The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views and which together with the detailed description below are incorporated in and form part of the specification, serve to further illustrate various embodiments and to explain various principles and advantages all in accordance with the present invention.
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help improve understanding of various embodiments of the present invention. Also, common and well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments of the present invention.
In a typical urban/suburban environment in the United States, it is already possible to see coverage of at least three different types of access networks such as Mobile Communications (“GSM”), Code division multiple access (“CDMA”), and Wireless Local Area Network (“WLAN”) hotspots. These hotspots may be privately owned. For each of these types of access networks, a device such as a mobile station is likely to find multiple service providers. The utilization of each of these access networks varies. For example, while the GSM network is overloaded, the WLAN hotspots might have plenty of bandwidth available. Also, due to deployment constraints and inadequate capacity, a GSM operator's network might be overloaded while a CDMA operator might have available capacity in the same location. In such situations, the access network that is currently providing service to a device might find it beneficial to move the user/device to another access network. This would satisfy the needs of both service providers. That is, the second access network could purchase the user's traffic/session from the first access network to alleviate the first access network's congestion or to reduce the first access network's costs.
Conceptually, this is similar to roaming between networks. Roaming, however, requires pre-arranged agreements. The focus of the teachings described below is to enable a negotiation of the right to service a particular mobile station in real-time, in an ad-hoc manner between multiple different access networks. These teachings are also related to the selling of wire-line bandwidth by wire-line telephony companies in the form of phone cards. These teachings are directed to bidding by the user (or software on the user device) instead of auctioning of bandwidth. Meanwhile, the user is under the control of the current access network that holds, for example, the authentication parameters.
These teachings provide transactional elements to enable a business model in which access networks with available capacity may “buy users” from incumbent access networks. This would enable smaller networks (even with private WLAN access point owners) to derive income from their excess bandwidth. The resource being sold is the user (with some constraints) and the buyers are competing networks. This system therefore provides a viable business model.
A token is utilized for transactions between the access networks. A token includes a plurality of information about the device, including the identity of the device, information about the primary service provider, information about the current access network, quality of service requirements, and authentication information for the user that are temporarily valid.
The token may be stored in the network and in the device. Alternatively, the token may be stored only in the network. The token may be available at all times or it may be generated just when the current network decides to sell the user.
A token stored at the mobile station differs slightly from the token stored in the access network. That is, the token stored in the mobile station has an authentication key that is complementary to the authentication key in the access network's token. A second access network would need to take both tokens to authenticate the user and provide corresponding service.
The selling of a user refers to a real-time financial agreement between a first access network and a second access network where the user's traffic is carried via the second access network for a negotiated duration. The second access network receives money or some other benefit in return. The access networks may alternatively negotiate for a certain number of calls or sessions instead of time duration. According to various embodiments described below, the various access networks may all access a shared server or core network or have access to each other's servers or core networks. That is, after the second network acquires the user, the second service provider provides a way for the first service provider to route calls to the user through the second network without using the first service provider's resources. The Internet provides simple ways to set up and connect multiple networks.
For example, the first access network 110 may utilize GSM, the second access network 115 may utilize WiMAX, the third access network 120 may be a WLAN, and the fourth access network 125 may utilize CDMA. The mobile station 305 may operate on multiple technologies, such as WiMAX, WLAN, CDMA, Global System for Mobile Communications (“GSM”), and software-definable radios, to name a few. These technologies are exemplary and it should be appreciated that additional technology may also be utilized. The first access network 110, the second access network 115, the third access network 120, and the fourth access network 125 may provide wireless service to overlapping coverage areas. In other words, more than one, or possibly all, of these access networks may provide wireless service to the mobile station 105 located in a particular location of their respective wireless coverage areas.
In
When the mobile station 105 detects wireless coverage provided by the second access network 115, the third access network 120, and the fourth access network 125, the mobile station 105 transmits the second token 140 to these access networks. The second token 140 may include the quality of service requirements for servicing the mobile station 105. In the event that any of the second access network 115, the third access network 120, and the fourth access network 125 have available bandwidth and/or a desire to purchase the mobile station's 105 wireless session, these access networks may each send a “bid” to the first access network 110. For example, the bid may include a request for money or credits in exchange for servicing the mobile station 105. Alternatively, the bid may include some other type of remuneration other than money or credits.
The first access network 110 evaluates the bids and then determines a “winner,” i.e., the access network to which the right to service of the mobile station 105 will be provided. The winner may be determined based on which of the bidding access networks offers to service the mobile station 105 in exchange for the least amount of money or the least expensive of some other item alone or in combination with money. Another factor to consider is the quality of service. That is, in an embodiment, a bidding access network should be able to meet the same quality of service requirements as required by the mobile station 105. The quality of service requirements may be listed in the second token 140 that is stored within the mobile station 105 and provided to the second access network 115, the third access network 120, and the fourth access network 125.
The first token 135 is transmitted from the first access network 110 to the access network corresponding to the winning bid. In the event that the second access network 115 provides the winning bid, then it would receive the first token 135. The second access network 115 then has to establish a connection with the server, service provider, or core network 130. The server, service provider, or core network 130 may be specific to the service provider. Alternatively, the server, service provider, or core network 130 may be a common server, service provider, or core network. The purpose of establishing the connection between the second access network 115 and the server, service provider, or core network 130 is so that calls may be routed and received. The second access network 115 than authenticates the mobile station 105 and the mobile station 105 begins to use the second access network 115. During the authentication process, the first token 135 and the second token 140 are utilized. Finally, the server, service provider, or core network 130, or some entity in communication with the server, service provider, or core network 130, informs the first access network 110 that the mobile station 105 has moved over to the second access network 115.
This process may be of particular value to a proprietor having a WLAN network with available bandwidth. For example, a coffee shop may have a WLAN. When a user walks into the coffee shop with the mobile station 105, the mobile station 105 may begin the negotiation process with the WLAN and any other access networks detected. By providing wireless service via the WLAN, the owner of the coffee shop may earn money from excess bandwidth not currently being used. The first access network 110 also benefits. For example, if the first access network 110 is experiencing congestion, it may cost less to pay the WLAN to provide the wireless service to the mobile station 105. Moreover, even if it is not congested, there is always a cost involved with providing wireless service to the mobile station 105, and it may be cheaper for the WLAN to provide the wireless service to the mobile station 105 instead of the first access network 110.
These access networks bid for the right to service the mobile station 105 at operation 210. After the bids are received, the first access network 110 determines which is the best bid and accepts one of the bids and sends the first token 135 to the winning bidder at operation 215. For example, if the second access network 115 provides the winning bid, the first token 135 would be transmitted to the second access network 115. Next, at operation 220, the second access network 115 establishes a connection with the server, service provider, or core network 130. At operation 225, the second access network 115 authenticates the mobile station 105. The first token 135 and the second token 140 are utilized during this authentication process. Finally, at operation 230, the mobile station's 105 service provider informs the first access network 110 that the mobile station 105 has moved to the second access network 115.
The protocol of
Each of the access networks may provide wireless service under a different technology. Alternatively, each of the access networks may provide wireless service via the same technology. For example, the first access network 310 may utilize GSM, the second access network 315 may utilize WiMAX, the third access network 120 may be a WLAN, and the fourth access network 325 may utilize CDMA. These technologies are exemplary and it should be appreciated that additional technologies may also be utilized. The first access network 310, the second access network 315, the third access network 320, and the fourth access network 325 may provide wireless service to overlapping coverage areas. In other words, more than one, or possibly all, of the access networks may provide wireless service to a mobile station located in a particular location of their respective wireless coverage areas.
In
The access network with available bandwidth then determines the identity of the first access network 310 that is currently serving the mobile station 305 and sends bids to it. The final transition from the first access network 310 to another access network is fully controlled by the first access network 310.
The first access network 310 may store a first token 335 and a partial token 345. The mobile station 305 may store a second token 340. The first token 335, second token 340, and partial token 345 may each be pieces of software containing information required for authenticating the mobile station 105 and providing wireless service. The first token 335 may include a first authentication key, and the second token 340 may include a second authentication key. Both the first token 335 and the second token 340 are needed to authenticate the mobile station 305. The partial token 345 is similar to the first token 335 except that it lacks the authentication information of the first token 335.
At operation 410, the first access network 310 sends a response to the second access network 315 with the partial token 445. The partial token 445 is similar to the first token 335 that is stored with the first access network 310. However, the partial token 445 lacks the authentication information contained within the first token 335. Next, at operation 415, the second access network 315 sends a “bid” for the mobile station's 305 traffic to the first access network 310. The first access network 310 may then either accept or deny the bid. If the bid is accepted, the complete first token 335 is sent to the second access network 315 at operation 420. The second access network 315 then establishes a connection to the server, service provider, or core network 330 for the mobile station's 305 normal server, service provider, or core network 330, or to a common server, service provider, or core network, so that calls may be routed and received. At operation 430, the service provider directs the first access network 310 to transfer the mobile station 305 to the second access network 315. Finally, at operation 435, the first access network 310 sends a handoff or redirection message to move the mobile station 305 to the second access network 315.
The various teachings described above enable a negotiation of the right to service a particular mobile station in real-time, in an ad-hoc manner between multiple different access networks. These teachings are directed to bidding by the user (or software on the user device) instead of auctioning of bandwidth. Meanwhile, the user is under the control of the current access network that holds, for example, the authentication parameters.
These teachings provide transactional elements to enable a business model in which access networks with available capacity may “buy users” from incumbent access networks. This would enable smaller networks (even with private WLAN access point owners) to derive income from their excess bandwidth. The resource being sold is the user (with some constraints) and the buyers are competing networks.
The selling of a user refers to a real-time financial agreement between a first access network and a second access network where the user's traffic is carried via the second access network for a negotiated duration. The second access network receives money or some other benefit in return. The access networks may alternatively negotiate for a certain number of calls or sessions instead of time duration.
As discussed above, this process may be of particular value to a proprietor having, for example, a WLAN network with available bandwidth. By providing wireless service via the WLAN to other nearby networks, the owner of the WLAN may earn money from excess bandwidth not currently being used, and the initial servicing network may alleviate congestion and/or reduce its costs.
A token is utilized for transactions between the access networks. The token includes a plurality of information about the device, including the identity of the device, information about the primary service provider, information about the current access network, quality of service requirements, and authentication information for the user that are temporary valid. The token may be stored in the network and in the device. Alternatively, the token may be stored only in the network. The token may be available at all times or it may be generated just when the current network decides to sell the user. Tokens are utilized to authenticate the user and provide corresponding service.
Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the above described embodiments without departing from the spirit and scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept.