`(12) Patent Application Publication (10) Pub. No.: US 2007/0033197 A1
`Scherzer et al.
`(43) Pub. Date:
`Feb. 8, 2007
`
`US 20070033197A1
`
`(54) PROVIDING AND RECEIVING NETWORK
`ACCESS
`
`(75) Inventors: Shimon Scherzer, Los Gatos, CA (US);
`Tamir Scherzer, Herzelia (IL)
`Correspondence Address:
`VAN PELT, YI & JAMES LLP
`1OOSON FOOTHILL BILVD #2OO
`CUPERTINO, CA 95.014 (US)
`
`(73) Assignee: Contigo Mobility Inc.
`(21) Appl. No.:
`11/441,827
`
`(22) Filed:
`
`May 25, 2006
`
`
`
`Related U.S. Application Data
`(60) Provisional application No. 60/687,463, filed on Jun.
`3, 2005. Provisional application No. 60/728,918, filed
`on Oct. 21, 2005. Provisional application No. 60/772,
`084, filed on Feb. 9, 2006. Provisional application
`No. 60/776,444, filed on Feb. 23, 2006.
`
`Publication Classification
`
`(51) Int. Cl.
`(2006.01)
`G06F 7/30
`(52) U.S. Cl. ................................................................ T07/10
`(57)
`ABSTRACT
`Providing network access is disclosed. A request is received
`for access information. User contribution account accept
`ability is determined. Access information is provided.
`
`102
`
`108
`
`APPLE 1004
`
`1
`
`
`
`Patent Application Publication Feb. 8, 2007 Sheet 1 of 6
`
`US 2007/0033197 A1
`
`S1 116
`
`114
`
`
`
`
`
`102
`
`108
`
`
`
`112
`
`110
`
`FIG. 1
`
`2
`
`
`
`Patent Application Publication Feb. 8, 2007 Sheet 2 of 6
`
`US 2007/0033197 A1
`
`
`
`200
`
`2O2
`
`204
`
`Transmit Registration
`Information
`
`Receive Client Software
`
`Install Client Software
`
`FIG.2
`
`3
`
`
`
`Patent Application Publication Feb. 8, 2007 Sheet 3 of 6
`
`US 2007/0033197 A1
`
`
`
`300
`
`302
`
`304
`
`Receive Registration
`information
`
`Establish User Contribution
`ACCOUnt
`
`Transmit Client Software
`
`FIG. 3
`
`4
`
`
`
`Patent Application Publication Feb. 8, 2007 Sheet 4 of 6
`
`US 2007/0033197 A1
`
`400
`
`
`
`
`
`402
`
`404
`
`
`
`406
`
`
`
`
`
`408
`
`
`
`Determine Visible Access
`Points
`
`
`
`Determine ACCeSS Information
`with Respect to Visible Access
`PointS
`
`
`
`Select an Access Point to
`Attempt a Connection
`
`Attempt a Connection to the
`Selected ACCeSS Point
`
`Was Connection
`Attempt Successful ?
`
`FIG. 4
`
`5
`
`
`
`Patent Application Publication Feb. 8, 2007 Sheet 5 of 6
`
`US 2007/0033197 A1
`
`
`
`500
`
`502
`
`504
`
`506
`
`Transmit Request for Access
`Information
`
`Request User Contribution
`ACCount Acceptability
`
`Receive Access Information,
`lf Necessary
`
`Receive Connection Status
`information
`
`FIG. 5
`
`6
`
`
`
`Patent Application Publication Feb. 8, 2007 Sheet 6 of 6
`
`US 2007/0033197 A1
`
`
`
`600
`
`6O2
`
`604
`
`606
`
`Receive Request for Access
`Information
`
`Determine Contribution ACCount
`Acceptability
`
`Provide Access Information,
`lf Necessary
`
`Provide Connection Status
`Information
`
`F.G. 6
`
`7
`
`
`
`US 2007/0033197 A1
`
`Feb. 8, 2007
`
`PROVIDING AND RECEIVING NETWORK
`ACCESS
`
`CROSS REFERENCE TO OTHER
`APPLICATIONS
`0001. This application claims priority to U.S. Provisional
`Patent Application No. 60/687,463 entitled Collaborative
`Mobile Broad Band (CMBB) Service filed Jun. 3, 2005
`which is incorporated herein by reference for all purposes.
`0002 This application claims priority to U.S. Provisional
`Patent Application No. 60/728,918 entitled Wireless Broad
`band by Centrally Managed Peer to Peer Networking filed
`Oct. 21, 2005 which is incorporated herein by reference for
`all purposes.
`0003. This application claims priority to U.S. Provisional
`Patent Application No. 60/772,084 entitled Client Based
`Wireless Network for Collaborative Community filed Feb.
`9, 2006 which is incorporated herein by reference for all
`purposes.
`0004. This application claims priority to U.S. Provisional
`Patent Application No. 60/776.444 entitled Enhancing VoIP/
`WiFi Quality. Using “Packet Path Diversity & MultiNet
`filed Feb. 23, 2006 which is incorporated herein by reference
`for all purposes.
`
`BACKGROUND OF THE INVENTION
`0005 Wireless connectivity can provide the ability to
`communicate between a user's device and the Internet
`enabling access to the information and services that the
`Internet makes available. Because of the utility of the
`information and services available on the Internet, it is
`desirable to be able to wirelessly connect to the Internet from
`any location. However, to provide wireless coverage for
`many locations, as, for example, cell phone networks do,
`requires a large infrastructure that is expensive. And as
`bandwidth requirements for wireless connectivity increase,
`the cost for the wireless connectivity rises. It would be
`beneficial to be able to connect wirelessly to the Internet
`from any location without the cost of building a large
`infrastructure.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0006 Various embodiments of the invention are dis
`closed in the following detailed description and the accom
`panying drawings.
`0007 FIG. 1 is a block diagram illustrating an embodi
`ment of a system for providing network access.
`0008 FIG. 2 is a flow diagram illustrating an embodi
`ment of a process for providing network access.
`0009 FIG. 3 is a flow diagram illustrating an embodi
`ment of a process for providing network access.
`0010 FIG. 4 is a flow diagram illustrating an embodi
`ment of a process for providing network access.
`0011
`FIG. 5 is a flow diagram illustrating an embodi
`ment of a process for determining access information.
`0012 FIG. 6 is a flow diagram illustrating an embodi
`ment of a process for providing access information.
`
`DETAILED DESCRIPTION
`0013 The invention can be implemented in numerous
`ways, including as a process, an apparatus, a System, a
`composition of matter, a computer readable medium Such as
`a computer readable storage medium or a computer network
`wherein program instructions are sent over optical or elec
`tronic communication links. In this specification, these
`implementations, or any other form that the invention may
`take, may be referred to as techniques. A component such as
`a processor or a memory described as being configured to
`perform a task includes both a general component that is
`temporarily configured to perform the task at a given time or
`a specific component that is manufactured to perform the
`task. In general, the order of the steps of disclosed processes
`may be altered within the scope of the invention.
`0014) A detailed description of one or more embodiments
`of the invention is provided below along with accompanying
`figures that illustrate the principles of the invention. The
`invention is described in connection with such embodi
`ments, but the invention is not limited to any embodiment.
`The scope of the invention is limited only by the claims and
`the invention encompasses numerous alternatives, modifi
`cations and equivalents. Numerous specific details are set
`forth in the following description in order to provide a
`thorough understanding of the invention. These details are
`provided for the purpose of example and the invention may
`be practiced according to the claims without some or all of
`these specific details. For the purpose of clarity, technical
`material that is known in the technical fields related to the
`invention has not been described in detail so that the
`invention is not unnecessarily obscured.
`00.15
`Providing network access is disclosed. A request is
`received for access information. User contribution account
`acceptability is determined. Access information is provided.
`In some embodiments, a collaborative community of users
`allows a percentage of bandwidth of the user's access point
`to be accessed by one or more other users in order to be able
`to use other access points when in locations not within range
`of the user's own access point. In some embodiments, some
`access or limited access is provided to use other users
`access points without allowing use of an access point to
`other users. Access information comprises the information
`that can be used to access one or more of the following: the
`Internet, the world wide web, network services, wireless
`network services, broadband wireless network services,
`broadband wireless network services via Wi-FiR) access
`points, broadband wireless network services via a Social
`network, and broadband wireless network services via a
`social network that is enabled by a community of collabo
`rative users.
`0016.
`In some embodiments, a user contribution account
`is established when a user registers. In some embodiments,
`a temporary user contribution account is established—for
`example, for a trial period. When a user registers, the user
`provides registration information. In some cases registration
`information can be used to enable other users to access to the
`user's access point. In some embodiments, registration
`information is used to request access to the user's access
`point. In some embodiments, the user may choose to grant
`or deny access to his/her access point. In some embodi
`ments, a user is provided with the ability to monitor and
`control access allowed to the user's access point—for
`
`8
`
`
`
`US 2007/0033197 A1
`
`Feb. 8, 2007
`
`example, viewing the users connected to the access point,
`viewing the to and from traffic usage of the access point,
`controlling or permitting the traffic levels to and from the
`access point, terminating or denying access through the
`access point, etc. In various embodiments, user allows
`access to other users by designated acceptable groups that
`are allowed access, by indicating that an immediate “friend’
`on a list is allowed, by indicating that a “friend of a friend’
`on a list of a friend is allowed, or any other appropriate way
`of designating one or more users can use the user's access
`point. Registration information can include one or more of
`the following: the user's access point information to enable
`a second user to use the user's access point, the user's
`identifier information (e.g., media access control (MAC)
`address), the user's access point service set identifier
`(SSID), the user's access point wired equivalent privacy
`(WEP) key or password, and the user's access point Wi-Fi
`protected access (WPA) key or password.
`0017. In some embodiments, user contribution account
`ing tracks the balance of bandwidth provided by a user via
`the user's access point to other users and the bandwidth used
`by the user via other's access points. In some embodiments,
`user contribution account balance is added to when band
`width is used by a second user when accessing the user's
`access point and/or user contribution account balance is
`subtracted from when bandwidth is used by the user when
`accessing a third user's access point. In various embodi
`ments, additions to a user's user contribution account bal
`ance are weighted proportional to a user's access point
`bandwidth allocation to other users or additions to a user's
`user contribution account balance are weighted proportional
`to a user's access point bandwidth used by a second, or
`other, users.
`0018. In various embodiments, user contribution account
`acceptability comprises having agreed to a trial period and
`being associated with a temporary user contribution account,
`having registered and being associated with a temporary
`user contribution account, having a temporary user contri
`bution account, having a user contribution account, having
`a user contribution account balance, having a user contri
`bution account balance above a threshold value, having a
`user contribution account balance below a threshold value,
`having a user contribution account balance in a range a
`values, or any other appropriate criteria for acceptability.
`0019. In some embodiments, connection status informa
`tion is provided and/or received. Connection status infor
`mation can be used to select appropriate access point. Status
`information can include one or more of the following:
`visible network access points at a given location, number of
`users using each of the visible access points, signal strength
`for the visible network access points, average transfer rates
`to or from the visible network access points, bandwidth
`allocation for the visible network access points, retry statis
`tics for visible network access points, the user's access point
`bandwidth allocation for other users, and mean and/or
`variance of the returnping delays (e.g., the time it takes for
`a return message from the provider's server or any other
`computer dedicated to this function, to arrive after a message
`was sent to it from the user device or from an access point)
`for visible network access points. In some embodiments, the
`appropriate access point comprises an access point that has
`better performance (e.g., higher bandwidth from the net
`work, shorter response delays, lower variance of signal
`
`strength/bandwidth, etc.). In various embodiments, user
`determines one or more types of connection status informa
`tion, user transmits one or more types of connection status
`information to a provider server or other users, and/or user
`receives one or more types of connection stats information
`from a provider server or other users.
`0020 FIG. 1 is a block diagram illustrating an embodi
`ment of a system for providing network access. In the
`example shown, wireless access points, represented in FIG.
`1 by 100 and 102, enable access to Internet 114. In various
`embodiments, access to Internet 114 is via an internet
`service provider (e.g., a local phone carrier using a dial-up
`modem or digital subscriber line (DSL), a cable provider
`using a cable modem, a satellite company using a modem
`that can communicate via a satellite, etc.), via a local area
`network, a wide area network, a wired network, a wireless
`network, an optical network, or any other appropriate net
`work enabling communication with Internet 114. A user,
`represented in FIG. 1 as laptop device 104,106, and 108, or
`personal digital assistant (PDA) 110 and 112, allows access
`to the user's access point in exchange for being allowed to
`access other user's access points. In some embodiments, a
`user is allowed minimal or limited access without allowing
`other users to access the user's access point. This can enable
`a user to be able to access the Internet, its services and
`information, from a large number of locations. A user
`registers with the provider of network access by communi
`cating with provider application server 116. Application
`server 116 receives and stores registration information.
`Registration information enables another user to request
`access to or access the user's access point. Application
`server 116 provides the user with a software client. In some
`embodiments, the user is provided a software client without
`being connected directly or indirectly to application server
`116 (e.g., the Software is sent via the mail on a piece of
`storage media or the software is downloaded from a third
`party web site). The software client enables the user to
`access another user's access point either directly or by
`relaying information through another registered user's
`device. Access point information (e.g., SSID's, WEP/WPA
`keys or passwords, etc.) can be provided to a user via a wired
`network by preloading the user's device, a cell phone
`network, a Wi-Fi network, or any other appropriate network.
`In some embodiments, access information is provided to a
`user not in real time—for example, the user down loads
`access information form server while connected to his own
`access point before going to a new location where user
`desires to user other user's access points.
`0021
`FIG. 2 is a flow diagram illustrating an embodi
`ment of a process for providing network access. In some
`embodiments, the process of FIG. 2 is caused to be executed
`by user on a user's device—for example, users represented
`in FIG. 1 by 104, 106, 108, 110, or 112. In the example
`shown, in 200 registration information is transmitted. Reg
`istration information can include one or more of the follow
`ing: the user's access point information to enable a second
`user to use the user's access point, the user's identifier
`information (e.g., media access control (MAC) address), the
`user's access point service set identifier (SSID), the user's
`access point wired equivalent privacy (WEP) key or pass
`word, the user's access point Wi-Fi protected access (WPA)
`key or password, and the user's access point bandwidth
`allocation for a second user. The registration information is
`used by the provider of the network to set up a user
`
`9
`
`
`
`US 2007/0033197 Al
`
`Feb. 8, 2007
`
`contribution account and to enable other registered users of
`the network to access the user’s access point. In 202, client
`software is received. The client software is provided by the
`provider to enable the user’s device to be able to contact the
`provider application server and to acquire access informa-
`tion for network access points that are made available by a
`given user to other network users. In 204, client software is
`installed.
`In various embodiments, client
`software is
`installed before registration or client software is installed
`after registration. In some embodiments, the client software
`enables the user to contact the provider’s application server
`in order to obtain access information for a location where the
`user is not able to use the user’s own access point. Access
`information enables the user to use another user’s access
`
`point in order to gain access to the Internet.
`
`[0022] FIG. 3 is a flow diagram illustrating an embodi-
`ment of a process for providing network access. In some
`embodiments, the process of FIG. 3 is caused to be executed
`by provider application server 116 of FIG.1. In the example
`shown, in 300 registration information is received. In some
`embodiments, registration information is received via a web
`application—for example, a user’s browser communicating
`with the provider’s web site or a web applet communicating
`via the Internet. Registration information can include one or
`moreof the following: the user’s access point information to
`enable a seconduserto use the user’s access point, the user’s
`identifier information (e.g., media access control (MAC)
`address),
`the user’s access point service set
`identifier
`(SSID), the user’s access point wired equivalent privacy
`(WEP) key or password,
`the user’s access point Wi-Fi
`protected access (WPA) key or password, and the user’s
`access point bandwidth allocation for other users. The
`registration information is used by the provider of the
`network to set up a user contribution account and, if appro-
`priate, to enable other registered users of the network to
`access the user’s access point. In 302, user contribution
`accountis established. The user contribution account com-
`
`prises a way to track the amountof access that is given by
`a user to other users of the network. Similarly, the user
`contribution account comprises a wayto track the amount of
`access that is used by a userof other users’ access points. In
`some embodiments, user contribution accounting tracks the
`balance of bandwidth provided by a user via the user’s
`access point to other users and the bandwidth used by the
`user via other’s access points. In some embodiments, user
`contribution account balance is added to when bandwidth is
`
`used by a other users when accessing the user’s access point
`and/or user contribution account balance is subtracted from
`when bandwidth is used by the user when accessing another
`user’s access point. In some embodiments, the user accesses
`a plurality of access points because an access point becomes
`unavailable—for example, the user has changed locations
`(e.g., roaming) or the access point that the user was con-
`nected to is no longer available or is no longer desirable
`(e.g., over loaded). In various embodiments, user contirbu-
`tion account acceptability comprises having a user contri-
`bution account, having a user contribution account balance,
`having a user contribution account balance abovea thresh-
`old value, having a user contribution account balance below
`a threshold value, having a user contribution account bal-
`ance in a range a values. In various embodiments, additions
`to a user contribution account balance are weighted in
`proportion to a user’s access point bandwidth allocation to
`other users or a user’s access bandwidth used by another
`
`user. In some embodiments, the registration information is
`accepted after being received. In some embodiments, deter-
`mining user contribution account acceptability includes
`checking user contribution account registration information
`for a user. In 304, client software is transmitted. The client
`software, once installed in the client device, enables the user
`to contact the provider’s application server in order to obtain
`access information for a location where the user is not able
`to use the user’s own access point. Access information
`enables the user to use another user’s access point in order
`to gain access to the Internet.
`[0023]
`FIG. 4 is a flow diagram illustrating an embodi-
`ment of a process for providing network access. In some
`embodiments, the process of FIG. 4 is caused to be executed
`by user on a user’s device—for example, users represented
`in FIG. 1 by 104, 106, 108, 110, or 112. In some embodi-
`ments, the process of FIG. 4 is executed as a part of client
`software that is provided by the network provider. In the
`example shown,in 400 visible access points are determined.
`The user’s device identifies the visible wireless access
`
`points. In 402, access information with respect to the visible
`access points is determined. Access information can be
`determined by looking access information up in a preloaded
`table or file located on the user’s device, or downloaded or
`accessed via a cellular connection, a text messaging system,
`a Wi-Fi network, an open wireless access system, a wired or
`phonesystem, or any other appropriate manner of obtaining
`access information. In 404, an access point is selected with
`which to attempt a connection. Access point selection is
`based on the most appropriate access point for a user’s
`device, where most appropriate comprises appropriate per-
`formance (e.g., most reliable, highest average bandwidth,
`lowest variance in signal strength, highest average signal
`strength, shortest response delays, best average transfer
`rates, most bandwidth allocated for outside users, fewest
`retries, and lowest return ping delays, etc.).
`In 406, a
`connection is attempted to the selected access point. In some
`embodiments, the connection is attempted to more than one
`access point simultaneously, where the multiple connections
`are used concurrently to
`increase performance—for
`example, reliability and/or throughput. Access information
`is used to attempt a connection to the access point and
`communication via the access point
`is attempted to the
`Internet. In 408, it is determined if the connection attempt
`was successful.
`In the event
`that
`the attempt was not
`successful, control is passed to 404. In the event that the
`attempt was successful, the process ends.
`[0024]
`FIG. 5 is a flow diagram illustrating an embodi-
`ment of a process for determining access information. In
`some embodiments, the process of FIG. 5 implements 402 in
`FIG. 4. In some embodiments, the process of FIG. 4 is
`executed as a part of client software that is provided by the
`network provider (e.g., downloaded directly from the pro-
`vider, from a third party, or as received on a removable piece
`of storage media such as a CD or DVD). In the example
`shown, in 500 a request is transmitted for access informa-
`tion. Access information is requested regarding one or more
`access points. In some embodiments, access information is
`requested before arriving at a given location—preloading
`access information for a given location. In 502, user con-
`tribution account acceptability is
`requested.
`In some
`embodiments, user
`contribution account
`acceptability
`request comprises a request for access information. In 504,
`access information is received, if necessary. Access infor-
`10
`
`10
`
`
`
`US 2007/0033197 A1
`
`Feb. 8, 2007
`
`mation can include SSID's, WEP or WPA passwords or keys
`or any other appropriate information for accessing access
`points. In some embodiments, access information is received
`before arriving at a given location (e.g., preloading access
`information for a given location). In some embodiments, a
`default set of network access information is preloaded. In
`Some embodiments, one or more elements of the access
`information are calculated from other access information—
`for example, a password or key is calculated from an SSID,
`MAC address, user name, etc. In 506, connection status
`information is received. Connection status information can
`include access point type, backhaul band width (e.g., actual
`bandwidth available to the local access point from the
`Internet), number of users using visible access points, traffic
`each user consumes and/or generates, network congestion,
`usage priority, average signal strength and variance of signal
`strengths to and from the access point, average and variance
`statistics for ping delays, response times, retry statistics, etc.
`Connection status information can be used to determine the
`most appropriate access point to choose when attempting to
`communicate with the network. In some embodiments, each
`user may report his/her connection experience with a spe
`cific access point (e.g., connection status information Such
`as average and/or variance of data rate, retry statistics,
`connection failures, etc.) and the connection status informa
`tion becomes a part of the connection status information
`available to all users connecting the access point. In some
`embodiments, access is caused to be granted to the user. In
`Some embodiments, access is caused to be granted by
`providing access information to a user.
`0.025
`FIG. 6 is a flow diagram illustrating an embodi
`ment of a process for providing access information. In some
`embodiments, the process of FIG. 6 is executed on appli
`cation server 116 of FIG. 1. In the example shown, in 600
`a request is received for access information. Access infor
`mation is requested regarding one or more access points. In
`Some embodiments, access information is requested before
`arriving at a given location preloading access information
`for a given location. In 602, user contribution account
`acceptability is determined. In various embodiments, user
`contribution account acceptability comprises having a user
`contribution account (temporary account or permanate
`account), having a user contribution account balance, having
`a user contribution account balance above a threshold value,
`having a user contribution account balance below a thresh
`old value, having a user contribution account balance in a
`range a values, and/or any other appropriate acceptability
`criteria. In various embodiments, additions to a user contri
`bution account balance are weighted proportion to a user's
`access point bandwidth allocation to other users or a user's
`access bandwidth used by another user. In some embodi
`ments, the registration information is accepted after being
`received. In some embodiments, determining user contribu
`tion account acceptability includes checking user contribu
`tion account registration information for a user. In 604,
`access information is provided, if necessary. Access infor
`mation can include SSID's, WEP or WPA passwords or keys
`or any other appropriate information for accessing access
`points. In some embodiments, access information is received
`before arriving at a given location (e.g., preloading access
`information for a given location). In some embodiments, a
`default set of network access information is preloaded. In
`606, connection status information is provided. Connection
`status information can include access point type, backhaul
`band width (e.g., actual bandwidth available to the local
`access point from the Internet), number of users using
`
`visible access points, average signal strength and variance of
`signal strengths to and from the access point, ping delay
`statistics, response times, retry statistics, the user's access
`point bandwidth allocation for other users, etc. Connection
`status information can be used to determine the most appro
`priate access point to choose when attempting to commu
`nicate with the network. In some embodiments, connection
`status information is received from a plurality of users or
`clients, aggregated for a given access point, and provided to
`a user so that the user can best determine which access point
`tO COnnect to.
`0026. Although the foregoing embodiments have been
`described in some detail for purposes of clarity of under
`standing, the invention is not limited to the details provided.
`There are many alternative ways of implementing the inven
`tion. The disclosed embodiments are illustrative and not
`restrictive.
`
`What is claimed is:
`1. A method of providing network access comprising:
`receiving a request for access information;
`determining user contribution account acceptability; and
`providing access information.
`2. The method in claim 1, wherein the request for access
`information is requested using one or more of the following:
`a software client and a web application.
`3. The method in claim 2, wherein the software client
`enables one or more of the following: a user to monitor use
`of an access point, a user to control access to an access point,
`a user to permit use of an access point, a user to view other
`users connected to an access point, a user to view levels of
`traffic to or from an access point, and a user to deny use of
`an access point.
`4. The method in claim 1, further comprising causing
`access to be granted.
`5. A method as in claim 1, wherein access information can
`be used to access one or more of the following: the Internet,
`the world wide web, network services, wireless network
`services, broadband wireless network services, broadband
`wireless network services via Wi-Fi access points, broad
`band wireless network services via a social network, and
`broadband wireless network services via a social network
`that is enabled by a community of collaborative users.
`6. The method in claim 1, wherein a first element of access
`information is calculated from a second element of access
`information.
`7. The method in claim 1, further comprising receiving
`user registration information.
`8. A method as in claim 7, wherein registration informa
`tion includes one or more of the following: the user's access
`point information to enable a second user to use the user's
`access point, the user's identifier information, the user's
`access point SSID, the user's access point WEP key, the
`user's access point WPA key, and the user's access point
`bandwidth allocation for a second user.
`9. The method in claim 1, further comprising accepting
`user registration information.
`10. A method as in claim 1, wherein determining user
`contribution account acceptability includes checking user
`contribution account registration information for a user.
`11. The method in claim 1, wherein user contribution
`account acceptability comprises one or more of the follow
`ing: having agreed to a trial period and being associated with
`
`11
`
`
`
`US 2007/0033197 A1
`
`Feb. 8, 2007
`
`a temporary user contribution account, having registered and
`being associated with a temporary user contribution account,
`having a temporary user contribution account, having a user
`contribution account, having a user contribution account
`balance, having a user contribution account balance above a
`threshold value, having a user contribution account balance
`below a threshold value, and having a user contribution
`account balance in a range a values.
`12. A method as in claim 1, wherein Verifying user
`contribution account acceptability includes verifying that
`the user has an acceptable user contribution account balance.
`13. A method as in claim 12, wherein user contribution
`account balance is added to when bandwidth is used by a
`second user when accessing the user's access point.
`14. A method as in claim 12, wherein user contribution
`account balance is subtracted from when bandwidth is used
`by the user when accessing a third user's access point.
`15. The method in claim 12, wherein additions to a user
`contribution account balance are weighted proportional to a
`user's access point bandwidth allocation to other users.
`16. The method in claim 12, wherein additions to a user
`contribution account balance are weighted proportional to a
`user's access point bandwidth used by a second user.
`17. A method as in claim 1, wherein the access informa
`tion is provided using one or more of the following: a
`cellular network, a Wi-Fi network,