1. Field of the Invention
This invention relates generally to wireless networks, and, more particularly, to a method and apparatus for configuring a mobile device.
2. Description of the Related Art
A Wireless Local Area Network (WLAN) is a flexible data communications system that can either replace or extend a wired LAN to provide added functionality. A traditional, wired local area network (LAN) sends packets of data from one piece of equipment to another across cables or wires. A wireless local area network (WLAN) relies instead upon radio waves to transfer data. Data is superimposed onto a radio wave through a process called modulation, and this carrier wave then acts as the transmission medium, taking the place of a wire.
The importance of WLAN technology, however, goes beyond just the absence of wires. The advent of the WLAN opens up a whole new definition of what a network infrastructure can be. No longer does an infrastructure need to be solid and fixed, difficult to move, and expensive to change. Instead, it can move with the user and change as fast as the organization does. For example, business people can stay connected as they move throughout the corporate campus, easily tapping into the resources of the wired network.
Wireless Local Area Network technology has been targeted by analysts as one of the fastest growing sectors in the computing industry. WLANs are used in various vertical and horizontal applications (e.g., retail, manufacturing, logistics, healthcare, education, public space, etc.). A variety of wireless network standards have become popular, including the 802.11 family of standards that have ratified by the Institute of Electrical and Electronics Engineering (IEEE). Exemplary IEEE 802.11 standards include 802.11, 802.11a, 802.11b (also known as Wi-Fi), and 802.11g.
Recently, there has been a surge in the deployment of 802.11-based wireless infrastructure networks especially in public “hot spots” covering airports, hotels, coffee shops, etc. to provide wireless internet access services. In the future, further proliferation of demanding multimedia applications, e.g., music and video streaming, and new location-based services are expected.
Portable digital devices have been developed that facilitate both data and voice communication over a wireless network. Such voice communication is commonly referred to as voice over internet protocol (VOIP) communication. Voice data is compressed into packets and delivered to the destination in a manner that is similar to the handling of data packets.
To operate a mobile device on a wireless network, a number of network related configuration items must be entered into the device. This configuration information may include an extended service set (ESS) identifier, user name, password, an internet protocol (IP) address, or the like. In addition, various application specific configuration information items may also be required. For example, for a VOIP device, additional configuration information may include the call control and authentication protocol to be used.
Some mobile devices may have one or more peripherals by which configuration information may be entered. For example, a keypad or a touch screen and a display may be provided. There may also be a barcode scanner, serial port, and/or plug-in card for entering the configuration data.
As the size and cost of a wireless interface has been reduced, new classes of devices have been proposed that are specialized for a particular function. These devices include audio headsets, call buttons, bar code scanners, etc. These devices typically have limited peripherals making the entry of configuration information if not impossible, at least cumbersome. For example, there only be 1 to 3 keys and/or no visual display. Thee may be no serial port or plug-in interface. Configuration of such devices is still necessary, but is made difficult owing to the lack of peripherals.
The present invention is directed to overcoming, or at least reducing the effects of, one or more of the problems set forth above.
One aspect of the present invention is seen in a method for configuring a mobile device includes receiving at least one of an audio and a video signal encoded with configuration data from an interface unit proximate the mobile device and configuring the mobile device based on the configuration data.
In another embodiment, the method includes initiating a client-to-client connection between the mobile device and an interface unit coupled to the communication network, receiving configuration data from the interface unit over the client-to-client connection, and configuring the mobile device based on the configuration data.
Another aspect of the present invention is seen in a mobile device including at least one of an audio sensor and a video sensor and a processing unit coupled to at least one of the audio sensor and the video sensor. The processing unit is adapted to receive a signal encoded with configuration data through at least one of the audio sensor and the video sensor from an interface unit proximate the mobile device and configure the mobile device based on the configuration data.
Still another aspect of the present invention is seen in a communication system including a communication network, an interface unit coupled to the communication network, and a mobile device. The mobile device includes a processing unit adapted to initiate a client-to-client connection between the mobile device and the interface unit, receive configuration data from the interface unit over the client-to-client connection, and configure the mobile device based on the configuration data.
The invention may be understood by reference to the following description taken in conjunction with the accompanying drawings, in which like reference numerals identify like elements, and in which:
While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the invention to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims.
Illustrative embodiments of the invention are described below. In the interest of clarity, not all features of an actual implementation are described in this specification. It will of course be appreciated that in the development of any such actual embodiment, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which will vary from one implementation to another. Moreover, it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine undertaking for those of ordinary skill in the art having the benefit of this disclosure.
Referring now to the Figures, and first to
Those of ordinary skill in the art are familiar with the construct of a wireless network, the commands and protocols for accessing such a network, and the types of configuration data required to enable communication between the mobile device 110 and the network. Accordingly, for clarity and to avoid obscuring the instant invention, further details are not provided as to this aspect of implementing the illustrated embodiment.
In the embodiment illustrated in
Turning now to
Returning briefly to
Turning now to
In such embodiments, the sensor 270 is employed to receive the visual signal. The sensor 270 may comprise a photocell set behind a lens (not shown) or hole (not shown) in the housing 210. A user of headset 200 may place the headset 200 in close proximity to the display 400 so that the sensor 270 may detect the pattern displayed. The headset 200, after receiving the configuration data 140 may configure the protocols and addresses used by the processor 300. The processor 300 may then establish the connection 115 (shown in
The configuration sequence may be repeated for a predetermined number of times, and the user may be notified if the configuration was not properly completed within an acceptable time interval. For example, an error in the configuration data may prevent the establishment of the connection 115.
As with the embodiment of
A third technique for communicating the configuration data 140 to the mobile device 110 is described in reference to
Wireless network protocols sometimes define a client-to-client connection mode, where the intermediary function is bypassed and the clients communicate with one another directly. In accordance with the 802.11 standard, the client-to-client mode is referred to as an independent basic service set (IBSS) mode. In this particular embodiment, the connection 135 is a client-to-client connection between the mobile device 110 and the interface unit 130. The mobile device 110 broadcasts a public key with an accompanying configuration request. The interface unit 130 receives the request and public key and uses the public key to encrypt the configuration data 140. The mobile device 110 receives the encrypted configuration data 140 and decrypts it using its associated private key. The mobile device 110 can then employ the configuration data and establish the connection 115 with the network. Again, the mobile device 110 may send a confirmation or time out message to the user (e.g., through the network connection 115, through the client-to-client connection 135, or through an audible beep).
In the client-to-client embodiment, there is a possibility that some other entity (not shown) other than the interface unit 130 may send a false public key using an address associated with the mobile device 110. In such a case, the interface unit 130 may be deceived into sending confidential count information (e.g., username and/or password) to the intruding entity. To address this possibility, the user may be required to place the mobile device 110 in close proximity to the interface unit 130 (e.g., a few inches). The interface unit 130 measures the receive signal strength indication (RSSI) parameter for the access request and compares it to a predetermined threshold. If the mobile device 110 is only a few inches from the interface unit 130, the RSSI should be at its maximum value. As a result of the physics of radio propagation, such a strong signal can typically only be generated by a device in very close proximity. Devices just a few feet away or using a highly directional antenna cannot generate such a high RSSI value. Hence, the interface unit 130 may identify a possible intruder based on a lower RSSI value. The mobile device 110 may also employ a similar RSSI technique to authenticate communication from the interface unit 130 including the configuration data.
The particular embodiments disclosed above are illustrative only, as the invention may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings herein. Furthermore, no limitations are intended to the details of construction or design herein shown, other than as described in the claims below. It is therefore evident that the particular embodiments disclosed above may be altered or modified and all such variations are considered within the scope and spirit of the invention. Accordingly, the protection sought herein is as set forth in the claims below.