`(10) Patent No.:
`a2) United States Patent
`Scherzeret al.
`(45) Date of Patent:
`Jun. 10, 2014
`
`
`US008751648B2
`
`(54) PROVIDING AND RECEIVING NETWORK
`ACCESS
`
`(75)
`
`.
`:
`Inventors: Shimon Scherzer, Los Gatos, CA (US);
`Tamir Scherzer, Herzelia (IL)
`
`%
`
`tae
`
`:
`
`:
`
`:
`
`(73) Assignee: Wefi, Inc., Marlborough, MA (US)
`(*) Notice:
`Subjectto any disclaimer, the termoFthis
`patent 1s extended or adjusted under
`U.S.C. 154(b) by 2014 days.
`
`:
`
`(21) Appl. No.: 11/441,827
`:
`Filed:
`
`May25, 2006
`
`(22)
`
`9/2007 Blacket al.
`7,266,595 BL
`4/2008 Wang oo...ccc 370/400
`7,359,387 B2*
`1/2009 Jonkeret al.
`7,483,984 Bl
`7/2002 Crosbie we 380/248
`2002/0085719 AL*
`7/2002 Reuning etal.
`.............. 707/102
`2002/0087573 Al*
`8/2002 Sutherlandetal.
`... 709/229
`2002/0120757 Al*
`9/2002 Sherman et al.
`...
`.. 713/201
`2002/0124188 Al*
`2002/0184310 Al* 12/2002 Traversat et al.
`..
`... 709/204
`2003/0005133 Al*
`1/2003 Banerjee et al.
`...
`.. 709/229
`2003/0028596 AL*
`2/2003 Toyotaetal. wo. 709/204
`2004/0066759 Al
`4/2004 Molteniet al.
`2004/0209622 AL* 10/2004 Kotzin veeusseseenee 455/452.1
`2005/0070279 Al
`3/2005 Ginzburgetal.
`2005/0198388 AL*
`9/2005 Teodosiu etal. o....... 709/245
`2005/0223086 AL* 10/2005 Raverdy etal. 709/220
`(Continued)
`OTHER PUBLICATIONS
`
`
`
`(65)
`
`Prior Publication Data
`US 2007/0033197 Al
`Feb. 8, 2007
`ous
`Related U.S. Application Data
`;
`(60) Provisional application No. 60/687,463, filed on Jun.
`3, 2005, provisionalapplication No. 60/728,918,filed|Primary Examiner — Richard G Keehn
`on Oct. 21, 2005, provisional application No.
`(74) Attorney, Agent, or Firm — Finnegan, Henderson,
`60/772,084,
`filed on Feb.
`9, 2006, provisional
`Farabow, Garrett & Dunner, LLP
`application No. 60/776,444,filed on Feb. 23, 2006.
`
`Bahl et al. “MultiNet: Connecting to Multiple IEEE 802.11 Networks
`Using a Single Wireless Card.” Technical Report MSR-TR-2003-46.
`Aug. 2003. Microsoft Research Microsoft Corporation. Redmond,
`WA
`
`(2006.01)
`,
`(2006.01)
`(2006.01)
`
`GO) ae5/173
`GO6P 15/177
`GO6F 15/16
`;
`;
`(52) U.S. CL.
`USPC secseseeeserent 709/225; 709/220; 709/229
`(58) Field of Classification Search
`USPC sooseeecsennetcnnnnnseccnnnneescnnnneeccnnnnsee seatsve 709/225
`See applicationfile for complete search history.
`.
`References Cited
`U.S. PATENT DOCUMENTS
`
`(56)
`
`(57)
`
`ABSTRACT
`
`The disclosure concerns the expansion of wireless network
`access beyond networks for which a user is registered. A
`method of facilitating connection to a wireless network
`oe
`ws
`:
`access point includes receiving a request from a user device
`for access information-required to connect to a network
`through an access point. The network being a network for
`which the useris not registered, determining user contribu-
`tion account acceptability for the access point, and providing
`the access information to the user if the user contribution
`account is acceptable for said access point. In this manner,
`users whoare willing to share network access to networks for
`which they are registered will be able to access networks for
`whichthey are not registered.
`
`6,498,786 B1* 12/2002 Kirkbyet al. oo... 370/322
`7,103,661 B2
`9/2006 Klein
`
`55 Claims, 6 Drawing Sheets
`
`© 116
`
`
`A="
`
`4»S.&
`
`106 aar412
`
`.
`
`j
`
`Page 1 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 1 of 15
`
`KOSS-2024
`IPR2021-00255
`
`
`
`US 8,751,648 B2
`
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2006/0168438 Al
`2007/0066304 Al
`2008/0013487 Al
`
`7/2006 Klein
`3/2007 Lee
`1/2008 Molteniet al.
`
`2006/0031515 Al*
`2006/0089157 Al*
`
`.......... 709/227
`2/2006 Van Gasseletal.
`4/2006 Caseyetal. oo. 455/456.3
`
`* cited by examiner
`
`Page 2 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 2 of 15
`
`KOSS-2024
`IPR2021-00255
`
`
`
`U.S. Patent
`
`Jun. 10, 2014
`
`Sheet 1 of 6
`
`US 8,751,648 B2
`
`108
`
`
`112
`
`FIG.
`
`14
`
`Page 3 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 3 of 15
`
`KOSS-2024
`IPR2021-00255
`
`
`
`U.S. Patent
`
`Jun. 10, 2014
`
`Sheet 2 of 6
`
`US 8,751,648 B2
`
`200
`
`202
`
`204
`
`Transmit Registration
`Information
`
`Install Client Software
`
`Receive Client Software
`
`FIG. 2
`
`Page 4 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 4 of 15
`
`KOSS-2024
`IPR2021-00255
`
`
`
`U.S. Patent
`
`Jun. 10, 2014
`
`Sheet 3 of 6
`
`US 8,751,648 B2
`
`300
`
`302
`
`304
`
`Receive Registration
`Information
`
`Transmit Client Software
`
`Establish User Contribution
`Account
`
`FIG. 3
`
`Page 5 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 5 of 15
`
`KOSS-2024
`IPR2021-00255
`
`
`
`U.S. Patent
`
`Jun. 10, 2014
`
`Sheet 4 of 6
`
`US 8,751,648 B2
`
`
`
`Determine Visible Access
`Points
`
`
`
`
`Determine AccessInformation
`
`with Respect to Visible Access
`Points
`
`Select an Access Point to
`Attempt a Connection
`
`400
`
`402
`
`404
`
`406
`
`408
`
`
`
` Was Connection
`
`
`
`Attempt a Connection to the
`Selected Access Point
`
`Attempt Successful ?
`
`FIG. 4
`
`Page 6 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 6 of 15
`
`KOSS-2024
`IPR2021-00255
`
`
`
`U.S. Patent
`
`Jun. 10, 2014
`
`Sheet 5 of 6
`
`US 8,751,648 B2
`
`Transmit Request for Access
`Information
`
`500
`
`502
`
`504
`
`506
`
`Information
`
`Request User Contribution
`Account Acceptability
`
`Receive AccessInformation,
`If Necessary
`
`Receive Connection Status
`
`FIG. 5
`
`Page 7 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 7 of 15
`
`KOSS-2024
`IPR2021-00255
`
`
`
`U.S. Patent
`
`Jun. 10, 2014
`
`Sheet 6 of 6
`
`US 8,751,648 B2
`
`Receive Request for Access
`Information
`
`Determine Contribution Account
`Acceptability
`
`Information
`
`600
`
`602
`
`604
`
`606
`
`Provide AccessInformation,
`If Necessary
`
`Provide Connection Status
`
`FIG. 6
`
`Page 8 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 8 of 15
`
`KOSS-2024
`IPR2021-00255
`
`
`
`US 8,751,648 B2
`
`1
`PROVIDING AND RECEIVING NETWORK
`ACCESS
`
`CROSS REFERENCE TO OTHER
`APPLICATIONS
`
`This application claimspriority to U.S. Provisional Patent
`Application No. 60/687,463 entitled Collaborative Mobile
`Broad Band (CMBB)Service filed Jun. 3, 2005 which is
`incorporated herein by reference for all purposes.
`This application claimspriority to U.S. Provisional Patent
`Application No. 60/728,918 entitled Wireless Broadband by
`Centrally Managed Peer to Peer Networking filed Oct. 21,
`2005 which is incorporated herein by reference for all pur-
`poses.
`This application claimspriority to U.S. Provisional Patent
`Application No. 60/772,084 entitled Client Based Wireless
`Network for Collaborative Community filed Feb. 9, 2006
`whichis incorporated herein by reference for all purposes.
`This application claimspriority to U.S. Provisional Patent
`Application No. 60/776,444 entitled Enhancing VoIP/WiFi
`Quality Using “Packet Path Diversity” & MultiNet filed Feb.
`23, 2006 which is incorporated herein by reference for all
`purposes.
`
`BACKGROUND OF THE INVENTION
`
`2
`tions, or any other form that the invention may take, may be
`referred to as techniques. A componentsuch as a processor or
`a memory described as being configured to perform a task
`includes both a general componentthat is temporarily con-
`figured to perform the task at a given time or a specific
`componentthat is manufactured to perform the task. In gen-
`eral, the order of the steps of disclosed processes may be
`altered within the scope of the invention.
`A detailed description of one or more embodiments of the
`invention is provided below along with accompanyingfigures
`thatillustrate the principles of the invention. The invention is
`described in connection with such embodiments, but the
`inventionis not limited to any embodiment. The scopeofthe
`invention is limited only by the claims and the invention
`encompasses numerous alternatives, modifications and
`equivalents. Numerous specific details are set forth in the
`following description in order to provide a thorough under-
`standing of the invention. These details are provided for the
`purpose of example and the invention may be practiced
`according to the claims without someorall of these specific
`details. For the purpose of clarity, technical material thatis
`knownin the technicalfields related to the invention has not
`been described in detail so that the invention is not unneces-
`
`20
`
`25
`
`sarily obscured.
`is
`Providing network access is disclosed. A request
`received for access information. User contribution account
`
`Wireless connectivity can provide the ability to communi-
`cate between a user’s device and the Internet enabling access
`to the information andservices that the Internet makes avail-
`able. Because of the utility of the information and services
`available onthe Internet, it is desirable to be able to wirelessly
`connect to the Internet from any location. However, to pro-
`vide wireless coverage for many locations, as, for example,
`cell phone networksdo, requires a large infrastructure that is
`expensive. And as bandwidth requirements for wireless con-
`nectivity increase, the cost for the wireless connectivityrises.
`It would be beneficial to be able to connect wirelessly to the
`Internet from any location withoutthe cost of building a large
`infrastructure.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Various embodiments of the invention are disclosed in the
`following detailed description and the accompanying draw-
`ings.
`FIG.1 is a block diagram illustrating an embodimentof a
`system for providing networkaccess.
`FIG.2 is a flow diagram illustrating an embodimentof a
`process for providing networkaccess.
`FIG.3 is a flow diagram illustrating an embodimentof a
`process for providing networkaccess.
`FIG.4 is a flow diagram illustrating an embodimentof a
`process for providing networkaccess.
`FIG. 5 is a flow diagram illustrating an embodimentof a
`process for determining access information.
`FIG.6 is a flow diagram illustrating an embodimentof a
`process for providing access information.
`
`DETAILED DESCRIPTION
`
`acceptability is determined. Access information is provided.
`In some embodiments, a collaborative community of users
`allows a percentage ofbandwidth ofthe user’s access point to
`be accessed by one or more otherusers in order to be able to
`use other access points when in locations not within range of
`the user’s own access point. In some embodiments, some
`access or limited access is provided to use other users’ access
`points without allowing use of an access pointto otherusers.
`Access information comprises the information that can be
`used to access one or more of the following: the Internet, the
`world wide web, network services, wireless network services,
`broadband wireless network services, broadband wireless
`network services via Wi-Fi® access points, broadband wire-
`less network services via a social network, and broadband
`wireless network services via a social networkthat is enabled
`by a community of collaborative users.
`In some embodiments,a user contribution accountis estab-
`lished whena userregisters. In some embodiments, a tempo-
`rary user contribution account is established—for example,
`for a trial period. When a user registers, the user provides
`registration information. In somecases registration informa-
`tion can be used to enable other users to access to the user’s
`access point. In some embodiments, registration information
`is used to request access to the user’s access point. In some
`embodiments, the user may chooseto grant or deny access to
`his/her access point. In some embodiments, a user is provided
`with the ability to monitor and control access allowed to the
`user’s access point—for example, viewing the users con-
`nected to the access point, viewing the to and from traffic
`usage of the access point, controlling or permitting thetraffic
`levels to and from the access point, terminating or denying
`access throughthe access point, etc. In various embodiments,
`user allows access to other users by designated acceptable
`groups that are allowed access, by indicating that an imme-
`diate “friend” onalist is allowed, by indicating that a “friend
`The invention can be implemented in numerous ways,
`of a friend” on a list of a friend is allowed, or any other
`including as a process, an apparatus, a system, a composition
`appropriate way of designating one or moreusers can use the
`of matter, a computer readable medium such as a computer
`user’s access point. Registration information can include one
`readable storage medium or a computer network wherein
`or more ofthe following: the user’s access point information
`program instructions are sent over optical or electronic com-
`to enable a second user to use the user’s access point, the
`munication links. In this specification, these implementa-
`user’s identifier information (e.g., media access control
`Page 9 of 15
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`KOSS-2024
`IPR2021-00255
`
`Page 9 of 15
`
`KOSS-2024
`IPR2021-00255
`
`
`
`US 8,751,648 B2
`
`3
`(MAC) address), the user’s access point service set identifier
`(SSID), the user’s access point wired equivalent privacy
`(WEP) key or password, and the user’s access point Wi-Fi
`protected access (WPA) key or password.
`In some embodiments, user contribution accounting tracks
`the balance of bandwidth provided by a user via the user’s
`access point to other users and the bandwidth used by the user
`via other’s access points. In some embodiments, user contri-
`bution account balance is added to when bandwidth is used by
`a second user when accessing the user’s access point and/or
`user contribution account balance is subtracted from when
`bandwidth is used by the user when accessing a third user’s
`access point. In various embodiments, additions to a user’s
`user contribution account balance are weighted proportional
`to auser’s access point bandwidth allocationto other users or
`additions to a user’s user contribution account balance are
`
`4
`allowedto access other user’s access points. In some embodi-
`ments, a user is allowed minimal or limited access without
`allowing other user’s to access the user’s access point. This
`can enable a userto be able to access the Internet, its services
`and information, from a large numberof locations. A user
`registers with the provider of network access by communi-
`cating with provider application server 116. Application
`server 116 receives and stores registration information. Reg-
`istration information enables anotheruser to request access to
`or access the user’s access point. Application server 116
`provides the user with a software client. In some embodi-
`ments, the user is provided a software client without being
`connected directly or indirectly to application server 116
`(e.g., the software is sent via the mail on a piece of storage
`media or the software is downloaded from a third party web
`site). The software client enables the user to access another
`user’s access point either directly or by relaying information
`through another registered user’s device. Access point infor-
`mation (e.g., SSID’s, WEP/WPAkeysor passwords,etc.) can
`be provided to a user via a wired network by preloading the
`user’s device, a cell phone network, a Wi-Fi network, or any
`other appropriate network. In some embodiments, access
`information is provided to a user not in real
`time—for
`example, the user downloads access information form server
`while connected to his own accesspoint before going to anew
`location whereuser desires to user other user’s access points.
`FIG.2 is a flow diagram illustrating an embodimentof a
`process for providing network access. In some embodiments,
`the process of FIG. 2 is caused to be executed by user on a
`user’s device—for example, users represented in FIG. 1 by
`104, 106, 108, 110, or 112. In the example shown, in 200
`registration information is transmitted. Registration informa-
`tion can include one or more of the following: the user’s
`access point information to enable a second userto use the
`user’s access point, the user’s identifier information (e.g.,
`media access control (MAC) address), the user’s access point
`service set identifier (SSID), the user’s access point wired
`equivalent privacy (WEP) key or password,the user’s access
`point Wi-Fi protected access (WPA) key or password, and the
`user’s access point bandwidth allocation for a second user.
`The registration information is used by the provider of the
`network to set up a user contribution account and to enable
`other registered users of the network to access the user’s
`access point. In 202, client software is received. The client
`software is provided by the provider to enable the user’s
`device to be able to contact the provider application server
`and to acquire access information for network access points
`that are made available by a given user to other network users.
`In 204, client software is installed. In various embodiments,
`client software is installed before registration or client soft-
`wareis installed after registration. In some embodiments, the
`client software enables the user to contact the provider’s
`application server in order to obtain access information for a
`location wherethe useris not able to use the user’ s own access
`
`weighted proportional to a user’s access point bandwidth
`used by a second,or other, users.
`In various embodiments, user contribution account accept-
`ability comprises having agreed to a trial period and being
`associated with a temporary user contribution account, hav-
`ing registered and being associated with a temporary user
`contribution account, having a temporary user contribution
`account, having a user contribution account, having a user
`contribution account balance, having a user contribution
`account balance above a threshold value, having a user con-
`tribution account balance below a threshold value, having a
`user contribution account balance in a range a values, or any
`other appropriate criteria for acceptability.
`In some embodiments, connection status information is
`provided and/or received. Connection status information can
`be used to select appropriate access point. Status information
`can include one or more of the following: visible network
`access points at a given location, numberof users using each
`of the visible access points, signal strength for the visible
`network access points, average transfer rates to or from the
`visible network access points, bandwidth allocation for the
`visible network access points, retry statistics for visible net-
`work access points, the user’s access point bandwidth allo-
`cation for other users, and mean and/or variance ofthe return
`ping delays(e.g., the time it takes for a return message from
`the provider’s server or any other computer dedicated to this
`function, to arrive after a message wassentto it from the user
`device or from an access point) for visible network access
`points. In some embodiments, the appropriate access point
`comprises an access point that has better performance(e.g.,
`higher bandwidth from the network, shorter response delays,
`lowervarianceofsignal strength/bandwidth, etc.). In various
`embodiments, user determines one or more types of connec-
`tion status information, user transmits one or more types of
`connection status information to a provider server or other
`users, and/or user receives one or more types of connection
`stats information from a providerserveror other users.
`FIG.1 is a block diagram illustrating an embodimentof a
`point. Access information enables the user to use another
`system for providing network access. In the example shown,
`user’s access point in order to gain access to the Internet.
`wireless access points, represented in FIG. 1 by 100 and 102,
`enable access to Internet 114. In various embodiments, access
`FIG.3 is a flow diagram illustrating an embodimentof a
`process for providing network access. In some embodiments,
`to Internet 114is via an internet service provider(e.g., a local
`the process of FIG. 3 is caused to be executed by provider
`phonecarrier using a dial-up modem ordigital subscriberline
`(DSL), a cable provider using a cable modem,a satellite
`application server 116 of FIG. 1. In the example shown,in
`
`company using amodem that can communicateviaasatellite, 300 registration information is received. In some embodi-
`etc.), via a local area network, a wide area network, a wired
`ments, registration information is received via a web appli-
`network, a wireless network, an optical network, or any other
`cation—for example, a user’s browser communicating with
`appropriate network enabling communication with Internet
`the provider’s web site or a web applet communicating via the
`114. A user, represented in FIG. 1 as laptop device 104, 106,
`Internet. Registration information can include one or more of
`and 108, or personal digital assistant (PDA) 110 and 112,
`the following: the user’s access point information to enable a
`allows access to the user’s access point in exchange for being
`second user to use the user’s access point, the user’s identifier
`Page 10 of 15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`KOSS-2024
`IPR2021-00255
`
`Page 10 of 15
`
`KOSS-2024
`IPR2021-00255
`
`
`
`US 8,751,648 B2
`
`5
`information (e.g., media access control (MAC) address), the
`user’s access point service set identifier (SSID), the user’s
`access point wired equivalent privacy (WEP) key or pass-
`word, the user’s access point Wi-Fi protected access (WPA)
`key or password, andthe user’s access point bandwidth allo-
`cation for other users. The registration information is used by
`the provider of the network to set up a user contribution
`account and, if appropriate, to enable other registered users of
`the network to access the user’s access point. In 302, user
`contribution account is established. The user contribution
`
`account comprises a way to track the amountof access thatis
`given by a userto other users of the network. Similarly, the
`user contribution account comprises a way to track the
`amountof access that is used by a user of other users’ access
`points. In some embodiments, user contribution accounting
`tracks the balance of bandwidth provided by a user via the
`user’s access point to other users and the bandwidth used by
`the uservia other’s access points. In some embodiments, user
`contribution account balance is added to when bandwidth is
`
`used by a other users when accessing the user’s access point
`and/or user contribution account balance is subtracted from
`
`when bandwidth is used by the user when accessing another
`user’s access point. In some embodiments, the user accesses
`a plurality of access points because an access point becomes
`unavailable—for example, the user has changed locations
`(e.g., roaming) or the access pointthat the user was connected
`to is no longer available or is no longer desirable (e.g., over
`loaded). In various embodiments, user contirbution account
`acceptability comprises having a user contribution account,
`having a user contribution account balance, having a user
`contribution account balance above a threshold value, having
`a user contribution account balance below a threshold value,
`having a user contribution account balance in a rangea val-
`ues. In various embodiments, additions to a user contribution
`account balance are weighted in proportion to a user’s access
`point bandwidth allocation to other users or a user’s access
`bandwidth used by another user. In some embodiments, the
`registration information is accepted after being received. In
`some embodiments, determining user contribution account
`acceptability includes checking user contribution account
`registration information for a user. In 304, client software is
`transmitted. The client software, once installed in the client
`device, enables the user to contact the provider’s application
`server in order to obtain access information for a location
`wherethe useris notable to use the user’s own access point.
`Access information enables the user to use another user’s
`access point in order to gain access to the Internet.
`FIG.4 is a flow diagram illustrating an embodimentof a
`process for providing network access. In some embodiments,
`the process of FIG. 4 is caused to be executed by user on a
`user’s device—for example, users represented in FIG. 1 by
`104, 106, 108, 110, or 112. In some embodiments, the process
`of FIG. 4 is executed as a part of client software that is
`provided by the networkprovider. In the example shown, in
`400 visible access points are determined. The user’s device
`identifies the visible wireless access points. In 402, access
`information with respect to the visible access points is deter-
`mined. Access information can be determined by looking
`access information up in a preloadedtable orfile located on
`the user’s device, or downloaded or accessedvia a cellular
`connection, a text messaging system, a Wi-Fi network, an
`open wireless access system, a wired or phonesystem, or any
`other appropriate mannerof obtaining access information. In
`404, an access point is selected with which to attempt a
`connection. Access point selection is based on the most
`appropriate access point for a user’s device, where most
`appropriate comprises appropriate performance (e.g., most
`Page 11 of 15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`reliable, highest average bandwidth, lowestvariance in signal
`strength, highest average signal strength, shortest response
`delays, best average transfer rates, most bandwidth allocated
`for outside users, fewest retries, and lowest return ping
`delays, etc.). In 406, a connection 1s attemptedto the selected
`access point.
`In some embodiments,
`the connection is
`attempted to more than one access point simultaneously,
`where the multiple connections are used concurrently to
`increase performance—for
`example,
`reliability and/or
`throughput. Access information is used to attempt a connec-
`tion to the access point and communication via the access
`point is attempted to the Internet. In 408,it is determined ifthe
`connection attempt was successful. In the event that the
`attempt was not successful, control is passed to 404. In the
`event that the attempt was successful, the process ends.
`FIG.5 is a flow diagram illustrating an embodimentof a
`process for determining access information. In some embodi-
`ments, the process of FIG. 5 implements 402 in FIG. 4. In
`some embodiments, the process of FIG.4 is executed as a part
`of client software that is provided by the network provider
`(e.g., downloaded directly from the provider, from a third
`party, or as received on a removable piece of storage media
`such asaCD or DVD). In the example shown,in 500 a request
`is transmitted for access information. Access information is
`
`requested regarding one or more access points. In some
`embodiments, access information is requested before arriv-
`ing at a given location—preloading access information for a
`given location. In 502, user contribution account acceptabil-
`ity is requested. In some embodiments, user contribution
`account acceptability request comprises a request for access
`information. In 504, access informationis received, if neces-
`sary. Access information can include SSID’s, WEP or WPA
`passwords or keys or any other appropriate information for
`accessing access points. In some embodiments, access infor-
`mation is received before arriving at a given location (e.g.,
`preloading access information for a given location). In some
`embodiments, a default set of network access information is
`preloaded. In some embodiments, one or more elements of
`the access information are calculated from other access infor-
`mation—for example, a passwordor key is calculated from an
`SSID, MACaddress, user name,etc. In 506, connection status
`information is received. Connection status information can
`
`include access point type, backhaul band width(e.g., actual
`bandwidth available to the local access point from the Inter-
`net), numberofusers using visible access points, traffic each
`user consumes and/or generates, network congestion, usage
`priority, average signal strength and variance of signal
`strengths to and from the access point, average and variance
`statistics for ping delays, response times, retry statistics, etc.
`Connection status information can be used to determine the
`
`most appropriate access point to choose when attempting to
`communicate with the network. In some embodiments, each
`user mayreport his/her connection experience with a specific
`access point (e.g., connection status information suchas aver-
`age and/or variance of data rate, retry statistics, connection
`failures, etc.) and the connection status information becomes
`a part of the connection status information available toall
`users connecting the access point. In some embodiments,
`access is caused to be granted to the user. In some embodi-
`ments, access is caused to be granted by providing access
`information to a user.
`
`FIG.6 is a flow diagram illustrating an embodimentof a
`process for providing access information. In some embodi-
`ments, the process of FIG.6 is executed on application server
`116 of FIG. 1. In the example shown, in 600 a request is
`received for access information. Access information is
`
`requested regarding one or more access points. In some
`
`KOSS-2024
`IPR2021-00255
`
`Page 11 of 15
`
`KOSS-2024
`IPR2021-00255
`
`
`
`US 8,751,648 B2
`
`7
`embodiments, access information is requested before arriv-
`ing at a given location—preloading access information for a
`given location. In 602, user contribution account acceptabil-
`ity is determined. In various embodiments, user contribution
`account acceptability comprises having a user contribution
`account (temporary account or permanate account), having a
`user contribution accountbalance, having a user contribution
`account balance above a threshold value, having a user con-
`tribution account balance below a threshold value, having a
`user contribution account balance in a range a values, and/or
`any other appropriate acceptability criteria.
`In various
`embodiments, additions to a user contribution account bal-
`ance are weighted proportion to a user’s access point band-
`width allocation to other users or a user’s access bandwidth
`
`8
`providing the access point information to the user device
`basedat least in part on the determination.
`2. A methodas in claim 1, wherein the request for access
`point information is requested using one or more ofthe fol-
`lowing:
`a software client and a web application.
`3. A method as in claim 2, wherein the software client
`enables one or moreof the following:
`monitoring use of an access point, controling access to an
`access point, permitting use of an access point, viewing
`other users connected to an access point, viewing levels
`oftraffic to or from an access point, and denying use of
`an access point.
`4. A methodas in claim 1, further comprising connecting
`the user device to an access point using the access point
`information.
`
`used by another user. In some embodiments, the registration
`information is accepted after being received.
`In some
`embodiments, determining user contribution account accept-
`5. A methodas in claim 1, wherein access point informa-
`ability includes checking user contribution account registra-
`tion can be used to access one or more of the following
`tion information for a user. In 604, access information is
`through the-an access point:
`provided,
`if necessary. Access information can include
`the Internet, the world wide web, network services, wire-
`SSID’s, WEP or WPA passwordsor keysor any other appro-
`less network services, broadband wireless network ser-
`priate information for accessing access points.
`In some
`embodiments, access information is received before arriving
`vices, broadband wireless network services via WiFi
`at a given location (e.g., preloading access information for a
`access points, broadband wireless network services via a
`given location). In some embodiments, a default set of net-
`social network, and broadband wireless network ser-
`work access information is preloaded. In 606, connection
`vices via a social network that is enabled by a commu-
`status information is provided. Connection status information
`nity of collaborative users.
`can include access point type, backhaul band width (e.g.,
`6. A methodas in claim 1, whereinafirst element of access
`actual bandwidth available to the local access point from the
`point information is calculated from a second element of
`30
`Internet), numberofusers using visible access points, average
`access point information.
`signal strength and variance of signal strengths to and from
`7. A method as in claim 1, further comprising receiving
`the access point, ping delay statistics, response times, retry
`user registration information.
`statistics, the user’s access point bandwidth allocation for
`8. A method as in claim 7, wherein registration information
`other users, etc. Connection status information can be used to
`includes one or moreofthe following: the user’s access point
`determine the most appropriate access point to choose when
`information to enable a second user to use the user’s access
`attempting to communicate with the network.
`In some
`embodiments, connection status information is received from
`a plurality of users or clients, aggregated for a given access
`point, and providedto a user so that the user can best deter-
`mine which access point to connectto.
`Although the foregoing embodiments have been described
`in some detail for purposes of clarity of understanding, the
`inv