PORTABLE DEVICE THAT OPERATES AS A MULTI-PROTOCOL GATEWAY COMMUNICATIONS GATEWAY TO A WIRELESS NETWORK
A portable gateway device with a wireless local area network communications component capable of Wi-Fi or Bluetooth communications, a cellular wireless communications component capable of 3GPP LTE or LTE advanced communications, and a WiMAX communications component capable of WiMAX communications, and an identification module storing network authentication information for accessing a telecommunications network. The portable gateway device is configured such that the WLAN communications component enables Wi-Fi or Bluetooth communications at the same time the cellular wireless communications component enables LTE or LTE Advanced communications. The portable gateway device is also configured such the WLAN communications component enables Wi-Fi or Bluetooth communications at the same time the WiMAX communications component enables WiMAX communications.
The present application claims priority filing benefit to co-pending U.S. patent application Ser. No. 12/910,781, filed Oct. 22, 2010, and to U.S. Provisional Patent Application No. 61/253,920, filed Oct. 22, 2009, which are incorporated herein by reference.
FIELD OF THE INVENTIONThe present invention generally relates to systems and methods associated with a portable transceiver device that can facilitate one or more local computing devices accessing a subscriber-based network.
BACKGROUND OF THE INVENTIONWith the increasing popularity of modern data communications devices, also referred to herein as personal computing devices (PCDs), such as cellular phones, personal desktop assistants (PDAs), tablet computers, netbook computers, laptop computers, electronic book devices, media player devices, video-gaming units, digital cameras, video recorders, etc., many consumers are creating a high demand for new technologies that enhance the mobility and flexibility of wireless services that facilitate network communications for their PCDs. Only a minority of consumers today is able to replace their wireless-capable PCDs (e.g., their cell phone or tablet computing devices) every time a new or more popular device model (having improved features and functionality) becomes available. Most consumers prefer to simply upgrade or enhance their existing PCDs for a period of time, by updating operating system firmware, adding new software applications, and/or purchasing auxiliary compatible aftermarket hardware components, such as: external or plug-in memory components, wireless modems, media card readers, GPS units, auxiliary microphone and/or speaker devices, webcams, etc.
One relatively new technology that some consumers utilize to enhance the data communications capability of their existing PCDs is known in the Art as device “tethering.” By way of example, the Apple® iPhone™ (e.g., 112b of
As would be understood by those skilled in the art, tethering generally facilitates a first stand-alone computing device (e.g., a laptop or mini-computer), not having a desired network access at a particular time or location, to utilize a second stand-alone computing device (e.g., a cellular phone or PDA having a desired network service) as an external modem and/or gateway to provide the PCD with linked access to the desired network services (e.g., broadband access to the Internet). In this scenario, a tethered device (See e.g., cellular phone 112b) acts as a burdened, slave device for a master tetheree device (See e.g., laptop computer 112a). As would be understood by those skilled in the art, a master-slave model in data communications occurs when a master, controller device or process has unidirectional control over one or more slave device components. Generally, a tethered (slave) device is not designed to function independently of a tetheree (or master) device, while the two devices are paired in a routed data communications session. This is due to the fact that a significant amount of the tethered device's data processing and communications capability, along with its power and memory resources, are actively being consumed to facilitate the tetheree device's communications to a proprietary network service that is associated with the tethered device. In most scenarios, the tethered device's user interface is not accessible or practically available to its user during tethering, nor is its communications functionality.
Tethering scenarios that facilitate sharing access to a subscriber-based proprietary network typically require utilization of a subscriber identification module (SIM), or some other imbedded identity module, to authenticate the identity of a network service subscriber attempting to access the proprietary network. In other scenarios, tethering may not require use of a subscriber's SIM to access other types of data communications networks (e.g., some public Wireless Local Area Networks or WLANs). By way of example, if a user's PCD is not equipped with a transceiver allowing the PCD to access a public WiFi™ network (e.g., broadband access to the Internet not requiring secure account authentication), the PCD may be tethered to a cellular phone or PDA having a WiFi™ transceiver, to allow the PCD to access the public WiFi™ network.
Several deficiencies exist with modern tethering scenarios (See e.g., the tethering configuration between the tetheree laptop 112a and the tethered cell phone or PDA 112b of
1) a tethered device (the device acting as a modem and/or gateway for another device 112b) is typically not separately functional during the period of time when it is being used as an external modem (when it is in a “tethering mode”); if the device is functional, it will be significantly burdened by the tethering functions occurring in the background, and normal application processing and networking functions may be temporarily burdened to the point where they become impractical;
2) a tethered device 112b, acting as a connected dongle, is often bulky and awkward to keep connected by wireline coupling to a tetheree PCD 112a (the device using the tethered device as an external modem);
3) tethering network access authentication sessions generally require continuous use of the tethered device's 112b processor in order to facilitate access to internal subscriber authentication information and routed data communications between a tetheree device 112a and a network, thereby consuming the tethered device's 112b resources (e.g., battery power, processing power, available volatile memory, etc.) and limiting an available data transfer rate for the tethered device;
4) a tethered device 112b, such as cellular phone or a PDA, often has inadequate battery life to provide sufficient periods of wireless tethered communications along with the device's primary functions as a stand-alone computing device; this may require the device to be charged multiple times during the same day, thereby reducing or otherwise crippling its extended mobility;
5) a tethered device 112b is susceptible to unwanted computer viruses as well as other malware uploads from afflicted tetheree PCDs 112a (or vice versa) when the two devices are connected in networked communications; and
6) private and personal information resident on a tethered device 112b can be accessed or corrupted by or through a tetheree device 112a or a third party device 104a connected to the tetheree PCD via a network (e.g., over the Internet) 102 when the devices are linked during a tethered communications process.
In a tethering scenario, a tetheree (e.g., a PCD such as a laptop, tablet computer or an electronic book device) can be connected to a proprietary network service by using a tethered device (e.g., a device such as a cellular phone or a PDA) as a gateway. Generally the tethered device provides the tetheree with temporary access to its network service account by facilitating network subscriber authentication while communicating with the tethered device's service provider. For many service providers in the United States and abroad, network subscriber authentication is facilitated when a service provider verifies information contained on a subscriber resident device's identification module or SIM card.
As would be understood by those skilled in the art, SIM cards are smart cards that may be configured to fit inside a mobile computing device (e.g., securely under a removable battery component), such as a cellular phone or a PDA device. In other devices identity modules or SIM cards may be built into the hardware memory of the device, such that the identification module is specifically designed not to be separated from the communications device as a detachable unit. Identity modules and SIM cards can provide for the identification of a subscribed user to a network access provider, allowing the user to access services and data that may include, but are not limited to, telephony, email, text messaging, Internet usage, GPS, etc.
An identity module, or a SIM card, generally includes a microprocessor unit as well as on-chip memory to process commands and to store user data, such as contacts and a limited amount of media content, and to store the SIM card's operating instructions. As would be understood by those skilled in the Art, identity modules and SIM cards also provide network specific information used to identify and authenticate subscribers of a cellular network service, including, but not limited to, at least the following information: an Integrated Circuit Card ID (ICC-ID), an International Mobile Subscriber Identity (IMSI), an Authentication Key (Ki), and a Local Area Identity (LAI).
Each identity module or SIM can be internationally identified by an ICC-ID stored in the module's memory and optionally engraved or printed on a physical SIM card's exterior. The ICC-ID is defined by the ITU-T recommendation and is generally up to 19 or 20 digits long. Identity modules and SIM cards may also be identified on their individual service provider networks by holding unique IMSIs. An IMSI is a unique number that is associated with all GSM, UMTS, LTE, LTE Advanced, etc. network mobile phone users. An International Mobile Subscriber Identity is up to 15 digits long. The first three digits represent the country code, followed by the network code. The remaining digits, up to fifteen, represent the unique subscriber number from within the network's customer base.
An identity module's or a SIM's authentication key (Ki) is generally a 128-bit value used in authenticating the users of a proprietary network. Each SIM holds a unique Ki assigned to it by a service provider during a SIM registration process. The Ki is also stored on a database (e.g., an authentication Center or AuC) within the service provider's network infrastructure. Generally, an identity module or SIM card does not allow a particular Ki to be obtained using the smart-card interface. Instead, the SIM card can provide a specialized function that allows a PCD to pass data to the card to be signed with the Ki. This makes usage of the SIM card mandatory unless the Ki can be extracted from the SIM card, or a service provider is willing to reveal or duplicate a Ki. In practice, most service providers prefer to keep only one copy of a particular Ki per customer account so that duplicate and/or separate SIM cards would need to be purchased by the customer to facilitate multi subscriber account access.
A subscriber authentication process may include a subscriber PCD (having an identity module or SIM card therein) powering on and then obtaining the IMSI from SIM card memory. The subscriber PCD then passes the IMSI to its registered service provider that is requesting access authentication. The subscriber PCD may further be required to pass a personal identification number (PIN) to the SIM card before the SIM card will reveal the IMSI information to the service provider.
After receiving the IMSI, the service provider searches its database for the incoming IMSI's associated Ki. The service provider then generates a Random Number (RAND, a nonce that is used only once) and signs it with the Ki associated with the IMSI (and stored on the SIM card), computing another number known as Signed Response 1 (SRES1). The service provider then sends the RAND to the PCD, which passes it to the identity module or SIM card. The identity module of SIM card signs it with its Ki, producing SRES2, which it subsequently returns to the PCD, along with encryption key Kc. The subscriber's PCD passes SRES2 on to the service provider via the network. The service provider then compares its computed SRES1 with the received computed SRES2. If the two numbers match, the SIM is authenticated and the PCD is granted access to the service provider's network. Subsequently, the Kc may be utilized to encrypt all further communications between the subscriber PCD and the service provider network.
A common scenario may exists where a first stand-alone PCD with WiFi™ communications capability is not in proximity to a free public WiFi™ access point. For example, this may occur when a user in an automobile, at an airport, staying in a hotel, etc. In these scenarios, a user may only have access to a proprietary WiFi™ or WiMAX™ network that requires them to pay exorbitant hourly or day-use fees to access the private network. In other scenarios, access to a wireless local access network, or WLAN, may simply be unavailable at a PCD's present location.
To remedy these scenarios some service providers offer device-specific plug-in cellular transceiver/antenna components (e.g., USB transceiver 110b or PCI card transceiver 114b of
The MFCD 200 may include one or more different communications transceivers (e.g., WiFi™ 218, Bluetooth™ 220, GPS 222, and Cellular 224 transceivers) for communicating over both Local Area Networks (e.g., LANs, including WiFi™ enabled networks) and Wide Area Networks (e.g., WANs, including cellular and satellite communications networks). In order for the MFCD 200 to access a proprietary cellular communications network that can provide for both digital telephony and Internet data access to the Internet, the MFCD 200 will typically be required to provide subscriber identity information to authenticate access with a local network service provider. This authenticated access (the process of which is described above) generally requires communication between a network service provider (e.g., authentication with either network base station 106a or 106-b of
Even with the advent of modern tethering technologies, most network subscribers (with a single network service account) have only one SIM card or identification module within their MFCD 200. This single SIM card may only provide for subscriber account access with a single protected SIM authentication key (Ki). As such, these subscribers are only able to utilize one PCD at a time to access their network subscriber account. Switching their single SIM card between devices (only possible when both PCDs have SIM readers, such as a pair of cellular phones) is often cumbersome and time-consuming. Further, modern tethered standalone transceiver devices heavily burden and/or incapacitate a tethered device (the device acting as a modem) in order to connect a tetheree device to a proprietary communication network. Therefore it would be beneficial to have a portable gateway device that was physically and functionally separate or optionally separable from a user's PCD. It would also be advantageous if this portable gateway could facilitate shared access and easy switching amongst multiple subscriber devices without burdening functionality and/or resources of any of a user's standalone PCDs. It would also be beneficial if this device could be adapted to facilitate shared access to a proprietary WiFi™, WiMAX™, and/or cellular communications network.
Exemplary and alternative examples of the present invention are described in detail below with reference to the following Figure drawings:
In accordance with exemplary embodiments of the present invention,
As would be understood by those skilled in the Art, in most digital communications networks, the backhaul portion of a data communications network 302 may include the intermediate, generally wireline, links between a backbone of the network, and the sub-networks or network base stations 306a-b, and 310, located at the periphery of the network. For example, user equipment (also referred to herein as PCDs) 312a-c, 314, 316, and 318 communicating with one or more network base stations 306a-b, and 310 may constitute a local sub-network. Whereas the network connection between any of the network base stations 306a-b, and 310 and the rest of the world initiates with a link to the backhaul portion of an access provider's communications network 302 (e.g., via a point of presence).
In an embodiment, any of the portable gateway devices 320a-c, and/or network base stations 306a-b, and 310 may function collaboratively to implement any of the shared network access processes associated with various embodiments of the present invention. Further, any of the shared network access processes may be carried out via any common communications technology known in the Art, such as those associated with modern Global Systems for Mobile (GSM), Universal Mobile Telecommunications System (UMTS), Long Term Evolution (LTE) network infrastructures, etc. In accordance with a standard GSM network, any of the service provider devices 304a-c, 306a-b, 308, 310 may be associated with a base station controller (BSC), a mobile switching center (MSC), or any other common service provider device known in the art, such as a radio resource manager (RRM). In accordance with a standard UMTS network, any of the service provider devices 304a-c, 306a-b, 308, 310 may be associated with a network resource controller (NRC), a serving GPRS support node (SGSN), or any other common service provider controller device known in the art, such as a radio resource manager (RRM). In accordance with a standard LTE network, any of the service provider devices 304a-c, 306a-b, 308, 310 may be associated with an eNodeB base station, a mobility management entity (MME), or any other common service provider controller device known in the art, such as a radio resource manager (RRM).
In an embodiment, any of the service provider devices 304a-c, 306a-b, 308, 310 as well as any of the PCDs 312a-c, 314, 316, and 318 may be configured to run any well-known operating system, including, but not limited to: Microsoft® Windows®, Mac OS®, Google® Chrome®, Linux®, Unix®, or any well-known mobile operating system, including Symbian®, Palm®, Windows Mobile®, Google® Android®, Mobile Linux®, etc. In an embodiment, any of the service provider devices 304a-c, 306a-b, 308, 310 may employ any number of common server, desktop, laptop, and personal computing devices.
In an embodiment, any of the PCDs 312a-c, 314, 316, and 318 may be associated with any combination of common mobile computing devices (e.g., laptop computers, netbook computers, tablet computers, cellular phones, PDAs, handheld gaming units, electronic book devices, personal music players, video recorders, etc.), having wireless communications capabilities employing any common wireless data communications technology, including, but not limited to: GSM, UMTS, 3GPP LTE, LTE Advanced, WiFi, WiMAX, etc.
In an embodiment, the backhaul portion of the data communications network 302 of
Further, any of the portable gateway devices 320a-c, service provider devices 304a-c, 306a-b, 308, 310, as well as any of the PCDs 312a-c, 314, 316, and 318 may include one or more computer-readable media (e.g., any common volatile or non-volatile memory type) encoded with a set of computer readable instructions, which when executed, can perform a portion of any of the shared network access processes associated with various embodiments of the present invention. In context with various embodiments of the present invention, it should be understood that wireless communications coverage associated with various data communication technologies (e.g., network base stations 106a-b, and 310) typically vary amongst different service provider networks based on the type of network and the system infrastructure deployed within a particular region of a network (e.g., differences amongst GSM, UMTS, LTE, LTE Advanced, WiFi and WiMAX based networks and the technologies deployed in each network type).
In an embodiment, the CPU/DSP 504 may include an arithmetic logic unit (ALU, not shown) that performs arithmetic and logical operations and one or more control units (CUs, not shown) that extract instructions and stored content from memory and then executes and/or processes them, calling on the ALU when necessary during program execution. The CPU 504 may be responsible for executing all shared data communications and authentication software stored on the portable gateway device's 502 volatile (RAM) and non-volatile (ROM) system memories, 512. In an embodiment, the identity module 508 (e.g., such as a smart card or SIM card) may facilitate the portable gateway device's 502 authentication with a proprietary network service provider. In an embodiment, one or more users of local PCDs (e.g., any of PCDs 312a-c, 314, 316, and 318) may communicate with the portable gateway device's 502 short range communications transceiver 516 (i.e., such as a Bluetooth or a WiFi transceiver) to request individual and/or simultaneous access to a proprietary network service. In an embodiment, the portable gateway device 502 may authenticate one or more shared user access requests at the portable gateway device 502 and then submit/forward one or more data transfer requests (along with authentication information associated with the identity module 508) to a remote service provider device (e.g., any of base stations 306a-b, and 310 of
In an embodiment, the attachable power supply component 526 may include both a rechargeable power supply 528 (e.g., a lithium ion battery), a power charging unit 530 for allowing the attachable power supply component 526 to plug into a shore power source (not shown), and a connector 524 for connecting the attachable power supply component 526 to the portable gateway device 502.
In an embodiment, the CPU/DSP 602 may include an arithmetic logic unit (ALU, not shown) that performs arithmetic and logical operations and one or more control units (CUs, not shown) that extract instructions and stored content from memory and then executes and/or processes them, calling on the ALU when necessary during program execution. The CPU/DSP 602 may be responsible for executing all shared data communications and authentication software stored on the PCD's 600 volatile (RAM) and non-volatile (ROM) system memories 606.
In an embodiment, the CPU/DSP 802 may include an arithmetic logic unit (ALU, not shown) that performs arithmetic and logical operations and one or more control units (CUs, not shown) that extract instructions and stored content from memory and then executes and/or processes them, calling on the ALU when necessary during program execution. The CPU 802 may be responsible for executing all shared data communications and authentication software stored on the autonomous PGD's 800 volatile (RAM) and non-volatile (ROM) system memories, 806. In an embodiment, the identity module 808 (e.g., such as a smart card or SIM card) may facilitate the autonomous PGD's 800 authentication with a proprietary network service provider. In an embodiment, one or more users of local PCDs (e.g., any of PCDs 312a-c, 314, 316, and 318) may communicate with the autonomous PGD's 800 short range communications transceiver 816 (i.e., such as a Bluetooth or a WiFi transceiver), independently or at the same time, to request individual and/or simultaneous access to a proprietary network service. In an embodiment, the autonomous PGD 800 may authenticate one or more shared user access requests at the autonomous PGD 800 and then submit/forward one or more data transfer requests (along with authentication information associated with the identity module 808) to a remote service provider device (e.g., any of base stations 306a-b, and 310 of
While several embodiments of the present invention have been illustrated and described herein, many changes can be made without departing from the spirit and scope of the invention.
Claims
1. A portable gateway device comprising:
- one or more processors;
- a memory;
- an identification module storing network authentication information;
- a wireless local area network (WLAN) communications component;
- a cellular wireless communications component; and
- a WiMAX communications component,
- wherein the network authentication information stored in the identification module includes
- i) information for accessing a cellular telecommunication network using the cellular wireless communications component, or
- ii) information for accessing a WiMAX network using the WiMAX communications component.
2. The portable gateway device of claim 1, further comprising a plurality of indicator lights for identifying a communication signal strength for communications between the portable gateway device and a serving base station.
3. The portable gateway device of claim 1, further comprising a device authentication component for authenticating access to the portable gateway device by one or more external computing devices via the WLAN communications component.
4. (canceled)
5. The portable gateway device of claim 1, wherein the WLAN communications component enables Wi-Fi or Bluetooth communications.
6. The portable gateway device of claim 5, wherein the cellular wireless communications component enables 3GPP long term evolution (LTE) or LTE Advanced communications over a cellular telecommunication network.
7. The portable gateway device of claim 6, wherein the WiMAX communications component enables WiMAX communications.
8. The portable gateway device of claim 7, wherein the WLAN communications component enables Wi-Fi or Bluetooth communications at the same time that
- i) the cellular wireless communications component enables LTE or LTE Advanced communications, or
- ii) the WiMAX communications component enables WiMAX communications.
9. The portable gateway device of claim 1, wherein the portable gateway device is connectable to an external power source that is portable.
10. The portable gateway device of claim 1, wherein the portable gateway device is attachable to, and detachable from, a personal computing device.
11. A wireless communications device comprising:
- one or more processors;
- a memory;
- a wireless local area network (WLAN) communications component enabling communications via a WLAN communications protocol;
- a first wide area network (WAN) communications component enabling communications via a first WAN telecommunications protocol; and
- a second WAN communications component enabling communications via a second WAN telecommunications protocol,
- wherein the second WAN telecommunications protocol is different from the first WAN telecommunications protocol.
12. The wireless communications device of claim 11, further comprising a network identification module storing authentication information for accessing a telecommunication network using the
- i) the first WAN communications component or
- ii) the second WAN communications component.
13. The wireless communications device of claim 11, wherein the WLAN communications protocol is associated with a Wi-Fi or a Bluetooth communications protocol.
14. The wireless communications device of claim 12, wherein the first WAN communications protocol is associated with a 3GPP Long Term Evolution (LTE) or LTE Advanced telecommunications protocol.
15. The wireless communications device of claim 12, wherein the second WAN communications protocol is associated with a WiMAX telecommunications protocol.
16. The wireless communications device of claim 11, further comprising a device authentication component for authenticating access to the portable gateway device by one or more external computing devices via the WLAN communications component.
Type: Application
Filed: May 6, 2013
Publication Date: Sep 19, 2013
Inventor: Scott Allen Schlack
Application Number: 13/888,346
International Classification: H04W 88/16 (20060101);