摘要:
Some embodiments include a method for determining whether to establish a connection between a computer and a network. In some embodiments, the method includes: receiving first network information from a network; determining a first trust level for the network by matching the network information to provisioning information, wherein the provisioning information indicates the first trust level and an authentication method of the network; verifying that network supports the authentication method, wherein the verifying includes exchanging information with the network; after verifying that the network supports the authentication method, establishing a connection to the network, wherein the connection provides access to an Internet.
摘要:
In some embodiments, a method includes scanning for wireless networks, where scanning includes collecting network information indicating properties of the wireless networks. The method can include analyzing the network information to determine signal data indicating signal qualities for the wireless networks. The method can include characterizing, based on the signal data, one or more wireless networks as being suitable for connection by the mobile device, where the characterizing includes determining, based on the signal data, movement of the mobile relative to one or more access points of the wireless networks. The method can include determining that one or more signals of the wireless networks are above a dwell threshold level for reliable wireless connectivity. The method can include determining that one or more signals has been dropped, and connecting to the mobile device to one of the one or more wireless networks that are suitable for connection.
摘要:
A non-transitory computer readable storage medium has instructions executed by a processor to access a list of Wi-Fi networks available to a user device. User network activity is classified. It is determined that there is a new Wi-Fi network for the user device to initiate a connection attempt. In the event of an existing licensed spectrum wireless network data connection on the user device, licensed spectrum wireless network data connection analytics are collected and an attempt is made to transition to the new Wi-Fi network to produce either a failed transition to the new Wi-Fi network or a successful transition to the new Wi-Fi network. In the event of an existing Wi-Fi network collection on the user device or a successful transition to the new Wi-Fi network, available Wi-Fi networks are periodically assessed to establish one of a network unavailable state and a network available state.
摘要:
Some embodiments include a method for determining whether to establish a connection between a computer and a network. In some embodiments, the method includes: receiving first network information from a network; determining a first trust level for the network by matching the network information to provisioning information, wherein the provisioning information indicates the first trust level and an authentication method of the network; verifying that network supports the authentication method, wherein the verifying includes exchanging information with the network; after verifying that the network supports the authentication method, establishing a connection to the network, wherein the connection provides access to an Internet.
摘要:
In some embodiments a method for correlating supply chain network information received from supply chain network components controlled by different entities includes receiving connection agent information indicating access point identifiers associated with network access points; receiving provisioning information including physical location identifiers identifying venues at which the network access points reside; receiving network authorization request and response records, wherein the network authorization request and response records include data associated with the connection agent information and the provisioning data. The method can also include determining an association between one of the physical location identifiers that identifies one of the venues and one of the access point identifiers associated with one of the network access points, the determining including, selecting, based on the common data, the physical location identifier from the provisioning information; and selecting, based on the common data, the one of the access point identifiers from the connection agent information.
摘要:
A method includes sending a faked authentication request from a client device wherein the faked authentication request includes identification credentials. A faked authentication request indicates that a reply message in response to the faked authentication request is to include data for updating a directory on the client device. A reply message is received at the client device in response to the faked authentication request. The reply message includes data for updating the directory. The directory is updated based, at least in part, on the data for updating the directory.
摘要:
A server has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to collect scan lists from client devices, where each scan list specifies a Wi-Fi access point identifier collected by a client device and geographic coordinates of the client device when the Wi-Fi access point identifier was collected. A cluster of geographic coordinates around a designated Wi-Fi access point is formed. A centroid within the cluster is identified. The location of the centroid is ascribed the geographic position of the designated Wi-Fi access point. The geographic position of the designated Wi-Fi access point is added to a Wi-Fi access point location database. A Wi-Fi tag scan list is processed to form a tag path listing known geographic locations of Wi-Fi access points observed by the Wi-Fi tag. The tag path is supplied in response to a request.
摘要:
A server has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to collect scan lists from client devices, where each scan list specifies a Wi-Fi access point identifier collected by a client device and geographic coordinates of the client device when the Wi-Fi access point identifier was collected. A cluster of geographic coordinates around a designated Wi-Fi access point is formed. A centroid within the cluster is identified. The location of the centroid is ascribed the geographic position of the designated Wi-Fi access point. The geographic position of the designated Wi-Fi access point is added to a Wi-Fi access point location database. A Wi-Fi tag scan list is processed to form a tag path listing known geographic locations of Wi-Fi access points observed by the Wi-Fi tag. The tag path is supplied in response to a request.
摘要:
In some embodiments, a method includes scanning for wireless networks, where scanning includes collecting network information indicating properties of the wireless networks. The method can include analyzing the network information to determine signal data indicating signal qualities for the wireless networks. The method can include characterizing, based on the signal data, one or more wireless networks as being suitable for connection by the mobile device, where the characterizing includes determining, based on the signal data, movement of the mobile relative to one or more access points of the wireless networks. The method can include determining that one or more signals of the wireless networks are above a dwell threshold level for reliable wireless connectivity. The method can include determining that one or more signals has been dropped, and connecting to the mobile device to one of the one or more wireless networks that are suitable for connection.
摘要:
A server has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to collect scan lists from client devices. Each scan list includes individual entries. Each individual entry specifies a WiFi access point network identifier collected by a client. WiFi access point networks in the scan lists are evaluated. WiFi access point handshake priorities are supplied to the client devices. The WiFi access point handshake priorities characterize WiFi access point recovery and discovery priorities.