System configured to bypass an authentication process

ABSTRACT

A system and method of enabling a wireless device that has no directly accessible wireless Internet connection at a given location to make a data connection through a neighbouring different wireless device that does have directly accessible wireless Internet connection, to connect to the Internet. Specifically such indirect Internet connection does not require any authorization from any such other device, such as a server, other than between both wireless devices and additionally the wireless device that has no directly accessible wireless Internet connection does not require any credits from the wireless network to which the wireless device that does have directly accessible wireless Internet connection is connected to.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.15/548,351, filed Aug. 2, 2017, which claims the priority ofPCT/GB2016/050241, filed on Feb. 3, 2016, which claims the benefit ofpriority to Great Britain Application No. GB 1501723.9, filed on Feb. 3,2015, the entire contents of which are fully incorporated herein byreference.

FIELD OF THE INVENTION

A system and method of operating a communications system to extend theInternet access globally to all wireless devices adapted as per thisinvention. Aspects of the disclosures relate in particular to a systemand method of enabling a wireless device adapted as per this inventionthat has no directly accessible wireless Internet connection at a givenlocation to make a data connection through a neighbouring differentwireless device adapted as per this invention that does have directlyaccessible wireless Internet connection, to connect to the Internet.Specifically such indirect internet connection of this invention notrequiring any authorization form any such other device, such as aserver, other than between both wireless devices adapted as per thisinvention and additionally the wireless device adapted as per thisinvention that has no directly accessible wireless Internet connectiondoes not requiring any credits from the wireless network to which thewireless device adapted as per this invention that does have directlyaccessible wireless Internet connection is connected to.

BACKGROUND OF THE INVENTION

Wireless devices have evolved to become smart devices or also calledsmartphones or tablet and can now handle voice and data directly orthrough downloaded software Apps. Such wireless devices (smartphones andtablets) have typically multiple hardware radio allowing the wirelessdevice to connect to the Internet over different wireless networks, suchas through mobile networks (WCDMA, PCS, GSM, GPRS, 2G, 3G, 4G, LTE,etc.), through WiFi (wireless fidelity) as known by end-users or asreferred to by the technically skilled as Wi-Fi (wireless fidelity) andthrough short-range wireless interconnection, e.g., BLUETOOTH. In somewireless devices, such as some lower end tablets, where the onlyhardware radio connection available to connect to the Internet is onlythrough Wi-Fi or through BLUETOOTH.

In more recent times wireless devices (smartphones and tablets) alsohave a so called “personal hotspot” feature which then converts thewireless device that shares connection to the mobile network Internetthrough its Wi-Fi or BLUETOOTH radio with other wireless devices thatare allowed to connect to it.

The latest wireless devices variant of previous mentioned smartphones ortablet with a “personal hotspot” feature have resulted in severalmanufacturers to release so called MiFi-devices, which are wirelessdevices that have only function, namely to act always as a “personalhotspot”. These MiFi devices typically allow 5 or more differentwireless devices to connect to the MiFi device through Wi-Fi and then tothe Internet through the MiFi Internet connection to a mobile network,typically requiring a valid SIM (subscriber identity module) in the MiFidevice.

Any such wireless device that connects to a mobile network to theInternet requires a valid subscription and depending on the mobilenetwork operator also require a valid SIM.

All wireless devices with a valid SIM connect to the HLR of the mobilenetwork operator when in the coverage area serviced by their home mobilenetwork operator but connects to a VLR when in the coverage area notserviced by their home mobile network operator, this last typically whenroaming.

Competition driven mainly by innovations and often protected by patentswhich are licensed to third parties rather than by regulation havedriven mobile network operators to provide to their users bundles withunlimited calls and text messages and a reasonable amount of megabytesof data to connect to the Internet in the same bundle within the area(s)where the mobile network operator provides radio coverage service to itsusers. Some mobile network operators provide also data only bundles foruse in the coverage area (country) where it provides radio coverage toits users yet still high data usage prices when roaming abroad or whenusers connects to the Internet through a mobile network operatorservicing such coverage area not serviced directly by the home mobilenetwork operator of the SIM of the end user.

Mobile network operators and mobile virtual network operators make theirprofit typically on user breakage when providing bundle pricing forin-country unlimited calls, text including a reasonable amount of data(500 MB, 1 GB, 5 GB, etc. where MB is megabyte and GB is gigabyte) toconnect to the Internet or a data only bundle to connect to theInternet. Breakage means that the end-user in order not to pay extramuch higher prices per MB over and above his data bundle(s) allowance.

In the past years the amount of data allowance per bundle has beenincreasing consistently and is expected to increase in the future, forexample where for a given bundle cost the amount of data allowance permonth was a 2 years ago 500 Mb, it increased for the same cost to around1 GB a year ago and is currently close to becoming for the same cost amonthly data allowance of 3 GB. In practice although mobile data usageby end-users has increased it has not increased in the same amount thatmobile network operators are increasing the monthly data allowance yearon year for the same price year on year user get a lot more dataallowance. Typically an wireless device (smartphone and tablet) end-useruses quite a lot less then the maximum data amount allowance of thatmonth and that unused monthly data is what is known as breakage islikely to increase in the future.

The biggest breakage is achieved by mobile network operators when awireless device user is roaming or in a different country connected to adifferent mobile network operator because the data bundle allowance inroaming is very small or in most cases only applies to data usage forconnecting to the Internet only on his home country when connected tothe end-user's wireless device SIM home country connected to its homemobile network operator.

When looking at the prior art, current wireless devices (smartphones andtablets) with the “personal hotspot” features and a valid SIM or “MiFi”devices with a valid SIM, do not resolve the high Internet data cost toend-users when roaming or the high data cost over and above the databundle allowance. The prior art does also not allow end-users access tothe Internet when such end-user with a wireless device has no SIM credit(typically when prepay) or with a valid SIM but without any furthermobile data allowance to allow such wireless device end-user to continueusing the Internet without requiring to top up his mobile networkoperator SIM credit nor without requiring an additional MiFi device withan additional SIM with valid credit for data allowance.

Attempts have been made by companies such as Apple, Samsung, Huawei, andmany other smartphones and tablets manufacturers providing embedded intheir wireless hardware devices previous mentioned feature called“personal hotspot” as a software setting such that the wireless devicebecomes a “hotspot” performing the same function as a “MiFi” device. Theend-user can activate or deactivate such “personal hotspot” functionwhereby the wireless device automatically disconnects itself from anydata connection to a Wi-Fi or short-range wireless interconnection suchas a BLUETOOTH network and establishes instead a data connection to themobile network operator associated with the valid SIM inside thewireless device. Then the wireless device with the “personal hotspot”function activated allows other different to the previous authoriseddifferent wireless devices with a Wi-Fi or BLUETOOTH radio to connect tothe Internet through Wi-Fi or BLUETOOTH of the wireless device with the“personal hotspot” function activated.

Companies such as Huawei, Alcatel and many other MiFi manufacturersprovide a wireless device that is cheaper than a typical smartphone ortablet where the only function is to provide a permanent “personalhotspot” and such devices are commonly known as MiFi devices. Such MiFidevices do not require the end-user to activate or deactivate the“personal hotspot” as it's the only permanent function the MiFi deviceis designed to provide subject to having a valid SIM in the MiFi device.The fact that such MiFi device requires a valid SIM means in most if notall cases that end-users require at least two devices, their mostcommonly used smartphone or tablet plus an extra device such as the MiFidevice. The shortcomings of the prior art when using a MiFi device arethe same as when using a wireless device, because both require a validSIM and thus both do not resolve the main issues listed previously, ofusing excess monthly data bundle allowance nor having access to theInternet when no data credit on the SIM of the MiFi nor the credit onthe SIM of the smartphone or tablet.

Moreover certain tablet models from Apple, Samsung and othermanufacturers do not have a SIM and thus such users with such tabletwithout a wireless device or MiFi with a valid SIM or a SIM without datacredit cannot connect to the Internet when not at his home or officeWi-Fi or has to find a public free hotspot.

Probably one of the most successful attempts to address partially theshortcomings of the prior art was by Mr Martin Varsaysky, who accordingthe website at the URL en.wikipedia.org/wiki/Martin_Varsaysky,extraction of 20 Jan. 2015 “launched the company FON in Madrid at theend of 2005, which provides Wi-Fi services using user-generatedinfrastructure. Fon is backed by investors GOOGLE, SKYPE, Index Venturesand SEQUOIA CAPITAL. In 2012, the network reached over 7 millionhotspots in several countries.”

As extracted on 20 Jan. 2015 from the FON official website at the URLcorp.fon.com/en, “Fon is your Global Wi-Fi Network. It's built by peoplejust like you. Fon members share a bit of their home Wi-Fi, and in turnget free access at millions of other Fon hotspots worldwide. Joining iseasy. All you have to do is buy a Fon Wi-Fi router and plug it into yourbroadband connection. No monthly fee! Or, if you live in a country whereFon has a Telco partner, just sign up with them to become a member.”“Your global Wi-Fi Network. Join Fon and get free access to 14,136,008Fon spots. Share a little Wi-Fi and roam the world for free.”

Although the prior art by FON has grown to more than 14 million Wi-Fihot-spots worldwide, it must be noted that such hotspots are fixed Wi-Fihotspots mostly provided by private homes or small business throughindividuals or business having to purchase a Wi-Fi router hardwaredevice connected to their fixed line Internet (ADSL, DSL fibre, etc.).In areas of high user concentration such as cities where high-riseapartments are common such Wi-Fi routers coverage provided vertically isof little or no use to most end-users. Furthermore the penetration ofmobile subscribers has outperformed by far the fixed line subscriptionsand thus the coverage footprint by those FON subscribed Wi-Fi routerscan only provide a very small radio coverage footprint with their Wi-Firouters even if 100% of all fixed line users would purchase a Wi-Firouter and subscribe to Fon in comparison to the more than 7 Billionmobile subscriber devices that could provide Wi-Fi and/or BLUETOOTHradio coverage globally with a foot print multiple times bigger.

A further shortcoming of the FON system, apart from the fact that userswho subscribe to Fon has to purchase an additional hardware device Wi-Firouter and have a fixed Internet connection, is the fact that the FONWi-Fi routers have to be replaced in time whilst the current inventiondoes not require any additional hardware to be purchased at all by userwho wish to subscribe or share the benefits of this invention.

Also the fact that the FON hotspots are mostly indoors Wi-Fi routersconnected to fixed line Internet in people's homes renders to coveragearea for actual use by end-users very limited when comparing to thesheer amount of mobile smartphone users to find other smartphone usersis the proximity is extremely high simply by the high amount ofpenetration of mobile subscriptions.

A feature of the FON system, that is a benefit as much as it is ashortcoming is the fact that the Fon system is strictly based on fixedWi-Fi router devices located at people's homes and small offices mainly,which makes their geographical deployment extremely difficult to bewhere there are mostly needed, namely wherever a high concentration ofWi-Fi enabled wireless devices (such as smartphones and tablets) are atgiven times.

A more recent attempt to resolve some of the shortcomings of thepreviously explained prior art, was made by Burcham, et al. (Burcham)through U.S. Pat. No. 8,644,255 of February 2014 with the followingpatent identification: Assignee: Sprint Communications Company L.P.(overland Park, Kans.), Family ID: 50001705, application Ser. No.13/070,607, Filed: Mar. 24, 2011, and any such References Cited byBurcham.

Burcham's prior art titled “Wireless device access to communicationservices through another wireless device” describes the patent noveltyin his abstract as follows: Quote “A method of operating a communicationsystem is disclosed which includes, in a wireless communication device,transferring a wireless beacon signal and responsively receiving awireless access request from a user device, determining if a useridentifier received with the wireless access request has usage creditsin a data structure, exchanging wireless signals with the user deviceand with a wireless communication network based on the usage credits toprovide a wireless communication service to the user device, anddecrementing the usage credits for the user identifier in the datastructure. The method also includes wirelessly transferring usage creditupdates for receipt in a master data structure.” Unquote.

Burcham's prior art further describes the patent novelty in his claim 1as follows: “1. A method of operating a communication system, the methodcomprising: in a first user device, transferring a wireless beaconsignal and responsively receiving a first wireless access request from asecond user device indicating a user identifier, processing the useridentifier in a first data structure to determine if the user identifierhas usage credits, and if the user identifier has the usage credits,exchanging wireless signals, through the first user device, with thesecond user device and with a wireless communication network to providea wireless communication service to the second user device, decrementingthe usage credits in the first data structure for the user identifier,and wirelessly transferring first data structure updates; in a controlserver, receiving and processing the first data structure updates toupdate a master data structure; in a third user device, transferring thewireless beacon signal and responsively receiving a second wirelessaccess request from the second user device indicating the useridentifier, processing the user identifier in a second data structure todetermine if the user identifier has the usage credits, and if the useridentifier does not have the usage credits, transferring a usage requestindicating the user identifier; in the control server, receiving andprocessing the usage request indicating the user identifier against themaster data structure to generate and transfer an update message for thesecond data structure; in the third user device, receiving andprocessing the update message for the second data structure to updatethe second data structure, processing the user identifier against thesecond data structure to determine if the user identifier has the usagecredits, and if the user identifier has the usage credits, exchangingthe wireless signals, through the third user device, with the seconduser device and with the wireless communication network to provide thewireless communication service to the second user device, decrementingthe usage credits in the second data structure for the user identifier,and wirelessly transferring second data structure updates.”

The prior art by Burcham is particularly beneficial to Mobile networkoperators to increase the paid usage of their data networks to monetizeon their infrastructure investments. Burcham refers to paid usage as“usage credit”.

However Burcham does not resolve the shortcomings that this invention isspecifically addressing to resolve, as described in the text andillustrated in drawings (figures) but specifically as protected noveltydescribed in the Claims herein. As a matter of illustration, thefollowing are a summary of the shortcomings that the prior by Burchamdoes not resolve. Burcham specifically has the following conditions orlimitation explicitly required by “the method” and “the communicationsystem”;

-   -   two different user devices (first user device and a third user        device) to connect another user device (second user device),    -   three different data structures (first-, second-, master data        structure), and    -   a control server,    -   wireless communication network,    -   first user device and third user device are registered users        with usage credit for the wireless communication network's        services    -   second user device identifiers accessing wireless communication        service must have usage credit to access wireless communication        network through first and third user device.

Our invention resolves the shortcomings of Burcham, in that in ourinvention there is no such restriction of requiring 3 user devices for adata connection to one of them, in other words Burcham requires twodifferent user devices (first user device and a third user device) toconnect another user device (second user device), whereas our inventiononly requires any such two wireless devices referred to by Burcham as“user devices”.

Also Burcham requires three different data structures and a controlserver for the connection set-up whereas our invention does not requireany such data structure nor any such server to set-up a data connection.Actually in our invention a server is optional to support additionaloptional features but is not required for the data connection from userdevices to the communication system.

Another mayor restriction or condition of Burcham is that it requiresuser devices that wish to make use if its invention (as per Burchamsecond user device) to have “usage credit”, meaning to pay for theaccess to the services such as data or Internet access) of the wirelesscommunication network to which the sharing user devices (as per Burchamfirst user device and third user device) are connected to. This last initself is such a major restriction in that, although commerciallybeneficial to the owners of the wireless communications network such asMobile network Operators, it limits the scope of the invention to arelatively fragmented and thus small market segment of the global 7.1Billion mobile subscriber base simply because the huge amount of MobileNetworks Operators per country times the amount of countries. In the endthe invention of Burcham does not benefit the global 7.1 Billion mobilesubscribers because end users still have to pay in order to access thebenefits of the invention of Burcham and thus why connect indirectly ifthere is no financial benefit or cost reduction to the end user. In thecommunications system of Burcham end users can just as well get a directservice contract or pre-pay contract directly with the wirelesscommunication network.

In our invention there is no such requirement for any such wirelessdevice end user to have any credit (referred to by Burcham as userdevice identifier usage credit) at all to make use of the benefits ofour invention. In fact our invention relies on the basis that wirelessdevice users that download our invention software module that has directwireless data access to share Internet data connection with any otherwireless device users that also downloaded our invention software moduledoes not have direct wireless data access without such last needing anycredit at all to connect to the Internet through the first device andwithout any interaction with any server for such Internet dataconnection.

Another different prior art, less successful in terms of the low amountof users compared to previous mentioned prior arts, extracted on 2 Feb.2015 can be found on this Internet website at the URL opengarden.comwhere they mention: “5 Million users. Check out how we improve yourconnectivity”. On a different page within previous website, namely onopengarden.com/apps it states: “Open garden is a wireless meshnetworking application . . . ”. At the URLopengarden.com/faq#faq-security-005 it states: “Since the Open Gardenclients use VPN functionality to route traffic and it is not possible torun simultaneous VPNs on the operating systems we support, Open Gardencannot work when a VPN is running . . . ”. VPN stands for VirtualPrivate Network. At the URL opengarden.com/faq#faq-start-002 it states:“Assuming you already installed Open Garden on a nearby device, press“Connect” on one or both devices and wait. For the first timeconnection, Open Garden needs to learn about nearby devices and will doso using one of three methods: WLAN, when the devices are connected tothe same Wi-Fi network; location services, when the devices areconnected to separate networks; and BLUETOOTH, when one of the devicesis without Internet access completely, in this situation you canmanually pair devices with BLUETOOTH to force a connection over OpenGarden . . . ”.

The shortcomings of Open Garden are numerous, but the main shortcomingsare:

-   -   that the downloaded Open Garden software on a wireless device        requires one or more nearby device users to manually click on        the screen to force a connection the first time connection;    -   that when a nearby device has no Internet access at all then        again such wireless device user has to manually pair the 2 or        more nearby devices with the downloaded Open Garden software;    -   that Open Garden when downloaded into a wireless device requires        such wireless device to route all shared data traffic through a        VPN.

Our invention does not have any of the previous mentioned limitations ofOpen Garden in that the our invention as described herein;

-   -   does not require any manual intervention of any of the wireless        devices users with a downloaded software of this invention to        allow Internet Access the first time;    -   does not require any manual intervention of any of the wireless        devices users with a downloaded software of this invention to        allow Internet Access the first time;    -   does not require any manual intervention to pair any of the        wireless devices users with a downloaded software of this        invention to allow Internet Access even if one of them has no        direct Internet access at all;    -   does not require the use of a VPN in order to allow wireless        devices users with a downloaded software of this invention to        access the Internet through nearby wireless devices with a        downloaded software of this invention;    -   does not have the restriction when one of the devices has no        internet connection to use it the first time to be limited to        connect to another device with internet through BLUETOOTH only,        actually our invention is specifically targeted to wireless        devices without internet connection and thus connect through        wireless devices with internet connection through any available        radio module by both wireless devices with a downloaded module        of this invention.

Our invention resolves all the prior art shortcomings because thewireless devices with a build-in software module as per this invention,is not limited to only paying users nor limited to the wireless devicesthat use a VPNs nor is any user interaction required to enable accessthe Internet through a neighbouring wireless devices with a build-insoftware module as per this invention, but rather our novelty allowsInternet access to function for all wireless devices with no directinternet access provided they download the software module herein. Bythe sheer amount of wireless devices in any given place around the worldour invention provides the best additional Internet access coverage forend-users in areas with high concentration of people, wherever that maybe. This last is particularly illustrated because end users carry theirwireless devices with them, that combined with the fact that there arecurrently around 5 times more wireless devices then landlines, accordingto gsgtelco.com (see further in SUMMARY OF THE INVENTION more details)by at least a ratio of 5.4B mobiles in use to 1.1B landlines=4.9 timesup to 7.1B mobiles accounts to 1.1B landlines=6.4 times.

The following is a brief explanation of some of the industry terms used,as background information.

A Virtual Private Network (VPN) according to Wikipedia's website at theURL en.wikipedia.org/wiki/Virtual_private_network: “A VPN extends aprivate network across a public network, such as the Internet . . . . AVPN is created by establishing a virtual point-to-point connectionthrough the use of dedicated connections, virtual tunnelling protocols,or traffic encryptions . . . . One major limitation of traditional VPNsis that they are point-to-point, and do not tend to support or connectbroadcast domains . . . . To prevent disclosure of private information,VPNs typically allow only authenticated remote access and make use ofencryption techniques . . . . Mobile VPNs are used in a setting where anendpoint of the VPN is not fixed to a single IP address, but insteadroams across various networks such as data networks from cellularcarriers or between multiple Wi-Fi access points . . . . Instead oflogically tying the endpoint of the network tunnel to the physical IPaddress, each tunnel is bound to a permanently associated IP address atthe device.”

A Home Location Register (HLR) is a database that contains mobilesubscriber information for all subscribers of a mobile network operator.It is owned and maintained by that mobile operator.

A Visitor Location Register (VLR) is a database of the roaming usersauthorized and connected to the mobile network, such VLR database alsoowned and maintained by a mobile operator. It contains temporaryinformation about mobile subscribers that are currently located in ageographic area served by that mobile operator, but whose Home LocationRegister (HLR) is elsewhere from a different mobile network operator.

HLR subscriber information includes the International Mobile SubscriberIdentity (IMSI), service subscription information, location information(the identity of the currently serving Visitor Location Register (VLR)to enable the routing of mobile-terminated calls), service restrictionsand supplementary services information. The HLR also initiatestransactions with VLRs to complete incoming calls and to updatesubscriber data.

The IMSI is a unique non-dialable number allocated to each mobilesubscriber that identifies the subscriber and his or her operatorsubscription. The IMSI is stored in the Subscriber Identity Module(SIM). The IMSI is made up of three parts (1) the mobile country code(MCC) consisting of three digits, (2) the Mobile Network Code (MNC)consisting of two digits, and (3) the Mobile Subscriber Identity Number(MSIN) with up to 10 digits.

When a mobile subscriber roams away from his home location and into aremote location (typically to a different country), SS7 messages areused to obtain information about the subscriber from the HLR, and tocreate a temporary record for the subscriber in the VLR. There isusually one VLR per operator. The VLR automatically updates the HLR withthe new location information, which it does using an SS7 Location UpdateRequest Message. The Location Update Message is routed to the HLRthrough the SS7 network, based on the global title translation of theIMSI that is stored within the SCCP Called Party Address portion of themessage. The HLR responds with a message that informs the VLR whetherthe subscriber should be provided service in the new location.

This last is critical to a mobile network operator's ability to restrictwhat end-users can do is the fact that operators control their own HLR,which can be thought of as the gateway into the mobile communicationssystem, not only to make calls but also to connect to the Internet. Even‘virtual mobile network operators’ (VMNOs) are in effect subservient tothe mainstream network operators that manage the physical infrastructurebecause the VMNOs still need to access the HLRs or VLR of thetraditional mobile network operators who have ownership of the actualradio interface to the wireless devices (smartphones and tablets) with avalid SIM.

BRIEF SUMMARY OF THE INVENTION

The present invention is designed to overcome the shortcomings of theprior art and to provide an automated way of resolving the shortcomingsof the prior art specifically for Internet enabled wireless devicescapable of downloading a software module from the Internet. Suchsoftware module when downloaded onto the Internet enabled wirelessdevice renders the software module operable to communicate with otherwireless devices with the same such software module downloaded on tosuch other wireless device and without requiring any server. Theinvention does not require any server authentication of an authorizeduser as a wireless device becomes an authorized wireless device userupon download of the software module of this invention onto his wirelessdevice.

It's such proprietary software module when downloaded into an Internetenabled wireless devices together with all such other different wirelessdevices with a downloaded software module, that jointly form theWIRELESS INDIRECT INTERNET CONNECT SYSTEM (WINICS) or in other words asystem and method that resolves the shortcomings of the prior art forinterfacing and connecting an Internet enabled wireless device to thepublic Internet network or any such other wireless communicationsnetwork when such device user has no credit or no direct access to suchpublic Internet network or any such other wireless communicationsnetwork AND without requiring any server interaction to allow wirelessdevice user such Internet access.

According to the website at the URLwww.gsgtelco.com/2014/05/13/more-mobile-subscriptions-than-tv-sets-pcs-landline-phones-cable-satellite-subscriptions-combined/byJoey deVilla on May 13, 2014, “There are more mobile subscriptions thanTV sets, PCs, landline phones and cable/satellite subscriptionscombined”. The website pictures a graph showing 7.1B mobile accounts,5.4B mobiles in use, 4.5 unique mobile users, 1.1B landlines. It statesfurther, “The number of mobile subscriptions worldwide is now about thesame as the number of people worldwide. According to mobile analyst andpundit Tomi Ahonen, the worldwide mobile subscriptions rate is 100%, andas an article of ours from last week pointed out, that the rate is evenhigher in the Americas, Arab states, and Europe, and it's highest in theCIS (former Soviet republics), where there are 141 subscriptions forevery 100 people.”

When considering the previous published figures and assuming thatwireless/mobile saturation will only extend to more regions globally,then it becomes evident that more and more wireless devices users willencounter the same issues that the prior art is not resolving.

The present invention will resolve the following shortcomings of theprior art, namely to allow Internet enabled wireless device users toconnect to the Internet:

-   -   without the need for the end-user to have an additional wireless        hardware device, such as for example a MiFi device with a valid        SIM to connect wirelessly to the Internet    -   when the end-user is not in the coverage area of his home Wi-Fi,        office Wi-Fi or a public hotspot Wi-Fi    -   when the end-user own Internet enabled wireless device has run        out of data bundle allowance or has no data credit to access the        Internet through his own mobile network operator or Wi-Fi        service provider    -   when roaming without using his own Internet enabled wireless        device roaming data even if the end-user has data credit    -   without the need for the end-user of an Internet enabled        wireless to have to ask to all the people around him if there is        anybody with a MiFi or a smartphone or tablet to ask if they        would be willing to share their MiFi password or to set manually        their tablet or smartphone in “portable hotspot” mode and share        the corresponding hotspot password.

The shortcomings of the prior art have been addressed by the presentinvention and resolved by the novelty of the combination of aproprietary software module that becomes operable when downloaded intoan Internet enabled wireless device (smartphone or tablet) all thosesoftware modules, operable when downloaded into a wireless device,jointly and optional with a server with a build-in proprietary softwaremodule resolve the prior art short comings.

This is how the system (WINICS), and method, for interfacing andconnecting an Internet enabled wireless device to the public Internetnetwork functions as one embodiment of the present invention.

A user of an Internet enabled wireless device, such as a smartphone ortablet, downloads a proprietary software module of this invention ontohis Internet enabled wireless device. Such software module only becomesoperable when downloaded into an Internet enabled wireless device.

Such wireless device can be any Internet enabled wireless device, mobilephone, smartphone, tablet, iPOD, iPAD or any such other wireless devicetype with at least or more wireless radio interfaces, such as BLUETOOTH,Wi-Fi, WiMax, GPRS, GSM 2G, 3G, 4G, LTE, CDMA, WCDMA or nay such othercurrent or future wireless radio technology.

All wireless devices become automatically an authorized wireless device,when a software module is downloaded into an Internet enabled wirelessdevice, which renders such software module then operable. Each user ofan authorized wireless devices with a build-in software module definesthe parameters or conditions under which the end-user of such wirelessdevices with a build-in software module allows automatic Internetsharing of his wireless devices with a build-in software module with anysuch other different to the previous authorized wireless devices with abuild-in software module.

A typical list of parameters or conditions set by an end-user of anauthorized wireless devices with a build-in software module are as amatter of the example, although can be different than those listedherein next: Allow automatic Internet sharing with other authorizedwireless devices with a build-in software module if:

-   -   the month to date network operator data allowance amount used up        is not above a user defined threshold and if not defined then        the software module sets such maximum threshold figure (optional        user sets monthly start and stop date for data usage calculation        and if not defined then the software module sets those as the        first day of a calendar month as the start date and the last        calendar day of each month as the end date)    -   the wireless device is connected to a free data connection, such        as free Wi-Fi or BLUETOOTH data connection, if such information        is available to the software module    -   the wireless device battery level is not below a user defined        threshold and if not defined then the software module sets a        minimum level    -   the wireless device data connection is not a roaming data        connected.

Optionally a system server can be made part of this invention, connectedto the Internet, when embedding a software module of this inventionbecomes operable together with the software modules downloaded into theInternet enabled wireless devices to form a different embodiment of thepresent invention. Such server(s) with a build-in software module andconnected to the Internet may be hosted by the same party as the partyoperating the WINICS or hosted by third party or parties on behalf ofthe party operating the WINICS of this invention.

Such optional server with a build-in software module may be one or amultiple amount of servers in a single location or spread over differentgeographical locations, as to allow for massive user growth and thecorresponding standard known in the industry as servers load balancersand geographical colocation to improve access latency.

The present invention does not claim any prior art on well establishedand known servers hardware, virtualized servers, server software orfirmware, servers architectures, server load balancing, local orgeographical server clusters latency as these are well documentedamongst others at the URL www.cisco.com by companies like CISCO and manyothers.

Our invention claims are limited and specific to the software modulethat become operable when downloaded into any such Internet enabledwireless devices where all such software modules operable together andoptionally with the corresponding servers with a build-in softwaremodule jointly form this invention WINICS.

To illustrate one embodiment of the present invention, let's take theexample of a smartphone user with a downloaded software module (USER-A).This USER-A is roaming in country B and though he has a valid SIM ofhome country A that functions is country B, the USER A has disabledroaming data to avoid excessive roaming costs. USER-A is however withinBLUETOOTH coverage of a different smartphone with a build-in softwaremodule (USER-B). Both USER-A and USER-B are registered users of theWINICS; simply by having the software modules downloaded into theirdevices and are thus authorized WINICS users. USER-B is not roaming buthas a local SIM and has sufficient battery and sufficient unused databundle with his local mobile operator in country B and USER-B isconnected to the 4G data mobile network operator in country B (MNO-B) orin other words with direct Internet access to MVNO-B.

Software module of USER-A smartphone communicates over BLUETOOTH withsoftware module of USER-B smartphone, whereas USER-B smartphoneauto-clears authorization of USER-A, because USER-A has a downloadedsoftware module of this invention and then provided that USER-Bparameters allow USER-A to connect to the Internet then USER-B softwaremodule shares it's Internet data connection with USER-A throughBLUETOOTH through USER-B with MVNO-B.

A different embodiment of the present invention is applicable with thesame as previous example but with the data communication between USER-Asmartphone and USER-B smartphone through Wi-Fi instead of throughBLUETOOTH.

Another different embodiment of the present invention is applicablewhere previous mentioned USER-A smartphone has no data allowance leftanymore, (applicable when roaming or when in home country alike) andUSER-B parameters allow for Internet sharing and whereas USER-B has adata connection to the Internet through Wi-Fi but has no BLUETOOTH, thenthe software module of USER-B disconnects if USER-B parameters alonewill disconnect from Wi-Fi and reconnects USER-B Internet dataconnection through mobile data instead of Wi-Fi and communicates withUSER-A then over Wi-Fi and thus shares USER-B Internet data with USER-Athrough Wi-Fi.

In fact the software module of USER-B automatically without userintervention turns USER-B smartphone into a hotspot; Wi-Fi to mobiledata, BLUETOOTH to mobile data, Wi-Fi to BLUETOOTH, BLUETOOTH to Wi-Fi,depending on USER-B Internet data connection availability. Say if USER-Bonly has Internet data connection available within USER-B set parametersin his current location over mobile data, then USER-B connects on oneside of its hotspot function to mobile data and on the other sideconnects with USER-A to share such Internet connection through BLUETOOTHor Wi-Fi, whichever is available to both USER-A and USER-B and in theevent both are available whichever of the two provides the bestconnection quality (highest radio signal strength and/or lowest biterror rate) or the highest Internet speed.

In a different embodiment of the present invention when a wirelessdevice with a downloaded software module of this invention has no directInternet access, then the software module will through the wirelessdevice send a beacon through the available WLAN radio, such as Wi-Fi orBLUETOOTH. In this embodiment wireless device with a downloaded softwaremodule of this invention which have direct Internet access, then thesoftware module will through the wireless device scan through allavailable WLAN, such as Wi-Fi or BLUETOOTH in receive mode only, for abeacon of neighbouring wireless device with a downloaded software moduleof this invention. This can be beneficial to keep power consumption downfor those devices with a direct Internet connection as they only consumethe very lower power during receive mode of WLAN receivers (i.e. Wi-Fiand/or BLUETOOTH receivers). On the other hand those devices that haveno direct Internet connection will only transmit the beacon when thedevice user wishes to access the Internet, such as for example when itwakes up the wireless devices detected in the form of backlightswitching on or transition to wake-up state. The software module in thewireless device can have optionally a user setting to allow the user toset his wireless device to always transmit a beacon of this inventionwhen the device has no direct Internet access or to safe power to putthe setting to only send the beacon when the wireless device with nodirect Internet access has the screen active by the user using hisdevice (backlight on or wake-up detected or other similar detectiontrigger) and keep the beacon so long that condition applies until theusers stops using his device ((backlight off or sleep detected or othersimilar detection trigger). In this way when a wireless device with adownloaded software module of this invention AND with direct Internetaccess detects a beacon from a wireless device with a downloadedsoftware module of this invention without direct Internet access, thenboth devices software modules will automatically interact without anyuser intervention and automatically connect the wireless device with nodirect Internet to the Internet through the wireless device with directInternet connection. If the beacon received by the wireless device witha downloaded software module of this invention with direct Internetaccess is through the same radio module as the one through which itreceives direct Internet, in example Wi-Fi, then the software module ofthe wireless device with direct Internet access will cause the wirelessdevice without direct Internet access to switch to another differentjointly available radio module, in example BLUETOOTH, or vice-versa suchthat the direct Internet access radio is different than the radio usedtowards the device without direct Internet access.

This WINICS is particularly beneficial for the general public users ofwireless devices (mobile phones, smartphones, tablets) and in particularfor the younger population even when in their own home country orstudents or immigrants in countries away from home or the general publicwhen on holiday abroad or when home but having spent their monthly dataallowance.

Let's assume for illustration purposes that only as little as 10% of theprevious mentioned 7.1 Billion mobile subscribers would download thisinvention's software module, if made available for free, onto theirInternet enabled wireless device (smartphone and/or tablet) and settheir user parameters preferences, even with or without this invention'soptional server with a build-on software module. That means that 700million smartphones, with a build-in or downloaded software module, witha higher concentration of these devices in saturated mobile markets thenin non-saturated regions, would form a global WIRELESS INDIRECT INTERNETCONNECT SYSTEM (WINICS) where such wireless devices with a downloadedsoftware module are not fixed but move together with the movements oftheir end-users. Thus the statistical possibility that a user of anInternet enabled smartphone with a downloaded software module (USER-A)is within Wi-Fi or BLUETOOTH coverage range of another differentneighbouring Internet enabled smartphone with a downloaded softwaremodule (USER-B) is very high but is the highest in saturated regions andincreases as the amount of users that download the software module ofthis invention on their wireless devices increases. Frequently visitedpublic places, such as airports, public buildings, shopping malls, bars,restaurants, public gathering places such as parks, concerts, etc. areparticularly high saturation places where many wireless device usersconcentrate and thus are places for in country users but moreimportantly for roaming users where this invention illustrate the vastbenefits from this invention.

When incorporating to this invention an optional system server with abuilt-in software module, which can also act as a data server, then theconnections from and to wireless devices with a downloaded softwaremodule is not limited to Internet sharing but can include also thetransfer of any digital data asset or information to improve or enhancethe end-user experience of this invention, such as sharing geographicalGPS (geographical position system) location of nearby other wirelessdevices with a downloaded software module, sharing default parametersettings etc.

The optional system server with a built-in software module mayoptionally also host the proprietary software module of this inventionfor download by Internet enabled wireless devices. Typically thesoftware module of this invention can be made available for download byInternet enabled wireless devices on servers specifically dedicated tosoftware download for smartphones, tablets and similar devices such ason servers known as the AppStore by Apple for its iPOD, iPHONE, iPAD,the PlayStore by GOOGLE for Android devices with the Google operatingsystems, Amazon, AppStore, Samsung Store, GALAXY APPS, WINDOWS PHONEStore, MICROSOFT mobile Apps, NOKIA Apps Store also known in the past asOVI store or as Opera mobile store, etc.

In a different preferred embodiment of the present invention thesoftware module required to be downloaded into a wireless device is asub-module of a wireless device operating system, where when downloadingthe operating system which incorporates a sub-module which is thisinvention's software module, makes the software module operable whendownloading the operating system into a wireless device. The operatingsystem, which incorporates a sub-module, which is this invention'ssoftware module, is available for download by wireless devicessupporting such operating system(s) from the server associated to thecompany owner of such operating system. All such operating systems witha sub-module software module of this invention jointly form anotherpreferred embodiment of the present invention. Optionally the companyowner of such operating system(s) also has a server connected to theInternet where the WINICS server software module resides and whichtogether with the operating system with a sub-module software module ofthis invention form another different preferred embodiment of thepresent invention.

As a matter of illustration the software module can be embedded into oneor more of the following mobile operating systems: Android, iOS, WINDOWSPHONE, BLACKBERRY, AMAZON KINDLE Android, etc.

As a matter of illustration, according to the website at the URLen.wikipedia.org/wiki/Mobile operating system the following info hasbeen extracted: “On September 2014 Android's global market share rose to85%. As of September 2014, iOS global market share was 11%. As ofSeptember 2014, Windows Phone market share was 3%. Once one of thedominant platforms in the world, it's global market share has beenreduced to less than 1% in late 2014.”

Therefore if only as little as the 2 dominant operating systems owners,GOOGLE and Apple, would integrate the software module of this inventioninto their future respective Android- and iOS-operating system, andoptionally but not a requirement also would integrate the serversoftware module of this invention into a corresponding Android- andiOS-server, then the operable software modules jointly and optionallywith or without this invention server module would in this embodimentform instantly the biggest ever global WIRELESS INDIRECT INTERNETCONNECT SYSTEM (WINICS). In this last example, then an automatic updateof current Android and iOS smartphones and tablet operating system wouldmake 96% of all wireless devices (smartphones and tablet), meaning 96%of 5.4 Billion mobiles=5.18 Billion mobiles in use would improve theirInternet access capabilities through the benefits of this invention.

Even if only one of the top 2 mobile operating systems would integratethis invention into their operating system for smartphones and tabletsthrough the corresponding operating system owner servers, then theinstant amount of global end-users that would benefit from thisinvention and thereby increase dramatically the Internet connectivity ofsmartphones and tablet. According to the references quoted in BACKGROUNDOF THE INVENTION herein, there are currently around 5.4B mobiles in useand with integrating this invention only into the Android operatingsystem it would already provide 85% of 5.4 Billion mobiles=4.59 Billionmobiles instant access to the benefits of this invention with increasedInternet connectivity for those smartphones and tablets.

In order not to limit the benefits of this invention, when more than oneoperating system integrates the present invention into the combinationof embedding the software module in the wireless device operating systemand optionally the WINICS server software module into the correspondingoperating system owner server(s) to jointly form this invention'sWINICS, it is imperative that owner of different operating systems, suchas for example GOOGLE as owner of Android operating system, Apple asowner of iOS operating system, MICROSOFT as owner of MICROSOFT Phoneoperating system, RIM as owner of BLACKBERRY operating system, etc. usea common jointly agreed or standardized interface protocol for thewireless interface protocol between software modules (embedded inoperating system) downloaded in different wireless devices of differentoperating system.

This last would ensure inter-operability of all wireless devices with adownloaded software module embedded in the operating system, regardlessof the operating system type or owner and regardless of each operatingsystem corresponding WINICS system server software module being indifferent servers from different operating system owners (Apple, GOOGLE,MICROSOFT, BLACKBERRY, etc.).

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 represents a typical embodiment of present invention system,WIRELESS INDIRECT INTERNET CONNECT SYSTEM (novelty represented in FIG. 1jointly by 401.1, 402.1. 403.1, 404.1 and optionally including 200.1).As an example wireless devices (WD) 401, 402, 403 and 405 have a directInternet connection respectively to 300.1, 300.2, 202 and 300.2 whilstwireless device 404 (WD4) does not have any direct wireless Internetavailable. All wireless devices, except for 405 (WD5) have a downloadedSoftware Module of this invention, such that a wireless device withoutany direct Internet connection 404 (WD4) through its downloaded Softwaremodule of this invention (404.1) can communicate directly andautomatically only through other neighbouring wireless devices (WD1, Wd2or Wd3) with a downloaded Software module (401.1, 402.1 or 403.1) andconnected indirectly and automatically through one of such neighbouringSoftware Modules to the Internet, even without any interaction nor anyauthentication with any server. The optional server 200 with a build-inor downloaded Server Module of this invention allows any Software Module401.1, 402.1, 402.1, 404.1, etc. downloaded into any wireless device tocommunicate information of the corresponding wireless device WD1, WD2,WD3, WD4, etc. to the Server Module 200.1 and vice versa to receiveinformation from any neighbouring wireless devices (even if not incoverage range) with a downloaded Software Module from the Server Module200.1 during such times when connected through the Internet.

FIG. 2 shows a geographical representation of previous FIG. 1 of thepresent invention with respect to the proprietary WIRELESS INDIRECTINTERNET CONNECT SYSTEM (WINICS). FIG. 2 shows the geographical radiocoverage of each wireless device and each of the two different Cellularor Mobile Network Operators A and B in this example are in the samecountry although in a different embodiment of the present invention eachcould be in a different country. A way to better understand FIG. 2 isconsider it as a geographical map of FIG. 1 wherein the oval or circularshapes represent the coverage area of each network or device. When it'sa Mobile Network then it represents the cellular or mobile coverage fromthe network's infrastructure base-stations (GPRS-, 2G, 3G, 4G, LTE,WCDMA- or any such other similar cellular base-station standardtransceivers) and when it's a wireless device then it's the hotspotcoverage area from a wireless device such as from a smartphone or tabletthrough the wireless device build-in Wi-Fi, BLUETOOTH or any othersimilar standard low power radio transceiver.

FIGS. 3 to 5 are implementations of the present invention with respectto the proprietary WINICS.

FIG. 3 is part representation of FIG. 1, which corresponds to theWireless device 4 (WD4) indirect connections to the Internet within thepresent invention WINICS (novelty represented in FIG. 3 jointly by404.1, 401.1 and optionally including 200.1) between time T0 and T1 ofFIG. 2. The bi-directional indirect Internet connection is establishedautomatically between 404.1 and 401.1, respectively from device 404,through Wi-Fi connection 500.8, through device 401, through mobile orcellular connection 500.1, through Mobile Network 300.1, through gatewaydata connection 500.2 to the Internet 100 and reverse as a bidirectionalInternet connection back from 100 to device 404. Both software modules404.1 and 401.1 optionally communicate with the WINICS Server module200.1 through the Internet 100, through data connection 500.7 withserver 200 with a build-in software module 200.1 (WINICS optional Servermodule) for example to exchange GPS location of other wireless deviceswith a downloaded Software Module which are not in range for example ofWD4.

FIG. 4 is part representation of FIG. 1, which corresponds to the WD4(404) indirect connections to the Internet within the present inventionWINICS (novelty represented in FIG. 4 jointly by 404.1, 402.1 andoptionally including 200.1) between time T1 and T2 of FIG. 2.

FIG. 5 is part representation of FIG. 1, which corresponds to the WD4(404) indirect connections to the Internet within the present inventionWINICS (novelty represented in FIG. 5 jointly by 404.1, 403.1 andoptionally including 200.1) between time T3 and T4 of FIG. 2.

FIGS. 6 to 8 are implementations of the present invention with respectto the proprietary WINICS.

FIG. 6 is a different way of representing FIG. 3, namely as coverage arerepresented by the oval circles which are self explanatory when viewingFIGS. 6 and 3 simultaneously next to each other.

FIG. 7 is a different way of representing FIG. 4, namely as coverage arerepresented by the oval circles which are self explanatory when viewingFIGS. 7 and 4 simultaneously next to each other.

FIG. 8 is a different way of representing FIG. 5, namely as coverage arerepresented by the oval circles which are self explanatory when viewingFIGS. 8 and 5 simultaneously next to each other.

DETAILED DESCRIPTION OF THE INVENTION

Specifically, FIG. 1 is a top-level block diagram of a communicationssystem in accordance with the present invention. It includes wirelessdevices and optionally media servers interconnected and communicatingwith each other through the Internet wirelessly. It also shows theoverall basic functionality, with respect to the WIRELESS INDIRECTINTERNET CONNECT SYSTEM (WINICS) of this invention, wherein the noveltylies in the combination of the software module downloaded into Internetenabled wireless devices that then makes such software module operable.The WINICS can incorporate optionally a server module embedded into aserver connected to the Internet and accessible by the wireless deviceswith a downloaded software module of the present invention. As a matterof illustration to explain how the FIG. 1 WINICS works, let's make thefollowing assumptions:

-   -   Wireless Device 1 to 4 (401 to 404) each have downloaded the        software module (401.1 to 404.1) of this WINICS invention whilst        Wireless Device 5 (405) does not have any such software module        of this invention. All devices are in the same country for this        example.    -   Wireless Device 1, 2 and 4 are smartphones with a valid SIM,        Wireless Device 3 is a tablet without any cellular radio module        thus without a SIM, Wireless Device 5 is a MiFi hotspot with a        valid SIM.    -   Wireless Device 1 (401) has a wireless data connection (500.1)        to his home mobile network operator-A (300.1) thus has a SIM-A        and registers to HLR-A    -   Wireless Device 2 (402) has a wireless data connection (500.3)        to his home mobile network operator-B (300.2) thus has a SIM-B        and registers to HLR-B    -   Wireless Device 3 (404) has a wireless data connection (500.5)        to a Wi-Fi wireless network operator-C or Wi-Fi hotspot (202).    -   Operator A and B (300.1 and 300.2) are different mobile network        operators but provide mobile coverage in the same country in        FIG. 1.    -   Wireless Device 4 (404) and Wireless Device 5 (405) are Roaming        in FIG. 1, each with a valid SIM associated to their own        corresponding home network in a different country then the        country of FIG. 1. Both Wireless Device 4 and Wireless Device 5        are roaming on Mobile Network-B (300.2) and thus each their SIM        is registered to VLR-B as a guest-roaming user.    -   Wireless Device 4 (404) has his data Roaming setting manually        put to OFF.

Wireless devices with a downloaded software module of this invention canshare their GPS location and user set parameters, updating these onlocation change or on regular predefined time intervals provided thereis any change of such parameters, with the corresponding optional systemserver (200) with a build-in or downloaded server module (200.1) of thisinvention that jointly form an embodiment variant of the presentinvention.

Let's consider the user of Wireless Device 4 (404) with a downloadedsoftware module (404.1) of this invention (jointly 404 and 404.1referred to hereinafter as WD4) as an authorised user of the system ofthis invention, wherein a user is considered an authorised wireless userof this system invention upon downloading this invention's softwaremodule into an Internet enabled wireless device. The WD4 user wishes toconnect to the Internet but has data roaming disabled in order to avoidincurring high roaming data costs yet wishes to access the Internet.Transparent to the WD4 user, the WD4 software module 404.1 instructs 404to scans for neighbouring wireless devices and 404.1 instructs 404 toconnect only to another wireless device with a build-in software modulewith the highest radio signal strength that has direct Internetconnection. For the purpose of this illustration the highest radio(Wi-Fi) signal strength is from WD5 and the second highest radio(BLUETOOTH) signal strength is from WD1. The WD4 will not connect to WD5Wi-Fi because it doesn't have authorisation (WD4 does not have Wi-Fipassword of WD5) as that MiFi device is from a 3rd party user of aWireless device with no downloaded software module as per thisinvention. So WD4 will make a BLUETOOTH data connection (500.8) with WD1(jointly 401 and 401.1 referred to hereinafter as WD1) and transparentto the user of WD1, as per his account settings, WD1 will automaticallyturn the WD1 into a temporary hotspot allowing WD4 Internet connectionthrough wireless BLUETOOTH link 500.8 and then through cellular dataconnection 500.1 with Mobile Network-A (300.1) then through gatewayconnection 500.2 to the Internet bi-directionally.

Since wireless devices are carried by end-users and change location overtime, then to illustrate real life situations, let's assume that WD4(404) user moves away from WD1 (401) user and the WD1 BLUETOOTH radiosignal strength becomes less than the Wi-Fi radio signal strength ofanother wireless device 2 with a downloaded software module of thisinvention (jointly 402 and 402.1 referred to hereinafter as WD2) shownas WD2 on FIG. 1. Then if WD2 software module (401.1) account settingsallow for automatic sharing then WD4 software module (404.1) will haveWD4 automatically re-connect to WD2 as soon as signal strength Wi-Fi ofWD2 is higher than signal strength of BLUETOOTH WD1. In this scenariothen the user of WD4 will simply have a very brief interruption of noInternet access but without any user intervention automatically continueto have Internet access because the WD4 software module (404.1) hasdisconnected device 404 from wireless BLUETOOTH connection 500.8 andconnected instead to wireless Wi-Fi connection 500.9 as authorized bywireless module (402.1) of WD2. Thus WD4 connects to the Internetthrough wireless Wi-Fi data link 500.9 through device 402 to cellularmobile network data link 500.3, then through the mobile network 300.2then through the cellular gateway connection 500.4 connected to theInternet bi-directionally.

Let's now assume that WD4 user stays put on the same place but losesInternet connection because both WD1 and WD2 users move out of range ofWD4. Since software modules (401.1, 402.1, 403.1 and 404.1) downloadedinto wireless devices (401, 402, 403 and 404) optionally update theirparameters with the corresponding optional server software module(200.1) build-into the optional system server (200) and the softwaremodule (200.1) shares the info requested, for example by software module404.1 who received the info of the neighbouring wireless devices with abuild-in software module such as the last known GPS location of theclosest authorized device 403 with a downloaded software module 403.1(jointly 403 and 403.1 referred to hereinafter as WD3).

The downloaded software module 404.1 will then notify the user of WD4 ifhe attempts to connect to the Internet that no Internet access can beprovided but will suggest the user to move to the location of thenearest GPS location within walking distance where the WIRELESS INDIRECTINTERNET CONNECT SYSTEM (WINICS) could provide Internet access from WD3.

Let's assume WD4 user walks in the direction of the GPS location ofwireless device 403 and when within range of the BLUETOOTH radio signalof 403, then the software module 404.1 of wireless device 404communicates with software module 403.1 of wireless device 403 throughthe BLUETOOTH wireless data link 500.10 and let's assume further thatthe settings of 403.1 did not allow for automatic indirect Internetconnection by another software module of this invention and thus WD3user will be notified through the software module 403.1 that anauthorized WINICS user is requesting to connect but the parameters ofWD3 do not allow it at this point in time. For example WD3 could havereached the maximum limit of monthly amount of data it was willing toshare with authorized WINICS user or simply because WD3 battery level isbelow the minimum allowed user settings in 403.1 which can only bechanged or allowed access then manually by the WD3 user. If WD3 manuallychanges the 403.1 settings to allow indirect Internet access orexplicitly manually allows only for this one time such Indirect Internetaccess by 404.1 of WD4 user, only then WD4 will connect bi-directionallyto the Internet through wireless BLUETOOTH data link 500.10, throughwireless device 403, through Wi-Fi data link 500.5, through Wi-FiNetwork-C (202), through gateway connection 500.6 to the Internet.

Software modules (400.1, 402.1, 403.1, 404.1, etc.), which becomeoperable when downloaded into wireless devices, and are operable to alsocommunicate which the corresponding optional server module 200.1 of thisinvention, build-into an optional server 200 and connected to theInternet through the data link 500.7.

In a different embodiment, Wi-Fi Network-C (202) could be a Wi-Fi routerin a private home, in an office or in a public place. As a matter ofexample 202 could be a public hotspot and 403 a wireless device of anauthorized user of such public hotspot as an illustration that thisinvention (based on moving wireless devices) can co-exist with existingprior-art yet resolving their shortcomings of fixed hotspots based priorart. For example user of device 403 if an authorized user of such publicfixed hotspot yet downloads the software module of this invention in hissmartphone then in the geographical locations as described hereinpreviously where there is no public hotspot radio coverage but there iswireless devices WD1 and/or WD2 within Wi-Fi or BLUETOOTH coverage ofWD3. In this case such public hotspot user's smartphone with thisinvention's downloaded software module (WD3) could benefit of thesolutions of this invention rather than be limited by the prior art.Actually this invention does not require a user to have anyauthorization of any fixed hotspot nor any mobile network of the priorart but simply requires a wireless device to download the softwaremodule of this invention that jointly form the novelty of this inventionwithout requiring users to purchase any additional hardware, such as aWi-Fi router or a MiFi device and having data credit by the wirelessdevice users with a downloaded software module of this invention is notrequired in the present invention in complete contrast with the priorart.

FIG. 2 are the geographical representation of previous FIG. 1 of thepresent invention with respect to the WINICS. The previous explanationof FIG. 1 is applicable in its entirety on FIG. 2 wherein WD4 (see FIG.1 device 404 with a downloaded software module 404.1) starts moving attime T0 from GPS position 0 direction GPS location 1, after time T1 theuser WD4 moves from GPS location 1 towards GPS location 2, at time T2moves from GPS location 2 towards GPS location 3, at time T3 keepsmoving towards GPS location 3 and finally WD4 user stops moving at timeT4 at GPS location 4. The WD4 is between time T0 and T1 within radiocoverage of wireless device 1—BLUETOOTH area 1, between time T1 and T2within radio coverage of wireless device 2—Wi-Fi area 2, between time T2and T3 within NO radio coverage of any neighbouring wireless device witha downloaded software module, and between time T3 and T4 within radiocoverage of wireless device 3—BLUETOOTH area 3, and wherein;

Wireless device 1 (WD1) of FIG. 2 is 401 with downloaded software module401.1 of FIG. 1.

BLUETOOTH area 1 is the geographical BLUETOOTH radio coverage area of401 of FIG. 1.

GPS location 1 is the geographical position system coordinates of 401 ofFIG. 1.

Wireless device 2 (WD2) of FIG. 2 is 402 with downloaded software module402.1 of FIG. 1.

Wi-Fi area 2 is the geographical Wi-Fi radio coverage area of 402 ofFIG. 1.

GPS location 2 is the geographical position system coordinates of 402 ofFIG. 1.

Wireless device 3 (WD3) of FIG. 2 is 403 with downloaded software module403.1 of FIG. 1.

BLUETOOTH area 3 is the geographical BLUETOOTH radio coverage area of403 of FIG. 1.

GPS location 3 is the geographical position system coordinates of 403 ofFIG. 1.

Wireless device 5 (WD5) of FIG. 2 is 405 with NO downloaded softwaremodule of FIG. 1.

Wi-Fi area 5 is the geographical Wi-Fi radio coverage area of 405 ofFIG. 1.

GPS location 5 is not shown in FIG. 2 because it is unknown to thisinvention optional system server 200, because device 405 has nodownloaded software and thus is not authorised to communicate withserver module 200.1 of this invention as per FIG. 1.

Mobile Network Operator B of FIG. 2 represents 300.2 of FIG. 1 andprovides cellular or mobile radio coverage for wireless device 2 andwireless device 5 of FIG. 2, which are respectively 402 and 405 of FIG.1.

Mobile Network Operator A of FIG. 2 represents 300.1 of FIG. 1 andprovides cellular or mobile radio coverage for wireless device 1 andwireless device 4 of FIG. 2, which are respectively 401 and 404 of FIG.1.

Wi-Fi Network C of FIG. 2 represents 202 of FIG. 1 and provides Wi-Fi(non cellular, non mobile) radio coverage for wireless device 3 of FIG.2, which corresponds to 403 of FIG. 1.

With previous detailed descriptions of FIGS. 1 and 2 it makes FIGS. 3 to5 self-explanatory as each represents a corresponding part of previousFIGS. 1 and 2, respectively FIG. 3, over time periods T0 to T1, FIG. 4over time period T1 to T2 and FIG. 5 over time period T3 to T4.

Previous descriptions of FIGS. 1, 2 and 3 to 5 make FIGS. 6 to 8self-explanatory as each of FIGS. 6 to 8 corresponds respectively toFIGS. 3 to 5, namely FIG. 6 represents a geographical coverageillustration of FIG. 3, FIG. 7 represents a geographical coverageillustration of FIG. 4, and FIG. 8 represents a geographical coverageillustration of FIG. 5.

Concepts

1. A wireless communication system, WIRELESS INDIRECT INTERNET CONNECTSYSTEM (WINICS), comprising of wireless devices with a downloadedsoftware module without requiring the use of a VPN (virtual privatenetwork) and wherein;

a) the wireless devices are Internet enabled mobile phones, smartphonesor tablets, with at least two or more different build-in radiotransceivers of which one radio transceiver is at least one local areatransceiver (Wi-Fi or BLUETOOTH), adapted to download the softwaremodule. Such a wireless device (WD) when downloading the software module(SM) automatically upon download of the SM into the WD makes the SMoperable to access the WD functions and also makes the SM operable tocommunicate with any such other SM downloaded into any such differentwireless device (WDn). Any such different wireless device (WDn) becomesalso automatically an authorised wireless device of the WINICS upondownload of the SM into such WDn;

b) the software module (SM1) operable when downloaded into the wirelessdevice (WD1), such WD1 without direct Internet data connection withinrange, then the SM1 communicates with such nearby software module (SM2)downloaded into a different wireless device (WD2) within range of WD1,such WD2 with direct Internet data connection. SM1 and SM2 communicatethrough such WD1 and WD2 commonly available and compatible wirelesslocal area data connection (Wi-Fi orBLUETOOTH), meaning any suchnon-mobile network data connection between WD1 and WD2, such that WD1through the software modules SM1 and SM2 establishes automatically anindirect bidirectional Internet data connection from WD1 through WD2with the Internet.

c) all the software modules of this concept 1, downloaded into wirelessdevices globally, jointly form the WINICS.

2. The wireless communication system of Concept 1 in which the followingparameters can be set as part of the software module by users of thewireless devices with a downloaded software module.

A Wireless Devices with a downloaded software module with directInternet connection only allows automatic Internet access to any suchother wireless device with a downloaded software module without directInternet access if all following conditions apply:

-   -   the month to date total wireless device used Internet data        amount is not above the user set monthly data amount threshold        and if not set by the user then the software module will set a        minimum monthly data amount threshold wherein the month to date        start and stop date are set by the user and if not set by the        user then the software module will set a start date as the first        day- and the stop date as the last day- of each calendar month    -   the wireless device is directly connected to a data Internet        connection    -   the wireless device battery level is not below a user set        wireless device battery level threshold and if not set by the        user then the software module will set a minimum battery level        threshold value.    -   Optional additional condition, only if the wireless device data        connection is not a roaming data connection.

3. The wireless communication system of previous concepts 1 and 2 inwhich a system server with a build-in server module becomes part of theWINICS, as per concept 1, and wherein the software module whendownloaded into a wireless device and when such wireless device has adirect Internet data connection, as per the restrictions of Concept 2,then also acts as a captive portal that allows Internet data accessbypassing any authentication process initiated by the software moduledownloaded into a wireless device that does not have direct Internetdata access through the wireless device with a downloaded softwaremodule that has a direct Internet data connection BUT restricted to onlyaccess those URL- (Uniform Locater Locator) or IP-(Internet Protocol)addresses of the system server.

The captive portal as a sub module of the software module then allowsthe software module downloaded into a wireless device that does not havedirect Internet data access to communicate with the system serverthrough the software module downloaded into a wireless device that doeshave direct Internet data access.

All the software modules as per concept 1, downloaded into wirelessdevices globally as well as all server modules as per this concept 3,downloaded into system servers globally, jointly form a WINICS.

4. The wireless communication system of Concept 1, 2 and 3 in whichwireless devices with a downloaded software module communicate thefollowing information to the system server of concept 3;

-   -   the GPS (Global Positioning System) location parameters    -   the parameters as per concept 2.

5. The wireless communication system of Concept 1, 2 and 3 in which thesystem server communicates the following information to each individualwireless device with a downloaded software module as per concept 3 as areply to the wireless devices with a downloaded software moduleproviding his GPS (Global Positioning System) location to the systemserver;

-   -   the GPS (Global Positioning System) location parameters of all        the neighbouring wireless devices with a downloaded software        module.

6. The wireless communication system of Concept 1, 2 and 3 in which thesystem server communicates the following information to each individualwireless device with a downloaded software module as per concept 3 as areply to the wireless devices with a downloaded software requesting suchinformation to the system server or automatically provided by the systemserver when any such information parameters have changed at the systemserver;

-   -   the default value parameters as per concept 2.

7. The wireless communication system of Concept 1, 2 and 3 in which thesystem server communicates the following information to each individualwireless device with a downloaded software module as per concept 3 as areply to the wireless devices with a downloaded software requesting suchinformation to the system server or automatically provided by the systemserver when any such information parameters have changed at the systemserver;

-   -   the new captive portal list of URL or IP addresses as per        concept 3.

8. A method of operating a wireless communication system, WIRELESSINDIRECT INTERNET CONNECT SYSTEM (WINICS), comprising of wirelessdevices with a downloaded software module without requiring the use of aVPN (virtual private network) and wherein;

a) the wireless devices are Internet enabled mobile phones, smartphonesor tablets, with at least two or more different build-in radiotransceivers of which one radio transceiver is at least one local areatransceiver (Wi-Fi or BLUETOOTH), adapted to download the softwaremodule. Such a wireless device (WD) when downloading the software module(SM) automatically upon download of the SM into the WD makes the SMoperable to access the WD functions and also makes the SM operable tocommunicate with any such other SM downloaded into any such differentwireless device (WDn). Any such different wireless device (WDn) becomesalso automatically an authorised wireless device of the WINICS upondownload of the SM into such WDn;

b) the software module (SM1) operable when downloaded into the wirelessdevice (WD1), such WD1 without direct Internet data connection withinrange, then the SM1 communicates with such nearby software module (SM2)downloaded into a different wireless device (WD2) within range of WD1,such WD2 with direct Internet data connection. SM1 and SM2 communicatethrough such WD1 and WD2 commonly available and compatible wirelesslocal area data connection (Wi-Fi or BLUETOOTH), meaning any suchnon-mobile network data connection between WD1 and WD2, such that WD1through the software modules SM1 and SM2 establishes automatically anindirect bidirectional Internet data connection from WD1 through WD2with the Internet.

c) all the software modules of this concept 8, downloaded into wirelessdevices globally, jointly form the WINICS.

9. The method of Concept 8 in which the following parameters can be setas part of the software module by users of the wireless devices with adownloaded software module.

A Wireless Devices with a downloaded software module with directInternet connection only allows automatic Internet access to any suchother wireless device with a downloaded software module without directInternet access if all following conditions apply:

-   -   the month to date total wireless device used Internet data        amount is not above the user set monthly data amount threshold        and if not set by the user then the software module will set a        minimum monthly data amount threshold wherein the month to date        start and stop date are set by the user and if not set by the        user then the software module will set a start date as the first        day- and the stop date as the last day—of each calendar month    -   the wireless device is directly connected to a data Internet        connection    -   the wireless device battery level is not below a user set        wireless device battery level threshold and if not set by the        user then the software module will set a minimum battery level        threshold value.    -   Optional additional condition, only if the wireless device data        connection is not a roaming data connection.

10. The method of previous concepts 8 and 9 in which a system serverwith a build-in server module becomes part of the WINICS, as per concept8, and wherein the software module when downloaded into a wirelessdevice and when such wireless device has a direct Internet dataconnection, as per the restrictions of Concept 9, then also acts as acaptive portal that allows Internet data access bypassing anyauthentication process initiated by the software module downloaded intoa wireless device that does not have direct Internet data access throughthe wireless device with a downloaded software module that has a directInternet data connection BUT restricted to only access those URL-(Uniform Locater Locator) or IP- (Internet Protocol) addresses of thesystem server.

The captive portal as a sub module of the software module then allowsthe software module downloaded into a wireless device that does not havedirect Internet data access to communicate with the system serverthrough the software module downloaded into a wireless device that doeshave direct Internet data access.

All the software modules as per concept 8, downloaded into wirelessdevices globally as well as all server modules as per this concept 10,downloaded into system servers globally, jointly form a WINICS.

11. The method of Concept 8, 9 and 10 in which wireless devices with adownloaded software module communicate the following information to thesystem server of concept 10;

-   -   the GPS (Global Positioning System) location parameters    -   the parameters as per concept 9

12. The method of Concept 8, 9 and 10 in which the system servercommunicates the following information to each individual wirelessdevice with a downloaded software module as per concept 10 as a reply tothe wireless devices with a downloaded software module providing his GPS(Global Positioning System) location to the system server;

-   -   the GPS (Global Positioning System) location parameters of all        the neighbouring wireless devices with a downloaded software        module.

13. The method of Concept 8, 9 and 10 in which the system servercommunicates the following information to each individual wirelessdevice with a downloaded software module as per concept 10 as a reply tothe wireless devices with a downloaded software requesting suchinformation to the system server or automatically provided by the systemserver when any such information parameters have changed at the systemserver;

-   -   the default value parameters as per concept 9.

14. The method of Concept 8, 9 and 10 in which the system servercommunicates the following information to each individual wirelessdevice with a downloaded software module as per concept 10 as a reply tothe wireless devices with a downloaded software requesting suchinformation to the system server or automatically provided by the systemserver when any such information parameters have changed at the systemserver;

-   -   the new captive portal list of URL or IP addresses as per        concept 10.

15. The method of any preceding Concept 8 to 14 in which;

(a) A Wireless Device with a downloaded software module with no directInternet connection transmits a beacon through a local area transceiver(Wi-Fi or BLUETOOTH), as a means to request for Internet access from aneighbouring Wireless Devices with a downloaded software module withdirect Internet connection, meaning the one used local area transceiveris used in transmit mode until a Wireless Devices with a downloadedsoftware module with direct Internet connection responds to this requestfor Internet access and then turn automatically bidirectionalSend/Receive.

(b) Wireless Devices with a downloaded software module with directInternet connection permanently scans through all its available localarea transceiver (Wi-Fi and BLUETOOTH) for neighbouring Wireless Deviceswith a downloaded software module with no direct Internet connection,meaning all local area transceivers are in used in receive mode onlyuntil a Wireless Devices with a downloaded software module with nodirect Internet connection that requests Internet access is detected andthen turn automatically bidirectional Send/Receive.

(c) If the beacon received by the wireless device with a downloadedsoftware module with direct Internet connection is through the sameradio module as the one through which the wireless device receivesdirect Internet, then the software module of the wireless device withdirect Internet access will cause the wireless device without directInternet access to switch to another different radio module available toboth wireless devices, or vice-versa such that the direct Internetaccess radio module is different than the radio module used towards thedevice without direct Internet access.

16. The wireless communication system of any preceding Concept 1 to 7 inwhich;

(a) A Wireless Device with a downloaded software module with no directInternet connection transmits a beacon through a local area transceiver(Wi-Fi or BLUETOOTH), as a means to request for Internet access from aneighbouring Wireless Devices with a downloaded software module withdirect Internet connection, meaning the one used local area transceiveris used in transmit mode until a Wireless Devices with a downloadedsoftware module with direct Internet connection responds to this requestfor Internet access and then turn automatically bidirectionalSend/Receive.

(b) Wireless Devices with a downloaded software module with directInternet connection permanently scans through all its available localarea transceiver (Wi-Fi and BLUETOOTH) for neighbouring Wireless Deviceswith a downloaded software module with no direct Internet connection,meaning all local area transceivers are in used in receive mode onlyuntil a Wireless Devices with a downloaded software module with nodirect Internet connection that requests Internet access is detected andthen turn automatically bidirectional Send/Receive.

(c) If the beacon received by the wireless device with a downloadedsoftware module with direct Internet connection is through the sameradio module as the one through which the wireless device receivesdirect Internet, then the software module of the wireless device withdirect Internet access will cause the wireless device without directInternet access to switch to another different radio module available toboth wireless devices, or vice-versa such that the direct Internetaccess radio module is different than the radio module used towards thedevice without direct Internet access.

Many modifications and variations or different embodiments of thispresent invention are possible in view of the above disclosures,figures, drawings and explanations. Thus, it is to be understood that,within the scope of the appended claims, the invention can be practicedother than as specifically described above. The invention which isintended to be protected should not, however, be construed as limited tothe particular forms disclosed, or implementation examples outlined, asthese are to be regarded as illustrative rather than restrictive.Variations and changes could be made by those skilled in the art withoutdeviating from the novelty of the invention. Accordingly, the foregoingdetailed descriptions and figures should be considered exemplary innature and not limited to the novelties of the invention as set forth inthe claims.

1. A system including a first wireless computer device and a secondwireless computer device, the first wireless computer device including afirst operating system embodied on a first non-transitory storagemedium, the first operating system executable on the first wirelesscomputer device, the first wireless computer device including a firstbuilt-in radio local area wireless transceiver, the second wirelesscomputer device including a second operating system embodied on a secondnon-transitory storage medium, the second operating system executable onthe second wireless computer device, the second wireless computer deviceincluding a second built-in radio local area wireless transceiver, thefirst wireless computer device in connection with a wirelesscommunication network using the first built-in radio local area wirelesstransceiver, the first operating system including a first sub-module,wherein the first sub-module is configured to bypass an authenticationprocess initiated by the second operating system, to enable connectionof the second wireless computer device with the wireless communicationnetwork using the second built-in radio local area wireless transceiver.2. The system of claim 1, wherein the second operating system includes asecond sub-module, wherein the first sub-module is operable tocommunicate with the second sub-module, using the first built-in radiolocal area wireless transceiver in communication with the secondbuilt-in radio local area wireless transceiver, to bypass theauthentication process initiated by the second operating system, toenable connection of the second wireless computer device with thewireless communication network using the second built-in radio localarea wireless transceiver.
 3. The system of claim 1, wherein theconnection of the first wireless computer device with the wirelesscommunication network is an internet data connection, and wherein theconnection of the second wireless computer device with the wirelesscommunication network is an internet data connection.
 4. The system ofclaim 1, wherein the first operating system is a downloadable operatingsystem.
 5. The system of claim 1, wherein the second operating system isa downloadable operating system.
 6. The system of claim 1, wherein thefirst wireless device is a first internet enabled wireless mobiledevice.
 7. The system of claim 1, wherein the second wireless device isa second internet enabled wireless mobile device.
 8. The system of claim1, wherein the first wireless device is an Internet enabled mobilephone, an Internet enabled smartphone or an Internet enabled tabletdevice.
 9. The system of claim 1, wherein the second wireless device isan Internet enabled mobile phone, an Internet enabled smartphone or anInternet enabled tablet device.
 10. The system of claim 1, wherein thewireless communication network is a Wi-Fi network or a Bluetoothnetwork, or wherein the wireless communication network is a non-mobilenetwork.
 11. A first wireless computer device, forming part of a systemincluding the first wireless computer device and a second wirelesscomputer device, the first wireless computer device including a firstoperating system embodied on a first non-transitory storage medium, thefirst operating system executable on the first wireless computer device,the first wireless computer device including a first built-in radiolocal area wireless transceiver, the second wireless computer deviceincluding a second operating system embodied on a second non-transitorystorage medium, the second operating system executable on the secondwireless computer device, the second wireless computer device includinga second built-in radio local area wireless transceiver, the firstwireless computer device in connection with a wireless communicationnetwork using the first built-in radio local area wireless transceiver,the first operating system including a first sub-module, wherein thefirst sub-module is configured to bypass an authentication processinitiated by the second operating system, to enable connection of thesecond wireless computer device with the wireless communication networkusing the second built-in radio local area wireless transceiver.
 12. Thefirst wireless computing device of claim 11, wherein the secondoperating system includes a second sub-module, wherein the firstsub-module is operable to communicate with the second sub-module, usingthe first built-in radio local area wireless transceiver incommunication with the second built-in radio local area wirelesstransceiver, to bypass the authentication process initiated by thesecond operating system, to enable connection of the second wirelesscomputer device with the wireless communication network using the secondbuilt-in radio local area wireless transceiver.
 13. The first wirelesscomputing device of claim 11, wherein the connection of the firstwireless computer device with the wireless communication network is aninternet data connection.
 14. The first wireless computing device ofclaim 11, wherein the first operating system is a downloadable operatingsystem.
 15. The first wireless computing device of claim 11, wherein thefirst wireless device is a first internet enabled wireless mobiledevice, or the first wireless device is an Internet enabled mobilephone, an Internet enabled smartphone or an Internet enabled tabletdevice.
 16. The first wireless computing device of claim 11, wherein thewireless communication network is a Wi-Fi network or a Bluetoothnetwork, or a non-mobile network.
 17. A second wireless computer device,forming part of a system including a first wireless computer device andthe second wireless computer device, the first wireless computer deviceincluding a first operating system embodied on a first non-transitorystorage medium, the first operating system executable on the firstwireless computer device, the first wireless computer device including afirst built-in radio local area wireless transceiver, the secondwireless computer device including a second operating system embodied ona second non-transitory storage medium, the second operating systemexecutable on the second wireless computer device, the second wirelesscomputer device including a second built-in radio local area wirelesstransceiver, the first wireless computer device in connection with awireless communication network using the first built-in radio local areawireless transceiver, the first operating system including a firstsub-module, wherein the first sub-module is configured to bypass anauthentication process initiated by the second operating system, toenable connection of the second wireless computer device with thewireless communication network using the second built-in radio localarea wireless transceiver.
 18. The second wireless computing device ofclaim 17, wherein the second operating system includes a secondsub-module, wherein the second sub-module is operable to communicatewith the first sub-module, using the second built-in radio local areawireless transceiver in communication with the first built-in radiolocal area wireless transceiver, to bypass the authentication processinitiated by the second operating system, to enable connection of thesecond wireless computer device with the wireless communication networkusing the second built-in radio local area wireless transceiver.
 19. Thesecond wireless computing device of claim 17, wherein the connection ofthe second wireless computer device with the wireless communicationnetwork is an internet data connection.
 20. The second wirelesscomputing device of claim 17, wherein the second operating system is adownloadable operating system.
 21. The second wireless computing deviceof claim 17, wherein the second wireless device is a second internetenabled wireless mobile device, or the second wireless device is anInternet enabled mobile phone, an Internet enabled smartphone or anInternet enabled tablet device.
 22. The second wireless computing deviceof claim 17, wherein the wireless communication network is a Wi-Finetwork or a Bluetooth network, or a non-mobile network.