US20080181187A1 - WLAN Connection Setup Application and Profile Manager - Google Patents

WLAN Connection Setup Application and Profile Manager Download PDF

Info

Publication number
US20080181187A1
US20080181187A1 US11/943,332 US94333207A US2008181187A1 US 20080181187 A1 US20080181187 A1 US 20080181187A1 US 94333207 A US94333207 A US 94333207A US 2008181187 A1 US2008181187 A1 US 2008181187A1
Authority
US
United States
Prior art keywords
wlan
client device
local area
wireless local
profile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/943,332
Inventor
Sherryl Lee Lorraine Scott
Zaheen Somani
Alexander Jordan Reif
Peter La
Michael Montemurro
Michael McAndrews
Gerhard Dietrich Klassen
Denis Fedotenko
Nicholas Bryson Wilson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Malikie Innovations Ltd
Original Assignee
Research in Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research in Motion Ltd filed Critical Research in Motion Ltd
Priority to US11/943,332 priority Critical patent/US20080181187A1/en
Assigned to RESEARCH IN MOTION LIMITED reassignment RESEARCH IN MOTION LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SCOTT, SHERYL LEE LORRAINE, SOMANI, ZAHEEN, LA, PETER, MCANDREWS, MICHAEL, MONTEMURRO, MICHAEL, WILSON, NICHOLAS BRYSON, FEDOTENKO, DENIS, KLASSEN, GERHARD DIETRICH, REIF, ALEXANDER JORDAN
Publication of US20080181187A1 publication Critical patent/US20080181187A1/en
Assigned to RESEARCH IN MOTION LIMITED reassignment RESEARCH IN MOTION LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MONTEMURRO, MICHAEL
Assigned to RESEARCH IN MOTION LIMITED reassignment RESEARCH IN MOTION LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SOMANI, ZAHEEN
Priority to US13/027,823 priority patent/US8874764B2/en
Priority to US13/027,806 priority patent/US8595365B2/en
Priority to US13/093,099 priority patent/US20110238824A1/en
Assigned to BLACKBERRY LIMITED reassignment BLACKBERRY LIMITED CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: RESEARCH IN MOTION LIMITED
Assigned to MALIKIE INNOVATIONS LIMITED reassignment MALIKIE INNOVATIONS LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BLACKBERRY LIMITED
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/75Indicating network or usage conditions on the user display
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • a handheld device may be equipped with a wireless local area network (WLAN) communication interface through which the handheld device may be able to connect to a WLAN.
  • WLAN wireless local area network
  • IEEE 802.11 networks also known as Wi-FiTM networks
  • ETSI HIPERLAN networks are examples of WLANs.
  • a WLAN client device may store in its memory one or more persistent connection profiles of WLANs, each labeled by a connection profile name.
  • a persistent connection profile may include, for example, the service set identity (SSID) of the network, WLAN configuration parameters, security credentials, proxy information, default printer, file and printer sharing, firewall, and Internet Protocol (IP) network parameters.
  • the SSID is also known as the network name.
  • the persistent connection profiles may be assigned priorities, for example, by a user that has purchased the client device, a carrier who controls the sale of the client device, or an administrator of an enterprise that has purchased the client device. Generally, user action is required to delete a persistent connection profile from a client device.
  • a handheld device Since a handheld device has a small display and small keyboard, care must be taken when designing a user interface of an application to be run on the handheld device.
  • FIG. 1 is an illustration of an exemplary handheld device
  • FIG. 2 is an illustration of an exemplary screen shown when a wireless local area network profile management application is launched and an exemplary menu associated with the application is opened by a user of the handheld device;
  • FIG. 3 is an illustration of an exemplary screen which may appear when a WLAN connection setup application is launched
  • FIGS. 4-1 and 4 - 2 are illustrations of an exemplary screen which may appear while the handheld device is scanning for available wireless local area networks;
  • FIGS. 5-1 , 5 - 2 , and 5 - 3 are illustrations of an exemplary screen listing the results of the scanning
  • FIGS. 5-4 and 5 - 5 are illustrations of other exemplary screens listing the results, in full or in part, of the scanning;
  • FIGS. 6-1 , 6 - 2 , 6 - 3 , 6 - 4 , 6 - 5 , 6 - 6 , 6 - 7 , 6 - 8 , 6 - 9 and 6 - 10 are illustrations of an exemplary screen for user input of security credentials for a wireless local area network;
  • FIG. 7 is an illustration of an exemplary screen which may appear while the device is attempting to connect to a particular wireless local area network
  • FIGS. 8-1 and 8 - 2 are illustrations of an exemplary screen which may appear if the device successfully connects to the wireless local area network;
  • FIGS. 8-3 and 8 - 4 are illustrations of exemplary screens which may appear if the device is unable to connect to the wireless local area network;
  • FIGS. 9-1 and 9 - 2 are illustrations of an exemplary screen for virtual private network (VPN) selection
  • FIGS. 10-1 and 10 - 2 are illustrations of an exemplary setup completion screen
  • FIG. 11 is an illustration of an exemplary screen for manually adding a wireless local area network
  • FIGS. 12-1 and 12 - 2 are illustrations of an exemplary screen of a wireless local area network profile management application
  • FIG. 13 is an illustration of an exemplary screen for a wireless connections management application.
  • FIG. 14 is a block diagram of an exemplary handheld device.
  • FIG. 1 is an illustration of an exemplary handheld device 1 .
  • Device 1 has a display 2 and user input components such as a keyboard 4 and a trackball 6 .
  • Device 1 is equipped with a WLAN wireless communication interface for connecting to Wi-Fi networks, and is a WLAN client device.
  • device 1 is also equipped with additional wireless communication interfaces, for example, a wireless wide area network (WWAN) communication interface for connecting to mobile networks and a wireless personal area network (WPAN) communication interface for connecting to a WPAN.
  • WWAN wireless wide area network
  • WPAN wireless personal area network
  • a non-exhaustive list of mobile phone and data standards for WWANs includes 2G standards such as Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA), 2.5G standards such as General Packet Radio Service (GPRS), 2.75G standards such as CDMA2000 and Enhanced Data rates for GSM Evolution (EDGE), and 3G standards such as Wideband CDMA (W-CDMA).
  • GSM Global System for Mobile Communications
  • CDMA Code Division Multiple Access
  • GPRS General Packet Radio Service
  • EDGE Enhanced Data rates for GSM Evolution
  • W-CDMA Wideband CDMA
  • Bluetooth® networks, ZigbeeTM and ultra-wideband (UWB) networks are examples of WPANs.
  • Device 1 also comprises other components which for clarity are not shown in FIG. 1 .
  • the following description is based on an exemplary graphical user interface.
  • the functionality of the exemplary screens described below can be implemented using other graphical user-interface elements than those shown.
  • FIG. 1 An exemplary home screen, which is the screen displayed in display 2 when device 1 is first turned on, is shown in FIG. 1 .
  • Icons representing applications of device 1 are displayed in a list 8 .
  • a user of device 1 may select an icon 10 representing an options application. If the user selects icon 10 , an options application will be launched.
  • the screen may then show a window 12 listing a partial or entire list of options that the user can view and/or edit.
  • a WLAN profile management application By navigating to and selecting the “Wi-Fi Connections” option 13 , a WLAN profile management application will be launched.
  • FIG. 2 is an illustration of an exemplary screen 20 shown when the WLAN profile management application is launched and an exemplary menu 22 of commands associated with the application is opened by the user. Screen 20 and menu 22 are described in more detail below with respect to FIGS. 12-1 and 12 - 2 . Selecting a menu item 24 entitled “New . . . ” from menu 22 will launch a WLAN connection setup application.
  • FIG. 3 is an illustration of an exemplary screen 30 which may appear when the WLAN connection setup application is launched.
  • Screen 30 includes a button 32 entitled “Scan for Networks” and a button 34 entitled “Manually Add Network”.
  • Device 1 may employ passive scanning techniques, active scanning techniques or any combination thereof.
  • FIG. 4-1 is an illustration of an exemplary screen 40 which may appear while the device is scanning for available WLANs. If no available WLANs are found, a popup window 42 informing the user of this may appear, as shown in FIG. 4-2 . If the user presses an OK button 44 , the user will be presented again with screen 30 .
  • FIGS. 5-1 , 5 - 2 , and 5 - 3 are illustrations of an exemplary screen 50 listing the results of the scanning. All available wireless local area networks that have been identified during scanning are listed. If the number of available networks exceeds that which can be viewed simultaneously, a scrollbar 51 may be used to scroll through the entire list.
  • WLANs for which a persistent connection profile is saved in device 1 are identified in the list by connection profile name (e.g. “Home”, “Coffee Shop”) and WLANs for which a connection profile is not saved in device 1 are identified in the list by network name (e.g. “Rosencrantz”, “Guildenstern”, “Symbol”).
  • WLANs for which a connection profile is saved in device 1 are further identified by the description “Saved”, except for a WLAN to which device 1 is currently connected, if any. If device 1 is currently connected to a WLAN, that WLAN is displayed first in the list, regardless of its signal strength as perceived by device 1 .
  • the WLAN to which device 1 may be further identified by the text description “Connected” or by a visual indicator 52 , for example, a graphic, or by both.
  • the text description and the visual indicator are displayed near an identifier of the WLAN to which the WLAN client device is currently connected.
  • visual indicator 52 is a checkmark.
  • Available WLANs to which device 1 is not currently connected are displayed in the list ordered by decreasing received signal strength at device 1 .
  • Each available wireless local area network appears in the list with a visual indicator 53 of its signal strength as perceived by device 1 .
  • visual indicator 53 is a graphic of a radio tower broadcasting radio waves. The size and number of radio waves is indicative of the signal strength, which may be abstracted to three values: high, medium and low.
  • the WLAN to which device 1 is currently connected identified by its connection profile name “Coffee Shop”, is listed first even though it has a lower received signal strength than the WLAN identified by its network name “Rosencrantz”.
  • Device 1 may identify the security configurations of the available WLANs from the scan results. For example, device 1 may identify whether the security configuration of the WLAN is none, Wired Equivalent Privacy (WEP), PSK (also known as “WPA-Personal”) or IEEE 802.1x (also known as “WPA-Enterprise”). Each available wireless local area network for which a connection profile is not saved in device 1 appears in the list with a description of its security requirements (e.g. “No Security”, “Security: WEP”, “Security: WPA-Personal”, “Security: WPA-Enterprise”). For anything other than “No Security”, a visual indicator 54 of its security requirements is also displayed. In this example, visual indicator 54 is a graphic of a lock. In alternative implementations, different visual indicators could be used to indicate different security requirements.
  • WEP Wired Equivalent Privacy
  • PSK also known as “WPA-Personal”
  • IEEE 802.1x also known as “WPA-Enterprise”.
  • device 1 may save a connection profile as a persistent connection profile or as a transient connection profile.
  • Visual indicators may be employed to distinguish available WLANs for which transient connection profiles are saved in device 1 from available WLANs for which a persistent connection profile is saved in device 1 .
  • the WLAN may appear in the list identified by its connection profile name (e.g. “Temporary”) and its network name (e.g. “Proxim”), concatenated into a single string.
  • that string may be displayed in italicized text.
  • Navigating to and selecting a particular available WLAN in the list will indicate that the user wants to have device 1 connect to the selected WLAN. If no security is required by the selected WLAN, device 1 may directly attempt to connect to the select WLAN, as described below with respect to FIG. 7 . If security credentials are required, the user will be prompted to supply security credentials for the selected WLAN, as described below with respect to FIGS. 6-1 , 6 - 2 , 6 - 3 , 6 - 4 , 6 - 5 , 6 - 6 , 6 - 7 , 6 - 8 , 6 - 9 and 6 - 10 .
  • FIG. 5-2 illustrates a view of screen 50 in which a menu 55 associated with screen 50 is opened by the user. Navigating to a particular available WLAN in the list and then selecting a menu item 56 entitled “Connect” has the same effect as selecting the list item. Navigating to a particular available WLAN in the list and then selecting a menu item 57 entitled “Refresh” will cause device 1 to scan again for wireless local area networks, as described above. Navigating to a particular available WLAN in the list and then selecting a menu item 58 entitled “Manage Saved Wi-Fi Networks” will launch the WLAN profile management application, which is described in more detail below with respect to FIGS. 12-1 and 12 - 2 .
  • Navigating to a particular available WLAN in the list and then selecting a menu item 59 entitled “Network Details” will result in a popup window being shown with details of the particular available WLAN, as shown in FIG. 5-3 .
  • the user has selected the available WLAN with the network name “Rosencrantz”, which has the strongest signal strength.
  • a user of device 1 may be able to designate one or more connection profiles of WLANs saved in the device as “preferred”. For example, when creating a connection profile of a WLAN, there may a check box or radio button or other graphical user-interface element that enables the designation of the connection profile as preferred.
  • menu 22 associated with the WLAN profile management application may include a menu item (not shown) the text of which toggles between “Preferred” if a selected connection profile is not designated as preferred and “Not Preferred” if the selected connection profile is designated as preferred. Selecting that menu item will toggle the preferred/not preferred status of the selected connection profile.
  • Other user interface means for enabling designation of one or more connection profiles as preferred or not preferred are also contemplated.
  • scan results may be filtered so that only matches to preferred connection profiles are displayed at the device.
  • the connection profiles named “Coffee Shop” and “Home” may have been designated as preferred and the results of the scanning may be such that there are available WLANs matching those connection profiles.
  • a screen 501 of available WLANs may display only those available WLANs that match one of the preferred connection profiles.
  • device 1 may include in a list of available WLANs those available WLANs for which a preferred connection profile is saved in device 1 , and device 1 may exclude from the list any other available WLANs. Device 1 may then display the list or a portion thereof on its display.
  • a displayed list of available WLANs may distinguish in the list available WLANs for which a preferred connection profile is saved in device 1 from other available WLANs in the list.
  • the connection profiles named “Coffee Shop” and “Home” may have been designated as preferred and the results of the scanning may be such that there are available WLANs matching those connection profiles.
  • a screen 502 displaying a list of available WLANs may include a first sublist of available WLANs for which a preferred connection profile is saved in device 1 and a second sublist of the other available WLANs.
  • the first sublist may include a header 504 that identifies the available WLANs in the sublist as preferred
  • the second sublist may include a header 506 that is different than header 504 .
  • One or more of the aspects of displaying a list of available WLANs that are described above with respect to FIGS. 5-1 , 5 - 2 and 5 - 3 may also be applicable to the list of only those available WLANs that match one of the preferred connection profiles. Likewise, one or more of the aspects of displaying a list of available WLANs that are described above with respect to FIGS. 5-1 , 5 - 2 and 5 - 3 may also be applicable to a list that distinguishes between available WLANs that match one of the preferred connection profiles and other available WLANs, and may be applicable to the first sublist, the second sublist or both.
  • FIGS. 6-1 , 6 - 2 , 6 - 3 , 6 - 4 , 6 - 5 , 6 - 6 , 6 - 7 , 6 - 8 , 6 - 9 and 6 - 10 are illustrations of an exemplary screen 60 for user input of security credentials for a wireless local area network. If device 1 has identified the selected WLAN as having a PSK security configuration, screen 60 will appear as in FIG. 6-1 , with editable text fields 61 and 62 to enable the user to input a password. This is the case for the example with the selected WLAN having the network name “Rosencrantz”.
  • screen 60 will appear as in FIG. 6-2 , with an editable text field 64 to enable the user to input a WEP key.
  • EAP Extensible Authentication Protocol
  • editable text fields 66 and 67 enable the user to input a user name and password.
  • IMSI International Mobile Subscriber Identity
  • FIGS. 6-7 and 6 - 8 the International Mobile Subscriber Identity (IMSI) of device 1 is displayed.
  • IMSI International Mobile Subscriber Identity
  • FIG. 6-9 a client certificate stored in device 1 is displayed. If more than one client certificate is stored in device 1 , then as shown in FIG. 6-10 , screen 60 includes a drop-down menu 68 listing the client certificates.
  • FIGS. 6-1 , 6 - 2 , 6 - 3 , 6 - 4 , 6 - 5 , 6 - 6 , 6 - 7 , 6 - 8 , 6 - 9 and 6 - 10 have a button 63 entitled “Next”, which when selected by the user will cause device 1 to attempt to connect to the selected WLAN, using the security credentials provided in screen 60 .
  • FIG. 7 is an illustration of an exemplary screen 70 which may appear while the device is attempting to connect to the selected WLAN.
  • device 1 Upon successfully connecting to a WLAN, device 1 obtains an Internet Protocol (IP) address. If device 1 successfully connects to the selected WLAN and a connection profile of the selected WLAN is already saved in device 1 , then screen 70 closes and, returning briefly to FIG. 1 , an icon 14 is displayed in home screen 2 . Icon 14 indicates to the user that the device is connected to a WLAN.
  • IP Internet Protocol
  • FIGS. 8-1 and 8 - 2 are illustrations of an exemplary screen 80 which may appear if the attempt to connect to the WLAN is successful and a connection profile is not saved for the WLAN.
  • the user is asked whether to save the connection information (e.g. SSID, security credentials, other information gleaned from the scan result or the connection process) in a persistent connection profile. By saving a persistent connection profile, the user will not need to reenter the security credentials when connecting to this WLAN in the future.
  • a “Yes”/“No” toggle button 81 is displayed.
  • An editable text field 82 enables the user to input a name for the persistent connection profile.
  • button 81 is set to “Yes”
  • selecting a button 83 entitled “Next” causes device 1 to attempt to create a persistent connection profile for the newly connected WLAN with the connection profile name provided in text field 82 .
  • the user has provided the connection profile name “Suzie's Home” for the WLAN with the network name “Rosencrantz”.
  • a popup window 84 as shown in FIG. 8-2 is displayed to inform the user of this and to enable the user to select, via a “Yes” button 85 or a “No” button, whether to replace the existing connection profile. If the user selects “Yes”, then device 1 creates a persistent connection profile for the newly connected WLAN with the connection profile name provided by the user. If the user selects “No”, popup window 84 disappears and the user is able to provide a different connection profile name via editable text field 82 .
  • screen 88 differs from screen 80 only in that a description 89 explaining that the device is out of the coverage area is displayed.
  • button 81 is set to “Yes”
  • selecting button 83 entitled “Next” causes device 1 to attempt to create a persistent connection profile for the newly connected WLAN with the connection profile name provided by the user.
  • popup window 84 will be displayed.
  • a transient connection profile differs from a persistent connection profile in that its name is not chosen at creation by the user, and a transient connection profile has a limited lifetime. After a period of time, for example, 24 hours, a transient connection profile may be automatically deleted from the device without any user intervention. Alternatively, a transient connection profile may be stored in the device until overwritten with another transient connection profile. Persistent connection profiles, on the other hand, generally require user intervention in order to be deleted from the device.
  • Transient connection profiles may be automatically assigned connection profile names, for example, “Temporary 1 ”, “Temporary 2 ”, etc.
  • the SSID of the WLAN may be incorporated into the connection profile name of the transient connection profile.
  • connection profile whether persistent or transient, is successful
  • the device will proceed to display the next screen.
  • select button 81 is set to “No”
  • selecting button 83 entitled “Next” may cause device to proceed to the next screen without creating any connection profile.
  • a virtual private network is a private communications network used to communicate confidentially over a publicly accessible network.
  • VPN message traffic can be carried over a public network infrastructure (e.g. the Internet) on top of standard protocols.
  • VPNs are used, for example, to enable employees to connect securely to a corporate network. If a VPN client application is installed on device 1 and one or more VPN profiles have been defined, then the next screen following screen 80 or screen 88 is a VPN selection screen, as shown in FIGS. 9-1 and 9 - 2 . Otherwise the next screen is a setup completion screen, as shown in FIGS. 10-1 and 10 - 2 .
  • FIGS. 9-1 and 9 - 2 are illustrations of an exemplary screen 90 for VPN profile selection.
  • Screen 90 is displayed only if one or more VPN profiles have been defined in device 1 .
  • screen 90 is always displayed and enables a user to define a VPN profile if none are defined yet.
  • screen 90 is displayed as shown in FIG. 9-1 , with an indication of the VPN profile, e.g. the label “ABC-HQ”, displayed in a text field 92 . If two or more VPN profiles are defined in device 1 , screen 90 is displayed as shown in FIG. 9-2 , with a drop-down menu 94 listing indications of the VPN profiles, for example, their labels.
  • a user specifies, via a “Yes”/“No” toggle button 96 , whether to use one of the VPN profiles with the WLAN to which device 1 has just connected. If button 96 is set to “No”, selecting a button 98 entitled “Next” causes a setup completion screen to be displayed. If button 96 is set to “Yes”, selecting button 98 causes device 1 to attempt, using the VPN client application, to connect to establish a VPN connection according to the VPN profile which label is displayed in text field 92 or selected in drop-down menu 94 . If a connection profile for the WLAN is saved, device 1 associates the VPN profile with the connection profile of the WLAN so that subsequent connections of the device to the WLAN will automatically attempt to establish a VPN connection according to the associated VPN profile after the device obtains an IP address.
  • FIGS. 10-1 and 10 - 2 are illustrations of an exemplary setup completion screen 100 .
  • screen 100 closes and icon 14 is displayed in home screen 2 (see FIG. 1 ) to indicate to the user that the device is connected to a WLAN.
  • Screen 100 includes a message 103 informing the user that the connection profile of the WLAN to which device 1 has connected has been saved.
  • Screen 100 also includes a button 104 entitled “Prioritize Wi-Fi Profiles” which, if selected, will close screen 100 and launch the profile management application.
  • a hotspot is a venue that offers access to the Internet via a wireless local area network.
  • a WLAN client device Upon connecting to the WLAN, a WLAN client device is given an IP address.
  • Access to a public network such as the Internet is provided by the WLAN via a gateway.
  • the gateway may implement one or more IP filtering rules to limit IP addresses that can be accessed by the WLAN client device, thus providing access to what is known as a “walled garden”. Subscription may be required and fees may apply in order to gain access to the public network.
  • device 1 Once device 1 has successfully connected to a WLAN, it sends via the WLAN a hypertext transfer protocol (HTTP) request to a particular IP address that is not normally redirected. This occurs automatically in the background, without any intervention by the user and without providing any feedback to the user. If the device receives a redirection response to the HTTP request, then device 1 has detected that the WLAN to which it is connected is offered by a hotspot. In this situation, device 1 may display an indication of this. For example, device 1 may display screen 100 as it appears in FIG. 10-2 , rather than as it appears in FIG. 10-1 . As shown in FIG. 10-2 , screen 100 includes a description 105 about hotspots and a button 106 entitled “Hotspot Registration”. Selecting button 106 launches a browser application of device 1 with an IP address that ought to trigger an IP filtering rule of the gateway. The browser will be redirected to a captive portal of the hotspot that may enable the user to register for access to the public network.
  • HTTP hypertext transfer protocol
  • a browser application of device 1 upon detecting in the background that a WLAN to which device 1 has just connected is offered by a hotspot, where access to the Internet is provided by the wireless local area network via a gateway, a browser application of device 1 is automatically launched with an IP address that ought to trigger an IP filtering rule of the gateway.
  • FIG. 11 is an illustration of an exemplary screen 110 that may appear after the user selects button 34 .
  • the user may type the name of the network (SSID), which will appear in an editable text field 112 .
  • the user has typed “BLUEBIRD”.
  • a button 114 entitled “Next” the user will be prompted to supply security credentials for the WLAN via screen 60 , as described above with respect to FIGS. 6-1 , 6 - 2 , 6 - 3 , 6 - 4 , 6 - 5 , 6 - 6 , 6 - 7 , 6 - 8 , 6 - 9 and 6 - 10 .
  • device 1 may scan for a WLAN having “BLUEBIRD” as its SSID.
  • Device 1 may employ passive scanning techniques, active scanning techniques or any combination thereof. From the scan results, device 1 may identify whether the security configuration of the WLAN is none, WEP, PSK or IEEE 802.1x. If no security is required, device 1 may directly attempt to connect to the WLAN, and screen 70 will be displayed with the text “Connecting to BLUEBIRD . . . ” instead of “Connecting to Rosencrantz . . . ”. If security credentials are required, the user will be prompted to supply security credentials for the WLAN via screen 60 , as described above with respect to FIGS.
  • FIGS. 12-1 and 12 - 2 are illustrations of exemplary screen 20 of a wireless local area network profile management application.
  • Connection profiles of WLANs are listed in screen 20 in decreasing order of priority.
  • the relative priority of connection profiles may affect the order in which those connection profiles are compared to scanning results and therefore may also affect the order in which the device attempts to connect to WLANs matching those connection profiles.
  • Connection profiles may be created with the lowest relative priority, by default.
  • connection profile of the WLAN with which device 1 is currently connected may be automatically selected when opening screen 20 , as indicated by a highlight bar 120 .
  • Further visual indications of the connection profile of the WLAN with which device 1 is currently connected include the connection profile name in a text field 121 near the description “Active Wi-Fi Connection” and a checkmark 122 next to the connection profile in the list. If device 1 is currently connected to a WLAN for which a connection profile is not saved, then the network name of that WLAN is displayed in text field 121 . If device 1 is not connected to a WLAN, then text field 121 is blank or displays the text “None”.
  • a cross 123 identifies connection profiles of WLANs with which device 1 is not currently connected. If screen 20 is opened when device 1 is not connected to any WLAN, then the connection profile with the highest priority may be automatically selected. Alternatively, a newly created connection profile may be automatically selected in screen 20 .
  • scanning for WLANs may be performed in one of the following ways:
  • Manual Scans A user initiates a scan for either a specific WLAN or for all available WLANs.
  • Background Profile Scans Scans that occur from time to time in the background without user intervention, even if the device is already connected to a WLAN. Scan results are filtered to exclude WLANs having a received signal strength below a threshold. The enabled connection profile with the highest priority is then compared to the filtered scan results and if there is a match, the device attempts to connect to the matching WLAN. If there is no match, the enabled connection profile with the next highest priority is compared to the filtered scan results, and so on. Disabled connection profiles are not compared to the filtered scan results.
  • Neighbor Scans Scans that occur from time to time in the background without user intervention, when the device is connected to a WLAN via an association with an access point.
  • the scanning is restricted to neighboring access points within an IP subnetwork, based on the assumption that WLANs on different IP subnets have different SSIDs. If the quality of the wireless link between the device and the access point with which the device is associated drops below a threshold, the device may associate instead with a neighboring access point on the same IP subnetwork.
  • a visual indicator 124 of a broadcasting access point identifies enabled connection profiles and a visual indicator 125 of an access point with a cross identifies disabled connection profiles.
  • menu 22 associated with the WLAN profile management application applies to the selected connection profile.
  • Selecting a menu item 25 entitled “Move Selection” enables the user to adjust the priority of the selected connection profile relative to the other connection profiles in the list by moving the selected connection profile within the list. For example, by adjusting a trackball or thumbwheel or by pressing the appropriate keys in a keyboard, the user may provide input to move the selected connection profile within the list.
  • the list of connection profiles is updated to show the selected connection profile at a location in the list corresponding to the input. For example, if the input is a slight upwards motion of the trackball (where upwards is defined as the direction towards the top edge of the device), the selected connection profile will be displayed higher in the list than before.
  • the text of a menu item 26 toggles between “Disable” if the selected connection profile is enabled and “Enable” if the selected connection profile is disabled. Selecting menu item 26 will toggle the enabled/disabled status of the selected connection profile.
  • Selecting a menu item 27 entitled “Scan” will cause device 1 to scan for and attempt to connect to the WLAN matching the selected connection profile.
  • a user may also initiate this by clicking the selected connection profile or providing other appropriate input (for example, pressing an “Enter” button on the keyboard) while a connection profile is selected and menu 22 is closed.
  • a Wi-Fi selection mode “Automatic”/“Manual” toggle button 126 allows the user to enable or disable background profile scanning. If button 126 is set to “Manual”, as shown in FIG. 12-2 , then radio buttons 127 appear next to the connection profiles and the user may select which of the connection profiles to scan for and attempt to connect to.
  • icon 14 may appear in the home screen when device 1 is connected to a WLAN. If device 1 also has a WWAN communication interface, an icon 16 may appear in the home screen when device 1 is connected to a WWAN. Likewise, if device 1 also has a WPAN communication interface, an icon (not shown) may appear in the home screen when device 1 is connected to a WPAN. Selecting any of icons 14 , 16 and the WPAN icon may launch a wireless connections management application. List 8 also includes an icon 18 which if selected will launch the wireless connections management application.
  • FIG. 13 is an illustration of an exemplary screen 130 shown when the wireless connections management application is launched. Selecting a menu item 132 entitled “Set Up Wi-Fi Network” will launch the WLAN connection setup application described above, beginning at screen 30 (described above with respect to FIG. 3 ).
  • FIG. 14 is a block diagram of an exemplary handheld device 1400 .
  • Handheld device 1400 includes a processor 1402 and a memory 1404 coupled to processor 1402 .
  • Handheld device 1400 includes an audio input element 1406 , for example a microphone, an audio output element 1408 , for example, a speaker, and an audio coder-decoder (codec) 1410 , however, the technology described herein is also applicable to devices without these audio components.
  • codec audio coder-decoder
  • Handheld device 1400 includes a display 1412 coupled to processor 1402 .
  • Handheld device 1400 also includes one or more user input elements 1414 coupled to processor 1402 , for example, a keyboard and a trackball.
  • Handheld device 1400 may include additional user input and/or output elements that are not shown in FIG. 15 , for example a thumbwheel.
  • a keyboard may be embedded in full or in part within display 1412 , i.e. display 1412 may be a touch screen.
  • Handheld device 1400 includes a WLAN communication interface 1416 coupled to processor 1402 and to an antenna 1418 .
  • Communication interface 1416 is compatible with one or more WLAN standards, for example, IEEE 802.11 or ETSI HIPERLAN, and includes a WLAN controller and a radio.
  • Handheld device 1400 optionally also includes a WWAN communication interface 1420 coupled to processor 1402 and to an antenna 1422 .
  • Communication interface 1420 is compatible with one or more WWAN standards, for example, cellular communication standards, and includes a WWAN controller and a radio.
  • Handheld device 1400 optionally also includes a WPAN communication interface 1424 coupled to processor 1402 and to an antenna 1426 .
  • Communication interface 1424 is compatible with one or more WPAN standards, for example, Bluetooth®, ZigBeeTM, radio frequency identification (RFID), ultra wideband (UWB) and the like.
  • Handheld device 1400 may optionally also include a Global Positioning System (GPS) receiver 1428 coupled to processor 1402 and to an antenna 1430 .
  • GPS Global Positioning System
  • Each communication interface includes a controller and a radio, and the radio is coupled to an antenna. Controllers may share the same hardware, but logically they are independent. Analog components of the radios may be shared, but digital components of the radios are most likely to be independent. Depending on the frequencies, antennas could be shared among the communication interfaces.
  • handheld device 1400 may be able to establish telephone and/or data communication sessions with other systems (not shown).
  • Data communication sessions may include data in the form of plain text, data files, voice files, image files, movie files, streaming audio, streaming video, animation, or any other suitable data form.
  • a non-exhaustive list of examples for data communication sessions includes sending and receiving electronic mail (e-mail), sending and receiving instant messages, sending and receiving paging messages, sending and receiving short message service (SMS) messages, and any other suitable data communication sessions.
  • memory 1404 may store respective application modules to be executed by processor 1402 , for example, an e-mail application module 1432 , an SMS application module 1434 , a paging application module 1436 , an instant messaging application module 1438 , and a web browser application module 1440 .
  • Memory 1404 stores a system management application module 1442 and may optionally store other application modules, for example, an address book or contacts application module 1444 and a calendar application module 1446 .
  • application modules are just examples, and the technology described herein is also applicable to handheld devices with a different set of application modules.
  • Memory 1404 may store executable code 1448 which, when executed by processor 1402 , implements a wireless connection setup application, and executable code 1450 which, when executed by processor 1402 , implements a wireless connection profile management application.

Abstract

A sequence of screens are displayed for a wireless local area network (WLAN) connection setup application to enable a user of a handheld WLAN client device to scan for and set up a new WLAN connection. Various connection parameters may be saved in a profile. A profile management application lists profiles in decreasing order of priority.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit under 35 USC 119(e) from U.S. Provisional Patent Application No. 60/866,753, filed Nov. 21, 2006, and which is incorporated by reference herein.
  • BACKGROUND
  • A handheld device may be equipped with a wireless local area network (WLAN) communication interface through which the handheld device may be able to connect to a WLAN. IEEE 802.11 networks (also known as Wi-Fi™ networks) and ETSI HIPERLAN networks are examples of WLANs.
  • A WLAN client device may store in its memory one or more persistent connection profiles of WLANs, each labeled by a connection profile name. A persistent connection profile may include, for example, the service set identity (SSID) of the network, WLAN configuration parameters, security credentials, proxy information, default printer, file and printer sharing, firewall, and Internet Protocol (IP) network parameters. The SSID is also known as the network name. The persistent connection profiles may be assigned priorities, for example, by a user that has purchased the client device, a carrier who controls the sale of the client device, or an administrator of an enterprise that has purchased the client device. Generally, user action is required to delete a persistent connection profile from a client device.
  • Since a handheld device has a small display and small keyboard, care must be taken when designing a user interface of an application to be run on the handheld device.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like reference numerals indicate corresponding, analogous or similar elements, and in which:
  • FIG. 1 is an illustration of an exemplary handheld device;
  • FIG. 2 is an illustration of an exemplary screen shown when a wireless local area network profile management application is launched and an exemplary menu associated with the application is opened by a user of the handheld device;
  • FIG. 3 is an illustration of an exemplary screen which may appear when a WLAN connection setup application is launched;
  • FIGS. 4-1 and 4-2 are illustrations of an exemplary screen which may appear while the handheld device is scanning for available wireless local area networks;
  • FIGS. 5-1, 5-2, and 5-3 are illustrations of an exemplary screen listing the results of the scanning;
  • FIGS. 5-4 and 5-5 are illustrations of other exemplary screens listing the results, in full or in part, of the scanning;
  • FIGS. 6-1, 6-2, 6-3, 6-4, 6-5, 6-6, 6-7, 6-8, 6-9 and 6-10 are illustrations of an exemplary screen for user input of security credentials for a wireless local area network;
  • FIG. 7 is an illustration of an exemplary screen which may appear while the device is attempting to connect to a particular wireless local area network;
  • FIGS. 8-1 and 8-2 are illustrations of an exemplary screen which may appear if the device successfully connects to the wireless local area network;
  • FIGS. 8-3 and 8-4 are illustrations of exemplary screens which may appear if the device is unable to connect to the wireless local area network;
  • FIGS. 9-1 and 9-2 are illustrations of an exemplary screen for virtual private network (VPN) selection;
  • FIGS. 10-1 and 10-2 are illustrations of an exemplary setup completion screen;
  • FIG. 11 is an illustration of an exemplary screen for manually adding a wireless local area network;
  • FIGS. 12-1 and 12-2 are illustrations of an exemplary screen of a wireless local area network profile management application;
  • FIG. 13 is an illustration of an exemplary screen for a wireless connections management application; and
  • FIG. 14 is a block diagram of an exemplary handheld device.
  • It will be appreciated that for simplicity and clarity of illustration, elements shown in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity.
  • DETAILED DESCRIPTION
  • In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of embodiments. However it will be understood by those of ordinary skill in the art that the embodiments may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the embodiments.
  • FIG. 1 is an illustration of an exemplary handheld device 1. Device 1 has a display 2 and user input components such as a keyboard 4 and a trackball 6. Device 1 is equipped with a WLAN wireless communication interface for connecting to Wi-Fi networks, and is a WLAN client device.
  • Optionally, device 1 is also equipped with additional wireless communication interfaces, for example, a wireless wide area network (WWAN) communication interface for connecting to mobile networks and a wireless personal area network (WPAN) communication interface for connecting to a WPAN. A non-exhaustive list of mobile phone and data standards for WWANs includes 2G standards such as Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA), 2.5G standards such as General Packet Radio Service (GPRS), 2.75G standards such as CDMA2000 and Enhanced Data rates for GSM Evolution (EDGE), and 3G standards such as Wideband CDMA (W-CDMA). Bluetooth® networks, Zigbee™ and ultra-wideband (UWB) networks are examples of WPANs.
  • Device 1 also comprises other components which for clarity are not shown in FIG. 1. The following description is based on an exemplary graphical user interface. Clearly, the functionality of the exemplary screens described below can be implemented using other graphical user-interface elements than those shown.
  • An exemplary home screen, which is the screen displayed in display 2 when device 1 is first turned on, is shown in FIG. 1. Icons representing applications of device 1 are displayed in a list 8. By navigating through list 8, a user of device 1 may select an icon 10 representing an options application. If the user selects icon 10, an options application will be launched. The screen may then show a window 12 listing a partial or entire list of options that the user can view and/or edit.
  • By navigating to and selecting the “Wi-Fi Connections” option 13, a WLAN profile management application will be launched.
  • FIG. 2 is an illustration of an exemplary screen 20 shown when the WLAN profile management application is launched and an exemplary menu 22 of commands associated with the application is opened by the user. Screen 20 and menu 22 are described in more detail below with respect to FIGS. 12-1 and 12-2. Selecting a menu item 24 entitled “New . . . ” from menu 22 will launch a WLAN connection setup application.
  • WLAN Connection Setup Application
  • FIG. 3 is an illustration of an exemplary screen 30 which may appear when the WLAN connection setup application is launched. Screen 30 includes a button 32 entitled “Scan for Networks” and a button 34 entitled “Manually Add Network”.
  • If button 32 is selected, scanning for wireless local area networks will commence. Device 1 may employ passive scanning techniques, active scanning techniques or any combination thereof.
  • FIG. 4-1 is an illustration of an exemplary screen 40 which may appear while the device is scanning for available WLANs. If no available WLANs are found, a popup window 42 informing the user of this may appear, as shown in FIG. 4-2. If the user presses an OK button 44, the user will be presented again with screen 30.
  • FIGS. 5-1, 5-2, and 5-3 are illustrations of an exemplary screen 50 listing the results of the scanning. All available wireless local area networks that have been identified during scanning are listed. If the number of available networks exceeds that which can be viewed simultaneously, a scrollbar 51 may be used to scroll through the entire list.
  • In the example shown in FIGS. 5-1, 5-2, and 5-3, six different available wireless local area networks are listed. WLANs for which a persistent connection profile is saved in device 1 are identified in the list by connection profile name (e.g. “Home”, “Coffee Shop”) and WLANs for which a connection profile is not saved in device 1 are identified in the list by network name (e.g. “Rosencrantz”, “Guildenstern”, “Symbol”). WLANs for which a connection profile is saved in device 1 are further identified by the description “Saved”, except for a WLAN to which device 1 is currently connected, if any. If device 1 is currently connected to a WLAN, that WLAN is displayed first in the list, regardless of its signal strength as perceived by device 1. The WLAN to which device 1 may be further identified by the text description “Connected” or by a visual indicator 52, for example, a graphic, or by both. The text description and the visual indicator are displayed near an identifier of the WLAN to which the WLAN client device is currently connected. In this example, visual indicator 52 is a checkmark.
  • Available WLANs to which device 1 is not currently connected are displayed in the list ordered by decreasing received signal strength at device 1. Each available wireless local area network appears in the list with a visual indicator 53 of its signal strength as perceived by device 1. In this example, visual indicator 53 is a graphic of a radio tower broadcasting radio waves. The size and number of radio waves is indicative of the signal strength, which may be abstracted to three values: high, medium and low. In the example shown in FIGS. 5-1, 5-2 and 5-3, the WLAN to which device 1 is currently connected, identified by its connection profile name “Coffee Shop”, is listed first even though it has a lower received signal strength than the WLAN identified by its network name “Rosencrantz”.
  • Device 1 may identify the security configurations of the available WLANs from the scan results. For example, device 1 may identify whether the security configuration of the WLAN is none, Wired Equivalent Privacy (WEP), PSK (also known as “WPA-Personal”) or IEEE 802.1x (also known as “WPA-Enterprise”). Each available wireless local area network for which a connection profile is not saved in device 1 appears in the list with a description of its security requirements (e.g. “No Security”, “Security: WEP”, “Security: WPA-Personal”, “Security: WPA-Enterprise”). For anything other than “No Security”, a visual indicator 54 of its security requirements is also displayed. In this example, visual indicator 54 is a graphic of a lock. In alternative implementations, different visual indicators could be used to indicate different security requirements.
  • As will be described in further detail below, device 1 may save a connection profile as a persistent connection profile or as a transient connection profile. Visual indicators may be employed to distinguish available WLANs for which transient connection profiles are saved in device 1 from available WLANs for which a persistent connection profile is saved in device 1. For example, the WLAN may appear in the list identified by its connection profile name (e.g. “Temporary”) and its network name (e.g. “Proxim”), concatenated into a single string. Moreover, that string may be displayed in italicized text.
  • Navigating to and selecting a particular available WLAN in the list will indicate that the user wants to have device 1 connect to the selected WLAN. If no security is required by the selected WLAN, device 1 may directly attempt to connect to the select WLAN, as described below with respect to FIG. 7. If security credentials are required, the user will be prompted to supply security credentials for the selected WLAN, as described below with respect to FIGS. 6-1, 6-2, 6-3, 6-4, 6-5, 6-6, 6-7, 6-8, 6-9 and 6-10.
  • FIG. 5-2 illustrates a view of screen 50 in which a menu 55 associated with screen 50 is opened by the user. Navigating to a particular available WLAN in the list and then selecting a menu item 56 entitled “Connect” has the same effect as selecting the list item. Navigating to a particular available WLAN in the list and then selecting a menu item 57 entitled “Refresh” will cause device 1 to scan again for wireless local area networks, as described above. Navigating to a particular available WLAN in the list and then selecting a menu item 58 entitled “Manage Saved Wi-Fi Networks” will launch the WLAN profile management application, which is described in more detail below with respect to FIGS. 12-1 and 12-2.
  • Navigating to a particular available WLAN in the list and then selecting a menu item 59 entitled “Network Details” will result in a popup window being shown with details of the particular available WLAN, as shown in FIG. 5-3. In this example, the user has selected the available WLAN with the network name “Rosencrantz”, which has the strongest signal strength.
  • Preferred Connection Profiles
  • A user of device 1 may be able to designate one or more connection profiles of WLANs saved in the device as “preferred”. For example, when creating a connection profile of a WLAN, there may a check box or radio button or other graphical user-interface element that enables the designation of the connection profile as preferred. In another example, menu 22 associated with the WLAN profile management application may include a menu item (not shown) the text of which toggles between “Preferred” if a selected connection profile is not designated as preferred and “Not Preferred” if the selected connection profile is designated as preferred. Selecting that menu item will toggle the preferred/not preferred status of the selected connection profile. Other user interface means for enabling designation of one or more connection profiles as preferred or not preferred are also contemplated.
  • When displaying the results of scanning, available wireless local area networks matching preferred connection profiles may be treated differently than other available wireless local area networks. In one aspect, scan results may be filtered so that only matches to preferred connection profiles are displayed at the device. For example, the connection profiles named “Coffee Shop” and “Home” may have been designated as preferred and the results of the scanning may be such that there are available WLANs matching those connection profiles. As illustrated in FIG. 5-4, a screen 501 of available WLANs may display only those available WLANs that match one of the preferred connection profiles. To accomplish this, device 1 may include in a list of available WLANs those available WLANs for which a preferred connection profile is saved in device 1, and device 1 may exclude from the list any other available WLANs. Device 1 may then display the list or a portion thereof on its display.
  • In another aspect, a displayed list of available WLANs may distinguish in the list available WLANs for which a preferred connection profile is saved in device 1 from other available WLANs in the list. For example, the connection profiles named “Coffee Shop” and “Home” may have been designated as preferred and the results of the scanning may be such that there are available WLANs matching those connection profiles. As illustrated in FIG. 5-5, a screen 502 displaying a list of available WLANs may include a first sublist of available WLANs for which a preferred connection profile is saved in device 1 and a second sublist of the other available WLANs. The first sublist may include a header 504 that identifies the available WLANs in the sublist as preferred, and the second sublist may include a header 506 that is different than header 504.
  • One or more of the aspects of displaying a list of available WLANs that are described above with respect to FIGS. 5-1, 5-2 and 5-3 may also be applicable to the list of only those available WLANs that match one of the preferred connection profiles. Likewise, one or more of the aspects of displaying a list of available WLANs that are described above with respect to FIGS. 5-1, 5-2 and 5-3 may also be applicable to a list that distinguishes between available WLANs that match one of the preferred connection profiles and other available WLANs, and may be applicable to the first sublist, the second sublist or both.
  • FIGS. 6-1, 6-2, 6-3, 6-4, 6-5, 6-6, 6-7, 6-8, 6-9 and 6-10 are illustrations of an exemplary screen 60 for user input of security credentials for a wireless local area network. If device 1 has identified the selected WLAN as having a PSK security configuration, screen 60 will appear as in FIG. 6-1, with editable text fields 61 and 62 to enable the user to input a password. This is the case for the example with the selected WLAN having the network name “Rosencrantz”.
  • If device 1 has identified the selected WLAN as having a WEP security configuration, screen 60 will appear as in FIG. 6-2, with an editable text field 64 to enable the user to input a WEP key.
  • If device 1 has identified the selected WLAN as having an IEEE 802.1x security configuration, but is unable to which identify which Extensible Authentication Protocol (EAP) is being used, screen 60 will appear as in one of FIGS. 6-3, 6-4, 6-5, 6-6, 6-7, 6-8, 6-9 and 6-10, with a drop-down menu 65 of EAP-based security types.
  • In FIGS. 6-3, 6-4, 6-5, and 6-6, editable text fields 66 and 67 enable the user to input a user name and password. In FIGS. 6-7 and 6-8, the International Mobile Subscriber Identity (IMSI) of device 1 is displayed. In FIG. 6-9, a client certificate stored in device 1 is displayed. If more than one client certificate is stored in device 1, then as shown in FIG. 6-10, screen 60 includes a drop-down menu 68 listing the client certificates.
  • All of FIGS. 6-1, 6-2, 6-3, 6-4, 6-5, 6-6, 6-7, 6-8, 6-9 and 6-10 have a button 63 entitled “Next”, which when selected by the user will cause device 1 to attempt to connect to the selected WLAN, using the security credentials provided in screen 60.
  • FIG. 7 is an illustration of an exemplary screen 70 which may appear while the device is attempting to connect to the selected WLAN. Upon successfully connecting to a WLAN, device 1 obtains an Internet Protocol (IP) address. If device 1 successfully connects to the selected WLAN and a connection profile of the selected WLAN is already saved in device 1, then screen 70 closes and, returning briefly to FIG. 1, an icon 14 is displayed in home screen 2. Icon 14 indicates to the user that the device is connected to a WLAN.
  • If device 1 successfully connects to a WLAN for which a connection profile is not saved in device 1, a connection profile screen may be displayed. FIGS. 8-1 and 8-2 are illustrations of an exemplary screen 80 which may appear if the attempt to connect to the WLAN is successful and a connection profile is not saved for the WLAN. The user is asked whether to save the connection information (e.g. SSID, security credentials, other information gleaned from the scan result or the connection process) in a persistent connection profile. By saving a persistent connection profile, the user will not need to reenter the security credentials when connecting to this WLAN in the future. A “Yes”/“No” toggle button 81 is displayed. An editable text field 82 enables the user to input a name for the persistent connection profile. If button 81 is set to “Yes”, selecting a button 83 entitled “Next” causes device 1 to attempt to create a persistent connection profile for the newly connected WLAN with the connection profile name provided in text field 82. In this example, the user has provided the connection profile name “Suzie's Home” for the WLAN with the network name “Rosencrantz”.
  • If a connection profile with that connection profile name is already saved in device 1, a popup window 84 as shown in FIG. 8-2 is displayed to inform the user of this and to enable the user to select, via a “Yes” button 85 or a “No” button, whether to replace the existing connection profile. If the user selects “Yes”, then device 1 creates a persistent connection profile for the newly connected WLAN with the connection profile name provided by the user. If the user selects “No”, popup window 84 disappears and the user is able to provide a different connection profile name via editable text field 82.
  • If device 1 is unable to connect to the WLAN because the security credentials provided in one of FIGS. 6-1, 6-2, 6-3, 6-4, 6-5, 6-6, 6-7, 6-8, 6-9 and 6-10 does not match the requirements of the WLAN, then the user is informed of this, for example, via a screen 86 as shown in FIG. 8-3. Selecting a button 87 entitled “Back” will bring the user back to one of FIGS. 6-1, 6-2, 6-3, 6-4, 6-5, 6-6, 6-7, 6-8, 6-9 and 6-10. In another implementation, instead of screen 86, a popup window with a single button may be displayed over screen 70.
  • If device 1 is unable to connect because it is out of the coverage area of the WLAN, then the user is informed of this, for example, via a screen 88 as shown in FIG. 8-4. Screen 88 differs from screen 80 only in that a description 89 explaining that the device is out of the coverage area is displayed. By saving a persistent connection profile, the user will not need to reenter the security credentials when connecting to this WLAN in the future. This is helpful even in the situation where the user was unable to connect to the WLAN due to being out of the coverage area of the WLAN. If button 81 is set to “Yes”, selecting button 83 entitled “Next” causes device 1 to attempt to create a persistent connection profile for the newly connected WLAN with the connection profile name provided by the user. As with screen 80, if a connection profile with that connection profile name is already saved in device 1, popup window 84 will be displayed.
  • If, in screen 80 or screen 88, toggle button 81 is set to “No”, selecting button 83 entitled “Next” may cause device 1 to attempt to create a transient connection profile. A transient connection profile differs from a persistent connection profile in that its name is not chosen at creation by the user, and a transient connection profile has a limited lifetime. After a period of time, for example, 24 hours, a transient connection profile may be automatically deleted from the device without any user intervention. Alternatively, a transient connection profile may be stored in the device until overwritten with another transient connection profile. Persistent connection profiles, on the other hand, generally require user intervention in order to be deleted from the device.
  • Consider the situation where a user is in an area of WLAN coverage for a short period of time, for example, at an airport lounge. The user may choose not to save a persistent connection profile for the WLAN, knowing that he/she is not intending to be in that location for a long time. However, by saving a transient connection profile, if the device becomes disconnected from the WLAN, attempts to reconnect to the WLAN will be easier and require less intervention from the user, than if no connection information for the WLAN is stored in the device.
  • Transient connection profiles may be automatically assigned connection profile names, for example, “Temporary 1”, “Temporary 2”, etc. The SSID of the WLAN may be incorporated into the connection profile name of the transient connection profile.
  • If creation of the connection profile, whether persistent or transient, is successful, the device will proceed to display the next screen.
  • In alternate implementations, if in screen 80 or screen 88 select button 81 is set to “No”, selecting button 83 entitled “Next” may cause device to proceed to the next screen without creating any connection profile.
  • A virtual private network (VPN) is a private communications network used to communicate confidentially over a publicly accessible network. VPN message traffic can be carried over a public network infrastructure (e.g. the Internet) on top of standard protocols. VPNs are used, for example, to enable employees to connect securely to a corporate network. If a VPN client application is installed on device 1 and one or more VPN profiles have been defined, then the next screen following screen 80 or screen 88 is a VPN selection screen, as shown in FIGS. 9-1 and 9-2. Otherwise the next screen is a setup completion screen, as shown in FIGS. 10-1 and 10-2.
  • FIGS. 9-1 and 9-2 are illustrations of an exemplary screen 90 for VPN profile selection. Screen 90 is displayed only if one or more VPN profiles have been defined in device 1. In alternate implementations, screen 90 is always displayed and enables a user to define a VPN profile if none are defined yet.
  • If a single VPN profile is defined in device 1, screen 90 is displayed as shown in FIG. 9-1, with an indication of the VPN profile, e.g. the label “ABC-HQ”, displayed in a text field 92. If two or more VPN profiles are defined in device 1, screen 90 is displayed as shown in FIG. 9-2, with a drop-down menu 94 listing indications of the VPN profiles, for example, their labels.
  • A user specifies, via a “Yes”/“No” toggle button 96, whether to use one of the VPN profiles with the WLAN to which device 1 has just connected. If button 96 is set to “No”, selecting a button 98 entitled “Next” causes a setup completion screen to be displayed. If button 96 is set to “Yes”, selecting button 98 causes device 1 to attempt, using the VPN client application, to connect to establish a VPN connection according to the VPN profile which label is displayed in text field 92 or selected in drop-down menu 94. If a connection profile for the WLAN is saved, device 1 associates the VPN profile with the connection profile of the WLAN so that subsequent connections of the device to the WLAN will automatically attempt to establish a VPN connection according to the associated VPN profile after the device obtains an IP address.
  • FIGS. 10-1 and 10-2 are illustrations of an exemplary setup completion screen 100. By selecting a button 102 entitled “Finish”, screen 100 closes and icon 14 is displayed in home screen 2 (see FIG. 1) to indicate to the user that the device is connected to a WLAN. Screen 100 includes a message 103 informing the user that the connection profile of the WLAN to which device 1 has connected has been saved. Screen 100 also includes a button 104 entitled “Prioritize Wi-Fi Profiles” which, if selected, will close screen 100 and launch the profile management application.
  • Hotspot Registration
  • A hotspot is a venue that offers access to the Internet via a wireless local area network. Upon connecting to the WLAN, a WLAN client device is given an IP address. Access to a public network such as the Internet is provided by the WLAN via a gateway. The gateway may implement one or more IP filtering rules to limit IP addresses that can be accessed by the WLAN client device, thus providing access to what is known as a “walled garden”. Subscription may be required and fees may apply in order to gain access to the public network.
  • Once device 1 has successfully connected to a WLAN, it sends via the WLAN a hypertext transfer protocol (HTTP) request to a particular IP address that is not normally redirected. This occurs automatically in the background, without any intervention by the user and without providing any feedback to the user. If the device receives a redirection response to the HTTP request, then device 1 has detected that the WLAN to which it is connected is offered by a hotspot. In this situation, device 1 may display an indication of this. For example, device 1 may display screen 100 as it appears in FIG. 10-2, rather than as it appears in FIG. 10-1. As shown in FIG. 10-2, screen 100 includes a description 105 about hotspots and a button 106 entitled “Hotspot Registration”. Selecting button 106 launches a browser application of device 1 with an IP address that ought to trigger an IP filtering rule of the gateway. The browser will be redirected to a captive portal of the hotspot that may enable the user to register for access to the public network.
  • In an alternate implementation, upon detecting in the background that a WLAN to which device 1 has just connected is offered by a hotspot, where access to the Internet is provided by the wireless local area network via a gateway, a browser application of device 1 is automatically launched with an IP address that ought to trigger an IP filtering rule of the gateway.
  • Manually Adding Networks
  • Returning briefly to FIG. 3, if the user selects button 34 entitled “Manually Add Network”, the user will be prompted to specify the WLAN that the user wants device 1 to connect to. FIG. 11 is an illustration of an exemplary screen 110 that may appear after the user selects button 34. Using keyboard 4, the user may type the name of the network (SSID), which will appear in an editable text field 112. In the example shown in FIG. 11, the user has typed “BLUEBIRD”. If the user then presses a button 114 entitled “Next”, the user will be prompted to supply security credentials for the WLAN via screen 60, as described above with respect to FIGS. 6-1, 6-2, 6-3, 6-4, 6-5, 6-6, 6-7, 6-8, 6-9 and 6-10.
  • In an alternate implementation, when the user presses button 114, device 1 may scan for a WLAN having “BLUEBIRD” as its SSID. Device 1 may employ passive scanning techniques, active scanning techniques or any combination thereof. From the scan results, device 1 may identify whether the security configuration of the WLAN is none, WEP, PSK or IEEE 802.1x. If no security is required, device 1 may directly attempt to connect to the WLAN, and screen 70 will be displayed with the text “Connecting to BLUEBIRD . . . ” instead of “Connecting to Rosencrantz . . . ”. If security credentials are required, the user will be prompted to supply security credentials for the WLAN via screen 60, as described above with respect to FIGS. 6-1, 6-2, 6-3, 6-4, 6-5, 6-6, 6-7, 6-8, 6-9 and 6-10. If the scan results identify PSK as the configuration, screen 60 may appear as in FIG. 6-1. If the scan results identify WEP as the configuration, screen 60 may appear as in FIG. 6-2. If the scan results identify IEEE 802.1x but do not distinguish between the different types, screen 60 may appear with the drop-down options of security type restricted to the various EAP types.
  • WLAN Profile Management Application
  • FIGS. 12-1 and 12-2 are illustrations of exemplary screen 20 of a wireless local area network profile management application. Connection profiles of WLANs are listed in screen 20 in decreasing order of priority. The relative priority of connection profiles may affect the order in which those connection profiles are compared to scanning results and therefore may also affect the order in which the device attempts to connect to WLANs matching those connection profiles. Connection profiles may be created with the lowest relative priority, by default.
  • The connection profile of the WLAN with which device 1 is currently connected may be automatically selected when opening screen 20, as indicated by a highlight bar 120. Further visual indications of the connection profile of the WLAN with which device 1 is currently connected include the connection profile name in a text field 121 near the description “Active Wi-Fi Connection” and a checkmark 122 next to the connection profile in the list. If device 1 is currently connected to a WLAN for which a connection profile is not saved, then the network name of that WLAN is displayed in text field 121. If device 1 is not connected to a WLAN, then text field 121 is blank or displays the text “None”. A cross 123 identifies connection profiles of WLANs with which device 1 is not currently connected. If screen 20 is opened when device 1 is not connected to any WLAN, then the connection profile with the highest priority may be automatically selected. Alternatively, a newly created connection profile may be automatically selected in screen 20.
  • As is known in the art, scanning for WLANs may be performed in one of the following ways:
  • Manual Scans—A user initiates a scan for either a specific WLAN or for all available WLANs.
  • Background Profile Scans—Scans that occur from time to time in the background without user intervention, even if the device is already connected to a WLAN. Scan results are filtered to exclude WLANs having a received signal strength below a threshold. The enabled connection profile with the highest priority is then compared to the filtered scan results and if there is a match, the device attempts to connect to the matching WLAN. If there is no match, the enabled connection profile with the next highest priority is compared to the filtered scan results, and so on. Disabled connection profiles are not compared to the filtered scan results. The terms “enabled” and “disabled” are intended to distinguish between connection profiles of WLANs that are checked against results of background profile scans (and hence are termed “enabled”) and connection profiles of WLANs that are not checked against the results (and hence are termed “disabled”).
  • Neighbor Scans—Scans that occur from time to time in the background without user intervention, when the device is connected to a WLAN via an association with an access point. The scanning is restricted to neighboring access points within an IP subnetwork, based on the assumption that WLANs on different IP subnets have different SSIDs. If the quality of the wireless link between the device and the access point with which the device is associated drops below a threshold, the device may associate instead with a neighboring access point on the same IP subnetwork.
  • A visual indicator 124 of a broadcasting access point identifies enabled connection profiles and a visual indicator 125 of an access point with a cross identifies disabled connection profiles.
  • Returning briefly to FIG. 2, menu 22 associated with the WLAN profile management application applies to the selected connection profile. Selecting a menu item 25 entitled “Move Selection” enables the user to adjust the priority of the selected connection profile relative to the other connection profiles in the list by moving the selected connection profile within the list. For example, by adjusting a trackball or thumbwheel or by pressing the appropriate keys in a keyboard, the user may provide input to move the selected connection profile within the list. As the input is detected and processed, the list of connection profiles is updated to show the selected connection profile at a location in the list corresponding to the input. For example, if the input is a slight upwards motion of the trackball (where upwards is defined as the direction towards the top edge of the device), the selected connection profile will be displayed higher in the list than before.
  • The text of a menu item 26 toggles between “Disable” if the selected connection profile is enabled and “Enable” if the selected connection profile is disabled. Selecting menu item 26 will toggle the enabled/disabled status of the selected connection profile.
  • Selecting a menu item 27 entitled “Scan” will cause device 1 to scan for and attempt to connect to the WLAN matching the selected connection profile. A user may also initiate this by clicking the selected connection profile or providing other appropriate input (for example, pressing an “Enter” button on the keyboard) while a connection profile is selected and menu 22 is closed.
  • Returning to FIGS. 12-1 and 12-2, a Wi-Fi selection mode “Automatic”/“Manual” toggle button 126 allows the user to enable or disable background profile scanning. If button 126 is set to “Manual”, as shown in FIG. 12-2, then radio buttons 127 appear next to the connection profiles and the user may select which of the connection profiles to scan for and attempt to connect to.
  • Other Ways to Launch Wireless Connections Management Application
  • Returning briefly to FIG. 1, icon 14 may appear in the home screen when device 1 is connected to a WLAN. If device 1 also has a WWAN communication interface, an icon 16 may appear in the home screen when device 1 is connected to a WWAN. Likewise, if device 1 also has a WPAN communication interface, an icon (not shown) may appear in the home screen when device 1 is connected to a WPAN. Selecting any of icons 14, 16 and the WPAN icon may launch a wireless connections management application. List 8 also includes an icon 18 which if selected will launch the wireless connections management application.
  • FIG. 13 is an illustration of an exemplary screen 130 shown when the wireless connections management application is launched. Selecting a menu item 132 entitled “Set Up Wi-Fi Network” will launch the WLAN connection setup application described above, beginning at screen 30 (described above with respect to FIG. 3).
  • Details of Handheld Device
  • FIG. 14 is a block diagram of an exemplary handheld device 1400. For clarity, some components and features of handheld device 1400 are not shown in FIG. 15 and are not described explicitly below. Handheld device 1400 includes a processor 1402 and a memory 1404 coupled to processor 1402. Handheld device 1400 includes an audio input element 1406, for example a microphone, an audio output element 1408, for example, a speaker, and an audio coder-decoder (codec) 1410, however, the technology described herein is also applicable to devices without these audio components.
  • Handheld device 1400 includes a display 1412 coupled to processor 1402. Handheld device 1400 also includes one or more user input elements 1414 coupled to processor 1402, for example, a keyboard and a trackball. Handheld device 1400 may include additional user input and/or output elements that are not shown in FIG. 15, for example a thumbwheel. A keyboard may be embedded in full or in part within display 1412, i.e. display 1412 may be a touch screen.
  • Handheld device 1400 includes a WLAN communication interface 1416 coupled to processor 1402 and to an antenna 1418. Communication interface 1416 is compatible with one or more WLAN standards, for example, IEEE 802.11 or ETSI HIPERLAN, and includes a WLAN controller and a radio.
  • Handheld device 1400 optionally also includes a WWAN communication interface 1420 coupled to processor 1402 and to an antenna 1422. Communication interface 1420 is compatible with one or more WWAN standards, for example, cellular communication standards, and includes a WWAN controller and a radio.
  • Handheld device 1400 optionally also includes a WPAN communication interface 1424 coupled to processor 1402 and to an antenna 1426. Communication interface 1424 is compatible with one or more WPAN standards, for example, Bluetooth®, ZigBee™, radio frequency identification (RFID), ultra wideband (UWB) and the like.
  • Handheld device 1400 may optionally also include a Global Positioning System (GPS) receiver 1428 coupled to processor 1402 and to an antenna 1430.
  • Each communication interface includes a controller and a radio, and the radio is coupled to an antenna. Controllers may share the same hardware, but logically they are independent. Analog components of the radios may be shared, but digital components of the radios are most likely to be independent. Depending on the frequencies, antennas could be shared among the communication interfaces. By way of the communication interfaces and antennas, handheld device 1400 may be able to establish telephone and/or data communication sessions with other systems (not shown).
  • Data communication sessions may include data in the form of plain text, data files, voice files, image files, movie files, streaming audio, streaming video, animation, or any other suitable data form. A non-exhaustive list of examples for data communication sessions includes sending and receiving electronic mail (e-mail), sending and receiving instant messages, sending and receiving paging messages, sending and receiving short message service (SMS) messages, and any other suitable data communication sessions. For data communications supported by handheld device 1400, memory 1404 may store respective application modules to be executed by processor 1402, for example, an e-mail application module 1432, an SMS application module 1434, a paging application module 1436, an instant messaging application module 1438, and a web browser application module 1440.
  • Memory 1404 stores a system management application module 1442 and may optionally store other application modules, for example, an address book or contacts application module 1444 and a calendar application module 1446. These application modules are just examples, and the technology described herein is also applicable to handheld devices with a different set of application modules.
  • Memory 1404 may store executable code 1448 which, when executed by processor 1402, implements a wireless connection setup application, and executable code 1450 which, when executed by processor 1402, implements a wireless connection profile management application.
  • Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (20)

What is claimed is:
1. A method for displaying a list of available wireless local area networks, the method comprising:
displaying on a display of a wireless local area network ‘WLAN’ client device a list of wireless local area networks that are available to the WLAN client device, by displaying first in the list a WLAN to which the WLAN client device is currently connected, regardless of its received signal strength at the WLAN client device, and by displaying further in the list any other available wireless local area networks ordered by decreasing received signal strength at the WLAN client device.
2. A method for displaying a list of available wireless local area networks, the method comprising:
displaying on a display of a WLAN client device a list of wireless local area networks that are available to the WLAN client device, by distinguishing in the list available wireless local area networks for which a preferred connection profile is saved in the WLAN client device from any other available wireless local area networks.
3. The method of claim 2, wherein distinguishing available wireless local area networks for which a preferred connection profile is saved in the WLAN client device from any other available wireless local area networks comprises:
displaying the available wireless local area networks for which a preferred connection profile is saved in the WLAN client device in a sublist with a header that identifies the available wireless local area networks in the sublist as preferred; and
displaying any other available wireless local area networks in another sublist with a different header than the header.
4. A method for saving a connection profile of a wireless local area network ‘WLAN’, the method comprising:
obtaining information regarding a particular WLAN for which a connection profile is not stored in a WLAN client device;
attempting to connect to the particular WLAN;
displaying via a display of the WLAN client device that the attempt was unsuccessful; and
saving the information in a connection profile in the WLAN client device.
5. The method of claim 4, the information includes a network name of the particular WLAN, the method further comprising:
receiving the network name via a user input element of the WLAN client device.
6. The method of claim 4, the information includes a network name of the particular WLAN, the method further comprising:
gleaning the network name from a signal received at the WLAN client device over the particular WLAN.
7. A method for handling one or more virtual private network ‘VPN’ profiles defined in a wireless local area network ‘WLAN’ client device, the method comprising:
in response to connecting to a WLAN, enabling input, via a user input element of the WLAN client device, of an indication whether to attempt to establish a VPN connection over the WLAN.
8. The method of claim 7, further comprising:
if more than one VPN profile has been defined in the WLAN client device, enabling selection, via a user input element of the WLAN client device, of which VPN profile to use in attempting to establish the VPN connection over the WLAN.
9. The method of claim 8, further comprising:
receiving, via a user input element of the WLAN client device, an indication to attempt to establish a VPN connection over the WLAN;
receiving, via a user input element of the WLAN client device, an indication of which VPN profile to use in attempting to establish the VPN connection; and
associating the VPN profile for which the indication has been received with a connection profile of the WLAN that is saved or to be saved in the WLAN client device.
10. The method of claim 8, further comprising:
receiving, via a user input element of the WLAN client device, an indication to attempt to establish a VPN connection over the WLAN;
receiving, via a user input element of the WLAN client device, an indication of which VPN profile to use in attempting to establish the VPN connection; and
attempting to establish the VPN connection.
11. The method of claim 7, further comprising:
if a single VPN profile has been defined in the WLAN client device, displaying via a display of the WLAN client device an indication of the VPN profile.
12. The method of claim 11, further comprising:
receiving, via a user input element of the WLAN client device, an indication to attempt to establish a VPN connection over the WLAN; and
associating the VPN profile with a connection profile of the WLAN that is saved or to be saved in the WLAN client device.
13. The method of claim 11, further comprising:
receiving, via a user input element of the WLAN client device, an indication to attempt to establish a VPN connection over the WLAN; and
attempting to establish the VPN connection.
14. A method for handling hotspots, the method comprising:
detecting that a wireless local area network ‘WLAN’ to which a WLAN client device has just connected is offered by a hotspot, where access to a public network is provided by the WLAN via a gateway; and
launching a browser application of the WLAN client device with an Internet Protocol address that ought to trigger an Internet Protocol filtering rule of the gateway.
15. The method of claim 14, wherein launching the browser application occurs automatically in response to detecting that the WLAN is offered by a hotspot.
16. The method of claim 14, further comprising:
displaying via a display of the WLAN client device an indication that the WLAN is offered by a hotspot; and
receiving, via a user input element of the WLAN client device, an indication to register at the hotspot,
wherein launching the browser application occurs in response to receiving the indication to register at the hotspot.
17. The method of claim 14, wherein detecting that the WLAN is offered by a hotspot comprises:
sending a hypertext transfer protocol request via the WLAN, where the request is to an Internet Protocol address that is not normally redirected; and
receiving via the WLAN a redirection response to the request.
18. The method of claim 14, wherein detecting that the WLAN is offered by a hotspot occurs in the background.
19. A method for displaying a list of connection profiles of wireless local area networks, the method comprising:
displaying on a display of a wireless local area network ‘WLAN’ client device a list of connection profiles of wireless local area networks stored in the WLAN client device along with indications of relative priorities of the connection profiles, where the connection profiles are ordered in the list according to their decreasing relative priority, in which a newly created connection profile is automatically selected in the list.
20. The method of claim 19, further comprising:
automatically assigning a lowest relative priority to the newly created connection profile.
US11/943,332 2006-11-21 2007-11-20 WLAN Connection Setup Application and Profile Manager Abandoned US20080181187A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US11/943,332 US20080181187A1 (en) 2006-11-21 2007-11-20 WLAN Connection Setup Application and Profile Manager
US13/027,823 US8874764B2 (en) 2006-11-21 2011-02-15 Saving a connection profile when unable to connect to a wireless local area network
US13/027,806 US8595365B2 (en) 2006-11-21 2011-02-15 Handling virtual private network connections over a wireless local area network
US13/093,099 US20110238824A1 (en) 2006-11-21 2011-04-25 Wireless Local Area Network Hotspot Registration

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US86675306P 2006-11-21 2006-11-21
US11/943,332 US20080181187A1 (en) 2006-11-21 2007-11-20 WLAN Connection Setup Application and Profile Manager

Related Child Applications (3)

Application Number Title Priority Date Filing Date
US13/027,823 Division US8874764B2 (en) 2006-11-21 2011-02-15 Saving a connection profile when unable to connect to a wireless local area network
US13/027,806 Division US8595365B2 (en) 2006-11-21 2011-02-15 Handling virtual private network connections over a wireless local area network
US13/093,099 Division US20110238824A1 (en) 2006-11-21 2011-04-25 Wireless Local Area Network Hotspot Registration

Publications (1)

Publication Number Publication Date
US20080181187A1 true US20080181187A1 (en) 2008-07-31

Family

ID=39429336

Family Applications (4)

Application Number Title Priority Date Filing Date
US11/943,332 Abandoned US20080181187A1 (en) 2006-11-21 2007-11-20 WLAN Connection Setup Application and Profile Manager
US13/027,823 Active US8874764B2 (en) 2006-11-21 2011-02-15 Saving a connection profile when unable to connect to a wireless local area network
US13/027,806 Active US8595365B2 (en) 2006-11-21 2011-02-15 Handling virtual private network connections over a wireless local area network
US13/093,099 Abandoned US20110238824A1 (en) 2006-11-21 2011-04-25 Wireless Local Area Network Hotspot Registration

Family Applications After (3)

Application Number Title Priority Date Filing Date
US13/027,823 Active US8874764B2 (en) 2006-11-21 2011-02-15 Saving a connection profile when unable to connect to a wireless local area network
US13/027,806 Active US8595365B2 (en) 2006-11-21 2011-02-15 Handling virtual private network connections over a wireless local area network
US13/093,099 Abandoned US20110238824A1 (en) 2006-11-21 2011-04-25 Wireless Local Area Network Hotspot Registration

Country Status (5)

Country Link
US (4) US20080181187A1 (en)
EP (5) EP2084930B1 (en)
CN (1) CN101578900B (en)
CA (4) CA2636384C (en)
WO (5) WO2008061348A1 (en)

Cited By (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080034207A1 (en) * 2006-08-01 2008-02-07 Cisco Technology, Inc. Method and apparatus for selecting an appropriate authentication method on a client
US20080167050A1 (en) * 2007-01-05 2008-07-10 Stonestreet One, Inc. Method and system for managing user preferences for one or more software applications runing on a mobile computing device
US20080275992A1 (en) * 2005-02-09 2008-11-06 Access Systems Americas, Inc. System and method of managing connections between a computing system and an available network using a connection manager
US20090158216A1 (en) * 2007-12-14 2009-06-18 Sony Corporation Method and system for setting up a computer system at startup
US20090161639A1 (en) * 2007-12-07 2009-06-25 Mattias Ostergren Method and system for evaluating proximity to a wlan for a uma/gan compatible electronic device
US20090234953A1 (en) * 2008-03-11 2009-09-17 Palm, Inc. Apparatus and methods for integration of third party virtual private network solutions
US20090254662A1 (en) * 2008-04-07 2009-10-08 Ji-Hye Lee Method for updating connection profile in content delivery service
WO2009134209A1 (en) * 2008-05-02 2009-11-05 Creative Technology Ltd A method for enabling access to internet
US20090279492A1 (en) * 2008-05-12 2009-11-12 Research In Motion Limited Methods And Apparatus For Use In Facilitating Access To A Communication Service Via A WLAN Hotspot
US20110032857A1 (en) * 2008-04-18 2011-02-10 Nippon Telegraph And Telephone Corporation Wireless terminal device, Method of controlling wireless terminal device, and control program of wireless terminal device to station, station control method, and station control program
US20110065426A1 (en) * 2009-09-11 2011-03-17 Samsung Electronics Co., Ltd. METHOD AND NETWORK FOR DISPLAYING A CALLER ID IN WiMAX/GSM INTEGRATED SUPPORT TERMINAL
US20110154454A1 (en) * 2009-04-07 2011-06-23 Togewa Holding Ag Method and system for authenticating a network node in a uam-based wlan network
US20110228330A1 (en) * 2010-03-18 2011-09-22 Brother Kogyo Kabushiki Kaisha Wireless Communication System
CN102209323A (en) * 2010-03-30 2011-10-05 兄弟工业株式会社 Wireless communication device
JP2011197864A (en) * 2010-03-18 2011-10-06 Brother Industries Ltd Controlling device and computer program
US20110264735A1 (en) * 2007-11-27 2011-10-27 Ido Gaver Method, Device and System For Creating a Virtual Local Social Network
US20110268027A1 (en) * 2010-04-28 2011-11-03 Brother Kogyo Kabushiki Kaisha Wireless Communication Device
US20120029808A1 (en) * 2010-07-30 2012-02-02 Shin Kangsoo Apparatus and method for displaying service information provided in service zone
US20120062912A1 (en) * 2010-09-14 2012-03-15 Xerox Corporation Method, system and computer-usable medium for ranking networked rendering devices with visual cues
US20120144467A1 (en) * 2010-12-06 2012-06-07 Google Inc. Network Selection from a Menu
US20120329484A1 (en) * 2011-06-23 2012-12-27 Ariel Inventions Llc Locating mobile devices utilizing wi-fi information
US20130036450A1 (en) * 2011-08-03 2013-02-07 Research In Motion Limited Automatic disabling of enabled connection profile for wireless network
US20130107777A1 (en) * 2011-10-26 2013-05-02 Samsung Electronics Co., Ltd. Method and apparatus for scanning access points in a portable terminal
US20130155842A1 (en) * 2011-12-14 2013-06-20 Verizon Corporate Services Group Inc. Method and system for providing mobile wireless call failover
US20130182695A1 (en) * 2012-01-18 2013-07-18 Samsung Electronics Co., Ltd. Method and apparatus for establishing wireless local area network link between portable terminals
US20130215740A1 (en) * 2012-02-16 2013-08-22 Research In Motion Limited Method and apparatus for automatic vpn login on interface selection
WO2014004288A1 (en) * 2012-06-27 2014-01-03 J2 Global, Inc. Facilitating network login
US20140092889A1 (en) * 2008-05-09 2014-04-03 Marvell World Trade Ltd. Method and Apparatus for Providing Location-Aware Wi-Fi Access
US20140256256A1 (en) * 2011-10-21 2014-09-11 Lg Electronics Inc. Electronic device and a method of operating the same
US20150023336A1 (en) * 2013-07-16 2015-01-22 Qualcomm Connected Experiences, Inc. Communicating a headless onboardee device local wireless network scan to an onboarder device via a peer-to-peer protocol to assist an onboarding process
US20150049630A1 (en) * 2013-08-13 2015-02-19 International Business Machines Corporation Smart wireless access point analyzer
US20150235052A1 (en) * 2014-02-17 2015-08-20 Samsung Electronics Co., Ltd. Electronic device and method for protecting users privacy
US20150350871A1 (en) * 2011-06-30 2015-12-03 Vivek Gupta Mobile device and method for automatic connectivity, data offloading and roaming between networks
US20160021578A1 (en) * 2014-07-21 2016-01-21 International Business Machines Corporation Secure wifi using predictive analytics
JP2016054391A (en) * 2014-09-03 2016-04-14 キヤノン株式会社 Information processing device, control method of information processing device, and program
US9479595B2 (en) 2013-02-05 2016-10-25 Intel IP Corporation Online signup provisioning techniques for hotspot connections
JP2017501647A (en) * 2014-09-30 2017-01-12 小米科技有限責任公司Xiaomi Inc. Access point list display method, apparatus, program, and recording medium
CN106358264A (en) * 2016-11-08 2017-01-25 珠海市魅族科技有限公司 Network sharing method and terminal
US20170048737A1 (en) * 2015-08-12 2017-02-16 Acer Incorporated Method of controlling wlan measurement report and related apparatus using the same
US20170150533A1 (en) * 2015-11-19 2017-05-25 Nike, Inc. System, apparatus, and method for received signal strength indicator (rssi) based authentication
US9814091B2 (en) 2015-12-11 2017-11-07 Ricoh Company, Ltd. Information processing apparatus and computer program product
US20180115946A1 (en) * 2016-10-24 2018-04-26 International Business Machines Corporation TRUSTED METHOD FOR CONSUMING AND SHARING Wi-Fi INTERNET ACCESS
US9992671B2 (en) 2012-12-27 2018-06-05 Intel Corporation On-line signup server for provisioning of certificate credentials to wireless devices
US10051680B2 (en) 2013-02-21 2018-08-14 Samsung Electronics, Co., Ltd. Method and apparatus for connecting short-range wireless communication in terminal
US10341328B2 (en) 2011-07-21 2019-07-02 Intel Corporation Secure on-line sign-up and provisioning for Wi-Fi hotspots using a device-management protocol
DE102019205323A1 (en) * 2019-04-12 2020-10-15 Robert Bosch Gmbh Procedure for registering a participant in a network
US10931388B2 (en) * 2015-03-31 2021-02-23 Brother Kogyo Kabushiki Kaisha Display control device, display control method and non-transitory computer-readable medium storing instructions for display control
US20210160238A1 (en) * 2018-08-06 2021-05-27 Lianshang (xinchang) Network Technology Co., Ltd. Method, an apparatus and a storage medium for network connection
US11277788B2 (en) * 2016-08-01 2022-03-15 Samsung Electonics Co., Ltd Scan method in near-field wireless communication network and electronic device for implementing same
US20220337997A1 (en) * 2007-06-06 2022-10-20 Datavalet Technologies System and method for wireless device detection, recognition and visit profiling

Families Citing this family (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9043919B2 (en) 2008-10-21 2015-05-26 Lookout, Inc. Crawling multiple markets and correlating
JP4670946B2 (en) * 2008-12-04 2011-04-13 ブラザー工業株式会社 Wireless communication apparatus and program
US9065928B2 (en) * 2009-05-26 2015-06-23 Apple Inc. Space and time based device customization
EP2309790B1 (en) * 2009-10-11 2016-07-27 BlackBerry Limited Authentication failure in a wireless local area network
EP2309805B1 (en) 2009-10-11 2012-10-24 Research In Motion Limited Handling wrong WEP key and related battery drain and communication exchange failures
KR101719365B1 (en) * 2009-10-30 2017-03-23 삼성전자주식회사 Video call method and apparatus
EP2337312B1 (en) * 2009-12-21 2018-03-21 BlackBerry Limited Methods and apparatus for use in facilitating access to aggregator services for mobile communication devices via wireless communication networks
US8699379B2 (en) 2011-04-08 2014-04-15 Blackberry Limited Configuring mobile station according to type of wireless local area network (WLAN) deployment
EP3018940B1 (en) 2011-04-08 2017-10-18 BlackBerry Limited Configuration of a mobile station according to the type of wireless local area network (wlan) deployment
US20130132574A1 (en) * 2011-05-12 2013-05-23 Ariel Inventions Llc Transmitting and receiving information associated with wi-fi hotspots
US8929817B2 (en) 2011-05-13 2015-01-06 Nokia Corporation Sensor-based touch inquiry control
US8965285B2 (en) * 2011-05-13 2015-02-24 Nokia Corporation Touch inquiry
US8929816B2 (en) 2011-05-13 2015-01-06 Nokia Corporation Multiple apparatus selection via touch
US8938196B2 (en) * 2011-05-18 2015-01-20 Radius Networks Inc. System and method for delivering content to a wireless station
EP2555546B1 (en) * 2011-08-03 2015-05-06 BlackBerry Limited Automatic disabling of enabled connection profile for wireless network
CN102300287A (en) * 2011-08-12 2011-12-28 盛乐信息技术(上海)有限公司 Wireless hotspot connection method and apparatus thereof
EP2584768B1 (en) * 2011-10-21 2015-04-01 LG Electronics Inc. Mobile terminal and control method of the same
KR20130048035A (en) * 2011-11-01 2013-05-09 엘지전자 주식회사 Media apparatus, contents server, and method for operating the same
EP2642795A1 (en) * 2012-03-20 2013-09-25 Giesecke & Devrient GmbH Methods and devices for accessing a wireless local area network
CN103379480B (en) * 2012-04-17 2019-03-01 腾讯科技(深圳)有限公司 Wireless network connecting method and device
US9589129B2 (en) 2012-06-05 2017-03-07 Lookout, Inc. Determining source of side-loaded software
US9407443B2 (en) 2012-06-05 2016-08-02 Lookout, Inc. Component analysis of software applications on computing devices
CN103517341B (en) * 2012-06-29 2017-06-20 中国移动通信集团公司 Split the method, system and device of flow in a kind of WLAN
ES2582280T3 (en) * 2012-07-05 2016-09-12 Ernst Wojak Method for operating a mobile device, mobile device and method for automatically sending a notification
US9173068B2 (en) * 2012-07-05 2015-10-27 Ernst Wojak Method for operating a mobile radio apparatus, mobile radio apparatus as well as method for automatically transmitting a message
DE102012106044B8 (en) * 2012-07-05 2015-06-18 Capinvision AG Method for operating a mobile device, mobile device and method for automatically sending a message
USD748114S1 (en) * 2012-08-17 2016-01-26 Blackberry Limited Display screen with graphical user interface
CN102905348B (en) * 2012-09-18 2016-12-21 陕西海创中盈信息技术有限公司 A kind of contactless information transmission system based on intelligent terminal and transmission method
US9208215B2 (en) 2012-12-27 2015-12-08 Lookout, Inc. User classification based on data gathered from a computing device
EP2939368A4 (en) * 2012-12-31 2016-01-13 Aastra Technologies Ltd Remote vpn provisioning of an endpoint
CA2920947A1 (en) 2013-07-01 2015-01-08 Skydrop Holdings, Llc Water reduction optimizing irrigation protocols
TWI507026B (en) * 2013-07-26 2015-11-01 Sonix Technology Co Ltd Network surveillance system, wireless network surveillance apparatus and setting method thereof
US9642008B2 (en) 2013-10-25 2017-05-02 Lookout, Inc. System and method for creating and assigning a policy for a mobile communications device based on personal data
US9973534B2 (en) 2013-11-04 2018-05-15 Lookout, Inc. Methods and systems for secure network connections
US9451511B2 (en) 2014-05-08 2016-09-20 Qualcomm Incorporated Method and apparatus for providing wireless connection quality guidance
US9696414B2 (en) * 2014-05-15 2017-07-04 Sony Corporation Proximity detection of candidate companion display device in same room as primary display using sonic signaling
US10070291B2 (en) 2014-05-19 2018-09-04 Sony Corporation Proximity detection of candidate companion display device in same room as primary display using low energy bluetooth
US9860297B2 (en) 2014-06-02 2018-01-02 Nokia Technologies Oy Method, apparatus, and computer program product for media selection for moving user
US9635690B2 (en) 2014-06-24 2017-04-25 Nokia Technologies Oy Method, apparatus, and computer program product for improving security for wireless communication
US9338635B2 (en) 2014-07-01 2016-05-10 Nokia Technologies Oy Method, apparatus, and computer program product for device tracking
US9265080B1 (en) 2014-10-01 2016-02-16 Nokia Technologies Oy Method, apparatus, and computer program product for multi-device output mode configuration
CN104684048B (en) * 2015-03-04 2019-06-04 小米科技有限责任公司 WIFI list shows method and apparatus
WO2016178816A1 (en) 2015-05-01 2016-11-10 Lookout, Inc. Determining source of side-loaded software
US10009329B2 (en) 2015-06-23 2018-06-26 Microsoft Technology Licensing, Llc Learned roving authentication profiles
JP6560559B2 (en) 2015-08-10 2019-08-14 キヤノン株式会社 Information processing apparatus, information processing apparatus control method, and program
PL3148157T3 (en) * 2015-09-22 2018-04-30 Comptel Oyj Method and system of identifying an access request of an application on a mobile device in a telecommunication network
US9866530B2 (en) * 2015-10-05 2018-01-09 Zyxel Communications, Inc. Method and apparatus for provision of secure connection
JP6714813B2 (en) * 2015-11-27 2020-07-01 セイコーエプソン株式会社 Electronic device, wireless communication method, and program
CN105373297A (en) * 2015-12-10 2016-03-02 珠海市君天电子科技有限公司 WiFi name collection method and device
CN105898842A (en) * 2015-12-11 2016-08-24 乐视移动智能信息技术(北京)有限公司 WiFi (Wireless Fidelity) list generation method and terminal.
US11496579B2 (en) * 2016-01-19 2022-11-08 Comcast Cable Communications, Llc Connection manager
CN107241679B (en) * 2016-03-29 2022-01-04 阿里巴巴集团控股有限公司 Connection establishing method, information sending method, message sending method and device
CN107534930B (en) * 2016-03-30 2021-07-16 华为技术有限公司 Recommendation method of Wi-Fi hot spot, terminal and graphical user interface
US10440053B2 (en) 2016-05-31 2019-10-08 Lookout, Inc. Methods and systems for detecting and preventing network connection compromise
US10904211B2 (en) 2017-01-21 2021-01-26 Verisign, Inc. Systems, devices, and methods for generating a domain name using a user interface
CN106792699A (en) 2017-02-20 2017-05-31 广东欧珀移动通信有限公司 A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal
US10218697B2 (en) 2017-06-09 2019-02-26 Lookout, Inc. Use of device risk evaluation to manage access to services
USD844649S1 (en) 2017-07-28 2019-04-02 Verisign, Inc. Display screen or portion thereof with a sequential graphical user interface
USD882602S1 (en) 2017-07-28 2020-04-28 Verisign, Inc. Display screen or portion thereof with a sequential graphical user interface of a mobile device
CN108228289A (en) * 2017-11-30 2018-06-29 维沃移动通信有限公司 A kind of interface display method and device
CN108738105B (en) * 2018-05-31 2021-08-06 上海尚往网络科技有限公司 Wireless access point sequencing method and device
KR20200054565A (en) 2018-11-12 2020-05-20 삼성전자주식회사 Electronic device and control method thereof

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5870744A (en) * 1997-06-30 1999-02-09 Intel Corporation Virtual people networking
US5903832A (en) * 1995-12-21 1999-05-11 Nokia Mobile Phones Llimited Mobile terminal having enhanced system selection capability
US20030003933A1 (en) * 2001-06-27 2003-01-02 Intel Corporation Mobile client for multi-service provider network environment
US20030219022A1 (en) * 2002-01-28 2003-11-27 Hughes Electronics Method and system for utilizing virtual private network (VPN) connections in a performance enhanced network
US6718339B2 (en) * 2001-08-31 2004-04-06 Sharp Laboratories Of America, Inc. System and method for controlling a profile's lifetime in a limited memory store device
US20040077341A1 (en) * 2002-10-17 2004-04-22 Chandranmenon Girish P. Multi-interface mobility client
US20040114601A1 (en) * 2002-09-02 2004-06-17 Hiroyuki Watanabe Electronic device, communication environment setting method, and program
US20050181734A1 (en) * 2005-01-21 2005-08-18 Knightsbridge Wireless Inc. Automatic connection of a mobile device to a wireless network
US6961762B1 (en) * 2000-02-14 2005-11-01 Sygate Technologies, Inc. Automatic switching network points based on configuration profiles
US20050260973A1 (en) * 2004-05-24 2005-11-24 Van De Groenendaal Joannes G Wireless manager and method for managing wireless devices
US20060174127A1 (en) * 2004-11-05 2006-08-03 Asawaree Kalavade Network access server (NAS) discovery and associated automated authentication in heterogenous public hotspot networks
US20060173844A1 (en) * 2003-03-14 2006-08-03 Junbiao Zhang Automatic configuration of client terminal in public hot spot
US20060209773A1 (en) * 2004-12-28 2006-09-21 Hundal Sukhdeep S Method and system for enhanced wireless communications
US20060242305A1 (en) * 2005-04-25 2006-10-26 Telefonaktiebolaget L M Ericsson (Publ) VPN Proxy Management Object
US20070067446A1 (en) * 2005-09-16 2007-03-22 Microsoft Corporation Connecting to different network types through a common user interface
US20070249365A1 (en) * 2006-04-20 2007-10-25 Sony Ericsson Mobile Communications Ab Device, method and computer program for connecting a mobile device to a wireless network
US20070264991A1 (en) * 2006-05-15 2007-11-15 Microsoft Corporation Services near me: discovering and connecting to available wireless services utilizing proximity discovery
US7395341B2 (en) * 2003-08-15 2008-07-01 Fiberlink Communications Corporation System, method, apparatus and computer program product for facilitating digital communications
US20080281952A1 (en) * 2007-05-08 2008-11-13 Research In Motion Limited System and method for managing connections for networks used by a communication device
US20090080390A1 (en) * 2005-03-18 2009-03-26 Beijing Lenove Software Ltd. Shangdi Information Industry Base Haidian District Method of Discovering Devices Located in Different Wireless Networks
US20090300722A1 (en) * 2005-12-16 2009-12-03 Nokia Corporation Support for integrated wlan hotspot clients

Family Cites Families (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6636894B1 (en) * 1998-12-08 2003-10-21 Nomadix, Inc. Systems and methods for redirecting users having transparent computer access to a network using a gateway device having redirection capability
WO2001041392A2 (en) * 1999-11-18 2001-06-07 Singapore Telecommunications Limited Virtual private network selection
US7103661B2 (en) 2000-07-12 2006-09-05 John Raymond Klein Auto configuration of portable computers for use in wireless local area networks
US20030204748A1 (en) * 2002-04-30 2003-10-30 Tom Chiu Auto-detection of wireless network accessibility
JP3988585B2 (en) * 2002-08-27 2007-10-10 日本電気株式会社 Public wireless LAN service area notification apparatus and method
KR100625654B1 (en) * 2002-08-29 2006-09-20 에스케이 텔레콤주식회사 Decision Method Of Access System Based On WLAN Signal Strength In Wireless LAN and Mobile Interworking System and Mobile Terminal Equipment Therefor
AU2003263545A1 (en) 2002-10-02 2004-04-23 Koninklijke Philips Electronics N.V. Smart connection management of portable devices
US7515569B2 (en) 2002-11-27 2009-04-07 Agere Systems, Inc. Access control for wireless systems
US7590708B2 (en) * 2003-02-24 2009-09-15 Qualcomm, Incorporated Wireless local access network system detection and selection
JP2007525731A (en) * 2003-04-29 2007-09-06 アザイア・ネットワークス・インコーポレーテッド Method and system for providing SIM-based roaming to an existing WLAN public access infrastructure
CN1269368C (en) 2003-06-19 2006-08-09 大唐移动通信设备有限公司 Method for controlling cross-region switching in mobile communication system
JP2005039758A (en) * 2003-06-24 2005-02-10 Alps Electric Co Ltd Method for accessing access point in wireless lan, and station
FI20030967A (en) 2003-06-27 2004-12-28 Nokia Corp Selection of connection settings
US20070140214A1 (en) * 2003-07-24 2007-06-21 Pal Zoltan Method for accessing a packet-switched network financed by a provider for electronic trade and payment and for running a telecommunication system based on a partnership bonus principle
US7762470B2 (en) * 2003-11-17 2010-07-27 Dpd Patent Trust Ltd. RFID token with multiple interface controller
JP2005176021A (en) 2003-12-12 2005-06-30 Toshiba Corp Information processor and program
US20050254435A1 (en) 2003-12-23 2005-11-17 Moakley George P Method and system for selecting network connections in a multi-network environment
JP4709166B2 (en) 2004-02-09 2011-06-22 パームソース・インコーポレイテッド Method and system for a security model for a computer device
US6965576B1 (en) 2004-04-21 2005-11-15 Telcordia Technologies, Inc. Automatic configuration of WLAN for mobile users
WO2006012058A1 (en) * 2004-06-28 2006-02-02 Japan Communications, Inc. Systems and methods for mutual authentication of network
US20080137622A1 (en) * 2004-08-25 2008-06-12 Levi Russell Method and System for Connecting to a Network Via a Wireless Local Area Network
US7962136B2 (en) * 2004-09-15 2011-06-14 Research In Motion Limited Handheld electronic device including preferred network selection, and associated method
EP1638357B1 (en) * 2004-09-15 2007-05-02 Research In Motion Limited Handheld electronic device including preferred network selection, and associated method
US7738488B2 (en) * 2004-09-15 2010-06-15 Tekelec Methods, systems, and computer program products for providing wireless-fidelity (Wi-Fi) gateway visitor location register (VLR) functionality
US7389122B2 (en) * 2004-12-17 2008-06-17 Intel Corporation Method and apparatus to provide a continuous useable wireless network connection
TW200622744A (en) * 2004-12-20 2006-07-01 Inst Information Industry Public wireless local area network roaming identity recognition method
US7603119B1 (en) * 2005-03-16 2009-10-13 Sprint Spectrum L.P. Automatic over-the-air updating of a preferred roaming list (PRL) in a multi-mode device, based on an account association between the device and a wireless local area network (WLAN) access point
US7568220B2 (en) * 2005-04-19 2009-07-28 Cisco Technology, Inc. Connecting VPN users in a public network
US20060265501A1 (en) * 2005-05-20 2006-11-23 Anchorfree Wireless System and method for enabling wireless internet access in public areas
TW200701707A (en) * 2005-06-22 2007-01-01 Mitac Technology Corp System and method for switching internet connection settings according to internet environment
US7685264B2 (en) 2005-08-30 2010-03-23 Microsoft Corporation System displaying a collection of network settings for a user to adjust and associate the settings with a network profile
US7920531B2 (en) * 2005-10-11 2011-04-05 Hewlett-Packard Development Company, L.P. Technique for managing wireless networks
US20070130468A1 (en) 2005-12-07 2007-06-07 Microsoft Corporation Network connection identification
US20070178933A1 (en) * 2006-01-30 2007-08-02 Sony Ericsson Mobile Communications Ab Wireless communication network selection
US7903817B2 (en) 2006-03-02 2011-03-08 Cisco Technology, Inc. System and method for wireless network profile provisioning
US9319967B2 (en) * 2006-05-15 2016-04-19 Boingo Wireless, Inc. Network access point detection and use
US8245284B2 (en) * 2006-10-05 2012-08-14 Microsoft Corporation Extensible network discovery
US8358638B2 (en) * 2007-05-24 2013-01-22 Wefi, Inc. Dynamically created and expanded wireless network
US7894837B2 (en) * 2007-10-05 2011-02-22 Zipit Wireless, Inc. Instant messaging terminal adapted for wireless communication access points

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5903832A (en) * 1995-12-21 1999-05-11 Nokia Mobile Phones Llimited Mobile terminal having enhanced system selection capability
US5870744A (en) * 1997-06-30 1999-02-09 Intel Corporation Virtual people networking
US6961762B1 (en) * 2000-02-14 2005-11-01 Sygate Technologies, Inc. Automatic switching network points based on configuration profiles
US20030003933A1 (en) * 2001-06-27 2003-01-02 Intel Corporation Mobile client for multi-service provider network environment
US6718339B2 (en) * 2001-08-31 2004-04-06 Sharp Laboratories Of America, Inc. System and method for controlling a profile's lifetime in a limited memory store device
US20030219022A1 (en) * 2002-01-28 2003-11-27 Hughes Electronics Method and system for utilizing virtual private network (VPN) connections in a performance enhanced network
US20040114601A1 (en) * 2002-09-02 2004-06-17 Hiroyuki Watanabe Electronic device, communication environment setting method, and program
US20040077341A1 (en) * 2002-10-17 2004-04-22 Chandranmenon Girish P. Multi-interface mobility client
US20060173844A1 (en) * 2003-03-14 2006-08-03 Junbiao Zhang Automatic configuration of client terminal in public hot spot
US7395341B2 (en) * 2003-08-15 2008-07-01 Fiberlink Communications Corporation System, method, apparatus and computer program product for facilitating digital communications
US20050260973A1 (en) * 2004-05-24 2005-11-24 Van De Groenendaal Joannes G Wireless manager and method for managing wireless devices
US20060174127A1 (en) * 2004-11-05 2006-08-03 Asawaree Kalavade Network access server (NAS) discovery and associated automated authentication in heterogenous public hotspot networks
US20060209773A1 (en) * 2004-12-28 2006-09-21 Hundal Sukhdeep S Method and system for enhanced wireless communications
US20050181734A1 (en) * 2005-01-21 2005-08-18 Knightsbridge Wireless Inc. Automatic connection of a mobile device to a wireless network
US20090080390A1 (en) * 2005-03-18 2009-03-26 Beijing Lenove Software Ltd. Shangdi Information Industry Base Haidian District Method of Discovering Devices Located in Different Wireless Networks
US20060242305A1 (en) * 2005-04-25 2006-10-26 Telefonaktiebolaget L M Ericsson (Publ) VPN Proxy Management Object
US20070067446A1 (en) * 2005-09-16 2007-03-22 Microsoft Corporation Connecting to different network types through a common user interface
US20090300722A1 (en) * 2005-12-16 2009-12-03 Nokia Corporation Support for integrated wlan hotspot clients
US20070249365A1 (en) * 2006-04-20 2007-10-25 Sony Ericsson Mobile Communications Ab Device, method and computer program for connecting a mobile device to a wireless network
US20070264991A1 (en) * 2006-05-15 2007-11-15 Microsoft Corporation Services near me: discovering and connecting to available wireless services utilizing proximity discovery
US20080281952A1 (en) * 2007-05-08 2008-11-13 Research In Motion Limited System and method for managing connections for networks used by a communication device

Cited By (106)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080275992A1 (en) * 2005-02-09 2008-11-06 Access Systems Americas, Inc. System and method of managing connections between a computing system and an available network using a connection manager
US20080034207A1 (en) * 2006-08-01 2008-02-07 Cisco Technology, Inc. Method and apparatus for selecting an appropriate authentication method on a client
US7966489B2 (en) * 2006-08-01 2011-06-21 Cisco Technology, Inc. Method and apparatus for selecting an appropriate authentication method on a client
US20080167050A1 (en) * 2007-01-05 2008-07-10 Stonestreet One, Inc. Method and system for managing user preferences for one or more software applications runing on a mobile computing device
US20220337997A1 (en) * 2007-06-06 2022-10-20 Datavalet Technologies System and method for wireless device detection, recognition and visit profiling
US20110264735A1 (en) * 2007-11-27 2011-10-27 Ido Gaver Method, Device and System For Creating a Virtual Local Social Network
US8959175B2 (en) * 2007-11-27 2015-02-17 Loyalblocks Ltd. Method, device and system for creating a virtual local social network
US20230188966A1 (en) * 2007-11-27 2023-06-15 Ido Gaver Method, Device and System For Creating A Virtual Local Social Network
US10028076B2 (en) * 2007-11-27 2018-07-17 Loyalblocks Ltd. Method, device and system for creating a virtual local social network
US8321525B2 (en) * 2007-11-27 2012-11-27 Loyalblocks Ltd. Method, device and system for creating a virtual local social network
US11540103B2 (en) * 2007-11-27 2022-12-27 Wix.Com Ltd. Method, device and system for creating a virtual local social network
US20130173704A1 (en) * 2007-11-27 2013-07-04 Loyalblocks Ltd. Method, Device and System for Creating a Virtual Local Social Network
US20150271626A1 (en) * 2007-11-27 2015-09-24 Loyalblocks Ltd. Method, Device and System for Creating a Virtual Local Social Network
US20200112843A1 (en) * 2007-11-27 2020-04-09 Loyalblocks Ltd. Method, Device and System For Creating A Virtual Local Social Network
US20090161639A1 (en) * 2007-12-07 2009-06-25 Mattias Ostergren Method and system for evaluating proximity to a wlan for a uma/gan compatible electronic device
US8050243B2 (en) * 2007-12-07 2011-11-01 Sony Ericsson Mobile Communications Ab Method and system for evaluating proximity to a WLAN for a UMA/GAN compatible electronic device
US20090158216A1 (en) * 2007-12-14 2009-06-18 Sony Corporation Method and system for setting up a computer system at startup
US20090234953A1 (en) * 2008-03-11 2009-09-17 Palm, Inc. Apparatus and methods for integration of third party virtual private network solutions
US20090254662A1 (en) * 2008-04-07 2009-10-08 Ji-Hye Lee Method for updating connection profile in content delivery service
US8949437B2 (en) * 2008-04-07 2015-02-03 Lg Electronics Inc. Method for updating connection profile in content delivery service
US20110087729A1 (en) * 2008-04-07 2011-04-14 Ji-Hye Lee Method for updating connection profile in content delivery service
US7882246B2 (en) * 2008-04-07 2011-02-01 Lg Electronics Inc. Method for updating connection profile in content delivery service
US8917642B2 (en) * 2008-04-18 2014-12-23 Nippon Telegraph And Telephone Corporation Station, station control method, and station control program
US20110032857A1 (en) * 2008-04-18 2011-02-10 Nippon Telegraph And Telephone Corporation Wireless terminal device, Method of controlling wireless terminal device, and control program of wireless terminal device to station, station control method, and station control program
WO2009134209A1 (en) * 2008-05-02 2009-11-05 Creative Technology Ltd A method for enabling access to internet
US9374775B2 (en) * 2008-05-09 2016-06-21 Marvell World Trade Ltd. Method and apparatus for providing location-aware Wi-Fi access
US20140092889A1 (en) * 2008-05-09 2014-04-03 Marvell World Trade Ltd. Method and Apparatus for Providing Location-Aware Wi-Fi Access
US9179399B2 (en) 2008-05-12 2015-11-03 Blackberry Limited Methods and apparatus for use in facilitating access to a communication service via a WLAN hotspot
US10477468B2 (en) 2008-05-12 2019-11-12 Blackberry Limited Methods and apparatus for use in facilitating access to a communication service via a WLAN hotspot
US20090279492A1 (en) * 2008-05-12 2009-11-12 Research In Motion Limited Methods And Apparatus For Use In Facilitating Access To A Communication Service Via A WLAN Hotspot
US9888437B2 (en) 2008-05-12 2018-02-06 Blackberry Limited Methods and apparatus for use in facilitating access to a communication service via a WLAN hotspot
US8806587B2 (en) * 2009-04-07 2014-08-12 Togewa Holding Ag Method and system for authenticating a network node in a UAM-based WLAN network
US9015815B2 (en) 2009-04-07 2015-04-21 Togewa Holding Ag Method and system for authenticating a network node in a UAM-based WLAN network
US20110154454A1 (en) * 2009-04-07 2011-06-23 Togewa Holding Ag Method and system for authenticating a network node in a uam-based wlan network
US20110065426A1 (en) * 2009-09-11 2011-03-17 Samsung Electronics Co., Ltd. METHOD AND NETWORK FOR DISPLAYING A CALLER ID IN WiMAX/GSM INTEGRATED SUPPORT TERMINAL
US8607048B2 (en) * 2010-03-18 2013-12-10 Brother Kogyo Kabushiki Kaisha Wireless communication system
JP2011199458A (en) * 2010-03-18 2011-10-06 Brother Industries Ltd Wireless communication system
US20110228330A1 (en) * 2010-03-18 2011-09-22 Brother Kogyo Kabushiki Kaisha Wireless Communication System
JP2011197864A (en) * 2010-03-18 2011-10-06 Brother Industries Ltd Controlling device and computer program
CN102209323B (en) * 2010-03-30 2015-05-13 兄弟工业株式会社 Wireless communication device
CN102209323A (en) * 2010-03-30 2011-10-05 兄弟工业株式会社 Wireless communication device
US8774026B2 (en) * 2010-03-30 2014-07-08 Brother Kogyo Kabushiki Kaisha Wireless communication device
US20110242983A1 (en) * 2010-03-30 2011-10-06 Brother Kogyo Kabushiki Kaisha Wireless Communication Device
US8774144B2 (en) * 2010-04-28 2014-07-08 Brother Kogyo Kabushiki Kaisha Wireless communication device
US20110268027A1 (en) * 2010-04-28 2011-11-03 Brother Kogyo Kabushiki Kaisha Wireless Communication Device
US9106308B2 (en) 2010-04-28 2015-08-11 Brother Kogyo Kabushiki Kaisha Wireless communication device
US20120029808A1 (en) * 2010-07-30 2012-02-02 Shin Kangsoo Apparatus and method for displaying service information provided in service zone
US9681368B2 (en) * 2010-07-30 2017-06-13 Lg Electronics Inc. Apparatus and method for displaying service information provided in service zone
US9049315B2 (en) * 2010-09-14 2015-06-02 Xerox Corporation Method, system and computer-usable medium for ranking networked rendering devices with visual cues
US20120062912A1 (en) * 2010-09-14 2012-03-15 Xerox Corporation Method, system and computer-usable medium for ranking networked rendering devices with visual cues
US20120144467A1 (en) * 2010-12-06 2012-06-07 Google Inc. Network Selection from a Menu
US20120144469A1 (en) * 2010-12-06 2012-06-07 Google Inc. Network Selection From A Menu
US20120329484A1 (en) * 2011-06-23 2012-12-27 Ariel Inventions Llc Locating mobile devices utilizing wi-fi information
US10349263B2 (en) * 2011-06-30 2019-07-09 Intel Corporation Mobile device and method for automatic connectivity, data offloading and roaming between networks
US9906940B2 (en) * 2011-06-30 2018-02-27 Intel Corporation Mobile device and method for automatic connectivity, data offloading and roaming between networks
US20150350871A1 (en) * 2011-06-30 2015-12-03 Vivek Gupta Mobile device and method for automatic connectivity, data offloading and roaming between networks
US10341328B2 (en) 2011-07-21 2019-07-02 Intel Corporation Secure on-line sign-up and provisioning for Wi-Fi hotspots using a device-management protocol
US20130036450A1 (en) * 2011-08-03 2013-02-07 Research In Motion Limited Automatic disabling of enabled connection profile for wireless network
US8732798B2 (en) * 2011-08-03 2014-05-20 Blackberry Limited Automatic disabling of enabled connection profile for wireless network
US9713043B2 (en) 2011-10-21 2017-07-18 Lg Electronics Inc. Electronic device and a method of operating the same
US20140256256A1 (en) * 2011-10-21 2014-09-11 Lg Electronics Inc. Electronic device and a method of operating the same
US9379779B2 (en) * 2011-10-21 2016-06-28 Lg Electronics Inc. Electronic device and a method of operating the same
US11246091B2 (en) 2011-10-26 2022-02-08 Samsung Electronics Co., Ltd. Method and apparatus for scanning access points in a portable terminal
US20130107777A1 (en) * 2011-10-26 2013-05-02 Samsung Electronics Co., Ltd. Method and apparatus for scanning access points in a portable terminal
US10681628B2 (en) 2011-10-26 2020-06-09 Samsung Electronics Co., Ltd. Method and apparatus for scanning access points in a portable terminal
US20130155842A1 (en) * 2011-12-14 2013-06-20 Verizon Corporate Services Group Inc. Method and system for providing mobile wireless call failover
US8964533B2 (en) * 2011-12-14 2015-02-24 Verizon Patent And Licensing Inc. Method and system for providing mobile wireless call failover
US9241369B2 (en) * 2012-01-18 2016-01-19 Samsung Electronics Co., Ltd. Method and apparatus for establishing wireless local area network link between portable terminals
US20130182695A1 (en) * 2012-01-18 2013-07-18 Samsung Electronics Co., Ltd. Method and apparatus for establishing wireless local area network link between portable terminals
US20130215740A1 (en) * 2012-02-16 2013-08-22 Research In Motion Limited Method and apparatus for automatic vpn login on interface selection
US9077622B2 (en) * 2012-02-16 2015-07-07 Blackberry Limited Method and apparatus for automatic VPN login on interface selection
WO2014004288A1 (en) * 2012-06-27 2014-01-03 J2 Global, Inc. Facilitating network login
US9699174B2 (en) 2012-06-27 2017-07-04 Advanced Messaging Technologies, Inc. Facilitating network login
US10601812B2 (en) 2012-06-27 2020-03-24 Advanced Messaging Technologies, Inc. Facilitating access to protected content by commonly owned devices of a user
US9258704B2 (en) 2012-06-27 2016-02-09 Advanced Messaging Technologies, Inc. Facilitating network login
US9992671B2 (en) 2012-12-27 2018-06-05 Intel Corporation On-line signup server for provisioning of certificate credentials to wireless devices
US9479595B2 (en) 2013-02-05 2016-10-25 Intel IP Corporation Online signup provisioning techniques for hotspot connections
US10313449B2 (en) 2013-02-05 2019-06-04 Intel IP Corporation Online signup provisioning techniques for hotspot connections
US10051680B2 (en) 2013-02-21 2018-08-14 Samsung Electronics, Co., Ltd. Method and apparatus for connecting short-range wireless communication in terminal
US10314098B2 (en) 2013-02-21 2019-06-04 Samsung Electronics Co., Ltd. Method and apparatus for connecting short-range wireless communication in terminal
US20150023336A1 (en) * 2013-07-16 2015-01-22 Qualcomm Connected Experiences, Inc. Communicating a headless onboardee device local wireless network scan to an onboarder device via a peer-to-peer protocol to assist an onboarding process
US20150049630A1 (en) * 2013-08-13 2015-02-19 International Business Machines Corporation Smart wireless access point analyzer
KR20150097421A (en) * 2014-02-17 2015-08-26 삼성전자주식회사 Electronic Apparatus and Method for Protecting of Privacy of User
KR102271044B1 (en) * 2014-02-17 2021-07-02 삼성전자주식회사 Electronic Apparatus and Method for Protecting of Privacy of User
US10929563B2 (en) 2014-02-17 2021-02-23 Samsung Electronics Co., Ltd. Electronic device and method for protecting users privacy
US20150235052A1 (en) * 2014-02-17 2015-08-20 Samsung Electronics Co., Ltd. Electronic device and method for protecting users privacy
US20160021578A1 (en) * 2014-07-21 2016-01-21 International Business Machines Corporation Secure wifi using predictive analytics
US9860796B2 (en) 2014-07-21 2018-01-02 International Business Machines Corporation Secure WiFi using predictive analytics
US9596647B2 (en) * 2014-07-21 2017-03-14 International Business Machines Corporation Secure WiFi using predictive analytics
JP2016054391A (en) * 2014-09-03 2016-04-14 キヤノン株式会社 Information processing device, control method of information processing device, and program
US10271268B2 (en) 2014-09-30 2019-04-23 Xiaomi Inc. Method for presenting list of access points and device thereof
JP2017501647A (en) * 2014-09-30 2017-01-12 小米科技有限責任公司Xiaomi Inc. Access point list display method, apparatus, program, and recording medium
US10931388B2 (en) * 2015-03-31 2021-02-23 Brother Kogyo Kabushiki Kaisha Display control device, display control method and non-transitory computer-readable medium storing instructions for display control
US20170048737A1 (en) * 2015-08-12 2017-02-16 Acer Incorporated Method of controlling wlan measurement report and related apparatus using the same
US10555197B2 (en) * 2015-08-12 2020-02-04 Acer Incorporated Method of controlling WLAN measurement report and related apparatus using the same
US20170150533A1 (en) * 2015-11-19 2017-05-25 Nike, Inc. System, apparatus, and method for received signal strength indicator (rssi) based authentication
US20180368193A1 (en) * 2015-11-19 2018-12-20 Nike, Inc. System, apparatus, and method for received signal strength indicator (rssi) based authentication
US10728931B2 (en) * 2015-11-19 2020-07-28 Nike, Inc. System, apparatus, and method for received signal strength indicator (RSSI) based authentication
US10039145B2 (en) * 2015-11-19 2018-07-31 Nike, Inc. System, apparatus, and method for received signal strength indicator (RSSI) based authentication
US9814091B2 (en) 2015-12-11 2017-11-07 Ricoh Company, Ltd. Information processing apparatus and computer program product
US11277788B2 (en) * 2016-08-01 2022-03-15 Samsung Electonics Co., Ltd Scan method in near-field wireless communication network and electronic device for implementing same
US11425639B2 (en) * 2016-10-24 2022-08-23 International Business Machines Corporation Trusted method for consuming and sharing Wi-Fi internet access
US20180115946A1 (en) * 2016-10-24 2018-04-26 International Business Machines Corporation TRUSTED METHOD FOR CONSUMING AND SHARING Wi-Fi INTERNET ACCESS
CN106358264A (en) * 2016-11-08 2017-01-25 珠海市魅族科技有限公司 Network sharing method and terminal
US20210160238A1 (en) * 2018-08-06 2021-05-27 Lianshang (xinchang) Network Technology Co., Ltd. Method, an apparatus and a storage medium for network connection
DE102019205323A1 (en) * 2019-04-12 2020-10-15 Robert Bosch Gmbh Procedure for registering a participant in a network

Also Published As

Publication number Publication date
CA2670038A1 (en) 2008-05-29
CN101578900B (en) 2013-02-27
US20110238824A1 (en) 2011-09-29
EP2084855A4 (en) 2009-12-02
US20110238847A1 (en) 2011-09-29
WO2008061349A1 (en) 2008-05-29
CA2670056C (en) 2012-07-10
CA2670038C (en) 2013-01-22
WO2008061348A1 (en) 2008-05-29
EP2084930A4 (en) 2009-11-25
WO2008061350A1 (en) 2008-05-29
CA2636384C (en) 2014-07-15
CA2670056A1 (en) 2008-05-29
EP2084855B1 (en) 2020-01-08
EP2084856A4 (en) 2009-12-02
EP1974505A4 (en) 2009-01-21
EP2084930A1 (en) 2009-08-05
WO2008061351A1 (en) 2008-05-29
EP1974505A1 (en) 2008-10-01
US8874764B2 (en) 2014-10-28
CA2670033C (en) 2016-03-15
WO2008061347A1 (en) 2008-05-29
US8595365B2 (en) 2013-11-26
EP1974505B1 (en) 2012-08-01
CA2670033A1 (en) 2008-05-29
WO2008061349B1 (en) 2008-07-17
CA2636384A1 (en) 2008-05-29
EP2084855A1 (en) 2009-08-05
US20110235624A1 (en) 2011-09-29
CN101578900A (en) 2009-11-11
EP2346211A2 (en) 2011-07-20
EP2084856A1 (en) 2009-08-05
EP2346211A3 (en) 2011-10-26
EP2084930B1 (en) 2013-10-23
WO2008061348B1 (en) 2008-07-17

Similar Documents

Publication Publication Date Title
US8595365B2 (en) Handling virtual private network connections over a wireless local area network
JP5389259B2 (en) Method and apparatus for use in facilitating communication of neighboring network information to a mobile terminal using a RADIUS compatible protocol
EP2077003B1 (en) Transient wlan connection profiles
US9775093B2 (en) Architecture that manages access between a mobile communications device and an IP network
JP5589845B2 (en) Method for controlling roaming steering of user equipment in wireless communication network
JP4213125B2 (en) System and method for selecting a cellular network over a wireless local area network
US20090300722A1 (en) Support for integrated wlan hotspot clients
KR100873460B1 (en) System and method of handset configuration between cellular and private wireless network modes
JP2020513186A (en) Providing emergency codes to mobile devices
EP2117261A1 (en) Method for assisting a wireless device to find closed subscriber group cells
JP2012055009A (en) Network selection in gan environment

Legal Events

Date Code Title Description
AS Assignment

Owner name: RESEARCH IN MOTION LIMITED, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SCOTT, SHERYL LEE LORRAINE;SOMANI, ZAHEEN;LA, PETER;AND OTHERS;REEL/FRAME:020793/0296;SIGNING DATES FROM 20071202 TO 20080328

AS Assignment

Owner name: RESEARCH IN MOTION LIMITED, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MONTEMURRO, MICHAEL;REEL/FRAME:022219/0956

Effective date: 20090126

AS Assignment

Owner name: RESEARCH IN MOTION LIMITED, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SOMANI, ZAHEEN;REEL/FRAME:022994/0767

Effective date: 20090707

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: BLACKBERRY LIMITED, ONTARIO

Free format text: CHANGE OF NAME;ASSIGNOR:RESEARCH IN MOTION LIMITED;REEL/FRAME:033283/0679

Effective date: 20130709

AS Assignment

Owner name: MALIKIE INNOVATIONS LIMITED, IRELAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLACKBERRY LIMITED;REEL/FRAME:064104/0103

Effective date: 20230511