throbber
USOO8687536B2
`
`(12) United States Patent
`Michaelis
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,687,536 B2
`Apr. 1, 2014
`
`(54) METHOD AND APPARATUS TO CREATE
`MULTICAST GROUPS BASED ON
`PROXIMITY
`
`(75) Inventor: Oliver Michaelis, San Diego, CA (US)
`
`(73) Assignee: QUALCOMM Incorporated, San
`Diego, CA (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 848 days.
`
`(21) Appl. No.: 12/035,358
`
`(22) Filed:
`
`Feb. 21, 2008
`
`65
`(65)
`
`Prior Publication Data
`US 2008/0219227A1
`Sep. 11, 2008
`
`Related U.S. Application Data
`(60) Provisional application No. 60/891,231, filed on Feb.
`23, 2007.
`
`(51) Int. Cl.
`(2008.01)
`H04H2O/7
`(2006.01)
`H04L 2/28
`(52) U.S. Cl
`USPC ............................ 370,312.370/300: 370432
`(58) Field of Classification Search
`None
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`1/2006 Magret et al.
`6,988,146 B1
`3f2005 Oommen ...................... 370/432
`2005/0063409 A1
`2005, 0138369 A1* 6/2005 Lebovitz et al. .............. T13,163
`2006/0029078 A1
`2/2006 Lu et al. ..................... 370,395.2
`
`2/2006 Moon et al. ................... 370,328
`2006/0034215 A1
`4/2006 Dorenbosch et al.
`2006/0072532 A1 ck
`1/2007 Otranen ..................... 340,572.1
`2007/0001853 A1
`2009/0313689 A1* 12/2009 Nystrom et al. .................. 726/9
`FOREIGN PATENT DOCUMENTS
`
`2, 2006
`2006054616 A
`JP
`7, 2008
`2008524906. A
`JP
`6, 2006
`WO WO2006.064480 A1
`OTHER PUBLICATIONS
`International Search Report—PCT/US08/054783—International
`Search Authority—European Patent Office—Jun. 24, 2008.
`Search
`Written
`Opinion PCT/US08/054783 International
`Authority—European Patent Office, Munich—Jun. 24, 2008.
`* cited by examiner
`Primary Examiner — Yemane Mesfin
`y
`Assistant Examiner — Christine Duong
`(74) Attorney, Agent, or Firm — James T. Hagler
`
`ABSTRACT
`(57)
`Devices and methods use close range communication links,
`such as near field communication (NFC) protocol links, to
`enable users to authenticate mobile devices to one another to
`create or expand secure multicast groups. Once the two or
`more devices establish a close range communication peer-to
`peer link the devices exchange multicast group communica
`to data sufficient to permit the devices to receive or send
`multicast messages. Long range wireless or wired network
`communication links are then used for multicast message
`communications. ProXimity limits of the close range commu
`nication P2P link enables mutual trust to be presumed among
`devices, reducing the need for security and authentication
`signaling. The limited range of close range communication
`P2Plinks renders multicast groups established in this manner
`less Vulnerable to eavesdropping and intrusion. Embodiments
`enable users to initiate secure multicast group participation
`merely by bringing two or more devices into close proximity.
`
`40 Claims, 8 Drawing Sheets
`
`
`
`55
`- initiate multicast -
`request
`create a multicast group
`
`50
`ed
`
`request
`multigest
`advertiserhart
`
`send multicast
`advertisement
`
`70
`
`80
`
`8808
`capabilities
`
`
`
`relay
`capabilities
`
`addevice to
`multicast
`group
`
`90
`
`S. Multicast group includes multicast server, initial device, and requesting
`dewlce
`
`Ex.1013
`APPLE INC. / Page 1 of 20
`
`

`

`U.S. Patent
`
`Apr. 1, 2014
`
`Sheet 1 of 8
`
`US 8,687,536 B2
`
`
`
`FIG. 1
`
`Ex.1013
`APPLE INC. / Page 2 of 20
`
`

`

`U.S. Patent
`
`Apr. 1, 2014
`
`Sheet 2 of 8
`
`US 8,687,536 B2
`
`
`
`NFC Handshake
`
`Multicast Request
`
`MultiCast Advertisement
`
`Signaling Data
`
`Multicast Group Established
`
`Signaling Data
`
`MultiCast
`
`FIG. 2
`
`Ex.1013
`APPLE INC. / Page 3 of 20
`
`

`

`U.S. Patent
`
`Apr. 1, 2014
`
`Sheet 3 of 8
`
`US 8,687,536 B2
`
`
`
`initiate multiCast
`
`Create a multicast group
`
`multiCast
`advertisement
`
`Send multiCast
`advertisement
`
`anOUCe
`Capabilities
`
`relay
`Capabilities
`
`add device to
`multicast
`group
`
`Multicast group includes multicast server, initial device, and requesting
`device
`
`FIG. 3
`
`Ex.1013
`APPLE INC. / Page 4 of 20
`
`

`

`U.S. Patent
`
`Apr. 1, 2014
`
`Sheet 4 of 8
`
`US 8,687,536 B2
`
`
`
`NFC Handshake
`
`34
`
`Multicast Group Advertisement
`
`Signaling Data
`
`MultiCast
`
`NFC Handshake
`
`Multicast Request
`
`MultiCast Advertisement
`
`Signaling Data
`
`Signaling Data
`
`43
`
`MultiCast
`
`FIG. 4
`
`Ex.1013
`APPLE INC. / Page 5 of 20
`
`

`

`U.S. Patent
`
`Apr. 1, 2014
`
`Sheet 5 of 8
`
`US 8,687,536 B2
`
`
`
`Bring devices in
`close proximity
`
`establish NFC Connection
`
`create a multicast group
`
`Send multiCast
`advertisement
`
`request
`multiCast
`advertisement
`
`Add device to
`multiCast
`grOup
`
`relay
`capabilities
`
`aOUCS
`capabilities
`
`Multicast group Communications among the three devices
`
`FIG. 5
`
`Ex.1013
`APPLE INC. / Page 6 of 20
`
`

`

`U.S. Patent
`
`Apr. 1, 2014
`
`Sheet 6 of 8
`
`US 8,687,536 B2
`
`
`
`Group Exit Announcement
`
`NFC Handshake
`
`Group Exit Confirmation
`
`MultiCast
`
`Group Exit Confirmation
`
`MultiCast
`
`FIG. 6
`
`Ex.1013
`APPLE INC. / Page 7 of 20
`
`

`

`U.S. Patent
`
`Apr. 1, 2014
`
`Sheet 7 of 8
`
`US 8,687,536 B2
`
`<capabilities.>
`
`- - - - - - - - - - - - - - - - - 110
`<protocola
`
`<identifier21 92.168.0.1 </identifier2
`</protocold
`- - - - - - - - - - - - - - - - - -
`
`115
`-
`
`<protocola
`<name>EVDO</name>
`<identifier2555-555-1212</identifierd
`</protocold
`- - - - - - - - - - - - - - - - - -
`
`|
`
`</capabilities.>
`
`FIG. 7
`
`Ex.1013
`APPLE INC. / Page 8 of 20
`
`

`

`U.S. Patent
`
`Apr. 1, 2014
`
`Sheet 8 of 8
`
`US 8,687,536 B2
`
`
`
`170
`
`174
`
`FIG. 8
`
`Ex.1013
`APPLE INC. / Page 9 of 20
`
`

`

`1.
`METHOD AND APPARATUS TO CREATE
`MULTICAST GROUPS BASED ON
`PROXMITY
`
`RELATED APPLICATIONS
`
`The present application claims the benefit of priority to
`U.S. Provisional Patent Application No. 60/891,231 filed
`Feb. 23, 2008 entitled “Method and Apparatus to Create
`Multi-Cast Groups Based on Proximity, the entire contents
`of which are hereby incorporated by reference.
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to computer net
`work communications, and more specifically to creating mul
`ticast groups based on proximity.
`
`10
`
`15
`
`BACKGROUND
`
`US 8,687,536 B2
`
`2
`the general description given above and the detailed descrip
`tion given below, serve to explain the features of the inven
`tion.
`FIG. 1 is a block diagram of wireless cellular network
`which includes short-range wireless communication imple
`mented on a number of mobile devices.
`FIG. 2 is a message flow diagram of an embodiment for
`joining a device to a multicast group.
`FIG.3 is a process flow diagram of an embodiment method
`Suitable for joining a device to a multicast group.
`FIG. 4 is a message flow diagram of an embodiment for
`establishing a multicast group.
`FIG.5 is a process flow diagram of an embodiment method
`Suitable for establishing a multicast group.
`FIG. 6 is a diagram of a data structure suitable for use with
`the various embodiments.
`FIG. 7 is a message flow diagram of an embodiment for
`removing a device from an established multicast group.
`FIG. 8 is a circuit block diagram of an example mobile
`device suitable for use with the various embodiments.
`
`As mobile devices and consumer electronic devices target
`converging markets there is increasing interest in multicast
`communication technologies. In multicast groups, multiple
`participants are linked together into an inter-networkin which
`the participants send and receive communications to and from
`one another. Such networks have a variety of useful applica
`tions, from business collaboration to interactive gaming.
`Multicast groups are not without their hazards, however, as
`members have communication access to all members of the
`group. Allowing an intruder into a multicast group could
`leave members vulnerable to electronic attack and eavesdrop
`ping. Accordingly, most multicast groups employ some form
`of security or authentication protocols to limit group access.
`Such mechanisms may work well in established and stable
`groups. However, ad hoc multicast groups and groups that
`frequently add and delete members may become burdened by
`Such security or authentication protocols.
`
`SUMMARY
`
`In the various embodiments a wireless proximity-limited
`communication technology is used to establish an initial link
`between mobile devices to recognize one another and estab
`lish a multicast group. A variety of wireless proximity-limited
`communication technologies may be used for mobile devices
`(e.g., cellphones, PDAs, and other wireless devices) to estab
`lish a peer-to-peer (P2P) data link. After the P2P link has been
`configured with wireless proximity-limited communication,
`another wireless communication technology, Such as Blue
`tooth R or Wi-Fi, can be used for longer-range communica
`tion or for transferring larger amounts of data. The longer
`range communication technology can then be used as the
`medium for establishing a multicast group. Since wireless
`proximity-limited communication technologies are limited to
`short ranges, this self establishing wireless communication
`link provides an intuitive mechanism for users to authenticate
`mobile devices to a multicast group and to initiate multicast
`group participation merely by bringing two or more mobile
`devices into close proximity.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`The accompanying drawings, which are incorporated
`herein and constitute part of this specification, illustrate
`exemplary embodiments of the invention, and together with
`
`65
`
`DETAILED DESCRIPTION
`
`The various embodiments will be described in detail with
`reference to the accompanying drawings. Wherever possible,
`the same reference numbers will be used throughout the
`drawings to refer to the same or like parts. References made to
`particular examples and implementations are for illustrative
`purposes, and are not intended to limit the scope of the inven
`tion or the claims.
`As used herein, the terms “mobile handset,” “handset.”
`“mobile device” and “handheld device” refer to any one or all
`of cellular telephones, personal data assistants (PDAs),
`palm-top computers, wireless electronic mail receivers and
`cellular telephone receivers (e.g., the Blackberry(R) and Treo(R)
`devices), multimedia Internet enabled cellular telephones
`(e.g., the iPhone(R), and similar personal electronic devices
`which include a programmable processor and memory and
`the capability to connect to a wireless network. While the
`various embodiments refer to cellular telephone network sys
`tems including cell towers of Such networks, the scope of the
`present invention and the claims encompass any wireless
`communication system including disperse communication
`cells centered on base stations which include an identifier,
`including for example, WiFi, WiMax, and other wireless data
`network communication technologies.
`The various embodiments make use of wireless proximity
`limited communication technologies to impose the need to
`bring two electronic devices to exchange information neces
`sary to establish a multicast group. A variety of wireless
`proximity-limited communication technologies may be used
`for this purpose. For example, close range communication
`link technologies, such as near field communications (NFC)
`protocol technologies, may be used. NFC protocol technol
`ogy devices operate in the unregulated RF band of 13.56MHz
`and fully comply with existing contactless Smart-card tech
`nologies, standards, and protocols such as FeliCa and Milfare.
`NFC protocol-enabled devices are interoperable with con
`tactless Smart-cards and Smart-card readers conforming to
`these protocols. The effective NFC protocol range is approxi
`mately 0-20 cm (up to 8 in.) and data communications termi
`nates either by a command from an application using the link
`or when the communicating devices move out of range.
`Evolving from a combination of contactless, identification
`and networking technologies, NFC protocol is a short-range
`wireless connectivity standard. A number of international
`standards have been established for NFC protocols, including
`
`Ex.1013
`APPLE INC. / Page 10 of 20
`
`

`

`US 8,687,536 B2
`
`10
`
`15
`
`30
`
`35
`
`40
`
`3
`for example: ISO/IEC 14443; ISO/IEC 15693; ISO/IEC
`18092; ISO/IEC 21481; ISO/IEC 22536; ISO/IEC 23917;
`ISO/IEC DIS 28361; ECMA-340, referred to asNFCIP-1:
`ECMA-352, referred to as NFCIP-2: ECMA-356: ECMA
`362; ECMA-373: ECMA/TC32-TG19/2006/057; NFC-WI;
`and NFC-FEC.
`However, the embodiments and the claims are not limited
`to any one orall of the NFC protocols, and instead encompass
`any short range (i.e., proximity-limited) wireless communi
`cation link. Any wireless proximity-limited communication
`technology may be used. In addition to the NFC protocols
`listed above, wireless proximity-limited communication
`links may be established using other short range communi
`cation media, including for example radiofrequency identifi
`cation (RFID) tags and the IrDA (Infrared Data Association)
`protocol. Also, other short range wireless protocols and stan
`dards may be developed and may be used in the various
`embodiments in the same manner as NFC protocol devices.
`Further, longer range wireless technologies and protocols
`may be used with modifications or additions that limit their
`effective range for purposes of identifying electronic devices
`one to another. For example, WiFi, Bluetooth R (which com
`municates using the 2.4 GHz frequency band), UWB (Ultra
`Wideband), IEEE 802.15.4, and Zigbee R wireless commu
`nication protocols and standards may also be used in combi
`25
`nation with range-limiting features. For example, the power
`of transmitters may be limited for authentication communi
`cations, such that two devices must be relatively close
`together (e.g., within a few feet of each other) in order to send
`and receive the communications. As another example, round
`trip communication delay limits may be imposed Such that
`authentication communications can only occur if the round
`trip of such signals is less than a threshold set to reject signals
`sent from more than a dozen feet or so, which may be a short
`as two to three feet separation.
`For simplicity of reference, the various embodiments and
`the claims refer to "close range communications' and “near
`field communications in order to encompass any and all
`wireless proximity-limited communication technologies.
`References herein to "close range communication links'
`(CRCL) and “near field communications” are not intended to
`limit the scope of the description or the claims in any way
`other than the communications technology will not exchange
`credential information beyond about three meters (about
`twelve feet). In a preferred embodiment, the communication
`range is limited to less than about one meter (about three feet),
`in a further preferred embodiment, the communication range
`is limited to less than about one foot, and in some embodi
`ments the communication range is limited to approximately
`0-20 cm (up to 8 in.). In order to reflect this distinction,
`descriptions of embodiments using links with communica
`tion ranges of approximately 0-20 cm (up to 8 in.) are refer to
`“NFC protocol” links. Therefore, references to “near field
`communication protocol and “NFC protocol communica
`tions are intended to be limited to communications transceiv
`ers and technologies with ranges provided by the various
`NFC protocols and standards listed above, but may also
`include RFID transceivers and technologies with a similarly
`limited communication range.
`With the increased adoption of radio frequency identifica
`tion (RFID) contactless Smart-cards to Support abroad range
`of applications, such as access, payment, and ticketing, and
`the commercial availability of NFC-enabled devices such as
`cell phones, the convergence of NFC with RFID is gaining
`interest.
`65
`With close range communications technologies, like NFC
`protocol devices, it is possible to connect any two devices to
`
`55
`
`45
`
`50
`
`60
`
`4
`each other to exchange information or access content and
`services-easily and securely. Solution vendors argue that the
`intuitive operation of NFC protocol systems makes the tech
`nology particularly easy for consumers to use (just touch and
`go'), while the inherent security resulting from its very short
`communication range makes such systems ideal for mobile
`payment and financial transaction applications. Familiar
`applications of NFC protocol technology are electronic pass
`keys used in building security systems, mass transit fare card
`systems, and Smart credit cards which need only to be brought
`close to a point of sale reader to complete a transaction.
`As mobile devices and consumer electronic devices are
`targeting converging telecommunication markets and multi
`cast group systems become more prevalent, the need mecha
`nisms for establishing secure multicast groups in a user
`friendly manner is becoming increasingly important. This
`includes simple multicast groups of devices sharing a com
`mon physical link and devices on disparate links.
`Wireless proximity-limited communications technologies
`are limited to Such short ranges that users must touch or nearly
`touch two devices together to establish the communication
`link. This physical action thus provides an intuitive mecha
`nism for establishing a peer-to-peer (P2P) wireless commu
`nication link; if users want two devices to communicate, they
`merely touch them together. In the various embodiments, this
`touch-to-communicate mechanism is leveraged to provide an
`intuitive means for users to authenticate mobile devices to one
`another to create a multicast group or to join an established
`multicast group. Once the two (or more) mobile devices
`establish a close range communication P2P link, long range
`wireless or wired network communications can be estab
`lished, such as by using the close range communication link
`to negotiate network protocol parameters. Multicast group
`credentials and encryption keys may also be exchanged via
`the close range communication P2P link. Since very close
`physical proximity is required to establish and maintain the
`close range communication P2P link, mutual trust can be
`presumed by the respective mobile devices. This obviates the
`need for involved security and authentication protocols to
`form or add members to a multicast group. The limited range
`of close range communication P2P links (e.g., NFC protocol
`P2P links) makes them generally invulnerable to eavesdrop
`ping and avoids issues of unwanted devices attempting to join
`multicast groups via long range wireless links. Thus, the
`various embodiments enable users to initiate secure multicast
`group participation merely by bringing two or more mobile
`devices into close proximity.
`The various embodiments may be employed in a variety of
`wired and wireless networks, including for example a wire
`less network employing cellular data communication links.
`By way of example, FIG. 1 shows a block diagram of a
`multicast group communication network 10 including a cel
`lular network in which some mobile cellular devices have the
`additional ability to function as readers of short-range wire
`less communications, such as NFC protocol and Radio Fre
`quency Identification (RFID) communications. The network
`10 may include a terminal 12 (typically the network will
`include a plurality of terminals, although for the sake of
`clarity only one terminal is shown), which is configured with
`a network antenna and transceiver fortransmitting and receiv
`ing cellular signals 2 from/to a cellular base site or base
`station (BS) 16. In this example network 10, the base station
`16 is a part of a cellular network that includes elements
`required to operate the network, Such as a mobile Switching
`center (MSC) 18. In operation, the MSC 18 is capable of
`routing calls and messages to and from the terminal 12 via the
`base station 16 when the terminal 12 is making and receiving
`
`Ex.1013
`APPLE INC. / Page 11 of 20
`
`

`

`US 8,687,536 B2
`
`10
`
`15
`
`25
`
`30
`
`35
`
`5
`calls. The MSC 18 also provides a connection to telephone
`landline trunks (not shown) when the terminal 12 is involved
`in a call. Further, the MSC can, but need not, be coupled to a
`server gateway 22 coupled to the Internet 24.
`The MSC 18 can also be coupled to a network 19 by a wired
`network connection 1. Such as a local area network (LAN), a
`metropolitan area network (MAN), and/or a wide area net
`work (WAN). The MSC 18 can be coupled to the network 19
`directly by a wired network connection 1, or if the system
`includes a gateway 22 (as shown), the MSC can be coupled to
`the network 19 via the gateway 22 which has a wired network
`connection 1 to the network 19. In a typical embodiment, the
`MSC 18 is coupled to the gateway 22, and the gateway 22 is
`coupled to the Internet 24. In turn, electronic devices such as
`a laptop computer 30 (as shown) or any other processing
`elements (e.g., personal computers, server computers or the
`like) can be coupled to the terminal 10 via the Internet 24 by
`way of their own Internet connection 9. In a further embodi
`ment, one or more processing elements associated with an
`origin server 26 may be coupled to this network 10 by way of
`the Internet 24.
`In addition to cellular network communications 2, the ter
`minal 12 may be equipped to communicate with other
`devices, such as mobile devices 28, 29, 30 via a local wireless
`network 3 and a close-range communication link 4. For
`example, in the FIG. 1 embodiment, the terminal 12 is con
`figured to communicate with a first mobile device 28, a sec
`ond mobile device 29 and a laptop computer 30, each
`equipped with an internal close-range communications trans
`ceiver (e.g., for example an NFCIP-2 transceiver). The termi
`nal 12 is also configured to communicate with these devices
`28, 29, 30 via another wireless communication link, such as a
`local area wireless link 3. For example, the terminal 12 may
`include an NFCIP-2 NFC transceiver and an IEEE 802.11g
`wireless data network transceiver. Similarly, the mobile
`devices 28, 29 and the laptop computer 30 may be configured
`with compatible NFC and local area (or wide area) wireless
`transceivers.
`The close range communication transceivers in the termi
`40
`nal 12 and the other network devices 28, 29.30 may be any of
`a number of different known transceivers (including for
`example RFID tags) capable of transmitting and/or receiving
`data in accordance with any of a number of different close
`range communications techniques, such as defined in the
`international standards listed above. For example, the close
`range communication transceiver may be a NFCIP-1 or
`NFCIP-2 transceiver, an RFID transceiver or RFID tag, or use
`Bluetooth R) (i.e., communication in the 2.4 GHz frequency
`band), infrared, IrDA (Infrared Data Association). UWB (Ul
`tra Wideband) or another wireless communication link.
`The terminal 12 and network devices 28, 29, 30 also
`include a second data communication link that can be used for
`transmitting data associated with a multicast group. For
`example, as illustrated in FIG. 1, the second data communi
`cation link may be a local area wireless link3. Such as accord
`ing to the IEEE 802.11g standard. This second data commu
`nication link need not be wireless, and can be a wired local
`area network (not shown). Such as a ring token network oran
`Ethernet network.
`60
`In addition to cellular telephones 28, 29 and laptop com
`puters 30, the network 10 may also or alternatively include
`any of a number of different electronic devices, including
`other mobile terminals, wireless accessories (e.g., mass Stor
`age devices, networked printers, monitors, etc.), portable
`digital assistants (PDAs), pagers, desk top computers and
`other types of electronic systems.
`
`50
`
`45
`
`55
`
`65
`
`6
`FIG. 1 illustrates devices that may be members of a multi
`cast group. For example, a multicast group may be estab
`lished among the terminal 12, mobile devices 28, 29 and a lap
`top computer 30. An example of such a multicast group may
`be a home entertainment system that uses the terminal 12 as a
`hub for administering the multicast group. In this example,
`the multicast group is able to share data within the group via
`multicast messages transmitted by a wireless data link3. Such
`multicast group transmissions may be peer-to-peer links,
`such as illustrated between mobile device 28 and mobile
`device 29, or indirect network communications via the termi
`nal 12, such as illustrated between the mobile devices 28, 29
`and the laptop computer 30. Such a multicast group may also
`communicate with external websites and data sources. Such
`as by the terminal 12 communicating via a cellular data com
`munication link 2 with a base station 16 coupled to the Inter
`net 24 as illustrated. Similarly, one or more of the mobile
`devices 28, 29 may also be able to communicate directly with
`the base station 16. Such as by a cellular data communication
`link 2.
`The architecture illustrated in FIG. 1 also supports multi
`cast groups that include distant elements, such as a server 26
`coupled to the Internet 24. For example, a multicast group
`may be administered by an origin server 26 via the Internet
`24. Messages intended for the multicast group may be trans
`mitted from the origin server 26 via the Internet 24 to a base
`station 16 and then to the terminal 12 as illustrated. From
`terminal 12, the multicast group messages may be rebroad
`cast via local wireless communication links 3 to the other
`group members 28, 29, 30. Messages from any member of the
`multicast group may then be routed to the origin server 26 in
`a reverse manner. Similarly, the multicast group may include
`computing devices that are beyond the range of the terminal
`12. Such as a computer coupled to the Internet 24. Messages
`to and among multicast group members may be directed to
`each member device using IP addresses using addressing
`schemes that are well known in the Internet arts.
`While the protocols and methods for communicating to,
`from and within a multicast group are well known, the various
`embodiments provide new mechanisms forestablishing an ad
`hoc multicast group or for joining new members to an existing
`multicast group. By adding close range communication trans
`ceivers, such as NFC protocol transceivers, to the terminal 12
`and group elements 28, 29, 30, the proximity limitation of
`close range communications links is leveraged to make two
`unrelated devices, such as a terminal 12 and a mobile device
`28, aware of each other. Thus, to add a first mobile device 28
`to a multicast group including the terminal 12 the first mobile
`device is brought in very close proximity to the terminal 12.
`Using one of the known close range communication tech
`niques, the first mobile device 28 and the terminal 12 establish
`a close range communication data link 4 and exchange a
`multicast-based services advertisement over the close range
`communication data link 4. As part of exchanging a multicast
`services advertisement, the address of the first mobile device
`28 is provided to the terminal 12 for use by the multicast
`group, and the multicast group address is communicated from
`the terminal 12 to the first mobile device 28. Additional infor
`mation Such as user notification and/or multicast group par
`ticipation confirmation may also be addressed at this point.
`As a part of the multicast services advertisement data the
`first mobile device 28 and the terminal 12 can exchange
`information to configure a specific multicast group commu
`nication link. For example, the terminal 12 may inform the
`first mobile device 28 of the network (such as wireless or
`wired network) over which the multicast group is communi
`cating. As another example, the terminal 12 may inform the
`
`Ex.1013
`APPLE INC. / Page 12 of 20
`
`

`

`US 8,687,536 B2
`
`5
`
`10
`
`7
`first mobile device 28 of security or encryption information
`needed for the first mobile device 28 to access a wireless
`network (i.e., establish wireless communication links 3). In
`this manner, the creation of a new multicast group or joining
`of an existing group can be negotiated and communicated
`between the first mobile device 28 and the terminal 12 as part
`of the services advertisement processing using the close
`range communication link 4. Once the multicast group is
`established or the first mobile device 28 is added to the group,
`link-specific signaling data can be transmitted on the multi
`cast-capable link 1, 2, 3.
`In an embodiment the first mobile device 28 and the termi
`nal 12 have data connectivity via disparate physical links, e.g.
`an 802.11g wireless link 3 and a CDMA cellular data com
`munication link 2 in addition to the close range communica
`15
`tion link 4. In this embodiment, the multicast group can be
`established using the 802.11g wireless link 3, the CDMA
`cellular data communication link 2, or both. In a further
`embodiment, one or more of the group devices (e.g., the
`laptop computer 30) may include a wired network link 1 that
`can be used for multicast group communications.
`A multicast proxy may be collocated with any one of the
`terminal 12 or other group member devices 28, 29, 30, or
`present in the network as a separate entity, including in an
`origin server 26 accessed via the Internet 24. The services
`advertisement data exchanged via a close range communica
`tion link 4 can be used to configure the multicast proxy in
`addition to the creation of a multicast group or addition of a
`device to an established multicast group. Each device 12, 28.
`29, 30 can use its multicast-capable link (e.g., wired, wireless
`and/or cellular links 1, 2 or 3) to send out the configuration
`signaling to other members of the multicast group, and hence
`create the multicast group or join groups of devices over
`single or disparate links. Thus, once a multicast group has
`been established, any member of the group having close range
`communications (e.g., NFC protocol) capability can join
`another device to the group by being placed in close proxim
`ity to the new device sufficient to establish a close range
`communication link4. Since the networking authentication is
`established by bringing two devices in close proximity and
`the network and multicast group addresses and set up infor
`mation is communicated via the close range communication
`link 4, the establishment of a multicast group or joining an
`established multicast group can be completely transparent to
`the user.
`45
`The network 10 illustrated in FIG. 1 enables a variety of
`connections between mobile devices 28, 29 and other com
`puting devices on the network, Such as a laptop 30. For
`example, the multicast group can communicate by means of
`cellular communications networks 2, by local wireless net
`works 3, by wired network connections 1 accessed via cellu
`lar communication links 2 to the base station 16 via the MSC
`18 and network 19, and via the Internet 24 by an Internet
`connection 9. This flexibility in network connections is illus
`trated with respect to laptop 30 with dashed communications
`symbols. Once a multicast group has been authenticated by
`close range communications procedures described herein, the
`group devices may communicate to each other directly
`through peer-to-peer links or indirectly via networks 1,2,3,9.
`24.
`While FIG. 1 shows a terminal 12 to be an immobile
`terminal, this multicast group hub may itself be a mobile
`device. Such as a cellular telephone. For example, mobile
`device 29 may serve as the hub of a multicast group including
`itself, the mobile device 28 and the laptop 30, with network
`communications including a cellular data network link 2 and
`a local area wireless link 3. In this example, once multicast
`
`55
`
`8
`group membership is confirmed by bringing the mobile
`device 28 in close proximity to the mobile device 29 to estab
`lish the close range communication link 4, communications
`to, from and among the multicast group may proceed accord
`ing to well-known multicast group communication methods
`and protocols.
`Each device that may be joined to a multicast group may be
`configured with application Software to automatically nego
`tiate the creation of a multicast group when any two devices
`are brought in close proximity. Similarly, the devices may be
`configured with application Software to automatically join
`one device to an established multicast group of which the
`other device is a member when the two devices are brought
`into close proximity. Such applications using

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket