The present application is generally related to the subject matter of co-pending and co-owned U.S. patent application Ser. No. 14/959,948 filed on Dec. 4, 2015 and entitled “APPARATUS AND METHOD FOR WIRELESS NETWORK EXTENSIBILITY AND ENHANCEMENT”, Ser. No. 14/959,885 filed on Dec. 4, 2015 and entitled “APPARATUS AND METHODS FOR SELECTIVE DATA NETWORK ACCESS”, Ser. No. 14/534,067 filed Nov. 5, 2014 and entitled “METHODS AND APPARATUS FOR DETERMINING AN OPTIMIZED WIRELESS INTERFACE INSTALLATION CONFIGURATION”, and Ser. No. 14/302,313 filed Jun. 11, 2014 and entitled “METHODS AND APPARATUS FOR ACCESS POINT LOCATION”, each of the foregoing incorporated herein by reference in its entirety.
A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever.
1. Technological Field
The present disclosure relates generally to the field of wireless networks, and specifically in one implementation, to apparatus and methods for providing wireless network coverage within vehicles or other moving objects. Various disclosed embodiments extend and enhance wireless network systems to inter alia, accommodate the dynamic and fluid requirements of vehicular and/or other mobile network connectivity.
2. Description of Related Technology
Wireless networking technologies enable wireless devices to connect to one another. One common application for wireless technology is to provide network access to devices that are within a coverage area of a wireless network (e.g., WLAN, or wireless LAN) that is connected to the Internet. One such technology is Wi-Fi™ (IEEE Std. 802.11), which has become the de facto standard for wireless networking in consumer electronics. Wi-Fi enables multiple interconnected Access Points (APs, also commonly referred to as “hotspots”) to provide coverage areas ranging from those as small as local coffee shops or residences, to entire corporate and academic campuses.
Commercially, Wi-Fi provides high value services in, for example, airports, hotels, and restaurants. Businesses and/or promotional events often provide Internet service to attract customers. Artisans of ordinary skill in the related arts will readily appreciate that typical wireless APs have an effective connectivity range on the order of one hundred (100) feet, depending on factors such as the presence or absence of buildings or other structures (and their materials of construction), and other interfering emitters. Large coverage areas can be formed by grouping together a number of APs with overlapping coverage.
Vehicular Wi-Fi is a current area of interest for network providers. Existing solutions for vehicular Wi-Fi hotspots are coupled to either a satellite or cellular network for backhaul access. Unfortunately, while satellite and cellular networks can provide service over large coverage areas, they offer significantly less bandwidth than Wi-Fi. For example, practical implementations of existing cell technology cannot support more than 50 Mbps in the downlink and 20 Mbps in the uplink direction; in contrast, Wi-Fi supports 200 Mbps in the downlink and 50 Mbps in the uplink. Satellite technology provides even lower data rates than cellular. Consequently, satellite/cellular backhauls have inherent data bottlenecks that significantly limit the end user experience e.g., browsing videos, surfing the Internet, etc. This problem is exacerbated in multi-user environments; e.g., when multiple users (e.g., passengers) within the vehicle are each attempting to access external networks via a common (vehicular-centric) interface such as an LTE modem built into the vehicles infotainment or telematics system. Multiple passengers are each vying for access to the common, limited bandwidth “data pipe” (such as via their respective smartphones/tablets), as is the vehicle telematics system for functions such as navigation imagery, streaming Internet music, concierge services, etc.
Moreover, from a service provider perspective, both satellite and cellular networks are very expensive to deploy, upgrade, and maintain.
From a consumer standpoint, existing solutions for vehicular Wi-Fi that require a cellular/satellite backhaul provide marginal benefits (if any) over e.g., direct cellular network connectivity (such as e.g., LTE), and often require a subscription service to the more expensive backhaul networks, when compared to the relatively cheaper services of e.g., in-home cable network data services.
Moreover, users riding in vehicles are often rendered wholly or partly “unproductive” by virtue of limited bandwidth of the cellular/satellite backhaul, spotty coverage or dropouts, etc. Millions of person-hours are wasted each year in the U.S. by people riding in vehicles (especially when stuck in traffic or the like) who could otherwise be productive if high-bandwidth service was in fact available to them.
To these ends, solutions are needed to extend and enhance wireless network coverage within moving vehicles. Specifically, solutions and improvements would enable network providers to support Wi-Fi bandwidths within vehicles, preferably with minimal outlays of capital and/or network infrastructure, and with substantial flexibility.
The present disclosure addresses the foregoing needs by providing, inter alia, methods and apparatus for providing wireless network coverage within vehicles and/or other forms of mobile network connectivity.
In one aspect of the disclosure, a method performed via a stationary access point for operating a wireless network is provided. In one embodiment, the method includes: managing a first wireless local area network (WLAN) connection to a mobile access point that services a client device via a second WLAN connection; communicating data between the mobile access point and a service provider via the first WLAN connection; and causing the mobile access point to communicate the data to the client device via the second WLAN connection.
In one variant, the service provider includes a managed network operator, the data includes first data, and the method further includes: managing a third WLAN connection to a downstream access point; and communicating second data between the downstream access point and a second service provider via the third WLAN connection concurrently with communicating the first data between the mobile access point and the managed network operator via the first WLAN connection. In one implementation, the mobile access point includes a first mobile access point, the client device includes a first client device, the downstream access point includes a second mobile access point that services at least one of the first client device or a second client device, and the method further includes: causing the second mobile access point to communicate the second data to the second client device via the third WLAN connection. The first mobile access point and the second mobile access point have at least one common service set identifier (SSID). The downstream access point includes another stationary access point.
In another variant, the method includes communicating the data between the mobile access point and the service provider via the first WLAN connection and a wired connection managed at least in part by the service provider. The method can also include providing a third WLAN connection to an upstream access point and communicating the data between the mobile access point and the service provider via the first WLAN connection and the third WLAN connection.
In another aspect, a method of operating a wireless network having at least a mobile access point is provided. In one embodiment, the method includes: managing a first Wi-Fi connection to a stationary access point; managing a second Wi-Fi connection to a client device; and communicating data between the client device and a service provider network via the first Wi-Fi connection and the second Wi-Fi connection. The mobile access point and the client device can be located on or within a land-mobile vehicle. The data may include data originally configured for communication over a cellular network.
In one variant, the stationary access point is in data communication with a second stationary access point via a third Wi-Fi connection, and the method further includes communicating the data between the client device and the service provider network via the first Wi-Fi connection, the second Wi-Fi connection, and the third Wi-Fi connection.
In another variant, the stationary access point is connected to the service provider network via a wired connection, and the method includes communicating the data between the client device and the service provider network via the first Wi-Fi connection, the second Wi-Fi connection, and the wired connection.
In a further variant, the method further includes: establishing a third Wi-Fi connection to a second stationary access point; terminating the first Wi-Fi connection to the stationary access point; and communicating data between the client device and the service provider via the second Wi-Fi connection and the third Wi-Fi connection. The method may also include: scanning for access points that are in range of the mobile access point and that are not in wireless connection with the mobile access point; and establishing the third Wi-Fi connection to the second stationary access point based at least on the scanning. The first stationary access point may be associated with a first service set identifier (SSID), and the second stationary access point may be associated with a second, different SSID.
In yet another variant, the method further includes: managing throughput of the data communicated between the client device and the service provider based on signal conditions of the first Wi-Fi connection to the stationary access point. In another implementation, the method further includes: managing throughput of the data communicated between the client device and the service provider based on transit speed of the mobile access point.
In still another variant, the method further includes: receiving configuration information from the stationary access point; performing configuration of the mobile access point according to the configuration information; and maintaining the configuration of the mobile access point until a next power recycle of the mobile access point. The method may also include: authenticating with a backhaul network via the first Wi-Fi connection to the stationary access point for access to the backhaul network; and communicating the data between the client device and the service provider via the backhaul network. The method may further include: receiving, from the client device via the second Wi-Fi connection, payment information for connecting to a backhaul network associated with the stationary access point; and after receiving the payment information, communicating the data between the client device and the service provider via the first Wi-Fi connection and the second Wi-Fi connection. Additionally, the method may include communicating second data between a second client device and a second service provider via the first Wi-Fi connection and a third Wi-Fi connection concurrently with communicating the first data between the first client device and the first content provider via the first Wi-Fi connection and the second Wi-Fi connection.
In another aspect, system for use within a wireless network is disclosed. In one embodiment, the system apparatus includes: a plurality of stationary access points, each of the plurality of stationary access points configured to effectuate a respective Wi-Fi connection to one or more respective mobile access points, and to communicate data between the one or more respective mobile access points and a respective service provider via the respective Wi-Fi connection; wherein a first stationary access point of the plurality of stationary access points is configured to effectuate a wired connection to a network, and to communicate data between the respective mobile access point and the respective content provider via the respective Wi-Fi connection and the wired connection to the network; and wherein a second stationary access point of the plurality of stationary access points is configured to effectuate a Wi-Fi connection to the first stationary access point, the second stationary access point configured to communicate data between the respective mobile access point and the respective service provider via at least the respective Wi-Fi connection to the mobile access point, the Wi-Fi connection to the first stationary access point, and the wired connection to the network.
These and other aspects shall become apparent when considered in light of the disclosure provided herein.
All figures © Copyright 2016 Time Warner Enterprises LLC. All rights reserved.
Reference is now made to the drawings wherein like numerals refer to like parts throughout.
As used herein, the term “application” refers generally and without limitation to a unit of executable software that implements a certain functionality or theme. The themes of applications vary broadly across any number of disciplines and functions (such as on-demand content management, e-commerce transactions, brokerage transactions, home entertainment, calculator etc.), and one application may have more than one theme. The unit of executable software generally runs in a predetermined environment; for example, the unit could include a downloadable Java Xlet™ that runs within the JavaTV™ environment.
As used herein, the term “codec” refers to a video, audio, or other data coding and/or decoding algorithm, process or apparatus including, without limitation, those of the MPEG (e.g., MPEG-1, MPEG-2, MPEG-4/H.264, etc.), Real (RealVideo, etc.), AC-3 (audio), DiVX, XViD/ViDX, Windows Media Video (e.g., WMV 7, 8, 9, 10, or 11), ATI Video codec, or VC-1 (SMPTE standard 421M) families.
As used herein, the term “computer program” or “software” is meant to include any sequence or human or machine cognizable steps which perform a function. Such program may be rendered in virtually any programming language or environment including, for example, C/C++, Fortran, COBOL, PASCAL, assembly language, markup languages (e.g., HTML, SGML, XML, VoXML), and the like, as well as object-oriented environments such as the Common Object Request Broker Architecture (CORBA), Java™ (including J2ME, Java Beans, etc.) and the like.
The term “Customer Premises Equipment (CPE)” refers without limitation to any type of electronic equipment located within a customer's or subscriber's premises and connected to or in communication with a network.
As used herein, the term “DOCSIS” refers to any of the existing or planned variants of the Data Over Cable Services Interface Specification, including for example DOCSIS versions 1.0, 1.1, 2.0, 3.0 and 3.1.
As used herein, the term “headend” refers generally to a networked system controlled by an operator (e.g., an MSO) that distributes programming to MSO clientele using client devices. Such programming may include literally any information source/receiver including, inter alia, free-to-air TV channels, pay TV channels, interactive TV, and the Internet.
As used herein, the terms “Internet” and “internet” are used interchangeably to refer to inter-networks including, without limitation, the Internet.
As used herein, the term “memory” includes any type of integrated circuit or other storage device adapted for storing digital data including, without limitation, ROM. PROM, EEPROM, DRAM, SDRAM, DDR/2 SDRAM, EDO/FPMS, RLDRAM, SRAM, “flash” memory (e.g., NAND/NOR), and PSRAM.
As used herein, the terms “microprocessor” and “processor” or “digital processor” are meant generally to include all types of digital processing devices including, without limitation, digital signal processors (DSPs), reduced instruction set computers (RISC), general-purpose (CISC) processors, microprocessors, gate arrays (e.g., FPGAs), PLDs, reconfigurable computer fabrics (RCFs), array processors, secure microprocessors, and application-specific integrated circuits (ASICs). Such digital processors may be contained on a single unitary IC die, or distributed across multiple components.
As used herein, the terms “MSO” or “multiple systems operator” refer to a cable, satellite, or terrestrial network provider having infrastructure required to deliver services including programming and data over those mediums.
As used herein, the terms “network” and “bearer network” refer generally to any type of telecommunications or data network including, without limitation, hybrid fiber coax (HFC) networks, satellite networks, telco networks, and data networks (including MANs, WANs, LANs, WLANs, internets, and intranets). Such networks or portions thereof may utilize any one or more different topologies (e.g., ring, bus, star, loop, etc.), transmission media (e.g., wired/RF cable, RF wireless, millimeter wave, optical, etc.) and/or communications or networking protocols (e.g., SONET, DOCSIS, IEEE Std. 802.3, ATM, X.25, Frame Relay, 3GPP, 3GPP2, WAP, SIP, UDP, FTP, RTP/RTCP, H.323, etc.).
As used herein, the term “network interface” refers to any signal or data interface with a component or network including, without limitation, those of the FireWire (e.g., FW400, FW800, etc.), USB (e.g., USB2), Ethernet (e.g., 10/100, 10/100/1000 (Gigabit Ethernet), 10-Gig-E, etc.), MoCA, Coaxsys (e.g., TVnet™), radio frequency tuner (e.g., in-band or OOB, cable modem, etc.), Wi-Fi (802.11), WiMAX (802.16), Zigbee®, Z-wave, PAN (e.g., 802.15), power line carrier (PLC), or IrDA families.
As used herein, the term “QAM” refers to modulation schemes used for sending signals over cable networks. Such modulation scheme might use any constellation level (e.g. QPSK, 16-QAM, 64-QAM, 256-QAM, etc.) depending on details of a cable network. A QAM may also refer to a physical channel modulated according to the schemes.
As used herein, the term “server” refers to any computerized component, system or entity regardless of form which is adapted to provide data, files, applications, content, or other services to one or more other devices or entities on a computer network.
As used herein, the term “storage” refers to without limitation computer hard drives, DVR device, memory, RAID devices or arrays, optical media (e.g., CD-ROMs, Laserdiscs, Blu-Ray, etc.), or any other devices or media capable of storing content or other information.
As used herein, the term “Wi-Fi” refers to, without limitation, any of the variants of IEEE-Std. 802.11 or related standards including 802.11 a/b/g/n/s/v/ac or 802.11-2012, each of the foregoing incorporated herein by reference in its entirety.
As used herein, the term “wireless” means any wireless signal, data, communication, or other interface including without limitation Wi-Fi, Bluetooth, 3G (3GPP/3GPP2), HSDPA/HSUPA, TDMA, CDMA (e.g., IS-95A, WCDMA, etc.), FHSS, DSSS, GSM, PAN/802.15, WiMAX (802.16), 802.20, Zigbee®, Z-wave, narrowband/FDMA, OFDM, PCS/DCS, LTE/LTE-A, analog cellular, CDPD, satellite systems, millimeter wave or microwave systems, acoustic, and infrared (i.e., IrDA).
In one aspect of the present disclosure, a wireless network of access points provides backhaul access connectivity to e.g., a vehicular hotspot or series of hotspots. The wireless network of access points includes so-called “parent access points” (PAPs), “child access points” (CAPs), and “transit access points” (TAPs). Each PAP operates as a service gateway and provides a wireless coverage area, which is further augmented by the coverages of its subsidiary CAPs. Each TAP can connect to either a PAP or a CAP for backhaul access. During exemplary operation, a subscriber's Wi-Fi client device connects to a TAP located in the vehicle (e.g., car, train, bus, etc.) As described in greater detail hereinafter, the TAP roams between PAP and/or CAP coverage as the vehicle moves.
Various embodiments of the present disclosure provide improved throughput via the Wi-Fi backhaul (when compared to mobile satellite/cellular alternatives), and reduce reception overhead for the typically smaller, less powerful Wi-Fi client devices. Instead, throughput for Wi-Fi users in one implementation of the disclosure is based on the signal conditions between the TAP and its respective backhaul access point (PAP or CAP). Vehicular TAPs can be optimized for maximum visibility and can implement more aggressive reception techniques due to fewer power constraints, thereby providing better throughput than the client devices would otherwise be capable of. Still further, multiple users can simultaneously arbitrate for, and use the Wi-Fi service without caps on the throughput speeds, subject to the TAP's constraints. Artisans of ordinary skill in the related arts will readily appreciate, given the contents of the present disclosure, that the Wi-Fi client devices are stationary relative to the TAP; accordingly, certain mobility management functions can be greatly reduced/obviated. For example, a Wi-Fi client device does not experience a disruption in service during handover operation (the TAP transparently manages backhaul access to nearby PAPs/CAPs).
Various business considerations are discussed in greater detail herein. In one aspect of the present disclosure, vehicular access is monetized via an overarching service provider's accounting infrastructure; for example, a network subscriber of cable service at home may also receive the added benefits of vehicular accessibility. In some cases, an AP may be registered in several multiple system operator (MSO) networks, thereby allowing the AP to seamlessly move between registered MSO networks (so-called “partner networks”), and hence further expanding coverage areas that can provide uninterrupted Wi-Fi services. In still other cases, a cellular network provider may redirect a cellular subscriber (who is not a member of a MSO network) to use the MSO's Wi-Fi network so as to offload cellular network congestion; here, the cellular network provider may subsidize the Wi-Fi roaming costs. The cellular network may instruct the client device of the cellular subscriber to switch the IP traffic to use the Wi-Fi connection instead of the cellular data connection. Any data originally targeted for communication via the cellular network is delivered over the Wi-Fi network.
Exemplary embodiments of the apparatus and methods of the present disclosure are now described in detail. While these exemplary embodiments are described in the context of a wireless network connectivity provided by a multiple systems operator (MSO) that offers digital networking capability and Internet Protocol (IP) packet delivery capability, the general principles and advantages of the disclosure may be extended to other types of networks and architectures that are configured to deliver digital media data (e.g., text, video, and/or audio). Such other networks or architectures may be broadband, narrowband, wired or wireless, or otherwise, the following therefore being merely exemplary in nature.
Moreover, it will be appreciated that while described generally in the context of a network providing service to a vehicular context, the present disclosure may be readily adapted to other types of mobile, “limited mobile” (e.g., low-velocity or spatially constrained vehicles such as trams, elevators, moving walkways, etc.) and non-mobile environments including, e.g., commercial/enterprise, and government/military applications. Myriad other applications are possible, as will be recognized by those of ordinary skill given the present disclosure.
Also, while certain aspects are described primarily in the context of the well-known Internet Protocol (described in, inter alia, Internet Protocol DARPA Internet Program Protocol Specification, IETF RCF 791 (September 1981) and Deering, et al., Internet Protocol, Version 6 (IPv6) Specification, IETF RFC 2460 (December 1998) each of which is incorporated herein by reference in its entirety), it will be appreciated that the present disclosure may utilize other types of protocols (and in fact bearer networks to include other internets and intranets) to implement the described functionality.
Other features and advantages of the present disclosure will immediately be recognized by persons of ordinary skill in the art with reference to the attached drawings and detailed description of exemplary embodiments as given below.
Service Provider Network—
As opposed to an unmanaged network, the managed service-provider network of
Advantageously, the service provider network 100 also allows components at the service location (e.g., Wi-Fi APs and any supporting infrastructure such as routers, switches, MIMO or modulation coding scheme (MCS) or other physical layer (PHY) configurations, etc.) to be remotely reconfigured by the network MSO, based on e.g., prevailing operational conditions in the network, changes in user population and/or makeup of users at the service location, business models (e.g., to maximize profitability), etc.
The various components of the exemplary embodiment of the network 100 include (i) one or more data and application origination points 102; (ii) one or more content sources 103, (iii) one or more application distribution servers 104; (iv) one or more VOD servers 105, (v) customer premises equipment (CPE) 106, (vi) one or more routers 108, (vii) one or more wireless access point controllers 110, (viii) one or more parent APs (PAPs) 112, (ix) one or more children APs (CAPs) 114, and/or (x) one or more transit APs (TAPs) 116. The application server(s) 104, VOD servers 105, CPE(s) 106, and router(s) 108 are connected via a bearer (e.g., HFC) network 101. A simple architecture comprising one of each of the aforementioned components 102, 103, 104, 105, 106, 108, 110, 112, 114, and 116 is shown in
The exemplary architecture 150 of
Content (e.g., audio, video, data, files, etc.) is provided in each downstream (in-band) channel associated with the relevant service group. To communicate with the headend or intermediary node (e.g., hub server), the CPE 106 may use the out-of-band (OOB) or DOCSIS channels and associated protocols. The OCAP 1.0, 2.0, 3.0, 3.1 (and subsequent) specification provides for exemplary networking protocols both downstream and upstream, although the present disclosure is in no way limited to these approaches.
In addition to “broadcast” content (e.g., video programming), the systems of
Referring again to
The edge switch 194 forwards the packets received from the CMTS 199 to the QAM modulator 189, which transmits the packets on one or more physical (QAM-modulated RF) channels to the CPE. The IP packets are typically transmitted on RF channels (e.g., DOCSIS QAMs) that are different than the RF channels used for the broadcast video and audio programming, although this is not a requirement. The CPE 106 (shown in
While the foregoing network architectures described herein can (and in fact do) carry packetized content (e.g., IP over MPEG for high-speed data or Internet TV, MPEG2 packet content over QAM for MPTS, etc.), they are often not optimized for such delivery. Hence, in accordance with another embodiment of the disclosure, a “packet optimized” delivery network is used for carriage of the packet content (e.g., IPTV content).
It will be appreciated that the foregoing MSO or managed network can advantageously be leveraged for easy installation of the various AP components described herein (e.g., PAP/CAP/TAP) within a geographic region. Specifically, in that the MSO network is already pervasive through a given area (i.e., the MSO has numerous customers, both business and residential and otherwise) within a given area, the MSO already has significant infrastructure deployed, and often at a very high level of granularity. Hence, where a given AP needs to be placed at a given location in order to effect the coverage/operation for the Wi-Fi network described herein, the MSO can easily “tap off” that existing infrastructure in that area to enable the AP placement. This may take the form of e.g., placement of an AP coincident with a given customer's extant equipment, and/or placement of new equipment that taps off a local service node. The present disclosure further contemplates provision by the MSO (or other parties) of consideration to the customer for allowing the placement of the equipment on their premises (e.g., payments, credits on their bill, special services or features, etc.).
As noted elsewhere herein, it is also contemplated that the service provider may utilize or “piggy back” off the infrastructure of other service providers, utilities, etc. For instance, a third party service provider may have a high-bandwidth backhaul “drop” near a location desired by the MSO; the MSO can they lease, pay, rent, etc. that third party for use of the drop. Similarly, traffic signal poles, lighting, bridges, tunnels, etc. all contain a wide variety of cabling, conduits, and other infrastructure which the (host) MSO could make use of so as to obviate having to perform a new installation (and all of the attendant costs and delays thereof).
Exemplary Wireless Network Architecture and Methods—
Referring now to
As used herein, the term “access point” includes, but is not limited to, any wireless device operating that enables one or more other devices (which themselves may be an access point and/or a client device) to connect to a wired or wireless network using Wi-Fi, or a similar wireless networking standard. It is appreciated that while Wi-Fi (and its several variants) is the prevalent, de facto standard for wireless local area networking, the various aspects of the present disclosure are in no way limited to Wi-Fi, and in fact further contemplate heterogeneous implementations, such as where Wi-Fi and another air interface standard are employed in concert, such as to provide heterogeneous capabilities in terms of range, bandwidth, frequency band of operation, etc. As noted above, Wi-Fi in its current incarnation has ranges on the order of 100 feet or so, and data bandwidth on the order of 200 Mbps (DL). It may be the case that in certain geographic areas, an AP with less bandwidth and greater range may suffice or be desirable (due to e.g., topological considerations, propagation challenges, less demanding use-cases, etc.), and hence the present disclosure allows for such “intelligent mixing” of different air interfaces to achieve a more optimized result.
An access point may further include additional capabilities, including but not limited to: network management, security capabilities (authorization, authentication, etc.), routing capabilities, firewall capabilities, network address translation (NAT), encapsulation, virtual private network (VPN), etc.
As used herein, the term “client device” refers generally to any electronics device configured to transmit and receive data for application and/or use; client devices may include, but are not limited to, set-top boxes (e.g., DSTBs), gateways, modems, personal computers (PCs), and minicomputers, whether desktop, laptop, or otherwise, and mobile devices such as handheld computers, PDAs, personal media devices (PMDs), tablets, “phablets”, smart watches, and smartphones. A client may also be wholly or partly integrated with a vehicular telematics or infotainment system, or even constitute an aggregation of two or more individual clients (e.g., two or more devices logically cooperating with one another to provide a desired capability or functionality).
As used herein, the term “vehicle” refers generally and without limitation to any mobile machine used to transport persons and/or cargo, and may include, but are not limited to: cars, buses, trains, planes, boats, trams, elevators, submersibles, etc.
In one exemplary embodiment, the TAP 116 is located at a static (or semi-static) position relative to the vehicle. Radio link fading is primarily due to distance, weather conditions, and visibility; thus, the radio channel conditions between the TAP 116 and the client device 118 are relatively stable and unchanging when considered relative to the radio conditions between the TAP 116 and the PAP 112 or CAP 114.
As a brief aside, in the exemplary context of Wi-Fi operation, APs and client devices share the same resources. For example, the uplink and downlink must arbitrate over the same bandwidth according to e.g., time slots. Thus, increasing the uplink transactions decreases downlink resources available for transactions (and vice versa). From a network resource utilization and/or interference standpoint, operating a TAP hotspot for a client device provides multiple benefits when compared to directly connecting a client to a PAP/CAP hotspot. Firstly, most client devices are portable handheld devices (e.g., smartphones and laptops) which have limited battery capabilities; consequently, client devices are often unable to maximally utilize reception and transmission techniques that consume more power (e.g., multiple input multiple output (MIMO), increasing transmit and reception gain, increasing processing gains, etc.).
In contrast, vehicles have ready access to power (e.g., an electrical system driven by the engine, etc.); thus vehicles can provide power to a TAP to enable more aggressive radio techniques, while simultaneously addressing client device power consumption.
Performance improvements may be further amplified where there are multiple client devices within a vehicle. For example, even though each client device is unaware of the service requirements of the other client devices in the vehicle, a TAP services all of the client devices and is able to centrally manage services for the vehicle. In some scenarios, a TAP can prioritize services for the community of client devices, and service client devices concurrently by ensuring that each client device is granted an appropriate amount of bandwidth according to an allocation scheme. Common allocation schemes include e.g., fairness, prioritization, round-robin, etc. Centrally managed allocation schemes can prevent or reduce close quarters client device interferences (i.e., where multiple client devices interfere with each other, resulting in sub-optimal performance for the devices).
Additionally, a TAP can consolidate network management overhead; for example, a single TAP can change its backhaul access link path between the various PAPs and CAPs of the wireless mesh network transparently to each of its serviced client devices. This greatly simplifies the processing burden on each of the client devices; additionally, it reduces overall network strain as the wireless mesh network can handle one aggregated handover for all the connected client devices of the TAP, rather than negotiating each handover individually. As a brief aside, so-called “mesh networks” enable each node to relay messages to other nodes of the network; relaying may occur via any number of intermediary nodes (i.e., “hops”). Existing mesh networking technologies encompass fully connected meshes (i.e., where each node is connected to all other nodes) as well as partially-connected meshes (i.e., where nodes are connected to some subset of the total network). Mesh networks may employ both routing addressing (i.e., unicast) and so-called “flooding” address schemes (i.e., broadcast/multicast).
As used herein, the term “handover” refers to a transfer of a device (access point or client) from one serving access point to another serving access point. Handovers may be intra-network (i.e., within the same network) or inter-network (i.e., between two different networks).
During data transactions, the intermediary access points of the wireless mesh network (e.g., the PAP 112 and/or intermediary CAPs 114) connect to a backhaul link for the TAP 116 and its respective client devices. Functionally, each intermediary access point can aggregate, and transfer bi-directional data from one or more downstream (or “southbound”) peers as well as its upstream (or “northbound”) service node to provide the requisite backhaul link. More directly, it should be appreciated that each CAP may be required to support multiple TAPs, and each PAP may support multiple CAPs and TAPs. Since the overall bandwidth that is serviceable by the PAP may be limited by the PAP's Wi-Fi bandwidth, each intermediary node may be required to manage congestion either by prioritizing delivery of data (including potentially dropping data), and/or throttling data rates appropriately.
In one embodiment, the upstream and downstream connectivity is performed according to a Time Division Multiple Access (TDMA) scheme. Other appropriate multiple access schemes may be used, including for example Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access (OFDMA), Code Division Multiple Access (CDMA), etc. Certain system design considerations may require the flexibility of packet-switched delivery, or alternately, the bandwidth guarantees of circuit-switched delivery. Additionally, network content delivery may further include capabilities and support for Quality-of-Service (QoS) parameters. QoS parameters support resource reservation control mechanisms and may, inter alia, provide different priorities to different content data, or guarantee a minimum delivery rate.
From a cost perspective, operating a network of hotspots for backhaul access capabilities is far superior to the alternatives. At current (2016) prices, a cellular tower that provides coverage over distances of 1500 feet (about 7 million square feet if assumed omni-directional) costs approximately $1.5M, and may have maintenance costs of $200K per year. Satellite deployments are even more expensive, and require near-earth rocketry (typically requiring government licensing and contracts, etc.). In contrast, a Wi-Fi hotspot can provide coverage over distances of 250-300 feet (280 thousand square feet), and each hotspot costs approximately $1.5K with maintenance costs of $3K per year. Wi-Fi enabled integrated circuit (IC) prices are sub-$1 at the time of this writing. Thus, an array of Wi-Fi hotspots that provide equivalent coverage areas to a cellular tower would be approximately $38K. Additionally, while cellular towers provide coverage over a broad area, the smaller coverage area of Wi-Fi hotspots enables focused or tailored deployments. For example, a linear distance of 1500 feet (such as would be suitable for a roadway) could be covered with as few as 6 hotspots.
Various other improvements and optimizations attributable to aggregating client devices within a vehicular hotspot will be readily appreciated by those of ordinary skill in the related arts, given the contents of the present disclosure.
Backhaul Link Management—
Traditionally, within the context of Wi-Fi networking, the connection quality is primarily limited by the radio link between the client and its serving AP. Thus, where the client device has poor reception, the client device adjust its operation to compensate (e.g., by reducing application software performance, etc.). However, unlike traditional wireless networking, the exemplary wireless network of access points described herein is not primarily bottlenecked at the client; rather the weakest radio link is most likely to occur between two or more of the TAP, CAPs, and/or PAP. For example, the TAP may experience significant mobility-related issues that affect channel quality to the CAP. Similarly, even where a TAP has a relatively clear connection to a CAP, the CAP's link to the PAP may experience attenuation due to e.g., rain fade, distance, momentary obstruction, etc. Since the bottlenecking radio link of the wireless “mesh fabric” is not apparent to the endpoints (i.e., the client device 118 and the network entity), various features and embodiments of the present disclosure are directed to managing backhaul link operation.
As shown, the TAP moves from a first position (˜0 ft from PAP) to a second position (˜100 ft from the PAP, ˜200 ft from the CAP) and throttles data rates to/from its clients commensurate to its diminishing reception quality. While the TAP is in the first position, it can offer a total throughput based on its received signal strength (RSSI); e.g., the TAP can provide a downlink (DL) data rate that corresponds to an RSSI of 50, and an uplink (UL) data rate that corresponds to an RSSI of 15. As the TAP nears the second position, its downlink and uplink rates have diminished (corresponding to RSSIs of 30 DL and 10 UL, respectively).
As the TAP leaves the second position and moves to the third position (˜200 ft from the PAP 112, ˜100 ft from the CAP) performance at the TAP continues to degrade. Artisans of ordinary skill in the related arts, given the contents of the present disclosure, will readily appreciate that Wi-Fi APs contend over the same transmit and receive resources (e.g., timeslots); e.g., TAP bandwidth detracts from the bandwidth available to the CAP, and vice versa. Thus, even though the channel between the TAP and CAP is relatively clear, the TAP may still have a better overall performance by remaining connected to the PAP rather than handing over to the CAP.
Unfortunately, the TAP and CAP nodes may be unaware of the overall network topology and bandwidth capabilities. Although the PAP has an overarching network view, the PAP does not have direct access to point-to-point link quality information (e.g., RSSI, etc.) Accordingly, in one embodiment, each “parent” node determines the overall bandwidth allocations for each of its immediate downstream “children” nodes, thereby localizing link decisions to the node that is most closely situated to the radio links. More directly, the PAP controls the resource allocations for its immediately connected downstream CAP(s) and TAP(s) (if any); similarly, the CAP controls resource allocations for any of its immediately connected downstream CAP(s) and TAP(s) (if any), etc.
As shown, once the TAP leaves the third position and moves to the fourth position (˜0 ft from the CAP), the TAP's connection to the PAP is too far attenuated. Thus, in order to maximize its throughput, the TAP may continuously search for, and handover to, an optimal CAP (or another PAP). The TAP may consider a variety of considerations in determining the optimal CAP or PAP. Common considerations include e.g., channel quality, network congestion, cost considerations, roaming network agreements, user preference, historic performance, etc. Once the TAP has identified the CAP and successfully performed a handover, the TAP's throughput is restored.
Inter-Network Handovers—
Artisans of ordinary skill in the related arts will readily appreciate that existing Wi-Fi technology was designed for wired backhaul access; thus, hotspots are not configured to dynamically change backhaul access. As a brief aside, existing Wi-Fi networks might group together a number of APs with overlapping coverage with a single common service set identifier (SSID). Typically, existing large scale hotspot deployments only use a few SSIDs; for example, a corporate campus may use one SSID for a private network and another SSID for a public network. Once a client device has registered with a network, it will ignore wireless packets from other networks with a different SSID.
Unlike prior art Wi-Fi technologies, various embodiments of the present disclosure are directed to an access point with a wireless backhaul link. For example, consider
Rather than abruptly terminating existing sessions, in one optimized variant, the TAP 116 maintains a presence in multiple networks simultaneously. As illustrated in
Methods—
At step 502 of the method 500, an access point (e.g., TAP) establishes a connection with one or more backhaul access points (e.g., CAP/PAP). In one embodiment, the access point discovers the presence of backhaul access points based on one or more beacon signals via e.g., active searches, user input, etc. Once the access point has discovered one or more available backhaul access points, the access point may preferentially connect to a backhaul access point based at least in part on information included within the one or more beacon signals. Common examples of such information may include e.g., network identification, signal quality, supported modes of operation, network congestion, etc. In some embodiments, the access point may connect to multiple backhaul access points in tandem so as to e.g., ensure the presence of at least one connection, access multiple different networks simultaneously, etc.
In one variant, the access point is configured to connect to a particular backhaul access point (CAP/PAP) based at least in one or more predefined parameters. In some cases, the predefined parameters may be set by the network provider; in other cases the predefined parameters may be set by the user (e.g., based on user preferences for billing, power consumption, etc.). In still other cases, the predetermined parameters may be internally managed by the access point based on ongoing device considerations (e.g., processing burden, power management considerations, hardware/software compatibility, etc.).
In other cases, the access point may also be steered or associated with a backhaul access point based on e.g., different services provided by that upstream backhaul access point (e.g., higher available upstream bandwidth); see, e.g., the methods and apparatus described in co-owned and co-pending U.S. patent application Ser. No. 14/959,885 filed on Dec. 4, 2015 and entitled “APPARATUS AND METHODS FOR SELECTIVE DATA NETWORK ACCESS”, previously incorporated herein, for exemplary approaches to such association.
In one embodiment, the access point may operate within the coverage area of multiple networks. For example, in one variant, the access point may receive multiple signals from multiple different backhaul access points with different Service Set Identifiers (SSIDs). The access point may connect via one or more of these different backhaul access points, ostensibly providing a coverage area that bridges between the different backhaul networks. In such variants, the access point may select which backhaul access points to connect, based on one or more of a multitude of considerations including, without limitation: (i) the access point's processing burden, (ii) the access point's transceiver capabilities, (iii) the access point's power consumption/remaining power, (iv) the link quality of each backhaul access point, (v) the congestion of each backhaul access point, and/or (vi) overarching network coverage considerations (e.g., based on data generated from a centralized access point or access point controller).
In one such implementation, each backhaul network maintains an access point registry that enables registered access points to migrate into and out of the backhaul network with minimal handover overhead (e.g., authentication, authorization, etc.). In some variants, the access point registry may periodically “prune” access points based on e.g., inactivity, last use, first use, frequency of use, and/or network considerations, etc. In some cases, an access point may be added to the access point registry upon a successful registry within the network.
In other cases, an access point may be added to the access point registry pre-emptively based on e.g., forecasted activity, out-of-band “pushes” (described in greater detail infra), etc. In still other cases, an access point may be added to the access point registry based on a threshold condition (e.g., a number of uses within a designated time period, etc.).
Each access point is, in the exemplary configuration, identified by a unique identifier to the access point controller and/or access point registry. Common examples of unique identifiers include, without limitation, a user email account (or other subscriber-specific account), vehicular identification (e.g., VIN number, license plate, etc.), account number, device-specific identifier (e.g., medium access control (MAC) ID, serial number etc.), software registration number (e.g., assigned during initial software installation), etc.
In one embodiment, registration with a backhaul access point network includes establishing a permanent or semi-permanent security association between the backhaul access point network and the access point. In some implementations, the access point is authenticated and/or authorized to service client devices using a network identifier. For example, the access point may be assigned a service set identifier (SSID). In some embodiments, the network identifier matches the backhaul access network's identifier; alternatively, the network identifier may be unique to the access point, and maintained when the access point connects to a different backhaul network.
As a brief aside, within the context of Wi-Fi, client devices ignore packets that have different SSIDs. Thus, session continuity can only be maintained in a Wi-Fi handover where the SSIDs are the same between two access points of the same Wi-Fi network. However, artisans of ordinary skill in the related arts will readily appreciate that the various principles described herein may be used with equivalent success in technologies that support session continuity for cross-network data transfers, and/or that provide for other handover provisions, the foregoing being purely illustrative. For example, the access point may support session continuity despite changing SSIDs in networks that support session continuity via out-of-band messaging, etc.
In some embodiments, after performing a boot-up procedure and upon registering with a backhaul access point, the access point receives configuration information from the backhaul access point, configures itself according to the configuration information, and holds the configuration until the next power recycle. Some examples of configuration include configuration settings for managing handovers between access points, managing throughput to connected devices, managing capabilities supported by the wireless network, etc. Holding the configuration until the next power cycle may allow the AP to seamlessly move between backhaul access points and provide uninterrupted Wi-Fi services.
At step 504 of the method 500 of
It will be appreciated that the hotspot may be configured to support client devices and/or access points. For example, in one such use case, the hotspot is a vehicular access point that services a number of client devices of the vehicle (as well as e.g., the indigenous telematics functions). In other use cases, the hotspot is a child access point that services one or more vehicular access points. Still other variants may be a combination or hybrid of the foregoing.
In some cases, the access point may dynamically arbitrate for hotspot resources. For example, within the context of Wi-Fi, an access point may use existing Wi-Fi distributed coordination function (DCF) operation to share the wireless medium between multiple other access points and clients. DCF relies on carrier sense multiple access with collision avoidance (CSMA/CA), and optionally includes request to send/clear to send signaling (RTS/CTS) to share the wireless medium. In other schemes, the access point may assign specific resources for use (e.g., uplink and downlink frequencies, time slots, spreading codes, etc.) Generally, within the context of Wi-Fi, the beacon signal is transmitted within a dedicated time slot, whereas other data transmissions are dynamically arbitrated according to the aforementioned Wi-Fi DCF functionality.
As a brief aside, artisans of ordinary skill in the related arts will readily appreciate that increasing the uplink transactions decreases downlink resources available for transactions (and vice versa). Since data transactions and backhaul overhead use the same resources, it may be better from a network resource utilization and/or interference standpoint for the access point to relay data via an intermediary access point to a farther upstream access point, or to transmit the data directly to the upstream access point. Additionally, certain system design considerations may require the flexibility of packet-switched delivery, or alternately, the bandwidth guarantees of circuit-switched delivery. Network content delivery may further include capabilities and support for Quality-of-Service (QoS) parameters. QoS parameters support resource reservation control mechanisms and may, inter alia, provide different priorities to different content data, or guarantee a minimum delivery rate.
In view of the foregoing, in one embodiment, the access point may consider its own limitations, the requested service of its attached wireless clients, and/or network considerations in the selection of an optimal backhaul access link to service its traffic. In other embodiments, one or more intermediary nodes of the backhaul network may be required to manage traffic flow. Common traffic flow management tasks include e.g., reducing data rates and/or preferentially service one or more downstream devices. In still other embodiments, traffic management may be implemented at upstream network entities (such as the access point controller).
In some embodiments, the access point broadcasts one or more beacons that enable devices within its vicinity to discover the access point. As previously noted, wireless devices monitor for beacons, and regularly assess beacon signal strength in order to determine which access point can provide the best coverage. In other embodiments, the access point broadcasts one or more continuous signals (e.g., a pilot signal), so as to enable continuous mobility correction (e.g., fast fading compensation, etc.) In some variants, the continuous signals may be broadcast via a different bandwidth; for example, an access point may provide hotspot coverage via a 5 GHz bandwidth (consistent with existing Wi-Fi operation), and provide a dedicated pilot signal via a 2.4 GHz bandwidth. Still other solutions for mobility management will be readily appreciated by those of ordinary skill given the contents of the present disclosure.
Unlike existing wireless network service nodes, one embodiment of an access point continues to monitor its backhaul access link (step 506 of the method 500) and adjusts its service provisioning in accordance with its backhaul access link quality. In one such embodiment, the access point monitors its own movement so as to better predict future link quality, etc.
The backhaul access link quality is measured, in one implementation, based on received signal strength indication (RSSI). Artisans of ordinary skill in the related arts will appreciate that virtually any signal or link quality measure (or multiple measures used in tandem or in a coincidence/confirmatory fashion) may be substituted with equivalent success. Other examples of link quality include, without limitation: received signal strength (RSS), signal-to-noise ratio (SNR), carrier-to-noise ratio (CNR), signal-to-interference plus noise ratio (SINR), carrier-to-interference plus noise ratio (CINR), bit error rate (BER), block error rate (BLER), packet error rate (PER), etc.
In some embodiments, backhaul access link quality is measured on a periodic basis, such as e.g., at regular prescribed intervals, and/or at dynamically prescribed intervals (e.g., where the interval is dynamically shortened or elongated based on prevailing conditions such as vehicle movement speed/acceleration/deceleration which could make it more desirable to measure/sample at a different periodicity). In other embodiments, backhaul access link quality is measured continuously, or semi-continuously (e.g., continuously for prescribed durations, punctuated by periods of non-measurement). Still other embodiments may implement a combination of the foregoing; for example, an access point may continuously check its backhaul link while moving, but revert to periodic beacon measurements while stopped.
In one embodiment, when a better backhaul access link is available (as determined by e.g., one or more prescribed metrics or criteria), the access point initiates a handover to the better link. In one such variant, the access point may be instructed to connect to a particular backhaul access point by one or more higher-level network management entities (e.g., a network algorithm or process running on a network server or the like). In one exemplary embodiment, the higher-level network management entity or entities is/are executed from an upstream backhaul access point (e.g., a parent access point (PAP), or a child access point (CAP)). For example, the PAP may be configured to centrally manage all of its CAP(s) and TAP(s) and can instruct any of its managed access points to handover to another backhaul access point. A TAP which is already connected to a first CAP may be instructed, for instance, to change to another CAP by the PAP.
In other embodiments, an access point controller or other mobility management entity may be used to initiate handovers so as to optimize overall network performance, and/or to comply with higher level network management functions.
In still other embodiments, the handovers may be locally managed (e.g., by the CAP and/or TAP of the wireless link). For example, in some cases, the TAP may internally manage connectivity according to user preferences, and/or vehicular information (e.g., navigation path information derived from an indigenous GPS receiver of the client, and/or vehicle telematics system, etc.). Still other schemes for handover selection will be readily appreciated by those of ordinary skill given the contents of the present disclosure.
In other scenarios, handovers may be managed or modified by one or more client devices in conjunction with their access point; in such “distributed” network control schemes, the client device may actively inform the access point of handover possibilities and/or the access point may notify the client device(s) of available networks for backhaul service. The client device(s) may then select an appropriate backhaul access point based on e.g., user preferences, application considerations, cost considerations, etc. Where multiple client devices have conflicting desires, the access point may select one based on e.g., a vote process, time sharing, etc.
In an out-of-band push embodiment, an access point may be “pushed” (or “pulled”) into another network's access point registry so as to e.g., resolve network overloading. For example, in one such case, an access point may be receiving poor service from a first network; as a customer service (or perhaps by customer request), the first network may push the access point to a second network for overflow handling. Thereafter, the access point can seamlessly migrate to the second network transparently. Additionally, in some cases, the first network may pre-emptively push access points to an overflow network in anticipation of a network congestion or other event (such as e.g., a train carrying numerous passengers approaching a more highly populated area).
Moreover, access points that meet certain prescribed criteria; e.g., which have frequent coverage loss or regular bandwidth overflows, may benefit from out-of-band push operation. Such decisions are based in one variant on historical data obtained for that AP from one or more sources. To that end, APs may be “ranked” or rated according to their proclivity for such issues, and pushed/pulled in sequence based on that ranking/rating.
Out-of-band push operation may enable seamless cross-network handovers. For example, in one exemplary embodiment, an access point that has backhaul access via a chain of backhaul access points may eventually leave the backhaul access point network; under such conditions, the access point may revert to a cellular/satellite network backhaul. Similarly, where the access point returns to the backhaul access point network coverage, the access point may preferentially handover to a backhaul access point for improved performance. In either of these scenarios, the access point controller and/or access point registry can push/pull the access point registration information to/from the other network, thereby enabling the access point to handover without requiring a termination of existing network connectivity (and subsequent re-establishment), which may cause service interruptions, loss of extant “state” for certain applications or processes running on the client, etc.
The access point can be configured to continuously or periodically search for better backhaul access points, or only search for better backhaul access points when one or more criteria are met; e.g., reception quality is fading or failing. For example, in one such case, the access point only searches for better backhaul access points when the signal quality falls below a reception threshold. In one variant, reception threshold is set at the minimum amount of signal strength needed to sustain data communications (or data communications to a prescribed bandwidth or other performance metric). In another variant, the reception threshold is set at a signal strength where data loss is likely. In still other variants, the reception threshold may be set at a signal strength designated based on network considerations (e.g., as provided by an access point controller, etc.)
Still further, various other parameters of the foregoing may be adjusted (statically or dynamically) so as to optimize network management. For example, increasing the threshold for handover reduces the frequency of handovers, while decreasing the threshold for handover increases the frequency of handovers. Such adjustment may be particularly useful depending on the relative velocities of the access point and/or the backhaul access point in consideration of network resources. Faster moving vehicles may enter/exit coverage quickly; however, each handover transaction can result in undesirable network overhead. Thus, increasing or decreasing the minimum reception threshold may allow an access point to conserve power (rather than continuing to use a fading link, etc.) or alternatively maximize link connectivity even under poor reception circumstances.
It will also be recognized that a given access point may utilize partly or wholly different rules or policies regarding operation, association and/or backhaul access establishment, depending on the identity or affiliation of the various backhaul networks at a given location. For instance, the access point of a MSO subscriber may implement one or more of the foregoing policies whenever its initial and/or “target” access points are each owned and operated by the same MSO (such as may be determined by e.g., MAC address of the AP, SSID, advertisement of the AP as being MSO-associated, etc.), whereas when operating in a non-MSO network, the backhaul access network capability is not utilized.
In some variants, handover procedures include updating registration information within the access point controller and/or network. For example, in some cases, registration with the network may enable the access point to sustain ongoing client device transactions (which may be useful for accounting, billing, etc.). Profile management may be useful so as to, inter alia, reduce messaging overhead and enable session persistence (e.g., reduce re-negotiation of cryptographic keys, etc.), such as where a given access point “hops” (for whatever reason) between backhaul access points within a given coverage area or network.
In some variants of the foregoing, an access point can migrate a data session (including encryption keys, etc.) from a first backhaul network to a second backhaul network. Simple variants may update current session information with new routing paths.
More complex embodiments may allow for re-transmission, and/or duplicative transmission of packets, etc. thereby enabling fluid data migration that is transparent to higher layer software applications.
Various other schemes for wireless backhaul link operation will be readily appreciated by those of ordinary skill in the related arts, given the contents of the present disclosure.
Wireless Access Point (AP) Apparatus—
As shown, the exemplary access point device includes: a processor subsystem 602, a memory module 604, a client interface 606, and a backhaul interface 608.
In one exemplary embodiment, the processor 602 may include one or more of a digital signal processor, microprocessor, field-programmable gate array, or plurality of processing components mounted on one or more substrates. The processor subsystem 602 may also comprise internal cache memory (e.g., L1/L2/L3 or other types of cache). The processor subsystem is in communication with a memory subsystem 604, the latter including memory which may for example comprise SRAM, flash, and/or SDRAM components, or even “3D” memory arrays. The memory subsystem may implement one or more of DMA-type hardware, so as to facilitate data accesses as is well known in the art.
The processor subsystem 602 is configured to execute at least one computer program stored in memory 604 (e.g., non-transitory computer readable storage media). The computer program may include a plurality of computer readable instructions configured to establish, monitor, and maintain a backhaul access link.
In one embodiment, the client interface 606 (e.g., Wi-Fi interface) is configured to transact one or more data with one or more wireless devices. Each client of the wireless access point has an address that is unique within the wireless network; the address can be used to communicate with the corresponding device. In more complex networks, multiple layers of indirection may be used to assist in address exhaustion (e.g., one address is logically divided into another range of network addresses, etc.). Common examples of Open Systems Interconnection (OSI) based network routing protocols include for example: Internet Protocol (IP), Internetwork Packet Exchange (IPX), and OSI based network technologies (e.g., Asynchronous Transfer Mode (ATM), Synchronous Optical Networking (SONET), Synchronous Digital Hierarchy (SDH), Frame Relay, etc.).
Referring now to the backhaul interface 608 of
As will be readily appreciated by those of ordinary skill in the related arts, the access point may provide network service by e.g., providing network identification, managing network congestion, managing capabilities supported by the wireless network, etc. For example, the access point may communicate with wireless clients, and/or intermediary access points to intelligently manage its hotspot data rates and coverage.
In another aspect, the access point 600 is configured to manage and relay packets as an intermediary node from another wireless network to a backhaul network, and vice versa. In one exemplary embodiment, the access point has both relay communications capabilities and gateway functionality (to aggregate data traffic over its own communications). As used in the present context, the term “relay” refers without limitation to any network node that is configured to act as an intermediary between two or more nodes of the network that use e.g., the same protocols, addressing schemes, etc. As used in the present context, the term “gateway” refers without limitation to any network node that is configured to bridge data transactions between networks that use e.g., different protocols, addressing schemes, etc. Common examples of gateway functionality may require, without limitation: protocol translation, network address translation, rate conversion, firewall capabilities, rate buffering, etc.
For example, each intermediary backhaul access point may collect data packets from its downstream devices and arbitrate for access to its upstream device. Once access to the upstream device is granted, the intermediary backhaul access point relays the data packets according to guaranteed quality of service (QoS) requirements, etc. Additionally, while connected to the upstream device, the intermediary backhaul access point can receive packets destined for its downstream devices. Thereafter, the intermediary backhaul access point can relay the downstream packets to its downstream devices.
In one exemplary embodiment, the client interface 606 and backhaul interface 608 of the device 600 of
While the present disclosure is primarily directed to Wi-Fi implementations compliant with IEEE 802.11, artisans of ordinary skill in the related arts, given the contents of the present disclosure, will readily appreciate that the various principles described herein are readily applicable to any wireless interface, including but not limited to: Bluetooth, 3G (3GPP/3GPP2), HSDPA/HSUPA, TDMA, CDMA (e.g., IS-95A, WCDMA, etc.), FHSS, DSSS, GSM, PAN/802.15, WiMAX (802.16), 802.20, Zigbee®, Z-wave, narrowband/FDMA, OFDM, PCS/DCS, LTE/LTE-A, analog cellular, CDPD, satellite systems, millimeter wave or microwave systems, acoustic, and infrared (i.e., IrDA).
In one embodiment the backhaul interface 608 of the device 600 of
Access Point Controller Apparatus—
In one exemplary embodiment, the processor 702 may include one or more of a digital signal processor, microprocessor, field-programmable gate array, or plurality of processing components mounted on one or more substrates. The processor 702 may also comprise an internal cache memory. The processing subsystem is in communication with a memory subsystem 704, the latter including memory which may for example comprise SRAM, flash, and/or SDRAM components. The memory subsystem may implement one or more of DMA type hardware, so as to facilitate data accesses as is well known in the art.
The device 700 also optionally includes one or more back-end interfaces 708 for, e.g., connection to other network entities, devices, local monitoring or I/O devices, storage, etc.
The processing apparatus 702 is configured to execute at least one computer program stored in memory 704 (e.g., non-transitory computer readable storage media). The computer program may include a plurality of computer readable instructions configured to track and store information corresponding to one or more access points of the network. Other embodiments may implement such functionality within dedicated hardware, logic, and/or specialized co-processors (not shown). For instance, the AP controller can be located in one or more MSO data centers, and/or in other “cloud” entities (whether within our outside of the MSO network).
In one embodiment, the AP controller 700 is configured to register wireless clients and access points, and centrally control the broader wireless network (and constituent sub-networks). Common examples of configuration include: providing network identification, managing network congestion, managing capabilities supported by the wireless network, etc. For example, the AP controller may communicate with access points and/or enable/disable intermediary backhaul relay connectivity to intelligently manage the overall coverage provided by the wireless network and sub-network coverage. In some variants, the AP controller 700 may be configured to push (or respond to pull requests) for access points and/or wireless clients so as to augment and/or enhance its coverage area.
In one embodiment, the AP controller is further configured to communicate with one or more authentication, authorization, and accounting (AAA) servers of the core network. The AAA servers are configured to provide, inter alia, authorization services and facilitate tracking and/or control of network subscribers for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
In some variants, authentication processes are configured to identify a subscriber, typically by having the subscriber enter a valid user name and valid password before access is granted. The process of authentication may be based on each subscriber having a unique set of criteria or credentials (e.g., unique user name and password, challenge questions, entry of biometric data, entry of “human” verification data such as “Captcha” data, etc.) for gaining access to the network. For example, the AAA servers may compare a user's authentication credentials with user credentials stored in a database. If the authentication credentials match the stored credentials, the user may then be granted access to the network. If the credentials are at variance, authentication fails and network access may be denied.
In some embodiments, a user may be granted network access upon payment of a service charge. After receiving the user's payment information, the AAA servers may grant network access to the user for a particular session and/or for predetermined period of time. If the user is granted access for a predetermined time period, the AAA server may store credentials for the user in the database for authenticating the user when the user requests access to the network during that time period.
It will also be appreciated that users may provide payment of e.g., a service charge while the vehicle is moving through a structure or past a prescribed infrastructure point. For example, in one implementation, an RFID (radio-frequency identification) or other similar wireless system of the type generally known in the art can be used to debit a user's account when the user is, e.g., entering onto a toll road, bridge, or other “metered” transportation structure within their vehicle. The vehicle for example may be interrogated using a (comparatively) short-range RFID signal, and a corresponding RFID device (e.g., clipped to the vehicle's visor, adhered to the windshield, etc.) responds with user identification and/or account data to enable the transaction to be processed. The RFID interrogator may be in data communication with one or more MSO (or third party) network components, which may pass the received data to an MSO network entity for processing and identification as an MSO subscriber or other “entitled” user. In this fashion the Wi-Fi network previously described herein can be selectively turned on/off for that individual user (such as be instructing the system controller to process communications to/from a MAC address and/or SSID of a user's device that has been registered with the MSO or network operator. In one such variant, the user's smartphone or tablet is registered with the MSO, and subsequently upon user payment via RFID, any devices associated with (registered in association with) the user's MSO account are “enabled” within the toll road, etc. for Wi-Fi communication. Other non-authorized communications from e.g., vehicles associated with users who are not MSO subscribers will simply be ignored or filtered.
Following authentication, the AAA servers are configured to grant a subscriber authorization for certain features, functions, and/or doing certain tasks. After logging into a system, for instance, the subscriber may try to enable a vehicular access point. The authorization process determines whether the user has the authority to issue such requests. Simply put, authorization is the process of enforcing policies: determining what types or qualities of activities, resources, or services a user is permitted. Usually, authorization occurs within the context of authentication. Once a user is authenticated, they may be authorized for different types of access or activity. A given user may also have different types, sets, or levels of authorization, depending on any number of aspects. For instance, a given subscriber may be authorized to: enable a vehicular access point, access a vehicular access point, prevent other subscribers from requesting vehicular access, etc.
The AAA servers may be further configured for accounting, which measures the resources a user consumes during access. This may include the amount of system time or the amount of data a user has sent and/or received during a session, somewhat akin to cellular data plans based on so many consumed or available Gb of data. Accounting may be carried out by logging of session statistics and usage information, and is used for, inter alia, authorization control, billing, trend analysis, resource utilization, and capacity planning activities. It will be appreciated that in other examples, one or more AAA servers can be located at the regional data center, and may be linked to a third-party or proxy server, such as that of an event management entity.
Accounting information may be used to compensate subscribers for their access point services, and/or resource consumption. As previously noted, compensation may be monetary e.g., in the form of billing rebates, promotions, reduced service fees, etc. In other situations, the compensation may be service related i.e., preferential service, and/or unlocking desirable device features, etc.
It will be recognized that while certain aspects of the disclosure are described in terms of a specific sequence of steps of a method, these descriptions are only illustrative of the broader methods of the disclosure, and may be modified as required by the particular application. Certain steps may be rendered unnecessary or optional under certain circumstances. Additionally, certain steps or functionality may be added to the disclosed embodiments, or the order of performance of two or more steps permuted. All such variations are considered to be encompassed within the disclosure disclosed and claimed herein.
While the above detailed description has shown, described, and pointed out novel features of the disclosure as applied to various embodiments, it will be understood that various omissions, substitutions, and changes in the form and details of the device or process illustrated may be made by those skilled in the art without departing from the disclosure. This description is in no way meant to be limiting, but rather should be taken as illustrative of the general principles of the disclosure. The scope of the disclosure should be determined with reference to the claims.
It will be further appreciated that while certain steps and aspects of the various methods and apparatus described herein may be performed by a human being, the disclosed aspects and individual methods and apparatus are generally computerized/computer-implemented. Computerized apparatus and methods are necessary to fully implement these aspects for any number of reasons including, without limitation, commercial viability, practicality, and even feasibility (i.e., certain steps/processes simply cannot be performed by a human being in any viable fashion).
Number | Name | Date | Kind |
---|---|---|---|
5313454 | Bustini et al. | May 1994 | A |
5369707 | Follendore, III | Nov 1994 | A |
5528284 | Iwami et al. | Jun 1996 | A |
5577209 | Boyle et al. | Nov 1996 | A |
5708961 | Hylton et al. | Jan 1998 | A |
5715403 | Stefik | Feb 1998 | A |
5774170 | Hite et al. | Jun 1998 | A |
5787172 | Arnold | Jul 1998 | A |
5818438 | Howe et al. | Oct 1998 | A |
5828832 | Holden et al. | Oct 1998 | A |
5862312 | Mann et al. | Jan 1999 | A |
5870474 | Wasilewski et al. | Feb 1999 | A |
5878324 | Borth et al. | Mar 1999 | A |
5897635 | Torres et al. | Apr 1999 | A |
5926205 | Krause et al. | Jul 1999 | A |
5935206 | Dixon et al. | Aug 1999 | A |
5982412 | Nulty | Nov 1999 | A |
6002393 | Hite et al. | Dec 1999 | A |
6009103 | Woundy | Dec 1999 | A |
6092178 | Jindal et al. | Jul 2000 | A |
6128316 | Takeda et al. | Oct 2000 | A |
6134532 | Lazarus et al. | Oct 2000 | A |
6148400 | Arnold | Nov 2000 | A |
6154844 | Touboul et al. | Nov 2000 | A |
6157719 | Wasilewski et al. | Dec 2000 | A |
6167432 | Jiang | Dec 2000 | A |
6167521 | Smith et al. | Dec 2000 | A |
6169728 | Perreault et al. | Jan 2001 | B1 |
6181697 | Nurenberg et al. | Jan 2001 | B1 |
6211901 | Imajima et al. | Apr 2001 | B1 |
6212636 | Boyle et al. | Apr 2001 | B1 |
6219710 | Gray et al. | Apr 2001 | B1 |
6219840 | Corrigan et al. | Apr 2001 | B1 |
6233341 | Riggins | May 2001 | B1 |
6233687 | White | May 2001 | B1 |
6240553 | Son et al. | May 2001 | B1 |
6249680 | Wax et al. | Jun 2001 | B1 |
6256393 | Safadi et al. | Jul 2001 | B1 |
6259701 | Shur et al. | Jul 2001 | B1 |
6266421 | Domyo et al. | Jul 2001 | B1 |
6330609 | Garofalakis et al. | Dec 2001 | B1 |
6353626 | Sunay et al. | Mar 2002 | B1 |
6378130 | Adams | Apr 2002 | B1 |
6434141 | Oz et al. | Aug 2002 | B1 |
6456716 | Arnold | Sep 2002 | B1 |
6463585 | Hendricks et al. | Oct 2002 | B1 |
6498783 | Lin | Dec 2002 | B1 |
6519062 | Yoo | Feb 2003 | B1 |
6523696 | Saito et al. | Feb 2003 | B1 |
6590865 | Ibaraki et al. | Jul 2003 | B1 |
6601171 | Carter et al. | Jul 2003 | B1 |
6640145 | Hoffberg et al. | Oct 2003 | B2 |
6657991 | Akgun et al. | Dec 2003 | B1 |
6687735 | Logston et al. | Feb 2004 | B1 |
6694145 | Riikonen et al. | Feb 2004 | B2 |
6711148 | Hills | Mar 2004 | B1 |
6718551 | Swix et al. | Apr 2004 | B1 |
6738978 | Hendricks et al. | May 2004 | B1 |
6742116 | Matsui et al. | May 2004 | B1 |
6760768 | Holden et al. | Jul 2004 | B2 |
6763391 | Ludtke | Jul 2004 | B1 |
6782550 | Cao | Aug 2004 | B1 |
6785810 | Lirov et al. | Aug 2004 | B1 |
6788676 | Partanen et al. | Sep 2004 | B2 |
6799047 | Bahl et al. | Sep 2004 | B1 |
6807573 | Saito et al. | Oct 2004 | B2 |
6813505 | Walley et al. | Nov 2004 | B2 |
6842783 | Boivie et al. | Jan 2005 | B1 |
6859535 | Tatebayashi et al. | Feb 2005 | B1 |
6891841 | Leatherbury et al. | May 2005 | B2 |
6898708 | Hori et al. | May 2005 | B2 |
6910064 | Astarabadi et al. | Jun 2005 | B1 |
6925257 | Yoo | Aug 2005 | B2 |
6944150 | McConnell et al. | Sep 2005 | B1 |
6948183 | Peterka | Sep 2005 | B1 |
6954632 | Kobayashi | Oct 2005 | B2 |
6957261 | Lortz | Oct 2005 | B2 |
6957328 | Goodman et al. | Oct 2005 | B2 |
6973576 | Giobbi | Dec 2005 | B2 |
6975730 | Kuroiwa et al. | Dec 2005 | B1 |
6985355 | Allirot | Jan 2006 | B2 |
6986156 | Rodriguez et al. | Jan 2006 | B1 |
6996544 | Sellars et al. | Feb 2006 | B2 |
7006881 | Hoffberg et al. | Feb 2006 | B1 |
7007170 | Morten | Feb 2006 | B2 |
7009972 | Maher et al. | Mar 2006 | B2 |
7016963 | Judd et al. | Mar 2006 | B1 |
7017189 | Demello et al. | Mar 2006 | B1 |
7027460 | Iyer et al. | Apr 2006 | B2 |
7039048 | Monta et al. | May 2006 | B1 |
7054443 | Jakubowski et al. | May 2006 | B1 |
7054902 | Toporek et al. | May 2006 | B2 |
7055040 | Klemba et al. | May 2006 | B2 |
7065216 | Benaloh et al. | Jun 2006 | B1 |
7068639 | Varma et al. | Jun 2006 | B1 |
7069449 | Weaver et al. | Jun 2006 | B2 |
7069573 | Brooks et al. | Jun 2006 | B1 |
7072950 | Toft | Jul 2006 | B2 |
7073199 | Raley | Jul 2006 | B1 |
7075945 | Arsenault et al. | Jul 2006 | B2 |
7086077 | Giammaressi | Aug 2006 | B2 |
7092397 | Chandran et al. | Aug 2006 | B1 |
7099308 | Merrill et al. | Aug 2006 | B2 |
7103181 | Ananth | Sep 2006 | B2 |
7106382 | Shiotsu | Sep 2006 | B2 |
7107326 | Fijolek et al. | Sep 2006 | B1 |
7143431 | Eager et al. | Nov 2006 | B1 |
7149772 | Kalavade | Dec 2006 | B1 |
7154912 | Chong et al. | Dec 2006 | B2 |
7165268 | Moore et al. | Jan 2007 | B1 |
7174126 | McElhatten et al. | Feb 2007 | B2 |
7174127 | Otten et al. | Feb 2007 | B2 |
7174371 | Elo et al. | Feb 2007 | B2 |
7174385 | Li | Feb 2007 | B2 |
7194756 | Addington et al. | Mar 2007 | B2 |
7209458 | Ahvonen et al. | Apr 2007 | B2 |
7225333 | Peinado et al. | May 2007 | B2 |
7228427 | Fransdonk | Jun 2007 | B2 |
7228555 | Schlack | Jun 2007 | B2 |
7237112 | Ishiguro et al. | Jun 2007 | B1 |
7242960 | Van et al. | Jul 2007 | B2 |
7248694 | Husemann et al. | Jul 2007 | B2 |
7254608 | Yeager et al. | Aug 2007 | B2 |
7257227 | Chen et al. | Aug 2007 | B2 |
7266726 | Ladd et al. | Sep 2007 | B1 |
7289534 | Bailey et al. | Oct 2007 | B1 |
7299502 | Schmeling et al. | Nov 2007 | B2 |
7305460 | Park | Dec 2007 | B2 |
7308415 | Kimbrel et al. | Dec 2007 | B2 |
7313611 | Jacobs et al. | Dec 2007 | B1 |
7324531 | Cho | Jan 2008 | B2 |
7325073 | Shao et al. | Jan 2008 | B2 |
7330483 | Peters, Jr. et al. | Feb 2008 | B1 |
7330967 | Pujare et al. | Feb 2008 | B1 |
7334044 | Allen | Feb 2008 | B1 |
7340759 | Rodriguez | Mar 2008 | B1 |
7346688 | Allen et al. | Mar 2008 | B2 |
7353543 | Ohmori et al. | Apr 2008 | B2 |
7363371 | Kirby et al. | Apr 2008 | B2 |
7373506 | Asano et al. | May 2008 | B2 |
7376386 | Phillips et al. | May 2008 | B2 |
7376976 | Fierstein et al. | May 2008 | B2 |
7379494 | Raleigh et al. | May 2008 | B2 |
7409546 | Platt | Aug 2008 | B2 |
7457520 | Rosetti et al. | Nov 2008 | B2 |
7464179 | Hodges et al. | Dec 2008 | B2 |
7472280 | Giobbi | Dec 2008 | B2 |
7486869 | Alexander et al. | Feb 2009 | B2 |
7487363 | Alve et al. | Feb 2009 | B2 |
7506367 | Ishibashi | Mar 2009 | B1 |
7567565 | La | Jul 2009 | B2 |
7577118 | Haumonte et al. | Aug 2009 | B2 |
7592912 | Hasek et al. | Sep 2009 | B2 |
7602820 | Helms et al. | Oct 2009 | B2 |
7673004 | Sherstinsky et al. | Mar 2010 | B1 |
7690020 | Lebar | Mar 2010 | B2 |
7693171 | Gould | Apr 2010 | B2 |
7707644 | Choi et al. | Apr 2010 | B2 |
7721314 | Sincaglia et al. | May 2010 | B2 |
7730321 | Gasparini et al. | Jun 2010 | B2 |
7742074 | Minatogawa | Jun 2010 | B2 |
7752617 | Blinick et al. | Jul 2010 | B2 |
7757101 | Nonaka et al. | Jul 2010 | B2 |
7783891 | Perlin et al. | Aug 2010 | B2 |
7809942 | Baran et al. | Oct 2010 | B2 |
7860507 | Kalika et al. | Dec 2010 | B2 |
7865440 | Jaquette | Jan 2011 | B2 |
7870599 | Pemmaraju | Jan 2011 | B2 |
7925592 | Issa et al. | Apr 2011 | B1 |
7930558 | Hori | Apr 2011 | B2 |
7930715 | Hendricks et al. | Apr 2011 | B2 |
7954131 | Cholas et al. | May 2011 | B2 |
7983418 | Oyama et al. | Jul 2011 | B2 |
8041785 | Mazur et al. | Oct 2011 | B2 |
8084792 | Lehmann et al. | Dec 2011 | B2 |
8166508 | Mitsuji et al. | Apr 2012 | B2 |
8181262 | Cooper et al. | May 2012 | B2 |
8234387 | Bradley et al. | Jul 2012 | B2 |
8280982 | La et al. | Oct 2012 | B2 |
8306634 | Nguyen et al. | Nov 2012 | B2 |
8332370 | Gattegno et al. | Dec 2012 | B2 |
8341242 | Dillon et al. | Dec 2012 | B2 |
8442265 | Bosworth et al. | May 2013 | B1 |
8583484 | Chalawsky et al. | Nov 2013 | B1 |
8713623 | Brooks | Apr 2014 | B2 |
8862155 | Stern et al. | Oct 2014 | B2 |
8866911 | Sivertsen | Oct 2014 | B1 |
8898270 | Stack et al. | Nov 2014 | B1 |
9003436 | Tidwell et al. | Apr 2015 | B2 |
9027062 | Patel et al. | May 2015 | B2 |
9071859 | Lajoie | Jun 2015 | B2 |
9215423 | Kimble et al. | Dec 2015 | B2 |
9300919 | Cholas et al. | Mar 2016 | B2 |
20010004768 | Hodge et al. | Jun 2001 | A1 |
20010014946 | Ichinoi et al. | Aug 2001 | A1 |
20010019614 | Madoukh et al. | Sep 2001 | A1 |
20010029581 | Knauft | Oct 2001 | A1 |
20010030785 | Pangrac et al. | Oct 2001 | A1 |
20010053223 | Ishibashi et al. | Dec 2001 | A1 |
20010053226 | Akins et al. | Dec 2001 | A1 |
20010056541 | Matsuzaki et al. | Dec 2001 | A1 |
20020013772 | Peinado | Jan 2002 | A1 |
20020026575 | Wheeler et al. | Feb 2002 | A1 |
20020027883 | Belaiche | Mar 2002 | A1 |
20020032754 | Logston et al. | Mar 2002 | A1 |
20020049902 | Rhodes | Apr 2002 | A1 |
20020054589 | Ethridge et al. | May 2002 | A1 |
20020055978 | Joon-Bo et al. | May 2002 | A1 |
20020056125 | Hodge et al. | May 2002 | A1 |
20020059619 | Lebar | May 2002 | A1 |
20020062440 | Akama | May 2002 | A1 |
20020063621 | Tseng et al. | May 2002 | A1 |
20020066033 | Dobbins et al. | May 2002 | A1 |
20020077984 | Ireton | Jun 2002 | A1 |
20020087976 | Kaplan et al. | Jul 2002 | A1 |
20020123928 | Eldering et al. | Sep 2002 | A1 |
20020126654 | Preston et al. | Sep 2002 | A1 |
20020129358 | Buehl et al. | Sep 2002 | A1 |
20020129378 | Cloonan et al. | Sep 2002 | A1 |
20020147771 | Traversat et al. | Oct 2002 | A1 |
20020152299 | Traversat et al. | Oct 2002 | A1 |
20020152393 | Thoma et al. | Oct 2002 | A1 |
20020183985 | Hori et al. | Dec 2002 | A1 |
20020188744 | Mani | Dec 2002 | A1 |
20020188869 | Patrick | Dec 2002 | A1 |
20020199105 | Ishiguro et al. | Dec 2002 | A1 |
20030002862 | Rodriguez et al. | Jan 2003 | A1 |
20030005453 | Rodriguez et al. | Jan 2003 | A1 |
20030007516 | Abramov et al. | Jan 2003 | A1 |
20030009681 | Harada et al. | Jan 2003 | A1 |
20030021421 | Yokota et al. | Jan 2003 | A1 |
20030041336 | Del et al. | Feb 2003 | A1 |
20030046560 | Inomata et al. | Mar 2003 | A1 |
20030046704 | Laksono et al. | Mar 2003 | A1 |
20030048380 | Tamura | Mar 2003 | A1 |
20030056217 | Brooks | Mar 2003 | A1 |
20030061619 | Giammaressi | Mar 2003 | A1 |
20030069965 | Ma et al. | Apr 2003 | A1 |
20030071117 | Meade | Apr 2003 | A1 |
20030074571 | Fujiwara et al. | Apr 2003 | A1 |
20030084003 | Pinkas et al. | May 2003 | A1 |
20030097340 | Okamoto et al. | May 2003 | A1 |
20030099212 | Anjum et al. | May 2003 | A1 |
20030114162 | Chheda et al. | Jun 2003 | A1 |
20030115267 | Hinton et al. | Jun 2003 | A1 |
20030139980 | Hamilton | Jul 2003 | A1 |
20030140227 | Asano et al. | Jul 2003 | A1 |
20030163697 | Pabla et al. | Aug 2003 | A1 |
20030163739 | Armington et al. | Aug 2003 | A1 |
20030165241 | Fransdonk | Sep 2003 | A1 |
20030166401 | Combes et al. | Sep 2003 | A1 |
20030174838 | Bremer | Sep 2003 | A1 |
20030179773 | Mocek et al. | Sep 2003 | A1 |
20030187799 | Sellars et al. | Oct 2003 | A1 |
20030205763 | Park et al. | Nov 2003 | A1 |
20030208763 | McElhatten et al. | Nov 2003 | A1 |
20030208767 | Williamson et al. | Nov 2003 | A1 |
20030217137 | Roese et al. | Nov 2003 | A1 |
20030217365 | Caputo | Nov 2003 | A1 |
20040019691 | Daymond et al. | Jan 2004 | A1 |
20040024688 | Bi et al. | Feb 2004 | A1 |
20040034877 | Nogues | Feb 2004 | A1 |
20040045032 | Cummings et al. | Mar 2004 | A1 |
20040045035 | Cummings et al. | Mar 2004 | A1 |
20040045037 | Cummings et al. | Mar 2004 | A1 |
20040078602 | Rothbarth et al. | Apr 2004 | A1 |
20040088558 | Candelore | May 2004 | A1 |
20040106403 | Mori et al. | Jun 2004 | A1 |
20040109569 | Ellison et al. | Jun 2004 | A1 |
20040117836 | Karaoguz et al. | Jun 2004 | A1 |
20040123129 | Ginter et al. | Jun 2004 | A1 |
20040128499 | Peterka et al. | Jul 2004 | A1 |
20040133907 | Rodriguez et al. | Jul 2004 | A1 |
20040133923 | Watson et al. | Jul 2004 | A1 |
20040137918 | Varonen et al. | Jul 2004 | A1 |
20040146006 | Jackson | Jul 2004 | A1 |
20040181800 | Rakib et al. | Sep 2004 | A1 |
20040187159 | Gaydos et al. | Sep 2004 | A1 |
20040193609 | Phan et al. | Sep 2004 | A1 |
20040193680 | Gibbs et al. | Sep 2004 | A1 |
20040224425 | Gjerde et al. | Nov 2004 | A1 |
20040250273 | Swix et al. | Dec 2004 | A1 |
20040260798 | Addington et al. | Dec 2004 | A1 |
20040261093 | Rebaud et al. | Dec 2004 | A1 |
20040268386 | Logan et al. | Dec 2004 | A1 |
20050005287 | Claussen | Jan 2005 | A1 |
20050007278 | Anson et al. | Jan 2005 | A1 |
20050015810 | Gould et al. | Jan 2005 | A1 |
20050021985 | Ono et al. | Jan 2005 | A1 |
20050022227 | Shen et al. | Jan 2005 | A1 |
20050034171 | Benya | Feb 2005 | A1 |
20050039205 | Riedl | Feb 2005 | A1 |
20050039212 | Baran et al. | Feb 2005 | A1 |
20050049886 | Grannan et al. | Mar 2005 | A1 |
20050055220 | Lee et al. | Mar 2005 | A1 |
20050060742 | Riedl et al. | Mar 2005 | A1 |
20050060745 | Riedl et al. | Mar 2005 | A1 |
20050065888 | Benaloh | Mar 2005 | A1 |
20050086683 | Meyerson | Apr 2005 | A1 |
20050086691 | Dudkiewicz et al. | Apr 2005 | A1 |
20050091173 | Alve | Apr 2005 | A1 |
20050097006 | Nyako | May 2005 | A1 |
20050108763 | Baran et al. | May 2005 | A1 |
20050111844 | Compton et al. | May 2005 | A1 |
20050114686 | Ball et al. | May 2005 | A1 |
20050114900 | Ladd et al. | May 2005 | A1 |
20050125832 | Jost et al. | Jun 2005 | A1 |
20050138357 | Swenson et al. | Jun 2005 | A1 |
20050168323 | Lenoir et al. | Aug 2005 | A1 |
20050169468 | Fahrny et al. | Aug 2005 | A1 |
20050172127 | Hartung et al. | Aug 2005 | A1 |
20050176444 | Tanaka | Aug 2005 | A1 |
20050177740 | Athaide et al. | Aug 2005 | A1 |
20050177741 | Chen et al. | Aug 2005 | A1 |
20050177855 | Maynard et al. | Aug 2005 | A1 |
20050182931 | Robert et al. | Aug 2005 | A1 |
20050188210 | Perlin et al. | Aug 2005 | A1 |
20050190912 | Hopkins et al. | Sep 2005 | A1 |
20050195975 | Kawakita | Sep 2005 | A1 |
20050198693 | Choi et al. | Sep 2005 | A1 |
20050268107 | Harris et al. | Dec 2005 | A1 |
20050273629 | Abrams et al. | Dec 2005 | A1 |
20050278259 | Gunaseelan et al. | Dec 2005 | A1 |
20050289618 | Hardin | Dec 2005 | A1 |
20050289619 | Melby | Dec 2005 | A1 |
20060002551 | Brown et al. | Jan 2006 | A1 |
20060004662 | Nadalin et al. | Jan 2006 | A1 |
20060008256 | Khedouri et al. | Jan 2006 | A1 |
20060020786 | Helms et al. | Jan 2006 | A1 |
20060020950 | Ladd et al. | Jan 2006 | A1 |
20060021004 | Moran et al. | Jan 2006 | A1 |
20060036750 | Ladd et al. | Feb 2006 | A1 |
20060041903 | Kahn et al. | Feb 2006 | A1 |
20060047801 | Haag et al. | Mar 2006 | A1 |
20060047957 | Helms et al. | Mar 2006 | A1 |
20060064583 | Birnbaum et al. | Mar 2006 | A1 |
20060095940 | Yearwood | May 2006 | A1 |
20060130099 | Rooyen | Jun 2006 | A1 |
20060130107 | Gonder et al. | Jun 2006 | A1 |
20060130113 | Carlucci et al. | Jun 2006 | A1 |
20060136964 | Diez et al. | Jun 2006 | A1 |
20060137005 | Park | Jun 2006 | A1 |
20060137015 | Fahrny et al. | Jun 2006 | A1 |
20060148362 | Bridges | Jul 2006 | A1 |
20060149850 | Bowman | Jul 2006 | A1 |
20060154674 | Landschaft et al. | Jul 2006 | A1 |
20060161635 | Lamkin et al. | Jul 2006 | A1 |
20060165090 | Kalliola et al. | Jul 2006 | A1 |
20060165197 | Morita et al. | Jul 2006 | A1 |
20060168219 | Ahluwalia et al. | Jul 2006 | A1 |
20060171390 | La | Aug 2006 | A1 |
20060171423 | Helms et al. | Aug 2006 | A1 |
20060179138 | Van et al. | Aug 2006 | A1 |
20060184972 | Rafey et al. | Aug 2006 | A1 |
20060187900 | Akbar | Aug 2006 | A1 |
20060200856 | Salowey et al. | Sep 2006 | A1 |
20060206712 | Dillaway et al. | Sep 2006 | A1 |
20060209799 | Gallagher et al. | Sep 2006 | A1 |
20060212400 | Kamperman et al. | Sep 2006 | A1 |
20060218604 | Riedl et al. | Sep 2006 | A1 |
20060218632 | Corley et al. | Sep 2006 | A1 |
20060236131 | Vauclair | Oct 2006 | A1 |
20060248553 | Mikkelson et al. | Nov 2006 | A1 |
20060248555 | Eldering | Nov 2006 | A1 |
20060253328 | Kohli et al. | Nov 2006 | A1 |
20060253864 | Easty | Nov 2006 | A1 |
20060259927 | Acharya et al. | Nov 2006 | A1 |
20060277569 | Smith | Dec 2006 | A1 |
20060291506 | Cain | Dec 2006 | A1 |
20070011335 | Burns et al. | Jan 2007 | A1 |
20070019645 | Menon | Jan 2007 | A1 |
20070022459 | Gaebel, Jr. et al. | Jan 2007 | A1 |
20070022469 | Cooper et al. | Jan 2007 | A1 |
20070033531 | Marsh | Feb 2007 | A1 |
20070046791 | Wang et al. | Mar 2007 | A1 |
20070049245 | Lipman | Mar 2007 | A1 |
20070067851 | Fernando et al. | Mar 2007 | A1 |
20070076728 | Rieger et al. | Apr 2007 | A1 |
20070079381 | Hartung et al. | Apr 2007 | A1 |
20070089127 | Flickinger et al. | Apr 2007 | A1 |
20070094691 | Gazdzinski | Apr 2007 | A1 |
20070098178 | Raikar | May 2007 | A1 |
20070113243 | Brey | May 2007 | A1 |
20070115900 | Liang | May 2007 | A1 |
20070121678 | Brooks et al. | May 2007 | A1 |
20070124488 | Baum et al. | May 2007 | A1 |
20070157295 | Mangalore et al. | Jul 2007 | A1 |
20070174888 | Rubinstein | Jul 2007 | A1 |
20070192615 | Varghese et al. | Aug 2007 | A1 |
20070204314 | Hasek et al. | Aug 2007 | A1 |
20070206799 | Wingert et al. | Sep 2007 | A1 |
20070209059 | Moore et al. | Sep 2007 | A1 |
20070217436 | Markley et al. | Sep 2007 | A1 |
20070219910 | Martinez | Sep 2007 | A1 |
20070220024 | Putterman et al. | Sep 2007 | A1 |
20070233857 | Cheng et al. | Oct 2007 | A1 |
20070250872 | Dua | Oct 2007 | A1 |
20070250880 | Hainline | Oct 2007 | A1 |
20070261116 | Prafullchandra et al. | Nov 2007 | A1 |
20070266395 | Lee et al. | Nov 2007 | A1 |
20070276925 | La et al. | Nov 2007 | A1 |
20070276926 | Lajoie et al. | Nov 2007 | A1 |
20070294178 | Pinder et al. | Dec 2007 | A1 |
20080008321 | Gagnon et al. | Jan 2008 | A1 |
20080008371 | Woods et al. | Jan 2008 | A1 |
20080021836 | Lao | Jan 2008 | A1 |
20080022012 | Wang | Jan 2008 | A1 |
20080037493 | Morton | Feb 2008 | A1 |
20080059804 | Shah et al. | Mar 2008 | A1 |
20080066112 | Bailey et al. | Mar 2008 | A1 |
20080091805 | Malaby et al. | Apr 2008 | A1 |
20080091807 | Strub et al. | Apr 2008 | A1 |
20080098212 | Helms et al. | Apr 2008 | A1 |
20080101460 | Rodriguez | May 2008 | A1 |
20080103976 | Read et al. | May 2008 | A1 |
20080103977 | Khosravy et al. | May 2008 | A1 |
20080104634 | Gajdos et al. | May 2008 | A1 |
20080109307 | Ullah | May 2008 | A1 |
20080112405 | Cholas et al. | May 2008 | A1 |
20080117920 | Tucker | May 2008 | A1 |
20080123862 | Rowley | May 2008 | A1 |
20080133551 | Wensley et al. | Jun 2008 | A1 |
20080134274 | Derrenberger et al. | Jun 2008 | A1 |
20080141317 | Radloff et al. | Jun 2008 | A1 |
20080141353 | Brown | Jun 2008 | A1 |
20080148362 | Gilder et al. | Jun 2008 | A1 |
20080155059 | Hardin et al. | Jun 2008 | A1 |
20080155614 | Cooper et al. | Jun 2008 | A1 |
20080162353 | Tom et al. | Jul 2008 | A1 |
20080165460 | Whitby-Strevens | Jul 2008 | A1 |
20080177998 | Apsangi et al. | Jul 2008 | A1 |
20080182591 | Krikorian | Jul 2008 | A1 |
20080183705 | Shivaji-Rao et al. | Jul 2008 | A1 |
20080192820 | Brooks et al. | Aug 2008 | A1 |
20080212945 | Khedouri et al. | Sep 2008 | A1 |
20080222684 | Mukraj et al. | Sep 2008 | A1 |
20080229354 | Morris et al. | Sep 2008 | A1 |
20080235746 | Peters et al. | Sep 2008 | A1 |
20080244667 | Osborne | Oct 2008 | A1 |
20080256510 | Auerbach | Oct 2008 | A1 |
20080270307 | Olson et al. | Oct 2008 | A1 |
20080273591 | Brooks et al. | Nov 2008 | A1 |
20080282299 | Koat et al. | Nov 2008 | A1 |
20080288618 | Vardi et al. | Nov 2008 | A1 |
20090007234 | Birger et al. | Jan 2009 | A1 |
20090025027 | Craner | Jan 2009 | A1 |
20090025075 | Chow et al. | Jan 2009 | A1 |
20090028182 | Brooks et al. | Jan 2009 | A1 |
20090031371 | Munsell et al. | Jan 2009 | A1 |
20090064251 | Savoor et al. | Mar 2009 | A1 |
20090083813 | Dolce et al. | Mar 2009 | A1 |
20090098861 | Kalliola et al. | Apr 2009 | A1 |
20090100459 | Riedl et al. | Apr 2009 | A1 |
20090102983 | Malone et al. | Apr 2009 | A1 |
20090151006 | Saeki et al. | Jun 2009 | A1 |
20090170479 | Jarenskog | Jul 2009 | A1 |
20090182815 | Czechowski, III et al. | Jul 2009 | A1 |
20090185576 | Kisel et al. | Jul 2009 | A1 |
20090187939 | Lajoie | Jul 2009 | A1 |
20090201917 | Maes et al. | Aug 2009 | A1 |
20090210899 | Lawrence-Apfelbaum et al. | Aug 2009 | A1 |
20090210912 | Cholas et al. | Aug 2009 | A1 |
20090225760 | Foti | Sep 2009 | A1 |
20090244290 | McKelvey et al. | Oct 2009 | A1 |
20090265750 | Jones et al. | Oct 2009 | A1 |
20090282241 | Prafullchandra et al. | Nov 2009 | A1 |
20090282449 | Lee | Nov 2009 | A1 |
20090292922 | Park | Nov 2009 | A1 |
20090293101 | Carter et al. | Nov 2009 | A1 |
20100014496 | Kalika et al. | Jan 2010 | A1 |
20100030578 | Siddique et al. | Feb 2010 | A1 |
20100031299 | Harrang et al. | Feb 2010 | A1 |
20100042478 | Reisman | Feb 2010 | A1 |
20100070867 | Lemmers | Mar 2010 | A1 |
20100081416 | Cohen | Apr 2010 | A1 |
20100082983 | Shah et al. | Apr 2010 | A1 |
20100083329 | Joyce et al. | Apr 2010 | A1 |
20100088236 | Karabulut et al. | Apr 2010 | A1 |
20100088292 | Tirpak et al. | Apr 2010 | A1 |
20100106846 | Noldus et al. | Apr 2010 | A1 |
20100122288 | Minter et al. | May 2010 | A1 |
20100131973 | Dillon et al. | May 2010 | A1 |
20100138900 | Peterka et al. | Jun 2010 | A1 |
20100150027 | Atwal et al. | Jun 2010 | A1 |
20100151816 | Besehanic et al. | Jun 2010 | A1 |
20100159951 | Shkedi | Jun 2010 | A1 |
20100167743 | Palanki et al. | Jul 2010 | A1 |
20100169977 | Dasher et al. | Jul 2010 | A1 |
20100185855 | Margolus et al. | Jul 2010 | A1 |
20100198888 | Blomstedt et al. | Aug 2010 | A1 |
20100217837 | Ansari et al. | Aug 2010 | A1 |
20100251305 | Kimble et al. | Sep 2010 | A1 |
20100287609 | Gonzalez et al. | Nov 2010 | A1 |
20100309051 | Moshfeghi | Dec 2010 | A1 |
20100312826 | Sarosi et al. | Dec 2010 | A1 |
20100313225 | Cholas et al. | Dec 2010 | A1 |
20100313226 | Cholas et al. | Dec 2010 | A1 |
20110015989 | Tidwell et al. | Jan 2011 | A1 |
20110071841 | Fomenko et al. | Mar 2011 | A1 |
20110078721 | Wang et al. | Mar 2011 | A1 |
20110093900 | Patel et al. | Apr 2011 | A1 |
20110103374 | Lajoie et al. | May 2011 | A1 |
20110107389 | Chakarapani | May 2011 | A1 |
20110112717 | Resner | May 2011 | A1 |
20110138064 | Rieger et al. | Jun 2011 | A1 |
20110163888 | Goedde | Jul 2011 | A1 |
20110164753 | Dubhashi et al. | Jul 2011 | A1 |
20110167440 | Greenfield | Jul 2011 | A1 |
20110169977 | Masuda | Jul 2011 | A1 |
20110197070 | Mizrah | Aug 2011 | A1 |
20110206136 | Bekedam et al. | Aug 2011 | A1 |
20110213688 | Santos et al. | Sep 2011 | A1 |
20110219229 | Cholas et al. | Sep 2011 | A1 |
20110225619 | Kesireddy et al. | Sep 2011 | A1 |
20110235577 | Hintermeister et al. | Sep 2011 | A1 |
20110247029 | Yarvis et al. | Oct 2011 | A1 |
20110252236 | De et al. | Oct 2011 | A1 |
20110252243 | Brouwer et al. | Oct 2011 | A1 |
20110286437 | Austin et al. | Nov 2011 | A1 |
20120008786 | Cronk et al. | Jan 2012 | A1 |
20120011567 | Cronk et al. | Jan 2012 | A1 |
20120023535 | Brooks et al. | Jan 2012 | A1 |
20120030716 | Zhang et al. | Feb 2012 | A1 |
20120046049 | Curtis et al. | Feb 2012 | A1 |
20120054785 | Yang et al. | Mar 2012 | A1 |
20120079546 | Kalidindi et al. | Mar 2012 | A1 |
20120115501 | Zheng | May 2012 | A1 |
20120151549 | Kumar et al. | Jun 2012 | A1 |
20120159603 | Queck | Jun 2012 | A1 |
20120167173 | Nadalin et al. | Jun 2012 | A1 |
20120202447 | Edge et al. | Aug 2012 | A1 |
20120203822 | Floyd et al. | Aug 2012 | A1 |
20120222081 | Schaefer et al. | Aug 2012 | A1 |
20120291062 | Pearson et al. | Nov 2012 | A1 |
20120302259 | Busch | Nov 2012 | A1 |
20120330759 | Aggarwal et al. | Dec 2012 | A1 |
20130016648 | Koskela | Jan 2013 | A1 |
20130045681 | Dua | Feb 2013 | A1 |
20130046623 | Moritz et al. | Feb 2013 | A1 |
20130081097 | Park et al. | Mar 2013 | A1 |
20130095848 | Gold et al. | Apr 2013 | A1 |
20130100818 | Qiu et al. | Apr 2013 | A1 |
20130235774 | Jo | Sep 2013 | A1 |
20130254787 | Cox et al. | Sep 2013 | A1 |
20130308622 | Uhlik | Nov 2013 | A1 |
20130347089 | Bailey et al. | Dec 2013 | A1 |
20140010219 | Dor et al. | Jan 2014 | A1 |
20140046624 | Miettinen | Feb 2014 | A1 |
20140066098 | Stern et al. | Mar 2014 | A1 |
20140213256 | Meylan et al. | Jul 2014 | A1 |
20140215506 | Kalmes et al. | Jul 2014 | A1 |
20140242991 | Yanover et al. | Aug 2014 | A1 |
20140281489 | Peterka et al. | Sep 2014 | A1 |
20140282721 | Kuncl et al. | Sep 2014 | A1 |
20140283137 | Rebaud et al. | Sep 2014 | A1 |
20140309868 | Ricci | Oct 2014 | A1 |
20140328257 | Kamlani | Nov 2014 | A1 |
20140359649 | Cronk et al. | Dec 2014 | A1 |
20150058883 | Tidwell et al. | Feb 2015 | A1 |
20150058909 | Miller et al. | Feb 2015 | A1 |
20150094098 | Stern et al. | Apr 2015 | A1 |
20150103685 | Butchko et al. | Apr 2015 | A1 |
20150106501 | Malets et al. | Apr 2015 | A1 |
20150106846 | Chen et al. | Apr 2015 | A1 |
20150146537 | Panaitopol et al. | May 2015 | A1 |
20150189377 | Wheatley et al. | Jul 2015 | A1 |
20150288617 | Dasher et al. | Oct 2015 | A1 |
20150288732 | Phillips et al. | Oct 2015 | A1 |
20150365833 | Stafford et al. | Dec 2015 | A1 |
20160019103 | Basra | Jan 2016 | A1 |
20160301525 | Canard et al. | Oct 2016 | A1 |
Number | Date | Country |
---|---|---|
1139198 | Oct 2001 | EP |
2113860 | Nov 2009 | EP |
2381709 | May 2003 | GB |
H08263440 | Oct 1996 | JP |
2000156676 | Jun 2000 | JP |
2000332746 | Nov 2000 | JP |
2001243707 | Sep 2001 | JP |
2001274786 | Oct 2001 | JP |
2001274788 | Oct 2001 | JP |
2001285821 | Oct 2001 | JP |
2002163396 | Jun 2002 | JP |
2002352094 | Dec 2002 | JP |
2003058657 | Feb 2003 | JP |
2003162600 | Jun 2003 | JP |
2003233690 | Aug 2003 | JP |
2003248508 | Sep 2003 | JP |
2003296484 | Oct 2003 | JP |
2003348508 | Dec 2003 | JP |
2004030111 | Jan 2004 | JP |
2004072721 | Mar 2004 | JP |
2004120736 | Apr 2004 | JP |
2004120738 | Apr 2004 | JP |
2004303111 | Oct 2004 | JP |
2005506627 | Mar 2005 | JP |
2005519365 | Jun 2005 | JP |
2005519501 | Jun 2005 | JP |
2005339093 | Dec 2005 | JP |
2006185473 | Jul 2006 | JP |
2006311267 | Nov 2006 | JP |
2007020144 | Jan 2007 | JP |
2008005047 | Jan 2008 | JP |
2008015936 | Jan 2008 | JP |
2008021293 | Jan 2008 | JP |
2008507905 | Mar 2008 | JP |
2008167018 | Jul 2008 | JP |
2008186272 | Aug 2008 | JP |
2008206039 | Sep 2008 | JP |
2009071786 | Apr 2009 | JP |
2009515238 | Apr 2009 | JP |
2009176060 | Aug 2009 | JP |
2009211632 | Sep 2009 | JP |
2010502109 | Jan 2010 | JP |
2010079902 | Apr 2010 | JP |
2012505436 | Mar 2012 | JP |
2012523614 | Oct 2012 | JP |
WO-0103410 | Jan 2001 | WO |
WO-0110125 | Feb 2001 | WO |
WO-0137479 | May 2001 | WO |
WO-0169842 | Sep 2001 | WO |
WO-0177778 | Oct 2001 | WO |
WO-0213032 | Feb 2002 | WO |
WO-0221841 | Mar 2002 | WO |
WO-0242966 | May 2002 | WO |
WO-02080556 | Oct 2002 | WO |
WO-03038704 | May 2003 | WO |
WO-03087799 | Oct 2003 | WO |
WO-03093944 | Nov 2003 | WO |
WO-2004027622 | Apr 2004 | WO |
WO-2005015422 | Feb 2005 | WO |
WO-2006020141 | Feb 2006 | WO |
WO-2008080556 | Jul 2008 | WO |
WO-2009020476 | Feb 2009 | WO |
WO-2012021245 | Feb 2012 | WO |
Entry |
---|
Arlington, M.R., “Internet Protocol DARPA Internet Program Protocol Specification,” RFC 791, 1981. |
Deering, S.E., et al., “Internet Protocol, Version 6 (IPv6) Specification,” 1998. |
5C Digital Transmission Content Protection White Paper, Hitachi, Ltd., et al., dated Jul. 14, 1998, 15 pages. |
Cantor, et al., Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard, Mar. 15 2005. Document ID: saml-core-2.0-os (http://docs.oasis-open.org/securit/saml/v2.0/saml-core-2.0-os.pdf). |
Cantor, et al., Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard, Mar. 2005 (http://docs.oasis-open.org/security/saml/v2.0/). |
DCAS Authorized Service Domain, Version 1.2, dated Nov. 30, 2005, 54 pages. |
DCAS Licensed Specification Abstracts, CableLabs Confidential Information, Jan. 12, 2006, 4 pages. |
Digital Video Broadcasting (DVB); DVB SimulCrypt; Part 1: “Head-end architecture and synchronization” Technical Specification—ETSI TS 101 197 V1.2.1 (Feb. 2002), 40 pages. |
DVB (Digital Video Broadcasting), DVB Document A045 Rev. 3, Jul. 2004, “Head-end Implementation of SimulCrypt,” 289 pages. |
Federal Information Processing Standards Publication, US FIPS PUB 197, Nov. 26, 2001, “Advanced Encryption Standards (AES),” 47 pages. |
High-bandwidth Digital Content Protection System, Revision 1.091, dated Apr. 22, 2003, Digital Content Protection LLC Draft, 78 pages. |
Marusic, et al., “Share it!—Content Transfer in Home-to-Home Networks.” IEEE MELECON 2004, May 12-15, 2004, Dubrovnik, Croatia. |
Media Server; 1 Device Template Version 1.01 Jun. 25, 2002. |
OpenCable Application Platform Specification, OCAP 2.0 Profile, OC-SP-OCAP2.0-I01-020419, Apr. 19, 2002. |
OpenCable Application Platform Specifications, OCAP Extensions, OC-SP-OCAP-HNEXT-I03-080418, 2005-2008. |
OpenCable Host Device, Core Functional Requirements, OC-SP-HOST-CFR-I13-030707, Jul. 7, 2003. |
OpenCable, HOST-POD Interface Specification, OC-SP-HOSTPOD-IF-113-030707, Jul. 7, 2003. |
OpenCable Specification, Home Networking Protocol 2.0, OC-SP-HNP2.0-I01-08418, 2007. |
OpenCable Specifications, Home Networking Security Specification, OC-SP-HN-SEC-DO1-081027, draft (Oct. 27, 2008). |
Primergy BX300 Switch Blade user's manual, Fujitsu Corp., Sep. 30, 2002, first edition, pp. 1 to 20. |
Real System Media Commerce Suite (Technical White Paper), at http://docs.real.com/docs/drm/DRM.sub-WP1.pdf, 12 pages, Nov. 2001. |
Van Moffaert, K., et al. (“Digital Rights Management: DRM is a key enabler for the future growth of the broadband access market and the telecom/networking market in general”, Alcatel Telecommunications Review, Alcatel, Paris Cedex FR, Apr. 1, 2003, XP007005930ISSN; 8 pages. |
Zhang, et al., A Flexible Content Protection System for Media-on-Demand, ISM China Research Lab, Proceedings of the IEEE Fourth International Symposium on Multimedia Software Engineering (MSE'02), 6 pages. |
Cisco Intelligent Network Architecture for Digital Video—SCTE Cable-Tec Expo 2004 information page, Orange Convention Center, Jun. 2004, 24 pages. |
Grifith, et al., Resource Planning and Bandwidth Allocation in Hybrid Fiber-Coax Residential Networks, National Institute of Standards and Technology (NIST), 10 pages, 2004. |
Gupta V., et al., “Bit-Stuffing in 802.11 Beacon Frame: Embedding Non-Standard Custom Information,” International Journal of Computer Applications, Feb. 2013, vol. 63 (2), pp. 6-12. |
Kanouff, Communications Technology: Next-Generation Bandwidth Management—The Evolution of the Anything-to-Anywhere Network, 8 pages, Apr. 1, 2004. |
Motorola DOCSIS Cable Module DCM 2000 specifications, 4 pages, 2004. |
OpenVision Session Resource Manager—Open Standards-Based Solution Optimizes Network Resources by Dynamically Assigning Bandwidth in the Delivery of Digital Services article, 2 pages, (copyright 2006), (http://www.imake.com/hopenvision). |
Number | Date | Country | |
---|---|---|---|
20170208632 A1 | Jul 2017 | US |