WO2014074672A2 - Système et procédé pour stocker et extraire des informations associées à un emplacement de réseau - Google Patents

Système et procédé pour stocker et extraire des informations associées à un emplacement de réseau Download PDF

Info

Publication number
WO2014074672A2
WO2014074672A2 PCT/US2013/068872 US2013068872W WO2014074672A2 WO 2014074672 A2 WO2014074672 A2 WO 2014074672A2 US 2013068872 W US2013068872 W US 2013068872W WO 2014074672 A2 WO2014074672 A2 WO 2014074672A2
Authority
WO
WIPO (PCT)
Prior art keywords
network
string
information string
wireless
biscuit
Prior art date
Application number
PCT/US2013/068872
Other languages
English (en)
Other versions
WO2014074672A3 (fr
Inventor
Stillman BRADISH
Scott A. Smith
Original Assignee
Wifiname, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wifiname, Inc. filed Critical Wifiname, Inc.
Publication of WO2014074672A2 publication Critical patent/WO2014074672A2/fr
Publication of WO2014074672A3 publication Critical patent/WO2014074672A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • Networks may be operated so as to restrict access to authorized users.
  • a wireless network may be open to access to anyone, either for a fee or without charge.
  • open networks or "hot spots" are often operated by retail establishments, transportation hubs, medical facilities, and educational institutions to permit access to the Internet to users of wireless stations, such as laptops, smartphones, and tablets, through a base station or access point (AP).
  • AP access point
  • a wireless network typically communicates using a protocol that defines message structures (sometimes referred to herein as "frames").
  • a message frame may include a field for a network identifier or name, the media access controller address (MAC) of the station from which the frame is broadcast, and other information.
  • MAC media access controller address
  • a wireless station In order to connect to a network, a wireless station must first find a compatible network that is within range of its transceiver. This process is typically accomplished through either passive or active scanning. In passive scanning, an AP broadcasts its network name and other information in a message frame. In active scanning, the wireless station requests a response from an access point by broadcasting the network ID of the network it is seeking to join.
  • an active scanning process may include broadcasting a request for a response from any network within range of the wireless station.
  • the APs that are within range broadcast their SSIDs to the wireless station.
  • the wireless station may select a wireless AP to associate with from the list of responders.
  • Another architecture allows wireless stations to announce their presence to other wireless stations and to form networks in which there is no AP. In this case, the wireless station seeking other wireless stations broadcasts its network identifier and receives a response from other wireless stations within range.
  • the wireless station establishes a connection to a wireless network through an exchange of messages that authenticates the wireless station to an access point (or a wireless station when there is no AP present) and then associates the wireless station with that access point or wireless station.
  • an IEEE 802.11 network (or more commonly, "Wi-Fi" network) provides communications between a Wi-Fi AP and Wi-Fi enabled device.
  • the Wi-Fi AP transmits the network name in the form of a service set identifier (SSID).
  • the SSID is typically a 1 to 32 byte value that segments the airwaves for usage.
  • a beacon message is sent by an AP 5 to 20 times per second.
  • the beacon typically includes the SSID, the time, capabilities, supported data rates, and physical layer parameter sets that regulate the smooth operation of a wireless network.
  • the information that is broadcast by an AP may be received freely by any device that operates a compatible receiver. Unless the device intends to connect to the network supported by the AP, the information that is broadcast by the AP is simply ignored.
  • the MAC address may be used as the network information string either alone or in combination with the network identifier.
  • a network information string may be registered with an information string server.
  • a method for managing content exchanges in a wireless network comprises receiving, by a wireless station, a message broadcast by a string broadcast station, wherein the string broadcast station message comprises a network information string;
  • an identifier comprising a tag component and a content component
  • sending the identifier and the network information string to a datastore and storing the identifier in association with the network information string in the datastore.
  • a method for managing content exchanges in a wireless network comprises receiving, by a wireless station, a beacon message broadcast by a string broadcast station ("SBS"), wherein the message comprises a network information string;
  • SBS string broadcast station
  • a method for managing content exchanges in a wireless network comprises receiving, by a wireless station, a message broadcast by a string broadcast station, wherein the message broadcast comprises a network information string associated with a physical location of the SBS; generating, by the wireless station, an identifier comprising a tag component and a content component; and sending, by the wireless station, the identifier and the network information string to a datastore for storage in association with the network information string.
  • FIG. 1 is a flow diagram illustrating a process by which a network information string may be registered with an information string server according to an embodiment.
  • FIG. 2 is a flow diagram illustrating a process by which content associated with a network information string may be stored in a datastore according to an embodiment.
  • FIG. 3 is a block diagram illustrating the acquisition of content associated with a network information string according to an embodiment.
  • FIG. 4 is a flow block illustrating operations performed by a listener module according to an embodiment.
  • FIG. 5A is a block diagram illustrating the operation of a wireless station in response to receipt of a network information string according to an embodiment.
  • FIG. 5B is a block diagram illustrating a process for triggering a wireless station to take an action according to an embodiment.
  • FIG. 7 is a flow diagram illustrating a process for retrieving the content component of a biscuit according to an embodiment.
  • FIG. 10 is a block diagram illustrating a server device. DETAILED DESCRIPTION
  • Embodiments are directed to utilizing the information broadcast by a string broadcast station (SBS) to identify a physical location to which other information may be pinned.
  • the pinned information may be used by applications to take an action or to inform users of those applications about additional information that may be associated with or derived from the pinned information.
  • Embodiments are also directed to associating content with a network identifier of a wireless network, storing the associated content on a server, and providing access to the content to wireless stations based on the network identifier.
  • Wireless networks that utilize a network identifier that is broadcast in a message frame (for example and not as a limitation, an 802.11 management frame) either by a string broadcast station or by a wireless station may be used to convey the network information strings and to facilitate the association of content, which may be entirely unrelated to network operation, as described below.
  • wireless networks may include RFID networks, Zigbee® networks, Bluetooth® networks and 3G/4G networks.
  • a "probe message” encompasses a signal transmitted by a wireless station that may be received by a wireless station or an SBS, which signal conveys a message that identifies the wireless station and requests information about a particular wireless network or all wireless networks within range of the wireless station.
  • a network information string encompasses a character string that is included in a beacon message broadcast by an SBS or in a probe message broadcast by a wireless station.
  • the network information string may encompass all or a portion of the network identifier broadcast by the SBS, such as for example and not as limitation, a service set identifier (SSID) of a Wi-Fi network, the MAC address broadcast by the SBS, or the MAC address in combination with all or part of the network identifier.
  • SSID service set identifier
  • a “server” encompasses a computing device comprising at least one processor that may be configured to interact in an automated fashion with other devices over a network to serve content and web pages, to issue responses to communications from other network devices and to respond to queries from other network devices.
  • FIG. 1 is a flow diagram illustrating a process by which a network information string may be registered with an information string server according to an embodiment.
  • a wireless network such as for example and without limitation a Wi-Fi network, broadcasts a message, such as a beacon message, that includes a network identifier, such as a service set identifier (SSID). All or part of the network identifier may represent a network information string.
  • a network information string registration request is received at an information string server.
  • a determination is made whether the request includes a network information string.
  • Block 104. If the request does not include a network information string (the determination at Block 104 is "No"), a network information string may be generated by the information string server (Block 106), and the process continues at block 114 (described below).
  • the request includes a network information string (the determination at Block 104 is "Yes"), a determination is made whether the requested network information string has been previously registered. (Block 108). In an embodiment, the determination as to whether a network information string has been previously registered may be based on matching all of a previously registered network information string or a portion of the previously registered network information string. [0040] If the network information string has been previously registered (the determination at Block 108 is "Yes"), the registration request is rejected. (Block 110.) A message is sent advising the requestor that the registration request has been rejected. (Block 112.) In an embodiment, the rejection message may include one or more available network information strings. If the network information string has not been previously registered (the
  • the network information string may include all or a portion of a network name identifier, all or a portion of a MAC address of a string broadcast station that will broadcast the network information string in a beacon message, or a combination of a network name identifier and a string broadcast station MAC address.
  • the network information string includes all or part of the network name identifier and may be registered in association with one or more MAC addresses. For example, a single network information string based on the network name identifier may be registered in association with the MAC addresses of multiple string broadcast stations. The string broadcast stations may be used in different locations. As discussed in detail below, the association of the network information string with the string broadcast station MAC address allows information to be associated with a network information string that is specific to that particular SBS.
  • FIG. 2 is a flow diagram illustrating a process by which content associated with a network information string may be stored in a datastore according to an embodiment.
  • a wireless station 202 such as for example and without limitation a Wi-Fi enabled device, comprises a transceiver 204, a processor 206, a memory 208, a wireless station application 212 and a display 214.
  • the wireless station 202 also operates an instance of string utilization application 210.
  • the wireless station application 212 provides instructions to the processor 206 of the wireless station 202 to enable the wireless station 202 to interact with the string broadcast station (SBS) 220, such as for example and without limitation a Wi-Fi string broadcast station, as is known in the art.
  • SBS string broadcast station
  • the SBS 220 broadcasts a beacon message 230 that includes a network information string.
  • the network information string may be an SSID or a portion of an SSID as previously described.
  • Content may be delivered to, and stored in, a content datastore 244 by either the operator of the SBS 220 and/or the user of the wireless station 202.
  • the content datastore 244 is illustrated as supporting two records.
  • the record 246 allows content to be stored in association with a network information string without regard to the ownership of the registration of the network information string.
  • the operator of the SBS 220 or the user of the wireless station 202 may submit content to the content datastore for association with a network information string and the content will be stored in the record 246.
  • the record 248 is reserved for storage of content by a registered owner of a network information string.
  • an operator of the SBS 220 may send a message 232 over a link 234 conveying content or a link to content and the network information string to the information string server 240.
  • the information string server stores the content or the record 246 in the content datastore 244 associated with the network information string or in record 248 if the network information string has been registered by the operator of the SBS 220.
  • the content may be associated with a network information string rule allowing delivery of the content during a particular time period. For example, a business may operate an SBS. The additional content scheduled for evening and night hours may indicate nightly specials, a message that the business is currently closed, or other time-sensitive information. During those specific time periods, potential customers may be directed to the business's website for more information.
  • the additional content is stored in a record of the information string server 240 in association with the MAC address of an SBS.
  • the MAC address may also be used in combination with the network information string or alone.
  • the association of an SBS MAC address with a network information string allows the record 246 or the record 248 to store content that is specific to a particular SBS.
  • the MAC address may be included in the request.
  • the content that is returned is specific to an SBS and the area that is served by that SBS.
  • a network information string may be used by the operator of a business that has multiple locations each with its own SBS. The operator may elect to issue a coupon for one location only. By tying the coupon to the MAC address of that specific SBS, the coupon will be served only when a request for content (described below) includes both the network information string and the correct MAC address.
  • content is provided by a user of a wireless station, such as for example and without limitation a Wi-Fi enabled device.
  • a beacon message 230 is received at the wireless station 202 operating the string utilization application 210.
  • the wireless station 202 may be a cell phone, a smart phone, or a laptop computer.
  • the string utilization application 210 may be utilized to receive or create content for association with the network information string broadcast by the SBS 210.
  • the string utilization application 210 creates a message 216 conveying the content and the network information string, and optionally, the MAC address of the SBS 210 that transmitted the beacon message 230, to the information string server 240 via link 216.
  • the content datastore 244 stores the content in association with the network information string in a record 246 that is associated with the network information string supplied in the message.
  • the SBS MAC address is included in the message 216, the content is stored in association with both the network information string and the MAC address.
  • the MAC address may be used to establish a general location of the SBS 210, which location may be used in certain messages. For example, an operator of a wireless station may leave a message to gather at a location proximate to the location of the SBS 220 that broadcasts a particular network information string. As another example, the operator of a wireless station may also leave comments about a venue that is proximate to the location of the SBS 220 that broadcasts a particular network information string, such as feedback or a review of their products or services.
  • the content datastore 244 is physically separate from the information string server 240.
  • the content data store 244 may be located on a server that is accessible to the information string server 240 via a link 242 and to the wireless station 202 via the link 216.
  • the content datastore 242 is a component of the information string server 240 and the content datastore 244 is served by the information string server 240 to the wireless station 202 via the communication link 216.
  • content is stored in a memory of a wireless station, such as, for example and without limitation, memory 208 of wireless station 202.
  • the content may be stored in memory 208 of the wireless station 202 at the direction of a user of the wireless station 202, by virtue of the configuration of string utilization application 210, or in response to the acquisition of content by the wireless station 202 from the content datastore 244 (acquisition of content from the content datastore 244 is discussed in detail below).
  • a user may configure a wireless station to play an audio file when in proximity to an SBS that is broadcasting a network information string that includes the word "coffee.”
  • the string utilization application 210 may also acquire content (for example, a coupon for a pastry) in response to receipt of a network information string from a first SBS that includes the word "coffee,” wherein the coupon is presented when the wireless station receives a network information string (for example, "helen's cakes") from a second SBS.
  • FIG. 3 is a block diagram illustrating the acquisition of content associated with a network information string according to an embodiment.
  • a wireless station 202 such as for example and without limitation a Wi-Fi enabled device, comprises a transceiver 204, a processor 206, a memory 208, a wireless station application 212 and a display 214.
  • the wireless station 202 also operates an instance of string utilization application 210.
  • the wireless station application 212 provides instructions to the processor 206 of the wireless station 202 to enable the wireless station 202 to interact with the SBS 220 as is known in the art.
  • an SBS 220 comprises a transceiver 222, a processor 224, a memory 226, and SBS application 228.
  • the SBS 220 also operates an instance of string utilization application 210.
  • the SBS 228 provides instructions to the processor 224 of the SBS 220 to at least enable the SBS 220 to transmit beacon message 230.
  • the SBS 220 broadcasts a beacon message 230 that includes a network information string that is associated with content stored on the information string server 240.
  • the network information string may be associated with content stored in a record 246 or 248 held on content data store 244.
  • the beacon message 230 may also include the MAC address of the SBS 220.
  • the SBS 220 provides wireless stations that associate with SBS 220 access to a network (not illustrated).
  • the SBS 220 is configured to broadcast beacon message 230 but is not configured to provide network access.
  • the SBS 220 not capable of providing connectivity to a network.
  • a wireless station 202 is configured with a string utilization application 210 to be executed by processor 206.
  • the wireless station 202 may be a cell phone, a smart phone, a laptop computer, a vending machine or a cash register.
  • the wireless station 202 may receive one or more beacon messages, including beacon message 230.
  • the string utilization application 210 examines the network identifier of each beacon message to determine if the network identifier contains a network information string included on a network information string list stored in a memory accessible to the wireless station 202, such as memory 208.
  • the string utilization application 210 may check a memory accessible to the wireless station 202, such as memory 208, for content that is associated with the network information string. If the content is not found in the memory accessible to the wireless station 202, the wireless station 202 may send a content request message 302 that includes the network information string to the information string server 240 via link 216.
  • the string utilization application 210 passes the network identifier from each beacon message to the information string server 240 for inspection without first examining the network information string.
  • the information string server 240 examines the network identifier of each beacon message to determine if the network identifier contains a network information string associated with content stored in a data stored device accessible to information string server 240, such as content datastore 244.
  • the network information string may include all or a portion of the network identifier (e.g., the SSID) that is broadcast by the string broadcast station 220.
  • the network identifier e.g., the SSID
  • a coffee shop chain may assign the SSIDs joesjaval , joesjava2... joesjava[n] to its "n" shops. It may register the network information string "joesjava” to provide the same message to all of its patrons regardless of which shop a patron is visiting. It may also register joesjava[n] in association with string broadcast station MAC addresses to provide messages on a per-shop basis.
  • the acquisition of content is based at least in part on the MAC address of the string broadcast station 220 that is included in the beacon message 230.
  • the MAC address may be associated with the network information string and with the content on the content datastore 244. The MAC address may be used to acquire content that is specific to a particular venue at which the SBS 220 is located.
  • the content request message 302 may also include credentials of the user of the wireless station 202.
  • the credentials are evaluated by the information string server 240 prior to responding to a request to obtain content from the information string server.
  • the requestor may be required to first obtain a user ID and password from the information string server or from an authentication server utilized by the information string server.
  • the string utilization application 210 operating on the wireless station 202 may be configured to present the credentials required to access the information string server 240.
  • the user of the wireless station 202 may establish a session of a fixed time period with the information string server 240 by presenting the required credentials to the information string server 240.
  • the information string server 240 responds by sending a content response message 304 to the wireless station 202 via the link 216.
  • the additional content may include coupons, announcements, menus, news alerts, photos, directions or links to additional content on other servers.
  • the content datastore 232 is physically separate from the information string server 240.
  • the content datastore 244 may be located on a server that is accessible to the information string server 240 via a link 242 and to the wireless station 202 via the link 216.
  • the content datastore 244 is a component of the information string server 240 and the content is served by the information string server 240 to the wireless station 202 via the link 216.
  • the wireless station 202 communicates with the information string server 240 and receives content from the content datastore 232 via a communication link 216.
  • the link 216 may be a wired link, a wireless link that is provided via a cellular network or a wireless link that is provided over a variety of wireless protocols.
  • the link 216 may be provided wirelessly through a gateway (not illustrated) that connects a wireless network to a wired network such as the Internet.
  • the wireless portion of the link may be provided through string broadcast station 220 or through another string broadcast station (not illustrated).
  • Requests for content may be logged in the log datastore 250.
  • the logged data may include identifying information of the wireless station 202, identifying information of the user of the wireless station 202, the network information string associated with the requested content, the time when the request for content was made, and the location of the wireless station when the request for content was made.
  • the logged data captured in log datastore 250 may be used to identify user preferences, determine the response of the user of the wireless station 202 to the content associated with the network information string, and measure the interest of the user of the wireless station 202 in types of content.
  • Embodiments hereof allow a message to be addressed to any wireless station that enters the range of a beacon signal sent by an SBS.
  • Cell phones, smart phones, laptop computers, automated software, vending machines and cash registers can perform the functions using the system of the invention.
  • the messages may convey marketing information, public service information, traffic information, instructions for persons with disabilities, sports scores, weather information, time schedules, and emergency instructions among other information.
  • the messages may be displayed as text, images or audio or a combination of the same.
  • FIG. 4 is a block diagram illustrating operations performed by a listener module according to an embodiment.
  • Wireless listener module A and B are configured to listen for beacon messages 416 transmitted by string broadcast stations, such as SBS A, SBS B and SBS C (elements 410, 412 and 414).
  • an SBS beacon message 416 comprises a network information string.
  • a wireless listener module (elements 402 and 406) operating a string utilization application (element 404) receives one or more beacon messages 416 and obtains the network information string from each received beacon message.
  • the wireless listener modules (elements 402 and 406) also receive a probe message 422 from a wireless station 202.
  • the probe message includes the media access controller (MAC) address of the wireless station 202.
  • Wireless station 202 operates string utilization application 210.
  • wireless listener module 402 also receives probe message 444 from wireless station 442.
  • the probe message 444 includes the media access controller (MAC) address of the wireless station 442.
  • Wireless station 442 does not operate an instance of the string utilization application 210.
  • wireless listener module 404 also receives probe message 448 from wireless station 446.
  • the probe message includes the MAC address of the wireless station 446.
  • Wireless station 446 also does not operate an instance of the string utilization application 210.
  • a wireless listener modules receive probe and beacon messages from wireless stations and SBSs that are within range of the wireless listener module.
  • a wireless listener module such as module A and B, may also be configured to operate as an SBS and broadcast an SBS beacon message that comprises a network information string.
  • a wireless listener module such as wireless listener module A, 402 associates the MAC address of the wireless station 202, the MAC address of wireless station 442, the MAC address of wireless station 444 and the MAC address of listener module A with the network information strings received from each beacon message 416 and sends the information strings and the MAC addresses to a list data server 430 for storage in a listener datastore 432.
  • the wireless listener module A 402 may also provide a timestamp that indicates when the wireless station 202 was proximate to the listener module A 402.
  • wireless listener module A 402 connects to the list data server 430 via a link 420 and wireless listener module B 406 connects to list data server 430 via link 422.
  • the links 420 and 422 may be wireless links, such as via a wireless LAN or a wireless telephone network, or may be a wired link, such as via DSL line, a cable network, or a fiber network.
  • wireless listener modules A 402 and B 406 communicate with each other and other wireless listener modules via a mesh network (not illustrated).
  • the wireless station 202 may send a string data request message 450 for a list of network information strings proximate to its current location from the list server that have been reported by one or more listener modules, such as wireless listener module A 402, that have also detected the probe message and the MAC address of the wireless station 420.
  • the string data request message 450 includes the MAC address of the wireless station 202.
  • the list server 440 may respond to the string data request message by acquiring a list of network information strings associated with the MAC address of the wireless station 202 from the listener datastore 432 and sending the list to the wireless station 202 in string data response message.
  • a wireless listener module such as wireless listener module A 402 may listen for probe messages periodically.
  • the time of receipt of a probe message 422 is captured by a time stamp.
  • a wireless station moves out of range of the wireless listener module A 402 the elapsed time between a current time and the time indicated by a last time stamp will increase.
  • This elapsed time period may be used by the datastore 442 to measure the age of data relating to a MAC address and to log data (for example, MAC address and associated network information strings) to the listener datastore 432 or to delete data of a particular age.
  • FIG. 4 illustrates two listener modules A and B, the illustration is not limiting. Any number of listener modules may be deployed in a physical space to form a listener network. Because the location of each listener module within the listener network is known, the location of a wireless station that broadcasts a probe message (without regard to whether the wireless station operates a string utilization application) may be tracked within the listener network. Time stamping of the receipt of probe messages by each listener module within the listener network allows the presence, path, time at location, number of visits to a location, and other metrics to be determined on a per wireless station basis. Additionally, the tracking data may be used to construct reports.
  • the tracking data may indicate that 3,000 wireless station passed by a particular listener module during a single day and that 78% of these also passed by the listener module the previous day.
  • the tracking data may be of interest to city planners, businesses and public safety officials. For example, traffic outside a potential terrorist target could be monitored to determine if the behavior of a particular wireless station is suspicious.
  • FIG. 4 illustrates a list data server 430 and a listener datastore 432.
  • these structures are components of information string server 240 (see, FIG. 2).
  • a listener module such as listener module A (402) receives probe messages from the wireless station 202 and communicates content to the wireless station 202 directly.
  • FIG. 5A is a block diagram illustrating the operation of a wireless station in response to receipt of a network information string according to an embodiment.
  • a wireless station 202 such as, for example and without limitation a Wi-Fi enabled device, is configured with a string utilization application (string utilization application) 210 executed by processor 206 (not illustrated).
  • the wireless station 202 may be a cell phone, a smart phone, a laptop computer, a vending machine or a cash register.
  • the memory 208 and the content datastore 244 may include a list of network
  • the wireless station 202 may receive one or more beacon messages, including beacon message 230, from the string broadcast station 220.
  • the string utilization application 210 examines the network identifier (for example and not as a limitation, an SSID) of each beacon message. In an embodiment, the string utilization application 210 may determine if the network identifier contains a network information string on the command code list stored in memory 208. Alternatively, the string utilization application 210 may forward a received network information string to information string server 240 (not illustrated).
  • the string server 240 may respond with content that is stored in content datastore 244 that includes a command code.
  • the string utilization application 210 receives a listed network information string associated with a command code that is stored in memory 208 or content datastore 244, the string utilization application 210 refers the listed command code to a command-responsive application 520 or to the operating system 522 of the wireless station.
  • the command- responsive application 520 and the operating system 522 may be configured to take an action in response to the receipt of the command code.
  • the command-responsive application 520 may be a browser that is configured to open a particular web page in response to a particular command code.
  • the device operating system 522 may be configured to load a command-responsive application 520 from memory or to download a command-responsive application from the Internet. Other actions may include displaying a reminder message or playing audio content.
  • FIG. 5B is a block diagram illustrating a process for triggering a wireless station to take an action according to an embodiment.
  • the string utilization application 210 is downloaded from a download/application server 570 to a wireless station 202 that receives wireless services from a wireless service provider 576.
  • the download/application server 570 acquires wireless station information, including its MAC address and a unique token, and user information and stores the station and user information in a datastore 572.
  • the wireless station 202 may be configured to receive a notification from the wireless service provider and to initiate a response based on this notification.
  • the string utilization application 210 is configured by a listener service provider 580 to respond to the receipt of the notification in a particular way.
  • the notification service provider 580 monitors one or more wireless listener modules, such as wireless listener module A 402 as illustrated in FIG. 4, via a monitoring server 582.
  • the monitoring server 582 may send a message to the wireless service provider 576 to send a notification to the wireless station 202.
  • the message from the monitoring server 582 to the wireless service provider 576 includes the unique token associated with the wireless station 202.
  • the notification service provider 576 directs notification server 578 to send the notification to the wireless station 202, based on the unique token sent from the monitoring server.
  • the receipt of the notification by the wireless station 202 conveys a location-relevant instruction to the string utilization application 210 operating on the wireless station 202.
  • the instruction may cause the wireless station 202 to download a coupon for a nearby merchant, render content, operate an application, connect to a website, etc.
  • FIG. 6 is a flow diagram illustrating a process by which content may be associated with a network information string and a tag and stored in record according to an embodiment.
  • circuit encompasses a string comprising a tag component and a content component.
  • the tag is associated with the content and is required to retrieve the content.
  • the term “biscuit record” encompasses one or more biscuits stored in a storage device in association with a network information string.
  • a “biscuit-enabled application” encompasses a software application configured to operate on a wireless station to create a biscuit, send it to a biscuit server for storage and to request content associated with one or more tags.
  • a biscuit-enabled application may process the content and/or use the content to perform an operation.
  • a wireless station 620 is within range of beacon messages transmitted by one or more string broadcasting stations such as, for example, SBS A (602) and SBS B (604) through SBS N (606).
  • the beacon messages include a network information string as previously described.
  • the wireless station 620 includes a biscuit-enabled application 624.
  • the biscuit-enabled application 624 is a dedicated application that performs operations to create and retrieve biscuits.
  • the biscuit-enabled application 624 is an application that includes biscuit creation and retrieval functionality.
  • the tags may be generated by an algorithm operated by a biscuit-enabled application.
  • the wireless station receives an NIS from each of SBS A (602) and SBS B (604) through SBS N (606).
  • the biscuit-enabled application 624 receives the NISs and generates a biscuit from each NIS received.
  • the biscuit includes a tag component and a content component.
  • the biscuit may be subject to structural limitations that limit the size of the tag component and the content component.
  • the content component may be limited to 1000 characters of text and the tag may be limited to 65,000 characters of text.
  • the biscuit is sent by the biscuit-enabled software along with the NIS of a particular SBS to which the biscuit is to be associated, such as, for example, the NIS for SBS A (602).
  • the biscuit is then associated in a biscuit record 632 with the NIS of SBS A (602).
  • the biscuit-record 632 for SBS A may include an unlimited number of biscuits.
  • the tag component In order to retrieve the content component of a particular biscuit, the tag component must be known.
  • the content component may be generated by a user or by a biscuit enabled application.
  • a biscuit-enabled application may prompt a user of a wireless station for content that the user would like to associate with a particular NIS and tag.
  • the user-provided content may be in the form of text, an audio file, an image or a video file.
  • the content component may also be generated by the biscuit-enabled application.
  • an application may create a biscuit that includes the MAC address of the wireless station or an identifier that identifies the user of the wireless station to the biscuit-enabled application.
  • FIG. 7 is a flow diagram illustrating a process for retrieving the content component of a biscuit according to an embodiment.
  • a wireless station such as, for example, wireless station 620 (FIG. 6), generates a biscuit request that includes NIS and the biscuit tag component and sends the request to the biscuit server (Circle 702).
  • the biscuit server searches biscuit records for all content associated with the biscuit tag component conveyed in the biscuit request (Circle 704).
  • the biscuit server sends the tag component, the content component associated with the biscuit tag and the NIS of the SBS to which the biscuit is associated to the wireless station 620.
  • the biscuit-enabled application then acts on the biscuit and/or the NIS in accordance with the application's instructions.
  • the biscuit request may not specify the NIS.
  • the biscuit server returns all content associated with a tag without regard to the SBS that transmitted a particular tag.
  • a tag may be used by a wireless station to create a biscuit that identifies the wireless station or the user of the wireless station.
  • the biscuit may be saved in association with any number of NISs.
  • Requesting the biscuit based solely on the tag may be used to produce a map of a route taken by the wireless station.
  • the same tag may be used by a second wireless station to create a biscuit that includes an identifier of the second wireless station. Requesting the biscuit based solely on the tag will, in this case, provide the routes taken by the first and second wireless stations and identify whether the two wireless stations were in proximity to each other. If the content of the biscuit includes a timestamp and if the NIS is associated with a physical location, the time and location of any intersection of the routes taken by the two wireless stations can be determined.
  • the biscuit-enabled application may process biscuit
  • a biscuit may be used to indicate the presence of a wireless station in proximity to other wireless stations.
  • a social networking application that is a biscuit- enabled application operating on a first wireless station may create a biscuit that includes a shared tag and an identifier of the user of a first wireless station.
  • the shared tag is known to other instances of the social media application operating on other wireless stations, including a second wireless station.
  • the social media application sends the biscuit to other wireless stations (including the second wireless station) that are in proximity to the NIS associated with the biscuit.
  • the social media application processes the content component of the biscuit, retrieves the user identifier and allows communication to be initiated between the second wireless station and the first wireless station.
  • a biscuit-enabled game application generates a biscuit that informs other instances of the application operating on wireless stations receiving a particular NIS that another wireless station is involved in a particular game.
  • the biscuit-enabled application may check for biscuits to identify the users in the immediate area who are playing a particular game.
  • a wireless station operating a biscuit-enabled application may continuously check a received NIS for biscuits and use the biscuits to determine whether the wireless station has previously been at or near a particular location.
  • a color attribute of the display of the wireless station may change when the biscuit-enabled application determines that the wireless station has previously been at or near the particular location.
  • the tags may be used in secured environments to pass information among wireless stations that are authorized to exchange information in that environment.
  • the tags and the content are generated by algorithms to further provide for secure communications.
  • a listener module such as, for example, a listener module described above in reference to FIG. 4 may detect all NISs and mobile device probes containing network information strings and submit that information to the biscuit server as biscuits in many combinations.
  • the listener module may be tasked with a specific purpose such as detecting known MAC addresses from beacon probes sent from wireless stations and submitting them as biscuits under a specific tag for use by specific applications for specific times.
  • the listener module may also create biscuits that include the location information of the listener module.
  • a listener module may also detect wireless stations assigned to particular users (such as an office manager) and submit biscuits that give other devices in proximity to that wireless module access to certain systems only for so long as that wireless station is detectible.
  • a listener module may also listen to all beacons in range and create biscuits based on combination of the NISs included in the beacons, or create biscuits based on combinations the NISs with information derived from probes sent by wireless stations.
  • a listener module may transmit beacons, or multiple beacons, that wireless stations can detect.
  • the beacons transmitted by the listener module may include NISs generated by secure algorithms that wireless stations that detect them may use in high security applications.
  • the algorithm used to generate the NIS's may turn on and off in combinations, change in rapid sequences, or be presented in combinations (many NIS's at once). All these combinations of NIS's can hold biscuits.
  • algorithm-generated NISs may be used at once, allowing complex proximity confirmed security.
  • This can provide one-to-one or many-to-many security between/among devices, such as, for example, communication devices, heavy equipment with NIS markers, and listener modules in combinations.
  • the proximity of the various devices may be determined when the devices are moving relative to each other. Fixed components may be used to provide Lat- Long location in addition to the proximity information.
  • a wireless device 800 may include a processor 801 coupled to an internal memory 802, to a display 803 and to a SIMM 821 or similar removable memory unit. Additionally, the wireless station 800 may optionally have a cellular antenna 804 for sending and receiving electromagnetic radiation that is connected to a cellular transceiver 805 coupled to the processor 801. In some implementations, the transceiver 805 and portions of the processor 801 and memory 802 may be used for multi-network communications. The wireless device 800 may also include a key pad 806 or miniature keyboard and menu selection buttons or rocker switches 807 for receiving user inputs. The wireless device 800 may also include a GPS navigation device 820 coupled to the processor and used to determine the location coordinates of the wireless device 800. Additionally, the display 803 may be a touch-sensitive device that may be configured to receive user inputs.
  • a wireless transceiver 830 provides wireless communications via wireless antenna 832.
  • the wireless transceiver may be compliant with 802.1 lx standards.
  • the processor 801 may be any programmable microprocessor, microcomputer or multiple processor chip or chips that can be configured by software instructions (applications) to perform a variety of functions, including the functions of the various embodiments described herein.
  • the wireless device 800 may include multiple processors 801, such as one processor dedicated to cellular and/or wireless communication functions and one processor dedicated to running other applications.
  • software applications may be stored in the internal memory 802 before they are accessed and loaded into the processor 801.
  • the internal memory 802 may include string utilization application 824.
  • the processor 801 may include or have access to an internal memory 802 sufficient to store the application software instructions.
  • the memory may also include an operating system 822.
  • the internal memory of the processor may include a secure memory (not illustrated) which is not directly accessible by users or applications and that is capable of recording MDINs and SIMM IDs as described in the various embodiments. As part of the processor, such a secure memory may not be replaced or accessed without damaging or replacing the processor.
  • the internal memory 802 may be a volatile or nonvolatile memory, such as flash memory, or a mixture of both.
  • a general reference to memory refers to all memory accessible by the processor 801, including internal memory 802, removable memory plugged into the computing device, and memory within the processor 801 itself, including the secure memory.
  • additional memory chips e.g., a Secure Data (SD) card
  • SD Secure Data
  • FIG. 9 is a system block diagram of a computing device suitable for use with various embodiments.
  • a typical computing device 1000 may include a processor 1001 coupled to internal memory 1002, to a display 1003, and to a speaker 1008. Additionally, the computing device 1000 will include an antenna 1004 for sending and receiving electromagnetic radiation and/or data messages to and from the Internet and/or other networks.
  • the various components may include a processor 1001 coupled to internal memory 1002, to a display 1003, and to a speaker 1008. Additionally, the computing device 1000 will include an antenna 1004 for sending and receiving electromagnetic radiation and/or data messages to and from the Internet and/or other networks.
  • server 1100 typically includes a processor 1101 coupled to volatile memory 1102 and a large capacity nonvolatile memory, such as a disk drive 1103.
  • the server 1100 may also include a floppy disc drive, compact disc (CD) or DVD disc drive 1104 coupled to the processor 1101.
  • the server 1100 may also include network access ports 1106 coupled to the processor 1101 for establishing data connections with a network 1112, such as a local area network coupled to other broadcast system computers and servers.
  • Servers 1100 may also include operator interfaces, such as a keyboard 1108, pointer device (e.g., a computer mouse 1110), and a display 1109.
  • the processors 1001, 1101 may be any programmable microprocessor, microcomputer or multiple processor chip or chips that can be configured by software instructions
  • processors may be provided, such as one processor dedicated to wireless communication functions and one processor dedicated to running other applications.
  • software applications may be stored in the internal memory 1002, 1102, and 1103 before they are accessed and loaded into the processor 1001, 1101.
  • the processor 1001, 1101 may include internal memory sufficient to store the application software instructions.
  • process flow diagrams are provided merely as illustrative examples and are not intended to require or imply that the steps of the various embodiments must be performed in the order presented. As will be appreciated by one of skill in the art the steps in the foregoing embodiments may be performed in any order. Words such as “then,” “next,” etc. are not intended to limit the order of the steps; these words are simply used to guide the reader through the description of the methods.
  • process flow diagrams may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be rearranged.
  • a process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination may correspond to a return of the function to the calling function or the main function.
  • Embodiments implemented in computer software may be implemented in software, firmware, middleware, microcode, hardware description languages, or any combination thereof.
  • a code segment or machine-executable instructions may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements.
  • a code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents.
  • Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
  • the functions may be stored as one or more instructions or code on a non-transitory computer-readable or processor-readable storage medium.
  • the steps of a method or algorithm disclosed herein may be embodied in a processor-executable software module which may reside on a computer-readable or processor-readable storage medium.
  • a non-transitory computer-readable or processor-readable media includes both computer storage media and tangible storage media that facilitate transfer of a computer program from one place to another.
  • a non-transitory processor-readable storage media may be any available media that may be accessed by a computer.
  • such non-transitory processor-readable media may comprise RAM, ROM,
  • Disk and disc include compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk, and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
  • the operations of a method or algorithm may reside as one or any combination or set of codes and/or instructions on a non-transitory processor- readable medium and/or computer-readable medium, which may be incorporated into a computer program product.
  • the functionality may be implemented within circuitry of a wireless signal processing circuit that may be suitable for use in a wireless receiver or mobile device.
  • a wireless signal processing circuit may include circuits for
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • a general- purpose processor may be a microprocessor, but, in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
  • a processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Alternatively, some steps or methods may be performed by circuitry that is specific to a given function.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Circuits Of Receivers In General (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Selon l'invention, une station sans fil reçoit un message diffusé par une station de diffusion de chaîne, lequel message comprend une chaîne d'informations de réseau. La station sans fil génère un identificateur comprenant un composant d'étiquette et un composant de contenu et envoie l'identificateur et la chaîne d'informations de réseau à un magasin de données. L'identificateur est stocké en association avec la chaîne d'informations de réseau dans le magasin de données.
PCT/US2013/068872 2012-11-07 2013-11-07 Système et procédé pour stocker et extraire des informations associées à un emplacement de réseau WO2014074672A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261723456P 2012-11-07 2012-11-07
US61/723,456 2012-11-07

Publications (2)

Publication Number Publication Date
WO2014074672A2 true WO2014074672A2 (fr) 2014-05-15
WO2014074672A3 WO2014074672A3 (fr) 2015-07-16

Family

ID=50685312

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/068872 WO2014074672A2 (fr) 2012-11-07 2013-11-07 Système et procédé pour stocker et extraire des informations associées à un emplacement de réseau

Country Status (1)

Country Link
WO (1) WO2014074672A2 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488053A (zh) * 2014-09-17 2016-04-13 阿里巴巴集团控股有限公司 一种信息匹配方法及装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005088991A1 (fr) * 2004-03-06 2005-09-22 Ting-Mao Chang Systeme et procede destines a determiner un emplacement au moyen d'identificateurs multiples de points d'acces sans fil
SG157355A1 (en) * 2004-10-29 2009-12-29 Skyhook Wireless Inc Location beacon database and server, method of building location beacon database, and location based service using same
US8000276B2 (en) * 2007-02-05 2011-08-16 Wefi, Inc. Providing easy access to radio networks
US8089405B2 (en) * 2007-10-02 2012-01-03 Ricoh Co., Ltd. Applications for geographically coded access points

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488053A (zh) * 2014-09-17 2016-04-13 阿里巴巴集团控股有限公司 一种信息匹配方法及装置
EP3195232A4 (fr) * 2014-09-17 2017-08-23 Alibaba Group Holding Limited Procédé et dispositif d'obtention de contenu d'informations de service
US10219204B2 (en) 2014-09-17 2019-02-26 Alibaba Group Holding Limited Method and device for obtaining content of service information
EP3525152A1 (fr) * 2014-09-17 2019-08-14 Alibaba Group Holding Limited Procédé et dispositif permettant d'obtenir un contenu d'informations de service
CN110263246A (zh) * 2014-09-17 2019-09-20 阿里巴巴集团控股有限公司 一种信息匹配方法及装置
US10555250B2 (en) 2014-09-17 2020-02-04 Alibaba Group Holding Limited Method and device for obtaining content of service information
TWI695271B (zh) * 2014-09-17 2020-06-01 香港商阿里巴巴集團服務有限公司 一種資訊匹配方法及裝置
CN110263246B (zh) * 2014-09-17 2023-11-17 创新先进技术有限公司 一种信息匹配方法及装置

Also Published As

Publication number Publication date
WO2014074672A3 (fr) 2015-07-16

Similar Documents

Publication Publication Date Title
US10212647B2 (en) System and method for managing content exchanges in a wireless network using a listener module
US8989094B2 (en) Systems and methods for generating and displaying application information on a wireless station
US11122393B2 (en) Beacon-based media network
US10325496B1 (en) Wireless transmission system to determine parking lot occupancy
US10818179B1 (en) Wireless transmission system to determine parking lot occupancy
US10455354B2 (en) Systems and methods for real-time user engagement and interactions
EP3195232B1 (fr) Procédé et dispositif d'obtention de contenu d'informations de service
WO2014063100A1 (fr) Association de groupes sur la base d'un emplacement déterminé par le réseau
US9749813B2 (en) System and method for associating a MAC address of a wireless station with personal identifying information of a user of the wireless station
WO2014074672A2 (fr) Système et procédé pour stocker et extraire des informations associées à un emplacement de réseau
Levallois-Barth Bluespam and the French National Commission on Data Protection (CNIL)
KR20150066612A (ko) 공간 기반의 포스터 서비스 제공 시스템 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13852586

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13852586

Country of ref document: EP

Kind code of ref document: A2