Abstract: A computer networking infrastructure for load balancing, which comprises a network, access points each with a first service set identifier, computing devices and a computing system. The computing system can receive requests from computing devices to access the network via a second service set identifier of an access point. In response to a request to access the network from a computing device, the computing system generates a list of access points which are able to support a connection with the computing device. The computing device may connect to the network via an access point on the list and via the first service set identifier.
Abstract: A computer networking infrastructure for load balancing, which comprises a network, access points each with a first service set identifier, computing devices and a computing system. The computing system can receive requests from computing devices to access the network via a second service set identifier of an access point. In response to a request to access the network from a computing device, the computing system generates a list of access points which are able to support a connection with the computing device. The computing device may connect to the network via an access point on the list and via the first service set identifier.
Abstract: A method and system for securing a user transaction involving a subscriber unit (“SU”) (having a processor, memory, and a display configured to accept user input), a credential information manager (“CIM”) (having a processor and memory), and a transaction service provider (“TSP”) (having a processor and memory). A cyber identifier (“CyberID”), a subscriber identifier (“SubscriberID”), and subscriber information, each associated with the user, is stored in the CIM. A transaction request is sent from the SU to the TSP, which creates a transaction identifier (“TID”), stores it in the TSP memory and transmits it to the SU. The SU transmits an authentication request, the TID, and SubscriberID to the CIM, which authenticates the SubscriberID and verifies the TID to the TSP. The TSP verifies the TID and reports it to the CIM, which transmits the CyberID and subscriber information to the TSP, and transmits a transaction authorization to the SU.