iPass Inc. Patent applications |
Patent application number | Title | Published |
20140188676 | AUTOMATED CONFIGURATION FOR NETWORK APPLIANCES - Some embodiments include a method for initially configuring a network appliance. The method can detect, by the network appliance, a subscriber network. The method can transmit, to a remote configuration service via the subscriber network, a request for configuration information for the network appliance, and receive, via the subscriber network, the configuration information, wherein the configuration information includes first parameters for the subscriber network, and second parameters for an access network for connecting computing devices to the network appliance. The method can also perform an automated initial configuration of the network appliance using the configuration information, wherein the automated configuration does not require user input, and wherein the automated configuration includes using the first parameters and the second parameters to configure the network appliance for use with the access network and the subscriber network. | 07-03-2014 |
20140185469 | ADVANCED NETWORK CHARACTERIZATION AND MIGRATION - In some embodiments, a method includes scanning for wireless networks, where scanning includes collecting network information indicating properties of the wireless networks. The method can include analyzing the network information to determine signal data indicating signal qualities for the wireless networks. The method can include characterizing, based on the signal data, one or more wireless networks as being suitable for connection by the mobile device, where the characterizing includes determining, based on the signal data, movement of the mobile relative to one or more access points of the wireless networks. The method can include determining that one or more signals of the wireless networks are above a dwell threshold level for reliable wireless connectivity. The method can include determining that one or more signals has been dropped, and connecting to the mobile device to one of the one or more wireless networks that are suitable for connection. | 07-03-2014 |
20140082714 | METHOD AND SYSTEM OF PROVIDING ACCESS POINT DATA ASSOCIATED WITH A NETWORK ACCESS POINT - A method includes sending a faked authentication request from a client device wherein the faked authentication request includes identification credentials. A faked authentication request indicates that a reply message in response to the faked authentication request is to include data for updating a directory on the client device. A reply message is received at the client device in response to the faked authentication request. The reply message includes data for updating the directory. The directory is updated based, at least in part, on the data for updating the directory. | 03-20-2014 |
20120233300 | CONFIGURING CONNECTION AGENTS - In some embodiments, a method includes detecting, in a connection agent, a problem connecting to a network; receiving, in the connection agent, replacement configuration options, wherein the replacement configuration options are for updating a configuration profile for the connection agent; wherein the configuration profile for the connection agent and the replacement configuration options define parameter values used in connecting to a network; updating the configuration profile for the connection agent based on the replacement configuration options; and determining, using testing components in the connection agent, test results that indicate the replacement configuration options do not solve the problem connecting to the network. | 09-13-2012 |
20110208866 | ADVANCED NETWORK CHARACTERIZATION - Some embodiments include a method for determining whether to establish a connection between a computer and a network. In some embodiments, the method includes: receiving first network information from a network; determining a first trust level for the network by matching the network information to provisioning information, wherein the provisioning information indicates the first trust level and an authentication method of the network; verifying that network supports the authentication method, wherein the verifying includes exchanging information with the network; after verifying that the network supports the authentication method, establishing a connection to the network, wherein the connection provides access to an Internet. | 08-25-2011 |
20100017525 | ELECTRONIC SUPPLY CHAIN MANAGEMENT - In some embodiments a method for correlating supply chain network information received from supply chain network components controlled by different entities includes receiving connection agent information indicating access point identifiers associated with network access points; receiving provisioning information including physical location identifiers identifying venues at which the network access points reside; receiving network authorization request and response records, wherein the network authorization request and response records include data associated with the connection agent information and the provisioning data. The method can also include determining an association between one of the physical location identifiers that identifies one of the venues and one of the access point identifiers associated with one of the network access points, the determining including, selecting, based on the common data, the physical location identifier from the provisioning information; and selecting, based on the common data, the one of the access point identifiers from the connection agent information. | 01-21-2010 |