24 | 2014-02-25 | Armstrong, Quinton Co. LLC | Policy based controls for wireless cameras |
US8238879B2 (en) | 2004-09-24 | 2012-08-07 | Armstrong, Quinton Co. LLC | Policy-based controls for wireless cameras |
US20110069188A1 (en) * | 2004-09-24 | 2011-03-24 | Singh Munindar P | Policy-Based Controls For Wireless Cameras |
US8145241B2 (en) * | 2005-06-30 | 2012-03-27 | Armstrong, Quinton Co. LLC | Methods, systems, and computer program products for role- and locale-based mobile user device feature control |
US20070004386A1 (en) * | 2005-06-30 | 2007-01-04 | Singh Munindar P | Methods, systems, and computer program products for role-and locale-based mobile user device feature control |
US8738029B2 (en) * | 2005-06-30 | 2014-05-27 | Armstrong, Quinton Co. LLC | Methods, systems, and computer program products for role- and locale-based mobile user device feature control |
US20120149337A1 (en) * | 2005-06-30 | 2012-06-14 | Armstrong, Quinton Co. LLC | Methods, systems, and computer program products for role- and locale-based mobile user device feature control |
US10425527B1 (en) | 2005-07-14 | 2019-09-24 | Binj Laboratories, Inc. | Systems and methods for detecting and controlling transmission devices |
US10986502B1 (en) | 2005-07-14 | 2021-04-20 | Binj Laboratories, Inc. | Systems and methods for detecting and controlling transmission devices |
US10785593B1 (en) | 2005-07-14 | 2020-09-22 | Binj Laboratories, Inc. | System and method for detecting and controlling transmission devices |
US10757753B1 (en) | 2005-07-14 | 2020-08-25 | Binj Laboratories, Inc. | Systems and methods for detecting and controlling transmission devices |
US20110065452A1 (en) * | 2005-07-14 | 2011-03-17 | BINJ Labs. | System and method for detecting and controlling transmission devices |
US10735576B1 (en) | 2005-07-14 | 2020-08-04 | Binj Laboratories, Inc. | Systems and methods for detecting and controlling transmission devices |
US9900776B1 (en) | 2005-07-14 | 2018-02-20 | Binj Laboratories, Inc. | Systems and methods for determining allowability of a wireless device to operate |
US10631166B1 (en) | 2005-07-14 | 2020-04-21 | Binj Laboratories, Inc. | Systems and methods for detecting and controlling transmission devices |
US9860731B1 (en) | 2005-07-14 | 2018-01-02 | Binj Laboratories, Inc. | Systems and methods for controlling wireless devices |
US11431837B1 (en) * | 2005-07-14 | 2022-08-30 | Binj Laboratories, Inc. | Systems and methods for detecting and controlling transmission devices |
US10785592B1 (en) | 2005-07-14 | 2020-09-22 | Binj Laboratories, Inc. | System and method for detecting and controlling transmission devices |
US10477401B1 (en) | 2005-07-14 | 2019-11-12 | Binj Laboratories, Inc. | Systems and methods for detecting and controlling transmission devices |
US9066194B2 (en) * | 2005-07-14 | 2015-06-23 | Binj Laboratories, Inc. | System and method for detecting and controlling transmission devices |
US11039268B1 (en) | 2005-07-14 | 2021-06-15 | Binj Laboratories, Inc. | System and method for detecting and controlling transmission devices |
US10299190B1 (en) | 2005-07-14 | 2019-05-21 | Binj Laboratories, Inc. | System and method for detecting and controlling transmission devices |
US10868632B1 (en) * | 2005-07-14 | 2020-12-15 | Binj Laboratories, Inc. | System and method for the detection of transmission facilities |
US9900760B1 (en) | 2005-07-14 | 2018-02-20 | Binj Laboratories, Inc. | System and method for detecting and controlling transmission devices |
US10003685B2 (en) | 2005-07-14 | 2018-06-19 | Binj Laboratories, Inc. | Systems and methods for detecting and controlling transmission devices |
US10855368B1 (en) | 2006-07-14 | 2020-12-01 | Binj Laboratories, Inc. | System and method for wrist band transmitter and system thereof |
US7769394B1 (en) * | 2006-10-06 | 2010-08-03 | Sprint Communications Company L.P. | System and method for location-based device control |
US9210569B2 (en) * | 2008-12-31 | 2015-12-08 | Commscope Technologies Llc | Femto personal proxy application client |
US20100167718A1 (en) * | 2008-12-31 | 2010-07-01 | Chiussi Fabio M | Femto personal proxy application client |
US20100167694A1 (en) * | 2008-12-31 | 2010-07-01 | Chiussi Fabio M | Femto personal policy server |
US8693987B2 (en) | 2008-12-31 | 2014-04-08 | Airvana Lp | Femto personal policy server |
US8787174B2 (en) | 2009-12-31 | 2014-07-22 | Tekelec, Inc. | Methods, systems, and computer readable media for condition-triggered policies |
US20110158090A1 (en) * | 2009-12-31 | 2011-06-30 | Yusun Kim Riley | Methods, systems, and computer readable media for condition-triggered policies |
US9185510B2 (en) | 2010-03-03 | 2015-11-10 | Tekelec, Inc. | Methods, systems, and computer readable media for managing the roaming preferences of mobile subscribers |
US20110217979A1 (en) * | 2010-03-03 | 2011-09-08 | Petrus Wilhelmus Adrianus Jacobus Maria Nas | Methods, systems, and computer readable media for managing the roaming preferences of mobile subscribers |
US9917700B2 (en) | 2010-03-15 | 2018-03-13 | Tekelec, Inc. | Systems, methods, and computer readable media for policy enforcement correlation |
US8812020B2 (en) * | 2010-10-15 | 2014-08-19 | Tekelec, Inc. | Methods, systems, and computer readable media for location-based policy enhancement |
US20120094685A1 (en) * | 2010-10-15 | 2012-04-19 | Peter Joseph Marsico | Methods, systems, and computer readable media for location-based policy enhancement |
US8626156B2 (en) | 2010-10-20 | 2014-01-07 | Tekelec, Inc. | Methods, systems, and computer readable media for selective policy enhancement (PE) for high-usage roamers |
US8681622B2 (en) | 2010-12-17 | 2014-03-25 | Tekelec, Inc. | Policy and charging rules function (PCRF) and performance intelligence center (PIC) based congestion control |
US9106769B2 (en) | 2011-08-10 | 2015-08-11 | Tekelec, Inc. | Methods, systems, and computer readable media for congestion management in a diameter signaling network |
US9860390B2 (en) | 2011-08-10 | 2018-01-02 | Tekelec, Inc. | Methods, systems, and computer readable media for policy event record generation |
US9369910B2 (en) | 2012-07-14 | 2016-06-14 | Tekelec, Inc. | Methods, systems, and computer readable media for dynamically controlling congestion in a radio access network |
US9473928B2 (en) | 2012-07-14 | 2016-10-18 | Tekelec, Inc. | Methods, systems, and computer readable media for policy-based local breakout (LBO) |
US20160088608A1 (en) * | 2013-04-30 | 2016-03-24 | Telefonaktiebolaget L M Ericsson (Publ) | Radio communication policy allocation in a network node |
US10387680B2 (en) | 2014-06-12 | 2019-08-20 | Alibaba Group Holding Limited | Managing confidential information |
US9922208B2 (en) | 2014-06-12 | 2018-03-20 | Alibaba Group Holding Limited | Managing confidential information |
US9589150B2 (en) | 2014-06-12 | 2017-03-07 | Alibaba Group Holding Limited | Managing confidential information |
US9832203B2 (en) * | 2015-02-10 | 2017-11-28 | Fu Tai Hua Industry (Shenzhen) Co., Ltd. | Application permission management device and method therefor |
US20160234218A1 (en) * | 2015-02-10 | 2016-08-11 | Fu Tai Hua Industry (Shenzhen) Co., Ltd. | Application permission management device and method therefor |
US10103806B1 (en) | 2017-06-05 | 2018-10-16 | Binj Laboratories, Inc. | System and method for wrist band transmitter and system thereof |
Also Published As
Publication number | Publication date |
---|---|
CA2567596A1 (en) | 2006-02-16 |
MXPA06013986A (en) | 2007-02-08 |
US20060014547A1 (en) | 2006-01-19 |
WO2006017071A3 (en) | 2006-05-04 |
US7286834B2 (en) | 2007-10-23 |
EP1766803A4 (en) | 2010-12-22 |
WO2006017071A2 (en) | 2006-02-16 |
KR20070032673A (en) | 2007-03-22 |
EP1766803A1 (en) | 2007-03-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7286834B2 (en) | System and method for location based policy management | |
US11937083B2 (en) | Intelligent network access controller and method | |
US7535880B1 (en) | Method and apparatus for controlling wireless access to a network | |
US20070117558A1 (en) | Local area wireless airspace management | |
EP2375690B1 (en) | Locating devices in a data network | |
US6662014B1 (en) | Location privacy manager for a wireless communication device and method therefor | |
EP1836830B1 (en) | Controlling wireless access to a network | |
EP1989868B1 (en) | Secure voice communication channel for confidential messaging | |
US20090168667A1 (en) | Time based access provisioning system and process | |
US20080008140A1 (en) | Conditional utilization of private short-range wireless networks for service provision and mobility | |
Berger et al. | Ubiquitous computing using SIP | |
JP2008515310A (en) | Method and system for contextually starting a mobile terminal synchronization service in an enterprise environment | |
US8902839B2 (en) | Service/mobility domain with handover for private short-range wireless networks | |
Cheng et al. | Protection of privacy in pervasive computing environments | |
Brassil et al. | Traffic signature-based mobile device location authentication | |
Marotta et al. | NausicaApp: a hybrid decentralized approach to managing Covid-19 pandemic at campus premises | |
Mobile | Wireless Networks | |
CA2815923C (en) | Location aware data network | |
Vaha-Sipila et al. | BT-Crowds: Crowds-style anonymity with Bluetooth and Java | |
Singh | Mobile Computing | |
Brassil et al. | Securing a femtocell-based location service | |
Dodgson | Mobile terminal security and tracking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SBC KNOWLEDGE VENTURES, L.P., NEVADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SBC KNOWLEDGE VENTURES, L.P.;WALTER, EDWARD;REEL/FRAME:019809/0969 Effective date: 20040827 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |