This description relates to provisioning private access points for wireless networking.
Cellular wireless communications systems are designed to serve many access terminals distributed in a large geographic area by dividing the area into cells, as shown in
The 1xEV-DO protocol has been standardized by the Telecommunication Industry Association (TIA) as TIA/EIA/IS-856, “CDMA2000 High Rate Packet Data Air Interface Specification,” 3GPP2 C.S0024-0, Version 4.0, Oct. 25, 2002, which is incorporated herein by reference. Revision A to this specification has been published as TIA/EIA/IS-856A, “CDMA2000 High Rate Packet Data Air Interface Specification,” 3GPP2 C.S0024-A, Version 2.0, July 2005. Revision A is also incorporated herein by reference. Revision B to this specification has been published as TIA/EIA/IS-856-B, 3GPP2 C.S0024-B, version 1.0, May 2006, and is also incorporated herein by reference. Other wireless communication protocols may also be used.
In general, in one aspect, instructions are received from a user for management of a network device, the instructions are adjusted for compatibility with requirements of a network provider other than the user, and the adjusted instructions are implemented on the network device.
Implementations may include one or more of the following features.
The network device is at least partially under the control of the user. The instructions are received from a portable electronic device. The portable electronic device is a mobile telephone. The portable electronic device is an access terminal connected to a radio access network. The portable electronic device is connected to the radio access network through the network device. Receiving the instructions includes receiving a text message from the user. The text message includes an SMS message. The text message system includes an instant message. Receiving the instructions also includes identifying device management instructions within the text message. Receiving the instructions also includes authenticating the user by processing caller ID information associated with the text message. Receiving the instructions includes authenticating the user as a user authorized to provide instructions. Receiving the instructions includes receiving a text message from the user and authenticating the user that sent the text message as a user authorized to provide instructions. Authenticating the user includes identifying caller ID information associated with the text message, transmitting the caller ID information to an authorization and accounting server, associating a user account with the caller ID information, and confirming that the user account is associated with the network device.
Receiving the instructions includes receiving a text message from the user, and identifying one or more of several network devices associated with the user. Identifying the one or more network devices includes locating within the text message an identification of a network device. identifying the one or more network devices includes locating within the text message an instruction to configure all networking devices associated with the user. Identifying the one or more network devices includes identifying a set of network devices associated with the user and having a particular geographic location.
Adjusting the device management instructions includes identifying within the instructions a list of access terminals, associating each access terminal on the list with a device identification, and generating an instruction that encodes the device identifications. Associating the access terminals with device identifications includes transmitting the list of access terminals to an authorization and accounting server and receiving from the authorization and accounting server a list of access terminal device identifications. The list of access terminals includes a telephone number. Adjusting the device management instructions includes converting the device management instructions into a format usable to set device configuration parameters. Adjusting the device management instructions includes identifying within the instructions an identification of an access terminal, determining a geographic location of the access terminal, determining whether the access terminal is near the network device, and if the access terminal is near the network device generating an instruction that instructs the network device to provide access to the access terminal. Adjusting the device management instructions includes identifying within the instructions an identification of an access terminal, determining whether a technology used by the access terminal is compatible with the network device, if the technology is not compatible, disregarding the device management instruction, and if the technology is compatible, generating an instruction that instructs the network device to provide access to the access terminal. Adjusting the device management instructions includes identifying within the instructions an identification of an access terminal, determining whether the access terminal is authorized to receive services offered by a network operator, if the access terminal is not authorized, disregarding the device management instruction, and if the technology is compatible, generating an instruction that instructs the network device to provide access to the access terminal.
Confirming that the user account is associated with the network device includes associating the user account with a specific network device, and implementing the adjusted instructions includes transmitting the instructions to the specific network device. Implementing the adjusted instructions includes transmitting an authentication signal to the network device, receiving an acknowledgment from the network device, transmitting control parameters to the network device, and instructing the network device to implement controls according to the parameters. Implementing the adjusted instructions includes transmitting a connection request to the network device, and transmitting a list of access terminals to the network device. Implementing the adjusted instructions also includes determining that an acknowledgment was not received from the network device, causing the network device to be reset, and upon determining that the device has been reset, transmitting configuration instructions to the network device. Causing the network device to be reset includes transmitting a failure indication to a text messaging server and causing the text messaging server to transmit an instruction to the user to reset the network device. Determining that the device has been reset includes receiving a transmission from the network device. The configuration instructions include the list of access terminals. The network device is an access point of a radio access network. The radio access network uses an EvDO protocol. The radio access network uses an UMTS protocol.
In general, in some aspects, a text message is received including an identification of an access terminal, the access terminal is associated with a device identification, an instruction is generated that encodes the device identifications, and the instruction is transmitted to cause the network device to provide access to the access terminal.
In general, in some aspects, an access terminal is configured to receive input from a user indicating an instruction for management of an access point of the radio access network, convert the instruction into a text message, and transmit the text message to a network configuration server.
These and other aspects and features and various combinations of them may be expressed as methods, apparatus, systems, means for performing functions, program products, and in other ways.
The described techniques have several advantages. Security is enhanced by reducing the number of network ports that must remain open to allow configuration of the system. Because the network operator retains control, it can ensure that only a provisioning configuration that is fully compatible with its network services is committed to the home networking device. Web-based and text-message-based interfaces are familiar to users and require little training for them to operate.
Other features and advantages will be apparent from the description a the claims.
Referring to
In some examples, as shown in
When an authorized access terminal 206 is present inside the home (or anywhere within range of the private access point 202), it uses the private access point 202 rather than a regular cellular radio network access point such as access point 108 to place or receive voice calls and data connections, even if it is otherwise within the cell 102 for that access point 108. We sometimes refer to the standard access point 108 as a macro access point or macro BTS to distinguish it from a private access point, as it provides direct access to the wider RAN. A neighboring home 210 may have its own private access point 212 connected to its cable modem 214 for use by its owner's access terminal 216. A private access point deployment is different than traditional radio network deployment because neighboring private access points are intended to operate independently, in part because real-time communications is difficult between neighboring private access points. The intended private access point deployment is also different than WiFi deployment in that it is intended to operate in licensed spectrum. Some details and examples are discussed in co-pending application Ser. No. 11/640,415, titled Controlling Reverse Link Interference in Private Access Points for Wireless Networking, filed Dec. 15, 2006, and Ser. No. 11/640,503, titled Configuring Preferred User Zone Lists for Private Access Points for Wireless Networking, filed Dec. 15, 2006, which are incorporated here by reference.
Access lists of authorized access terminals for each private access point can be configured on a central server and distributed to the private access points. Information to locate and access the private access points can be distributed to access terminals using an over-the-air parameter administration (OTAPA) system. Access terminals may also retrieve access information from the configuration server themselves. A mobile internet protocol (mobile IP) can be used along with voice call continuity (VCC) for handoffs between private access points. Although this description uses terminology from EV-DO standards, the same concepts are applicable to other communication methods, including GSM, UMTS, HSDPA, WiMax, WiBro, WiFi, and the like. For example, when we refer to a reverse power control (RPC) signal, this should be taken to refer to any signal used by a base station to control power levels of an access terminal.
User-Directed Service Provisioning
Provisioning refers to defining sets of access terminals that should use a particular access point and related configuration activities. Personal access points can benefit from a user-friendly provisioning system that can allow the end-user to direct which other users should be allowed to have access to a particular private access point. This is advantageous because it allows owners to control who accesses their hardware, but at the same time, the network operator is able to maintain some amount of control over how its network is accessed. In existing systems, web-based configuration interfaces are sometimes hosted by the device under configuration, for example, home routers manufactured by the LinkSys® division of Cisco Systems, Inc., of San Jose, Calif., allow end-users to restrict access to their home Ethernet or WiFi routers by providing a web-based user interface hosted on those same routers. An end user can connect his personal computer, equipped with web-browser software, to his home router and configure its access list and other settings through a locally-generated web page. Such home routers are not operator-managed; they are managed by the end-users themselves. Many home-networking access products operate in this fashion. In other systems, configuration is done using custom client applications, for example, the AirPort® wireless access point from Apple Computer, Inc., of Cupertino, Calif., is configured using software that is built and provided by Apple for the specific purpose of managing such access points. Such home networking devices are also managed by the end-users themselves, not the operator of the wide-area network to which they may be attached. Many other home-networking products operate in this fashion as well.
In the description below, a system enables end-users to provision a home networking device such as a personal access point in a user-friendly manner, yet allows the network operator to manage and retain final control over the device. Two primary methods are described: one through an operator-hosted web-based interface, the other using SMS text messaging terminated by the operator's text messaging application server. These methods may be implemented independently or in combination.
Such user-based provisioning has several advantages. Because the end-user does not configure the home networking device directly, one fewer networking port needs to be opened (i.e., a port for accessing the device directly through a web browser) and the home networking device will be more secure, more “hack-proof” for it. Web-browsing and text-messaging are common and familiar interfaces for many end users providing user friendliness and ease of use.
To provide access to a radio access network, a personal base station needs to be provisioned and configured in a way that is compatible with the services provided by the network operator. Using this system, because configuration is done through an operator-managed interface and the device is ultimately left operator-managed, the operator can ensure that only a provisioning configuration that is fully compatible with its network service is used on the personal base station.
After authenticating the sender, the text messaging application server 308 forwards a message 316 including the provisioning configuration command to a provisioning configuration server 314. The provisioning configuration server 314 can perform additional checks 318 and verification with the AAA server if necessary. It alters the provisioning configuration information, as appropriate for the network operator's needs, and transmits the provisioning configuration change 322 to the private access point 300 over a wide-area network 330a, which may, for example, be the Internet or a private network. In some examples, the network operator may also provide broadband services to the user, and a single network connection may provide both the configuration change 322 and Internet access, with or without the change 322 actually being transmitted through the Internet component of the service. This process is further described below with reference to
Note that for user-friendliness considerations, the user can deal with phone numbers rather than with hardware IDs. For example, the number to which the text message 304 is sent appears, to the user, to be a standard telephone number or a short telephone number as is commonly used for text-messaging-based applications. The user does not need to know or store in his phone a different type of identification for the text messaging application server 306. Furthermore, the text messaging application server 306 can infer the sender's identity by the source of the text message 304 (e.g., using caller ID) and infer which home networking device 300 to associate with the sender. In some examples, this association is established when the user first registers or activates his private access point 300 with the network operator. In some examples, a user may have more than one private access point, and the text message or custom application used to create it may include an identification of which one the user wishes to modify. For example, the user may specify an ID of the targeted access point, or may specify “all” if he wants to change the configuration of all the access points he controls. In some examples, the system may automatically determine which access points to configure. If the user provides a phone number of an access terminal that should be granted access, the system may determine that access terminal's current geographic location and provision the access terminal on all the private access points owned by that user that are within 100 miles of the access terminal.
In some examples, the user uses a personal computer 324 running web-browser software to connect to a web server 326 (arc 328) through a wide-area network 330b. The two wide-area networks 330a and 330b may both be the Internet, and may be the same or different routes through the Internet. Web traffic 328 from the computer 324 to the web server 326 may pass through the private access point 300 if the private access point 300 is also serving as an Internet gateway for the computer 324. This web server 326 may be operated by the network operator or a third party. The web server 326 can ask for username & password information to verify 332 the user's identity. Other authentication systems, such as certificates or public key encryption can also be used. Through the web server 326, the user enters provisioning configuration information. The web server 326 then forwards a message 334 including the new provisioning configuration to the provisioning configuration server 314. The provisioning configuration server 314 can perform additional checks and verification 336 with the AAA server 308, if necessary. As in the first scenario, the provisioning configuration server 314 alters the provisioning configuration information, as appropriate for the network operator's needs, and transmits the provisioning configuration change 322 to the private access point 300 over a wide-area network 330a.
In some examples, a centralized provisioning configuration server 314 is used. Unlike in some other systems, this server 314 does not gather provisioning information from the home networking equipment 300, but rather, it gets provisioning information from the network operator or from the end user using the web-based or text-messaging-based methods described above and then downloads the configuration information to the home networking equipment.
Other types of configuration messages may be sent, and other types of modifications may be made to them. In some examples, a user may send a message to indicate that a particular access terminal should have priority over others in accessing the radio access network through his private access point. In some examples, a user may specify a phone number of an access terminal that is not compatible with his private access point for technical or business reasons. It may be an access terminal that uses GSM, while the user's access point is part of a CDMA network, or it may be an access terminal that subscribes to a service other than the one the user subscribes to, even if they use the same technology. In either case, the system will reject the request and not provision the specified access terminal on the user's private access point. This could be communicated to the user in the form of a text message. In some examples, the operator may be willing to provide access to an access terminal from a competing network operator, assuming it is compatible, but will provision it to take a lower priority than those of its own subscribers. Other commands may be less network-focused, such as configuring the private access point to initiate a wake-up call, or simply instructing it to reset itself.
Although the techniques described above employ the 1xEV-DO air interface standard, the techniques are also applicable to other CDMA and non-CDMA air interface technologies in which access points are installed in small-scale deployments or can otherwise be configured by their users.
The techniques described herein can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. The techniques can be implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable storage device, for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers. A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
Method steps of the techniques described herein can be performed by one or more programmable processors executing a computer program to perform functions of the invention by operating on input data and generating output. Method steps can also be performed by, and apparatus of the invention can be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit). Modules can refer to portions of the computer program and/or the processor/special circuitry that implements that functionality.
Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read-only memory or a random access memory or both. The essential elements of a computer are a processor for executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. Information carriers suitable for embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in special purpose logic circuitry.
To provide for interaction with a user, the techniques described herein can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer (e.g., interact with a user interface element, for example, by clicking a button on such a pointing device). Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
The techniques described herein can be implemented in a distributed computing system that includes a back-end component, e.g., as a data server, and/or a middleware component, e.g., an application server, and/or a front-end component, e.g., a client computer having a graphical user interface and/or a Web browser through which a user can interact with an implementation of the invention, or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), e.g., the Internet, and include both wired and wireless networks.
The computing system can include clients and servers. A client and server are generally remote from each other and typically interact over a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
Other embodiments are within the scope of the following claims. The techniques described herein can be performed in a different order and still achieve desirable results.
This application claims priority under 35 USC §119(e) to U.S. Patent Application Ser. No. 60/824,877, filed on Sep. 7, 2006, the entire contents of which are hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
5623495 | Eng et al. | Apr 1997 | A |
5848063 | Weaver et al. | Dec 1998 | A |
6163524 | Magnusson et al. | Dec 2000 | A |
6208873 | Black et al. | Mar 2001 | B1 |
6233231 | Felix et al. | May 2001 | B1 |
6272122 | Wee | Aug 2001 | B1 |
6301484 | Rogers et al. | Oct 2001 | B1 |
6317452 | Durrant et al. | Nov 2001 | B1 |
6400755 | Harris et al. | Jun 2002 | B1 |
6560194 | Gourgue et al. | May 2003 | B1 |
6597671 | Ahmadi et al. | Jul 2003 | B1 |
6597677 | Segawa | Jul 2003 | B1 |
6615038 | Moles et al. | Sep 2003 | B1 |
6711144 | Kim et al. | Mar 2004 | B1 |
6731618 | Chung et al. | May 2004 | B1 |
6741862 | Chung et al. | May 2004 | B2 |
6781999 | Eyuboglu et al. | Aug 2004 | B2 |
6804216 | Kuwahara et al. | Oct 2004 | B1 |
6876690 | Imbeni et al. | Apr 2005 | B1 |
7170871 | Eyuboglu et al. | Jan 2007 | B2 |
7200391 | Chung et al. | Apr 2007 | B2 |
7242958 | Chung et al. | Jul 2007 | B2 |
7277446 | Abi-Nassif et al. | Oct 2007 | B1 |
7299278 | Ch'ng | Nov 2007 | B2 |
8078165 | Mate et al. | Dec 2011 | B2 |
8160629 | Mate et al. | Apr 2012 | B2 |
8229498 | Ch'Ng et al. | Jul 2012 | B2 |
20020051437 | Take | May 2002 | A1 |
20020086658 | Biedermann | Jul 2002 | A1 |
20020101943 | Proctor, Jr. | Aug 2002 | A1 |
20020167907 | Sarkar et al. | Nov 2002 | A1 |
20020196749 | Eyuboglu et al. | Dec 2002 | A1 |
20030026225 | Ogino et al. | Feb 2003 | A1 |
20030065805 | Barnes, Jr. | Apr 2003 | A1 |
20030100311 | Chung et al. | May 2003 | A1 |
20030114180 | Black et al. | Jun 2003 | A1 |
20030125026 | Tsunehara et al. | Jul 2003 | A1 |
20040076120 | Ishidoshiro | Apr 2004 | A1 |
20040081134 | Kotzin | Apr 2004 | A1 |
20040081144 | Martin et al. | Apr 2004 | A1 |
20040177270 | Little et al. | Sep 2004 | A1 |
20040258027 | Tsybakov et al. | Dec 2004 | A1 |
20050026640 | Pan | Feb 2005 | A1 |
20050099974 | Kats et al. | May 2005 | A1 |
20050136949 | Barnes, Jr. | Jun 2005 | A1 |
20050213555 | Eyuboglu et al. | Sep 2005 | A1 |
20050232242 | Karaoguz et al. | Oct 2005 | A1 |
20050243749 | Mehrabanzad et al. | Nov 2005 | A1 |
20050245279 | Mehrabanzad et al. | Nov 2005 | A1 |
20060067422 | Chung | Mar 2006 | A1 |
20060067451 | Pollman et al. | Mar 2006 | A1 |
20060126509 | Abi-Nassif | Jun 2006 | A1 |
20060159045 | Ananthaiyer et al. | Jul 2006 | A1 |
20060179322 | Bennett et al. | Aug 2006 | A1 |
20060203746 | Maggenti et al. | Sep 2006 | A1 |
20060209721 | Mese et al. | Sep 2006 | A1 |
20060240782 | Pollman et al. | Oct 2006 | A1 |
20060291420 | Ng | Dec 2006 | A1 |
20060294241 | Cherian et al. | Dec 2006 | A1 |
20070010261 | Dravida et al. | Jan 2007 | A1 |
20070026884 | Rao | Feb 2007 | A1 |
20070058628 | Rao et al. | Mar 2007 | A1 |
20070077948 | Sharma et al. | Apr 2007 | A1 |
20070097916 | Eyuboglu et al. | May 2007 | A1 |
20070115896 | To et al. | May 2007 | A1 |
20070140163 | Meier et al. | Jun 2007 | A1 |
20070140172 | Garg et al. | Jun 2007 | A1 |
20070140184 | Garg et al. | Jun 2007 | A1 |
20070140185 | Garg et al. | Jun 2007 | A1 |
20070140218 | Nair et al. | Jun 2007 | A1 |
20070155329 | Mehrabanzad et al. | Jul 2007 | A1 |
20070213049 | Bishop | Sep 2007 | A1 |
20070220573 | Chiussi et al. | Sep 2007 | A1 |
20070230392 | Adams et al. | Oct 2007 | A1 |
20070230419 | Raman et al. | Oct 2007 | A1 |
20070238442 | Mate et al. | Oct 2007 | A1 |
20070238476 | Raman et al. | Oct 2007 | A1 |
20070242648 | Garg et al. | Oct 2007 | A1 |
20070248042 | Harikumar et al. | Oct 2007 | A1 |
20070265013 | Labedz | Nov 2007 | A1 |
20080003988 | Richardson | Jan 2008 | A1 |
20080013488 | Garg et al. | Jan 2008 | A1 |
20080062925 | Mate et al. | Mar 2008 | A1 |
20080065752 | Ch'ng et al. | Mar 2008 | A1 |
20080069020 | Richardson | Mar 2008 | A1 |
20080069028 | Richardson | Mar 2008 | A1 |
20080076398 | Mate et al. | Mar 2008 | A1 |
20080117842 | Rao | May 2008 | A1 |
20080119172 | Rao et al. | May 2008 | A1 |
20080120417 | Harikumar et al. | May 2008 | A1 |
20080139203 | Ng et al. | Jun 2008 | A1 |
20080146232 | Knisely | Jun 2008 | A1 |
20080151843 | Valmikam et al. | Jun 2008 | A1 |
20080159236 | Ch'ng et al. | Jul 2008 | A1 |
20080162924 | Chinitz et al. | Jul 2008 | A1 |
20080162926 | Xiong et al. | Jul 2008 | A1 |
20080253550 | Ch'ng et al. | Oct 2008 | A1 |
20080254792 | Ch'ng | Oct 2008 | A1 |
20090034440 | Samar et al. | Feb 2009 | A1 |
20120302249 | Ch'ng et al. | Nov 2012 | A1 |
Number | Date | Country |
---|---|---|
101536587 | Sep 2009 | CN |
907263 | Apr 1999 | EP |
2 046 084 | Apr 2009 | EP |
2456090 | Jul 2009 | GB |
2456694 | Jul 2009 | GB |
WO9849844 | Nov 1998 | WO |
WO2007008574 | Jan 2007 | WO |
WO2008030933 | Mar 2008 | WO |
WO2008030934 | Mar 2008 | WO |
WO2008030956 | Mar 2008 | WO |
WO2008082985 | Jul 2008 | WO |
Entry |
---|
U.S. Appl. No. 11/617,298, filed Dec. 28, 2006. |
PCT application No. PCT/US2007/088112 filed on Dec. 19, 2007, with Publication No. WO2008/082985, published on Jul. 10, 2008. |
International Search Report and Written Opinion mailed Jun. 3, 2008 from PCT application No. PCT/US2007/088112 (13 pages). |
Kramer et al., “Building and Measuring a High Performance Network Architecture,” Apr. 20, 2001, pp. 31, LBNL Technical Report No. LBNL 47274:WTCK. |
3rd Generation Partnership Project “3GPP2”, “cdma2000 High Rate Packet Data Air Interface Specification”, TIA/EIA/IS-856, C.S0024, version 4.0, Oct. 25, 2002 (548 pages). |
3rd Generation Partnership Project “3GPP2”, “cdma2000 High Rate Data Air Interface Specification”, TIA/EIA/IS-856, C.S0024-A, version 2.0, Jul. 2005 (1227 pages). |
3rd Generation Partnership Project “3GPP2”, “cdma2000 High Rate Data Air Interface Specification”, TIA/EIA/IS-856, C.S0024-B, version 1.0, Apr. 2006 (1623 pages). |
Office action from U.S. Appl. No. 11/640,503 mailed Oct. 10, 2008. |
International Search Report and Written Opinion mailed Dec. 19, 2008 from PCT application No. PCT/US2007/77755 (12 pages). |
International Preliminary Report on Patentability from PCT application No. PCT/US2007/077725 mailed Mar. 19, 2009 (11 pages). |
International Preliminary Report on Patentability from PCT application No. PCT/US2007/077722 mailed Mar. 19, 2009 (11 pages). |
International Preliminary Report on Patentability from PCT application No. PCT/US2007/077755 mailed Mar. 19, 2009 (8 pages). |
Office action from U.S. Appl. No. 11/640,503 mailed May 7, 2009. |
International Search Report and Written Opinion from corresponding PCT application No. PCT/US2007/77722 mailed on May 5, 2008 (44 pages). |
U.S. Appl. No. 60/824,877, filed Sep. 7, 2006. |
U.S. Appl. No. 11/640,415, filed Dec. 15, 2006. |
PCT application No. PCT/US2007/77725 filed on Sep. 6, 2007, with Publication No. WO2008/030934. |
International Search Report and Written Opinion from related U.S. Appl. No. 11/640,415 with corresponding PCT application No. PCT/US2007/77725, Patent Cooperation Treaty, mailed Mar. 20, 2008, 14 pages. |
PCT application No. PCT/US2007/77722 filed on Sep. 6, 2007, with Publication No. WO2008/030933. |
U.S. Appl. No. 11/640,503, filed Dec. 15, 2006. |
PCT application No. PCT/US2007/077755 filed on Sep. 6, 2007, with Publication No. WO2008/030956. |
Office action from U.S. Appl. No. 11/640,415 mailed May 14, 2009. |
International Preliminary Report on Patentability from PCT application No. PCT/US2007/088112 mailed Jul. 9, 2009 (7 pages). |
Office action and response history of U.S. Appl. No. 11/640,415 to Oct. 9, 2009. |
Office action and response history of U.S. Appl. No. 11/640,503 to Oct. 9, 2009. |
Examination Report for GB Application No. 0905846.2 mailed Sep. 10, 2009 (2 pages). |
Office action and response history of U.S. Appl. No. 11/640,503 to Jan. 6, 2010. |
Response filed in GB Application No. 0905846.2 filed on Jan. 8, 2010. |
Office action and response history of U.S. Appl. No. 11/617,298 to Mar. 4, 2010. |
Notice of allowance of GB Application No. 0905846.2 mailed on Feb. 16, 2010. |
Office action and response history of U.S. Appl. No. 11/617,298 to Nov. 5, 2009. |
Office action and response history of U.S. Appl. No. 11/640,415 to Dec. 17, 2009. |
Office action and response history of U.S. Appl. No. 11/640,415 to Jul. 26, 2010. |
Office action and response history of U.S. Appl. No. 11/640,503 to May 28, 2010. |
Office action and response history of U.S. Appl. No. 11/617,298 to Jul. 15, 2010. |
Examination Report issued Jul. 26, 2010 from United Kingdom patent application No. GB0905844.7, 2 pages. |
USPTO Non Final Office Action in U.S. Appl. No. 11/640,415, dated Oct. 5, 2010, 34 pages. |
Fish & Richardson P.C., Response to Final Office action mailed Jul. 15, 2010 in U.S. Appl. No. 11/617,298, filed Oct. 15, 2010, 14 pages. |
Fish & Richardson P.C., Response to Non Final Office action mailed Nov. 2, 2011 in U.S. Appl. No. 11/617,298, filed Mar. 2, 2012, 11 pages. |
Fish & Richardson P.C., Response to Final Office action mailed Apr. 19, 2011 in U.S. Appl. No. 11/640,415, filed Oct. 19, 2011, 23 pages. |
USPTO Non Final Office Action in U.S. Appl. No. 11/617,298, dated Nov. 2, 2011, 14 pages. |
Harry Newton, Newton's Telecom Dictionary, Mar. 2007, Flatrion Publishing, 23rd, p. 1006. |
USPTO Non Final Office Action in U.S. Appl. No. 11/617,298, dated Jan. 18, 2011, 16 pages. |
Fish & Richardson P.C., Response to Non Final Office action mailed Oct. 5, 2010 in U.S. Appl. No. 11/640,415, filed Feb. 7, 2011, 23 pages. |
Fish & Richardson P.C., Response to Non Final Office action mailed Jan. 18, 2011 in U.S. Appl. No. 11/617,298, filed Apr. 18, 2011, 10 pages. |
USPTO Final Office Action in U.S. Appl. No. 11/640,415, dated Apr. 19, 2011, 38 pages. |
USPTO Non Final Office Action in U.S. Appl. No. 11/640,503, dated Feb. 3, 2011, 14 pages. |
Fish & Richardson P.C., Response to Non Final Office action mailed Feb. 3, 2011 in U.S. Appl. No. 11/640,503, filed May 3, 2011, 21 pages. |
USPTO Final Office Action in U.S. Appl. No. 11/617,298, dated Jun. 23, 2011, 14 pages. |
Fish & Richardson P.C., Response to Final Office action mailed Jun. 23, 2011 in U.S. Appl. No. 11/617,298, filed Aug. 23, 2011, 11 pages. |
USPTO Notice of Allowance in U.S. Appl. No. 11/640,503, dated Aug. 8, 2011, 8 pages. |
USPTO Examiner's Amendment in U.S. Appl. No. 11/640,503, dated Aug. 8, 2011, 1 page. |
File history of U.S. Appl. No. 11/640,415 filed Dec. 15, 2006 (retrieved Sep. 9, 2013). |
File history of U.S. Appl. No. 11/640,503, filed Dec. 15, 2006 (retrieved Sep. 9, 2013). |
File history of U.S. Appl. No. 11/617,298, filed Dec. 28, 2006 (retrieved Sep. 9, 2013). |
File history of U.S. Appl. No. 13/555,830, filed Jul. 23, 2012 (retrieved Sep. 9, 2013). |
USPTO Non Final Office Action in U.S. Appl. No. 13/555,830, dated Aug. 8, 2013(12 pages). |
Number | Date | Country | |
---|---|---|---|
20080065752 A1 | Mar 2008 | US |
Number | Date | Country | |
---|---|---|---|
60824877 | Sep 2006 | US |