throbber
(12) United States Patent
`Singla et a].
`
`(10) Patent N0.2
`(45) Date of Patent:
`
`US 7,546,458 B1
`Jun. 9, 2009
`
`US007546458B1
`
`(54) METHOD FOR ORGANIZING VIRTUAL
`NETWORKS WHILE OPTIMIZING
`
`SECURITY
`
`(75) IIWBIIIOFSI Amall Slngla, FTP/mom, CA (Us);
`AndreWM- Davfdsons San J05?’ CA
`(Us); MlcllaelFmes San P91101500’ CA
`(5:); Km“ Hayes’ Mountam View’ CA
`(
`)
`(73) Assigneez Atheros Communications, Inc‘, Santa
`Clara, CA (U S)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U_S_C_ 154(1)) by 1613 days_
`
`p10‘Z
`
`(22) Filed:
`
`Oct. 18, 2002
`
`5,978,378 A * 11/1999 Van Seters et a1. ........ .. 370/401
`5,983,350 A * 11/1999 Minear etal. ............... .. 726/11
`
`6,304,973 B1 * 10/2001 Williams ..................... .. 726/3
`
`709/238
`6,308,218 B1* 10/2001 Vasa .............. ..
`.... .. 705/3
`6,804,656 B1 * 10/2004 Rosenfeld et a1. .
`370/386
`2002/0146002 A1 * 10/2002 Sato ............... ..
`2002/0146026 A1* 10/2002 Unitt et a1. ................ .. 370/428
`2003/0120763 A1* 6/2003 Volpano ................... .. 709/223
`2003/0145118 A1* 7/2003 Volpano et a1.
`709/249
`2005/0157688 A1* 7/2005 Rydnell et a1. ............ .. 370/338
`
`OTHER PUBLICATIONS
`
`IBM technical Disclosure Bulletin, Mar. 2002, “Use ofVirtual Local
`Ar N
`k '
`Sh d1 f
`S
`M l '
`l C
`ea etWor s1na are n rastructure to upport ut1pe us
`tomers at LOW C081,” Mar. 1, 2002,1313. 1-3.*
`
`* .
`
`“ed by exammer
`
`.
`
`_
`_
`Related U-s- APPhcatmn Data
`(60) Provisional application No. 60/377,906, ?led on May
`4,
`
`Primary ExamineriEmmanuel L Moise
`Assistant ExamineriMichael PyZocha
`‘312mm?’ glgkelml Or F W miBever’ Hoffman & Harms’
`; eane e .
`arms
`
`(51) Int CL
`(2006.01)
`H04L 9/00
`(2006.01)
`H04K 1/00
`(2006 01)
`G06F 15/173
`7'13/166_ 380/255 709/223
`52 U 5 Cl
`’
`’
`(
`)
`_'
`'
`' """ "_' """ "_ """ "
`(58) Field of Classl?catlon Search ............... .. 713/166;
`_
`_
`70902;; 380/255
`See apphcanon ?le for Complete Search hlstory'
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`5,684,800 A 11/1997 Dobbins et a1.
`
`(57)
`
`ABSTRACT
`
`.
`.
`.
`1
`.
`.
`b
`An access point in a Wire ess communication system can e
`con?gured to include multiple virtual LANS (VLANs) based
`on security levels, thereby allowing secure traf?c to be iso
`lated from insecure traf?e Con?guring the access point can
`include assigning a security level to each VLAN and setting a
`security association for each station associated With the
`access point. Based on this security association, each station
`can be assigned to an appropriate VLAN.
`
`17 Claims, 3 Drawing Sheets
`
`300
`
`/
`
`Set Defaull/Multi-Cast
`Keys
`301
`
`1
`
`Enable
`Encryption
`302
`
`1
`
`Assign Security Levels
`To VLANs
`3 03
`
`1
`
`Enable Access Control
`304
`
`1
`
`Set Security Associations
`For Stations
`305
`
`STARWOOD Ex 1010, page 1
`
`

`
`US. Patent
`
`Jun. 9, 2009
`
`Sheet 1 of3
`
`US 7,546,458 B1
`
`09900090 00090900
`
`Figure 1
`
`STARWOOD Ex 1010, page 2
`
`

`
`US. Patent
`
`Jun. 9, 2009
`
`Sheet 2 of3
`
`US 7,546,458 B1
`
`Network Port
`208
`
`AES
`VLAN
`201
`
`(7
`
`WEP
`VLAN
`207
`
`7
`
`F igure 2
`
`STARWOOD Ex 1010, page 3
`
`

`
`US. Patent
`
`Jun. 9, 2009
`
`Sheet 3 0f 3
`
`US 7,546,458 B1
`
`300
`
`Figure 3
`
`Set Default/Multi-Cast
`Keys
`3 01
`
`l
`
`Enable
`Encryption
`302
`
`i
`Assign Security Levels
`To VLANs
`303
`
`1
`
`Enable Access Control
`304
`
`l
`
`Set Security Associations
`For Stations
`305
`
`STARWOOD Ex 1010, page 4
`
`

`
`US 7,546,458 B1
`
`1
`METHOD FOR ORGANIZING VIRTUAL
`NETWORKS WHILE OPTIMIZING
`SECURITY
`
`RELATED APPLICATIONS
`
`This application claims priority to US. Provisional Appli
`cation Ser. No. 60/377,906 Which Was ?led on May 4, 2002.
`
`BACKGROUND OF THE INVENTION
`
`2
`Increasingly, users Want to encrypt their communications,
`especially in Wireless environments, Which are particularly
`susceptible to interception. The 1999 IEEE 802.11 standard
`includes encryption as a service. HoWever, this encryption
`methodology provides only loW-level security. Therefore, a
`need arises for implementing higher-level security encryption
`methodologies into VLANs.
`
`SUMMARY OF THE INVENTION
`
`In accordance With one feature of the invention, an access
`device in a Wireless communication system can be con?gured
`to include multiple virtual LANS (VLANs) based on security
`levels, thereby alloWing secure tra?ic to be isolated from
`insecure tra?ic. Con?guring the access device can include
`assigning a security level to eachVLAN and setting a security
`association for each station associated With the access device.
`The security association can include security algorithms (i.e.
`a cipher suite), end point designations, key length (Wherein a
`key is a given length of random data), predetermined key
`rotations, and/or liveness. Each station can be assigned to an
`appropriate VLAN based on its security association.
`In one embodiment, setting security associations, e.g. key
`maps, for the stations can be triggered by an access control
`enable command. This command can further indicate
`Whether unencrypted tra?ic from a transmitting station
`should be ?ltered, i.e. not forWard to the receiving station.
`A VLAN identi?cation (VID) identi?es each VLAN. In
`one embodiment, the VID could be incorporated into the
`transmitting data frame. Additionally, certain functions on the
`access device, such as con?guration and management func
`tions, can be designated to be accessible via a particular
`VLAN during the assignment step. In accordance With one
`aspect of the invention, a neW security level can be assigned to
`any VLAN. In one embodiment, a default VLAN can be
`provided.
`A Wireless communication system can include an access
`point and a plurality of stations associated With the access
`point, each station being assigned to a VLAN based on its
`security association. Various security levels can be used in
`accordance With the invention. For example, current encryp
`tion standards includeAES, WEP and/or no encryption. Other
`embodiments of the invention can provide VLANs With dif
`ferent encryption standards.
`
`BRIEF DESCRIPTION OF THE FIGURES
`
`FIG. 1 illustrates three logically de?ned sub-netWorks.
`FIG. 2 illustrates an access point (AP) With multiple
`VLANS, Wherein each VLAN has an associated security
`level.
`FIG. 3 illustrates a How chart With exemplary steps for
`con?guring an AP to include multipleVLANs based on secu
`rity levels.
`
`DETAILED DESCRIPTION OF THE FIGURES
`
`In accordance With one feature of the invention, a Wireless
`access point (AP) platform can support multiple VLANs
`based on the level of security provided. Speci?cally, VLAN
`membership of a Wireless station to a particular VLAN is
`based on the security association that the station uses over the
`Wireless link. For example, using security VLANs, an AP
`could place more secure Wireless stations directly onto a
`sensitive internal corporate sub-netWork, Whereas less secure
`Wireless stations could be assigned to a VLAN that functions
`outside the corporate sub-netWork’s ?reWall. In this manner,
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`1. Field of the Invention
`The present invention relates generally to the ?eld of Wire
`lessly connected computer netWorks and particularly the
`assignment of netWorked computers to sub-netWorks based
`on the security level of the connection enabled by each net
`Worked computer.
`2. Description of the Related Art
`Current technology has alloWed the global expansion of
`proprietary networks, thereby creating the potential for a
`dispersed Workforce. To e?iciently incorporate individuals
`from different physical locations into coordinated Work
`groups, specialiZed sub-netWorks, called Virtual Local Area
`Networks (VLANs), can be used. VLANs are logically, rather
`than physically, de?ned sub-netWorks. VLANs, Which can
`include any type of data tra?ic creators (e.g. portable and
`desktop computers, servers, printers, or other peripherals) can
`be de?ned according to various policies or selection param
`eters.
`In one embodiment, VLAN technology alloWs a system
`administrator to group ports of various sWitches and the users
`associated With such ports into de?ned communities. For
`example, FIG. 1 illustrates three logically de?ned sub-net
`Works, i.e. VLANs 101, 102, and 103. The computer icons,
`shoWn in VLANs 101, 102, and 103, represent users Within
`those sub-netWorks. In this embodiment, the netWork
`includes tWo sWitches 104 and 105, each sWitch having eight
`ports (shoWn as circles). VLAN 101 comprises four ports of
`sWitch 104 and three ports of sWitch 105; VLAN 102 com
`prises tWo ports of sWitch 104 and ?ve ports of sWitch 105;
`and VLAN 103 comprises tWo ports of sWitch 104 and Zero
`ports of sWitch 105. In this netWork con?guration, each
`VLAN alloWs communication betWeen its oWn users (i.e. as if
`the users Were on a common LAN), but restricts communi
`cation betWeen users of different VLANs. VLANs 101, 102,
`and 103 could represent various groups Within a company,
`such as engineering, sales, and accounting. When a user
`moves from one port to another, the system administrator can
`recon?gure the VLAN membership to include that user.
`In another embodiment, VLAN membership can be based
`on a MAC-layer address. In a MAC address-based VLAN,
`users can be initially con?gured to be in at least one VLAN,
`thereby alloWing the subsequent tracking of such users. When
`the user changes location, the VLAN con?guration may
`change, or remain constant, the VLAN con?guration may
`change based on the MAC-layer address. US. Pat. No. 5,684,
`800 provides an illustrative explanation of the operation and
`con?guration of MAC address-based VLANs and is incorpo
`rated by reference herein.
`Advantageously, VLANs are supported over all IEEE 802
`LAN MAC protocols. Moreover, VLANs can provide l:N
`communication (i.e. shared media traf?c) as Well as 1:1 com
`munication (i.e. point-to-point traf?c). Additional advantages
`of VLANs, as Well as the standardized format for frame
`tagging of VLANs, are provided in the IEEE 802.1Q standard
`published in 1999.
`
`50
`
`55
`
`60
`
`65
`
`STARWOOD Ex 1010, page 5
`
`

`
`US 7,546,458 B1
`
`3
`the corporate network can be kept completely secure While
`still providing the bene?ts of Wireless connectivity to all users
`Within physical proximity of the AP.
`Various levels of encryption currently can be used in accor
`dance With security VLANs. For example, the Advanced
`Encryption Standard (AES) speci?es a cryptographic algo
`rithm that can provide a 128-, 192-, or 256-bit key. In general,
`the larger the key siZe, the greater the level of security pro
`vided. Another encryption standard, called the Wired Equiva
`lent Protocol (WEP), can provide a 64-, 128-, or 152-bit key.
`HoWever, each WEP key includes 24 bits that are not user
`controlled. Thus, to more accurately compare WEP to AES,
`the WEP key can be thought of as including 40, 104, or 128
`bits. Therefore, for purposes of description herein, AES and
`WEP Will be used as exemplary encryption standards repre
`senting “high” and “loW” security levels, respectively. In
`accordance With other embodiments of the invention, differ
`ent encryption standards offering different levels of security
`can also be used.
`FIG. 2 illustrates anAP 200 having anAES VLAN 201 and
`a WEP VLAN 207. In this embodiment, AES VLAN 201
`includes stations 202, 203, and 204, Whereas WEP VLAN
`207 includes stations 205 and 206. In accordance With one
`feature of the invention, frames from one station can be for
`Warded to other stations Within the group of Wireless devices
`associated With AP 200, called a Basic Service Set (BSS),
`only if the other stations are in the sameVLAN. Thus, stations
`202, 203, and 204 can communicate With each other through
`AP 200. Similarly, stations 205 and 206 can communicate
`through AP 200. HoWever, if the stations are in different
`VLANs, then AP 200 ?lters the frame, i.e. does not alloW the
`frame to be transmitted. Thus, for example, if station 205
`attempts to send a frame using WEP to station 203, Which
`communicates using AES, then AP 200 Would ?lter that
`frame.
`In one embodiment, a VLAN Identi?er (VID) facilitates
`identi?cation of that VLAN. Speci?cally, a VID can be
`included in a VLAN tag, Which in turn can be incorporated
`into a transmitting data frame. In this manner, each frame
`indicates its level of encryption security. In one embodiment,
`a VLAN can alloW multiple or even all security levels (and
`thus, the associated VLAN tag Would indicate all levels of
`encryption security in Which the station can communicate).
`For example, a station could have the capability to commu
`nicate in a VLAN using both AES and/or WEP. Or a station
`could have the capability to communicate in a VLAN using
`AES and/or no encryption security.
`In one embodiment, a con?gured AP can determine the
`security association of a station using the VID in the frame
`and a look-up table of VIDs and security associations. Know
`ing the VID and/ or the security association alloWs the AP to
`change the VLAN of a station should the need arise or to
`match the security level of the transmitting station With the
`security level of the VLAN.
`In one embodiment, frames received at a netWork port 208,
`eg an Ethernet port, using a VLAN tag With no correspond
`ing VID can be ?ltered. In another embodiment, the VLAN
`tag corresponding to a designated encryption standard can be
`set to “invalid,” thereby causing all frames using that desig
`nated encryption standard to be ?ltered.
`In one embodiment, the VLANs can be implemented via
`softWare, Which is executed by a microprocessor or central
`processing unit (CPU) Within the AP. To correctly con?gure a
`VLAN operation, the netWork port of the AP needs to be
`connected to devices that can understand VLAN tags, e. g. an
`IEEE 802.1Q-compliant device. These devices can include
`bridges, routers, or hosts. Multiple VLANs can be aggregated
`
`50
`
`55
`
`60
`
`65
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`4
`onto the netWork port (also called a trunk port), thereby
`effectively combining the tra?ic load of the stations.
`FIG. 3 illustrates a How chart 300 With exemplary steps for
`con?guring an AP to include multipleVLANs based on secu
`rity levels. FloW chart 300 is herein described in conjunction
`With pseudo code (immediately folloWing) that can imple
`ment this con?guration. Note that a code line starting With a
`# is a comment line, Whereas a code line Without a # is a
`command.
`
`# In this example, the AP is connected to a sWitch via a trunk
`port.
`# On the sWitch, the vlan is the default (1).
`
`# VLAN 16 is set up, and connected to the internal netWork.
`[10.10.16.X]
`# VLAN 2 is set up, and connected to the external netWork.
`[192.168.1.X]
`# VLAN 3 is set up, and connected to another external net
`Work. [192.168.2.X]
`# set your default key
`
`# your WEP and AES clients must have this as their Shared
`Key #1
`
`set key 1 40 1234567890
`
`set key 1 default
`
`# set your default AES-VLAN key
`
`# your AES clients must have this as their Shared Key #2
`
`set key 2 128 1234567890abcdef1234567890abcdef
`
`set key 2 default AES-VLAN
`
`# alloW encryption
`set encryption enable
`
`# set your cipher to alloW both WEP and AES
`
`set cipher auto
`
`# VLANs are set in decimal numbers.
`
`set vlan eth 1
`
`set vlan ap 16
`
`set vlan aes 16
`
`set vlan Wep 2
`
`set vlan clear 3
`
`# set acl control mode
`
`# if you “set acl strict”, then clear clients Will be dropped
`
`set acl enable
`
`# set your unique station keys
`
`set acl keymap 00:03:7 F:00:00:01 104 1234567890abc
`def1234567890
`
`128
`
`F:00:00:02
`
`00:03:7
`keymap
`acl
`set
`1234567890abcdef1234567890abcdef
`As indicated in the initial comment lines of the pseudo
`code, the AP can be connected to a sWitch via a trunk port. In
`this particular sWitch, the default setting is a VLAN. In this
`embodiment, three VLANs Will be con?gured. To facilitate
`this con?guration, each VLAN is assigned an arbitrary num
`ber, i.e. VLAN 16, VLAN 2, or VLAN 3. Each of these
`VLANs Will be associated With a speci?c netWork. For
`
`STARWOOD Ex 1010, page 6
`
`

`
`5
`example, VLAN 16 Will be associated With an internal net
`work, Which has a designated number 10.10.16.X. Similarly,
`VLAN 2 Will be associated With an external network, Which
`has a designated number 192.168.1.X, and VLAN 3 Will be
`associated With another external netWork, Which has a desig
`nated number 192.168.2.X. As explained in further detail
`beloW, VLANs 16, 2, and 3 Will be associated With AES,
`WEP, and Clear (i.e. unencrypted) security levels, respec
`tively.
`The “set key 1” commands set a default encryption key
`(step 301), Which can be used by both the WEP and AES
`clients. Note that a default key can be considered a multi-cast
`key in the context of the security VLANs. If WEP andAES are
`assigned to separate VLANs, as shoWn in this embodiment,
`an additional default key can be set for the AES VLAN. In this
`embodiment, an additional default key can be programmed
`for AES by appending “AES-VLAN” to the end of the default
`command (i.e. “set key 2 default AES-VLAN”). Note that
`AES encryption uses longer keys than WEP encryption, eg
`128 versus 40 bits, as previously described.
`At this point, encryption can be enabled in step 302 as
`triggered by the “set encryption enable” command. The “set
`cipher auto” command alloWs the AP to automatically nego
`tiate the appropriate security association With each station
`based on that station’s capability. The security levels and
`associated VIDs for the VLANs can be assigned in step 303.
`For example, the “set vlan aes 16” command indicates that the
`AES tra?ic corresponds to VLAN 16; the “set vlan Wep 2”
`command indicates that WEP traf?c corresponds to VLAN 2;
`and the “set vlan clear 3” command indicates that unen
`crypted tra?ic corresponds to VLAN 3.
`Additionally, the “set vlan ap 16” command indicates that
`to access the con?guration and management functions on the
`AP, the AP is also placed onVLAN 16. This command alloWs
`a system administrator to change settings on the AP. Prefer
`ably, the AP node is placed on the most secure VLAN to
`provide optimal security. Finally, the “set vlan eth 1” com
`mand indicates that for any untagged traf?c received on the
`Ethernet port of the AP, that traf?c is assumed to have tag “1”.
`As this number does not correspond to any VID, a tag 1
`essentially ?lters out that traf?c.
`The “set acl enable” command alloWs the AP to enable
`access control in step 304. This access control can include
`setting security associations in step 305 for stations assigned
`to VLANs 2, 3, and 16. In one embodiment, setting a security
`association could include setting a key map for each station.
`Exemplary “set acl keymap” commands from tWo stations are
`provided to the AP in this case.
`In one embodiment, if no VLANs are explicitly created by
`a system administrator during the initial AP con?guration
`(step 303), then the VLAN assignment of each security level
`can be automatically determined by the setting of the encryp
`tion mode. For example, in one default con?guration after
`enabling encryption (step 302), the WEP and AES security
`levels can be assigned to VLAN 1 and the Clear security level
`can be assigned to VLAN Oxff, i.e. an invalid VLAN. Note
`that if encryption is not enabled, then the WEP and AES
`security levels can be assigned to VLAN Oxff and the Clear
`security level can be assigned to VLAN 1 . To provide optimal
`system ?exibility, these default settings can be changed With
`the “set VLA ” commands (step 303).
`Examples of additional VLAN con?guration commands
`folloWing the initial AP con?guration are provided beloW in
`pseudo code. Note that commands are preceded With arroWs,
`Whereas system (i.e. AP) responses have no arroWs. In this
`case, no VLANs have been created during the initial AP
`con?guration.
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 7,546,458 B1
`
`-> get encryption
`Encryption: Enabled
`
`-> get vlan
`
`Ethernet Port Native Vlan: 1
`
`AP’s local Vlan: 1
`
`AES Vlan: 1
`
`WEP Vlan: 1
`
`Clear Vlan: INVALID (tra?ic Will be ?ltered)
`
`-> set vlan aes 3
`
`-> set vlan clear 2
`
`-> set vlan Wep 1
`
`-> set vlan eth 3
`
`-> set vlan ap 3
`
`20
`
`-> get vlan
`
`Ethernet Port Native Vlan: 3
`
`AP’s local Vlan: 3
`
`25
`
`AES Vlan: 3
`
`WEP Vlan: 1
`
`Clear Vlan: 2
`
`30
`
`-> del vlan
`
`-> get vlan
`
`Ethernet Port Native Vlan: 1
`
`35
`
`AP’s local Vlan: 1
`
`AES Vlan: 1
`
`WEP Vlan: 1
`
`Clear Vlan: INVALID (tra?ic Will be ?ltered)
`In this embodiment, the “get encryption” command
`requests that the AP indicate Whether encryption is enabled.
`In this case, as shoWn by the system response, encryption is
`enabled. The “get vlan” command displays the VLAN secu
`rity levels for speci?ed VLANs. In this case, all Ethernet, AP
`local, AES, and WEP security levels have been assigned
`VLAN 1, Whereas the Clear security level has been assigned
`to VLAN Oxff.
`In accordance With one feature of the invention, settings
`can be adjusted by using a “set vlan” command to modify
`VLAN security for a speci?ed VLAN. For example, the “set
`vlan aes 3” and “set vlan eth 3” commands can alloW AES and
`Ethernet tra?ic on a neW VLAN, i.e. VLAN 3. Similarly, a
`“set vlan ap 3” command may be used to alloW the con?gu
`ration and management functions on the AP to be accessed on
`VLAN 3. The “set vlan Wep 1” command explicitly de?nes
`WEP tra?ic for VLAN 1 (the default VLAN). The “set vlan
`clear 2” assigns invalid tra?ic to a neW VLAN, i.e. VLAN 2.
`Note that the “get vlan” command folloWing the “set vlan”
`commands re?ect the neWly set VLANs. In one embodiment,
`a “del vlan” command Will delete any previously set VLANs,
`Wherein after the “get vlan” command, the system can
`respond With the default VLANs of the AP.
`In one embodiment, frames arriving untagged, i.e. Without
`a VLAN tag, on an Ethernet port can be assigned a default
`VID for that port (PVID). The AP can also be designated as
`
`STARWOOD Ex 1010, page 7
`
`

`
`US 7,546,458 B1
`
`7
`belonging to the default VID. Note that frames belonging to
`the port’s default VLAN are transmitted untagged onto the
`port.
`Providing security VLANs advantageously alloWs users to
`deploy neW cryptographic standards While still supporting the
`old standards. With different standards available, companies
`can provide different access to different users, thereby isolat
`ing secure tra?ic from insecure tra?ic. Security VLANs can
`also provide users With different levels of authorization, e.g.
`access control, thereby enhancing system ?exibility.
`Although illustrative embodiments of the invention have
`been described in detail herein With reference to the accom
`panying ?gures, it is to be understood that the invention is not
`limited to those precise embodiments. They are not intended
`to be exhaustive or to limit the invention to the precise forms
`disclosed. As such, many modi?cations and variations Will be
`apparent. For example, users can refer to hosts, bridges, rout
`ers, and/ or computers. Moreover, security levels can refer to
`domains, strength, speed of performance, and/or levels of
`authoriZation (i.e. access control). Finally, access points can
`refer to any access devices. Accordingly, it is intended that the
`scope of the invention be de?ned by the folloWing Claims and
`their equivalents.
`
`The invention claimed is:
`1. A method of con?guring an access device to include
`multiple virtual LANS (V LANs) based on security levels, the
`method comprising:
`enabling encryption in the access device;
`selectively assigning one of a predetermined security level,
`multiple security levels, and no security level to each
`VLAN; and
`setting a security association for each station associated
`With the access device, Wherein the security association
`of a station determines its assigned VLAN.
`2. The method of claim 1, further including setting a multi
`cast key for each security level before enabling encryption.
`3. The method of claim 1, further including enabling access
`control before setting the security association for each station.
`4. The method of claim 3, Wherein enabling access control
`includes ?ltering unencrypted communication from any sta
`tion.
`5. The method of claim 1, Wherein setting a security asso
`ciation includes setting key maps for stations associated With
`the access device.
`6. The method of claim 1, Wherein selectively assigning
`includes designating a VLAN identi?cation (V ID) for each
`VLAN.
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`8
`7. The method of claim 1, Wherein selectively assigning
`includes alloWing certain functions on the access device to be
`accessible via a designated VLAN.
`8. The method of claim 1, Wherein selectively assigning
`includes ?ltering untagged traf?c received on a netWork port
`on the access device.
`9. The method of claim 1, further including reassigning a
`neW security level to at least one VLAN.
`10. The method of claim 1, Wherein selectively assigning
`includes accessing a default VLAN con?guration based on
`encryption mode.
`11. The method of claim 10, Wherein the default VLAN
`con?guration includes:
`assigning security levels With encryption to a default
`VLAN; and
`assigning security levels Without encryption to an invalid
`VLAN.
`12. The method of claim 1, further including:
`deleting any previously-set VLANs; and
`reverting to any default VLANs.
`13. A method of isolating more secure traf?c from less
`secure tra?ic in a Wireless communication system, the
`method comprising:
`building an association betWeen multiple virtual LANS
`(V LANs) and security levels, Wherein a ?rst VLAN
`having a ?rst security level facilitates the more secure
`traf?c and a second VLAN having a second security
`level facilitates the less secure tra?ic, Wherein each
`security level is selectable betWeen a single security
`level, multiple security levels, and no security level.
`14. The method of claim 13, Wherein the multiple security
`levels include at least tWo of ABS, WEP, and unencrypted.
`15. The method of claim 13, Wherein building includes
`con?guring an access device.
`16. The method of claim 15, Wherein con?guring includes:
`assigning a security level to each VLAN; and
`setting a security association for each station associated
`With the access device, Wherein the security association
`of a station determines its assigned VLAN.
`17. A Wireless communication system comprising:
`an access device; and
`a plurality of stations associated With the access device,
`each station being assigned to a virtual LAN (VLAN)
`based on a security level associated With that station,
`each security level being user-selectable betWeen a
`single security level, multiple security levels, and no
`security level.
`
`STARWOOD Ex 1010, page 8

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket