`Harris
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 8,312,286 B2
`Nov. 13, 2012
`
`US008312286B2
`
`(54) WIRELESS NETWORK HAVING MULTIPLE
`COMMUNICATION ALLOWANCES
`
`(75) Inventor: Scott C. Harris, Rancho Sante Fe, CA
`(US)
`
`.
`.
`(73) Ass1gnee: Harris Technology, LLC, Rancho Santa
`Fe, CA (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent 1s extended or adjusted under 35
`U-S-C- 154(1)) by Odays-
`
`-
`
`-
`
`(21) App1_ NO; 12/345,565
`
`.
`(22) Flledi
`
`Dec- 291 2008
`
`Prior Publication Data
`
`US 2009/0113208 A1
`
`Apr. 30, 2009
`
`(56)
`
`References Cited
`
`,
`
`,
`
`U.S. PATENT DOCUMENTS
`6,571,221 B1
`5/2003 Stewart et al.
`6,856,676 B1* 2/2005 Pirot et al. ............. .. 379/201.01
`7,046,684 B2 *
`5/2006 Matsuura .................... .. 370/401
`7,103,313 B2
`9/2006 Heinonen et al.
`7,155,437 B2 120006 Chang et a1‘
`7,173,922 B2
`2/2007 Beach
`7,173,923 B2
`2/2007 Beach
`3%
`i 1
`59b?“ e; all~ ~~~~~~~~~~~ "4535722203;
`7,315,823 B2
`M2008 Brondglp
`7,428,413 B2
`9/2008 Fink
`7,472,191 B2 12/2008 Stewart et al.
`7,486,628 B1
`2/2009 Brisebois et a1.
`7,493,084 B2
`2/2009 Meier et al.
`7,523,046 B2
`4/2009 Colalancia et al.
`7,633,909 B1
`12/2009 Jones et al.
`7,856,659 B2 12/2010 Keeler et al.
`Keeler et al.
`2002/0152402 A1* 10/2002 Tov et al. .................... .. 713/201
`2003/0182377 A1* 9/2003 Tabet et a1. ................. .. 709/205
`
`ire a e a . ........... ..
`
`.
`
`Related US. Application Data
`_
`_
`_
`_
`(63) Connnuanon 0f apphcatlon NO- 10/800,472, ?led On
`Mar. 15, 2004, noW Pat. No. 7,490,348.
`
`(60) Provisional application No. 60/454,694, ?led on Mar.
`17, 2003.
`
`OTHER PUBLICATIONS
`
`WiFi: An Emerging Information Society Infrastructure, Auray,
`Beauvallet, Charbit, Fernandez, STARIssue ReportN.40, Sep. 2003.
`
`* cited by examiner
`
`_
`Primary Examiner * Carl Colm
`Assistant Examiner * Gary Lavelle
`
`(51) Int- Cl-
`H04L 29/06
`(2006.01)
`(52) us. Cl. ...... .. 713/183; 713/153; 713/155; 713/156;
`726/2; 726/4; 726/14; 726/21; 726/27; 725/29;
`725/30
`
`_
`_
`_
`(58) Field of Classi?cation Search‘ ................ .. 713/153,
`713/155’ 156’ 183’ 726/2’ 4’
`2370’
`
`(57)
`ABSTRACT
`1 _
`1
`1
`1
`f _
`1
`k
`_
`M1111‘? e eve St}? @3155 new“ resourc‘igrallinng'Afer
`.W .0 is an au OnZe ey’ .e'g" an enFryP 1°“ ey or a ey
`mdlcatmg that they have pa1d for servlce, gets a ?rst, better
`level of access to the network resources. One Without the key
`is granted lesser access’ egg less total bandwidth’ less band_
`Width speed, no access to ?les or the like.
`
`See application ?le for complete search history.
`
`18 Claims, 1 Drawing Sheet
`
`[98
`
`130
`
`l
`
`l
`
`l
`
`l
`
`Wireless FULL FILE
`
`ACCESS
`
`l
`I
`
`.
`
`l ABCDEF |
`
`r99 5 :
`
`i
`:
`r110 i
`SERVER 5
`i L02 eh USE/12
`
`ONLY
`
`l
`
`l
`
`:
`PUBLIC
`:
`I I1 ---------- --1
`:
`[120 :
`
`l
`
`l
`
`l
`
`i : If i :
`
`
`:
`:
`I ___________ _ -I
`
`Wireless LIMITS
`
`—> Commercial Only
`—> Limited Quantity/ Request
`—>
`/Computer
`
`STARWOOD Ex 1001, page 1
`
`
`
`US. Patent
`
`Nov. 13, 2012
`
`US 8,312,286 B2
`
`Wireless
`FULL FILE
`ACCESS
`
`> USE/31
`
`Wireless
`‘
`PRINT & INTERNE' T
`ONLY
`
`R2
`
`Wireless
`' U SE B 3
`LIMITS
`—> Commercial Only
`—> Limited Quantity/ Request
`—>
`/ Computer
`
`I l I I I | I llrllllllllllll
`
`I I | I I 1 I I I | I I I l I I ll
`
`NIC3
`
`STARWOOD Ex 1001, page 2
`
`
`
`US 8,312,286 B2
`
`1
`WIRELESS NETWORK HAVING MULTIPLE
`COMMUNICATION ALLOWANCES
`
`This application claims priority to US. Provisional Ser.
`No. 60/454,694 ?led Mar. 14, 2003.
`
`FIELD OF INVENTION
`
`Wireless networks are well-known, and may be based, for
`example, on the 802.1 1 standard. Because the contents of the
`wireless network can be received by anyone with wireless
`access, security may be achieved through encryption of the
`stream. Anyone with an encryption code can tap into the
`network. Those without the encryption code, however, simply
`cannot decode the wireless stream. In addition, standard net
`work protocols may be used, so that not only the encryption
`code, but also a network login, is necessary.
`
`SUMMARY
`
`The present application describes a wireless network,
`de?ning a plurality of different classes of service, where the
`different classes of service include at least a ?rst class of
`service that includes a ?rst set of permissions for access to
`resources, and a second class of service which includes a
`second set of permissions of access to resources.
`
`20
`
`25
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`These and other aspects will now be described in detail
`with reference to the accompanying drawings, in which:
`FIG. 1 shows a basic diagram of the networks described
`herein.
`
`30
`
`DETAILED DESCRIPTION
`
`Wireless networks have been used for other things besides
`secure ?le transfer. For example, Internet Cafes, and “wire
`less hot spots” may include the capability of communication
`to a user’s personal laptop which is equipped with a wireless
`card. This may use a network key for the encryption of the
`word “public”, or a network key which is given to users who
`pay for the service or pay for a drink or food, or without any
`network key at all. Certain areas such as hotel rooms are often
`wireless enabled. However, the communication is typically or
`totally on, or totally off; that is either the user is allowed to
`receive wireless Internet, or the user is blocked from all
`communications.
`The present system teaches a network with multiple levels
`of capability, depending on the access credentials possessed
`by the user. FIG. 1 shows this being carried out using multiple
`network cards or NICs. However, the same effect can be
`obtained with a single NIC. Preferably the network cards are
`wireless, using one of the features of IEEE 802.11 wireless
`communication protocols.
`Different classes of users may be assigned. The ?rst class
`of users, shown as user 1, are allowed ?le access to ?les and
`information from the server. These users may be given the
`encryption key, here for the ?rst NIC 100 here shown as
`ABCDEF. These users may be allowed the highest level of
`access to resources. As conventional users who have the com
`plete set of credentials, they are allowed unlimited upload and
`download, and full ?le access (that is allowed to non-admin
`istrator users). In addition, these users may be allowed the
`maximum upload and download speeds which is given to
`network users, and to receive all different kinds of Internet
`and ?les from all sources.
`For example, the amount of access which is provided to
`these users may be assigned by the operating system which
`
`35
`
`40
`
`50
`
`55
`
`65
`
`2
`drives the NICS. For example, if Windows XP is used as the
`operating system, it may assign NIC 100 with unlimited ?le
`access.
`A second class of users shown as user 2 do not have the
`credentials, here the encryption key, for the network card 100,
`and hence use the encryption key “public” and thereby can
`only communicate with the network card No. 2 shown as 110.
`Alternatively, these same users may communicate using no
`encryption key at all. The network card 110 allows only some
`subset of the operations that are allowed by the network card
`1 00. For example, the user 2 may receive Internet only, and no
`?le access. They may be allowed to print. In addition, the
`upload and download speeds may be limited or severely lim
`ited; for example, the Internet may be limited to 1M download
`speeds and 100K of upload speed.
`This system as described above may be usable in an o?ice
`environment. For example, users who are actually members
`of the of?ce obtain ?le access, while visitors only receive
`print and Internet access.
`Another contemplated use is in pay-for-Internet use. The
`user 1 may pay a higher fee than the user 2. For example, user
`2 may pay only for limited Internet, while user 1 may pay for
`access to resources such as video over IP, and higher down
`load speeds from the Internet.
`In addition, a third class of users shown as user 3 may be
`de?ned. These users communicate only to NIC 120. Note that
`while this describes users 1, 2 and 3, any subset of these users
`may be used, for example a system may be con?gured which
`only communicates with user 1 and user 3. The NIC No. 3 is
`shown as having no encryption code whatsoever. User 3 is
`limited even further. User 3 may receive only commercial
`parts of the Internet. In the of?ce environment, this may limit
`the Internet to web pages describing the of?ce and/ or certain
`intranet sites. In a pay for internet environment, this may
`describe the “free” user, who may only receive certain con
`tent. User 3 may also receive a severely restricted bandwidth
`and/or only a limited quantity of information. For example,
`the user 3 may be assigned a token which allows them only to
`receive for example total of 1 megabytes of download and
`only to upload 100 Kilobytes of upload. This even further
`limits the user 3.
`As described above, the different users in their different
`classes have different levels of ?le access, and resource
`access, resource speed and resource amount.
`FIG. 1 shows this being carried out with three different
`network cards over the same airspace. Alternatively, the three
`different networks may be carried out as part of a single
`network card; shown as network card 130. For example, this
`may include three network resources which operate on the
`single card. Alternatively, the three different kinds of
`resources may be carried out in software, for example this
`may be carried out by three different network resource allow
`ances within the software that runs the network card or within
`the server 99.
`Other implementations are within the disclosed embodi
`ment
`
`The invention claimed is:
`1. A network transmitting system, comprising:
`a ?rst networking device, transmitting an unencrypted ?rst
`wireless network stream from a ?rst location, said ?rst
`wireless network stream requiring a ?rst key in order to
`access content in said ?rst wireless network stream, and
`said ?rst wireless network stream, when accessed using
`said ?rst key, providing a ?rst level of access to network
`resources;
`wherein said ?rst level of access to network resources
`provided by said ?rst wireless network stream does not
`include access to information on a server, and allows
`access to one or more speci?c webpages without said
`?rst key but does not allow access to a second subset of
`webpages without said ?rst key, and allows access to
`
`STARWOOD Ex 1001, page 3
`
`
`
`US 8,312,286 B2
`
`3
`additional Webpages including said second subset of
`Webpages With said ?rst key;
`a second networking device, transmitting an unencrypted
`second Wireless network stream from an area overlap
`ping in the same space as the ?rst netWorking device,
`said second Wireless netWork stream controlling access
`With a second key, and providing a second level of access
`to netWork resources in order to access said second
`Wireless netWork stream,
`Wherein said second level of access to netWork resources
`provided by said second Wireless netWork stream does
`not include access to the information on the server, and
`alloWs access to the internet including said second sub
`set of Webpages With said second key.
`2. A system as in claim 1, Wherein said ?rst netWorking
`device and said second netWorking device are tWo separate
`devices Which are physically in a same housing.
`3. A netWork transmitting system as in claim 1, Wherein
`said ?rst level of access provided by said ?rst Wireless net
`Work stream provides access to video over IP over said ?rst
`Wireless netWork stream, and said second level of access
`provided by said second Wireless netWork stream does not
`provide access to video over IP over said second Wireless
`netWork stream.
`4. A netWork transmitting system as in claim 1, Wherein
`said ?rst level of access to netWork resources provides a ?rst
`speed of netWork access, and said second level of access to
`netWork resources provides a second speed of netWork
`access, Wherein said second speed is loWer than said ?rst
`speed.
`5. A system as in claim 4, Wherein said second level of
`access has less bandWidth than said ?rst level of access.
`6. A system as in claim 1, Wherein said ?rst level of access
`provides access to a ?rst service over IP and said second level
`of access blocks access to said ?rst service over IP.
`7. A system as in claim 6, Wherein said second key is
`different than the ?rst key.
`8. A system as in claim 1, Wherein said ?rst is provided on
`payment for a service.
`9. A system as in claim 1, Wherein said second level of
`access limits access such that only speci?c Internet pages can
`be obtained.
`10. A system as in claim 1, Wherein said ?rst and second
`levels of access to netWork resources provide different levels
`of all of ?le access, resource access, resource speed, and
`resource amount.
`11. A system as in claim 1, further comprising a third
`netWorking device, transmitting, from an area overlapping in
`the same space as the ?rst netWorking device, Wherein said
`third netWorking device operates Without either of said ?rst
`key or said second key and provides a third level of access to
`resources Which includes access to information on the server.
`12. A netWork transmitting system, comprising:
`a ?rst netWorking device, transmitting a ?rst Wireless net
`Work stream from a ?rst location, said ?rst Wireless
`netWork stream sending and receiving encrypted infor
`mation in order to access said ?rst Wireless netWork
`stream, and said ?rst Wireless netWork stream providing
`a ?rst level of access to netWork resources using said
`encrypted information;
`Wherein said ?rst level of access to netWork resources
`includes access to information on a server,
`a second netWorking device, transmitting a second Wireless
`netWork stream from an area overlapping in the same
`space as the ?rst netWorking device, said second Wire
`less netWork stream,
`said second netWorking device controlling access With a
`key, Wherein said second level of access to netWork
`resources provided by said ?rst Wireless netWork stream
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`4
`does not include access to said information on said
`server, and alloWs access to one or more speci?c
`Webpages Without said key but does not alloW access to
`a second subset of Webpages Without said key, and
`alloWs access to additional Webpages including said sec
`ond subset of Webpages With said key,
`Wherein said second level of access to netWork resources
`provided by said second Wireless netWork stream does
`not include access to the information on the server; and
`a third netWorking device, transmitting a third Wireless
`netWork stream overlapping in the same space as the ?rst
`netWorking device, Wherein said third netWorking
`device operates Without said key and provides internet
`access Without said key.
`13. A system as in claim 12, Wherein said ?rst netWorking
`device and said second netWorking device are tWo separate
`devices Which are physically in a same housing.
`14. A system as in claim 12, Wherein said ?rst level of
`access provided by said ?rst Wireless netWork stream pro
`vides access to video over IP over said ?rst Wireless netWork
`stream via said encrypted information as a ?rst service, and
`said third Wireless netWork stream does not provide access to
`said ?rst service of video over IP.
`15. A netWork transmitting system, comprising:
`a ?rst netWorking device, transmitting a ?rst unencrypted
`Wireless netWork stream, said ?rst Wireless netWork
`stream requiring a ?rst key in order to access said ?rst
`Wireless netWork stream, and said ?rst Wireless netWork
`stream, When accessed using said ?rst key, providing a
`?rst level of access to netWork resources, and providing
`access to video over IP Which can be accessed using said
`?rst key;
`Wherein said ?rst level of access to netWork resources pro
`vided by said ?rst Wireless netWork stream does not include
`access to information on a server With said ?rst key, and
`alloWs access to one or more speci?c Webpages Without said
`?rst key but does not alloW access to a second subset of
`Webpages Without said ?rst key, and alloWs access to addi
`tional Webpages including said second subset of Webpages
`With said ?rst key;
`a second netWorking device, transmitting a second Wireless
`netWork stream that is a separate netWork from said ?rst
`Wireless netWork stream, said second Wireless system
`netWork stream controlling access Without said ?rst key,
`and providing a second level of access to netWork
`resources With a second key in order to access said
`second Wireless netWork stream, Where said second
`level of access to netWork resources does not alloW
`access to information on said server, and also said sec
`ond level of access to netWork resources does not alloW
`access to video over IP, and alloWs access to the internet
`including said second subset of Webpages With said sec
`ond key.
`16. A system as in claim 15, Wherein said ?rst netWorking
`device and said second netWorking device are tWo separate
`devices Which transmit over a same area.
`17. A system as in claim 15, Wherein said second Wireless
`netWork stream alloWs access of limited bandWidth.
`18. A system as in claim 15, further comprising a third
`netWorking device, transmitting a third Wireless netWork
`stream, Wherein said third netWorking device operates With
`out either of said ?rst key or said second key and provides a
`third level of access to resources Which provides access to
`information on said server.
`
`STARWOOD Ex 1001, page 4
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`CERTIFICATE OF CORRECTION
`
`PATENT NO.
`APPLICATION NO.
`DATED
`INVENTOR(S)
`
`: 8,312,286 B2
`: 12/345565
`: November 13, 2012
`: Scott C Harris
`
`Page 1 Ofl
`
`It is certified that error appears in the above-identi?ed patent and that said Letters Patent is hereby corrected as shown below:
`
`Claim 8, column 3 of the patent, line 36, after “?rst”, insert --key--.
`
`Claim 12, column 3 of the patent, line 62, after “said second wireless network stream”, insert --not
`being encrypted, and providing a second level of access to network resources in order to access said
`second wireless network stream--.
`
`Claim 12, column 3 of the patent, last line, change “?rst” to “second”.
`
`Signed and Sealed this
`Twenty-?fth Day of December, 2012
`
`David J. Kappos
`Director afthe United States Patent and Trademark O?ice
`
`STARWOOD Ex 1001, page 5