Patent application number | Description | Published |
20080253550 | Activating Private Access Points For Wireless Networking - A unique identifier is associated with a personal access point. The personal access point is distributed to an end user, who sends a text message including the identifier. Within an automated computer system, the text message is received, a billing account is associated with the personal access point on the basis of the text message, and the personal access point is activated to provide wireless access to a network. | 10-16-2008 |
20080254792 | Controlling Access To Private Access Points For Wireless Networking - An invitation to use a personal access point to access a wireless network is transmitted to an access terminal. An indication that the invitation has been accepted is received and the personal access point is authorized to provide the access terminal with access to the network. | 10-16-2008 |
20090082020 | Selecting embedded cells in wireless networks - An access terminal determines whether a parameter encoded in a signal received from an embedded access point is identified by a list in a memory of the access terminal. Based on the determination, the access terminal initiates communication with a radio area network through the embedded access point. | 03-26-2009 |
20090164547 | PROVIDING ZONE INDICATIONS FOR WIRELESS NETWORKING - Methods and systems for communicating over a wireless network are described. A private access point sends indication information to a mobile station that includes available services provided by the private access point. | 06-25-2009 |
20090170475 | Secure Mobile Base Station Connections - In addition to other aspects disclosed, through a non-secure network, one or more bidirectional secure logical connections are established between a mobile base station and a secure network interface. | 07-02-2009 |
20090172169 | SECURE PROXIES FOR FLAT NETWORKS - A proxy is in communication with an internet protocol network and a mobile operator network. The proxy receives first communications from access points via the internet protocol network, transmits content from the first communications to the mobile operator network, receives second communications from the mobile operator network, and transmits content from the second communications to the access points via the internet protocol network. The proxy may perform operations based on the first and second communications received from either the access points, or from the mobile operator network. The operations performed by the proxy may include modifying the communications, saving certain information regarding the communications, performing authentication, encryption, or decryption of the communications, determining a destination for the communications, or sending the communications to a destination. | 07-02-2009 |
20120178415 | Secure Mobile Base Station Connections - In addition to other aspects disclosed, through a non-secure network, one or more bidirectional secure logical connections are established between a mobile base station and a secure network interface. | 07-12-2012 |
20120302249 | ASSIGNING CODE SPACE TO PORTABLE BASE STATIONS - In addition to other aspects disclosed, a portable base station requests assignment of a portion of a code space from a remotely located control station. The assignment is based upon the location of the portable base station. The portable base station is also capable of transmitting an identification signal using the assigned code space portion to uniquely identify the portable base station to one or more access terminals. | 11-29-2012 |