SCHEMES FOR PROVIDING WIRELESS COMMUNICATION
First Claim
1. A method performed under control of a mobile operating server, comprising:
- determining whether there is an authenticated Wi-Fi access point around a mobile device;
if there is an authenticated Wi-Fi access point around the mobile device, instructing the mobile device to connect to a Wi-Fi network provided by the authenticated Wi-Fi access point;
if there is no authenticated Wi-Fi access point around the mobile device, determining whether there is a non-authenticated Wi-Fi access point whose capacity is over a predetermined value around the mobile device;
if there is a non-authenticated Wi-Fi access point whose capacity is over the predetermined value around the mobile device, instructing the mobile device to connect to a Wi-Fi network provided by the non-authenticated Wi-Fi access point whose capacity is over the predetermined value;
initiating a virtual private network (VPN) with the mobile device connected to the Wi-Fi network provided by the authenticated Wi-Fi access point or the non-authenticated Wi-Fi access point; and
instructing the mobile device to disable uplink transmission from the mobile device to the authenticated Wi-Fi access point or the non-authenticated Wi-Fi access point, and to maintain downlink transmission from the authenticated Wi-Fi access point or the non-authenticated Wi-Fi access point to the mobile device.
3 Assignments
0 Petitions
Accused Products
Abstract
Technologies are generally described for providing wireless communications. In some examples, a method performed under control of a mobile operating server may include determining whether there is an authenticated wireless access point around a mobile device, if there is no authenticated wireless access point, determining whether there is a non-authenticated wireless access point whose capacity is over a predetermined value around the mobile device and if there is a non-authenticated wireless access point whose capacity is over the predetermined value, instructing the mobile device to connect to a wireless local area network provided by the non-authenticated wireless access point.
5 Citations
41 Claims
-
1. A method performed under control of a mobile operating server, comprising:
-
determining whether there is an authenticated Wi-Fi access point around a mobile device; if there is an authenticated Wi-Fi access point around the mobile device, instructing the mobile device to connect to a Wi-Fi network provided by the authenticated Wi-Fi access point;
if there is no authenticated Wi-Fi access point around the mobile device, determining whether there is a non-authenticated Wi-Fi access point whose capacity is over a predetermined value around the mobile device;if there is a non-authenticated Wi-Fi access point whose capacity is over the predetermined value around the mobile device, instructing the mobile device to connect to a Wi-Fi network provided by the non-authenticated Wi-Fi access point whose capacity is over the predetermined value; initiating a virtual private network (VPN) with the mobile device connected to the Wi-Fi network provided by the authenticated Wi-Fi access point or the non-authenticated Wi-Fi access point; and
instructing the mobile device to disable uplink transmission from the mobile device to the authenticated Wi-Fi access point or the non-authenticated Wi-Fi access point, and to maintain downlink transmission from the authenticated Wi-Fi access point or the non-authenticated Wi-Fi access point to the mobile device.
-
-
2. A method performed under control of a mobile operating server, comprising:
-
determining whether there is an authenticated wireless access point around a mobile device; if there is no authenticated wireless access point around the mobile device, determining whether there is a non-authenticated wireless access point whose capacity is over a predetermined value around the mobile device; and if there is a non-authenticated wireless access point whose capacity is over the predetermined value around the mobile device, instructing the mobile device to connect to a wireless local area network provided by the non-authenticated wireless access point whose capacity is over the predetermined value. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method performed under control of a mobile operating server, comprising:
-
determining whether there is a wireless access point around a mobile device; and if there is a wireless access point around the mobile device, instructing a mobile device to connect to a wireless local area network provided by the wireless access point, to disable uplink transmission from the mobile device to the wireless access point through the wireless local area network, and to maintain downlink transmission from the wireless access point to the mobile device through the wireless local area network, wherein the determining whether there is a wireless access point around a mobile device includes determining whether there is at least one of an authenticated wireless access point and a non-authenticated wireless access point whose capacity is over a predetermined value around the mobile device, and the instructing a mobile device to connect to a wireless local area network provided by the wireless access point includes instructing the mobile device to connect to the wireless local area network provided by the at least one of the authenticated wireless access point and the non-authenticated wireless access point whose capacity is over the predetermined value. - View Dependent Claims (18, 19, 20, 22, 23, 24, 25)
-
-
21. (canceled)
-
26. (canceled)
-
27. (canceled)
-
28. A mobile operating server, comprising:
-
an available wireless access point determination unit configured to; determine whether there is an available wireless access point around a mobile device, and determine whether there is an authenticated wireless access point around the mobile device, the authenticated wireless access point including at least one of a wireless access point controlled by the mobile operating server and a wireless access point previously used by the mobile device; and a network connection control unit configured to; generate an instruction for the mobile device to use a wireless local area network provided by the available wireless access point for downlink communication and to use a mobile telecommunications network provided by the mobile operating server for uplink communication, and generate an instruction for the mobile device to connect to a wireless local area network provided by the authenticated wireless access point, if the available wireless access point determination unit determines that there is an authenticated wireless access point around the mobile device. - View Dependent Claims (29, 30, 32, 33, 34, 35, 36, 37, 38)
-
-
31. (canceled)
-
39. A computer-readable storage medium having stored thereon computer-executable instructions that, in response to execution, cause a mobile operating server to perform operations, comprising:
-
determining whether there is an authenticated wireless access point around a mobile device; if there is no authenticated wireless access point around the mobile device, determining whether there is a non-authenticated wireless access point whose capacity is over a predetermined value around the mobile device; and if there is a non-authenticated wireless access point whose capacity is over the predetermined value around the mobile device, instructing the mobile device to connect to a wireless local area network provided by the non-authenticated wireless access point whose capacity is over the predetermined value.
-
-
40. (canceled)
-
41. (canceled)
Specification