throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2007/0033197 A1
`Scherzer et al.
`(43) Pub. Date:
`Feb. 8, 2007
`
`US 20070033197A1
`
`(54) PROVIDING AND RECEIVING NETWORK
`ACCESS
`
`(75) Inventors: Shimon Scherzer, Los Gatos, CA (US);
`Tamir Scherzer, Herzelia (IL)
`Correspondence Address:
`VAN PELT, YI & JAMES LLP
`1OOSON FOOTHILL BILVD #2OO
`CUPERTINO, CA 95.014 (US)
`
`(73) Assignee: Contigo Mobility Inc.
`(21) Appl. No.:
`11/441,827
`
`(22) Filed:
`
`May 25, 2006
`
`
`
`Related U.S. Application Data
`(60) Provisional application No. 60/687,463, filed on Jun.
`3, 2005. Provisional application No. 60/728,918, filed
`on Oct. 21, 2005. Provisional application No. 60/772,
`084, filed on Feb. 9, 2006. Provisional application
`No. 60/776,444, filed on Feb. 23, 2006.
`
`Publication Classification
`
`(51) Int. Cl.
`(2006.01)
`G06F 7/30
`(52) U.S. Cl. ................................................................ T07/10
`(57)
`ABSTRACT
`Providing network access is disclosed. A request is received
`for access information. User contribution account accept
`ability is determined. Access information is provided.
`
`102
`
`108
`
`APPLE 1004
`
`1
`
`

`

`Patent Application Publication Feb. 8, 2007 Sheet 1 of 6
`
`US 2007/0033197 A1
`
`S1 116
`
`114
`
`
`
`
`
`102
`
`108
`
`
`
`112
`
`110
`
`FIG. 1
`
`2
`
`

`

`Patent Application Publication Feb. 8, 2007 Sheet 2 of 6
`
`US 2007/0033197 A1
`
`
`
`200
`
`2O2
`
`204
`
`Transmit Registration
`Information
`
`Receive Client Software
`
`Install Client Software
`
`FIG.2
`
`3
`
`

`

`Patent Application Publication Feb. 8, 2007 Sheet 3 of 6
`
`US 2007/0033197 A1
`
`
`
`300
`
`302
`
`304
`
`Receive Registration
`information
`
`Establish User Contribution
`ACCOUnt
`
`Transmit Client Software
`
`FIG. 3
`
`4
`
`

`

`Patent Application Publication Feb. 8, 2007 Sheet 4 of 6
`
`US 2007/0033197 A1
`
`400
`
`
`
`
`
`402
`
`404
`
`
`
`406
`
`
`
`
`
`408
`
`
`
`Determine Visible Access
`Points
`
`
`
`Determine ACCeSS Information
`with Respect to Visible Access
`PointS
`
`
`
`Select an Access Point to
`Attempt a Connection
`
`Attempt a Connection to the
`Selected ACCeSS Point
`
`Was Connection
`Attempt Successful ?
`
`FIG. 4
`
`5
`
`

`

`Patent Application Publication Feb. 8, 2007 Sheet 5 of 6
`
`US 2007/0033197 A1
`
`
`
`500
`
`502
`
`504
`
`506
`
`Transmit Request for Access
`Information
`
`Request User Contribution
`ACCount Acceptability
`
`Receive Access Information,
`lf Necessary
`
`Receive Connection Status
`information
`
`FIG. 5
`
`6
`
`

`

`Patent Application Publication Feb. 8, 2007 Sheet 6 of 6
`
`US 2007/0033197 A1
`
`
`
`600
`
`6O2
`
`604
`
`606
`
`Receive Request for Access
`Information
`
`Determine Contribution ACCount
`Acceptability
`
`Provide Access Information,
`lf Necessary
`
`Provide Connection Status
`Information
`
`F.G. 6
`
`7
`
`

`

`US 2007/0033197 A1
`
`Feb. 8, 2007
`
`PROVIDING AND RECEIVING NETWORK
`ACCESS
`
`CROSS REFERENCE TO OTHER
`APPLICATIONS
`0001. This application claims priority to U.S. Provisional
`Patent Application No. 60/687,463 entitled Collaborative
`Mobile Broad Band (CMBB) Service filed Jun. 3, 2005
`which is incorporated herein by reference for all purposes.
`0002 This application claims priority to U.S. Provisional
`Patent Application No. 60/728,918 entitled Wireless Broad
`band by Centrally Managed Peer to Peer Networking filed
`Oct. 21, 2005 which is incorporated herein by reference for
`all purposes.
`0003. This application claims priority to U.S. Provisional
`Patent Application No. 60/772,084 entitled Client Based
`Wireless Network for Collaborative Community filed Feb.
`9, 2006 which is incorporated herein by reference for all
`purposes.
`0004. This application claims priority to U.S. Provisional
`Patent Application No. 60/776.444 entitled Enhancing VoIP/
`WiFi Quality. Using “Packet Path Diversity & MultiNet
`filed Feb. 23, 2006 which is incorporated herein by reference
`for all purposes.
`
`BACKGROUND OF THE INVENTION
`0005 Wireless connectivity can provide the ability to
`communicate between a user's device and the Internet
`enabling access to the information and services that the
`Internet makes available. Because of the utility of the
`information and services available on the Internet, it is
`desirable to be able to wirelessly connect to the Internet from
`any location. However, to provide wireless coverage for
`many locations, as, for example, cell phone networks do,
`requires a large infrastructure that is expensive. And as
`bandwidth requirements for wireless connectivity increase,
`the cost for the wireless connectivity rises. It would be
`beneficial to be able to connect wirelessly to the Internet
`from any location without the cost of building a large
`infrastructure.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0006 Various embodiments of the invention are dis
`closed in the following detailed description and the accom
`panying drawings.
`0007 FIG. 1 is a block diagram illustrating an embodi
`ment of a system for providing network access.
`0008 FIG. 2 is a flow diagram illustrating an embodi
`ment of a process for providing network access.
`0009 FIG. 3 is a flow diagram illustrating an embodi
`ment of a process for providing network access.
`0010 FIG. 4 is a flow diagram illustrating an embodi
`ment of a process for providing network access.
`0011
`FIG. 5 is a flow diagram illustrating an embodi
`ment of a process for determining access information.
`0012 FIG. 6 is a flow diagram illustrating an embodi
`ment of a process for providing access information.
`
`DETAILED DESCRIPTION
`0013 The invention can be implemented in numerous
`ways, including as a process, an apparatus, a System, a
`composition of matter, a computer readable medium Such as
`a computer readable storage medium or a computer network
`wherein program instructions are sent over optical or elec
`tronic communication links. In this specification, these
`implementations, or any other form that the invention may
`take, may be referred to as techniques. A component such as
`a processor or a memory described as being configured to
`perform a task includes both a general component that is
`temporarily configured to perform the task at a given time or
`a specific component that is manufactured to perform the
`task. In general, the order of the steps of disclosed processes
`may be altered within the scope of the invention.
`0014) A detailed description of one or more embodiments
`of the invention is provided below along with accompanying
`figures that illustrate the principles of the invention. The
`invention is described in connection with such embodi
`ments, but the invention is not limited to any embodiment.
`The scope of the invention is limited only by the claims and
`the invention encompasses numerous alternatives, modifi
`cations and equivalents. Numerous specific details are set
`forth in the following description in order to provide a
`thorough understanding of the invention. These details are
`provided for the purpose of example and the invention may
`be practiced according to the claims without some or all of
`these specific details. For the purpose of clarity, technical
`material that is known in the technical fields related to the
`invention has not been described in detail so that the
`invention is not unnecessarily obscured.
`00.15
`Providing network access is disclosed. A request is
`received for access information. User contribution account
`acceptability is determined. Access information is provided.
`In some embodiments, a collaborative community of users
`allows a percentage of bandwidth of the user's access point
`to be accessed by one or more other users in order to be able
`to use other access points when in locations not within range
`of the user's own access point. In some embodiments, some
`access or limited access is provided to use other users
`access points without allowing use of an access point to
`other users. Access information comprises the information
`that can be used to access one or more of the following: the
`Internet, the world wide web, network services, wireless
`network services, broadband wireless network services,
`broadband wireless network services via Wi-FiR) access
`points, broadband wireless network services via a Social
`network, and broadband wireless network services via a
`social network that is enabled by a community of collabo
`rative users.
`0016.
`In some embodiments, a user contribution account
`is established when a user registers. In some embodiments,
`a temporary user contribution account is established—for
`example, for a trial period. When a user registers, the user
`provides registration information. In some cases registration
`information can be used to enable other users to access to the
`user's access point. In some embodiments, registration
`information is used to request access to the user's access
`point. In some embodiments, the user may choose to grant
`or deny access to his/her access point. In some embodi
`ments, a user is provided with the ability to monitor and
`control access allowed to the user's access point—for
`
`8
`
`

`

`US 2007/0033197 A1
`
`Feb. 8, 2007
`
`example, viewing the users connected to the access point,
`viewing the to and from traffic usage of the access point,
`controlling or permitting the traffic levels to and from the
`access point, terminating or denying access through the
`access point, etc. In various embodiments, user allows
`access to other users by designated acceptable groups that
`are allowed access, by indicating that an immediate “friend’
`on a list is allowed, by indicating that a “friend of a friend’
`on a list of a friend is allowed, or any other appropriate way
`of designating one or more users can use the user's access
`point. Registration information can include one or more of
`the following: the user's access point information to enable
`a second user to use the user's access point, the user's
`identifier information (e.g., media access control (MAC)
`address), the user's access point service set identifier
`(SSID), the user's access point wired equivalent privacy
`(WEP) key or password, and the user's access point Wi-Fi
`protected access (WPA) key or password.
`0017. In some embodiments, user contribution account
`ing tracks the balance of bandwidth provided by a user via
`the user's access point to other users and the bandwidth used
`by the user via other's access points. In some embodiments,
`user contribution account balance is added to when band
`width is used by a second user when accessing the user's
`access point and/or user contribution account balance is
`subtracted from when bandwidth is used by the user when
`accessing a third user's access point. In various embodi
`ments, additions to a user's user contribution account bal
`ance are weighted proportional to a user's access point
`bandwidth allocation to other users or additions to a user's
`user contribution account balance are weighted proportional
`to a user's access point bandwidth used by a second, or
`other, users.
`0018. In various embodiments, user contribution account
`acceptability comprises having agreed to a trial period and
`being associated with a temporary user contribution account,
`having registered and being associated with a temporary
`user contribution account, having a temporary user contri
`bution account, having a user contribution account, having
`a user contribution account balance, having a user contri
`bution account balance above a threshold value, having a
`user contribution account balance below a threshold value,
`having a user contribution account balance in a range a
`values, or any other appropriate criteria for acceptability.
`0019. In some embodiments, connection status informa
`tion is provided and/or received. Connection status infor
`mation can be used to select appropriate access point. Status
`information can include one or more of the following:
`visible network access points at a given location, number of
`users using each of the visible access points, signal strength
`for the visible network access points, average transfer rates
`to or from the visible network access points, bandwidth
`allocation for the visible network access points, retry statis
`tics for visible network access points, the user's access point
`bandwidth allocation for other users, and mean and/or
`variance of the returnping delays (e.g., the time it takes for
`a return message from the provider's server or any other
`computer dedicated to this function, to arrive after a message
`was sent to it from the user device or from an access point)
`for visible network access points. In some embodiments, the
`appropriate access point comprises an access point that has
`better performance (e.g., higher bandwidth from the net
`work, shorter response delays, lower variance of signal
`
`strength/bandwidth, etc.). In various embodiments, user
`determines one or more types of connection status informa
`tion, user transmits one or more types of connection status
`information to a provider server or other users, and/or user
`receives one or more types of connection stats information
`from a provider server or other users.
`0020 FIG. 1 is a block diagram illustrating an embodi
`ment of a system for providing network access. In the
`example shown, wireless access points, represented in FIG.
`1 by 100 and 102, enable access to Internet 114. In various
`embodiments, access to Internet 114 is via an internet
`service provider (e.g., a local phone carrier using a dial-up
`modem or digital subscriber line (DSL), a cable provider
`using a cable modem, a satellite company using a modem
`that can communicate via a satellite, etc.), via a local area
`network, a wide area network, a wired network, a wireless
`network, an optical network, or any other appropriate net
`work enabling communication with Internet 114. A user,
`represented in FIG. 1 as laptop device 104,106, and 108, or
`personal digital assistant (PDA) 110 and 112, allows access
`to the user's access point in exchange for being allowed to
`access other user's access points. In some embodiments, a
`user is allowed minimal or limited access without allowing
`other users to access the user's access point. This can enable
`a user to be able to access the Internet, its services and
`information, from a large number of locations. A user
`registers with the provider of network access by communi
`cating with provider application server 116. Application
`server 116 receives and stores registration information.
`Registration information enables another user to request
`access to or access the user's access point. Application
`server 116 provides the user with a software client. In some
`embodiments, the user is provided a software client without
`being connected directly or indirectly to application server
`116 (e.g., the Software is sent via the mail on a piece of
`storage media or the software is downloaded from a third
`party web site). The software client enables the user to
`access another user's access point either directly or by
`relaying information through another registered user's
`device. Access point information (e.g., SSID's, WEP/WPA
`keys or passwords, etc.) can be provided to a user via a wired
`network by preloading the user's device, a cell phone
`network, a Wi-Fi network, or any other appropriate network.
`In some embodiments, access information is provided to a
`user not in real time—for example, the user down loads
`access information form server while connected to his own
`access point before going to a new location where user
`desires to user other user's access points.
`0021
`FIG. 2 is a flow diagram illustrating an embodi
`ment of a process for providing network access. In some
`embodiments, the process of FIG. 2 is caused to be executed
`by user on a user's device—for example, users represented
`in FIG. 1 by 104, 106, 108, 110, or 112. In the example
`shown, in 200 registration information is transmitted. Reg
`istration information can include one or more of the follow
`ing: the user's access point information to enable a second
`user to use the user's access point, the user's identifier
`information (e.g., media access control (MAC) address), the
`user's access point service set identifier (SSID), the user's
`access point wired equivalent privacy (WEP) key or pass
`word, the user's access point Wi-Fi protected access (WPA)
`key or password, and the user's access point bandwidth
`allocation for a second user. The registration information is
`used by the provider of the network to set up a user
`
`9
`
`

`

`US 2007/0033197 Al
`
`Feb. 8, 2007
`
`contribution account and to enable other registered users of
`the network to access the user’s access point. In 202, client
`software is received. The client software is provided by the
`provider to enable the user’s device to be able to contact the
`provider application server and to acquire access informa-
`tion for network access points that are made available by a
`given user to other network users. In 204, client software is
`installed.
`In various embodiments, client
`software is
`installed before registration or client software is installed
`after registration. In some embodiments, the client software
`enables the user to contact the provider’s application server
`in order to obtain access information for a location where the
`user is not able to use the user’s own access point. Access
`information enables the user to use another user’s access
`
`point in order to gain access to the Internet.
`
`[0022] FIG. 3 is a flow diagram illustrating an embodi-
`ment of a process for providing network access. In some
`embodiments, the process of FIG. 3 is caused to be executed
`by provider application server 116 of FIG.1. In the example
`shown, in 300 registration information is received. In some
`embodiments, registration information is received via a web
`application—for example, a user’s browser communicating
`with the provider’s web site or a web applet communicating
`via the Internet. Registration information can include one or
`moreof the following: the user’s access point information to
`enable a seconduserto use the user’s access point, the user’s
`identifier information (e.g., media access control (MAC)
`address),
`the user’s access point service set
`identifier
`(SSID), the user’s access point wired equivalent privacy
`(WEP) key or password,
`the user’s access point Wi-Fi
`protected access (WPA) key or password, and the user’s
`access point bandwidth allocation for other users. The
`registration information is used by the provider of the
`network to set up a user contribution account and, if appro-
`priate, to enable other registered users of the network to
`access the user’s access point. In 302, user contribution
`accountis established. The user contribution account com-
`
`prises a way to track the amountof access that is given by
`a user to other users of the network. Similarly, the user
`contribution account comprises a wayto track the amount of
`access that is used by a userof other users’ access points. In
`some embodiments, user contribution accounting tracks the
`balance of bandwidth provided by a user via the user’s
`access point to other users and the bandwidth used by the
`user via other’s access points. In some embodiments, user
`contribution account balance is added to when bandwidth is
`
`used by a other users when accessing the user’s access point
`and/or user contribution account balance is subtracted from
`when bandwidth is used by the user when accessing another
`user’s access point. In some embodiments, the user accesses
`a plurality of access points because an access point becomes
`unavailable—for example, the user has changed locations
`(e.g., roaming) or the access point that the user was con-
`nected to is no longer available or is no longer desirable
`(e.g., over loaded). In various embodiments, user contirbu-
`tion account acceptability comprises having a user contri-
`bution account, having a user contribution account balance,
`having a user contribution account balance abovea thresh-
`old value, having a user contribution account balance below
`a threshold value, having a user contribution account bal-
`ance in a range a values. In various embodiments, additions
`to a user contribution account balance are weighted in
`proportion to a user’s access point bandwidth allocation to
`other users or a user’s access bandwidth used by another
`
`user. In some embodiments, the registration information is
`accepted after being received. In some embodiments, deter-
`mining user contribution account acceptability includes
`checking user contribution account registration information
`for a user. In 304, client software is transmitted. The client
`software, once installed in the client device, enables the user
`to contact the provider’s application server in order to obtain
`access information for a location where the user is not able
`to use the user’s own access point. Access information
`enables the user to use another user’s access point in order
`to gain access to the Internet.
`[0023]
`FIG. 4 is a flow diagram illustrating an embodi-
`ment of a process for providing network access. In some
`embodiments, the process of FIG. 4 is caused to be executed
`by user on a user’s device—for example, users represented
`in FIG. 1 by 104, 106, 108, 110, or 112. In some embodi-
`ments, the process of FIG. 4 is executed as a part of client
`software that is provided by the network provider. In the
`example shown,in 400 visible access points are determined.
`The user’s device identifies the visible wireless access
`
`points. In 402, access information with respect to the visible
`access points is determined. Access information can be
`determined by looking access information up in a preloaded
`table or file located on the user’s device, or downloaded or
`accessed via a cellular connection, a text messaging system,
`a Wi-Fi network, an open wireless access system, a wired or
`phonesystem, or any other appropriate manner of obtaining
`access information. In 404, an access point is selected with
`which to attempt a connection. Access point selection is
`based on the most appropriate access point for a user’s
`device, where most appropriate comprises appropriate per-
`formance (e.g., most reliable, highest average bandwidth,
`lowest variance in signal strength, highest average signal
`strength, shortest response delays, best average transfer
`rates, most bandwidth allocated for outside users, fewest
`retries, and lowest return ping delays, etc.).
`In 406, a
`connection is attempted to the selected access point. In some
`embodiments, the connection is attempted to more than one
`access point simultaneously, where the multiple connections
`are used concurrently to
`increase performance—for
`example, reliability and/or throughput. Access information
`is used to attempt a connection to the access point and
`communication via the access point
`is attempted to the
`Internet. In 408, it is determined if the connection attempt
`was successful.
`In the event
`that
`the attempt was not
`successful, control is passed to 404. In the event that the
`attempt was successful, the process ends.
`[0024]
`FIG. 5 is a flow diagram illustrating an embodi-
`ment of a process for determining access information. In
`some embodiments, the process of FIG. 5 implements 402 in
`FIG. 4. In some embodiments, the process of FIG. 4 is
`executed as a part of client software that is provided by the
`network provider (e.g., downloaded directly from the pro-
`vider, from a third party, or as received on a removable piece
`of storage media such as a CD or DVD). In the example
`shown, in 500 a request is transmitted for access informa-
`tion. Access information is requested regarding one or more
`access points. In some embodiments, access information is
`requested before arriving at a given location—preloading
`access information for a given location. In 502, user con-
`tribution account acceptability is
`requested.
`In some
`embodiments, user
`contribution account
`acceptability
`request comprises a request for access information. In 504,
`access information is received, if necessary. Access infor-
`10
`
`10
`
`

`

`US 2007/0033197 A1
`
`Feb. 8, 2007
`
`mation can include SSID's, WEP or WPA passwords or keys
`or any other appropriate information for accessing access
`points. In some embodiments, access information is received
`before arriving at a given location (e.g., preloading access
`information for a given location). In some embodiments, a
`default set of network access information is preloaded. In
`Some embodiments, one or more elements of the access
`information are calculated from other access information—
`for example, a password or key is calculated from an SSID,
`MAC address, user name, etc. In 506, connection status
`information is received. Connection status information can
`include access point type, backhaul band width (e.g., actual
`bandwidth available to the local access point from the
`Internet), number of users using visible access points, traffic
`each user consumes and/or generates, network congestion,
`usage priority, average signal strength and variance of signal
`strengths to and from the access point, average and variance
`statistics for ping delays, response times, retry statistics, etc.
`Connection status information can be used to determine the
`most appropriate access point to choose when attempting to
`communicate with the network. In some embodiments, each
`user may report his/her connection experience with a spe
`cific access point (e.g., connection status information Such
`as average and/or variance of data rate, retry statistics,
`connection failures, etc.) and the connection status informa
`tion becomes a part of the connection status information
`available to all users connecting the access point. In some
`embodiments, access is caused to be granted to the user. In
`Some embodiments, access is caused to be granted by
`providing access information to a user.
`0.025
`FIG. 6 is a flow diagram illustrating an embodi
`ment of a process for providing access information. In some
`embodiments, the process of FIG. 6 is executed on appli
`cation server 116 of FIG. 1. In the example shown, in 600
`a request is received for access information. Access infor
`mation is requested regarding one or more access points. In
`Some embodiments, access information is requested before
`arriving at a given location preloading access information
`for a given location. In 602, user contribution account
`acceptability is determined. In various embodiments, user
`contribution account acceptability comprises having a user
`contribution account (temporary account or permanate
`account), having a user contribution account balance, having
`a user contribution account balance above a threshold value,
`having a user contribution account balance below a thresh
`old value, having a user contribution account balance in a
`range a values, and/or any other appropriate acceptability
`criteria. In various embodiments, additions to a user contri
`bution account balance are weighted proportion to a user's
`access point bandwidth allocation to other users or a user's
`access bandwidth used by another user. In some embodi
`ments, the registration information is accepted after being
`received. In some embodiments, determining user contribu
`tion account acceptability includes checking user contribu
`tion account registration information for a user. In 604,
`access information is provided, if necessary. Access infor
`mation can include SSID's, WEP or WPA passwords or keys
`or any other appropriate information for accessing access
`points. In some embodiments, access information is received
`before arriving at a given location (e.g., preloading access
`information for a given location). In some embodiments, a
`default set of network access information is preloaded. In
`606, connection status information is provided. Connection
`status information can include access point type, backhaul
`band width (e.g., actual bandwidth available to the local
`access point from the Internet), number of users using
`
`visible access points, average signal strength and variance of
`signal strengths to and from the access point, ping delay
`statistics, response times, retry statistics, the user's access
`point bandwidth allocation for other users, etc. Connection
`status information can be used to determine the most appro
`priate access point to choose when attempting to commu
`nicate with the network. In some embodiments, connection
`status information is received from a plurality of users or
`clients, aggregated for a given access point, and provided to
`a user so that the user can best determine which access point
`tO COnnect to.
`0026. Although the foregoing embodiments have been
`described in some detail for purposes of clarity of under
`standing, the invention is not limited to the details provided.
`There are many alternative ways of implementing the inven
`tion. The disclosed embodiments are illustrative and not
`restrictive.
`
`What is claimed is:
`1. A method of providing network access comprising:
`receiving a request for access information;
`determining user contribution account acceptability; and
`providing access information.
`2. The method in claim 1, wherein the request for access
`information is requested using one or more of the following:
`a software client and a web application.
`3. The method in claim 2, wherein the software client
`enables one or more of the following: a user to monitor use
`of an access point, a user to control access to an access point,
`a user to permit use of an access point, a user to view other
`users connected to an access point, a user to view levels of
`traffic to or from an access point, and a user to deny use of
`an access point.
`4. The method in claim 1, further comprising causing
`access to be granted.
`5. A method as in claim 1, wherein access information can
`be used to access one or more of the following: the Internet,
`the world wide web, network services, wireless network
`services, broadband wireless network services, broadband
`wireless network services via Wi-Fi access points, broad
`band wireless network services via a social network, and
`broadband wireless network services via a social network
`that is enabled by a community of collaborative users.
`6. The method in claim 1, wherein a first element of access
`information is calculated from a second element of access
`information.
`7. The method in claim 1, further comprising receiving
`user registration information.
`8. A method as in claim 7, wherein registration informa
`tion includes one or more of the following: the user's access
`point information to enable a second user to use the user's
`access point, the user's identifier information, the user's
`access point SSID, the user's access point WEP key, the
`user's access point WPA key, and the user's access point
`bandwidth allocation for a second user.
`9. The method in claim 1, further comprising accepting
`user registration information.
`10. A method as in claim 1, wherein determining user
`contribution account acceptability includes checking user
`contribution account registration information for a user.
`11. The method in claim 1, wherein user contribution
`account acceptability comprises one or more of the follow
`ing: having agreed to a trial period and being associated with
`
`11
`
`

`

`US 2007/0033197 A1
`
`Feb. 8, 2007
`
`a temporary user contribution account, having registered and
`being associated with a temporary user contribution account,
`having a temporary user contribution account, having a user
`contribution account, having a user contribution account
`balance, having a user contribution account balance above a
`threshold value, having a user contribution account balance
`below a threshold value, and having a user contribution
`account balance in a range a values.
`12. A method as in claim 1, wherein Verifying user
`contribution account acceptability includes verifying that
`the user has an acceptable user contribution account balance.
`13. A method as in claim 12, wherein user contribution
`account balance is added to when bandwidth is used by a
`second user when accessing the user's access point.
`14. A method as in claim 12, wherein user contribution
`account balance is subtracted from when bandwidth is used
`by the user when accessing a third user's access point.
`15. The method in claim 12, wherein additions to a user
`contribution account balance are weighted proportional to a
`user's access point bandwidth allocation to other users.
`16. The method in claim 12, wherein additions to a user
`contribution account balance are weighted proportional to a
`user's access point bandwidth used by a second user.
`17. A method as in claim 1, wherein the access informa
`tion is provided using one or more of the following: a
`cellular network, a Wi-Fi network,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket