System and method for maintaining a virtual connection to a network node
First Claim
1. A system comprising:
- a wireless device having a plurality of connectivity options;
a carrier that provides an interface between the wireless device and desired information;
a base station through which the wireless device may establish wireless communication with the carrier; and
a virtual base station controller interfacing between the carrier and the wireless device when an alternative connectivity is employed, such that whether the wireless device interfaces via the virtual base station controller or establishes wireless communication through the base station is transparent to the carrier.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless device is provided with a plurality of connectivity options that enable it to connect to a carrier via alternative connectivity routes thereby providing access to value-added services and other information over plurality of connectivity routes. A user of the wireless device may select alternative connectivities when available based on dollar expense, available bandwidth, reliability, latency, or other considerations. Volume data delivery may be deferred until a more suitable connectivity route is established. With each change of connectivity the wireless device should reauthenticate itself. Reauthentication can be simplified by employing the previously authenticated route and leveraging the original authentication.
-
Citations
13 Claims
-
1. A system comprising:
-
a wireless device having a plurality of connectivity options;
a carrier that provides an interface between the wireless device and desired information;
a base station through which the wireless device may establish wireless communication with the carrier; and
a virtual base station controller interfacing between the carrier and the wireless device when an alternative connectivity is employed, such that whether the wireless device interfaces via the virtual base station controller or establishes wireless communication through the base station is transparent to the carrier. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
establishing a new connection route to a carrier from a wireless device;
receiving a datum from the carrier over one of a previously authenticated connection route and the new connection route; and
sending proof of receipt of the datum to the carrier over the one of the new connection route and the previously authenticated connection route on which the datum was not received. - View Dependent Claims (8, 9, 10)
tunneling network packets to the carrier from the wireless device over the new connection route.
-
-
9. The method of claim 7 wherein the wireless device maintains connection to both the new connection route and the previously authenticated connection route until authentication of the new connection route is complete.
-
10. The method of claim 7 wherein the datum is received after the new connection route is requested.
-
11. A method comprising:
-
periodically forwarding an authentication datum to a wireless device over an authenticated connectivity;
receiving a proof of receipt of the authentication datum after the wireless device changes to a new connectivity; and
treating the new connectivity as authenticated once the proof of receipt is received. - View Dependent Claims (12, 13)
establishing a time limit during which the authentication datum is valid.
-
-
13. The method of claim 12 wherein the time limit may vary depending on an information requested.
Specification