Automatic wireless service activation in a private local wireless service
First Claim
1. A secondary Ethernet-like wireless communication system overlapped by a dominant Ethernet-like wireless communication system, and including radio access and communication for activation, association, and authentication of a wireless device in the secondary Ethernet-like wireless communication system, comprising:
- an automated private service activation (APSA) port for accepting access and communication requests of a wireless device seeking activation, association and authentication in the secondary Ethernet-like wireless communication system;
the APSA port providing;
an access and communication channel for radiating signals at a level exceeding a signal level of the access and communication channel only within limited spatial constraints; and
providing space for receiving the wireless device for activation and communication in the secondary Ethernet-like wireless communication system.
1 Assignment
0 Petitions
Accused Products
Abstract
A secondary Ethernet-like wireless communication system overlapped by a dominant Ethernet-like wireless communication system, and including radio access and communication for activation, association, and authentication of a wireless device in the secondary Ethernet-like wireless communication system. An automated private service activation (APSA) port is used for accepting access and communication requests of a wireless device seeking activation, association and authentication in the secondary Ethernet-like wireless communication system. The APSA port provides an access and communication channel for radiating signals at a level exceeding a signal level of the access and communication channel only within limited spatial constraints. In addition the APSA port provides space for receiving the wireless device for activation and communication in the secondary Ethernet-like wireless communication system.
-
Citations
31 Claims
-
1. A secondary Ethernet-like wireless communication system overlapped by a dominant Ethernet-like wireless communication system, and including radio access and communication for activation, association, and authentication of a wireless device in the secondary Ethernet-like wireless communication system, comprising:
an automated private service activation (APSA) port for accepting access and communication requests of a wireless device seeking activation, association and authentication in the secondary Ethernet-like wireless communication system;
the APSA port providing;an access and communication channel for radiating signals at a level exceeding a signal level of the access and communication channel only within limited spatial constraints; and
providing space for receiving the wireless device for activation and communication in the secondary Ethernet-like wireless communication system.- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A method of communication for achieving association, authentication and access, from a secondary Ethernet-like wireless communication system in a region overlapped by a dominant Ethernet-like wireless communication system, comprising the steps of:
-
creating access, association, and authentication in a signal space in which radiated access and communication signal levels of the secondary Ethernet-like wireless communication system within the signal space exceed access and communication signal levels of the dominant Ethernet-like wireless communication system; positioning a wireless device seeking access, association, and authentication and communication within the access and communication signal space and powering up the wireless device; searching by the wireless device for the strongest channel; selecting the channel of the secondary Ethernet-like wireless communication system by reason of positioning of the wireless device within the access and communication space; and authorizing, authenticating, and associating the wireless device for operation within the secondary Ethernet-like wireless communication system. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method of activating and authenticating a wireless device of a new user in a secondary Ethernet-like wireless communication system in a region overlapped by a dominant Ethernet-like wireless communication system, comprising the steps of:
-
enabling the activating and authenticating within a limited sub-region of the region overlapped by a dominant Ethernet-like wireless communication system and within that sub-region including the steps of; providing access credentials from an Automatic Private Service Activation (APSA) unit of the secondary Ethernet-like system; and
interact with a database containing user credentials, user requested features, to provide a record and enable service to the new user. - View Dependent Claims (16)
-
-
17. A secondary Ethernet-like wireless communication system overlapped by a dominant Ethernet-like wireless communication system, and including radio access and communication for activation, association, and authentication of a wireless device in the secondary Ethernet-like wireless communication system, comprising:
-
an internet/intranet-connected database including user lists and user features and characteristics and access and communications to individuals requesting service in the secondary Ethernet-like wireless communication system and allowing the individuals to insert information concerning user credentials and access and communication information in advance of implementing access, association, and communication requests; and an automated private service activation (APSA) port for accepting the access, association, and communication requests of a wireless device seeking activation in the secondary Ethernet-like wireless communication system. - View Dependent Claims (18)
-
-
19. A method of activating, associating, and authenticating a wireless device in a secondary Ethernet-like wireless communication system co-located with a primary Ethernet-like wireless communication system, the method comprising:
-
masking the signal strength associated with the primary Ethernet-like wireless communication system; and coupling signals of the secondary Ethernet-like wireless communication system to the wireless device during the masking. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method of accessing and achieving authentication from a secondary Ethernet-like wireless communication system in a region overlapped by a dominant Ethernet-like wireless communication system, the method comprising:
-
creating an access and communication signal space in which radiated access and communication signal levels of the secondary Ethernet-like wireless communication system within the access and communication signal space exceed access and communication signal levels of the dominant Ethernet-like wireless communication system; receiving a wireless device seeking access and communication to the secondary Ethernet-like wireless communication system within the access and communication signal space; receiving a search from the wireless device for a strongest channel;
selecting the channel of the secondary Ethernet-like wireless communication system by reason of the proximity of the wireless device within the access and communication space; andauthorizing and authenticating the wireless device for operation within the secondary Ethernet-like wireless communication system. - View Dependent Claims (29, 30, 31)
-
Specification