WO2014174343A1 - Sessid: semantic ssid - Google Patents
Sessid: semantic ssid Download PDFInfo
- Publication number
- WO2014174343A1 WO2014174343A1 PCT/IB2013/053310 IB2013053310W WO2014174343A1 WO 2014174343 A1 WO2014174343 A1 WO 2014174343A1 IB 2013053310 W IB2013053310 W IB 2013053310W WO 2014174343 A1 WO2014174343 A1 WO 2014174343A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- sessid
- ssid
- services
- new
- devices
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a service scheme for wireless networks, referred to as Se mantic Service Set Identification (SeSSID). SeSSID makes it possible to provide a set of meta-functionality on top of current wireless technology. It does so by imposing a distinct meaning (hence the word semantic) to the service set identifier (SSID) of wireless 802.11 devices/access points. By deployment of a new 802.11 SSID naming scheme - namely SeSSID - existing Internet infrastructures can be used to solve a number of challenges within the existing and foreseeable 802.11 network structure. Described is a method to utilize the SSID of 802.11 wireless networks in order to solve discovery, association, and/or authentication problems using direct and indirect service discovery with the aid of a SeSSID lookup server.
Description
Wireless Networks
The SeSSID is primarely relying on existing and
forthcoming 802.11 wireless infrastructures as described here:
"http://en.wikipedia.org/wiki/IEEE_802.11"
The technical problem is that devices need to be
able to discover, verify, and exploit services that could be available using
wireless services. Devices can discover wireless networks, but they have no
means to directly, and potentially without association, query and search for
validated information regarding given 802.11 access points. Scanning for
wireless networks is the usual approach and decision to join can be ad-hoc and
potentially unsafe as the originator is generally not verifiable. From a
commercial aspect, a number of new services related to context-sensitive
applications ranging across industry verticals such as smart
grid/buildings/homes, telemedicine, Internet of Things, and telematics are is
great need of easy-to-use M2M solutions that work even on existing wireless
802.11 communication devices. A number of different wireless solutions are
developed and being developed. For each new standard, a potentially new island
of functionality emerges. 802.11 radios hold the potential to be the backbone
of the new wireless internet and a smart standard gateway/bridge for utilizing
services provided by various 802.15.4 networks. Increasing traffic and
logistics transportation are acknowledged global challenges and a need to
provide new innovative wireless infrastructure services is significant.
This patent claim relates to a new service scheme
for wireless networks. We refer to it as Semantic Service
Set Identification (SeSSID). SeSSID makes it possible to provide
a new set of meta-functionality on top of current wireless technology. It does
so by imposing a distinct meaning (hence the word semantic) to the
service set identifier (SSID) of wireless 802.11 devices/access points. By
deployment of a new 802.11 SSID naming scheme - namely SeSSID - existing
Internet infrastructures can be used to solve a number of important challenges
within the existing and foreseeable 802.11 network structure. A number of
so-called use cases are listed in Appendix 1 to illustrate example cases of
what the SeSSID is capable of. We describe a method to utilize the SSID of
802.11 wireless networks in order to solve important discovery, association,
and/or authentication problems.
It is the intention of the SeSSID patent's claims
to be used in subsequent standardization processes: However, the goal it first
is to speed up that process by issuing this patent and establish sound
commercial processes with using the patent, while gathering and instituting a
consortium of companies/organizations that can push SeSSID to its full
potential.
The patent describes a new meta-net on top of the
existing WLAN/WIFI based internet. It is possible to use the 802.11 SSID string
of up to 32 bytes to display, consume, and even transmit a new type of
information 'on top' of the existing, forthcoming, and already installed WIFI
products.
Two or more devices can establish a trusted and/or
authenticated connection using WLAN SSID names in new ways. A device is
typically a small WLAN module, mobile phone, tablet, router, or PC with WIFI
capabilities. Element id zero (the SSID) of 802.11 (probe) management frames
and beacons are extended with new meta-functionality to support uni- and
bi-directional discovery and/or authentication.
A SeSSID is zero, one, or more 802.11 frames which
provides a new meta-service layer to existing WIFI infrastructures using a
database/register to look up additional meaning and services. It use the 802.11
beacon frames to discover the SeSSID ((a SSID or HESSID/ESSIdentifier) with
semantic meaning) this can be done in passive mode, active mode, or in beacon
table mode.
Def. 1) Zero packet SeSSID: The SSID is not
broadcasted (ie. no beacon frames) but a client/server device are able to
acquire information/data through other means (such as NFC as discussed
later).
Def. 2) Unchanging SeSSID: The same SeSSID is
broadcasted using 802.11 (management) frames; usually multiple times pr.
second. Upon discovery, a client can identify it as a SeSSID (with extra
meaning) and not a traditional 802.11 SSID.
Def. 3) Multi-packet dynamic SeSSID: The
SeSSID is now a more abstract sequential entity that is broadcasted like
SSID1, SSID2, SSID3,..,SSIDn. This
makes it possible to use the existing SSID as a TCP-like session structure.
A SeSSID is encoded such that the byte string,
which make up the SSID conveys a deeper semantic meaning. This is accomplished
through byte sequences that would consist of combinations of printable,
non-printable, and control characters. Illustrations of different SeSSID
schemes are exhibited in the use cases later in the hereto patent claim.
Semantic Rules: The protocol of the semantic
service id is logically divided into two parts:
1. The semantic part, which can be as simple as
'Free Coffee' or as complicated as a binary protocol describing some
proprietary routing protocol.
2. The ID part, which is static or dynamic,
depending on if the case is used for discovery and/or association and/or
authentication.
In some situations, there is not a need for the
first part, as the ID part will serve as a lookup in a remote ID service
mapping register. This register (database) can reside on a central SESSID
server or being distributed to relevant parties (that also have a SeSSID). If
the semantic part is intended to be human-readable then it is recommended to
use byte values in the lower end of the Ascii character set. For example *, +,
-, etc. If the semantic part is not intended to be human readable, then it
would be more user friendly to use bytevalues in the SSID of value 123 and
higher (including characters in the extended Ascii set). Ascii table value 122
corresponds to 'z'.
If the SeSSID is not intended for human reading
or part of a sequence of different SSID values belonging to a SeSSID session,
it can make sense to prepend the SSID with a character such as '≈' (extended
Ascii code 247). Then a sequence of bytes can depict the desired semantic
meaning (actions to be made) and the ID part of the SeSSID can be prepended by
the tilde character '~' (Ascii code 126). Some characters in the Ascii table
already have an associated meaning among people, and it is possible to extend
existing Web 2.0 services using this patent. Examples of some characters that
have some associated meaning could be the '@', '#', or '+' characters to name a
few.
Direct Discovery: Two or more devices can discover
each other using the 802.11 management frame information element format
applicable to the 802.11. A device (also named station (STA)) can also use the
wireless network management services to obtain a list of SeSSIDs, which is a
list of SSIDs that is encoded with extra meaning, such that they can be
utilized in an overlay service. Multiple SeSSIDS can also be discovered by
using the wild card SSID in the existing 802.11 MLME-CHANNELREQUEST.request,
MLME-CHANNELUSAGE.request, beacons, and so on. In other instances, a particular
SeSSID is requested]. It can for example be a short lived SSID that is not
broadcasted but only one that 'informed' clients would know about. This
knowledge can be from a SeSSID database for example or a specific short-lived
challenge text/key provided each party from a third source. Using semantic
rules and/or use of a central SeSSID database a device (STA) can issue
'qualified guesses' on which SSIDs that might be in a certain area. SeSSID
context information may be augmented by additional information that can come
from many sources (sensors) on a smart phone: GPS, other visible SSIDs, time of
day, web-service lookup, NFC, etc.
Indirect Discovery: The indirect discovery method
is when one of the devices use other information than the broadcasted SSID to
learn about the presence of a possible Wifi connection. This information can be
read from a sticker or saved on a RFID/NFC chip.
Indirect discovery can also be provided by an
information provider, such as a website that may or may not use different
filters to convey information about different SSID's that are of possible
interests. It may be regarded as a type of 'yellow pages' for wireless access
points.
Informed Discovery: It involves that at least one
device is in scanning mode, while the other device broadcasts a SeSSID. This
functionality can augment the existing 802.11 generic advertisement service
(GAS) as SeSSID can be used for a first announcement of either directly
available services or provide a lookup id for discovering a richer set of
services.
Guided Discovery: SeSSID can be utilized in order
to voice interest in something. That is done by broadcasting a SeSSID that in
itself bears meaning, and/or a SeSSID that is an identifiable SeSSID in the
SeSSID register. A request is such as the MLME.SCAN.request/MLME.SCAN.confirm
in the 802.11 standards.
Association: One form of association is to use a
third party service/server (or DNS-like hierarchical system) to assist the two
(or group of) devices in establishing trust. Upon (1) discovery, the (A) device
make (possibly encrypted) (2) query to the server (S). The server (S) creates
two challenges (3) to each device. Device (B) then changes its SSID (see
Functionality Section) to make the challenge visible. Device (A), then reads
the challenge and know that it can trust that device (B) in fact is device (B).
This means that it can either choose to login to the device, connect to its AP,
look up which services are offered (a third party webserver) or another
device.
Authentication: A static SeSSID is allocated to a
person or object that needs/wants an ID that does not change. A SeSSID is
retrieved from a pool of unallocated SeSSIDs. The length of the SeSSID depends
on its use, but the upper limit is 32 bytes if only one 802.11 frame is
used.
Dynamic SeSSID: A dynamic SeSSID is allocated by
a given SeSSID authority, such as a centrally located trusted server. This
temporary ID can be used as a one-time ticket/password depending on the level
of encryption/security measures that were taken when distributing the requested
SeSSID.
Public/Private/Shared Keys: If the SeSSID is to be
used to initiate an encrypted connection then public/private key pairs can be
used. Client SeSSID devices can read the public key displayed in the SeSSID,
and encrypt a message for the SeSSID receiver/server device. The client/server
roles are not necessary static, and may be employed simultaneously in some
instances. One example could be when a SeSSID session using a shared secret key
is the goal of establishing a connection (for example using AES). The announced
(ie. encoded in the SSID) public key of a device can be verified by a client
lookup in a trusted SeSSID issuing entity. This is a service similar to
existing public/private key pairs. Existing tools such as openssl can be used
to generate the public/private keypairs for say RSA.
Use case 1:: Smart City: Any given city - large
or small - can consider using SeSSID devices/services to enhance existing
services and provide new ones. It amounts to having a SeSSID broadcast device a
given service, and providing means (such as a mobile application) to its
citizens. Example applications could be bus stops, train stations, taxis,
libraries etc.
Use case 2: Staying in Contact or Finding
friends/kids in crowded places: It is possible to stay in contact with one or
more friends when people are in crowded places such as a bar, a concert, or in
a shopping mall. The SeSSID can be used to provide some means of knowing that
one's friends is close by, or take appropriate action if the signal goes out of
range.
Use case 3:: Multi-agents: It has long been a
vision to use 'intelligent' software agents in the Internet. The SeSSID can
allow software agents to 'jump' from wireless access point or wireless device
to wireless device. At any point an authentication can be demanded and the
software agent would need to go through an authentication procedure using the
SeSSID database or a licensed de-central register.
Use case 4:: Smart House/Smart Building: SeSSID
can be used to make a house smart/intelligent in terms adopting its features
(water, heat, multimedia etc.) to each habitant in the house. A device (such as
a smartphone) can be utilized to scan for SeSSID-enabled devices in the near
vicinity. The RSSI signal can be used to determine how close the service point
is and this can be used as valuable information for a smart house control
system.
Use case 5:: Smart Appliances and Service:
Appliances can broadcasts their need service using the SeSSID. This allows for
a non-intrusive alternative to wired service messages. For example, a firmware
update is possible because trust can be established wirelessly.
Use case 6:: P2P networking: It is conceivable
that distributed and local SeSSID databases can exist. How the central SeSSID
register is implemented, is domain and application specific. Some SeSSID
services may prefer a royalty fee structure for using the SeSSID patent while
most will want to use a central trusted authority such as SeSSID.net. SeSSIDs
can also be used for 802.11 mesh networking services.
Use case 7:: Emergency Situations: A device can
start broadcasting a semantic service ID based on some rules. It can be lack of
activity on the movement sensors (if one is trapped in an avalanche). It can be
a very hard bump (ie. if one is involved in a car accident).
Use case 8:: Air Bags: Cars can use the SeSSID
functionality to warn each other about slippery roads, accidents etc. With the
use of the SeSSID it is possible to provide a dynamic and flexible discovery,
communication, and authentication protocol using existing 802.11 hardware.
Use case 9:: Bitcoin: Bitcoin is one of the
first implementations of so-called crypto-currency . A system like Bitcoin (and
off course Bitcoin itself) can be improved by adding SeSSID lookup to its
existing solutions. It can be used to find other 'Bitcoin' people in the near
vicinity and perform transactions. It can also be a merchant (a coffee shop)
that announces a great offer of latte and that he accepts Bitcoin as a
currency.
Use case 10:: SeSSID Banner Text: Banner text can
be broadcast using the SeSSID. Possibly in use with an operator for
broadcasting such as '*' meaning many. If people only want to see banner text
from authenticated sources then it can use the ID part of the semantic
SeSSID.
Use case 11:: ONS: The Object Name Service is an
example of an existing service which can utilize the SeSSID lookup service.
Use case 12:: 'Rumor-nets': It is possible to use
the SeSSID scheme to let rumors fluctuate among Wifi access points. One access
point or device that learns something of interest can relay this information to
other nodes.
Use case 13:: Network-Bridge: The SeSSID scheme
can be used as a bridge between different protocols. For example it can provide
means to establish a bridge between say a Zigbee network and an Wifi device.
For the other Wifi device to learn that there is a Zigbee connected to some
Zigbee/Wifi bridge, it is possible to use the SeSSID scheme to broadcast the
PAN ID and services offered by this otherwise hidden network.
Use case 14:: Guest in a House: Being a guest in
a friend's house involves getting a password for the local Wifi network. With
SeSSID it is possible to avoid this manual process as the broadcasted SeSSID
can be used to make a safe/encrypted lookup in a central database.
Use case 15:: NFC: Devices can utilize the SeSSID
to perform a first level filtering interest. Then NFC can be used to finalize
the association by either using two devices such as smartphones, or an NFC tag
and a NFC reader. Some device (such as a smart phone) can read the NFC chip,
its ID, and the intended action. It can then broadcast it for other nearby
devices to learn about its existence. There are huge numbers of NFC tags
available already today and the patent thus enhances existing technology.
Use case 16:: Passive RFID/NFC/Active RFID
Gateway: SeSSID can be used to either broadcast one RFID/NFC ID (including the
intended action programmed onto the NFC chip, such as an URL) thus making the
effective range of passive RFID/NFC greater. This scenario can help in
intelligent logistics as one SeSSID Gateway can quickly transmit to a tollbooth
the set of RFID/NFC tags inside the truck (perhaps learned by the device when
the truck was loaded). Consequently, it becomes possible to follow goods in
realtime without slowing down traffic, thus lowering carbon footprint of ship,
train, air, and road transportation.
Use case 17:: Disaster Sites/War Zones: In case
of real disasters such as floods, tsunamis, tornados, earthquakes, chemical
explosions, nuclear power plant accidents, or war zones it is likely that the
existing Internet infrastructure become non-functional. However, in many
instances it is like that a sufficient number of smart phones are functional
(ie. 3G) in a given active disaster zone. If such smart phones/devices are
equipped with a SeSSID-enabled app it is then possible to create a trusted
peer2peer network that is either isolated or partly connected to the Internet.
It can allow trusted messages to be delivered/sent and assist victims in the
immediate timeframe following a disaster.
Use case 18:: Web 2.0/Web 3.0: Most the existing
Web 2.0 services can benefit from using a central SeSSID register or a licensed
SeSSID model. Companies such as Twitter, LinkedIn, Facebook, or Google+ to name
a few examples, can gain from using SeSSID: They can use the patented SeSSID
mechanisms to extend and enhance their services. Using appropriate filtering
and lookup mechanisms it becomes possible to find former colleagues, friends'
friends, persons you do not know from a picture, but want to meet and vice
versa. Some companies can complement their existing services with SeSSID and
invent new ones.
Use case 19:: Disabled People (semantic
services): The SeSSID allows trusted and critical services to be announced to
disabled people. This can be based on an individual SeSSID account or part of a
group profile. For instance, a blind person can use a SeSSID-enabled product to
discover, associate and trust a service tailored to him/her. It can be an
elevator that announces its layout to a discrete hearing aid or a pair of
Google Classes that display (trusted and relevant) information to
hearing-impaired people.
Use case 20:: Infrastructure Use Cases: IP
routing ( It is possible to create an IP network on top of the (already
IP-based) Internet). URI Schemes (It would be possible to use the SeSSID as a
uri scheme such as: sessid://…)
Use case 21:: One-to-one Marketing (store front)
and Digital Coupons: Store front and shopping mall marketing can be tailored to
the specific customer based on his/her preferences (preferences set up on a
device such as a smart phone). It can be combined with GPS, compass, and other
sensor inputs. A digital marketing service based on SeSSID broadcasting is both
dynamic and it can allow the seller to optimize offers based on real-time
feedback from customers. It is possible to create coupon-like products using
the SeSSID scheme.
Use case 22:: Account and Phone SMS: The control
mechanisms for ensuring the SeSSID belongs to the right person/object is
dependent on the situation in which is it going to be utilized. It is possible
to extend the SeSSID allocation mechanism to 3rd party systems such as
established email accounts or online social media services like Twitter,
Facebook, etc.
Use case 23:: M2M Information 'Trading': Machines
and devices can announce (ie. using a SeSSID) either their possession of
certain knowledge/data/information to others. Vice versa, other machines and
devices can observe and consume these capabilities. It is possible to encode
either part of or the complete information in the SeSSID.
Use case 24:: Internet of (Every)Thing Logistics:
The SeSSID can be used as part of a 'glue' that enables many of the necessary
underlying processes of the new internet.
Use case 25:: SeSSID Radio Transmitter: A
specialized (thus comparably cheap) SeSSID radio transmitter can be built. This
transmitter can broadcast (possibly with high transmission power) SeSSID
information that is consumed by listening SeSSID aware devices.
Use case 26:: SeSSID Radio Receiver: A
specialized radio receiver could be built much cheaper that todays Wifi
receivers. Because it would only need to consume SSID information, a focused
receiver silicon can be constructed orders cheaper than todays Wifi
transceivers units. An example scenario could be a cheap SeSSID radio receiver
that receive local configuration information for a new radio protocol at
weightless.org.
Use case 27:: SeSSID Enabled MCUs/CPUs: A
promising trend can be spotted in CPUs and micro controllers (MCU) that are
shipped with Wifi capabilities. Manufactures of such devices can SeSSID enable
their products by extending the API of the processor that drives that
transceiver itself. A specialized API for SeSSID makes it easier for OEM
manufactures and software developers to utilize SeSSID. Such a scenario is
especially valuable to companies such as Intel and ARM.
Use case 28:: Battery Constrained Devices: The
patent also address one of the dominating constraints for wireless embedded
devices, namely the battery constraint. A battery on a WIFI device drains
quickly if such a device needs to be online at all times. However, using the
WLAN name (SSID) as a ticket it is not necessary for other devices to initiate
a connection unless there is sufficient reason to do so. In other words, the
authentication mechanism is avoided and introduced as a third party
service.
Figure 1: The drawing shows one example use of
SeSSID: It is two devices that associate using a third party. The third party
is the SeSSID lookup server, which maps static and dynamic SSIDs to aid with
lookup services. It is possible for the first client device A to verify that B
is SeSSID 12345678, but engaging the SeSSID server, which issues a challenge to
B. This challenge is an extra piece of information (9876584 in this case) which
B uses to change its SSID. Device A can read this new information from a beacon
frame or even visually if a display was in use. A login can then occur or it is
often enough for the client A to have verified device B as an SeSSID enabled
device (by verifying that the same challenge text was recieved).
To get started, a basic best mode setup would
include two smart phones (Android for example), a relevant software development
kit for a given device, and a server that is accessible using either a static
IP address or prreferable a domain name. This will enable the scenario in
Figure 1 to be achieved. For a company already working with wireless 802.11,
the best mode is to update help documentation and refer to the SeSSID patent.
For individuals, the best mode is to develop mobile applications that are
either consumers or producers of SeSSID services. For merchants, the best mode
would be to use mobile apps that are SeSSID enabled. For wireless R/D the best
mode is to incorporate a Wifi tranceiver in new designs, and ensure that rapid
change of SSID is enabled and stable. Please refer to the 28 use cases in the
Section "Advantageous Effects". See Section Mode for Invention.
For a company already working with wireless 802.11,
the best mode is to update help documentation and refer to the SeSSID patent.
For individuals, the best mode is to develop mobile applications that are
either consumers or producers of SeSSID services. For merchants, the best mode
would be to use mobile apps that are SeSSID enabled. For wireless R/D the best
mode is to incorporate a Wifi tranceiver in new designs, and ensure that rapid
change of SSID is enabled and stable. Please refer to the 28 use cases in the
Section "Advantageous Effects". Please refer to the 28 use cases in the Section
"Advantageous Effects". See Section Best Mode.
The invention of SeSSID is directly applicable to a
large number of 802.11 radios. One example is mobile smart phones such as
Android, IPhone, or Microsoft moble phones. These devices expose APIs which can
set/get the SSID and thus also be used for SeSSID. Furthermore, it is
straightforward to include better support for SeSSID functionality in future
wireless radio chips. For multiradio chips such as those with Bluetooth and
802.11 functionality, SeSSID can be used to inform other devices about the
capabilities of such radios. Machine to machine (M2M) functionality can be
realized using both existing 802.11 radios and also new future products. It
would be valuable if CPUs/MCUs coupled with one or more 802.11 tranceivers had
a rich inherent SeSSID API directly from the producers such as ARM, Intel,
Cisco, Broadcom, and so on.
N/A
Claims (2)
- Invention of a meta functionality on top of existing wireless 802.11 infrastructures using SSID as direct or indirect means to create a new semantic network overlay. SeSSID can be used to discover devices, associate to devices, and to trust devices in a new internet not only containing millions of webservers, but billions of potentially autonomous intelligent devices. We have described how SeSSIDs may be distinguised from existing SSIDs using special characters such as tilde (~) to place SeSSIDs at the bottom of an alfabetically sorted list of scanned SSIDs at some device/PC/server with 802.11 functionality.
- The invention and its applicability to existing and new 802.11 equipment is documented and illustrated with 28 use cases ranging from disaster recovery to digital storefront services to Web 2.0 enriched functionality optionally using central SeSSID servers to establish a chain of trust that can be used as a premise for trusted (ad-hoc) services. The 32 bytes of the 802.11 SSID represents an untapped source and possibility to create a plentora of new Internet of Things (IoT) services, and that is what we claim to have discovered in this patent application, which should serve as a basis for new profitable Internet services and standardization processes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2013/053310 WO2014174343A1 (en) | 2013-04-26 | 2013-04-26 | Sessid: semantic ssid |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2013/053310 WO2014174343A1 (en) | 2013-04-26 | 2013-04-26 | Sessid: semantic ssid |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014174343A1 true WO2014174343A1 (en) | 2014-10-30 |
Family
ID=48444465
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2013/053310 WO2014174343A1 (en) | 2013-04-26 | 2013-04-26 | Sessid: semantic ssid |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2014174343A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107257385A (en) * | 2017-07-28 | 2017-10-17 | 安徽华博胜讯信息科技股份有限公司 | Intelligent cloud library system based on internet of things |
EP3335403A4 (en) * | 2015-10-15 | 2018-08-22 | Samsung Electronics Co., Ltd. | Method for assigning dynamic identifier to electronic device and device thereof |
WO2018177879A1 (en) | 2017-03-30 | 2018-10-04 | Telecom Italia S.P.A. | Method and system of cooperation among access gateways for bandwidth sharing |
CN109195201A (en) * | 2018-09-14 | 2019-01-11 | 珠海格力电器股份有限公司 | Connect method, apparatus, storage medium and the user terminal of network |
WO2020010300A1 (en) * | 2018-07-05 | 2020-01-09 | Qualcomm Incorporated | Uplink service access via a wireless local area network (wlan) |
US11032708B2 (en) | 2018-09-26 | 2021-06-08 | International Business Machines Corporation | Securing public WLAN hotspot network access |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006043956A1 (en) * | 2004-10-20 | 2006-04-27 | Thomson Licensing | Method for mobile terminal access to wireless lan based on access point services and service parameters |
JP2006246433A (en) * | 2005-02-03 | 2006-09-14 | Canon Inc | Communication apparatus and communication method |
US20120099476A1 (en) * | 2010-10-20 | 2012-04-26 | Brian Mahaffy | Pre-Association Discovery |
-
2013
- 2013-04-26 WO PCT/IB2013/053310 patent/WO2014174343A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006043956A1 (en) * | 2004-10-20 | 2006-04-27 | Thomson Licensing | Method for mobile terminal access to wireless lan based on access point services and service parameters |
JP2006246433A (en) * | 2005-02-03 | 2006-09-14 | Canon Inc | Communication apparatus and communication method |
US20120099476A1 (en) * | 2010-10-20 | 2012-04-26 | Brian Mahaffy | Pre-Association Discovery |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3335403A4 (en) * | 2015-10-15 | 2018-08-22 | Samsung Electronics Co., Ltd. | Method for assigning dynamic identifier to electronic device and device thereof |
WO2018177879A1 (en) | 2017-03-30 | 2018-10-04 | Telecom Italia S.P.A. | Method and system of cooperation among access gateways for bandwidth sharing |
CN107257385A (en) * | 2017-07-28 | 2017-10-17 | 安徽华博胜讯信息科技股份有限公司 | Intelligent cloud library system based on internet of things |
WO2020010300A1 (en) * | 2018-07-05 | 2020-01-09 | Qualcomm Incorporated | Uplink service access via a wireless local area network (wlan) |
CN109195201A (en) * | 2018-09-14 | 2019-01-11 | 珠海格力电器股份有限公司 | Connect method, apparatus, storage medium and the user terminal of network |
CN109195201B (en) * | 2018-09-14 | 2021-04-23 | 珠海格力电器股份有限公司 | Network connection method, device, storage medium and user terminal |
US11032708B2 (en) | 2018-09-26 | 2021-06-08 | International Business Machines Corporation | Securing public WLAN hotspot network access |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8305935B2 (en) | Method and system for dynamic information exchange on location aware mesh network devices | |
EP2245790B1 (en) | Authentication mechanisms for wireless networks | |
US8427979B1 (en) | Method and system for dynamic information exchange on location aware mesh network devices | |
WO2014174343A1 (en) | Sessid: semantic ssid | |
KR101710067B1 (en) | Network access based on social-networking information | |
US20110235627A1 (en) | Method and system for dynamic information exchange on a mesh network in a vehicle | |
US10455354B2 (en) | Systems and methods for real-time user engagement and interactions | |
CN109889509A (en) | Network assistance for machine-to-machine communication guides bootstrapping | |
CN105379312A (en) | Device triggering | |
US20140380443A1 (en) | Network connection in a wireless communication device | |
KR20050085484A (en) | Location tracking of portable devices in a wireless network | |
KR101638349B1 (en) | Method for communicating of message based on wifi direct and apparatus performing the method | |
JP5336486B2 (en) | System and method for network configuration of wireless device for home network | |
CN104038912A (en) | Security WIFI advertising method and system | |
Namiot et al. | On proximity-based information delivery | |
JP2006166311A (en) | Wireless communication terminal and wireless communication method | |
US20170265233A1 (en) | Apparatus and method of connecting a mobile device to a field device | |
USRE47894E1 (en) | Method and system for dynamic information exchange on location aware mesh network devices | |
JP2008236651A (en) | Location information providing system, rfid antenna apparatus, and mobile phone terminal | |
Santa et al. | Comprehensive vehicular networking platform for V2I and V2V communications within the walkie-talkie project | |
CN104937911A (en) | Wireless communication device, communication system, method for controlling wireless communication device, and program | |
CN104301361B (en) | Intelligent navigation method and system based on M2M system | |
JP4579592B2 (en) | Information providing service system and method | |
US10694315B2 (en) | Technique for allowing registered mobile users of the same or different social networks in the vicinity to use mobile devices of the same or different operation system to identify each other and exchange business information | |
KR100647768B1 (en) | Method for providing ideal type person searching service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13722848 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08.02.2016) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13722848 Country of ref document: EP Kind code of ref document: A1 |