Wireless device registration, such as automatic registration of a Wi-Fi enabled device

ABSTRACT

A system for providing a wireless device with access to a computer network includes an access point that sets up a radio link with the wireless device and couples the wireless device to the network. The system also includes a server that receives data packets from the access point through the computer network. The data packets include at least one data packet that has a first identifier that uniquely identifies the wireless device and a second identifier that corresponds to the wireless device. The system further includes a database that is coupled to the server and stores data for associating a service plan with the first and second identifiers and basing the service plan, at least in part, on the second identifier. Other features and systems are also disclosed.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a continuation of U.S. patent application Ser. No.14/629,434, filed Feb. 23, 2015, entitled WIRELESS DEVICE REGISTRATION,SUCH AS AUTOMATIC REGISTRATION OF A WI-FI ENABLED DEVICE, now U.S. Pat.No. 9,307,488; which is a continuation of U.S. patent application Ser.No. 13/960,745, filed Aug. 6, 2013, entitled WIRELESS DEVICEREGISTRATION, SUCH AS AUTOMATIC REGISTRATION OF A WI-FI ENABLED DEVICE,now U.S. Pat. No. 8,964,715; which is a continuation of U.S. patentapplication Ser. No. 12/442,386 filed on Nov. 4, 2009, now U.S. Pat. No.8,503,358, entitled WIRELESS DEVICE REGISTRATION, SUCH AS AUTOMATICREGISTRATION OF A WI-FI ENABLED DEVICE; which is a U.S. National Stageapplication of International Application No. PCT/US2007/079222, entitledWIRELESS DEVICE REGISTRATION, SUCH AS AUTOMATIC REGISTRATION OF A WI-FIENABLED DEVICE, filed Sep. 21, 2007, which claims priority to U.S.Provisional Patent Application Nos. 60/846,697 and 60/846,650, filedSep. 21, 2006, each of which are hereby incorporated by reference.

BACKGROUND

Wireless local area networks (WLAN), and wireless wide area networks(WWAN), are becoming increasingly available in most metropolitan andsome suburban areas. These wireless networks operate under a variety ofstandards, including IEEE 802.11 (including 802.11(a), (b) and (g),often referred to as “Wi-Fi”) and IEEE 802.16 (often referred to as“WiMax”). A user with a laptop and wireless connection can readily gainaccess the Internet or other networks via such hot spots.

A laptop must typically register with a WLAN or WWAN service provider,Wireless Internet Service Provider (WISP), or other service providers soas to gain desired network access. To do so, the user provides a username and password which identifies the user. However, this informationdoes not identify the wireless device accessing the network. Priorsystems have used http clients or user agents to identify devices, suchas by type of browser. These methods are not secure. Further, they maynot positively identify the device connected to the network. Forexample, identifiers such as Media Access Control (MAC) addresses oftenhave arbitrary (yet unique) values that cannot be readily looked up(e.g., in a database) due to a multitude of component sources andfurther, are readily changeable in most devices. Moreover, if multiplerate plans are associated with the user or device, these plans cannot bereadily associated with the user or device without additionalinformation, and if so, could be prone to being hacked or otherwisecompromised by malicious activity. For example, the IP address of aparticular device can be “spoofed.”

The above examples of some related systems and associated limitationsare intended to be illustrative and not exclusive. Other limitations ofexisting prior systems will become apparent to those skilled in the artupon reading the following Detailed Description. Overall, there is aneed for a system that overcomes the above problems as well as providesadditional benefits.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram illustrating a system for providing variouswireless devices with access to a wireless network under aspects of theinvention.

FIG. 2 is a block diagram illustrating an example of a wireless devicefor use in the system of FIG. 1.

FIG. 3 is a flow diagram illustrating an example of a routine performedby a wireless device and network server for providing wireless networkaccess under the system of FIG. 1.

FIG. 4 is an example of a data structure or table employed by thenetwork server under the system of FIG. 1.

FIG. 5 is a table showing an example of header fields that may beemployed in one or more data packets communicated to the network serverunder the system of FIG. 1.

DETAILED DESCRIPTION

As described in detail below, systems and associated methods embed orprovide one or more codes within wireless enabled or wireless accessdevices, where the codes identify a vendor or manufacturer and/or adevice or model. The codes may be transmitted securely to a wirelessaccess point and used by a network server (with associated database) toauthorize and establish wireless service under an appropriate account.Any of a variety of wireless devices or wireless enabled components canbe employed, for example, as a Wi-Fi enabled camera, wireless MP3/audiodevice, as well as traditional wireless devices such as laptops ormobile phones.

Notably, various classes of service can be associated with each device,manufacturer, venue, or data payload. For example, devices from aparticular manufacture may receive a preferred service plan having apreferred rate. Alternatively or additionally, all wireless camerasowned by a particular individual may receive a preferred rate planregardless of the manufacturer. Alternatively or additionally, users mayreceive different rate plans depending upon the venue or location, suchas a per minute plan in airports, train stations, and the like, butdifferent rate plans, such as hourly or daily at hotels, conventioncenters, etc. Alternatively or additionally, different types of data ordata payload type may receive different rate plans, such as voicetraffic (e.g., voice over IP (VoIP)) receiving a different rate planthan wirelessly accessed video or audio/music content.

Under the suitable system described in detail herein, a Wi-Fi-, WiMax-or similarly-enabled device and compatible access point (AP) employknown communication protocols, such as Wireless Internet ServiceProvider (WISP) roaming, and a smart client interface, to permit securetransfer of information between the device and the AP. For example,HTTPS is used to encrypt or secure the manufacturer and model codesprovided by the wireless device. The manufacturer and model codes can besecurely stored in tamper-resistant memory of the device, andtransmitted in header information provided by the device to the AP.

The network server employs the manufacturer and model codes, as well aspossibly other information, to establish an appropriate WISP accessaccount and rate plan. A unique Media Access Control (MAC) addressuniquely identifies each device, and helps to uniquely identify eachaccount in the database. (Of course, other unique identifiers orglobally unique identifiers (GUID) may be used.) A timestamp can beadded, which may be used to identify a starting point for trial accessthat may be provided for a limited time period, as well as identifyingtime for periodic automatic billings.

While “Wi-Fi” is used herein as an example, the system may employ anytype of wireless protocol, including wireless local, wide andmetropolitan area network (WLAN, WWAN, WMAN, respectively) accessprotocols. For example, wireless protocols can be based on any of the802.11 IEEE standards. Some embodiments the system can employ Bluetooth,Ultra-wideband, WiMAX, or ZigBee protocols. Further, while a particularsystem employing wireless devices communicating with a network servervia an AP and network (e.g. the Internet), other system configurationsare possible. For example, a system can include a computer that providesa physical network link to the Internet and also provides a wirelessbridge to a peripheral device (e.g., a wireless device or anothercomputer).

Various examples of the invention will now be described. The followingdescription provides specific details for a thorough understanding andenabling description of these examples. One skilled in the art willunderstand, however, that the invention may be practiced without many ofthese details. Additionally, some well-known structures or functions maynot be shown or described in detail, so as to avoid unnecessarilyobscuring the relevant description.

The terminology used in the description presented below is intended tobe interpreted in its broadest reasonable manner, even though it isbeing used in conjunction with a detailed description of certainspecific examples of the invention. Certain terms may even be emphasizedbelow; however, any terminology intended to be interpreted in anyrestricted manner will be overtly and specifically defined as such inthis Detailed Description section.

FIG. 1 and the following discussion provide a brief, general descriptionof a suitable environment in which the invention can be implemented.Although not required, aspects of the invention are described in thegeneral context of computer-executable instructions, such as routinesexecuted by a general-purpose computer, e.g., a server computer,wireless device or personal computer. Those skilled in the relevant artwill appreciate that the invention can be practiced with othercommunications, data processing, or computer system configurations,including: Internet appliances, hand-held devices (including personaldigital assistants (PDAs)), wearable computers, all manner of cellularor mobile phones, multi-processor systems, microprocessor-based orprogrammable consumer electronics, set-top boxes, network PCs,mini-computers, mainframe computers, and the like. Indeed, the terms“computer,” “server,” “host,” “host system,” and the like are generallyused interchangeably herein, and refer to any of the above devices andsystems, as well as any data processor.

Aspects of the invention can be embodied in a special purpose computeror data processor that is specifically programmed, configured, orconstructed to perform one or more of the computer-executableinstructions explained in detail herein. Aspects of the invention canalso be practiced in distributed computing environments where tasks ormodules are performed by remote processing devices, which are linkedthrough a communications network, such as a Local Area Network (LAN),Wide Area Network (WAN), or the Internet. In a distributed computingenvironment, program modules may be located in both local and remotememory storage devices.

Aspects of the invention may be stored or distributed oncomputer-readable media, including magnetically or optically readablecomputer discs, hard-wired or preprogrammed chips (e.g., EEPROMsemiconductor chips), nanotechnology memory, biological memory, or otherdata storage media. Indeed, computer implemented instructions, datastructures, screen displays, and other data under aspects of theinvention may be distributed over the Internet or over other networks(including wireless networks), on a propagated signal on a propagationmedium (e.g., an electromagnetic wave(s), a sound wave, etc.) over aperiod of time, or they may be provided on any analog or digital network(packet switched, circuit switched, or other scheme).

Referring to FIG. 1, a system 100 for providing a wireless device 112with access to a computer network is shown. The system 100 includes acomputer network 102, one or more APs 104, a server 106, and a database108. While a single computer network 102 is shown in FIG. 1, two or morenetworks may well be interposed between the wireless devices and theserver 106, such as wireless LANs between the wireless devices and theAPs, and one or more a wired networks between the APs and the server.The APs 104 set up, at least in part, radio links 110 between wirelessdevices 112 a-d and the network 102. The server 106 (e.g., a Radiusserver or other type of authentication server) receives data packetsfrom the APs 104 through the network 102. These data packets can beused, for example, to authenticate network access of one or more of thewireless devices 112 a-e at an individual AP 104. Such packets caninclude a first identifier or unique device identifier for uniquelyidentifying a wireless device, such as a MAC address. In manyembodiments, these packets also include at least a second identifier ora Wi-Fi service identifier that corresponds to a manufacturer or vendorcode, model code, or both, embedded in the wireless device, as describedherein. The database 108, in operation, stores data that associates aWi-Fi service plan with the device and service identifiers. For example,the database 108 can associate a MAC address, vendor/model code, or both(or portions thereof) with a specific service plan that should beprovided to any device made by a particular manufacturer. The server 102can later identify the service plan that should be provided to eachwireless device by looking up the MAC address in the database 108. Ofcourse, as will be described below, other examples are possible.

In many embodiments, the wireless devices are Wi-Fi enabled deviceswithout the capability to operate full function browsers. For example,Wi-Fi enabled devices can include a VoIP phone 112 a, an mp3 player 112b, a digital camera 112 c, a laptop computer 112 d, or any otherwireless device 112 e. Of course any other types of Wi-Fi or wirelessenabled devices are possible, such as those that include a card or othertype of peripheral adapter for communicating with an AP and over thenetwork 102. Also, in other embodiments, two or more Wi-Fi enableddevices can communicate at a common AP. For example, the laptop 110 eand the other wireless device 110 e are shown in FIG. 1 as communicatingwith the same AP.

Referring to FIG. 2, a simplified block diagram of wireless enableddevice 212 is shown. The device 212 may be any wireless device, such asdevices 112 of FIG. 1. The device 212 includes one or more CPUs 220(e.g., a processor), an input/output component 222, a Wi-Ficommunication component 224, and a memory 230. The CPU 220 cancoordinate communications between the input/output component 222, theWi-Fi component 224, and the memory 230. The input/output component 222can include input devices such as keypads, touch screens, and othertypes of user input devices. The output component 222 can also include agraphical display or other type of output device for displaying data toa user, and/or audio output. The Wi-Fi component 224, in operation, canexchange data over a radio link with an AP. In many embodiments, theWi-Fi component can also communicate with other devices that areconfigured to act as an AP or a Wi-Fi bridge (e.g., in an ad-hocconfiguration).

In many embodiments, the memory 230 stores one or more unique deviceidentifiers 232 and one or more Wi-Fi service identifiers 234. Thedevice identifiers 232 can include, for example, a MAC address, a GUIDor serial number, and/or a dynamically assigned IP address. In general,the unique identifier is an arbitrary yet unique value that isdistinctive only to the particular device 206. The device identifierscan have values that are established by the manufacturer or vendor ofthe device 206 or by the manufacturer of a particular component withinthe device 112 e. For example, manufacturers or vendors of the device206 can program a unique identifier into the memory 230. Alternatively,a different manufacture who produces the memory 230 (e.g., before thedevice 212 is assembled) may set the value of the unique identifier.

The service identifiers 234, on the other hand, are not unique to thedevice 206. A service identifier is an embedded code that is programmedby the manufacturer or vendor of the device 212. In many embodiments,this code can directly correspond to the manufacturer or vendor of thedevice. Alternatively or additionally, the service identifier can beindicative of a device type (e.g., an mp3 player, a digital camera, or aVoIP phone) as well as a model type provided by a specific manufactureror vendor. For example, the service identifier can refer to a specificmodel of digital camera, such as a 5 MegaPixel model or an 8 MegaPixelmodel.

The memory 230 can also store processing instructions that enable theCPU 220 to transmit the device and service identifiers over the Wi-Ficomponent 224. For example, the processing instructions may instruct thedevice 212 to identify a particular service set identifier (SSID) beforeestablishing a radio link with an AP. Alternatively, the processinginstructions may cause the device 212 to associate any Wi-Ficommunications with an unbroadcasted SSID. In either of these examples,the SSID may be associated with a vendor of the device 212 and may onlyenable network access at APs that are provisioned by the vendor. Thedevice 212 can transmit the Wi-Fi service identifier(s) in a secure orencrypted fashion, such as using secure socket layers (SSL), or othersecure method.

Referring to FIG. 3, a method 300 for providing a wireless device withaccess to computer network is shown. The depicted example, the method300 can be used to set up a temporary account, such as a trialevaluation of a Wi-Fi service. In the method 300, network access isinitiated by limited or virtually no user input of the wireless device.For example, a wireless device may automatically create a networkconnection when it is brought into range of an AP. Additionally oralternatively, the wireless device may create such a connection when itis powered on or when the user acknowledges a confirmation screen on adisplay of the wireless device.

Referring again to FIG. 3, the method 300 first includes receiving arequest from a wireless device that has a unique device identifier and aservice identifier (block 302). The wireless device may first transmitthese identifiers to an AP via a radio link. The AP may in turn transmitthe device and service identifiers in a data packet to a server that iscoupled to the AP (via a computer network). In many embodiments, thedevice and services identifier can be included in one or more headerfields of such a data packet. If the device identifier is a MAC address,for example, it is automatically included in the header field.

After receiving a data packet, a server can determine whether thewireless device has an existing Wi-Fi service plan (block 304). Forexample, a server may use the device identifier to look up in a databasewhether the user of a particular wireless device has previouslyactivated a service plan (or account) of the device. If a service planhas been activated, the server can determine whether this account isstill active or if the account has expired (block 306). If the accounthas not expired, the server can authorize the network access of thewireless device (block 308).

In contrast to conventional methods of wireless authentication, theauthentication of method 300 is based, at least in part, on both thedevice and service identifiers of the wireless device. For example, theauthentication process of mobile phone networks may use adevice-swappable subscriber identify module (SIM) card. As a result, thesame subscriber may be authenticated to a cellular network on one cellphone today, but later swap the SIM out and place it into another phonethe next day. The authentication of method 300, however, uses a deviceidentifier which is embedded into the permanent (e.g. non-removable andalterable) memory of the wireless device. In addition, because thewireless device is accessing an IP network and not a mobile phonenetwork, the method 300 can also employ well established encryptiontechniques of IP based networks. For example, the header fields and thepayload of the data packet may be encrypted (e.g., via HTTPS). In manyexamples, the data packet can also include the local IP address and/or aphysical location of the wireless device. Accordingly, when the wirelessdevice is authorized at the server, these measures may prevent spoofingand surreptitious access to a network. For example, the server canprevent playback attacks by receiving a locally and dynamically assignedTCP/IP address as a key within the service identifier (or other datafield of a data packet). This key can be compared with another TCP/IPaddress that is conventionally associated with data packets as they aretransmitted to the server from an AP near the wireless device. Suchconventional TCP/IP addresses, for example, can also be located in aheader field and could correspond to the physical location of a wirelessdevice. If the dynamic TCP/IP address of the key does not correspondwith an expected physical location of the conventional TCP/IP address(e.g. the conventional TCP/IP address of the wireless device indicatesthat it is in Los Angeles, but instead should be associated withSeattle), the server can deny authentication or access to a wirelessservice plan. In additional or alternative examples, the method 300 mayalso use known Wi-Fi based encryption techniques.

If the service plan has expired, the server can indicate to an AP that awireless device should not have access to the network (block 310).Additionally or alternatively, the server can also provide instructionsto the wireless device as to how to re-activate the account or create anew account. For example, the instructions can cause a display of awireless device to display a customer service phone number or link to aweb address to obtain a new account. If the service plan is initially atrial evaluation, the user may access customer services to set up afee-based account.

Referring to block 312, if the wireless device does not have a serviceplan, the server identifies a service plan based on the serviceidentifier. In many embodiments, the service plan and correspondingidentifier can be based on the manufacturer or vendor of the wirelessdevice. For example, a particular manufacturer or vendor of a digitalcamera may offer the free trial network access as an incentive topurchase the digital camera or as an incentive to later purchasewireless network access (as under block 310). The service provider canalso work out an agreement with the manufacturer or vendor to includesuch a service identifier. In other examples, the service identifierincludes a model or device type that is used in lieu of or incombination with manufacturer or vendor information. Further, in manyexamples, a fee structure and/or a level of quality of service may bebased on a particular manufacture, vendor, model type, or device type.For example, a Wi-Fi enabled digital camera may have a lower rateservice plan than a higher bandwidth consuming VoIP device.

Upon identifying a service plan, the service plan can be activated forthe wireless device (block 314) and the server can authorize the networkaccess of wireless device access at the AP (block 308). In manyembodiments, activating the account includes associating the deviceidentifier with the service plan (block 316). Activating the account mayalso include associating other types of identifiers with the account,such as a phone number, a user name, a billing address, etc. A user maybe able to access the activated account, such as via an online browser.Accordingly, the user can view the service plan and/or modify featuresof the plan (e.g., billing rate, data plan, etc.). For example, amanufacturer or vendor can provide the user instructions for looking upthe MAC address (a device identifier) within a wireless address. ThisMAC address can then be used by the user or by customer service toaccess the particular service plan corresponding to the wireless device.Activating the account may also include storing a time stampcorresponding to the activation day in a database (block 318). Such atime stamp may correspond to the time and/or date at which the accountwas activated. When a predetermined amount of time elapses after thisactivation time, the service plan can be at least temporarilydiscontinued.

Referring to FIG. 4, an example is shown of a table 400 with variousfields as stored in a database in communication with the server. Whilethe term “field” and “table” are used herein, any type of data structureor data object can be employed. For example, relevant data can havepreceding headers, or other overhead data preceding (or following) therelevant data. Alternatively, relevant data can avoid the use of anyoverhead data, such as headers, and simply be recognized by a certainbyte or series of bytes within a serial data stream. Data structures mayconform to conventions of object oriented programming and/or to othertypes of programming techniques. Any number of data structures and typescan be employed herein.

Table 400 shows a unique device identifier field 402, a Wi-Fi serviceidentifier field 404, a Wi-Fi service plan field 406, and othercredentials field 408, all of which can correspond to wireless devices412 a-g. For example, the unique identifier field 402 shows the type ofidentifier that a server uses to identify the wireless devices 412 a-g.These fields also have sub-fields that may also store service planspecific values. The other credentials field 408, for example, includesvalues that correspond to whether an IP address should be used toprevent spoofing and other types of surreptitious access to a network.In one specific example, the digital camera 412 a is manufactured by anelectronics company that offers a trial 6 month service plan. Thedigital camera 412 b, on the other hand, is not manufactured by thiscompany and therefore its user does not qualify for the free trial userplan. In another example, the mp3 player 412 c qualifies for a 3 monthtrial service plan based on its device type (and not its manufacturer orvendor). In yet another example, a service plan bases its quality ofservice on device type. In this example, the VoIP phone 412 d receives ahigher quality of service than the laptop 412 e. In yet another example,a service plan bases its rate on the type of vendor that supplies awireless device. Accordingly, because the VoIP phone 412 f is providedby a particular vendor that supplied the phone (i.e., Cellular ServiceProvider B), the service plan has a reduced rate relative to the VoIPphone 412 g.

Referring to FIG. 5, an example is shown of a table 500 that includesheader fields 502, 504 corresponding to a data packet that may be sentto a server for Internet Service Provider roaming (WISPr)authentication. The header field 502 is a WISPr username having adefault account identifier that can be stored, for example, in thememory of the wireless device. The header field 504 is a WISPr passwordthat is an aggregate of a Wi-Fi service identifier, a flag parameter, alocally and/or dynamically network assigned IP address, a MAC address(i.e., a device identifier), and a default account password. In manyexamples, the default account and password can be updated to correspondwith a user upon activation of a new account. Table 500 also showsexample values that may be associated with the WISPr username andpassword fields 502, 504.

Many alternatives may be employed. In general, alternatives andalternative embodiments described herein are substantially similar topreviously described embodiments, and common elements and functions areidentified by the same reference numbers. Only significant differencesin construction or operation are described in detail.

Under one alternative, a user may purchase a rate plan that allows thatuser to use any wireless device in a given set, category, class orfamily. For example, a user may purchase a rate plan that allows thatuser to use any Wi-Fi-enabled camera within the network. Near-fieldcommunications, such as Bluetooth, can be used to exchangemanufacturer/model codes or other identifiers or keys between Wi-Fidevices, all of which would be usable under the common plan for thatcategory of devices. The database and network server would track (andconfirm) each device within the category.

Under another alternative, a mobile phone or similar device could beused to exchange device codes between authorized Wi-Fi devices.Therefore, rather than use a manufacturer code among similar deviceswithin a category (e.g., Wi-Fi cameras category), the mobile phoneexports its phone number to each Wi-Fi device in the category. Thosedevices in turn add that phone number to their embedded manufacturer andmodel codes, which are then provided to the APs. The network serverreceives the manufacturer and model codes along with the phone number toassociate those devices with a common plan and thereby enable a user toreceive a single rate plan for multiple devices in a given category.

Under yet another alternative, a wireless device can include aperipheral attachment that associates device and service identifiers fora particular device. For example, a laptop can be coupled to a USBmemory ‘stick’ for enabling VoIP communication. The USB stick may usethe device identifier of the laptop (e.g., a MAC address) and associateits own service identifier with a Wi-Fi transmission that itcommunicates to an AP. It is also contemplated that such peripheralattachments could be exchanged to provide additional or alternativefeatures. For example, a USB memory ‘stick’ could be swapped out withanother USB memory ‘stick’ that offers a different quality of service ora different rate plan. The use of the peripheral attachment is anexample only, and the above functionality can be implemented solely insoftware with appropriate security measure, such as encryption.

Unless the context clearly requires otherwise, throughout thedescription and the claims, the words “comprise,” “comprising,” and thelike are to be construed in an inclusive sense, as opposed to anexclusive or exhaustive sense; that is to say, in the sense of“including, but not limited to.” As used herein, the terms “connected,”“coupled,” or any variant thereof, means any connection or coupling,either direct or indirect, between two or more elements; the coupling ofconnection between the elements can be physical, logical, or acombination thereof. Additionally, the words “herein,” “above,” “below,”and words of similar import, when used in this application, shall referto this application as a whole and not to any particular portions ofthis application. Where the context permits, words in the above DetailedDescription using the singular or plural number may also include theplural or singular number respectively. The word “or,” in reference to alist of two or more items, covers all of the following interpretationsof the word: any of the items in the list, all of the items in the list,and any combination of the items in the list.

The above detailed description of embodiments of the invention is notintended to be exhaustive or to limit the invention to the precise formdisclosed above. While specific embodiments of, and examples for, theinvention are described above for illustrative purposes, variousequivalent modifications are possible within the scope of the invention,as those skilled in the relevant art will recognize. For example, whileprocesses or blocks are presented in a given order, alternativeembodiments may perform routines having steps, or employ systems havingblocks, in a different order, and some processes or blocks may bedeleted, moved, added, subdivided, combined, and/or modified to providealternative or subcombinations. Each of these processes or blocks may beimplemented in a variety of different ways. Also, while processes orblocks are at times shown as being performed in series, these processesor blocks may instead be performed in parallel, or may be performed atdifferent times. Further any specific numbers noted herein are onlyexamples: alternative implementations may employ differing values orranges.

The teachings of the invention provided herein can be applied to othersystems, not necessarily the system described above. The elements andacts of the various embodiments described above can be combined toprovide further embodiments.

Any patents and applications and other references noted above, includingany that may be listed in accompanying filing papers, are incorporatedherein by reference. Aspects of the invention can be modified, ifnecessary, to employ the systems, functions, and concepts of the variousreferences described above to provide yet further embodiments of theinvention.

These and other changes can be made to the invention in light of theabove Detailed Description. While the above description describescertain embodiments of the invention, and describes the best modecontemplated, no matter how detailed the above appears in text, theinvention can be practiced in many ways. Details of the system may varyconsiderably in its implementation details, while still beingencompassed by the invention disclosed herein. As noted above,particular terminology used when describing certain features or aspectsof the invention should not be taken to imply that the terminology isbeing redefined herein to be restricted to any specific characteristics,features, or aspects of the invention with which that terminology isassociated. In general, the terms used in the following claims shouldnot be construed to limit the invention to the specific embodimentsdisclosed in the specification, unless the above Detailed Descriptionsection explicitly defines such terms. Accordingly, the actual scope ofthe invention encompasses not only the disclosed embodiments, but alsoall equivalent ways of practicing or implementing the invention underthe claims.

While certain aspects of the invention are presented below in certainclaim forms, the inventors contemplate the various aspects of theinvention in any number of claim forms. For example, while only oneaspect of the invention is recited as a means-plus-function claim under35 U.S.C sec. 112, sixth paragraph, other aspects may likewise beembodied as a means-plus-function claim, or in other forms, such asbeing embodied in a computer-readable medium. (Any claims intended to betreated under 35 U.S.C. §112, ¶6 will begin with the words “means for”.)Accordingly, the inventors reserve the right to add additional claimsafter filing the application to pursue such additional claim forms forother aspects of the invention.

We claim:
 1. A wireless device configured to request and obtain Wi-Fiaccess to a computer network, the device comprising: at least onewireless transceiver; at least one memory storing instructions; at leastone processor, coupled to the wireless transceiver and memory, andconfigured to execute the instructions, wherein the instructions areconfigured to cause the device to: transmit, from the wireless device, amessage regarding a request for the wireless device to access a computernetwork, wherein the message includes a device identifier and a Wi-Fiservice identifier; and access, by the wireless device, information viathe computer network, wherein prior to accessing the information: aservice plan is associated with the wireless device based on at leastthe Wi-Fi service identifier, wherein the service plan is for wirelessaccess to the computer network and not to a cellular phone network; inresponse to a determination that the service plan has expired,receiving, by the wireless device, one or more instructions tore-activate the service plan or obtain a new service plan; and wirelessaccess between the wireless device and a Wi-Fi access point coupled tothe computer network is authenticated based on the service plan, whereinthe authenticating of the wireless access is not performed based on useof a subscriber identity module (SIM) associated with the wirelessdevice.
 2. The wireless device of claim 1 wherein at least one of thereceived instructions causes the wireless device to display a customerservice phone number or a link to a web address.
 3. The wireless deviceof claim 1 wherein the Wi-Fi service identifier is further based on atleast one of a model type, device type, manufacturer code, or vendorcode.
 4. The wireless device of claim 1 wherein a time stampcorresponding to an activation time of the service plan is produced andthe service plan is at least temporarily discontinued when apredetermined amount of time elapses after the activation time.
 5. Thewireless device of claim 1 wherein the message is transmitted as a datapacket and at least one of the device identifier and the Wi-Fi serviceidentifier is located in one or more header fields of the data packet.6. The wireless device of claim 1 wherein the device identifier istransmitted securely, and wherein the service plan is based on an amountof bandwidth that is consumable by the wireless device under the serviceplan.
 7. A non-transitory computer-readable storage medium whosecontents cause at least one processor to perform a process in a wirelessdevice for accessing a wireless packet-switched computer network under aservice plan, the wireless packet-switched computer network includingone or more of a wireless local area network (WLAN), a wireless widearea network (WWAN), or a wireless metropolitan area network (WMAN), theprocess comprising: wirelessly transmitting a first data packet from awireless device to a packet-switched computer network that is coupled toa server and a first wireless access point, wherein the first datapacket includes a wireless service identifier; and wherein the firstdata packet also includes a unique device identifier corresponding tothe wireless device; accessing, by the wireless device, information viathe packet-switched computer network, wherein prior to accessing theinformation: a service plan is identified based on the wireless serviceidentifier, wherein the service plan is a temporary service plan; inresponse to a determination that the identified service plan hasexpired, an instruction is received to re-activate the identifiedservice plan; and the identified service plan is associated with thedevice identifier; and a second data packet is communicated to the firstaccess point, wherein the second data packet enables the wireless deviceto access one or more of the WLAN, WWAN, or WMAN under the identifiedservice plan, and wherein the WLAN, WWAN, or WMAN are IP based computernetworks and are not mobile telephone networks.
 8. The non-transitorycomputer-readable storage medium of claim 7 wherein the receivedinstruction causes the wireless device to display a customer servicephone number or a link to a web address.
 9. The non-transitorycomputer-readable storage medium of claim 7 wherein at least one of thedevice identifier and the service identifier is located in one or moreheader fields of the first data packet.
 10. The non-transitorycomputer-readable storage medium of claim 7 wherein prior to the seconddata packet being communicated to the first access point: a locally anddynamically assigned TCP/IP address embedded as a key in the first datapacket is compared with another TCP/IP address associated with the firstdata packet and corresponding to a physical location of the wirelessdevice; and use of the identified service plan is authenticated based onthe comparison of the locally and dynamically assigned TCP/IP addressand the TCP/IP address corresponding to the physical location of thewireless device.
 11. The non-transitory computer-readable storage mediumof claim 7 wherein the method further includes: transmitting a thirddata packet from the wireless device to a second access point coupled tothe computer network, the third data packet including the deviceidentifier, and being transmitted at a time when the wireless device isno longer accessing the computer network through the first access point;identifying the identified service plan based at least in part on thedevice identifier; and receiving, at the wireless device, a fourth datapacket that enables the wireless device to re-access the computernetwork through the second access point.
 12. The non-transitorycomputer-readable storage medium of claim 7 wherein the identifiedservice plan is discontinued at least temporarily when a predeterminedamount of time elapses after an activation of the identified serviceplan, and wherein a third data packet is communicated to the wirelessdevice, the communicated third data packet including an indication thatthe identified service plan is discontinued, and/or an indication withinstructions corresponding to re-activating the identified service planor activating a new service plan.
 13. The method of claim 7 wherein thedevice identifier is transmitted securely.
 14. A method in a wirelessdevice for obtaining Wi-Fi access to a computer network, the methodcomprising: identifying, by the wireless device, a computer networkassociated with a particular secure set identifier (SSID); transmitting,from the wireless device, a message regarding a request for the wirelessdevice to access the computer network, wherein the message includes adevice identifier and a Wi-Fi service identifier, and wherein thetransmitting occurs after identifying the particular SSID for thecomputer network; and accessing, by the wireless device, information viathe computer network, wherein prior to accessing the information: aservice plan is associated with the wireless device based on at leastthe Wi-Fi service identifier, wherein the device identifier isautomatically associated with the service plan; and wireless accessbetween the wireless device and a Wi-Fi access point coupled to thecomputer network is automatically authenticated based on the serviceplan, wherein the automatic authenticating of the wireless access is notbased on use of a subscriber identity module (SIM) associated with thewireless device.
 15. The method of claim 14 wherein the wireless deviceis a camera or an audio device.
 16. The method of claim 14 wherein thewireless device exchanges one or more codes or identifiers with at leastone other wireless device in a predetermined group of wireless devicesto enable wireless access under the service plan.
 17. The method ofclaim 16 wherein at least one code or identifier is a telephone number,and wherein the service plan is a common rate plan for allowing two ormore wireless devices that belong to the predefined group of wirelessdevices to wirelessly access the computer network and not to wirelesslyaccess a cellular phone network.
 18. The method of claim 14 wherein theservice plan is further based on at least one of a model type, devicetype, manufacturer code, or vendor code.
 19. The method of claim 14wherein the SSID is associated with a vendor of the wireless device. 20.The method of claim 14 wherein the SSID further enables wireless accessonly at Wi-Fi access points that are provisioned by the associatedvendor.