US20160373933A1 - Wireless network having multiple communication allowances - Google Patents
Wireless network having multiple communication allowances Download PDFInfo
- Publication number
- US20160373933A1 US20160373933A1 US15/253,465 US201615253465A US2016373933A1 US 20160373933 A1 US20160373933 A1 US 20160373933A1 US 201615253465 A US201615253465 A US 201615253465A US 2016373933 A1 US2016373933 A1 US 2016373933A1
- Authority
- US
- United States
- Prior art keywords
- access
- level
- users
- wireless network
- class
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Definitions
- Wireless networks are well-known, and may be based, for example, on the 802.11 standard. Because the contents of the wireless network can be received by anyone with wireless access, security may be achieved through encryption of the stream. Perhaps with an encryption code can/ap into the network. Those without the encryption code, however, simply cannot decode the wireless stream. In addition, standard network protocols may be used, so that not only the encryption code, but also a network login, is necessary.
- the present application describes a wireless network, defining a plurality of different classes of service, where the different classes of service include at least a first class of service that includes a first set of permissions for access to resources, and a second class of service which includes a second set of permissions of access to resources.
- FIG. 1 shows a basic diagram of the networks described herein.
- Wireless networks have been used for other things besides secure file transfer.
- Internet cafes and “wireless hot spots” may include the capability of communication to a user's personal laptop which is equipped with a wireless card.
- This may use a network key for the encryption of the word “public”, or a network key which is given to users who pay for the service or pay for a drink or food, or without any network key at all.
- Certain areas such as hotel rooms are often wireless enabled.
- the communication is typically or totally on, or totally off; that is either the user is allowed to receive wireless Internet, or the user is blocked from all communications.
- the present system teaches a network with multiple levels of capability, depending on the access credentials possessed by the user.
- FIG. 1 shows this being carried out using multiple network cards or NICs.
- the same effect can be obtained with a single NIC.
- the network cards are wireless, using one of the features of IEEE 802.11 wireless communication protocols.
- the first class of users are allowed file access to files and information from the server. These users may be given the encryption key, here for the first NIC 100 here shown as ABCDEF. These users may be allowed the highest level of access to resources. As conventional users who have the complete set of credentials, they are allowed unlimited upload and download, and full file access (that is allowed to non-administrator users). In addition, these users may be allowed the maximum upload and download speeds which is given to network users, and to receive all different kinds of Internet and files from all sources.
- the amount of access which is provided to these users may be assigned by the operating system which drives the NICs. For example, if Windows XP is used as the operating system, it may assign NIC 100 with unlimited file access.
- a second class of users shown as user 2 do not have the credentials, here the encryption key, for the network card 100 , and hence use the encryption key “pubic” and thereby can only communicate with the network card No. 2 shown as 110 . Alternatively, these same users may communicate using no encryption key at all.
- the network card 110 allows only some subset of the operations that are allowed by the network card 100 .
- the user 2 may receive Internet only, and no file access. They may be allowed to print.
- the upload and download speeds may be limited or severely limited; for example, the Internet may be limited to 1M download speeds and 100K of upload speed.
- This system as described above may be usable in an office environment. For example, users who are actually members of the office obtain file access, while visitors only receive print and Internet access.
- the user 1 may pay a higher fee than the user 2 .
- user 2 may pay only for limited Internet, while user 1 may pay for access to resources such as video over IP, and higher download speeds from the Internet.
- a third class of users shown as user 3 may be defined. These users communicate only to NIC 120 . Note that while this describes users 1 , 2 and 3 , any subset of these users may be used, for example a system may be configured which only communicates with user 1 and user 3 .
- the NIC No. 3 is shown as having no encryption code whatsoever.
- User 3 is limited even further. User 3 may receive only commercial parts of the Internet. In the office environment, this may limit the Internet to web pages describing the office and/or certain intranet sites. In a pay for internet environment, this may describe the “free” user, who may only receive certain content. User 3 may also receive a severely restricted bandwidth and/or only a limited quantity of information. For example, the user 3 may be assigned a token which allows them only to receive for example total of 1 megabytes of download and only to upload 100 Kilobytes of upload. This even further limits the user 3 .
- the different users in their different classes have different levels of file access, and resource access, resource speed and resource amount.
- FIG. 1 shows this being carried out with three different network cards over the same airspace.
- the three different networks may be carried out as part of a single network card; shown as network card 130 .
- this may include three network resources which operate on the single card.
- the three different kinds of resources may be carried out in software, for example this may be carried out by three different network resource allowances within the software that runs the network card or within the server 99 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of access to the network resources. One without the key is granted lesser access, e.g., less total bandwidth, less bandwidth speed, no access to files or the like.
Description
- This Application is a continuation of application Ser. No. 13/667,690 filed Nov. 2, 2012, pending, which is a continuation of application Ser. No. 12/345,565 filed Dec. 29, 2008, now issued as U.S. Pat. No. 8,312,286, which is a continuation of application Ser. No. 10/800,472 filed Mar. 15, 2004, now issued as U.S. Pat. No. 7,490,348, and claims priority to U.S. Provisional Application No. 60/454,694 filed Mar. 14, 2003. The entire disclosures of the above-listed Applications are hereby incorporated by specific reference thereto.
- Wireless networks are well-known, and may be based, for example, on the 802.11 standard. Because the contents of the wireless network can be received by anyone with wireless access, security may be achieved through encryption of the stream. Anyone with an encryption code can/ap into the network. Those without the encryption code, however, simply cannot decode the wireless stream. In addition, standard network protocols may be used, so that not only the encryption code, but also a network login, is necessary.
- The present application describes a wireless network, defining a plurality of different classes of service, where the different classes of service include at least a first class of service that includes a first set of permissions for access to resources, and a second class of service which includes a second set of permissions of access to resources.
- These and other aspects will now be described in detail with reference to the accompanying drawings, in which:
-
FIG. 1 shows a basic diagram of the networks described herein. - Wireless networks have been used for other things besides secure file transfer. For example, Internet Cafes and “wireless hot spots” may include the capability of communication to a user's personal laptop which is equipped with a wireless card. This may use a network key for the encryption of the word “public”, or a network key which is given to users who pay for the service or pay for a drink or food, or without any network key at all. Certain areas such as hotel rooms are often wireless enabled. However, the communication is typically or totally on, or totally off; that is either the user is allowed to receive wireless Internet, or the user is blocked from all communications.
- The present system teaches a network with multiple levels of capability, depending on the access credentials possessed by the user.
-
FIG. 1 shows this being carried out using multiple network cards or NICs. However, the same effect can be obtained with a single NIC. Preferably the network cards are wireless, using one of the features of IEEE 802.11 wireless communication protocols. - Different classes of users may be assigned. The first class of users, shown as user 1, are allowed file access to files and information from the server. These users may be given the encryption key, here for the
first NIC 100 here shown as ABCDEF. These users may be allowed the highest level of access to resources. As conventional users who have the complete set of credentials, they are allowed unlimited upload and download, and full file access (that is allowed to non-administrator users). In addition, these users may be allowed the maximum upload and download speeds which is given to network users, and to receive all different kinds of Internet and files from all sources. - For example, the amount of access which is provided to these users may be assigned by the operating system which drives the NICs. For example, if Windows XP is used as the operating system, it may assign NIC 100 with unlimited file access.
- A second class of users shown as user 2 do not have the credentials, here the encryption key, for the
network card 100, and hence use the encryption key “pubic” and thereby can only communicate with the network card No. 2 shown as 110. Alternatively, these same users may communicate using no encryption key at all. - The
network card 110 allows only some subset of the operations that are allowed by thenetwork card 100. For example, the user 2 may receive Internet only, and no file access. They may be allowed to print. In addition, the upload and download speeds may be limited or severely limited; for example, the Internet may be limited to 1M download speeds and 100K of upload speed. - This system as described above may be usable in an office environment. For example, users who are actually members of the office obtain file access, while visitors only receive print and Internet access.
- Another contemplated use is in pay-for-Internet use. The user 1 may pay a higher fee than the user 2. For example, user 2 may pay only for limited Internet, while user 1 may pay for access to resources such as video over IP, and higher download speeds from the Internet.
- In addition, a third class of users shown as
user 3 may be defined. These users communicate only to NIC 120. Note that while this describesusers 1, 2 and 3, any subset of these users may be used, for example a system may be configured which only communicates with user 1 anduser 3. The NIC No. 3 is shown as having no encryption code whatsoever. -
User 3 is limited even further.User 3 may receive only commercial parts of the Internet. In the office environment, this may limit the Internet to web pages describing the office and/or certain intranet sites. In a pay for internet environment, this may describe the “free” user, who may only receive certain content.User 3 may also receive a severely restricted bandwidth and/or only a limited quantity of information. For example, theuser 3 may be assigned a token which allows them only to receive for example total of 1 megabytes of download and only to upload 100 Kilobytes of upload. This even further limits theuser 3. - As described above, the different users in their different classes have different levels of file access, and resource access, resource speed and resource amount.
-
FIG. 1 shows this being carried out with three different network cards over the same airspace. Alternatively, the three different networks may be carried out as part of a single network card; shown asnetwork card 130. For example, this may include three network resources which operate on the single card. - Alternatively, the three different kinds of resources may be carried out in software, for example this may be carried out by three different network resource allowances within the software that runs the network card or within the
server 99. - Other implementations are within the disclosed embodiment.
Claims (20)
1. A network transmitting system comprising:
a first device, transmitting a first wireless network stream with a first network name identifier, said first wireless network stream being accessible with a first key that provides a first level of server and/or Internet access to a first class of users using said first wireless network stream;
a second device, transmitting a second wireless network stream with a second network name identifier, said second wireless network stream being accessible with a second key that provides a second level of said server and/or Internet access to a second class of users using said second wireless network stream;
said first and second wireless network streams having coverage areas that overlap;
said first key being different from said second key;
said first level of access being different from said second level of access;
and wherein the level of access provided to at least one class of users does not allow access to all server files.
2. A system as in claim 1 , wherein each class of users is given access to the Internet and the Internet access speed given to one class of users is different from the Internet access speed given to the other class of users.
3. A system as in claim 1 , wherein one level of access allows access to different intranet resources than another level of access.
4. A system as in claim 1 , wherein each wireless network stream is compliant with IEEE 802.11.
5. A system as in claim 1 , wherein each class of users is given access to some server files but neither class of users is given access to all server files.
6. A system as in claim 4 , wherein the first network name identifier and the second network name identifier are different.
7. A system as in claim 1 , wherein said first networking device and said second networking device are in one device and the coverage areas of the network streams substantially overlap.
8. A network transmitting system, comprising:
a first device, transmitting a first wireless network stream with a first network name identifier, said first wireless network stream being accessible with a first key that provides a first level of server and/or Internet access to a first class of users using said first wireless network stream;
a second device, transmitting a second wireless network stream with a second network name identifier, said second wireless network stream being accessible with a second key that provides a second level of said server and/or Internet access to a second class of users using said second wireless network stream;
said first and second wireless network streams having coverage areas that overlap;
said first key being different from said second key;
said first level of access being different from said second level of access;
wherein the level of access provided to at least one class of users does not allow access to all server files;
and wherein the Internet access speed given to one class of users is different from the Internet access speed given to another class of users.
9. A system as in claim 8 , wherein the first network name identifier and the second network name identifier are different, wherein one level of access allows access to different intranet resources than another level of access, and wherein each wireless network stream is compliant with IEEE 802.11.
10. A system as in claim 8 , wherein one level of access allows access to different Internet resources than another level of access.
11. A system as in claim 8 , wherein each class of users is given access to some server files but neither class of users is given access to all server files.
12. A system as in claim 8 , wherein the first network name identifier and the second network name identifier are different, wherein each wireless network stream is compliant with IEEE 802.11, and wherein the coverage areas of the wireless network streams substantially overlap.
13. A system as in claim 8 , wherein each network is accessed by its respective key without requiring any further network login.
14. A network transmitting system, comprising:
a first device, transmitting a first wireless network stream, said first wireless network stream being accessible with a first key that provides a first level of server and/or Internet access to a first class of users using said first wireless network stream;
a second device, transmitting a second wireless network stream, said second wireless network stream being accessible with a second key that provides a second level of said server and/or Internet access to a second class of users using said second wireless network stream;
said first and second wireless network streams having coverage areas that overlap;
said first key being different from said second key; and
said first level of access being different from said second level of access.
15. A system as in claim 14 , wherein the level of access provided to at least one class of users does not allow access to all server files; wherein said first level of access allows access to different Internet resources than said second level of access; and wherein one level of access allows access to different intranet resources than another level of access.
16. A system as in claim 14 , wherein the first network name identifier and the second network name identifier are different, and wherein each wireless network stream is compliant with IEEE 802.11.
17. A system as in claim 14 , wherein each class of users is given access to some server files but neither class of users is given access to all server files.
18. A system as in claim 14 , wherein said first networking device and said second networking device are in one device.
19. A system as in claim 14 , wherein each class of users is given access to the Internet and the Internet access speed given to one class of users is different from the Internet access speed given to another class of users.
20. A system as in claim 14 , wherein the level of access provided to at least one class of users does not allow access to all server files; wherein said first level of access allows access to different Internet resources than said second level of access; wherein one level of access allows access to different intranet resources than another level of access; wherein the first network name identifier and the second network name identifier are different; and wherein each wireless network stream is compliant with IEEE 802.11.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/253,465 US20160373933A1 (en) | 2003-03-17 | 2016-08-31 | Wireless network having multiple communication allowances |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US45469403P | 2003-03-17 | 2003-03-17 | |
US10/800,472 US7490348B1 (en) | 2003-03-17 | 2004-03-15 | Wireless network having multiple communication allowances |
US12/345,565 US8312286B2 (en) | 2003-03-17 | 2008-12-29 | Wireless network having multiple communication allowances |
US201213667690A | 2012-11-02 | 2012-11-02 | |
US15/253,465 US20160373933A1 (en) | 2003-03-17 | 2016-08-31 | Wireless network having multiple communication allowances |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US201213667690A Continuation | 2003-03-17 | 2012-11-02 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160373933A1 true US20160373933A1 (en) | 2016-12-22 |
Family
ID=40342971
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/800,472 Expired - Fee Related US7490348B1 (en) | 2003-03-17 | 2004-03-15 | Wireless network having multiple communication allowances |
US12/345,565 Expired - Fee Related US8312286B2 (en) | 2003-03-17 | 2008-12-29 | Wireless network having multiple communication allowances |
US13/748,523 Expired - Fee Related US8583935B2 (en) | 2003-03-17 | 2013-01-23 | Wireless network having multiple communication allowances |
US15/253,465 Abandoned US20160373933A1 (en) | 2003-03-17 | 2016-08-31 | Wireless network having multiple communication allowances |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/800,472 Expired - Fee Related US7490348B1 (en) | 2003-03-17 | 2004-03-15 | Wireless network having multiple communication allowances |
US12/345,565 Expired - Fee Related US8312286B2 (en) | 2003-03-17 | 2008-12-29 | Wireless network having multiple communication allowances |
US13/748,523 Expired - Fee Related US8583935B2 (en) | 2003-03-17 | 2013-01-23 | Wireless network having multiple communication allowances |
Country Status (1)
Country | Link |
---|---|
US (4) | US7490348B1 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7490348B1 (en) | 2003-03-17 | 2009-02-10 | Harris Technology, Llc | Wireless network having multiple communication allowances |
JP2006014035A (en) * | 2004-06-28 | 2006-01-12 | Toshiba Corp | Storage medium processing method, storage medium processor and program |
US8266681B2 (en) * | 2006-08-29 | 2012-09-11 | Ca, Inc. | System and method for automatic network logon over a wireless network |
US8780799B2 (en) * | 2011-05-02 | 2014-07-15 | Verizon Patent And Licensing Inc. | Handling multiple voice over internet protocol (VoIP) calls via a single bearer |
US9161219B2 (en) | 2012-06-22 | 2015-10-13 | Guest Tek Interactive Entertainment Ltd. | Authorizing secured wireless access at hotspot having open wireless network and secure wireless network |
WO2014171232A1 (en) * | 2013-04-19 | 2014-10-23 | オリンパスイメージング株式会社 | Information communication apparatus, information communication method and information communication program |
US10158695B1 (en) * | 2015-01-30 | 2018-12-18 | KOGM, Inc. | System and method for polling via proximal awareness |
US9900162B2 (en) | 2015-11-11 | 2018-02-20 | At&T Mobility Ii Llc | System and method for wireless network management |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020022483A1 (en) * | 2000-04-18 | 2002-02-21 | Wayport, Inc. | Distributed network communication system which allows multiple wireless service providers to share a common network infrastructure |
US20020075844A1 (en) * | 2000-12-15 | 2002-06-20 | Hagen W. Alexander | Integrating public and private network resources for optimized broadband wireless access and method |
US20030084056A1 (en) * | 2001-10-26 | 2003-05-01 | Deanna Robert | System for development, management and operation of distributed clients and servers |
US20030140256A1 (en) * | 2002-01-24 | 2003-07-24 | Swisscom Mobile Ag | Wireless local communication network, access control method for a wireless local communication network and devices suitable therefor |
US7362865B2 (en) * | 2002-04-15 | 2008-04-22 | Hewlett-Packard Development Company, L.P. | Wireless network system |
US7496751B2 (en) * | 2001-10-29 | 2009-02-24 | Sun Microsystems, Inc. | Privacy and identification in a data communications network |
US7509687B2 (en) * | 2002-03-16 | 2009-03-24 | Trustedflow Systems, Inc. | Remotely authenticated operation method |
Family Cites Families (165)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7013133B2 (en) | 2001-12-21 | 2006-03-14 | Intel Corporation | Portable communication device that may permit one wireless network to communicate with another wireless networks and method therefor |
US5274841A (en) | 1990-10-29 | 1993-12-28 | International Business Machines Corporation | Methods for polling mobile users in a multiple cell wireless network |
US5272754A (en) * | 1991-03-28 | 1993-12-21 | Secure Computing Corporation | Secure computer interface |
US5960344A (en) | 1993-12-20 | 1999-09-28 | Norand Corporation | Local area network having multiple channel wireless access |
WO1995019672A2 (en) | 1994-01-13 | 1995-07-20 | Bankers Trust Company | Cryptographic system and method with key escrow feature |
US5864683A (en) | 1994-10-12 | 1999-01-26 | Secure Computing Corporartion | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights |
CA2138302C (en) | 1994-12-15 | 1999-05-25 | Michael S. Fortinsky | Provision of secure access to external resources from a distributed computing environment |
US5802320A (en) | 1995-05-18 | 1998-09-01 | Sun Microsystems, Inc. | System for packet filtering of data packets at a computer network interface |
US5659787A (en) | 1995-05-26 | 1997-08-19 | Sensormatic Electronics Corporation | Data communication network with highly efficient polling procedure |
US5696898A (en) | 1995-06-06 | 1997-12-09 | Lucent Technologies Inc. | System and method for database access control |
US5749075A (en) | 1995-06-06 | 1998-05-05 | Interactive Media Works, L.L.C. | Method for providing prepaid internet access and/or long distance calling including the distribution of specialized calling cards |
US5774869A (en) | 1995-06-06 | 1998-06-30 | Interactive Media Works, Llc | Method for providing sponsor paid internet access and simultaneous sponsor promotion |
US5678041A (en) | 1995-06-06 | 1997-10-14 | At&T | System and method for restricting user access rights on the internet based on rating information stored in a relational database |
US5708780A (en) | 1995-06-07 | 1998-01-13 | Open Market, Inc. | Internet server access control and monitoring systems |
US5850517A (en) | 1995-08-31 | 1998-12-15 | Oracle Corporation | Communication link for client-server having agent which sends plurality of requests independent of client and receives information from the server independent of the server |
US5826188A (en) | 1995-12-07 | 1998-10-20 | Motorola, Inc. | Method and apparatus for handing off calls between differing radio telecommunication networks |
US6615251B1 (en) * | 1995-12-11 | 2003-09-02 | John R. Klug | Method for providing node targeted content in an addressable network |
US5784566A (en) | 1996-01-11 | 1998-07-21 | Oracle Corporation | System and method for negotiating security services and algorithms for communication across a computer network |
US6021433A (en) | 1996-01-26 | 2000-02-01 | Wireless Internet, Inc. | System and method for transmission of data |
US7035914B1 (en) | 1996-01-26 | 2006-04-25 | Simpleair Holdings, Inc. | System and method for transmission of data |
US5781550A (en) | 1996-02-02 | 1998-07-14 | Digital Equipment Corporation | Transparent and secure network gateway |
US5918018A (en) | 1996-02-09 | 1999-06-29 | Secure Computing Corporation | System and method for achieving network separation |
US6088451A (en) | 1996-06-28 | 2000-07-11 | Mci Communications Corporation | Security system and method for network element access |
EP0823694A1 (en) * | 1996-08-09 | 1998-02-11 | Koninklijke KPN N.V. | Tickets stored in smart cards |
DE19633802A1 (en) * | 1996-08-22 | 1998-02-26 | Philips Patentverwaltung | Method and system for writing key information |
US5950195A (en) | 1996-09-18 | 1999-09-07 | Secure Computing Corporation | Generalized security policy management system and method |
US6751221B1 (en) | 1996-10-04 | 2004-06-15 | Kabushiki Kaisha Toshiba | Data transmitting node and network inter-connection node suitable for home network environment |
US5745884A (en) | 1996-10-21 | 1998-04-28 | Mobile Area Networks, Inc. | System and method for billing data grade network use on a per connection basis |
US6167426A (en) | 1996-11-15 | 2000-12-26 | Wireless Internet, Inc. | Contact alerts for unconnected users |
US5835727A (en) | 1996-12-09 | 1998-11-10 | Sun Microsystems, Inc. | Method and apparatus for controlling access to services within a computer network |
US6073178A (en) | 1996-12-09 | 2000-06-06 | Sun Microsystems, Inc. | Method and apparatus for assignment of IP addresses |
US5848233A (en) | 1996-12-09 | 1998-12-08 | Sun Microsystems, Inc. | Method and apparatus for dynamic packet filter assignment |
US5889958A (en) | 1996-12-20 | 1999-03-30 | Livingston Enterprises, Inc. | Network access control system and process |
US5987611A (en) | 1996-12-31 | 1999-11-16 | Zone Labs, Inc. | System and methodology for managing internet access on a per application basis for client computers connected to the internet |
US6233686B1 (en) | 1997-01-17 | 2001-05-15 | At & T Corp. | System and method for providing peer level access control on a network |
US6542497B1 (en) | 1997-03-11 | 2003-04-01 | Verizon Services Corp. | Public wireless/cordless internet gateway |
US6247054B1 (en) | 1997-03-24 | 2001-06-12 | Nortel Networks Limited | Method and apparatus for redirecting packets using encapsulation |
US5915093A (en) | 1997-04-24 | 1999-06-22 | Howard Berlin | Computer network debit disk used for prepayment to transfer information from a central computer |
US6314525B1 (en) | 1997-05-13 | 2001-11-06 | 3Com Corporation | Means for allowing two or more network interface controller cards to appear as one card to an operating system |
US6070243A (en) | 1997-06-13 | 2000-05-30 | Xylan Corporation | Deterministic user authentication service for communication network |
US6112239A (en) | 1997-06-18 | 2000-08-29 | Intervu, Inc | System and method for server-side optimization of data delivery on a distributed computer network |
US6092200A (en) | 1997-08-01 | 2000-07-18 | Novell, Inc. | Method and apparatus for providing a virtual private network |
GB9717868D0 (en) | 1997-08-23 | 1997-10-29 | Philips Electronics Nv | Wireless network |
US5987430A (en) | 1997-08-28 | 1999-11-16 | Atcom, Inc. | Communications network connection system and method |
US6460084B1 (en) | 1997-08-28 | 2002-10-01 | Cisco Technology, Inc. | Forced network portal |
US6154775A (en) | 1997-09-12 | 2000-11-28 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules |
US6223209B1 (en) | 1997-09-30 | 2001-04-24 | Ncr Corporation | Distributed world wide web servers |
US6158008A (en) | 1997-10-23 | 2000-12-05 | At&T Wireless Svcs. Inc. | Method and apparatus for updating address lists for a packet filter processor |
JP2996937B2 (en) * | 1997-12-01 | 2000-01-11 | 三菱電機株式会社 | server |
US6038597A (en) | 1998-01-20 | 2000-03-14 | Dell U.S.A., L.P. | Method and apparatus for providing and accessing data at an internet site |
US6181684B1 (en) * | 1998-02-02 | 2001-01-30 | Motorola, Inc. | Air interface statistical multiplexing in communication systems |
US6233618B1 (en) | 1998-03-31 | 2001-05-15 | Content Advisor, Inc. | Access control of networked data |
US6779118B1 (en) | 1998-05-04 | 2004-08-17 | Auriq Systems, Inc. | User specific automatic data redirection system |
JP3995338B2 (en) * | 1998-05-27 | 2007-10-24 | 富士通株式会社 | Network connection control method and system |
US6377990B1 (en) | 1998-06-15 | 2002-04-23 | Lodgenet Entertainment Corporation | System for providing internet access from locations different from those for which the user's software was configured |
US6044349A (en) * | 1998-06-19 | 2000-03-28 | Intel Corporation | Secure and convenient information storage and retrieval method and apparatus |
US6219790B1 (en) | 1998-06-19 | 2001-04-17 | Lucent Technologies Inc. | Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types |
US6345043B1 (en) | 1998-07-06 | 2002-02-05 | National Datacomm Corporation | Access scheme for a wireless LAN station to connect an access point |
US6311275B1 (en) | 1998-08-03 | 2001-10-30 | Cisco Technology, Inc. | Method for providing single step log-on access to a differentiated computer network |
US6304973B1 (en) * | 1998-08-06 | 2001-10-16 | Cryptek Secure Communications, Llc | Multi-level security network system |
US6687732B1 (en) | 1998-09-28 | 2004-02-03 | Inktomi Corporation | Adaptive traffic bypassing in an intercepting network driver |
US6119160A (en) | 1998-10-13 | 2000-09-12 | Cisco Technology, Inc. | Multiple-level internet protocol accounting |
US6856676B1 (en) * | 1998-10-15 | 2005-02-15 | Alcatel | System and method of controlling and managing voice and data services in a telecommunications network |
US6185612B1 (en) | 1998-10-29 | 2001-02-06 | Novell, Inc. | Secure distribution and use of weighted network topology information |
US6226677B1 (en) | 1998-11-25 | 2001-05-01 | Lodgenet Entertainment Corporation | Controlled communications over a global computer network |
US6466976B1 (en) | 1998-12-03 | 2002-10-15 | Nortel Networks Limited | System and method for providing desired service policies to subscribers accessing the internet |
US6636894B1 (en) | 1998-12-08 | 2003-10-21 | Nomadix, Inc. | Systems and methods for redirecting users having transparent computer access to a network using a gateway device having redirection capability |
EP1014624A1 (en) | 1998-12-22 | 2000-06-28 | TELEFONAKTIEBOLAGET LM ERICSSON (publ) | Multiple access communication system |
FI114064B (en) | 1999-01-08 | 2004-07-30 | Telia Ab | Directing access to the Internet to sponsors |
GB2350211A (en) | 1999-01-14 | 2000-11-22 | Paul William Kuczora | Internet browser software lock |
US6438125B1 (en) | 1999-01-22 | 2002-08-20 | Nortel Networks Limited | Method and system for redirecting web page requests on a TCP/IP network |
US6560630B1 (en) | 1999-03-18 | 2003-05-06 | 3Com Corporation | Receive load balancing and fail over with multiple network interface cards |
US6636968B1 (en) | 1999-03-25 | 2003-10-21 | Koninklijke Philips Electronics N.V. | Multi-node encryption and key delivery |
EP1041483A1 (en) | 1999-03-30 | 2000-10-04 | International Business Machines Corporation | Discovering stolen or lost network-attachable computer systems |
US6711681B1 (en) | 1999-05-05 | 2004-03-23 | Sun Microsystems, Inc. | Cryptographic authorization with prioritized authentication |
US6564253B1 (en) * | 1999-05-07 | 2003-05-13 | Recording Industry Association Of America | Content authorization system over networks including searching and reporting for unauthorized content locations |
WO2000072506A1 (en) | 1999-05-21 | 2000-11-30 | International Business Machines Corporation | Method and apparatus for initializing secure communications among, and for exclusively pairing wireless devices |
GB9913165D0 (en) * | 1999-06-08 | 1999-08-04 | Secr Defence | Access control in a web environment |
US7707420B1 (en) | 1999-06-23 | 2010-04-27 | Research In Motion Limited | Public key encryption with digital signature scheme |
US6463474B1 (en) | 1999-07-02 | 2002-10-08 | Cisco Technology, Inc. | Local authentication of a client at a network device |
US6356937B1 (en) * | 1999-07-06 | 2002-03-12 | David Montville | Interoperable full-featured web-based and client-side e-mail system |
US6719200B1 (en) * | 1999-08-06 | 2004-04-13 | Precise Biometrics Ab | Checking of right to access |
US6757259B1 (en) | 1999-08-12 | 2004-06-29 | Intel Corporation | Control of internet based video conferencing |
US6332163B1 (en) * | 1999-09-01 | 2001-12-18 | Accenture, Llp | Method for providing communication services over a computer network system |
US7061904B2 (en) | 1999-09-13 | 2006-06-13 | Infineon Technologies North America Corp. | Integrated access device controller |
US6463338B1 (en) * | 1999-09-30 | 2002-10-08 | Rockwell Automation Technologies, Inc. | Industrial controller and network card with buffer negotiation |
WO2001031843A2 (en) | 1999-10-22 | 2001-05-03 | Nomadix, Inc. | Systems and methods for providing dynamic network authorization, authentication and accounting |
DE60041352D1 (en) | 1999-10-22 | 2009-02-26 | Nomadix Inc | SYSTEM AND METHOD FOR DYNAMIC PARTICIPANT BASED BANDWIDTH MANAGEMENT IN A COMMUNICATION NETWORK |
EP1226697B1 (en) | 1999-11-03 | 2010-09-22 | Wayport, Inc. | Distributed network communication system which enables multiple network providers to use a common distributed network infrastructure |
US6970927B1 (en) * | 2000-04-18 | 2005-11-29 | Wayport, Inc. | Distributed network communication system which provides different network access features |
US6571221B1 (en) | 1999-11-03 | 2003-05-27 | Wayport, Inc. | Network communication service with an improved subscriber model using digital certificates |
US6738901B1 (en) * | 1999-12-15 | 2004-05-18 | 3M Innovative Properties Company | Smart card controlled internet access |
US7486628B1 (en) * | 1999-12-21 | 2009-02-03 | Nortel Networks Limited | Wireless network communications |
US6606659B1 (en) * | 2000-01-28 | 2003-08-12 | Websense, Inc. | System and method for controlling access to internet sites |
US7028186B1 (en) | 2000-02-11 | 2006-04-11 | Nokia, Inc. | Key management methods for wireless LANs |
US20010044818A1 (en) | 2000-02-21 | 2001-11-22 | Yufeng Liang | System and method for identifying and blocking pornogarphic and other web content on the internet |
US7444669B1 (en) | 2000-05-05 | 2008-10-28 | Microsoft Corporation | Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet |
NO314530B1 (en) * | 2000-02-25 | 2003-03-31 | Ericsson Telefon Ab L M | Wireless reservation, check-in, access control, check-out and payment |
CA2299824C (en) | 2000-03-01 | 2012-02-21 | Spicer Corporation | Network resource control system |
US7173922B2 (en) * | 2000-03-17 | 2007-02-06 | Symbol Technologies, Inc. | Multiple wireless local area networks occupying overlapping physical spaces |
US7173923B2 (en) * | 2000-03-17 | 2007-02-06 | Symbol Technologies, Inc. | Security in multiple wireless local area networks |
US7149896B1 (en) | 2000-05-05 | 2006-12-12 | Microsoft Corporation | Methods and systems for providing security for accessing networks, methods and systems for providing security for accessing the internet |
US6993044B2 (en) | 2000-05-19 | 2006-01-31 | Scientific-Atlanta, Inc. | Computerized method for allocating access across a shared communication medium |
US6680923B1 (en) | 2000-05-23 | 2004-01-20 | Calypso Wireless, Inc. | Communication system and method |
WO2002009458A2 (en) | 2000-07-24 | 2002-01-31 | Bluesocket, Inc. | Method and system for enabling seamless roaming in a wireless network |
US6625251B2 (en) * | 2000-09-22 | 2003-09-23 | Ntt Advanced Technology Corporation | Laser plasma x-ray generation apparatus |
GB2371711B (en) | 2000-11-27 | 2004-07-07 | Nokia Mobile Phones Ltd | A Server |
US20020152402A1 (en) * | 2001-02-07 | 2002-10-17 | Tov Ofer Shem | Personalized visitor pages |
US7096359B2 (en) | 2001-03-01 | 2006-08-22 | University Of Cincinnati | Authentication scheme for ad hoc and sensor wireless networks |
US7096261B2 (en) | 2001-03-12 | 2006-08-22 | Qualcomm Incorporated | Method and apparatus for providing multiple quality of service levels in a wireless packet data services connection |
JP2002290551A (en) * | 2001-03-28 | 2002-10-04 | Nec Corp | Gateway system and trouble processing method for use therein |
EP1378093B1 (en) | 2001-04-09 | 2012-08-08 | Hewlett-Packard Development Company, L.P. | Authentication and encryption method and apparatus for a wireless local access network |
EP2296348B1 (en) | 2001-04-12 | 2013-09-25 | BlackBerry Limited | A method and a system for pushing a service book to a mobile user |
US7277953B2 (en) * | 2001-04-18 | 2007-10-02 | Emc Corporation | Integrated procedure for partitioning network data services among multiple subscribers |
US6968334B2 (en) * | 2001-05-15 | 2005-11-22 | Nokia Corporation | Method and business process to maintain privacy in distributed recommendation systems |
US20020178365A1 (en) * | 2001-05-24 | 2002-11-28 | Shingo Yamaguchi | Method and system for controlling access to network resources based on connection security |
US20020176579A1 (en) | 2001-05-24 | 2002-11-28 | Deshpande Nikhil M. | Location-based services using wireless hotspot technology |
US20030003933A1 (en) | 2001-06-27 | 2003-01-02 | Intel Corporation | Mobile client for multi-service provider network environment |
US7231521B2 (en) | 2001-07-05 | 2007-06-12 | Lucent Technologies Inc. | Scheme for authentication and dynamic key exchange |
US20040003060A1 (en) | 2001-07-13 | 2004-01-01 | International Business Machines Corporation | Method and apparatus for network connection registration and selection |
US7062750B2 (en) * | 2001-07-16 | 2006-06-13 | Microsoft Corporation | Accessing remote stores of source and symbol data for use by computing tools |
EP1421509A4 (en) | 2001-08-07 | 2009-12-02 | Tatara Systems Inc | Method and apparatus for integrating billing and authentication functions in local area and wide area wireless data networks |
US7130904B2 (en) * | 2001-08-16 | 2006-10-31 | Intel Corporation | Multiple link layer wireless access point |
US7073066B1 (en) | 2001-08-28 | 2006-07-04 | 3Com Corporation | Offloading cryptographic processing from an access point to an access point server using Otway-Rees key distribution |
US7042988B2 (en) | 2001-09-28 | 2006-05-09 | Bluesocket, Inc. | Method and system for managing data traffic in wireless networks |
WO2003034760A1 (en) | 2001-10-10 | 2003-04-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Method of and device for operating a wireless telecommunication terminal in a wireless communication system providing a number of distinct service levels |
US7316029B1 (en) | 2001-10-25 | 2008-01-01 | Sprint Communications Company L.P. | Network security services architecture |
US6687495B2 (en) * | 2001-11-07 | 2004-02-03 | Teltier Technologies, Inc. | Method and system for supporting differentiated network service for mobile customers and applications |
US7400901B2 (en) | 2001-11-19 | 2008-07-15 | At&T Corp. | WLAN having load balancing based on access point loading |
US20030095663A1 (en) | 2001-11-21 | 2003-05-22 | Nelson David B. | System and method to provide enhanced security in a wireless local area network system |
CN100444545C (en) | 2001-11-29 | 2008-12-17 | 西门子公司 | Use the public key pair in the terminal equipment to allow network operators and business partners to authenticate and authorize telecom users |
US20030182377A1 (en) * | 2002-02-12 | 2003-09-25 | Tabet Paul M. | Flexible routing engine |
US7177637B2 (en) | 2002-03-01 | 2007-02-13 | Intel Corporation | Connectivity to public domain services of wireless local area networks |
AU2002329940A1 (en) | 2002-03-08 | 2003-09-29 | International Business Machines Corporation | Differentiated connectivity in a pay-per-use public data access system |
US7082535B1 (en) | 2002-04-17 | 2006-07-25 | Cisco Technology, Inc. | System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol |
GB2388746A (en) * | 2002-04-30 | 2003-11-19 | Hewlett Packard Co | Ensuring quality of service in a wireless network |
US7546458B1 (en) | 2002-05-04 | 2009-06-09 | Atheros Communications, Inc. | Method for organizing virtual networks while optimizing security |
US20030233580A1 (en) | 2002-05-29 | 2003-12-18 | Keeler James D. | Authorization and authentication of user access to a distributed network communication system with roaming features |
US7103313B2 (en) * | 2002-06-05 | 2006-09-05 | Nokia Corporation | Automatic determination of access point content and services for short-range wireless terminals |
US8037299B2 (en) | 2002-06-18 | 2011-10-11 | Ericsson Ab | Domain-less service selection |
US7215638B1 (en) * | 2002-06-19 | 2007-05-08 | Meshnetworks, Inc. | System and method to provide 911 access in voice over internet protocol systems without compromising network security |
US20040004965A1 (en) * | 2002-07-02 | 2004-01-08 | Weijing Chen | Dynamic provisioning of DSL services |
US7523046B2 (en) * | 2002-07-26 | 2009-04-21 | Cartmanager, Llc | Communication system for managing hotel operations |
US7155437B2 (en) * | 2002-07-29 | 2006-12-26 | Inventec Appliances Corp. | Method for multiple configurations of wireless network connection settings |
US6950628B1 (en) | 2002-08-02 | 2005-09-27 | Cisco Technology, Inc. | Method for grouping 802.11 stations into authorized service sets to differentiate network access and services |
AU2003265434A1 (en) | 2002-08-12 | 2004-02-25 | Wireless Security Corporation | Fine grained access control for wireless networks |
US7373662B2 (en) | 2002-08-27 | 2008-05-13 | Hewlett-Packard Development Company, L.P. | Secure resource access |
US20040073674A1 (en) * | 2002-09-05 | 2004-04-15 | Alcatel | Method and a server for allocating local area network resources to a terminal according to the type of terminal |
WO2004028069A1 (en) | 2002-09-17 | 2004-04-01 | Broadcom Corporation | Method and system for providing multiple encryption in a multi-band multi-protocol hybrid wired/wireless network |
US7334255B2 (en) | 2002-09-30 | 2008-02-19 | Authenex, Inc. | System and method for controlling access to multiple public networks and for controlling access to multiple private networks |
US7607015B2 (en) | 2002-10-08 | 2009-10-20 | Koolspan, Inc. | Shared network access using different access keys |
US7574731B2 (en) | 2002-10-08 | 2009-08-11 | Koolspan, Inc. | Self-managed network access using localized access management |
US7325134B2 (en) | 2002-10-08 | 2008-01-29 | Koolspan, Inc. | Localized network authentication and security using tamper-resistant keys |
AU2003279950A1 (en) | 2002-10-10 | 2004-05-04 | Rocksteady Networks, Inc. | System and method for providing access control |
US7391748B2 (en) | 2002-10-15 | 2008-06-24 | Cisco Technology, Inc. | Configuration of enterprise gateways |
US7792527B2 (en) | 2002-11-08 | 2010-09-07 | Ntt Docomo, Inc. | Wireless network handoff key |
US7633909B1 (en) * | 2002-12-20 | 2009-12-15 | Sprint Spectrum L.P. | Method and system for providing multiple connections from a common wireless access point |
US7441043B1 (en) | 2002-12-31 | 2008-10-21 | At&T Corp. | System and method to support networking functions for mobile hosts that access multiple networks |
US7207058B2 (en) | 2002-12-31 | 2007-04-17 | American Express Travel Related Services Company, Inc. | Method and system for transmitting authentication context information |
US7802292B2 (en) | 2003-02-10 | 2010-09-21 | At&T Mobility Ii Llc | Application of dynamic profiles to the allocation and configuration of network resources |
US7941840B2 (en) | 2003-02-25 | 2011-05-10 | Hewlett-Packard Development Company, L.P. | Secure resource access |
US7428413B2 (en) * | 2003-03-11 | 2008-09-23 | Wayport, Inc. | Method and system for providing network access and services using access codes |
US7490348B1 (en) | 2003-03-17 | 2009-02-10 | Harris Technology, Llc | Wireless network having multiple communication allowances |
US20050086346A1 (en) * | 2003-10-17 | 2005-04-21 | Meyer Jeffrey D. | Access point coupling guests to the internet |
US7286848B2 (en) * | 2004-06-30 | 2007-10-23 | Richard P Vireday | Method and apparatus to provide tiered wireless network access |
-
2004
- 2004-03-15 US US10/800,472 patent/US7490348B1/en not_active Expired - Fee Related
-
2008
- 2008-12-29 US US12/345,565 patent/US8312286B2/en not_active Expired - Fee Related
-
2013
- 2013-01-23 US US13/748,523 patent/US8583935B2/en not_active Expired - Fee Related
-
2016
- 2016-08-31 US US15/253,465 patent/US20160373933A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020022483A1 (en) * | 2000-04-18 | 2002-02-21 | Wayport, Inc. | Distributed network communication system which allows multiple wireless service providers to share a common network infrastructure |
US20020075844A1 (en) * | 2000-12-15 | 2002-06-20 | Hagen W. Alexander | Integrating public and private network resources for optimized broadband wireless access and method |
US20030084056A1 (en) * | 2001-10-26 | 2003-05-01 | Deanna Robert | System for development, management and operation of distributed clients and servers |
US7496751B2 (en) * | 2001-10-29 | 2009-02-24 | Sun Microsystems, Inc. | Privacy and identification in a data communications network |
US20030140256A1 (en) * | 2002-01-24 | 2003-07-24 | Swisscom Mobile Ag | Wireless local communication network, access control method for a wireless local communication network and devices suitable therefor |
US7509687B2 (en) * | 2002-03-16 | 2009-03-24 | Trustedflow Systems, Inc. | Remotely authenticated operation method |
US7362865B2 (en) * | 2002-04-15 | 2008-04-22 | Hewlett-Packard Development Company, L.P. | Wireless network system |
Also Published As
Publication number | Publication date |
---|---|
US20130148808A1 (en) | 2013-06-13 |
US7490348B1 (en) | 2009-02-10 |
US20090113208A1 (en) | 2009-04-30 |
US8583935B2 (en) | 2013-11-12 |
US8312286B2 (en) | 2012-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20160373933A1 (en) | Wireless network having multiple communication allowances | |
US5944794A (en) | User identification data management scheme for networking computer systems using wide area network | |
JP5813790B2 (en) | Method and system for providing distributed wireless network services | |
US7551574B1 (en) | Method and apparatus for controlling wireless network access privileges based on wireless client location | |
EP1356636B1 (en) | Distributed network communication system which allows multiple wireless service providers to share a common network infrastructure | |
JP6104178B2 (en) | System and method for group bandwidth management in a communication system network | |
US20040225898A1 (en) | System and method for ubiquitous network access | |
RU2280333C2 (en) | Safety in networks of undefined localization level | |
CA2228687A1 (en) | Secured virtual private networks | |
AU2006274697A1 (en) | Method for signaling geographical constraints | |
WO2007064714A1 (en) | Apparatus for providing quality of service level in broadband communications systems | |
US20090019517A1 (en) | Method and System for Restricting Access of One or More Users to a Service | |
US11356434B2 (en) | Technical layer for portable electronic assistant | |
US20030158914A1 (en) | Access control method and system | |
EP1517510A2 (en) | Moving principals across security boundaries without service interruptions | |
US20030226037A1 (en) | Authorization negotiation in multi-domain environment | |
Kosuga et al. | A multimedia service composition scheme for ubiquitous networks | |
JP2003032281A (en) | Access guidance apparatus and method | |
JP4872128B2 (en) | Connection control system and connection control method using terminal device | |
KR20020003633A (en) | Method of extending user ID and method of identifying the user ID | |
KR20020025329A (en) | Membership authentication system and a method thereof | |
JP2004260470A (en) | Policy control apparatus | |
KR20100115106A (en) | System and method for supplying messenger service | |
Mishra et al. | Authentication and Authorization Issues For Multi-Hop Networks | |
WO2003094441A1 (en) | An arrangement and a method for directing geographically dispersed units |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |