摘要:
Embodiments provision captive portals on network access points (NAPs). In response to a request from a NAP owner, a cloud service associates a NAP with the NAP owner and provides a control channel for configuring the NAP. The NAP owner inputs configuration settings describing the captive portal. The cloud service processes the configuration settings to generate configuration data. The cloud service transmits the configuration data to the NAP. The NAP applies the configuration data to configure the NAP. Some embodiments configure Wi-Fi hotspots with captive portals for gated access to the Internet.
摘要:
Embodiments provision captive portals on network access points (NAPs). In response to a request from a NAP owner, a cloud service associates a NAP with the NAP owner and provides a control channel for configuring the NAP. The NAP owner inputs configuration settings describing the captive portal. The cloud service processes the configuration settings to generate configuration data. The cloud service transmits the configuration data to the NAP. The NAP applies the configuration data to configure the NAP. Some embodiments configure Wi-Fi hotspots with captive portals for gated access to the Internet.
摘要:
Embodiments apply a set of sequenced instructions to connect to a network through a captive portal. A computing device detects a network access point and obtains the instruction set corresponding to the network access point. The instruction set is derived by a cloud service from crowdsourced data describing interactions between mobile computing devices and the network access point. Applying the instruction set includes performing actions such as navigating web pages to accept terms and conditions, provide user or device information, and more.
摘要:
Embodiments personalize a set of network access points (NAPs) acting as captive portals for each user and/or user device. A cloud service, or the user device, accesses context describing the user device. The context identifies at least one NAP, and may include accounting data. One of the NAP is selected for connection based on the context, and an instruction set associated with the selected NAP is provided for replay by the user device to connect through the NAP. In some embodiments, instructions within the instruction set are also personalized to the user and/or user device based on the context.
摘要:
Described is a technology by which a target device automatically starts tethering on a source device. A target device sends a request to start tethering to the source device, which responds by starting tethering, independent of needing any user interaction on the source device. While tethering is operational, status messages may be exchanged between the source device and the target device.
摘要:
A framework is provided for diagnosing and resolving wireless connectivity-related issues. For example, some embodiments of the invention provide a “health monitor” which monitors and logs wireless connectivity-related events occurring on the device, the network, and the one or more resources to which the device is connected. The health monitor may analyze these events and/or other information to determine when a connectivity problem may have arisen, and if a problem is determined to be imminent or to have occurred, may initiate recovery procedures. In some embodiments, the monitoring of events, analysis to determine whether a connectivity problem has arisen, and the recovery from the problem occur transparently to the user.
摘要:
Embodiments enable prioritization and selection of network access points (NAP) by a computing device using NAP attribute values. The computing device obtains the attribute values based on a location of the computing device and/or proximate NAPs detected by the computing device. The obtained attribute values are compared to a state of the computing device (e.g., sensor values), user preferences, or other criteria to select at least one of the NAPs for connection with the computing device. In some embodiments, a user of the computing device is presented with a list of Wi-Fi access points ranked according to relevance to the computing device and/or user.
摘要:
Described is a technology by which a target device automatically starts tethering on a source device. A target device sends a request to start tethering to the source device, which responds by starting tethering, independent of needing any user interaction on the source device. While tethering is operational, status messages may be exchanged between the source device and the target device.
摘要:
Embodiments enable prioritization and selection of network access points (NAP) by a computing device using NAP attribute values. The computing device obtains the attribute values based on a location of the computing device and/or proximate NAPs detected by the computing device. The obtained attribute values are compared to a state of the computing device (e.g., sensor values), user preferences, or other criteria to select at least one of the NAPs for connection with the computing device. In some embodiments, a user of the computing device is presented with a list of Wi-Fi access points ranked according to relevance to the computing device and/or user.
摘要:
Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.