Method and apparatus of triggering applications in a wireless environment

ABSTRACT

Receive a first device identifier from a first computing device; determine whether the first device identifier matches the second device identifier stored in a database at the second computing device; locate first user data associated with the first device identifier in the database of the second computing device based on a match; transmit the first user data to the first computing device based on a location of the first user data associated with the first device identifier; select an application to automatically launch on the first computing device based on application information within the first user data; update a user data list with the first user data, wherein the user data list is associated with the application and is stored at the second computing device; and launch the application on the first computing device, wherein the application uses second user data determined from the user data list.

CROSS-REFERENCE TO RELATED APPLICATION(S)

The present application is a continuation of U.S. patent applicationSer. No. 14/946,352 filed on Nov. 19, 2015, the content of which ishereby incorporated by reference in its entirety.

TECHNICAL FIELD

The present disclosure generally relates to the field of wirelesscommunication and mobile operating system, and in particular, totriggering applications in a wireless environment.

BACKGROUND

As mobile communication systems and smart mobile devices are more andmore used in daily life, security and convenience for wireless datacommunication service demand higher standards. Traditional datacommunication services meet the security standard by authenticating userlogin via active actions of a user, which inevitably compromising theconvenience; however, many recent successful products introduce moreadvanced authentication methods, such as combined identification basedon at least one of: fingerprints, lip lines, iris, or heart rates. Theseadvanced methods can be implemented to reduce complexity and tediousnessof multistep, password-based authentication for the user, on the cost ofhigher complexity of software and hardware.

SUMMARY

Aspects of the present disclosure include methods, apparatuses andsystems for authorizing a mobile device to access a wireless network andtriggering applications of data communication services in a wirelessenvironment.

In one aspect, the present disclosure includes a method comprisingreceiving, by a processor, a first device identifier from a firstcomputing device; determining, by the processor, whether the firstdevice identifier matches a second device identifier stored in adatabase at the second computing device, wherein the database stores aset of device identifiers, a set of user data, and correspondingrelationships between the set of device identifiers and the set of userdata; locating, by the processor, first user data associated with thefirst device identifier in the database of the second computing devicebased on the determination that the first device identifier matches thesecond device identifier stored in the database; transmitting, by theprocessor, the first user data to the first computing device based on alocation of the first user data associated with the first deviceidentifier in the database of the second computing device; selecting, bythe processor, an application to automatically launch on the firstcomputing device based on application information within the first userdata and based on whether the first computing device has a stable powersupply; updating, by the processor, a user data list with the first userdata, wherein the user data list is associated with the application andis stored at the second computing device; determining, by the processor,second user data from the user data list; and launching, by theprocessor, the application on the first computing device, wherein theapplication uses the second user data.

In another aspect, the present disclosure includes a method comprisingreceiving, by a processor, a first device identifier from a firstcomputing device in response to a determination that a distance betweenthe first computing device and a second computing device is within apredetermined range distance for a predetermined time period;determining, by the processor, whether the first device identifiermatches the second device identifier stored in a database at the secondcomputing device, wherein the database stores a set of deviceidentifiers, a set of user data, and corresponding relationships betweenthe set of device identifiers and the set of user data; locating, by theprocessor, first user data associated with the first device identifierin the database of the second computing device based on thedetermination that the first device identifier matches the second deviceidentifier stored in the database; transmitting, by the processor, thefirst user data to the first computing device based on a location of thefirst user data associated with the first device identifier in thedatabase of the second computing device; selecting, by the processor, anapplication to automatically launch on the first computing device basedon application information within the first user data; updating, by theprocessor, a user data list with the first user data, wherein the userdata list is associated with the application and is stored at the secondcomputing device; determining, by the processor, second user data fromthe user data list; and launching, by the processor, the application onthe first computing device, wherein the application uses the second userdata.

In another aspect, the present disclosure includes an apparatuscomprising a memory and a processor, wherein the processor is configuredto execute instructions stored in the memory to receive a first deviceidentifier from a first computing device; determine whether the firstdevice identifier matches the second device identifier stored in adatabase at the second computing device, wherein the database stores aset of device identifiers, a set of user data, and correspondingrelationships between the set of device identifiers and the set of userdata; locate first user data associated with the first device identifierin the database of the second computing device based on thedetermination that the first device identifier matches the second deviceidentifier stored in the database; transmit the first user data to thefirst computing device based on a location of the first user dataassociated with the first device identifier in the database of thesecond computing device; select an application to automatically launchon the first computing device based on application information withinthe first user data; update a user data list with the first user data,wherein the user data list is associated with the application and isstored at the second computing device; determine second user data fromthe user data list; and launch the application on the first computingdevice, wherein the application uses the second user data.

Features and advantages of the present disclosure will be set forth inthe descriptions thereof that follow, or will be apparent from or bypractice of the disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The description here refers to the accompanying drawings where likereference numerals refer to like parts throughout the several views.

FIG. 1 is a flowchart of a method for authorizing a mobile device toaccess a wireless network and triggering an application in the mobiledevice according to implementations in this disclosure;

FIG. 2 is a block diagram of mobile device information, networkconfiguration, user information and relationship in between according toimplementations in this disclosure; and

FIG. 3 is a flowchart of a method of transmitting user information froma mobile device to a wireless router according to implementations inthis disclosure.

DETAILED DESCRIPTION

Example implementations of the present disclosure will be describedbelow with reference to the accompanying drawings. The same numbersacross the drawings set forth in the following description represent thesame or similar elements, unless differently expressed. Theimplementations set forth in the following description do not representall implementations or embodiments consistent with the presentdisclosure; on the contrary, they are only examples of apparatuses andmethods in accordance with some aspects of this disclosure as detailedin the claims.

In this disclosure, actions of moving a mobile device to a wirelessrouter (i.e., “proximity”) include actions of, including but not limitedto, placing the mobile device within a predetermined range of thewireless router, moving the mobile device around the router within thepredetermined range, moving the mobile device towards the router untilwithin the predetermined range, or combination thereof. In addition, theabove-mentioned one or more actions may be combined with one or moreother events. For example, the mobile device (i.e., “mobile terminal”)may have a software or hardware button, wherein the action of moving themobile device to a wireless router is combined with an event of pressingthe button, which is alternatively called “kissing”. The time differencebetween the moving and the pressing is used to determine proximitybetween the mobile device and the router.

In some scenarios, the methods described herein is applicable to triggerevents such as conducting services of register, check-in, and payment inlocations of hotels, airports, shops, or public transportation. Forexample, when an employee is checking in or out of the office, and hisor her mobile device is approaching the employer's router, mobileinformation pre-stored in the mobile device can be triggered to be sentto the employer via proximate high-speed encrypted data transmission,which allows the employer to do application-based secondaryauthentication to improve data security and greatly reduce time formanual check.

In the following examples, the wireless router is assumed to be properlyconfigured and connected to the Internet.

FIG. 1 is a flowchart of a method for authorizing a mobile device toaccess a wireless network and triggering an application in the mobiledevice.

At operation S11, a mobile device such as a mobile phone is moved to awireless router within a predetermined range, wherein the wirelessrouter is able to detect presence of the mobile device. The detectionmay be embodied by a proximity sensor equipped in the wireless router.Upon detecting the presence of the mobile device, the router establishesa connection between the mobile device and itself.

In one implementation, the pre-determined range may be determined usingstrength of a wireless signal received from the mobile device by therouter, in accordance with a model of a relation between the range andthe signal strength. For example, the router may measure a distance or aposition of the mobile device using a radiofrequency (RF) signalreceived from the mobile device. The model may be pre-configured andstored in the router, or downloaded from a server and dynamicallyadjusted via a network. Alternatively, the predetermined range may bedetermined using the signal strength combined with one or moreparameters, such as a transmission rate and a loss rate, in accordancewith a model of a relation between the range and the signal strength,the transmission rate, and the loss rate.

In another implementation, the pre-determined range may be determinedusing location information of the mobile device received from the mobiledevice by the router or a wireless network device, such as a cloudserver, an accessory distance measurement apparatus equipped in awireless router, or another mobile device of the same type. The locationinformation may be geological information such as, a location of themobile device, a distance between the mobile device and the wirelessnetwork device, and tracking information of the mobile device recordinga trace thereof. Further, the location information may also be temporalinformation, or a combination of the geological information and thetemporal information such as the mobile device being within a distanceof 5 cm from the wireless router for longer than 3 seconds, wherein ageological and temporal model is used to determine the distance and theduration. Alternatively, the above-mentioned location information may beprovided by the mobile device or a third party to the router.

At operations S12-S14, the router authorizing the mobile device toaccess a wireless network associated with the router using a firstdevice identifier of the mobile device. A traditional method toauthenticate a user for communication services and resources is toindicate the user to enter a username and a password. According to thisimplementation, the device identifier received from the mobile device,or the first device identifier, is used to authorize the mobile deviceto access the wireless network, wherein the first device identifierincludes at least one item in the following device information list: anIP address, a MAC address, a mobile phone number, a manufacturer logo, atime stamp, a mobile device number such as a serial number or anInternational Mobile Station Equipment Identity (IMEI), and/or anydevice information that is unique to the mobile device. This method isbased on an assumption that the user of the mobile device near thewireless router is trusted, which is set forth in the followingdescription.

At operation S12, the router receives the first device identifier fromthe mobile device and determines whether the first device identifier isstored in data storage, such a database, wherein the database may storea set of device identifiers, a set of user information and correspondingrelationships between the set of device identifiers and the set of userinformation. The database may be stored in the router or in anotherdevice accessible to the router, wherein the database is encrypted forsecurity of information of the mobile device and the user.

At operation S13, if the first device identifier is not stored in thedatabase, the router encrypts and appends the first device identifier tothe encrypted database, and configures the mobile device for access tothe wireless network. This case indicates that the mobile device isconnected to the router for the first time, wherein the router encryptsthe device identifier, appends or overwrites the device identifier tothe database and performs necessary network configurations in the mobiledevice, wherein in accordance with an automatic configuration of therouter or a request by the mobile device, the router determinesparameters for the mobile device for access to the wireless networkbased upon network configuration information, wherein the networkconfiguration information includes at least one of: a MAC address, an IPaddress, a channel measurement, power information, and batteryinformation. Once properly configured, the mobile device sends a requestto the router for access to the wireless network, such as the Internet,which is then granted by the wireless router upon receiving the request.

At operation S14, if the first device identifier is stored in thedatabase, the router configures the mobile device for access to thewireless network. This case indicates that the mobile device wasconnected to the wireless router, wherein the router performs the samenetwork configuration to the mobile device as described in operationS13.

In one implementation, flowchart 100 may further include an operation ofauthorizing the mobile device to access the wireless network based on apredetermined model, wherein the model includes a corresponding relationbetween location information of the mobile device and network accessinformation.

In one implementation, flowchart 100 may further include an operation ofa second verification process, which determines whether the mobiledevice and a user associated with the mobile device have secure identityinformation using information such as a username, a password, afingerprint, iris information, a sound wave, a two-dimensional code or adynamic password.

In one implementation, flowchart 100 may further include an operation ofsending the location information of the mobile device, the model and thedevice identifier of the mobile device to a cloud server connected via anetwork, wherein the cloud server adjusts or revises the model based onconditions of user behavior, user need and application need, and sendsback the adjusted model to the router and associated applications,thereby authorizing the mobile device in accordance with the conditionsfor adjustment or revision.

At operation S15, the router launches a data communication applicationon the mobile device, including the following sub-operations.

First, the router locates first user information (block 23 in FIG. 2)associated with the first device identifier in the encrypted database ofthe router, wherein the first user information comprises a username anda password.

Second, the router sends the first user information back to the mobiledevice, which may be used for an automatic login service of theapplication.

Then the mobile device incorporates the first user information into auser information list and launches the automatic login service of theapplication, wherein the user information list is associated with theapplication and stored at the mobile device. For example, recentapplications support a function of caching, which stores most recentlyused usernames and passwords for the application. The mobile device maycombine the cached user information and the first user informationreceived from the router to update the cached user information list.

If the user information list as a result of the above-mentioned stepscontains only one item, which is essentially the first user information,the mobile device automatically select the item for the automatic loginservice of the application.

If otherwise, the mobile device indicates a list for user selection,wherein the list includes items in the user information list and anoption item for entering third user information. Once the user selectsor enters new user information that is different from the first userinformation, the mobile device uses the new user information for theautomatic login service of the application. If this sub-operation isexecuted, operation S16 follows as the final operation of this method.

At Operation S16, the mobile device sends the new user information tothe router, wherein the router updates the database with the receiveduser information for the application launched on the mobile device, suchas a social network application, a document uploading application, acloud drive application or any other application that can be used.

In one implementation, at operation S15-S16, if the mobile device hashigh speed network and stable power supply, such as being placed nearthe router with a charger plugged in, the application may further be oneof the following: an application for configuring the mobile device, anapplication for service of documents, pictures, audio or video, anapplication for location based services of weather, news or socialnetworking, and an application for backing up data to a cloud server.

In one implementation, if the user has high demand for network speed,the router may firstly backup the data to the local storage mediuminstalled in the wireless router, and secondly upload the data to thecloud server when the user has low demand for network speed, such as innight time.

In some implementations, the authorization may be completed between morethan one router via a mobile device, the operations of which are setforth in the following description.

First, a first wireless router is configured in accordance to aconfiguration described in connection with FIG. 1, and the mobile deviceis authorized via the operations set forth in the aforementionedimplementation.

Then, a second wireless router at a different location with no wirednetwork connection is switched on, wherein the second wireless routerautomatically enters a repeater work mode to work as a wireless networkrepeater based on a determination that the second wireless router has nowired network connection.

The mobile device, or any device that has been previously authorized bythe first wireless router, is moved towards the second wireless router(e.g., “kissing”), wherein the second wireless router establishes awireless connection with the mobile device and authenticates the mobiledevice via the operations set forth in the aforementionedimplementation.

Upon the mobile device, or any device that has been previouslyauthorized by the first wireless router, being authenticated by thesecond wireless router, the second wireless router sends out a networkconnection request to one or more routers in near location thereof,wherein the request contains a device identifier (can be unique) of themobile device. The format of the request is specialized so that only awireless router of the same kind with the same ability of authorizationis able to parse the request.

Upon the first wireless router receiving and parsing the request sent bythe second wireless router, the first wireless router determines thatwhether the device identifier is within an encrypted database storedwithin the same, wherein the encrypted database maintains a list ofdevice identifier which associates to devices that have been previouslyauthorized by the first wireless router.

Upon a determination that the received device identifier is within theencrypted database of the first wireless router, the first wirelessrouter authorizes the network connection request sent by the secondwireless router, so that the two wireless routers establish a wirelessnetwork connection.

The second wireless router receives network configuration informationcomprising a network name, a network password and an IP address rangefrom the first wireless router, and configures itself in accordance tothe network configuration information, wherein the network configurationinformation is used by the first wireless router to connect to a broadwireless network, such as the Internet.

Finally, the second wireless router disables a Dynamic HostConfiguration Protocol (DHCP) program on the same, wherein the DHCPprogram automatically allocates IP addresses, and switches the work modethereof from the repeater mode to a bridge mode, and the second wirelessrouter uses the first wireless router as a DHCP server.

In these implementations, the second wireless router establishes aconnection to the broad wireless network without any manualconfiguration, whereby coverage of the broad wireless network isenlarged, and the mobile device is able to seamlessly roam within thecoverage of both wireless routers.

FIG. 2 illustrates the data structures and relationship thereof betweena device identifier (e.g., the device information), networkconfiguration information, and user information associated withapplications according to implementations herein.

The device identifier, illustrated in block 21, is stored in a mobiledevice, which is sent to a wireless router for authorization. In oneimplementation, device information 21 can be stored in a format of atable or a database. Device information 21 has a unique and immutableassociation relation to user information 23 stored in the router.

Network configuration information 22 is stored in the router forconfiguring the connected mobile device by automatic allocation or arequest sent by the mobile device. The network configuration informationincludes at least one of: a MAC address, an IP address, a channelmeasurement, power information, or battery information.

User information 23 includes information related to applications andaccount information related to a user. The information related to theapplications include at least one of: a username, a password, a name ofthe application, a version number of the application, a recent logintime stamp associated with the username and the password, and a recentlogout time stamp associated with the username and the password. Theaccount information related to a user includes at least one of: a useraccount number, user identity information, a user photo, user paymentinformation, a user account balance, a time stamp of a recenttransaction, and a location of a recent transaction.

In one implementation, network configuration information 22 and userinformation 23 may be implemented as a component of a complex database.

The data structures and relationships thereof illustrated in FIG. 2 maybe modified and/or extended based on different software and/or hardwareenvironment, wherein the methods described herein may be modifiedaccordingly in accordance with such modification and/or extension.

FIG. 3 is a flowchart of a method of transmitting user information froma mobile device to a wireless router, wherein operations of S31, S32 andS33 are the same as S11, S12 and S13, respectively.

At operations S34-S36, the router receives first user information of anapplication from the mobile device to update an encrypted database atthe router, and launches the application using the first userinformation.

At operation S34, the router receives pre-stored user information,structured as block 23, from the mobile device to determine whethersecond user information associated with the first device identifierexists in the encrypted database, wherein the first device identifier isthe device identifier of the mobile device used in operations S31-S33.

At operation S35, the router determines the second user information doesnot exist in the database. This case indicates that the device isconnected to the router for the first time. The router then furtherdetermines whether the first user information is identical to third userinformation associated with a second device identifier stored in theencrypted database. If the first user information is identical to thethird user information, the mobile device indicates the user to confirmassociation between the first device identifier and the third userinformation, replaces the second device identifier in the encrypteddatabase with the first device identifier, and starts the applicationusing the third user information. This case indicates that a userselects previously used user information with a first-time connectedmobile device. If the first user information is different from any userinformation stored in the database, the mobile device indicates the userto confirm association between the first device identifier and the firstuser information, appends the first user information to the encrypteddatabase, and starts the application with the first user information.This case indicates that neither the user information nor the mobiledevice was used in this router.

At operation S36, the router determines the second user informationexists in the database. If the second user information is identical tothe first user information, the mobile device starts the applicationusing the first user information. This case indicates same userinformation is selected in a previously connected mobile device. If thesecond user information is different from the first user information,the mobile device indicates the user to confirm association between thefirst device identifier and the first user information, replaces thesecond user information in the encrypted database with the first userinformation, then start the application using the first userinformation. This case indicates that different user information isselected in a previously connected mobile device.

In one implementation, a manual operation is needed to compare sensitiveuser information, such as a user photo, with any user informationpre-stored in the encrypted database. Upon a successful comparison, withthe user's confirmation, the router updates the user information. Themobile device user may proceed to use the applications. For example,upon a successful comparison, the mobile device may proceed in anapplication to complete a business transaction using stored paymentinformation. The user information may be updated simultaneously at therouter and the mobile device.

It should be understood that each block or flow in the flowcharts may berealized by computer program instructions. Unless otherwise specified,any or all parts of the examples discussed above can be combined. Theorder of the implementations can be changed or substituted byequivalents and multiple operations can be combined into one or viceversa. The embodiments of the present disclosure can be implemented bycomputer software, hardware, firmware, logic circuits (like ASIC), ortheir combinations. In some examples, part of the functions of thewireless router of the mobile device can be implemented by cloudservers, and part of the data, such as user information, can also bestored or backed up in cloud servers.

In some implementations, the wireless router (and the algorithms,methods, and instructions stored thereon and/or executed thereby) can berealized in hardware including intellectual property (IP) cores,application-specific integrated circuits (ASICs), programmable logicarrays, optical processors, programmable logic controllers, microcode,firmware, microcontrollers, servers, microprocessors, digital signalprocessors or any other suitable circuit. Further, portions of themobile device and the wireless router do not necessarily have to beimplemented in the same manner.

In some implementations, the wireless router can be implemented usinggeneral purpose computers/processors with a computer program that, whenexecuted, carries out any of the respective methods, algorithms and/orinstructions described herein. In addition or alternatively, specialpurpose computers/processors are utilized that contain specializedhardware for carrying out any of the methods, algorithms, orinstructions described herein.

Further, all or a portion of implementations can take the form of acomputer program product accessible from, for example, a non-transitorycomputer-usable or computer-readable medium. In an implementation, anon-transitory computer-usable or computer-readable medium can be anydevice that can tangibly contain, store, communicate, or transport theprogram for use by or in connection with any processor. Thenon-transitory medium can be an electronic device, magnetic device,optical device, electromagnetic device, or a semiconductor device. Othersuitable mediums are also available.

While this disclosure includes what is presently considered to be themost practical and preferred embodiments or implementations, it is to beunderstood that the disclosure is not to be limited to the disclosedembodiments or implementations but is intended to cover variousmodifications and equivalent arrangements included within the spirit andscope of the claims, which scope is to be accorded the broadestinterpretation so as to encompass all such modifications and equivalents(such as equivalent structures) as are permitted under the law.

It should be understood to those of ordinary skills in the art that theimplementations of the present disclosure may be presented as methods,apparatus, systems or computer program products. Accordingly, thepresent disclosure may take the form of an entirely hardwareimplementation, an entirely software implementation, or animplementation combining hardware and software. Moreover, the presentdisclosure may take the form of a computer program product which may beimplemented on one or more computer usable storage media in whichcomputer usable program code is contained.

The above-described implementations have been described in order toallow easy understanding of the present invention and do not limit thepresent invention. On the contrary, the invention is intended to covervarious modifications and equivalent arrangements included within thescope of the appended claims, which scope is to be accorded the broadestinterpretation so as to encompass all such modifications and equivalentstructure as is permitted under the law.

The mobile device may be a computing device, which includes one or morehardware including at least a processor such as a central processingunit (CPU) and a memory for data storage. The CPU may include acontroller for controlling operations of the computing device, or may bea microprocessor, digital signal processor, field programmable gatearray, discrete circuit elements laid out in a custom applicationspecific integrated circuit (ASIC), or any other digital data processor.The CPU may be connected to the memory by a memory bus, one or morewires, one or more cables, a wireless connection, or any otherconnection. The memory may be a read-only memory (ROM), a random accessmemory (RAM), an optical storage, a magnetic storage such as a disc or atape, a non-volatile memory card, a logical storage spanning multiplephysical servers (i.e., a “cloud storage”), a combination thereof, orany other digital storage. The memory stores data and programinstructions that are used by the CPU. In other implementations, theprocessing of the computing device may be distributed among one or moredevices communicating over one or more networks.

Further, in one implementation, for example, computing device can beimplemented using a general purpose computer/processor with a computerprogram that, when executed, carries out any of the respective methods,algorithms and/or instructions described herein. In addition oralternatively, for example, a special purpose computer/processor can beutilized which can contain specialized hardware for carrying out any ofthe methods, algorithms, or instructions described herein. Computingdevice can be implemented on a device separate from the server, such asa cell phone or other hand-held communications device.

Further, all or a portion of implementations of the present inventioncan take the form of a computer program product accessible from, forexample, a computer-usable or computer-readable medium. Acomputer-usable or computer-readable medium can be any device that can,for example, tangibly contain, store, communicate, or transport theprogram for use by or in connection with any processor. The medium canbe, for example, an electronic, magnetic, optical, electromagnetic, or asemiconductor device. Other suitable mediums are also available.

What is claimed is:
 1. A method, comprising: receiving, by a processor,a first device identifier from a first computing device; establishing,by the processor, a connection between the first computing device and asecond computing device when a distance between the first computingdevice and the second computing device is within a predetermined rangefor a predetermined time period; determining, by the processor, whetherthe first device identifier matches a second device identifier stored ina database at the second computing device, wherein the database stores aset of device identifiers, a set of user data, and correspondingrelationships between the set of device identifiers and the set of userdata; locating, by the processor, first user data associated with thefirst device identifier in the database of the second computing devicebased on the determination that the first device identifier matches thesecond device identifier stored in the database; transmitting, by theprocessor, the first user data to the first computing device based on alocation of the first user data associated with the first deviceidentifier in the database of the second computing device; selecting, bythe processor, an application to automatically launch on the firstcomputing device based on application information within the first userdata and based on whether the first computing device has a stable powersupply; updating, by the processor, a user data list with the first userdata, wherein the user data list is associated with the application andis stored at the second computing device; determining, by the processor,second user data from the user data list; and launching, by theprocessor, the application on the first computing device, wherein theapplication uses the second user data.
 2. The method of claim 1, furthercomprising: determining, by the processor, the distance between thefirst computing device and the second computing device; authorizing, bythe processor, the first computing device to access a wireless networkassociated with the second computing device.
 3. The method of claim 1,further comprising: based upon a determination that the first deviceidentifier does not match any one of the set of device identifiersstored in the database, appending the first device identifier to thedatabase and configuring the first computing device for access to awireless network associated with the second computing device.
 4. Themethod of claim 3, wherein the configuring the first computing devicefor access to the wireless network comprises: in accordance with anautomatic configuration of the second computing device or a request bythe first computing device, determining, by the processor, parametersfor the first computing device for access to the wireless network basedupon network configuration data, wherein the network configuration dataincludes at least one of: a MAC address, an IP address, a channelmeasurement, power data, or battery data.
 5. The method of claim 1,wherein the determining whether the first device identifier matches thesecond device identifier stored in the database at the second computingdevice comprises: in accordance with one or more predetermined rules,determining, by the processor, whether the first computing device and auser associated with the first computing device have secure identitydata, wherein the secure identity data and the first device identifierare not the same; and based upon a determination that the firstcomputing device and the user associated with the first computing devicehave secure identity data, determining whether the first deviceidentifier matches the second device identifier stored in the databaseof the second computing device.
 6. The method of claim 1, wherein thelaunching an application in the first computing device comprises:enabling, by the processor, an automatic login service of theapplication for mobile communication, wherein the automatic loginservice uses the first user data transmitted by the processor.
 7. Themethod of claim 1, wherein the launching the application in the firstcomputing device comprises at least one of: enabling, by the processor,a login service of the application using the second user data; basedupon a determination, by the processor, that the second user data doesnot match the first user data, receiving the second user data from thefirst computing device at the second computing device, wherein thereceived second user data comprises a username, a password, a name ofthe application, a version number of the application, a recent logintime stamp associated with the username and the password, or a recentlogout time stamp associated with the username and the password; andupdating, by the processor, user data associated with the first deviceidentifier in the database of the second computing device with thereceived second user data.
 8. A method, comprising: receiving, by aprocessor, a first device identifier from a first computing device inresponse to a determination that a distance between the first computingdevice and a second computing device is within a predetermined range fora predetermined time period; determining, by the processor, whether thefirst device identifier matches a second device identifier stored in adatabase at the second computing device, wherein the database stores aset of device identifiers, a set of user data, and correspondingrelationships between the set of device identifiers and the set of userdata; locating, by the processor, first user data associated with thefirst device identifier in the database of the second computing devicebased on the determination that the first device identifier matches thesecond device identifier stored in the database; transmitting, by theprocessor, the first user data to the first computing device based on alocation of the first user data associated with the first deviceidentifier in the database of the second computing device; selecting, bythe processor, an application to automatically launch on the firstcomputing device based on application information within the first userdata; updating, by the processor, a user data list with the first userdata, wherein the user data list is associated with the application andis stored at the second computing device; determining, by the processor,second user data from the user data list; and launching, by theprocessor, the application on the first computing device, wherein theapplication uses the second user data.
 9. The method of claim 8, whereinthe application to automatically launch on the first computing devicecomprises one of: an application for configuring the first computingdevice, an application for service of documents, pictures, audio orvideo, an application for location based services, and an applicationfor backing up data to a cloud server.
 10. The method of claim 8,wherein the application to automatically launch on the first computingdevice comprises one of: an application for data communication, a socialnetwork application, a document uploading application, a cloud driveapplication, and an application to complete a business transaction usingstored payment information.
 11. The method of claim 8, wherein the firstcomputing device comprises a mobile device and the second computingdevice comprises a wireless router.
 12. The method of claim 8, whereinthe determining whether the first device identifier matches the seconddevice identifier stored in the database at the second computing devicecomprises: in accordance with one or more predetermined rules,determining, by the processor, whether the first computing device and auser associated with the first computing device have secure identitydata, wherein the secure identity data and the first device identifierare not the same; and based upon a determination that the firstcomputing device and the user associated with the first computing devicehave secure identity data, determining whether the first deviceidentifier matches the second device identifier stored in the databaseof the second computing device.
 13. The method of claim 8, wherein thelaunching an application in the first computing device comprises:enabling, by the processor, an automatic login service of theapplication for mobile communication, wherein the automatic loginservice uses the first user data transmitted by the processor.
 14. Themethod of claim 8, wherein the launching the application in the firstcomputing device comprises at least one of: enabling, by the processor,a login service of the application using the second user data; basedupon a determination, by the processor, that the second user data doesnot match the first user data, receiving the second user data from thefirst computing device at the second computing device, wherein thereceived second user data comprises a username, a password, a name ofthe application, a version number of the application, a recent logintime stamp associated with the username and the password, or a recentlogout time stamp associated with the username and the password; andupdating, by the processor, user data associated with the first deviceidentifier in the database of the second computing device with thereceived second user data.
 15. An apparatus, comprising: a memory; and aprocessor configured to execute instructions stored in the memory to:receive a first device identifier from a first computing device;establish a connection between the first computing device and a secondcomputing device when a distance between the first computing device andthe second computing device is within a predetermined range for apredetermined time period; determine whether the first device identifiermatches a second device identifier stored in a database at the secondcomputing device, wherein the database stores a set of deviceidentifiers, a set of user data, and corresponding relationships betweenthe set of device identifiers and the set of user data; locate firstuser data associated with the first device identifier in the database ofthe second computing device based on a determination that the firstdevice identifier matches the second device identifier stored in thedatabase; transmit the first user data to the first computing devicebased on a location of the first user data associated with the firstdevice identifier in the database of the second computing device; selectan application to automatically launch on the first computing devicebased on application information within the first user data; update auser data list with the first user data, wherein the user data list isassociated with the application and is stored at the second computingdevice; determine second user data from the user data list; and launchthe application on the first computing device, wherein the applicationuses the second user data.
 16. The apparatus of claim 15, wherein theinstructions stored in the memory further comprise instructions to:determine the distance between the first computing device and the secondcomputing device; authorize the first computing device to access awireless network associated with the second computing device.
 17. Theapparatus of claim 16, wherein the instructions stored in the memoryfurther comprise instructions to: establish a connection between thefirst computing device and a third computing device when a distancebetween the first computing device and the third computing device iswithin the predetermined range for the predetermined time period; andauthorize the first computing device to access the wireless networkassociated with the second computing device via the third computingdevice.
 18. The apparatus of claim 17, wherein the first computingdevice comprises a mobile device, the second computing device comprisesa first wireless router, and the third computing device comprises asecond wireless router.
 19. The apparatus of claim 17, wherein theinstructions stored in the memory further comprise instructions to: set,without manual configuration, the third computing device to a repeaterwork mode based on a determination that the third computing device hasno wired network connection.
 20. The apparatus of claim 19, wherein thefirst computing device is authorized to access the wireless networkassociated with the second computing device via the third computingdevice when the third computing device is in the repeater work mode andthe first computing device has been previously authorized by the secondcomputing device to access the wireless network associated with thesecond computing device.