Nothing Special   »   [go: up one dir, main page]

CN104255059A - Presence platform for passive radio access network-to-radio access network device transition - Google Patents

Presence platform for passive radio access network-to-radio access network device transition Download PDF

Info

Publication number
CN104255059A
CN104255059A CN201280061280.6A CN201280061280A CN104255059A CN 104255059 A CN104255059 A CN 104255059A CN 201280061280 A CN201280061280 A CN 201280061280A CN 104255059 A CN104255059 A CN 104255059A
Authority
CN
China
Prior art keywords
beacon
access point
network
mobile device
specific identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201280061280.6A
Other languages
Chinese (zh)
Inventor
沙·乌拉
N.F.罕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Omnitrail LLC
Original Assignee
Omnitrail LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Omnitrail LLC filed Critical Omnitrail LLC
Publication of CN104255059A publication Critical patent/CN104255059A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • H04W36/144Reselecting a network or an air interface over a different radio air interface technology
    • H04W36/1446Reselecting a network or an air interface over a different radio air interface technology wherein at least one of the networks is unlicensed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Profile-based passive network switching of wireless mobile devices comprises receiving at a wireless access point a device specific identifier beacon transmitted from a mobile device and extracting a device specific identifier from the beacon. The access point then transmits the device specific identifier and access point provider information to a networked server configured with presence network switching software for determining network switching requirements based on the transmitted device specific identifier. The access point then receives mobile device network switching data from the server for processing. The access point then transmits local wireless network authentication and connection information from the access point to the mobile device to facilitate activating a wireless network connection between the mobile device and the access point at which point the access point starts processing wireless communication from the mobile device over the local wireless network.

Description

For passive wireless electricity Access Network to radio access network equipment transformation present platform
The cross reference of related application
This application claims the rights and interests (each in them is incorporated herein by reference with its full content) of following provisional application: the United States serial No. 61/546,086 that on October 12nd, 2011 submits to.
Technical field
Method and system described herein relates generally to wireless devices network authentication, and identifies in particular to the passive equipment changed for wireless network and user.
Background technology
Use 802.11 specifications of communication equipment 12 eight octet field being called as MAC Address can be used to come to other device identifications they oneself.Each grouping of Wireless transceiver comprises MAC header, and it comprises the MAC Address of source and/or intended destination equipment.These groupings are absorbed by all wireless devices, and wherein media access control sublayer checks MAC Address field and then abandons grouping or grouping be delivered to higher data link layer for further process.
MAC Address usually " hard coded " on connection chip and be irreversible, but the radio chip upgraded allows MAC Address to pass through software change.This allow in order to protect identity use anonymous MAC Address to change MAC information in grouping or use look-up table or some use the additive method of the intelligent packet route of multiple MAC Address, the MAC Address on network is distributed to each equipment to prevent MAC Address from copying and for the MAC Address of an equipment is cloned into another equipment.
Although the data transmitted in packet radio when secure network can be encrypted, MAC Address does not have encrypted, because they are for the destination filtering to grouping before any further process generation.By amendment device driver software, all groupings of importing into may be accepted and the MAC Address of no matter specifying in MAC header.This allows to have the roaming wireless electricity equipment eavesdropping packet radio of modified device driver software, checks their MAC header and identifies the MAC Address of other wireless devices in its vicinity, and without the need to equipment possessory knowledge or permit in advance.
At present, voice/data payload transformation (" switching " or " handover ") of opening/safety that the various telecom solutions of classifying according to fixed estropia (FMC) and/or the mobile access (UMA) of non-license allow to initiate from elementary automated validation (do not need end user mutual) wide area radio Access Network (network of cell tower (base station transceiver) such as operated by mobile operator and so on) to secondary user's (free, with good conditionsi or pay) destination wireless network.Opening/security purpose ground wireless network that this secondary user's is initiated comprises various wireless wide area network, regional network and local area network (LAN) (being WAN, WRAN and WLAN respectively), that wherein most of business adopts is the WLAN based on IEEE 802.11 standard operated in non-licensed radio frequency frequency spectrum, is commonly called Wi-Fi.This particular example changed to the mobile device of the secondary Wi-Fi network set operated by many foreign sides from the single elementary WAN operated by mobile operator is the important driver of current above-mentioned FMC/UMA solution of being proposed by solution provider.But the most of current realization of FMC solution needs initiatively end user's reservation (non-passive), and they just can promote that the payload between elementary and destination radio access network changes afterwards.
When the payload of the WAN operated from mobile operator to destination WLAN changes, usually this end user is required to preengage to obtain official's license from the WAN of mobile operator operation because of the needs to both the end-user device on authentication purpose ground WLAN or certification end-user device and WLAN.Existing IEEE agreement (such as announced in 2008 802.21) is special allows the better seamless transitions between each wireless network on different spectral (once they certified and connect), but still requires to set up the initial manual end user's reservation connected.These initiatively end user's reservation usually comprise manually downloading and expect mobile device client software on the WLAN of destination and/or manual authentication and subsequently this process repeated to the destination WLAN of each new expectation.Because it is relevant with the manual reservation in such as Wi-Fi network, so end user usually must enter service set identifier or SSID(for hiding Wi-Fi network) or select SSID from the SSID classification propagated.If destination network is safe network, then also may require that end user is manually provided for the key of certification in addition.
In order to the further end user of this specific service condition and its implementation being converted to WLAN from the WAN of mobile operator operation adopts, Wireless Networking, the certification that the connection that the seamless payload that the while that when manufacturing industry and the various stakeholder in the service supplier's ecosystem equipment comprised by detecting end user being set up, WLAN is connected (except elementary WAN connects) and is implemented to WLAN switches the radio access network using elementary mobile operator operation changes with the end-user device and payload that proceed to secondary Wi-Fi network, the concept of the universal access network (GAN) that more how seamless end user experiences.The amendment (i.e. 802.11u) of having set up IEEE 802.11 agreement, to publicize the information in Wi-Fi network, can select them to have permission the network (i.e. Wi-Fi network) proposed by third party's (such as non-master network external or " roaming partner " Mobile Network Operator) of access to make end user.
Although have these innovations, the great majority with the fixed estropia solution of universal access network realize the initial manually transformation that the first time for each new secondary destination network will be required to use.Although this is because elementary network authentication is automatically (subscriber and corresponding end-user device information store on the remote server by mobile operator), but payload transformation also depends on the success identity of mobile device to destination network of end user, and it is initial always manual as mentioned.Once the given mobile device of user seamlessly on authentication purpose zone network, GAN will only seamlessly run.But, formed with most of Mobile Network Operator and contrast, most of destination network (and on 802.11 operation all WLAN) only can allow seamless transitions in being stored on end-user device by verify data and be stored in Long-distance Control data storage area.This will require that end user performs manual authentication at least one times to each new destination radio access network.
Summary of the invention
Method and system described herein can use the key of long-range distribution to create the MAC Address through conversion in order to radio-packet transport, it can be locally stored or cannot be locally stored.By making MAC Address convert (such as by adding the time to conversion as variable), the MAC Address through conversion can change along with the time; The MAC Address transmitted is made to be dynamic thus so that the MAC Address that receives of given radio access network can periodically not essential (such as per hourly, every day ground, etc.).Because can only locally convert when transmitting, so once the MAC Address in header is reversed conversion, any other use (such as Packet routing) for MAC Address still can complete.MAC Address through conversion can also be used as device-specific identifier as described herein (DSI).
Method and system described herein can be avoided end user's manual authentication, the first needs connected even arriving new destination radio access network by impelling the mobile device of end user automatically to launch the WLAN Unique Device unique identifiers (DSI) of the software Passive intake that can detect it.This process is here also referred to as and presents or passively to present.In one example, the mobile device of end user DSI together with the identifier of WLAN be passed to can this information of seamless absorption and then certification by the modified general access network controller of Mobile Network Operator or their users independently on the WLAN that operates of third party's wlan network operators in co-operation partner.Proposed invention also has revises the resistive additional benefits of tool to the user on client device, because each equipment is uniquely identified.In addition, be placed on the software revised in access point and can allow to use existing protocol and method and existing protocol to be connected with network while method, to reach the object of feasible seamless delivering here.
In the past, the transformation between each Mobile Network Operator WAN to be easier to and more reliable end user experiences because of the best practices (namely from " family " Cellular Networks to the transformation of " roaming " net) set up by large Mobile Network Operator.Method and system described herein can utilize automatically launch and the device-specific identifier of Passive intake to realize the simplification of the transformation between any two incompatible radio access networks and seamless end user experiences.Included method and system can also be the alternative method of the seamless transitions (namely " family " Cellular Networks is to " roaming " net) realized between two WAN.
Method and system described herein also provides the network insertion of the end user's device be provided in the region with low WAN signal (such as honeycomb) or the more feasible alternative not being linked into mobile operator WAN.Proposed invention can utilize by revising other prior wireless network hardware residing on the existing software on prior wireless network hardware and obtain.With existing solution such as Femto cell (commercial be also referred to as " little community " and " picocell ") (this Femto cell is that Mobile Network Operator is special, because they utilize the unique radio frequency frequency spectrum of each Mobile Network Operator and the radio access network interface of correspondence) form contrast, in many cases, proposed invention is more suitable substituting because it provide the end-user device of more wide region can non-licensed radio spectrum access and there is the passive transformation benefit of Femto cell.Say clearer, if the radio access network interface of the mobile device of end user and the radio access network interface of Femto cell have common hardware and software and operate (the latter is the agency of the first factor for determining the certification to which Mobile Network Operator of equipment Internet access) on same authorized frequency, then the equipment from cellular base station transceiver to Femto cell changes and can only change.This means only can realize seamless delivering when the Radio Access Interface of elementary network is imitated in Femto cell or other secondary radio Access Networks.But proposed invention makes the mobile device belonging to elementary mobile network to be seamlessly converted to have the secondary mobile network of not compatible attribute (comprise operate on license/non-authorized frequency, have different hardware/software network interface etc. for radio access).Most of something in commons of such transformation will be used to the radio access network of mobile device from Mobile Network Operator (mainly comprising cellular base station transceiver) to WLAN(Wi-Fi router) transformation, this is the thing that existing solution can not realize.
Method and system described herein can comprise the method for the passive network switching based on profile, is included in WAP (wireless access point) place and receives the device-specific identifier beacon transmitted from above equipment; From this beacon extraction equipment unique identifiers; This device-specific identifier and access point supplier information are sent to and are configured with for determining that based on transmitted device-specific identifier network switches the networked server presenting network switching software required; Mobile device network switch data is received from this server; Local wireless network certification and link information are sent to mobile device to promote that the wireless network activated between mobile device and access point connects from access point; And process is by the radio communication of Local wireless network from mobile device.In the method, beacon is that radio-frequency channel by meeting 802.11 transmits.In the method, beacon comprises the recipient address had nothing to do with recipient.Alternately, before Local wireless network transmits Local wireless network certification and link information, mobile device does not know Local wireless network in the method.In the method, process radio communication and can initiate the first use of mobile device to Local wireless network.The method may further include: receive beacon in response at access point place, transmit electronic response by wireless signal to mobile device.The method may further include the signal strength signal intensity of the radio signal determined between mobile device and access point.The method may further include and added timestamp received beacon before extraction equipment unique identifiers.In the method, access point is adapted to from beacon reception and extraction equipment unique identifiers.Alternately, beacon is the urgent beacon of the high priority field based on the beacon be activated in the method.
Method and system described herein can be included on basis that the passive network based on profile switches calling is delivered to the method for IP network from cellular network, comprising: at WAP (wireless access point) place by cellular network from the mobile device receiving equipment unique identifiers beacon being engaged in calling; From this beacon extraction equipment unique identifiers; Device-specific identifier and access point supplier information are sent to and are configured with for determining that based on transmitted device-specific identifier cellular network provider calling switches the networked server presenting network switching software required; Mobile device calling switch data is received from this server; Local wireless network certification and link information are sent to mobile device to promote that the local wireless activated between mobile device and access point connects from access point; And promote the route calling through Local wireless network.In the method, beacon is that radio-frequency channel by meeting 802.11 transmits.In the method, beacon comprises the recipient address had nothing to do with recipient.In the method, before Local wireless network transmits Local wireless network certification and link information, mobile device does not know Local wireless network.In the method, process radio communication and can initiate the first use of mobile device to Local wireless network.The method may further include: receive beacon in response at access point place, transmit electronic response by wireless signal to mobile device.The method may further include the signal strength signal intensity of the radio signal determined between mobile device and access point.The method may further include and added timestamp received beacon before extraction equipment unique identifiers.In the method, access point is adapted to from beacon reception and extraction equipment unique identifiers.In the method, the route calling through Local wireless network comprises the use of terminated call to cellular network.
Method and system described herein can be included in method data flow being delivered to by the basis based on the passive network switching of profile IP network from cellular network, comprising: use cellular data network from mobile device receiving equipment unique identifiers beacon at WAP (wireless access point) place; From this beacon extraction equipment unique identifiers; Device-specific identifier and access point supplier information are sent to and are configured with for determining that based on transmitted device-specific identifier cellular network provider calling switches the networked server presenting network switching software required; Mobile device calling switch data is received from described server; Local wireless network certification and link information are sent to mobile device to promote that the local wireless activated between mobile device and access point connects from access point; And promote that the data network of mobile device connects via Local wireless network instead of by cellular data network.
Method and system described herein can comprise the WAP (wireless access point) being adapted to checkout equipment unique identifiers beacon, comprising: wireless router, and this wireless router comprises: be adapted to the MAC layer function that mark presents packet; Dock to send with adaptive MAC layer function and receive divide into groups in present data present function; And with present function dock to present data to communicate with the presence server networked in outside present client functionality.In the access point, the recipient address presenting packet has nothing to do with recipient.In the access point, the recipient address presenting packet is 0xFFFFFFFFFFFF.Access point performs the signal strength detection comprising the wireless signal presenting packet.In the access point, access point present function executive signal intensity detection.The mark of packet that what at least first access point time stab identified present.In the access point, the function execution that presents of access point adds timestamp.In the access point, the radio-frequency channel by meeting 802.11 detects beacon.
Method and system described herein can comprise checkout equipment unique identifiers letter calibration method, comprising: at access point place by reception of wireless signals packet, the recipient address of wherein packet has nothing to do with recipient; What received packet was forwarded to access point from the MAC layer facility of the adaptation of access point presents facility; Utilization presents facility from packet extraction equipment unique identifiers; And extracted device-specific identifier is forwarded to the outside networked server being adapted to and performing and present network switching and authorize together with access point identity data.In the method, radio signal be meet 802.11 radio-frequency channel.The method may further include and receives beacon in response at access point place, transmits electronic response by wireless signal to mobile device.In the method, device-specific identifier comprises the MAC Address through conversion having the equipment of wireless capability receiving beacon from it.In the method, the recipient address presenting packet is 0xFFFFFFFFFFFF.In the method, access point performs the signal strength detection comprising the wireless signal presenting packet.In the method, access point present function executive signal intensity detection.In the method, access point adds timestamp the mark presenting packet at least first identified.In the method, the function execution that presents of access point adds timestamp.In the method, beacon comprises and was not previously access in the device-specific identifier a little received.
Method and system described herein can comprise the cell phone being adapted to and generating device-specific identifier beacon, comprising: be adapted to the MAC layer function transmitting and present beacon packet; And present function, its for: with adaptive MAC layer function to fetching device-specific identifier data configuration to presenting in beacon packet; Determine the transmission channel transmitting beacon packet; Determine beacon transmission interval; And communicate present data with outside presence server of networking.In cell phone, transmitted by the radio-frequency channel meeting 802.11 and present beacon packet.In cell phone, device-specific identifier comprises the MAC Address through conversion of cell phone.In cell phone, the recipient address presenting packet is 0xFFFFFFFFFFFF.
Method and system described herein can comprise generation device-specific identifier letter calibration method, comprising: the MAC Address obtaining mobile device; Utilize the operation firmware that presents on the mobile apparatus that MAC Address is transformed into device-specific identifier; Utilization presents firmware to determine and presents beacon transmissions channel; By device-specific identifier with present beacon transmissions channel and be sent to operation adaptive MAC layer function on the mobile apparatus; And based on present beacon transmission interval periodically transmit comprise device-specific identifier present beacon.In the method, determine to present transmission intercal based on the response presenting beacon transmitted received mobile device.In the method, the key based on long-range distribution is converted to MAC Address.In the method, MAC Address is converted to the byte shift comprising MAC Address.In the method, MAC Address was converted based on the DHCP update cycle in rental period.
Method and system described herein can comprise the method for the radio communication with mobile phone being carried out to monetization from cellular domains to the transformation in wifi territory, is included in networked server place and receives the instruction using Local wireless network as the result mobile device presenting the switching of passive network from cellular network; The cellular network provider of cellular network is determined based on the analysis of this server to instruction; Calculate the value that mobile device uses Local wireless network instead of cellular network; And a part for calculated value is asked for cellular network provider.In the method, value is calculated based on the special transformation guide of cellular network provider.In the method, determine cellular network provider comprise from this instruction extract mobile device device-specific identifier and based on extracted device-specific identifier come from the equipment simple document search cellular network provider identification data device profile database.
According to the detailed description of preferred embodiments and drawings below, these and other systems of the present invention, method, object, feature and advantage will be apparent for a person skilled in the art.Here all documents mentioned are incorporated herein by reference with its entirety.
Accompanying drawing explanation
The detailed description of the present invention and its some embodiment following can be understood by reference to figure below:
Fig. 1 describes the critical piece that passive network-to-network changes solution (be also referred to as the invention of proposition or present framework);
Fig. 2 drawing section is deployed in the element presenting framework on mobile device (such as individual intelligent movable phone);
Fig. 3 describes the remote data server for promoting passive network-to-network conversion techniques (comprising the DSI and device profile that are in harmonious proportion and detect); The system that can be utilized by proposed invention;
Fig. 4 describes three exemplary welcome screens, and it illustrates that application developers is to presenting the use of framework to add location-based feature to mobile applications;
Fig. 5 describes to be used for visuality being supplied to the screen presenting the application program based on web of the User Activity in the region of detection zone realized by proposed invention;
Fig. 6 and Fig. 7 describes an example of the method for the conversion of MAC Address and/or DSI;
Fig. 8 describes by the embodiment presenting framework provided by the invention;
Fig. 9 describes the detailed technology details of the user on certification Mobile Network Operator core network;
Figure 10 illustrates and is included in by the step presenting framework and come in the wireless device of authenticated user provided by the invention;
Figure 11 describes for installing the illustrative steps supporting the application program presented;
Figure 12 describes the exchange of identifier in harmonic process;
Figure 13 illustrates once identified for providing the illustrative methods of passive WLAN certification and concatenation ability to presenting beacon dispatching station;
Figure 14 illustrates in case of emergency for providing the illustrative methods of passive WLAN emergency alarm system (EAS) certification;
Figure 15 describes the proposed form presenting frame;
Figure 16 describes the proposed form presenting the frame control field in frame format;
Figure 17 describes the proposed frame format for presenting control frame;
Figure 18 illustrates the son field presented in the frame control field of control frame;
Figure 19 illustrates the proposed frame format for DSI beacon frame;
Figure 20 illustrates the proposed frame format for DSI+ timestamp request beacon frame;
Figure 21 illustrates the proposed frame format for WLAN SSID+ key beacon frame;
Figure 22 illustrates the proposed frame body format for WLAN SSID+ cipher key frame;
Figure 23 illustrates the frame header format of the proposed frame main body for WLAN SSID+ cipher key frame;
Figure 24 describes the flow chart of SBF execution mode;
Figure 25 has been illustrated as and has obtained access point architecture that proposed support presents and the required amendment to existing Wi-Fi access point structures;
Figure 26 summarizes proposed basis and presents packet configuration;
Figure 27 illustrate proposed present frame control in field and possible values; And
Figure 28 has been illustrated as and has obtained mobile phone framework that proposed support presents and the required amendment to the existing Wi-Fi framework on cell phone.
Embodiment
Although be here described with reference to various embodiment, be appreciated that in all situations (unless otherwise indicating), one or more exemplary and non-limiting example is referred to the reference of " embodiment " or " multiple embodiment ".And, being appreciated that in all descriptions here (unless otherwise indicating), even referring to one or more exemplary and non-limiting example when not having clear and definite with reference to " embodiment " or " multiple embodiment ".
Can promote that passive equipment/user profiles mark and certification can be identified and certification passively to make the equipment being connected to wireless network (i.e. Wi-Fi network) by presenting platform as described herein, and not require that equipment user utilizes mobile device to take any concrete action.The access point (PAP) that support presents can use any one in method described herein, comprises the method and system described herein that utilization sends the unique radio frequency propagation of the form being in device-specific identifier (DSI) beacon or the equipment of " RF label ".Such PAP can detect the given RF label of carrying DSI passively, and makes this given RF label subsequently for the database in remote server or data storage area or database collection with reference to determine the access rights to equipment.Once authority is determined, required information (such as SSID and WPA/WPA2 authenticate key) is transmitted to equipment by PAP, is successfully connected to be used in be called as the proposed radio access network presenting the privately owned packet format of form here for it.Technology described in the related application that user and/or device profile are associated with MAC Address and/or DSI by promotion as referred to herein can be configured for the basis of the access rights determined equipment.
Mobile device is from WAN(such as honeycomb) the passive transformation of network also can present chance for this function of monetization.WAN service supplier has regulation frequency spectrum for serving mobile device and limited capacity, but continues to increase the demand of capacity.Therefore, WAN service supplier may be willing to that another Network Provider of purpose pays the expense of unloading capacity requirement.Enterprise-level use (such as calling to say) of mobile device can being strengthened by passive transformation, enterprise's local wireless network (such as Wi-Fi) can be automatically handed over to make the mobile device user when user/employee is in business facility.And for WAN service, the use cost of local Wi-Fi service is tended to lower or free, so enterprise can receive cost savings by changing to the passive equipment of local wireless network (such as Wi-Fi).Therefore, use with only WAN or realize compared with the above-mentioned Femto cell lacking compatibility between each end-user device, enterprise may be ready to pay provided by the local wireless route of mobile device call/data convenience, cost savings and improvement call quality.Therefore, Local wireless network supplier may be ready its networked components adaptive as described herein in case as the payment to enterprise and/or WAN supplier etc. return and support proprietary protocol.
Passive transformation can also be controlled at least partly by WAN supplier.WAN supplier can formulate determine communicate what in perhaps type can by handover to the strategy of Local wireless network.Such strategy can comprise the service quality of equipment improved and support to present, thus determines that whether Local wireless network signal presents the improvement of service quality by WAN network signal.In one example, WAN(is honeycomb such as) Network Provider can set up the strategy comprising passive convert signals quality threshold, and this passive convert signals quality threshold can be used to assessment Local wireless network signal and determine whether the transformation of data and/or sound is authorized to thus.
Technology for converting networked devices MAC Address may be of value to access point (such as Wi-Fi router) and mobile device, wherein can reduce the possibility that unauthorized third party can determine physical location and/or other information about access point and its networked environment presenting in environment the MAC Address through conversion being rendered as DSI.Because only support that the device access presented supports the DSI being provided with beacon of the equipment presented from other, so fail safe is also enhanced, can be configured to limit application program and/or the third party that can access the information relevant with device location because present framework.
Be depicted in Fig. 1 and be called as the critical piece that the proposed passive network-to-network presenting solution changes solution here.There is provided on mobile device and passive transformation server (such as remote data server) in run software support present API(PAPI) promote that passive network-to-network equipment changes at least in part.When PAPI is mounted or when being unloaded on mobile device and when provide to apps server present prompting time, this PAPI can promote and the docking of third party application.Can by ASI(" application-specific identifier ") identify each application program, and ASUH(" application-specific user hash " can be used) identify each subscriber using each application program.In order to reach the object relevant with fail safe, only this ASUH shared can be carried out by generating ASUH with the application program presenting framework resources.Only present resource and can access this mobile device DSI(" device-specific identifier " that beacon can be set by mobile device).
This mobile device can be made can to support to present platform via the beacon that can represent unique DSI sent from this mobile device with the adaptive radio chip firmware presenting software communication that mobile device runs.Support the access point (PAP) presented can also be called as here and be adapted to support privately owned " location server " presenting agreement and function described herein.Example presents environment can comprise management for can carry out the LSI(" position-specific identifier " of each restriction position of manual hard coded based on geography) the location server of unique set or PAP.Location server or PAP can detect mobile DSI with LSI and be forwarded to apart from remote data server for being in harmonious proportion the DSI and one or more device profile that detect together with the LSI detected by the mobile DSI detected.Each location server or PAP can reach the region of 70m or more by covering radius.Multiple location server or PAP can be used collectively to provide the covering to more large regions.
Fig. 2 describes the element presenting deployment on proposed mobile device (such as individual intelligent movable phone).These elements can be configured attached bag and draw together in the layer presenting application program, application framework, storehouse, operating system nucleus and device hardware.
Fig. 3 describes the remote data server (RDS) for promoting passive network-to-network conversion techniques described herein (it can comprise the DSI and device profile that are in harmonious proportion and detect).This RDS stores and/or processes all DSI and be linked to the database server of ASUH of each DSI in subscriber database.Being forwarded directly to together with its positional information (being derived from LSI) through the profile that is in harmonious proportion of being associated applications providers server or mobile device can present application program by RDS.RDS remotely can also upgrade the encryption key for generating DSI as described herein on the mobile apparatus.
Present framework can promote to make mobile applications developer can detect presenting of mobile subscriber passively by beacon transmission described herein and passive detection technology.The exemplary use presenting API can be allow when Guest Physical is present in retail environment, and more intelligent, more concentrated purchase experiences is brought this client by mobile applications developer and advertizer.
Present API(PAPI) can be used for retrieving ASI(" application-specific identifier " by third party application), this ASI distributes when third party application is registered on mobile data server (RDS).Once subscriber accepts application program EULA(" EULA "), application program just can be called out the installation function on PAPI and be provided ASI and ASUH to it.Then this information can be sent to RDS together with the mobile device DSI of subscriber by PAPI.PAPI can also utilize the information that is associated with the application program of new registration and position (PAPI can ask from it or receive the to present data) high-speed cache upgraded subscriber call to present data.
Each application program can have its oneself selection and add requirement, to allow various different applications providers can obtain the access presenting data to their desired locations by the proposed framework that present.
Can also application program unloading or subsequently exit selection time use present API(PAPI).Its ASI can be supplied to PAPI by application program, and PAPI removes its data and Indicated Cloud server removes corresponding ASUH and ASI from the database of subscriber from local subscriber call high-speed cache.
Fig. 4 describes can be used for location-based feature to add to by application developers that three of presenting the mobile applications that framework realizes are exemplary recognizes the welcome screen presented.
Fig. 5 describes the screen of the application program based on web being used for User Activity visuality be supplied in the region supporting the district presented.That caught can be used to provide the Additional Services presenting prompting and realize for the information generating such screen.
The method and system presenting platform can comprise the conversion of device-specific MAC Address, to reach the object of the common detection of the equipment physical location (such as geo-location) providing added security and avoid comprising mobile device, router etc.
Describe an example of the method for the conversion of MAC Address and/or DSI here, and describe this example in figure 6 and figure 7.In the method, alternate key is supplied to mobile device (be such as supplied to radio chip, the processor be supplied on mobile device etc.), and it determines to be propagated through the MAC Address of conversion.This key can be used to (such as be preloaded on chip hardware or firmware according to various one to one transforming function transformation function, by web download etc.) determine transform method or as the variable for converting MAC Address, such as can pass through predetermined transforming function transformation function one to one (such as byte shift).By being used as the variable factor in MAC Address transforming function transformation function the time, the MAC Address through conversion can need not be upgraded alternate key by changing regularly.Time factor with the DHCP refresh synchronization dispatched, can change to this new MAC Address to make the equipment of all connections when new MAC Address generates.In one example, for the DHCP update cycle in rental period of 24 hours, data can be used to generate the MAC Address through conversion.
Another example generating the MAC Address through conversion of mobile phone is the displacement performing MAC Address data.In this example, the radio processor chip of mobile phone can be loaded with the first alternate key to the corresponding right side to left byte shift, with the second alternate key to corresponding left-to-right byte shift, with the 3rd alternate key to corresponding simple byte negate, etc.Mobile phone can be configured to its DHCP of renewal per hour and show, and will be suitable MAC Address transformed variable to make the concrete time in one day.If the MAC Address of equipment is that 01:23:45:67:89:AB(is in hexadecimal at first), and the conversion of key is configured to indicate dextroposition, MAC Address then through converting from 01:00 to 1:59 will be B0:12:34:56:78:9A, and from 02:00 to 02:59, it will be AB:01:23:45:67:89.This conversion can be used the firmware on chip or be undertaken by predefined gate on use chip etc.The grouping of importing into will have inverse transformation, if key instruction destination MAC Address is in an mac header performed right to left byte shift to it before the MAC layer being provided process in this case, then it is not the reserved MAC header for multicast.
By reference to the database of MAC Address, alternate key and current time, the radio chip seller or other third parties may be able to be in harmonious proportion exactly will by the MAC Address through conversion propagated so that marked network and its build-in attribute.MAC Address through conversion can also be used as DSI the function of interpolation is supplied to access point.
Fig. 8 describes the example presenting the deployed environment of framework.Presenting framework makes user can by the seamless transitions utilizing device-specific identifier (DSI) to realize between two incompatible radio access networks, and this device-specific identifier (DSI) can authenticate the user in the core net that operated by mobile operator or their separate network operators in co-operation partner.DSI can be sent by the mobile device of user and by general access network controller Passive intake so as authenticated user and promote when not having initial user to input to the connection of destination radio access network.
Fig. 9 describes the detailed technology details of the user in certification Mobile Network Operator core net.As shown, automatically launch can by the Unique Device unique identifiers (DSI) of secondary and incompatible destination radio net access point (such as Wi-Fi router) Passive intake for the mobile device of user.The DSI of user's mobile device is delivered to the general access network controller through amendment together with the identifier for secondary destination radio net access point (such as Wi-Fi router), and it can seamlessly absorb this information and user then in certification Mobile Network Operator core net.
Figure 10 describes to be included in by the different step in the wireless device presenting system authentication user provided by the invention.The device-specific identifier of being launched by wireless device is absorbed by the access point supporting to present.Then device-specific identification request is sent to the remote server of the set of the parts in the general access network controller and core net comprising responsible certification and payload route.This remote server provides equipment access privilege.Then SSID and authenticate key are used to provide safe Wi-Fi authentication.
The object of proposed method and system described herein is that first testing equipment has the equipment of wireless aerial (such as 2.4GHz) because they to enter in detectable zone of approach each other and subsequently by means of equipment originally with it and/or service initiation on remote equipment/data storage area is machine-processed and/or supplier's (i.e. client applications developer) of data, services is helped in passive certification.Described herein is support the function needed for equipment that presents and service to support to other this equipment of device identification of presenting.What also limit here is to provide these example implementation of various privately owned radio frames form needed for service.The document also comprises the requirement of maintenance customer's privacy and the description of process.What also describe here is some technology, and the privately owned agreement that presents allows by it the operation meeting the equipment of IEEE 802.11 that overlapping IEEE 802.11 WLAN coexists.
In order to the object of the document, term and definition is below suitable for.
Application-specific identifier (ASI): agree to that the strategy presenting application developers is just to the unique identifier of each application assigned once application program affiliate.
Application-specific user hash (ASUH): be to applications providers identifying user the hash that each application program on end-user device generates specially to allow to present to remind.
Beacon detection zone (BDA): two stations can successfully send and/or receive the district of beacon before each other wherein.
Beacon sends scheduling interval (BSI): the interval sending beacon frame from PBS.
Device-specific identifier (DSI): for identifying unique 6 byte-identifier symbols of each PBS.
Present API(PAPI): support that the application program that presents is used for receiving and present/the interface of position data.
Location server (LS): the equipment of the access point that the support being equipped with and having the position-specific identifier of (for retail location designs) its oneself presents.This can be the proposed of the present invention existing Wi-Fi access point with resident in a software form.
Position-specific identifier (LSI): for identifying the unique identifier of each location server.
Support the access point (PAP) presented: the wireless local network connecting point playing the effect presenting measuring station.
Present beacon dispatching station (PBS): there is the station (normally end-user device) presenting beacon transmitting capacity.
Remote data server (RDS): keep the remote data base presenting a part for framework as storing all DSI, ASI, ASUH, LSI and its license and relation.
Present measuring station (PDS): there is process and present beacon and any station instruction being sent to the ability of PBS.
In order to the object of the document, abbreviation below and initial are suitable for.
AP access point
ASI application-specific identifier
ASUH application-specific user hash
BDA beacon detection zone
BSI beacon sends scheduling interval
BSS Basic Service Set
CRC cyclic redundancy code
DBS reduces beacon and sends scheduling
DSI device-specific identifier
EAS emergency alarm system
The urgent beacon function of EBF
ERF emergency response function
FCS FCS
LLC logic link control
LS location server
LSI position-specific identifier
MAC Media access contorl
NAV network allocation vector
PAP supports the access point presented
PAPI presents application programming interfaces
PBS presents beacon dispatching station
PDS presents measuring station
PHY physical layer
RDS remote data server
The short interframe space of SIFS
SSID service set identifier
STA stands
The request of TSR timestamp
WEP Wired Equivalent Privacy
WLAN WLAN (wireless local area network)
The access that WPA WLAN protects
The proposed privately owned wireless protocols that presents has the fundamental characteristics that itself and existing wireless communications agreement are differentiated, thus supports the non-licensed spectrum of 2.4GHz or 5GHz, and such as bluetooth and IEEE 802.11(market are called Wi-Fi).Proposed invention and agreement utilize the Physical architecture closely similar with IEEE 802.11 and agreement proposed by result meets the various laws and regulations requirements (i.e. FCC) putting on wireless radio transmission.
Be sent to and present presenting beacon frame and can using the address (such as 00:00:00:00:00:00) irrelevant with destination of measuring station (PDS).This allows normal WLAN AP to ignore transmission, any PDS simultaneously allowing to have different address not have between two equipment any shake hands and this any shake hands before receive and the same packets of process for being in harmonious proportion.
Present frame can detect to equipment (such as CFS to CFS) by support equipment.The proposed agreement that presents may be not required for and makes it run and set up Basic Service Set (BSS).This allows to support that equipment of presenting is not when having handshake procedure and set up subsequent data transmission to connect (connection such as undertaken by Wi-Fi, bluetooth or any other device-to-device Data Transport Protocol or association) and work.
Proposed present agreement and also may not require that any acknowledgement frame is to check that successful data transmits.Because when by present that beacon dispatching station (PBS) transmits present beacon frame outside beacon detection zone (BDA) time it can not be picked up by PDS, thus confirmation request frame impels PBS repeatedly to transmit in some cases.When agreement is within BDA, this agreement depends on shorter beacon and sends scheduling interval (BSI) to form for the possible loss divided into groups on the contrary.
The proposed agreement that presents is by complicated carrier sense multiple access/conflict avoidance (CSMA/CA) scheme not using Bluetooth frequency hopping scheme to avoid interference or will not implement for IEEE 802.11 required competition.On the contrary, the existing business in interference 2.4GHz or 5GHz frequency, display device may depend on the lasting CSMA pattern of more basic 1-without collision detection/avoid.
Present framework and architecture and comprise the some parts interacted to be provided for the platform presenting detection and/or certification.PBS launches beacon frame constantly and beacon frame is absorbed by PDS when it enters BDA.The instruction that PDS uses it to receive from beacon frame and the information that receives each process of being in harmonious proportion.In order to the summary providing the object of information to provide this mediation here.Instruction can send to PBS to affect its transport behavior by PDS.Information can also be sent to the authentication service on PBS by it.
In an example of beacon frame instruction harmonic process, can by presenting framework to support Multilevel user harmonic process to protect the identity of user and to guarantee to keep privacy when sharing users information.Present framework and use two different identification layers (each has different identifier collection), application layer and machine to machine layer.
Figure 11 describes for installing the illustrative steps supporting the application program presented.Be called as and present API(PAPI) application program layer interface allow application program support to present ability so that the identifier being called as application-specific user hash (ASUH) by generation identifies each user uniquely to applications providers.When application program installed first and only present share between frame parts and applications providers time, each application program affiliate generates its oneself ASUH.Each applications providers also provides presenting in frame system the unique identifier being called as application-specific identifier (ASI) identifying them.Proposed method and system also promotes that allowing all application program affiliates to inform the user them is asking to present data so that the position used in their EULA, and can also check subsequently and adjust this information subtly to present setting.
Independent machine to machine layer interface use device-specific interface (DSI) identifies the equipment that each support presents uniquely.DSI can be the derivative of the MAC Address had in the equipment of unique mac address.For the equipment that MAC Address is not unique, generate one or more such as by MAC Address converter technique described herein of DSI(individually), and this DSI is distributed to equipment.DSI is only presenting known in frame system and can not share this DSI with other entities or this DSI is not associated with any user data.DSI is a part for all beacon frames transmitted by PBS.Importantly, if DSI will be absorbed by unauthorized entity, then it cannot be in harmonious proportion with any user profile or identity.
Figure 12 describes the exchange of identifier in harmonic process.DSI launches as a part for its beacon by presenting beacon dispatching station (PBS).PDS from beacon frame absorb DSI and subsequently by its relaying to remote data server (RDS) to process.RDS inquires about DSI and determines which application program affiliate has been ratified to receive by user and presents/position data for what detect website.Then determined that application program affiliate can utilize this ASUH to carry out identifying user for sending their corresponding ASUH the application program affiliate of this site access.
The beacon frame sent by PBS is only detected when there is transmission in BDA.Once PBS leaves BDA, its beacon frame just can not picked up by PDS again, and at this some place, it stops receiving instruction from PDS and being switched to the disappearance electrical energy saving transmission mode with comparatively long letter mark transmission scheduling interval (BSI).
The AP(PAP that can be presented by support) send dedicated beacon frame with the passive certification allowing core WLAN to connect.PAP can authenticate PBS and hiding SSID and WEP/WPA/WPA2 key is directly passed to PBS.This information is used to trigger the association request from PBS.The more detailed description of illustrative embodiments shown in example below.
We describe now and are used for presenting beacon dispatching station (PBS) just present to this illustrative methods that beacon dispatching station (PBS) provides passive WLAN certification and concatenation ability or in case of emergency avoid certification completely once identify.
Support that the access point (PAP) presented is WLAN access point (AP), when being equipped with proposed invention with the software form in the hardware resided in WLAN access point, this WLAN access point also serves as and presents measuring station (PDS).With only can detect compared with the independent PDS that presents, PAP with the addition of the function making them can realize the access to the more service of wide region.
When PAP detects new PBS in its beacon detection zone (BDA), its first as described herein user profile mediation is normal PDS.In addition, if user has the privilege of accessing the WLAN provided by PAP, then PAP is given to provide WLAN authentication information to PBS by instruction and encryption key from cloud storage.PAP uses this double secret key SSID and WLAN secret key encryption and guides this information to PBS with beacon.Software client on PBS can be deciphered SSID and WLAN key and they is used for certification passively and be connected to the WLAN provided by PAP.Summarize these steps in fig. 13.
When urgent beacon is detected by PAP, SSID and WLAN key is sent to PBS by PAP automatically, without the need to waiting for the harmonic process by cloud.Summarize these involved steps in fig. 14.
Proposed proprietary protocol limits the service needed for the operation of this agreement, but may can not require the particular implementation of described service.PBS and PDS has different function collection and is responsible for initiating and/or perform some service.Implement the service for PDS without the need to PBS and implement the service for PBS without the need to PDS.
The service that can be triggered by PDS that PBS implements comprises:
Increase beacon frequency
Realize WLAN access.
The service that this locality that PBS implements is triggered is:
Launch DSI beacon
Launch DSI+ timestamp beacon
Launch DSI+EAS beacon.
The service that PDS implements is:
Mediation PBS beacon frame
Launch DBS beacon
Launch TSR beacon
Launch WLAN parameter beacon (only on PAP).
PBS generates the service that may affect the overall behavior of presentity system structure.
PBS with the fixed intervals determined by BSI to launch beacon frame.Once beacon frame is absorbed, PBS just can initiate other services.
Be activated if added timestamp, then PBS transmits beacon frame together with the time passing nearest 1.25 nanoseconds from last beacon.
If PBS has activated emergency alarm system (EAS), then it can launch preferential beacon frame.When PDS receives preferential beacon frame, its process and mediation information thus while preferential beacon frame is processed, every other non-preferential beacon frame is pushed in buffer.Preferential beacon frame can have precedence over the setting of all privacy of user and start to collect and presents information and allow to access the service that can provide under normal circumstances or can not provide.
When PDS detects PBS first in its BDA, its PBS can be indicated to reduce time quantum that its BSI reaches setting.If PBS remains in BDA crossed time restriction, then it can be again indicated to maintain the frequency increased.Once PBS leaves BDA, it just can give tacit consent to BSI to it by automatic reduction when lacking the beacon frame from PDS.
PAP can be indicated to realize the WLAN access on PBS.PBS is given by the encryption key set up needed for WLAN connection and/or SSID.When receiving WLAN access information, this information is passed to software client by PBS.This software client can use this information to connect to set up WLAN subsequently.
PDS can instruct PBS, and whether BDA needs to add timestamp.If then PBS can launch DSI+TSR(" timestamp request ") beacon instead of regular DSI beacon.When PBS enters BDA first and is in aturegularaintervals later, support that all PDS of the timestamp being used for signal analysis can propagate TSR beacon frame.When lacking this TSR beacon frame, PBS can stop adding timestamp this beacon.
When PDS receives beacon frame from PBS, it may need to route the information to remote data server (RDS).PDS can monitor the signal strength signal intensity of importing beacon frame into and only route PBS data (once its passing threshold).Importantly, PDS is also according to receiving their their priority and the beacon frame that is sequentially in harmonious proportion.EAS beacon frame there is limit priority and on priority channel route they.
Once PBS enter its BDA, PDS just can high-speed cache PBS information.When PBS first being detected, PDS can launch beacon frame, once by PBS receive this beacon by reduce PBS BSI thus make PBS with less interval to launch beacon frame.PDS can maintain dispatching algorithm and launch beacon frame to notify that to PBS they are within its BDS.
If BDA is equipped with to be provided the function of interpolation for the timestamp information of signal analysis by process, then it can send the additional beacon frame being called as TSR beacon.To PBS, this beacon notifies that it needs beacon to be added timestamp.When PBS is detected first and is also in aturegularaintervals later, PDS may need to send this beacon frame, because when lacking this beacon frame, PBS may stop adding timestamp its beacon.
PAP has WLAN ability, and the information needed for connecting is sent to core wlan network.Once PAP has been detected and has made PBS be in harmonious proportion, it just can launch the beacon frame comprising SSID and WLAN authenticate key when being indicated by RDS.If PBS is just launching priority emergency beacon frame, then this information can also sent out PBS in this locality by PAP acquiescently.
Present description presents the form of frame.Stand (STA) suitably should be able to construct the subset of frame and the different subsets of frame specified by decoding.Can be present beacon transmission frame (PBS) still to present measuring station (PDS) and determine this set by STA.All STA should be able to use Frame Check Sequence (FCS) verify each frame of receiving and explain some field according to frame header.
Each frame comprises solvent below:
Header, its compromise frame controls and the duration;
Variable-length frame main body, it comprises the information being exclusively used in frame type;
FCS, it comprises IEEE 32 bit CRC.
Frame is described to a series of fields being in predefined order.Each figure in Part V describes the field (from left to right) when field appears at frame from the order that physical layer is launched with them.
All bits in field are all numbered, and (from 0 to k), wherein the length of field is k+1 bit.Eight bit byte border in field can be obtained for mould with 8 by making the bit number of field.The order (from numbering minimum bit to numbering the highest bit) increased with importance describes the eight bit byte in the numeric field longer than single eight bit byte.Eight bit byte in the numeric field that single eight bit byte is longer is sent to physical layer, and order is from comprising the eight bit byte of the minimum bit of numbering to the eight bit byte comprising the highest bit of numbering.Any field comprising cyclic redundancy code (CRC) is the exception of this convention, and transmits this any field from the coefficient of most higher order term.
The proposed frame format that presents comprises in all frames with the set of fields that permanent order occurs.Figure 15 describes commonly to present frame format.First three field in Figure 15 (frame controls, duration/ID and recipient address) and last field (FCS) form minimum frame form and are present in all frames.Field source address and frame main body exist only in some frame type.Frame main body has and depends on the variable-sized of frame type.
Frame control field forms following son field: protocol version, type, priority and the mark relevant with WLAN.The form of frame control field is illustrated in Figure 16.
The length of protocol version field is 2 bits and is constant with regard to the size of all corrections of this standard and placement.It also reflects the protocol version of 802.11 standards that same radio is supported.This release level only can be increased to increase progressively when allowing the cross-compatibility across the standard of multiple equipment at the release level of 802.11 agreements.Any frame with higher revision level that receives should abandon the frame without any instruction giving STA or logic link control (LLC).
The length of type field is 6 bits.The function of type field identification frames.There are two kinds of frame types: beacon and control.Each in these frame types has several subtype defined.Table 1 defines the combination of each subtype.(digital value in table 1 illustrates with binary system).
Table 1---life type combines.
Bit 7 is configured to 0 and in control frame, is configured to 1. bits 6 in the frame being derived from PBS, be configured to 0 and be configured to 1 in the frame being derived from PDS within a beacon frame.
Precedence field can be configured to determine the priority of the order that beacon frame is processed at (Media access contorl) MAC or higher level place.Process other beacon of same priority with the basis of first in first out, and always before comparatively low level, remove higher prior rank.The combination of definition value and corresponding priority level in fig. 2.
The precedence field value of table 2---beacon frame.
The proposed header that presents has 6 added bits, and these 6 added bits are added to make this present header and have the length identical with the frame control field specified in IEEE 802.11 MAC header.Order in bit 10,11,13,14 and the more segmentations of 15(, retry, more data, shielded frame and IEEE 802.11) be all configured to 0.Power management from the bit 12(IEEE 802.11 of all PDS) be configured to 0, but be configured to 1 from the bit 12 of all PBS.
The length of Duration field is 16 bits.The code that duration value is used to define in the clause 9.2.5.4 according to IEEE 802.11 upgrades network allocation vector (NAV).Duration field is configured to the time quantum needed for microsecond meter to send whole frame.Because proposed agreement has the transmission of an only frame length at most, so it will not require that equipment reserves longer time restriction.
Each address field comprises 48 bit addresses of the identifier serving as equipment.All PDS by 00:00:00:00:00:00(in hexadecimal) as their address, and determined the address of the PBS being called as DSI by the Add-ons in the application layer of equipment.
Frame main body is the variable length comprising the additional information being exclusively used in some frame type.Minimum frame main body is 0 eight bit byte, because not all type all needs to propagate additional information.
FCS field is 32 bit fields comprising 32 bit CRC.The proposed all fields presenting header and frame body field calculate FCS.FCS calculates identical with the calculating specified in IEEE 802.11.
Use index be below the standard generator polynomial of 32 to calculate FCS:
G(x)?=?x 32?+?x 26?+?x 23?+?x 22?+?x 16?+?x 12?+?x 11?+?x 10?+?x 8?+?x 7?+?x 5?+?x 4?+?x 2?+?x?+?1。
FCS is the complement of the following sum (with 2 for mould):
X k× (x 31+ x 30+ x 29+ ... + x 2+ x+1) divided by the remainder of (with 2 for mould) G (x), wherein k is the number of bit in calculated field, and
X is multiplied by the content (being counted as multinomial) of calculated field 32and then divided by the remainder after G (x).
Transmit the FCS field from the coefficient of most higher order term.
As exemplary embodiment, at reflector place, the initial remainder of division is preset to and is all 1 and then revises them by the division of calculated field to generator polynomial G (x).First most higher order bits (as FCS field) is utilized to transmit the complement of this remainder.
At receiver place, initial remainder is preset to and is all 1 and when the bit that imports into continuously divided by FCS during G (x) and calculated field causes not having transmission error in unique non-zero remainder value.Unique remainder values is following multinomial:
x 31?+?x 30?+?x 26?+?x 25?+?x 24?+?x 18?+?x 15?+?x 14?+?x 12?+?x 11?+?x 10?+?x 8?+?x 6?+?x 5?+?x 4?+?x 3?+?x?+?1。
The frame format of control frame and frame subtype have nothing to do and define this frame format in fig. 17.Recipient address is configured to the DSI of destination equipment.Duration field is configured to transmission and treats that framing adds the time interval needed for short interframe space (SIFS) interval.
Son field in the frame control field of control frame is set as illustrated in Figure 18 like that.
In Figure 19, definition is used for the frame format of DSI beacon frame.
Recipient address is configured to 0xFFFFFFFFFFFF(in hexadecimal) and source DSI is the DSI of transfer equipment.Duration field is configured to transmit treats that framing adds the time needed for a SIFS interval.
Definition is used for the frame format of DSI+ timestamp beacon frame in fig. 20.
DSI+ timestamp frame has the field identical with DSI beacon frame, but also has the timestamp field comprising additional clocking information.When realizing adding timestamp, PBS carries out timing to passing the time of 1.25 nearest nanoseconds from transmitting the time of last beacon.It is in the timestamp field of 8 eight bit bytes that the time in past is inserted into length.
Definition is used for the frame format of WLAN SSID+ key beacon frame in figure 21.
Recipient DIS is the DSI of the equipment of authorized access WLAN.Source MAC is the MAC Address of WLAN AP.Duration field is configured to transmit treats that framing adds the time needed for a SIFS interval.The length of frame body field can be 3 to 98 eight bit bytes and describe its content in 5.3.2 joint.
The minimum length of WLAN frame main body 3 eight bit bytes and greatly enhance 98 eight bit bytes most.Define its form in fig. 22.
The type of the encryption used by WLAN, determine frame main body header in the length of the SSID of byte and in the length of the key of byte, and define this frame main body header in fig 23.SSID can be long to 32 eight bit bytes from 1 eight bit byte, and key can be that 0 to 64 eight bit bytes are long.
According to the kind of the encryption on WLAN, WLAN type is set.Provide the probable value for WLAN type in figure 3.SSID length is in the length of the eight bit byte of SSID, and wherein maximum is 32, and WLAN key length is that wherein maximum is 64 in the eight bit byte of WLAN encryption key.
Table 3---WLAN Type subfield combines.
The proposed agreement that presents is designed to utilize the MAC function collection identical with IEEE 802.11.Although may not need to support whole function collection, some in them carry out Frame switch for more than one involved frame needed for 802.11, and this agreement can use existing contention protocols to determine when and send grouping.Except existing function, this agreement also may need the additional function described in these chapters and sections.Scheduling beacon function (SBF) is determined that PBS is many and is transmitted DSI beacon continually.When equipment has made EAS mode activation on PBS trigger emergency beacon function (EBF).
SBF keeps determining when a series of timers transmitting next beacon.There is the BSI of two predefined 60 seconds and 15 seconds.PBS gives tacit consent to the use BSI of 60 seconds.
The timer of 0 countdown SBF should come with the interval specified by BSI.Once timer arrives the transmission that 0, SBF just should start beacon frame.If exist for 802.11 treat that if framing or medium do, then should send in next obtainable chance and present beacon frame.Once beacon is successfully delivered (attention this means that beacon is sent to physical layer and successfully leaves it, may not be picked up by another equipment), SBF will reset timer and repeat this process.
When receiving DBS beacon on PBS, SBF should be switched to the use BSI of 15 seconds.PBS should use shorter BSI to send next 20 beacon (beacons of next 5 minutes).If receive DBS beacon at this time durations, then it restarts to be 20 beacon timing with shorter BSI.If do not receive DBS beacon, then it switches the acquiescence BSI got back to 60 seconds.
By physics or virtual mechanism or SBF can be implemented by both.Here example embodiment is discussed.
Beacon needs SBF with every 60 seconds default rate once.When PBS receive reduce beacon send scheduling (DBS) beacon time, the beacon transmission frequency that PBS can initiate every 15 seconds 1 beacons continues the period (next 20 beacons) of 5 minutes.If receive another DBS beacon in this time frame, then PBS may continue to transmit beacon with 15 seconds intervals and continue another 5 minutes.When PBS misses the reception of DBS beacon, it turns back to acquiescence 60 seconds intervals.
Count_A, type: integer, minimum value: 0, maximum 4, (counting 4x15s interval is so that every 60s sends beacon)
Count_B, type: integer, minimum value: 0, maximum 20, (counting 20x15s interval is to turn back to acquiescence SBI)
SBI, type: boolean, true=SBI is 60s, false=SBI is 15s.
In Figure 24, diagram is used for the flow chart of SBF execution mode.
False code for SBF execution mode is shown below.
On PBS, EBF is used when activating EAS pattern on equipment.EBF arranges precedence field in presenting in header of all beacon frames, thus makes PBS be high (see chapters and sections 5.1.3.1.3).EBF ignores any other service attempting to stride across PHY layer.
When PDS receives high priority beacon but resides on media access control sublayer, this PDS uses ERF.
Proposed agreement uses physics (PHY) layer identical with the IEEE 802.11 described in detail in IEEE 802.11 specification clause 12,13,14 with 15 and hopping.
Although compared with IEEE 802.11, this agreement is designed to be used in the lasting CSMA pattern of the 1-without collision detection/avoidance mechanism.Whenever presenting grouping and being ready to be transmitted, check medium is to look at whether there is ongoing transmission.If medium is idle, then transmit this grouping immediately.If busy medium, then before transmission presents grouping, PHY layer may be waited for until the medium free time.
Here be exceed that the physical layer that provides in chapters and sections above describes about the detailed description presenting measuring station (PDS) and how to run.
The major function of PDS absorbs the beacon frame launched by PBS, and subsequently the device-specific identifier (DSI) of PBS is relayed to remote data server (RDS) together with the associated metadata identifying PDS.The all devices serving as PDS needs Internet connection can communicate with RDS.PDS uses ICP/IP protocol to communicate with RDS.
PDS can also maintain and make the local cache table of all PBS current in its beacon detection zone (BDA).PDS can also with aturegularaintervals by beacon emissions to all PBS in this table.When they time (the 5th chapters and sections see for DBS form), can be sent to each PBS to trigger shorter beacon emissions interval by minimizing beacon transmission scheduling (DBS) mouse beacon in BDA.If there is radio-frequency (RF) tag (RFT), then PDS can also launch beacon detection zone (RBDA) beacon format supporting radio-frequency (RF) tag.PDS can maintain the scheduling above-mentioned frame being sent to all PBS in its BDA.
PDS can import the intensive analysis of beacon executive signal into from all of PBS.PDS can have the algorithm allowing them PBS launched lower than predefined threshold signal strength level to be carried out to filtering.For the position being equipped with multiple PDS, PDS may be able to carry out communicating and by the signal strength analysis data of collecting at each PDS place and more the comparing of good position PBS place each other.
Proprietary protocol proposed when we are described in 911 calling is now for providing the method for location-based service to emergency response person.
This agreement has the built-in mechanism helping emergency response person when in the presenting and beacon dispatching station (PBS) is equipped with 911 calling of such as mobile device and so on.All precedence fields presented in beacon frame main body header (with reference to chapters and sections 5.1.3.1.3) are set to height by the urgent beacon function (EBF) on PBS.Beacon is also sent scheduling interval (BSI) and is reduced to 15 seconds by EBF.
When presenting measuring station (PDS) and high priority beacon being detected, trigger emergency response function (ERF) on PDS.ERF can impel PDS at all high priority beacons of pre-treatment of the beacon of process lower priority.If PDS is the part presenting access point (PAP), then SSID and WLAN authenticate key can also be sent to PBS with beacon by PAP.
If there is low signal intensity over a cellular network or do not have signal strength signal intensity, then when EBF receives SSID and WLAN key, EBF can determine that whether setting up WLAN connects.This guarantees even in the region with the reception of poor honeycomb, covers, still can carry out 911 callings if there is PAP.
ERF also guarantees all information be associated with preferential beacon to be routed to remote data server (RDS) by priority channel.RDS ignores all privacies and arranges and can share with emergency response person and present/position data, even if user does not also have pre-authorization that he present/position data is collected in specified location.
Proposed agreement is the New Deal about 2.4/5GHz radio frequency.It is designed to use presenting detection and certification but having its oneself privately owned packet format of the same physical layer instruction of Wi-Fi.Any Wi-Fi AP has the basic hardware requirement supporting to present needed for consciousness.This description general introduction makes existing Wi-Fi AP can become needed for PAP and is used as presenting additional firmware/Change In Design of a part for solution.
Figure 25 illustrates the amendment needed for existing Wi-Fi access point architectural framework.MAC layer abandon by physical layer catch concerning invalid or significant all groupings another destination.May need to make amendment to MAC layer, be routed to now new present firmware routines to process to make to present grouping.The new firmware of AP inside also must communicate with outer remote data server.
Proposed present grouping there is very similar structure of dividing into groups with 802.11, there is some key difference.Summarize basic grouped structure in fig. 26.
Frame controls: arrange the son field in frame control as illustrated in Figure 27 like that.Subtype can adopt any value from 0x00 to 0x0F, and priority can adopt any value from 0x00 to 0x03.
Duration: it is current does not have settings in presentity system structure.It keeps intact to make address field subsequently and 802.11 consistent.
Recipient address: this address is configured to 0xFFFFFFFFFFFF and can receives grouping to make any Pap and process it.
Source DSI: this source DSI can be any value from 0x01 to 0xFFFFFFFFFFFE and be unique for the mobile device that each support presents.
FCS:FCS field is 32 bit fields comprising 32 bit CRC.FCS is calculated by 16 bytes above.FCS calculates identical with that regulation in IEEE 802.11.
Signal strength signal intensity/(adding timestamp): except grouped data, the signal strength signal intensity of grouping being used for apparatus for establishing position presenting that firmware routines also needs to receive.Although be not mandatory requirement, add timestamp the accuracy helping improve location at acceptance point place.
Internet accesses: presenting firmware routines also needs to communicate with remote data server via 4G/3G modulator-demodulator or other Internet connections a certain.
Figure 28 illustrates the amendment needed for existing Wi-Fi architectural framework on cell phone.May need to modify to make it possible to send from mobile phone present grouping to MAC layer.The client that presents on proposed equipment specifies unique 6 byte device unique identifiers as the part presenting frame.Present client and also specify 802.11 channels, chip needs to transmit between beacon subsequently to present frame and the time interval on this channel.
Can by performing computer software on a processor, the machine of program code and/or instruction disposes method and system described herein with carrying out a part or whole part.This processor can be a part for server, client, network infrastructure, mobile computing platform, fixing computing platform or other computing platforms.Processor can be can execution of program instructions, the calculating of any kind of code binary command etc. or treatment facility.Processor can be or comprises any variant of signal processor, digital processing unit, flush bonding processor, microprocessor or such as coprocessor (mathematics coprocessor, Graphics Collaborative processor, communication coprocessor etc.) and so on and can promote to perform the similar processor of program code or the program command that it stores directly or indirectly.In addition, process can realize the execution of multiple program, thread and code.Thread can be performed concurrently to strengthen the performance of processor and to operate while promoting application program.By means of execution mode, method described herein, program code, program command etc. can be implemented in one or more thread.Thread can produce other threads in a large number, and these other threads can have the priority of the distribution be associated with them; The basis of the instruction that processor can provide in program code performs these threads based on priority or any other order.Processor can comprise memory, the method for its storage here and described in other places, code, instruction and program.Processor can visit by interface the storage medium stored as the method here and as described in other places, code and instruction.Be associated with processor for storing, can be able to include but not limited in CD-ROM, DVD, memory, hard disk, flash disc drives, RAM, ROM, buffer storage etc. by the storage medium of the instruction of the method calculated or treatment facility performs, program, code, program command or other types one or more.
Processor can comprise the enhancing performance of multiprocessor and one or more kernels of speed.In certain embodiments, processor can be dual core processor, four core processors, other chip-level multiprocessor and combine the analog of two or more independent kernels (being called as tube core).
Method and system described herein can be disposed with carrying out a part or whole part by performing computer software in server, client, fire compartment wall, gateway, hub, router or other such computers and/or networking hardware.Software program can be associated with the server comprising file server, printing server, domain server, Internet server, intranet servers and other such as variants of secondary server, host server, distributed server etc. and so on.Server can comprise memory, processor, computer-readable medium, storage medium, port (physics and virtual), communication equipment and can one or more by the interface of other servers of wired or wireless medium etc. access, client, machine and equipment.As local method, the journey logic bomb described can be performed by server with other here.In addition, other equipment performed needed for method as described in the application can be regarded as a part for the infrastructure be associated with server.
Server can provide the interface with other equipment including but not limited to client, other servers, printer, database server, printing server, file server, the communication server, distributed server etc.In addition, this coupling and/or connection can promote that program is at the long-distance support of whole network.Some or all of networking in these equipment can promote do not depart from scope one or more positions handling procedure or method concurrently.In addition, by any one being attached in the equipment of server of interface can comprise can storage means, program, code and/or instruction at least one storage medium.Central repository can provide the program command that will perform on different devices.In this embodiment, remote repositories can serve as the storage medium for program code, instruction and program.
Software program can be associated with the client comprising file client, Printing, territory client, the Internet client, internet client and other such as variants of assistant client terminal, host client, distributed clients etc. and so on.Client can comprise memory, processor, computer-readable medium, storage medium, port (physics and virtual), communication equipment and can one or more by the interface of other clients of wired or wireless medium etc. access, server, machine and equipment.As local method, the journey logic bomb described can be performed by client with other here.In addition, other equipment performed needed for method as described in the application can be regarded as a part for the infrastructure be associated with client.
Client can provide the interface with other equipment including but not limited to server, other clients, printer, database server, printing server, file server, the communication server, distributed server etc.In addition, this coupling and/or connection can promote that program is at the long-distance support of whole network.Some or all of networking in these equipment can promote do not depart from scope one or more positions handling procedure or method concurrently.In addition, by any one being attached in the equipment of client of interface can comprise can storage means, program, application program, code and/or instruction at least one storage medium.Central repository can provide the program command that will perform on different devices.In this embodiment, remote repositories can serve as the storage medium for program code, instruction and program.
Method and system described herein can be disposed with carrying out a part or whole part by network infrastructure.This network infrastructure can comprise the element of such as computing equipment, server, router, hub, fire compartment wall, client, personal computer, communication equipment, routing device and other active and inactive components known in the art, module and/or parts and so on.(one or more) that are associated with network infrastructure calculate and/or non-computational equipment can also comprise the storage medium of such as flash memory, buffer, storehouse, RAM, ROM etc. and so on except comprising miscellaneous part.Here and other local process, method, program code, instruction described can be performed by one or more in network infrastructure element.
Can implement here on the cellular network with multiple community and other local describe method, program code and instruction.Cellular network can be frequency division multiple access (FDMA) network or code division multiple access (CDMA) network.Cellular network can comprise mobile device, cell site, base station, repeater, antenna, tower etc.Cell phone network can be GSM, GPRS, 3G, EVDO, net or other network types.
Can on the mobile apparatus or implemented here by mobile device and other local describe method, program code and instruction.Mobile device can comprise navigator, mobile phone, mobile phone, mobile personal digital assistant, kneetop computer, palmtop computer, notebook, beep-pager, E-book reader, music player etc.These equipment can also comprise the storage medium of such as flash memory, buffer, RAM, ROM and so on and one or more computing equipment except comprising miscellaneous part.The program code that the computing equipment be associated with mobile device can be made to perform it stores, method and instruction.Alternately, mobile device can be configured to perform instruction collaboratively with other equipment.Carry out communicating and be configured to executive program code in the base station that mobile device can dock with same server.Mobile device can at peer-to-peer network, mesh network or the enterprising Serial Communication of other communication networks.Program code can be stored on the storage medium that is associated with server and to be performed by the computing equipment embedded in server.Base station can comprise computing equipment and storage medium.Memory device can store the program code and instruction that are performed by the computing equipment be associated with base station.
Computer software, program code and/or instruction can be stored on a machine-readable medium and/or accessed on a machine-readable medium, and this machine readable media can comprise: be kept for calculating the machine element of the numerical data at interval sometime, equipment and recording medium; Be called as the semiconductor storage of random-access memory (ram); Be generally used for the mass storage device of more permanent storage, the form of the hard disk of such as CD, magnetic storage class, band, drum, card and other types; Processor register, buffer storage, volatile memory, nonvolatile memory; Optical storage, such as CD, DVD; Removable medium, such as flash memory (such as USB rod or key), floppy disk, tape, paper tape, punched card, independently ram disc, Zip drive, removable mass storage device, off-line device etc.; Other computer storages, such as dynamic memory, static memory, read/write storage device, variable storage device, read-only, arbitrary access, sequential access, position addressable, file addressable, content addressable, network-attached storage device, storage area network, bar code, magnetic ink etc.
Method and system described herein can by physics and/or an invisible Xiang Congyi state transformation to another state.Method and system described herein can also will represent that the data of physics and/or invisible item are from a state transformation to another state.
Here the element (comprising flow chart and the block diagram in figure) described and describe imply logic between element throughout.But, according to software or hardware engineering practice, can can be performed medium by the computer with the processor that can perform the program command that it stores on device, described element and its Function implementation to be monolithic software configuration, independent software module or to adopt the module of outside routine, code, service etc. or these any combination, and all such execution modes can in the scope of the present disclosure.The example of such machine includes but not limited to personal digital assistant, kneetop computer, personal computer, mobile phone, other handheld computing devices, Medical Instruments, wired or wireless communication equipment, transducer, chip, calculator, satellite, dull and stereotyped PC, e-book, gadget, electronic equipment, the equipment with artificial intelligence, computing equipment, networking instrument, server, router etc.In addition, can at the element that can the machine of execution of program instructions be described in implementing procedure figure and block diagram or any other logical block.Therefore, although the function aspects of figure above and the system disclosed in description elaboration, but the specific arrangements of the software of inferring for implementing these function aspects should not described, unless context is set forth clearly or otherwise clearly obtained from context from these.Similarly, the various steps describing above can recognizing and identify can change, and the order of step can be adapted to the application-specific of technology disclosed herein.All such changes and amendment intention fall in the scope of the present disclosure.Therefore, the description and/or describe for the order of various step should not be understood as that and need the specific execution sequence of these steps, unless application-specific needs, or context is set forth clearly or otherwise clearly obtains from context.
Above-described method and/or process and its step can realize with any combination being suitable for the hardware of application-specific, software or hardware and software.Hardware can comprise particular aspects or the parts of all-purpose computer and/or dedicated computing equipment or concrete computing equipment or concrete computing equipment.Can one or more microprocessor, microcontroller, embedded microcontroller, programmable digital signal processor or other programmable devices, together with inner and/or external memory storage in realize this process.This process or instead can also be embedded in application-specific integrated circuit, programmable gate array, programmable logic array or any other equipment or is configured in the combination of the equipment processing the signal of telecommunication.Can also to recognize in this process one or more may be implemented as the computer-executable code that can perform on a machine-readable medium.
Can use and stored, the structured programming language of such as C and so on of compiling or explanation, the OO programming language of such as C++ and so on or any other senior or low level programming language (comprise assembler language, hardware description language, with database programming language and technology) create computer-executable code so that at the said equipment, and the uneven combination of processor, processor architectural framework, or the combination of different hardware and software, or can in any other machine of execution of program instructions one is upper runs.
Therefore, in an aspect, each method above-described and its combination can be embedded in computer-executable code, the step of method carried out therewith when performing this computer-executable code on one or more computing equipment.On the other hand, the method can be embedded in the system carrying out its step, and can be distributed on equipment in many ways, or all functions can be integrated in special, autonomous device or other hardware.In another aspect, the device for carrying out the step be associated with above-described process can comprise any one in above-described hardware and/or software.All such arrangements and combination intention fall in the scope of the present disclosure.
Although combined some preferred embodiment described in detail and illustrate to disclose method and system described herein, the various amendment on it and improvement have easily become apparent for a person skilled in the art.Therefore, the spirit and scope of method and system described herein can not be limited by aforementioned exemplary, but will understand it with law the broadest admissible meaning.
Here all documents quoted are incorporated herein by reference.

Claims (55)

1., based on the method that the passive network of profile switches, comprising:
The device-specific identifier beacon transmitted from mobile device is received at WAP (wireless access point) place;
From described beacon extraction equipment unique identifiers;
Described device-specific identifier and access point supplier information are sent to be configured with and present network and switch the networked server of software, described in present network and switch software for determining that based on transmitted device-specific identifier network switches requirement;
Mobile device network switch data is received from described server;
Local wireless network certification and link information are sent to described mobile device to promote that the wireless network activated between described mobile device and access point connects from described access point; And
Process is by the radio communication of Local wireless network from described mobile device.
2. method according to claim 1, wherein said beacon is that the radio-frequency channel by meeting 802.11 transmits.
3. method according to claim 1, wherein said beacon comprises the recipient address had nothing to do with recipient.
4. method according to claim 1, wherein before Local wireless network transmits Local wireless network certification and link information, this Local wireless network is not known to described mobile device.
5. method according to claim 1, wherein processes radio communication and initiates the first use of described mobile device to Local wireless network.
6. method according to claim 1, comprises further and receives described beacon in response at access point place, transmits electronic response by wireless signal to described mobile device.
7. method according to claim 1, comprises the signal strength signal intensity of the radio signal determined between described mobile device and access point further.
8. method according to claim 1, is included in further before extracting described device-specific identifier and adds timestamp received beacon.
9. method according to claim 1, wherein said access point is adapted to from described beacon reception and extraction equipment unique identifiers.
10. method according to claim 1, wherein said beacon is the urgent beacon of the high priority field based on the beacon be activated.
To the method being delivered to IP network from cellular network be called out on the basis that the passive network based on profile switches, comprising for 11. 1 kinds:
At WAP (wireless access point) place by cellular network from the mobile device receiving equipment unique identifiers beacon being engaged in calling;
From described beacon extraction equipment unique identifiers;
Described device-specific identifier and access point supplier information are sent to be configured with and present network and switch the networked server of software, described in present network and switch software for determining that based on transmitted device-specific identifier cellular network provider calling switches requirement;
Mobile device calling switch data is received from described server;
Local wireless network certification and link information are sent to described mobile device to promote that the local wireless activated between described mobile device and access point connects from described access point; And
Promote the route calling through Local wireless network.
12. methods according to claim 11, wherein said beacon is that the radio-frequency channel by meeting 802.11 transmits.
13. methods according to claim 11, wherein said beacon comprises the recipient address had nothing to do with recipient.
14. methods according to claim 11, wherein before Local wireless network transmits Local wireless network certification and link information, this Local wireless network is not known to described mobile device.
15. methods according to claim 11, wherein process radio communication and initiate the first use of described mobile device to Local wireless network.
16. methods according to claim 11, comprise further and receive described beacon in response at access point place, transmit electronic response by wireless signal to described mobile device.
17. methods according to claim 11, comprise the signal strength signal intensity of the radio signal determined between described mobile device and access point further.
18. methods according to claim 11, are included in further before extracting described device-specific identifier and add timestamp received beacon.
19. methods according to claim 11, wherein said access point is adapted to from described beacon reception and extraction equipment unique identifiers.
20. methods according to claim 11, the wherein said route calling through Local wireless network comprises the described calling of end to the use of cellular network.
21. 1 kinds of methods data flow being delivered to IP network on the basis that the passive network based on profile switches from cellular network, comprising:
Use cellular data network from mobile device receiving equipment unique identifiers beacon at WAP (wireless access point) place;
From described beacon extraction equipment unique identifiers;
Described device-specific identifier and access point supplier information are sent to be configured with and present network and switch the networked server of software, described in present network and switch software for determining that based on transmitted device-specific identifier cellular network provider calling switches requirement;
Mobile device calling switch data is received from described server;
Local wireless network certification and link information are sent to described mobile device to promote that the local wireless activated between described mobile device and access point connects from access point; And
Promote that the data network of described mobile device connects via Local wireless network instead of by cellular data network.
22. 1 kinds of WAP (wireless access point) being adapted to checkout equipment unique identifiers beacon, comprising:
Wireless router, this wireless router comprises:
Be adapted to the MAC layer function that mark presents packet;
Dock to send with adaptive MAC layer function and receive divide into groups in present data present function; And
With described present function dock to present data to communicate with outside networked server present client functionality.
23. access points according to claim 22, the wherein said recipient address presenting packet has nothing to do with recipient.
24. access points according to claim 23, the wherein said recipient address presenting packet is 0xFFFFFFFFFFFF.
25. access points according to claim 22, wherein said access point performs the signal strength detection to presenting the wireless signal of packet described in comprising.
26. access points according to claim 25, wherein said access point present function executive signal intensity detection.
27. access points according to claim 22, wherein said access point adds timestamp the mark presenting packet at least first identified.
28. access points according to claim 27, the function execution that presents of wherein said access point adds timestamp.
29. access points according to claim 22, wherein said beacon is that the radio-frequency channel by meeting 802.11 detects.
30. 1 kinds of checkout equipment unique identifiers letter calibration methods, comprising:
At access point place by reception of wireless signals packet, the recipient address of wherein said packet has nothing to do with recipient;
What received packet was forwarded to described access point from the adaptive MAC layer facility of described access point presents facility;
Facility is presented from described packet extraction equipment unique identifiers described in utilization; And
Extracted device-specific identifier is forwarded to be adapted to perform together with access point identity data and presents the outside networked server that network switches mandate.
31. methods according to claim 30, wherein said radio signal be meet 802.11 radio-frequency channel.
32. methods according to claim 30, comprise further and receive described beacon in response at described access point place, transmit electronic response by wireless signal to described mobile device.
33. methods according to claim 30, wherein said device-specific identifier comprises the MAC Address through conversion having the equipment of wireless capability receiving described beacon from it.
34. methods according to claim 30, the wherein said recipient address presenting packet is 0xFFFFFFFFFFFF.
35. methods according to claim 30, wherein said access point performs the signal strength detection to presenting the wireless signal of packet described in comprising.
36. methods according to claim 35, wherein said access point present function executive signal intensity detection.
37. methods according to claim 30, wherein said access point adds timestamp the mark presenting packet at least first identified.
38. according to method according to claim 37, and the function execution that presents of wherein said access point adds timestamp.
39. methods according to claim 30, wherein said beacon comprises previously not by device-specific identifier that described access point receives.
40. 1 kinds are adapted to the cell phone generating device-specific identifier beacon, comprise:
Be adapted to the MAC layer function transmitting and present beacon packet; And
Present function, its for:
With adaptive MAC layer function to fetching device-specific identifier data configuration to presenting in beacon packet;
Determine the transmission channel transmitting beacon packet;
Determine beacon transmission interval; And
Communicate with outside networked server and present data.
41. cell phones according to claim 40, the wherein said beacon packet that presents is that radio-frequency channel by meeting 802.11 transmits.
43. cell phones according to claim 40, wherein said device-specific identifier comprises the MAC Address through conversion of described cell phone.
44. cell phones according to claim 40, the wherein said recipient address presenting packet is 0xFFFFFFFFFFFF.
45. 1 kinds generate device-specific identifier letter calibration method, comprising:
Obtain the device-specific identifier of mobile device;
Utilize configuration presenting firmware to determine and present beacon transmissions channel on the mobile apparatus;
Described device-specific identifier and the described beacon transmissions channel that presents are sent to the adaptive MAC layer function operated on described mobile device; And
Based on present beacon transmission interval periodically transmit comprise described device-specific identifier present beacon.
46. methods according to claim 45, wherein determine to present transmission intercal based on the response presenting beacon transmitted received described mobile device.
47. methods according to claim 45, wherein convert the key based on long-range distribution to MAC Address.
48. methods according to claim 45, wherein convert the byte shift comprising MAC Address to MAC Address.
49. methods according to claim 45, wherein convert based on the DHCP update cycle in rental period MAC Address.
50. methods according to claim 45, wherein said device-specific identifier comprises the MAC Address through conversion of described mobile device.
The method that 51. 1 kinds of MAC Address through conversion used in the wireless radio transmission of wireless device generate, comprising:
Obtain the MAC Address of wireless device;
Based on remote cipher key, utilize the conversion firmware operated on the mobile apparatus that described MAC Address is transformed into device-specific identifier; And
Described wireless device is configured to described device-specific identifier instead of described MAC Address are used for follow-up wireless radio transmission.
52. methods according to claim 51, wherein said remote cipher key is the part of the time of a day data value.
53. methods according to claim 51, wherein said remote cipher key is based on the DHCP update cycle in rental period.
54. 1 kinds of methods of the radio communication with mobile phone being carried out to monetization from cellular domains to the transformation in WI-FI territory, comprising:
Using the instruction of Local wireless network owing to presenting the switching of passive network from cellular network reception mobile device at networked server place;
The cellular network provider of cellular network is determined based on the analysis of described server to described instruction;
Calculate the value that described mobile device uses Local wireless network instead of cellular network; And
A part for calculated value is asked for cellular network provider.
55. methods according to claim 54, wherein calculate described value based on the special transformation guide of cellular network provider.
56. methods according to claim 54, wherein determine that cellular network provider comprises: the device-specific identifier extracting described mobile device from described instruction; And come from the equipment simple document search cellular network provider identification data device profile database based on extracted device-specific identifier.
CN201280061280.6A 2011-10-12 2012-10-12 Presence platform for passive radio access network-to-radio access network device transition Pending CN104255059A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201161546086P 2011-10-12 2011-10-12
US61/546086 2011-10-12
PCT/US2012/060087 WO2013056143A1 (en) 2011-10-12 2012-10-12 Presence platform for passive radio access network-to-radio access network device transition

Publications (1)

Publication Number Publication Date
CN104255059A true CN104255059A (en) 2014-12-31

Family

ID=48082528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201280061280.6A Pending CN104255059A (en) 2011-10-12 2012-10-12 Presence platform for passive radio access network-to-radio access network device transition

Country Status (3)

Country Link
EP (1) EP2777325A4 (en)
CN (1) CN104255059A (en)
WO (1) WO2013056143A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111345113A (en) * 2017-08-28 2020-06-26 洛卡解决方案有限责任公司 System and method for selectively deactivating transmitter mode of cargo monitoring device
CN111434088A (en) * 2018-01-08 2020-07-17 英国电讯有限公司 Data processing method

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9445353B2 (en) 2006-09-14 2016-09-13 Omnitrail Technologies Inc. Presence platform for passive radio access network-to-radio access network device transition
WO2015061673A1 (en) * 2013-10-25 2015-04-30 Roximity, Inc. Beacon security
CN105284138B (en) * 2014-06-09 2019-08-06 雷蛇(亚太)私人有限公司 Radio communications system and radio communication method
EP2997788B1 (en) 2014-06-09 2019-01-02 Razer (Asia-pacific) Pte Ltd Radio communication devices and methods for controlling a radio communication device
WO2015195021A1 (en) * 2014-06-18 2015-12-23 Telefonaktiebolaget L M Ericsson (Publ) Method for generating a common identifier for a wireless device in at least two different types of networks
US11496932B2 (en) * 2018-03-05 2022-11-08 Signify Holding B.V. Beacon-based handover option for commissioning and control of wireless network devices

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004015725A (en) * 2002-06-11 2004-01-15 Canon Inc Communication system, authentication method in communication system, program therefor and recording medium therefor
CN1682487A (en) * 2003-05-15 2005-10-12 松下电器产业株式会社 Radio lan access authentication system
US20070256135A1 (en) * 2006-04-26 2007-11-01 Sbc Knowledge Ventures, L.P. Wireless local area network access controlled by cellular communications
CN101317437A (en) * 2004-05-07 2008-12-03 美商内数位科技公司 Supporting emergency calls on a wireless local area network

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8682279B2 (en) * 2004-05-07 2014-03-25 Interdigital Technology Corporation Supporting emergency calls on a wireless local area network
DE102004045147A1 (en) * 2004-09-17 2006-03-23 Fujitsu Ltd., Kawasaki A setting information distribution apparatus, method, program and medium, authentication setting transfer apparatus, method, program and medium, and setting information receiving program
EP1965595B1 (en) * 2007-02-27 2009-10-28 Lucent Technologies Inc. Wireless communication techniques for controlling access granted by a security device
US9319879B2 (en) * 2007-05-30 2016-04-19 Apple Inc. Method and apparatus for security configuration and verification of wireless devices in a fixed/mobile convergence environment
US8265281B2 (en) * 2007-07-09 2012-09-11 Qualcomm Incorporated IP service authorization in wireless communications networks
US8295864B2 (en) * 2008-10-10 2012-10-23 Samaha Tareq A Sending and receiving text-based messages over a mobile phone via a network connected computer
JP5472977B2 (en) * 2009-08-27 2014-04-16 日本電気通信システム株式会社 Wireless communication device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004015725A (en) * 2002-06-11 2004-01-15 Canon Inc Communication system, authentication method in communication system, program therefor and recording medium therefor
CN1682487A (en) * 2003-05-15 2005-10-12 松下电器产业株式会社 Radio lan access authentication system
CN101317437A (en) * 2004-05-07 2008-12-03 美商内数位科技公司 Supporting emergency calls on a wireless local area network
US20070256135A1 (en) * 2006-04-26 2007-11-01 Sbc Knowledge Ventures, L.P. Wireless local area network access controlled by cellular communications

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111345113A (en) * 2017-08-28 2020-06-26 洛卡解决方案有限责任公司 System and method for selectively deactivating transmitter mode of cargo monitoring device
CN111345113B (en) * 2017-08-28 2024-01-02 艾默生数字冷链公司 System and method for selectively deactivating transmitter modes of cargo monitoring devices
CN111434088A (en) * 2018-01-08 2020-07-17 英国电讯有限公司 Data processing method
US11336623B2 (en) 2018-01-08 2022-05-17 British Telecommunications Public Limited Company Data processing method

Also Published As

Publication number Publication date
WO2013056143A1 (en) 2013-04-18
EP2777325A4 (en) 2015-10-21
EP2777325A1 (en) 2014-09-17

Similar Documents

Publication Publication Date Title
CN104255059A (en) Presence platform for passive radio access network-to-radio access network device transition
US9204376B2 (en) Profile based passive network switching
US9445353B2 (en) Presence platform for passive radio access network-to-radio access network device transition
EP2569986B1 (en) Methods and apparatus to provide network capabilities for connecting to an access network
CN101779477B (en) Base station initiated proximity service discovery and connection establishment
EP3028506B1 (en) Access network selection and connection methods, devices, and computer programs
US9723540B2 (en) Bluetooth-enabled femto access control
CN110603801A (en) Hierarchical developer unlocking of network hubs with software defined radio protection
CN101243649B (en) International regulatory compliance for ad hoc networking
CN104871598A (en) Wireless access point
RU2010109858A (en) ACCESS MANAGEMENT FOR A SELF-ORGANIZING BASIC STATION WITH A SMALL COVERAGE AREA
KR20130040908A (en) Methods and apparatus to authenticate requests for network capabilities for connecting to an access network
CN103828412A (en) Methods of and systems for remotely configuring a wireless device
KR20130053413A (en) Discover network capabilities for connecting to an access network
CN105557047A (en) Communication system, mobile station device, and communication method
CN102239719A (en) Verifying neighbor cell
EP3001709A1 (en) Communication terminal, base station apparatus and server apparatus
CN105530589A (en) Bluetooth beacon device, wireless LAN terminal authentication access system and wireless LAN terminal authentication access method
US20110055554A1 (en) Wireless personal area network accessing method
CN107615791A (en) Apparatus and method for adding M2M services
CN110808942A (en) Subscription information configuration method and communication equipment
CN103546511A (en) Method for realizing establishment of distributed network for multiple WIFI (wireless fidelity) equipment through WIFI, software program and server
CN204231671U (en) A kind of Bluetooth beacon device and WLAN terminal authentication connecting system
JP2014511488A (en) Method for locating a wireless device in an environment with a wireless network having at least one access point
JP2007272399A (en) Service providing system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141231

WD01 Invention patent application deemed withdrawn after publication