Patent application number | Description | Published |
20120214533 | Reducing WLAN Power Consumption on a Mobile Device Utilizing a Cellular Radio Interface - A system and method of reducing the WLAN power consumption and limiting battery drain of a mobile communications device is provided. The mechanism continuously monitors for changes in the WLAN and cellular signal strength and modifies the WLAN profile scanning activity accordingly. By monitoring for changes, transitions can be detected which indicate the location of the mobile device (i.e., indoor or outdoor). An increase in cellular signal strength and a decrease in WLAN signal strength indicates the user is transitioning outdoors where WLAN coverage may be limited. To reduce battery power consumption, background scanning is suspended or its frequency significantly lowered. Moving indoors is indicated by a decrease in cellular signal strength and an increase in WLAN signal strength. Background/Connectivity scanning frequency is increased to provide shorter time-to-connect to WLAN Networks for the user within the WLAN coverage area. | 08-23-2012 |
20120230304 | NETWORK ACCESS AND A MOBILE STATION CONFIGURED FOR THE SAME - A method for network access and a mobile station configured for the same is described. In one embodiment, there is provided a method for network access on a mobile station comprising: scanning for Wi-Fi networks; receiving responses from available wireless access points (APs) of the Wi-Fi networks; selecting a Wi-Fi network in accordance with past connectivity data associated with the Wi-Fi networks of the available APs; and attempting to connect to the selected Wi-Fi network. | 09-13-2012 |
20120230305 | WI-FI NETWORK ACCESS AND A MOBILE TERMINAL CONFIGURED FOR THE SAME - A method for network access and a mobile station configured for the same is described. In one embodiment, there is provided a method for Wi-Fi network access on a mobile station comprising: scanning for wireless access points (APs) of a Wi-Fi network; receiving responses from available APs of the Wi-Fi network; selecting an AP in accordance with past connectivity data associated with the available APs; and attempting to connect or switch to the Wi-Fi network using the selected AP. | 09-13-2012 |
20120257536 | Configuring Mobile Station According to Type of Wireless Local Area Network (WLAN) Deployment - A target access point is selected from the results of a discovery scan so that a mobile station can attempt a connection with the target access point. The mobile station determines whether the target access point belongs to a small office/home office (SOHO)-type wireless local area network (WLAN) deployment or to a corporate/enterprise-type WLAN deployment. The mobile station then configures itself according to the determination of the type of WLAN deployment to which the target access point belongs. | 10-11-2012 |
20130170419 | Reducing WLAN Power Consumption on a Mobile Device Utilizing a Cellular Radio Interface - A system and method of reducing the WLAN power consumption and limiting battery drain of a mobile communications device is provided. The mechanism continuously monitors for changes in the WLAN and cellular signal strength and modifies the WLAN profile scanning activity accordingly. By monitoring for changes, transitions can be detected which indicate the location of the mobile device (i.e., indoor or outdoor). An increase in cellular signal strength and a decrease in WLAN signal strength indicates the user is transitioning outdoors where WLAN coverage may be limited. To reduce battery power consumption, background scanning is suspended or its frequency significantly lowered. Moving indoors is indicated by a decrease in cellular signal strength and an increase in WLAN signal strength. Background/Connectivity scanning frequency is increased to provide shorter time-to-connect to WLAN Networks for the user within the WLAN coverage area. | 07-04-2013 |
20130208891 | HANDLING MISMATCH OF CRYPTOGRAPHIC KEYS AND RELATED BATTERY DRAIN AND COMMUNICATION EXCHANGE FAILURES - A wireless communications device stores a first cryptographic key in connection with a profile, the profile indicating a security type requiring no credentials and a network name. An access point (AP) supports a wireless local area network (WLAN), the WLAN having the network name, the WLAN supporting the security type and the WLAN requiring a second cryptographic key for encryption. The wireless communications device successfully authenticates and associates with the AP, thus joining the WLAN. Subsequent to joining the WLAN, the wireless communications device conducts encrypted communications with the AP and detects from the encrypted communications that there is a mismatch between the first cryptographic key and the second cryptographic key. Responsive to detecting the mismatch, the wireless communications device bans the profile or the AP or both. | 08-15-2013 |
20140148131 | Authentication Failure in a Wireless Local Area Network - In the event of an authentication process failure, a mobile station bans a connection profile storing the credentials provided by the mobile station when initiating the failed authentication process, thus affecting how subsequent scans—other than discovery scans—and connection attempts are handled. In the event of an authentication process failure, a mobile station bans or suppresses an access point with which the mobile station initiated the failed authentication process. The mobile station refrains from transmitting any communications addressed to the unique identifier of any banned access point. The mobile station may ignore any communications received from a banned access point. Suppressed access points are occasionally not made available to the mobile station for selection as a target for a connection attempt. | 05-29-2014 |
20140207946 | METHOD AND SYSTEM FOR MANAGING A VPN CONNECTION - A method and computing device configured to send and receive traffic over a virtual private network (VPN) connection, the computing device having a processor; and a communications subsystem, where the method determines that a first trigger had been met, wherein the first trigger is dynamically configured based on at least one factor at the computing device; monitors whether data traffic exists over the VPN connection for a first time period; and if no data traffic exists over the VPN connection for the first time period, disconnects the VPN connection. | 07-24-2014 |