throbber
US007042988B2
`
`(12) United States Patent
`Juitt et al.
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 7,042,988 B2
`May 9, 2006
`
`(54) METHOD AND SYSTEM FOR MANAGING
`DATA TRAFFIC IN WIRELESS NETWORKS
`
`(75) Inventors: David Juitt, Arlington, MA (US);
`Philip Bates, London (GB); Thomas
`Christo?el, Concord, MA (US);
`Geo?rey CraWshaW, Needham, MA
`(US); David Crosbie, Somerville, MA
`(Us)
`
`(73) Assignee: Bluesocket, Inc., Burlington, MA (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(1)) by 512 days.
`
`1
`)
`(
`21 App . N0.: 10/259 248
`,
`sep' 27’ 2002
`Prior Publication Data
`
`(22) Flled:
`(65)
`
`US 2003/0087629 A1
`
`May 8, 2003
`
`Related US. Application Data
`(60) Provisional application NO 60/325,592’ ?led on Sep
`28 2001_
`’
`(51) Int_ CL
`(200601)
`H04M 1/64
`(52) us. Cl. ................. .. 379/8817; 370/329; 455/411;
`455/4563. 726/12
`455/412
`413 415’
`See application ?le for Complete Search history.’
`
`(58) Field of Classi?cation Search
`
`(56)
`
`-
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`8/1993
`5,239,466 A
`4/1994
`5,301,356 A
`6/1995
`5,423,065 A
`5,457,680 A 10/1995
`5,629,981 A
`5/1997
`5,657,317 A
`8/1997
`
`Morgan et 31'
`B.Odm et 31'
`
`Pinard ..................... .. 455/332
`Kamm et a1.
`Nerlikar
`Mahany et a1.
`
`5,668,875 A
`5,673,031 A
`5,809,415 A
`i
`
`’
`’
`5915908 A
`
`9/1997 Brown et a1.
`9/1997 Meier
`9/1998 Rossmann ................ .. 455/422
`glrililshte?n
`370/330
`l e a‘ """""""" "
`6/1999 Dulman
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`
`0 504 122 A2
`
`9/1992
`
`(Continued)
`
`OTHER PUBLICATIONS
`Crosbie, “Method and System for Enabling Seamless Roam
`ing in a Wireless Network,” Mar. 21, 2002*
`
`(Continued)
`Primary ExamineriAllan Hoosain
`Assistant Examiner4Gerald Gauthier
`(74) Attorney, Agent, or F irmiGoodwin Procter, LLP
`
`(57)
`
`ABSTRACT
`
`The present invention can be used to facilitate the integra
`tion of wireless capability provided by wireless access
`points into an enterprise computer network. A gateway
`server is interposed between wireless access points and
`protected networks to provlde secur1ty and integration func
`‘ions’ for e’fampl‘i “the/111M901?’ access 09mm?’ linkP?'
`vacy, link mtegnty, and bandwldth metermg 1n var1ous
`embodiments. Use of such a gateway server allows substan
`tial control to be gained over network access even with the
`use of relatively simple access points. In general, such a
`gateway server receives a request to access the protected
`networ .
`aut ent1cat1on su s stemo t e atewa server
`k An h i
`i
`b y
`f h g
`y
`authenticates the user, preferably by accessing an external
`authentication server and returns a role to the authenticated
`user. An access controller in the gateway server provides
`diiTerential access to the protected network based on the
`user’s assigned role. A multiple gateway servers can be
`connected together to form a mesh network archltecture.
`
`.
`
`52 Claims, 10 Drawing Sheets
`
`DEFINE ROLE K STEP 200
`
`1
`
`|
`
`RECEIVE REQUEST
`
`1K’ STEP 205
`
`i
`AUTHENTICATE
`
`STEP 210
`1K
`
`ASSIGN ROLE W STEP 22°
`
`EVALU 5...?2HE'ES
`
`PROVIDE ACCESS
`
`1
`l
`

`
`1
`
`STEP 225
`
`STEP 230
`
`[K
`
`STARWOOD Ex 1011, page 1
`
`

`
`US 7,042,988 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`2002/0087335 A1
`2002/0098840 A1
`2002/0101848 A1
`2002/0114303 A1
`2002/0124109 A1
`
`7/2002 Meyers et a1. ............... .. 705/1
`7/2002 Hanson etal.
`455/435
`8/2002 Lee etal.
`.......... .. 370/349
`8/2002 Crosbie et al.
`9/2002 Brown
`
`9/2002 Reisman
`2002/0129094 A1
`9,2002 christoffel et 31'
`20020136226 Al
`9,2002 Brown
`2002/0138620 A1
`20020144144 A1,, 10,2002 Weisset 31'
`2003/0035388 A1,,
`2,2003 Schmidt
`2003/0154110 A1
`8/2003 Walter et al.
`2004/0167984 A1
`8/2004 Hermann
`2004/0193921 Al* 9/2004 Byrne
`
`5940591 A
`8/1999 Boyle et 31' ~~~~~~~ " 395/187'01
`5949776 A
`9/1999 Mahany etal'
`2,3332; i 1?; 133g gheung e: 311'
`
`’
`’
`6,014,558 A
`6,018,657 A
`6,026,297 A
`2,835,238 A
`6’044’465 A
`6’055’236 A
`630733234 A
`
`375/225
`
`~~~~~~~~~~~ --
`ngwere '
`1/2000 Thomas .................... ..455/410
`1/2000 Kennedy, 111 et al.
`.455/426
`2/2000 Haansen ...... ..
`.455/426
`ggggg
`....................... .. 455/560
`3,2000 Butcher et a1‘
`4,2000 Nessett et a1‘
`6,2000 Kigo et a1‘
`
`9/2000 chnah
`6,115,390 A
`9/2000 Ota et al. ................. .. 455/553
`6,115,615 A
`6,134,591 A 10/2000 Nickles
`.709/229
`6,137,791 A 10/2000 Frid et al. ................. .. 370/352
`6,141,690 A 10/2000 Weiman
`709/225
`6,151,628 A * 11/2000 Xu et al. ........ ..
`370/466
`6,172,986 B1
`1/2001 Watanuki et al. .
`6,182,076 B1 *
`1/2001 Yu et al. ..................... .. 707/10
`6,192,130 B1
`2/2001 Otway
`6,195,705 B1
`2/2001 Leung ...................... .. 709/245
`6,205,480 B1 *
`3/2001 Broadhurst et al. ....... .. 709/225
`6,223,291 B1
`4/2001 Puhl etal.
`6,233,577 B1
`5/2001 Ramasubramani et al.
`6,243,581 B1
`6/2001 Jawanda ................... .. 455/432
`6,256,300 B1
`7/2001 Ahmed et al.
`6,256,737 B1
`7/2001 Bianco et al.
`6,292,657 B1
`9/2001 Laursen et al.
`6,301,471 B1
`10/2001 Dahm etal.
`6,377,548 B1
`4/2002 Chuah ...................... .. 370/233
`6,427,174 B1
`7/2002 Sitaraman et al. ........ .. 709/245
`6,493,749 B1
`12/2002
`et a1. ............. .. 709/220
`6’594’484 B1
`7/2003 Hltchmgs’ Jr‘
`6,600,734 B1
`7/2003 Gernert et a1.
`6,633,761 B1
`10/2003 Singhal et al. ............ .. 455/436
`6,769,009 B1
`7/2004 Reisman et a1‘
`6,772,331 B1
`g/2004 Hind et a1,
`2001/0001268 A1
`5/2001 Menon et al. ............ .. 370/329
`2001/0012777 A1
`8/2001 Igarashiet a1.
`455/435
`2001/0014917 A1
`8/2001 Ishiyama et a1. ......... .. 709/227
`2001/0016492 A1
`8/2001 Igarashi et a1. ........... .. 455/433
`2001/0017856 A1
`8/2001 Asokan et al. ..... ..
`370/389
`
`888888883138 21
`
`88881 821888“???8.8:..11111111'. 388888
`
`370/401
`9/2001 Alriksson et al. .
`2001/0024443 A1
`2001/0031634 A1 10/2001 Mizutani et al. .......... .. 455/425
`2001/0036224 A1 11/2001 Demello et al. .......... .. 375/220
`2001/0043571 A1
`ll/200l Jang et a1,
`2001/0044305 A1 ll/200l Reddy et a1. ............. .. 455/436
`2001/0048686 A1 12/2001 Takeda et al. ............ .. 370/401
`2002/0010758 A1
`1/2002 Chan ........... ..
`709/218
`
`0 883 266 A2 12/1998
`EP
`0 903 873 A1
`3/1999
`EP
`0 964 599 A2 12/1999
`EP
`0 982 662 A2
`3/2000
`EP
`0 984 639 A2
`3/2000
`EP
`1 009 176 A2
`6/2000
`EP
`1 011 243 A1
`6/2000
`EP
`1 011 278 A2
`6/2000
`EP
`1 131 7744
`11/1999
`JP
`WO 00/36522
`6/2000
`W0
`W0 00/79727
`12/2000
`W0
`W0 01/19097
`3/2001
`W0
`W0 01/50781 A2
`7/2001
`W0
`W0 02/09458 A2
`1/2002
`W0
`W0 02/41587 A2
`5/2002
`W0
`W0 02/065707 A2
`8/2002
`W0
`W0 PcT/Us02/08986
`10/2002
`
`OTHER PUBLICATIONS
`Berger, S‘, et a1" “Pervasive Networking Using BluetoothzA
`Status Report and Future Plans,” Presentation Slides and
`Paper (21 pgs'); IBM Watson Research Center (1999);
`Bluesocket Press Release “Bluesocket Secures 5M in First
`Round Funding from St. Paul Venture Capital and Osborn
`Capital LLC”, (2 pages) [online], [Retrieved 011 NW 19,
`2002)]. Retrieved from the Internet: <URL:http://WWW.
`bluesockeLcQm/newS/funding_htm1>_
`Bluetooth Speci?cation Version 11’ Pan K_.9_. La” Access
`Pro?le‘. 275608 (2001)'
`
`Blue/toothspeci?cationversionwere"1098mm
`
`_
`_
`_
`120423 (2001);
`Blueloolh SPecl?callOn Verslon 11> P a” C‘ Lmk Manager
`Protocol! 184-252 (2001)
`Bluetooth Speci?cation Version 1.1, Part H:]: Host Con
`troller Interface Functional Speci?cation: 536-780 (2001).
`Bluetooth Speci?cation version 11, pm Hi; HC; U53
`Transport Layer‘. '782_796 (2001)~
`
`
`
`2002/0013831 A1 2002/0032855 A1
`
`
`
`1/2002 AS12113 et a1. ............. .. 709/220 3/2002 Neves et al. .............. .. 713/154
`
`
`
`Bluetooth Speci?cation Version Transport Layer 798_818 (2001)
`
`Pan
`
`2002/0032858 A1
`2002/0034298 A1
`2002/0034301 A1
`2002/0035699 A1
`2002/0037708 A1
`2002/0046179 A1
`2002/0046285 A1
`2002/0052965 A1
`2002/0066029 A1
`
`88888888888 21
`2002/0069278 A1
`2002/0069282 A1
`2002/0073240 A1
`2002/0075844 A1
`2002/0085719 A1
`
`713/159
`3/2002 Nakano etal.
`3/2002 Gallagher et al. ........ .. 380/247
`3/2002 Andersson ................ .. 380/270
`3/2002 Crosbie ....... ..
`.
`3/2002 McCann et al. .......... .. 455/411
`4/2002 Kokudo ..................... .. 705/51
`4/2002 Yasushi et a1~
`- 709/228
`5/2002 DoWling ................... .. 709/230
`5/2002 Yi ............................ .. 713/201
`
`‘318881
`28888 Mailman
`6/2002 ForsloW .................... .. 709/225
`6/2002 Reisman
`6/2002 Kokkinen et al. ........ .. 709/249
`6/2002 Hagen ...................... .. 370/351
`7/2002 Crosbie
`
`'
`.
`.
`.'
`Bluetooth Specl?canon Verslon 1'1’ Pa” H~'4~' HCZ UART
`Dal/SP0” Layer! 820-826 (2001)
`_
`Bray 61 211-, “Bluetoothiconnect W1th0ut Cables”, (NeW
`Jersey, Prentice Hall, Mar. 20, 2001), XP002221666, p. 84,
`'H5.7-p. 86,1158.
`Bray et al., “BluetoothiConnect Without Cables”, (New
`Jersey, Prentice Hall, Man 20’ 2001), XP002221667, p_
`115418
`
`“PSPN Solution for CDMAZOOO Networks” <2 Pee)
`[Onhne], [Remeved on Jan- 25’ 20021 RemeVed?Qm [he
`Internet:
`~<URLihttp://WWW.c1sco.con1/Warp/pu‘bl1c/779/
`Servpro/solutlons/wlrelessimoblle/pdsn-html>
`Cisco White Paper, “Cisco Code-Division Multiple Access
`Performance Management”, (15 pgs.) [online], [Retrieved
`
`STARWOOD Ex 1011, page 2
`
`

`
`US 7,042,988 B2
`Page 3
`
`on Jan. 25, 2002]. Retrieved from the Internet: <URL:http://
`WWW.cisco.com/Warp/public/779/servpro/solutions/
`Wirelessimobile/pdsnhtml>.
`ETSI HIPERLAN/2 standard [online], Sep. 2000, (3 pgs.)
`[online], [Retrieved on Jul. 16, 2001]. Retrieved from the
`Internet:
`<URL:http://WWW.etsi.org/technicalactiv/
`hiperlan2.htm>.
`Haartsen, 1., “BluetoothiThe universal radio interface for
`ad hoc, Wireless connectivity”, Ericsson Review No. 3, pp.
`110-117, 1998, XP000783249 ISSN:0014-0171.
`Lough et al., “A Short Tutorial on Wireless LANs and IEEE
`802.11”, (5 pgs.) [online], [Retrieved on Oct. 16, 2001].
`Retrieved from the Internet: <URL:http://WWW.computer.
`org/students/looking/summer97/ieee802.htm>.
`“Medium Access Control (MAC) and Physical (PHY)
`Speci?cations,” MAC Sublayer Management Entity: 123
`128, ANSI/IEEE Std 802.11 (1999).
`MitZel, D., “Overview of 2000 IAB Wireless IntemetWork
`ing Workshop”, (40 pgs.) [online], Dec., 2000 [Retrieved on
`Jan. 25, 2002]. Retrieved from the Internet: <URL:http://
`WWW.ietf.org/rfc/rfc3002.txt?number:3002>.
`Mouly et al., “GSMiThe System for Mobile Communica
`tions” (Palaiseau, France, Sep. 2, 1993), XP002221665, p.
`327-330.
`T. Muller, “Bluetooth White Paper”, Bluetooth Security
`Architecture Version 1.0: 1-33 (1999).
`Perkins, C., “IP Mobility Support”, (67 pgs.) [online], Oct.,
`1996 [Retrieved on Sep. 16, 2002]. Retrieved from the
`Internet:
`<URL:http://WWW.ietf.org/rfc/rfc2002.
`txt?number:2002>.
`“A Practical Approach to Identifying and Tracking Unau
`thoriZed 802.11 Cards and Access Points”, (26 pgs.)
`[online], [Retrieved on Sep. 10, 2001]. Retrieved from the
`Internet: <URL:http:// WWW. interlinknetWorks .com/ graph
`ics/neWs/Wirelessidetectionianditracking.pdf>.
`“RoamAD” (6 pgs.) [online], [Retrieved on Sep. 16, 2002].
`Retrieved from the Internet: <URL:http://WWW.roamad.
`com/roam>.
`R. Schneiderman, “Bluetooth’s sloW daWn: Hype gives Way
`to hard Work as expectations for the mini radio netWork
`encounter nettlesome interoperability issues,” IEEE Spec
`trum: 61-65 (2000).
`Solomon, 1., “Applicability Statement for IP Mobility Sup
`port”, (5 pgs.) [online], Oct., 1996 [Retrieved on Jan. 25,
`2002]. Retrieved from the Internet: <URL:http://WWW.ietf.
`org/rfc/rfc2005 .txt?number:2005 >.
`
`ToWnsley, W., et al., “ Layer TWo Tunneling Protocol
`‘L2TP’,” [online], Aug., 1999 [Retrieved onAug. 29, 2001].
`Retrieved from the Internet: <URL:http://WWW.ietf.org/rfc/
`rfc2661.txt?number:2661>.
`Vernier NetWorks Whitepaper, “Controlling the NetWork
`Edge: Vernier NetWorks and the Enterprise”, (7 pgs.)
`[online], Jun., 2002 [Retrieve on Sep. 10, 2002]. Retrieved
`from the Internet: <URL:WWW.verniemetWorks.com>.
`Vernier NetWorks Whitepaper, “High Availability for Wire
`less Edge Connectivity”, (6 pgs.) [online], Jun., 2002
`[Retrieve on Sep. 10, 2002]. Retrieved from the Internet:
`<URL:WWW.vemiernetWorks.com>.
`Vernier NetWorks Whitepaper, “The Vernier NetWorks Sys
`tem”, (7 pgs.) [online], [Retrieve on Sep. 10, 2002].
`Retrieved from the Internet: <URL:WWW.verniernetWorks.
`com>.
`Vernier NetWorks Whitepaper, “The Three Phases of WLAN
`Deployments”, (2 pgs.) [online], Jun., 2002 [Retrieve on
`Sep. 10, 2002]. Retrieved from the Internet: <URLZWWW.
`verniernetWorks.com>.
`Vernier NetWorks Whitepaper, “Vernier NetWorks: Ensuring
`the Promise of 802.11b NetWorks”, (5 pgs.) [online], Jun.,
`2002 [Retrieve on Sep. 10, 2002]. Retrieved from the
`Internet: <URL:WWW.verniemetWorks.com>.
`Vernier NetWorks Whitepaper, “Wireless Security: Protect
`ing Your 802.11 NetWor ”, (3 pgs.) [online], Jun., 2002
`[Retrieve on Sep. 10, 2002]. Retrieved from the Internet:
`<URL:WWW.vemiernetWorks.com>.
`International Search Report for International Application
`No.: PCT/US01/23145, dated Aug. 16, 2002.
`International Search Report for International Application
`No.: PCT/US02/08986, dated Aug. 19, 2002.
`International Search Report for International Application
`No.: PCT/US01/51306, dated Dec. 3, 2002.
`Bluetooth Speci?cation Version 1.0 B, I 0 Channel Control
`(Nov. 29, 1999), pp. 95-126.
`International Search Report for International Application
`No.: PCT/US01/49547, dated Feb. 28, 2003.
`Of?ce Action for US. Appl. No. 09/911,092 dated Sep. 19,
`2005.
`European Search Report for Application No. 027253228
`dated Aug. 26, 2005.
`International Search Report for International Application
`No.: PCT/US02/30558, dated Mar. 28, 2003.
`
`* cited by examiner
`
`STARWOOD Ex 1011, page 3
`
`

`
`U.S. Patent
`
`May 9, 2006
`
`Sheet 1 0f 10
`
`US 7,042,988 B2
`
`.
`
`N a
`
`'---——--—————----------‘
`
`NP
`
`QwhOmPOmm
`
`o:
`
`352
`
`561
`
`0N2
`
`%
`
`$32
`
`E61
`
`$32 %/
`56¢ 5502
`
`
`
`22 wuSmQ
`
`”, wmmzwg;
`‘w vEo>>Ez a
`
`a
`
`STARWOOD Ex 1011, page 4
`
`

`
`U.S. Patent
`
`May 9,2006
`
`Sheet 2 of 10
`
`US 7,042,988 B2
`
`><>>m:.<0
`
`mm>mmw
`
`om_,
`
`O._.
`
`n_m_._.0m_._.Ow_n_
`
`v_mo>>Ez
`
`o_,_.
`
`wmmoo<
`
`mm44om+zoo
`
`wafl
`
`m4om
`
`mozwam<
`
`amfi
`
`zofi<o:zm:»:<
`
`2m»m>mm:w
`
`mmfl
`
`mm>_m_omm
`
`mmfl
`
`_>_oE
`
`mmm_oo<
`
`w._.Z_On_
`
`Nor
`
`
`
`m:.0_u_
`
`STARWOOD EX 1011, page 5
`
`STARWOOD Ex 1011, page 5
`
`

`
`U.S. Patent
`
`May 9, 2006
`
`Sheet 3 0f 10
`
`US 7,042,988 B2
`
`
`
`mom nmFw
`
`
`
`mNN nEPw
`
`08 nmFw \
`
`
`
`mjOm mZEmQ
`
`................
`
`
`
`mjOm ZO_ww<
`
`N .0?
`
`a
`a a
`a a
`
`STARWOOD Ex 1011, page 6
`
`

`
`U.S. Patent
`
`May 9, 2006
`
`Sheet 4 0f 10
`
`US 7,042,988 B2
`
`
`
`mIOM wZEwO
`
`m .OE
`
`F
`
`JOOOPONE
`komjmw %
`
`a
`
`STARWOOD Ex 1011, page 7
`
`

`
`U.S. Patent
`
`60029:ym
`
`LI.
`
`fl.0
`
`9:240:7SU
`
`2B00
`
`
`
`
`
`
`
`mm...EmEwmcmS_o__on_cozmczmmo
`
`%Eamwoocmci
`
`5__<
`
`m__<
`
`00_.
`
`0.".
`
`__<
`
`__<
`
`
`
`w>m>>Eom
`
`
`
`m>m>>Eom
`
`
`
`m>m>>£om_
`
`9.6930
`
`30930
`
`:o=om:_Q
`
`n:oomm\m=n_>_
`
`mc:mm:_mcm_
`
`£u_;_Emm
`
`>>o__<
`
`;o__<
`
`;o__<
`
`
`
`:o_uo<>o__on_
`
`_.
`
`Eswam
`
`
`
`®_O._Eotu_._®£C_
`
`STARWOOD EX 1011, page 8
`
`STARWOOD Ex 1011, page 8
`
`

`
`U.S. Patent
`
`May 9, 2006
`
`Sheet 6 0f 10
`
`US 7,042,988 B2
`
`023E SEMI;
`
`m8 EEKW $6301 xgll
`
`zobszozm ....... .. zowzo
`
`
`
`
`
`m .OE
`
`>
`
`:02: mm;
`
`azzol
`
`o8 nm?w K zo;o<
`SEOHEE
`
`STARWOOD Ex 1011, page 9
`
`

`
`U.S. Patent
`
`May 9, 2006
`
`Sheet 7 0f 10
`
`US 7,042,988 B2
`
`w .QE
`
`> 62mm
`
`29 :6: E25
`
`STARWOOD Ex 1011, page 10
`
`

`
`U.S. Patent
`
`May 9, 2006
`
`Sheet 8 0f 10
`
`US 7,042,988 B2
`
`NP
`
`I.
`
`h .OE
`
`mmor
`
`nmow
`
`I
`I
`
`I
`
`STARWOOD Ex 1011, page 11
`
`

`
`U.S. Patent
`
`May 9, 2006
`
`Sheet 9 0f 10
`
`US 7,042,988 B2
`
`w .07
`
`STARWOOD Ex 1011, page 12
`
`

`
`U.S. Patent
`
`May 9, 2006
`
`Sheet 10 0f 10
`
`US 7,042,988 B2
`
`IwmE
`
`E0552
`
`Ow
`
`gm
`
`
`
`55mm 5502
`
`mwm
`
`a
`
`M xmosimz
`
`a .GE
`
`55%
`
`Q
`
`STARWOOD Ex 1011, page 13
`
`

`
`US 7,042,988 B2
`
`1
`METHOD AND SYSTEM FOR MANAGING
`DATA TRAFFIC IN WIRELESS NETWORKS
`
`CROSS-REFERENCE TO RELATED
`APPLICATION
`
`This application claims priority to and the bene?t of US.
`Provisional Patent Application Ser. No. 60/325,592, ?led
`Sep. 28, 2001, entitled METHOD AND SYSTEM FOR
`MANAGING DATA TRAFFIC IN WIRELESS NET
`WORKS, the entire disclosure of which is hereby incorpo
`rated by reference.
`
`TECHNICAL FIELD
`
`This invention relates to the ?eld of telecommunications
`and, more particularly, to the management of data traffic in
`wireless networks.
`
`BACKGROUND INFORMATION
`
`Wireless network technology allows a mobile user to
`wirelessly connect to a wired network, such as an enter
`prise’s local area network (LAN) or wide area network
`(WAN), or to another wireless network. Enterprises today
`are rapidly deploying wireless technology, in part because of
`the decreasing cost of mobile devices (e.g., personal digital
`assistants like the Compaq iPAQ by Compaq Corporation of
`Houston, Tex. and laptop computers) and wireless access
`points, and in part because of the increasing ease of instal
`lation and deployment, among other reasons. Such wireless
`network technology can provide LAN and/or WAN service
`to enterprises’ authorized users without wire installation and
`without tethering users to network connections. Wireless
`networks typically include mobile devices and wireless
`access points, which are portals to the wired network.
`Wireless access points are available with varying degrees of
`intelligence and functionality. Some merely act as bridges
`that relay wireless traf?c into a wired network, while others
`provide additional functionality. Typically, simpler access
`points that provide less functionality cost less, but may not
`provide features necessary for operation within an enter
`prise.
`Devices that conform to the IEEE 802.11 standard, a
`family of speci?cations for wireless networks developed by
`a working group of the Institute of Electrical and Electronics
`Engineers (IEEE), are very popular and, particularly, the
`802.11b technology has garnered wide acceptance in many
`businesses as standard networking technology. This tech
`nology e?‘ectively replaces an Ethernet cable from a router
`to a computer with a wireless link. Each 802.11b access
`point can support dozens of mobile devices by sharing 11
`Mbps (megabits per second) of capacity. There can be up to
`three access points working in the same area, and each
`typically has an indoor range of 80 feet at 11 Mbps and 300
`feet at 1 Mbps.
`Despite the freedom and convenience provided by wire
`less networks, establishment of adequate security is a barrier
`to adoption. Wireless networks introduce a series of new
`security problems to organizations because physical con
`nection to a network is not required for access. Wireless
`network signals typically have ranges beyond the physical
`con?nes of a building. Any compatible network adapter or
`access point within the range of an 802.11b access point can
`join the network. Thus, these networks can potentially make
`otherwise proprietary resources available to unauthorized
`users.
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`To offset the susceptibility of wireless networks to unau
`thorized accesses, the 802.11b standard provides a security
`protocol called Wired Equivalent Privacy (WEP). WEP
`attempts to provide a wireless network with a level of
`security and privacy comparable to a wired network by
`providing access control, link privacy and data integrity
`functions. When WEP is enabled on an 802.11b network, a
`secure key is entered into each mobile device and this key
`is used to encrypt and authenticate data.
`Many practitioners view the security provided by WEP as
`inadequate, however, and for many applications users typi
`cally implement additional security measures to supplement
`the de?ciencies of WEP. For example, several independent
`studies have shown that, with relatively minor e?cort, attack
`ers can gain access to a WEP-secured wireless network by
`eavesdropping on the network. The studies have also shown
`that attackers can log on to WEP-enabled networks as bona
`?de users and send data into the networks without being
`detected.
`To overcome WEP’s ?aws, industry organizations have
`recommended using Virtual Private Networks (V PNs) to
`provide security for wireless networks. Unfortunately, the
`currently available VPNs introduce additional implementa
`tion challenges. For example, some implementations require
`access points to be directly wired to a single VPN server
`(normally located in a central equipment room). VPNs
`typically provide only binary access to the organization’s
`network, meaning a mobile device user can either have a
`complete access to the protected network or none at all.
`Further, a single 11 Mbps 802.11b access point can have an
`effective throughput of approximately three times more than
`the capacity of a T1 connection, which is the connection
`typically supported by some existing VPN servers. Thus,
`wireless network users might overload the VPN server,
`resulting in poor performance for both the wireless network
`and mobile device users.
`
`SUMMARY OF THE INVENTION
`
`Systems and methods according to the invention can be
`used to facilitate the secure integration of wireless capability
`provided by wireless access points into an enterprise com
`puter network. A gateway server is interposed between one
`or more wireless access points and protected (e.g., wired)
`networks. That gateway server provides security and inte
`gration functions, for example, authentication, access con
`trol, link privacy, link integrity, and bandwidth metering in
`various embodiments. Use of such a gateway server allows
`substantial control to be gained over network access even
`with the use of relatively simple (and inexpensive) access
`points. While the invention is particularly suited to the
`popular IEEE 802.11 wireless communication protocol,
`wireless access points are available that use a variety of
`present protocols, such as variations of 802.11 (e.g.,
`802.11a, 802.11b, 802.11g), Bluetooth, HiperLAN2, and
`802.1x. The invention would be equally useful with other
`protocols and interfaces available now and in the future.
`In one implementation, the present invention can address
`de?ciencies in the WEP and VPN technologies by providing
`differential levels of access based on a category assigned to
`the user, rather than the binary con?guration of according a
`user either full access to the organization’s network or none
`at all. The present invention can limit the bandwidth capac
`ity of users, for example, so the 11 Mbps of capacity at each
`802.11b access point cannot easily be saturated by a single
`user, leaving all other users stalled.
`
`STARWOOD Ex 1011, page 14
`
`

`
`US 7,042,988 B2
`
`3
`In general, in one aspect, a gateway server receives a
`request to access the protected network. This request typi
`cally comes from a mobile device operated by a user. The
`request is communicated from the mobile device to a
`wireless access point, and relayed by the wireless access
`point to the gateway server. The request might be an explicit
`request for access, and can include an identi?er and authen
`tication information (e.g., a PIN, password, digital certi?
`cate, encryption key, digital code, or some combination).
`The request might be an implicit request, such as a request
`to access network resources, a web page request, and so on.
`Since the gateway server manages access control and
`security in a single integrated con?guration, neither the
`mobile device nor the access points need to be intelligent to
`carry out the sophisticated access control and security func
`tions to connect with wireless networks. Moreover, any
`changes in the networks, mobile devices, and access points
`do not result in signi?cant changes, such as additions,
`modi?cations, or replacements, to the gateway server. In one
`implementation, the gateway server can be con?gured by a
`web-based interface, so that con?guration changes can be
`incorporated in the gateway server by merely changing the
`parameters using the web-based interface.
`In some implementations, an authentication subsystem of
`the gateway server authenticates the user of the mobile
`device. This is preferably accomplished by accessing an
`external authentication server (e.g., a RADIUS, LDAP, or
`NTLM server). Enterprises typically use such servers in the
`operation of their networks. The use of an already operating
`external authentication server simpli?es network adminis
`tration. The gateway server (and/ or the external authentica
`tion server) can also authenticate a user that was previously
`authenticated via the same or a different gateway server
`without requiring re-communication of authentication infor
`mation. A user is free to roam between different access
`points in wireless networks without having to terminate
`open connections. In another embodiment, the user can be
`authenticated using an authentication database within the
`gateway server, instead of or in combination with accessing
`an external authentication server. Because the authentication
`process is conducted solely by the gateway server, use of an
`internal or external authentication server is irrelevant and
`transparent to the user.
`In some implementations, after the authentication pro
`cess, the authenticated user of the mobile device can estab
`lish a VPN connection with the gateway server according to
`the Point-to-Point Protocol (PPTP) or Internet Protocol
`Security (IPSec) protocol. The VPN connection can provide
`additional security measures for the user and the protected
`network.
`In one embodiment, the gateway server can passively
`monitor an authentication process when a user makes a
`request to authenticate to a server. If the user successfully
`authenticates, the gateway server assigns a role to the user
`based on the server with which the user authenticated. In one
`example, the gateway server can easily integrate with
`Microsoft NT and/ or Windows environment. A user already
`registered and authenticated in such environment does not
`need to authenticate separately to the gateway server, since
`the gateway server assigns the role when the NT and/or
`Windows server accepted the user.
`In some implementations, the user can authenticate via a
`secure web page without requiring additional software. The
`use of a secure web page can protect the wireless network
`from illicit monitoring. The gateway server receives identi
`?er and authentication information from the user through a
`secure web page. The identi?er and authentication informa
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`tion might be associated with a user of the mobile device, the
`mobile device itself, a smart card, an authentication token,
`and so on. For purposes of this discussion, authenticating the
`mobile device is understood to include any one or a com
`bination of suitable authentication techniques for authenti
`cating a device and/or a user of a device, depending on
`implementation. Examples of an identi?er include one or a
`combination of username, e-mail address, and unique name.
`Examples of authentication information include one or a
`combination of a personal identi?cation number (PIN),
`password, digital certi?cate, encryption key, and digital
`code. As discussed above, the user can use the same iden
`ti?cation and authentication information used to access the
`protected resource in the wired environment.
`Additionally, the gateway server can detect unauthoriZed
`access points by monitoring network traf?c. In particular, the
`gateway server detects the presence of the unauthoriZed
`access points by monitoring SNMP, MAC addresses, and
`802.11 DS Layer signals and characteristics of network
`tra?ic on both the protected and unprotected sides of the
`gateway server.
`In one exemplary implementation, visitors to a corpora
`tion may be allowed to access the Internet at a low data rate
`by entering their e-mail address. Employees from other
`of?ces may be required to enter a usemame and password to
`access the Internet and resources permitted by their home
`of?ce server. Employees working with highly sensitive data
`may be subject to a very high level of security available from
`the gateway server that utiliZes certi?cates, smart cards
`and/or secure token technologies.
`In one embodiment, before the user makes a request to
`access the protected network, a role is previously de?ned in
`the gateway server for the user. A role also can be assigned
`based on the attributes of a user as provided by the external
`authentication server.
`In one embodiment, a role de?ner in the gateway server
`de?nes roles and assigns them to users. The role de?ner can
`specify network resources and degree of access to the
`protected network, including connection bandwidth limits.
`The role de?ner can also specify a tunneling protocol (e.g.
`IPSec or PPTP) associated with a role. Thus, for example,
`once a role is assigned to the user, the user’s bandwidth
`capacity is limited according to the assigned role. Access
`privileges can be differentiated for authoriZed users based on
`roles, instead of the commonly used “all or nothing” access.
`A particular role can be de?ned with different privileges in
`multiple resource locations. For example, an “engineer” role
`can be de?ned with full access to engineering department
`servers, but limited access to ?nance department servers.
`Once the user is authenticated and assigned a role, an
`access controller in the gateway server provides access to
`the protected network based on the assigned role. A role
`includes one or more policies specifying the scope of
`performances permitted for the user. For example, in one
`embodiment, policies can include action, service, connec
`tion direction (e.g., to or from protected network, or both),
`and destination (e.g., resources in the protected network).
`The access controller evaluates each of the policies in the
`role to determine whether the services requested by the user
`should be allowed. If elements in a policy match the user’s
`requests, then the requested actions are performed. If a
`match is not found even after checking all the policies, then
`“inherited” roles can be checked for the user.
`For example, every employee can share the role of staff.
`The staff role can have a set of default policies, or privileges
`granted to everyone in the organization. A change to the
`inherited role need not be repeated in the other speci?c roles,
`
`STARWOOD Ex 1011, page 15
`
`

`
`US 7,042,988 B2
`
`5
`since these changes will apply to all roles that inherit the
`change. If no match is found even with the default policies,
`the user is disallowed from performing the requested ser
`vices.
`In one embodiment, one or more additional gateway
`servers are interposed between the wireless network and the
`protected network to provide a fail-over con?guration. If a
`?rst gateway server (also referred to as the primary server)
`fails, another gateway server (also referred to as the back-up
`server) receives the access request in the place of the ?rst
`gateway server. In one implementation, there are more than
`one additional (or back-up) gateway servers. In this con
`?guration, all set up information, additions and changes to
`the primary server are automatically propagated across and
`shared in real time with the back-up servers. The primary
`and the back-up gateway servers are connected via a fail
`over interface. While the primary server is actively manag
`ing the user and the wireless network, the back-up servers
`remain idle. Concurrently, the back-up servers monitor a
`“heartbeat signal” of the primary server. If the back-up
`servers do not detect a certain number of heartbeats from the
`primary server in a speci?ed amount of time, a fail-over
`occurs and one of the back-up servers takes over the role of
`the primary server and receives the requests from the user,
`without requiring new set-up and con?guration.
`In another embodiment, multiple gateway servers are
`interposed between different wireless networks and pro
`tected networks. These gateway servers replicate the con
`?guration information of a single gateway server initially in
`communication with the mobile device. Such replication
`among the multiple gateway servers can be useful in admin
`istering a large-scale wireless network in that con?guration
`changes are propagated from the single gateway server.
`In some implementations, multiple gateway servers can
`be interposed between the protected network and unpro
`tected wireless local area networks to create a “mesh net
`wor ” architecture of gateway servers. The mesh network
`architecture can facilitate the seamless roaming of a mobile
`device from one gateway server to another

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket