WO2014174343A1 - Sessid: semantic ssid - Google Patents

Sessid: semantic ssid Download PDF

Info

Publication number
WO2014174343A1
WO2014174343A1 PCT/IB2013/053310 IB2013053310W WO2014174343A1 WO 2014174343 A1 WO2014174343 A1 WO 2014174343A1 IB 2013053310 W IB2013053310 W IB 2013053310W WO 2014174343 A1 WO2014174343 A1 WO 2014174343A1
Authority
WO
WIPO (PCT)
Prior art keywords
sessid
ssid
services
new
devices
Prior art date
Application number
PCT/IB2013/053310
Other languages
French (fr)
Inventor
Rasmus Ulslev PEDERSEN
Original Assignee
Rup It
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rup It filed Critical Rup It
Priority to PCT/IB2013/053310 priority Critical patent/WO2014174343A1/en
Publication of WO2014174343A1 publication Critical patent/WO2014174343A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a service scheme for wireless networks, referred to as Se mantic Service Set Identification (SeSSID). SeSSID makes it possible to provide a set of meta-functionality on top of current wireless technology. It does so by imposing a distinct meaning (hence the word semantic) to the service set identifier (SSID) of wireless 802.11 devices/access points. By deployment of a new 802.11 SSID naming scheme - namely SeSSID - existing Internet infrastructures can be used to solve a number of challenges within the existing and foreseeable 802.11 network structure. Described is a method to utilize the SSID of 802.11 wireless networks in order to solve discovery, association, and/or authentication problems using direct and indirect service discovery with the aid of a SeSSID lookup server.

Description

SESSID: SEMANTIC SSID Technical Field
Wireless Networks
Background Art
The SeSSID is primarely relying on existing and forthcoming 802.11 wireless infrastructures as described here: "http://en.wikipedia.org/wiki/IEEE_802.11"
Technical Problem
The technical problem is that devices need to be able to discover, verify, and exploit services that could be available using wireless services. Devices can discover wireless networks, but they have no means to directly, and potentially without association, query and search for validated information regarding given 802.11 access points. Scanning for wireless networks is the usual approach and decision to join can be ad-hoc and potentially unsafe as the originator is generally not verifiable. From a commercial aspect, a number of new services related to context-sensitive applications ranging across industry verticals such as smart grid/buildings/homes, telemedicine, Internet of Things, and telematics are is great need of easy-to-use M2M solutions that work even on existing wireless 802.11 communication devices. A number of different wireless solutions are developed and being developed. For each new standard, a potentially new island of functionality emerges. 802.11 radios hold the potential to be the backbone of the new wireless internet and a smart standard gateway/bridge for utilizing services provided by various 802.15.4 networks. Increasing traffic and logistics transportation are acknowledged global challenges and a need to provide new innovative wireless infrastructure services is significant.
Technical Solution
This patent claim relates to a new service scheme for wireless networks. We refer to it as Semantic Service Set Identification (SeSSID). SeSSID makes it possible to provide a new set of meta-functionality on top of current wireless technology. It does so by imposing a distinct meaning (hence the word semantic) to the service set identifier (SSID) of wireless 802.11 devices/access points. By deployment of a new 802.11 SSID naming scheme - namely SeSSID - existing Internet infrastructures can be used to solve a number of important challenges within the existing and foreseeable 802.11 network structure. A number of so-called use cases are listed in Appendix 1 to illustrate example cases of what the SeSSID is capable of. We describe a method to utilize the SSID of 802.11 wireless networks in order to solve important discovery, association, and/or authentication problems.
It is the intention of the SeSSID patent's claims to be used in subsequent standardization processes: However, the goal it first is to speed up that process by issuing this patent and establish sound commercial processes with using the patent, while gathering and instituting a consortium of companies/organizations that can push SeSSID to its full potential.
The patent describes a new meta-net on top of the existing WLAN/WIFI based internet. It is possible to use the 802.11 SSID string of up to 32 bytes to display, consume, and even transmit a new type of information 'on top' of the existing, forthcoming, and already installed WIFI products.
Two or more devices can establish a trusted and/or authenticated connection using WLAN SSID names in new ways. A device is typically a small WLAN module, mobile phone, tablet, router, or PC with WIFI capabilities. Element id zero (the SSID) of 802.11 (probe) management frames and beacons are extended with new meta-functionality to support uni- and bi-directional discovery and/or authentication.
A SeSSID is zero, one, or more 802.11 frames which provides a new meta-service layer to existing WIFI infrastructures using a database/register to look up additional meaning and services. It use the 802.11 beacon frames to discover the SeSSID ((a SSID or HESSID/ESSIdentifier) with semantic meaning) this can be done in passive mode, active mode, or in beacon table mode.
Def. 1) Zero packet SeSSID: The SSID is not broadcasted (ie. no beacon frames) but a client/server device are able to acquire information/data through other means (such as NFC as discussed later).
Def. 2) Unchanging SeSSID: The same SeSSID is broadcasted using 802.11 (management) frames; usually multiple times pr. second. Upon discovery, a client can identify it as a SeSSID (with extra meaning) and not a traditional 802.11 SSID.
Def. 3) Multi-packet dynamic SeSSID: The SeSSID is now a more abstract sequential entity that is broadcasted like SSID1, SSID2, SSID3,..,SSIDn. This makes it possible to use the existing SSID as a TCP-like session structure.
A SeSSID is encoded such that the byte string, which make up the SSID conveys a deeper semantic meaning. This is accomplished through byte sequences that would consist of combinations of printable, non-printable, and control characters. Illustrations of different SeSSID schemes are exhibited in the use cases later in the hereto patent claim.
Semantic Rules: The protocol of the semantic service id is logically divided into two parts:
1. The semantic part, which can be as simple as 'Free Coffee' or as complicated as a binary protocol describing some proprietary routing protocol.
2. The ID part, which is static or dynamic, depending on if the case is used for discovery and/or association and/or authentication.
Figure SeSSID1FILE-appb-I000001
In some situations, there is not a need for the first part, as the ID part will serve as a lookup in a remote ID service mapping register. This register (database) can reside on a central SESSID server or being distributed to relevant parties (that also have a SeSSID). If the semantic part is intended to be human-readable then it is recommended to use byte values in the lower end of the Ascii character set. For example *, +, -, etc. If the semantic part is not intended to be human readable, then it would be more user friendly to use bytevalues in the SSID of value 123 and higher (including characters in the extended Ascii set). Ascii table value 122 corresponds to 'z'.
If the SeSSID is not intended for human reading or part of a sequence of different SSID values belonging to a SeSSID session, it can make sense to prepend the SSID with a character such as '≈' (extended Ascii code 247). Then a sequence of bytes can depict the desired semantic meaning (actions to be made) and the ID part of the SeSSID can be prepended by the tilde character '~' (Ascii code 126). Some characters in the Ascii table already have an associated meaning among people, and it is possible to extend existing Web 2.0 services using this patent. Examples of some characters that have some associated meaning could be the '@', '#', or '+' characters to name a few.
Direct Discovery: Two or more devices can discover each other using the 802.11 management frame information element format applicable to the 802.11. A device (also named station (STA)) can also use the wireless network management services to obtain a list of SeSSIDs, which is a list of SSIDs that is encoded with extra meaning, such that they can be utilized in an overlay service. Multiple SeSSIDS can also be discovered by using the wild card SSID in the existing 802.11 MLME-CHANNELREQUEST.request, MLME-CHANNELUSAGE.request, beacons, and so on. In other instances, a particular SeSSID is requested]. It can for example be a short lived SSID that is not broadcasted but only one that 'informed' clients would know about. This knowledge can be from a SeSSID database for example or a specific short-lived challenge text/key provided each party from a third source. Using semantic rules and/or use of a central SeSSID database a device (STA) can issue 'qualified guesses' on which SSIDs that might be in a certain area. SeSSID context information may be augmented by additional information that can come from many sources (sensors) on a smart phone: GPS, other visible SSIDs, time of day, web-service lookup, NFC, etc.
Indirect Discovery: The indirect discovery method is when one of the devices use other information than the broadcasted SSID to learn about the presence of a possible Wifi connection. This information can be read from a sticker or saved on a RFID/NFC chip.
Indirect discovery can also be provided by an information provider, such as a website that may or may not use different filters to convey information about different SSID's that are of possible interests. It may be regarded as a type of 'yellow pages' for wireless access points.
Informed Discovery: It involves that at least one device is in scanning mode, while the other device broadcasts a SeSSID. This functionality can augment the existing 802.11 generic advertisement service (GAS) as SeSSID can be used for a first announcement of either directly available services or provide a lookup id for discovering a richer set of services.
Guided Discovery: SeSSID can be utilized in order to voice interest in something. That is done by broadcasting a SeSSID that in itself bears meaning, and/or a SeSSID that is an identifiable SeSSID in the SeSSID register. A request is such as the MLME.SCAN.request/MLME.SCAN.confirm in the 802.11 standards.
Association: One form of association is to use a third party service/server (or DNS-like hierarchical system) to assist the two (or group of) devices in establishing trust. Upon (1) discovery, the (A) device make (possibly encrypted) (2) query to the server (S). The server (S) creates two challenges (3) to each device. Device (B) then changes its SSID (see Functionality Section) to make the challenge visible. Device (A), then reads the challenge and know that it can trust that device (B) in fact is device (B). This means that it can either choose to login to the device, connect to its AP, look up which services are offered (a third party webserver) or another device.
Authentication: A static SeSSID is allocated to a person or object that needs/wants an ID that does not change. A SeSSID is retrieved from a pool of unallocated SeSSIDs. The length of the SeSSID depends on its use, but the upper limit is 32 bytes if only one 802.11 frame is used.
Dynamic SeSSID: A dynamic SeSSID is allocated by a given SeSSID authority, such as a centrally located trusted server. This temporary ID can be used as a one-time ticket/password depending on the level of encryption/security measures that were taken when distributing the requested SeSSID.
Public/Private/Shared Keys: If the SeSSID is to be used to initiate an encrypted connection then public/private key pairs can be used. Client SeSSID devices can read the public key displayed in the SeSSID, and encrypt a message for the SeSSID receiver/server device. The client/server roles are not necessary static, and may be employed simultaneously in some instances. One example could be when a SeSSID session using a shared secret key is the goal of establishing a connection (for example using AES). The announced (ie. encoded in the SSID) public key of a device can be verified by a client lookup in a trusted SeSSID issuing entity. This is a service similar to existing public/private key pairs. Existing tools such as openssl can be used to generate the public/private keypairs for say RSA.
Advantageous Effects
Use case 1:: Smart City: Any given city - large or small - can consider using SeSSID devices/services to enhance existing services and provide new ones. It amounts to having a SeSSID broadcast device a given service, and providing means (such as a mobile application) to its citizens. Example applications could be bus stops, train stations, taxis, libraries etc.
Use case 2: Staying in Contact or Finding friends/kids in crowded places: It is possible to stay in contact with one or more friends when people are in crowded places such as a bar, a concert, or in a shopping mall. The SeSSID can be used to provide some means of knowing that one's friends is close by, or take appropriate action if the signal goes out of range.
Use case 3:: Multi-agents: It has long been a vision to use 'intelligent' software agents in the Internet. The SeSSID can allow software agents to 'jump' from wireless access point or wireless device to wireless device. At any point an authentication can be demanded and the software agent would need to go through an authentication procedure using the SeSSID database or a licensed de-central register.
Use case 4:: Smart House/Smart Building: SeSSID can be used to make a house smart/intelligent in terms adopting its features (water, heat, multimedia etc.) to each habitant in the house. A device (such as a smartphone) can be utilized to scan for SeSSID-enabled devices in the near vicinity. The RSSI signal can be used to determine how close the service point is and this can be used as valuable information for a smart house control system.
Use case 5:: Smart Appliances and Service: Appliances can broadcasts their need service using the SeSSID. This allows for a non-intrusive alternative to wired service messages. For example, a firmware update is possible because trust can be established wirelessly.
Use case 6:: P2P networking: It is conceivable that distributed and local SeSSID databases can exist. How the central SeSSID register is implemented, is domain and application specific. Some SeSSID services may prefer a royalty fee structure for using the SeSSID patent while most will want to use a central trusted authority such as SeSSID.net. SeSSIDs can also be used for 802.11 mesh networking services.
Use case 7:: Emergency Situations: A device can start broadcasting a semantic service ID based on some rules. It can be lack of activity on the movement sensors (if one is trapped in an avalanche). It can be a very hard bump (ie. if one is involved in a car accident).
Use case 8:: Air Bags: Cars can use the SeSSID functionality to warn each other about slippery roads, accidents etc. With the use of the SeSSID it is possible to provide a dynamic and flexible discovery, communication, and authentication protocol using existing 802.11 hardware.
Use case 9:: Bitcoin: Bitcoin is one of the first implementations of so-called crypto-currency . A system like Bitcoin (and off course Bitcoin itself) can be improved by adding SeSSID lookup to its existing solutions. It can be used to find other 'Bitcoin' people in the near vicinity and perform transactions. It can also be a merchant (a coffee shop) that announces a great offer of latte and that he accepts Bitcoin as a currency.
Use case 10:: SeSSID Banner Text: Banner text can be broadcast using the SeSSID. Possibly in use with an operator for broadcasting such as '*' meaning many. If people only want to see banner text from authenticated sources then it can use the ID part of the semantic SeSSID.
Use case 11:: ONS: The Object Name Service is an example of an existing service which can utilize the SeSSID lookup service.
Use case 12:: 'Rumor-nets': It is possible to use the SeSSID scheme to let rumors fluctuate among Wifi access points. One access point or device that learns something of interest can relay this information to other nodes.
Use case 13:: Network-Bridge: The SeSSID scheme can be used as a bridge between different protocols. For example it can provide means to establish a bridge between say a Zigbee network and an Wifi device. For the other Wifi device to learn that there is a Zigbee connected to some Zigbee/Wifi bridge, it is possible to use the SeSSID scheme to broadcast the PAN ID and services offered by this otherwise hidden network.
Use case 14:: Guest in a House: Being a guest in a friend's house involves getting a password for the local Wifi network. With SeSSID it is possible to avoid this manual process as the broadcasted SeSSID can be used to make a safe/encrypted lookup in a central database.
Use case 15:: NFC: Devices can utilize the SeSSID to perform a first level filtering interest. Then NFC can be used to finalize the association by either using two devices such as smartphones, or an NFC tag and a NFC reader. Some device (such as a smart phone) can read the NFC chip, its ID, and the intended action. It can then broadcast it for other nearby devices to learn about its existence. There are huge numbers of NFC tags available already today and the patent thus enhances existing technology.
Use case 16:: Passive RFID/NFC/Active RFID Gateway: SeSSID can be used to either broadcast one RFID/NFC ID (including the intended action programmed onto the NFC chip, such as an URL) thus making the effective range of passive RFID/NFC greater. This scenario can help in intelligent logistics as one SeSSID Gateway can quickly transmit to a tollbooth the set of RFID/NFC tags inside the truck (perhaps learned by the device when the truck was loaded). Consequently, it becomes possible to follow goods in realtime without slowing down traffic, thus lowering carbon footprint of ship, train, air, and road transportation.
Use case 17:: Disaster Sites/War Zones: In case of real disasters such as floods, tsunamis, tornados, earthquakes, chemical explosions, nuclear power plant accidents, or war zones it is likely that the existing Internet infrastructure become non-functional. However, in many instances it is like that a sufficient number of smart phones are functional (ie. 3G) in a given active disaster zone. If such smart phones/devices are equipped with a SeSSID-enabled app it is then possible to create a trusted peer2peer network that is either isolated or partly connected to the Internet. It can allow trusted messages to be delivered/sent and assist victims in the immediate timeframe following a disaster.
Use case 18:: Web 2.0/Web 3.0: Most the existing Web 2.0 services can benefit from using a central SeSSID register or a licensed SeSSID model. Companies such as Twitter, LinkedIn, Facebook, or Google+ to name a few examples, can gain from using SeSSID: They can use the patented SeSSID mechanisms to extend and enhance their services. Using appropriate filtering and lookup mechanisms it becomes possible to find former colleagues, friends' friends, persons you do not know from a picture, but want to meet and vice versa. Some companies can complement their existing services with SeSSID and invent new ones.
Use case 19:: Disabled People (semantic services): The SeSSID allows trusted and critical services to be announced to disabled people. This can be based on an individual SeSSID account or part of a group profile. For instance, a blind person can use a SeSSID-enabled product to discover, associate and trust a service tailored to him/her. It can be an elevator that announces its layout to a discrete hearing aid or a pair of Google Classes that display (trusted and relevant) information to hearing-impaired people.
Use case 20:: Infrastructure Use Cases: IP routing ( It is possible to create an IP network on top of the (already IP-based) Internet). URI Schemes (It would be possible to use the SeSSID as a uri scheme such as: sessid://…)
Use case 21:: One-to-one Marketing (store front) and Digital Coupons: Store front and shopping mall marketing can be tailored to the specific customer based on his/her preferences (preferences set up on a device such as a smart phone). It can be combined with GPS, compass, and other sensor inputs. A digital marketing service based on SeSSID broadcasting is both dynamic and it can allow the seller to optimize offers based on real-time feedback from customers. It is possible to create coupon-like products using the SeSSID scheme.
Use case 22:: Account and Phone SMS: The control mechanisms for ensuring the SeSSID belongs to the right person/object is dependent on the situation in which is it going to be utilized. It is possible to extend the SeSSID allocation mechanism to 3rd party systems such as established email accounts or online social media services like Twitter, Facebook, etc.
Use case 23:: M2M Information 'Trading': Machines and devices can announce (ie. using a SeSSID) either their possession of certain knowledge/data/information to others. Vice versa, other machines and devices can observe and consume these capabilities. It is possible to encode either part of or the complete information in the SeSSID.
Use case 24:: Internet of (Every)Thing Logistics: The SeSSID can be used as part of a 'glue' that enables many of the necessary underlying processes of the new internet.
Use case 25:: SeSSID Radio Transmitter: A specialized (thus comparably cheap) SeSSID radio transmitter can be built. This transmitter can broadcast (possibly with high transmission power) SeSSID information that is consumed by listening SeSSID aware devices.
Use case 26:: SeSSID Radio Receiver: A specialized radio receiver could be built much cheaper that todays Wifi receivers. Because it would only need to consume SSID information, a focused receiver silicon can be constructed orders cheaper than todays Wifi transceivers units. An example scenario could be a cheap SeSSID radio receiver that receive local configuration information for a new radio protocol at weightless.org.
Use case 27:: SeSSID Enabled MCUs/CPUs: A promising trend can be spotted in CPUs and micro controllers (MCU) that are shipped with Wifi capabilities. Manufactures of such devices can SeSSID enable their products by extending the API of the processor that drives that transceiver itself. A specialized API for SeSSID makes it easier for OEM manufactures and software developers to utilize SeSSID. Such a scenario is especially valuable to companies such as Intel and ARM.
Use case 28:: Battery Constrained Devices: The patent also address one of the dominating constraints for wireless embedded devices, namely the battery constraint. A battery on a WIFI device drains quickly if such a device needs to be online at all times. However, using the WLAN name (SSID) as a ticket it is not necessary for other devices to initiate a connection unless there is sufficient reason to do so. In other words, the authentication mechanism is avoided and introduced as a third party service.
Description of Drawings
Figure 1: The drawing shows one example use of SeSSID: It is two devices that associate using a third party. The third party is the SeSSID lookup server, which maps static and dynamic SSIDs to aid with lookup services. It is possible for the first client device A to verify that B is SeSSID 12345678, but engaging the SeSSID server, which issues a challenge to B. This challenge is an extra piece of information (9876584 in this case) which B uses to change its SSID. Device A can read this new information from a beacon frame or even visually if a display was in use. A login can then occur or it is often enough for the client A to have verified device B as an SeSSID enabled device (by verifying that the same challenge text was recieved).
Best Mode
To get started, a basic best mode setup would include two smart phones (Android for example), a relevant software development kit for a given device, and a server that is accessible using either a static IP address or prreferable a domain name. This will enable the scenario in Figure 1 to be achieved. For a company already working with wireless 802.11, the best mode is to update help documentation and refer to the SeSSID patent. For individuals, the best mode is to develop mobile applications that are either consumers or producers of SeSSID services. For merchants, the best mode would be to use mobile apps that are SeSSID enabled. For wireless R/D the best mode is to incorporate a Wifi tranceiver in new designs, and ensure that rapid change of SSID is enabled and stable. Please refer to the 28 use cases in the Section "Advantageous Effects". See Section Mode for Invention.
Mode for Invention
For a company already working with wireless 802.11, the best mode is to update help documentation and refer to the SeSSID patent. For individuals, the best mode is to develop mobile applications that are either consumers or producers of SeSSID services. For merchants, the best mode would be to use mobile apps that are SeSSID enabled. For wireless R/D the best mode is to incorporate a Wifi tranceiver in new designs, and ensure that rapid change of SSID is enabled and stable. Please refer to the 28 use cases in the Section "Advantageous Effects". Please refer to the 28 use cases in the Section "Advantageous Effects". See Section Best Mode.
Industrial Applicability
The invention of SeSSID is directly applicable to a large number of 802.11 radios. One example is mobile smart phones such as Android, IPhone, or Microsoft moble phones. These devices expose APIs which can set/get the SSID and thus also be used for SeSSID. Furthermore, it is straightforward to include better support for SeSSID functionality in future wireless radio chips. For multiradio chips such as those with Bluetooth and 802.11 functionality, SeSSID can be used to inform other devices about the capabilities of such radios. Machine to machine (M2M) functionality can be realized using both existing 802.11 radios and also new future products. It would be valuable if CPUs/MCUs coupled with one or more 802.11 tranceivers had a rich inherent SeSSID API directly from the producers such as ARM, Intel, Cisco, Broadcom, and so on.
Sequence List Text
N/A

Claims (2)

  1. Invention of a meta functionality on top of existing wireless 802.11 infrastructures using SSID as direct or indirect means to create a new semantic network overlay. SeSSID can be used to discover devices, associate to devices, and to trust devices in a new internet not only containing millions of webservers, but billions of potentially autonomous intelligent devices. We have described how SeSSIDs may be distinguised from existing SSIDs using special characters such as tilde (~) to place SeSSIDs at the bottom of an alfabetically sorted list of scanned SSIDs at some device/PC/server with 802.11 functionality.
  2. The invention and its applicability to existing and new 802.11 equipment is documented and illustrated with 28 use cases ranging from disaster recovery to digital storefront services to Web 2.0 enriched functionality optionally using central SeSSID servers to establish a chain of trust that can be used as a premise for trusted (ad-hoc) services. The 32 bytes of the 802.11 SSID represents an untapped source and possibility to create a plentora of new Internet of Things (IoT) services, and that is what we claim to have discovered in this patent application, which should serve as a basis for new profitable Internet services and standardization processes.
PCT/IB2013/053310 2013-04-26 2013-04-26 Sessid: semantic ssid WO2014174343A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/IB2013/053310 WO2014174343A1 (en) 2013-04-26 2013-04-26 Sessid: semantic ssid

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2013/053310 WO2014174343A1 (en) 2013-04-26 2013-04-26 Sessid: semantic ssid

Publications (1)

Publication Number Publication Date
WO2014174343A1 true WO2014174343A1 (en) 2014-10-30

Family

ID=48444465

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2013/053310 WO2014174343A1 (en) 2013-04-26 2013-04-26 Sessid: semantic ssid

Country Status (1)

Country Link
WO (1) WO2014174343A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107257385A (en) * 2017-07-28 2017-10-17 安徽华博胜讯信息科技股份有限公司 Intelligent cloud library system based on internet of things
EP3335403A4 (en) * 2015-10-15 2018-08-22 Samsung Electronics Co., Ltd. Method for assigning dynamic identifier to electronic device and device thereof
WO2018177879A1 (en) 2017-03-30 2018-10-04 Telecom Italia S.P.A. Method and system of cooperation among access gateways for bandwidth sharing
CN109195201A (en) * 2018-09-14 2019-01-11 珠海格力电器股份有限公司 Connect method, apparatus, storage medium and the user terminal of network
WO2020010300A1 (en) * 2018-07-05 2020-01-09 Qualcomm Incorporated Uplink service access via a wireless local area network (wlan)
US11032708B2 (en) 2018-09-26 2021-06-08 International Business Machines Corporation Securing public WLAN hotspot network access

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006043956A1 (en) * 2004-10-20 2006-04-27 Thomson Licensing Method for mobile terminal access to wireless lan based on access point services and service parameters
JP2006246433A (en) * 2005-02-03 2006-09-14 Canon Inc Communication apparatus and communication method
US20120099476A1 (en) * 2010-10-20 2012-04-26 Brian Mahaffy Pre-Association Discovery

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006043956A1 (en) * 2004-10-20 2006-04-27 Thomson Licensing Method for mobile terminal access to wireless lan based on access point services and service parameters
JP2006246433A (en) * 2005-02-03 2006-09-14 Canon Inc Communication apparatus and communication method
US20120099476A1 (en) * 2010-10-20 2012-04-26 Brian Mahaffy Pre-Association Discovery

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3335403A4 (en) * 2015-10-15 2018-08-22 Samsung Electronics Co., Ltd. Method for assigning dynamic identifier to electronic device and device thereof
WO2018177879A1 (en) 2017-03-30 2018-10-04 Telecom Italia S.P.A. Method and system of cooperation among access gateways for bandwidth sharing
CN107257385A (en) * 2017-07-28 2017-10-17 安徽华博胜讯信息科技股份有限公司 Intelligent cloud library system based on internet of things
WO2020010300A1 (en) * 2018-07-05 2020-01-09 Qualcomm Incorporated Uplink service access via a wireless local area network (wlan)
CN109195201A (en) * 2018-09-14 2019-01-11 珠海格力电器股份有限公司 Connect method, apparatus, storage medium and the user terminal of network
CN109195201B (en) * 2018-09-14 2021-04-23 珠海格力电器股份有限公司 Network connection method, device, storage medium and user terminal
US11032708B2 (en) 2018-09-26 2021-06-08 International Business Machines Corporation Securing public WLAN hotspot network access

Similar Documents

Publication Publication Date Title
US8305935B2 (en) Method and system for dynamic information exchange on location aware mesh network devices
EP2245790B1 (en) Authentication mechanisms for wireless networks
US8427979B1 (en) Method and system for dynamic information exchange on location aware mesh network devices
WO2014174343A1 (en) Sessid: semantic ssid
KR101710067B1 (en) Network access based on social-networking information
US20110235627A1 (en) Method and system for dynamic information exchange on a mesh network in a vehicle
US10455354B2 (en) Systems and methods for real-time user engagement and interactions
CN109889509A (en) Network assistance for machine-to-machine communication guides bootstrapping
CN105379312A (en) Device triggering
US20140380443A1 (en) Network connection in a wireless communication device
KR20050085484A (en) Location tracking of portable devices in a wireless network
KR101638349B1 (en) Method for communicating of message based on wifi direct and apparatus performing the method
JP5336486B2 (en) System and method for network configuration of wireless device for home network
CN104038912A (en) Security WIFI advertising method and system
Namiot et al. On proximity-based information delivery
JP2006166311A (en) Wireless communication terminal and wireless communication method
US20170265233A1 (en) Apparatus and method of connecting a mobile device to a field device
USRE47894E1 (en) Method and system for dynamic information exchange on location aware mesh network devices
JP2008236651A (en) Location information providing system, rfid antenna apparatus, and mobile phone terminal
Santa et al. Comprehensive vehicular networking platform for V2I and V2V communications within the walkie-talkie project
CN104937911A (en) Wireless communication device, communication system, method for controlling wireless communication device, and program
CN104301361B (en) Intelligent navigation method and system based on M2M system
JP4579592B2 (en) Information providing service system and method
US10694315B2 (en) Technique for allowing registered mobile users of the same or different social networks in the vicinity to use mobile devices of the same or different operation system to identify each other and exchange business information
KR100647768B1 (en) Method for providing ideal type person searching service

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13722848

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08.02.2016)

122 Ep: pct application non-entry in european phase

Ref document number: 13722848

Country of ref document: EP

Kind code of ref document: A1