(((Guglielmo))) ::: Wireless Internet Service Provider
Seamless authentication
pantented technology


Innovative suite evolution for the WiFi as a complementary system for mobile Internet access.

WiFi has always been a sort of anomaly within the networking scenario because it typically provides a key service utilizing a worldwide standard with no expensive license.

As a result, the WiFi hotspot network has grown with large-scale operators and small providers sharing the same market without any coordination, and this has led to a shortfall in roaming and interoperability.


In recent years, the huge market explosion of mobile devices and forecast exponential growth in mobile traffic has profoundly changed the scenario of applications and services which can be fully experienced in mobility, making WiFi hotspots a key part of the infrastructure.

Increasingly fewer analysts still believe 4G will be the definitive solution, while, simultaneously, WiFi has attracted significant attention from service providers who have started offloading mobile data from 3G/4G to WiFi.
In essence, this means that WiFi is going to play a crucial role in the new generation of services for mobile devices.

Unfortunately, existing hotspot networks are typically based on poor technical solutions that are quite far from offering a reliable option to improve network performance or meet the expectations and requirements of mobile operators in providing user services.

In an attempt to manage the issues involved in a fully seamless integration between WiFi and cellular networks, main standardization boards are currently working to define guidelines and protocols for WiFi network implementation. This process has proven to be somewhat confusing because the various organizations (IEEE, 3GPP, WBA and Hotspot 2.0) are all focusing on similar problems while pursuing different solutions. Furthermore, the lack of compliance for these standards on network elements (mobile terminals, access points, controllers, etc.) makes the transition to new standards extremely difficult, bringing the innovation process to a complete standstill.

In order to raise WiFi to a carrier grade level of services and integration, we have developed a unique authentication platform that works in perfect synergy with a new series of cloud-based access controllers.
This platform does not require the replacement of any network elements, nor does the device need to be rooted—it relies simply on an application for tablets/smartphones.

Our goal was to make the client "Always Best Connected" in a seamless way. A sophisticated algorithm governs the Context Based Cloud Network Selection as well as the authentication.
Authentication process can rely directly on the SIM, avoiding annoying registration procedures, or any other accounting system.

By using an innovative approach which collects data form the network, the algorithm creates a full picture of the "Context" in which the mobile device is actually operating, including such basic information as position and service availability, but also information related to what the device is currently doing and the surrounding environment. All information is real time evaluated and also projected into the near future in order to find the best network available as well as the optimum moment to handover. In addition, while the user is successfully driven to the best option, the network selection algorithm continuously sends the information from the network elements and mobile users, actually functioning as probes that make the system auto-learning and self-fixing.

This patented authentication process is possibly the most innovative development because it is able to dramatically improve handover performance and reliability. The most ground-breaking feature is the capability to perform a seamless authentication of the WiFi by using the active connection, typically the 3G/4G interface, opening a totally new scenario in terms of performance and reliability while overcoming the off-line gap of the device which works with only one active data connection at time.

Such in-depth control of the authentication process also makes it possible to bind the authentication of several different non SIM devices through the use of a single account in many cool and effective ways without any further registration.

Guglielmo :: BABELTEN
 
Guglielmo :: BABELTEN
 
Guglielmo :: BABELTEN
 
Guglielmo :: BABELTEN