throbber
(12)
`
`United States Patent
`Liu et a].
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 7,177,637 B2
`Feb. 13, 2007
`
`US007177637B2
`
`(54) CONNECTIVITY TO PUBLIC DOMAIN
`SERVICES OF WIRELESS LOCAL AREA
`NETWORKS
`
`.
`
`75
`(
`)
`
`_
`Inventors‘
`
`.
`
`-
`_
`sDg?glg’iec‘oA‘ (53mg)
`g ’
`’
`(73) Assigneez Intel Corporation’ Santa Clara’ CA
`(Us)
`
`_
`
`( * ) Not1ce:
`
`_
`
`_
`
`_
`
`_
`
`Subject‘ to any d1scla1mer, the term of this
`patent 1s extended or adjusted under 35
`U.S.C. 154(1)) by 253 days.
`
`_
`(21) Appl' NO" 10/090’136
`(22) Filed
`Mar 1 2002
`'
`'
`’
`
`8/2000 Subhankar ................ .. 455/462
`6,112,097 A *
`7/2001 Stewart et a1.
`342/457
`6,259,405 B1 *
`6,301,475 B1 * 10/2001 Saarela et a1. ...... ..
`370/350
`6,477,156 B1* 11/2002 Ala-Laurila et al. ...... .. 370/331
`
`709/227
`6,732,176 B1* 5/2004 Stewart et a1. ...... ..
`455/433
`6,829,480 B1 * 12/2004 Hoglund et a1. .... ..
`455/439
`2002/0022483 A1* 2/2002 Thompson et al.
`*
`2002/0075844 A1
`6/2002 Hagen ...................... .. 370/351
`FOREIGN PATENT DOCUMENTS
`
`DK
`
`EP0641137 A2 * 8/1994
`
`EP0505106 A2 * 3/l992
`GB
`_
`* _
`“ted by examlner
`Primary ExamineriFan Tsang
`Assistant ExamineriLisa Hashem
`(74) Attorney, Agent, or FirmiBlakely, SokoloiT, Taylor &
`Zafman LLP
`
`(65)
`
`Prior Publication Data
`
`(57)
`
`ABSTRACT
`
`US 2004/0192264 A1
`
`Sep. 30, 2004
`
`(51) Int_ CL
`(200601)
`H04Q 7/20
`(200601)
`H04M 1/66
`(52) us. Cl. ................ .. 455/426.1- 455/412 455/411-
`4’55/435_2.;‘55/456~5’
`(58) Field of Classi?cation Search
`’ 342/457
`3
`338’
`
`-
`’
`-
`-
`S
`ee apphcanon ?le for Complete Search hlstory
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`_
`_
`_
`A method and/or apparatus to permlt non-authorized w1re
`less mobile devices access to public domain services of a
`local area network. One embodiment of the invention pro
`vides a wireless access point device, with a wireless port and
`a Wired network P0“, With a‘ least ‘W0 modes of Operation
`to permit authorized mobile devices access to network
`services and non-authorized mobile devices access to a
`particular set of network services. A list of free and/or
`pay-per-use network services is provided to non-authorized
`mob1le dev1ces to select the desired service(s). For pay-per
`use services, a mobile device user can provide a form of
`payment for validation.
`
`5,818,824 A * 10/1998 Lu et a1. ................... .. 370/328
`
`34 Claims, 5 Drawing Sheets
`
`AP powers on and enters Public Mode
`
`
`
`0 1 2
`
`User edlvitea WLAN or lnternet servloe
`
`MU listens to (or sends a request in solicit) broadcaeted
`
`mation [mm AP i
`
`104
`
`AP broadcasts the general information about Its WLAN
`Indicating the public made and providing a "81 O‘ the aimilahle
`WLAN service Information
`
`106
`
`MU and AF‘ 5hr! Autlwnticatlon/Asaodatlon handshakes
`
`If it ls free service
`
`MU displays WLAN service info & wait tor user selection
`
`106
`
`110
`
`)1 payment required
`
`‘- an ' I
`
`rta secure proceure r passing paymen
`inionn ti
`
`112
`
`MU displays payment optiuna 8t waits for user eeiecllon
`
`MU sends Credit card number to AP ina secure way
`
`passes the relSiBd payment information lb network ‘or
`veli at'on
`
`114
`
`116
`
`118
`
`AP sends validation mult to MU when validation completed
`
`If validation falls
`
`If velldetlun successful
`
`MU and AP Complete authentication/association handshakes
`
`12
`
`Numaal operations and data exchanges
`MU sets lirnerfor pre-pay payment
`
`124
`
`If pre-pay timer expired
`
`AF‘ sends dlDOnnac! "01.105 110 MU
`
`126
`
`Exit WLAN SQI'ViOG
`
`STARWOOD Ex 1003, page 1
`
`

`
`U.S. Patent
`
`Feb. 13, 2007
`
`Sheet 1 0f 5
`
`US 7,177,637 B2
`
`C
`
`AP powers on and enters Public Mode
`
`) 102
`
`User activates WLAN or internet service
`
`if
`MU listens to (or sends a request to solicit) broadcasted
`information from AP
`
`AP broadcasts the general information about its WLAN
`'ndicating the public mode and providing a list of the availabl
`l
`e
`WLAN service information
`
`10 4
`
`106
`
`if
`C MU and AP start Authentication/Association handshakes
`
`108
`
`V
`if it is free service
`‘———( MU displays WLAN sen/ice info & waits for user selection ) 1 10
`
`if payment required
`
`if
`AP and MU start a secure procedure for passing payment
`information
`
`1 12
`
`V
`( MU displays payment options & waits for user selection J 11 4
`l
`( MU sends Credit card number to AP ina secure way
`
`1 16
`
`AP
`[ passes the related payment information to network for j 1 18
`validation
`
`if
`if
`lid
`'
`f 'l
`C AP sends validation result to MU when validation comple@—Htlon 3‘ S
`120
`
`r If validation successful
`ll
`CMU and AP complete authentication/association handshakes) 122
`
`Normal operations and data exchanges
`MU sets timer for pre-pay payment
`
`124
`
`C
`
`V
`AP sends diconnect notice to MU
`
`126
`
`If pre-pay timer expired
`
`V
`Exit WLAN service
`
`D
`
`FIG. 1
`
`STARWOOD Ex 1003, page 2
`
`

`
`U.S. Patent
`
`Feb. 13, 2007
`
`Sheet 2 0f 5
`
`US 7,177,637 B2
`
`WLAN Service Information
`
`0 Internet Explorer
`
`0 Departure/Arrival Information
`
`0 Airport Services
`
`0 Ground Transportation
`
`0
`
`(new)
`
`(frog)
`
`(free)
`
`(fregl
`
`FIG. 2
`
`STARWOOD Ex 1003, page 3
`
`

`
`U.S. Patent
`
`Feb. 13, 2007
`
`Sheet 3 0f 5
`
`US 7,177,637 B2
`
`/
`
`\
`\
`
`Public Service
`Network
`(World Wide Web)
`
`\\
`/>
`//
`
`Private Service
`Network
`(Corporate network)
`
`<11 Public Service Network ‘p
`(Small Wireless LAN)
`
`302
`
`AP1
`(Private Mode)
`
`AP2
`(Public Mode)
`
`304
`
`MU1
`Authorized device
`
`306
`
`Y
`
`308
`
`MU2
`Non-authorized
`Non-pre-registered
`device
`
`FIG. 3
`
`STARWOOD Ex 1003, page 4
`
`

`
`U.S. Patent
`
`Feb. 13, 2007
`
`Sheet 4 0f 5
`
`US 7,177,637 B2
`
`/ — ~ _ — '— — —\
`
`/
`/
`/
`/
`/
`/
`\
`\
`\
`\
`\
`
`\
`\
`\
`\
`\
`\
`/
`/
`/
`/
`/
`
`.
`.
`Public Service
`Network
`(World Wide Web)
`
`_______L_//
`
`Private Service
`Network
`(Corporate network)
`
`___________________________ __
`
`Public Service Networig‘v
`(Small Wireless LAN)
`
`AP
`Public Mode
`and
`Private Mode
`
`402
`
`____________________________ _/
`
`406
`
`MU1
`Authorized device
`
`408
`
`MUZ
`Non-authorized
`non-pre-registered
`device
`
`FIG. 4.
`
`STARWOOD Ex 1003, page 5
`
`

`
`U.S. Patent
`
`Feb. 13, 2007
`
`Sheet 5 0f 5
`
`US 7,177,637 B2
`
`I
`I
`I
`I
`I
`I
`I
`I
`l
`l
`I
`l
`I
`I
`I
`I
`I
`I
`l
`II
`I
`l
`l
`I
`I
`I
`I
`I
`l
`I
`I
`I
`I
`I
`I
`I
`I
`l
`I
`I
`
`To Network
`
`Network
`Communication
`Port
`
`506
`
`504
`
`Control UnIt
`
`Transceiver
`Port
`
`To Mobile Devices
`
`FIG. 5.
`
`STARWOOD Ex 1003, page 6
`
`

`
`US 7,177,637 B2
`
`1
`CONNECTIVITY TO PUBLIC DOMAIN
`SERVICES OF WIRELESS LOCAL AREA
`NETWORKS
`
`FIELD
`
`The invention relates to wireless local area networks. In
`particular, one embodiment of the invention relates to a
`method, machine-readable medium, and apparatus for pro
`viding simple access to public computer network services to
`non-authorized wireless local area network users.
`
`BACKGROUND
`
`2
`access to the WLAN. Recent extensions of the IEEE 802.11
`supports more enhanced authentication methods to improve
`security. Open System authentication is a default, null
`authentication procedure or algorithm. This procedure
`involves identity assertion, request for authentication, and an
`authentication result. Typically, an MU is already a network
`member, provides a password, and/or is pre-registered, in
`order to obtain access to the WLAN and its services via the
`authentication interface. Other authentication algorithms
`typically require MUs to know a secret key. The secret key
`may be delivered to an MU over a secure channel that may
`be protocol independent of the IEEE 802.11 standard (e.g.,
`the IEEE 802.1>< standard for instance).
`Association is the mechanism through which an IEEE
`802.11 compliant WLAN provides transparent mobility to
`stations or APs. Once a station successfully completes
`authentication/association handshakes with an AP, it may
`begin exchanging data frames with the AP and accessing
`network services.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 illustrates one method of implementing public
`mode access according to one embodiment of the invention.
`FIG. 2 illustrates an exemplary menu of various pay and
`free public domain services that may be provided to a mobile
`unit.
`FIG. 3 illustrates one embodiment of the invention that
`provides multiple access modes through multiple access
`points to permit both authorized and non-authorized mobile
`units to access network services.
`FIG. 4 illustrates another embodiment of the invention
`that provides multiple access modes through a single access
`point to permit both authorized and non-authorized mobile
`units to access network services.
`FIG. 5 illustrates a block diagram of one embodiment of
`an access point device according to one aspect of the
`invention.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`In the following detailed description of the invention,
`numerous speci?c details are set forth in order to provide a
`thorough understanding of the invention. However, the
`invention may be practiced without these speci?c details. In
`other instances well known methods, procedures, and/or
`components have not been described in detail so as not to
`unnecessarily obscure aspects of the invention.
`Throughout this description, the term ‘mobile unit’ (MU)
`generally refers to any device with a wireless communica
`tion interface that may be used to access a WLAN. Addi
`tionally, the term ‘authorization’ generally refers to any
`pre-subscription or authentication scheme whereby a prior
`registration, password, and/or relationship is established to
`permit an MU to gain access to a network. Conversely, the
`term ‘non-authorized’ generally refers to MU or users that
`have no prior registration, agreement, and/or authority to
`access a network. The term ‘public domain’ generally refers
`to both free and/or pay-per-use network services that made
`available to non-authorized MUs and/or users. The term
`‘network services’ generally refers to access to various data,
`information, applications, and/or communication interfaces
`provided by a network. In the context in which it is
`employed herein, network services may refer to services
`provided by a wireless and/or wired network.
`
`20
`
`25
`
`30
`
`35
`
`40
`
`Wireless local area networks (WLAN) have developed to
`provide communication capabilities to various types of
`mobile devices. Such communication capabilities enable
`mobile devices to communicate with other devices in the
`network and beyond.
`A typical WLAN has an interface point or access point
`(AP) to enable communications to, from, and/or between
`wireless devices within its network. An AP is the point of
`entry for wireless devices or mobile units (MU) into a
`network infrastructure. Additionally, an AP may itself be
`communicatively coupled to other network(s) including a
`wired network. Thus, an AP may manage communications
`between itself and other devices within its wireless network,
`communications between devices within its wireless net
`work, and act as a bridge or gateway for communications
`between devices within its network and devices outside of
`its networks (e.g., devices on a wired network).
`One type of WLAN has been speci?ed in the Institute of
`Electrical and Electronics Engineers (IEEE) Standard
`802.11-1997 and subsequent revisions. In an IEEE 802.11
`compliant wireless network, various services are provided to
`establish and manage communications between an AP and
`MUs. Generally, an MU is registered, pre-subscribed, or
`otherwise authorized to access and/or communicate over the
`WLAN through the AP. For example, a WLAN may be
`deployed within a corporation. The corporation wishes to
`protect its computers and data that can be accessed over the
`network. Thus, an AP may limit access to the network to
`only pre-authorized MUs. A ?rst mobile unit, being a
`pre-authorized device, would be allowed to communicate
`over the network. Meanwhile, a second mobile unit would
`be denied access to the network since it is not a pre
`authorized device.
`A typical network access protocol for an IEEE 802.11
`compliant WLAN is herein described. Upon start-up or
`initialization, an MU with an IEEE 802.11 compliant inter
`face attempts to ?nd an existing WLAN infrastructure. The
`MU may listen to the information broadcasted by a WLAN
`station or AP. This information would allow the MU to
`locate AP, and then possibly to join its network. The MU
`may also start by sending out a message to solicit such
`55
`information from a WLAN station or AP. The MU may then
`listen for a response from AP. The AP receiving such a
`request responds by sending a message with information that
`will allow the MU to locate the WLAN infrastructure. Once
`the MU has found an infrastructure, it may choose to join the
`WLAN by synchronizing its parameters.
`If the MU decides to join a WLAN, it then proceeds by
`authentication/association handshakes. The authentication
`process is a mechanism for the MU to prove its identity. The
`IEEE 802.11 1997 WLAN speci?cation supports two
`authentication services, Open System and Shared Key.
`These services function as low-level interfaces to negotiate
`
`45
`
`50
`
`60
`
`65
`
`STARWOOD Ex 1003, page 7
`
`

`
`US 7,177,637 B2
`
`20
`
`25
`
`3
`One aspect of the invention provides a novel scheme that
`permits non-authorized MUs to access public or limited
`regions of a network. In one implementation, this enables an
`IEEE 802.11 compliant WLAN to provide access to services
`of its own network (eg a wireless network) and/or of other
`networks (eg a wired network) to non-authorized wireless
`devices.
`Generally, conventional WLANs implementations restrict
`access to network services (eg wireless network services
`and/or wired network services) to authorized users or MUs.
`This may be accomplished in a number of ways. In one
`implementation access to the WLAN is restricted to autho
`rized MUs only by requiring secret key access during
`authentication. In other implementations, a higher-level
`access restriction scheme may be employed. This higher
`level access restriction scheme may necessitate that the MU
`continuously provide some security identi?cation, authenti
`cation password or key, or that the MU be known (or
`pre-registered) to the AP network beforehand.
`One aspect of the invention provides multiple access
`modes through an AP to permit both authorized and non
`authorized MUs to access network services. According to
`one implementation, an AP has two modes of operation,
`private mode and public mode.
`In private mode, the AP and MU ?rst implement Secure
`Service, as speci?ed in the IEEE 802.11 (or its supplements)
`speci?cation, including authentication and encryption to
`ensure secure communications over the WLAN. Then, the
`AP provides full network access/ functionality to the MU
`consistent with the IEEE 802.11 Standard WLAN speci?
`30
`cation.
`In public mode, an AP provides non-authorized MUs
`access to public network services. Establishing a connection
`between an MU and AP in public mode differs from how a
`connection is established in private mode.
`Generally, connection establishment between an AP and
`MU refers to completing authentication and association
`handshakes regardless of their order. For instance, in one
`embodiment authentication may be performed prior to asso
`ciation, while in another embodiment authentication may be
`performed after association.
`An AP operating in public mode may provide non
`authorized MUs access to network services by ?rst initiating
`a simple registration process.
`According to one aspect of the invention, the Open
`System and/or other authentication procedures are supple
`mented to provide non-authorized MUs free and/or pay-per
`use access to certain WLAN services. The network services
`available to non-authorized MUs are provided to the user for
`selection. In this manner, non-authorized MUs may access a
`number of network services while restricting access to
`private network services (such as those belonging to a
`corporation) to authorized MUs only.
`FIG. 1 illustrates one method of implementing public
`mode access according to one embodiment of the invention.
`An AP may be pre-con?gured or dynamically con?gured to
`operate in public mode 102. This may occur at start-up or
`boot-up for example. An MU then sends a request to obtain
`basic connection information (or the MU awaits for such
`information) 104. The AP responds to the request by indi
`cating its mode of is operation (either public mode or private
`mode) 106.
`In one implementation, the AP operating in public mode
`responds by indicating public mode operation and providing
`the available WLAN service information 106. The WLAN
`65
`services available in public mode may also be referred to as
`public domain services.
`
`50
`
`4
`In public mode, the MU and AP may then process
`authentication information 108 to establish an initial con
`nection with the AP.
`Once the initial connection has been established, the MU
`displays the WLAN public domain services available and
`waits for user selection 110. FIG. 2 illustrates an exemplary
`menu of various pay and free public domain services that
`may be displayed on an MU.
`If the public domain services are freely accessible, once
`the user selects a service the, network connection will be
`established and normal operation of the selected service(s)
`may begin 122. AnAP terminates access to network services
`by sending a disconnect notice 126. In this manner, a
`non-authorized MU may obtain access to public domain
`services of a network, while allowing other network services
`to be secure from unauthorized access.
`If the user selects a pay-for-use public domain service,
`then some form of payment will be requested. In one
`implementation, secure services are provided to safeguard
`the transaction 112. Different forms of payment options may
`be displayed by the MU to enable a user to provide payment
`114. The AP and MU employ a secure scheme 112 to prevent
`easy access to payment information (e. g. credit card number,
`etc.) during transmission from the MU to the AP. In various
`embodiments, a user may provide payment via credit card,
`prepaid services (eg prepaid phone-card), and/or other
`forms of remote or direct payment methods.
`Once an AP receives payment information 116 (eg credit
`card number), it passes this information to other network
`components for validation 118 in a secure way. Validation is
`the process of checking the validity of the form of payment
`sent by the MU to the AP as payment for a pay for use
`service. The AP is informed of the validation results. The AP,
`in turn, sends the result to the MU 120.
`If the form of payment is determined to be valid, the
`connection of the MU to the selected service 124 through an
`AP 122 is established.
`If a prepaid payment form is used, a timer is maintained
`to monitor the amount of time the service is employed. If the
`prepaid time is exceeded, then service is terminated. In one
`implementation, the MU maintains a timer to indicate the
`amount of prepaid time used or remaining. In another
`implementation, a timer is maintained by the AP, enabling
`the AP to terminate access to network services if the prepaid
`time has been exhausted. In other implementations, the AP
`may terminate access to public domain network services if
`such access has exceeded an allotted amount of time and/or
`if network traf?c reaches a threshold level (eg to alleviate
`network congestion).
`FIG. 3 illustrates one embodiment of the invention that
`provides multiple access modes through multiple access
`points to permit both authorized and non-authorized MUs to
`access network services. A ?rst access point AP1 302 is
`communicatively coupled to a network and con?gured to
`operate in private mode and provide network services (eg
`pre-registered) to authorized MUs (e.g. MU1 306). A second
`access point AP2 304 is communicatively coupled to the
`same network and con?gured to operate in public mode and
`provide public domain service(s) (e.g. free or pay-per-use)
`to non-authorized MUs (e.g. MU2 308).
`FIG. 4 illustrates another embodiment of the invention
`that provides multiple access modes through a single access
`point to permit both authorized and non-authorized MUs to
`access network services. An access point AP 402 is com
`municatively coupled to a network and con?gured to pro
`vide both private mode network service(s) (e.g. pre-regis
`tered) to authorized MUs (e.g. MU1 406) and public mode
`
`35
`
`40
`
`55
`
`60
`
`STARWOOD Ex 1003, page 8
`
`

`
`US 7,177,637 B2
`
`20
`
`25
`
`30
`
`5
`service(s) (e.g. free or pay-per-use) to non-authorized MUs
`(e.g. MU2 408). In one embodiment, AP 402 may have a
`single Wireless communication port (eg a Wireless trans
`ceiver port) concurrently supporting both public and private
`mode communications and/or services. In another embodi
`ment, AP 402 may have tWo separate Wireless communica
`tions ports (e.g. Wireless transceiver ports), a ?rst port to
`support public mode communications and/or services and a
`second port to support private mode communications and/or
`services.
`FIG. 5 illustrates one embodiment of an access point AP
`device 500 according to one aspect of the invention. A
`transceiver port 502 serves to Wirelessly transmit and
`receive information from mobile devices and/or users. The
`Wireless transceiver port 502 is coupled to a control unit 504
`that controls communications/access betWeen the trans
`ceiver port 502 and a netWork communications port 506
`(unit 504 is also handles 802.11 protocol). The netWork
`communications port 506 to couple to a Wired or Wireless
`network. Through both the transceiver port 502 and netWork
`communications point 506, the access point device 500 acts
`as a gateWay for Wireless/mobile devices to access netWork
`services.
`In a ?rst mode of operation (e.g. private mode), the access
`point device 500 permits authorized mobile devices access
`to the netWork communications port 506 and the netWork
`services provided by the netWork coupled to the netWork
`communications port 506. In this mode of operation, only
`mobile devices that are pre-authorized or are members of the
`netWork may obtain access to netWork services via the
`netWork communications port 506.
`In a second mode of operation (e.g. public mode), the
`access point device 500 permits non-authorized mobile
`devices access to the netWork communications port 506 and
`the public domain netWork services provided by the netWork
`coupled to the netWork communications port 506.
`The access point device is con?gured to provide non
`member or non-authorized MUs a list of available public
`domain (e. g. free or pay-per-use) netWork services. The MU
`user may select from the list of public domain services and
`40
`thus obtain access to the selected services. If a pay-per-use
`netWork service is selected, then the access point device 500
`provides a mechanism to validate such payment information
`prior to permitting the MU access to the selected netWork
`service. The access point device 500 may request that the
`MU user provide a form of payment (e.g. credit card
`number, prepaid card, etc.). Upon receiving said payment
`information, the access point device 500 validates the form
`of payment to ascertain that it is bona ?de. The access point
`device 500 may employ netWork services, over the netWork
`communications port 506, to validate the payment informa
`tion.
`The access point device 500 communicates With MUs in
`accordance With the Electrical and Electronics Engineers
`(IEEE) Standard 802.11 Speci?cation. In particular, authen
`tication and privacy services may be provided via the
`procedures de?ned in IEEE Standard 802.11 and/or any of
`its supplement Speci?cations.
`In another embodiment, the access point device 500 may
`operate to provide both authorized and non-authorized MU
`60
`(e. g. members and non-members) access to netWork services
`at the same time. As before, authorized MUs are provided
`extensive access to netWork services While non-authorized
`MUs are only alloWed access to public domain netWork
`services.
`While certain exemplary embodiments have been
`described and shoWn in the accompanying draWings, it is to
`
`50
`
`6
`be understood that such embodiments are merely illustrative
`of and not restrictive on the broad invention, and that this
`invention not be limited to the speci?c constructions and
`arrangements shoWn and described, since various other
`modi?cations are possible. For instance, While the invention
`has been described in the context of the IEEE 802.11
`standard, it may also be implemented With other communi
`cation standards, such as Hyperlan I and Hyperlan II (speci
`?ed by the European Telecommunications Standardization
`Institute). Additionally, it is possible to implement the
`invention or some of its features in hardWare, programmable
`devices, ?rmware, softWare or a combination thereof. For
`instance, all or parts of the methods described herein may be
`performed by a processor Within an AP and/or MU. The
`invention or parts of the invention may also be embodied in
`a processor-readable storage medium or machine-readable
`medium such as a magnetic, optical, or semiconductor
`storage medium.
`What is claimed is:
`1. A method comprising:
`broadcasting a synchronization signal from a Wireless
`access point device indicating one of a plurality of
`modes of operation for the access point, the plurality of
`modes of operation including a private mode of opera
`tion for authorized devices and a public mode of
`operation for authorized or non-authorized devices;
`broadcasting available public netWork services if the
`mode of operation is the public mode of operation;
`receiving a request for establishment of a connection from
`a non-authorized mobile device in response to the
`broadcast of a synchronization signal for the public
`mode of operation; and
`establishing a connection betWeen the non-authorized
`mobile device and the access point device;
`Wherein establishing a connection in the private mode
`comprises use of a secure authentication process, and
`Wherein establishing a connection in the public mode
`comprises use of a registration process.
`2. The method of claim 1 further comprising:
`receiving a request from the non-authorized mobile
`device for access to a selected netWork service of the
`available netWork services; and
`alloWing the non-authorized mobile device access to the
`selected netWork service.
`3. The method of claim 1, Wherein the available netWork
`services include free public netWork services.
`4. The method of claim 1, Wherein the available netWork
`services include pay-per-use public netWork services.
`5. The method of claim 4 further comprising:
`providing a form of payment for a pay-per-use netWork
`service.
`6. The method of claim 5 Wherein the form of payment is
`a credit card number.
`7. The method of claim 5 Wherein the form of payment is
`a prepaid payment number.
`8. The method of claim 5 further comprising:
`providing a secure transmission of information betWeen
`the non-authorized mobile device and the access point
`device.
`9. The method of claim 5 further comprising:
`sending payment information from the non-authorized
`mobile device to the access point device Wirelessly.
`10. The method of claim 5 further comprising:
`validating the payment information provided by the non
`authorized mobile device; and
`providing the validation results to the non-authorized
`mobile device.
`
`35
`
`45
`
`55
`
`65
`
`STARWOOD Ex 1003, page 9
`
`

`
`US 7,177,637 B2
`
`7
`11. The method of claim 10 further comprising:
`establishing a connection between the non-authorized
`mobile device and a selected network service only if
`payment validation is successful.
`12. The method of claim 11 further comprising:
`if a payment for the non-authorized mobile device
`expires, disconnecting the non-authorized mobile
`device from a selected network service of the available
`network services.
`13. The method of claim 1 further comprising:
`performing data exchanges between the non-authorized
`mobile device and a selected network service of the
`available network services through the access point.
`14. The method of claim 1 further comprising:
`disconnecting the non-authorized mobile device from the
`access point device to terminate access to the available
`network services.
`15. The method of claim 1 wherein the establishment of
`the connection uses an authentication procedure provided in
`the Electrical and Electronics Engineers (IEEE) Standard
`802.11 Speci?cation or its supplements.
`16. A machine-readable medium having one or more
`instructions for enabling a non-authorized user to wirelessly
`access a number of network services, which when executed
`by a processor, causes the processor to perform operations
`comprising:
`wirelessly transmitting a synchronization signal indicat
`ing one of a plurality of modes of operation for an
`access point, the plurality of modes of operation includ
`ing a private mode of operation for authorized devices
`and a public mode of operation for authorized or
`non-authorized devices;
`wirelessly transmitting available network services if the
`mode of operation is the public mode of operation;
`receiving a request for connection establishment from a
`non-authorized user in response to the transmission of
`a synchronization signal for the public mode of opera
`tion;
`establishing a connection with the non-authorized user;
`receiving a request for access to a selected network
`service, from among the available network services, by
`the non-authorized user; and
`providing the non-authorized user access to the selected
`network service;
`wherein establishing a connection in the private mode
`comprises use of authentication and association hand
`shakes, and wherein establishing a connection in the
`public mode comprises use of a registration process.
`17. The machine-readable medium of claim 16 further
`comprising:
`requesting a form of payment from the non-authorized
`user for access to pay-per-use network services.
`18. The machine-readable medium of claim 17 further
`comprising:
`validating the payment information provided by the non
`authorized user.
`19. The machine-readable medium of claim 18 further
`comprising:
`if payment from the non-authorized mobile device
`expires, disconnecting the non-authorized mobile
`device from the selected network service.
`20. The machine-readable medium of claim 16 further
`comprising:
`performing data exchanges between the non-authorized
`user and the selected network service.
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`21. An apparatus comprising:
`a transceiver port for wirelessly communicating with
`mobile devices;
`a network communications port communicatively
`coupled to the transceiver port, the network communi
`cations port for coupling to a network; and
`a control unit coupled to the transceiver port and the
`network communications port, the control unit con?g
`ured to control access from the transceiver port to the
`network communications port and provide at least two
`modes of operation, a ?rst mode of operation to provide
`authorized mobile devices private access to the network
`communications port, and a second mode of operation
`to provide authorized and non-authorized mobile
`devices public access to the network communications
`port
`wherein the control unit is to use the transceiver port to
`broadcast a synchronization signal indicating one of the
`modes of operation and, for the second mode of opera
`tion, available network services, and to receive a
`response from an unauthorized mobile device in
`response to the broadcast of the synchronization signal;
`and
`wherein the control unit is to establish a connection in the
`private mode through use of authentication and asso
`ciation handshakes, and to establish a connection in the
`public through use of a registration process.
`22. The apparatus of claim 21 wherein any one of the
`operation modes can be dynamically enabled or disabled.
`23. The apparatus of claim 21 wherein in the ?rst mode of
`operation a speci?c authentication process is requested from
`the mobile devices to obtain full network access over the
`network communications port and in the second mode of
`operation no speci?c authentication process is requested
`from the mobile devices to obtain certain network access
`over the network communications port.
`24. The apparatus of claim 21 wherein the second mode
`of operation allows the non-authorized mobile devices to
`obtain public network access through the network commu
`nication port.
`25. The apparatus of claim 21 wherein the control unit is
`con?gured to provide secure services to both authorized and
`non-authorized mobile devices.
`26. The apparatus of claim 21 where

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket