throbber
US 8,751,648 B2
`(10) Patent No.:
`a2) United States Patent
`Scherzeret al.
`(45) Date of Patent:
`Jun. 10, 2014
`
`
`US008751648B2
`
`(54) PROVIDING AND RECEIVING NETWORK
`ACCESS
`
`(75)
`
`.
`:
`Inventors: Shimon Scherzer, Los Gatos, CA (US);
`Tamir Scherzer, Herzelia (IL)
`
`%
`
`tae
`
`:
`
`:
`
`:
`
`(73) Assignee: Wefi, Inc., Marlborough, MA (US)
`(*) Notice:
`Subjectto any disclaimer, the termoFthis
`patent 1s extended or adjusted under
`U.S.C. 154(b) by 2014 days.
`
`:
`
`(21) Appl. No.: 11/441,827
`:
`Filed:
`
`May25, 2006
`
`(22)
`
`9/2007 Blacket al.
`7,266,595 BL
`4/2008 Wang oo...ccc 370/400
`7,359,387 B2*
`1/2009 Jonkeret al.
`7,483,984 Bl
`7/2002 Crosbie we 380/248
`2002/0085719 AL*
`7/2002 Reuning etal.
`.............. 707/102
`2002/0087573 Al*
`8/2002 Sutherlandetal.
`... 709/229
`2002/0120757 Al*
`9/2002 Sherman et al.
`...
`.. 713/201
`2002/0124188 Al*
`2002/0184310 Al* 12/2002 Traversat et al.
`..
`... 709/204
`2003/0005133 Al*
`1/2003 Banerjee et al.
`...
`.. 709/229
`2003/0028596 AL*
`2/2003 Toyotaetal. wo. 709/204
`2004/0066759 Al
`4/2004 Molteniet al.
`2004/0209622 AL* 10/2004 Kotzin veeusseseenee 455/452.1
`2005/0070279 Al
`3/2005 Ginzburgetal.
`2005/0198388 AL*
`9/2005 Teodosiu etal. o....... 709/245
`2005/0223086 AL* 10/2005 Raverdy etal. 709/220
`(Continued)
`OTHER PUBLICATIONS
`
`
`
`(65)
`
`Prior Publication Data
`US 2007/0033197 Al
`Feb. 8, 2007
`ous
`Related U.S. Application Data
`;
`(60) Provisional application No. 60/687,463, filed on Jun.
`3, 2005, provisionalapplication No. 60/728,918,filed|Primary Examiner — Richard G Keehn
`on Oct. 21, 2005, provisional application No.
`(74) Attorney, Agent, or Firm — Finnegan, Henderson,
`60/772,084,
`filed on Feb.
`9, 2006, provisional
`Farabow, Garrett & Dunner, LLP
`application No. 60/776,444,filed on Feb. 23, 2006.
`
`Bahl et al. “MultiNet: Connecting to Multiple IEEE 802.11 Networks
`Using a Single Wireless Card.” Technical Report MSR-TR-2003-46.
`Aug. 2003. Microsoft Research Microsoft Corporation. Redmond,
`WA
`
`(2006.01)
`,
`(2006.01)
`(2006.01)
`
`GO) ae5/173
`GO6P 15/177
`GO6F 15/16
`;
`;
`(52) U.S. CL.
`USPC secseseeeserent 709/225; 709/220; 709/229
`(58) Field of Classification Search
`USPC sooseeecsennetcnnnnnseccnnnneescnnnneeccnnnnsee seatsve 709/225
`See applicationfile for complete search history.
`.
`References Cited
`U.S. PATENT DOCUMENTS
`
`(56)
`
`(57)
`
`ABSTRACT
`
`The disclosure concerns the expansion of wireless network
`access beyond networks for which a user is registered. A
`method of facilitating connection to a wireless network
`oe
`ws
`:
`access point includes receiving a request from a user device
`for access information-required to connect to a network
`through an access point. The network being a network for
`which the useris not registered, determining user contribu-
`tion account acceptability for the access point, and providing
`the access information to the user if the user contribution
`account is acceptable for said access point. In this manner,
`users whoare willing to share network access to networks for
`which they are registered will be able to access networks for
`whichthey are not registered.
`
`6,498,786 B1* 12/2002 Kirkbyet al. oo... 370/322
`7,103,661 B2
`9/2006 Klein
`
`55 Claims, 6 Drawing Sheets
`
`© 116
`
`
`A="
`
`4»S.&
`
`106 aar412
`
`.
`
`j
`
`Page 1 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 1 of 15
`
`KOSS-2024
`IPR2021-00255
`
`

`

`US 8,751,648 B2
`
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2006/0168438 Al
`2007/0066304 Al
`2008/0013487 Al
`
`7/2006 Klein
`3/2007 Lee
`1/2008 Molteniet al.
`
`2006/0031515 Al*
`2006/0089157 Al*
`
`.......... 709/227
`2/2006 Van Gasseletal.
`4/2006 Caseyetal. oo. 455/456.3
`
`* cited by examiner
`
`Page 2 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 2 of 15
`
`KOSS-2024
`IPR2021-00255
`
`

`

`U.S. Patent
`
`Jun. 10, 2014
`
`Sheet 1 of 6
`
`US 8,751,648 B2
`
`108
`
`
`112
`
`FIG.
`
`14
`
`Page 3 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 3 of 15
`
`KOSS-2024
`IPR2021-00255
`
`

`

`U.S. Patent
`
`Jun. 10, 2014
`
`Sheet 2 of 6
`
`US 8,751,648 B2
`
`200
`
`202
`
`204
`
`Transmit Registration
`Information
`
`Install Client Software
`
`Receive Client Software
`
`FIG. 2
`
`Page 4 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 4 of 15
`
`KOSS-2024
`IPR2021-00255
`
`

`

`U.S. Patent
`
`Jun. 10, 2014
`
`Sheet 3 of 6
`
`US 8,751,648 B2
`
`300
`
`302
`
`304
`
`Receive Registration
`Information
`
`Transmit Client Software
`
`Establish User Contribution
`Account
`
`FIG. 3
`
`Page 5 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 5 of 15
`
`KOSS-2024
`IPR2021-00255
`
`

`

`U.S. Patent
`
`Jun. 10, 2014
`
`Sheet 4 of 6
`
`US 8,751,648 B2
`
`
`
`Determine Visible Access
`Points
`
`
`
`
`Determine AccessInformation
`
`with Respect to Visible Access
`Points
`
`Select an Access Point to
`Attempt a Connection
`
`400
`
`402
`
`404
`
`406
`
`408
`
`
`
` Was Connection
`
`
`
`Attempt a Connection to the
`Selected Access Point
`
`Attempt Successful ?
`
`FIG. 4
`
`Page 6 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 6 of 15
`
`KOSS-2024
`IPR2021-00255
`
`

`

`U.S. Patent
`
`Jun. 10, 2014
`
`Sheet 5 of 6
`
`US 8,751,648 B2
`
`Transmit Request for Access
`Information
`
`500
`
`502
`
`504
`
`506
`
`Information
`
`Request User Contribution
`Account Acceptability
`
`Receive AccessInformation,
`If Necessary
`
`Receive Connection Status
`
`FIG. 5
`
`Page 7 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 7 of 15
`
`KOSS-2024
`IPR2021-00255
`
`

`

`U.S. Patent
`
`Jun. 10, 2014
`
`Sheet 6 of 6
`
`US 8,751,648 B2
`
`Receive Request for Access
`Information
`
`Determine Contribution Account
`Acceptability
`
`Information
`
`600
`
`602
`
`604
`
`606
`
`Provide AccessInformation,
`If Necessary
`
`Provide Connection Status
`
`FIG. 6
`
`Page 8 of 15
`
`KOSS-2024
`IPR2021-00255
`
`Page 8 of 15
`
`KOSS-2024
`IPR2021-00255
`
`

`

`US 8,751,648 B2
`
`1
`PROVIDING AND RECEIVING NETWORK
`ACCESS
`
`CROSS REFERENCE TO OTHER
`APPLICATIONS
`
`This application claimspriority to U.S. Provisional Patent
`Application No. 60/687,463 entitled Collaborative Mobile
`Broad Band (CMBB)Service filed Jun. 3, 2005 which is
`incorporated herein by reference for all purposes.
`This application claimspriority to U.S. Provisional Patent
`Application No. 60/728,918 entitled Wireless Broadband by
`Centrally Managed Peer to Peer Networking filed Oct. 21,
`2005 which is incorporated herein by reference for all pur-
`poses.
`This application claimspriority to U.S. Provisional Patent
`Application No. 60/772,084 entitled Client Based Wireless
`Network for Collaborative Community filed Feb. 9, 2006
`whichis incorporated herein by reference for all purposes.
`This application claimspriority to U.S. Provisional Patent
`Application No. 60/776,444 entitled Enhancing VoIP/WiFi
`Quality Using “Packet Path Diversity” & MultiNet filed Feb.
`23, 2006 which is incorporated herein by reference for all
`purposes.
`
`BACKGROUND OF THE INVENTION
`
`2
`tions, or any other form that the invention may take, may be
`referred to as techniques. A componentsuch as a processor or
`a memory described as being configured to perform a task
`includes both a general componentthat is temporarily con-
`figured to perform the task at a given time or a specific
`componentthat is manufactured to perform the task. In gen-
`eral, the order of the steps of disclosed processes may be
`altered within the scope of the invention.
`A detailed description of one or more embodiments of the
`invention is provided below along with accompanyingfigures
`thatillustrate the principles of the invention. The invention is
`described in connection with such embodiments, but the
`inventionis not limited to any embodiment. The scopeofthe
`invention is limited only by the claims and the invention
`encompasses numerous alternatives, modifications and
`equivalents. Numerous specific details are set forth in the
`following description in order to provide a thorough under-
`standing of the invention. These details are provided for the
`purpose of example and the invention may be practiced
`according to the claims without someorall of these specific
`details. For the purpose of clarity, technical material thatis
`knownin the technicalfields related to the invention has not
`been described in detail so that the invention is not unneces-
`
`20
`
`25
`
`sarily obscured.
`is
`Providing network access is disclosed. A request
`received for access information. User contribution account
`
`Wireless connectivity can provide the ability to communi-
`cate between a user’s device and the Internet enabling access
`to the information andservices that the Internet makes avail-
`able. Because of the utility of the information and services
`available onthe Internet, it is desirable to be able to wirelessly
`connect to the Internet from any location. However, to pro-
`vide wireless coverage for many locations, as, for example,
`cell phone networksdo, requires a large infrastructure that is
`expensive. And as bandwidth requirements for wireless con-
`nectivity increase, the cost for the wireless connectivityrises.
`It would be beneficial to be able to connect wirelessly to the
`Internet from any location withoutthe cost of building a large
`infrastructure.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Various embodiments of the invention are disclosed in the
`following detailed description and the accompanying draw-
`ings.
`FIG.1 is a block diagram illustrating an embodimentof a
`system for providing networkaccess.
`FIG.2 is a flow diagram illustrating an embodimentof a
`process for providing networkaccess.
`FIG.3 is a flow diagram illustrating an embodimentof a
`process for providing networkaccess.
`FIG.4 is a flow diagram illustrating an embodimentof a
`process for providing networkaccess.
`FIG. 5 is a flow diagram illustrating an embodimentof a
`process for determining access information.
`FIG.6 is a flow diagram illustrating an embodimentof a
`process for providing access information.
`
`DETAILED DESCRIPTION
`
`acceptability is determined. Access information is provided.
`In some embodiments, a collaborative community of users
`allows a percentage ofbandwidth ofthe user’s access point to
`be accessed by one or more otherusers in order to be able to
`use other access points when in locations not within range of
`the user’s own access point. In some embodiments, some
`access or limited access is provided to use other users’ access
`points without allowing use of an access pointto otherusers.
`Access information comprises the information that can be
`used to access one or more of the following: the Internet, the
`world wide web, network services, wireless network services,
`broadband wireless network services, broadband wireless
`network services via Wi-Fi® access points, broadband wire-
`less network services via a social network, and broadband
`wireless network services via a social networkthat is enabled
`by a community of collaborative users.
`In some embodiments,a user contribution accountis estab-
`lished whena userregisters. In some embodiments, a tempo-
`rary user contribution account is established—for example,
`for a trial period. When a user registers, the user provides
`registration information. In somecases registration informa-
`tion can be used to enable other users to access to the user’s
`access point. In some embodiments, registration information
`is used to request access to the user’s access point. In some
`embodiments, the user may chooseto grant or deny access to
`his/her access point. In some embodiments, a user is provided
`with the ability to monitor and control access allowed to the
`user’s access point—for example, viewing the users con-
`nected to the access point, viewing the to and from traffic
`usage of the access point, controlling or permitting thetraffic
`levels to and from the access point, terminating or denying
`access throughthe access point, etc. In various embodiments,
`user allows access to other users by designated acceptable
`groups that are allowed access, by indicating that an imme-
`diate “friend” onalist is allowed, by indicating that a “friend
`The invention can be implemented in numerous ways,
`of a friend” on a list of a friend is allowed, or any other
`including as a process, an apparatus, a system, a composition
`appropriate way of designating one or moreusers can use the
`of matter, a computer readable medium such as a computer
`user’s access point. Registration information can include one
`readable storage medium or a computer network wherein
`or more ofthe following: the user’s access point information
`program instructions are sent over optical or electronic com-
`to enable a second user to use the user’s access point, the
`munication links. In this specification, these implementa-
`user’s identifier information (e.g., media access control
`Page 9 of 15
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`KOSS-2024
`IPR2021-00255
`
`Page 9 of 15
`
`KOSS-2024
`IPR2021-00255
`
`

`

`US 8,751,648 B2
`
`3
`(MAC) address), the user’s access point service set identifier
`(SSID), the user’s access point wired equivalent privacy
`(WEP) key or password, and the user’s access point Wi-Fi
`protected access (WPA) key or password.
`In some embodiments, user contribution accounting tracks
`the balance of bandwidth provided by a user via the user’s
`access point to other users and the bandwidth used by the user
`via other’s access points. In some embodiments, user contri-
`bution account balance is added to when bandwidth is used by
`a second user when accessing the user’s access point and/or
`user contribution account balance is subtracted from when
`bandwidth is used by the user when accessing a third user’s
`access point. In various embodiments, additions to a user’s
`user contribution account balance are weighted proportional
`to auser’s access point bandwidth allocationto other users or
`additions to a user’s user contribution account balance are
`
`4
`allowedto access other user’s access points. In some embodi-
`ments, a user is allowed minimal or limited access without
`allowing other user’s to access the user’s access point. This
`can enable a userto be able to access the Internet, its services
`and information, from a large numberof locations. A user
`registers with the provider of network access by communi-
`cating with provider application server 116. Application
`server 116 receives and stores registration information. Reg-
`istration information enables anotheruser to request access to
`or access the user’s access point. Application server 116
`provides the user with a software client. In some embodi-
`ments, the user is provided a software client without being
`connected directly or indirectly to application server 116
`(e.g., the software is sent via the mail on a piece of storage
`media or the software is downloaded from a third party web
`site). The software client enables the user to access another
`user’s access point either directly or by relaying information
`through another registered user’s device. Access point infor-
`mation (e.g., SSID’s, WEP/WPAkeysor passwords,etc.) can
`be provided to a user via a wired network by preloading the
`user’s device, a cell phone network, a Wi-Fi network, or any
`other appropriate network. In some embodiments, access
`information is provided to a user not in real
`time—for
`example, the user downloads access information form server
`while connected to his own accesspoint before going to anew
`location whereuser desires to user other user’s access points.
`FIG.2 is a flow diagram illustrating an embodimentof a
`process for providing network access. In some embodiments,
`the process of FIG. 2 is caused to be executed by user on a
`user’s device—for example, users represented in FIG. 1 by
`104, 106, 108, 110, or 112. In the example shown, in 200
`registration information is transmitted. Registration informa-
`tion can include one or more of the following: the user’s
`access point information to enable a second userto use the
`user’s access point, the user’s identifier information (e.g.,
`media access control (MAC) address), the user’s access point
`service set identifier (SSID), the user’s access point wired
`equivalent privacy (WEP) key or password,the user’s access
`point Wi-Fi protected access (WPA) key or password, and the
`user’s access point bandwidth allocation for a second user.
`The registration information is used by the provider of the
`network to set up a user contribution account and to enable
`other registered users of the network to access the user’s
`access point. In 202, client software is received. The client
`software is provided by the provider to enable the user’s
`device to be able to contact the provider application server
`and to acquire access information for network access points
`that are made available by a given user to other network users.
`In 204, client software is installed. In various embodiments,
`client software is installed before registration or client soft-
`wareis installed after registration. In some embodiments, the
`client software enables the user to contact the provider’s
`application server in order to obtain access information for a
`location wherethe useris not able to use the user’ s own access
`
`weighted proportional to a user’s access point bandwidth
`used by a second,or other, users.
`In various embodiments, user contribution account accept-
`ability comprises having agreed to a trial period and being
`associated with a temporary user contribution account, hav-
`ing registered and being associated with a temporary user
`contribution account, having a temporary user contribution
`account, having a user contribution account, having a user
`contribution account balance, having a user contribution
`account balance above a threshold value, having a user con-
`tribution account balance below a threshold value, having a
`user contribution account balance in a range a values, or any
`other appropriate criteria for acceptability.
`In some embodiments, connection status information is
`provided and/or received. Connection status information can
`be used to select appropriate access point. Status information
`can include one or more of the following: visible network
`access points at a given location, numberof users using each
`of the visible access points, signal strength for the visible
`network access points, average transfer rates to or from the
`visible network access points, bandwidth allocation for the
`visible network access points, retry statistics for visible net-
`work access points, the user’s access point bandwidth allo-
`cation for other users, and mean and/or variance ofthe return
`ping delays(e.g., the time it takes for a return message from
`the provider’s server or any other computer dedicated to this
`function, to arrive after a message wassentto it from the user
`device or from an access point) for visible network access
`points. In some embodiments, the appropriate access point
`comprises an access point that has better performance(e.g.,
`higher bandwidth from the network, shorter response delays,
`lowervarianceofsignal strength/bandwidth, etc.). In various
`embodiments, user determines one or more types of connec-
`tion status information, user transmits one or more types of
`connection status information to a provider server or other
`users, and/or user receives one or more types of connection
`stats information from a providerserveror other users.
`FIG.1 is a block diagram illustrating an embodimentof a
`point. Access information enables the user to use another
`system for providing network access. In the example shown,
`user’s access point in order to gain access to the Internet.
`wireless access points, represented in FIG. 1 by 100 and 102,
`enable access to Internet 114. In various embodiments, access
`FIG.3 is a flow diagram illustrating an embodimentof a
`process for providing network access. In some embodiments,
`to Internet 114is via an internet service provider(e.g., a local
`the process of FIG. 3 is caused to be executed by provider
`phonecarrier using a dial-up modem ordigital subscriberline
`(DSL), a cable provider using a cable modem,a satellite
`application server 116 of FIG. 1. In the example shown,in
`
`company using amodem that can communicateviaasatellite, 300 registration information is received. In some embodi-
`etc.), via a local area network, a wide area network, a wired
`ments, registration information is received via a web appli-
`network, a wireless network, an optical network, or any other
`cation—for example, a user’s browser communicating with
`appropriate network enabling communication with Internet
`the provider’s web site or a web applet communicating via the
`114. A user, represented in FIG. 1 as laptop device 104, 106,
`Internet. Registration information can include one or more of
`and 108, or personal digital assistant (PDA) 110 and 112,
`the following: the user’s access point information to enable a
`allows access to the user’s access point in exchange for being
`second user to use the user’s access point, the user’s identifier
`Page 10 of 15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`KOSS-2024
`IPR2021-00255
`
`Page 10 of 15
`
`KOSS-2024
`IPR2021-00255
`
`

`

`US 8,751,648 B2
`
`5
`information (e.g., media access control (MAC) address), the
`user’s access point service set identifier (SSID), the user’s
`access point wired equivalent privacy (WEP) key or pass-
`word, the user’s access point Wi-Fi protected access (WPA)
`key or password, andthe user’s access point bandwidth allo-
`cation for other users. The registration information is used by
`the provider of the network to set up a user contribution
`account and, if appropriate, to enable other registered users of
`the network to access the user’s access point. In 302, user
`contribution account is established. The user contribution
`
`account comprises a way to track the amountof access thatis
`given by a userto other users of the network. Similarly, the
`user contribution account comprises a way to track the
`amountof access that is used by a user of other users’ access
`points. In some embodiments, user contribution accounting
`tracks the balance of bandwidth provided by a user via the
`user’s access point to other users and the bandwidth used by
`the uservia other’s access points. In some embodiments, user
`contribution account balance is added to when bandwidth is
`
`used by a other users when accessing the user’s access point
`and/or user contribution account balance is subtracted from
`
`when bandwidth is used by the user when accessing another
`user’s access point. In some embodiments, the user accesses
`a plurality of access points because an access point becomes
`unavailable—for example, the user has changed locations
`(e.g., roaming) or the access pointthat the user was connected
`to is no longer available or is no longer desirable (e.g., over
`loaded). In various embodiments, user contirbution account
`acceptability comprises having a user contribution account,
`having a user contribution account balance, having a user
`contribution account balance above a threshold value, having
`a user contribution account balance below a threshold value,
`having a user contribution account balance in a rangea val-
`ues. In various embodiments, additions to a user contribution
`account balance are weighted in proportion to a user’s access
`point bandwidth allocation to other users or a user’s access
`bandwidth used by another user. In some embodiments, the
`registration information is accepted after being received. In
`some embodiments, determining user contribution account
`acceptability includes checking user contribution account
`registration information for a user. In 304, client software is
`transmitted. The client software, once installed in the client
`device, enables the user to contact the provider’s application
`server in order to obtain access information for a location
`wherethe useris notable to use the user’s own access point.
`Access information enables the user to use another user’s
`access point in order to gain access to the Internet.
`FIG.4 is a flow diagram illustrating an embodimentof a
`process for providing network access. In some embodiments,
`the process of FIG. 4 is caused to be executed by user on a
`user’s device—for example, users represented in FIG. 1 by
`104, 106, 108, 110, or 112. In some embodiments, the process
`of FIG. 4 is executed as a part of client software that is
`provided by the networkprovider. In the example shown, in
`400 visible access points are determined. The user’s device
`identifies the visible wireless access points. In 402, access
`information with respect to the visible access points is deter-
`mined. Access information can be determined by looking
`access information up in a preloadedtable orfile located on
`the user’s device, or downloaded or accessedvia a cellular
`connection, a text messaging system, a Wi-Fi network, an
`open wireless access system, a wired or phonesystem, or any
`other appropriate mannerof obtaining access information. In
`404, an access point is selected with which to attempt a
`connection. Access point selection is based on the most
`appropriate access point for a user’s device, where most
`appropriate comprises appropriate performance (e.g., most
`Page 11 of 15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`reliable, highest average bandwidth, lowestvariance in signal
`strength, highest average signal strength, shortest response
`delays, best average transfer rates, most bandwidth allocated
`for outside users, fewest retries, and lowest return ping
`delays, etc.). In 406, a connection 1s attemptedto the selected
`access point.
`In some embodiments,
`the connection is
`attempted to more than one access point simultaneously,
`where the multiple connections are used concurrently to
`increase performance—for
`example,
`reliability and/or
`throughput. Access information is used to attempt a connec-
`tion to the access point and communication via the access
`point is attempted to the Internet. In 408,it is determined ifthe
`connection attempt was successful. In the event that the
`attempt was not successful, control is passed to 404. In the
`event that the attempt was successful, the process ends.
`FIG.5 is a flow diagram illustrating an embodimentof a
`process for determining access information. In some embodi-
`ments, the process of FIG. 5 implements 402 in FIG. 4. In
`some embodiments, the process of FIG.4 is executed as a part
`of client software that is provided by the network provider
`(e.g., downloaded directly from the provider, from a third
`party, or as received on a removable piece of storage media
`such asaCD or DVD). In the example shown,in 500 a request
`is transmitted for access information. Access information is
`
`requested regarding one or more access points. In some
`embodiments, access information is requested before arriv-
`ing at a given location—preloading access information for a
`given location. In 502, user contribution account acceptabil-
`ity is requested. In some embodiments, user contribution
`account acceptability request comprises a request for access
`information. In 504, access informationis received, if neces-
`sary. Access information can include SSID’s, WEP or WPA
`passwords or keys or any other appropriate information for
`accessing access points. In some embodiments, access infor-
`mation is received before arriving at a given location (e.g.,
`preloading access information for a given location). In some
`embodiments, a default set of network access information is
`preloaded. In some embodiments, one or more elements of
`the access information are calculated from other access infor-
`mation—for example, a passwordor key is calculated from an
`SSID, MACaddress, user name,etc. In 506, connection status
`information is received. Connection status information can
`
`include access point type, backhaul band width(e.g., actual
`bandwidth available to the local access point from the Inter-
`net), numberofusers using visible access points, traffic each
`user consumes and/or generates, network congestion, usage
`priority, average signal strength and variance of signal
`strengths to and from the access point, average and variance
`statistics for ping delays, response times, retry statistics, etc.
`Connection status information can be used to determine the
`
`most appropriate access point to choose when attempting to
`communicate with the network. In some embodiments, each
`user mayreport his/her connection experience with a specific
`access point (e.g., connection status information suchas aver-
`age and/or variance of data rate, retry statistics, connection
`failures, etc.) and the connection status information becomes
`a part of the connection status information available toall
`users connecting the access point. In some embodiments,
`access is caused to be granted to the user. In some embodi-
`ments, access is caused to be granted by providing access
`information to a user.
`
`FIG.6 is a flow diagram illustrating an embodimentof a
`process for providing access information. In some embodi-
`ments, the process of FIG.6 is executed on application server
`116 of FIG. 1. In the example shown, in 600 a request is
`received for access information. Access information is
`
`requested regarding one or more access points. In some
`
`KOSS-2024
`IPR2021-00255
`
`Page 11 of 15
`
`KOSS-2024
`IPR2021-00255
`
`

`

`US 8,751,648 B2
`
`7
`embodiments, access information is requested before arriv-
`ing at a given location—preloading access information for a
`given location. In 602, user contribution account acceptabil-
`ity is determined. In various embodiments, user contribution
`account acceptability comprises having a user contribution
`account (temporary account or permanate account), having a
`user contribution accountbalance, having a user contribution
`account balance above a threshold value, having a user con-
`tribution account balance below a threshold value, having a
`user contribution account balance in a range a values, and/or
`any other appropriate acceptability criteria.
`In various
`embodiments, additions to a user contribution account bal-
`ance are weighted proportion to a user’s access point band-
`width allocation to other users or a user’s access bandwidth
`
`8
`providing the access point information to the user device
`basedat least in part on the determination.
`2. A methodas in claim 1, wherein the request for access
`point information is requested using one or more ofthe fol-
`lowing:
`a software client and a web application.
`3. A method as in claim 2, wherein the software client
`enables one or moreof the following:
`monitoring use of an access point, controling access to an
`access point, permitting use of an access point, viewing
`other users connected to an access point, viewing levels
`oftraffic to or from an access point, and denying use of
`an access point.
`4. A methodas in claim 1, further comprising connecting
`the user device to an access point using the access point
`information.
`
`used by another user. In some embodiments, the registration
`information is accepted after being received.
`In some
`embodiments, determining user contribution account accept-
`5. A methodas in claim 1, wherein access point informa-
`ability includes checking user contribution account registra-
`tion can be used to access one or more of the following
`tion information for a user. In 604, access information is
`through the-an access point:
`provided,
`if necessary. Access information can include
`the Internet, the world wide web, network services, wire-
`SSID’s, WEP or WPA passwordsor keysor any other appro-
`less network services, broadband wireless network ser-
`priate information for accessing access points.
`In some
`embodiments, access information is received before arriving
`vices, broadband wireless network services via WiFi
`at a given location (e.g., preloading access information for a
`access points, broadband wireless network services via a
`given location). In some embodiments, a default set of net-
`social network, and broadband wireless network ser-
`work access information is preloaded. In 606, connection
`vices via a social network that is enabled by a commu-
`status information is provided. Connection status information
`nity of collaborative users.
`can include access point type, backhaul band width (e.g.,
`6. A methodas in claim 1, whereinafirst element of access
`actual bandwidth available to the local access point from the
`point information is calculated from a second element of
`30
`Internet), numberofusers using visible access points, average
`access point information.
`signal strength and variance of signal strengths to and from
`7. A method as in claim 1, further comprising receiving
`the access point, ping delay statistics, response times, retry
`user registration information.
`statistics, the user’s access point bandwidth allocation for
`8. A method as in claim 7, wherein registration information
`other users, etc. Connection status information can be used to
`includes one or moreofthe following: the user’s access point
`determine the most appropriate access point to choose when
`information to enable a second user to use the user’s access
`attempting to communicate with the network.
`In some
`embodiments, connection status information is received from
`a plurality of users or clients, aggregated for a given access
`point, and providedto a user so that the user can best deter-
`mine which access point to connectto.
`Although the foregoing embodiments have been described
`in some detail for purposes of clarity of understanding, the
`inv

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket