throbber
(12) United States Patent
`Harris
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 8,312,286 B2
`Nov. 13, 2012
`
`US008312286B2
`
`(54) WIRELESS NETWORK HAVING MULTIPLE
`COMMUNICATION ALLOWANCES
`
`(75) Inventor: Scott C. Harris, Rancho Sante Fe, CA
`(US)
`
`.
`.
`(73) Ass1gnee: Harris Technology, LLC, Rancho Santa
`Fe, CA (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent 1s extended or adjusted under 35
`U-S-C- 154(1)) by Odays-
`
`-
`
`-
`
`(21) App1_ NO; 12/345,565
`
`.
`(22) Flledi
`
`Dec- 291 2008
`
`Prior Publication Data
`
`US 2009/0113208 A1
`
`Apr. 30, 2009
`
`(56)
`
`References Cited
`
`,
`
`,
`
`U.S. PATENT DOCUMENTS
`6,571,221 B1
`5/2003 Stewart et al.
`6,856,676 B1* 2/2005 Pirot et al. ............. .. 379/201.01
`7,046,684 B2 *
`5/2006 Matsuura .................... .. 370/401
`7,103,313 B2
`9/2006 Heinonen et al.
`7,155,437 B2 120006 Chang et a1‘
`7,173,922 B2
`2/2007 Beach
`7,173,923 B2
`2/2007 Beach
`3%
`i 1
`59b?“ e; all~ ~~~~~~~~~~~ "4535722203;
`7,315,823 B2
`M2008 Brondglp
`7,428,413 B2
`9/2008 Fink
`7,472,191 B2 12/2008 Stewart et al.
`7,486,628 B1
`2/2009 Brisebois et a1.
`7,493,084 B2
`2/2009 Meier et al.
`7,523,046 B2
`4/2009 Colalancia et al.
`7,633,909 B1
`12/2009 Jones et al.
`7,856,659 B2 12/2010 Keeler et al.
`Keeler et al.
`2002/0152402 A1* 10/2002 Tov et al. .................... .. 713/201
`2003/0182377 A1* 9/2003 Tabet et a1. ................. .. 709/205
`
`ire a e a . ........... ..
`
`.
`
`Related US. Application Data
`_
`_
`_
`_
`(63) Connnuanon 0f apphcatlon NO- 10/800,472, ?led On
`Mar. 15, 2004, noW Pat. No. 7,490,348.
`
`(60) Provisional application No. 60/454,694, ?led on Mar.
`17, 2003.
`
`OTHER PUBLICATIONS
`
`WiFi: An Emerging Information Society Infrastructure, Auray,
`Beauvallet, Charbit, Fernandez, STARIssue ReportN.40, Sep. 2003.
`
`* cited by examiner
`
`_
`Primary Examiner * Carl Colm
`Assistant Examiner * Gary Lavelle
`
`(51) Int- Cl-
`H04L 29/06
`(2006.01)
`(52) us. Cl. ...... .. 713/183; 713/153; 713/155; 713/156;
`726/2; 726/4; 726/14; 726/21; 726/27; 725/29;
`725/30
`
`_
`_
`_
`(58) Field of Classi?cation Search‘ ................ .. 713/153,
`713/155’ 156’ 183’ 726/2’ 4’
`2370’
`
`(57)
`ABSTRACT
`1 _
`1
`1
`1
`f _
`1
`k
`_
`M1111‘? e eve St}? @3155 new“ resourc‘igrallinng'Afer
`.W .0 is an au OnZe ey’ .e'g" an enFryP 1°“ ey or a ey
`mdlcatmg that they have pa1d for servlce, gets a ?rst, better
`level of access to the network resources. One Without the key
`is granted lesser access’ egg less total bandwidth’ less band_
`Width speed, no access to ?les or the like.
`
`See application ?le for complete search history.
`
`18 Claims, 1 Drawing Sheet
`
`[98
`
`130
`
`l
`
`l
`
`l
`
`l
`
`Wireless FULL FILE
`
`ACCESS
`
`l
`I
`
`.
`
`l ABCDEF |
`
`r99 5 :
`
`i
`:
`r110 i
`SERVER 5
`i L02 eh USE/12
`
`ONLY
`
`l
`
`l
`
`:
`PUBLIC
`:
`I I1 ---------- --1
`:
`[120 :
`
`l
`
`l
`
`l
`
`i : If i :
`
`
`:
`:
`I ___________ _ -I
`
`Wireless LIMITS
`
`—> Commercial Only
`—> Limited Quantity/ Request
`—>
`/Computer
`
`STARWOOD Ex 1001, page 1
`
`

`
`US. Patent
`
`Nov. 13, 2012
`
`US 8,312,286 B2
`
`Wireless
`FULL FILE
`ACCESS
`
`> USE/31
`
`Wireless
`‘
`PRINT & INTERNE' T
`ONLY
`
`R2
`
`Wireless
`' U SE B 3
`LIMITS
`—> Commercial Only
`—> Limited Quantity/ Request
`—>
`/ Computer
`
`I l I I I | I llrllllllllllll
`
`I I | I I 1 I I I | I I I l I I ll
`
`NIC3
`
`STARWOOD Ex 1001, page 2
`
`

`
`US 8,312,286 B2
`
`1
`WIRELESS NETWORK HAVING MULTIPLE
`COMMUNICATION ALLOWANCES
`
`This application claims priority to US. Provisional Ser.
`No. 60/454,694 ?led Mar. 14, 2003.
`
`FIELD OF INVENTION
`
`Wireless networks are well-known, and may be based, for
`example, on the 802.1 1 standard. Because the contents of the
`wireless network can be received by anyone with wireless
`access, security may be achieved through encryption of the
`stream. Anyone with an encryption code can tap into the
`network. Those without the encryption code, however, simply
`cannot decode the wireless stream. In addition, standard net
`work protocols may be used, so that not only the encryption
`code, but also a network login, is necessary.
`
`SUMMARY
`
`The present application describes a wireless network,
`de?ning a plurality of different classes of service, where the
`different classes of service include at least a ?rst class of
`service that includes a ?rst set of permissions for access to
`resources, and a second class of service which includes a
`second set of permissions of access to resources.
`
`20
`
`25
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`These and other aspects will now be described in detail
`with reference to the accompanying drawings, in which:
`FIG. 1 shows a basic diagram of the networks described
`herein.
`
`30
`
`DETAILED DESCRIPTION
`
`Wireless networks have been used for other things besides
`secure ?le transfer. For example, Internet Cafes, and “wire
`less hot spots” may include the capability of communication
`to a user’s personal laptop which is equipped with a wireless
`card. This may use a network key for the encryption of the
`word “public”, or a network key which is given to users who
`pay for the service or pay for a drink or food, or without any
`network key at all. Certain areas such as hotel rooms are often
`wireless enabled. However, the communication is typically or
`totally on, or totally off; that is either the user is allowed to
`receive wireless Internet, or the user is blocked from all
`communications.
`The present system teaches a network with multiple levels
`of capability, depending on the access credentials possessed
`by the user. FIG. 1 shows this being carried out using multiple
`network cards or NICs. However, the same effect can be
`obtained with a single NIC. Preferably the network cards are
`wireless, using one of the features of IEEE 802.11 wireless
`communication protocols.
`Different classes of users may be assigned. The ?rst class
`of users, shown as user 1, are allowed ?le access to ?les and
`information from the server. These users may be given the
`encryption key, here for the ?rst NIC 100 here shown as
`ABCDEF. These users may be allowed the highest level of
`access to resources. As conventional users who have the com
`plete set of credentials, they are allowed unlimited upload and
`download, and full ?le access (that is allowed to non-admin
`istrator users). In addition, these users may be allowed the
`maximum upload and download speeds which is given to
`network users, and to receive all different kinds of Internet
`and ?les from all sources.
`For example, the amount of access which is provided to
`these users may be assigned by the operating system which
`
`35
`
`40
`
`50
`
`55
`
`65
`
`2
`drives the NICS. For example, if Windows XP is used as the
`operating system, it may assign NIC 100 with unlimited ?le
`access.
`A second class of users shown as user 2 do not have the
`credentials, here the encryption key, for the network card 100,
`and hence use the encryption key “public” and thereby can
`only communicate with the network card No. 2 shown as 110.
`Alternatively, these same users may communicate using no
`encryption key at all. The network card 110 allows only some
`subset of the operations that are allowed by the network card
`1 00. For example, the user 2 may receive Internet only, and no
`?le access. They may be allowed to print. In addition, the
`upload and download speeds may be limited or severely lim
`ited; for example, the Internet may be limited to 1M download
`speeds and 100K of upload speed.
`This system as described above may be usable in an o?ice
`environment. For example, users who are actually members
`of the of?ce obtain ?le access, while visitors only receive
`print and Internet access.
`Another contemplated use is in pay-for-Internet use. The
`user 1 may pay a higher fee than the user 2. For example, user
`2 may pay only for limited Internet, while user 1 may pay for
`access to resources such as video over IP, and higher down
`load speeds from the Internet.
`In addition, a third class of users shown as user 3 may be
`de?ned. These users communicate only to NIC 120. Note that
`while this describes users 1, 2 and 3, any subset of these users
`may be used, for example a system may be con?gured which
`only communicates with user 1 and user 3. The NIC No. 3 is
`shown as having no encryption code whatsoever. User 3 is
`limited even further. User 3 may receive only commercial
`parts of the Internet. In the of?ce environment, this may limit
`the Internet to web pages describing the of?ce and/ or certain
`intranet sites. In a pay for internet environment, this may
`describe the “free” user, who may only receive certain con
`tent. User 3 may also receive a severely restricted bandwidth
`and/or only a limited quantity of information. For example,
`the user 3 may be assigned a token which allows them only to
`receive for example total of 1 megabytes of download and
`only to upload 100 Kilobytes of upload. This even further
`limits the user 3.
`As described above, the different users in their different
`classes have different levels of ?le access, and resource
`access, resource speed and resource amount.
`FIG. 1 shows this being carried out with three different
`network cards over the same airspace. Alternatively, the three
`different networks may be carried out as part of a single
`network card; shown as network card 130. For example, this
`may include three network resources which operate on the
`single card. Alternatively, the three different kinds of
`resources may be carried out in software, for example this
`may be carried out by three different network resource allow
`ances within the software that runs the network card or within
`the server 99.
`Other implementations are within the disclosed embodi
`ment
`
`The invention claimed is:
`1. A network transmitting system, comprising:
`a ?rst networking device, transmitting an unencrypted ?rst
`wireless network stream from a ?rst location, said ?rst
`wireless network stream requiring a ?rst key in order to
`access content in said ?rst wireless network stream, and
`said ?rst wireless network stream, when accessed using
`said ?rst key, providing a ?rst level of access to network
`resources;
`wherein said ?rst level of access to network resources
`provided by said ?rst wireless network stream does not
`include access to information on a server, and allows
`access to one or more speci?c webpages without said
`?rst key but does not allow access to a second subset of
`webpages without said ?rst key, and allows access to
`
`STARWOOD Ex 1001, page 3
`
`

`
`US 8,312,286 B2
`
`3
`additional Webpages including said second subset of
`Webpages With said ?rst key;
`a second networking device, transmitting an unencrypted
`second Wireless network stream from an area overlap
`ping in the same space as the ?rst netWorking device,
`said second Wireless netWork stream controlling access
`With a second key, and providing a second level of access
`to netWork resources in order to access said second
`Wireless netWork stream,
`Wherein said second level of access to netWork resources
`provided by said second Wireless netWork stream does
`not include access to the information on the server, and
`alloWs access to the internet including said second sub
`set of Webpages With said second key.
`2. A system as in claim 1, Wherein said ?rst netWorking
`device and said second netWorking device are tWo separate
`devices Which are physically in a same housing.
`3. A netWork transmitting system as in claim 1, Wherein
`said ?rst level of access provided by said ?rst Wireless net
`Work stream provides access to video over IP over said ?rst
`Wireless netWork stream, and said second level of access
`provided by said second Wireless netWork stream does not
`provide access to video over IP over said second Wireless
`netWork stream.
`4. A netWork transmitting system as in claim 1, Wherein
`said ?rst level of access to netWork resources provides a ?rst
`speed of netWork access, and said second level of access to
`netWork resources provides a second speed of netWork
`access, Wherein said second speed is loWer than said ?rst
`speed.
`5. A system as in claim 4, Wherein said second level of
`access has less bandWidth than said ?rst level of access.
`6. A system as in claim 1, Wherein said ?rst level of access
`provides access to a ?rst service over IP and said second level
`of access blocks access to said ?rst service over IP.
`7. A system as in claim 6, Wherein said second key is
`different than the ?rst key.
`8. A system as in claim 1, Wherein said ?rst is provided on
`payment for a service.
`9. A system as in claim 1, Wherein said second level of
`access limits access such that only speci?c Internet pages can
`be obtained.
`10. A system as in claim 1, Wherein said ?rst and second
`levels of access to netWork resources provide different levels
`of all of ?le access, resource access, resource speed, and
`resource amount.
`11. A system as in claim 1, further comprising a third
`netWorking device, transmitting, from an area overlapping in
`the same space as the ?rst netWorking device, Wherein said
`third netWorking device operates Without either of said ?rst
`key or said second key and provides a third level of access to
`resources Which includes access to information on the server.
`12. A netWork transmitting system, comprising:
`a ?rst netWorking device, transmitting a ?rst Wireless net
`Work stream from a ?rst location, said ?rst Wireless
`netWork stream sending and receiving encrypted infor
`mation in order to access said ?rst Wireless netWork
`stream, and said ?rst Wireless netWork stream providing
`a ?rst level of access to netWork resources using said
`encrypted information;
`Wherein said ?rst level of access to netWork resources
`includes access to information on a server,
`a second netWorking device, transmitting a second Wireless
`netWork stream from an area overlapping in the same
`space as the ?rst netWorking device, said second Wire
`less netWork stream,
`said second netWorking device controlling access With a
`key, Wherein said second level of access to netWork
`resources provided by said ?rst Wireless netWork stream
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`4
`does not include access to said information on said
`server, and alloWs access to one or more speci?c
`Webpages Without said key but does not alloW access to
`a second subset of Webpages Without said key, and
`alloWs access to additional Webpages including said sec
`ond subset of Webpages With said key,
`Wherein said second level of access to netWork resources
`provided by said second Wireless netWork stream does
`not include access to the information on the server; and
`a third netWorking device, transmitting a third Wireless
`netWork stream overlapping in the same space as the ?rst
`netWorking device, Wherein said third netWorking
`device operates Without said key and provides internet
`access Without said key.
`13. A system as in claim 12, Wherein said ?rst netWorking
`device and said second netWorking device are tWo separate
`devices Which are physically in a same housing.
`14. A system as in claim 12, Wherein said ?rst level of
`access provided by said ?rst Wireless netWork stream pro
`vides access to video over IP over said ?rst Wireless netWork
`stream via said encrypted information as a ?rst service, and
`said third Wireless netWork stream does not provide access to
`said ?rst service of video over IP.
`15. A netWork transmitting system, comprising:
`a ?rst netWorking device, transmitting a ?rst unencrypted
`Wireless netWork stream, said ?rst Wireless netWork
`stream requiring a ?rst key in order to access said ?rst
`Wireless netWork stream, and said ?rst Wireless netWork
`stream, When accessed using said ?rst key, providing a
`?rst level of access to netWork resources, and providing
`access to video over IP Which can be accessed using said
`?rst key;
`Wherein said ?rst level of access to netWork resources pro
`vided by said ?rst Wireless netWork stream does not include
`access to information on a server With said ?rst key, and
`alloWs access to one or more speci?c Webpages Without said
`?rst key but does not alloW access to a second subset of
`Webpages Without said ?rst key, and alloWs access to addi
`tional Webpages including said second subset of Webpages
`With said ?rst key;
`a second netWorking device, transmitting a second Wireless
`netWork stream that is a separate netWork from said ?rst
`Wireless netWork stream, said second Wireless system
`netWork stream controlling access Without said ?rst key,
`and providing a second level of access to netWork
`resources With a second key in order to access said
`second Wireless netWork stream, Where said second
`level of access to netWork resources does not alloW
`access to information on said server, and also said sec
`ond level of access to netWork resources does not alloW
`access to video over IP, and alloWs access to the internet
`including said second subset of Webpages With said sec
`ond key.
`16. A system as in claim 15, Wherein said ?rst netWorking
`device and said second netWorking device are tWo separate
`devices Which transmit over a same area.
`17. A system as in claim 15, Wherein said second Wireless
`netWork stream alloWs access of limited bandWidth.
`18. A system as in claim 15, further comprising a third
`netWorking device, transmitting a third Wireless netWork
`stream, Wherein said third netWorking device operates With
`out either of said ?rst key or said second key and provides a
`third level of access to resources Which provides access to
`information on said server.
`
`STARWOOD Ex 1001, page 4
`
`

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`CERTIFICATE OF CORRECTION
`
`PATENT NO.
`APPLICATION NO.
`DATED
`INVENTOR(S)
`
`: 8,312,286 B2
`: 12/345565
`: November 13, 2012
`: Scott C Harris
`
`Page 1 Ofl
`
`It is certified that error appears in the above-identi?ed patent and that said Letters Patent is hereby corrected as shown below:
`
`Claim 8, column 3 of the patent, line 36, after “?rst”, insert --key--.
`
`Claim 12, column 3 of the patent, line 62, after “said second wireless network stream”, insert --not
`being encrypted, and providing a second level of access to network resources in order to access said
`second wireless network stream--.
`
`Claim 12, column 3 of the patent, last line, change “?rst” to “second”.
`
`Signed and Sealed this
`Twenty-?fth Day of December, 2012
`
`David J. Kappos
`Director afthe United States Patent and Trademark O?ice
`
`STARWOOD Ex 1001, page 5

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket