1. Field of the Invention
The present invention generally relates to key assignment. More specifically, the present invention relates to key assignment for a brand.
2. Description of the Related Art
An increasing number of individuals and businesses rely on wireless services to carry out various transactions and enable communication from remote locations. Many businesses such as hotels and coffee houses have sought to capitalize on this trend and offer free wireless access to attract and retain customers. A business offering such wireless access may do by creating a “hotspot”—a location that offers Internet access over a wireless local area network through the use of a router connected to a link to an Internet service provider.
Many hotspots only offer open and unsecured communications. Some users, however, may wish to engage in communications or transactions that involve personal, sensitive, or proprietary information that is not necessarily suited for an open and unsecured communications network. As such, users may wish for such transactions be conducted in a secure manner, such that such information may not be exposed or stolen.
Implementing security features is complicated, difficult to maintain, and requires a high level of technical knowledge. An additional complication is that users at a hotspot may be continually changing. Authentication relying on 802.1x/EAP is not a practical option as hotspot users may vary widely in security needs. Setting up a RADIUS server on a network backend may likewise be complicated and unwieldy.
Pre-shared key (PSK)-based security systems require that a secret be manually entered onto all user devices using the network. A PSK-based system relies on a secret shared between and stored at both the client station and the access point. The secret may be, for example, a long bit stream, such as a passphrase, a password, a hexadecimal string, or the like. Used by a client station and the access point to authenticate each other, the secret may also be used to generate an encryption key set.
A disadvantage to PSK-based systems is that once the shared secret becomes known to unauthorized personnel, the security of the entire network is compromised. This may pose a problem where network access is provided to an ever-changing set of numerous, diverse, and transient mobile users. Generally, to maintain the security of a PSK-based system, the secret must be changed on all client stations whenever a person with knowledge of the secret departs from the organization or is no longer authorized to access the network. As a result, many commercial organizations (e.g., small- and medium-sized businesses or enterprises with a high degree of turn over) have been unable to deploy security measures around their hotspots, because of their lack of expertise and/or full-time professional technical support.
In addition, a business (e.g., branded hotels) may have multiple locations where customers are provided service. While wireless internet services may be provided at these multiple locations, the customer is generally required to login and authenticate anew at each location. Such a business may wish to be able to leverage the information previously provided and steps previously performed at one location to facilitate and ease the customer experience at a second location. As used herein, a brand refers to any related products or services that may be provided at a plurality of locations. A branded hotspot, for example, may be a hotspot associated with a particular coffee shop that is associated with a chain of coffee shops, each of which may have its own branded hotspot.
Embodiments of the present invention include systems and methods for providing secured network access at a branded hotspot. A user device located within range of a branded hotspot initiates a request for the secured network access. The request concerns secured network access at the hotspot by the user device and includes a unique pre-shared key. A query regarding the unique pre-shared key is sent to a database, which retrieves information regarding a corresponding pre-shared key. That information is sent to the hotspot controller, which allows the user device secured network access as governed by one or more parameters associated with the pre-shared key.
Various embodiments of the present invention include methods for providing secured network access at a branded hotspot. Such methods may include receiving a request for secured network access initiated by a user device located within a range of a hotspot associated with a brand. The request may include a unique pre-shared key associated with the user device. Methods may further include sending a query to a database of pre-shared keys concerning the unique pre-shared key included in the request, receiving a response to the query including a corresponding pre-shared key regarding secured network access that has been generated at another hotspot associated with the brand, and providing secured network access at the hotspot based on the unique pre-shared key associated with the user device and the corresponding pre-shared key.
Additional embodiments include apparatuses for providing secured network access at a branded hotspot. Such apparatuses may include an interface for receiving an incoming request initiated by a user device located within a range of a hotspot associated with a brand and a processor for executing instructions stored in memory to generates a query to a database of pre-shared keys concerning the unique pre-shared key included in the request. The interface may further receive a response to the query including a corresponding pre-shared key regarding secured network access that has been generated at another hotspot associated with the brand, and secured network access may be provided at the hotspot based on the unique pre-shared key associated with the user device and the corresponding pre-shared key.
Embodiments of the present invention may further include systems for providing secured network access at a branded hotspot. Such systems may include a hotspot controller controlling a branded hotspot and comprising an interface that receives an incoming request for secured network access concerning a unique pre-shared key and initiated by a user device located within a range of the branded hotspot, sends a query to a database of pre-shared keys concerning the unique pre-shared key included in the request, and receives a response to the query including a corresponding pre-shared key regarding secured network access that has been generated at another hotspot associated with the brand. Systems may further include an access point associated with the branded hotspot that provides secured network access based on the unique pre-shared key associated with the user device and the corresponding pre-shared key.
Other embodiments of the present invention include non-transitory computer-readable storage media on which is embodied instructions executable to providing secured network access at a branded hotspot in general accordance with the method previously set forth above.
Secured network access at a branded hotspot is provided. A user device located within range of the hotspot initiates a request sent via an open communication network associated with the hotspot. The request concerns secured network access at the hotspot by the user device and includes a unique pre-shared key. A query regarding the unique pre-shared key is sent to a database, which retrieves information regarding a corresponding pre-shared key. That information is sent to the hotspot controller, which allows the user device secured network access as governed by one or more parameters associated with the pre-shared key.
Users may use any number of different wireless user devices 110 such as notebook, netbook, and tablet computers with WiFi capability, smartphones with WiFi capability, or any other type of wireless computing device capable of communicating over communication networks 120. User device 110 may also be configured to access data from other storage media, such as memory cards or disk drives as may be appropriate in the case of downloaded services. User device 110 may include standard hardware computing components such as network (e.g., wireless) and media interfaces, non-transitory computer-readable storage (memory), and processors for executing instructions that may be stored in memory.
Communication networks 120A-B may convey various kinds of information to user devices, such as user device 110. Communication networks 120A-B may be a local, proprietary network (e.g., an intranet) and/or may be a part of a larger wide-area network. The communications network 120A-B may be a local area network (LAN), which may be communicatively coupled to a wide area network (WAN) such as the Internet. The Internet is a broad network of interconnected computers and servers allowing for the transmission and exchange of Internet Protocol (IP) data between users connected through a network service provider. Examples of network service providers are the public switched telephone network, a cable service provider, a provider of digital subscriber line (DSL) services, or a satellite service provider. Communications networks 120A-B allow a connecting device (e.g., user device 110) to access the Internet. Open communication network 120A is open and unsecured. As such, any user device 110 may be able to connect to the open communication network 120A without (much) restriction. In contrast, secured communication network 120B may involve various security policies and protocols so that communications to and from user device 110 may remain secure.
Communication networks 120A-B are provided by a hotspot access point 130, which can transmit various electromagnetic waves. Examples of wireless protocols that might be used by hotspot access point 130 include IEEE 802.11 (Wi-Fi or Wireless LAN), IEEE 802.16 (WiMAX), or IEEE 802.16c network. Hotspot may be inclusive or a number of wireless transceivers distributed over an area.
Access point 130 includes, at the least, an antenna system, radio, memory, and processor. The antenna system wirelessly receives and transmits data packets. For example, the antenna system can receive packet data such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) packet data using the IEEE 802.11 wireless protocol. Radio converts data into the requisite wireless protocols. Various instructions governing the control of the access point 130 are stored in memory and executed by processor.
One or more wireless or wired connections may be created to allow for data transmission between access point 130 and user device 110 (via communication networks 120A-B) as well as web server 140, hotspot controller 150, and various other access points in network environment 100. The antenna may further include selectable antenna elements like those disclosed in U.S. Pat. No. 7,292,198 for a “System and Method for an Omnidirectional Planar Antenna Apparatus,” the disclosure of which is incorporated herein by reference. Hotspot access point 130 may also utilize various transmission parameter controls like those disclosed in U.S. Pat. No. 7,889,497 for a “System and Method for Transmission Parameter Control for an Antenna Apparatus with Selectable Elements,” the disclosure of which is incorporated herein by reference.
Web server 140 may include any type of server or other computing device as is known in the art for communication over the Internet (web). Web server 140 may include standard hardware computing components such as network and media interfaces, non-transitory computer-readable storage (memory), and processors for executing instructions or accessing information that may be stored in memory. The functionalities of multiple servers may be integrated into a single server. Any of the aforementioned servers (or an integrated server) may take on certain client-side, cache, or proxy server characteristics. These characteristics may depend on the particular network placement of the server or certain configurations of the server.
Hotspot controller 150 manages the one or more hotspot access points 130 in network environment 100. As such, the hotspot controller 150 intelligently manages the hotspot wireless services, including deployment, RF assignments, traffic/load balancing, and security. In terms of security, for example, the hotspot controller 150 may receive a request that a user device 110 be allowed to use the secured communication network 120B. The hotspot controller 150 may be located remotely (e.g., in the cloud) or in the same local area network as the hotspot access point 130.
In some instances, the hotspot controlled by hotspot controller 150 may be associated with a particular brand (e.g., hotel or coffee shop chain). When a user device 110 that is new to a brand requests secure network access, the request may be redirected to web server 140, which may convey the request to hotspot controller 150. Hotspot controller 150 dynamically generates a unique pre-shared key for the requesting user device 110 and return the key to web portal server 140, which in turns generates a web page displaying the unique pre-shared key to the user device 110. User device 110 may then use the pre-shared key in a request to access secure communication network 120B. Information regarding the pre-shared key associated with user device 110 is further sent by hotspot controller 150 to database of pre-shared keys 160 for storage.
The database of pre-shared keys 160 is accessible via the cloud (e.g., Internet) and stores a plurality of pre-shared keys associated with a brand. In some instances, the database 160 may store keys for a plurality of brands. The pre-shared keys and related information (e.g., associated parameter(s) for secured network access) may provided by a plurality of branded hotspots. Because the database 160 is located in the cloud, any hotspot controller 150 may send a query to the database 160 when an unfamiliar (to the hotspot controller 150) user device 110 submits an unfamiliar pre-shared key in a request for secured network access.
In some cases, the user device 110 may wish to request secured network access at another hotspot that is associated with the same brand but that is new to the user device 110. Because the user device 110 is already associated with a pre-shared key, the request sent by user device 110 may be sent using secured communication network 120B to hotspot controller 150. Since the user device 110 is new to this particular hotspot controller 150, a query regarding the pre-shared key is sent to database of pre-shared keys 160. In response to the query, the database 160 retrieves information regarding a corresponding pre-shared key. Such information may additionally include parameters of the secured network access to be provided to the user device 110.
In method 200 of
It is further determined whether the controller has a corresponding pre-shared key. Where the particular controller generated the key, for example, the controller may already have a corresponding key stored in memory. In some cases, however, the user device may be requesting secured network access from another hotspot new to the user device, but associated with the same brand as the hotspot where the pre-shared key was generated. The particular controller at the new hotspot may request the database for information regarding the pre-shared key associated with the user device. Such information may be retrieved and sent to the new hotspot, and secured network access is provided to the user device in accordance with the retrieved information.
In step 210, it is determined whether the user device 110 has already been associated with a pre-shared key. In such a scenario, user device 110 is within a range of a branded hotspot and is attempting to connect to a secured wireless network. If the user device 110 is already associated with a pre-shared key (e.g., previously generated at the branded hotspot or at another hotspot associated with the same brand), the method may skip ahead to step 245. If the user device 110 is not already associated with a pre-shared key, the method proceeds to step 215.
In step 215, a user device 110 connects to an open communication network 120A provided by hotspot access point 130. For some network activity (e.g., reading the news), the user may not necessarily require security and the use of the open communication network 120A may be sufficient. Some transactions (e.g., financial or business related) may require additional security so as to ensure that sensitive information is not exposed or misappropriated by other users of the open communication network 120A. The user of device 110 may be offered access to the secured communication network 120B as an option. Upon selection of that offering, a user request for access to the secure communication network 120B may be sent over the open communication network 120A. Connection to the open communication network 120A may, in some implementations, automatically initiate a request for secure access to the secured communication network 120B.
In step 220, the request for secure network access is redirected to web portal server 140. In addition to information regarding the particular user device 110, the access request may include information concerning various policies and parameters as determined by the particular entity (e.g., business) providing wireless access at the hotspot. These parameters and policies may include information used to configure a wireless device for connection to a restricted wireless network and access policies related to the same, such as a wireless network name, wireless device parameters, adapter configurations, security-related parameters, access constraints, quality of service parameters, security-related parameters, expiration date of the secure access, limits on session duration, bandwidth, user identity, user rewards, and access policies.
In step 225, the web portal server 140 submits a request for a unique pre-shared key to hotspot controller 150. Assigning each individual user/user device 110 a unique pre-shared key ensures that third-parties cannot eavesdrop on or otherwise access information belonging to another user accessing the network by way of device 110. Because each pre-shared key is unique, the encryption (and decryption) of information belonging to one particular user is different from that for any other user. Moreover, when the user leaves the hotspot, the unique pre-shared key assigned to that user/user device 110 does not need to be changed to maintain security for users remaining in the hotspot.
In step 230, the hotspot controller 150 generates a unique pre-shared key for the requesting user device 110 and sends the generated unique pre-shared key to the web portal server 140. Hotspot controller 150 may randomly generate the unique pre-shared secret for each user device 110 using various algorithms and formulas. By providing for randomly generated and unique keys, hotspot controller 150 increases the difficulty of illicitly gaining accessing user information by deducing the secret of any particular user.
Hotspot controller 150 may also store information associating the particular key with the requesting user device 110. Where a particular business providing the hotspot wishes to apply certain policies and parameters, those policies and parameters may also be stored. A hotel, for example, may wish to provide frequent guests with greater bandwidth than other guests. As such, information regarding the guest identity, the user device 110 belonging to the guests (e.g., as identified by MAC address) and the amount of bandwidth allotted may also be stored in association with the unique pre-shared key.
In step 235, the web portal server 140 generates a webpage to display the unique pre-shared key to the user of user device 110.
In step 240, information regarding the generated pre-shared key is sent from the hotspot controller 150 to the database of pre-shared keys 160. Any related information (e.g., policies and parameters described in relation to step 220) may also be sent to database 160 for storage and retrieval in response to subsequent queries.
In step 245, the unique pre-shared key is entered into user device 110, either manually by the user (e.g., a cut and paste operation), via user selection (e.g., execution of a script associated with a ‘install’ button), or automatically as a result of instructions embedded with a pre-shared key download package. A subsequent request for access to the secure communication network 120B is generated based on the unique pre-shared key. In some instances, the unique pre-shared key may be bundled as part of a package that may be installed automatically or upon request on the user device 110. The package may include any applications, policies, or parameters required for connection to the secure communication network 120B. For example, an application may be downloaded to the wireless device and executed to survey, configure (e.g., install parameters and policies), and/or connect the wireless device to the secured communication network 120B. The unique pre-shared key may then be used to authenticate the user device 110 so that the user device 110 can access the secured communication network 120B according to the installed policies and parameters.
In step 250, it is determined whether the hotspot controller 150 has a corresponding pre-shared key. In instances where the user device 110 is a repeat user of the same hotspot, the associated hotspot controller 150 may already have a corresponding pre-shared key in memory and the method may skip ahead to step 265. Where secured network access is being requested from a hotspot new to the user device 110, the hotspot controller 150 at this new hotspot may not have a corresponding pre-shared key, and the method proceeds to step 255.
In step 255, a query is generated and sent to a database of pre-shared keys 160. The query may include information regarding the user device 110 that may be used to identify the pre-shared key associated with the user device 110, and other associated information (e.g., policies and parameters described in relation to step 220). In some embodiments, the query may include information to identify the user device 110 (e.g., the MAC address).
In step 260, the pre-shared key information is retrieved from the database 160. Using the information in the query, the database 160 may identify that the user device 110 has been provided with a pre-shared key at a hotspot associated with the same brand as the hotspot (i.e., hotspot controller 150) that sent the query. In addition, certain policies and parameters may have been associated with that pre-shared key at other hotspots at other locations. For example, a customer may accumulate points by staying at a variety of locations of a branded hotel chain. Parameters of secured network access may be adjusted (e.g., higher bandwidth) as a reward to frequent customers. As such, information regarding a corresponding pre-shared key (including related policies and parameters) may be sent to the hotspot controller 150 in response to the query.
In step 265, secured network access is provided to the user device 110 in accordance with the parameters and policies indicated by the query response sent from the database 160. In addition, the current hotspot 160 may update 160 regarding any information that may affect the parameters and policies associated with the secured network access to be provided to the user device 110.
The present invention may be implemented in a variety of devices. Non-transitory computer-readable storage media refer to any non-transitory storage medium or media that participate in providing instructions to a central processing unit (CPU) for execution. Such media can take many forms, including, but not limited to, non-volatile and volatile media, which may include optical disks, dynamic memory, floppy disks, flexible disks, hard disks, magnetic tape, any other magnetic medium, CD-ROM disks, digital video disks (DVDs), any other optical medium, RAM, PROM, EPROM, a FLASHEPROM, and any other memory chip or cartridge.
Various forms of transmission media may be involved in carrying one or more sequences of one or more instructions to a CPU for execution. A bus carries the data to system RAM, from which a CPU retrieves and executes the instructions. The instructions received by system RAM can optionally be stored on a fixed disk either before or after execution by a CPU. Various forms of storage may likewise be implemented as well as the necessary network interfaces and network topologies to implement the same.
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and are not intended to limit the scope of the invention to the particular forms set forth herein. To the contrary, the present descriptions are intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims and otherwise appreciated by one of ordinary skill in the art along with their full scope of equivalents.
Number | Name | Date | Kind |
---|---|---|---|
725605 | Tesla | Apr 1903 | A |
1869659 | Broertjes | Aug 1932 | A |
2292387 | Markey et al. | Aug 1942 | A |
3488445 | Chang | Jan 1970 | A |
3568105 | Felsenheld | Mar 1971 | A |
3721990 | Gibson et al. | Mar 1973 | A |
3887925 | Ranghelli | Jun 1975 | A |
3967067 | Potter | Jun 1976 | A |
3969730 | Fuchser | Jul 1976 | A |
3982214 | Burns | Sep 1976 | A |
3991273 | Mathes | Nov 1976 | A |
4001734 | Burns | Jan 1977 | A |
4027307 | Litchford | May 1977 | A |
4176356 | Foster | Nov 1979 | A |
4193077 | Greenberg | Mar 1980 | A |
4203118 | Alford | May 1980 | A |
4253193 | Kennard | Feb 1981 | A |
4305052 | Baril | Dec 1981 | A |
4513412 | Cox | Apr 1985 | A |
4554554 | Olesen et al. | Nov 1985 | A |
4733203 | Ayasli | Mar 1988 | A |
4764773 | Larsen et al. | Aug 1988 | A |
4800393 | Edward et al. | Jan 1989 | A |
4814777 | Monser | Mar 1989 | A |
4821040 | Johnson et al. | Apr 1989 | A |
4920285 | Clark et al. | Apr 1990 | A |
4937585 | Shoemaker | Jun 1990 | A |
5063574 | Moose | Nov 1991 | A |
5097484 | Akaiwa | Mar 1992 | A |
5173711 | Takeuchi | Dec 1992 | A |
5203010 | Felix | Apr 1993 | A |
5208564 | Burns et al. | May 1993 | A |
5220340 | Shafai | Jun 1993 | A |
5241693 | Kim | Aug 1993 | A |
5282222 | Fattouche et al. | Jan 1994 | A |
5291289 | Hulyalkar et al. | Mar 1994 | A |
5311550 | Fouche et al. | May 1994 | A |
5373548 | McCarthy | Dec 1994 | A |
5434575 | Jelinek | Jul 1995 | A |
5453752 | Wang et al. | Sep 1995 | A |
5479176 | Zavrel | Dec 1995 | A |
5507035 | Bantz | Apr 1996 | A |
5532708 | Krenz et al. | Jul 1996 | A |
5559800 | Mousseau | Sep 1996 | A |
5726666 | Hoover et al. | Mar 1998 | A |
5754145 | Evans | May 1998 | A |
5767755 | Kim et al. | Jun 1998 | A |
5767807 | Prtichett | Jun 1998 | A |
5767809 | Chuang | Jun 1998 | A |
5786793 | Maeda et al. | Jul 1998 | A |
5802312 | Lazaridis | Sep 1998 | A |
5828346 | Park | Oct 1998 | A |
5936595 | Wang | Aug 1999 | A |
5964830 | Durrett | Oct 1999 | A |
5990838 | Burns et al. | Nov 1999 | A |
6005525 | Kivela | Dec 1999 | A |
6011450 | Miya | Jan 2000 | A |
6023250 | Cronyn | Feb 2000 | A |
6031503 | Preiss, II et al. | Feb 2000 | A |
6034638 | Thiel | Mar 2000 | A |
6046703 | Wang | Apr 2000 | A |
6052093 | Yao et al. | Apr 2000 | A |
6091364 | Murakami et al. | Jul 2000 | A |
6094177 | Yamamoto | Jul 2000 | A |
6097347 | Duan et al. | Aug 2000 | A |
6104356 | Hikuma et al. | Aug 2000 | A |
6169523 | Ploussios | Jan 2001 | B1 |
6249216 | Flick | Jun 2001 | B1 |
6266528 | Farzaneh | Jul 2001 | B1 |
6281762 | Nakao | Aug 2001 | B1 |
6288682 | Thiel et al. | Sep 2001 | B1 |
6292153 | Aiello | Sep 2001 | B1 |
6307524 | Britain | Oct 2001 | B1 |
6317599 | Rappaport | Nov 2001 | B1 |
6323810 | Poilasne et al. | Nov 2001 | B1 |
6326922 | Hegendoerfer | Dec 2001 | B1 |
6326924 | Muramoto et al. | Dec 2001 | B1 |
6337628 | Campana | Jan 2002 | B2 |
6337668 | Ito | Jan 2002 | B1 |
6339404 | Johnson | Jan 2002 | B1 |
6345043 | Hsu | Feb 2002 | B1 |
6351240 | Karimullah et al. | Feb 2002 | B1 |
6356242 | Ploussios | Mar 2002 | B1 |
6356243 | Schneider | Mar 2002 | B1 |
6356905 | Gershman | Mar 2002 | B1 |
6366254 | Sivenpiper | Apr 2002 | B1 |
6377227 | Zhu | Apr 2002 | B1 |
6392610 | Braun | May 2002 | B1 |
6396456 | Chiang et al. | May 2002 | B1 |
6400329 | Barnes | Jun 2002 | B1 |
6404386 | Proctor | Jun 2002 | B1 |
6407719 | Ohira | Jun 2002 | B1 |
RE37802 | Fattouche et al. | Jul 2002 | E |
6414647 | Lee | Jul 2002 | B1 |
6424311 | Tsai et al. | Jul 2002 | B1 |
6442507 | Skidmore | Aug 2002 | B1 |
6445688 | Garces | Sep 2002 | B1 |
6456242 | Crawford | Sep 2002 | B1 |
6476773 | Palmer | Nov 2002 | B2 |
6492957 | Carillo et al. | Dec 2002 | B2 |
6493679 | Rappaport | Dec 2002 | B1 |
6496083 | Kushitani et al. | Dec 2002 | B1 |
6498589 | Horii | Dec 2002 | B1 |
6499006 | Rappaport | Dec 2002 | B1 |
6507321 | Oberschmidt | Jan 2003 | B2 |
6521422 | Hsu | Feb 2003 | B1 |
6531985 | Jones et al. | Mar 2003 | B1 |
6545643 | Sward | Apr 2003 | B1 |
6583765 | Schamberget et al. | Jun 2003 | B1 |
6586786 | Kitazawa et al. | Jul 2003 | B2 |
6593891 | Zhang | Jul 2003 | B2 |
6606059 | Barabash | Aug 2003 | B1 |
6611230 | Phelan | Aug 2003 | B2 |
6621029 | Galmiche | Sep 2003 | B2 |
6625454 | Rappaport | Sep 2003 | B1 |
6633206 | Kato | Oct 2003 | B1 |
6642889 | McGrath | Nov 2003 | B1 |
6642890 | Chen | Nov 2003 | B1 |
6674459 | Ben-Shachar | Jan 2004 | B2 |
6700546 | Benhammou et al. | Mar 2004 | B2 |
6701522 | Rubin | Mar 2004 | B1 |
6724346 | Le Bolzer | Apr 2004 | B2 |
6725281 | Zintel | Apr 2004 | B1 |
6741219 | Shor | May 2004 | B2 |
6747605 | Lebaric | Jun 2004 | B2 |
6753814 | Killen | Jun 2004 | B2 |
6757267 | Evans | Jun 2004 | B1 |
6762723 | Nallo | Jul 2004 | B2 |
6772331 | Hind et al. | Aug 2004 | B1 |
6774852 | Chiang et al. | Aug 2004 | B2 |
6774864 | Evans | Aug 2004 | B2 |
6779004 | Zintel | Aug 2004 | B1 |
6807577 | Gillespie | Oct 2004 | B1 |
6819287 | Sullivan | Nov 2004 | B2 |
6839038 | Weinstein | Jan 2005 | B2 |
6859176 | Choi | Feb 2005 | B2 |
6859182 | Horii | Feb 2005 | B2 |
6864852 | Chiang et al. | Mar 2005 | B2 |
6876280 | Nakano | Apr 2005 | B2 |
6876836 | Lin | Apr 2005 | B2 |
6879293 | Sato | Apr 2005 | B2 |
6888504 | Chiang | May 2005 | B2 |
6888893 | Li | May 2005 | B2 |
6892230 | Gu | May 2005 | B1 |
6894653 | Chiang et al. | May 2005 | B2 |
6903686 | Vance et al. | Jun 2005 | B2 |
6906678 | Chen | Jun 2005 | B2 |
6910068 | Zintel | Jun 2005 | B2 |
6914581 | Popek | Jul 2005 | B1 |
6924768 | Wu | Aug 2005 | B2 |
6931429 | Gouge | Aug 2005 | B2 |
6933907 | Shirosaka | Aug 2005 | B2 |
6941143 | Mathur | Sep 2005 | B2 |
6943749 | Paun | Sep 2005 | B2 |
6947727 | Brynielsson | Sep 2005 | B1 |
6950019 | Bellone | Sep 2005 | B2 |
6950069 | Gaucher et al. | Sep 2005 | B2 |
6950523 | Brickell | Sep 2005 | B1 |
6961028 | Joy | Nov 2005 | B2 |
6965353 | Shirosaka et al. | Nov 2005 | B2 |
6973622 | Rappaport | Dec 2005 | B1 |
6975834 | Forster | Dec 2005 | B1 |
6980782 | Braun et al. | Dec 2005 | B1 |
7023909 | Adams et al. | Apr 2006 | B1 |
7024225 | Ito | Apr 2006 | B2 |
7034769 | Surducan et al. | Apr 2006 | B2 |
7034770 | Yang | Apr 2006 | B2 |
7043277 | Pfister | May 2006 | B1 |
7043633 | Fink et al. | May 2006 | B1 |
7046201 | Okada | May 2006 | B2 |
7050809 | Lim | May 2006 | B2 |
7053844 | Gaucher et al. | May 2006 | B2 |
7064717 | Kaluzni | Jun 2006 | B2 |
7085814 | Ghandi | Aug 2006 | B1 |
7088299 | Siegler et al. | Aug 2006 | B2 |
7088306 | Chiang et al. | Aug 2006 | B2 |
7089307 | Zintel | Aug 2006 | B2 |
7098863 | Bancroft | Aug 2006 | B2 |
D530325 | Kerila | Oct 2006 | S |
7120405 | Rofougaran | Oct 2006 | B2 |
7127234 | Ishii | Oct 2006 | B2 |
7130895 | Zintel | Oct 2006 | B2 |
7148846 | Qi et al. | Dec 2006 | B2 |
7162273 | Ambramov et al. | Jan 2007 | B1 |
7164380 | Saito | Jan 2007 | B2 |
7171475 | Weisman | Jan 2007 | B2 |
7181620 | Hur | Feb 2007 | B1 |
7193562 | Shtrom | Mar 2007 | B2 |
7197297 | Myles | Mar 2007 | B2 |
7206610 | Iacono et al. | Apr 2007 | B2 |
7215296 | Ambramov et al. | May 2007 | B2 |
7234063 | Baugher | Jun 2007 | B1 |
7234156 | French et al. | Jun 2007 | B2 |
7263076 | Leibovitz et al. | Aug 2007 | B1 |
7277063 | Shirosaka et al. | Oct 2007 | B2 |
7292198 | Shtrom | Nov 2007 | B2 |
7292870 | Heredia et al. | Nov 2007 | B2 |
7295825 | Raddant | Nov 2007 | B2 |
7298228 | Sievenpiper | Nov 2007 | B2 |
7312762 | Puente Ballarda et al. | Dec 2007 | B2 |
7319432 | Andersson | Jan 2008 | B2 |
7333460 | Vaisanen et al. | Feb 2008 | B2 |
7358912 | Kish et al. | Apr 2008 | B1 |
7362280 | Shtrom | Apr 2008 | B2 |
7363354 | Lahti | Apr 2008 | B2 |
7385563 | Bishop | Jun 2008 | B2 |
7421578 | Huang et al. | Sep 2008 | B1 |
7477894 | Sinha | Jan 2009 | B1 |
7498999 | Shtrom et al. | Mar 2009 | B2 |
7505434 | Backes | Mar 2009 | B1 |
7511680 | Shtrom et al. | Mar 2009 | B2 |
7522569 | Rada | Apr 2009 | B2 |
7525486 | Shtrom | Apr 2009 | B2 |
7562385 | Thione et al. | Jul 2009 | B2 |
7565529 | Beck | Jul 2009 | B2 |
7599380 | Whitten | Oct 2009 | B2 |
7609648 | Hoffmann et al. | Oct 2009 | B2 |
7669232 | Jou | Feb 2010 | B2 |
7697550 | Rada | Apr 2010 | B2 |
7715833 | Sanchez | May 2010 | B2 |
7722502 | Holkkola | May 2010 | B2 |
7733275 | Hirota | Jun 2010 | B2 |
7782895 | Pasanen et al. | Aug 2010 | B2 |
7788703 | Jou | Aug 2010 | B2 |
7835697 | Wright | Nov 2010 | B2 |
7847741 | Hirota | Dec 2010 | B2 |
7864119 | Shtrom et al. | Jan 2011 | B2 |
7893882 | Shtrom | Feb 2011 | B2 |
7916463 | Aya et al. | Mar 2011 | B2 |
7966497 | Gantman et al. | Jun 2011 | B2 |
8005459 | Balsillie | Aug 2011 | B2 |
8009644 | Kuo | Aug 2011 | B2 |
8068068 | Kish et al. | Nov 2011 | B2 |
8085206 | Shtrom | Dec 2011 | B2 |
8091120 | Perrella et al. | Jan 2012 | B2 |
8108904 | Chickering et al. | Jan 2012 | B1 |
8217843 | Shtrom | Jul 2012 | B2 |
8260278 | Landsman et al. | Sep 2012 | B2 |
8272036 | Jou | Sep 2012 | B2 |
8355912 | Keesey et al. | Jan 2013 | B1 |
8358248 | Shtrom | Jan 2013 | B2 |
8605697 | Kuo | Dec 2013 | B2 |
8607315 | Jou | Dec 2013 | B2 |
8686905 | Shtrom | Apr 2014 | B2 |
8704720 | Kish | Apr 2014 | B2 |
8723741 | Shtrom | May 2014 | B2 |
8756668 | Ranade et al. | Jun 2014 | B2 |
8836606 | Kish | Sep 2014 | B2 |
8923265 | Kuo | Dec 2014 | B2 |
20010046848 | Kenkel | Nov 2001 | A1 |
20020009199 | Ala-Laurila et al. | Jan 2002 | A1 |
20020022483 | Thompson et al. | Feb 2002 | A1 |
20020031130 | Tsuchiya | Mar 2002 | A1 |
20020036586 | Gothard et al. | Mar 2002 | A1 |
20020047800 | Proctor | Apr 2002 | A1 |
20020080767 | Lee | Jun 2002 | A1 |
20020084942 | Tsai | Jul 2002 | A1 |
20020101377 | Crawford | Aug 2002 | A1 |
20020105471 | Kojima | Aug 2002 | A1 |
20020112058 | Weisman | Aug 2002 | A1 |
20020119757 | Hamabe | Aug 2002 | A1 |
20020158798 | Chang | Oct 2002 | A1 |
20020169966 | Nyman | Nov 2002 | A1 |
20020170064 | Monroe | Nov 2002 | A1 |
20030026240 | Eyuboglu | Feb 2003 | A1 |
20030030588 | Kalis | Feb 2003 | A1 |
20030038698 | Hirayama | Feb 2003 | A1 |
20030063591 | Leung | Apr 2003 | A1 |
20030122714 | Wannagot | Jul 2003 | A1 |
20030156558 | Cromer et al. | Aug 2003 | A1 |
20030162533 | Moles | Aug 2003 | A1 |
20030169330 | Ben-Shachar | Sep 2003 | A1 |
20030184490 | Raiman | Oct 2003 | A1 |
20030189514 | Miyano | Oct 2003 | A1 |
20030189521 | Yamamoto | Oct 2003 | A1 |
20030189523 | Ojantakanen | Oct 2003 | A1 |
20030191935 | Ferguson | Oct 2003 | A1 |
20030196084 | Okereke | Oct 2003 | A1 |
20030202486 | Anton et al. | Oct 2003 | A1 |
20030210207 | Suh | Nov 2003 | A1 |
20030214446 | Shehab | Nov 2003 | A1 |
20030227414 | Saliga | Dec 2003 | A1 |
20040014432 | Boyle | Jan 2004 | A1 |
20040017310 | Vargas-Hurlston | Jan 2004 | A1 |
20040017315 | Fang et al. | Jan 2004 | A1 |
20040017860 | Liu | Jan 2004 | A1 |
20040027291 | Zhang | Feb 2004 | A1 |
20040027304 | Chiang | Feb 2004 | A1 |
20040030900 | Clark | Feb 2004 | A1 |
20040032378 | Volman | Feb 2004 | A1 |
20040036651 | Toda | Feb 2004 | A1 |
20040036654 | Hsieh | Feb 2004 | A1 |
20040041732 | Aikawa | Mar 2004 | A1 |
20040048593 | Sano | Mar 2004 | A1 |
20040058690 | Ratzel | Mar 2004 | A1 |
20040061653 | Webb | Apr 2004 | A1 |
20040070543 | Masaki | Apr 2004 | A1 |
20040073786 | O'Neill | Apr 2004 | A1 |
20040075609 | Li | Apr 2004 | A1 |
20040080455 | Lee | Apr 2004 | A1 |
20040090371 | Rossman | May 2004 | A1 |
20040095278 | Kanemoto | May 2004 | A1 |
20040097217 | McClain | May 2004 | A1 |
20040114535 | Hoffman | Jun 2004 | A1 |
20040121749 | Cui et al. | Jun 2004 | A1 |
20040125777 | Doyle | Jul 2004 | A1 |
20040141617 | Volpano | Jul 2004 | A1 |
20040145528 | Mukai et al. | Jul 2004 | A1 |
20040153647 | Rotholtz et al. | Aug 2004 | A1 |
20040160376 | Hornsby et al. | Aug 2004 | A1 |
20040190477 | Olson | Sep 2004 | A1 |
20040203347 | Nguyen | Oct 2004 | A1 |
20040203593 | Whelan | Oct 2004 | A1 |
20040207563 | Yang | Oct 2004 | A1 |
20040214570 | Zhang | Oct 2004 | A1 |
20040214572 | Thompson et al. | Oct 2004 | A1 |
20040227669 | Okada | Nov 2004 | A1 |
20040260800 | Gu | Dec 2004 | A1 |
20050022210 | Zintel | Jan 2005 | A1 |
20050041739 | Li | Feb 2005 | A1 |
20050042988 | Hoek | Feb 2005 | A1 |
20050048934 | Rawnick et al. | Mar 2005 | A1 |
20050050352 | Narayanaswami et al. | Mar 2005 | A1 |
20050062649 | Chiang et al. | Mar 2005 | A1 |
20050074018 | Zintel | Apr 2005 | A1 |
20050097503 | Zintel | May 2005 | A1 |
20050100166 | Smetters | May 2005 | A1 |
20050122265 | Gaucher et al. | Jun 2005 | A1 |
20050128983 | Kim et al. | Jun 2005 | A1 |
20050128988 | Simpson et al. | Jun 2005 | A1 |
20050129222 | Creamer et al. | Jun 2005 | A1 |
20050135480 | Li | Jun 2005 | A1 |
20050138137 | Encamacion | Jun 2005 | A1 |
20050138193 | Encamacion | Jun 2005 | A1 |
20050146475 | Bettner et al. | Jul 2005 | A1 |
20050152305 | Ji et al. | Jul 2005 | A1 |
20050165953 | Oba et al. | Jul 2005 | A1 |
20050180381 | Retzer | Aug 2005 | A1 |
20050188193 | Kuehnel | Aug 2005 | A1 |
20050220048 | Lee et al. | Oct 2005 | A1 |
20050222933 | Wesby | Oct 2005 | A1 |
20050228874 | Edgett | Oct 2005 | A1 |
20050237258 | Abramov et al. | Oct 2005 | A1 |
20050240665 | Gu | Oct 2005 | A1 |
20050250472 | Silvester | Nov 2005 | A1 |
20050261970 | Vucina et al. | Nov 2005 | A1 |
20050267935 | Ghandi | Dec 2005 | A1 |
20050268107 | Harris | Dec 2005 | A1 |
20060007897 | Ishii | Jan 2006 | A1 |
20060031922 | Sakai | Feb 2006 | A1 |
20060038734 | Shtrom et al. | Feb 2006 | A1 |
20060046730 | Briancon et al. | Mar 2006 | A1 |
20060050005 | Shirosaka et al. | Mar 2006 | A1 |
20060052085 | Gregrio Rodriguez et al. | Mar 2006 | A1 |
20060080415 | Tu | Apr 2006 | A1 |
20060080741 | Nair | Apr 2006 | A1 |
20060089123 | Frank | Apr 2006 | A1 |
20060094371 | Nguyen | May 2006 | A1 |
20060094400 | Beachem et al. | May 2006 | A1 |
20060098607 | Zeng | May 2006 | A1 |
20060109191 | Shtrom | May 2006 | A1 |
20060111902 | Julia et al. | May 2006 | A1 |
20060123124 | Weisman | Jun 2006 | A1 |
20060123125 | Weisman | Jun 2006 | A1 |
20060123455 | Pai | Jun 2006 | A1 |
20060133405 | Fee | Jun 2006 | A1 |
20060165103 | Trudeau et al. | Jul 2006 | A1 |
20060168159 | Weisman | Jul 2006 | A1 |
20060184660 | Rao | Aug 2006 | A1 |
20060184661 | Weisman | Aug 2006 | A1 |
20060184693 | Rao | Aug 2006 | A1 |
20060189298 | Marcelli | Aug 2006 | A1 |
20060200851 | Hung | Sep 2006 | A1 |
20060223527 | Lee et al. | Oct 2006 | A1 |
20060224690 | Falkenburg | Oct 2006 | A1 |
20060225107 | Seetharaman | Oct 2006 | A1 |
20060227062 | Francque et al. | Oct 2006 | A1 |
20060227761 | Scott | Oct 2006 | A1 |
20060239369 | Lee | Oct 2006 | A1 |
20060251256 | Asokan et al. | Nov 2006 | A1 |
20060262015 | Thornell-Pers et al. | Nov 2006 | A1 |
20060291434 | Gu | Dec 2006 | A1 |
20070027622 | Cleron | Feb 2007 | A1 |
20070037619 | Matsunaga et al. | Feb 2007 | A1 |
20070047449 | Berger et al. | Mar 2007 | A1 |
20070055752 | Wiegand et al. | Mar 2007 | A1 |
20070115180 | Kish et al. | May 2007 | A1 |
20070124490 | Kalavade et al. | May 2007 | A1 |
20070130294 | Nishio | Jun 2007 | A1 |
20070130456 | Kuo | Jun 2007 | A1 |
20070135167 | Liu | Jun 2007 | A1 |
20070143832 | Perrella et al. | Jun 2007 | A1 |
20070150736 | Cukier | Jun 2007 | A1 |
20070165582 | Batta | Jul 2007 | A1 |
20070189537 | Zhang et al. | Aug 2007 | A1 |
20070199053 | Sandhu et al. | Aug 2007 | A1 |
20070211659 | Li et al. | Sep 2007 | A1 |
20070249324 | Jou | Oct 2007 | A1 |
20070287450 | Yang | Dec 2007 | A1 |
20070293951 | Takahashi | Dec 2007 | A1 |
20070294528 | Shoji et al. | Dec 2007 | A1 |
20080060064 | Wynn et al. | Mar 2008 | A1 |
20080062058 | Bishop | Mar 2008 | A1 |
20080075280 | Ye et al. | Mar 2008 | A1 |
20080085723 | Tsao et al. | Apr 2008 | A1 |
20080096492 | Yoon | Apr 2008 | A1 |
20080109657 | Bajaj et al. | May 2008 | A1 |
20080119165 | Mittal et al. | May 2008 | A1 |
20080136715 | Shtrom | Jun 2008 | A1 |
20080141244 | Kelley | Jun 2008 | A1 |
20080208617 | Onyon et al. | Aug 2008 | A1 |
20080212535 | Karaoguz et al. | Sep 2008 | A1 |
20080272977 | Gaucher et al. | Nov 2008 | A1 |
20080307515 | Drokov et al. | Dec 2008 | A1 |
20090005005 | Forstall et al. | Jan 2009 | A1 |
20090013210 | McIntosh et al. | Jan 2009 | A1 |
20090092255 | Jou | Apr 2009 | A1 |
20090103731 | Sarikaya | Apr 2009 | A1 |
20090119190 | Realini | May 2009 | A1 |
20090187970 | Mower et al. | Jul 2009 | A1 |
20090193118 | Cox et al. | Jul 2009 | A1 |
20090217048 | Smith | Aug 2009 | A1 |
20090219903 | Alamouti et al. | Sep 2009 | A1 |
20090295648 | Dorsey et al. | Dec 2009 | A1 |
20090315794 | Alamouti et al. | Dec 2009 | A1 |
20100053023 | Shtrom | Mar 2010 | A1 |
20100070542 | Feinsmith | Mar 2010 | A1 |
20100103065 | Shtrom et al. | Apr 2010 | A1 |
20100103066 | Shtrom et al. | Apr 2010 | A1 |
20100299518 | Viswanathan et al. | Nov 2010 | A1 |
20100332828 | Goto | Dec 2010 | A1 |
20110007705 | Buddhikot et al. | Jan 2011 | A1 |
20110035624 | Miller | Feb 2011 | A1 |
20110040870 | Wynn et al. | Feb 2011 | A1 |
20110047603 | Gordon et al. | Feb 2011 | A1 |
20110055898 | Jou | Mar 2011 | A1 |
20110095960 | Shtrom | Apr 2011 | A1 |
20110126016 | Sun | May 2011 | A1 |
20110208866 | Marmolejo-Meillon et al. | Aug 2011 | A1 |
20110271111 | Frank et al. | Nov 2011 | A1 |
20110281609 | Kuo | Nov 2011 | A1 |
20120030466 | Yamaguchi | Feb 2012 | A1 |
20120054338 | Ando | Mar 2012 | A1 |
20120078949 | Allen et al. | Mar 2012 | A1 |
20120089845 | Raleigh | Apr 2012 | A1 |
20120098730 | Kish | Apr 2012 | A1 |
20120134291 | Raleigh | May 2012 | A1 |
20120257536 | Kholaif et al. | Oct 2012 | A1 |
20120278654 | Shen | Nov 2012 | A1 |
20120284785 | Salkintzis et al. | Nov 2012 | A1 |
20120299772 | Shtrom | Nov 2012 | A1 |
20120317625 | Jou | Dec 2012 | A1 |
20120322035 | Julia et al. | Dec 2012 | A1 |
20130007853 | Gupta et al. | Jan 2013 | A1 |
20130038496 | Shtrom | Feb 2013 | A1 |
20130047218 | Smith | Feb 2013 | A1 |
20130182693 | Sperling et al. | Jul 2013 | A1 |
20130207865 | Shtrom | Aug 2013 | A1 |
20130207866 | Shtrom | Aug 2013 | A1 |
20130207877 | Shtrom | Aug 2013 | A1 |
20130212656 | Ranade et al. | Aug 2013 | A1 |
20130241789 | Shtrom | Sep 2013 | A1 |
20140007209 | Zucker | Jan 2014 | A1 |
20140066112 | Kuo | Mar 2014 | A1 |
20140068724 | Jou | Mar 2014 | A1 |
20140210681 | Shtrom | Jul 2014 | A1 |
20140282951 | Ranade | Sep 2014 | A1 |
Number | Date | Country |
---|---|---|
2003227399 | Oct 2003 | AU |
02494982 | Oct 2003 | CA |
1708162 | Dec 2005 | CN |
1316862 | Oct 2011 | CN |
103441984 | Dec 2013 | CN |
103858106 | Jun 2014 | CN |
10 2006 026350 | Dec 2006 | DE |
0 352 787 | Jul 1989 | EP |
352 787 | Jan 1990 | EP |
0 534 612 | Mar 1993 | EP |
0 756 381 | Jan 1997 | EP |
0 883 206 | Dec 1998 | EP |
1 152 452 | Nov 2001 | EP |
1 152 542 | Nov 2001 | EP |
1 152 543 | Nov 2001 | EP |
1 376 920 | Jun 2002 | EP |
1 220 461 | Jul 2002 | EP |
1 315 311 | May 2003 | EP |
1 450 521 | Aug 2004 | EP |
1 608 108 | Dec 2005 | EP |
1 638 261 | Mar 2006 | EP |
1 724 691 | Nov 2006 | EP |
1 909 358 | Apr 2008 | EP |
1 287 588 | Jan 2009 | EP |
2 705 429 | Mar 2014 | EP |
1 958 369 | Apr 2015 | EP |
2 426 870 | Jun 2006 | GB |
2 423 191 | Aug 2006 | GB |
3038933 | Jul 1989 | JP |
03038933 | Feb 1991 | JP |
2008088633 | Feb 1996 | JP |
2008088633 | Apr 1996 | JP |
2001-057560 | Feb 2001 | JP |
2001057560 | Feb 2002 | JP |
2002-505835 | Feb 2002 | JP |
2005-354249 | Dec 2005 | JP |
2005354249 | Dec 2005 | JP |
2006060408 | Mar 2006 | JP |
2014-522142 | Aug 2014 | JP |
201351188 | Dec 2013 | TW |
WO 9004893 | May 1990 | WO |
WO 9955012 | Oct 1999 | WO |
WO 0113461 | Feb 2001 | WO |
WO 0169724 | Sep 2001 | WO |
WO 0184323 | Nov 2001 | WO |
WO 0207258 | Jan 2002 | WO |
WO 0207258 | Jan 2002 | WO |
WO 0225967 | Mar 2002 | WO |
WO 03079484 | Sep 2003 | WO |
WO 03081718 | Oct 2003 | WO |
WO 2004051798 | Jun 2004 | WO |
WO 2006023247 | Mar 2006 | WO |
WO 2006057679 | Jun 2006 | WO |
WO 2007064822 | Jun 2007 | WO |
WO 2007076105 | Jul 2007 | WO |
WO 2007127087 | Nov 2007 | WO |
WO 2007127120 | Nov 2007 | WO |
WO 2007127162 | Nov 2007 | WO |
WO 2012151224 | Nov 2012 | WO |
WO 2013119750 | Aug 2013 | WO |
WO 2013152027 | Oct 2013 | WO |
Entry |
---|
Ruckus Wireless, Inc. vs. Netgear, Inc; Defendant Netgear, Inc. Invalidity Contentions. |
Abramov 2003—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Abramov 273—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Abramov 296—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Airgain 2004—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Bancroft 863—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Barabash 059—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Cetiner 2003—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Chuang 2003—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Evans 864—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486. |
Johnson 404—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Kalis 2000—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Kalis 2002—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486. |
Kaluzni 717—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Kim 693—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Lin 836—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Nakao 762—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486. |
Okada 201—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Palmer 773—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Paun 749—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Qian 2000—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Shehab 2003—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Shirosaka 907—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Shtrom 198 & 280—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Sievenpiper 254—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Simons 1994—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Sward 643—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Vaughan 1995—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Wang 703—P.R. 3-3 © Chart for U.S. Patent No. 7,525,486 and U.S. Patent No. 7,193,562. |
Alard, M., et al., “Principles of Modulation and Channel Coding for Digital Broadcasting for Mobile Receivers,” 8301 EBU Review Technical, Aug. 1987, No. 224, Brussels, Belgium. |
Ando et al., “Study of Dual-Polarized Omni-Directional Antennas for 5.2 GHz-Band 2×2 MIMO-OFDM Systems,” Antennas and Propogation Society International Symposium, 2004, IEEE, pp. 1740-1743 vol. 2. |
“Authorization of Spread Spectrum Systems Under Parts 15 and 90 of the FCC Rules and Regulations,” Rules and Regulations Federal Communications Commission, 47 CFR Part 2, and 90, Jun. 18, 1985. |
“Authorization of spread spectrum and other wideband emissions not presently provided for in the FCC Rules and Regulations,” Before the Federal Communications Commission, FCC 81-289, 87 F.C.C.2d 876, Gen Docket No. 81-413, Jun. 30, 1981. |
Bedell, Paul, “Wireless Crash Course,” 2005, p. 84, The McGraw-Hill Companies, Inc., USA. |
Behdad et al., Slot Antenna Miniaturization Using Distributed Inductive Loading, Antenna and Propagation Society International Symposium, 2003 IEEE, vol. 1, pp. 308-311 (Jun. 2003). |
Berenguer, Inaki, et al., “Adaptive MIMO Antenna Selection,” Nov. 2003. |
Casas, Eduardo F., et al., “OFDM for Data Communication Over Mobile Radio FM Channels—Part I: Analysis and Experimental Results,” IEEE Transactions on Communications, vol. 39, No. 5, May 1991, pp. 783-793. |
Casas, Eduardo F., et al., “OFDM for Data Communication over Mobile Radio FM Channels; Part II: Performance Improvement,” Department of Electrical Engineering, University of British Columbia. |
Chang, Robert W., et al., “A Theoretical Study of Performance of an Orthogonal Multiplexing Data Transmission Scheme,” IEEE Transactions on Communication Technology, vol. Com-16, No. 4, Aug. 1968, pp. 529-540. |
Chang, Robert W., “Synthesis of Band-Limited Orthogonal Signals for Multichannel Data Transmission,” The Bell System Technical Journal, Dec. 1966, pp. 1775-1796.C. |
Chuang et al., A 2.4 GHz Polarization-diversity Planar Printed Dipole Antenna for WLAN and Wireless Communication Applications, Microwave Journal, vol. 45, No. 6, pp. 50-62 (Jun. 2002). |
Cimini, Jr., Leonard J, “Analysis and Simulation of a Digital Mobile Channel Using Orthogonal Frequency Division Multiplexing,” IEEE Transactions on Communications, vol. Com-33, No. 7, Jul. 1985, pp. 665-675. |
English Translation of PCT Pub. No. WO2004/051798 (as filed U.S. Appl. No. 10/536,547). |
Frederick et al., Smart Antennas Based on Spatial Multiplexing of Local Elements (SMILE) for Mutual Coupling Reduction, IEEE Transactions of Antennas and Propogation, vol. 52., No. 1, pp. 106-114 (Jan. 2004). |
Gaur, Sudhanshu, et al., “Transmit/Receive Antenna Selection for MIMO Systems to Improve Error Performance of Linear Receivers,” School of ECE, Georgia Institute of Technology, Apr. 4, 2005. |
Gledhill, J. J., et al., “The Transmission of Digital Television in the UHF Band Using Orthogonal Frequency Division Multiplexing,” Sixth International Conference on Digital Processing of Signals in Communications, Sep. 2-6, 1991, pp. 175-180. |
Information Society Technologies Ultrawaves, “System Concept / Architecture Design and Communication Stack Requirement Document,” Feb. 23, 2004. |
Molisch, Andreas F., et al., “MIMO Systems with Antenna Selection—an Overview,” Draft, Dec. 31, 2003. |
Moose, Paul H., “Differential Modulation and Demodulation of Multi-Frequency Digital Communications Signals,” 1990 IEEE,CH2831-6/90/0000-0273. |
ORINOCO AP-2000 5GHz Kit, “Access Point Family,” Proxim Wireless Corporation. |
Pat Calhoun et al., “802.11r strengthens wireless voice,” Technology Update, Network World, Aug. 22, 2005, http://www.networkworld.com/news/tech/2005/082208techupdate.html. |
Press Release, NETGEAR RangeMax(TM) Wireless Networking Solutions Incorporate Smart MIMO Technology to Eliminate Wireless Dead Spots and Take Consumers Farther, Ruckus Wireles Inc. (Mar. 7, 2005), available at http://ruckuswireless.com/press/releases/20050307.php. |
RL Miller, “4.3 Project X—A True Secrecy System for Speech,” Engineering and Science in the Bell System, A History of Engineering and Science in the Bell System National Service in War and Peace (1925-1975), pp. 296-317, 1978, Bell Telephone Laboratories, Inc. |
Sadek, Mirette, et al., “Active Antenna Selection in Multiuser MIMO Communications,” IEEE Transactions on Signal Processing, vol. 55, No. 4, Apr. 2007, pp. 1498-1510. |
Saltzberg, Burton R., “Performance of an Efficient Parallel Data Transmission System,” IEEE Transactions on Communication Technology, vol. Com-15, No. 6, Dec. 1967, pp. 805-811. |
Tsunekawa, Kouichi, “Diversity Antennas for Portable Telephones,” 39th IEEE Vehicular Technology Conference, pp. 50-56, vol. I, Gateway to New Concepts in Vehicular Technology, May 1-3, 1989, San Francisco, CA. |
Varnes et al., A Switched Radial Divider for an L-Band Mobile Satellite Antenna, European Microwave Conference (Oct. 1995), pp. 1037-1041. |
W.E. Doherty, Jr. et al., The Pin Diode Circuit Designer's Handbook (1998). |
Weinstein, S. B., et al., “Data Transmission by Frequency-Division Multiplexing Using the Discrete Fourier Transform,” IEEE Transactions on Communication Technology, vol. Com-19, No. 5, Oct. 1971, pp. 628-634. |
Petition Decision Denying Request to Order Additional Claims for U.S. Patent No. 7,193,562 (Control No. 95/001078) mailed on Jul. 10, 2009. |
Right of Appeal Notice for U.S. Patent No. 7,193,562 (Control No. 95/001078) mailed on Jul. 2009. |
European Examination Report for EP Application No. 05776697.4 mailed Jan. 21, 2011. |
European Second Examination Report for EP Application No. 07775498.4 dated Mar. 12, 2013. |
European Third Examination Report for EP Application No. 07775498.4 dated Oct. 17, 2011. |
European First Examination Report for EP Application No. 09014989.9 dated May 7, 2012. |
Supplementary European Search Report for EP Application No. EP05776697.4 dated Jul. 10, 2009. |
Supplementary European Search Report for EP Application No. EP07755519 dated Mar. 11, 2009. |
PCT Application No. PCT/US2005/27023, International Search Report and Written Opinion mailed Dec. 23, 2005. |
PCT Application No. PCT/US2006/49211, International Search Report and Written Opinion mailed Aug. 29, 2008. |
PCT Application No. PCT/US2007/09276, International Search Report and Written Opinion mailed Aug. 11, 2008. |
Chinese Application No. 200680048001.7, Office Action dated Jun. 20, 2012. |
Chinese Application No. 200780020943.9, Office Action dated Feb. 7, 2013. |
Chinese Application No. 200780020943.9, Office Action dated Aug. 29, 2012. |
Chinese Application No. 200780020943.9, Office Action dated Dec. 19, 2011. |
Chinese Application No. 200910258884.X, Office Action dated Aug. 3, 2012. |
Taiwan Application No. 094127953, Office Action dated Mar. 20, 2012. |
Taiwan Application No. 096114265, Office Action dated Jun. 20, 2011. |
U.S. Appl. No. 11/010,076, Office Action mailed Oct. 31, 2006. |
U.S. Appl. No. 11/010,076, Final Office Action mailed Aug. 8, 2006. |
U.S. Appl. No. 11/010,076, Office Action mailed Dec. 23, 2006. |
U.S. Appl. No. 11/022,080, Office Action mailed Jul. 21, 2006. |
U.S. Appl. No. 11/041,145, Final Office Action mailed Jan. 29, 2007. |
U.S. Appl. No. 11/041,145, Office Action mailed Jul. 21, 2006. |
U.S. Appl. No. 11/265,751, Office Action mailed Mar. 18, 2008. |
U.S. Appl. No. 11/714,707, Final Office Action mailed May 30, 2008. |
U.S. Appl. No. 11/714,707, Office Action mailed Oct. 15, 2007. |
U.S. Appl. No. 11/924,082, Office Action mailed Aug. 29, 2008. |
U.S. Appl. No. 12/082,090, Office Action mailed Jan. 18, 2011. |
U.S. Appl. No. 12/404,124, Final Office Action mailed Feb. 7, 2012. |
U.S. Appl. No. 12/404,124, Office Action mailed Sep. 19, 2011. |
U.S. Appl. No. 12/953,324, Office Action mailed Mar. 24, 2011. |
U.S. Appl. No. 13/280,278, Office Action mailed Mar. 25, 2013. |
U.S. Appl. No. 13/280,278, Final Office Action mailed Aug. 22, 2012. |
U.S. Appl. No. 13/280,278, Office Action mailed Feb. 21, 2012. |
U.S. Appl. No. 13/305,609, Final Office Action mailed Jul. 3, 2012. |
U.S. Appl. No. 13/305,609, Office Action mailed Dec. 20, 2011. |
U.S. Appl. No. 13/370,201, Office Action mailed May 13, 2013. |
U.S. Appl. No. 13/485,012, Final Office Action mailed Mar. 3, 2013. |
U.S. Appl. No. 13/485,012, Office Action mailed Oct. 25, 2012. |
Encrypted Preshared key; cisco corp. 14 pages, 2010. |
Request for Inter Partes Rexamination for U.S. Patent No. 7,358,912, filed by Rayspan Corporation and Netgear, Inc. on Sep. 4, 2008. |
Third Party Comments after Patent Owner's Response in Accordance with 37 CFR 1.947 for U.S. Patent No. 7,358,912 (Control No. 95/001079) mailed on Jul. 17, 2009. |
U.S. Appl. No. 95/001,078, Sep. 4, 2008, Shtrom et al. (Re-Exam). |
U.S. Appl. No. 95/001,079, Sep. 4, 2008, Shtrom et al. (Re-Exam). |
PCT Application No. PCT/US2005/027169, International Search Report and Written Opinion mailed Aug. 10, 2006. |
PCT Application No. PCT/US2013/34997, International Search Report mailed Jun. 17, 2013. |
Chinese Application No. 20058001532.6, Office Action dated Jun. 23, 2011. |
Chinese Application No. 200910258884.X, Office Action dated Apr. 15, 2013. |
Taiwan Application No. 094127953, Office Action dated Aug. 16, 2011. |
U.S. Appl. No. 12/404,127, Final Office Action mailed Feb. 7, 2012. |
U.S. Appl. No. 12/404,127, Office Action mailed Sep. 19, 2011. |
U.S. Appl. No. 11/877,465, Final Office Action mailed May 16, 2013. |
U.S. Appl. No. 11/877,465, Office Action mailed Oct. 3, 2012. |
U.S. Appl. No. 11/877,465, Final Office Action mailed Jun. 20, 2012. |
U.S. Appl. No. 11/877,465, Office Action mailed Sep. 19, 2011. |
U.S. Appl. No. 11/877,465, Final Office Action mailed Dec. 9, 2010. |
U.S. Appl. No. 11/877,465, Office Action mailed Apr. 12, 2010. |
U.S. Appl. No. 12/980,253, Final Office Action mailed Jun. 6, 2013. |
U.S. Appl. No. 12/980,253, Office Action mailed Aug. 17, 2012. |
U.S. Appl. No. 12/980,253, Office Action mailed Sep. 13, 2011. |
U.S. Appl. No. 12/980,253, Office Action mailed Mar. 1, 2011. |
U.S. Appl. No. 12/425,374, Office Action mailed Jul. 6, 2010. |
U.S. Appl. No. 11/413,461, Office Action mailed Jun. 7, 2007. |
U.S. Appl. No. 13/653,405, Office Action mailed Dec. 19, 2012. |
U.S. Appl. No. 13/731,273, Office Action mailed May 23, 2013. |
U.S. Appl. No. 13/396,482, Office Action mailed Oct. 18, 2013. |
U.S. Appl. No. 13/396,484, Office Action mailed Oct. 11, 2013. |
Bargh et al., “Fast Authentication Methods for Handovers between IEEE 802.11 Wireless LANs”, Proceedings of the ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots. Oct. 1, 2004. |
Kassab et al., “Fast Pre-Authentication Based on Proactive Key Distribution for 802.11 Infrastructure Networks”, WMuNeP'05, Oct. 13, 2005, Montreal, Quebec, Canada, Copyright 2005 ACM. |
European Second Examination Report for EP Application No. 09014989.9 dated Dec. 13, 2013. |
Taiwan Application No. 094141018, Office Action dated May 8, 2013. |
U.S. Appl. No. 13/653,405, Office Action mailed Dec. 19, 2013. |
U.S. Appl. No. 12/980,253, Office Action mailed Mar. 27, 2014. |
U.S. Appl. No. 13/396,482, Final Office Action mailed Mar. 28, 2014. |
U.S. Appl. No. 13/396,484, Final Office Action mailed Apr. 11, 2014. |
U.S. Appl. No. 11/877,465, Office Action mailed Jul. 29, 2014. |
U.S. Appl. No. 13/396,482, Office Action mailed Sep. 16, 2014. |
U.S. Appl. No. 12/980,253, Final Office Action mailed Jan. 23, 2015. |
U.S. Appl. No. 13/396,482, Final Office Action mailed Jan. 22, 2015. |
U.S. Appl. No. 13/396,484, Office Action mailed Jan. 21 2015. |
Aboba, Bernard “Virtual Access Points,” IEEEP802.11 Wireless LANs, XX, XX, No. 802.11-03/154r1, May 22, 2003. |
Areg Alimian et al., “Analysis of Roaming Techniques,” doc.:IEEE 802.11-04/0377r1, Submission, Mar. 2004. |
Chang, Nicholas B. et al., “Optimal Channel Probing and Transmission Scheduling for Opportunistics Spectrum Access,” Sep. 2007. |
Cisco Systems, “Cisco Aironet Access Point Software Configuration Guide: Configuring Filters and Quality of Service,” Aug. 2003. |
Dell Inc., “How Much Broadcast and Multicast Traffic Should I Allow in My Network,” PowerConnect Application Note #5, Nov. 2003. |
Dunkels, Adam et al., “Connecting Wireless Sensornets with TCP/IP Networks,” Proc. of the 2d Int'l Conf. on Wired Networks, Frankfurt, Feb. 2004. |
Dunkels, Adam et al., “Making TCP/IP Viable for Wireless Sensor Networks,” Proc. of the 1st Euro. Workshop on Wireless Sensor Networks, Berlin, Jan. 2004. |
Dutta, Ashutosh et al., “MarconiNet Supporting Streaming Media Over Localized Wireless Multicast,” Proc. of the 2d Int'l Workshop on Mobile Commerce, 2002. |
Festag, Andreas, “What is MOMBASA?” Telecommunication Networks Group (TKN), Technical University of Berlin, Mar. 7, 2002. |
Golmie, Nada, “Coexistence in Wireless Networks: Challenges and System-Level Solutions in the Unlicensed Bands,” Cambridge University Press, 2006. |
Hewlett Packard, “HP ProCurve Networking: Enterprise Wireless LAN Networking and Mobility Solutions,” 2003. |
Hirayama, Koji et al., “Next-Generation Mobile-Access IP Network,” Hitachi Review vol. 49, No. 4, 2000. |
Ian F. Akyildiz, et al., “A Virtual Topology Based Routing Protocol for Multihop Dynamic Wireless Networks,” Broadband and Wireless Networking Lab, School of Electrical and Computer Engineering, Georgia Institute of Technology. |
IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability Via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation; IEEE Std 802.11 F-2003 ED, IEEE Standard, IEEE, Piscataway, NJ, USA, Jan. 1, 2003, pp. 1-67. |
Information Society Technologies Ultrawaves, “System Concept/Architecture Design and Communication Stack Requirement Document,” Feb. 23, 2004. |
Keidl et al., TES2003, LNCS v. 2819, pp. 104-118, Sep. 2003. |
Ken Tang, et al., “MAC Layer Broadcast Support in 802.11 Wireless Networks,” Computer Science Department, University of California, Los Angeles, 2000 IEEE, pp. 544-548. |
Ken Tang, et al., “MAC Reliable Broadcast in Ad Hoc Networks,” Computer Science Department, University of California, Los Angeles, 2001 IEEE, pp. 1008-1013. |
Mawa, Rakesh, “Power Control in 3G Systems,” Hughes Systique Corporation, Jun. 28, 2006. |
Microsoft Corporation, “IEEE 802.11 Networks and Windows XP,” Windows Hardware Developer Central, Dec. 4, 2001. |
Pat Calhoun et al., “802.11 r strengthens wireless voice,” Technology Update, Network World, Aug. 22, 2005, http://www.networkworld.com/news/tech/2005/082208techupdate.html. |
Steger, Christopher et al., “Performance of IEEE 802.11b Wireless LAN in an Emulated Mobile Channel,” 2003. |
Toskala, Antti, “Enhancement of Broadcast and Introduction of Multicast Capabilities in RAN,” Nokia Networks, Palm Springs, California, Mar. 13-16, 2001. |
Tsunekawa, Kouichi, “Diversity Antennas for Portable Telephones”, 39th IEEE Vehicular Technology Conference, pp. 50-56, vol. 1, Gateway to New Concepts in Vehicular Technology, May 1-3, 1989, San Francisco, CA. |
Vincent D. Park, et al., “A Performance Comparison of the Temporally-Ordered Routing Algorithm and Ideal Link-State Routing,” IEEE, Jul. 1998, pp. 592-598. |
Wennstrom, Mattias et al., “Transmit Antenna Diversity in Ricean Fading MIMO Channels with Co-Channel Interference,” 2001. |
Yang, Song Li, Virtual AP for 802.11 Seamless Handoff draft-song-80211-seamless-handoff-00.txt. |
Extended European Search Report for EP application No. 07755678.5 mailed Dec. 29, 2011. |
Extended European Search Report for EP application No. 06838713.3 mailed Jul. 13, 2011. |
Extended European Search Report for EP application No. 14163071.5 mailed Jul. 4, 2014. |
Supplementary European Search Report for EP application No. 07755678.5 mailed Jan. 17, 2012. |
PCT Application No. PCT/US2006/045893, International Search Report and Written Opinion Sep. 25, 2007. |
PCT Application No. PCT/US2007/09836, International Search Report and Written Opinion Sep. 12, 2008. |
PCT Application No. PCT/US2007/09503, International Search Report and Written Opinion Mar. 3, 2008. |
PCT Application No. PCT/US2012/036028, International Search Report and Written Opinion Aug. 7, 2012. |
Chinese Office Action for CN Application No. 200680045272.7 mailed Oct. 27, 2011. |
Chinese Office Action for CN Application No. 200680045272.7 mailed Jul. 12, 2011. |
Chinese Office Action for CN Application No. 200680045272.7 mailed Feb. 1, 2011. |
Chinese Office Action for CN Application No. 200680045272.7 mailed Jul. 15, 2010. |
Chinese Office Action for CN Application No. 200780019074.8 mailed Jun. 15, 2011. |
Chinese Office Action for CN Application No. 200780019389.2 mailed Sep. 12, 2012. |
Chinese Office Action for CN Application No. 200780019389.2 mailed Feb. 14, 2012. |
Chinese Office Action for CN Application No. 200780019389.2 mailed Apr. 8, 2011. |
European First Examination Report for EP Application No. 068387133 mailed Apr. 3, 2012. |
European Second Examination Report for EP Application No. 07755678.5 dated Feb. 3, 2014. |
European First Examination Report for EP Application No. 07755678.5 dated Oct. 23, 2012. |
European First Examination Report for EP Application No. 07755913.6 dated Jul. 4, 2013. |
U.S. Appl. No. 11/607,619, Office Action mailed Oct. 13, 2010. |
U.S. Appl. No. 11/607,619, Final Office Action mailed Dec. 4, 2009. |
U.S. Appl. No. 11/607,619, Office Action mailed Apr. 29, 2009. |
U.S. Appl. No. 13/191,383, Office Action mailed Jul. 22, 2013. |
U.S. Appl. No. 11/788,371, Final Office Action mailed Jan. 21, 2010. |
U.S. Appl. No. 11/788,371, Office Action mailed Sep. 17, 2009. |
U.S. Appl. No. 11/789,446, Final Office Action mailed Oct. 13, 2010. |
U.S. Appl. No. 11/789,446, Office Action mailed May 24, 2010. |
U.S. Appl. No. 11/789,446, Final Office Action mailed Jun. 24, 2009. |
U.S. Appl. No. 11/789,446, Office Action mailed Sep. 3, 2008. |
U.S. Appl. No. 12/339,688, Office Action mailed Sep. 15, 2009. |
U.S. Appl. No. 12/845,089, Final Office Action mailed Feb. 14, 2012. |
U.S. Appl. No. 12/845,089, Office Action mailed Sep. 6, 2011. |
U.S. Appl. No. 13/590,997, Office Action mailed Jul. 18, 2013. |
U.S. Appl. No. 14/078,947, Final Office Action mailed Feb. 23, 2015. |
U.S. Appl. No. 14/078,947, Office Action mailed Sep. 24, 2014. |
U.S. Appl. No. 14/294,012, Office Action mailed Mar. 23, 2015. |
U.S. Appl. No. 13/461,679, Office Action mailed Mar. 28, 2014. |
U.S. Appl. No. 13/461,679, Final Office Action mailed Oct. 25, 2013. |
U.S. Appl. No. 13/461,679, Office Action mailed Apr. 1, 2013. |
Extended European Search Report for EP application No. 12779857.7 dated Mar. 30, 2015. |
Number | Date | Country | |
---|---|---|---|
20130269008 A1 | Oct 2013 | US |