throbber
Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 1 of 15
`
`
`
`
`Exhibit E
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 2 of 15
`I 1111111111111111 11111 111111111111111 IIIII IIIII IIIII IIIII lll111111111111111
`US007463596B2
`
`c12) United States Patent
`Roskind et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,463,596 B2
`*Dec. 9, 2008
`
`(54) TIME BASED WIRELESS ACCESS
`PROVISIONING
`
`6,272,129 Bl
`
`8/2001 Dynarski et al.
`
`(75)
`
`Inventors: James A. Roskind, Redwood City, CA
`(US); John D. Robinson, South Riding,
`VA (US)
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`(73) Assignee: AOL LLC, Dulles, VA (US)
`
`EP
`
`0814623
`
`12/1997
`
`( *) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by O days.
`
`(Continued)
`
`OTHER PUBLICATIONS
`
`This patent is subject to a terminal dis(cid:173)
`claimer.
`
`Security Issues for Wearable Computing and Bluetooth Technology;
`Catharina Candolin, undated.
`
`(21) Appl. No.: 11/673,513
`
`(22) Filed:
`
`Feb.9,2007
`
`(65)
`
`Prior Publication Data
`
`US 2007/0135060Al
`
`Jun. 14,2007
`
`Related U.S. Application Data
`
`(63) Continuation of application No. 10/961,959, filed on
`Oct. 8, 2004, now Pat. No. 7,177,285, which is a con(cid:173)
`tinuation of application No. 10/341,847, filed on Jan.
`13, 2003, now Pat. No. 6,891,807.
`
`(51)
`
`Int. Cl.
`H04L 12126
`(2006.01)
`H04Q 7134
`(2006.01)
`(52) U.S. Cl. ....................................... 370/255; 370/338
`(58) Field of Classification Search ................. 370/255,
`370/338
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,461,627 A
`6,058,106 A
`6,167,428 A
`
`10/1995 Rypinski
`5/2000 Cudak et al.
`12/2000 Ellis
`
`(Continued)
`
`Primary Examiner-Melvin Marcelo
`(74) Attorney, Agent, or Firm-Michael A. Glenn; Glenn
`Patent Group
`
`(57)
`
`ABSTRACT
`
`A method and apparatus is provided for the time-based pro(cid:173)
`visioning of wireless devices. A network access point moni(cid:173)
`tors operation of wireless devices within a service region.
`When provisioning logic is activated at the network access
`point, the access point determines if the tracked parameter
`(such as power on or the onset of signal transmission) of the
`wireless device occurs within a designated time interval from
`the time of the provisioning activation. If the tracked device
`qualifies, the network access point proceeds with provision(cid:173)
`ing the device. In one system embodiment, the network
`access point tracks the power on time of wireless devices.
`When a wireless device to be authorized is powered on, the
`provisioning logic at the network access point notes the
`power on time. The user then activates the provisioning
`access at the network access point, and the network access
`point provisions the wireless device if it is recently powered
`on.
`
`30 Claims, 7 Drawing Sheets
`
`16
`
`8
`
`12
`34 32
`-+----+----_L_----~
`Transceiver
`
`30 94
`
`48
`c--+-~-_-_--t_,,__-_-_-~+
`Transceiver
`
`Communication
`Logic
`
`Wireless
`Device
`
`Connection
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 3 of 15
`
`US 7,463,596 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`6,275,693 Bl
`6,282,183 Bl
`6,317,594 Bl
`6,334,056 Bl
`6,359,880 Bl
`6,418,146 Bl
`6,418,324 Bl
`6,891,807 B2
`7,274,931 B2 *
`2001/0048744 Al
`2003/0152235 Al
`
`8/2001 Lin et al.
`8/2001 Harris et al.
`11/2001 Gossman et al.
`12/2001 Holmes et al.
`3/2002 Curry et al.
`7/2002 Miloslavsky
`7/2002 Doviak et al.
`5/2005 Roskind et al.
`9/2007 Harris ........................ 455/419
`12/2001 Kimura
`8/2003 Cohen et al.
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`EP
`EP
`JP
`WO
`
`0999672
`1081895
`1126681
`1191763
`1225778
`2001-308866
`WO 01/22661
`
`5/2000
`3/2001
`8/2001
`3/2002
`7/2002
`2/2001
`3/2001
`
`OTHER PUBLICATIONS
`
`Privacy and Authentication for Wireless Local Area Networks; Ashar
`Aziz, and Whitfield Diffie; Sun Microsystems, Inc.; Jul. 26, 1993.
`Painting Your Home Blue [Bluetooth/sup ™/wireless Technology];
`D. Cypher; Proceedings 2002 IEEE 4th International Workshop on
`Networked Appliances; Jan. 15-16, 2002.
`Wireless Home Networks Based on a Hierarchical Bluetooth Scat(cid:173)
`ternet Architecture; W. Lilakiatsakun, A. Seneviratne; Proceedings
`Ninth IEEE International Conference on Networks; Oct. 10-12,
`2001.
`
`Bluetooth Wireless Technology in the Home; R. Shepherd; Electron(cid:173)
`ics & Communication Engineering Journal; Oct. 2001.
`Wireless Gateway for Wireless Home AV Network and Its Implemen(cid:173)
`tation; T. Saito, I. Imoda, Y. Takabatke, and K. Teramoto, and K.
`Fujimoto; IEEE Transactions on consumer Electronics; Aug. 2001.
`A Wireless Home Network and !ta Application Systems; H. Fujieda, Y.
`Horiike, T. Yamamoto, and T. Nomura; IEEE Transactions on Con(cid:173)
`sumer Electronics; May 2000.
`Wireless Home Link; IEICE Transactions on Communications; Dec.
`1999.
`An Access Protocol fora Wireless Home Network; A.C.V. Gummalia,
`and J.O. Limb; WCNC. 1999 IEEE Wireless Communications and
`Networking Conference; Sep. 21-24, 1999.
`Firewalls for Security in Wireless Networks; U. Murthy, 0. Bukhres,
`W. Winn, and E. Vanderdez; Proceedings of the Thirty-First Hawaii
`International Conference on System sciences; Jan. 6-9, 1998.
`Self-Securing Ad Hoc Wireless Networks; Haiyun Luo, PetrosAerfos,
`Jiejun Kng, Songwu Lu, and Lixia Zhang, undated.
`Wireless Networkingfor Control and Automation of Off Road Equip(cid:173)
`ment; by J.D. Will; An ASAE Meeting Presentation, undated.
`Intrusion Detection in Wireless Ad-Hoc Networks; Yongguang Zhang
`and Wenke Lee; Proceedings of the Sixth Annual International Con(cid:173)
`ference on Mobile Computing and Networking; Aug. 6-11, 2000.
`Microsoft Announces Wireless Provisioning Services; GeekZone;
`Wi-Fi, posted Dec. 10, 2003 20:56:21 NZ.
`HP Spotlights Mobile Gear; Ina Fried; CNET News.com; Oct. 13,
`2003.
`Wireless Provisioning Services Overview; The Cable Guy-Dec.
`2003; TechNet Newsletter; 2004 Microsoft Corporation.
`Sony Ericsson Mobile Communications; Sony Ericsson HBH-65
`(Manual); Pub #LZT 1086746 RlA; 1st Ed. Aug. 2003; Sony Erics(cid:173)
`son Mobile Communications, AB.
`
`* cited by examiner
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 4 of 15
`
`U.S. Patent
`
`Dec. 9, 2008
`
`Sheet 1 of 7
`
`US 7,463,596 B2
`
`HM
`
`, -
`
`.,,
`
`.,, ,
`
`14n
`------------- --------,.)18
`(cid:143)
`
`i;;;;ai
`
`,
`
`.,,
`
`,
`
`,,
`
`,,
`,
`
`I'
`
`I
`
`I' 14b
`
`I
`
`/
`
`14h
`
`16
`
`B
`
`coo
`
`I
`
`I
`
`I
`
`I
`
`I
`I
`I
`'
`I
`
`14f
`\14g
`
`\
`
`\l4e
`
`\
`
`\
`
`' \
`
`'
`'
`' '
`
`'
`
`'
`
`'
`
`'
`
`....
`
`16
`
`.....
`
`... -- -
`
`-
`
`-
`
`- - --
`
`16
`
`' '
`
`'
`
`'
`
`\
`
`\
`
`HM '
`
`\
`
`\
`
`\
`
`\
`'
`I
`I
`
`I
`I
`I
`I
`I
`
`I
`
`I
`
`/
`
`14a
`14c
`
`/
`,
`I'
`
`I'
`,
`
`,,
`
`,
`
`,,
`
`,,
`
`.,, Fig. 1
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 5 of 15
`
`16 [28
`
`2224
`
`48
`
`34 32
`
`12
`
`J20
`
`Transceiver
`
`30
`
`Transceiver
`
`Communication
`Logic
`Device
`Identifier
`
`Power
`
`50/ J 261 27
`14
`Wireless
`Device
`
`Network
`a
`Access Point
`43
`42 \ 43b r40
`
`44
`
`Time Based
`Provisioning
`
`Activation
`
`Access Control
`List
`
`c::::J . . .
`
`Network
`Functions
`
`I
`I
`I
`I
`I
`
`---------
`
`4-6 36
`
`43n
`
`Fig. 2
`
`38
`Network
`Connection
`
`~
`00
`•
`~
`~
`~
`
`~ = ~
`
`c ('D
`
`~
`~\,Ci
`N
`0
`0
`QO
`
`('D
`('D
`
`rJJ =(cid:173)
`.....
`N
`0 ....
`
`-....J
`
`d r.,;_
`
`-....l
`~
`0--, w
`tit
`\0
`0--, = N
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 6 of 15
`
`U.S. Patent
`
`Dec. 9, 2008
`
`Sheet 3 of 7
`
`US 7,463,596 B2
`
`Track Power On of Devices
`at Network Access Point
`
`Power On
`Wireless Device
`
`56
`
`54
`52a
`.I
`
`/ 5 8
`Activate Access
`(Press
`at
`Network Access Point Button)
`
`Time Based
`5
`7 Device
`Qualification
`
`62
`60
`Yes/
`
`64
`
`Initiate
`Provisioning
`
`Deny Access
`
`68
`
`Fig. 3
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 7 of 15
`
`U.S. Patent
`
`Dec. 9, 2008
`
`Sheet 4 of 7
`
`US 7,463,596 B2
`
`Track Power On of Devices
`at Network Access Point
`
`54
`/
`
`52b
`
`j 5 8
`Activate Access
`(Press
`at
`Network Access Point Button)
`
`Power On
`Wireless Device
`
`56
`
`Time Based
`57 Device
`Qualification
`
`62
`60
`Yesf
`
`64
`
`Initiate
`Provisioning
`
`Deny Access
`
`68
`
`Fig. 4
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 8 of 15
`
`U.S. Patent
`
`Dec. 9, 2008
`
`Sheet 5 of 7
`
`US 7,463,596 B2
`
`Acceptance
`Time Interval
`74
`76
`
`80
`
`70a
`
`J
`
`Provisioning
`5 8 Activation
`
`78 \ss
`
`Power On
`of
`Unaccepted
`Device
`
`82
`
`Time
`72~
`Fig. 5
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 9 of 15
`
`U.S. Patent
`
`Dec. 9, 2008
`
`Sheet 6 of 7
`
`US 7,463,596 B2
`
`70b
`
`J
`
`7 4 Acceptance
`Time Interval
`
`Provisioning
`Activation
`58
`
`80
`
`76
`
`Device
`Activation
`56
`
`78 \gg
`Power On
`of
`Unaccepted
`Device
`
`Time
`72~
`
`82
`Fig. 6
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 10 of 15
`
`92
`
`2224
`
`48
`
`J90
`
`34 32
`
`12
`
`Transceiver
`
`30
`
`'94
`
`Transceiver
`
`Communication
`Logic
`Device
`Identifier
`
`Power
`
`50 1 l 26
`14
`Wireless
`Device
`
`Network
`a
`Access Point
`43
`42 \ .43b 140
`
`44
`
`Time Based
`Provisioning
`~ctivation
`
`Access Control
`List
`(cid:141) c:::::J
`. . .
`50 I~ '
`
`(
`
`Network
`Functions
`
`57,62
`Time Based
`Qualification
`
`~6 36 J 43n
`20
`-Fig. 7
`
`38
`Network
`Connection
`
`~
`00
`•
`~
`~
`~
`
`~ = ~
`
`c
`('D
`~
`1,0
`
`~
`
`N
`0
`0
`QO
`
`rJJ =(cid:173)
`('D a
`0 ....
`
`-....J
`
`-....J
`
`d r.,;_
`
`-....l
`~
`0--, w
`tit
`\0
`0--, = N
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 11 of 15
`
`US 7,463,596 B2
`
`1
`TIME BASED WIRELESS ACCESS
`PROVISIONING
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`This application is a Continuation of U.S. Ser. No. 10/961,
`959, filed Oct. 8, 2004 now U.S. Pat. No. 7,177,285, which is
`a Continuation of U.S. Ser. No. 10/341,847, filed Jan. 13,
`2003, which was issued as U.S. Pat. No. 6,891,807 on May 10
`10, 2005, each of which are incorporated herein in their
`entirety by this reference thereto.
`
`2
`describes the sending of an authentication key to a device for
`storage, when an identification code received from the device
`corresponds to a code stored in an access point.
`Secure Wireless LAN, European Pat. No. EP, 1081895,
`5 discloses wireless device use by a wireless device operator
`with an access point connected to a wired LAN in communi(cid:173)
`cation with the wireless device through air channel authenti(cid:173)
`cation.
`C. Candolin, Security Issues for Wearable Computing and
`Bluetooth Technology, 23 Oct. 2000, Telecommunications
`Software and Multimedia Laboratory, Helsinki University of
`Technology, P.B. 400, FIN-02015 HUT, Finland, describes
`Bluetooth Technology as "a short-range wireless cable
`replacement technology enabling restricted types of ad hoc
`15 networks to be formed. All the while, a need for connecting
`wearable devices, such as PDAs, mobile. phones, and mp3-
`players, is rising. Such networks may be formed using Blue(cid:173)
`tooth technology, but issues such as security must be taken
`into consideration. Although an attempt to tackle security is
`20 made, the result is too weak to be used for anything else than
`for personal purposes."
`Other systems provide various details of the operation of
`wireless devices within a network, such as U.S. Pat. No.
`6,418,324, Apparatus and Method for Transparent Wireless
`25 Communication; U.S. Pat. No. 6,418,146, Integrated Com(cid:173)
`munication Center Functionality for WAP Devices; U.S. Pat.
`No. 6,359,880, Public Wireless/Cordless Internet Gateway;
`U.S. Pat. No. 6,334,056, Secure Gateway Processing for
`Handheld Device Markup Language; U.S. Pat. No. 6,317,
`30 594, System and Method for Providing Data to a Wireless
`Device Upon Detection of Activity of the Device on a Wire(cid:173)
`less Network, U.S. Pat. No. 6,282,183, Method for Authoriz(cid:173)
`ing Coupling between devices in a Capability Addressable
`Network; U.S. Pat. No. 6,272,129, Dynamic Allocation of
`35 Wireless Mobile Nodes Over An Internet Protocol (IP) Net(cid:173)
`work; U.S. Pat. No. 6,167,428, Personal Computer Micropro(cid:173)
`cessor Firewalls for Internet Distributed Processing; Euro(cid:173)
`pean Pat. No. 1225778, Wireless Repeater Using
`Identification of Call Originator, European Pat. No. EP
`40 1191763, Access Authentication System for a Wireless Envi(cid:173)
`ronment; European Pat. No. 1126681, A Network Portal Sys(cid:173)
`tem and Methods; European Pat. No. EP1081895, Secure
`Wireless Local Area Network; European Pat. No. EP 999672,
`System and Method for Mapping Packet Data Functional
`45 Entities to Elements in a Communications Network; Euro(cid:173)
`pean Pat. No. EP814623, Mobile Decision Methodology for
`Accessing Multiple Wireless Data Networks; Privacy and
`Authentication for Wireless Local Area Networks, Ashar Aziz
`and Whitfield Diffie; Sun Microsystems, Inc., Jul. 26, 1993;
`50 Painting Your Home Blue (Bluetooth™Wireless Technology),
`D. Cypher, Proceedings 2002 IEEE 4th International Work(cid:173)
`shop on Networked Appliances, Jan. 15-16, 2002; Wireless
`Home Networks on a Hierarchical Bluetooth Scatternet
`Architecture, W. Lilakiatsakun, A. Seneviratne, Proceedings
`55 Ninth IEEE International Conference on Networks; Oct.
`10-12, 2001; Bluetooth Wireless Technology in the Home, R.
`Shephard, Electronics & Communication Engineering Jour(cid:173)
`nal; October 2001; Wireless Gateway for Wireless Home AV
`Network and It's Implementation, T. Saito, I. Imada, Y. Taka-
`60 batke, K. Teramoto, and K. Fujimoto, IEEE Transactions on
`Consumer Electronics, August 2001; A Wireless Home Net(cid:173)
`work and its Applications Systems, H. Fujieda, Y. Horiike, T.
`Yamamoto, and T. Nomura, IEEE Transactions on Consumer
`Electronics, May 2000; Wireless Home Link, M. Nakagawa,
`65 IEICE Transactions on Communications, December 1999;
`An Access Protocol for a Wireless Home Network, A. C. V.
`Gummalla, and J. 0. Limb, WCNC 1999 IEEE Wireless
`
`FIELD OF THE INVENTION
`
`The invention relates to the field of wireless connections
`between a wireless device and a network. More particularly,
`the invention relates to access provisioning between one or
`more wireless devices and an intranet access point.
`
`BACKGROUND OF THE INVENTION
`
`In local area networks, such as wireless home networks,
`one or more wireless devices, e.g. such as IEEE 802.11 b
`devices, are linked to the network by a provisioning process
`through a network access point. When a user acquires a new
`wireless device, they need to securely tie it to their intranet,
`which comprises telling the intranet to accept wireless com(cid:173)
`munications from the device, as well as provisioning the
`device with key material, such as for creating an encrypted
`connection. In conventional networks having one or more
`devices to be provisioned to a network access point, device
`identification information, such as a MAC address, is
`required to be communicated from the wireless device to the
`access point.
`Several methods have been described for wireless access
`provisioning to integrate wireless devices into a network.
`M. Cudak, B. Mueller, J. Kelton, and B. Classon, Network
`Protocol Method, Access Point Device and Peripheral
`Devices for Providing for an Efficient Centrally Coordinated
`Peer-to-Peer Wireless Communications Network, U.S. Pat.
`No. 6,058,106, discloses a "peer-to-peer wireless communi(cid:173)
`cations network wherein the access point device: (1) broad(cid:173)
`casts a block assignnient that specifies a wireless source
`peripheral device and a wireless destination peripheral
`device; (2) receives, from the wireless destination peripheral
`device, sequence information; (3) determines whether the
`sequence information represents one of: a negative acknowl(cid:173)
`edgment and a positive acknowledgment with a sequence
`number; (4) forwards an acknowledgment to the wireless
`source peripheral based on the sequence information, and
`repeats steps (1)-( 4)until Nblocks of data, Na predetermined
`integer, have been transferred from the wireless source
`peripheral to the wireless destination peripheral."
`J. Lin, P. Alfano, and S. Upp, Method and Apparatus for
`Performing Bearer Independent Wireless Application Service
`Provisioning, U.S. Pat. No 6,275,693 disclose a provisioning
`system, in which a "mobile communication device contacts a
`provisioning proxy over the wireless bearer network, which
`in turns contacts a provisioning center over a public network.
`A provisioning tunnel is then established between the provi(cid:173)
`sioning center and the mobile communication device. Once
`the provisioning tunnel is set up, the user of the mobile
`communication device can subscribe to, or unsubscribe from
`wireless application services."
`Wireless Device Registering Method in Wireless Home
`Network, PCT Patent Application No. WO 01/2266,
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 12 of 15
`
`US 7,463,596 B2
`
`4
`within a designated time interval from the time of the provi(cid:173)
`sioning activation. If the tracked device qualifies, the network
`access point proceeds with provisioning the device. When a
`wireless device to be authorized is powered on, the provision-
`s ing logic at the network access point notes the power on time.
`The user then activates the provisioning access at the network
`access point, and the network access point provisions the
`wireless device if it is recently powered on.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a schematic plan view of a time based wireless
`access provisioning system;
`FIG. 2 is a functional block diagram of a time based wire(cid:173)
`less access provisioning system;
`FIG. 3 is a flow chart of a time based wireless access
`provisioning process;
`FIG. 4 is a flow chart of an alternate time based wireless
`access provisioning process;
`FIG. 5 shows a simplified timeline for a time based wireless
`access provisioning process;
`FIG. 6 shows a simplified timeline for an alternate time
`based wireless access provisioning process; and
`FIG. 7 shows the time-based acceptance and provisioning
`of a new wireless device within a time based wireless access
`provisioning system.
`
`DETAILED DESCRIPTION OF PREFERRED
`EMBODIMENTS
`
`3
`Communications and Networking Conference; Sep. 21-24,
`1999; Firewalls for Security in Wireless Networks, V. Murthy,
`0. Bukres, W. Winn, and E. Vanderdez, Proceedings of the
`Thirty-First Hawaii International Conference on System Sci(cid:173)
`ences, Jan. 6-9, 1998; Self-Securing Ad Hoc Wireless Net(cid:173)
`works, Haiyun Luo, Petros Aerfos, Jiejun Kng, Songwu Lu,
`and Lixia Zhang; Wireless Networking/or Control and Auto(cid:173)
`mation of Off-Road Equipment, J. D. Will; ASAE Meeting
`Presentation; and Intrusion Detection in Wireless Ad-Hoc
`Networks, Yongguang Zhang and Wenke Lee, Proceeding of 10
`the Sixth Annual International Conference on Mobile Com(cid:173)
`puting and Networking, Aug. 6-11, 2000.
`The disclosed prior art systems and methodologies thus
`provide basic provisioning for wireless devices to a network
`through an access point. However, for many networks, such 15
`provisioning schemes are often impractical, either for wire(cid:173)
`less devices which lack a user interface which is configured
`for communicating provisioning information, or for simple
`home-based intranets. For example, device identification
`information, such as a MAC address, is often required to be 20
`manually transcribed from the wireless device to the access
`point, since wireless devices often lack a user interface con(cid:173)
`trol to reveal such identifying information. For example, a
`wireless picture frame device typically lacks a control inter(cid:173)
`face read or extract identification information, such as a MAC 25
`address.
`While some wireless devices include a user interface for
`dedicated device functionality, e.g. such as a user control for
`a game box or a digital video recorder, a dedicated user
`interface is often incapable or cumbersome to be used to 30
`communicate device identification and to exchange provi(cid:173)
`sioning information. In addition, while some wireless devices
`provide a user interface control which can reveal such iden(cid:173)
`tifying information, provisioning procedures still require a
`user to be technically proficient to properly initiate and com- 35
`plete a provisioning process.
`It would therefore be advantageous to provide a network
`provisioning system, which does not require a user interface
`for the initiation of a provisioning process. The development
`of such a wireless access provisioning system would consti- 40
`tute a major technological advance.
`Furthermore, it would be advantageous to provide a wire(cid:173)
`less access provisioning structure and process with minimal
`device requirements and/or user proficiency, whereby a wire(cid:173)
`less device is readily provisioned by the provisioning system, 45
`and whereby other devices within an access region are pre(cid:173)
`vented from being provisioned by the provisioning system.
`The development of such a provisioning system would con(cid:173)
`stitute a further technological advance.
`As well, it would be advantageous that such a wireless so
`access provisioning system be integrated with easily moni(cid:173)
`tored parameters of a wireless device, such as the time moni(cid:173)
`toring of power on and/or start of signal transmission. The
`development of such a provisioning system would constitute
`a further major technological advance. The development of 55
`such a time-based wireless access provisioning system for
`provisioning secure encrypted communication would consti(cid:173)
`tute a further technological advance.
`
`FIG.1 is a schematic plan view 10 ofa time based wireless
`access provisioning system 20. FIG. 2 is a functional block
`diagram of a time based wireless access provisioning system
`20, comprising a network access point 12 adapted to provide
`time-based provisioning with a wireless device 14.
`The network access point 12 shown in FIG. 2 comprises a
`transceiver 32 and antenna 34, which provides communica(cid:173)
`tion 16 to one or more wireless devices 14. The communica-
`tions channel 16 typically comprises an input, i.e. reverse
`link, signal 28 from a wireless device 14 to the access point,
`as well as an output, i.e. forward link, signal 30, from the
`access point 12 to the wireless device 14.
`As seen in FIG. 2, the network access point 12 typically
`comprises network logic & componentry 36, such as net(cid:173)
`working functions 40, thereby providing communications
`between one or more authorized wireless devices 14 and a
`localnetworkl 7 (FIG.1). The network access point 12 shown
`in FIG. 1 also comprises a network connection 38 to one or
`more networks 39, such as to wired devices within a LAN,
`and/or to other networks, such as the Internet. The network
`access point 12 shown in FIG. 2 comprises an access control
`list 42, which identifies wireless devices 14 which have
`proper access to the local network 17 (FIG. 1), such as by
`storing accepted device identifications 50 as list elements
`43a-43n.
`The wireless device 14 shown in FIG. 2 comprises a device
`transceiver 22 and antenna 24, which provides communica(cid:173)
`tion 16 to the network access point 12, and in some embodi(cid:173)
`ments to other wireless devices 14. The wireless device 14
`60 comprises communication logic and componentry 48, and
`comprises an associated device identifier 50, e.g. such as a
`unique MAC address, which is communicatable to the net(cid:173)
`work access point 12, whereby the wireless device 14 can be
`controllably provisioned into the network 17 by the network
`65 access point 12. The wireless device 14 also comprises power
`26, e.g. wired or battery, and power activation 26. In some
`embodiments of the time based wireless access provisioning
`
`SUMMARY OF THE INVENTION
`
`A method and apparatus is provided for the time-based
`provisioning of wireless devices. A network access point
`monitors operation of wireless devices within a service
`region. When provisioning logic is activated at the network
`access point, the access point determines if the tracked
`parameter, such as the power on, of the wireless device occurs
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 13 of 15
`
`US 7,463,596 B2
`
`5
`
`5
`system 20, the wireless device is an IEEE 802.11 WLAN
`and/or Bluetooth™ compliant device.
`The network access point 12 shown in FIG. 1 is located
`within a service area 18 for a network 17, such as a wireless
`local area network (WLAN) or a wireless personal area net-
`work (WPAN), and typically communicates 16 with a one or
`more wireless devices 14 which operate within the service
`area 18, as well as to other wired devices connected to the
`network, and to connected networks, such as the Internet.
`As seen in FIG. 1, the time based wireless access provi- 10
`sioning system 20 can be used for a wide variety of wireless
`devices 14a-14n which are adapted to communicate with the
`network access point 12, such as but not limited to a desktop
`computer 14a, a portable laptop computer 14b, a network
`printer 14c, a digital video recorder 14d, a game box 14e, a 15
`portable phone 14{, a personal digital assistant (PDA) 14g,
`and/or a wireless picture frame 14h.
`The network access point 12 provides time-based provi(cid:173)
`sioning to ensure that only authorized wireless devices 14 can
`operate within the local network 17, such as within a home 20
`HM, and to prevent unauthorized wireless devices 14, such as
`device 14n in FIG. 1, from gaining access to the network 17.
`In the time based wireless access provisioning system 20,
`the network access point 12 also comprises time based pro(cid:173)
`visioning 44, which is activatible 46, such as manually by a 25
`user U. The time based wireless access provisioning system
`20 securely integrates one or more wireless devices 14 into
`the local area network 17. A properly timed interaction 57
`(FIG. 3, FIG. 4) between a wireless device 14 to be provi(cid:173)
`sioned and the network access point 12 acts to qualify the 30
`wireless device 14 to the network access point.
`Time-Based Provisioning Process. FIG. 3 is a flow chart of
`a time based wireless access provisioning process 52a. The
`network access point 12 tracks 54 the power on time of
`wireless devices 14, whereby the powered wireless device 35
`begins transmission of a reverse link signal 28. When a wire(cid:173)
`less device 14 to be authorized is powered on 56, the provi(cid:173)
`sioning logic 44 at the network access point 12 notes the
`power on time 82 (FIG. 5). The user U then activates 58 the
`provisioning access 44 at the network access point 12, typi- 40
`cally by pressing an activation button or switch 46.
`In response to a properly timed interaction 57, the network
`access point 12 provisions the wireless device 14 automati(cid:173)
`cally. As seen in FIG. 3, the network access point 12 deter(cid:173)
`mines 60 if there is a recent power on of a wireless device 14, 45
`e.g. such as within 5 minutes. If the wireless device 14 was
`recently powered 56, such as within an acceptance time inter(cid:173)
`val 74 (FIG. 5), the positive determination logic 62 allows the
`network access point 12 to initiate provisioning 64.
`As seen in FIG. 3, the time based wireless access provi- 50
`sioning process 52a also prevents network access from
`devices 14whicharepoweredon 78 (FIG. 5) at an earlier time
`88 (FIG. 5). If a wireless device 14 is powered on at a time 88
`before the acceptance time interval 74 (FIG. 5), the negative
`determination logic 66 allows the network access point 12 to 55
`deny access 68 to the device, preventing provisioning 64 into
`the network 17.
`FIG. 5 shows a simplified timeline 70a for a time based
`wireless access provisioning process 52a. The enhanced net(cid:173)
`work access point 12 tracks power on 56 of wireless devices 60
`as a function of time 72. As seen in FIG. 5, the network access
`point 14 notes the start time 82 of the power on 56 of a
`wireless device 14 which is desired to be provisioned within
`the network 17. The user then activates provisioning logic 44
`at the network access point 12, at time 86. The provisioning
`logic 44 typically comprises an acceptance time interval 74,
`e.g. such as a 5 minute interval 7 4, having a start time 84 and
`
`6
`an end time 86, within which desired devices 14 are accepted
`62 (FIG. 3). As seen in FIG. 5, the time interval 76 for the
`desired device 14 properly falls within the acceptance interval
`7 4, such that the provisioning logic 44 accepts 62 the wireless
`device 14, and initiates provisioning 64.
`As further seen in FIG. 5, the network access point 14 also
`notes the start time 88 of the power on 78 of a second wireless
`device 14, which is not necessarily desired to be provisioned
`by the network access point 12. When the user activates the
`provisioning logic 44 at the network access point 12, at time
`86, the time interval 80 for the second device 14 falls outside
`the acceptance interval 74, i.e. failing 66, time-based deter(cid:173)
`mination 60 (FIG. 3) such that the provisioning logic 44
`denies 68 the second wireless device 14, and prevents provi(cid:173)
`sioning 64.
`Alternate Time-Based Provisioning Process. FIG. 4 is a
`flow chart of an alternate time based wireless access provi(cid:173)
`sioning process 52b, in which a desired wireless device 14 to
`be provisioned is powered on after the provisioning logic 44
`is activated. As above, the network access point 12 tracks 54
`the power on time of wireless devices 14, whereby the pow-
`ered wireless device begins transmission of a reverse link
`signal 28. The user U then activates 58 the provisioning
`access 44 at the network access point 12, typically by pressing
`an activation button or switch 46. When a wireless device 14
`to be authorized is powered on 56, the provisioning logic 44
`at the network access point 12 notes the power on time 82
`(FIG. 6).
`In response to a properly timed interaction 57, the network
`access point 12 provisions the wireless device 14 automati(cid:173)
`cally. As seen in FIG. 4, the network access point 12 deter(cid:173)
`mines 60 if there is a recent power on of a wireless device 14,
`after the provisioning logic 44 is activated 58. If the wireless
`device 14 was recently powered 56, such as within an accep-
`tance time interval 74 (FIG. 6), the positive determination
`logic 62 allows the network access point 12 to initiate provi-
`sioning 64.
`As seen in FIG. 4, the alternate time based wireless access
`provisioning process 52b also prevents network access from
`devices 14 which are powered on 78 (FIG. 6) at an earlier time
`88 (FIG. 6). If a wireless device 14 is powered on at a time 88
`before ( or after) the acceptance time interval 74 (FIG. 6), the
`negative determination logic 66 allows the network access
`point 12 to deny access 68 to the device 14, preventing pro(cid:173)
`visioning 64 into the network 17.
`FIG. 6 shows a simplified timeline 70b for the alternate
`time based wireless access provisioning process 52b. The
`enhanced network access point 12 tracks power on 56 of
`wireless devices as a function of time 72. As seen in FIG. 6,
`the user activates provisioning logic 44 at the network access
`point 12, at time 84. The network access point 14 notes the
`start time 82 of the power on 56 of a wireless device 14 which
`is desired to be provisioned within the network 17. If the
`power on 56 falls within the acceptance time interval 74, the
`desired device 14 is accepted 62 (FIG. 4). As seen in FIG. 6,
`the time interval 76 for the desired device 14 properly falls
`within the acceptance interval 74, such that the provisioning
`logic 44 accepts 62 the wireless device 14, and initiates pro(cid:173)
`visioning 64.
`As further seen in FIG. 6, the network access point 14 also
`notes the start time 88 of the power on 78 of a second wireless
`device 14, which is not necessarily desired to be provisioned
`by the network access point 12, such as from an unauthorized
`device 14, or from a desired device which is not powered on
`65 within the time interval 74. When the user then activates the
`provisioning logic 44 at the network access point 12, at time
`86, the time interval 80 for the second device 14 falls outside
`
`

`

`Case 1:20-cv-07529 Document 1-5 Filed 09/14/20 Page 14 of 15
`
`US 7,463,596 B2
`
`8
`ing for wireless devices. Wireless devices 14 to be provi(cid:173)
`sioned are not required to have complex user interfaces, and
`users are not required to perform complex provisioning pro(cid:173)
`cedures. The time-based access provisioning system 20 sim-
`5 plifies the integration of w

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket