EP3178244A1 - Managing private and public service set utilization - Google Patents
Managing private and public service set utilizationInfo
- Publication number
- EP3178244A1 EP3178244A1 EP15750534.8A EP15750534A EP3178244A1 EP 3178244 A1 EP3178244 A1 EP 3178244A1 EP 15750534 A EP15750534 A EP 15750534A EP 3178244 A1 EP3178244 A1 EP 3178244A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- client device
- service set
- join
- public service
- private
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 claims abstract description 29
- 230000008569 process Effects 0.000 description 15
- 230000004044 response Effects 0.000 description 10
- 238000007726 management method Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 238000013515 script Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 239000000523 sample Substances 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 239000004606 Fillers/Extenders Substances 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/67—Risk-dependent, e.g. selecting a security level depending on risk profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/73—Access point logical identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- This disclosure relates to managing private and public service set utilization.
- an access point such as a gateway device may provide a plurality of service sets to a customer premise for the delivery of wireless
- Each respective one of the plurality of service sets may be designated for use by a specific service and may be encrypted or unencrypted (e.g., private or public).
- a client device may potentially connect to the public service set rather than the private service set.
- a user may intend or a specific service may require that communications be delivered between a client device and access point through a private service set.
- FIG. 1 is a block diagram illustrating an example network environment operable to facilitate the management of connections between one or more client devices and an access point over one or more service sets.
- FIG. 2 is a block diagram illustrating an example access point operable to facilitate the management of connections between one or more client devices and an access point over one or more service sets.
- FIG. 3 is a flowchart illustrating an example process operable to facilitate the management of connections between one or more client devices and an access point over one or more service sets.
- FIG. 4 is a block diagram of a hardware configuration operable to facilitate the management of connections between one or more client devices and an access point over one or more service sets.
- an access point may maintain a list of client devices that have successfully associated with a private service set broadcast from the access point, and when a client device from the list attempts to connect to a public service set broadcast from the access point, the access point may deny the client device's attempt to connect to the public service set. Denying an attempt to connect to a public service set may provide a client device with more opportunities to connect to a private service set broadcast from a corresponding access point.
- an access point may deny a predetermined number of public service set connection attempts from a client device and/or may deny public service set connection attempts from a client device for a predetermined period of time. After a predetermined number of attempts or period of time, a client device attempt to join a public service set may be allowed by a corresponding access point.
- An embodiment of the invention described herein may include a method comprising: (a) receiving a request from a client device to join a public service set, wherein the public service set is provided by an access point; (b) determining that the client device is associated with a private service set, wherein the association between the client device and the private service set is based upon a prior authentication between the client device and the private service set; (c) determining whether a condition exists for allowing the client device to join the public service set; and (d) if the determination is made that no condition exists for allowing the client device to join the public service set: (i) denying the client device request to join the public service set; and (ii) outputting a message to the client device informing the client device of the denial of the request.
- determining that the client device is associated with a private service set comprises identifying a media access control address associated with the client device in a list of media access control addresses associated with one or more devices that had previously been or that are currently associated with a private service set.
- the request received from the client device to join the public service set comprises a subsequent attempt by the client device to join the public service set, and the condition for allowing the client device to join the public service set comprises the number of previous attempts by the client device to join the public service set being greater than a predetermined threshold.
- the request received from the client device to join the public service set comprises a subsequent attempt by the client device to join the public service set
- the condition for allowing the client device to join the public service set comprises the passing of a predetermined duration of time between the time of a first attempt by the client device to join the public service set and the time of the subsequent attempt by the client device to join the public service set.
- the client device if the determination is made that a condition does exist for allowing the client device to join the public service set, the client device is allowed to join the public service set, and the client device is removed from a list of devices that have previously been or that are currently associated with a private service set.
- the message informing the client device of the denial of the request comprises an identification of a frequency band to be probed by the client device for a private service set.
- the message informing the client device of the denial of the request comprises a private service set identifier to be used by the client device in an attempt to join an associated private service set.
- An embodiment of the invention described herein may include an apparatus comprising: (a) an interface configured to be used to receive a request from a client device to join a public service set; (b) one or more modules configured to: (i) determine that the client device is associated with a private service set, wherein the association between the client device and the private service set is based upon a prior authentication between the client device and the private service set; (ii) determine whether a condition exists for allowing the client device to join the public service set; and (iii) deny the client device request to join the public service set if the determination is made that no condition exists for allowing the client device to join the public service set; and (c) an interface configured to be used to output a message to the client device informing the client device of the denial of the request if the
- An embodiment of the invention described herein may include one or more non-transitory computer readable media having instructions operable to cause one or more processors to perform the operations comprising: (a) receiving a request from a client device to join a public service set, wherein the public service set is provided by an access point; (b) determining that the client device is associated with a private service set, wherein the association between the client device and the private service set is based upon a prior authentication between the client device and the private service set; (c) determining whether a condition exists for allowing the client device to join the public service set; and (d) if the determination is made that no condition exists for allowing the client device to join the public service set: (i) denying the client device request to join the public service set; and (ii) outputting a message to the client device informing the client device of the denial of the request.
- FIG. 1 is a block diagram illustrating an example network environment 100 operable to facilitate the management of connections between one or more client devices and an access point over one or more service sets.
- an access point 105 may route communications to and from one or more client devices 110.
- the one or more client devices 110 may be provisioned to receive video service(s), data service(s), and/or voice services through one or more access points 105.
- an access point 105 may include a gateway, a cable modem, a wireless router including an embedded cable modem, a mobile hot-spot router, a multimedia over coaxial alliance (MoCA) node, a wireless extender, and any other device that is operable to route communications to and from a client device 110.
- MoCA multimedia over coaxial alliance
- client devices 110 may include a wide variety of devices such as televisions, mobile devices, tablets, set-top boxes, computers, and any other device that is capable of utilizing a video, data, or telephony service.
- an access point 105 may provide one or more service sets (e.g., public service set 115, private service set 120), and the service sets may be identified using unique service set identifiers (SSID). Service sets may be used for delivering traffic between a client device 110 and the access point 105, and each service set may be designated for a particular service (e.g., video, data, security, hotspot, etc.).
- service sets e.g., public service set 115, private service set 120
- SSID unique service set identifiers
- Service sets may be used for delivering traffic between a client device 110 and the access point 105, and each service set may be designated for a particular service (e.g., video, data, security, hotspot, etc.).
- the client devices 110 may identify a service set and may connect to a service set provided by the access point 105. Once connected to a service set, a client device 110 may receive content and/or services from upstream networks or servers (e.g., wide area network (WAN) 125), and may communicate with other client devices 110 connected to the same service set.
- upstream networks or servers e.g., wide area network (WAN) 125
- WAN wide area network
- client devices 110 and one or more access points 105 may include wireless communications (e.g., 802.11 packet exchanges).
- an access point 105 may route communications between client device(s) 110 and a wide area network (WAN) 125 via a subscriber network 130.
- the subscriber network 130 may include various networks such as coaxial cable, optical fiber, twisted pair network, wireless networks including 4G and LTE, and others.
- an access point 105 may maintain a list of known client devices 110.
- the list of known client devices 110 may include client devices 110 that have successfully connected to a private service set 120 provided by the access point 105.
- a private service set 120 may include a service set that is password protected or that is otherwise encrypted.
- the access point 105 may identify and list known client devices 110 using media access control (MAC) addresses that are unique to the client devices 110.
- the known client device list may be stored at the access point 105 such that the list is maintained after reboots and software upgrades.
- the access point 105 may identify the MAC address of the client device 110 and check whether the MAC address is in the list of known client devices 110 stored at the access point 105. For example, the MAC address of a client device 110 may be identified from a wireless communication (e.g., 802.11 packet) received from the client device 110. When the MAC address of the client device 110 is found in the list of known client devices 110, the access point 105 may make the determination that the preferred service set for the client device 110 is a private service set 120 and may deny the client device's attempt to join the public service set 115.
- a wireless communication e.g., 802.11 packet
- the access point 105 may deny a known client device's attempt to join the public service set 115 for a predetermined number of times and/or predetermined period of time. After the client device 110 has attempted to connect to the public service set 115 for a predetermined number of times or a predetermined period of time, the access point 105 may allow the client device 110 to connect to the public service set 115. When a client device 110 on the known device list is allowed to join the public service set 115, the client device 110 may be removed from the known device list until the client device 110 later successfully connects to a private service set 120.
- FIG. 2 is a block diagram illustrating an example access point 105 operable to facilitate the management of connections between one or more client devices and an access point over one or more service sets.
- the access point 105 may include a wireless interface 205, a known device module 210, a known device data store 215, and a connection attempt module 220.
- the access point 105 may route communications to and from client devices 1 10 through one or more service sets (e.g., private service set 120, public service set 115).
- a client device 110 may identify an available service set (e.g., through a SSID associated with a service set), and can attempt to join the identified service set.
- communications exchanged between the access point 105 and client device 110 may include wireless communications (e.g., 802.11 packet exchanges).
- a wireless interface 205 may receive requests from client devices 110 to join a service set.
- a MAC address associated with the client device 110 may be added to a list of known client devices stored at the known device data store 215.
- the list of known client devices is updated when a client device completely authenticates to an encrypted service set.
- the known device module 210 may identify a MAC address associated with a client device 110 when the client device 110 attempts to join a public service set 115.
- the MAC address may be identified from a wireless communication (e.g., 802.11 packet) received from the client device 110.
- the known device module 210 may search for the identified MAC address in the list of known client devices.
- the access point 105 may ignore or withhold a response to a request to join a public service set received from a client device that is known (e.g., a client device included in the list of known client devices).
- the access point 105 may deny the client device's request to join a public service set 115. If the MAC address is not found in the list of known client devices, the client device 110 may be allowed to join the public service set 115.
- a connection attempt module 220 may determine whether a client device 110 listed in a known device list has met or exceeded a predetermined number of connection attempts or whether a predetermined period of time has passed since the client device's first attempt to join the public service set 115. For example, a connection attempt count (e.g., a count of authentications tried to the public service set per MAC address) may be initiated when a client device 110 listed on the known device list attempts to connect to a public service set 115, and the count may be incremented each time the client device 110 subsequently attempts to join the public service set 115.
- a connection attempt count e.g., a count of authentications tried to the public service set per MAC address
- connection attempt count for a requesting client device 110 is less than a predetermined threshold, the client device's attempt to join the public service set 115 may be denied.
- the client device 110 may be allowed to join the public service set 115.
- a sliding deny period may be configured such that the connection attempts of each MAC address is maintained over a predetermined period of time, and at the expiration of the sliding deny period, the attempt count for a corresponding MAC address may be reset or decremented. It should be understood that an attempt count for a MAC address may be reset when the corresponding client device successfully joins a private service set.
- a timer may be initiated. If, when the client device 110 makes a subsequent attempt to join the public service set 115, the timer has yet to expire or is otherwise less than a predetermined threshold, the client device's attempt to join the public service set 115 may be denied. If, when the client device 110 makes a subsequent attempt to join the public service set 115, the timer has expired or is otherwise greater than a predetermined threshold, the client device's attempt to join the public service set 115 may be allowed.
- the time of the initial attempt may be logged (e.g., at the known device data store), and when a subsequent attempt to join the public service set 115 is made by the known client device 110, the period of time between the initial attempt and the subsequent attempt may be used to determine whether to allow the known client device 110 to join the public service set 115.
- the access point 105 may allow the known client device 110 to join the public service set 115.
- a logged time of an initial attempt by a known client device 110 to join a public service set 115 may be reset or deleted from an access point 105 (e.g., known device data store 215) after the passing of a predetermined duration of time (e.g., five, ten minutes, etc.).
- the client device 110 when a client device 110 listed in the known device list is allowed to join the public service set 115, the client device 110 may be removed from the known device list stored at the known device data store 215.
- an operator may configure the deny period, the predetermined attempt threshold, and/or the list of known devices.
- FIG. 3 is a flowchart illustrating an example process 300 operable to facilitate the management of connections between one or more client devices and an access point over one or more service sets.
- an access point 105 of FIG. 1 may manage connections between client devices (e.g., client devices 110 of FIG. 1) and service sets offered by the access point 105.
- the process 300 may begin at 305, when a client device 110 request to join a public service set is received at an access point 105.
- a client device 110 request to join a public service set may include a probe request or authentication request identifying a public SSID.
- a determination may be made whether the client device 110 requesting to join the public service set is a known device (e.g., a device that has been previously connected to a private service set of an associated access point).
- the determination whether the client device 110 is a known device may be made, for example, by the known device module 210 of FIG. 2.
- the known device module 210 can search for a MAC address associated with the requesting client device 110 in a list of known devices (e.g., previously connected devices) stored at the known device data store 215 of FIG. 2.
- the access point 105 may allow the client device 110 to associate and/or authenticate with the requested public service set.
- the determination may be made that the client device 110 is a known device and the process 300 may proceed to 320.
- a count of the number of attempts the client device 110 has made to join the public service set may be
- a MAC address and attempt count associated with the known client device 110 may be stored at the access point 105 (e.g., at known device data store 215 of FIG. 2). Each time an attempt is made by the client device 110 to join the public service set provided by the access point 105, the attempt count associated with the client device 110 may be incremented.
- a determination may be made whether the client device 110 has attempted to join the public service set a number of times that is greater than a predetermined threshold. The determination may be made, for example, by the connection attempt module 220 of FIG. 2. For example, a count of the number of times a client device 110 attempts to join the public service set may be maintained. The attempt count associated with a specific MAC address may be associated with a period of time, such that the attempt count for the MAC address is reset after a predetermined period of time.
- the process 300 may proceed to 330.
- the client device 110 may be allowed to join the requested public service set.
- the access point 105 may allow the client device 110 to associate and/or authenticate with the requested public service set.
- the client device 110 may be conditionally removed from the known device list.
- the MAC address and associated attempt count of the client device 110 may be removed from the list of known devices stored at the known device data store 215 of FIG. 2.
- the client device 110 may be removed from the known device list until the client device 110 is later associated and/or authenticated with a private service set provided by the access point 105.
- the process 300 may proceed to 340.
- a determination may be made whether a denial period has expired. The determination may be made, for example, by the connection attempt module 220 of FIG. 2.
- the denial period may be a predetermined amount of time for which to deny a client device's attempt to join a public service set after the client device's first attempt to join the public service set. If the denial period has expired, the process 300 may proceed to 330, where the client device 110 may be allowed to join the public service set, and the client device 110 may be conditionally removed from the known device list at 335.
- the process 300 may proceed to 345.
- the client device's attempt to join the public service set may be denied.
- the access point 105 may output an authentication response informing the client device 110 that another network or service set is preferred for the client device 110.
- the access point 105 may output an authentication response including a status code indicating that another network or SSID is preferred for the client device 110.
- the authentication response may inform the client device 110 as to which specific network or SSID is preferred for the client device 110.
- the authentication response may include a specific frequency band (e.g., 2.4 GHz, 5 GHz, etc.) and/or an identification of the preferred SSID, and using the information included within the authentication response, the client device 110 may attempt to associate and/or authenticate with the preferred SSID. If the access point 105 is configured not to broadcast SSIDs, a preferred SSID field within the authentication response may be left blank. In embodiments, the authentication response may inform the client device 110 to only probe a frequency band defined in the authentication response.
- a specific frequency band e.g., 2.4 GHz, 5 GHz, etc.
- FIG. 4 is a block diagram of a hardware configuration 400 operable to facilitate the management of connections between one or more client devices and an access point over one or more service sets.
- the hardware configuration 400 can exist in various types of devices.
- the hardware configuration 400 can include a processor 410, a memory 420, a storage device 430, and an input/output device 440.
- Each of the components 410, 420, 430, and 440 can, for example, be interconnected using a system bus 450.
- the processor 410 can be capable of processing instructions for execution within the hardware configuration 400.
- the processor 410 can be a single-threaded processor.
- the processor 410 can be a multi-threaded processor.
- the processor 410 can be capable of processing instructions stored in the memory 420 or on the storage device 430.
- the memory 420 can store information within the hardware configuration 400.
- the memory 420 can be a computer-readable medium.
- the memory 420 can be a volatile memory unit.
- the memory 420 can be a non- volatile memory unit.
- the storage device 430 can be capable of providing mass storage for the hardware configuration 400. In one implementation, the storage device 430 can be a computer-readable medium. In various different
- the storage device 430 can, for example, include a hard disk device, an optical disk device, flash memory or some other large capacity storage device. In other implementations, the storage device 430 can be a device external to the hardware configuration 400.
- the input/output device 440 provides input/output operations for the hardware configuration 400.
- the input/output device 440 can include one or more of a network interface device (e.g., an Ethernet card), a serial communication device (e.g., an RS-232 port), one or more universal serial bus (USB) interfaces (e.g., a USB 2.0 port) and/or a wireless interface device (e.g., an 802.11 card).
- the input/output device can include driver devices configured to send communications to, and receive communications from one or more networks (e.g., subscriber network 130 of FIG. 1, WAN 125 of FIG. 1, etc.) and/or one or more service sets (e.g., public service set 115, private service set 120, etc.).
- the invention improves upon methods and apparatuses for managing connections between one or more client devices and an access point over one or more service sets.
- the methods, systems and apparatuses described in this disclosure enable the denial of a client device attempt to join a public service set when the client device has been previously associated with a private service set, wherein the private service set and the public service set are associated with the same access point.
- the methods, systems and apparatuses described in this disclosure increase the likelihood that a client device will connect to a private service set.
- Such instructions can, for example, comprise interpreted instructions, such as script instructions, e.g., JavaScript or ECMAScript instructions, or executable code, or other instructions stored in a computer readable medium.
- Implementations of the subject matter and the functional operations described in this specification can be provided in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them.
- Embodiments of the subject matter described in this specification can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a tangible program carrier for execution by, or to control the operation of, data processing apparatus.
- a computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, or declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
- a computer program does not necessarily correspond to a file in a file system.
- a program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code).
- a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
- the processes and logic flows described in this specification are performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output thereby tying the process to a particular machine (e.g., a machine programmed to perform the processes described herein).
- the processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
- Computer readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices (e.g., EPROM, EEPROM, and flash memory devices); magnetic disks (e.g., internal hard disks or removable disks); magneto optical disks; and CD ROM and DVD ROM disks.
- semiconductor memory devices e.g., EPROM, EEPROM, and flash memory devices
- magnetic disks e.g., internal hard disks or removable disks
- magneto optical disks e.g., CD ROM and DVD ROM disks.
- the processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462034479P | 2014-08-07 | 2014-08-07 | |
PCT/US2015/042856 WO2016022381A1 (en) | 2014-08-07 | 2015-07-30 | Managing private and public service set utilization |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3178244A1 true EP3178244A1 (en) | 2017-06-14 |
Family
ID=58669523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP15750534.8A Withdrawn EP3178244A1 (en) | 2014-08-07 | 2015-07-30 | Managing private and public service set utilization |
Country Status (1)
Country | Link |
---|---|
EP (1) | EP3178244A1 (en) |
-
2015
- 2015-07-30 EP EP15750534.8A patent/EP3178244A1/en not_active Withdrawn
Non-Patent Citations (2)
Title |
---|
None * |
See also references of WO2016022381A1 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9912667B2 (en) | Managing private and public service set utilization | |
US10887304B2 (en) | Simplified configuration of a network device | |
EP3912374B1 (en) | Improved handling of unique identifiers for stations | |
EP3205134B1 (en) | Auto-configuration of wireless network extender | |
US20160277928A1 (en) | Access method, system, and device of terminal, and computer storage medium | |
US20210385728A1 (en) | Protected pre-association device identification | |
CN107040501B (en) | Authentication method and device based on platform as a service | |
US9848319B2 (en) | Service set determination based upon device type identifier | |
WO2016026448A1 (en) | Method and apparatus for bandwidth on demand | |
US11641340B2 (en) | Generation of a unique device identifier for a client device in a wireless network | |
EP3178244A1 (en) | Managing private and public service set utilization | |
US10959159B2 (en) | Service set steering based upon device identifier | |
CN205864753U (en) | A kind of encryption guard system of terminal unit | |
US20210385729A1 (en) | Unsolicited handling of unique identifier for stations | |
CN106535176B (en) | Network access method and device | |
EP3289809A1 (en) | Service set determination based upon device type identifier |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20170306 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: BESTERMANN, JOHN RANDOLPH Inventor name: CARTER, WADE E. Inventor name: LUMBATIS, KURT ALAN |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ARRIS ENTERPRISES LLC |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20180430 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04W 84/12 20090101ALI20230228BHEP Ipc: H04W 48/18 20090101ALI20230228BHEP Ipc: H04W 48/16 20090101ALI20230228BHEP Ipc: H04W 48/12 20090101ALI20230228BHEP Ipc: H04W 48/02 20090101ALI20230228BHEP Ipc: H04L 9/40 20220101ALI20230228BHEP Ipc: H04W 12/06 20090101ALI20230228BHEP Ipc: H04W 12/08 20090101AFI20230228BHEP |
|
INTG | Intention to grant announced |
Effective date: 20230324 |
|
GRAJ | Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted |
Free format text: ORIGINAL CODE: EPIDOSDIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTC | Intention to grant announced (deleted) | ||
INTG | Intention to grant announced |
Effective date: 20230609 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20231020 |