Free-Fi provisional patent (DRAFT)

Invention to automatically connect to networks using information from other systems

  1. Connection to secondary network through open network
    1. Process
      1. Device D not connected to any network
      2. Device D detects an Open Network O not requiring any authorization information (e.g. passord, etc)
      3. Device D attempts to connect to Open Network O
      4. Open Network O sends authorization information needed to connect to secondary Secure Network S
      5. Device D connects to Secure Network S
    2. Notes:
      1. Device D could be any device capable of connecting to a network such as a laptop, desktop PC, etc.
      2. Open Network O and Secure Network S can be any type of network such as Wi-Fi, Bluetooth, wireless USB, Ethernet, near field communications, cellular, SMS, etc.
      3. Open Network O and Secure Network S can be different types of networks
      4. Device D does not have to disconnect from Open Network O  to connect to Secure Network S
      5. The Open Network O does not need to allow full connection to respond with authorization information
      6. The Open Network O could respond with authorization information in multiple ways such as header information instead of a full web page, in packet data, voice or text message, etc.
      7. The Open Network O could request authentication from Device D (such as an email address, user ID, MAC address, etc) to verify before replying with authorization information for the Secure Network S
      8. The Open Network O could respond with the same authorization information for all requests or provide different authorization information, even different network IDs
    3. Examples
      1. Open Wi-Fi to Secure Wi-Fi
        1. Device D is a mobile phone that connects to an Open Wi-Fi network
        2. The Open Wi-Fi network redirects all web access to a web page that displays the SSID and password for secondary hidden Secure Wi-Fi network
        3. The mobile phone collects the SSID and password from the webpage
        4. The mobile phone then disconnects from the Open Wi-Fi network
        5. The mobile phone then connects to the Secure Wi-Fi network
      2. Open Wi-Fi to Secure Wi-Fi (with authentication)
        1. Device D is a mobile phone that connects to an Open Wi-Fi network
        2. The Open Wi-Fi network redirects all web access to a web page that requests authentication (email, MAC address, etc) from the wireless phone
        3. The Open Wi-Fi network verifies the authentication information, then displays the SSID and password for secondary hidden Secure Wi-Fi network specific for that user (for example using a RADIX, LDAP, or similar service)
        4. The mobile phone collects the SSID and password from the webpage
        5. The mobile phone then disconnects from the Open Wi-Fi network
        6. The mobile phone then connects to the Secure Wi-Fi network
      3. Cellular message to Secure Wi-Fi
        1. Device D is a mobile phone that connects to a cellular network
        2. The mobile phone receives a message (SMS or email) with an SSID and password for a Secure Wi-Fi network
        3. The mobile phone connects to the Secure Wi-Fi network
      4. Shared near field or bluetooth data between devices
        1. Device L is a laptop that is connected to a Secure Wi-Fi network
        2. Device D is a mobile phone that gets the SSID and password for the Secure Wi-Fi network from Device L through near field or bluetooth communication
        3. The mobile phone connects to the Secure Wi-Fi network
      5. Secure Wi-Fi to secondary Secure Wi-Fi
        1. Device D is a mobile phone that is connected to a Secure Wi-Fi network
        2. The mobile phone upon request for a web page may receive a response with SSIDs and passwords for other Secure Wi-Fi networks
        3. The mobile phone caches the authorization information
        4. The mobile phone then connects to secondary Secure Wi-Fi if disconnected from the first network
          1. The mobile phone could also connect to both networks at the same time if it has the capability
          2. The mobile phone may choose to connect to the secondary Secure Wi-Fi even if it is NOT disconnected from the original (for example: better signal, lower cost, greater bandwidth, etc)
  2. Connection to secure network with a deterministic authorization information
    1. Process
      1. Device D starts not connected to any network
      2. Device D detects an Secure Network S requiring authorization information
      3. Device D connects to Secure Network S with authorization information calculated from Secure Network S and/or Device D characteristics
    2. Notes
      1. The authorization information could constant or depend upon a previously agreed upon algorithm
        1. The algorithm could use information from Device D, Secure Network S, location, time, etc to determine the authorization information
        2. The examples given are simple, but the algorithm could use more complex methods to  determine the authorization information such as a MD5 hash.
      2. There could be multiple ways to detect "Free-Fi" networks such as network name pattern (e.g. "Free-Fi", "Free-Fi#0001"), response packets, special headers, etc.    
    3. Examples
      1. Constant Password for all requests
        1. Device D is a mobile phone that detects a secure Wi-Fi network named "Free-Fi"
        2. The mobile phones connects to the secure Wi-Fi network with the password "Free-Fi"
      2. Constant password plus date
        1. Device D is a mobile phone that detects a secure Wi-Fi network named "Free-Fi" on August 1st 2014(GMT)
        2. Device D connect to the secure Wi-Fi network with the password "Free-Fi$2014-08-01"
      3. 'Hidden' SSID dependent upon date
        1. Device D is a mobile phone that does not detect any Wi-Fi network, but there is one 'hidden' because it is not broadcasting it's SSID
        2. On August 1st 2014 (GMT), the mobile phones looks for a Wi-Fi network with a specific SSID named "Free-Fi@2014-08-01"
        3. The mobile phone connects to the secure Wi-Fi with the password "Free-Fi"
      4. Password dependent upon secure network SSID
        1. Device D is a mobile phone that detects a secure Wi-Fi network named "Free-Fi#0001"
        2. The mobile phone connects to the secure Wi-Fi with the password "Free-Fi$0001"
      5. Password dependent upon Device D characteristics
        1. Device D is a mobile phone with a MAC address A1-B2-C3-D4-E5-F6 that detects a secure Wi-Fi network named "Free-Fi"
        2. The mobile phone connects to the secure Wi-Fi with the password "Free-Fi$ A1-B2-C3-D4-E5-F6"