The present invention relates to the field of mobile communications, and in particular to the procedure of setting up a wireless communication connection between a mobile device and a communications network. More specifically, the invention relates to matching of position data for automatic selection of a profile for setting up such a connection.
Today, a significant penetration of WLANs and VoIP systems has occurred both in homes and offices. VoIP enables the convergence of data and voice networks, allowing network administrators of major corporations or home users to cut costs. At the same time residential gateways provide a mechanism for data WLAN connectivity. Most WLAN usage is for data applications in devices, such as mobile phones, printers, cameras and WLAN IP phones. In general, security issues surrounding WLAN apply to all devices that connect to it, in order to guarantee that trusted relationships are achieved between communicating devices and to prevent eavesdropping of radio signals.
The 802.11i standard enables support for both packet and authentication security. Previous generations of 802.11 security methods revolved around the WEP protocol. The authentication provided by WEP does not provide two-way authentication, i.e. the user does not authenticate the network. The 802.11i standard addresses security deficiencies of WEP using wireless protected access (WPA) and the ratified 802.11i specification has been adopted as WPA2, WPA2 enhances WPA by using the Advanced Encryption Standard, AES, instead of the cipher method RC4 as the encryption engine, 802.11i also discloses a new robust security network (RSN) that may require hardware changes.
Referring to the WLAN security setup, WLAN IP phones provide the ability for a user to pick up their “home” phone and use the same phone anywhere were access to a broadband network is available. Thus, security measures need to encompass these use cases in addition to the traditional security setup. The type of security offered is typically limited to setting up an access point and a device connected to a computer or multiple computers.
802.11i provides for two different types of authentication mechanisms, pre-shared key (PSK) mode and 802.1x-based authentication mode. PSK is essentially a user setup that replaces the pairwise master key (PMK) that would have been exchanged via the 802.1x mechanism. Most ease-of-use implementations for home networks use the PSK mode as the core of their framework.
WLAN IP phones are network devices that normally use network-based authentication[24]. The type of messaging passed between elements is governed by the extensible authentication protocol (EAP). This messaging describes an authentication method using request and response sequences. There are different types of content formats that can be implemented, such as TLS, TTLS and SIM. The purpose of 802.1x in an 802.11i context is to exchange a PMK used to setup a secure network between the access point and the end station.
In the present and near future a WLAN user will need to access different WLAN networks and these different networks will need both different applications as well as different security measures in order to work in a secure and proper manner, as it is disclosed above. A user may e.g. need to use one kind of VoIP client in the home or in a public hotspot environment and a completely different VoIP client at work. Different application may require the user to authenticate the usage by using a VPN client at the office that is not required in home or in the hot spot environment or vice versa.
WO-A1-2005/109934, discloses a method to facilitate the selection of a WLAN, wherein the selection is based on an order of preference. The order of preference is based on the positioning of the mobile node. The position of the mobile node is determined based on e.g. the country code received from a cellular network. The main object of the method is to select a WLAN out of a plurality of available WLAN's based on the country wherein the mobile is used.
US, A1, 20050190747 discloses a mobile phone that is capable of acting differently depending on the place where the mobile phone is used. When the mobile phone is at home the phone receives calls via the home number and when the mobile phone is at work it receives calls to the office. When the mobile phone detects a public hot spot the wireless VoIP is used. From the WLAN detected a profile associated with the detected WLAN, and stored in the mobile phone, is used. The place where the mobile device is used is based on the identity of the WLAN. However, this method requires the mobile device to always scan and search for available wireless networks to set up a connection for communication over said wireless network and, this continuously scanning result in an excessive drainage of the battery of the mobile device.
A general objective of the invention is to provide a solution for mobile devices which provides easy and quick selection of settings to use when connecting to a network with a certain application.
An aspect of this object is to provide a solution which ensures that proper security procedures for different applications are used in the connection process.
Yet another aspect of this object is to provide a solution which does not entail excessive drainage of a battery of the wireless communications device.
The present invention relates to a device, as well as a method and a computer program product for use in a mobile device, for controlling connection to a communications network. More specifically, the invention involves positioning of the mobile device, and comparison of a determined current position with stored position data. If the determined position matches stored position data, a profile related to that position data is selected, which profile comprises settings for connection to the network Preferably, selection of a certain profile and launching of a related client works automatically when an application is initiated by a user. This means less user interaction, while appropriate settings may still be employed for different scenarios, typically for different applications and at different positions. Furthermore, the mobile device does not have to scan for wireless networks to connect to, since the network and settings to use are predefined and linked to the position and the type of application initiated. Hence, the battery drainage of the mobile device is reduced and battery time is extended[25]. Another benefit is that it is quicker to find networks since a scanning is not needed. Getting a position is faster than performing a network scan.
According to a first aspect, the invention relates to a mobile device wirelessly connectable to a communications network, comprising a signal transceiver configured to receive positioning information relating to the position of the mobile device; a memory for storing a plurality of position data and profiles related to the position data, which profiles comprise parameters usable for connecting to communications networks; and a control unit configured to compare a current position for the mobile device with stored position data, and to select one of the plurality of profiles to connect to said network if the current position matches stored position data.
In one embodiment the parameters of a profile comprise application clients, and the control unit is configured to launch the application client contained[26] in the selected profile.
In one embodiment the mobile device comprises a user interface operable to initiate an application, wherein the control unit is configured to retrieve parameters comprised in the profile related to the initiated application.
In one embodiment the application clients include VoIP clients and/or email clients, synchronisation clients, browser clients and the like.
In one embodiment the parameters of a profile comprise access parameters.
In one embodiment the access parameters include security parameters and authentication procedures.
In one embodiment the signal transceiver is configured to receive positioning information from a cellular network.
In one embodiment the signal transceiver is configured to receive positioning information from a satellite positioning system.
In one embodiment the communications network is a radio communications network.
In one embodiment the mobile device comprises a user interface operable to manually launch an application client for connection to a communications network, wherein the control unit is configured to store a profile in the memory including parameters used for connecting to the communications networks, responsive to manual launching of an application client.
According to a second aspect, the invention relates to a method for setting up a connection between a mobile device and a communications network, comprising the steps of:
In one embodiment the method further comprises:
In one embodiment the application clients include VoIP clients and/or email clients[28], synchronisation clients, browser clients, media player clients, and the like.
In one embodiment the step of determining position comprises receiving positioning information from a cellular network.
In one embodiment the step of determining position comprises receiving positioning information from a satellite positioning system.
In one embodiment the step of connecting further comprises authenticating the connection using a security procedure related to the selected profile.
According to a third aspect, the invention relates to a computer program product for use in a processor system of a mobile device, comprising computer program code executable to:
In one embodiment the computer program product comprises computer program code executable to:
In one embodiment the application clients include VoIP clients and/or email clients, synchronisation clients, browser clients and the like.
In one embodiment the step of determining position comprises receiving positioning information from a cellular network.
In one embodiment the step of determining position comprises receiving positioning information from a satellite positioning system.
In one embodiment the step of connecting further comprises authenticating the connection using a security procedure related to the selected profile.
The subject matter of the different embodiments outlined above may be combined in further embodiments.
The features and advantages of the present invention will be more apparent from the following description of the invention with references to the accompanying drawings, on which:
Embodiments of the present invention will be described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” “comprising,” “includes” and/or “including” when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms used herein should be interpreted as having a meaning that is consistent with their meaning in the context of this specification and the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The present invention is described below with reference to block diagrams and/or flowchart illustrations of methods, apparatus (systems) and/or computer program products according to embodiments of the invention. It is understood that several blocks of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, and/or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer and/or other programmable data processing apparatus, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instructions which implement the function/act specified in the block diagrams and/or flowchart block or blocks.
The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks.
Accordingly, the present invention may be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.). Furthermore, the present invention may take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system. In the context of this document, a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
The computer-usable or computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, and a portable compact disc read-only memory (CD-ROM). Note that the computer-usable or computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
The present invention is described herein as employed in and with a wireless communications device, also denoted a mobile device. In the context of the invention, the mobile device may e.g. be a mobile phone, a PDA (Personal Digital Assistant) or any other type of portable device such as laptop computer.
Referring to
In an embodiment of the present invention the position of the mobile device 100 is defined and identified by the longitude, latitude and altitude coordinate system, expressing the position in spatial terms. Latitude is expressed as 0-90 degrees north or south of the equator and longitude as 0-180 degrees east or west of the prime meridian. Altitude is expressed in meters above sea level. In one embodiment, the positioning information received in mobile device 100 is already in the form of such position coordinates. As an alternative, the positioning data received may be expressed as a text description.
There are different ways of positioning a mobile device, and in one embodiment of the present invention the mobile device is positioned using the mobile phone network within which the mobile device 110 is configured to communicate. One basic positioning procedure is to use the current cell ID. The cell ID is used to identify the base transceiver station, BTS, that the mobile device is communicating with, and the location of the BTS. The accuracy of this positioning method is dependent on the size of the cell and it should be understood that the cell size in a networks varies between 2 to 20 kilometres in diameter. Other techniques for positioning in a cellular network along with cell ID can be employed to narrow the resolution, such as Time Of Arrival (TOA), Time Difference Of Arrival (TDOA) and Angle of Arrival (AOA) techniques. Furthermore, Enhanced Observed Time Difference (E-OTD) is a positioning technology based on software within wireless phones combined with their existing signal measurement capabilities. Today, a position accuracy within 150 meters can be obtained.
In another embodiment of the present invention mobile device is positioned using satellites. Through the Global Positioning System (GPS) the mobile device may be positioned in longitude and latitude. A satellite positioning system is potentially the most accurate method, but requires additional hardware and/or software in the mobile device 100.
An alternative method to position a mobile device may be using short-range positioning beacons. This method is applicable in relatively small areas, such as a single building, but also along frequently visited roads, wherein a local area network can provide locations along with other services. For really short range applications within buildings, appropriately equipped devices can use Bluetooth for short-range positioning. The position data in such systems will be more accurate than in a cellular positioning system, due to the shorter communication range.
The position determined by means of the received positioning information relating to a current position, and the application requested by the user of the mobile device, are used in combination by control unit 150 to select a profile which is position-dependent, and to load and execute the selected application using parameters determined in the selected profile. The profiles may be manually programmed in advance by means of a user interface of mobile device 100, typically a keypad and a display with a menu system. Alternatively, profiles may be stored according to usage. In an embodiment of the latter kind, a profile may be stored when a certain application is launched for the first time in a certain position, which may or may not have been previously visited by the mobile device 100. In the illustrated embodiment of
Each profile is stored in memory 160 together with one or more related settings for different applications, for use by the mobile device 100 in order to set up a connection to a wireless network, such as e an IEEE 802.11 type WLAN, a WiMAX, a HiperLAN, a Bluetooth LAN, or a cellular mobile communications network such as a GPRS network, or a third generation WCDMA network. The mobile device 100 according to the embodiment illustrated in
In accordance with an embodiment of the present invention, the mobile device 100 is configured to automatically use the relevant settings for an application in a certain position. This way drainage of the battery 170 of the mobile device is reduced, since the mobile device 100 does not need to continuously run a scanning process in order to search and identify wireless networks.
Referring now to
The user initiates an application that involves setting up a connection to a communications network, step 200 in
In step 210 the position of mobile device 100 is determined. In one embodiment this includes receiving cell ID positioning information by means of antenna 110 and signal transceiver 140, through a cellular network covering the office. In a different embodiment the mobile device is positioned using GPS coordinates, where GPS satellite signals form the received positioning information. Alternative methods for positioning the mobile device may be used such as Galileo, Glonass or the like. The position of the device 100 is consequently determined based on the positioning information, where the positioning information may form the position data itself, or the position may be determined by analyzing the received positioning information. The position of the device may be constantly checked and determined or, as in the illustrated embodiment, determined following the selection of an application. In the embodiment of
In step 220 the determined position, i.e. the cell ID, is compared to position data stored in memory 160 of mobile device 100. In one embodiment the position data is stored in memory 160 as a list as described below with reference to
When a match is found between the determined position established from the received positioning information and the position data contained in memory 160, a profile related to the stored position data containing settings for different application is automatically selected, as denoted 230 in
When the profile has been selected in step 230, e.g. the profile “Office”, control unit 150 loads the settings prescribed in memory 160 for VoIP in the Office profile, and sets up a connection to an access point 320, as indicated in step 240. Settings used are e.g. VoIP codecs for voice compression, hi and low fidelity settings, authentication procedures such as 802.1x, WPA, WEP, PSK, EAP or the like, email clients and the like. In the illustrated example of
An embodiment of how to store profiles in memory 160 is schematically illustrated in
The foregoing has described the principles, preferred embodiments and modes of operation of the present invention. However, the invention should be regarded as illustrative rather than restrictive, and not as being limited to the particular embodiments discussed above. It should therefore be appreciated that variations may be made in those embodiments by those skilled in the art without departing from the scope of the present invention as defined by the following claims.
Number | Date | Country | |
---|---|---|---|
60745192 | Apr 2006 | US |