WO2013078408A1 - System for providing intelligent network access selection for a mobile wireless device - Google Patents

System for providing intelligent network access selection for a mobile wireless device Download PDF

Info

Publication number
WO2013078408A1
WO2013078408A1 PCT/US2012/066389 US2012066389W WO2013078408A1 WO 2013078408 A1 WO2013078408 A1 WO 2013078408A1 US 2012066389 W US2012066389 W US 2012066389W WO 2013078408 A1 WO2013078408 A1 WO 2013078408A1
Authority
WO
WIPO (PCT)
Prior art keywords
radio
access point
mobile device
access
connection
Prior art date
Application number
PCT/US2012/066389
Other languages
French (fr)
Inventor
Pertti Visuri
Randy Salo
Christian VAN HAMERSVLED
Original Assignee
Bandwidthx Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bandwidthx Inc. filed Critical Bandwidthx Inc.
Priority to CN201280057965.3A priority Critical patent/CN103959863B/en
Priority to BR112014033163-4A priority patent/BR112014033163A2/en
Priority to EP12851159.9A priority patent/EP2783535B1/en
Priority to EP18151712.9A priority patent/EP3358792A1/en
Publication of WO2013078408A1 publication Critical patent/WO2013078408A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5691Access to open networks; Ingress point selection, e.g. ISP selection
    • H04L12/5692Selection among different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • H04W36/36Reselection control by user or terminal equipment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • H04W52/0229Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is a wanted signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/542Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/15Setup of multiple wireless link connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/32Reselection being triggered by specific parameters by location or mobility data, e.g. speed data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • Mobile devices use wireless communication services provided by one or more mobile operators and/or technology companies.
  • the wireless communication demand is often higher than the mobile operators and technology companies can provide.
  • the subject matter includes a method for enablin alternative network access implemented for a mobile wireless communication device.
  • the method includes receiving information associated with a mobile device; the information comprises location information associated with the mobile device. Based on the information, associated wi th the mobile device, identifying an. access point available for providing connectivity services to the mobile device, the access point is not the computing device, information is provided to the mobile device winch is associated with the access point,
  • the information cab comprise at least one of usage terms, usage conditions, usage costs, access point characteristics, connection characteristics, access point capacity, and access point security access information. Osage information is received from at least one of the mobile device and the access point,
  • Another aspect include a method fo obtaining alternative network access implemented by a mobile device having a first radio and a second, radio.
  • the method includes; using the first radio in a connection,. Hie throughput of the connection being above a threshold is detected. Based on access conditions, an. access point to establish a second connection, using a second radio is determined. The second radio is then turned on. A connectivity test is performed with the access point using the second radio, A second, connection is established using the second radio.
  • a method for obtaining alternative network access is implemented by a mobile device having a first radio.
  • the method includes determining to turn on the first radio based, on tire expiration of a wake-op-interval .
  • the wake-up-interva! is determined based upon one or snore of predetermined application being executed, a location of the mobile device, the dropping of a previous .connection, or a time period.
  • An access node is identified using the radio.
  • a connection is established with the access node using the first radio,
  • a connectivity test with the access point is conducted using the first radio.
  • a further aspect includes a method for obtaining alternative network access for a mobiie device having a first radio and a second radio, or in some eases, onl one radio.
  • the method can include using a first radio in a first connection with a first access point. Whether t establish a second connection with a second access point using a second radio is determined. The deiern.iirtat.ion is based on a first set of access conditions associated with the first access point and a second set of access conditions associated with tire . second access point The second connection is established with the second access point using the second radio based on the determining, which indicates establishing the second connection.
  • Another aspect includes a method for obtaining alternative network access implemented by a mobile device having a radio.
  • the method includes identifying an available network access point, A determination whether to establish a connection with the identified access point is .made based on. a first set of access conditions associated with the ident ied access point. A connection with the identified access point is made using the radio based on the detemunhig, which indicates establishing the second connection.
  • FIG, 1 A is a functional block diagram of an overview of an example system for providing alternative network access.
  • FIG, IB is the example, system for providing alternative network access of
  • FIG. 1 A with financial components
  • FIG. 1 C is a functional block .diagram of a example of an access point configuration.
  • FIG. I D is a function block diagram of an alternative example of an access point configuration.
  • FIG, 1 E is a functional block diagram of a wireless mobile device.
  • FIG. 2A is a functional block diagram of an overview of another example system for providing alternative network access.
  • FIG. 2B is a functional block diagram of the example system for providing alternative network access environment of FKX 2 ⁇ with financial components.
  • FIG. 3 is a flow chart of an example process of maintaining connectivity in. a where a mobile device may be changing locations.
  • FIG. 4 is a flow chart of an example process of maintaining connectivity in an environment where information for connectivity may be provided by access points and -non- access p ints:
  • FIG. 5 Is a data and process flow diagram of an example implementation of system for providing alternative network access
  • FIG. &A-B are data and process flow diagrams of other example.
  • FIG. 7 shows an example process for managing radios.
  • FIG. 8 a block diagram illustrating an example wireless communication device
  • FKI 9 is a block diagram Illustrating an example wired or wireless processor enabled device that may be used in connection with various embodiments described herein.
  • FIG. 10 is a functional block diagram of an example computing environment with an example computing device suitable for use in some example implementations.
  • FIG. 1 A is a functional block diagram of an overview of an example system for providing ' alternative network aeeess.
  • a system for providing alternative network access may include one or more mobile devices (e.g., mobile device 1 10) that use wireless connectivity services and one or more providers of wireless connectivity services (e.g., connectivity providers 120-125 and 130).
  • mobile devices e.g., mobile device 1
  • providers of wireless connectivity services e.g., connectivity providers 120-125 and 130.
  • the system tor providing alternative network aeeess may include the like of one or more selection engines 1 12 and 152, one or more proposal engines 126 and 156, accounting engines i 16 and 128, and an alternative network acces provider (ANAP) 150.
  • the alternative network access provider environment includes structures and fonciions thai enable exchange of connectivity services (e.g., matching connectivity service providers with connectivity service users).
  • Alternative network access provider environment 100A shows, for example., that a mobile device 11.0 may be within communication reach with connectivity providers 320-125 and 130.
  • mobile device 1 10 may be device that uses wireless communication (e.g., a smartphone, tablet device, lapto computer, etc.).
  • Connectivity providers 120-125 which may collectivel ' he referred to as access points/' may provide wireless communication to wireless devices (e.g., using one or more wireless communication protocols).
  • An access point may be any source source of connectivity, in other words, any source of connectivity, e.g., connectivity providers 120-125 and 130, may be referred to as an access point.
  • An access point may be stationary with a wi ed connection through m ISP to the Internet or another communication network.
  • An access point may be mobile device connected to, for example, a 3G or 40 network or any available connection (e.g., for backhaul) to the Internet or oiher communication network.
  • the raobile device e.g., serving as an access point
  • An access point is - device that provides wireless connectivity to a communication network utilizing any wireless protocol (e.g., the above mentioned protocols ⁇ that enables a mobile device to establish a connection, to a communication -network.
  • a communication network is any network and/or access thai, in combination or alone, is capable of providing data to a mobile device.
  • One example of ation network is the internet.
  • Access points 120- 125 may be owned and/or operated by different entities.
  • Connectivity provider 1 0 may be one or more cells (e.g., eel! towers) of a cellular network.
  • Connectivity providers 120- 125 and 130 are equipped and/or configured with the capability to provide connectivity services to. mobile device i 10 tor voice and/or data communication.
  • Each of the connectivity providers 120-125 and 1 30 may use one or more wireless communication protocols, such as 2G (e.g., GSM, GPRS, EDGE, iDEN, TDMA.
  • 2G e.g., GSM, GPRS, EDGE, iDEN, TDMA.
  • CDMA Code Division Multiple Access
  • 3G e.g., CDMA2000, I -SBViX
  • P2S-LMR WCDMA
  • UMTS UMTS
  • EISPA EISPA
  • 4G e.g., LTE, WiMAX
  • VOIP IMS
  • IPTV IPTV
  • WLAN Wi-Fi
  • Wi-Fi e.g., one or more of the family of 802.1 1 standard from IEEE and the like
  • Bluetooth and other radio-based, wireless, protocols, to communicate with mobile devices (e.g., mobile device 1 10).
  • the protocols e.g., those of 2G, 3G, 4G, LTE and later
  • Mobile device 1 1 0 is equipped and/or configured with the protocols used by the connectivity providers to communicate with mobile device 1 10.
  • Access point 120 may, for example, be a Wi-Fi access point owned and/or operated by the use of mobile device 1 10, Access point 121 may be a free access point (e.g., provided at a city library), access point may be a commercial-based access point, access point 123 may be provided (e.g., for a fee or subscription) by a vendor or business (e.g., a coffee shop or an internet service provider), and acces point i 24-125 may be provided b other persons, businesses, and/or entities.
  • Connectivity provider 1 0 e.g., a mobile network operator
  • connectivity provide 130 may support 3G and/or 4G (e.g., ⁇ , ⁇ , WiMAX) protocols.
  • 3G and/or 4G e.g., ⁇ , ⁇ , WiMAX
  • Services provided by connectivity providers 120-125 and 130 may be "announced' * r broadcasted to mobile device 1 10 and/or alternative network access provider 150 using, for example, proposal engines.
  • the proposal engines can be implemented in the access points 1 0- 125 (e.g., proposal engine 126 in access point 124), in a network (not shown), or on computing devices (e.g., data center, servers, etc.) of alternative network access provider 150 (e.g., proposal engine 156) thai communicates with the. mobil device 1 10.
  • The. roposal engine provides, for example, access or a .reference to the terms and conditions (e.g., terms and conditions 155) for using a particular connection or connections.
  • Mobile device 1 10 may determine whether to use services provided by a connectivity provider based on its; terms and conditions and possibly various oilier data front other source including measurements of signal strength or other parameters by the device.
  • Mobile device 1 10 may use connectivity services for a new communication or a existing communication (e.g., changing and/or adding connectivit services). For example, when mobile device 1 10 needs* to initiate a new communication, mobile device 1 10 may receive information on available access points and select one, two, or more access points to use tor the new communication based on the provided information about the access points ⁇ e.g., terms and conditions for connectivity services and possibly various other data from other sources). Mobile device i 10 may change or add connectivit services providers for an existing communication.. For example, when mobile device 1 10 has changed location or the characteristics of the existing communication (e.g..).
  • mobile device 1 10 may request information on available access points and select one or more access points to use for the existing communication based on the provided information above the access points (e.g., terms and conditions tor connectivity services and possibly various other data from other sources).
  • Information on and/or about an availabie access point e.g., access point 124
  • the access point e.g., may be pro vided by the access point (e.g., may be pro vided by the access point (e.ganging engine 126 of access- oint 1.24) and/or alternative network, access provider 150 (e.g., proposal engine 156).
  • Mobile device 1 10 may determine* select or identify one or more available connectivity providers 120- 125 and 130 to connect with (e.g., for connectivity services) using a selection engine.
  • a connectivity provider may be selected exclusively for a specific application (e,g., a gaming application).
  • the selection engine can be implemented as a module that can work inside the mobile device 1 1 (e.g., selection engine 1 12 ⁇ or on computing device of alternative network access provider 150 (e.g., selection engine 1 2 ⁇ that communicates selection with the mobile device 1 10, or as a cooperative combination of functions executed on the mobile device 1 1.0 and on a server computer o alternative network access provider 1.50.
  • a selection engine may determine to select a connectivity provider based on information associated with the specific access point as established by the connectivity provider (e.g., terms and conditions of connectivity services). Tire connectivity provider controls and/or manages the access point and its connection to the communication network or the internet In some implementations, information associated with a currently used access point may be considered in deciding to select art alternative or additional access point. Once a determination is made to select an access point the access point may be selected using any identifying information (e.g., a SSIIX BSSiD, MAC address, a unique identifier, a combination thereof, or the like).
  • identifying information e.g., a SSIIX BSSiD, MAC address, a unique identifier, a combination thereof, or the like.
  • Services used e.g., by mobile device ! 10 and services provided (e.g., by a connectivity providers 120- 125 or 130 ⁇ may be accounted for using accounting engines.
  • the accounting engines can be implemented. in mobile device 1 10 (eg., . accounting engine 1 16) and/or in one or more access points .120-125 or in another computing device in the network connected to the access point, for example in an access control gateway (e.g., accounting engine 128) thai keep track of the usage of the connections and report it to the alternative network access provider 1 SO.
  • the accounting engines 12 in the access point or network or access control gateway are controlled by the connectivity provider that controls and -manages the access points. In these cases they may not report the usage to AN AP 150 but rather use the usage records collected by accounting engine 124 as a means of auditing the usage records collected by the accounting engine 1 16 and reported to ANAP 150, Fo example, during or after the end of a communication, mobile device 110 may report usage records 1 18 to ANAP 150.
  • An access point (e.g., access point i 24) used by mobile device 1 10 may report usage records (not shown) to A AP 1 50 or use them tor auditing purposes as mentioned above, ANAP 150 may store usage records (e.g., usage records 158) for reporting, billing, and/or issuing payments tor the connectivity services on record (to be described in FIG. 1 B below).
  • usage records e.g., usage records 1548
  • one or more accounting; etigirs.es can be implemented outside of mobile device 1 10 and access points 120-125, such as at an access gateway server in the network and or on one or more servers of the alternative network access provider 150.
  • a alternative network access provider environment which may he referred to as an "alternative network access provider ecosystem" (e.g., proposal engines, selections engines, accounting en ines ⁇ and alternative network access provider 1 50, all of which are described in further details below) enables wireless devices (e.g., mobile device i 10) to use wireless connectivity services from a variety of connectivity services providers (eg., access points 120425). From -the perspective of the connectivity services providers . , an alternative network access provider environment enables connectivity services providers to provide services to different wireless devices,
  • the al ernati e network access provider environment enables commerce or micro-commerce on providing data connectivity (e.g., bandwidth or data connectivit or transfe services measured either as the number of bytes transferred over each connection o as time the connection wa available or an oilier parameter recorded as a usage record).
  • data connectivity e.g., bandwidth or data connectivit or transfe services measured either as the number of bytes transferred over each connection o as time the connection wa available or an oilier parameter recorded as a usage record.
  • Embodiments of alternative network access provider can-include agreements (e.g., terms and conditions 1 55 ⁇ with wireless operators/service provider ⁇ .! 70 and 180» FIG. IB) and/or individual mobile device users (e,g., user of mobile device 1 10 ⁇ as well as with a number of individuals and/or companies that own or control Wi-Fi access points 122- 125, and with wired and/or wireless Internet service providers (190, FIG, .1 B).
  • an Internet service provider may deploy access point 123 as
  • FIG. 1 B is the example system for providing alternati ve network acces of FIG. 1 A with financial components.
  • One or more wireless operators 170 may sponsor one or more access points owned, and/or operated by connectivity providers 1.20-125 to provide connectivity services to mobile devices contracted with the wireless, operators 1.70.
  • Other sponsors 180 e.g., online retailers, .financial institutions, employers, gaming service providers, advertisers, etc.
  • Internet service providers (ISPs) i 90 may own and/or operate access points 123 and. 125 to provide connectivity services, hi the example of environment 1 OOB, ANAP 150 may serve as an enahler to match the connectivity providers 120-125 and connectivity consumers (e.g., mobile device 1 10).
  • ISPs Internet service providers
  • FIG, 2A is a functional block diagram of an overview of another example system for providing alternative network access.
  • FIG. 2B is a functional block diagram of the example system for providing alternative network access environment of PIG, 2A with financial components.
  • PIGs. 2A ⁇ B are similar to PIGs. 1 A-B except for mobile devices 2.10, 220, and 222, Mobile devices 210, 220, and 222 each is shown with a selection engine, a proposal engine, and an accounting engine.
  • I PIGs. 2A ⁇ B, mobile devices 210, 220, and 222 may function as connectivity service providers. For example, as shown, mobile device 210 accesses connectivity services provided by mobile devices 220 and 222.
  • a mobile wireless device that participates in the alternative network access provider system may have the ability to establish multiple wireless connections and/or change one or more wireless connections. For simpl icity a system that utilizes both Wi-Fi and 3G wireless connections is described, but the same ' solution can include other available wireless connections (2G and/or 4G, Bluetooth and/or an other wireless radio access).
  • Managing this connectivity in the mobile device or available to the mobile device through a network connection and operating on an alternative network access provider server system is a module referred to as the selection engine 1 12 and 152.
  • the selection engine bases its operatio on rules and policies 1 14 and 15 that have been set either by the wireless operator or the end- user of the mobile device 1 1 G ⁇ or any combination of rules and policies S 14 and/or 154.
  • the roles and policies 1 14 together with, information abou t access points in the vicinity of die mobile device may be downloaded to the mobile device and are subsequentl used to make an initial decision of connecting using the selection engine 1 12 when no other network connection of sufficient quality and speed is available, This initial decision may be based on a simpler and les dynamic set of rules and information.
  • the rules and policies 154 by selection engine 152 are used together with other information to revisit and possibly revise the initial selection.
  • the rules and policies 154 may have a higher frequency of updating than the rules and policies 1 .14, Also the rules and policies .154 may be more complex and include more parameters than the rules and policies 1 14. in ease the decision is revised to abandon the connection because a rule or policy 154, there may be a minimum time period until the connection is severed to avoid a negative user experience of enjoying only a momentary connection.
  • the rule and policies 1 14 and/or 154 control whi ch of the available connections will be selected at any given time for each of the- applications that need a data connection.
  • the level of ' sophistication in the selection process may vary among different implementations.
  • the following iactors may be included in the decision-making (e.g., in. selecting the connections to use). These factors or a subset of these factors maybe collected (e.g., data associated with the iactors ⁇ for each connection that the mobile device 1 10 can deieci at the time of selecting the connection to use for each application.
  • the factors or access conditions include:
  • the Ask price is very specific io the access point and may depend on a number of factors inel tiding time of day, day of the week or month, dynamic network operating parameters such as the load. It may also depend on the characteristics of and parameters associated with the mobile device for example the service provider associated with the device.
  • the Ask price may also be dependent on the buyer of " connectivity services
  • the offered (Bid) price may depend on a number of other parameters as well, including the day of the week or month, the cell tower or other access point that the device is connected to, dynamic net work, operating parameters of the currently used network and other information available to the ANAP 150 system or the mobile device. These may include information about the mobile device, its contract with a cellular service provider or the association of its end user with other organizations. For example, if the end user has a subscription with a certain connectivity service provider (possibly eabfe broadband service provider) and the particular access point for which the price is being offered beltings to the (hot spot) network of the connectivity service provider. the Ask price may he set to zero, while it would not be zero for end users that d not have such subscription
  • the cellular service provider is the buyer, but the buyer may also be a sponsor, for example a company that provides access to data when a specific application is " n top" or the main active application on the device.
  • the buyer may also be the end ser of a device.
  • Each buyer may have, a different offer (Bid) price for the connectivity service
  • connection decision may be affected.
  • Another example is a situation where the device is connected to an access point 120 to 125, hut the speed of the connection or packet loss or other parameter falls belo set limits. In this case the decision about the connection would he revisited using the new information about tbe existin connection
  • the mobile device may conduct a speed test or other performance test of its connection to the access point 120 to 125 or 130 at any time, for example immediately after establishing the initial connection.
  • the speed or performance test may be based on. observing the
  • implementation utilizes criteria that includes (he data transmission speed observed, immediately before connecting to the new access point. For example the decision to connect may be reversed if the data transmission speed is not higher than it was before changing the connection
  • some of the connection, alternatives may have lower cost or be free.
  • one or more access point e.g., access point 122 ⁇ but may be sponsored by a business thai provides free wireless access in exchange with acceptance of commercial messages and advertising.
  • Business entities e.g., gaming companies
  • service providers or vendors may sponsor connectivity that allows the end user to visit their website and make purchases.
  • Other access points may oiler lower
  • -lb- cost or free connectivity require the right to collect location-based information of the user or may require responses to surveys.
  • One example of useful location based information would be to collect the GPS system location of devices at specific intervals to measure the speed of traffic flows on roads and freeways. This couid be a commitment by the mobile device user that would be valid even when the system is connected through die regular 3G network, but could still earn privileges to use alternative network access provider connections as a form of compensation.
  • the selection engine is the function that makes the selections about which data connection to use for each of the applications in the Mobile wireless device. I one embodiment this is done on a real time moment-to-moment basis based on the rules and policies and current information, including- price information and possibly other information as listed above, about each available connection. This information ma e available directly from the access point for example by using the recently established 802,3 lu communication standard, or it may be obtained from the alternative network access provider SO based on a reference system that is explained in more detail in the section proposal engine below,
  • the selection engine uses specific criteria set by the operator or the device user that authorizes the use of connections based on combination of two main parameters; The speed or other quality parameter of the connection that is currently available to the device (in the 3G or 4G system from the operator) and the cost of an alternative (supposedly better or faster) connection through the alternative network access provider system.
  • the system may have thresholds for the quality parameter and acceptable cost. For example the tiers could he: a) at 300 kb per second and cost of up to three cents per megabyte is authorized b) at. 100 kb per second, the cost of up to five cents per megabyte is acceptable; and so on.
  • the mobile, device 1 10 will send the set of selection factors and parameters to the selection en ine; on the computer system and the selection engine will return to the mobile device the identifying information and the necessary authentication information tor connecting to a connectivity provider that will provide the selected con.ncci. oii.
  • the mobile device will use the selection factors available from ihe proposal engine (as described in the next section) to make the selection of an access point through which it will establish a connection. It will, then communicate this information to alternative network access provider 150 and in return receive the aihhentieation information that will enable the connection.
  • the authentication information can be, tor example, transmitted and/or exchanged using a protocol (e.g., 802.1 I ) that is the same or different from the protocol used in eoinmuni cation,
  • the selection engine will compare the offered selling ' price (Ask price) and the offered buy price (Bid price), which both are dependent on a number of parameters as described above, in eases that the Ask price plus a possible commission or other compensation for the ANA P system added on by the selection engine is lower than the Bid price the selection engine establishe a clearing price for the connectivity service.
  • This price may be a price per Byte transmitted or time of connecti ity or any other parameter, " This clearing price is then applied by the accounting engine tor establishing the necessary payments and settlements between the buyer and the seller.
  • the selection engine will provide to the mobile device any information that is necessary to establish the- connection through the selected access point.
  • This authentication and authorization information may include wireless passpjbrases or passwords, account identification information and passwords, it may also include credentials for an access control gateway, it may include detailed information about how to post the user name and password to a page on an access control captive portal page or it may include digital certificates and other more advanced access contra! tokens and parameters.
  • the selection -engine controls these authentication and authorization elements, which may be stored in encrypted form either in the selection engine database within the selection engine 1 12 or 152. in case of storage in i 12 the parameters may be downloaded together with the other information about the access points in the vicinity of the mobile device. These parameters may have expiration times and they may be changed at.
  • the parameters are made available to the mobile device's connection functions only at the time of connection and are subsequently erased f om its memory.
  • the end user will not have any access or visibility to the authentication or authorization parameters used by the selection engine, except, in cases where the end user provides such parameter for the system t use,
  • the mobile wireless device based on the connectivity selections and subsequent data traffic through each connection the mobile wireless device creates a detailed record on the actual use of each of the alternative connections utilizing another module called the accounting. engine.
  • the accounting engine transmits the usage record to the alternative network access provider I SO, including its own identifying information -and the identifying information of each of the access points that provided the connectivity for each use, identification of the selected buyer of the connection, the negotiated pri ce point for the connection, as well as information about the terms and conditions in force at the time of the use.
  • the usage data can be in the form of numbers of sent and received data bytes, time duration of connectivity or any other relevant variable describing the use.
  • the usage data collected at the mobile device may also include information about the application that was using th data and about websites or other resources that were accessed by the application during the data use. This information may also include other parameters of the connectivity service, for example the connection speed, jitter, latency or other performance characteristics, it may be collected by the mobile device (e.g., using its accounting engine) for ail of the data including both the data provided by the alternative connections 120 to 125 and the connection 130 including in situations where 130 is the cellular data service provider for the mobile device.
  • This information may also include other parameters of the connectivity service, for example the connection speed, jitter, latency or other performance characteristics, it may be collected by the mobile device (e.g., using its accounting engine) for ail of the data including both the data provided by the alternative connections 120 to 125 and the connection 130 including in situations where 130 is the cellular data service provider for the mobile device.
  • This data may be commtmicated to A AF ISO and used in directing billing to possible sponsors of wireless connectivity, for example providers of game" or other e tertainment applications or content or companies that wish to sponsor visits to their web sites where they may sell goods or services,
  • the operating system e.g. Android or iOS, or
  • Windows operating system in the mobile device enables use of mobile data by any application and regardless of the web sites or resources that are accessed.
  • the ANAP system and the accounting engine may include a specific browser versio for accessing web sites and other resources on the network that controls and limits the resources that can be accesses using the accounting engine controlled browser.
  • the browser/accounting engine also includes- a module that keeps track of the web sites visited and other resources accessed and stores the .number of- bytes used for each access of a web site/web page or resource. This information can then later be used to allocate usage per resource.
  • the system can be used to enable third parties, such as gaming application providers, web stores or content providers sponsor or provide free or reduced cost access to end users specifically for accessing their products and services on the web.
  • the tracking may cover any and all available access points and networks -and the stored usage data can be used by the A AP to provide appropriate crediting of charging records to accumulate the costs according to the sponsorship arrangements.
  • This information could he sold to wireless network, operators or be made available (possibly for a fee or in the form of a marketing campaign) "to owners, or potential future owners of access points, or residents or owner of buildings and other structures in each area.
  • the information could he used by such operators and owners to make decisions about pricing or adding capacity in the form of registering existing access points with alternative network access provider, installing new Wi-Fi access points or other alternative networks.
  • selection engine may use several different radio connections simultaneously. These may be selected individually tor different applications running on the mobile device o may be aggregated to provide a higher total data
  • the selection engine uses a combination of information to Implement the rules and policies for selecting connectivity. For example, it is aware of the connections provided directly by the wireless operator using their own network and is familiar with the connectivity through access points thai have been, configured to the wireless device by the end user. For example, these would include the access points at the user's home and office and other locations where free connectivity is available.
  • each access point in order to participate in providing the enhanced connectivity through the alternative network access provider, each access point must have a proposal engine or provide a reference to a proposal engine.
  • the proposal engine (e.g., proposal engine 126 or 156 ⁇ may be implemented, for example, as a module for or associated with each access point.
  • a proposal engine associated with an access point provides information about that access point (e.g,, the availability, connectivity services provided, and/or other information) to mobile devices (e.g., to the selection engines associated with, the mobile devices). This information .may include the terms and conditions including the price (Ts&Cs) of use of connectivity through die access point and may include detailed information about t he characteristics of the connection. Implementations of the proposal engine may vary depending on the sophistication and capabilities of the access point device and the organization or individual that owns or controls the access point as well as the technical and business arrangements that provide the internet connectivity for the access point.
  • a proposal engine associated with an access point may be deployed outside the access point (e.g., by a computing device on a network, at a cloud computing resource of the alternative network access provider or its partner, etc . ).
  • These implementations allow access points that can only broadcast their SSID and/or a unique identifier (e.g., a BSSiD, MAC address, etc, ⁇ to be used in an alternative network access provider environment to provide connectivity services to snore mobile devices (e.g., mobile devices not manually configured to use the access points),
  • Seiection engines of mobile devices that can receive the beacons of the specific access point can obtain the Ts& s and other information from the alternative network access provider by using the identifying information (for example SSID, a BSS I D, MAC address, a unique identifier) of the access point as a reference, in one possible implementation this is facilitated by including in the SSID of the access point an indication or information about its participation in alternative network access provider (for example by including a specific string of characters, such as the letters "AN AP" in the SSiD).
  • the selection engine may check for the Ts&Cs at an alternative network access provider without having to go through lists of participants' BSSIDs ⁇ or MAC addresses, unique identifiers, etc.).
  • alternative network access provider provides periodic downloads of BSSIDs (or MAC addresses, unique identifiers, etc.), SSlDs, location, associated Ts&Cs, and any other identifying information, about the participating access points that are located in the vicinity of the current location of the mobile device. This expedites access to the relevant Ts&Cs and makes it possible to have this information available even in situations where the device does not have an open data, connection to the internet or alternative network access provider (e.g., cellular devices that cannot see a. cell or WhFi-oniy
  • the location information can be obtained from the mobile device's GPS s stem if available or by having the access ' point transmit SSl ' D's (or BSSlDs, MAC ' addresses, unique identifiers, etc.) of access points (whether alternative network access pro vider registered or not) in its range and having the alternative network access provider system correlate these to a database of access point locations.
  • alternative network access provider can extend the range of access points to- include in the direction, of the movement. This process of maintaining connectivity in this alternative is illustrated in FIG. 3. .
  • the downloads may be scheduled to happen n regular intervals or they may be scheduled to take place every time a device has network access (possibly establishing a minimum interval between downloads). This mechanism is particularly important to enable devices that may only have one network access system, such as a. WiFi only tablet or Personal Computing device.
  • FIG. 3 is a flow chart of an example process of maintaining connectivity in a where a. mobile device may be changing locations.
  • a mobile device may trigger or request information about available access points (e,.g.,. access points not already configured or set up to use by the mobile device).
  • a mobile device may provide the current information location to an alternative network access provider (ANAP) computer system or server.
  • ANAP system may compile one or more (e,g., a list) of access points (e.g., those in the vicinity of the mobile device and/or available for use) that have been registered to provide connectivity services In the ANAP system.
  • the ANAP system may provide ⁇ e.g., via a download) information about one. or more access points to the mobile device.
  • the information about an A may include:
  • the party that is offering the connectivity services (Oris party may be referred to as a source, supplier, seller, provider) • the offered price, that can be used for all circumstances, at least for the first connectivity for a few minutes, until the device can connect to the sever to get an updated price (this is important to make the system work for Wi-Fi only devices and under conditions where cellular devices are out of coverage or congestion makes it impractical to get a current quote over the cellular network).
  • N t that the offered price may he specific to the mobile devi ce, a type of device, a user, class of users, etc.
  • the server ma be aware of attributes about the device and can tailor the pricing in accordance of tire device
  • a sponsor may be a party that is going to be paying for the connectivity services.
  • a cellular service provider may sponsor or pay for the services made available to users of the cellular service provider.
  • a business e.g., a coffee shop or online gaming provider may be a sponsor to allow patrons of the coffee sho or users of the gaming providers to gain free- access to connectivity services (to be paid for by the sponsors).
  • a device owner can be a sponsor (e.g., a subscriber of ser vices that include the connectivity services provided by the access points.
  • This information is made available for a number of access points within a certain radius (e.g., .10. miles) around the ciirrent location of the device (or around a location that the device owner has specified through the user interface.
  • the mobile device may compare connectivity options (e.g., with existing/us ng and/or other access points, using current rules and/or policies) then scan for access points and obtains identifying information for the oiies hi ra ge. It also measures the si nal strengths of each.
  • the device then combines the pre-loaded information and locally available information from the device to make the determination of which connection is the best, in one.
  • the rule may be as follows; set a threshold value for the signal strength (this would typically correspond to a good signal, adequate to get a good high speed connection) above this signal level the decision is made based on price. The lowest cost wins. Below the threshold decision of choosing the AP is based on signal strength. As long as the offered buy price is higher than foe offered sell price, the AP with the best signal is selected. Once a connection is established it .may be re-evaluated in light of the above rules and information if the signal strength falls below a set threshold, or it is possible that a tinier is set to re-valu.ate at specific intervals to see if a lower cost or a better signal connection is available. The intervals may be static or they may be dependent on the price of the connection or any other parameter known, to the device.
  • a connection or communication may be transferred from an existing connection to the newly established connection.
  • the mobile device and/or the access point at the other end of the existing connection may disassociate the communication.
  • the mobile device and/or the newl identified access point at the other end of the new connection may associate the communication.
  • the mobile device may report details of use of a previous connection (e.g., one that has been disassociated) to the ANAP system (if the access to the disassociated access point is facilitated by the ANAP system).
  • usage information may be stored by the ANAP system for billing, payment, analysis, and/or other purposes,
  • the access point may store the Ts&Cs and other information and provide them directly over the wireless li nk to the selection engine of each mobile device that is requesting to receive them. This could be done using the 802.1 1 u standard if both devices are capable of using this protocol It maybe that » n itbround two-way negotiation (or an auction) about the Ts&Cs is automatically carried out between devices. In this case the access point may be offering a price, the device ooukl counter with a lower price and the policies in the AP may enable it to .offer another price based on the counter oiler and so on.
  • the Ts&Cs may have short period of validity and connectivit may be renegotiated at specific intervals as situations in terms of needs and available capacity will constantly vary, in case the proposal engine for the access point is implemented at the alternative network access provider the validity periods will he automatically downloaded to the mobile device together with the other terms and conditions by the selection engine, in case both the selection engine and the proposal engine may be hosted on servers of the alternative network access provider the information about the Ts&Cs and their validity periods is made available to both within the compute system environment.
  • the alternative network access provider system can instruct a mobile device to immediately terminate a connection with an access point and can temporarily or permanently block the mobile device from that access point.
  • * price of using the connection This may vary according to- time of day or the day of the month or year and may depend on other variables some of which may be quite dynamic such as current demand from other selection engines.
  • connection information about special promotions or sponsorship for the connection.
  • connections may be sponsored by advertisers.
  • the nature of the products being advertised and the frequency and obtmsiveness of the advertisements needs to be communicated to the selection engine for good decision-making.
  • some end users may be interested in advertisements of topics that are close to their heart but may .not accept advertisements of other topics,
  • access points may belong to a network, of hotspots controlled by a wireless operator or wireless ISP that, offers fixed fee or oilier special pricing to subscribers of their services, in case the -mobile device is subscriber to the network the terms and conditions would normally be stored in the selection engine and the hotspot access point would provide information identifying it belongs to the group (for- example, in its SSID).
  • the hotspot access point would provide information identifying it belongs to the group (for- example, in its SSID).
  • information about the AP belonging t a specific group of wireless ISF hotspots and its impact to the cost of using it can he communicated through the proposal engine jost like for other access points.
  • the carrier's proposal engine may instruct the selection engine in a wireless device at a. particular time to seek th.e lowest price alternative even. when, the tower or cell connection would be available, if the load .on the tower or cell connection is high.
  • connection wil l Whether all of these factors are included in the decision-making about the connection wil l depend on the level of sophistication on the proposal and, selection engines. For example, it is possible that the selection engine is capable of selecting based on signal strength and price. However, more sophisticated decisions are possible by providing more information and alternatives in the terras and conditions by the proposal engine and increasing the capabilities in the selection engine.
  • eac mobile device participating in the alternative network access provider system will use connections through different access points at different times.
  • each mobile device has an accounting engine.
  • Many of the access points may use either an. embedded or a cloud-based accounting engine to track ' the capacity that it has provided to various mobile devices.
  • the accounting engine may use the RADIUS standard.
  • the accounting engine collects and provides the data for the micro-commerce
  • the accounting engine keeps track of the capacity utilized by the mobile device through each of the connections that are enabled by the alternative network access provider as well as the specific: terms and conditions and the clearing price established between the proposal and the selection engine for each specific use of the connectivity.
  • each mobile device needs to have an accounting engine or be covered by an accounting engine that is implemented on a gateway server connected to the access point.
  • the accounting engine is implemented in the mobile device or as a spli implementation with one part being implemented in the mobile device for reporting the usage and another part being implemented on a server computer at the alternative network access provider.
  • the accounting engine receives the usage reports from the mobile device and/or the access: point or gateway server. At least in a part of the connections the accounting engine receives a usage report both from the mobile device and from the access point or gateway server.
  • accounting engine tha can collect informatio about usage of data capacity by each mobile device. If such records are collected and made available to the alternative network access provider they may be recompiled and used to verify the usage records provided by the accounting engines in the mobile devices. In (me implementation the system of the alternative
  • nv network access provider automatically logs into the administrator's interface of the registered access points (using credentials provided by the access point owners during initial registration with the alternative network access provider) in order to retrieve information about usage of connectivity by various mobile devices.
  • This capability and function may be utilized in a subset of access points; however, even so it provides a very useful auditing function to control that the reporting by the mobile devices is accurate,
  • the alternative network access provider manages all the information, to enable the micro- commerce between owners of access points, the ISPs., wireless operators and possible the end-users of mobile devices.
  • the exchange further manages the billing and payments between all parties (see FIG, I B),
  • the alternative network access provider is implemented as modules on a server.
  • access points can have dual SSIDs and may establish priorities for traffic in each identity. This way a hom user can dictate that any traffic routed to the homeowners own devices will have priority and onl excess capacity in the connection is made available for commerce through the alternative network access provider. In other cases people can set up separate access points connected to the Ethernet ports of their home gateways and register these for the alternative network access provider. In yet other implementations the systems have provisions and policies to allocate different priorities for traffic with different client devices, in these cases the access point owners ma eithe manually select high priority devices or the system may be programmed to automatically give higher priority to devices with high signal strengths, and frequent long term connections (presumably devices that belong to the. owners of the access points).
  • the access point or gateway has the capability of transmitting its price and other proposal information directly to connected devices (for example by utiliz n the 802. 1 i u protocol) then that may be the preferred mechanism of automatically negotiating commerce on connectivity.
  • the access point owner can store terras and conditions at the alternative network access provider linked to its specific BSSID, MAC address, unique identifier, etc, and other identifying information.
  • the selection, engine will get the terms and conditions from the alternative network: access provider.
  • the alternative network access provider can be proactive and download the SSID's, authentication information and Ts&Cs for using the connection automatically to the mobile device for all the alternative network access provider registered access points that are in the vicinity of the mobile device at any given time.
  • the location of the mobile device can be made available to the alternative network access provider either by transmitting the OPS. coordinates of the device or by transmitting information about access points in range of the mobile device or by well known network based triangulation methods.
  • the alternative network access provider can correlate this information to a database about location coordinates of access points,
  • the second large set of information that the alternative network access provider manages is the usage records, As selection engines make decisions about which connections to use for various applications, the wireless device will transmit and receive data using different access points at different times.
  • Usage data may include, for example, the amount of data transmitted and received, which can be broken clown by time of use, the application that transmits and received data. etc.
  • the mobile wireless device received the proposal engine information directly from the access point, the term and conditions and clearing price in force at the time of the usage may get recorded by the accounting engine.
  • the alternative network access provider may get usage information from the access points or access control gateways thai may be connected to multiple access points. This may be used tor billing and for verifying the correctness of information from the mobile, devices.
  • One implementation of obtaining this information through the administration, interface was described above in the section about accounting engine.
  • usage information may he- available from gateway servers in the network of access points.
  • Such servers may be operated for example by wireless iSPs or operators of enterprise networks.
  • the usage information for each subscriber and for each access point is then compiled in. different ways and used as the basis for settling the compensation for using the bandwidth with all the parties involved.
  • the coram uni eat ion..between the accounting engine and the alternative network access provider may use any protocols or standards (e.g., the RADIUS standard), [95] Providing Billing a «d Payment Services to AH Parties
  • the alternative network access provider may establish direct relationships with the end-users of mobile devices and sell the alternative network access provider capacity directly to the end-users. This may be through fixed-price or per use or
  • Third-party aggregators can create agreements with end users of wireless mobile devices (or with owners of access points) and negotiate "wholesale" terms with the alternative network access provider. Regardless of how the selling of bandwidth is organized, there are, on the other side of the commerce transactions, the providers of the data transm ssion capability, the owners of the access points.
  • the alternative network access provider uses the information, provided by the accounting engines for settling the accounts with the bandwidth providers. Which may be the hoispot providers (or W SSPs) or new kinds of ISP's, in some cases operating together with individual access point owners or various aggregators of Wi-Fi capacity.
  • the same accounting engine data, this time aggregated by the ISPs, can be used for providing an appropriate and agreed compensation to the ISPs.
  • any compensation to the individual homeowner who have registered their access points in the alternative network access provider may be provided through their ISPs.
  • the payments, received from the alternative network access provider will be applied to the invoice that the fSP would be sending to the owner of access point for the ISP's service.
  • the ISP provides a bundle of services including telephony, and television services. Therefore the total bill may be large enough so that this compensation mechanism, can be used eve for access point owners that have great deal of the alternative network access provider traffic flowing through their connection..
  • One more set of participants in the commerce is. the sponsors of connectivity.
  • FIG. 5 is a data and process flow diagram of an example implementation of alternative network access provider
  • the alternative network access provider enables local micro-commerce in connectivity and data transfer capacity by making information available to potential buyers (users of wireless mobil devices ⁇ from po tential, seller (owners of access points) and by executing the micro-commerce transactions.
  • the alternative network access provider will accrue detailed information about the need, acceptable pricing and availability o connectivity and data transfer capacity in different locations and at different times.
  • FIG. 6A An intermediary market maker business is based on the alternative network access provider and negotiating terms and conditions with access point owners (with or without minimum purchases) and then selling, the band idth to owners of mobile devices o its own account at a price him that mobile device owners are willing to accept.
  • FIG. 6 ' B The overall process for utilizing the alternative network access provider in an intermediary mode is illustrated in FIG. 6 ' B
  • the alternative network access provider may facilitate participation of new sellers and buyers in the market by establishing and communicating local price levels
  • the alternative network access provider may create or trade in or enable other market participants to create, buy or sell sophisticated contracts including guaranteed minimum bandwidth, duration of the arrangement, characteristics of the bandwidth, for example reliability, jitter and packet loss.
  • the alternative network access provider may create or trade in or enable other market participants to create, buy or sell futures contracts on bandwidth in specific locations. For example providing bandwidth, during meetings, events, and/or conventions in specific locations may offer an opportunity to sell it a higher prices
  • each of the mobile devices includes a proposal engine . and can offer to transmit a connection, in essence acting as a .mobile access point.
  • the network connection for this mobile access point can in this scenario be: provided by the network operator through its infrastructure or it can be rooted through the Wi-Fi access point, i r example utilizing the alternative network access provider mechanism as described above in eases where more than one Wi-Fi radio system and frequency channel are available in the device.
  • This use of the alternative network access provider for pooling wireless connections is illustrated in FIGs. 2A-2B,
  • Wi-Fi access points for other devices. What is added to this mechanism are the functions thai make it possible for any device to support other devices in this f shion and get compensated for this service in accordance with terms and conditions negotiated between, the devices or though the alternative network access provider with real time pricing based on the alternative network access provider functions.
  • the alternative network, access provider can be implemented to handle the compensation and settlements between the devices,
  • M2M Machine to Machine
  • connection can be transmitte through several wi eless devices tbrming a mesh network.
  • alternative network access provider mechanism ibr accounting ibr the usage and providing payments to participants would be the commercially enabling new dimension to previously proposed mesh network systems.
  • connection pooling provides a barter tradin opportunity. Since the same devices participating in the connection pooling will he providing connectivity as well as utilizing connectivity provided by others the net cost for each participant maybe positive or negative depending on the usage patients,
  • resource pooling can include both mobile and stationary devices operating in a mixed mode pooling configuration.
  • the more important aspect -for the alternative network access provider functions is the authentication, airdiorizatiorg access control and usage .measurement and recording (accounting) of access and data traffic to the internet or possibly to the. Mobile Operator's core service system. Similar systems of authentication and access control can be used at both levels of access,
  • access control and accounting functions may be managed using one or more other methods (e,.g,. Extended Authentication Protocol (EAF). Wireless Internet Provider roaming (WiSPr), and the like),
  • EAF Extended Authentication Protocol
  • WiSPr Wireless Internet Provider roaming
  • each mobile device when initially registering wit the alternative network access provider each mobile device establishes a public/private key in a standard P 1 mfrasirueture system,
  • the private key resides in the mobile device and is used to authenticate the device to obtain information about connecting io the alternative network access provider enabled access points, in a similar fashion the usage records can be encrypted using the private key of the mobile device and a digest of them can be added, encrypted using the public key of the alternative network access provider, to make sure that they have not been altered during the transmission and storage,.
  • a corresponding public/private key combination may be established when they register for the alternative network access provider.
  • the Security aspect for the access control, information for the wireless connection specifically can. be handled, for example, in the following way: in cases where the Ts&Cs of the proposal engine are obtained from the alternative network access provider it is possible to control security ' transmitting the access point authentication password to the participating mob le device encrypted with its public key after the device has signaled acceptance of the Ts&Cs for using the connection through the particular access point.
  • the alternative network access provider changes the password or access credentials of participating access points at specific intervals and coordinates these changes with ail of the authorised devices including the ciieui devices of the access point owner and the devices to which acces is provided, through the alternative network access provider commerce arrangement, in this solution each access point owner registers all of the authorized cl ient devices with the alternative network access provider so they can participate in this continuous password change process.
  • sequence of future passwords is generated using an algorithm that is made available to all authorized devices (devices of the access point owner) which algorithm may be time based and use tables of randomly generated passwords.
  • the alternative network access provider has the same synchronised password generation System so it can provide password to the devices that it is enabling as a result of a alternative network access provider commerce transaction..
  • the alternative network access provider provides limited connectivity to all devices through the access point to an authentication server that can automatically provide access to devices pre auihori3 ⁇ 4ed b the access point owner or to devices that can input a password.
  • the same authentication server can then be used io manage access for devices that are utilizing the alternative network, access provider to gain access through the commerce transactions.
  • FIG, iC-D show example access point configurations, in a hardware-oriented security implementation, the alternative network access provider-registered access point is a separate device provided to the owner/iiser of a wired Internet connection. ' This device has i!ie proposal engine or a reference to it and is registered with the alternative network access provider. Depending, on the owner's equipment and preference there are different ways to connect the device to the Wide Area Network. These provide a way to maintain the security arrangements of the owner' s original access point and minimize (perceived.) security issues. For example the two access points may be connected to the WAN through a network switch or the alternative network access provider acces point may he connected to a secondary Ethernet port of -an internet gateway/router device.
  • IP tunneling access to operators' premium services and other issues related to security of the data transmitted through alternative network access provider connections.
  • 3GPP standards there are alread quite advanced solutions described in. the 3GPP standards and several vendors are - offering solutions for the- technical aspects . . of
  • PIG. IB is a block diagram of an example wireless mobile device.
  • the wireless device includes two or more wireless radio systems with their associated antennas (2, 3, 4, FIG. 1 E).
  • the device includes, for example, a processor (5) capable of executing
  • the device has a user interface (?) which allows a user of the device to interact with applications and to control various functions of the device. For example, the. user .may use the interface to turn on and off the various radio system ' s or he may use it to make the selection that a software application described in this document shall control the state of the radio systems.
  • the radio system can either be turned on and off by the user through the user interface (7) or be automatically turned on and off by the device by executing an application in the processor that controls the state of the radio.
  • the radio system can attempt to connect to the Internet or to the telephone network over the various radio systems.
  • the network system will require authentication, for example a password in order to allow the connection to go through.
  • the cellular radio system in many wireless devices it is customary to have the cellular radio system on all the time whether it is 2G, 3 ⁇ L or 4G radio, or a packet-based LTE radio.
  • Thi system bandies the communication with the mobile service provider including voice calls and tex messages. If there is no o ther radio systems available the cellular radio system handles any data communication that the device may require. However, in many cases the data amimu.nicatio.tt is automatically switched over to the Wi-Fi system if a. connection to the internet or other baekend system i available through the Wi-Fi radio. This is because in most cases it is less costly and uses less battery power to send the- data communications over the Wi-Fi system.
  • Some mobile devices may be equipped with a Wi-Fi radio that is able to communicate with two or more access points (e.g., using different Wi-Fi protocols).
  • an application running on the processor of the wireless device periodically checks the amount of data that is being transferred, , or needs to be transferred, through the- radio systems. If the amount of data transmitted over a particular time interval exceeds a predetermined value the application turns on the Wi-Fi radio. Stated, in a different way; if the speed of data transmissions exceeds a predetermined threshold, the system turns on the Wi-Fi radio.
  • Wi-Fi radio always when the Wi-Fi radio is turned on it will scan the environment to see what if any, Wi-Fi access points are available and whether they require, a password, or other credentiais for a connection. If there is at) available access poi nt or several access, poin ts die device will connect to one of them if the device has information of any passwords that may be required for a connection.
  • Connecting 1o the Wi- Fi access point may not mean that there is a connection to the internet.
  • the device cheeks whether the connection is available, for example by requesting a specific website to provide a response and then comparing the received response to a stored copy of the expected response. This way the system can determine whether any access control gatewa has redirected to a connection to a page that may require input of credentials,
  • the device in one embodiment continues to monitor data traffic in the communication system and if it detects that the speed of the traffic tails below a certain predetermined threshold for a. predetermined time it wilt turn off the Wi-Fi radio, in another embodiment die device would leave the Wi-Fi radio on as long as the device maintains a connection with the access point and the signal, strength, or the s gnabto-noise ratio in the connection to the Wi-Fi access point stays above a predetermined threshold. If the connection signal strength or other quality indicator fails below a predetermined value the device will disconnect and turn off the Wi-Fi radio.
  • the device processor keeps track of the active applications running in the device and as soon as an application that has significant communication needs is activated, the system will automatically turn on the Wi-Fi radio. This initiates another scan of the environment and, as explained above, possibly a connection through the Wi-Fi -access point. A list of applications that may have significant
  • the list can be precontlgured by a user or can be determined automatically over time by .monitoring the data usage and patterns of use of various applications.
  • Another ' indication of possible data communication needs is the overall state of the device and the state of its display. In order to conserve battery power the devices automatically go into a "sleep" mode, in which the display may be turned off, and any other processes and device may be .suspended. During these times the system may turn their ' Wi-Fi radio off and adjust the so-called wake-up interval as explained later in this description.
  • the device processor may use the observed current and a set of previous locations of the device for making the decision about turning o the radio,
  • the system rank orders the locations based on data usage and possibly based on the percentage of successfully using Wi-Fi and uses the top locations in the ranking as a basis for turning on Wi-Fi or shortening the wake-up interval.
  • the system ma just automatically turn on the Wi-Fi radio whenever it detects the device is hi a location or within a certain distance of the location where communication ver the Wi-Fi radio system was previously successfully used.
  • the device may first try to establish its location based on triangulatkm or other method utilizing the cellular radio stations or access points for Wi-Fi or other radio systems that it detects during routine scans and operation.
  • the .frequency of the location cheeks and the- method of checking the location may ' be selected based on past history of the frequency of data communications, time of day, day of week or oilier parameters characterising previous data communications.
  • the device may he in motion while die data use is going on., for example in a moving vehicle, hi these cases the opportunity to utilize Wi-Fi connections may he limited because of the time required to establish a new connection and the shortness of the time any particular- Wi-Fi access point would be available for the connection.
  • the wake up interval m be made longer or the Wi-Fi radio may be turned off if it is detected that the device is in motion, 11431 Managttig the radio systems based mi time
  • the solution uses time based methods for managing the . Wi-Fi radio. There may be several inputs to selectin times when to turn on and off the Wi-Fi radio. As mentioned i the previous section, the: times ma be based on. the pattern, of observed behavior regarding data communications or may be based on user input.
  • Wi-Fi automatically periodically turned on.
  • the device Upon taming on die radio the device performs a fairly rapid, scan of the environment and determines whether there are any access points that are available for a connection, if there are, the system will associate and may remain associated until signal quality degradation may result in a disassociation.
  • the device wil l turn the Wi-Fi radio off. If there are not any access points through which the device can establish a Wi-Fi connection, it will automatically turn off the Wi-Fi radio for a set amount of time, which we will call "the wake ⁇ up intern!”.
  • time based management system of the radio may not merely he turning on and off the radio at predetermined times but it may be affecting the length of the wake ⁇ up interval. For example during times of day and days a week thai the device lias had frequent and high-volume- data communication the wake-up interval may he made shorter,
  • the wake-up interval may depend, on the overall state of the wireless device and the state of its display. If the device is in so-called sleep mode the wake-up interval may be made longer. A status change from sleep mode to nonnal operating mode may trigger an immediate turning on the radio and a scan of the environment for Wi-Fi access points followed by a shorter wake-up interval in ease n access points are found that can provide a Wi-Fi connection.
  • the signal strength and quality may depend on a number of factors including the distance to the access point, the way the user is holding the device and interference from other devices like microwave ovens, in these eases the availability of a connection may disappear for a short period of time and return as the circumstances change, For this reason, the .solution, in one embodiment has a short wake-up interval for the first couple of tries after a disconnection and then changes over to a longer interval In accordance with the device situation data use and other parameters.
  • Some wireless devices allow the user to configure tasks and applications to execute when there is a Wi-Fi connection to the internet or a backend system. For example uploading photographs from the device and synchronizing auy podc sts or other content or performing software updates may be tasks that the user has configured to be carried out over a Wi-Fi connection.
  • the wake- up interval may be determined so that it is likely that these tasks will get completed within the time expected by the user after he or she arrives at a location where Wi-Fi is available. Without a wake-up. interval and time based. Wi-Fi radio management these tasks might not get completed even though a Wi-Fi. connection would he available, if the -only mechanism for turning on the radio would be dependent on. observed data communication speed the radio would not tarn on since the applications will not start before it is on.
  • the automatic turning on and off various radio systems can be based on the performance ch racteristics of observed for the di ferent systems.
  • the metrics used to measure the performance may include the relative signal strengths, the automatically selected encoding rates for each radio communication alternative, the relative battery consumption of various radio systems or any other metric that is available to the processor, in this solution the system may perform periodic checks of the performance level ibr example by transferring said, amounts of data ove the radio connection to serve the data communication speed.
  • the system may be- -performing brief speed tests with various radio systems and have logic that determines that a certain a vailable speed level in each of the radio systems will cause the connection to be switched over to that system. Other characteristics of relative performance may be measured and this may result in more complex logic for selecting which radios to use and which ones to turn off and how long the wake-up intervals should be for the radio that have been turned off
  • the Wi-Fi radio or other radio systems may have predetermined or known costs associated with data communication over the radio link. For example this cost may be provided through an alternative network access provider enables- as described in I; ,S. provisional app. Ser. No. 61/618,3 18, filed March 30, .20 ! 2, entitled “Systems And Methods For Alternative network access provider", and U.S.
  • the system may automatically turn off the radio in order to sav battery power and set the wake-up interval based on. time location and history of communication.
  • the wake-up interval can be set to be different at different times of the day and at different locations of the device and may depend on which applications are active in the device.
  • the wake-up interval may be made to depend on the past success in establishing a Wi-Fi connection in a particular location. For example, if the device has tried a fe times to find an available access point for a. Wi-Fi connection in - particular location and ailed, the system may make (he wake-up interval longer in thai location to avoid unnecessary attempt ' s. For example the wake-up interval for that location may be made to he a day or several days so that the system will catch a possible addition, of a new acces point that may be made available, but will not waste resources in trying to connect frequently in. places where no connection has bee available - before. Access points may be available for a particular device because they do not have a password protection or access control gateways controlling access to the internet, because the password has been stored in the memory of the wireless device or because they can be accessed through, a alternative network access provider,
  • M2M connectivity modules or services may use a small fraction of the capacity for simple asset tracking or monitoring can add a Wi-Fi module. and get paid for their M2 functionality by selling the excess capacity through the alternative network access provider.
  • FIG. 7 shows an example process.
  • the process may be implemented to manage a radio of a device.
  • This example is illustrated with two radios (e.g., mdios i and 2).
  • an implementation may include any number of radios,
  • process 700 may be used to manage the radios (e.g., manage the on/oil stages of the radios ⁇ to, for example, minimize power consumption.
  • Process 700 starts with decision block 705 being made to determine if a wake-up event has occurred, A wake up event may be triggered, for example, if a specific application is being executed, the throughput of radio I is above a ' high threshold or below a low threshold, the quality of an existing connection with radio I has deteriorated (e.g., a low signal to noise ratio), the location of the device has changed, etc. if a wake-up event has occurred, process 700 flows to block 715 where radio 2 is turned on. If a wake-up event has not occurred, determine if a wake-up interval has expired at decision block 710, When the wake-up interval has expired, turn on radio 2 at block 715, If not, process 700 loops back to decision block 70S,
  • radio 2 After radio 2 is turned on, scan for available connecti vity access (e.g., available access points) at block 720. If found at decision block 725, perform a connectivity test at block 730. Just because an access point is available docs not guarantee that the access point can connect to a desire source (e.g., on the Internet).
  • the connectivity test may be a simple "ping" command to a known destination, an access to a known website, or by any manner to establish that an end-t -end connection is likely to succeed, a determined in decision block 735, using re access point found at block 720.
  • a determination is performed to determine whether to use the found access point, The comparison, may be based on one or more access conditions (e.g., costs, capacity, speed, etc) as described above. If the determination is positive at decision block 745, establish a connection with the found access point at block 750. If the new connection using radio 2 is made to. replace an existing connection (e.g., using radio J as shown in decision block 755, then the communication using radio i is to be transferred at block 760. Alter transferred, radio 1 may be tamed oil or put in a power-save mode at bock 765 to eonserver power. If the existing communication using radio 1. is not to be transferred, the connection using radio 2 is used in parallel with the existing connection using radio I . for example, to speed up the comminncation on radio I or for new
  • Process 700 flows back to the beginning.
  • process 700 may be implemented with different, fewer, or more blocks.
  • Process 700 may be implemented as computer executable instructions, which can be stored on a medium, loaded onto one or more processors of one or more computing devices and mobile devices, and executed as a computer-implemented method.
  • FIG. 8 a block diagram illustrating a example wireless communication device
  • the wireless communication device 450 may be configured and/or implemented as an access point, a mobile device with a configuration different that shown in. FIG. 1 E, or a device or component used in an alternative network access provider system.
  • the wireless communication device 450 may be configured and/or implemented as an access point, a mobile device with a configuration different that shown in. FIG. 1 E, or a device or component used in an alternative network access provider system.
  • other Wireless communication devices and/or architectures may also be used, as will be clear to those skilled in the art,
  • wireless communication device 450 comprises an antenna system 455, a radio system 460, a baseband system 465, a speaker 470, a microphone 480, a central processing unit ("CP IP' ⁇ 485, a data storage area 490, -and a hardware interface 495.
  • CP IP' ⁇ 485 a central processing unit
  • data storage area 490 a data storage area 490
  • hardware interface 495 a hardware interface 495.
  • the antenna s stem 455 may comprise one or more antennae and one or more multiplexors (not shown) mat perform a switching function to provide the antenna system 455 with transmit and receive signal paths, in the receive path, received RF signals can be coupled from a multiplexor to a low noise amplifier (not shown) thai amplifies the received RF signal and sends the amplified signal ' to the radio -system 460.
  • the radio system 460 may comprise one or more radios thai are configured to communication over various frequencies and/or using different wireless communication protocols, in one embodiment, the radio system 460 may combine a demodulator (not shown) and modulator (not shown) in one integrated circuit t/IC"), The demodulator and modulator can also be separate components; In the incoming path, the demodulator strips
  • baseband system 465 decodes the signal and converts it to an analog signal. Then the signal is amplified and sent to the speaker 470, The baseband system 465 also receives analog audio signals from the microphone 480. These analog audio si nals are converted to digital signals and encoded by the baseband system 465, The baseband system 465 also codes the digital, signal for transmission and generates a baseband transmit audio signal thai is routed to the modulator portion of the radio system 460. The modulato mixes the baseband transmit audio signal With an RF carrier signal generating an RF transmit signal that is routed to the antenna, system and may pass through a power amplifier (not shown). The power amplifier amplifies the RF transmit signal and routes it. to the antenna system 455 where the signal is switched to the antenna port for transmission,
  • the baseband system 465 is also communicatively coupled with the central processing unit 485.
  • the central processing unit 485 lias access to a data storage area 490.
  • the central processing unit. 485 may be configured to execute instructions (i.e.- computer programs or software) that can be stored in the data storage area.490, Computer programs can also be received from the baseband processor 465 and stored in the data storage area 490 or executed upon receipt. Such computer programs * when executed, enable the wireless communication device 450 to perform the various functions of the present invention as previously described.
  • data storage area 490 may include various software modules (not shown] described with respect to one or more of FiGa, 3-7,
  • o -transitory media may be used to provide executable. instructions- (e.g., software and computer programs) to the wireless communication device 450 for execution b the central processing unit 485,
  • executable instructions- e.g., software and computer programs
  • An example of a non-transitory medium is data storage 490.
  • Communication device 450 may obtain executable instructions via microphone 480 (via the baseband system 465), antenna system 455 (also via the baseband system. 465), and hardware interface 495.
  • the central rocessing unit 485 is configured to receive notifications from the hardware interface 495 when new devices are detected by the hardware interface.
  • Hardware interface 495 can be a combination electromechanical detector with controlling software that communicates with the CPU 485 and interacts with new devices.
  • the hardware interface 495 may be a fire ire port, a Universal Serial Bus 'USB") port, a Bluetooth, or infrared wireless unit, or any of a variety of wired or wireless access .mechanisms.
  • Exampl es of hardware that may be linked with the device 450 include data storage devices, computing devices, headphones, microphones, and the like.
  • FIG, 9 is a block diagram illustrating an example wired or wireless system 550 thai may be used in connection with various embodiments described herein.
  • the system 550 may be configured and/or implemented as an access point, a mobile device with a configuration different that shown n FIG. IE, or a device or component used in an alternative network access provider system.
  • the system 550 can be computer, server, laptop computer, smart phone, tablet computer, or any other processor enabled device that is capable of wi red and/of wireless communication.
  • the system. 550 may include one or more processors, such as processor 560.
  • Additional processors may be provided, such, as an auxiliary processor to manage
  • auxil obviouslyy processor to perform floating point -mathematical operations e.g., digital signal processor
  • slave processor subordinate to the main processing system e.g., back-end processor
  • additional microprocessor or controller tor dual or multiple processor systems e.g., a coprocessor.
  • auxiliary processors may be discrete processors or may be integrated with the processor 560.
  • the processor 560 may .be connected to a communication bus 555,
  • the communication bus 555 may include a data channel for facilitating information transfer between, storage and other peripheral components of the system 5S0 ⁇
  • The- communication bus 555 further may provide a set of signals used for communication with the processor 560, including a data bus, address bus, and control bos (not shown).
  • the communication, bus 555 may comprise any standard or non-standard bus architecture such as, for example, bus architectures compliant with industry standard architecture C SA"), extended. Industry standard architecture (“EISA”), Micro Channel Architecture (“MCA”), peripheral component interconnect (“PCI”) local bus.
  • System 550 may include a main memor 565 and may also include a secondary memory 570.
  • the main memory 565 provides storage- of instructions and data for programs executing on the processor 560.
  • the main memory 565 is typically semiconductor- based memory such as dynamic random access memory (“DRAM”) and/or static random access memory (“SRAM”).
  • DRAM dynamic random access memory
  • SRAM static random access memory
  • Other semiconductor-based memory types include,, “ for example, synchronous dynamic random access memory (“S DRAM”), Rambus dynamic random access memory (“'RDRAM”), ferroelectric random access memory (“FRAM”), and the like, including -read only memory (“ROM”),
  • the secondary memory 570 may optionally include an internal memory 575 and/or a removable medium 580, for example a floppy disk drive, a magnetic tape drive, a compact disc (“CO") drive, a digital versatile disc (“"DVD”) drive, etc.
  • the remo able medium 580 is read iroro and/or written to in a well-known manner.
  • Removable storage medium 580 may be, tor example,, a floppy disk, magnetic tape, CD, DVD, SD card, etc.
  • the removable storage medium 58:0 is a non-transitory computer readable medium, ha ving stored thereon computer -executable code (i.e., software) and/or data.
  • the computer software or data stored on the removable storage medium 580. is read into the system 550 for execution, by the processo 560.
  • secondary memory 570 may include othe similar means for allowing computer programs or other data or instructions to be loaded into the system 550.
  • Such means may include, for example, an external storage medium 595 and an interface 570»
  • external storage medium 595 ma include an external hard disk drive or an external optical drive, or and external magneto-optical drive.
  • secondary memory 570 may include semiconductor-based memory such, as programmable read-only memory (“PROM”), erasable programmable, readonly memor (“ ⁇ ⁇ ”), electrically erasable read-only memory ⁇ ' ⁇ , or flash memory (block oriented memory similar to EEP OM), Also included are any other removable storage media 580 and communication interface 590, which allow software and data to be transferred from an external medium 595 to the system 550.
  • PROM programmable read-only memory
  • ⁇ ⁇ erasable programmable, readonly memor
  • ⁇ ' ⁇ electrically erasable read-only memory
  • flash memory block oriented memory similar to EEP OM
  • System 550 may also include an input/output (“I/O") interface 585.
  • the I/O interface 585 facilitates ' input f om and output to external devices.
  • the I O interface 585 ma receive input from a keyboard or mouse and may provide output to a display.
  • the I/O interface 585 is capable of facilitating input from and output to various alternat e types of human interface and machine interface devices alike.
  • System 550 may also include a communication interface 590.
  • communication interface 590 allows software and data to be transferred between system 550 and external devices (e.g. printers), networks, or information sources.
  • external devices e.g. printers
  • computer software or executable code may be transferred to system 550 from a network server via communication interface 590
  • Examples of communication interface 590 include a modem, a network Interface card ("NIC"), a wireless data card, a communications port, a. PCMCIA slot and card, an infrared interface, and an IEEE 1394 fire-wire connection, Universal Serial Bus (“USB”) connection ⁇ ), just to name a few.
  • NIC network Interface card
  • USB Universal Serial Bus
  • Communication interface 590 may implement one or more protocols or standards, such as Ethernet IEEE 802 standards, Fiber Channel, digital subscriber line (“DSL”) * asynchronous digital subscriber line (“ADSL”), frame relay, asynchronous transfer mode (''ATM”), integrated digital services network (“iSDN ' '' ⁇ * personal communications services (“PCS 5 ' ), transmission ' control protocol/internet protocol ( TCP/IP”), serial line Internet protocol/point to point protocol f'SLlP/PPP”), and so on, but may also implement customized or non-standard interface protocols as wed,
  • protocols or standards such as Ethernet IEEE 802 standards, Fiber Channel, digital subscriber line (“DSL”) * asynchronous digital subscriber line (“ADSL”), frame relay, asynchronous transfer mode (''ATM”), integrated digital services network (“iSDN ' '' ⁇ * personal communications services (“PCS 5 ' ), transmission ' control protocol/internet protocol ( TCP/IP”), serial line Internet protocol/point to point protocol f'SLlP/PPP
  • signals 605 may be provided to communication interface 590 via a communication channel 600.
  • the communication channel 600 may be a wired or wireless network, or any variety of other communication links.
  • Communication channel 600 carries signals 605 and can be implemented using .a variety of wired .or wireless eormnuni cation means including wire or cable, fiber optics, conventional phone line, cellular phone link, wireless data communication link, radio frequency (“RF”) link, or infrared link, just to name a few.
  • RF radio frequency
  • Computer executable code i.e., computer programs or software
  • Computer programs can also be, received, via- communication interface 590 and stored in the main memory 565 and/or the secondary memory 570, Such computer programs,, when ' executed, enable the system 550 to perform the various functions of the present invention as previously described,
  • computer readable medium' * is : used to refer to an transitory or non-transitor computer readable media used to provide computer executable -code (e.g., software and computer programs) to the system 550.
  • Examples of these media include main memory 565, secondary memory 570 (includin internal memory 575, removable medium 580, and external storage medium 595), and any peripheral device communicatively coupled with communication interface 590 (including a. network information server or other network device).
  • These transitory and non-transiiory computer readable media are means tor providing executable code, programming instructions, and software to the system 550.
  • the s stem 550 also includes optional wireless communication components that facilitate wireless cor uiaiicaiioo over a voice and over a data network, as wireless communication components comprise an antenna system 610, a radio system 6.1 5 and a baseband system 620, In the system 550, radio frequency "R ' F") signals are transmitted and received over the air by the antenna system 610 under the management of the radio system 615.
  • wireless communication components comprise an antenna system 610, a radio system 6.1 5 and a baseband system 620, In the system 550, radio frequency "R ' F" signals are transmitted and received over the air by the antenna system 610 under the management of the radio system 615.
  • the antenna system. 610 may comprise one or ore antennae and one or more multiplexors (not shown) that -perform a switching function to provide the antenna system 610 with transmit and receive signal paths, in the receive path, received RF signals can be coupled from a. multiplexor to a low noise amplifier (not shown) that amplifies the received RF signal and sends the amplified signal to the radi system 615,
  • the radio system 615 may comprise one or more radios that are configured to communicate over various frequencies.
  • the radio system 15 may combine a demodulator (not shown) and modulator (not shown) in one integrated circuit ⁇ ' ⁇ ). The demodulator and modulator can also be separate components.
  • the demodulator strips away the RF carrier signal leaving a baseband receive audio signal, which is sent from the radio system 61 5 to the baseband system 620, [202] if the received signal contains audio information, then baseband system 620 decodes die signal and converts it to an analog signal. Then the signal is amplified and sent to a speaker, " Hie baseband system 620 also receives analog audio signals from a
  • the baseband system 620 also codes the digital signals for transmission and generates a baseband transmit audio signal that is routed to the modulator portion of the radio system 615.
  • the .modulator mixes the baseband, transmit audio signal with an RF carrier signal generating an RF transmit, signal thai is routed to the antenna system and may pass through a po was amplifier (not shown).
  • the power amplifier amplifies the RF transmit signal and routes it to the antenna system 10 where the signal is switched to the antenna port for transmission.
  • the baseband system 620 is also communicatively coupled with the processor
  • the central processing unit 560 has access to data storage areas 565 and 570.
  • the central processing unit 560 may be configured to execute instructions (i.e., computer programs or software) that can be stored in the memory 565 or the secondary memory 570.
  • Computer programs can also be received from the baseband processor 61 and stored in the data storage area 565 or in secondary memory 570, or executed upon receipt.
  • Such computer programs when executed, enable the system 550 to perform the various functions of the present invention as previously described.
  • data storage areas 565 may include various software modules (not shown) that are executable by processor 560.
  • Various embodiments may also be implemented primarily in hardware using, for example, components such as application specific integrated circuits. ("ASICs * '), or field programmable gate arrays ("FPGAs").
  • ASICs * ' application specific integrated circuits
  • FPGAs field programmable gate arrays
  • ASICs * ' application specific integrated circuits
  • FPGAs field programmable gate arrays
  • a general purpose processor can be implemented or performed with a general purpose processor, a digital signal processor ( S *DSP M ), an ASIC, FFGA or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein
  • a general-purpose processor can he a microprocessor, but in the alternative, the processor can be any processor, -controller * microcontroller, or state machine.
  • a processor can also he implemented as a combination of computing devices, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
  • FIG. 10 is an example computing environment with an example computing device suitable for use in some example implementations ⁇ e.g., a mobile device, access point, a device in an ANAP system).
  • Computing device 1005 in computing environment 1000 can include one or more processing units, cores, or processors 1010, memory 1015 (e,g., RAM, ROM ' , and/or the like), internal storage 1020 (e.g., magnetic, optical, solid state storage, and/or organic), and/or I/O i nterface 1 25, any of which can be coupled on a communication mechanism or bus 1030 for communicating information or embedded in the. computing device 1 05.
  • memory 1015 e.g., RAM, ROM ' , and/or the like
  • internal storage 1020 e.g., magnetic, optical, solid state storage, and/or organic
  • I/O i nterface 1 any of which can be coupled on a communication mechanism or bus 1030 for communicating information or embedded in the. computing device 1 05.
  • Computing device 1005 can be communicativel coupled to input/user interface 1035 and output device/interface i 040. Either one or both of input/user interface 1035 and output device/interface 1040 can be a wired or wireless interface and can be detachable.
  • Input/user inierface 1035 may include any device, component sensor, or interface, physical or virtual, that can be used to provide, input (e.g., buttons, touch-screen interface, keyboard, a pointing/cursor control microphone, camera, braille, motion sensor, optical reader, and/or the like).
  • Output device/interface 1.040 may include a display, television, monitor, printer, speaker, braille, or the like.
  • input/user interface 1035 and output device/interface 1040 can. be embedded with or physically coupled to the compiiting device 1005, in other example implementations, other computing devices may function as or provide the functions of input/user interface 1(535 and output device/interface 1040 for a computing device ! 005,
  • Examples of computing device 1005 may include, hut are not !imited to, highly mobile devices (e.g., smartphones, devices in vehicles and other machines, devices carried b humans and animals, and the like), mobile devices (e.g., tablets, notebooks, laptops, personal computers, portable televisions, radios, and the like), and devices not designed for mobility (e.g., desktop computers, other computers, information kiosks, televisions coupled to one or more processors, radios, and the like).
  • highly mobile devices e.g., smartphones, devices in vehicles and other machines, devices carried b humans and animals, and the like
  • mobile devices e.g., tablets, notebooks, laptops, personal computers, portable televisions, radios, and the like
  • devices not designed for mobility e.g., desktop computers, other computers, information kiosks, televisions coupled to one or more processors, radios, and the like.
  • Computing device 1005 can be communicatively coupled (e.g., via I/O interface 1025) to external storage 1045 and network 1050 for co.rn.rn uioating with any number of networked components, devices, and systems, including one or more computing devices of the same or different configuration.
  • Computing device 1005 or any connected computing device can be functioning as.
  • I/O interface 1025 can include, bat is not limited to, wired and/or wireless interfaces using any communication or I/O protocols or standards (e.g.., Ethernet, 802.1 1 x, Universal System Bus, WiMax, modem, a cellular network protocol, and the like) fo communkating infonnation to and/or from at least all the connected components, devices, and network in computing environment 1000.
  • Network 1050 can be any network or combination of networks (e.g., the Internet, local area network, wide area network., a telephonic network, a cellular network, satellite network, and the like).
  • Computing device ⁇ 005 can use and/or communicate, using computer-usable or computer-readable media, including transitory media and non-transitory media.
  • Transitory media include transmission media (e.g., metal cables, fiber optics), signals, carrier waves, and the like.
  • Non-transitory media include magnetic media (e.g., disks and tapes), optical media (e.g., CD ROM, digital video disks, BSu-ray disks), solid state media (e.g., RAM, ROM, flash memory, solid-state storage), and other mm- volatile storage or memory.
  • Computing: device 1.005 can be used to implement techniques, methods, applications, processes, or computer-executable instructions in some example computing environments.
  • Computer-executable instructions can he retrieved f om transitory media, and stored on and retrieved ' from non-transitory media.
  • Tire executable .instructions can originate from one or more of any programming, scripting, and machine languages (e.g., C, C-H-, C#, Java, Visual Basic, Python, Perl J ' avaScript, and others).
  • [21 1 Processors) 1 10 can execute under any operating system (OS) ( ot. shown), in a native or virtual environment.
  • One or more applications can he deployed that include logic unit 1060, application programming interface (API) unit 1065, input unit 1.070, output unit 1075, mobile device management unit 1080, access point management unit 1 85, usage management unit 1 90, and inter-unit communication mechanism 1095 for the different units to communicate with each other, with the QS, and with other applications (not shown .
  • mobile device management unit 1080. access point management unit 1085, and usage management unit 1090 may implement one .or more processes shown in FIGs, 3-7.
  • the described units and elements can be varied in design, function, configuration, or implementation and are not limited to the descriptions provided.
  • API unit 1 65 when information or an execution- instruction is received by API unit 1 65, it niav be communicated to one or more other units (e.g., logic unit 1060, input unit 1070, output unit 1075, mobile device management unit 1 80, access point management unit 1085, and usage management unit 1090),
  • input unit 1 170 may recei ve location information -of a mobile device and pass the information to mobile device management unit 1080.
  • Access point management unit 1085 may determine one or more access points and provide information about these access points to the mobile device via output unit 1 175 (e.g., communicated to the mobile device using a radio or through another radio communication device connected to network 1 150),
  • the mobile device and/or an access point may provide usage data that are managed by the usage management unit 1 190, which may provide billing and/or payment information to the owners and/or operators the mobile device arid access points,
  • logic unit 1060 may he configured to control the information flow among the units and direct the services provided by API unit 1 65, input unit 1 70, output unit 1075, mobile device management unit 1080, access point management unit 1 85, and usage management unit 1 00 in some example implementations described above.
  • the flow of one or more processes or implementations may be controlled by logic unit 1060 alone or in conjunction with API unit 1065.
  • CDMA2000 Family of wireless standards and protocols, which use CDMA channel access, to send voice, data, and signaling data between mobile phones and cell, sites
  • 4G PTE Long Term Evolution 1 ,1 P Pong Term Evolution, marketed as 4G PTE, is standard for wireless cammunication of high-speed data for mobile phones and data terminals

Abstract

Systems and methods enable alternative network access implemented by a mobile wireless communication device. The method includes receiving information associated with a mobile device, the information comprises location information associated with the mobile device. Based on the information associated with the mobile device, identifying an access point available for providing connectivity services to the mobile device, the access point is not the computing device. Information is provided to the mobile device which is associated with the access point. Alternative network access for a mobile device having a first radio and a second radio, or in some cases, only one radio can include using a first radio in a first connection with a first access point.

Description

SYSTEM 'FOR PROVIDING INTELLIGENT NETWORK ACCESS SELECTION FOR
A MOBILE WIRELESS DEVICE
CROSS-REFERENCE TO RELATED APPLICATIONS fOl ] This application claims the benefit of U.S. provisional app. Sen No.
61/561735, filed November 25, 201 1 ; U.S. provisional app. Ser, No. 61/6 8,318, filed March 30, 2012; and U.S. provisional app. Ser, Ho. 61/671 ,583, filed July 13, 2012; all of which are 'hereb incorporated by reference, This application also hereby incorporates by reference the two applications filed on even date herewith titled : MOBILE DEVICE RADIO
MANAGEMENT and MOBILE WIRELESS DEVICE WITH INTELLIGENT NETWORK ACCESS SELECTION.
BACKGROU D
[021 Related Field
[03] The subject matter discussed herein relate generally to wireless
eonummication and, more particularly, to systems and methods for providing alternative network access tor mobile wireless devices and the wireless devices,
1 ) Related ackgr rmd
[OS] Rapid growth in mobile devices, such as smart phones, tablets, and connected laptops, and the proliferation of applications in these devices have created a. tremendous, need to increase wireless data conimuni cation capacity.
[06] Mobile devices use wireless communication services provided by one or more mobile operators and/or technology companies. The wireless communication demand is often higher than the mobile operators and technology companies can provide. SUMMARY
[07] The subject matter includes a method for enablin alternative network access implemented for a mobile wireless communication device. The method includes receiving information associated with a mobile device; the information comprises location information associated with the mobile device. Based on the information, associated wi th the mobile device, identifying an. access point available for providing connectivity services to the mobile device, the access point is not the computing device, information is provided to the mobile device winch is associated with the access point, The information cab comprise at least one of usage terms, usage conditions, usage costs, access point characteristics, connection characteristics, access point capacity, and access point security access information. Osage information is received from at least one of the mobile device and the access point,
[OS] Also included is the system which implements methods such as the foregoing,
[09] Another aspect include a method fo obtaining alternative network access implemented by a mobile device having a first radio and a second, radio. The method includes; using the first radio in a connection,. Hie throughput of the connection being above a threshold is detected. Based on access conditions, an. access point to establish a second connection, using a second radio is determined. The second radio is then turned on. A connectivity test is performed with the access point using the second radio, A second, connection is established using the second radio.
[1 ] in another aspect, a method for obtaining alternative network access is implemented by a mobile device having a first radio. The method includes determining to turn on the first radio based, on tire expiration of a wake-op-interval . The wake-up-interva!, is determined based upon one or snore of predetermined application being executed, a location of the mobile device, the dropping of a previous .connection, or a time period. An access node is identified using the radio. A connection is established with the access node using the first radio, A connectivity test with the access point is conducted using the first radio.
[1 1 ] A further aspect includes a method for obtaining alternative network access for a mobiie device having a first radio and a second radio, or in some eases, onl one radio.. The method can include using a first radio in a first connection with a first access point. Whether t establish a second connection with a second access point using a second radio is determined. The deiern.iirtat.ion is based on a first set of access conditions associated with the first access point and a second set of access conditions associated with tire . second access point The second connection is established with the second access point using the second radio based on the determining, which indicates establishing the second connection.
[ 12} Another aspect includes a method for obtaining alternative network access implemented by a mobile device having a radio.. The method includes identifying an available network access point, A determination whether to establish a connection with the identified access point is .made based on. a first set of access conditions associated with the ident ied access point. A connection with the identified access point is made using the radio based on the detemunhig, which indicates establishing the second connection.
[13] Further aspects include the corresponding mobile devices.
BRIEF DESCRI PTION Of ΊΜΕ DRA I GS
[14] FIG, 1 A is a functional block diagram of an overview of an example system for providing alternative network access.
[ 15] FIG, IB is the example, system for providing alternative network access of
FIG. 1 A with financial components,
[ 16] FIG. 1 C is a functional block .diagram of a example of an access point configuration. [17] FIG. I D is a function block diagram of an alternative example of an access point configuration.
[18] FIG, 1 E is a functional block diagram of a wireless mobile device.
[1 ] FIG. 2A. is a functional block diagram of an overview of another example system for providing alternative network access.
[20] FIG. 2B is a functional block diagram of the example system for providing alternative network access environment of FKX 2Λ with financial components.
[21 ] FIG. 3 is a flow chart of an example process of maintaining connectivity in. a where a mobile device may be changing locations.
[22] FIG. 4 is a flow chart of an example process of maintaining connectivity in an environment where information for connectivity may be provided by access points and -non- access p ints:
[23] FIG. 5 Is a data and process flow diagram of an example implementation of system for providing alternative network access,
[24] FIG. &A-B are data and process flow diagrams of other example.
implementations of system for providing alternative network access,
[25] FIG. 7 shows an example process for managing radios.
[26] FIG. 8 a block diagram illustrating an example wireless communication device,
[27] FKI 9 is a block diagram Illustrating an example wired or wireless processor enabled device that may be used in connection with various embodiments described herein.
[28] FIG. 10 is a functional block diagram of an example computing environment with an example computing device suitable for use in some example implementations. DETAILED DESCRIPTION
[29] The subject matter described herein is taught by way of example
implementations.. Various details have been omitted .for the sake of clarity and to avoid obscuring the subject matter. The examples shown below are directed to structures and functions for implementing systems and methods for providing alternative network access for connectivity of mobile wireless devices. Other features and advantages of the subject matter should be apparent, from the following description.
[30] Overview
[31 ] FIG. 1 A is a functional block diagram of an overview of an example system for providing 'alternative network aeeess. A system for providing alternative network access may include one or more mobile devices (e.g., mobile device 1 10) that use wireless connectivity services and one or more providers of wireless connectivity services (e.g., connectivity providers 120-125 and 130).
[32] The system tor providing alternative network aeeess may include the like of one or more selection engines 1 12 and 152, one or more proposal engines 126 and 156, accounting engines i 16 and 128, and an alternative network acces provider (ANAP) 150. The alternative network access provider environment includes structures and fonciions thai enable exchange of connectivity services (e.g., matching connectivity service providers with connectivity service users).
[33] Alternative network access provider environment 100A shows, for example., that a mobile device 11.0 may be within communication reach with connectivity providers 320-125 and 130. For example, mobile device 1 10 may be device that uses wireless communication (e.g., a smartphone, tablet device, lapto computer, etc.). Connectivity providers 120-125, which may collectivel 'he referred to as access points/' may provide wireless communication to wireless devices (e.g., using one or more wireless communication protocols). An access point may be any source source of connectivity, in other words, any source of connectivity, e.g., connectivity providers 120-125 and 130, may be referred to as an access point. An access point may be stationary with a wi ed connection through m ISP to the Internet or another communication network. An access point may be mobile device connected to, for example, a 3G or 40 network or any available connection (e.g., for backhaul) to the Internet or oiher communication network. The raobile device (e.g., serving as an access point) provides connectivity to other mobile devices. An access point is - device that provides wireless connectivity to a communication network utilizing any wireless protocol (e.g., the above mentioned protocols} that enables a mobile device to establish a connection, to a communication -network. A communication network is any network and/or access thai, in combination or alone, is capable of providing data to a mobile device. One example of ation network is the internet.
[34] Access points 120- 125 may be owned and/or operated by different entities.
Connectivity provider 1 0 may be one or more cells (e.g., eel! towers) of a cellular network. Connectivity providers 120- 125 and 130 are equipped and/or configured with the capability to provide connectivity services to. mobile device i 10 tor voice and/or data communication. Each of the connectivity providers 120-125 and 1 30 may use one or more wireless communication protocols, such as 2G (e.g., GSM, GPRS, EDGE, iDEN, TDMA. CDMA), 3G (eg., CDMA2000, I -SBViX), P2S-LMR, WCDMA, UMTS, EISPA), 4G (e.g., LTE, WiMAX), VOIP, IMS, IPTV, WLAN, Wi-Fi (e.g., one or more of the family of 802.1 1 standard from IEEE and the like), Bluetooth, and other radio-based, wireless, protocols, to communicate with mobile devices (e.g., mobile device 1 10). The protocols (e.g., those of 2G, 3G, 4G, LTE and later) used by a ceil tower of a cellular network may be referred to as cellular protocols. Mobile device 1 1 0 is equipped and/or configured with the protocols used by the connectivity providers to communicate with mobile device 1 10. ( The spelled out terms of the acronyms used herein are provided at m the last paragraph, }
[35] Access point 120 may, for example, be a Wi-Fi access point owned and/or operated by the use of mobile device 1 10, Access point 121 may be a free access point (e.g., provided at a city library), access point may be a commercial-based access point, access point 123 may be provided (e.g., for a fee or subscription) by a vendor or business (e.g., a coffee shop or an internet service provider), and acces point i 24-125 may be provided b other persons, businesses, and/or entities. Connectivity provider 1 0 (e.g., a mobile network operator) may be one or more eel! sites of the cellular network that provide cellular and other wireless communication services to mobile device ! 10. For example, cell sites of
connectivity provide 130 may support 3G and/or 4G (e.g., Ι,ΤΕ, WiMAX) protocols.
Services provided by connectivity providers 120-125 and 130 may be "announced'* r broadcasted to mobile device 1 10 and/or alternative network access provider 150 using, for example, proposal engines.
[36 j The proposal engines can be implemented in the access points 1 0- 125 (e.g., proposal engine 126 in access point 124), in a network (not shown), or on computing devices (e.g., data center, servers, etc.) of alternative network access provider 150 (e.g., proposal engine 156) thai communicates with the. mobil device 1 10. The. roposal engine provides, for example, access or a .reference to the terms and conditions (e.g., terms and conditions 155) for using a particular connection or connections. Mobile device 1 10 may determine whether to use services provided by a connectivity provider based on its; terms and conditions and possibly various oilier data front other source including measurements of signal strength or other parameters by the device.
[37] Mobile device 1 10 may use connectivity services for a new communication or a existing communication (e.g., changing and/or adding connectivit services). For example, when mobile device 1 10 needs* to initiate a new communication, mobile device 1 10 may receive information on available access points and select one, two, or more access points to use tor the new communication based on the provided information about the access points {e.g., terms and conditions for connectivity services and possibly various other data from other sources). Mobile device i 10 may change or add connectivit services providers for an existing communication.. For example, when mobile device 1 10 has changed location or the characteristics of the existing communication (e.g.. performance) have changed, mobile device 1 10 may request information on available access points and select one or more access points to use for the existing communication based on the provided information above the access points (e.g., terms and conditions tor connectivity services and possibly various other data from other sources). Information on and/or about an availabie access point (e.g., access point 124 ) ma be pro vided by the access point (e.g„ proposal engine 126 of access- oint 1.24) and/or alternative network, access provider 150 (e.g., proposal engine 156).
[38] Mobile device 1 10 may determine* select or identify one or more available connectivity providers 120- 125 and 130 to connect with (e.g., for connectivity services) using a selection engine. In some implementations,, a connectivity provider may be selected exclusively for a specific application (e,g., a gaming application). The selection engine can be implemented as a module that can work inside the mobile device 1 1 (e.g., selection engine 1 12} or on computing device of alternative network access provider 150 (e.g., selection engine 1 2} that communicates selection with the mobile device 1 10, or as a cooperative combination of functions executed on the mobile device 1 1.0 and on a server computer o alternative network access provider 1.50.
[39] A selection engine may determine to select a connectivity provider based on information associated with the specific access point as established by the connectivity provider (e.g., terms and conditions of connectivity services). Tire connectivity provider controls and/or manages the access point and its connection to the communication network or the internet In some implementations, information associated with a currently used access point may be considered in deciding to select art alternative or additional access point. Once a determination is made to select an access point the access point may be selected using any identifying information (e.g., a SSIIX BSSiD, MAC address, a unique identifier, a combination thereof, or the like).
[40] Services used (e.g., by mobile device ! 10) and services provided (e.g., by a connectivity providers 120- 125 or 130} may be accounted for using accounting engines. The accounting engines can be implemented. in mobile device 1 10 (eg., . accounting engine 1 16) and/or in one or more access points .120-125 or in another computing device in the network connected to the access point, for example in an access control gateway (e.g., accounting engine 128) thai keep track of the usage of the connections and report it to the alternative network access provider 1 SO.
[41 ] In some cases the accounting engines 12 in the access point or network or access control gateway are controlled by the connectivity provider that controls and -manages the access points. In these cases they may not report the usage to AN AP 150 but rather use the usage records collected by accounting engine 124 as a means of auditing the usage records collected by the accounting engine 1 16 and reported to ANAP 150, Fo example, during or after the end of a communication, mobile device 110 may report usage records 1 18 to ANAP 150. An access point (e.g., access point i 24) used by mobile device 1 10 may report usage records (not shown) to A AP 1 50 or use them tor auditing purposes as mentioned above, ANAP 150 may store usage records (e.g., usage records 158) for reporting, billing, and/or issuing payments tor the connectivity services on record (to be described in FIG. 1 B below). [42] In some implementations, one or more accounting; etigirs.es can be implemented outside of mobile device 1 10 and access points 120-125, such as at an access gateway server in the network and or on one or more servers of the alternative network access provider 150.
[43] A alternative network access provider environment, which may he referred to as an "alternative network access provider ecosystem" (e.g., proposal engines, selections engines, accounting en ines^ and alternative network access provider 1 50, all of which are described in further details below) enables wireless devices (e.g., mobile device i 10) to use wireless connectivity services from a variety of connectivity services providers (eg., access points 120425). From -the perspective of the connectivity services providers., an alternative network access provider environment enables connectivity services providers to provide services to different wireless devices,
[44] The al ernati e network access provider environment enables commerce or micro-commerce on providing data connectivity (e.g., bandwidth or data connectivit or transfe services measured either as the number of bytes transferred over each connection o as time the connection wa available or an oilier parameter recorded as a usage record). Embodiments of alternative network access provider can-include agreements (e.g., terms and conditions 1 55} with wireless operators/service provider { .! 70 and 180» FIG. IB) and/or individual mobile device users (e,g., user of mobile device 1 10} as well as with a number of individuals and/or companies that own or control Wi-Fi access points 122- 125, and with wired and/or wireless Internet service providers (190, FIG, .1 B). For example, an Internet service provider may deploy access point 123 as a wireless gateway or hot spot.
[45] FIG. 1 B is the example system for providing alternati ve network acces of FIG. 1 A with financial components. One or more wireless operators 170 may sponsor one or more access points owned, and/or operated by connectivity providers 1.20-125 to provide connectivity services to mobile devices contracted with the wireless, operators 1.70. Other sponsors 180 (e.g., online retailers, .financial institutions, employers, gaming service providers, advertisers, etc.) may sponsor "tree" connectivity services (e.g., provided y conneciivit provider 122) to users of the sponsors' services. Internet service providers (ISPs) i 90 may own and/or operate access points 123 and. 125 to provide connectivity services, hi the example of environment 1 OOB, ANAP 150 may serve as an enahler to match the connectivity providers 120-125 and connectivity consumers (e.g., mobile device 1 10).
Various payment and hilling arrows connectin A AP 1.50, wireless operators 170, sponsors 180, ISP 190 to ind cate that various payment and/or billing routes are possible based on the relationships of the services sponsors and. consumers. Providing billing and payment services to all partie -are described further below.
[46] FIG, 2A is a functional block diagram of an overview of another example system for providing alternative network access. FIG. 2B is a functional block diagram of the example system for providing alternative network access environment of PIG, 2A with financial components. PIGs. 2A~B are similar to PIGs. 1 A-B except for mobile devices 2.10, 220, and 222, Mobile devices 210, 220, and 222 each is shown with a selection engine, a proposal engine, and an accounting engine. I PIGs. 2A~B, mobile devices 210, 220, and 222 may function as connectivity service providers. For example, as shown, mobile device 210 accesses connectivity services provided by mobile devices 220 and 222.
[47] Selection Eagn
[48] A mobile wireless device that participates in the alternative network access provider system may have the ability to establish multiple wireless connections and/or change one or more wireless connections. For simpl icity a system that utilizes both Wi-Fi and 3G wireless connections is described, but the same' solution can include other available wireless connections (2G and/or 4G, Bluetooth and/or an other wireless radio access). Managing this connectivity in the mobile device or available to the mobile device through a network connection and operating on an alternative network access provider server system is a module referred to as the selection engine 1 12 and 152. The selection engine bases its operatio on rules and policies 1 14 and 15 that have been set either by the wireless operator or the end- user of the mobile device 1 1 G\ or any combination of rules and policies S 14 and/or 154. in some Implementations there is a selection engin both on the device and on the server system and the two operate in tandem using rules stored on both the device and the server. In some eases some rules are controlled by the operator and others are at. the discretion of the user. There can be a set of defaults so that the user does not need to do anything to activate the system.
[49] in one implementation of the selection engine i i 2,. the roles and policies 1 14 together with, information abou t access points in the vicinity of die mobile device may be downloaded to the mobile device and are subsequentl used to make an initial decision of connecting using the selection engine 1 12 when no other network connection of sufficient quality and speed is available, This initial decision may be based on a simpler and les dynamic set of rules and information. Once a connection to the server and the selection engine 152 is established, the rules and policies 154 by selection engine 152 are used together with other information to revisit and possibly revise the initial selection. The rules and policies 154 may have a higher frequency of updating than the rules and policies 1 .14, Also the rules and policies .154 may be more complex and include more parameters than the rules and policies 1 14. in ease the decision is revised to abandon the connection because a rule or policy 154, there may be a minimum time period until the connection is severed to avoid a negative user experience of enjoying only a momentary connection.
[501 The rule and policies 1 14 and/or 154 control whi ch of the available connections will be selected at any given time for each of the- applications that need a data connection. The level of 'sophistication in the selection process may vary among different implementations. For example, the following iactors may be included in the decision-making (e.g., in. selecting the connections to use). These factors or a subset of these factors maybe collected (e.g., data associated with the iactors} for each connection that the mobile device 1 10 can deieci at the time of selecting the connection to use for each application. The factors or access conditions include:
* price and ot her terms and conditions offered for of using each connection of devices the access points participating in the ANAP system (the Ask price). These may be provided by die proposal engine as described in the next section. The Ask price is very specific io the access point and may depend on a number of factors inel tiding time of day, day of the week or month, dynamic network operating parameters such as the load. It may also depend on the characteristics of and parameters associated with the mobile device for example the service provider associated with the device. The Ask price may also be dependent on the buyer of" connectivity services
• the price and other terms and conditions offered by the buyer of connectivity services for the specific device at the specific time and location (the Bid price). The offered (Bid) price may depend on a number of other parameters as well, including the day of the week or month, the cell tower or other access point that the device is connected to, dynamic net work, operating parameters of the currently used network and other information available to the ANAP 150 system or the mobile device. These may include information about the mobile device, its contract with a cellular service provider or the association of its end user with other organizations. For example, if the end user has a subscription with a certain connectivity service provider (possibly eabfe broadband service provider) and the particular access point for which the price is being offered beltings to the (hot spot) network of the connectivity service provider. the Ask price may he set to zero, while it would not be zero for end users that d not have such subscription
* quality of the signal based on measurement of the signal, .strength or signal -to-no.ise ratio or any other relevant parameter that is available from the radio system for each possible connection that the device can detect
» level of security available for using the connection
» throughput capaci y of the connection
» reliability (packet loss) of the connection
* latency and jitter of the connection
* bandwidth need or any other specific need for characteristics of connectivity of each application running on the wireless device or any application that the device as a need to initiate
* the specific application on the device that is requesting the access to or is already using mobile data
« the web site or specific service that the application is requesting to access
* information about special promotions or sponsorship for the connection
* buyer or potentially several alternative buyers for the connectivity service. It i
possible that for a spec fic connectivity service the cellular service provider is the buyer, but the buyer may also be a sponsor, for example a company that provides access to data when a specific application is " n top" or the main active application on the device. The buyer .may also be the end ser of a device. Each buyer may have, a different offer (Bid) price for the connectivity service
* acceptability of delay in transmitting the data as pre-speeiiied by Ihe application
provider or the end user for each application and the time elapsed from when the original request by an application was made .for the data r nsm ssion (For example, it may be specified as acceptable to delay uploading photographs to a website by one hour and the system may wait to see if a free connection becomes available- within fibs interval before selecting a connection with a non-zero price or the s stem may have different acceptable delays for using different eost levels or other specified characteristics of connections .)
* estimated drain on battery power of using the connection
* the speed, reliability or other characteristics of any connection that the device is
currently using or has been using in the past, for example if available data transfer speed of the connection provided to the mobile devise by the mobile network, operator with whom the end-user (subscriber) on the mobile service has an agreement falls below a set limit the connection decision may be affected. Another example is a situation where the device is connected to an access point 120 to 125, hut the speed of the connection or packet loss or other parameter falls belo set limits. In this case the decision about the connection would he revisited using the new information about tbe existin connection
* the result of a speed test, or other performance test of the connection. The mobile device may conduct a speed test or other performance test of its connection to the access point 120 to 125 or 130 at any time, for example immediately after establishing the initial connection. The speed or performance test may be based on. observing the
» Ϊ 5- data access speed of another application thai is communicating over the netwo k or it may be a speed test that Is specifically initiated by the device to check the quality of a new connection immediately after -establishing the connection. If the result is below a pre-set limit, which limit may depend, on the device and on. applications on the device, the selection engine may reverse the decision to connect to the specific access point and instead select another access point 1 2-0 to 125 or 130, One possible
implementation utilizes criteria that includes (he data transmission speed observed, immediately before connecting to the new access point. For example the decision to connect may be reversed if the data transmission speed is not higher than it was before changing the connection
* the geographic location of the device
* the radio (cell base station} that the device is connected to
* .inform lien about the movement of the device from any motion sensors or
aeeelerovnetevs or from tracking the GPS data
* special instructions (e.g., from the network operators, mobile device users, and/or access point operators)
[51 ] in some implementations, some of the connection, alternatives may have lower cost or be free. For example, one or more access point (e.g., access point 122} but may be sponsored by a business thai provides free wireless access in exchange with acceptance of commercial messages and advertising. Business entities (e.g., gaming companies) may provide tree access to certain web sites or services; or by certain applications (e,g.s gamin applications}. For example service providers or vendors may sponsor connectivity that allows the end user to visit their website and make purchases. Other access points may oiler lower
-lb- cost or free connectivity but require the right to collect location-based information of the user or may require responses to surveys. One example of useful location based information would be to collect the GPS system location of devices at specific intervals to measure the speed of traffic flows on roads and freeways. This couid be a commitment by the mobile device user that would be valid even when the system is connected through die regular 3G network, but could still earn privileges to use alternative network access provider connections as a form of compensation.
[52] The selection engine is the function that makes the selections about which data connection to use for each of the applications in the Mobile wireless device. I one embodiment this is done on a real time moment-to-moment basis based on the rules and policies and current information, including- price information and possibly other information as listed above, about each available connection. This information ma e available directly from the access point for example by using the recently established 802,3 lu communication standard, or it may be obtained from the alternative network access provider SO based on a reference system that is explained in more detail in the section proposal engine below,
[S3] in one embodiment the selection engine uses specific criteria set by the operator or the device user that authorizes the use of connections based on combination of two main parameters; The speed or other quality parameter of the connection that is currently available to the device (in the 3G or 4G system from the operator) and the cost of an alternative (supposedly better or faster) connection through the alternative network access provider system. The system may have thresholds for the quality parameter and acceptable cost. For example the tiers could he: a) at 300 kb per second and cost of up to three cents per megabyte is authorized b) at. 100 kb per second, the cost of up to five cents per megabyte is acceptable; and so on. [54] In art embodiment where the selection engine is hosted on a computer device on the network or in the alternative network access provider system the mobile, device 1 10 will send the set of selection factors and parameters to the selection en ine; on the computer system and the selection engine will return to the mobile device the identifying information and the necessary authentication information tor connecting to a connectivity provider that will provide the selected con.ncci. oii.
[55] in another embodiment where the selection engine is primarily boated by the mobile device, the mobile device will use the selection factors available from ihe proposal engine (as described in the next section) to make the selection of an access point through which it will establish a connection. It will, then communicate this information to alternative network access provider 150 and in return receive the aihhentieation information that will enable the connection. The authentication information can be, tor example, transmitted and/or exchanged using a protocol (e.g., 802.1 I ) that is the same or different from the protocol used in eoinmuni cation,
[56] In another embodiment the selection engine will compare the offered selling' price (Ask price) and the offered buy price (Bid price), which both are dependent on a number of parameters as described above, in eases that the Ask price plus a possible commission or other compensation for the ANA P system added on by the selection engine is lower than the Bid price the selection engine establishe a clearing price for the connectivity service. This price may be a price per Byte transmitted or time of connecti ity or any other parameter, "This clearing price is then applied by the accounting engine tor establishing the necessary payments and settlements between the buyer and the seller.
[57] Once a connection i selected the selection engine will provide to the mobile device any information that is necessary to establish the- connection through the selected access point. This authentication and authorization information may include wireless passpjbrases or passwords, account identification information and passwords, it may also include credentials for an access control gateway, it may include detailed information about how to post the user name and password to a page on an access control captive portal page or it may include digital certificates and other more advanced access contra! tokens and parameters. The selection -engine controls these authentication and authorization elements, which may be stored in encrypted form either in the selection engine database within the selection engine 1 12 or 152. in case of storage in i 12 the parameters may be downloaded together with the other information about the access points in the vicinity of the mobile device. These parameters may have expiration times and they may be changed at. regular intervals. The parameters are made available to the mobile device's connection functions only at the time of connection and are subsequently erased f om its memory. The end user will not have any access or visibility to the authentication or authorization parameters used by the selection engine, except, in cases where the end user provides such parameter for the system t use,
[58] In one embodiment, based on the connectivity selections and subsequent data traffic through each connection the mobile wireless device creates a detailed record on the actual use of each of the alternative connections utilizing another module called the accounting. engine. At intervals the accounting engine transmits the usage record to the alternative network access provider I SO, including its own identifying information -and the identifying information of each of the access points that provided the connectivity for each use, identification of the selected buyer of the connection, the negotiated pri ce point for the connection, as well as information about the terms and conditions in force at the time of the use. The usage data can be in the form of numbers of sent and received data bytes, time duration of connectivity or any other relevant variable describing the use. These record keeping functions are described in more detail in the section about the accounting engine below. The reporting of the connection: parameters can be performed in any manner. For example, the reporting can be performed using the RADIUS accounting standard for mobile devices,
[50] The usage data collected at the mobile device may also include information about the application that was using th data and about websites or other resources that were accessed by the application during the data use. This information may also include other parameters of the connectivity service, for example the connection speed, jitter, latency or other performance characteristics, it may be collected by the mobile device (e.g., using its accounting engine) for ail of the data including both the data provided by the alternative connections 120 to 125 and the connection 130 including in situations where 130 is the cellular data service provider for the mobile device. This data may be commtmicated to A AF ISO and used in directing billing to possible sponsors of wireless connectivity, for example providers of game" or other e tertainment applications or content or companies that wish to sponsor visits to their web sites where they may sell goods or services,
[60] in some implementations the operating system (e.g. Android or iOS, or
Windows operating system) in the mobile device enables use of mobile data by any application and regardless of the web sites or resources that are accessed. In. such cam the ANAP system and the accounting engine may include a specific browser versio for accessing web sites and other resources on the network that controls and limits the resources that can be accesses using the accounting engine controlled browser. The browser/accounting engine also includes- a module that keeps track of the web sites visited and other resources accessed and stores the .number of- bytes used for each access of a web site/web page or resource. This information can then later be used to allocate usage per resource. The system can be used to enable third parties, such as gaming application providers, web stores or content providers sponsor or provide free or reduced cost access to end users specifically for accessing their products and services on the web. The tracking may cover any and all available access points and networks -and the stored usage data can be used by the A AP to provide appropriate crediting of charging records to accumulate the costs according to the sponsorship arrangements.
[ 61 ] Other .statistics about the location of the device, signal quality, throughput performance of the access points and other parameters regarding connectivity such as the speed and availability for connecting through die mobile operators 3G or 4G systems and the sped t e time and location or the used cell tower ID of these observations may be collected and transmitted to alternative network access provider 150. The alternative network access provider .1 SO may use this data to compile useful information about the quality of
connectivity in various locations, and -the need for data capacity including tirne--of-u.se data and historical trends. This information could he sold to wireless network, operators or be made available (possibly for a fee or in the form of a marketing campaign) "to owners, or potential future owners of access points, or residents or owner of buildings and other structures in each area. The information, could he used by such operators and owners to make decisions about pricing or adding capacity in the form of registering existing access points with alternative network access provider, installing new Wi-Fi access points or other alternative networks. These actions would pro vide an opportunit to the owners of the buildings or access points to participate in the commerce of bandwidth through the alternative network access provider,
[62] It is important to note that selection engine may use several different radio connections simultaneously. These may be selected individually tor different applications running on the mobile device o may be aggregated to provide a higher total data
transmission capability for a single application, in other words mobile devices can "pool" resources to increase the data transmissi n speed. This is described m more detail below in. the section about resource pooling,
[63 ] The selection engine uses a combination of information to Implement the rules and policies for selecting connectivity. For example, it is aware of the connections provided directly by the wireless operator using their own network and is familiar with the connectivity through access points thai have been, configured to the wireless device by the end user. For example, these would include the access points at the user's home and office and other locations where free connectivity is available. However, in the alternative network access pro vider system, a new and important source of real time information about connectivity is available from a proposal engine residing in third-party access points (or in the network, or cloud, at a location from which it can be accessed by the selection engine), in order to participate in providing the enhanced connectivity through the alternative network access provider, each access point must have a proposal engine or provide a reference to a proposal engine.
[64] Proposal En ine
[65] The proposal engine (e.g., proposal engine 126 or 156} may be implemented, for example, as a module for or associated with each access point. A proposal engine associated with an access point provides information about that access point (e.g,, the availability, connectivity services provided, and/or other information) to mobile devices (e.g., to the selection engines associated with, the mobile devices). This information .may include the terms and conditions including the price (Ts&Cs) of use of connectivity through die access point and may include detailed information about t he characteristics of the connection. Implementations of the proposal engine may vary depending on the sophistication and capabilities of the access point device and the organization or individual that owns or controls the access point as well as the technical and business arrangements that provide the internet connectivity for the access point.
[66] in some implementations, a proposal engine associated with an access point may be deployed outside the access point (e.g., by a computing device on a network, at a cloud computing resource of the alternative network access provider or its partner, etc.). These implementations allow access points that can only broadcast their SSID and/or a unique identifier (e.g., a BSSiD, MAC address, etc,} to be used in an alternative network access provider environment to provide connectivity services to snore mobile devices (e.g., mobile devices not manually configured to use the access points),
[67] Seiection engines of mobile devices that can receive the beacons of the specific access point can obtain the Ts& s and other information from the alternative network access provider by using the identifying information (for example SSID, a BSS I D, MAC address, a unique identifier) of the access point as a reference, in one possible implementation this is facilitated by including in the SSID of the access point an indication or information about its participation in alternative network access provider (for example by including a specific string of characters, such as the letters "AN AP" in the SSiD). The selection engine may check for the Ts&Cs at an alternative network access provider without having to go through lists of participants' BSSIDs {or MAC addresses, unique identifiers, etc.). in some implementations; alternative network access provider provides periodic downloads of BSSIDs (or MAC addresses, unique identifiers, etc.), SSlDs, location, associated Ts&Cs, and any other identifying information, about the participating access points that are located in the vicinity of the current location of the mobile device. This expedites access to the relevant Ts&Cs and makes it possible to have this information available even in situations where the device does not have an open data, connection to the internet or alternative network access provider (e.g., cellular devices that cannot see a. cell or WhFi-oniy
--33- devices). The location information can be obtained from the mobile device's GPS s stem if available or by having the access 'point transmit SSl'D's (or BSSlDs, MAC' addresses, unique identifiers, etc.) of access points (whether alternative network access pro vider registered or not) in its range and having the alternative network access provider system correlate these to a database of access point locations. For rapidly changing locations (mobile device in a moving vehicle) alternative network access provider can extend the range of access points to- include in the direction, of the movement. This process of maintaining connectivity in this alternative is illustrated in FIG. 3. . The downloads may be scheduled to happen n regular intervals or they may be scheduled to take place every time a device has network access (possibly establishing a minimum interval between downloads). This mechanism is particularly important to enable devices that may only have one network access system, such as a. WiFi only tablet or Personal Computing device.
m
[69] FIG. 3 is a flow chart of an example process of maintaining connectivity in a where a. mobile device may be changing locations. At block 310, a mobile device may trigger or request information about available access points (e,.g.,. access points not already configured or set up to use by the mobile device). For example, a mobile device may provide the current information location to an alternative network access provider (ANAP) computer system or server. At block 1 5, ANAP system may compile one or more (e,g., a list) of access points (e.g., those in the vicinity of the mobile device and/or available for use) that have been registered to provide connectivity services In the ANAP system. At block 325, the ANAP system, may provide {e.g., via a download) information about one. or more access points to the mobile device. The information about an A may include:
* the party that is offering the connectivity services (Oris party may be referred to as a source, supplier, seller, provider) • the offered price, that can be used for all circumstances, at least for the first connectivity for a few minutes, until the device can connect to the sever to get an updated price (this is important to make the system work for Wi-Fi only devices and under conditions where cellular devices are out of coverage or congestion makes it impractical to get a current quote over the cellular network). N t that the offered price may he specific to the mobile devi ce, a type of device, a user, class of users, etc. For example, the server ma be aware of attributes about the device and can tailor the pricing in accordance of tire device
* one or more sponsors. A sponsor may be a party that is going to be paying for the connectivity services. For example, a cellular service provider may sponsor or pay for the services made available to users of the cellular service provider. A business (e.g., a coffee shop or online gaming provider may be a sponsor to allow patrons of the coffee sho or users of the gaming providers to gain free- access to connectivity services (to be paid for by the sponsors). A device owner can be a sponsor (e.g., a subscriber of ser vices that include the connectivity services provided by the access points.
« the offered price for using or consuming the connectivity services (e.g., the
bandwidth). This is the price that is acceptable under all circumstances, at least for the first couple of minutes, until the device can connect to the sever to get an updated price.
[70] This information is made available for a number of access points within a certain radius (e.g., .10. miles) around the ciirrent location of the device (or around a location that the device owner has specified through the user interface. At block 320, the mobile device may compare connectivity options (e.g., with existing/us ng and/or other access points, using current rules and/or policies) then scan for access points and obtains identifying information for the oiies hi ra ge. It also measures the si nal strengths of each. At block 330, the device then combines the pre-loaded information and locally available information from the device to make the determination of which connection is the best, in one. implementation, the rule may be as follows; set a threshold value for the signal strength (this would typically correspond to a good signal, adequate to get a good high speed connection) above this signal level the decision is made based on price. The lowest cost wins. Below the threshold decision of choosing the AP is based on signal strength. As long as the offered buy price is higher than foe offered sell price, the AP with the best signal is selected. Once a connection is established it .may be re-evaluated in light of the above rules and information if the signal strength falls below a set threshold, or it is possible that a tinier is set to re-valu.ate at specific intervals to see if a lower cost or a better signal connection is available. The intervals may be static or they may be dependent on the price of the connection or any other parameter known, to the device.
[7 ί ] At block 340, a connection or communication may be transferred from an existing connection to the newly established connection. For example, the mobile device and/or the access point at the other end of the existing connection may disassociate the communication. The mobile device and/or the newl identified access point at the other end of the new connection may associate the communication. At block 350, the mobile device may report details of use of a previous connection (e.g., one that has been disassociated) to the ANAP system (if the access to the disassociated access point is facilitated by the ANAP system). At block 355, usage information may be stored by the ANAP system for billing, payment, analysis, and/or other purposes,
[72] The access point may store the Ts&Cs and other information and provide them directly over the wireless li nk to the selection engine of each mobile device that is requesting to receive them. This could be done using the 802.1 1 u standard if both devices are capable of using this protocol It maybe that » n itbround two-way negotiation (or an auction) about the Ts&Cs is automatically carried out between devices. In this case the access point may be offering a price, the device ooukl counter with a lower price and the policies in the AP may enable it to .offer another price based on the counter oiler and so on. The process of maintaining -connect! viiy in an environment where some access po ts have interna! proposal engines and others rely on proposal engines at alternative network access provider s illustrated, in FIG 4.
[73] The Ts&Cs may have short period of validity and connectivit may be renegotiated at specific intervals as situations in terms of needs and available capacity will constantly vary, in case the proposal engine for the access point is implemented at the alternative network access provider the validity periods will he automatically downloaded to the mobile device together with the other terms and conditions by the selection engine, in case both the selection engine and the proposal engine may be hosted on servers of the alternative network access provider the information about the Ts&Cs and their validity periods is made available to both within the compute system environment. I some implementations, the alternative network access provider system can instruct a mobile device to immediately terminate a connection with an access point and can temporarily or permanently block the mobile device from that access point.
[74] The level of sophistication in the. terms and condition may vary between implementations but in one implementation (embodiment) the following factors or access conditions include:
* price of using the connection. This may vary according to- time of day or the day of the month or year and may depend on other variables some of which may be quite dynamic such as current demand from other selection engines.
* level of security available » historical data about available bandwidth (throughput), packet loss, stability, jitter and other parameters of the connection (the selection, engine may use this data but may have the mobile device conduct its own tesi.!? t etermine the bandwidth and other parameters for the bandwidth such as jitter, packet delays of retransmissions during the connection to make its own determination about th quality of the connection.)
* information about special promotions or sponsorship for the connection. For example some connections ma be sponsored by advertisers. In this ease the nature of the products being advertised and the frequency and obtmsiveness of the advertisements needs to be communicated to the selection engine for good decision-making. For example some end users may be interested in advertisements of topics that are close to their heart but may .not accept advertisements of other topics,
* Special instructions from the network operator and/or the mobile' device user
175] Other information pertaining to the terms and conditions of using the access point may be relevant. For example some access points ma belong to a network, of hotspots controlled by a wireless operator or wireless ISP that, offers fixed fee or oilier special pricing to subscribers of their services, in case the -mobile device is subscriber to the network the terms and conditions would normally be stored in the selection engine and the hotspot access point would provide information identifying it belongs to the group (for- example, in its SSID). Alternatively information about the AP belonging t a specific group of wireless ISF hotspots and its impact to the cost of using it can he communicated through the proposal engine jost like for other access points.
[?6j There may he special information transmitted by the mobile earner's own network. For example the desirability from the carrier's point of view to transfer the connection to an available Wi-Fi access point may depend on the- load on the tower or cell to which the device is -connected to. To manage the connections in an optimal way the carrier's proposal engine may instruct the selection engine in a wireless device at a. particular time to seek th.e lowest price alternative even. when, the tower or cell connection would be available, if the load .on the tower or cell connection is high.
[?? ] Other parameters affecting the Ts&Cs provided by the proposal engine were also illustrated above in the section about which parameters may be used by the selection engine to select, the connection.
[78] Whether all of these factors are included in the decision-making about the connection wil l depend on the level of sophistication on the proposal and, selection engines. For example, it is possible that the selection engine is capable of selecting based on signal strength and price. However, more sophisticated decisions are possible by providing more information and alternatives in the terras and conditions by the proposal engine and increasing the capabilities in the selection engine.
[79] Regardless of what level of sophistication is used in the decision-making, eac mobile device participating in the alternative network access provider system will use connections through different access points at different times. In order to keep track of the actual use of each connection and to provide information for compensation and settlements each mobile device has an accounting engine. Many of the access points may use either an. embedded or a cloud-based accounting engine to track' the capacity that it has provided to various mobile devices.
[80] In one embodiment, the accounting engine may use the RADIUS standard.
WR!X { Wireless Roaming intermediary Exchange) or another standard for access authorization and accounting to report and keep track of usage by the mobile devices.
[81 "I Accou nt i g E gin [82] The accounting engine collects and provides the data for the micro-commerce
In bandwidth which is used to reward and mcentivize all the participants in the ecosystem. The accounting engine keeps track of the capacity utilized by the mobile device through each of the connections that are enabled by the alternative network access provider as well as the specific: terms and conditions and the clearing price established between the proposal and the selection engine for each specific use of the connectivity.
[S3 ! As a minimum condition for operating in the alternative network access provider system, for example, each mobile device needs to have an accounting engine or be covered by an accounting engine that is implemented on a gateway server connected to the access point. In another implementation (embodiment) the accounting engine is implemented in the mobile device or as a spli implementation with one part being implemented in the mobile device for reporting the usage and another part being implemented on a server computer at the alternative network access provider. In this ease the accounting engine receives the usage reports from the mobile device and/or the access: point or gateway server. At least in a part of the connections the accounting engine receives a usage report both from the mobile device and from the access point or gateway server. This provides an opportunity to audit the reports coming from the mobile devices to make sure that the actual usage is reported correctly, in one Implementation (embodiment) the transmissions from the mobile to alternative network access provider use an authentication and digital signature mechanism, described below in the section about authentication and security.
[84] To the extent the capability is available in the access points they may include an. accounting engine tha can collect informatio about usage of data capacity by each mobile device. If such records are collected and made available to the alternative network access provider they may be recompiled and used to verify the usage records provided by the accounting engines in the mobile devices. In (me implementation the system of the alternative
nv network access provider automatically logs into the administrator's interface of the registered access points (using credentials provided by the access point owners during initial registration with the alternative network access provider) in order to retrieve information about usage of connectivity by various mobile devices. This capability and function may be utilized in a subset of access points; however, even so it provides a very useful auditing function to control that the reporting by the mobile devices is accurate,
[85] Alternative network access provider
[86] The alternative network access provider manages all the information, to enable the micro- commerce between owners of access points, the ISPs., wireless operators and possible the end-users of mobile devices. The exchange further manages the billing and payments between all parties (see FIG, I B), In one embodiment, the alternative network access provider is implemented as modules on a server.
[87] Managing Terms and Condit ns
[88] initially when an access point is added to the alternative network access provider it's SSID and other identifying information such as the BSSID, MAC address., unique identifier, etc. are registered with the exchange.
[89] Note that many access points can have dual SSIDs and may establish priorities for traffic in each identity. This way a hom user can dictate that any traffic routed to the homeowners own devices will have priority and onl excess capacity in the connection is made available for commerce through the alternative network access provider. In other cases people can set up separate access points connected to the Ethernet ports of their home gateways and register these for the alternative network access provider. In yet other implementations the systems have provisions and policies to allocate different priorities for traffic with different client devices, in these cases the access point owners ma eithe manually select high priority devices or the system may be programmed to automatically give higher priority to devices with high signal strengths, and frequent long term connections (presumably devices that belong to the. owners of the access points).
[90] If the access point or gateway has the capability of transmitting its price and other proposal information directly to connected devices (for example by utiliz n the 802. 1 i u protocol) then that may be the preferred mechanism of automatically negotiating commerce on connectivity. Alternatively the access point owner can store terras and conditions at the alternative network access provider linked to its specific BSSID, MAC address, unique identifier, etc, and other identifying information. In. this alternative the selection, engine will get the terms and conditions from the alternative network: access provider. As explained in the section about proposal engine, the alternative network access provider can be proactive and download the SSID's, authentication information and Ts&Cs for using the connection automatically to the mobile device for all the alternative network access provider registered access points that are in the vicinity of the mobile device at any given time. 'The location of the mobile device can be made available to the alternative network access provider either by transmitting the OPS. coordinates of the device or by transmitting information about access points in range of the mobile device or by well known network based triangulation methods. The alternative network access provider can correlate this information to a database about location coordinates of access points,
[911 aaagiag Osage Records
[92] The second large set of information that the alternative network access provider manages is the usage records, As selection engines make decisions about which connections to use for various applications, the wireless device will transmit and receive data using different access points at different times.
[93] The actual usage gets recorded by the accounting engine and detailed information about the use is transmitted to the alternative network access provider. Usage data may include, for example, the amount of data transmitted and received, which can be broken clown by time of use, the application that transmits and received data. etc. At least in cases where the mobile wireless device received the proposal engine information directly from the access point, the term and conditions and clearing price in force at the time of the usage may get recorded by the accounting engine. As explained above, the alternative network access provider may get usage information from the access points or access control gateways thai may be connected to multiple access points. This may be used tor billing and for verifying the correctness of information from the mobile, devices. One implementation of obtaining this information through the administration, interface was described above in the section about accounting engine. In another implementation usage information may he- available from gateway servers in the network of access points. Such servers may be operated for example by wireless iSPs or operators of enterprise networks. The usage information for each subscriber and for each access point is then compiled in. different ways and used as the basis for settling the compensation for using the bandwidth with all the parties involved.
[94] The coram uni eat ion..between the accounting engine and the alternative network access provider may use any protocols or standards (e.g., the RADIUS standard), [95] Providing Billing a«d Payment Services to AH Parties
[96] Depending on the agreements between, various parlies the bandwidth, or data transmission services may be sold by the alternative network access provide to the wireless operators who in turn will bill their customers for its use In accordance with their subscription agreements with each customer. As described above many other possible buyers of connectivity services may also be involved.
1 7] Alternatively the alternative network access provider may establish direct relationships with the end-users of mobile devices and sell the alternative network access provider capacity directly to the end-users. This may be through fixed-price or per use or
..ΤΪ. other creative commercial arrangements usin prepaid, postpaid or barter agreements (for example the owners of access points usual l y are the owners of mobile devices and may receive some or all of their mobile use of die alternative network access provider bandwidth in exchange of making their access point's bandwidth available for other mobile devises registered with the alternative network access provider).
[98] Third-party aggregators can create agreements with end users of wireless mobile devices (or with owners of access points) and negotiate "wholesale" terms with the alternative network access provider. Regardless of how the selling of bandwidth is organized, there are, on the other side of the commerce transactions, the providers of the data transm ssion capability, the owners of the access points. The alternative network access provider uses the information, provided by the accounting engines for settling the accounts with the bandwidth providers. Which may be the hoispot providers (or W SSPs) or new kinds of ISP's, in some cases operating together with individual access point owners or various aggregators of Wi-Fi capacity. The same accounting engine data, this time aggregated by the ISPs, can be used for providing an appropriate and agreed compensation to the ISPs.
[99] in practical terms any compensation to the individual homeowner who have registered their access points in the alternative network access provider may be provided through their ISPs. In this alternative (embodiment) the payments, received from the alternative network access provider will be applied to the invoice that the fSP would be sending to the owner of access point for the ISP's service. Often the ISP provides a bundle of services including telephony, and television services. Therefore the total bill may be large enough so that this compensation mechanism, can be used eve for access point owners that have great deal of the alternative network access provider traffic flowing through their connection.. [ 100] One more set of participants in the commerce is. the sponsors of connectivity.
Through, agreements with hoispot owner organizations, or even, individual access point owners, various companies may offer to pay for bandwidth in return for ability to' rovide advertisements or commercial messages io the end-users. As mentioned .in the section about proposal engine, other forms 'of compensation by the end-users may be used, it may be possible that the use of bandwidth is sponsored for accessing specific websites or other services. For example access- to sites that offer specific products for sale may be sponsored by the owners of the sites, In these cases the alternative network access provider will provide billing to and collect payments from the sponsors for the usage of the sponsored bandwidth.
[ 1 1 } FIG. 5 is a data and process flow diagram of an example implementation of alternative network access provider,
[102] The alternative network access provider enables local micro-commerce in connectivity and data transfer capacity by making information available to potential buyers (users of wireless mobil devices} from po tential, seller (owners of access points) and by executing the micro-commerce transactions. In the process the alternative network access provider will accrue detailed information about the need, acceptable pricing and availability o connectivity and data transfer capacity in different locations and at different times. There are several ways of charging for the service produced by the alternative network access provider. Some preferred alternatives are listed in the following.
* a brokerage fee arrangement charges a percentage of the value of each transaction mediated through, the exchange. In this case one possibility is to include the brokerage fee in the price offered in the Ts&Cs of the connectivity proposal. The overall process for utilizing the. alternative network access provider in a brokerage mode is illustrated in FIG. 6A * an intermediary market maker business is based on the alternative network access provider and negotiating terms and conditions with access point owners (with or without minimum purchases) and then selling, the band idth to owners of mobile devices o its own account at a price him that mobile device owners are willing to accept. The overall process for utilizing the alternative network access provider in an intermediary mode is illustrated in FIG. 6'B
* membership tee may be charged for. each participant n the marketplace
* information about the marketplace needs and activities in different localities may be sold to market participants and their infrastructure providers
* the alternative network access provider may facilitate participation of new sellers and buyers in the market by establishing and communicating local price levels,
« the alternative network access provider may create or trade in or enable other market participants to create, buy or sell sophisticated contracts including guaranteed minimum bandwidth, duration of the arrangement, characteristics of the bandwidth, for example reliability, jitter and packet loss.
* the alternative network access provider may create or trade in or enable other market participants to create, buy or sell futures contracts on bandwidth in specific locations. For example providing bandwidth, during meetings, events, and/or conventions in specific locations may offer an opportunity to sell it a higher prices
[ KB] esource Pooling through Ike atteruatlve network access provider
[! 04] The functions of the alternative network acces provider have been described as they would be osed for the purpose of providing connectivity and capacity to w eless devices through essentially stationary access points with wired connections through ISPs. However, the same s stem can be used in iiizing connections that are transmitted via other mobile devices. In this scenario each of the mobile devices includes a proposal engine . and can offer to transmit a connection, in essence acting as a .mobile access point. The network connection for this mobile access point can in this scenario be: provided by the network operator through its infrastructure or it can be rooted through the Wi-Fi access point, i r example utilizing the alternative network access provider mechanism as described above in eases where more than one Wi-Fi radio system and frequency channel are available in the device. This use of the alternative network access provider for pooling wireless connections is illustrated in FIGs. 2A-2B,
[J 05] There are already on the market solutions in which mobile smart phones act as
Wi-Fi access points for other devices. What is added to this mechanism are the functions thai make it possible for any device to support other devices in this f shion and get compensated for this service in accordance with terms and conditions negotiated between, the devices or though the alternative network access provider with real time pricing based on the alternative network access provider functions. The alternative network, access provider can be implemented to handle the compensation and settlements between the devices,
[ 106] There are a rapid! growing number of Machine to Machine (M2M) wireless modules deployed for purposes of providing asset Tacking and monitoring services. These systems may be using a fraction of the capacity of the connection. Adding Wi-Fi functio and registering the devices in the alternative network access provider could in many cases turn them into revenue sources.
[ 107] In addition, the connection can be transmitte through several wi eless devices tbrming a mesh network. Again the alternative network access provider mechanism ibr accounting ibr the usage and providing payments to participants would be the commercially enabling new dimension to previously proposed mesh network systems. Π 08] The benefits derived from transmitting connections between mobile devices
Include providing further connectivity in areas thai otherwise would not have sufficient capacity. However, a more frequent and important benefit is pooling the data connectivity resources of several devices using the "peer to peer" wireless connecti vity . Much of the usage of the web may include intermittent downloading (of new files, songs, webpages or images) and this activity between different devices may be asynchronous. Therefore, pooling the connectivity resources will in. effect increase the speed in the user experience of all participants in the connectivity pool. All the various radio resources (Wi-Fi, Bluetooth and other radio systems) on each device can be utilized in. establishing connections between mobile devices and connections to the Internet. Again the enabling systems and methods for obtaining these benefits are the alternative network access provider functionality as explained above.
[ 109] The connection pooling provides a barter tradin opportunity. Since the same devices participating in the connection pooling will he providing connectivity as well as utilizing connectivity provided by others the net cost for each participant maybe positive or negative depending on the usage patients,
[1 1.01 This same resource pooling method applies to pooling between stationary access points as well. At, the current time in most cases local area wireless network speeds are many times higher than wide area network connectivity through cable modem, DSL or even fiber connections, In. cases where there are multiple radios in each access point, similar peer to peer connectivity can provide access to several simultaneous wide area network connections. Situations with at least two wireless radios per access point are becoming more common as dual band (2,4 and 5 GHz) access points will gradually gain, a higher share of the installed base. Again, tire micro-commerce system of the alternative network access provider Can handle the enabling of access point resource pooling and the appropriate compensation to
- S- each articipant in the pool. The observations about intermittent downloading and benefits to user experience of all participants appl to this stationary case as it did for the mobile ease. In practice resource pooling can include both mobile and stationary devices operating in a mixed mode pooling configuration.
111 1 ) Authentication* Security ami Gateway Co»necti n.s
[1 12} There may be two or more nested levels of access in a Wi-Fi implementation for accessing the internet through the alternative network access provider; one deals with the wireless access to the access point itself and the other controls the access to the Internet, Using encryption and password access to secure the connection to the access poi t is optional in the alternative network access provider system. 'The more important aspect -for the alternative network access provider functions is the authentication, airdiorizatiorg access control and usage .measurement and recording (accounting) of access and data traffic to the internet or possibly to the. Mobile Operator's core service system. Similar systems of authentication and access control can be used at both levels of access,
[ 1 13] hi some implementations, access control and accounting functions may be managed using one or more other methods (e,.g,. Extended Authentication Protocol (EAF). Wireless Internet Provider roaming (WiSPr), and the like),
[1 1 ] hi one implementation when initially registering wit the alternative network access provider each mobile device establishes a public/private key in a standard P 1 mfrasirueture system, The private key resides in the mobile device and is used to authenticate the device to obtain information about connecting io the alternative network access provider enabled access points, in a similar fashion the usage records can be encrypted using the private key of the mobile device and a digest of them can be added, encrypted using the public key of the alternative network access provider, to make sure that they have not been altered during the transmission and storage,. For access points that are capable of handling similar security functions, a corresponding public/private key combination may be established when they register for the alternative network access provider.
[ i 15] The Security aspect for the access control, information for the wireless connection specifically can. be handled, for example, in the following way: in cases where the Ts&Cs of the proposal engine are obtained from the alternative network access provider it is possible to control security ' transmitting the access point authentication password to the participating mob le device encrypted with its public key after the device has signaled acceptance of the Ts&Cs for using the connection through the particular access point.
[ 1 16] In one implementation the alternative network access provider changes the password or access credentials of participating access points at specific intervals and coordinates these changes with ail of the authorised devices including the ciieui devices of the access point owner and the devices to which acces is provided, through the alternative network access provider commerce arrangement, in this solution each access point owner registers all of the authorized cl ient devices with the alternative network access provider so they can participate in this continuous password change process.
[ 117] In another implementation the sequence of future passwords is generated using an algorithm that is made available to all authorized devices (devices of the access point owner) which algorithm may be time based and use tables of randomly generated passwords. The alternative network access provider has the same synchronised password generation System so it can provide password to the devices that it is enabling as a result of a alternative network access provider commerce transaction..
[ 1 18} 'In yet another implementation, the alternative network access provider provides limited connectivity to all devices through the access point to an authentication server that can automatically provide access to devices pre auihori¾ed b the access point owner or to devices that can input a password. The same authentication server can then be used io manage access for devices that are utilizing the alternative network, access provider to gain access through the commerce transactions.
[ Π 9] One implementation of security provides for dual SSI D and security arrangements, at. the participating access points. This wa the owners' devices can continue to use their familiar log on functionality and the alternative network acces provider enabled devices will use the secondary SSiD and security system.
[ 120] FIG, iC-D show example access point configurations, in a hardware-oriented security implementation, the alternative network access provider-registered access point is a separate device provided to the owner/iiser of a wired Internet connection. 'This device has i!ie proposal engine or a reference to it and is registered with the alternative network access provider. Depending, on the owner's equipment and preference there are different ways to connect the device to the Wide Area Network. These provide a way to maintain the security arrangements of the owner' s original access point and minimize (perceived.) security issues. For example the two access points may be connected to the WAN through a network switch or the alternative network access provider acces point may he connected to a secondary Ethernet port of -an internet gateway/router device.
[ 121] it is not the purpose of this description to address the detai ls of authentication,
IP tunneling, access to operators' premium services and other issues related to security of the data transmitted through alternative network access provider connections. As mentioned in the introductory section, there are alread quite advanced solutions described in. the 3GPP standards and several vendors are - offering solutions for the- technical aspects.. of
authentication and security related issues and those are used in various embodiments,
[122] PIG. IB is a block diagram of an example wireless mobile device. The wireless device includes two or more wireless radio systems with their associated antennas (2, 3, 4, FIG. 1 E). The device includes, for example, a processor (5) capable of executing
-4j - applications and of controlling the status of the radio systems and storage or memory (6) for storing and retrieving data and programs for applications. Further the device has a user interface (?) which allows a user of the device to interact with applications and to control various functions of the device. For example, the. user .may use the interface to turn on and off the various radio system's or he may use it to make the selection that a software application described in this document shall control the state of the radio systems.
[I 23] Various applications executing in the processor may have communications needs and they would use the radio systems to satisfy them. This election of which radio system is used for communication is often made by the processor. In many cases wireless devices have been programmed by the manufacturer to uti lize a particular radio system, for example the Wi-Fi radio, for data communication, needs if a connection to the Internet can be established through the system.
124] In order for the wireless device to utilize a particular radio system the specific radio system needs to be turned on, The radio system can either be turned on and off by the user through the user interface (7) or be automatically turned on and off by the device by executing an application in the processor that controls the state of the radio.
( 1251 Once the radio system is on, it can attempt to connect to the Internet or to the telephone network over the various radio systems. In some cases the network system will require authentication, for example a password in order to allow the connection to go through.
[126] In the followin sections various methods to automatically manage the state of the radio systems and the selection, of the specific connection for communication e described.
1127] a.«ag*«g the slate of the radio systems based OR data communica ion need or speed [128] The following paragraphs in this section assume thai the user of the device ha made the selection- to let a softwar application manage the state of the radio systems,
[ 1 9] For clarity the following examples are written t illustrate the management of the Wi-Fi radio system. However, it should be understood that the same mechanisms and principles can be used to manage the stage o f any other radio system as well.
[ 130] in many wireless devices it is customary to have the cellular radio system on all the time whether it is 2G, 3<L or 4G radio, or a packet-based LTE radio. Thi system bandies the communication with the mobile service provider including voice calls and tex messages. If there is no o ther radio systems available the cellular radio system handles any data communication that the device may require. However, in many cases the data amimu.nicatio.tt is automatically switched over to the Wi-Fi system if a. connection to the internet or other baekend system i available through the Wi-Fi radio. This is because in most cases it is less costly and uses less battery power to send the- data communications over the Wi-Fi system. Some mobile devices may be equipped with a Wi-Fi radio that is able to communicate with two or more access points (e.g., using different Wi-Fi protocols)..
[ 1 i ] in one embodiment of the solution an application running on the processor of the wireless device periodically checks the amount of data that is being transferred,, or needs to be transferred, through the- radio systems. If the amount of data transmitted over a particular time interval exceeds a predetermined value the application turns on the Wi-Fi radio. Stated, in a different way; if the speed of data transmissions exceeds a predetermined threshold, the system turns on the Wi-Fi radio.
( 132] Always when the Wi-Fi radio is turned on it will scan the environment to see what if any, Wi-Fi access points are available and whether they require, a password, or other credentiais for a connection. If there is at) available access poi nt or several access, poin ts die device will connect to one of them if the device has information of any passwords that may be required for a connection.
[133] Connecting 1o the Wi- Fi access point may not mean that there is a connection to the internet. The device cheeks whether the connection is available, for example by requesting a specific website to provide a response and then comparing the received response to a stored copy of the expected response. This way the system can determine whether any access control gatewa has redirected to a connection to a page that may require input of credentials,
(134] The device, in one embodiment continues to monitor data traffic in the communication system and if it detects that the speed of the traffic tails below a certain predetermined threshold for a. predetermined time it wilt turn off the Wi-Fi radio, in another embodiment die device would leave the Wi-Fi radio on as long as the device maintains a connection with the access point and the signal, strength, or the s gnabto-noise ratio in the connection to the Wi-Fi access point stays above a predetermined threshold. If the connection signal strength or other quality indicator fails below a predetermined value the device will disconnect and turn off the Wi-Fi radio.
[135] in another embodiment the device processor keeps track of the active applications running in the device and as soon as an application that has significant communication needs is activated, the system will automatically turn on the Wi-Fi radio. This initiates another scan of the environment and, as explained above, possibly a connection through the Wi-Fi -access point. A list of applications that may have significant
communication needs is in this case stored in the device's memory (6). For example, the list can be precontlgured by a user or can be determined automatically over time by .monitoring the data usage and patterns of use of various applications. [136] Another 'indication of possible data communication needs is the overall state of the device and the state of its display. In order to conserve battery power the devices automatically go into a "sleep" mode, in which the display may be turned off, and any other processes and device may be .suspended. During these times the system may turn their 'Wi-Fi radio off and adjust the so-called wake-up interval as explained later in this description.
[13?| Managing the radio systems based OH dala com unication' locations
138] In addition to keeping track of the data communication speeds and the applications that may have data communication needs the device processor may use the observed current and a set of previous locations of the device for making the decision about turning o the radio,
[139] While there are proposed solutions in which the user of the device may program various locations into the memory and the system will then turn on Wi-Fi radio in these locations these systems are cumbersome and requ e significant effort by the user to input information about selecting locations where to turn on the Wi-Fi radio and the locations would need to be manually updated as the use patterns and availability of wireless networks in various locations changes.
[ 140] in one embodimen of the solution the wireless device stores in the memory
(6) the location of use of data communication, the radio system used for the data
communication and the total amount of data in each communication, session, the t me of the session as well as the application using data communications. This information is then used to let the device learn the locations where significant data communication takes place and where a Wi-Fi radio connection, (or any other particular radio system) is used for this communication, in one embodiment the system rank orders the locations based on data usage and possibly based on the percentage of successfully using Wi-Fi and uses the top locations in the ranking as a basis for turning on Wi-Fi or shortening the wake-up interval. The system ma just automatically turn on the Wi-Fi radio whenever it detects the device is hi a location or within a certain distance of the location where communication ver the Wi-Fi radio system was previously successfully used.
[ 14! ) in order to avoid the drain on the. battery from using the GPS system the device may first try to establish its location based on triangulatkm or other method utilizing the cellular radio stations or access points for Wi-Fi or other radio systems that it detects during routine scans and operation. The .frequency of the location cheeks and the- method of checking the location may' be selected based on past history of the frequency of data communications, time of day, day of week or oilier parameters characterising previous data communications.
[142] Sometimes the device .may he in motion while die data use is going on., for example in a moving vehicle, hi these cases the opportunity to utilize Wi-Fi connections may he limited because of the time required to establish a new connection and the shortness of the time any particular- Wi-Fi access point would be available for the connection. To avoid unnecessary use of the Wi-Fi radio in these circumstances the wake up interval m be made longer or the Wi-Fi radio may be turned off if it is detected that the device is in motion, 11431 Managttig the radio systems based mi time
[ 144] in addition to data communication needs and observed locations of data communication, the solution uses time based methods for managing the. Wi-Fi radio. There may be several inputs to selectin times when to turn on and off the Wi-Fi radio. As mentioned i the previous section, the: times ma be based on. the pattern, of observed behavior regarding data communications or may be based on user input.
[145] While there ar systems that provide the opportunity for the user to input a schedule lor turning on and off their' Wi-Fi radio, these methods provide- a partial improveraenf compared to al ways having the radio on or always off. They may affect the actual state of the radio to turn it either on oroff.
In. this solution there is a mechanism through, which the. Wi-Fi automatically periodically turned on. Upon taming on die radio the device performs a fairly rapid, scan of the environment and determines whether there are any access points that are available for a connection, if there are, the system will associate and may remain associated until signal quality degradation may result in a disassociation. Upon disassociation. the device wil l turn the Wi-Fi radio off. If there are not any access points through which the device can establish a Wi-Fi connection, it will automatically turn off the Wi-Fi radio for a set amount of time, which we will call "the wake~up intern!".
[ 147] in this solution ie time based management system of the radio may not merely he turning on and off the radio at predetermined times but it may be affecting the length of the wake~up interval. For example during times of day and days a week thai the device lias had frequent and high-volume- data communication the wake-up interval may he made shorter,
[148] The wake-up interval may depend, on the overall state of the wireless device and the state of its display. If the device is in so-called sleep mode the wake-up interval may be made longer. A status change from sleep mode to nonnal operating mode may trigger an immediate turning on the radio and a scan of the environment for Wi-Fi access points followed by a shorter wake-up interval in ease n access points are found that can provide a Wi-Fi connection.
[ 149) In Wi-Fi access point connections the signal strength and quality may depend on a number of factors including the distance to the access point, the way the user is holding the device and interference from other devices like microwave ovens, in these eases the availability of a connection may disappear for a short period of time and return as the circumstances change, For this reason, the .solution, in one embodiment has a short wake-up interval for the first couple of tries after a disconnection and then changes over to a longer interval In accordance with the device situation data use and other parameters.
[ 150] Some wireless devices .allow the user to configure tasks and applications to execute when there is a Wi-Fi connection to the internet or a backend system. For example uploading photographs from the device and synchronizing auy podc sts or other content or performing software updates may be tasks that the user has configured to be carried out over a Wi-Fi connection. The wake- up interval may be determined so that it is likely that these tasks will get completed within the time expected by the user after he or she arrives at a location where Wi-Fi is available. Without a wake-up. interval and time based. Wi-Fi radio management these tasks might not get completed even though a Wi-Fi. connection would he available, if the -only mechanism for turning on the radio would be dependent on. observed data communication speed the radio would not tarn on since the applications will not start before it is on.
f lSI ] Managing the radio systems based, o» the performance characteristics of ail radios
[1 52] In addition to the methods described above the automatic turning on and off various radio systems can be based on the performance ch racteristics of observed for the di ferent systems. The metrics used to measure the performance may include the relative signal strengths, the automatically selected encoding rates for each radio communication alternative, the relative battery consumption of various radio systems or any other metric that is available to the processor, in this solution the system may perform periodic checks of the performance level ibr example by transferring said, amounts of data ove the radio connection to serve the data communication speed. [ 1 53 } The system may be- -performing brief speed tests with various radio systems and have logic that determines that a certain a vailable speed level in each of the radio systems will cause the connection to be switched over to that system. Other characteristics of relative performance may be measured and this may result in more complex logic for selecting which radios to use and which ones to turn off and how long the wake-up intervals should be for the radio that have been turned off
[154] Managing- the radio sysietws based .a cost
1155] In some embodiments of the solution the Wi-Fi radio or other radio systems may have predetermined or known costs associated with data communication over the radio link. For example this cost may be provided through an alternative network access provider enables- as described in I; ,S. provisional app. Ser. No. 61/618,3 18, filed March 30, .20 ! 2, entitled "Systems And Methods For Alternative network access provider", and U.S.
provisional app. Ser, No, 61/363,735, entitled "Method and System for Real Time Micro- Commerce in Wireless Connecti vity," both of which are hereby incorporated by reference. 156] In ease die cost of communication is known or can be determined, it can be used to select the communication link between different alternatives. These alternatives may include multiple 'Wi-Fi access points and cellular radio, WilYlAX and other .radio systems. In .one. embodiment of the solution the selection of the connection -to be used is based on the cost and possibly by a policy provided by either the device owner or the communication service provider that is providing die ee'lluiar communication to the device and baa a contract with the device owner.
[.157] in case a certain radio system is not selected for communication the system, may automatically turn off the radio in order to sav battery power and set the wake-up interval based on. time location and history of communication.
| !58| Managing the radio systems based on combinations of factors [159] The earlier sections of this application have descri bed various factors that can be used in managing the state of the radio systems in a wireless device and in managing the selection of the specific communication link,
[ ϊ 60] In additional embodiments of the solution, various combinations of all o some of the factors can be used to achieve optimum management of the radio resources with regard to battery power and cost. For example the wake-up interval can be set to be different at different times of the day and at different locations of the device and may depend on which applications are active in the device.
f 161 ] Similarly the wake-up interval may be made to depend on the past success in establishing a Wi-Fi connection in a particular location. For example, if the device has tried a fe times to find an available access point for a. Wi-Fi connection in - particular location and ailed, the system may make (he wake-up interval longer in thai location to avoid unnecessary attempt's. For example the wake-up interval for that location may be made to he a day or several days so that the system will catch a possible addition, of a new acces point that may be made available, but will not waste resources in trying to connect frequently in. places where no connection has bee available - before. Access points may be available for a particular device because they do not have a password protection or access control gateways controlling access to the internet, because the password has been stored in the memory of the wireless device or because they can be accessed through, a alternative network access provider,
[162] Similar, other, complex combinations of variables explained in the previous sections may be utilized to precisely tune the management of the state of the radios and connection, selections to achieve the optimal battery savings and cost savings,
f M3| '.Ecosystem of .Software sad Component Providers [ 164] This description introduces a method and the system with the associated functional, descriptions to implement embodiments. The systems and methods can provide the means to harness the enormous wireless capacity already installed in people's homes and in enterprises. In addition as a result of establishing the alternative network access provider, an entire ecosystem of access- oint, pieoceil and iemtoeeil providers will take shape. Large numbers of these, relatively inexpensi e devices, can be deployed and connected to the i nternet and through the cloud-based service of 'alternative network access provider, their capacity can be connected directly into the ecosystem. Their owners and raaintai ers can be compensated through the alternative network access provider for the micro-transactions of providing bandwidth to wireless devices in. their vicinity. However, in this ecosystem there will he many other participants as well. The central aspect of the alternative network access provider solution is that it provides a platform tor large numbers of different kinds of participants to provide products and services thai will enable the commerce,
[ 65] By publishing the interfaces and APIs for communicating with the alternative network access provider for the purposes of providing terms and conditions for use, usage records and for automated payment transactions die managers of the alternative network access provider can make it possible for third-party companies to write applications for the selection engines and proposal engines for various kinds of mobile devices and access points. Alternatively the proposal and selection engines can be implemented on the alternative network access provider computer systems and the .-interfaces (APIs) provided to other ecosystem participants include specifying the method and format of providing the
information described above that is needed for the proposal and selection engines to work and .a format and method for providing the operator specified rules and policies.
[166} The published APIs wil l make it possible for already established companies that provide solutions for secure gateways and for mobile devices for Wi-Fi offload to add the functionality of proposal, selection and accounting engines and the above explained secure routing of terms and conditions and .usage data to the alternative network access provider cloud-based information .system,
[ 167] The published APIs wil l make it possible for different kinds of sponsor organizations to create applications for wireles devices to display their advertisements and collect survey results. Because of the local nature of access point connectivity the system will already kno to a certain degree the location 'of the wireless device and its end-user so many advertisements ca be local in nature and relate to products and services that are available in the vicinity of the end-user even in. eases where the end user is not willing to provide precise location information from the wireless devices GPS system.
[ 168} These enabling applications can he certified by the- lternative ne work access provider and sold either through wired IS Ps or directly to owners of access points and either directly or through wireless operators to the end-users of wireless devices.
[169) There ma 'he service pro viders and equipment manufacturers- who can add new alternative network access provider based features into their existing offerings and thereby generate new revenue opportunities and increase the a vailability of mobile data capacity. Examples include:
[170] municipal outdoor Wi-Fi service providers who can sell their excess capacity in retail, through, the alternative network, access provider
[ 171 ] providers of satellite based Internet connectivity, in this case it would be effective to utilize the installed physical satellite receiver structures, which are already outside the buildings and may be in an. elevated and visible location. Adding a high-powered outdoor Wi-Fi access point to these structures would provide a large coverage area around th saieiiiie receiver location. To maximize the possibility of mobile device connections and the opportunity for micro-commerce in may be several access points with sectional highly directional antennas could be used in each structure,
[Ί 72] Manufacturers of indoor access points-may provide a combined -client access point device that can be placed on. a wiiid wsi.11 in areas of high data connectivity need. This device would connect to the existing wireless access point as a client, and project wireless signals as an access point outside the building,
[173] Companies roiling out new 4G networks or operating WilVlAX networks are today limited by lack of end-user mobile devices that are capable of directly connecting to these new networks. The alternative network, access provider provides a mechanism for these companies to reach a much wider customer base immediately. By installing intermediary bridge devices that connect to the Interact using the new network technologies (like 40, LTE or WiMAX) and. on the other side provide simple local Wi-Fi connectivity that is made accessible through the alternative network access provider they can serve any Wi-Fi enabled devices,
[174] Providers of M2M connectivity modules or services may use a small fraction of the capacity for simple asset tracking or monitoring can add a Wi-Fi module. and get paid for their M2 functionality by selling the excess capacity through the alternative network access provider.
[ 175] As radios continue to become less expensive and more and more radios -can be integrated into a single chip SOCs, the opportunities increase for creating completely new products that are specifically designed to provide data connectivit services and rely on the alternative network access provider to handle the commercial aspects of their utilization.
[ 1761 FIG. 7 shows an example process. The process may be implemented to manage a radio of a device. This example is illustrated with two radios (e.g., mdios i and 2). However, an implementation may include any number of radios, When radio 1 is on and radi 2 is off, process 700 may be used to manage the radios (e.g., manage the on/oil stages of the radios} to, for example, minimize power consumption. Process 700 starts with decision block 705 being made to determine if a wake-up event has occurred, A wake up event may be triggered, for example, if a specific application is being executed, the throughput of radio I is above a 'high threshold or below a low threshold, the quality of an existing connection with radio I has deteriorated (e.g., a low signal to noise ratio), the location of the device has changed, etc. if a wake-up event has occurred, process 700 flows to block 715 where radio 2 is turned on. If a wake-up event has not occurred, determine if a wake-up interval has expired at decision block 710, When the wake-up interval has expired, turn on radio 2 at block 715, If not, process 700 loops back to decision block 70S,
[177] After radio 2 is turned on, scan for available connecti vity access (e.g., available access points) at block 720. If found at decision block 725, perform a connectivity test at block 730. Just because an access point is available docs not guarantee that the access point can connect to a desire source (e.g., on the Internet). The connectivity test may be a simple "ping" command to a known destination, an access to a known website, or by any manner to establish that an end-t -end connection is likely to succeed, a determined in decision block 735, using re access point found at block 720.
[ 1 8] At block 740, a determination (e.g., comparison) is performed to determine whether to use the found access point, The comparison, may be based on one or more access conditions (e.g., costs, capacity, speed, etc) as described above. If the determination is positive at decision block 745, establish a connection with the found access point at block 750. If the new connection using radio 2 is made to. replace an existing connection (e.g., using radio J as shown in decision block 755, then the communication using radio i is to be transferred at block 760. Alter transferred, radio 1 may be tamed oil or put in a power-save mode at bock 765 to eonserver power. If the existing communication using radio 1. is not to be transferred, the connection using radio 2 is used in parallel with the existing connection using radio I . for example, to speed up the comminncation on radio I or for new
communication. When a communication on any of the ra io has come to an end, that radio may he turned off or pot on a power-save mode. Process 700 flows back to the beginning.
[179] If the result at decision block 725,, 735, or 745 is "No,", process 700 flows to
'block 775, where radio 1 is turned oil or put o a power-save mode. Then the wake-up interval may be lengthened or shortened, at block 780, as described above, Process 700 flows back to. the beginning.
[1:80] In some examples, process 700 may be implemented with different, fewer, or more blocks. Process 700 may be implemented as computer executable instructions, which can be stored on a medium, loaded onto one or more processors of one or more computing devices and mobile devices, and executed as a computer-implemented method.
[181 ] FIG. 8 a block diagram illustrating a example wireless communication device
450 thai ma be used in. connection with various embodiments described herein. For example, the wireless communication device 450 may be configured and/or implemented as an access point, a mobile device with a configuration different that shown in. FIG. 1 E, or a device or component used in an alternative network access provider system. However, other Wireless communication devices and/or architectures may also be used, as will be clear to those skilled in the art,
[ 1.82] i the illustrated embodiment, wireless communication device 450 comprises an antenna system 455, a radio system 460, a baseband system 465, a speaker 470, a microphone 480, a central processing unit ("CP IP'} 485, a data storage area 490, -and a hardware interface 495. in the wireless communication device 450, radio frequency "RP") signals are transmitted and received over the air by the antenna system 455 under the management of the radio system 460, [ ί 83] in one embodiment, the antenna s stem 455 may comprise one or more antennae and one or more multiplexors (not shown) mat perform a switching function to provide the antenna system 455 with transmit and receive signal paths, in the receive path, received RF signals can be coupled from a multiplexor to a low noise amplifier (not shown) thai amplifies the received RF signal and sends the amplified signal 'to the radio -system 460., [1.84] in alternative embodiments, the radio system 460 may comprise one or more radios thai are configured to communication over various frequencies and/or using different wireless communication protocols, in one embodiment, the radio system 460 may combine a demodulator (not shown) and modulator (not shown) in one integrated circuit t/IC"), The demodulator and modulator can also be separate components; In the incoming path, the demodulator strips away the RF carrier signal leaving a baseband receive audio signal, which is sent from the radio system 460 to the baseband system 465,
p.85] If the received signal contains audio information, then baseband system 465 decodes the signal and converts it to an analog signal. Then the signal is amplified and sent to the speaker 470, The baseband system 465 also receives analog audio signals from the microphone 480. These analog audio si nals are converted to digital signals and encoded by the baseband system 465, The baseband system 465 also codes the digital, signal for transmission and generates a baseband transmit audio signal thai is routed to the modulator portion of the radio system 460. The modulato mixes the baseband transmit audio signal With an RF carrier signal generating an RF transmit signal that is routed to the antenna, system and may pass through a power amplifier (not shown). The power amplifier amplifies the RF transmit signal and routes it. to the antenna system 455 where the signal is switched to the antenna port for transmission,
[186] The baseband system 465 is also communicatively coupled with the central processing unit 485. The central processing unit 485 lias access to a data storage area 490. The central processing unit. 485 may be configured to execute instructions (i.e.- computer programs or software) that can be stored in the data storage area.490, Computer programs can also be received from the baseband processor 465 and stored in the data storage area 490 or executed upon receipt. Such computer programs* when executed, enable the wireless communication device 450 to perform the various functions of the present invention as previously described. For example, data storage area 490 may include various software modules (not shown] described with respect to one or more of FiGa, 3-7,
[1.87] o -transitory media may be used to provide executable. instructions- (e.g., software and computer programs) to the wireless communication device 450 for execution b the central processing unit 485, An example of a non-transitory medium is data storage 490. Communication device 450 may obtain executable instructions via microphone 480 (via the baseband system 465), antenna system 455 (also via the baseband system. 465), and hardware interface 495.
[188] The central rocessing unit 485 is configured to receive notifications from the hardware interface 495 when new devices are detected by the hardware interface. Hardware interface 495 can be a combination electromechanical detector with controlling software that communicates with the CPU 485 and interacts with new devices. The hardware interface 495 may be a fire ire port, a Universal Serial Bus 'USB") port, a Bluetooth, or infrared wireless unit, or any of a variety of wired or wireless access .mechanisms. Exampl es of hardware that may be linked with the device 450 include data storage devices, computing devices, headphones, microphones, and the like.
89] FIG, 9 is a block diagram illustrating an example wired or wireless system 550 thai may be used in connection with various embodiments described herein. For example the system 550 may be configured and/or implemented as an access point, a mobile device with a configuration different that shown n FIG. IE, or a device or component used in an alternative network access provider system. The system 550 can be computer, server, laptop computer, smart phone, tablet computer, or any other processor enabled device that is capable of wi red and/of wireless communication. Other computer systems and/or
architectures may be also used, as will, be clear to those skilled in the art.
[1 0] The system. 550 may include one or more processors, such as processor 560.
Additional processors may be provided, such, as an auxiliary processor to manage
input/output, an auxil iary processor to perform floating point -mathematical operations, a special -purpose -microprocessor having an architecture suitable for fast execution of signal processing algorithms (e.g., digital signal processor), a slave processor subordinate to the main processing system (e.g., back-end processor), an additional microprocessor or controller tor dual or multiple processor systems, or a coprocessor. Such auxiliary processors may be discrete processors or may be integrated with the processor 560.
[ 191 ] The processor 560 may .be connected to a communication bus 555, The communication bus 555 may include a data channel for facilitating information transfer between, storage and other peripheral components of the system 5S0< The- communication bus 555 further may provide a set of signals used for communication with the processor 560, including a data bus, address bus, and control bos (not shown). The communication, bus 555 may comprise any standard or non-standard bus architecture such as, for example, bus architectures compliant with industry standard architecture C SA"), extended. Industry standard architecture ("EISA"), Micro Channel Architecture ("MCA"), peripheral component interconnect ("PCI") local bus. Advanced Technology Attachment ("ATA"), Serial ATA f'SATA"), or standards promulgated by the Institute of Electrical and Electronics Engineers f IEEE") including IEEE 488 general-purpose interlace bus ( GI>1B"), IEEE 696/$- ! 00, and the like. [1 2] System 550 may include a main memor 565 and may also include a secondary memory 570. The main memory 565 provides storage- of instructions and data for programs executing on the processor 560. The main memory 565 is typically semiconductor- based memory such as dynamic random access memory ("DRAM") and/or static random access memory ("SRAM"). Other semiconductor-based memory types include,, "for example, synchronous dynamic random access memory ("S DRAM"), Rambus dynamic random access memory ("'RDRAM"), ferroelectric random access memory ("FRAM"), and the like, including -read only memory ("ROM"),
[ 193] The secondary memory 570 may optionally include an internal memory 575 and/or a removable medium 580, for example a floppy disk drive, a magnetic tape drive, a compact disc ("CO") drive, a digital versatile disc (""DVD") drive, etc. The remo able medium 580 is read iroro and/or written to in a well-known manner. Removable storage medium 580 may be, tor example,, a floppy disk, magnetic tape, CD, DVD, SD card, etc. i 94] The removable storage medium 58:0 is a non-transitory computer readable medium, ha ving stored thereon computer -executable code (i.e., software) and/or data. The computer software or data stored on the removable storage medium 580. is read into the system 550 for execution, by the processo 560.
[ 195] In alternative embodiments, secondary memory 570 may include othe similar means for allowing computer programs or other data or instructions to be loaded into the system 550. Such means may include, for example, an external storage medium 595 and an interface 570» Examples of external storage medium 595 ma include an external hard disk drive or an external optical drive, or and external magneto-optical drive.
[ 196] Other examples of secondary memory 570 may include semiconductor-based memory such, as programmable read-only memory ("PROM"), erasable programmable, readonly memor ("ΈΡΙ ΟΜ"), electrically erasable read-only memory ΓΈΕΡΙΙΟΜ'Ο, or flash memory (block oriented memory similar to EEP OM), Also included are any other removable storage media 580 and communication interface 590, which allow software and data to be transferred from an external medium 595 to the system 550.
[ 1 7] System 550 may also include an input/output ("I/O") interface 585. The I/O interface 585 facilitates' input f om and output to external devices. For example the I O interface 585 ma receive input from a keyboard or mouse and may provide output to a display. The I/O interface 585 is capable of facilitating input from and output to various alternat e types of human interface and machine interface devices alike.
[ 1 8] System 550 may also include a communication interface 590. The
communication interface 590 allows software and data to be transferred between system 550 and external devices (e.g. printers), networks, or information sources. For example, computer software or executable code may be transferred to system 550 from a network server via communication interface 590, Examples of communication interface 590 include a modem, a network Interface card ("NIC"), a wireless data card, a communications port, a. PCMCIA slot and card, an infrared interface, and an IEEE 1394 fire-wire connection, Universal Serial Bus ("USB") connection^), just to name a few.
[1 9] Communication interface 590 may implement one or more protocols or standards, such as Ethernet IEEE 802 standards, Fiber Channel, digital subscriber line ("DSL")* asynchronous digital subscriber line ("ADSL"), frame relay, asynchronous transfer mode (''ATM"), integrated digital services network ("iSDN'''}* personal communications services ("PCS5 '), transmission' control protocol/internet protocol ( TCP/IP"), serial line Internet protocol/point to point protocol f'SLlP/PPP"), and so on,, but may also implement customized or non-standard interface protocols as wed,
[209] Software and data transferred via communication interface 590 are generally
In the form of electrical communication signals 605. These signals 605 may be provided to communication interface 590 via a communication channel 600. In one embodimen , the communication channel 600 may be a wired or wireless network, or any variety of other communication links. Communication channel 600 carries signals 605 and can be implemented using .a variety of wired .or wireless eormnuni cation means including wire or cable, fiber optics, conventional phone line, cellular phone link, wireless data communication link, radio frequency ("RF") link, or infrared link, just to name a few.
[201 ] Computer executable code (i.e., computer programs or software) is stored in the main memory 565 and/or the secondary memory 570. Computer programs can also be, received, via- communication interface 590 and stored in the main memory 565 and/or the secondary memory 570, Such computer programs,, when' executed, enable the system 550 to perform the various functions of the present invention as previously described,
[202] !n this description, the term "computer readable medium'* is : used to refer to an transitory or non-transitor computer readable media used to provide computer executable -code (e.g., software and computer programs) to the system 550. Examples of these media include main memory 565, secondary memory 570 (includin internal memory 575, removable medium 580, and external storage medium 595), and any peripheral device communicatively coupled with communication interface 590 (including a. network information server or other network device). These transitory and non-transiiory computer readable media are means tor providing executable code, programming instructions, and software to the system 550.
[203] hi. an embodiment that is implemented using software, the software may be stored on a computer readable medium and loaded into the system 550 by way of removable medium 580, I/O interface 585, or communication interface 590. In such an embodiment, the software is loaded into the system 550 In the form of electrical communication signals 60S, [204] The s stem 550 also includes optional wireless communication components that facilitate wireless cor uiaiicaiioo over a voice and over a data network, lire wireless communication components comprise an antenna system 610, a radio system 6.1 5 and a baseband system 620, In the system 550, radio frequency "R'F") signals are transmitted and received over the air by the antenna system 610 under the management of the radio system 615.
[205] In one embodiment, the antenna system. 610 may comprise one or ore antennae and one or more multiplexors (not shown) that -perform a switching function to provide the antenna system 610 with transmit and receive signal paths, in the receive path, received RF signals can be coupled from a. multiplexor to a low noise amplifier (not shown) that amplifies the received RF signal and sends the amplified signal to the radi system 615, [206] In alternative embodiments, the radio system 615 may comprise one or more radios that are configured to communicate over various frequencies. In one embodiment, the radio system 15 may combine a demodulator (not shown) and modulator (not shown) in one integrated circuit Γ'Ιί ). The demodulator and modulator can also be separate components. In the incoming path, the demodulator strips away the RF carrier signal leaving a baseband receive audio signal, which is sent from the radio system 61 5 to the baseband system 620, [202] if the received signal contains audio information, then baseband system 620 decodes die signal and converts it to an analog signal. Then the signal is amplified and sent to a speaker, "Hie baseband system 620 also receives analog audio signals from a
microphone. These' analog audio signals are converted to digital signals rid encoded by the baseband system 620. The baseband system 620 also codes the digital signals for transmission and generates a baseband transmit audio signal that is routed to the modulator portion of the radio system 615. The .modulator mixes the baseband, transmit audio signal with an RF carrier signal generating an RF transmit, signal thai is routed to the antenna system and may pass through a po wer amplifier (not shown). The power amplifier amplifies the RF transmit signal and routes it to the antenna system 10 where the signal is switched to the antenna port for transmission.
[208] The baseband system 620 is also communicatively coupled with the processor
560, The central processing unit 560 has access to data storage areas 565 and 570. The central processing unit 560 may be configured to execute instructions (i.e., computer programs or software) that can be stored in the memory 565 or the secondary memory 570. Computer programs can also be received from the baseband processor 61 and stored in the data storage area 565 or in secondary memory 570, or executed upon receipt. Such computer programs, when executed, enable the system 550 to perform the various functions of the present invention as previously described. For example, data storage areas 565 may include various software modules (not shown) that are executable by processor 560.
[209] Various embodiments, may also be implemented primarily in hardware using, for example, components such as application specific integrated circuits. ("ASICs*'), or field programmable gate arrays ("FPGAs"). Implementation of a hardware state machine capable of performing the functions described herein will also he apparent to those skilled, in the relevant art. Various embodiments may also be implemented using a combination of both hardware and software,
[21 ] Furthermore, those of skill in the art will appreciate that the various illustrative logical blocks, modules, circuits, and method teps described in connection with the above described figures and the embodiments disclosed herein can often he implemented as electronic hardware, computer software, or combinations of both. To clearly i llustrate this interchangeabiiity of hardware and software, various illustrative components, blocks, modules, circuits,, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled ersons can implement the described functionality in varying ways for each particular, application, but such implementation decisions should not he' interpreted as causing a departure from the scope of the invention. In addition, the grouping of functions within a module, block, circuit or step is for ease- of description. Specific functions or steps can be moved from one module, block or circuit, to another without departing from the invention.
[211 ] Moreover, the various illustrative logical blocks, modules, and methods described in connection with the embodiments disclosed herein can be implemented or performed with a general purpose processor, a digital signal processor (S*DSPM), an ASIC, FFGA or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein, A general-purpose processor can he a microprocessor, but in the alternative, the processor can be any processor, -controller* microcontroller, or state machine. A processor can also he implemented as a combination of computing devices, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
[212] FIG. 10 is an example computing environment with an example computing device suitable for use in some example implementations {e.g., a mobile device, access point, a device in an ANAP system). Computing device 1005 in computing environment 1000 can include one or more processing units, cores, or processors 1010, memory 1015 (e,g., RAM, ROM', and/or the like), internal storage 1020 (e.g., magnetic, optical, solid state storage, and/or organic), and/or I/O i nterface 1 25, any of which can be coupled on a communication mechanism or bus 1030 for communicating information or embedded in the. computing device 1 05. [213] Computing device 1005 can be communicativel coupled to input/user interface 1035 and output device/interface i 040. Either one or both of input/user interface 1035 and output device/interface 1040 can be a wired or wireless interface and can be detachable. Input/user inierface 1035 may include any device, component sensor, or interface, physical or virtual, that can be used to provide, input (e.g., buttons, touch-screen interface, keyboard, a pointing/cursor control microphone, camera, braille, motion sensor, optical reader, and/or the like). Output device/interface 1.040 may include a display, television, monitor, printer, speaker, braille, or the like. n some example implementations, input/user interface 1035 and output device/interface 1040 can. be embedded with or physically coupled to the compiiting device 1005, in other example implementations, other computing devices may function as or provide the functions of input/user interface 1(535 and output device/interface 1040 for a computing device ! 005,
[214] Examples of computing device 1005 may include, hut are not !imited to, highly mobile devices (e.g., smartphones, devices in vehicles and other machines, devices carried b humans and animals, and the like), mobile devices (e.g., tablets, notebooks, laptops, personal computers, portable televisions, radios, and the like), and devices not designed for mobility (e.g., desktop computers, other computers, information kiosks, televisions coupled to one or more processors, radios, and the like).
[215] Computing device 1005 can be communicatively coupled (e.g., via I/O interface 1025) to external storage 1045 and network 1050 for co.rn.rn uioating with any number of networked components, devices, and systems, including one or more computing devices of the same or different configuration. Computing device 1005 or any connected computing device can be functioning as. providing services o£ or referred to as a server, client, thin server, general machine, special-purpose machine, or another label [216] I/O interface 1025 can include, bat is not limited to, wired and/or wireless interfaces using any communication or I/O protocols or standards (e.g.., Ethernet, 802.1 1 x, Universal System Bus, WiMax, modem, a cellular network protocol, and the like) fo communkating infonnation to and/or from at least all the connected components, devices, and network in computing environment 1000. Network 1050 can be any network or combination of networks (e.g., the Internet, local area network, wide area network., a telephonic network, a cellular network, satellite network, and the like).
[217] Computing device ί 005 can use and/or communicate, using computer-usable or computer-readable media, including transitory media and non-transitory media. Transitory media include transmission media (e.g., metal cables, fiber optics), signals, carrier waves, and the like. Non-transitory media include magnetic media (e.g., disks and tapes), optical media (e.g., CD ROM, digital video disks, BSu-ray disks), solid state media (e.g., RAM, ROM, flash memory, solid-state storage), and other mm- volatile storage or memory.
[218] Computing: device 1.005 can be used to implement techniques, methods, applications, processes, or computer-executable instructions in some example computing environments. Computer-executable instructions can he retrieved f om transitory media, and stored on and retrieved' from non-transitory media. Tire executable .instructions can originate from one or more of any programming, scripting, and machine languages (e.g., C, C-H-, C#, Java, Visual Basic, Python, Perl J ' avaScript, and others).
[21 1 Processors) 1 10 can execute under any operating system (OS) ( ot. shown), in a native or virtual environment. One or more applications can he deployed that include logic unit 1060, application programming interface (API) unit 1065, input unit 1.070, output unit 1075, mobile device management unit 1080, access point management unit 1 85, usage management unit 1 90, and inter-unit communication mechanism 1095 for the different units to communicate with each other, with the QS, and with other applications (not shown . For example, mobile device management unit 1080. access point management unit 1085, and usage management unit 1090 may implement one .or more processes shown in FIGs, 3-7. The described units and elements can be varied in design, function, configuration, or implementation and are not limited to the descriptions provided.
[220] in some example implementations,, when information or an execution- instruction is received by API unit 1 65, it niav be communicated to one or more other units (e.g., logic unit 1060, input unit 1070, output unit 1075, mobile device management unit 1 80, access point management unit 1085, and usage management unit 1090), In art ANAP implementation, for example, input unit 1 170 may recei ve location information -of a mobile device and pass the information to mobile device management unit 1080. Access point management unit 1085 may determine one or more access points and provide information about these access points to the mobile device via output unit 1 175 (e.g., communicated to the mobile device using a radio or through another radio communication device connected to network 1 150), The mobile device and/or an access point may provide usage data that are managed by the usage management unit 1 190, which may provide billing and/or payment information to the owners and/or operators the mobile device arid access points,
[2:211 In some instances, logic unit 1060 may he configured to control the information flow among the units and direct the services provided by API unit 1 65, input unit 1 70, output unit 1075, mobile device management unit 1080, access point management unit 1 85, and usage management unit 1 00 in some example implementations described above. For example, the flow of one or more processes or implementations may be controlled by logic unit 1060 alone or in conjunction with API unit 1065.
[222] Although a fe example implementations have been shown and described, these example implementations are provided to convey the subject matter described herein to people who are familiar with this field, it should be understood that the subject matter described herein may be mplemente i various forms without being limited to the described example implementations. The subject matter described herein can be practiced without those specifically defined or described matters or with other or different elements or matters not described, it will be appreciated by those familiar with this field tha changes may be made in these example implementations without departing from the subject matter described herein as defined in the appended claims and their equivalents.
[223 ] The tbi lo wing table pro vides definitions of acronyms-:
Acronym Definition
1 X-EVDO Evolution-Data Optimized
2G Second-generation wireless standards and protocols (including 2.5G
protocols)
30 Third-generation wireless standards and protocols
4G Fourth generation wireless standards and protocols
API A licati n programming interface
ASIC Application specific integrated circuit
BSS1D Basic service set identification
CDMA Code division multiple access
CDMA2000 Family of wireless standards and protocols, which use CDMA channel access, to send voice, data, and signaling data between mobile phones and cell, sites
CD-ROM Compact Disc Read-only memory
DSP Digital signal processor
EAP Extended Authentication Protocol
EDGE Enhanced Data Rates for -GS Evolution
EPROM Erasable programmable read only memory
EEPROM Electrically Erasable Programmable Read-Only Memory
FPGA Field programmable gate array
GPRS General packet radio service
GPS Global Positioning System
GS Global System for Mobile Communication
i SSPA High Speed Packet Access
i'DEN integrated Digital Enhanced Network
IEEE institute i <1 Electrical and Electronics Engineers
IMS IP Multimedia Subsystem
tPTV Internet Protocol television
iSP internet sendee provider
1 ,1 P Pong Term Evolution, marketed as 4G PTE, is standard for wireless cammunication of high-speed data for mobile phones and data terminals
M2M o ile to mobile
MAC Media Access Control
P25-L R Land mobile radio
PKi Public key infrastructure
-05
WLA Wireless local area network

Claims

WHAT IS CLAIMED IS:
1. A method for enabling alternative network access for a mobile wireless
.communication device, comprising;
receiving information associated with a mobile device, the information comprises location information associated with the mobile device;
identifying, based on the information associated with the mobile device, an access point available for providing connectivity services to the mobile device, the access point is not the computing device:
providing information associated with the access point to he mobile device, the information comprises at least one of usage terms, usage conditions, usage costs, access point characteristics, connection characteristics, access point capacity, and access point security access information; and
receiving usage information from at least one of the mobile device and the access poin
2, The method of claim 1 ,. wherein the access point is identified based cm the location information associated with the mobiie device.
3. The method of claim 1 , wherein before providing the information associated with the access point, se!eefing the access point for connecting with the mobile device based on the information associated with the access point and previous information associated with another access point, the previous infbnnation comprises at least one of usage terms, usage conditions, usage costs, access point characteristics, connection characteristics, and access point capacity.
4, The method of claim i , further comprising detenninmg a billing charge based on the usage information associated with the mobile device,
5. The method of claim 15 further comprising determining a payment value based on the usage information associated with the access point,
6. At least one computing device comprising storage and a processor configured to perform;
receiving information associated with a mobile device, the information comprises location information associated with the mobile device;
identifying, based on the information associated with the mobile device, an access point available for providing connectivity services to the mobile device, the access point is not the computing device;
providing information associated with the access point to the mobile device, the information comprises at least one of usage terras, usage conditions, usage costs, access point characteristics, connection, characteristics, access point capacity, and access point security access information; and
receiving usage information from at least one of the mobile device and the access point,
7, The at least one computing device of claim 6, wherein the access point is identified based on the location information associated with the mobile device,
8, The at least one computing device of claim 6, wherein before providing the information associated with the access point, selecting the access point for connecting with the mobile device based on the information associated with the access point and previous information associated with another access point, the previous information comprises at least one of usage terms, usage conditions, usage costs, access point characteristics, connection characteristics, and access point capacity.
9. The at least one computing device of claim 6, further comprisin determining a billing charge based on the usage information associated with the mobile device,
10. The at least one- computing device of claim 6, farther comprising determining a payment value based on the usage information associated with the access point
1 1 , A method for obtaining alternative network access implemented by a mobile device haying a first radio and a second radio, the method comprising:
using the first radio in a connection;
detecting that a throughput of the connection is above a threshold;
determining, based on access conditions, an access point to establish a second connection using a second radio;
turning on the second radio;
performing a connectivity test to the access point using the second radio; and establishing the second connection using the second radio.
12, The method of claim 1 1. , further comprising;
transferring a communication from using the first radio to using the second radio; and turning o f the first radio,
13 , The method of claim 1 1 ; wherein the first radio communicates using a Wi-Fi protocol and the second radio communicates using a cellular protocol..
1 . The method of claim 1 1 , wherein the first radio communicates using a cellular protocol and the second radio communicates using a Wi-Fi protocol, and the method further comprising
receiving information associated with at least one access point;
determining to establish a connection using the second radio with one of the at least one access point; and establishing the connection, with the one of the at least one access point.
15. 'The method of claim 11 , wherein the determining to turn on the second radio is based on the throughput of the first radio being below a low threshold or above a high threshold, the method further comprising:
identifying m access point to establish a connection using the second radio:
establishing the connection with the access point;
transferring a communication from using the first radio to the connection; and turning off the first radio.
16. The method of claim 1 ! , wherein the determining to turn on the second radio is based on the expiration of the wake-upontervai, wherein the wake-up-intervaS is shortened to an immediate expiration based on the predetermined application is being executed.
1 7. The method of claim J 1 , wherein the performing the cormectivity 'test using the second radio comprises sending a rest message to a predetermined destination and
determining whether the test message is sent successfully,
18. A mobile device having a first, radio, a second radio, storage, and a processor configured to perform:
using the first radio while the second radio is turned o ff:
determining to turn. on the second radio based on a throughput of the first radio being below a low threshold or above a high threshold, or based on an expiration of a wake-np- intervaS., wherein the wake-up-interva! is configured to be longer than a preset value when the mobile device is detected to be in motion, the power ievel of the mobile device is below a power threshold, the current tone is within first time period of the day, or the current time is within a first day of the week; and wherein the wake-up-intervai is configured to be shorter than the preset value when, a predetermined application is being executed, the mobile device has detected a change nt'location, the current time is within a second time period of the day, or the current time is within a second day of the week;
turning on the second radio; and
performing a connectivity test using the second radio.
19. The mobile device of claim 18, further comprising:
transferring a communication from using the first radio to using the second radio; and turning off the first radio,
20. A method for obtaining alternative network acces implemented by a mobile device having a first radio, the method comprising:
determining to turn on the first radio based on the expiration of a wake-up-intervaL wherein the wake-up-intervai is determined based upo one or more of a predetermined application being executed, a location of the mobile device, the dropping of a previous connection, or a time period;
identifying an access node using the radio;
establishing a connection with the access node using the first radio; and
performing a connectivity test to the access point using the first radio.
21. A method for obtaining alternative network access implemented by a mobile device having a first radio and a second radio, ihe method comprising:
using a first radio in a first connection with a first access point;
determining whether to establish a second connection, with a second access point using a second radio, the determining based on a first set of access conditions associated with the first access point and a second set of access conditions associated with the second access point; and establishing the second connection with the second access point using the second radio ased on the determining, which indicates establishing the second connection,
22, The method of claim 21 , wherein the first set of access conditions, comprises location information of the mobile device,
2.3. The method of claim 21 , wherein the first set of access conditions is provided by an information provide is no the access point,
24, The method of claim 21, wherein the first set of access conditions is provided b an Information provider which is the access point
25, The method of claim 21, wherein using the first, radio comprises using a first communication protocol that is different from a second communication protocol that i in use b the second radio in the co municati n with the another acces point
26, The method ofclaim 2 !„ further comprising record! ng usage information associated with the connection with the access point.
27, A method for obtaining alternative network access implemented by a mobile device having- a radio, the method comprising:
identifying an available network access point;
determining whether to establish a. a connection with identified access point based on a first set of access conditions associated with the identified access point; and
establishing a connection with the identified access point using the radio based on the determining, which indicates establishing the second connection,
28, A wireless mobile device having a first radio, a second radio, storage, and a processor configured to perform;
using a first radio in a first connectio with a first access point; determining whether to establish a second connection with a second access point using a second radio, the determining based on a first set of access conditions associated with the first access point and a second set of access conditions associated with the second access point; and.
establishing the second connection with, ihe second access point using the second radio based on the determining, which indicates establishing the second connection..
PCT/US2012/066389 2011-11-25 2012-11-21 System for providing intelligent network access selection for a mobile wireless device WO2013078408A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201280057965.3A CN103959863B (en) 2011-11-25 2012-11-21 For providing the method, mobile device and computer-readable medium that intelligent network accesses selection for portable radio
BR112014033163-4A BR112014033163A2 (en) 2011-11-25 2012-11-21 system to provide selection of smart network access to a wireless mobile device
EP12851159.9A EP2783535B1 (en) 2011-11-25 2012-11-21 System for providing intelligent network access selection for a mobile wireless device
EP18151712.9A EP3358792A1 (en) 2011-11-25 2012-11-21 System for providing intelligent network access selection for a mobile wireless device

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US201161563735P 2011-11-25 2011-11-25
US61/563,735 2011-11-25
US201261618318P 2012-03-30 2012-03-30
US61/618,318 2012-03-30
US201261671583P 2012-07-13 2012-07-13
US61/671,583 2012-07-13

Publications (1)

Publication Number Publication Date
WO2013078408A1 true WO2013078408A1 (en) 2013-05-30

Family

ID=48470326

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2012/066389 WO2013078408A1 (en) 2011-11-25 2012-11-21 System for providing intelligent network access selection for a mobile wireless device

Country Status (5)

Country Link
US (7) US9345059B2 (en)
EP (3) EP3131238B1 (en)
CN (2) CN103959863B (en)
BR (1) BR112014033163A2 (en)
WO (1) WO2013078408A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066153A (en) * 2014-06-30 2014-09-24 无锡科本信息科技有限公司 Method for realizing intelligent connection between mobile device and target device by use of position sensor
WO2014200749A1 (en) * 2013-06-14 2014-12-18 Qualcomm Incorporated Toll path routing protocol for competitive dynamic pricing and access point selection based on cost
WO2015051701A1 (en) * 2013-10-10 2015-04-16 成都达信通通讯设备有限公司 Method for realizing multi-channel concurrent internet accessing by synchronizing wifi with apn network, and automatically choosing wifi networking preferentially
CN104680407A (en) * 2013-11-26 2015-06-03 国际商业机器公司 Method and system for subsidizing wireless services in geo-fenced zones
CN104902582A (en) * 2015-04-13 2015-09-09 苏州天趣信息科技有限公司 Temporary access method and system for wireless network
CN105307224A (en) * 2014-06-19 2016-02-03 中国移动通信集团公司 Method and device for intelligently switching terminal between access points and terminal
JP2016213878A (en) * 2016-07-28 2016-12-15 キヤノン株式会社 Information processing apparatus, control method of the same, and program
US9544395B2 (en) 2014-10-10 2017-01-10 At&T Intellectual Property I, L.P. Facilitating quality of service and security via functional classification of devices in networks
CN107567026A (en) * 2016-06-30 2018-01-09 上海连尚网络科技有限公司 It is a kind of to be used to determine the method and apparatus with group focus
JP2019013035A (en) * 2018-09-19 2019-01-24 キヤノン株式会社 Information processing device, application, method of controlling information processing device, and program
US10383061B2 (en) 2014-03-11 2019-08-13 Canon Kabushiki Kaisha Information processing apparatus, method of controlling information processing apparatus, and storage medium
CN110636597A (en) * 2013-07-23 2019-12-31 交互数字Ce专利控股公司 Method for managing a wireless interface of a device and corresponding wireless device
CN110675414A (en) * 2019-09-30 2020-01-10 广州极飞科技有限公司 Land parcel segmentation method and device, electronic equipment and storage medium
US11113753B1 (en) * 2019-12-02 2021-09-07 Inmar Brand Solutions, Inc. Network access system for a shopping application and related methods
US11140734B2 (en) 2018-12-17 2021-10-05 Samsung Electronics Co., Ltd. Electronic device and method for controlling electronic device

Families Citing this family (116)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8254915B2 (en) * 2007-04-17 2012-08-28 Embarq Holdings Company, Llc System and method for enabling subscribers of a communications carrier to access a network of other subscribers
FI20100057A0 (en) * 2010-02-12 2010-02-12 Notava Oy A method and system for creating a virtual device for redirecting data traffic
US9134930B2 (en) 2011-03-30 2015-09-15 Hewlett-Packard Development Company, L.P. Delayed content production
US9323483B2 (en) 2011-10-28 2016-04-26 Hewlett-Packard Development Company, L.P. Location-based print notifications
US9345059B2 (en) 2011-11-25 2016-05-17 Bandwidthx Inc. Mobile device radio management
WO2013109189A1 (en) * 2012-01-16 2013-07-25 Agency For Science, Technology And Research A wireless communication system and a method of controlling the same
CN103249047B (en) * 2012-02-10 2018-11-23 南京中兴新软件有限责任公司 The access authentication method and device of WLAN hot spot
US9008045B2 (en) 2012-04-12 2015-04-14 Time Warner Cable Enterprises Llc Handoffs between access points in a Wi-Fi environment
US20130325662A1 (en) * 2012-05-31 2013-12-05 Red Hat, Inc. Systems and methods for providing wireless internet connection
US20140032728A1 (en) * 2012-07-30 2014-01-30 John Conor O'neil Location-based task activation
US8886236B2 (en) * 2012-07-31 2014-11-11 Aruba Networks, Inc. Method and system for using a minimum sensitivity threshold for receiving wireless signals
CN102917406B (en) * 2012-08-02 2016-04-06 华为技术有限公司 Data traffic shunt method and equipment
CN110062439B (en) * 2012-09-24 2022-03-29 华为技术有限公司 WLAN access method and device
CN103813330A (en) * 2012-11-15 2014-05-21 中兴通讯股份有限公司 Communication terminal and system and authority management method
KR20140067476A (en) * 2012-11-26 2014-06-05 삼성전기주식회사 Method for operating wireless network, recording medium for operating wireless network, and mobile terminal using the same
US9531764B1 (en) * 2012-11-27 2016-12-27 Amazon Technologies, Inc. History inclusive connection management
US9584382B2 (en) * 2012-11-28 2017-02-28 At&T Intellectual Property I, L.P. Collecting and using quality of experience information
WO2014112468A1 (en) * 2013-01-18 2014-07-24 京セラ株式会社 Communication control method, cellular base station and user terminal
US9378437B2 (en) 2013-02-27 2016-06-28 Hewlett-Packard Development Company, L.P. Sending print jobs using trigger distances
WO2014133588A1 (en) * 2013-03-01 2014-09-04 Intel Corporation Techniques for establishing access to a local wireless network
US20140258511A1 (en) * 2013-03-11 2014-09-11 Bluebox Security Inc. Methods and Apparatus for Reestablishing Secure Network Communications
US10007938B2 (en) * 2013-03-13 2018-06-26 Aeris Communication, Inc. Real-time priced (RTP) cellular service marketplace
WO2014143041A1 (en) * 2013-03-15 2014-09-18 Hewlett-Packard Development Company, L.P. Cloud-based connectivity
JP2014187654A (en) * 2013-03-25 2014-10-02 Fuji Xerox Co Ltd Information processing system, information processing device, and program
US9826464B2 (en) 2013-03-26 2017-11-21 Bandwidthx Inc. Systems and methods for establishing wireless connections based on access conditions
US9276863B2 (en) * 2013-06-28 2016-03-01 Alcatel Lucent Traffic detection function based on usage based thresholds
US10038729B1 (en) 2013-08-15 2018-07-31 Amazon Technologies, Inc. Cooperative network access
WO2015025353A1 (en) * 2013-08-19 2015-02-26 楽天株式会社 Portable device, method for controlling portable device, storage medium, and program
US20150063329A1 (en) * 2013-08-28 2015-03-05 General Motors Llc Selective vehicle wi-fi access
US20150065178A1 (en) * 2013-09-03 2015-03-05 Qualcomm Incorporated Methods and apparatuses for providing positioning assistance data
US9491678B2 (en) 2013-09-04 2016-11-08 At&T Mobility Ii Llc Cell broadcast for smart traffic steering across radio technologies with improved radio efficiency
CN103501501B (en) * 2013-10-09 2017-03-01 中磊电子(苏州)有限公司 Radio area network system, far control network system, wireless network detection and establishing method
US20150127436A1 (en) * 2013-11-04 2015-05-07 David Neil MacDonald Community wi-fi network
US9361633B1 (en) * 2013-11-11 2016-06-07 Amazon Technologies, Inc. Determining present venue for a user device
US10292067B2 (en) * 2013-11-25 2019-05-14 At&T Intellectual Property I, L.P. Collaborative scheduling of last hop cellular traffic
US9607002B2 (en) * 2013-12-18 2017-03-28 Intel Corporation File retrieval from multiple storage locations
US9549082B2 (en) 2013-12-31 2017-01-17 Bandwidthx Inc. Systems and methods for managing offload from one radio access network to another
EP3108697B1 (en) 2014-02-21 2018-01-31 Telefonaktiebolaget LM Ericsson (publ) A method and nodes for selecting a capillary network gateway
WO2015126295A1 (en) * 2014-02-21 2015-08-27 Telefonaktiebolaget L M Ericsson (Publ) A method and node for selecting a capillary network gateway
US10104521B2 (en) 2014-02-21 2018-10-16 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for CGW selection
CA2945848C (en) 2014-04-16 2019-03-05 Huawei Technologies Co., Ltd. Wireless local area network wlan access method, terminal, and server
EP2937828A1 (en) * 2014-04-23 2015-10-28 Fujitsu Limited Consumer profiling using network connectivity
WO2015165075A1 (en) 2014-04-30 2015-11-05 Hewlett-Packard Development Company, L.P. Wireless access point selection based on a connection plan
US20150358046A1 (en) * 2014-06-04 2015-12-10 Grandios Technologies, Llc Radio management
US9900845B2 (en) 2014-09-23 2018-02-20 At&T Intellectual Property I, L.P. Battery saving with radio control based on cellular condition data
US10002345B2 (en) 2014-09-26 2018-06-19 At&T Intellectual Property I, L.P. Conferencing auto agenda planner
CN105704836B (en) * 2014-11-27 2019-03-01 四零四科技股份有限公司 Automatic switching control equipment identity is to provide the system and method for wireless telecommunications
US9538441B2 (en) 2014-12-18 2017-01-03 At&T Mobility Ii Llc System and method for offload of wireless network
CN107113306A (en) * 2014-12-31 2017-08-29 班德韦斯克公司 System and method for controlling the access to wireless service
WO2016109742A1 (en) * 2014-12-31 2016-07-07 Bandwidthx Inc. Systems and methods for optimizing mobile device radio management for user experience
CN105991560B (en) * 2015-02-04 2019-07-19 腾讯科技(深圳)有限公司 Audio/video communication method for network access and audio/video communication network access device
US10171333B2 (en) * 2015-02-10 2019-01-01 International Business Machines Corporation Determining connection feasibility and selection between different connection types
US9674756B2 (en) * 2015-04-02 2017-06-06 Harman International Industries, Incorporated Expedited handover between wireless carriers
US9510149B2 (en) 2015-04-08 2016-11-29 Abb Technology Ag Location estimation within a wireless mesh network utilizing wireless signal signatures
US9854482B2 (en) 2015-04-21 2017-12-26 International Business Machines Corporation Controlling a delivery of voice communications over a cellular data network or a wireless network based on user's profile
CN107852662B (en) * 2015-05-26 2021-11-05 瑞典爱立信有限公司 Reconfiguration in a wireless mesh network
JP2017034560A (en) * 2015-08-04 2017-02-09 セイコーエプソン株式会社 Radio communication apparatus, radio communication method, and program
US10104665B2 (en) 2015-08-10 2018-10-16 Network Performance Research Group Llc Method and apparatus for providing dynamic frequency selection spectrum access in peer-to-peer wireless networks
US9832791B2 (en) 2015-08-04 2017-11-28 Network Performance Research Group Llc Method and apparatus for use of simultaneous multiple channels in the dynamic frequency selection band in wireless networks
US9439197B1 (en) 2015-08-10 2016-09-06 Planetary Network Technologies, Inc. Method and apparatus for directed adaptive control of dynamic channel selection in wireless networks
US9807625B2 (en) 2015-08-10 2017-10-31 Network Performance Research Group Llc Method and apparatus for using time shifted analysis based on gathering non-encrypted information from packets
CN105050145B (en) * 2015-08-31 2018-12-25 宇龙计算机通信科技(深圳)有限公司 Switching method and device is arranged in bandwidth
EP3148253A1 (en) * 2015-09-23 2017-03-29 Technische Universität Dresden Method for managing available communication resource in a communication network and node for a communication network
US10045211B2 (en) 2015-09-29 2018-08-07 Bandwidthx Inc. Authentication and authorization of mobile devices for usage of access points in an alternative network
US10368247B2 (en) 2015-11-25 2019-07-30 Network Performance Research Group Llc Cloud DFS super master detector location systems and methods
CN107950061B (en) * 2016-06-30 2020-07-07 华为技术有限公司 Network channel allocation method and device
US10873540B2 (en) 2016-07-06 2020-12-22 Cisco Technology, Inc. Crowd-sourced cloud computing resource validation
US11030590B2 (en) * 2016-08-24 2021-06-08 Motorola Mobility Llc Opening a data pipe for an electronic transaction
EP3507972B1 (en) * 2016-09-02 2023-10-04 Intel Corporation Virtual private network
US10650621B1 (en) 2016-09-13 2020-05-12 Iocurrents, Inc. Interfacing with a vehicular controller area network
US10187923B2 (en) * 2016-09-22 2019-01-22 T-Mobile Usa, Inc. Provisioning access points to mobile devices for emergency calls
US10200887B2 (en) * 2016-09-27 2019-02-05 GM Global Technology Operations LLC Optimizing user experience in vehicles with multiple hotspots
US20180176845A1 (en) * 2016-12-19 2018-06-21 Bandwidthx Inc. Optimized offloading of wireless devices to alternative wireless networks
WO2018125704A1 (en) 2016-12-27 2018-07-05 Bandwidthx Inc. Radio management based on user intervention
WO2018125702A1 (en) * 2016-12-27 2018-07-05 Bandwidthx Inc. Radio management
WO2018125682A1 (en) 2016-12-27 2018-07-05 Bandwidthx Inc. Auto-discovery of amenities
CN110352606A (en) * 2017-03-03 2019-10-18 华为技术有限公司 A kind of method, mobile terminal, electronic equipment and graphic user interface connecting network
US10382986B2 (en) * 2017-03-17 2019-08-13 At&T Mobility Ii Llc Facilitating mobile device self-optimizing technology selection thresholds in a wireless communication system
US10708823B2 (en) * 2017-05-23 2020-07-07 Veniam, Inc. Systems and methods for cooperative, dynamic, and balanced access to the infrastructure supporting the network of moving things, for example including autonomous vehicles
US20180352397A1 (en) * 2017-06-05 2018-12-06 Intel IP Corporation Synchronizing connectivity in wireless communication networks
WO2018227039A1 (en) * 2017-06-09 2018-12-13 Convida Wireless, Llc Efficient vehicular services
US9949232B1 (en) * 2017-07-28 2018-04-17 Bank Of America Corporation Network device loss prevention using a distributed wireless network
CN107392743B (en) * 2017-08-01 2021-04-06 安徽大学 McAfe two-way auction privacy protection method and auction method
KR20190053710A (en) * 2017-11-10 2019-05-20 삼성전자주식회사 Electronic device and method for displaying, updating mobile network operation information
US10609634B2 (en) 2017-12-24 2020-03-31 Cisco Technology, Inc. Access network selection
US11206412B2 (en) 2018-02-20 2021-12-21 Netgear, Inc. Band steering for a low power device
US11006128B2 (en) 2018-02-20 2021-05-11 Arlo Technologies, Inc. Camera communication channel selection
US11576127B2 (en) * 2018-02-20 2023-02-07 Netgear, Inc. Mesh-based home security system
US10623994B2 (en) 2018-02-22 2020-04-14 Cisco Technology, Inc. Flash crowd detection and responsive network management
US10278025B1 (en) * 2018-03-27 2019-04-30 Intel IP Corporation Device clustering for enhanced location services
CN108495075A (en) * 2018-03-30 2018-09-04 北京三体云联科技有限公司 Video communication method and device
EP3557890B1 (en) * 2018-04-16 2021-01-13 Sony Network Communications Europe B.V. Establishing a wireless connection to a cellular network
US10560562B1 (en) 2018-05-09 2020-02-11 Darpan Tandon Multi-mode smartphone or mobile computing device
USD910608S1 (en) 2018-05-09 2021-02-16 Darpan Tandon Smartphone
US20200028879A1 (en) 2018-07-17 2020-01-23 Microsoft Technology Licensing, Llc Queryless device configuration determination-based techniques for mobile device management
US11184223B2 (en) * 2018-07-31 2021-11-23 Microsoft Technology Licensing, Llc Implementation of compliance settings by a mobile device for compliance with a configuration scenario
US11601825B2 (en) * 2018-08-08 2023-03-07 Faraday&Future Inc. Connected vehicle network data transfer optimization
US11109308B2 (en) * 2018-08-28 2021-08-31 Faraday&Future Inc. Connected vehicle bandwidth-based network selection
US10602383B1 (en) * 2018-10-15 2020-03-24 Microsoft Technology Licensing Llc Application of machine learning for building predictive models enabling smart fail over between different network media types
US10715601B2 (en) * 2018-11-26 2020-07-14 Lockheed Martin Corporation Enhanced deployment of applications in airborne and spaceborne nodes
CN109862583A (en) * 2019-01-04 2019-06-07 新华三技术有限公司 A kind of method and device reporting exception information
WO2020190864A1 (en) * 2019-03-18 2020-09-24 Telcom Ventures, Llc Facilitating use of multi-operator, multi-band and unlicensed spectrum for a user equipment using out of band control channels
US11109309B2 (en) * 2019-03-29 2021-08-31 Blackberry Limited Systems and methods for establishing short-range communication links between asset tracking devices
CN110213731B (en) * 2019-04-29 2020-07-03 中国科学院计算技术研究所 Group user network selection method and system based on intelligent pricing
CN110461031B (en) * 2019-08-26 2021-04-13 维沃移动通信有限公司 Terminal device control method and terminal device
US11140615B2 (en) 2019-09-05 2021-10-05 International Business Machines Corporation Automatically joining a Wi-Fi network with a mobile device based on previous device behavior
US11228957B2 (en) 2019-09-13 2022-01-18 Microsoft Technology Licensing, Llc Seamless roaming of real time media sessions
JP2021078069A (en) * 2019-11-13 2021-05-20 セイコーエプソン株式会社 Radio communication system, first processing apparatus, second processing apparatus, terminal device, and terminal device control program
WO2021126072A1 (en) * 2019-12-19 2021-06-24 Rutledge Omni Services Pte. Ltd. System, base station and wireless device for location tracking
US11290910B2 (en) * 2020-01-31 2022-03-29 Dell Products, Lp System and method for prioritization of network traffic across multiple wireless options
US11165605B2 (en) 2020-03-09 2021-11-02 International Business Machines Corporation Personalized private roaming service set identifiers
CN113630801A (en) * 2020-08-12 2021-11-09 赵玉洁 Network state monitoring management system based on big data
US11589195B2 (en) 2020-08-20 2023-02-21 Ip Co, Llc Asset tracking systems and methods
USD960013S1 (en) 2021-03-04 2022-08-09 Rooster, LLC Asset activity tracker
USD941865S1 (en) 2021-03-04 2022-01-25 Rooster, LLC Display screen or portion thereof with graphical user interface
US20240007956A1 (en) * 2022-07-01 2024-01-04 Apple Inc. Methods and Procedures for Extended Battery Life

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090098869A1 (en) * 2007-09-21 2009-04-16 Ubinetics (Vpt) Limited Power saving
EP2170003A2 (en) * 2008-09-25 2010-03-31 LG Electronics Inc. Mobile terminal and method for accessing wireless internet of mobile terminal
US20110286437A1 (en) * 2010-05-20 2011-11-24 At&T Mobility Ii Llc Wi-Fi Intelligent Selection Engine

Family Cites Families (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI109163B (en) * 2000-02-24 2002-05-31 Nokia Corp Method and apparatus for supporting mobility in a telecommunication system
DE60107207T2 (en) 2001-05-08 2005-12-01 Lucent Technologies Inc. Wireless local area network with dynamic frequency dialing
JP4433126B2 (en) * 2001-05-17 2010-03-17 日本電気株式会社 Base station selection method, mobile station and base station
US20030003868A1 (en) * 2001-06-29 2003-01-02 Ilkka Juurikko Method and system for short-range radio communication
US7761606B2 (en) * 2001-08-02 2010-07-20 Ipass Inc. Method and system to secure a connection application for distribution to multiple end-users
US6707425B2 (en) * 2002-03-21 2004-03-16 Nokia Corporation Method and system for aligning a point-to-multipoint access terminal
KR100494289B1 (en) * 2002-12-06 2005-06-13 주식회사 케이티 billing system and method in wireless internet system
KR100595870B1 (en) 2002-09-18 2006-07-03 주식회사 케이티 Intergrated services management apparatus and method in W-LAN
US8116285B1 (en) * 2002-09-19 2012-02-14 Hewlett-Packard Development Company, L.P. Intelligent wireless access point selection
US7020438B2 (en) 2003-01-09 2006-03-28 Nokia Corporation Selection of access point in a wireless communication system
JP2004274310A (en) * 2003-03-07 2004-09-30 Sony Ericsson Mobilecommunications Japan Inc Mobile terminal device
US20040255008A1 (en) 2003-04-21 2004-12-16 International Business Machines Corporation System for low power operation of wireless LAN
US20050055371A1 (en) * 2003-06-05 2005-03-10 Singam Sunder Method and system to manage a network connection application
KR100735242B1 (en) 2003-12-16 2007-07-03 삼성전자주식회사 Method for providing/notifying interworking information of mobile telecommunication network and wireless local area network and therefor system
GB0410608D0 (en) 2004-05-12 2004-06-16 Nokia Corp Locating mobile terminals
US7894823B2 (en) * 2004-06-07 2011-02-22 Nokia Inc. System for enhanced capacity and quality over WLAN
US7539163B2 (en) 2004-06-07 2009-05-26 Jeou-Kai Lin System and method for a handoff in a multimedia mobile network
US7505795B1 (en) 2004-07-07 2009-03-17 Advanced Micro Devices, Inc. Power save management with customized range for user configuration and tuning value based upon recent usage
JP2008511231A (en) 2004-08-25 2008-04-10 レヴィ ラッセル、 Method and system for connecting to a network via a wireless local area network
US20060072493A1 (en) * 2004-09-28 2006-04-06 Ginzburg Boris E Roaming techniques for a communications network
US20060166669A1 (en) * 2005-01-27 2006-07-27 Holger Claussen Brokering services between wireless device users and operators
US20070026866A1 (en) 2005-05-27 2007-02-01 Govindarajan Krishnamurthi Mobile node, method and computer program product for handing off from one type of network to another type of network
US8886261B2 (en) * 2005-12-06 2014-11-11 Motorola Mobility Llc Multi-mode methods and devices utilizing battery power level for selection of the modes
US8880126B2 (en) * 2005-12-21 2014-11-04 Ntt Docomo, Inc. Method and system for wireless LAN network detection
US8494559B1 (en) 2005-12-30 2013-07-23 At&T Intellectual Property I, L.P. Method and system for selecting a wireless access technology using location based information
US9369246B2 (en) * 2005-12-30 2016-06-14 Vtech Telecommunications Limited System and method of enhancing WiFi real-time communications
US8521544B2 (en) * 2006-02-09 2013-08-27 At&T Intellectual Property I, Lp Method to negotiate for wireless services
EP2489199A2 (en) * 2006-02-22 2012-08-22 Elad Barkan Wireless internet system and method
US7933635B2 (en) * 2006-03-09 2011-04-26 Lg Electronics Inc. Adjustment of parameters based upon battery status
US8275377B2 (en) 2006-04-20 2012-09-25 Qualcomm Incorporated Wireless handoffs between multiple networks
US7808960B1 (en) 2006-05-25 2010-10-05 The Hong Kong University Of Science And Technology Wireless infrastructure and ad hoc network integration
US7737896B1 (en) 2006-08-16 2010-06-15 Kyocera Corporation System and method for optimized use of a dual mode wireless communication device
US8472998B2 (en) * 2006-09-05 2013-06-25 Motorola Mobility Llc System and method for achieving WLAN communications between access point and mobile device
US20080075051A1 (en) 2006-09-27 2008-03-27 Baris Dundar Methods, apparatus and articles for radio frequency planning
US20080089287A1 (en) * 2006-10-12 2008-04-17 Telefonaktiebolaget Lm Ericsson (Publ) Broadcast-based communication in a radio or wireless access network to support mobility
US8583057B2 (en) * 2006-10-31 2013-11-12 Palm, Inc. Techniques to control a shared antenna architecture for multiple co-located radio modules
US8755747B2 (en) 2006-10-31 2014-06-17 Qualcomm Incorporated Techniques to control transmit power for a shared antenna architecture
EP1926283A1 (en) 2006-11-27 2008-05-28 France Télécom Data communications
KR20080068325A (en) 2007-01-19 2008-07-23 삼성전자주식회사 Apparatus and method for decision handover in portable terminal
US20150257038A1 (en) * 2007-02-05 2015-09-10 Wefi, Inc. Devices, systems, and methods for sharing network capacity
EP2127423B1 (en) 2007-03-01 2018-05-09 Thomson Licensing A method and apparatus for selecting an access point or relay node in a multi-hop wireless network
US8036367B2 (en) 2007-03-19 2011-10-11 Google Inc. Flexible communication systems and methods
US8358638B2 (en) 2007-05-24 2013-01-22 Wefi, Inc. Dynamically created and expanded wireless network
US8179811B2 (en) 2007-06-08 2012-05-15 Qualcomm Incorporated Data attachment point selection
JP5197999B2 (en) 2007-06-18 2013-05-15 株式会社エヌ・ティ・ティ・ドコモ Access network switching method, access network switching device and mobile device
KR100891757B1 (en) 2007-07-26 2009-04-07 엘지노텔 주식회사 Method and apparatus for providing neighborhood ap information in a wlan system
US20090203352A1 (en) * 2008-02-13 2009-08-13 Xelex Technologies Inc. Mobile phone/device usage tracking system and method
US7979097B2 (en) 2008-03-18 2011-07-12 Kyocera Corporation Power management for multimode wireless communication device
KR20090106810A (en) * 2008-04-07 2009-10-12 삼성정밀화학 주식회사 Wax-resin compatibilizer, and wax-resin dispersion comprising the compatibilizer and method for preparing the same
US8635335B2 (en) * 2009-01-28 2014-01-21 Headwater Partners I Llc System and method for wireless network offloading
CN101616463B (en) * 2008-06-27 2011-11-16 华为技术有限公司 Method, device and system for realizing pre-certification
CN101388814B (en) * 2008-08-25 2013-03-13 中兴智能交通(无锡)有限公司 Method and system for mobile terminal data transmission
US8305980B1 (en) * 2008-09-12 2012-11-06 Nix John A Efficient handover of media communications in heterogeneous IP networks using handover procedure rules and media handover relays
TW201016066A (en) 2008-10-03 2010-04-16 Kuang Sheng Yun Ltd Method and system for WiFi network high speed mobile voice and multimedia video data communication
KR101535437B1 (en) * 2009-01-15 2015-07-09 삼성전자주식회사 Power Saving Method of Portable Device And Portable Device supporting the same
US20110246281A1 (en) 2009-01-21 2011-10-06 Billshrink, Inc. System and method for providing a savings opportunity in association with a financial account
US9155017B2 (en) * 2009-02-03 2015-10-06 Kyocera Corporation Access point detection for wireless networking
US8477670B2 (en) * 2009-03-06 2013-07-02 Nec Infrontia Corporation Wireless communication method for wireless LAN system, wireless communication device and wireless terminal
CN101600240B (en) * 2009-05-31 2011-07-20 腾讯科技(北京)有限公司 Method for switching multiple networks, instant messaging client, management server and system
CN102026165B (en) 2009-09-14 2014-11-05 中兴通讯股份有限公司 Method and system for identifying terminal
US8595796B2 (en) 2009-10-12 2013-11-26 Qualcomm Incorporated Apparatus and method for authorization for access point name (APN) usage in a specific access
KR20110045885A (en) 2009-10-28 2011-05-04 에스케이 텔레콤주식회사 Handover providing system and method based on mobile IP among heterogeneity network
EP2341738B1 (en) * 2009-12-29 2017-03-29 Lg Electronics Inc. Mobile terminal with Wi-Fi module operating in a power saving mode and providing an AP function and a method for controlling said terminal
KR101645461B1 (en) * 2010-01-12 2016-08-12 삼성전자주식회사 Apparatus and method for auto conntecting wlan in portable terminal
US9526058B2 (en) * 2010-02-10 2016-12-20 Lantronix, Inc. Smart roam system and method
US8812001B2 (en) 2010-05-25 2014-08-19 Electronics And Telecommunications Research Institute Dual mode terminal for supporting access in different network, network apparatus and operation method thereof
US20110310840A1 (en) 2010-06-22 2011-12-22 Richard Howard Kennedy Methods and apparatus to reduce network configuration changes
US8532074B2 (en) * 2010-07-29 2013-09-10 Microsoft Corporation Energy-efficient on-the-fly Wi-Fi hotspot using mobile devices
US9107142B2 (en) * 2010-08-18 2015-08-11 Blackberry Limited Network selection methods and apparatus with use of a master service management module and a prioritized list of multiple aggregator service profiles
US8750188B2 (en) * 2010-12-01 2014-06-10 Deutsche Telekom Ag System support for accessing and switching among multiple wireless interfaces on mobile devices
US8593967B2 (en) * 2011-03-08 2013-11-26 Medium Access Systems Private Limited Method and system of intelligently load balancing of Wi-Fi access point apparatus in a WLAN
WO2012124016A1 (en) 2011-03-11 2012-09-20 富士通株式会社 Wireless communication device and wireless communication method
US8977285B2 (en) * 2011-04-06 2015-03-10 Blackberry Limited Methods and apparatus for use in establishing a data session via an ad hoc wireless network for a scheduled meeting
US8861414B2 (en) 2011-04-08 2014-10-14 The Regents Of The University Of Michigan Reducing energy consumption in wireless devices
US9571952B2 (en) 2011-04-22 2017-02-14 Qualcomm Incorporatd Offloading of data to wireless local area network
EP2714347A2 (en) * 2011-06-01 2014-04-09 Blount, INC. Log splitter with two handed operation features
US9188973B2 (en) * 2011-07-08 2015-11-17 Restoration Robotics, Inc. Calibration and transformation of a camera system's coordinate system
US8767680B2 (en) 2011-07-21 2014-07-01 Moxa Inc. Roaming system using wireless access controller to select access point and method thereof
US9794848B2 (en) 2011-07-25 2017-10-17 Ethertronics, Inc. Method and system for priority-based handoff
DE102011109501B3 (en) * 2011-08-05 2013-01-31 Neoperl Gmbh aerator
US20160127152A1 (en) * 2011-09-26 2016-05-05 Theranos, Inc. Network connectivity methods and systems
US9025579B2 (en) * 2011-10-20 2015-05-05 Futurewei Technologies, Inc. Wireless connection management procedure
US9345059B2 (en) 2011-11-25 2016-05-17 Bandwidthx Inc. Mobile device radio management
US9264433B2 (en) 2012-03-27 2016-02-16 Intel Corporation Secure and automatic connection to wireless network
US9271254B2 (en) 2012-10-22 2016-02-23 Qualcomm Incorporated Network directed system selection using wireless device input
US9355420B2 (en) 2012-11-05 2016-05-31 International Business Machines Corporation Bandwidth management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090098869A1 (en) * 2007-09-21 2009-04-16 Ubinetics (Vpt) Limited Power saving
EP2170003A2 (en) * 2008-09-25 2010-03-31 LG Electronics Inc. Mobile terminal and method for accessing wireless internet of mobile terminal
US20110286437A1 (en) * 2010-05-20 2011-11-24 At&T Mobility Ii Llc Wi-Fi Intelligent Selection Engine

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2783535A4 *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014200749A1 (en) * 2013-06-14 2014-12-18 Qualcomm Incorporated Toll path routing protocol for competitive dynamic pricing and access point selection based on cost
US9301245B2 (en) 2013-06-14 2016-03-29 Qualcomm Incorporated Toll path routing protocol
US11678271B2 (en) 2013-07-23 2023-06-13 Interdigital Ce Patent Holdings Method of management of a wireless interface of a device and corresponding wireless device
EP3621362A1 (en) * 2013-07-23 2020-03-11 InterDigital CE Patent Holdings Method of management of a wireless interface of a device and corresponding wireless device
CN110636597A (en) * 2013-07-23 2019-12-31 交互数字Ce专利控股公司 Method for managing a wireless interface of a device and corresponding wireless device
WO2015051701A1 (en) * 2013-10-10 2015-04-16 成都达信通通讯设备有限公司 Method for realizing multi-channel concurrent internet accessing by synchronizing wifi with apn network, and automatically choosing wifi networking preferentially
CN104680407A (en) * 2013-11-26 2015-06-03 国际商业机器公司 Method and system for subsidizing wireless services in geo-fenced zones
US10383061B2 (en) 2014-03-11 2019-08-13 Canon Kabushiki Kaisha Information processing apparatus, method of controlling information processing apparatus, and storage medium
CN105307224A (en) * 2014-06-19 2016-02-03 中国移动通信集团公司 Method and device for intelligently switching terminal between access points and terminal
CN105307224B (en) * 2014-06-19 2019-01-01 中国移动通信集团公司 A kind of method, apparatus and terminal that terminal intelligently switches between access points
CN104066153B (en) * 2014-06-30 2017-11-03 无锡科本信息科技有限公司 The method that application site sensor realizes mobile device and target device intelligent link
CN104066153A (en) * 2014-06-30 2014-09-24 无锡科本信息科技有限公司 Method for realizing intelligent connection between mobile device and target device by use of position sensor
US9832283B2 (en) 2014-10-10 2017-11-28 At&T Intellectual Property I, L.P. Facilitating quality of service and security via functional classification of devices in networks
US9544395B2 (en) 2014-10-10 2017-01-10 At&T Intellectual Property I, L.P. Facilitating quality of service and security via functional classification of devices in networks
CN104902582A (en) * 2015-04-13 2015-09-09 苏州天趣信息科技有限公司 Temporary access method and system for wireless network
CN107567026A (en) * 2016-06-30 2018-01-09 上海连尚网络科技有限公司 It is a kind of to be used to determine the method and apparatus with group focus
JP2016213878A (en) * 2016-07-28 2016-12-15 キヤノン株式会社 Information processing apparatus, control method of the same, and program
JP2019013035A (en) * 2018-09-19 2019-01-24 キヤノン株式会社 Information processing device, application, method of controlling information processing device, and program
US11140734B2 (en) 2018-12-17 2021-10-05 Samsung Electronics Co., Ltd. Electronic device and method for controlling electronic device
CN110675414A (en) * 2019-09-30 2020-01-10 广州极飞科技有限公司 Land parcel segmentation method and device, electronic equipment and storage medium
US11113753B1 (en) * 2019-12-02 2021-09-07 Inmar Brand Solutions, Inc. Network access system for a shopping application and related methods

Also Published As

Publication number Publication date
EP3358792A1 (en) 2018-08-08
US20150282240A1 (en) 2015-10-01
US20170156113A1 (en) 2017-06-01
EP2783535B1 (en) 2016-09-14
CN103959863B (en) 2018-01-23
US20130322400A1 (en) 2013-12-05
US9578674B2 (en) 2017-02-21
EP2783535A4 (en) 2015-08-12
EP3131238B1 (en) 2018-01-17
US20130322401A1 (en) 2013-12-05
US20160262201A1 (en) 2016-09-08
US9924559B2 (en) 2018-03-20
US20130322329A1 (en) 2013-12-05
US20160192289A1 (en) 2016-06-30
EP2783535A1 (en) 2014-10-01
US9345059B2 (en) 2016-05-17
CN108174435A (en) 2018-06-15
EP3131238A1 (en) 2017-02-15
US9288831B2 (en) 2016-03-15
US9084179B2 (en) 2015-07-14
CN103959863A (en) 2014-07-30
BR112014033163A2 (en) 2020-11-03

Similar Documents

Publication Publication Date Title
US9578674B2 (en) Mobile device radio management
US9826464B2 (en) Systems and methods for establishing wireless connections based on access conditions
US9161200B2 (en) Managing network data transfers in view of multiple data usage plans
US20180176845A1 (en) Optimized offloading of wireless devices to alternative wireless networks
US10045211B2 (en) Authentication and authorization of mobile devices for usage of access points in an alternative network
US20180213078A1 (en) Application management for a mobile device
US20170374071A1 (en) Systems and methods for controlling access to wireless services
Yu et al. Cooperative Wi-Fi deployment: A one-to-many bargaining framework
Jiang et al. On economic viability of mobile edge caching
TW201507512A (en) Toll path routing protocol
US20130132489A1 (en) Location-based social networking
US11494817B2 (en) Market for selling and sharing mobile data
Chen et al. SpeedGate: A smart data pricing testbed based on speed tiers
WO2019232540A1 (en) Optimization across mobile networks
TWI477180B (en) Differentiate the way of registering wireless base stations

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12851159

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2012851159

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2012851159

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112014033163

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112014033163

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20140521