`
`
`
`
`Exhibit G
`
`
`
`Case 1:20-cv-07529 Document 1-7 Filed 09/14/20 Page 2 of 16
`I 1111111111111111 11111 lllll 111111111111111 1111111111 111111111111111 IIII IIII
`US007911979B2
`
`c12) United States Patent
`Roskind et al.
`
`(IO) Patent No.:
`(45) Date of Patent:
`
`US 7,911,979 B2
`*Mar. 22, 2011
`
`(54) TIME BASED ACCESS PROVISIONING
`SYSTEM AND PROCESS
`
`(75)
`
`Inventors: James A. Roskind, Redwood City, CA
`(US); John D. Robinson, South Riding,
`VA (US)
`
`(73) Assignee: Tarquin Consulting Co., LLC, Dover,
`DE (US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 58 days.
`
`6,167,428 A
`6,272,129 Bl
`6,275,693 Bl
`6,282,183 Bl
`6,317,594 Bl
`6,334,056 Bl
`
`12/2000 Ellis
`8/2001 Dynarski et al.
`8/2001 Lin et al.
`8/2001 Harris et al.
`11/2001 Gossman et al.
`12/2001 Holmes et al.
`(Continued)
`
`EP
`
`FOREIGN PATENT DOCUMENTS
`0814623 A2
`12/1997
`(Continued)
`
`OTHER PUBLICATIONS
`
`This patent is subject to a terminal dis(cid:173)
`claimer.
`
`Candolin, Catharina; "Security Issues for Wearable Computing and
`Bluetooth Technology:", undated.
`
`(21) Appl. No.: 12/323,399
`
`(22) Filed:
`
`Nov. 25, 2008
`
`(65)
`
`Prior Publication Data
`
`US 2009/0168667 Al
`
`Jul. 2, 2009
`
`Related U.S. Application Data
`
`(63) Continuation of application No. 11/673,513, filed on
`Feb. 9, 2007, now Pat. No. 7,463,596, which is a
`continuation of application No. 10/961,959, filed on
`Oct. 8, 2004, now Pat. No. 7,177,285, which is a
`continuation of application No. 10/341,847, filed on
`Jan. 13, 2003, now Pat. No. 6,891,807.
`
`(51)
`
`Int. Cl.
`H04L 12126
`(2006.01)
`(52) U.S. Cl. ........................................ 370/255; 370/338
`(58) Field of Classification Search .................. 370/255,
`370/338
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`5,461,627 A
`10/1995 Rypinski
`5/2000 Cudak et al.
`6,058,106 A
`
`(Continued)
`
`Primary Examiner - Melvin Marcelo
`(74) Attorney, Agent, or Firm - Schwabe, Williamson &
`Wyatt, P.C.
`
`(57)
`
`ABSTRACT
`
`A method and apparatus is provided for the time-based pro(cid:173)
`visioning of wireless devices. A network access point moni(cid:173)
`tors operation of wireless devices within a service region.
`When provisioning logic is activated at the network access
`point, the access point determines if the tracked parameter
`(such as power on or the onset of signal transmission) of the
`wireless device occurs within a designated time interval from
`the time of the provisioning activation. If the tracked device
`qualifies, the network access point proceeds with provision(cid:173)
`ing the device. In one system embodiment, the network
`access point tracks the power on time of wireless devices.
`When a wireless device to be authorized is powered on, the
`provisioning logic at the network access point notes the
`power on time. The user then activates the provisioning
`access at the network access point, and the network access
`point provisions the wireless device if it is recently powered
`on.
`
`32 Claims, 7 Drawing Sheets
`
`16
`
`12
`34 32
`-+-----j-----'---------,
`Transceiver
`
`30 94
`
`r-4~8'--t_r ____ +~---_-_+~
`Transceiver
`
`Communication
`Logic
`
`44
`
`26
`
`Wrreless
`Device
`
`57,62
`Time Based
`Qualification
`
`39
`
`Connection
`
`
`
`Case 1:20-cv-07529 Document 1-7 Filed 09/14/20 Page 3 of 16
`
`US 7,911,979 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`6,359,880 Bl
`3/2002 Curry et al.
`6,418,146 Bl
`7/2002 Miloslavsky
`6,418,324 Bl
`7/2002 Doviak et al.
`6,891,807 B2
`5/2005 Roskind et al.
`7,274,931 B2
`9/2007 Harris
`2001/0048744 Al
`12/2001 Kimura
`2003/0152235 Al
`8/2003 Cohen et al.
`
`EP
`EP
`EP
`EP
`EP
`JP
`WO
`
`FOREIGN PATENT DOCUMENTS
`0999672 A2
`5/2000
`1081895
`3/2001
`1126681 A2
`8/2001
`1191763 A2
`3/2002
`1225778 A2
`7/2002
`2001308866
`11/2001
`WO 0122661
`3/2001
`
`OTHER PUBLICATIONS
`
`Aziz, et al.; "Privacy and Authentication for Wireless Local Area
`Networks;" Sun Microsystems, Inc.; Jul. 26, 1993.
`Cypher, D.; "Painting your Home Blue [Bluetooth/sup TM/wireless
`Technology];" Proceedings 2002 IEEE 4.sup.th International Work(cid:173)
`shop on Networked Appliances; Jan. 15-16, 2002.
`Lilakiatsakun, W. et al.; "Wireless Home Networks Based on a Hier(cid:173)
`archical Bluetooth Scatternet Architecture;" Proceedings Ninth
`IEEE International Conference on Networks; Oct. 10-12, 2001.
`Shepherd, R.; "Bluetooth Wireless Technology in the Home;" Elec(cid:173)
`tronics & Communication Engineering Journal; Oct. 2001.
`Saito, T. et al.; "Wireless Gateway for Wireless Home AV Network
`and Its Implementation": IEEE Transcations; on consumer Electron(cid:173)
`ics; Aug. 2001.
`
`Fujieda, H. et al.; "A Wireless Home Network and Its Application
`Systems;" IEEE Transactions on Consumer Electronics: May 2000.
`Nakagawa, M.; "Wireless Home Link"; IEICE Transactions on Com(cid:173)
`munications; Dec. 1999.
`Gurnalla, et al.; "An Access Protocol for a Wireless Home Network;"
`WCNC. 1999 IEEE Wireless Communications and Networking Con(cid:173)
`ference; Sep. 21-24, 1999, cited by other.
`Murthy, U. et al.; "Firewalls for Security in Wireless Networks;"
`Proceedings of the Thirty-First Hawaii International Conference on
`System sciences; Jan. 6-9, 1998.
`Luo, H. et al.; "Self-Securing Ad Hoc Wireless Networks;" Jun. 13,
`2003, UCLA Computer Science Dept., Los Angeles, CA.
`Will, J.D.; "Wireless Networking for Control and Automation of
`Off-Road Equipment;" an ASAE Meeting Presentation; Jul. 18-21,
`1999; Toronto, Canada.
`Zhang, Y. et al.; "Intrusion Detection in Wireless Ad-Hoc Networks;"
`Proceedings of the Sixth Annual International Conference on Mobile
`Computing and Networking; Aug. 6-11, 2000.
`"Microsoft Announces Wireless Provisioning Services:" GeekZone;
`Wi-Fi, posted Dec. 10, 2003 20-56-21 NZ.
`Fried, Ina; "HP Spotlights Mobile Gear;" CNET News.com; Oct. 13,
`2003.
`"Wireless Provisioning Services Overview;" The Cable Guy-Dec.
`2003, Tech-Net Newsletter; 2004 Microsoft Corporation.
`Sony Ericcson Mobile Communications; Sony Ericsson HBH-65
`(Manual); Pub# LZT 1086746 RIA; l.sup.st Ed. Aug. 2003; Sony
`Ericcson Mobile Communications, AB.
`International Search Report and Written Opinion, issued in Interna(cid:173)
`tional Patent Application No. PCT/US2004/000860, mailed Aug. 17,
`2004, 5 pages.
`International Preliminary Report on Patentability, issued in Interna(cid:173)
`tional Patent Application No. PCT/US2004/000860, mailed Jul. 15,
`2005, 4 pages.
`
`
`
`Case 1:20-cv-07529 Document 1-7 Filed 09/14/20 Page 4 of 16
`
`U.S. Patent
`
`Mar. 22, 2011
`
`Sheet 1 of 7
`
`US 7,911,979 B2
`
`HM
`
`-- ---------.-- ---
`
`14n
`-
`-
`-
`
`'
`
`'
`
`--
`
`-
`
`/
`
`-
`
`/
`
`-
`
`/
`
`'-======±=::::.I
`
`16
`
`,
`,/
`,/
`// 14b 16 14h
`
`)18
`
`'
`
`'
`
`',
`
`'
`
`,
`HM',
`
`\
`
`,
`
`I
`
`I
`
`I
`I
`I
`I
`
`\ \l4e
`
`D
`
`\
`
`\
`
`\
`
`\
`
`' ' ' ' ' '
`
`'
`
`'
`
`14a
`
`14c
`
`\
`
`\
`
`\
`I
`
`I
`I
`
`I
`
`I
`
`16
`
`... _________ ... -
`
`17
`
`I
`
`I
`
`,,
`
`,,
`
`/
`
`I
`
`/ ,
`
`/
`
`Fig. 1
`
`
`
`Case 1:20-cv-07529 Document 1-7 Filed 09/14/20 Page 5 of 16
`
`2224
`
`48
`
`[28
`
`34 32
`
`12
`
`J20
`
`Transceiver
`
`30 1
`
`l I Transceiv~r I
`
`Network
`Access Point
`42
`
`43a
`43b 40
`
`~
`00
`•
`~
`~
`~
`
`~ = ~
`
`~
`~ :-:
`N
`~
`N
`0 ....
`....
`
`('D
`
`rJJ =-('D
`.....
`N
`0 ....
`
`-....J
`
`Communication
`Logic
`Device
`Identifier
`
`Power
`
`50/ I 26 1 27
`14
`Wireless
`Device
`
`44'1 I I Time Based
`Provisioning
`Activation I I I
`
`Access Control
`List
`
`c:::J . • •
`
`Network
`11 Functions
`
`I
`I
`I
`I
`I
`
`---------
`
`4636
`
`43n
`
`Fig. 2
`
`38
`Network
`Connection
`
`39
`
`d r.,;_
`-....l
`\0
`"'""'
`"'""'
`\0
`-....l
`
`\0 = N
`
`
`
`Case 1:20-cv-07529 Document 1-7 Filed 09/14/20 Page 6 of 16
`
`U.S. Patent
`
`Mar.22,2011
`
`Sheet 3 of 7
`
`US 7,911,979 B2
`
`Track Power On of Devices
`at Network Access Point
`
`Power On
`Wireless Device
`
`56
`
`54
`/
`
`52a
`
`/ 5 8
`Activate Access
`(Press
`at
`Network Access Point Button)
`
`Time Based
`5
`7 Device
`Qualification
`
`There Recent
`Power On of
`
`62
`60
`Yes/
`
`64
`
`Deny Access
`
`68
`
`Initiate
`Provisioning
`
`Fig. 3
`
`
`
`Case 1:20-cv-07529 Document 1-7 Filed 09/14/20 Page 7 of 16
`
`U.S. Patent
`
`Mar. 22, 2011
`
`Sheet 4 of 7
`
`US 7,911,979 B2
`
`Track Power On of Devices
`at Network Access Point
`
`54
`52b
`J
`
`j 5 8
`Activate Access
`(Press
`at
`Network Access Point Button)
`
`Power On
`Wireless Device
`
`56
`
`TimeBased
`5
`7 Device
`Qualification
`
`62
`60
`Yesf
`
`64
`
`Initiate
`Provisioning
`
`Deny Access
`
`68
`
`Fig. 4
`
`
`
`Case 1:20-cv-07529 Document 1-7 Filed 09/14/20 Page 8 of 16
`
`U.S. Patent
`
`Mar. 22, 2011
`
`Sheet 5 of 7
`
`US 7,911,979 B2
`
`Acceptance
`Time Interval
`74
`
`80
`
`70a
`
`J
`
`Provisioning
`5 8 Activation
`
`78 \gg
`Power On
`of
`Unaccepted
`Device
`
`82
`
`Time
`72~
`
`Fig. 5
`
`
`
`Case 1:20-cv-07529 Document 1-7 Filed 09/14/20 Page 9 of 16
`
`U.S. Patent
`
`Mar. 22, 2011
`
`Sheet 6 of 7
`
`US 7,911,979 B2
`
`70b
`
`J
`
`7 4 Acceptance
`Time Interval
`
`Provisioning
`Activation
`58
`
`80
`
`Device
`Activation
`56
`
`78 \88
`Power On
`of
`Unaccepted
`Device
`
`Time
`72~
`
`82
`Fig. 6
`
`
`
`Case 1:20-cv-07529 Document 1-7 Filed 09/14/20 Page 10 of 16
`
`92
`
`28
`
`24
`22
`
`48
`
`34 32
`
`12
`
`Transceiver
`
`30
`
`'94
`
`Transceiver
`
`J90
`
`~
`00
`•
`~
`~
`~
`
`~ = ~
`
`Communication
`Logic
`Device
`Identifier
`
`Power
`
`50/ I 26/ 21
`14
`Wireless
`Device
`
`Network
`a
`Access Point 43
`42 \ .43b r40
`
`~
`~ :-:
`N
`N
`N
`
`0 ....
`....
`
`~
`
`44
`
`Time Based
`Provisioning
`§f ctivation
`
`Access Control
`List
`5 a-~===:!
`
`Network
`Functions
`
`('D
`('D
`
`rJJ =(cid:173)
`.....
`--.J
`0 ....
`
`--.J
`
`57,62
`Time Based
`Qualification
`
`4-6 36 J 43n
`20
`-Fig. 7
`
`38
`Network
`Connection
`
`d r.,;_
`-....l
`\0
`"'""'
`"'""'
`\0
`-....l
`
`\0 = N
`
`
`
`Case 1:20-cv-07529 Document 1-7 Filed 09/14/20 Page 11 of 16
`
`US 7,911,979 B2
`
`1
`TIME BASED ACCESS PROVISIONING
`SYSTEM AND PROCESS
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`This application is a Continuation of and claims priority to
`U.S. Ser. No. 11/673,513, filed 9 Feb. 2007, which is a Con(cid:173)
`tinuation of and claims priority to U.S. Ser. No. 10/961,959,
`filed 8 Oct. 2004, which was issued as U.S. Pat. No. 7,177,285
`on 13 Feb. 2007, which is a Continuation of and claims
`priority to U.S. Ser. No.10/341,847, filed 13 Jan. 2003, which
`was issued as U.S. Pat. No. 6,891,807 on 10 May 2005, each
`of which are incorporated herein in their entirety by this
`reference thereto.
`This Application is also related to PCT Application No.
`PCT/US04/00860, filed 13 Jan. 2004, which claims the ben(cid:173)
`efitofU.S. Ser. No. 10/341,847, filed 13 Jan. 2003, which was
`issued as U.S. Pat. No. 6,891,807 on 10 May 2005.
`
`FIELD OF THE INVENTION
`
`The invention relates to the field of wireless connections
`between a wireless device and a network. More particularly,
`the invention relates to access provisioning between one or
`more wireless devices and an intranet access point.
`
`BACKGROUND OF THE INVENTION
`
`In local area networks, such as wireless home networks,
`one or more wireless devices, e.g. such as IEEE 802.11 b
`devices, are linked to the network by a provisioning process
`through a network access point. When a user acquires a new
`wireless device, they need to securely tie it to their intranet,
`which comprises telling the intranet to accept wireless com(cid:173)
`munications from the device, as well as provisioning the
`device with key material, such as for creating an encrypted
`connection. In conventional networks having one or more
`devices to be provisioned to a network access point, device
`identification information, such as a MAC address, is
`required to be communicated from the wireless device to the
`access point. Several methods have been described for wire(cid:173)
`less access provisioning to integrate wireless devices into a
`network.
`M. Cudak, B. Mueller, J. Kelton, and B. Glasson, Network
`Protocol Method, Access Point Device and Peripheral
`Devices for Providing for an Efficient Centrally Coordinated
`Peer-to-Peer Wireless Communications Network, U.S. Pat.
`No. 6,058,106, disclose a "peer-to-peer wireless communi(cid:173)
`cations network wherein the access point device: (1) broad(cid:173)
`casts a block assignment that specifies a wireless source
`peripheral device and a wireless destination peripheral
`device; (2) receives, from the wireless destination peripheral
`device, sequence information; (3) determines whether the
`sequence information represents one of: a negative acknowl(cid:173)
`edgment and a positive acknowledgment with a sequence
`number; (4) forwards an acknowledgment to the wireless
`source peripheral based on the sequence information, and
`repeats steps (1)-( 4)until Nblocks of data, Na predetermined
`integer, have been transferred from the wireless source
`peripheral to the wireless destination peripheral."
`J. Lin, P. Alfano, and S. Upp, Method and Apparatus for
`Performing Bearer Independent Wireless Application Service
`Provisioning, U.S. Pat. No. 6,275,693 disclose a provisioning
`system, in which a "mobile communication device contacts a 65
`provisioning proxy over the wireless bearer network, which
`in turns contacts a provisioning center over a public network.
`
`2
`A provisioning tunnel is then established between the provi(cid:173)
`sioning center and the mobile communication device. Once
`the provisioning tunnel is set up, the user of the mobile
`communication device can subscribe to, or unsubscribe from
`5 wireless application services."
`Wireless Device Registering Method in Wireless Home
`Network, PCT Patent Application No. WO 01/2266,
`describes the sending of an authentication key to a device for
`storage, when an identification code received from the device
`10 corresponds to a code stored in an access point.
`Secure Wireless LAN, European Pat. No. EP, 1081895,
`discloses wireless device use by a wireless device operator
`with an access point connected to a wired LAN in communi(cid:173)
`cation with the wireless device through air channel authenti-
`15 cation.
`C. Candolin, Security Issues for Wearable Computing and
`Bluetooth Technology, 23 Oct. 2000, Telecommunications
`Software and Multimedia Laboratory, Helsinki University of
`Technology, P.B. 400, FIN-02015 HUT, Finland, describes
`20 Bluetooth Technology as "a short-range wireless cable
`replacement technology enabling restricted types of ad hoc
`networks to be formed. All the while, a need for connecting
`wearable devices, such as PDAs, mobile phones, and mp3-
`players, is rising. Such networks may be formed using Blue-
`25 tooth technology, but issues such as security must be taken
`into consideration. Although an attempt to tackle security is
`made, the result is too weak to be used for anything else than
`for personal purposes."
`Other systems provide various details of the operation of
`30 wireless devices within a network, such as U.S. Pat. No.
`6,418,324, Apparatus and Method for Transparent Wireless
`Communication; U.S. Pat. No. 6,418,146, Integrated Com(cid:173)
`munication Center Functionality for WAP Devices; U.S. Pat.
`No. 6,359,880, Public Wireless/Cordless Internet Gateway;
`35 U.S. Pat. No. 6,334,056, Secure Gateway Processing for
`Handheld Device Markup Language; U.S. Pat. No. 6,317,
`594, System and Method for Providing Data to a Wireless
`Device Upon Detection of Activity of the Device on a Wire(cid:173)
`less Network; U.S. Pat. No. 6,282,183, Method for Authoriz-
`40 ing Coupling between devices in a Capability Addressable
`Network; U.S. Pat. No. 6,272,129, Dynamic Allocation of
`Wireless Mobile Nodes Over An Internet Protocol (IP) Net(cid:173)
`work; U.S. Pat. No. 6,167,428, Personal Computer Micropro(cid:173)
`cessor Firewalls for Internet Distributed Processing; Euro-
`45 pean Pat. No. 1225778, Wireless Repeater Using
`Identification of Call Originator; European Pat. No. EP
`1191763, Access Authentication System for a Wireless Envi(cid:173)
`ronment; European Pat. No. 1126681, A Network Portal Sys(cid:173)
`tem and Methods; European Pat. No. EP1081895, Secure
`50 Wireless Local Area Network; European Pat. No. EP 999672,
`System and Method for Mapping Packet Data Functional
`Entities to Elements in a Communications Network; Euro(cid:173)
`pean Pat. No. EP814623, Mobile Decision Methodology for
`Accessing Multiple Wireless Data Networks; Privacy and
`55 Authentication for Wireless Local Area Networks, Ashar Aziz
`and Whitfield Diffie; Sun Microsystems, Inc., Jul. 26, 1993;
`Painting Your Home Blue (Bluetooth™Wireless Technology),
`D. Cypher, Proceedings 2002 IEEE 4th International Work(cid:173)
`shop on Networked Appliances, Jan. 15-16, 2002; Wireless
`60 Home Networks on a Hierarchical Bluetooth Scatternet
`Architecture, W. Lilakiatsakun, A. Seneviratne, Proceedings
`Ninth IEEE International Conference on Networks; Oct.
`10-12, 2001; Bluetooth Wireless Technology in the Home, R.
`Shephard, Electronics & Communication Engineering Jour(cid:173)
`nal; October 2001; Wireless Gateway for Wireless Home AV
`Network and It's Implementation, T. Saito, I. Imada, Y. Taka(cid:173)
`batke, K. Teramoto, and K. Fujimoto, IEEE Transactions on
`
`
`
`Case 1:20-cv-07529 Document 1-7 Filed 09/14/20 Page 12 of 16
`
`US 7,911,979 B2
`
`4
`monitors operation of wireless devices within a service
`region. When provisioning logic is activated at the network
`access point, the access point determines if the tracked
`parameter, such as the power on, of the wireless device occurs
`within a designated time interval from the time of the provi(cid:173)
`sioning activation. If the tracked device qualifies, the network
`access point proceeds with provisioning the device. When a
`wireless device to be authorized is powered on, the provision(cid:173)
`ing logic at the network access point notes the power on time.
`The user then activates the provisioning access at the network
`access point, and the network access point provisions the
`wireless device if it is recently powered on.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`10
`
`3
`Consumer Electronics, August 2001; A Wireless Home Net(cid:173)
`work and its Applications Systems, H. Fujieda, Y. Horiike, T.
`Yamamoto, and T. Nomura, IEEE Transactions on Consumer
`Electronics, May 2000; Wireless Home Link, M. Nakagawa,
`IEICE Transactions on Communications, December 1999; 5
`An Access Protocol for a Wireless Home Network, A. C. V.
`Gummalla, and J. 0. Limb, WCNC 1999 IEEE Wireless
`Communications and Networking Conference; Sep. 21-24,
`1999; Firewalls for Security in Wireless Networks, V. Murthy,
`0. Bukres, W. Winn, and E. Vanderdez, Proceedings of the
`Thirty-First Hawaii International Conference on System Sci(cid:173)
`ences, Jan. 6-9, 1998; Self-Securing Ad Hoc Wireless Net(cid:173)
`works, Haiyun Luo, Petros Aerfos, Jiejun Kng, Songwu Lu,
`and Lixia Zhang; Wireless Networking/or Control and Auto(cid:173)
`mation of Off-Road Equipment, J. D. Will; ASAE Meeting
`Presentation; and Intrusion Detection in Wireless Ad-Hoc 15
`Networks, Yongguang Zhang and Wenke Lee, Proceeding of
`the Sixth Annual International Conference on Mobile Com(cid:173)
`puting and Networking, Aug. 6-11, 2000.
`The disclosed prior art systems and methodologies thus
`provide basic provisioning for wireless devices to a network 20
`through an access point. However, for many networks, such
`provisioning schemes are often impractical, either for wire(cid:173)
`less devices which lack a user interface which is configured
`for communicating provisioning information, or for simple
`home-based intranets. For example, device identification 25
`information, such as a MAC address, is often required to be
`manually transcribed from the wireless device to the access
`point, since wireless devices often lack a user interface con(cid:173)
`trol to reveal such identifying information. For example, a
`wireless picture frame device typically lacks a control inter(cid:173)
`face to read or extract identification information, such as a
`MAC address.
`While some wireless devices include a user interface for
`dedicated device functionality, e.g. such as a user control for
`a game box or a digital video recorder, a dedicated user
`interface is often incapable or cumbersome to be used to 35
`communicate device identification and to exchange provi(cid:173)
`sioning information. In addition, while some wireless devices
`provide a user interface control which can reveal such iden(cid:173)
`tifying information, provisioning procedures still require a
`user to be technically proficient to properly initiate and com- 40
`plete a provisioning process.
`It would therefore be advantageous to provide a network
`provisioning system, which does not require a user interface
`for the initiation of a provisioning process. The development
`of such a wireless access provisioning system would consti- 45
`tute a major technological advance.
`Furthermore, it would be advantageous to provide a wire(cid:173)
`less access provisioning structure and process with minimal
`device requirements and/or user proficiency, whereby a wire(cid:173)
`less device is readily provisioned by the provisioning system,
`and whereby other devices within an access region are pre- 50
`vented from being provisioned by the provisioning system.
`The development of such a provisioning system would con(cid:173)
`stitute a further technological advance.
`As well, it would be advantageous that such a wireless
`access provisioning system be integrated with easily moni- 55
`tared parameters of a wireless device, such as the time moni(cid:173)
`toring of power on and/or start of signal transmission. The
`development of such a provisioning system would constitute
`a further major technological advance. The development of
`such a time-based wireless access provisioning system for 60
`provisioning secure encrypted communication would consti(cid:173)
`tute a further technological advance.
`
`FIG. 1 is a schematic plan view of a time based wireless
`access provisioning system;
`FIG. 2 is a functional block diagram of a time based wire(cid:173)
`less access provisioning system;
`FIG. 3 is a flow chart of a time based wireless access
`provisioning process;
`FIG. 4 is a flow chart of an alternate time based wireless
`access provisioning process;
`FIG. 5 shows a simplified timeline for a time based wireless
`access provisioning process;
`FIG. 6 shows a simplified timeline for an alternate time
`based wireless access provisioning process; and
`FIG. 7 shows the time-based acceptance and provisioning
`of a new wireless device within a time based wireless access
`30 provisioning system.
`
`DETAILED DESCRIPTION OF PREFERRED
`EMBODIMENTS
`
`FIG.1 is a schematic plan view 10 ofa time based wireless
`access provisioning system 20. FIG. 2 is a functional block
`diagram of a time based wireless access provisioning system
`20, comprising a network access point 12 adapted to provide
`time-based provisioning with a wireless device 14.
`The network access point 12 shown in FIG. 2 comprises a
`transceiver 32 and antenna 34, which provides communica(cid:173)
`tion 16 to one or more wireless devices 14. The communica(cid:173)
`tions channel 16 typically comprises an input, i.e. reverse
`link, signal 28 from a wireless device 14 to the access point,
`as well as an output, i.e. forward link, signal 30, from the
`access point 12 to the wireless device 14.
`As seen in FIG. 2, the network access point 12 typically
`comprises network logic and componentry 36, such as net(cid:173)
`working functions 40, thereby providing communications
`between one or more authorized wireless devices 14 and a
`localnetworkl 7 (FIG.1). The network access point 12 shown
`in FIG. 2 also comprises a network connection 38 to one or
`more networks 39, such as to wired devices within a LAN,
`and/or to other networks, such as the Internet. The network
`access point 12 shown in FIG. 2 comprises an access control
`list 42, which identifies wireless devices 14 which have
`proper access to the local network 17 (FIG. 1), such as by
`storing accepted device identifications 50 as list elements
`43a-43n.
`The wireless device 14 shown in FIG. 2 comprises a device
`transceiver 22 and antenna 24, which provides communica(cid:173)
`tion 16 to the network access point 12, and in some embodi(cid:173)
`ments to other wireless devices 14. The wireless device 14
`comprises communication logic and componentry 48, and
`65 comprises an associated device identifier 50, e.g. such as a
`unique MAC address, which is communicatable to the net(cid:173)
`work access point 12, whereby the wireless device 14 can be
`
`SUMMARY OF THE INVENTION
`
`A method and apparatus is provided for the time-based
`provisioning of wireless devices. A network access point
`
`
`
`Case 1:20-cv-07529 Document 1-7 Filed 09/14/20 Page 13 of 16
`
`US 7,911,979 B2
`
`5
`controllably provisioned into the network 17 by the network
`access point 12. The wireless device 14 also comprises power
`26, e.g. wired or battery, and power activation 27. In some
`embodiments of the time based wireless access provisioning
`system 20, the wireless device 14 is an IEEE 802.11 WLAN 5
`and/or Bluetooth™ compliant device.
`The network access point 12 shown in FIG. 1 is located
`within a service area 18 for a network 17, such as a wireless
`local area network (WLAN) or a wireless personal area net(cid:173)
`work (WPAN), and typically communicates 16 with a one or 10
`more wireless devices 14 which operate within the service
`area 18, as well as to other wired devices connected to the
`network, and to connected 38 networks 39, such as the Inter-
`net.
`As seen in FIG. 1, the time based wireless access provi(cid:173)
`sioning system 20 can be used for a wide variety of wireless
`devices 14a-14n which are adapted to communicate with the
`network access point 12, such as but not limited to a desktop
`computer 14a, a portable laptop computer 14b, a network
`printer 14c, a digital video recorder 14d, a game box 14e, a
`portable phone 14{, a personal digital assistant (PDA) 14g,
`and/or a wireless picture frame 14h.
`The network access point 12 provides time-based provi(cid:173)
`sioning to ensure that only authorized wireless devices 14 can
`operate within the local network 17, such as within a home 25
`HM, and to prevent unauthorized wireless devices 14, such as
`device 14n in FIG. 1, from gaining access to the network 17.
`In the time based wireless access provisioning system 20,
`the network access point 12 also comprises time based pro(cid:173)
`visioning 44, which is activatible 46, such as manually by a 30
`user U. The time based wireless access provisioning system
`20 securely integrates one or more wireless devices 14 into
`the local area network 17. A properly timed interaction 57
`(FIG. 3, FIG. 4) between a wireless device 14 to be provi(cid:173)
`sioned and the network access point 12 acts to qualify the 35
`wireless device 14 to the network access point.
`Time-Based Provisioning Process. FIG. 3 is a flow chart of
`a time based wireless access provisioning process 52a. The
`network access point 12 tracks 54 the power on time of
`wireless devices 14, whereby the powered wireless device 40
`begins transmission of a reverse link signal 28. When a wire(cid:173)
`less device 14 to be authorized is powered on 56, the provi(cid:173)
`sioning logic 44 at the network access point 12 notes the
`power on time 82 (FIG. 5). The user U then activates 58 the
`provisioning access 44 at the network access point 12, typi- 45
`cally by pressing an activation button or switch 46.
`In response to a properly timed interaction 57, the network
`access point 12 provisions the wireless device 14 automati(cid:173)
`cally. As seen in FIG. 3, the network access point 12 deter(cid:173)
`mines 60 if there is a recent power on of a wireless device 14, 50
`e.g. such as within 5 minutes. If the wireless device 14 was
`recently powered 56, such as within an acceptance time inter(cid:173)
`val 74 (FIG. 5), the positive determination logic 62 allows the
`network access point 12 to initiate provisioning 64.
`As seen in FIG. 3, the time based wireless access provi- 55
`sioning process 52a also prevents network access from
`devices 14whicharepoweredon 78 (FIG. 5) at an earlier time
`88 (FIG. 5). If a wireless device 14 is powered on at a time 88
`before the acceptance time interval 74 (FIG. 5), the negative
`determination logic 66 allows the network access point 12 to 60
`deny access 68 to the device, preventing provisioning 64 into
`the network 17.
`FIG. 5 shows a simplified timeline 70a for a time based
`wireless access provisioning process 52a. The enhanced net(cid:173)
`work access point 12 tracks power on 56 of wireless devices 65
`as a function of time 72. As seen in FIG. 5, the network access
`point 14 notes the start time 82 of the power on 56 of a
`
`6
`wireless device 14 which is desired to be provisioned within
`the network 17. The user then activates provisioning logic 44
`at the network access point 12, at time 86. The provisioning
`logic 44 typically comprises an acceptance time interval 74,
`e.g. such as a 5 minute interval 7 4, having a start time 84 and
`an end time 86, within which desired devices 14 are accepted
`62 (FIG. 3). As seen in FIG. 5, the time interval 76 for the
`desired device 14 properly falls within the acceptance interval
`7 4, such that the provisioning logic 44 accepts 62 the wireless
`device 14, and initiates provisioning 64.
`As further seen in FIG. 5, the network access point 14 also
`notes the start time 88 of the power on 78 of a second wireless
`device 14, which is not necessarily desired to be provisioned
`by the network access point 12. When the user activates the
`15 provisioning logic 44 at the network access point 12, at time
`86, the time interval 80 for the second device 14 falls outside
`the acceptance interval 74, i.e. failing 66 time-based determi(cid:173)
`nation 60 (FIG. 3) such that the provisioning logic 44 denies
`68 the second wireless device 14, and prevents provisioning
`20 64.
`Alternate Time-Based Provisioning Process. FIG. 4 is a
`flow chart of an alternate time based wireless access provi(cid:173)
`sioning process 52b, in which a desired wireless device 14 to
`be provisioned is powered on after the provisioning logic 44
`is activated. As above, the network access point 12 tracks 54
`the power on time of wireless devices 14, whereby the pow(cid:173)
`ered wireless device begins transmission of a reverse link
`signal 28. The user U then activates 58 the provisioning
`access 44 at the network access point 12, typically by pressing
`an activation button or switch 46. When a wireless device 14
`to be authorized is powered on 56, the provisioning logic 44
`at the network access point 12 notes the power on time 82
`(FIG. 6).
`In response to a properly timed interaction 57, the network
`access point 12 provisions the wireless device 14 automati(cid:173)
`cally. As seen in FIG. 4, the network access point 12 deter(cid:173)
`mines 60 if there is a recent power on of a wireless device 14,
`after the provisioning logic 44 is activated 58. If the wireless
`device 14 was recently powered 56, such as within an accep(cid:173)
`tance time interval 74 (FIG. 6), the positive determination
`logic 62 allows the network access point 12 to initiate provi(cid:173)
`sioning 64.
`As seen in FIG. 4, the alternate time based wireless access
`provisioning process 52b also prevents network access from
`devices 14 which are powered on 78 (FIG. 6) at an earlier time
`88 (FIG. 6). If a wireless device 14 is powered on at a time 88
`before ( or after) the acceptance time interval 74 (FIG. 6), the
`negative determination logic 66 allows the network access
`point 12 to deny access 68 to the device 14, preventing pro(cid:173)
`visioning 64 into the network 17.
`FIG. 6 shows a simplified timeline 70b for the alternate
`time based wireless access provisioning process 52b. The
`enhanced network access point 12 tracks power on 56 of
`wireless devices as a function of time 72. As seen in FIG. 6,
`the user activates provisioning logic 44 at the network access
`point 12, at time 84. The network access point 14 notes the
`start time 82 of the power on 56 of a wireless device 14 which
`is desired to be provisioned within the network 17. If the
`power on 56 falls within the acceptance time interval 74, the
`desired device 14 is accepted 62 (FIG. 4). As seen in FIG. 6,
`the time interval 76 for the desired device 14 properly falls
`within the acceptance interval 74, such that the provisioning
`logic 44 accepts 62 the wireless device 14, and initiates pro(cid:173)
`visioning 64.
`As further seen in FIG. 6, the network access point 14 also
`notes the start time 88 of the power on 78 of a second wi