Cruable U-NII wireless radio with secure, integral antenna connection via SM BIOS in U-NII wireless ready device

ABSTRACT

A method that utilizes software and hardware mechanisms to meet the FCC requirement for a U-NII antenna to be an integral part of the device in which it operates, while providing wireless ready U-NII devices and CRUable U-NII radios. Enhancements are made to the software BIOS, including the inclusion of a table of approved radio-antenna PCI ID pairs to create an authentication scheme that verifies and authenticates the radio and antenna combination as being an FCC-approved unique coupling during boot-up of the system. The BIOS also comprises an OEM field that stores an encrypted secret key utilized to complete a second check of the radio model placed in the device. During boot up of the device, the PCI ID pairs from the BIOS are compared against the PCI ID of the radio and the secret key is checked against the radio model. Only a system with an approved combination of radio and antenna is allowed to complete the boot process, indicating an FCC approved device-antenna-radio combination under the “integral” requirement.

RELATED APPLICATIONS

The present invention is related to the subject matter of the followingcommonly assigned, co-pending U.S. patent applications: Ser. No.10/680,977 entitled “CRUABLE U-NII WIRELESS RADIO WITH SECURE, INTEGRALANTENNA CONNECTION VIA VALIDATION REGISTERS IN U-NII WIRELESS READYDEVICE” and filed Oct. 7, 2003; and Ser. No. 10/680,974 entitled“CRUABLE DUAL MODE U-NIL WIRELESS RADIO WITH SECURE, INTEGRAL ANTENNACONNECTION IN U-NII WIRELESS READY DEVICE” and filed Oct. 7, 2003. Thecontent of the above-referenced applications is incorporated herein byreference.

BACKGROUND OF THE INVENTION

1. Technical Field

The present invention relates generally to wireless communicationdevices and in particular to wireless communication devices utilized incomputer systems. Still more particularly, the present invention relatesto customer installable and replaceable U-NII wireless cards utilized incomputer systems.

2. Description of the Related Art

Computer-based wireless communication devices, including wireless LANsand wireless ready systems, is a quickly emerging and evolvingtechnology. Conventional computer-based wireless communication devicestransmit radio frequency (RF) signals to wireless receivers of localarea networks (LANs). These devices include transmitters that bothtransmit and receive wireless communication within a particularbandwidth in the highly regulated RF spectrum.

The RF spectrum is a limited bandwidth spectrum that is allocated amonga number of different services types/applications, including military,aviation, broadcast, and commercial communications. Because of the verylimited bandwidth available within the radio frequency (RF) spectrum,transmission in this medium is subject to strict government regulations.The regulations typically cover to the type and parameters of thetransmitters being utilized in a wireless network. These regulationscover modulation scheme, frequency of operation, and transmit power ofthe transmitters in order to avoid interference among the variousauthorized services utilizing the RF spectrum.

Transmitters comprise a combination of a circuit module called a radiocoupled to an antenna. The antenna is a central part of the transmittersince the antenna is designed and tuned to optimize gain or attenuationfor desired frequencies. Conventionally, manufacturers of transmittersobtain a license from the government authorizing the manufacturer tomanufacture a particular type of transmitter, exhibiting particularparameters. The license covers both components of the transmitter unit(i.e., radio and antenna), and the license typically specifies exactprotocols (i.e., operating parameters or ranges of parameters) for bothcomponents and the combination device. In the United States, forexample, licenses are granted and regulated by the Federal CommunicationCommission (FCC). Also, the regulations require that the end users notbe able to change or reconfigure the transmitter, which would result inoperation outside of the authorized parameters. Any change made to theoperating parameters radio or antenna requires another application forlicense and authorization by the FCC.

Conventional wireless computer networks are provided two frequencyranges with defined protocols to support wireless operations. Theseprotocols are the 802.11b and 802.11g protocols, operating at ISM bandfor 2.4 GHz, and the U-NII HiperLAN/2 and other protocols, operating atU-NII for 5 GHz. With the strict government regulations, it is essentialthat manufacturers and users of Wireless Fidelity (WiFi) LAN componentsensure that the wireless component is operating within authorizedparameters (i.e., power, roll off, etc. as defined by specification)provided by the ISM band for 2.4 GHz and U-NII for 5 GHz ranges. It isalso essential for the components to be designed to prevent tampering ormodification by the end users, which would change the operatingparameters of the transmitter.

To obtain authorization for the transmitter, manufacturers implementdesign and manufacturing controls to ensure that the transmittercomplies with the regulatory requirements. For example, the regulationof transmitters operating with the ISM 2.4 GHz band requires a uniqueconnection between the radio and antenna. To satisfy this requirement,the manufacturers designed a unique connector. International BusinessMachines Corporation, for example, selected a reverse thread connectionfor its low profile peripheral component interconnect (PCI) Card. Thatcompany also implemented a method referred to as BIOS Lock, which isdescribed below to ensure compliance with the FCC's ISM 2.4 GHz bandregulations.

Maintaining tight coupling between the radio and antenna in desktoppersonal computer or with PCMCIA cards is straightforward, sincetransmitters (radio and antenna) are typically packaged as a single unitwithin the casing of the card. However, maintaining tight coupling fordevices imbedded in notebook-type computer systems is much morecomplicated because the antenna is integrated into the lid portion orcover (i.e., within the external plastic or composite shell covering thetop portion) of the portable computer system, while the radio istypically a mPCI (mini peripheral component interconnect) card insertedinto the lower portion (i.e., the base/chassis) of the portable computersystem. In the portable computer environment, the transmitter isassembled by inserting the wireless PCI card into an mPCI slot andattaching the radio to the antenna via coax cable leading to the antennaimbedded in the lid portion.

Since there are a variety of suppliers of 802.11b mPCI (ISM 2.4 Ghzband) cards available on the market, the manufacturers of the notebookcomputer systems have to implement ways to ensure that the FCCregulations are complied with. That is, the manufacturer must design thecomputer system with a built in mechanism to prevent unauthorized802.11b cards from being utilized with the antenna built in to thecomputer system's cover. Different manufacturers provide differentmethods of handling this potential problem. IBM, for example, currentlyimplements a method referred to as BIOS (basic input/output system)Lock, which is described below.

Conventional 802.11b mPCI cards are inserted into the computer systembefore the computer system is powered on, and as such, BIOS Lock occursduring boot-up of the computer system. During boot, power-on self test(POST) checks the PCI IDs of the mPCI card and compares it to authorizedcards for that computer system. If the BIOS detects an unauthorizedcard, the BIOS will prevent boot of the system. This method allows themanufacturer to enable a system to accept several different 802.11b WiFicards from different suppliers. This approach also enableswireless-ready systems, where the computer system is shipped with theantenna embedded in the cover and the end user is able to install one ofthe authorized 802.11b WiFi mPCI radio cards.

Unlike the FCC regulation of its 802.11b (ISM 2.4 GHz band) counterpart,the FCC's regulation of transmitters operating with the 802.11a (U-NII/5GHz band) protocol requires that: “Any U-NII device that operates in the5.15-5.25 GHz band shall use a transmitting antenna that is an integralpart of the device.” (FCC regulation Part 15.407d). This restrictiverequirement presents a challenge for integrating U-NII wireless LAN(WLAN) devices such as an U-NII wireless card in a mobile PC, which isdesigned with an antenna subsystem separate from the feature cardimplementing specific WLAN function. The BIOS Lock method for 802.11b(ISM 2.4 GHz band) is not stringent enough and does not meet this FCCstandard of “integral part of the device”.

Conventional methods provided as solutions to the “integral part of thedevice” requirements either (1) solder (or otherwise permanently attach)antenna leads to the WLAN feature card, or (2) permanently “bury” thefeature card inside the mobile PC behind tamper-proof screws or othersuch mechanisms. Both approaches are not ideal because of serviceabilityissues, manufacturability issues, and additional costs. Moreimportantly, the permanence of the placement of the card eliminates theability to provide U-NII-based cards as an after-market upgrade that iscustomer installable, as is currently possible with 802.11b cards. TheTamper Proof Screw, introduced by IBM is one hardware implementationthat has received approval by the FCC for U-NII-based machines.

The PC industry has a long tradition of providing flexibility andexpandability. Manufacturers, such as IBM, are extending this traditionto the wireless arena, and are now building substantially all laptopswith integrated antennas. With the 802.11b (ISM 2.4 GHz standard, forexample, the user can order a card at time of purchase, add wireless, orchange wireless cards in the future. This functionality, particularlythe adding and/or replacing of the wireless card after purchasing thecomputer system, has led to the generation of customer replaceable unit(CRUable) wireless devices in the 802.11b arena.

Currently, the 802.11b radio is widely deployed in corporate enterprisesand in public hot spots, such as hotels, airports, etc. Recently,manufacturers have began to deploy the higher performance 802.11a(U-NII) radio in corporate infrastructures where additional performanceand capacity is critical. The difference in functional characteristicsand cost of the two radios (i.e., the transmitter types) results in adifferent market (and/or user) for computer systems designed to supportone of the two types of radio. Naturally, because of the above describedregulations, computer systems supporting the 802.11a (U-NII 5 GHz)standard requires the U-NII radio be built in to and shipped/sold withthe computer system, while the radios for computers supporting the802.11b standard may often be provided after-market, as a separateuser-replaceable component.

Because of the differences in users, operating parameters/restrictions,and customer demands, manufacturers conventionally manufacturesingle-mode wireless 802.11b cards with a radio or a combo card thatcontains both an 802.11b radio and separate U-NII radio. The combo(U-NII & ISM) cards are installed in the computer systems connected tothe antenna with tamper proof mechanisms in order to satisfy the FCC's“integral” requirement. 802.11a/b combo cards or single function U-NIIradios are not sold as a separate after-market product.

The present invention recognizes the limitations with implementingU-NII-based wireless computer systems, as well as the limitation of notenabling after-market upgrades of cards. The invention furtherrecognizes that it would be desirable to provide mechanisms that meetthe “integral part of the device” requirement for the U-NII antennaconnection, but still allows for serviceability and after-marketreplacement or addition. These and other benefits are provided by theinvention described herein.

SUMMARY OF THE INVENTION

Disclosed is a method and system that utilizes software to meet the FCCrequirement for an U-NII antenna to be an integral part of the device inwhich it operates, while providing wireless ready U-NII devices andCustomer Replaceable Units (CRUable) U-NII radios. The device comprisesthe antenna, an interface slot, a coax connector slot and coax couplingthe connector slot to the antenna, and a basic input/output system(BIOS). The device's BIOS is enhanced to include a table ofauthorized/approved radio-antenna pairs for the device. Additionally,the BIOS includes comparator logic, and a security mechanism (key) toprevent unauthorized modification of the table parameters. The CRUableU-NII radio is fabricated on a wireless module that also comprises aninterface for connecting to the interface slot of the device, as well asan EEPROM with a register storing a radio identifier (radioID) imprintedin the EEPROM's register by the manufacturer.

The software-based authentication process is completed as aradio-to-device authentication process. During boot up of the device,the radioID is compared against the radio-antenna pairs within the tablein the device's BIOS. The comparison first selects the correctradio-antenna pair based on the ID of the antenna embedded within thedevice. The security key provides access to the table and points to thecorrect radio for the device and antenna. U-NII transmission capabilityof the device and radio is enabled only when the radioID and the ID ofthe approved radio from the table of radio-antenna pair matches,indicating FCC approved device-antenna-radio combination under the“integral” requirement.

In one embodiment, the boot process is allowed to continue only when theradioIDs match. Otherwise the boot process is terminated. In anotherembodiment, the boot process is allowed to proceed but the radio isdisabled from operating within the device, so that the device bootswithout U-NII transmission capability. The invention thus allows themanufacture of both wireless-ready U-NII computer systems and approvedCRUable U-NII radios by uncoupling the radio and antenna, while ensuringthat the combination of system-antenna-radio would meet the FCC integralstandards for antennas and transmitters operating with that protocol.

The above as well as additional objectives, features, and advantages ofthe present invention will become apparent in the following detailedwritten description.

BRIEF DESCRIPTION OF THE DRAWINGS

The novel features believed characteristic of the invention are setforth in the appended claims. The invention itself however, as well as apreferred mode of use, further objects and advantages thereof, will bestbe understood by reference to the following detailed description of anillustrative embodiment when read in conjunction with the accompanyingdrawings, wherein:

FIG. 1A is a block diagram generally illustrating the base and displayportions of an exemplary laptop computer system within which thefeatures of the invention may be implemented;

FIG. 1B is a block diagram depicting the internal components of theexemplary laptop computer of FIG. 1A, including some software componentsutilized in accordance with one embodiment of the invention;

FIG. 2 depicts an exemplary CRUable wireless module with an U-NII radioaccording to one implementation of the present invention;

FIG. 3A depicts the system BIOS with wireless LAN adapter and devicedriver providing authentication of the wireless module according to oneembodiment of the invention;

FIG. 3B is a flow chart illustrating the processes by which the devicehardware and BIOS, etc. illustrated in the above figures are configuredfor operation according to the one embodiment of the invention; and

FIG. 4 is a flow chart of the process by which the BIOS-basedauthentication of an U-NII wireless module is completed in accordancewith one embodiment of the invention.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENT(S)

The present invention provides a software-implemented authenticationprocedure that enables a computer system designed with an embeddedU-NII-standard antenna to accommodate a CRUable wireless card whilefulfilling the FCC's “integral” requirements. The invention satisfiesthe integral requirement for devices of U-NII wireless transmittersutilizing specific authentication processes implemented by code withinsystem software, specifically the system BIOS. The BIOS is utilizedduring boot up to ensure unique, FCC-approved coupling ofsystem-antenna-radio before allowing the radio to be operational withinthe system. That is, the BIOS is uniquely coded for the particularchassis and antenna of the system/device within which it is located. Asoftware only solution is important because the solution can be utilizedwith existing hardware and is easily implemented on any wirelessoffering made by the manufacturer.

The unique coupling via software allows the radio to be sold separatelyand later installed into the computer system having a correct antenna,while still meeting the regulatory requirements for unique coupling. Theinvention thus provides a CRUable wireless card for U-NII that isauthenticated during the boot process via a software-directed scheme.The CRUable card is provided with an EEPROM that contains the radioidentifier (radioID) programmed into the EEPROM by the manufacturer andutilized to complete the authentication process that ensures that onlythe unique coupling will enable U-NII transmission capabilities withinthe system. The functional use of the radioID is described in furtherdetail below in the description of FIGS. 3A and 4. Also, the inventionis described generally with reference to ISM and U-NII devices/radios;however, for illustrative purposes, several references are made to an802.11b ISM 2 GHz device/radio and an 802.11a U-NII 5 GHz radio/device.

In the described embodiment, the software implemented scheme involvesthe interaction of parameter of the module, the radioID and the systemBIOS to complete the authentication process. In the described embodimentutilizing the software-directed authentication scheme of the presentinvention, a computer system designed (with embedded antenna) to operatewith the U-NII wireless protocol is prevented from being powered up foruse without an absolute validation/authenticated of the radio andantenna combination.

Notably, as will become clear in the described embodiments, the variousimplementations of the invention are significantly different from BIOSLock currently implemented for 802.11b (2.4 GHz) operation. The BIOSLock prevents the system from booting up with un-approved radios, butdoes not prevent the radio from working in an un-approved system. Forexample, one is able to take an 802.11b radio and it installs the radioin another notebook without BIOS Lock, and the radio would be connectedto the antenna in that chassis and fully functional. However, for U-NII(5 GHz) systems such as an 802.11a transmitter, this would probablycreate an unauthorized or illegal configuration under FCC regulations.The present invention overcomes this potential problem since theinvention ensures both that the system will only accept approved radiosand that the radio will only transmit in approved systems.

Since the radio is only functional when placed in a specific chassisthat contains the correct antenna, the problems/concerns that led to thestrict FCC integral regulation are eliminated, without having tohardwire the antenna and radio within the system during manufacture. Theantenna and radio combination when coupled together and authenticatedvia the method provided by the present invention meets the FCCrequirement for “integral part of the device” and is thus a legallyapproved combination.

Referring now to the figures, and in particular to FIGS. 1A and 1B,there are respectively illustrated an example of a wireless ready laptopcomputer and a computing system environment 100 within which theinvention may be implemented. To simplify the description of theinvention, the computing system environment is assumed to be an internalview of the laptop system described in FIG. 1A and thus share referencenumerals. The laptop system and computing system environment areprovided as an example and is not intended to suggest any limitation asto the scope of use or functionality of the invention. Neither shouldthe computing environment be interpreted as having any dependency orrequirement relating to any one or combination of components illustratedin the exemplary system environment.

Thus, the invention is operational with numerous other general purposeor special purpose computing system environments or configurations.Examples of well known computing systems, environments, and/orconfigurations that may be suitable for use with the invention include,but are not limited to, personal computers, server computers, hand-heldor laptop devices, multiprocessor systems, microprocessor-based systems,set top boxes, programmable consumer electronics, network PCs,minicomputers, mainframe computers, distributed computing environmentsthat include any of the above systems or devices, and the like.

FIG. 1A illustrates an exemplary laptop computer system configured forwireless communication (also referred to as a wireless-ready laptopcomputer system). Laptop computer 100 comprises base unit (or chassis)101 having internal components and an external housing with an uppersurface, a lower surface, side walls, etc. The laptop computer 100 alsocomprises a lid portion or cover 105 that includes display unit 107. Lidportion 105 is attached to the base unit 101 via some form of hingemechanism 108. In the illustrative embodiment, display unit includes ascreen 107 and external housing. Lid portion 105 also comprises anembedded antenna 115 with an attached co-ax cable 113 running fromantenna 115 through the hinge 108 into the base unit 101. The antenna115 is hidden/embedded behind the lid cover/shell and is thus referredto as an embedded antenna. Also, according to the invention, the antennahas a unique ID, which is known by the BIOS of the computer system. Theantenna 115 may be designed to support both 2.4 GHz band and 5 GHz bandoperations.

Base unit 101 also comprises an on/off button 102 by which power to theinternal components are turned on and off and a CD ROM (optical) drive155 for receiving an optical recording medium. Within the base unit 101is a mother board (not shown) on which the functional components of thelaptop computer such as the processor, memory, etc., arebuilt/installed. Also contained in the mother board is an mPCI connector(illustrated as dots 114), which accepts mPCI cards 111, such as U-NIIwireless cards, 802.11b wireless cards, or 801.11a/b wireless combocards. Access to the mPCI slot is obtained either by opening an accesspanel 104 (on the bottom of chassis unit 101) or by lifting keyboard161. Although described with specific reference to mPCI cards andassociated mPCI slots, those skilled in the art would appreciate thatthe features of the present invention may be applicable to other typesof port/connection schemes and CRUable cards.

As will be explained in greater details below, an access panel 104enables an insertion of a wireless card/module 111, such as is shown inFIG. 2, into the mPCI connector 114 located behind the access panel 104.The interfaces are electrical connectors that received interlockingconnectors from the wireless mPCI card 111. Wireless card 111 has aconnection interface for mPCI bus signal interface, which connects tomPCI connector 114 on the mother board. One electrical connectorillustrated in FIG. 1A serves to electrically couple the radio 112 ofthe wireless mPCI card 111 to the antenna 115, via micro-coaxial cables113.

Turning briefly to FIG. 2, wireless mPCI card 111 comprises wirelessU-NII (5 GHz) radio 112 (e.g., an 802.11a radio), a BaseBand 206, and amedia access controller (MAC) 205. The wireless mPCI card 111 alsocontains an antenna interface 204 that provides a cable connector to theradio 112 for micro-coaxial cable 113 to complete external coupling andinteraction with antenna 115. As described in FIG. 1A, antenna 115 maybe integrated within the lid portion of the laptop 100 and connected viamicro-coaxial cable 113 to the U-NII radio 112 on mPCI card 111.Wireless mPCI card 111 also comprises an mPCI interface/connector 203that interfaces with the processor and other components on the motherboard via mPCI connector 114. Other connectors provided on mPCI includepower interface (not shown) for providing wireless mPCI card 111 withelectrical power when wireless mPCI card 111 is connected within laptop100 via mPCI connector 114. Wireless mPCI card 111 may also comprise apower regulator and preamplifier, as well as other components, none ofwhich are relevant to the invention and therefore not illustratedherein.

With specific reference to FIG. 1B, there is illustrated an exemplarygeneral purpose computing device, which for purposes of simplificationis assumed to be wireless ready laptop computer 100. Computer 100comprises, but is not limited to, a processing unit 120, which isconnected by local bus to core chip 121. Core chip 121 is also connectedto system memory 130, and a system bus 122. The system bus 122 may beany of several types of bus structures including a memory bus, aperipheral bus, and a local bus using any of a variety of busarchitectures. By way of example, and not limitation, such architecturesinclude Industry Standard Architecture (ISA) bus, Micro ChannelArchitecture (MCA) bus, Enhanced ISA (EISA) bus, Video ElectronicsStandards Associate (VESA) local bus, and Peripheral ComponentInterconnect (PCI) bus.

The system memory 130 includes computer storage media in the form ofvolatile and/or nonvolatile memory such as read only memory (ROM) 131and random access memory (RAM) 132. For purposes of the invention,computer 100 further comprises an EEPROM 118, connected to the systembus 122, and which contains validation registers (VR) 125. A basicinput/output system (BIOS) 133, containing the basic routines that helpto transfer information between elements within computer 100, such asduring boot-up, is typically stored in ROM 131. RAM 132 typicallycontains data and/or program modules that are immediately accessible toand/or presently being operated on by processing unit 120. By way ofexample, and not limitation, the program modules include operatingsystem (OS) 134, application programs 135, other program modules 136,and program data 137.

The computer 100 may also include other removable/non-removable,volatile/nonvolatile computer storage media. By way of example only,FIG. 1B illustrates a hard disk drive 141, a magnetic disk drive 151that reads from or writes to a removable, nonvolatile magnetic disk 152,and an optical disk drive 155 that reads from or writes to a removable,nonvolatile optical disk 156 such as a CD ROM or other optical media.Other removable/non-removable, volatile/nonvolatile computer storagemedia that can be used in the exemplary operating environment include,but are not limited to, magnetic tape cassettes, flash memory cards,digital versatile disks, digital video tape, solid state RAM, solidstate ROM, and the like.

I/O Interface 140, connects hard disk drive 141, magnetic disk drive151, and optical disk drive 155 to the system bus 122. The drives andtheir associated computer storage media discussed above and illustratedin FIG. 1B provide storage of computer readable instructions, datastructures, program modules and other data for the computer 100. Forexample, hard disk drive 141 is illustrated as storing operating system144, application programs 145, other program modules 146, and programdata 147. Note that these components can either be the same as ordifferent from operating system 134, application programs 135, otherprogram modules 136, and program data 137. Operating system 144,application programs 145, other program modules 146, and program data147 are given different numbers herein to illustrate that, at a minimum,they are different copies.

A user may enter commands and information into the computer 100 throughinput devices such as a keyboard 161 and an integrated pointing device162 (e.g., a track point or track pad), commonly referred to as a touchpad. These and other input devices are integrated into chassis 101 andare often connected to the processing unit 120 through a user inputinterface 160 that is coupled to the system bus 122, but may beconnected by other interface and bus structures, such as a parallelport, game port or a universal serial bus (USB). A LCD panel 107(integrated into lid 105) is also connected to the system bus 122 via aninterface, such as a video interface 190. In addition to the monitor,computers may also include other peripheral output devices such asspeakers 197 and printer 196, which may be connected through an outputperipheral interface 195.

The computer 100 may operate in a networked environment using logicalconnections to one or more remote computers, such as a remote computer180. The remote computer 180 may be another personal computer, a server,a router, a network PC, a peer device or other common network node, andtypically includes many or all of the elements described above relativeto the computer 100. When used in a WLAN networking environment, thecomputer 100 is connected to the WLAN 171 through a WLAN networkinterface or wireless module 111. The connection to the networked remotecomputer 180 is facilitated by WLAN module 111, which connects viawireless transmission to other components in WLAN 171. WLAN module 111connects to system bus 122 via an mPCI connector 114. Computer 100 mayalso be connected via wired LAN and/or the Internet via other connectionmodules such as a modem.

The invention operates within a communication device (e.g., the laptopcomputer system 100 of FIGS. 1A and 1B) with which FCC authorizedradio-antenna coupling is required for U-NII communication. The computersystem is provided to a user with an U-NII approved antenna embeddedwithin the lid or other location that is made relatively inaccessible tothe user or difficult to modify/replace without manufacturer authorizedsupport. This prevents the antenna from being tampered with. Also, eachembedded antenna has a unique ID, which identifies the antenna as anU-NII antenna that may be utilized to receive and issue wirelesstransmissions within the particular computer system. Finally, accordingto the invention, the particular device and antenna together providespecific identifying characteristics required by any combination ofradio and antenna coupling that is to be utilized for wirelesscommunication via the U-NII protocol.

The invention may be described in the general context ofcomputer-executable instructions, such as program modules, beingexecuted by a computer. Generally, program modules include routines,programs, objects, components, data structures, etc. that performparticular tasks or implement particular abstract data types. Theinvention may also be practiced in distributed computing environmentswhere tasks are performed by remote processing devices that are linkedthrough a communications network. In a distributed computingenvironment, program modules may be located in both local and remotecomputer storage media including memory storage devices.

Because most of the implementation of the invention occurs withinportable computer systems, such as laptop computer system 100, theremainder of the invention will be described with specific reference toa computer system and software and hardware components thereof. Aspreviously described, the antenna is imbedded in the system lid, whichis permanently connected to the chassis, in which the mother boardhaving the CPU and System BIOS, and mPCI slot for connecting the CRUablemPCI card is located. A permanent connection between the system lid,which contains the antenna, and the system chassis is made via thehinges. The mother board/system board has a permanent connection to thechassis and contains BIOS unique to that mother board/chassis/system andlid configuration. The permanent connections allow the combination ofantenna, mother board, and BIOS to be considered a single unit. Theunique paring of a wireless card (such as card 111) to the mother boardallow for an integral connection that meets the FCC requirements, sincethe mother board has a unique coupling to antenna.

During design and manufacture of the transmission antennas, an antennaidentifier (ID) is created that is unique to the specific antennasubsystem and computer system within which the antenna is to beembedded. This antenna ID is based on the antenna's size, shape,material, tuning and the size, shape, material of the surroundingcomposite. Further, this unique antenna ID is a function of the antennaand chassis only and not related to previously used identifiers formachine type models (i.e., CPU, segment, Series, etc).

System BIOS Software-Authentication Mechanism for Integrally CouplingCRUable U-NII Wireless Radio and Embedded Antenna

The invention provides a software-based mPCI radio-to-system/deviceauthentication process. FIG. 3A illustrates several of the software andhardware components involved in completing the authentication process.The major blocks within the figure include blocks within the motherboard 300 of computer system 100 and a wireless module 111, shownconnected by a communication bus 314 (running from mPCI connector 114)across which signals/data are sent during the authentication process.Computer system 100 comprises coax connector 113 for antenna 109embedded in the lid portion, device driver API 309, and BIOS 133.Wireless module 111 comprises the U-NII radio 112, and an EEPROM 317,which includes a register 323 in which is stored the radioID. Thewireless module also comprises a wireless, local area network (wLAN)adapter (not shown) that enables wireless module to connect the computersystem to a LAN.

The BIOS 133 is enhanced/extended with a mechanism to uniquely determinethe antenna subsystem, which includes the antenna's size, shape,material, and tuning and the size, shape, and material of thesurrounding composite. This provides a version of BIOS that is unique tothe antenna and chassis only. Specifically, as illustrated, system BIOS133 comprises an original equipment manufacturer (OEM) field 305, whichprovides a software key 304 to complete the authentication process, asdescribed further below. Additionally, system BIOS 133 comprises a table321 of approved antenna-radio combinations for that device's chassis.Specifically, the table 321 includes a listing of the approvedPeripheral Component Interconnect (PCI) IDs for corresponding radio andantenna combinations that have been granted FCC authorization foroperation. System BIOS 133 also comprises a comparator 312 and anapproval flag 313, which holds the result of a comparison of radio PCIIDs as described below. The combinations of relevance to theimplementation depends on the manufacture-established parameters of theantenna and chassis, and thus, in one embodiment, the approvedcombination list may be limited to only those radios that are approvedfor use with the particular antenna of the system.

In order to support/provide the features of the invention, the abovesystem components and radio module are designed and/or programmed withspecific parameters and functionality. FIG. 3B provides a flow chart ofthe steps involved in obtaining FCC approval for the components afterdesigning and/or programming the components with parameters andfunctionality required for implementing the steps of the invention. Theprocess may be divided into three stages, which are: (1) designing,configuring, and installation of the BIOS; (2) building the CRUableadapter card; and (3) obtaining authorization from the regulatory body.Although described as sequential stages, the stages may be completed outof the described order or in an overlapping manner.

The first stage begins with a manufacturer designing the system/devicewith a particular antenna both having pre-established operatingparameters as shown at block 352. That is, in addition to the operatingparameters of the antenna, other parameters related to the chassis ofthe device are also specified within the system design. The BIOS creatorthen generates and stores the table of approved radio-antenna PCI IDcombinations for that chassis, as shown at block 354. Themanufacturer/supplier receives the authorized pairings from the FCCeither before or during the FCC authorization process based primarily onthe antenna parameters. The manufacturer also programs the OEM with thecorrect encrypted key for the authorized radio as indicated at block356. Following, the BIOS is installed on the system/device/machineduring completion of the building of the mother board as indicated atblock 358. An assumption is made that the manufacturer has loaded thecorrect BIOS based on the unique antenna type and device's chassis. Thisassumption is almost certain to be correct since failure of themanufacturer to provide the correct BIOS would result in unauthorizedantennas and substantial financial penalties by the FCC.

Once the system/device has been designed with the BIOS programmed withthe necessary functionality based on the antenna-system combination, thesecond stage of creating/building the wireless radio module is completedas shown at block 362. During the build process, logic is providedwithin the module to complete device-to-module authentication steps,etc., when the module is inserted within the system/device and power issupplied to the module. Following, the manufacturer or authorizedsupplier configures the module by programming the radioID in the EEPROMof the module, as shown at block 364. Because different types of CRUableradios may be utilized within the system/device depending on theapproved authorized combinations, all CRUable radios designed forutilization with the particular system/device's chassis may beprogrammed with a same radioID rather than having multiple radioIDs thatare each capable of receiving authorization during the BIOSauthorization process. However, as will be explained later, only thecorrect model of radio is allowed to be opened within the device. Themodel number or other identifying characteristic of the authorized radiois stored in the OEM at step 356.

When a system/device and authorized module have been created, thecombination is subjected to a series of tests as shown at block 372 toensure the system/device complies with government regulations. Followingthe completion of these tests, the system/device is submitted to theregulatory body for approval as indicated at block 374, and themanufacturer waits for approval from the governing body. The cards arealso tested and submitted for approval. Notably, manufacture ofdifferent cards and system/devices may also be submitted for approvalfrom the government regulatory body. Government approval is thusobtained for all combinations of authorized radio module andsystem/device chassis and antenna, given the BIOS-authenticationoperation. After approval is obtained, as indicted at block 376,similarly configured and designed systems/devices and modules are sentto market as individual units for customer purchase as shown at block378, and the authentication process that is built into the system/deviceand CRUable cards is triggered whenever the two units are coupled toeach other and the system/device is powered up.

The functionality and operation of each of the components of FIG. 3Awithin the invention is described below with reference to the processflow of FIG. 4. To simplify the description of the process, only thosecomponents of FIG. 3A that are vital to an operation are indicated witha reference numeral in the following description of FIG. 4.

Referring to the flow chart of FIG. 4, when the computer system ispowered on, the boot process begins as shown at block 401. The systemBIOS, which is unique to the device (and antenna type) verifies theantenna type and populates the table 321 with authorized combinations asindicated at block 403. Since the antenna type does not change in asystem, and the antenna is provided by the manufacturer (or authorizedservice entities), the table may be pre-populated during systemmanufacture or authorized replacement of wireless components. Thisremoves the second step of the process (block 403) following initiationof the boot-up procedure. Notably, the invention assumes that themanufacturer has loaded the correct BIOS based on the unique antennatype and device's chassis.

The BIOS then checks the PCI ID (or radioID) from the subsystem (EEPROM)of the wireless LAN card inserted into the system's wireless portagainst the PCI IDs of approved radio-antenna pairings within the tableas shown at block 405. The check is completed by the comparator 312,which receives two inputs, a first PCI ID of the radio of the authorizedradio-antenna pairing in the table 321 and a second PCI ID (or radioID)from the wireless LAN card. The comparator then compares the two PCI IDswith each other and makes a determination, indicated at block 407,whether the two PCI IDs match. The result of the comparison indicateswhether the present combination of antenna subsystem and wireless LANcard is an approved/valid coupling by the FCC's integral standard. Ifthe two PCI IDs do not match, indicating the wireless card's radio isnot FCC-authorized to be coupled to the antenna of the system/device, anerror message is generated as indicated at block 409. Then, in theprimary embodiment, the boot process terminates as shown at block 410.In another embodiment, the radio is disabled, but the boot process isallowed to proceed as indicated at block 412. However, the system bootswithout U-NII transmission capability. When the combination is an FCCapproved one, an approval flag is set as shown at block 411.

With the approval flag set, the boot process continues and, as shown atblock 413, the device driver 309 makes a BIOS call to the OEM (originalequipment manufacturer) field 305 for a pre-set value stored within theOEM 305. The OEM is a specific field within the BIOS that stores a valueprovided by the device manufacturer to identify the approved wirelesscard for that system/device and antenna. In one embodiment, the OEMstores the allowable card ID (e.g., the model number) for the authorizedcard. The value in the OEM field is encrypted prior to being stored bythe manufacturer of the system or an authorized customizer of thesystem. The value is decrypted during the BIOS call by the devicedriver. Utilizing the card's model number, an secondary check is made atblock 415 to determine whether the card installed is approved for thesystem/device, i.e., whether the wireless LAN card is approved foroperation within that computer system. This determination involvesdecrypting the OEM value that is retrieved from the OEM field andcomparing that decrypted value to a known/pre-authorized value (e.g.,model number) for radios (or radio cards/modules) that can be used inthe device. When the OEM value does not match one within the table orother location of authorized radio model numbers, the wireless LAN cardis not enabled as indicated at block 417. The device driver disables theinterface to the wireless LAN card. However, when the value is approved,the device driver enables the wireless LAN card for operation within thesystem as shown at block 419, and the boot process is allowed tocomplete as shown at block 421.

In one embodiment, the process of determining during system operationthat the radio has been authenticated involves utilization of theapproval flag and OEM field. The result of the comparison is storedwithin the approval flag, which may be a single bit register storing a 1or 0, respectively indicating authorized and un-authorized coupling.When a request for U-NII transmission is received on the system, theBIOS checks the output register for the stored indication and the OEMvalue against the model number of the radio before completing the U-NIIconnection from the system. Thus, a request for U-NII connection isallowed to proceed only when both checks return positive results. Also,the output register is cleared (reset to 0) whenever a triggeringcondition is registered on the device. The triggering condition may beone of several conditions from among reboot of the system, removal ofthe wireless module, registering a break in the wired connection betweenthe antenna and the radio, modification/replacement of the radio, andmodification/replacement of said antenna, etc. With this implementation,the wireless LAN card is disabled by default, and the Device Driver willnot enable the card to for use with the antenna if the card is notinstalled in a system where the antenna paring with the radio is an FCCapproved combination. The FCC's unique coupling requirement for integraltransmitters is thus satisfied using software-implemented authenticationof CRUable wireless modules within computer systems designed to supportU-NII wireless transmissions.

The two-step authentication mechanism ensures that the system will notcomplete a bootup unless an authorized combination of wirelessmodule/radio and antenna within a specific chassis is doubly confirmed.An false authentication from the BIOS table comparison is negated by theOEM check. Also, as indicated by block 412, the computer system may beallowed to boot-up but with the wireless capabilities completelydisabled. Further, other built in checks of the invention may cause thecomputer system to automatically shut down if the user attempts toconnect using an unauthorized radio (i.e., a radio that has not beenauthenticated by the above processes) during system operation.Additional safeguards are thus provided by the invention.

With this implementation, the boot process may complete on the system,but no wireless access is permitted and the wireless LAN card isinoperative within that system. Additional considerations for thisimplementation include: (1) The BIOS lock process may be utilized alongwith the above process to ensure that the system will only boot withauthorized cards; (2) The Device Drivers that recognize themanufacturer's mPCI cards should include logic for the “Allowable CardID.” That is, the device driver is designed to only allow the insertedcard to work (or become operational) in certain systems to which thecards match. Systems are thus designed with specific device drivers thatlook for pre-specified, unique cards and only accept those cards; and(3) The radio is disabled until enabled by the Device Driver.

OVERVIEW

This implementation of the invention provides several advantages overother solutions. Among these advantages are:

-   (1) The implementation has no dependency on hardware, including the    computer system and the card; The implementation is easily    implemented only with system management (SM) BIOS and Device Driver    and can easily be checked in real time during each power-up and/or    resume process;-   (2) The implementation is less complex in that it does not require    an additional Validation Utility Software (described below). Firstly    the solutions work with standard or legacy hardware. Both other    implementations require creation and maintenance of additional    software, such as Validation Utility;-   (3) Further, the solutions may be defined as industry standard    methods to be implemented across systems and cards; and-   (4) Lastly, updates to the allowable cards are handled only through    manufacturer-specific BIOS, thus substantially eliminating the    possibility of an unauthorized tampering of the approval mechanism.

Current solutions for U-NII enabled systems utilize tamper proof screwsto prevent the removal of the radio by unauthorized personnel. ForPCMCIA (personal computer memory card international adapter) cards, theantenna is soldered to the radio and is a single unit, and this preventsun-intentional removal of the radio. The various implementations and/orembodiments of the present invention enables a manufacturer to offerwireless ready systems for U-NII (5 Ghz band). Further the inventionallows for after-market purchase of a radio that satisfied the FCCrequirements, thus enabling users the flexibility of deciding whether toinvest in the more expensive U-NII devices. The invention also resultsin significant cost savings to the manufacturer, since the U-NIIproducts are CRUable, i.e., customers can install, exchange, or replacethe radio, rather than requiring the radio to be serviced by anauthorized service center. This solution also provides a significantimprovement in manufacturing, since it does not require tamper proofdesigns.

While the invention has been described with specific reference toportable computers and/or laptop computers, the features of theinvention are not limited to such devices. Those skilled in the artappreciate that the features of the invention may be extended to anydevice utilizing wireless transmitters, including desktop computers thatare built with embedded antennas and a slot for receiving a wirelesscard, and any portable electronic device with similar wirelesstransmission capabilities and components.

Also, it is important to note that while the present invention has beendescribed in the context of a fully functional data processing system,those skilled in the art will appreciate that the mechanism of thepresent invention is capable of being distributed in the form of acomputer readable medium of instructions in a variety of forms, and thatthe present invention applies equally, regardless of the particular typeof signal bearing media utilized to actually carry out the distribution.Examples of computer readable media include: nonvolatile, hard-codedtype media such as Read Only Memories (ROMs) or Erasable, ElectricallyProgrammable Read Only Memories (EEPROMs), recordable type media such asfloppy disks, hard disk drives and CD-ROMs, and transmission type mediasuch as digital and analog communication links.

Although the invention has been described with reference to specificembodiments, this description should not be construed in a limitingsense. Various modifications of the disclosed embodiments, as well asalternative embodiments of the invention, will become apparent topersons skilled in the art upon reference to the description of theinvention. It is therefore contemplated that such modifications can bemade without departing from the spirit or scope of the present inventionas defined in the appended claims.

1. In a device having an embedded antenna designed for supportingwireless communication via the U-NII wireless protocol, a basicinput/output system (BIOS), and an interface for electrically coupling aCRUable U-NII radio, a method for providing an authorized U-NIItransmitter within the device, said method comprising: detecting at theinterface an electrical coupling to a CRUable mPCI card containing aU-NI-standard radio having an associated radio PCI ID and otheridentifying characteristic; comparing the radio's PCI ID with a secondradio PCI ID obtained from a table of radio-antenna PCI ID pairscorresponding to authorized U-NII radio-antenna combinations, whereinsaid table is provided within the BIOS of the device and said secondradio PCI ID is selected by matching the antenna ID of the embeddedantenna with a similar antenna ID within the table; and enabling U-NIItransmission via the combination of the radio and the antenna only whensaid radio IDs match, indicating an approved combination of said radioand said embedded antenna; wherein, when the radio IDs do not match,said method further comprises preventing the use of the radio with theantenna.
 2. The method of claim 1, said comparing step furthercomprising: following a power on of said device, initiating a BIOS checkof system components, wherein the radio ID is read from the CRUableU-NII radio that is also electrically coupled to said BIOS; populatingthe table within system BIOS with authorized antenna-radio 11) pairs forthat device; retrieving the antenna ID from a storage location withinsaid BIOS; reading a first radio ID from the table within the BIOS,wherein said radio PCI ID read is one stored as a paired entry in saidtable with the retrieved antenna ID of the embedded antenna; comparing apairing of said radio ID and said antenna ID against the table ofapproved radio/antenna ID pairs, wherein the radio IDs are compared oncethe retrieved antenna ID is located within the table.
 3. The method ofclaim 2, further comprising terminating said boot up when saidcomparison indicates the radio's ID does not match one within the tableof approved radio-antenna ID pairs selected by matching the antenna ID.4. The method of claim 1, said authentication process furthercomprising: retrieving a secret key from an OEM field within said BIOS,said secret key being an allowable card ID for that device, which isencrypted and stored in said OEM field by a manufacturer of said device;decrypting said secret key; comparing said secret key against card IDswithin the table matching the ID of the CRUable U-NII radio card; andenabling said radio to operate within said device only when said secretkey matches the card ID, wherein U-NII transmission via theradio-antenna combination is enabled only when said radio-antenna IDpairing matches one of said approved radio/antenna ID pairs within thetable and said secret key matches the ID of the connected radio card. 5.The method of claim 4, wherein said secret key is a model number ofapproved cards for operation within the device and said model number isassociated with the radio PCI ID within the table.
 6. The method ofclaim 1, wherein said comparing further comprises: comparing the radio'sPCI ID with a second radio PCI ID for a match; when a match is found,storing an indication of said match of radio IDs within an approvalflag; checking said an approval flag prior to completing an U-NIIconnection with said device, wherein a request for U-NII connection isallowed to proceed only when said approval flag indicates the radio hasbeen authenticated; and clearing said approval flag whenever atriggering condition is registered on the device, said triggeringcondition being a condition form among rebooting the device, removingthe wireless module, breaking a connection between said antenna and saidradio, modification/replacement of said radio, modification/replacementof said antenna.
 7. The method of claim 3, wherein said device is aportable computer system.
 8. A method comprising: receiving a CRUableU-NII radio card into an interface slot within a wireless ready devicedesigned for receiving radio cards, said radio card having a radio witha radio identification (ID) parameter, wherein said slot enables saidradio to be electrically coupled to and interface with an antenna thatis embedded in the device and has an antenna identification (ID)parameter; during boot up of the device, completing an authenticationprocess utilizing a table within a BIOS of the device of pairedradio-antenna IDs for authorized radio-antenna combinations, wherein theauthentication process verifies that said radio is an authorized radiofor utilization with the antenna within the device under U-NIIstandards; and when said authentication process verifies that said radiois authorized, completing a boot of said device and enabling U-NIIcommunication via the combination of said antenna and said radio,wherein a U-NII transmitter meeting an “integral” requirement isprovided within the wireless ready device having the embedded antenna;wherein, when the authentication process fails to verify that the radiois authorize, completing the boot, and prevention the use of the radiowith the antenna, such that a breach of the integral requirement is notenabled.
 9. The method of claim 8, wherein: said CRUable U-NII radio isfabricated on a wireless module that also comprises a register holdingthe radio ID and an interface for connecting to said interface slot ofsaid device; said device comprises the antenna, the interface slot, acoax connector slot and coax coupling the connector slot to saidantenna, a basic input/output system (BIOS) with a table of approvedradio-antenna pairings and an OEM field with a secret key programmed bya manufacturer; and said step for completing an authentication processcompletes a radio-to-antenna and a radio-to-device authenticationprocess, wherein only a correct radio model is enabled.
 10. The methodof claim 8, said authentication process further comprising: following apower on of said device, initiating a BIOS check of system components,wherein the radio ID is read from the CRUable U-NII radio that is alsoelectrically coupled to said BIOS; populating the table within systemBIOS with authorized antenna-radio ID pairs for that device; retrievingthe antenna ID from a storage location within said BIOS; reading a firstradio ID from the table within the BIOS, wherein said radio PCI ID readis one stored as a paired entry in said table with the retrieved antennaID of the embedded antenna; comparing a pairing of said radio ID andsaid antenna ID against the table of approved radio/antenna ID pairs,wherein the radio IDs are compared once the retrieved antenna ID islocated within the table.
 11. The method of claim 8, said authenticationprocess further comprising: retrieving a secret key from an OEM fieldwithin said BIOS, said secret key being an allowable card ID for thatdevice, which is encrypted and stored in said OEM field by amanufacturer of said device; decrypting said secret key; comparing saidsecret key against card IDs within the table matching the ID of theCRUable U-NII radio card; and enabling said radio to operate within saiddevice only when said secret key matches the card ID, wherein U-NIItransmission via the radio-antenna combination is enabled only when saidradio-antenna ID pairing matches one of said approved radio/antenna IDpairs within the table and said secret key matches the ID of theconnected radio card.
 12. The method of claim 11, said comparing stepcomprises comparing said secret key to a radio ID within said tablewithin the BIOS.
 13. The method of claim 9, wherein said radio ID andsaid antenna ID are peripheral component interconnect (PCI)identifications (IDs).
 14. The method of claim 10, further comprising:when said first radio ID and said second radio ID matches, allowing aboot process being executed on the device to complete, wherein when saidmatch does not occur, said boot process is terminated.
 15. The method ofclaim 10, further comprising: when said first radio ID and said secondradio ID does not match, disabling said radio from operating within saiddevice, wherein said device is booted without U-NII transmissioncapability.
 16. The method of claim 11, wherein said secret keyauthentication is completed proximate in time to said comparison ofradio PCI ID pairs, whereby a dual authentication process is completedto activate said radio for U-NII operation within the device.
 17. Themethod of claim 8, wherein said completing an authentication processfurther comprises: comparing a pairing of said radio ID and said antennaID against the table of approved radio/antenna ID pairs for a match;when a match is found, storing an indication of said match within anapproval flag; checking said approval flag for said indication prior tocompleting a U-NII connection from said device, wherein a request forU-NII connection is allowed to proceed only when said approval flagindicates that U-NII connection is authorized and said secret keymatches the card ID; and clearing said approval flag whenever atriggering condition is registered on the device, said triggeringcondition being a condition form among rebooting the device, removingthe wireless module, breaking a connection between said antenna and saidradio, modification/replacement of said radio, modification/replacementof said antenna.
 18. A wireless-ready device comprising: an embeddedantenna having an antenna ID and specific design characteristics toenable U-NII transmission when coupled to an authorized U-NII radio; aninterface which receives a CRUable U-NII radio card with a radio havinga radio ID, wherein said interface enables said radio to be electricallycoupled to and interface with the embedded antenna; a BIOS thatcomprises an OEM field and a table of radio ID and antenna ID pairs forauthorized U-NII radio-antenna combinations, said OEM field storing anencrypted allowable card ID; an authentication mechanism associated withsaid BIOS that initiates a radio-to-device verification process duringboot up of the device that verifies that said radio is an authorizedradio for utilization with the embedded antenna and within said deviceaccording to pre- established U-NII standards; and U-NII transmitteractivation logic that, when said verification process verifies that saidradio is authorized for utilization with said antenna and within saiddevice, for completing a boot of said device and enabling U-NIIcommunication via the combination of said antenna and said radio,wherein a U-NII transmitter meeting an “integral” requirement isprovided within the wireless ready device; wherein, when theverification process fails to verify that the radio is authorized forutilization with said antenna and for utilization within the device,said activation logic enables completion of the boot of the device, andprevents use of the radio with the antenna, such that a breach of theintegral requirement is not enabled.
 19. The device of claim 18,wherein: said CRUable U-NII radio is fabricated on a wireless modulethat also comprises a register holding the radio ID and an interface forconnecting to said interface slot of said device; said device comprisesthe antenna, the interface slot, a coax connector slot and coax couplingthe connector slot to said antenna, a basic input/output system (BIOS)with a table of approved radio-antenna pairings and an OEM field with asecret key programmed by a manufacturer; and said authenticationmechanism provides both radio-to-antenna authentication and radio-to-device authentication, such that only an authorized radio within anapproved device is enabled.
 20. The device of claim 19, wherein saidBIOS further comprising: activation code, which initiates a BIOS checkof system components following a power on of said device, wherein theradio ID is read from the CRUable U-NII radio that is also electricallycoupled to said BIOS; authentication code that: (1) populates the tablewithin system BIOS with authorized antenna-radio ID pairs for thatdevice; (2) retrieves the antenna ID from a storage location within saidBIOS; and (3) reads a first radio ID from the table within the BIOS,wherein said radio ID read is one stored as a paired entry in said tablewith the retrieved antenna ID of the embedded antenna; a comparator thatcompares a pairing of said radio ID and said antenna ID against thetable of approved radio/antenna ID pairs, wherein the radio IDs arecompared once the retrieved antenna ID is located within the table; anda verification mechanism that, when said first PCI ID and said secondPCI ID matches, signals an approval of said radio-to-deviceauthentication as a successful authentication of said radio foroperation within said device.
 21. The device of claim 19, furthercomprising: a device driver that controls access to and from said radiocard, and which completes a radio-to-device authentication by:retrieving a secret key from an OEM field within said BIOS said secretkey being an allowable card ID for that device, which is encrypted andstored in said OEM field by a manufacturer of said device; decryptingsaid secret key; comparing said secret key against card IDs within thetable matching the ID of the CRUable U-NII radio card; and enabling saidradio to operate within said device only when said secret key matchesthe card ID, wherein U-NII transmission via the radio-antennacombination is enabled only when said radio-antenna ID pairing matchesone of said approved radio/antenna ID pairs within the table and saidsecret key matches the ID of the connected radio card.
 22. The device ofclaim 20, further comprising: boot termination mechanism that allows aboot process being executed on the device to complete when said firstradio ID and said second radio ID matches, wherein when said match doesnot occur, said boot termination mechanism terminates said boot process.23. The device of claim 20, further comprising: a transmission disablingmechanism that disables said radio from operating within said devicewhen said first radio ID and said second radio ID does not match or saidsecret key does not match the card ID, wherein said device is bootedwithout U-NII transmission capability.
 24. The device of claim 21,wherein said device driver comprises a transmission disabling mechanismthat disables said radio from operating within said device when saidfirst PCI ID and said second PCI ID do not match or said secret key doesnot match said card ID, wherein said device is booted without U-NIItransmission capability.
 25. The device of claim 18, further comprising:means for comparing the first radio ID with a second radio ID for amatch when an antenna ID of the respective first radio ID and the secondradio ID also matches; when a match is found, a validation register thatstores a result of the comparison of the radio IDs; means for checkingsaid validation register for said result prior to completing a U-NIIconnection with said device, wherein a request for U-NII connection isallowed to proceed only when said result indicates a match between saidradio IDs; and reset mechanism for resetting a value of said validationregister whenever a triggering condition is registered on the device,said triggering condition being a condition from among rebooting thedevice, removing the wireless module, breaking a connection between saidantenna and said radio, modification/replacement of said radio,modification/replacement of said antenna.