US20060234678A1 - Method and system for managing data traffic in wireless networks - Google Patents

Method and system for managing data traffic in wireless networks Download PDF

Info

Publication number
US20060234678A1
US20060234678A1 US11/370,586 US37058606A US2006234678A1 US 20060234678 A1 US20060234678 A1 US 20060234678A1 US 37058606 A US37058606 A US 37058606A US 2006234678 A1 US2006234678 A1 US 2006234678A1
Authority
US
United States
Prior art keywords
server
gateway server
network
gateway
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/370,586
Inventor
David Juitt
Philip Bates
Thomas Christoffel
Geoffrey Crawshaw
David Crosbie
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bluesocket Inc
Original Assignee
Bluesocket Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bluesocket Inc filed Critical Bluesocket Inc
Priority to US11/370,586 priority Critical patent/US20060234678A1/en
Assigned to BLUESOCKET, INC. reassignment BLUESOCKET, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BATES, PHILIP, CRAWSHAW, GEOFFREY, CROSBIE, DAVID, CHRISTOFFEL, THOMAS, JUITT, DAVID
Publication of US20060234678A1 publication Critical patent/US20060234678A1/en
Assigned to VENTURE LENDING & LEASING IV, INC. reassignment VENTURE LENDING & LEASING IV, INC. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BLUESOCKET, INC.
Assigned to BLUESOCKET, INC. reassignment BLUESOCKET, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: VENTURE LENDING & LEASING IV, INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/22Arrangements for detecting or preventing errors in the information received using redundant apparatus to increase reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/02Inter-networking arrangements

Definitions

  • This invention relates to the field of telecommunications and, more particularly, to the management of data traffic in wireless networks.
  • Wireless network technology allows a mobile user to wirelessly connect to a wired network, such as an enterprise's local area network (LAN) or wide area network (WAN), or to another wireless network.
  • Enterprises today are rapidly deploying wireless technology, in part because of the decreasing cost of mobile devices (e.g., personal digital assistants like the Compaq iPAQ by Compaq Corporation of Houston, Tex. and laptop computers) and wireless access points, and in part because of the increasing ease of installation and deployment, among other reasons.
  • Such wireless network technology can provide LAN and/or WAN service to enterprises' authorized users without wire installation and without tethering users to network connections.
  • Wireless networks typically include mobile devices and wireless access points, which are portals to the wired network. Wireless access points are available with varying degrees of intelligence and functionality. Some merely act as bridges that relay wireless traffic into a wired network, while others provide additional functionality. Typically, simpler access points that provide less functionality cost less, but may not provide features necessary for operation within an enterprise.
  • Each 802.11b access point can support dozens of mobile devices by sharing 11 Mbps (megabits per second) of capacity. There can be up to three access points working in the same area, and each typically has an indoor range of 80 feet at 11 Mbps and 300 feet at 1 Mbps.
  • Wireless networks introduce a series of new security problems to organizations because physical connection to a network is not required for access.
  • Wireless network signals typically have ranges beyond the physical confines of a building. Any compatible network adapter or access point within the range of an 802.11b access point can join the network.
  • 802.11b access point can join the network.
  • WEP Wired Equivalent Privacy
  • VPNs Virtual Private Networks
  • a single VPN server normally located in a central equipment room.
  • VPNs typically provide only binary access to the organization's network, meaning a mobile device user can either have a complete access to the protected network or none at all.
  • a single 11 Mbps 802.11b access point can have an effective throughput of approximately three times more than the capacity of a T1 connection, which is the connection typically supported by some existing VPN servers.
  • wireless network users might overload the VPN server, resulting in poor performance for both the wireless network and mobile device users.
  • a gateway server is interposed between one or more wireless access points and protected (e.g., wired) networks. That gateway server provides security and integration functions, for example, authentication, access control link privacy, link integrity, and bandwidth metering in various embodiments. Use of such a gateway server allows substantial control to be gained over network access even with the use of relatively simple (and inexpensive) access points. While the invention is particularly suited to the popular IEEE 802.11 wireless communication protocol, wireless access points are available that use a variety of present protocols, such as variations of 802.11 (e.g., 802.11a, 802.11b, 802.11g), Bluetooth, HiperLAN2, and 802.1x. The invention would be equally useful with other protocols and interfaces available now and in the future.
  • the present invention can address deficiencies in the WEP and VPN technologies by providing differential levels of access based on a category assigned to the user, rather than the binary configuration of according a user either fill access to the organization's network or none at all.
  • the present invention can limit the bandwidth capacity of users, for example, so the 11 Mbps of capacity at each 802.11b access point cannot easily be saturated by a single user, leaving all other users stalled.
  • a gateway server receives a request to access the protected network.
  • This request typically comes from a mobile device operated by a user.
  • the request is communicated from the mobile device to a wireless access point, and relayed by the wireless access point to the gateway server.
  • the request might be an explicit request for access, and can include an identifier and authentication information (e.g., a PIN, password, digital certificate, encryption key, digital code, or some combination).
  • the request might be an implicit request, such as a request to access network resources, a web page request, and so on.
  • the gateway server manages access control and security in a single integrated configuration, neither the mobile device nor the access points need to be intelligent to carry out the sophisticated access control and security functions to connect with wireless networks. Moreover, any changes in the networks, mobile devices, and access points do not result in significant changes, such as additions, modifications, or replacements, to the gateway server.
  • the gateway server can be configured by a web-based interface, so that configuration changes can be incorporated in the gateway server by merely changing the parameters using the web-based interface.
  • an authentication subsystem of the gateway server authenticates the user of the mobile-device. This is preferably accomplished by accessing an external authentication server (e.g., a RADIUS, LDAP, or NTLM server). Enterprises typically use such servers in the operation of their networks. The use of an already operating external authentication server-simplifies network administration.
  • the gateway server (and/or the external authentication server) can also authenticate a user that was previously authenticated via the same or a different gateway server without requiring re-communication of authentication information. A user is free to roam between different access points in wireless networks without having to terminate open connections.
  • the user can be authenticated using an authentication database within the gateway server, instead of or in combination with accessing an external authentication server. Because the authentication process is conducted solely by the gateway server, use of an internal or external authentication server is irrelevant and transparent to the user.
  • the authenticated user of the mobile device can establish a VPN connection with the gateway server according to the Point-to-Point Protocol (PPTP) or Internet Protocol Security (IPSec) protocol.
  • PPTP Point-to-Point Protocol
  • IPSec Internet Protocol Security
  • the VPN connection can provide additional security measures for the user and the protected network.
  • the gateway server can passively monitor an authentication process when a user makes a request to authenticate to a server. If the user successfully authenticates, the gateway server assigns a role to the user based on the server with which the user authenticated.
  • the gateway server can easily integrate with Microsoft NT and/or Windows environment. A user already registered and authenticated in such environment does not need to authenticate separately to the gateway server, since the gateway server assigns the role when the NT and/or Windows server accepted the user.
  • the user can authenticate via a secure web page without requiring additional software.
  • the use of a secure web page can protect the wireless network from illicit monitoring.
  • the gateway server receives identifier and authentication information from the user through a secure web page.
  • the identifier and authentication information might be associated with a user of the mobile device, the mobile device itself, a smart card, an authentication token, and so on.
  • authenticating the mobile device is understood to include any one or a combination of suitable authentication techniques for authenticating a device and/or a user of a device, depending on implementation.
  • Examples of an identifier include one or a combination of username, e-mail address, and unique name.
  • Examples of authentication information include one or a combination of a personal identification number (PIN), password, digital certificate, encryption key, and digital code.
  • PIN personal identification number
  • the user can use the same identification and authentication information used to access the protected resource in the wired environment.
  • the gateway server can detect unauthorized access points by monitoring network traffic.
  • the gateway server detects the presence of the unauthorized access points by monitoring SNMP, MAC addresses, and 802.11 DS Layer signals and characteristics of network traffic on both the protected and unprotected sides of the gateway server.
  • visitors to a corporation may be allowed to access the Internet at a low data rate by entering their e-mail address.
  • Employees from other offices may be required to enter a username and password to access the Internet and resources permitted by their home office server.
  • Employees working with highly sensitive data may be subject to a very high level of security available from the gateway server that utilizes certificates, smart cards and/or secure token technologies.
  • a role is previously defined in the gateway server for the user.
  • a role also can be assigned based on the attributes of a user as provided by the external authentication server.
  • a role definer in the gateway server defines roles and assigns them to users.
  • the role definer can specify network resources and degree of access to the protected network, including connection bandwidth limits.
  • the role definer can also specify a tunneling protocol (e.g. IPSec or PPTP) associated with a role.
  • IPSec tunneling protocol
  • PPTP packet processing protocol
  • Access privileges can be differentiated for authorized users based on roles, instead of the commonly used “all or nothing” access.
  • a particular role can be defined with different privileges in multiple resource locations. For example, an “engineer” role can be defined with full access to engineering department servers, but limited access to finance department servers.
  • an access controller in the gateway server provides access to the protected network based on the assigned role.
  • a role includes one or more policies specifying the scope of performances permitted for the user.
  • policies can include action, service, connection direction (e.g., to or from protected network, or both), and destination (e.g., resources in the protected network).
  • the access controller evaluates each of the policies in the role to determine whether the services requested by the user should be allowed. If elements in a policy match the user's requests, then the requested actions are performed. If a match is not found even after checking all the policies, then “inherited” roles can be checked for the user.
  • Every employee can share the role of staff
  • the staff role can have a set of default policies, or privileges granted to everyone in the organization.
  • a change to the inherited role need not be repeated in the other specific roles, since these changes will apply to all roles that inherit the change. If no match is found even with the default policies, the user is disallowed from performing the requested services.
  • one or more additional gateway servers are interposed between the wireless network and the protected network to provide a fail-over configuration. If a first gateway server (also referred to as the primary server) fails, another gateway server (also referred to as the back-up server) receives the access request in the place of the first gateway server. In one implementation, there are more than one additional (or back-up) gateway servers. In this configuration, all set up information, additions and changes to the primary server are automatically propagated across and shared in real time with the back-up servers. The primary and the back-up gateway servers are connected via a fail-over interface. While the primary server is actively managing the user and the wireless network, the back-up servers remain idle.
  • the back-up servers monitor a “heartbeat signal” of the primary server. If the back-up servers do not detect a certain number of heartbeats from the primary server in a specified amount of time, a fail-over occurs and one of the back-up servers takes over the role of the primary server and receives the requests from the user, without requiring new set-up and configuration.
  • multiple gateway servers are interposed between different wireless networks and protected networks. These gateway servers replicate the configuration information of a single gateway server initially in communication with the mobile device. Such replication among the multiple gateway servers can be useful in administering a large-scale wireless network in that configuration changes are propagated from the single gateway server.
  • multiple gateway servers can be interposed between the protected network and unprotected wireless local area networks to create a “mesh network” architecture of gateway servers.
  • the mesh network architecture can facilitate the seamless roaming of a mobile device from one gateway server to another gateway server, the fail-proof configuration, and the replication of configuration information for the gateway servers connected to form the mesh network.
  • This mesh network of gateway servers acts as one managed system that controls access to the resources in the protected network via any of the various types of unprotected networks that could be in communication with the gateway servers.
  • the unprotected networks can each be any of a radio-frequency based local are network, a cellular-based data network, or any type of a wired network. Any number of gateway servers can be supported by such a mesh network, depending upon implementation.
  • FIG. 1A is a block diagram depicting an embodiment of a gateway server managing a connection between a mobile device and a protected network.
  • FIG. 1B is a block diagram depicting an embodiment of the gateway server as shown in FIG. 1A .
  • FIG. 2 is a flowchart depicting an embodiment of a method for managing a connection between a mobile device and a protected network.
  • FIG. 3 is a flowchart depicting role definition in one embodiment of the method of FIG. 2 .
  • FIG. 4 is a user interface display in an embodiment for a system implementing the method of FIG. 2 .
  • FIG. 5 is a flowchart depicting the details of evaluating policies in one embodiment of the method of FIG. 2 .
  • FIG. 6 is a user interface display in an embodiment for a system implementing role inheritance.
  • FIG. 7 is a block diagram depicting a fail-proof configuration as described in an embodiment of the invention.
  • FIG. 8 is a block diagram depicting a multi-gateway server replication configuration.
  • FIG. 9 is a block diagram depicting an embodiment of a mesh network infrastructure including multiple gateway servers.
  • a user of a mobile device 100 communicates with an access point 102 a via a wireless local are network 105 to access a protected network 110 .
  • the access point 102 a is connected to a wired network 117 , which includes a gateway server 120 , the protected network 110 , an authentication server 125 , and a firewall 130 which is a gateway to the Internet 135 .
  • the mobile device 100 can be any sort of device that has wireless communication capability, including but not limited to handheld, small, and large computers, personal digital assistants, peripherals, appliances, machines, telephones, toys, games, and so on.
  • the mobile device 100 enters the coverage area of the access point 102 a that communicates between the wireless network 105 and the wired network 117 , and upon entry, the mobile device discovers and identifies the wireless network 105 .
  • the user of the mobile device 100 seeks to access the protected network 110 via the wireless network 105 .
  • the wireless network 105 can be implemented with a wireless networking protocol, such as IEEE 802.11 (e.g., 802.11a, 802.11b, 802.11g), Bluetooth, ETSE HIPERLAN/2, and 802.1x, or other protocol.
  • IEEE 802.11 e.g., 802.11a, 802.11b, 802.11g
  • Bluetooth ETSE HIPERLAN/2
  • 802.1x or other protocol.
  • the wireless network 105 can support a wide variety of wireless networks, including cellular networks.
  • the wireless network 105 is radio frequency (RF) based network, operating on 2.4 GHz or 5.1 GHz.
  • RF radio frequency
  • a private wireless network can be supported within privately-owned spectrum. It should be understood that the network 105 can be or can include or support any present or future wired or wireless networking protocol.
  • the protected network 110 can be a wired network that typically includes an Ethernet network, and may include a DSL, T1, or T3 connection to yet another network, such as, for example, the Internet, or a WAN.
  • the protected network 110 can be or can include or support any present or later-developed network, including without limitation, another wireless network.
  • the mobile device 100 is typically a laptop computer or a hand-held device such as a personal digital assistant.
  • the protected network 110 is typically a corporate or local intranet, which may or may not in turn access the Internet 135 through routers, gateways, firewalls 130 , and so on.
  • the access point 102 a thus provides wireless access to the corporate intranet 110 (and possibly the Internet 135 ) via the wireless network 105 .
  • the mobile device 100 may be one of various electronic devices, computers, and appliances that include wireless networking hardware, and the protected network provides a connection (e.g. via DSL or cable modem) from the home to an Internet service provider's network, which in turn connects to the Internet
  • Each of the access points 102 a , 102 b , and 102 c may be a relatively simple communication device that relays communications between the mobile device 100 and the wired network 117 .
  • the access points 102 are typically located in the same subnet as each other.
  • subnets are segments of the network that are typically connected by routers, where the routers forward packets from one subnet to another based on a packet's destination.
  • the gateway server 120 might be located in a subnet made up of 255 or fewer network nodes, called a class C subnet, that each typically share a common portion of their IP address, for example, 201.100.1.X, where X represents the portion of the address that will be different for each node in the subnet.
  • the access point 102 a can be simple or complex in design and functionality. There can be multiple access points, 102 a , 102 b , and 102 c connected to the same subnet and there can be other access points connected to other subnets. The various access points can use the same or different protocols, to communicate with a gateway server 120 .
  • the gateway server 120 provides sophisticated control functionality, yet the access points 102 are gateway server, router, and network agnostic.
  • the access points 102 can be more complex and include gateway, router, or other more sophisticated processing functionality, or some combinations, although this functionality typically is not required.
  • the access point 102 a is an off-the-shelf external PC-compatible access point. Such an access point typically has a data transfer rate of 11 Mbps in full duplex, thus 5.5 Mbps in either direction.
  • the access point typically uses the Ethernet protocol but, since the gateway server 120 is access point agnostic, any type of present or future data link protocol supported by any manufacturer of the access point and the wireless devices can be used.
  • the access point 102 a can also include WEP data encryption for enhanced security. Examples of access points include, but are not limited to, the AXIS 9010 Bluetooth Access Point offered by AXIS COMMUNICATIONS of Lund, Sweden, Cisco Aironet 340 and 350 series from Cisco Systems, Inc.
  • the gateway server 120 provides sophisticated functionality while keeping the level of sophistication required of the access points 102 to a minimum.
  • An exemplary gateway server is the WG-1000 Wireless Gateway from Bluesocket, Inc. of Burlington, Mass.
  • a gateway server 120 can also be implemented as, or as part of, any other suitable network device with software to implement the functions described herein.
  • the gateway server 120 can be implemented as a server-class computer, such a PC having a CPU board containing at least one processor operating at a speed greater than 866 MHz.
  • the processors are selected from the Pentium or Celeron family of processors manufactured by Intel Corporation of Santa Clara, Calif.
  • processors are selected from the “680 ⁇ 0” and POWER PC family of processors manufactured by Motorola Corporation of Schaumburg, Ill., the Alpha line of processors manufactured by Compaq Corporation of Houston, Tex., the CRUSOE line of processors manufactured by Transmeta Corporation of Santa Clara, Calif., and the ATHLON line of processors manufactured by Advanced Micro Devices, Inc., of Sunnyvale, Calif.
  • the server computer also includes a main memory unit for storing programs and/or data.
  • the memory capacity is 256 MBs or greater, and may include random access memory (RAM, read only memory (ROM), and FLASH memory.
  • the gateway server 120 typically also includes one or more storage devices, such as hard disk drive and a floppy disk drive.
  • Other additional peripheral devices also can be included in a gateway server including output devices (e.g., printer or plotter) and/or optical disk drives for receiving, reading, and/or writing digital data on a CD-ROM. and/or DVD.
  • the controlling software program(s) and all of the data utilized by the program(s) are typically stored on one or more of the gateway server 120 storage mediums such as the hard disk drive, or the other additional peripheral devices, such as a CD-ROM.
  • the gateway server 120 can include a server-class operating system, such as Linux, available, for example, from Red Hat, Inc. of Durham, N.C., and Windows NT, available from Microsoft Corporation of Redmond, Wash.
  • the gateway server can include a web server, for example an Apache web server, which sends out web pages in response to HTTP requests from remote browsers/users.
  • An Apache server is an open-source HTTP server available from the Apache Software Foundation.
  • the gateway server 120 can also include IPSec or PPTP functionality according to the standards.
  • IPSec Various software implementations of IPSec are available, including, for example, from Trilogy of Austin, Tex. Windows XP Pro IPSec Client, Windows 2000 IPSec Client, Safenet IPSec Client for Windows NT, Safenet IPSec Client for Windows 2000, SSH Sentinal IPSec Client for Windows NT or Windows 2000 from Microsoft Corp. of Redmond, Wash.
  • Examples of software implementations of PPTP include, but are not limited to, the Windows 2000/XP/NT Client by Microsoft Corp. of Redmond, Wash.
  • IPSec acts at the network layer, protecting and authenticating packets between participating devices, such as the access points 102 and the gateway server 120 .
  • NICs network interface cards
  • the implementation of the NICs depends on the type of network 117 , thus the gateway server 120 can utilize NIC from any vendor. If, for example, the wired network 117 is an Ethernet network, then the NICs provide an Ethernet interface. Examples of commercially available NICs are, but not limited to, EtherLink III Parallel Tasking Ethernet Adapters by 3Com of Santa Clara, Calif., Series A340, A350, and TrueMobile Series by Cisco Systems, Inc. of San Jose, Calif., D-Link Air Series by D-Link Systems, Inc. of Levine, Calif., quartet Server NICs by Adaptec of Milpitas, Calif., and the Intel Pro 100 and 1000 Series from Intel Corp. of Santa Clara, Calif., among many others.
  • the gateway server 120 is connected to at least two networks, ie., the network to which the access points 102 are connected and the protected network 117 , and the gateway server 120 forwards packets from one network to the other to reach their destination.
  • the routing of packets is preferably performed by software running on the processor, in cooperation with the NICs and other hardware. Routing software is commercially available, for example, as part of the Linux operating system, and in various Windows server software programs.
  • An authentication server 125 is in communication with the gateway server 120 .
  • the gateway server- 120 can use the authentication server 125 to authenticate the mobile device 100 .
  • the authentication server 125 which preferably is a RADIUS server, an LDAP server, or an NTLM server, can be administered by the same entity as the gateway server or can be a third-party authentication server, e.g., a server maintained by an authentication service provider and accessed, for example, over the Internet
  • the authentication server 125 is preferably implemented with software running on one or more server-class computers.
  • the authentication server 125 can also be implemented as a special-purpose hardware device. Examples of RADIUS authentication servers are Funk Steel Belted RADIUS from Funk Software Inc. of Cambridge, Mass., and the Microsoft Radius server from Microsoft Corp. of Redmond, Wash. Examples of LDAP authentication servers are Open LDAP and Microsoft Active Directory from Microsoft Corp. of Redmond, Wash.
  • one embodiment of the gateway server 120 includes a receiver 150 , an authentication subsystem 155 , a role assignor 160 , and an access controller 165 .
  • the receiver 150 receives a user's request to access the protected network 110 .
  • the authentication subsystem 155 authenticates the user and the user's mobile device 100 using the external authentication server 125 .
  • the role assignor 160 assigns a role to the authenticate user.
  • the access controller 165 provides access to the protected network 110 based on the user's assigned role. -
  • a user of a mobile device 100 makes a request to access the protected network 110 (STEP 205 ).
  • This request comes from a mobile device 100 operated by the user.
  • the request is communicated from the mobile device 100 to one of the access points 102 , and relayed by the access point 102 a , 102 b , or 102 c to the receiver 150 of the gateway server 120 .
  • the user might make a request, for example, to access the protected network 110 to utilize the applications and retrieve information from the protected network 110 .
  • the user also may desire access to the protected network 110 to receive and transmit data across the wireless network 105 and the wired network 117 to another network.
  • the request can include an identifier and authentication information, such as a user name and password.
  • the gateway server 120 can require more than the user's name and password, such as one or more of a digital certificate and security codes.
  • the request can be a web page request, only accessing the Internet and not the protected network 110 .
  • the user's request may be made as just a request according to a particular protocol such as the hypertext transfer protocol (HTTP).
  • HTTP hypertext transfer protocol
  • Minimal information can be required for such a request, such as a user's e-mail address.
  • the gateway server 120 detects the presence of a new user, the gateway server 120 presents the mobile device with an authentication web page to make a request, which permits the user of the mobile device 100 to enter a name and password.
  • the user is authenticated by the gateway server 120 based on the authentication information provided by the user.
  • the request is transmitted through the wireless network 105 and forwarded to the access point 102 a.
  • the mobile device 100 enters the communication range of the access point 102 a associated with the wireless network 105 as the mobile device 100 physically moves from the access point 102 b to the second access point 102 a .
  • the signal strength from the second access point 102 a becomes stronger than the signal strength from the first access point 102 b with respect to the mobile device 100 .
  • the mobile device 100 switches its communication from the first access point 102 b to the second access point 102 a based on the signal strength.
  • the access point 102 a may be selected because it is the only access point. available among the access points 102 and/or because it is a preferred access point (e.g., for load balancing purposes).
  • the gateway server 120 may detect a triggering event that initiates a transfer of the mobile device 100 from one access point 102 b to another access point 102 a .
  • One triggering event can occur as the mobile device 100 moves away from the communication range of the access point 102 b .
  • the gateway server 120 detects poor or declining quality of the connection (e.g., radio link) between the mobile device 100 and the access point 102 b .
  • a weakening reception of the wireless signal from the mobile device 100 can be indicated by increased packet loss to the mobile device 100 and/or by an indication of weakening reception, such as RSSI (Received Signal Strength Indication).
  • RSSI Receiveived Signal Strength Indication
  • a triggering event can also be indicated by congestion or a load balancing need of the access points 102 and the gateway server 120 .
  • the gateway server 120 may decide to move the mobile device 100 to a less congested access point.
  • a triggering event may also occur to fulfill a pre-defined service level for the user of the mobile device 100 . Because the access point 102 a is not congested, the access point 102 a can ensure the user with a pre-defined service level. See, for example, U.S. patent application Ser. No. 10/055,028, filed Jan. 23, 2002, entitled METHODS AND SYSTEMS FOR ENABLING SEAMLESS ROAMING OF MOBILE DEVICES AMONG WIRELESS NETWORKS and U.S. patent application Ser. No.
  • the gateway server 120 can monitor communications in the subnet (e.g., TCP communications) and respond to the request from the mobile device 100 communicating via one of the access points 102 . It should be understood that the gateway server 120 can be connected to more than one subnet, particularly if the gateway server functionality is incorporated into a router or other device that typically is connected to more than one subnet.
  • the gateway server 120 authenticates the mobile device 100 utilizing its authentication subsystem 155 , which may include authenticating the device or the user or owner of the device using an authentication server 125 (STEP 210 ).
  • the authentication server 125 determines the access privileges assigned to users and allows access to the protected network 110 based on the access privileges.
  • the authentication server 125 typically has information about authorized users or devices, and determines whether the mobile device 100 is authorized as well as the nature and extent of authorized access defined by, for example, a role (access privilege classification) and domain (area relevant to the user). For example, a student who takes history classes at a university may be assigned the “role” of a student member of the history department “domain,” and the student's mobile device 100 allowed to access the history department network only to the extent permitted to students.
  • the mobile device 100 can be authorized to initiate a session with the protected network 110 via the wireless network 105 based on the access privilege information provided by the authentication server 125 .
  • an authentication server 125 is already used for central authentication in the protected network 110 .
  • the user can use the same identification and authentication information as if the user were accessing the wired network 110 of the organization.
  • the central authentication server can be any sort of server, including a RADIUS server, an LDAP server, or an NTLM server. Because this configuration uses only one database for all forms of authentication, including, for example, dial-up access and sever log-in, as well as wireless access, large networks with many users can be managed more easily.
  • the user is authenticated initially with an authentication database maintained by the gateway server 120 and then re-authenticated with the central authentication server 125 .
  • the gateway server 120 uses only its own internal authentication database, rather than the central authentication server 125 to authenticate the user of the mobile device 100 .
  • the internal authentication database can be used when the external authentication server 125 is not available.
  • the internal authentication database can also be used to provide authentication without delay, waiting for a response from the external authentication server 125 .
  • the gateway server 120 maintains authorzed users' user names and passwords provided, for example, using an authentication web page in its internal authentication database.
  • the gateway server 120 When a user is authenticated via the external authentication server 125 , the gateway server 120 retains the authorized user's name and password, as well as the assigned role, and stores the information in the internal authentication database in a hashed form. When a user makes a request to log in, the gateway server 120 can perform a look-up in its internal database to see if the user's name and password are stored internally. If the requested user's name and password match the stored information in the internal database, then the gateway server returns the user's assigned role and grants access to the protected network 110 based thereon.
  • authentication is accomplished by interaction with an authentication web page maintained by, for example, the authentication server 125 .
  • the local gateway server 120 redirects all requests from the mobile device 100 made with a particular protocol (e.g., HTTP) to the authentication web page.
  • the mobile device. 100 (or the user of the mobile device 100 ) then supplies identifier and authentication information to the authentication web page.
  • Identifier information can include one or a combination of a username, e-mail address, or other unique name associated with the user of the mobile device 100 , the mobile device 100 , an object such as a smart card, and so on.
  • Authentication information can include one or a combination of personal identification number (PIN), password, encryption key, biometric information, digital certification, and digital code, as well as other information that is associated with at least one of the user of the mobile device 100 , the mobile device 100 , a srart card, and so on.
  • PIN personal identification number
  • password password
  • encryption key encryption key
  • biometric information digital certification
  • digital code digital code
  • the identity and authentication information required from the user can vary based on the status of-the user. For example, visitors to the organization may be allowed to access only the Internet at a low data rate by merely entering their e-mail address. Employees from branch offices may be required to enter their LAN and/or WAN username and password to access the Internet and resources permitted by their home office server. Employees working with highly sensitive data may be subject to the highest level of security available from the gateway server 120 requiring such items as digital certificates, smart cards, and secure token technologies.
  • the gateway server 120 responds to the request by assigning a role to the user (STEP 220 ) through its role assignor 160 .
  • a role sets a boundary for access privileges, such as particular network resources, bandwidth capacity, and security protocol, to which a group of users is restricted.
  • the network resource privileges for a role are configured under one or more policies including Action, Service, Direction (network traffic from the protected side), and Destination (resources in the protected side). These are described further below.
  • the role can designate that members of a role cannot use more than a stated maximum bandwidth set forth by the role.
  • the role can also designate a security protocol for its members.
  • the gateway server 120 includes PPTP and IPSec.
  • IPSec is particularly useful for users communicating sensitive data to and from the protected network 110 .
  • IPSec is commonly used to describe a combination of two protocols: IPSec and IKE (Internet Key Exchange).
  • IKE is a protocol that enables an encrypted connection to be negotiated between two end points.
  • IPSec data exchange is based on symmetric keys; IKE uses asymmetric keys (e.g., keys from a public key infrastructure) to initiate an IPSec link.
  • Any device on a network can be an endpoint of an IPSec link, and some access points may have this functionality.
  • IPSec is a standard, it can be implemented with different features and options that may be vendor dependent.
  • IPSec does not require specific algorithms to be used for authentication, encryption, or compression, any algorithm(s) can be used within the parameters of the protocol. Examples of commonly supported algorithms are DES Data Encryption Standard), 3DES Triple DES), AES (Advanced Encryption Standard), and ECC (Elliptical Curve Cryptography).
  • DES Data Encryption Standard 3DES Triple DES
  • AES Advanced Encryption Standard
  • ECC Elliptical Curve Cryptography
  • the gateway server 120 can transparently authenticate the user without requiring any information from or interactions with the user. This transparent authentication allows the mobile device to roam seamlessly in a wireless network without having to submit authentication information when it changes to a subnet handled by a new gateway server.
  • the mobile device 100 can move from one access point in one subnet to another access point in a different subnet without having to log out of its current session with the first subnet and obtain a new network address to connect to the new subnet.
  • the gateway server 120 retains its connection information (also referred to as the context information) with a user of the mobile device 100 belonging to a role, a group of users performing similar duties in an enterprise. For example, even after the mobile device 100 moves outside the service area of the gateway server 120 and loses its connection with the gateway server 120 , if the mobile device 100 returns to the service area of the gateway server 120 afterward, the mobile device 100 can access the protected network 110 without re-registration or re-authentication based on the connection information for the mobile device 100 retained and reused by the gateway server 120 .
  • connection information also referred to as the context information
  • the gateway server 120 sets access privileges for a role of users of the wireless network 105 , so that the gateway server 120 can determine the access-privileges associated with the role to which a user belongs, in addition to the user and/or device identifier information.
  • the device identifier is a unique identifier, such as a Media Access Control (MAC) address,. IP address, or other address or identifier.
  • MAC Media Access Control
  • the authentication server 125 identifies users belonging to a role in an enterprise, such as a student in a university.
  • the gateway server 120 obtains access privilege information based on at least one of the device identifier, user identifier, the role membership information, and context information. Examples of context information are a network address of the mobile device 100 used for a previous session and pointer information to the user's role.
  • the gateway server 120 saves the context information associated with a previous session between the mobile device 100 and the resource in the protected network 110 and reuses the information for the current session between the mobile device 100 and the resource without re-authentication. See, for example, U.S. patent application Ser. No. 09/911,092, filed Jul.
  • the gateway server 120 enables a mobile device to roam from a first wireless network associated with a first gateway server to a second wireless network associated with a second gateway server.
  • the first wireless network and second wireless networks use different communication technologies (e.g., a cellular network or a GGSN 2.5/3G network, and an 802.11b network).
  • the second gateway server receives a request for the first gateway server by the mobile device 100 .
  • the second gateway server recognizes that the request is for a known server, and as a result, the second gateway server responds to the request on behalf of the first gateway server and informs the mobile device that it is replacing the first gateway server in serving the mobile device 100 .
  • the second gateway server can identify the home gateway server of the mobile device and notify the home gateway server that the mobile device is currently communicating with the second gateway server.
  • a tunnel may be established between the home gateway server and the second gateway server in order to forward data for the mobile device 100 via the tunnel to the second gateway server.
  • a detection feature of the gateway server 120 can detect the presence of unauthorized or “rogue” access points, for example, access points installed without the knowledge or approval of network managers of an enterprise.
  • the gateway server 120 can monitor traffic on the network looking for MAC (Media Access Control) addresses associated with known access point vendors.
  • the gateway server 120 can also detect the presence of unauthorized access points by monitoring SNMP and 802.11 DS Layer signals, and characteristics of network traffic on both the wired and wireless sides.
  • the gateway server 120 authenticates the mobile device 100 using the authentication server 125 .
  • the local gateway server 120 redirects all HTTP requests from the mobile device 100 such that the web browser on mobile device 100 is presented with an authentication web page, which permits the user or the mobile device 100 to provide a user name and password.
  • the central authentication server can be configured to permit the user to use the same identification and authentication information used to access other resources in the protected network 110 .
  • the gateway server 120 returns the user to the web page originally requested.
  • the gateway server 120 can require all users to authenticate via a web browser page served from a secure web server that uses digital certificates.
  • SSL Secure Sockets Layer
  • the browser recognizes that the server certificate is one of the reference certificates stored in the browser. Examples of web browsers include, but are not limited to, Microsoft Internet Explorer Browser and Netscape Browser.
  • the gateway server 120 can passively monitor an authentication process between a mobile device and a server. If the server successfully authenticates the device, the gateway server assigns a role to the mobile device based on the authentication. A user authenticated in this manner does not need to authenticate separately to the gateway server, and in this way the gateway server operation is transparent to the user.
  • the gateway server 120 allows initial access by all mobile devices to a file server sufficient to allow authentication to that file server. If the authentication is successful, the mobile device 100 is assigned to a role designating privileges' associated with users who can access that file server. In one implementation, if authentication with the file server is not successful further access to that file server can be denied, for example after a certain number of attempts, or after a certain time period. In some embodiments, authentication information is extracted from the authentication protocol, for example a user name, or network address, network domain, or other identifier. The gateway server 120 specifies a role for the mobile device 100 based on this information if authentication with the server is successful.
  • the gateway server 120 integrates with Microsoft NT and Windows 2000 environment by passively monitoring the communication between a mobile device and Windows servers.
  • the user of the mobile device 100 authenticates only to Windows server, and the gateway server determines from the communication between mobile device and server whether the authentication was successful.
  • the gateway server can monitor the SMB and Kerberos protocol exchanges to verify that the user has successfully authenticated to specific servers. Based on the authentication results, a proper role is assigned.
  • the gateway server 120 can be used to define a role for different individual users or groups of authorized users for the protected network 110 based on the users' roles or status in the organization (shown as optional STEP 200 ).
  • the gateway server 120 uses a web-browser interface to define a role and set up parameters for the role.
  • a particular role can be configured with different privileges for resources. For example, an “engineering” role can be defined with full access in the engineering department servers, but limited access to the finance department servers. Additionally, a role can be defined with access to an IP address subnet or a router.
  • defining a role includes specifying one or more policies that set the boundaries for each action or service to be allowed for members (STEP 400 ).
  • each policy has four elements: 1) Action, 2) Service, 3) Direction, and 4) Destination.
  • the Action indicates whether the service under the corresponding policy is allowed or denied.
  • the gateway server 120 includes a set of network services that users can access, if permitted by the role which they are assigned. Examples of available Service options are: HTFPS (Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL), HTTP, DNS, POP-3, SMTP, Telnet, SSH, FIP, POP-2, and so on. Additional network services can be specified.
  • the Service can specify protocols such as TCP, UDP, both TCP/UDP or a protocol other than TCP and/or UDP.
  • the Direction defines the direction of a network connection initiation for which the service access is allowed or denied from the perspective of the gateway server 120 .
  • the Direction can be set as Outgoing, Incoming, and Both Ways.
  • Outgoing means the network connections can only be initiated from the wireless side to services or destinations in the protected side 110
  • Incoming refers to connections initiated from the protected side.
  • Both Ways refers to bi-directional initiation.
  • the Destination lists correspond to a resource or group of resources in the protected network 1 10 .
  • the Destination can be a single device or location within a network, for example, such as a marketing server.
  • the Destination can also be all devices and/or location reachable within a network address space, such as all servers in a department's subnet.
  • Policies can be easily added, deleted, and amended, e.g., through the use of a drop-down list in the web-browser interface.
  • FIG. 4 is a user interface display in an embodiment for a system defining a role called “Engineering” that blocks access to the finance department server but allows web and e-mail access to all other servers and resources in the protected network 110 .
  • the security protocol is defined as PPTP rather than IPSec (STEP 420 ).
  • An additional security protocol, such as subnet VPN, can be added to provide more security measures for users.
  • the gateway server 120 can set up, enable, and delete parameters for PPTP, IPSec, and a subnet VPN.
  • the “Engineering” role is denied access to the financial server in both directions.
  • HTTP service is allowed in the both directions for all servers in the protected network 110 .
  • HTTPS service is allowed in both directions for all servers in the protected network 110 .
  • SMTP service is allowed in only the outgoing direction for all servers in the protected network 110 .
  • POP-3 service is allowed only in the outgoing direction for all servers in the protected network 110 .
  • the access controller 165 of the gateway server 120 provides differential levels of access to the user based on the policies set forth in the user's assigned role (STEP 230 ). Once a role is assigned to the user, each policy in the role is evaluated (STEP 225 ) before allowing requested service to the user. If the gateway server 120 does not specify any policy within the assigned role for the user, then the gateway server 120 denies access to all services and all destinations by default. The gateway server 120 evaluates each policy in the assigned role to determine whether the user's requested services should be performed (STEP 225 ).
  • the policies are evaluated in the order of top to bottom, although the order can be changed by the use of the web-browser interface. All of the elements in each policy must match the requested service in order for the gateway server 120 to-allow the requested service (STEP 600 ). If any of the elements do not match the requested service, then the user is blocked from performing such a service (STEP 610 ).
  • Every member of an enterprise typically shares certain access privileges and these shared access privileges can be mapped according to the enterprise's structure by the gateway server 120 through a role inheritance feature. For example, all employees are likely to have access to some resources of the enterprise, but only members of the information technology group (IT) are likely to have access to others.
  • Commonly held privileges such as access to the cafeteria, can be defined as a base role.
  • the base role can be specified as a default set of privileges that are available (e.g., inherited).
  • the assigned role has an inherited role, even if the elements in the policies do not match the requested service, the requested service is not blocked until the inherited role is checked.
  • every employee is a staff member to the corporation, and thus might share the role of staff
  • Commonly held access privileges or the status of authorized users, such as staff can constitute an inherited role.
  • the inherited role has a set of default policies, or privileges granted to the users.
  • a change in the inherited role does not need to be repeated in the other specific roles, since this change will also be inherited by all the roles. Thus, there is less chance of error when a change is made only to the inherited role rather than to all the roles that use the inherited role.
  • the Sales role may only have FTP access to the Sales server and the Engineering-role may only have FTP access to the Engineering server.
  • all members of the corporation should be allowed to read or send e-mail and access the Web on any server as a staff of the corporation.
  • the gateway server 120 in order to configure an authorization system that takes advantage of inheritance, the gateway server 120 first defines an inherited role (e.g., Staff role) that lists privileges granted to everyone in the organization.
  • an inherited role e.g., Staff role
  • the same user interface display is used to configure the role of “Staff.”
  • the total bandwidth capacity allocated for all users within this role is set to 5 Mbits/second
  • the security protocol is set to PPTP
  • the policies are defined so that all “Staff” members can read or send e-mail and surf the Web on any server.
  • the inherited role of Staff is inserted in the “Inherit from role” box, so that the gateway server 120 automatically evaluates the inherited role if the server 120 cannot find a match in the policies set forth for the specific assigned role.
  • the policies in the inherited role are checked (as shown in phantom in STEP 605 ). If a match is found in the inherited policies, then matched performance is allowed for the user (STEP 600 ); otherwise, the requested service is blocked by the gateway server 120 .
  • additional gateway servers can be configured to provide a fault-tolerant configuration.
  • the gateway server 120 can be configured as a primary, on-line gateway server in an active state.
  • the other gateway server 820 can be configured as a back-up, stand-by gateway server. In another embodiment, there is more than one back-up gateway server.
  • the back-up gateway server 820 is configured so that all set-up information, additions, and changes to the primary server 120 are automatically propagated across and shared in real time with the back-up server 820 through a fail-over interface, e.g., an Ethernet adapter connecting the primary server 120 and the back-up server 820 .
  • the primary gateway server 120 alone manages the user and the wireless network while the back-up gateway server 820 remains in its stand-by mode.
  • the back-up server 820 monitors a “heartbeat” signal, e.g., exchange of short messages in a time frame, of the primary gateway server 120 and accepts input from the primary gateway server 120 . If the back-up server 820 does not detect a certain number of heartbeats in a specified amount of time, and realizes that the back-up server 820 is unable to communicate with the primary gateway server 120 via fail-over port 900 , then a fail-over takes a place and one of the back-up server 820 takes over the primary server role without requiring new set-ups and configurations. If the primary gateway server 120 recovers, then the gateway server 120 becomes the back-up gateway server to the gateway server 820 . Thus once again no manual intervention is necessary, and the same network availability is maintained through the back-up gateway server 820 .
  • a “heartbeat” signal e.g., exchange of short messages in a time frame
  • two or more gateway servers can be used in a large-scale wireless network in a multi-gateway server configuration. Replication of information among the multiple gateway servers can be useful in handling networks for a large organization. For example, it may be convenient to divide an enterprise's wireless local are network configuration by floors, subnets, buildings, and so on, by placing one gateway server per local wired subnet.
  • a user can remain seamlessly connected to the protected network without having to authenticate because the gateway servers communicate with each other.
  • the mobile device can be supported by the remaining gateway servers and maintain its connection even if the mobile device moves outside the communication range of the initial gateway server.
  • one gateway server in a multiple gateway server configuration, one gateway server is designated as a Master gateway server 900 and all other gateway servers are designated as Slave gateway servers 910 a - c (collectively 910 ).
  • the configuration information in the Master gateway server 900 except for data interface, maintenance, and status functions, is shared in real time with the Slave gateway servers 910 .
  • Initial setup information and subsequent changes are propagated from the Master gateway server 900 to the Slave gateway servers. 910 .
  • configuration changes are made on the Master gateway server 900 .
  • each of the primary gateway server 120 and the back-up gateway server 820 can provide configuration replication.
  • access to a protected network 910 can be controlled and facilitated by a mesh network of multiple gateway servers 920 , 950 , 955 , 960 .
  • An exemplary embodiment of each gateway servers 920 , 950 , 955 , 960 is described with reference to the gateway server 120 shown in FIGS. 1A and 1B .
  • the multiple gateway servers support a mesh network 970 architecture that facilitates the seamless roaming of the mobile device 100 , the redundant configuration (described with reference to FIG. 7 ) and the configuration replication (described with reference to FIG. 8 ).
  • the mesh network 970 of gateway servers 920 , 950 , 955 , 960 provides a single managed system where each of the gateway servers 920 , 950 , 955 , 960 communicates with each other.
  • the mesh network 970 of the gateway servers 920 , 950 , 955 , 960 is interposed between the protected network 910 and a mobile device 980 (and a network 985 ) to act as a boundary or a wall that separates the protected network 910 from unauthorized mobile devices.
  • the networks outside the mesh network 970 e.g., network 985
  • any number of gateway servers can be connected to the-protected network 910 to form the mesh network 970 of gateway servers.
  • each gateway server 920 , 950 , 955 , 960 can act as a point of communication for a mobile device 980 .
  • Each gateway server 920 , 950 , 955 , 960 can be, designated as a primary gateway server or a back-up for another gateway server.
  • each of the gateway servers 920 , 950 , 955 , 960 can support any number of connections to the other gateway servers in the mesh network 970 to provide one or combination of the seamless mobility architecture, the fail-over redundant configuration and configuration replication.
  • the gateway servers 920 , 950 , 955 , 960 communicate to each other connection information about the mobile device 980 .
  • one gateway server 920 can communicate connection information to another gateway server 950 and that gateway server 950 can subsequently relay the information to yet another gateway server 955 as the mobile device moves from one subnet to another.
  • the gateway server 920 can also distribute (e.g., broadcast) the connection information to other gateway servers 950 , 955 , 960 .
  • one gateway server 960 serves as a registry of connection information (also referred to as a home gateway server 960 ) for the mobile device 980 that is connected to one of the gateway servers 920 , 950 , 955 , 960 .
  • the seamless roaming architecture uses connections between each pair of gateway servers 920 , 950 , 955 , and 960 in the mesh network 970 to synchronize client connection information between the gateway servers 920 , 950 , 955 , 960 in the mesh network 970 as the mobile device 980 moves from the service area of one gateway server to another gateway server.
  • the mobile device enters the service area of the new gateway server 920 via the wireless local network 985 and the access point 1000 .
  • the authentication server (not shown in FIG. 9 , but shown as the authentication server 125 in FIG. 1A ) is configured to authenticate the mobile device based on the information collected from previous sessions between the mobile device 980 and different gateway servers in the mesh network 970 .
  • the mobile device 500 does not need to request a new network address to connect with the gateway server 920 nor re-register with the new gateway server 920 , as long as the gateway server 920 has been connected to one or more of the remaining gateway servers 950 , 955 , 960 in the mesh network 970 .
  • the mobile device 980 moves from the coverage area of one of the gateway servers 950 , 955 , 960 associated with a wireless network to the gateway server 920 associated with another wireless network 985 .
  • the associated wireless network of the gateway servers 920 , 950 , 955 , 960 can be any type of wireless or wired local area network, supporting any type of present and/or future networking protocols.
  • the initial wireless network can the same type of network as the wireless network 985 .
  • the initial wireless network can also be substantially incompatible with the wireless network 985 .
  • the mobile device 980 moves from the initial wireless network to the wireless network 985 .
  • the mobile device 980 sends data to the network address (e.g. MAC address) of the previous gateway server to forward these data to their destination.
  • the network address e.g. MAC address
  • the gateway servers 920 , 950 , 955 , 960 are connected via the mesh network 970 to maintain synchronized client/mobile device information while the mobile device 980 roams across the gateway servers 920 , 950 , 955 , 960 . Accordingly, the gateway server 920 responds to the request of the mobile-device 980 by providing its network address to the mobile device 980 , after verifying with an authentication server that the mobile device 980 has already been authenticated via the home gateway server 960 or any of the gateway servers in the mesh network 970 . The gateway server 920 can serve the mobile device 980 on behalf of the previous gateway servers 920 , 950 , 955 , 960 by communicating with the home gateway server 960 .
  • the gateway server 920 identifies the home gateway server 960 for the mobile device 980 and updates the location information of the mobile device 980 with the home gateway server 960 .
  • the gateway servers 920 , 950 , 955 , 960 in the mesh network 970 have established tunnels that route the requests of the mobile device 980 to the home gateway server 960 .
  • the data addressed to the mobile device 980 are first forwarded to the home gateway server 960 .
  • the home gateway server 960 then forwards the data to the gateway server 920 via the tunnel, which in turn forwards the data to the mobile device 980 via the wireless local area network 985 .
  • the gateway servers 920 , 950 , 955 , 960 are interconnected by a network connection that can be wireless or hard-wired.
  • the interconnection between the gateway servers 920 , 950 , 955 , 960 can serve to support configuration replication.
  • one of the gateway servers 920 , 950 , 955 , and 960 can be designated as a Master gateway server, and the others as Slave gateway servers as described above with reference to FIG. 8 .
  • Another set of interconnections between two or more of the gateway servers 920 , 950 , 955 ,. 960 can serve as a-fail-over port 900 to support the fail-over configuration, as described above with reference to FIG. 7 .

Abstract

The present invention can be used to facilitate the integration of wireless capability provided by wireless access points into an enterprise computer network. A gateway server is interposed between wireless access points and protected networks to provide security and integration functions, for example, authentication, access control, link privacy, link integrity, and bandwidth metering in various embodiments. Use of such a gateway server allows substantial control to be gained over network access even with the use of relatively simple access points. In general, such a gateway server receives a request to access the protected network. An authentication subsystem of the gateway server authenticates the user, preferably by accessing an external authentication server and returns a role to the authenticated user. An access controller in the gateway server provides differential access to the protected network based on the user's assigned role. A multiple gateway servers can be connected together to form a mesh network architecture.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This application claims priority to and the benefit of U.S. Provisional Patent Application Ser. No. 60/325,592, filed Sep. 28, 2001, entitled METHOD AND SYSTEM FOR MANAGING DATA TRAFFIC IN WIRELESS NETWORKS, the entire disclosure of which is hereby incorporated by reference.
  • TECHNICAL FIELD
  • This invention relates to the field of telecommunications and, more particularly, to the management of data traffic in wireless networks.
  • BACKGROUND INFORMATION
  • Wireless network technology allows a mobile user to wirelessly connect to a wired network, such as an enterprise's local area network (LAN) or wide area network (WAN), or to another wireless network. Enterprises today are rapidly deploying wireless technology, in part because of the decreasing cost of mobile devices (e.g., personal digital assistants like the Compaq iPAQ by Compaq Corporation of Houston, Tex. and laptop computers) and wireless access points, and in part because of the increasing ease of installation and deployment, among other reasons. Such wireless network technology can provide LAN and/or WAN service to enterprises' authorized users without wire installation and without tethering users to network connections. Wireless networks typically include mobile devices and wireless access points, which are portals to the wired network. Wireless access points are available with varying degrees of intelligence and functionality. Some merely act as bridges that relay wireless traffic into a wired network, while others provide additional functionality. Typically, simpler access points that provide less functionality cost less, but may not provide features necessary for operation within an enterprise.
  • Devices that conform to the IEEE 802.11 standard, a family of specifications for wireless networks developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE), are very popular and, particularly, the 802.11b technology has garnered wide acceptance in many businesses as standard networking technology. This technology effectively replaces an Ethernet cable from a router to a computer with a wireless link. Each 802.11b access point can support dozens of mobile devices by sharing 11 Mbps (megabits per second) of capacity. There can be up to three access points working in the same area, and each typically has an indoor range of 80 feet at 11 Mbps and 300 feet at 1 Mbps.
  • Despite the freedom and convenience provided by wireless networks, establishment of adequate security is a barrier to adoption. Wireless networks introduce a series of new security problems to organizations because physical connection to a network is not required for access. Wireless network signals typically have ranges beyond the physical confines of a building. Any compatible network adapter or access point within the range of an 802.11b access point can join the network. Thus, these networks can potentially make otherwise proprietary resources available to unauthorized users.
  • To offset the susceptibility of wireless networks to unauthorized accesses, the 802.11b standard provides a security protocol called Wired Equivalent Privacy (WEP). WEP attempts to provide a wireless network with a level of security and privacy comparable to a wired network by providing access control, link privacy and data integrity functions. When WEP is enabled on an 802.11b network, a secure key is entered into each mobile device and this key is used to encrypt and authenticate data.
  • Many practitioners view the security provided by WEP as inadequate, however, and for many applications users typically implement additional security measures to supplement the deficiencies of WEP. For example, several independent studies have shown that, with relatively minor effort, attackers can gain access to a WEP-secured wireless network by eavesdropping on the network. The studies have also shown that attackers can log on to WEP-enabled networks as bona fide users and send data into the networks without being detected.
  • To overcome WEP's flaws, industry organizations have recommended using Virtual Private Networks (VPNs) to provide security for wireless networks. Unfortunately, the currently available VPNs introduce additional implementation challenges. For example, some implementations require access points to be directly wired to a single VPN server (normally located in a central equipment room). VPNs typically provide only binary access to the organization's network, meaning a mobile device user can either have a complete access to the protected network or none at all. Further, a single 11 Mbps 802.11b access point can have an effective throughput of approximately three times more than the capacity of a T1 connection, which is the connection typically supported by some existing VPN servers. Thus, wireless network users might overload the VPN server, resulting in poor performance for both the wireless network and mobile device users.
  • SUMMARY OF THE INVENTION
  • Systems and methods according to the invention can be used to facilitate the secure integration of wireless capability provided by wireless access points into an enterprise computer network. A gateway server is interposed between one or more wireless access points and protected (e.g., wired) networks. That gateway server provides security and integration functions, for example, authentication, access control link privacy, link integrity, and bandwidth metering in various embodiments. Use of such a gateway server allows substantial control to be gained over network access even with the use of relatively simple (and inexpensive) access points. While the invention is particularly suited to the popular IEEE 802.11 wireless communication protocol, wireless access points are available that use a variety of present protocols, such as variations of 802.11 (e.g., 802.11a, 802.11b, 802.11g), Bluetooth, HiperLAN2, and 802.1x. The invention would be equally useful with other protocols and interfaces available now and in the future.
  • In one implementation, the present invention can address deficiencies in the WEP and VPN technologies by providing differential levels of access based on a category assigned to the user, rather than the binary configuration of according a user either fill access to the organization's network or none at all. The present invention can limit the bandwidth capacity of users, for example, so the 11 Mbps of capacity at each 802.11b access point cannot easily be saturated by a single user, leaving all other users stalled.
  • In general, in one aspect, a gateway server receives a request to access the protected network. This request typically comes from a mobile device operated by a user. The request is communicated from the mobile device to a wireless access point, and relayed by the wireless access point to the gateway server. The request might be an explicit request for access, and can include an identifier and authentication information (e.g., a PIN, password, digital certificate, encryption key, digital code, or some combination). The request might be an implicit request, such as a request to access network resources, a web page request, and so on.
  • Since the gateway server manages access control and security in a single integrated configuration, neither the mobile device nor the access points need to be intelligent to carry out the sophisticated access control and security functions to connect with wireless networks. Moreover, any changes in the networks, mobile devices, and access points do not result in significant changes, such as additions, modifications, or replacements, to the gateway server. In one implementation, the gateway server can be configured by a web-based interface, so that configuration changes can be incorporated in the gateway server by merely changing the parameters using the web-based interface.
  • In some implementations, an authentication subsystem of the gateway server authenticates the user of the mobile-device. This is preferably accomplished by accessing an external authentication server (e.g., a RADIUS, LDAP, or NTLM server). Enterprises typically use such servers in the operation of their networks. The use of an already operating external authentication server-simplifies network administration. The gateway server (and/or the external authentication server) can also authenticate a user that was previously authenticated via the same or a different gateway server without requiring re-communication of authentication information. A user is free to roam between different access points in wireless networks without having to terminate open connections. In another embodiment, the user can be authenticated using an authentication database within the gateway server, instead of or in combination with accessing an external authentication server. Because the authentication process is conducted solely by the gateway server, use of an internal or external authentication server is irrelevant and transparent to the user.
  • In some implementations, after the authentication process, the authenticated user of the mobile device can establish a VPN connection with the gateway server according to the Point-to-Point Protocol (PPTP) or Internet Protocol Security (IPSec) protocol. The VPN connection can provide additional security measures for the user and the protected network.
  • In one embodiment, the gateway server can passively monitor an authentication process when a user makes a request to authenticate to a server. If the user successfully authenticates, the gateway server assigns a role to the user based on the server with which the user authenticated. In one example, the gateway server can easily integrate with Microsoft NT and/or Windows environment. A user already registered and authenticated in such environment does not need to authenticate separately to the gateway server, since the gateway server assigns the role when the NT and/or Windows server accepted the user.
  • In some implementations, the user can authenticate via a secure web page without requiring additional software. The use of a secure web page can protect the wireless network from illicit monitoring. The gateway server receives identifier and authentication information from the user through a secure web page. The identifier and authentication information might be associated with a user of the mobile device, the mobile device itself, a smart card, an authentication token, and so on. For purposes of this discussion, authenticating the mobile device is understood to include any one or a combination of suitable authentication techniques for authenticating a device and/or a user of a device, depending on implementation. Examples of an identifier include one or a combination of username, e-mail address, and unique name. Examples of authentication information include one or a combination of a personal identification number (PIN), password, digital certificate, encryption key, and digital code. As discussed above, the user can use the same identification and authentication information used to access the protected resource in the wired environment.
  • Additionally, the gateway server can detect unauthorized access points by monitoring network traffic. In particular, the gateway server detects the presence of the unauthorized access points by monitoring SNMP, MAC addresses, and 802.11 DS Layer signals and characteristics of network traffic on both the protected and unprotected sides of the gateway server.
  • In one exemplary implementation, visitors to a corporation may be allowed to access the Internet at a low data rate by entering their e-mail address. Employees from other offices may be required to enter a username and password to access the Internet and resources permitted by their home office server. Employees working with highly sensitive data may be subject to a very high level of security available from the gateway server that utilizes certificates, smart cards and/or secure token technologies.
  • In one embodiment, before the user makes a request to access the protected network, a role is previously defined in the gateway server for the user. A role also can be assigned based on the attributes of a user as provided by the external authentication server.
  • In one embodiment, a role definer in the gateway server defines roles and assigns them to users. The role definer can specify network resources and degree of access to the protected network, including connection bandwidth limits. The role definer can also specify a tunneling protocol (e.g. IPSec or PPTP) associated with a role. Thus, for example, once a role is assigned to the user, the user's bandwidth capacity is limited according to the assigned role. Access privileges can be differentiated for authorized users based on roles, instead of the commonly used “all or nothing” access. A particular role can be defined with different privileges in multiple resource locations. For example, an “engineer” role can be defined with full access to engineering department servers, but limited access to finance department servers.
  • Once the user is authenticated and assigned a role, an access controller in the gateway server provides access to the protected network based on the assigned role. A role includes one or more policies specifying the scope of performances permitted for the user. For example, in one embodiment, policies can include action, service, connection direction (e.g., to or from protected network, or both), and destination (e.g., resources in the protected network). The access controller evaluates each of the policies in the role to determine whether the services requested by the user should be allowed. If elements in a policy match the user's requests, then the requested actions are performed. If a match is not found even after checking all the policies, then “inherited” roles can be checked for the user.
  • For example, every employee can share the role of staff The staff role can have a set of default policies, or privileges granted to everyone in the organization. A change to the inherited role need not be repeated in the other specific roles, since these changes will apply to all roles that inherit the change. If no match is found even with the default policies, the user is disallowed from performing the requested services.
  • In one embodiment, one or more additional gateway servers are interposed between the wireless network and the protected network to provide a fail-over configuration. If a first gateway server (also referred to as the primary server) fails, another gateway server (also referred to as the back-up server) receives the access request in the place of the first gateway server. In one implementation, there are more than one additional (or back-up) gateway servers. In this configuration, all set up information, additions and changes to the primary server are automatically propagated across and shared in real time with the back-up servers. The primary and the back-up gateway servers are connected via a fail-over interface. While the primary server is actively managing the user and the wireless network, the back-up servers remain idle. Concurrently, the back-up servers monitor a “heartbeat signal” of the primary server. If the back-up servers do not detect a certain number of heartbeats from the primary server in a specified amount of time, a fail-over occurs and one of the back-up servers takes over the role of the primary server and receives the requests from the user, without requiring new set-up and configuration.
  • In another embodiment, multiple gateway servers are interposed between different wireless networks and protected networks. These gateway servers replicate the configuration information of a single gateway server initially in communication with the mobile device. Such replication among the multiple gateway servers can be useful in administering a large-scale wireless network in that configuration changes are propagated from the single gateway server.
  • In some implementations, multiple gateway servers can be interposed between the protected network and unprotected wireless local area networks to create a “mesh network” architecture of gateway servers. The mesh network architecture can facilitate the seamless roaming of a mobile device from one gateway server to another gateway server, the fail-proof configuration, and the replication of configuration information for the gateway servers connected to form the mesh network. This mesh network of gateway servers acts as one managed system that controls access to the resources in the protected network via any of the various types of unprotected networks that could be in communication with the gateway servers. The unprotected networks can each be any of a radio-frequency based local are network, a cellular-based data network, or any type of a wired network. Any number of gateway servers can be supported by such a mesh network, depending upon implementation.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • In the drawings, like reference characters generally refer to the same parts throughout the different views. Also, the drawings are not necessarily to scale, emphasis instead generally being placed upon illustrating the principles of the invention.
  • FIG. 1A is a block diagram depicting an embodiment of a gateway server managing a connection between a mobile device and a protected network.
  • FIG. 1B is a block diagram depicting an embodiment of the gateway server as shown in FIG. 1A.
  • FIG. 2 is a flowchart depicting an embodiment of a method for managing a connection between a mobile device and a protected network.
  • FIG. 3 is a flowchart depicting role definition in one embodiment of the method of FIG. 2.
  • FIG. 4 is a user interface display in an embodiment for a system implementing the method of FIG. 2.
  • FIG. 5 is a flowchart depicting the details of evaluating policies in one embodiment of the method of FIG. 2.
  • FIG. 6 is a user interface display in an embodiment for a system implementing role inheritance.
  • FIG. 7 is a block diagram depicting a fail-proof configuration as described in an embodiment of the invention.
  • FIG. 8 is a block diagram depicting a multi-gateway server replication configuration.
  • FIG. 9 is a block diagram depicting an embodiment of a mesh network infrastructure including multiple gateway servers.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • Referring to FIG. 1A, in one embodiment, a user of a mobile device 100 communicates with an access point 102 a via a wireless local are network 105 to access a protected network 110. The access point 102 a is connected to a wired network 117, which includes a gateway server 120, the protected network 110, an authentication server 125, and a firewall 130 which is a gateway to the Internet 135. The mobile device 100 can be any sort of device that has wireless communication capability, including but not limited to handheld, small, and large computers, personal digital assistants, peripherals, appliances, machines, telephones, toys, games, and so on. In one implementation, the mobile device 100 enters the coverage area of the access point 102 a that communicates between the wireless network 105 and the wired network 117, and upon entry, the mobile device discovers and identifies the wireless network 105. The user of the mobile device 100 seeks to access the protected network 110 via the wireless network 105.
  • The wireless network 105 can be implemented with a wireless networking protocol, such as IEEE 802.11 (e.g., 802.11a, 802.11b, 802.11g), Bluetooth, ETSE HIPERLAN/2, and 802.1x, or other protocol. In some implementations, the wireless network 105 can support a wide variety of wireless networks, including cellular networks. In typical implementations, the wireless network 105 is radio frequency (RF) based network, operating on 2.4 GHz or 5.1 GHz. In another implementations, a private wireless network can be supported within privately-owned spectrum. It should be understood that the network 105 can be or can include or support any present or future wired or wireless networking protocol. The protected network 110 can be a wired network that typically includes an Ethernet network, and may include a DSL, T1, or T3 connection to yet another network, such as, for example, the Internet, or a WAN. The protected network 110 can be or can include or support any present or later-developed network, including without limitation, another wireless network.
  • For example, in an embodiment implemented in an enterprise setting, the mobile device 100 is typically a laptop computer or a hand-held device such as a personal digital assistant. The protected network 110 is typically a corporate or local intranet, which may or may not in turn access the Internet 135 through routers, gateways, firewalls 130, and so on. The access point 102 a thus provides wireless access to the corporate intranet 110 (and possibly the Internet 135) via the wireless network 105. As another example (not shown), in a home, the mobile device 100 may be one of various electronic devices, computers, and appliances that include wireless networking hardware, and the protected network provides a connection (e.g. via DSL or cable modem) from the home to an Internet service provider's network, which in turn connects to the Internet
  • Each of the access points 102 a, 102 b, and 102 c (collectively 102) may be a relatively simple communication device that relays communications between the mobile device 100 and the wired network 117. The access points 102 are typically located in the same subnet as each other. In a TCP/IP network, such as used in the Internet, subnets are segments of the network that are typically connected by routers, where the routers forward packets from one subnet to another based on a packet's destination. For example, the gateway server 120 might be located in a subnet made up of 255 or fewer network nodes, called a class C subnet, that each typically share a common portion of their IP address, for example, 201.100.1.X, where X represents the portion of the address that will be different for each node in the subnet.
  • The access point 102 a can be simple or complex in design and functionality. There can be multiple access points, 102 a, 102 b, and 102 c connected to the same subnet and there can be other access points connected to other subnets. The various access points can use the same or different protocols, to communicate with a gateway server 120. The gateway server 120 provides sophisticated control functionality, yet the access points 102 are gateway server, router, and network agnostic. The access points 102 can be more complex and include gateway, router, or other more sophisticated processing functionality, or some combinations, although this functionality typically is not required.
  • For example, in one embodiment, the access point 102 a is an off-the-shelf external PC-compatible access point. Such an access point typically has a data transfer rate of 11 Mbps in full duplex, thus 5.5 Mbps in either direction. The access point typically uses the Ethernet protocol but, since the gateway server 120 is access point agnostic, any type of present or future data link protocol supported by any manufacturer of the access point and the wireless devices can be used. The access point 102 a can also include WEP data encryption for enhanced security. Examples of access points include, but are not limited to, the AXIS 9010 Bluetooth Access Point offered by AXIS COMMUNICATIONS of Lund, Sweden, Cisco Aironet 340 and 350 series from Cisco Systems, Inc. of San Jose, Calif., 3 CRW series from 3Com Corp. of Santa Clara, Calif., the AP-2001 Bluetooth Access Point offered by ANYCOMI INC. of Irvine, Calif., D-Link Air Series from D-Link Systems, Inc. of Irvine, Calif., and the Harmony 802.11 Series from Proxim Inc. of Sunnyvale of California.
  • In one embodiment, the gateway server 120 provides sophisticated functionality while keeping the level of sophistication required of the access points 102 to a minimum. An exemplary gateway server is the WG-1000 Wireless Gateway from Bluesocket, Inc. of Burlington, Mass. A gateway server 120 can also be implemented as, or as part of, any other suitable network device with software to implement the functions described herein. The gateway server 120 can be implemented as a server-class computer, such a PC having a CPU board containing at least one processor operating at a speed greater than 866 MHz. In one embodiment, the processors are selected from the Pentium or Celeron family of processors manufactured by Intel Corporation of Santa Clara, Calif. In another embodiment processors are selected from the “680×0” and POWER PC family of processors manufactured by Motorola Corporation of Schaumburg, Ill., the Alpha line of processors manufactured by Compaq Corporation of Houston, Tex., the CRUSOE line of processors manufactured by Transmeta Corporation of Santa Clara, Calif., and the ATHLON line of processors manufactured by Advanced Micro Devices, Inc., of Sunnyvale, Calif. The server computer also includes a main memory unit for storing programs and/or data. The memory capacity is 256 MBs or greater, and may include random access memory (RAM, read only memory (ROM), and FLASH memory.
  • The gateway server 120 typically also includes one or more storage devices, such as hard disk drive and a floppy disk drive. Other additional peripheral devices also can be included in a gateway server including output devices (e.g., printer or plotter) and/or optical disk drives for receiving, reading, and/or writing digital data on a CD-ROM. and/or DVD. The controlling software program(s) and all of the data utilized by the program(s) are typically stored on one or more of the gateway server 120 storage mediums such as the hard disk drive, or the other additional peripheral devices, such as a CD-ROM.
  • The gateway server 120 can include a server-class operating system, such as Linux, available, for example, from Red Hat, Inc. of Durham, N.C., and Windows NT, available from Microsoft Corporation of Redmond, Wash. The gateway server can include a web server, for example an Apache web server, which sends out web pages in response to HTTP requests from remote browsers/users. An Apache server is an open-source HTTP server available from the Apache Software Foundation.
  • The gateway server 120 can also include IPSec or PPTP functionality according to the standards. Various software implementations of IPSec are available, including, for example, from Trilogy of Austin, Tex. Windows XP Pro IPSec Client, Windows 2000 IPSec Client, Safenet IPSec Client for Windows NT, Safenet IPSec Client for Windows 2000, SSH Sentinal IPSec Client for Windows NT or Windows 2000 from Microsoft Corp. of Redmond, Wash. Examples of software implementations of PPTP include, but are not limited to, the Windows 2000/XP/NT Client by Microsoft Corp. of Redmond, Wash. IPSec acts at the network layer, protecting and authenticating packets between participating devices, such as the access points 102 and the gateway server 120. One or more network interface cards (NICs) provide a physical connection to a wired or wireless network. The implementation of the NICs depends on the type of network 117, thus the gateway server 120 can utilize NIC from any vendor. If, for example, the wired network 117 is an Ethernet network, then the NICs provide an Ethernet interface. Examples of commercially available NICs are, but not limited to, EtherLink III Parallel Tasking Ethernet Adapters by 3Com of Santa Clara, Calif., Series A340, A350, and TrueMobile Series by Cisco Systems, Inc. of San Jose, Calif., D-Link Air Series by D-Link Systems, Inc. of Levine, Calif., Quartet Server NICs by Adaptec of Milpitas, Calif., and the Intel Pro 100 and 1000 Series from Intel Corp. of Santa Clara, Calif., among many others.
  • The gateway server 120 is connected to at least two networks, ie., the network to which the access points 102 are connected and the protected network 117, and the gateway server 120 forwards packets from one network to the other to reach their destination. The routing of packets is preferably performed by software running on the processor, in cooperation with the NICs and other hardware. Routing software is commercially available, for example, as part of the Linux operating system, and in various Windows server software programs.
  • An authentication server 125 is in communication with the gateway server 120. The gateway server-120 can use the authentication server 125 to authenticate the mobile device 100. The authentication server 125, which preferably is a RADIUS server, an LDAP server, or an NTLM server, can be administered by the same entity as the gateway server or can be a third-party authentication server, e.g., a server maintained by an authentication service provider and accessed, for example, over the Internet The authentication server 125 is preferably implemented with software running on one or more server-class computers. The authentication server 125 can also be implemented as a special-purpose hardware device. Examples of RADIUS authentication servers are Funk Steel Belted RADIUS from Funk Software Inc. of Cambridge, Mass., and the Microsoft Radius server from Microsoft Corp. of Redmond, Wash. Examples of LDAP authentication servers are Open LDAP and Microsoft Active Directory from Microsoft Corp. of Redmond, Wash.
  • Referring to FIG. 1B, one embodiment of the gateway server 120 includes a receiver 150, an authentication subsystem 155, a role assignor 160, and an access controller 165. The receiver 150 receives a user's request to access the protected network 110. The authentication subsystem 155 authenticates the user and the user's mobile device 100 using the external authentication server 125. The role assignor 160 assigns a role to the authenticate user. The access controller 165 provides access to the protected network 110 based on the user's assigned role. -
  • Referring now to FIG. 2 (also FIGS. 1A and 1B for reference), in one embodiment, a user of a mobile device 100 makes a request to access the protected network 110 (STEP 205). This request comes from a mobile device 100 operated by the user. The request is communicated from the mobile device 100 to one of the access points 102, and relayed by the access point 102 a, 102 b, or 102 c to the receiver 150 of the gateway server 120.
  • The user might make a request, for example, to access the protected network 110 to utilize the applications and retrieve information from the protected network 110. The user also may desire access to the protected network 110 to receive and transmit data across the wireless network 105 and the wired network 117 to another network. The request can include an identifier and authentication information, such as a user name and password. For a request to access highly sensitive network resource in the protected network 110, the gateway server 120 can require more than the user's name and password, such as one or more of a digital certificate and security codes. As another example, the request can be a web page request, only accessing the Internet and not the protected network 110. In this instance, the user's request may be made as just a request according to a particular protocol such as the hypertext transfer protocol (HTTP). Minimal information can be required for such a request, such as a user's e-mail address.
  • In one embodiment, as the gateway server 120 detects the presence of a new user, the gateway server 120 presents the mobile device with an authentication web page to make a request, which permits the user of the mobile device 100 to enter a name and password. The user is authenticated by the gateway server 120 based on the authentication information provided by the user. The request is transmitted through the wireless network 105 and forwarded to the access point 102 a.
  • The mobile device 100 enters the communication range of the access point 102 a associated with the wireless network 105 as the mobile device 100 physically moves from the access point 102 b to the second access point 102 a. The signal strength from the second access point 102 a becomes stronger than the signal strength from the first access point 102 b with respect to the mobile device 100. Subsequently, the mobile device 100 switches its communication from the first access point 102 b to the second access point 102 a based on the signal strength. Alternatively, regardless of the distance of the communication range or the signal strength, the access point 102 a may be selected because it is the only access point. available among the access points 102 and/or because it is a preferred access point (e.g., for load balancing purposes).
  • For example, the gateway server 120 may detect a triggering event that initiates a transfer of the mobile device 100 from one access point 102 b to another access point 102 a. One triggering event can occur as the mobile device 100 moves away from the communication range of the access point 102 b. The gateway server 120 detects poor or declining quality of the connection (e.g., radio link) between the mobile device 100 and the access point 102 b. A weakening reception of the wireless signal from the mobile device 100 can be indicated by increased packet loss to the mobile device 100 and/or by an indication of weakening reception, such as RSSI (Received Signal Strength Indication). A triggering event can also be indicated by congestion or a load balancing need of the access points 102 and the gateway server 120. For example, if the access point 102 b becomes congested with mobile devices in comparison with the access point 102 a, the gateway server 120 may decide to move the mobile device 100 to a less congested access point. A triggering event may also occur to fulfill a pre-defined service level for the user of the mobile device 100. Because the access point 102 a is not congested, the access point 102 a can ensure the user with a pre-defined service level. See, for example, U.S. patent application Ser. No. 10/055,028, filed Jan. 23, 2002, entitled METHODS AND SYSTEMS FOR ENABLING SEAMLESS ROAMING OF MOBILE DEVICES AMONG WIRELESS NETWORKS and U.S. patent application Ser. No. 10/032,199, filed Dec. 21, 2001, entitled METHODS AND SYSTEMS FOR CLOCK SYNCHRONIZATION ACROSS WIRELESS NETWORKS, which claims priority to U.S. Provisional Application Ser. No. 60/257,544, filed Dec. 26, 2000, the disclosures of which are incorporated herein by reference in their entirety.
  • Although not shown in this example, there is at least one gateway server 120 associated with each wired network subnet that connects the access points 102 and the gateway server 120. The gateway server 120 can monitor communications in the subnet (e.g., TCP communications) and respond to the request from the mobile device 100 communicating via one of the access points 102. It should be understood that the gateway server 120 can be connected to more than one subnet, particularly if the gateway server functionality is incorporated into a router or other device that typically is connected to more than one subnet.
  • The gateway server 120 authenticates the mobile device 100 utilizing its authentication subsystem 155, which may include authenticating the device or the user or owner of the device using an authentication server 125 (STEP 210). The authentication server 125 determines the access privileges assigned to users and allows access to the protected network 110 based on the access privileges. The authentication server 125 typically has information about authorized users or devices, and determines whether the mobile device 100 is authorized as well as the nature and extent of authorized access defined by, for example, a role (access privilege classification) and domain (area relevant to the user). For example, a student who takes history classes at a university may be assigned the “role” of a student member of the history department “domain,” and the student's mobile device 100 allowed to access the history department network only to the extent permitted to students. Thus the mobile device 100 can be authorized to initiate a session with the protected network 110 via the wireless network 105 based on the access privilege information provided by the authentication server 125.
  • In one particular implementation, an authentication server 125 is already used for central authentication in the protected network 110. In such a case, the user can use the same identification and authentication information as if the user were accessing the wired network 110 of the organization. As discussed above, the central authentication server can be any sort of server, including a RADIUS server, an LDAP server, or an NTLM server. Because this configuration uses only one database for all forms of authentication, including, for example, dial-up access and sever log-in, as well as wireless access, large networks with many users can be managed more easily.
  • In another embodiment, the user is authenticated initially with an authentication database maintained by the gateway server 120 and then re-authenticated with the central authentication server 125. In yet another embodiment, the gateway server 120 uses only its own internal authentication database, rather than the central authentication server 125 to authenticate the user of the mobile device 100. The internal authentication database can be used when the external authentication server 125 is not available. The internal authentication database can also be used to provide authentication without delay, waiting for a response from the external authentication server 125. The gateway server 120 maintains authorzed users' user names and passwords provided, for example, using an authentication web page in its internal authentication database. When a user is authenticated via the external authentication server 125, the gateway server 120 retains the authorized user's name and password, as well as the assigned role, and stores the information in the internal authentication database in a hashed form. When a user makes a request to log in, the gateway server 120 can perform a look-up in its internal database to see if the user's name and password are stored internally. If the requested user's name and password match the stored information in the internal database, then the gateway server returns the user's assigned role and grants access to the protected network 110 based thereon.
  • In one embodiment, authentication (STEP 210) is accomplished by interaction with an authentication web page maintained by, for example, the authentication server 125. The local gateway server 120 redirects all requests from the mobile device 100 made with a particular protocol (e.g., HTTP) to the authentication web page. The mobile device. 100 (or the user of the mobile device 100) then supplies identifier and authentication information to the authentication web page. Identifier information can include one or a combination of a username, e-mail address, or other unique name associated with the user of the mobile device 100, the mobile device 100, an object such as a smart card, and so on. Authentication information can include one or a combination of personal identification number (PIN), password, encryption key, biometric information, digital certification, and digital code, as well as other information that is associated with at least one of the user of the mobile device 100, the mobile device 100, a srart card, and so on.
  • The identity and authentication information required from the user can vary based on the status of-the user. For example, visitors to the organization may be allowed to access only the Internet at a low data rate by merely entering their e-mail address. Employees from branch offices may be required to enter their LAN and/or WAN username and password to access the Internet and resources permitted by their home office server. Employees working with highly sensitive data may be subject to the highest level of security available from the gateway server 120 requiring such items as digital certificates, smart cards, and secure token technologies.
  • Referring again to FIG. 2 (and still to FIGS. 1A and 1B), in one embodiment, the gateway server 120 responds to the request by assigning a role to the user (STEP 220) through its role assignor 160. A role sets a boundary for access privileges, such as particular network resources, bandwidth capacity, and security protocol, to which a group of users is restricted. The network resource privileges for a role are configured under one or more policies including Action, Service, Direction (network traffic from the protected side), and Destination (resources in the protected side). These are described further below. The role can designate that members of a role cannot use more than a stated maximum bandwidth set forth by the role. The role can also designate a security protocol for its members. For example, the gateway server 120 includes PPTP and IPSec.
  • The IPSec protocol is particularly useful for users communicating sensitive data to and from the protected network 110. IPSec is commonly used to describe a combination of two protocols: IPSec and IKE (Internet Key Exchange). IKE is a protocol that enables an encrypted connection to be negotiated between two end points. IPSec data exchange is based on symmetric keys; IKE uses asymmetric keys (e.g., keys from a public key infrastructure) to initiate an IPSec link. Any device on a network can be an endpoint of an IPSec link, and some access points may have this functionality. Even though IPSec is a standard, it can be implemented with different features and options that may be vendor dependent. IPSec does not require specific algorithms to be used for authentication, encryption, or compression, any algorithm(s) can be used within the parameters of the protocol. Examples of commonly supported algorithms are DES Data Encryption Standard), 3DES Triple DES), AES (Advanced Encryption Standard), and ECC (Elliptical Curve Cryptography). By placing the IPSec endpoint functionality in the gateway server 120 and not the access points 102, the version of IPSec supported by a given access point becomes irrelevant. Further, if the gateway server 120 provides IPSec functionality, the access point can remain simple and inexpensive.
  • As the mobile device 100-enters the communication range of the access points 102, one of the access points 102 can receive a signal from the mobile device 100 based on the criteria previously discussed. In one embodiment, the gateway server 120 can transparently authenticate the user without requiring any information from or interactions with the user. This transparent authentication allows the mobile device to roam seamlessly in a wireless network without having to submit authentication information when it changes to a subnet handled by a new gateway server. The mobile device 100 can move from one access point in one subnet to another access point in a different subnet without having to log out of its current session with the first subnet and obtain a new network address to connect to the new subnet.
  • In one embodiment, the gateway server 120 retains its connection information (also referred to as the context information) with a user of the mobile device 100 belonging to a role, a group of users performing similar duties in an enterprise. For example, even after the mobile device 100 moves outside the service area of the gateway server 120 and loses its connection with the gateway server 120, if the mobile device 100 returns to the service area of the gateway server 120 afterward, the mobile device 100 can access the protected network 110 without re-registration or re-authentication based on the connection information for the mobile device 100 retained and reused by the gateway server 120. The gateway server 120 sets access privileges for a role of users of the wireless network 105, so that the gateway server 120 can determine the access-privileges associated with the role to which a user belongs, in addition to the user and/or device identifier information. The device identifier is a unique identifier, such as a Media Access Control (MAC) address,. IP address, or other address or identifier.
  • The authentication server 125 identifies users belonging to a role in an enterprise, such as a student in a university. The gateway server 120 obtains access privilege information based on at least one of the device identifier, user identifier, the role membership information, and context information. Examples of context information are a network address of the mobile device 100 used for a previous session and pointer information to the user's role. The gateway server 120 saves the context information associated with a previous session between the mobile device 100 and the resource in the protected network 110 and reuses the information for the current session between the mobile device 100 and the resource without re-authentication. See, for example, U.S. patent application Ser. No. 09/911,092, filed Jul. 23, 2001, entitled METHOD AND SYSTEM FOR ENABLING SEAMLESS ROAMING IN A WIRELESS NETWORK, which claims priority to U.S. Provisional Application Ser. No. 60/220,385, filed Jul. 24, 2000 and U.S. patent application Ser. No. 10/035,569, filed Oct. 22, 2001, entitled METHOD AND SYSTEM FOR ENABLING CENTRALIZED CONTROL OF WIRELESS LOCAL AREA NETWORKS, which claims priority to U.S. Provisional Application Ser. No. 60,241,975, filed Oct. 23, 2000; the disclosures of which are incorporated herein by reference in their entirety.
  • Furthermore, in one embodiment, the gateway server 120 enables a mobile device to roam from a first wireless network associated with a first gateway server to a second wireless network associated with a second gateway server. In some instances, the first wireless network and second wireless networks use different communication technologies (e.g., a cellular network or a GGSN 2.5/3G network, and an 802.11b network). As the mobile device 100 enters the subnet of the second gateway server, the second gateway server receives a request for the first gateway server by the mobile device 100. The second gateway server recognizes that the request is for a known server, and as a result, the second gateway server responds to the request on behalf of the first gateway server and informs the mobile device that it is replacing the first gateway server in serving the mobile device 100. Based on the authentication and identification information of the mobile device 100 and a user of the mobile device 100, the second gateway server can identify the home gateway server of the mobile device and notify the home gateway server that the mobile device is currently communicating with the second gateway server. A tunnel may be established between the home gateway server and the second gateway server in order to forward data for the mobile device 100 via the tunnel to the second gateway server. See, for example, U.S. patent application Ser. No. 10/055,028, filed Jan. 23, 2002, entitled METHODS AND SYSTEMS FOR ENABLING SEAMLESS ROAMING OF MOBILE DEVICES AMONG WIRELESS NETWORKS, the disclosure of which is incorporated herein by reference in its entirety.
  • A detection feature of the gateway server 120 can detect the presence of unauthorized or “rogue” access points, for example, access points installed without the knowledge or approval of network managers of an enterprise. The gateway server 120 can monitor traffic on the network looking for MAC (Media Access Control) addresses associated with known access point vendors. The gateway server 120 can also detect the presence of unauthorized access points by monitoring SNMP and 802.11 DS Layer signals, and characteristics of network traffic on both the wired and wireless sides.
  • As discussed above, in one embodiment, the gateway server 120 authenticates the mobile device 100 using the authentication server 125. Initially, the local gateway server 120 redirects all HTTP requests from the mobile device 100 such that the web browser on mobile device 100 is presented with an authentication web page, which permits the user or the mobile device 100 to provide a user name and password. The central authentication server can be configured to permit the user to use the same identification and authentication information used to access other resources in the protected network 110. Once the user has been authenticated, the gateway server 120 returns the user to the web page originally requested.
  • In one implementation, to avoid capture of authentication information by rogue access points, the gateway server 120 can require all users to authenticate via a web browser page served from a secure web server that uses digital certificates. Using the Secure Sockets Layer (SSL) protocol, the browser recognizes that the server certificate is one of the reference certificates stored in the browser. Examples of web browsers include, but are not limited to, Microsoft Internet Explorer Browser and Netscape Browser.
  • In another embodiment, the gateway server 120 can passively monitor an authentication process between a mobile device and a server. If the server successfully authenticates the device, the gateway server assigns a role to the mobile device based on the authentication. A user authenticated in this manner does not need to authenticate separately to the gateway server, and in this way the gateway server operation is transparent to the user.
  • For example, in one embodiment, the gateway server 120 allows initial access by all mobile devices to a file server sufficient to allow authentication to that file server. If the authentication is successful, the mobile device 100 is assigned to a role designating privileges' associated with users who can access that file server. In one implementation, if authentication with the file server is not successful further access to that file server can be denied, for example after a certain number of attempts, or after a certain time period. In some embodiments, authentication information is extracted from the authentication protocol, for example a user name, or network address, network domain, or other identifier. The gateway server 120 specifies a role for the mobile device 100 based on this information if authentication with the server is successful.
  • This protocol is straightforwardly implemented in connection with the standard protocols currently in use for authentication. In one example, the gateway server 120 integrates with Microsoft NT and Windows 2000 environment by passively monitoring the communication between a mobile device and Windows servers. The user of the mobile device 100 authenticates only to Windows server, and the gateway server determines from the communication between mobile device and server whether the authentication was successful. For example, the gateway server can monitor the SMB and Kerberos protocol exchanges to verify that the user has successfully authenticated to specific servers. Based on the authentication results, a proper role is assigned.
  • J Referring still to FIGS. 1A, 1B, and 2, before the user makes a request to access the protected network 110, the gateway server 120 can be used to define a role for different individual users or groups of authorized users for the protected network 110 based on the users' roles or status in the organization (shown as optional STEP 200). In one embodiment, the gateway server 120 uses a web-browser interface to define a role and set up parameters for the role. A particular role can be configured with different privileges for resources. For example, an “engineering” role can be defined with full access in the engineering department servers, but limited access to the finance department servers. Additionally, a role can be defined with access to an IP address subnet or a router.
  • Referring to FIG. 3, defining a role includes specifying one or more policies that set the boundaries for each action or service to be allowed for members (STEP 400). In one embodiment, each policy has four elements: 1) Action, 2) Service, 3) Direction, and 4) Destination. The Action indicates whether the service under the corresponding policy is allowed or denied. The gateway server 120 includes a set of network services that users can access, if permitted by the role which they are assigned. Examples of available Service options are: HTFPS (Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL), HTTP, DNS, POP-3, SMTP, Telnet, SSH, FIP, POP-2, and so on. Additional network services can be specified. The Service can specify protocols such as TCP, UDP, both TCP/UDP or a protocol other than TCP and/or UDP. The Direction defines the direction of a network connection initiation for which the service access is allowed or denied from the perspective of the gateway server 120. For example, the Direction can be set as Outgoing, Incoming, and Both Ways. Outgoing means the network connections can only be initiated from the wireless side to services or destinations in the protected side 110, and Incoming refers to connections initiated from the protected side. Both Ways refers to bi-directional initiation. The Destination lists correspond to a resource or group of resources in the protected network 1 10. The Destination can be a single device or location within a network, for example, such as a marketing server. The Destination can also be all devices and/or location reachable within a network address space, such as all servers in a department's subnet. Policies can be easily added, deleted, and amended, e.g., through the use of a drop-down list in the web-browser interface.
  • For example, FIG. 4 is a user interface display in an embodiment for a system defining a role called “Engineering” that blocks access to the finance department server but allows web and e-mail access to all other servers and resources in the protected network 110. Still referring to FIGS. 2-4, when creating this role, the total bandwidth allocated to all users with the same role can be predetermined (STEP 410). The security protocol is defined as PPTP rather than IPSec (STEP 420). An additional security protocol, such as subnet VPN, can be added to provide more security measures for users. Thus, the gateway server 120 can set up, enable, and delete parameters for PPTP, IPSec, and a subnet VPN. For the first policy, the “Engineering” role is denied access to the financial server in both directions. For the second policy, HTTP service is allowed in the both directions for all servers in the protected network 110. For the third policy, HTTPS service is allowed in both directions for all servers in the protected network 110. For the fourth policy, SMTP service is allowed in only the outgoing direction for all servers in the protected network 110. For the fifth policy, POP-3 service is allowed only in the outgoing direction for all servers in the protected network 110.
  • Referring again to FIG. 2 (and still to FIGS. 1A and 1B), the access controller 165 of the gateway server 120 provides differential levels of access to the user based on the policies set forth in the user's assigned role (STEP 230). Once a role is assigned to the user, each policy in the role is evaluated (STEP 225) before allowing requested service to the user. If the gateway server 120 does not specify any policy within the assigned role for the user, then the gateway server 120 denies access to all services and all destinations by default. The gateway server 120 evaluates each policy in the assigned role to determine whether the user's requested services should be performed (STEP 225).
  • Referring to FIGS. 4 and 5, the policies are evaluated in the order of top to bottom, although the order can be changed by the use of the web-browser interface. All of the elements in each policy must match the requested service in order for the gateway server 120 to-allow the requested service (STEP 600). If any of the elements do not match the requested service, then the user is blocked from performing such a service (STEP 610).
  • Every member of an enterprise typically shares certain access privileges and these shared access privileges can be mapped according to the enterprise's structure by the gateway server 120 through a role inheritance feature. For example, all employees are likely to have access to some resources of the enterprise, but only members of the information technology group (IT) are likely to have access to others. Commonly held privileges, such as access to the cafeteria, can be defined as a base role. When defining a more responsible role, such as “member of IT,” the base role can be specified as a default set of privileges that are available (e.g., inherited).
  • Referring to FIG. 5, if the assigned role has an inherited role, even if the elements in the policies do not match the requested service, the requested service is not blocked until the inherited role is checked. As discussed previously, every employee is a staff member to the corporation, and thus might share the role of staff Commonly held access privileges or the status of authorized users, such as staff, can constitute an inherited role. Just like any other role, the inherited role has a set of default policies, or privileges granted to the users. A change in the inherited role does not need to be repeated in the other specific roles, since this change will also be inherited by all the roles. Thus, there is less chance of error when a change is made only to the inherited role rather than to all the roles that use the inherited role. For example, suppose the corporation has set up a Sales role and an Engineering role. The Sales role may only have FTP access to the Sales server and the Engineering-role may only have FTP access to the Engineering server. However, all members of the corporation should be allowed to read or send e-mail and access the Web on any server as a staff of the corporation.
  • Referring to FIG. 6, in order to configure an authorization system that takes advantage of inheritance, the gateway server 120 first defines an inherited role (e.g., Staff role) that lists privileges granted to everyone in the organization. Thus, just like the role-defining step as described previously in FIG. 2 and FIG. 4, the same user interface display is used to configure the role of “Staff.” As shown, the total bandwidth capacity allocated for all users within this role is set to 5 Mbits/second, the security protocol is set to PPTP, and the policies are defined so that all “Staff” members can read or send e-mail and surf the Web on any server. In the Engineering role web-interface of FIG. 4, the inherited role of Staff is inserted in the “Inherit from role” box, so that the gateway server 120 automatically evaluates the inherited role if the server 120 cannot find a match in the policies set forth for the specific assigned role. Thus, if a match is not found in the policies of the assigned role, then the policies in the inherited role are checked (as shown in phantom in STEP 605). If a match is found in the inherited policies, then matched performance is allowed for the user (STEP 600); otherwise, the requested service is blocked by the gateway server 120.
  • Referring to FIG. 7, additional gateway servers can be configured to provide a fault-tolerant configuration. The gateway server 120 can be configured as a primary, on-line gateway server in an active state. The other gateway server 820 can be configured as a back-up, stand-by gateway server. In another embodiment, there is more than one back-up gateway server. The back-up gateway server 820 is configured so that all set-up information, additions, and changes to the primary server 120 are automatically propagated across and shared in real time with the back-up server 820 through a fail-over interface, e.g., an Ethernet adapter connecting the primary server 120 and the back-up server 820. The primary gateway server 120 alone manages the user and the wireless network while the back-up gateway server 820 remains in its stand-by mode. The back-up server 820, meanwhile, monitors a “heartbeat” signal, e.g., exchange of short messages in a time frame, of the primary gateway server 120 and accepts input from the primary gateway server 120. If the back-up server 820 does not detect a certain number of heartbeats in a specified amount of time, and realizes that the back-up server 820 is unable to communicate with the primary gateway server 120 via fail-over port 900, then a fail-over takes a place and one of the back-up server 820 takes over the primary server role without requiring new set-ups and configurations. If the primary gateway server 120 recovers, then the gateway server 120 becomes the back-up gateway server to the gateway server 820. Thus once again no manual intervention is necessary, and the same network availability is maintained through the back-up gateway server 820.
  • Referring to FIG. 8, two or more gateway servers can be used in a large-scale wireless network in a multi-gateway server configuration. Replication of information among the multiple gateway servers can be useful in handling networks for a large organization. For example, it may be convenient to divide an enterprise's wireless local are network configuration by floors, subnets, buildings, and so on, by placing one gateway server per local wired subnet. In some embodiments, as discussed previously, a user can remain seamlessly connected to the protected network without having to authenticate because the gateway servers communicate with each other. Thus, once a mobile device and a user of the mobile device are authenticated by a gateway server, the mobile device can be supported by the remaining gateway servers and maintain its connection even if the mobile device moves outside the communication range of the initial gateway server.
  • In one embodiment, in a multiple gateway server configuration, one gateway server is designated as a Master gateway server 900 and all other gateway servers are designated as Slave gateway servers 910 a-c (collectively 910). The configuration information in the Master gateway server 900, except for data interface, maintenance, and status functions, is shared in real time with the Slave gateway servers 910. Initial setup information and subsequent changes are propagated from the Master gateway server 900 to the Slave gateway servers. 910. Thus, configuration changes are made on the Master gateway server 900. Referring to FIGS. 7 and 8, each of the primary gateway server 120 and the back-up gateway server 820 can provide configuration replication.
  • Referring to FIG. 9, access to a protected network 910 can be controlled and facilitated by a mesh network of multiple gateway servers 920, 950, 955, 960. An exemplary embodiment of each gateway servers 920, 950, 955, 960 is described with reference to the gateway server 120 shown in FIGS. 1A and 1B. The multiple gateway servers support a mesh network 970 architecture that facilitates the seamless roaming of the mobile device 100, the redundant configuration (described with reference to FIG. 7) and the configuration replication (described with reference to FIG. 8). The mesh network 970 of gateway servers 920, 950, 955, 960 provides a single managed system where each of the gateway servers 920, 950, 955, 960 communicates with each other. In addition, the mesh network 970 of the gateway servers 920, 950, 955, 960 is interposed between the protected network 910 and a mobile device 980 (and a network 985) to act as a boundary or a wall that separates the protected network 910 from unauthorized mobile devices. The networks outside the mesh network 970 (e.g., network 985) can be different types of networks, including RF based networks, cellular networks, 802.11 networks, or any other wireless or wired present and future networking protocols. Although only four gateway servers are shown in this example, any number of gateway servers can be connected to the-protected network 910 to form the mesh network 970 of gateway servers.
  • For example, each gateway server 920, 950, 955, 960 can act as a point of communication for a mobile device 980. Each gateway server 920, 950, 955, 960 can be, designated as a primary gateway server or a back-up for another gateway server. In combination with high level of security and access management features supported by each of the gateway servers 920, 950, 955, 960 (discussed previously), each of the gateway servers 920, 950, 955, 960 can support any number of connections to the other gateway servers in the mesh network 970 to provide one or combination of the seamless mobility architecture, the fail-over redundant configuration and configuration replication.
  • In one embodiment, the gateway servers 920, 950, 955, 960, communicate to each other connection information about the mobile device 980. For example, one gateway server 920 can communicate connection information to another gateway server 950 and that gateway server 950 can subsequently relay the information to yet another gateway server 955 as the mobile device moves from one subnet to another. The gateway server 920 can also distribute (e.g., broadcast) the connection information to other gateway servers 950, 955, 960. In another embodiment, one gateway server 960 serves as a registry of connection information (also referred to as a home gateway server 960) for the mobile device 980 that is connected to one of the gateway servers 920, 950, 955, 960.
  • In some implementations, the seamless roaming architecture uses connections between each pair of gateway servers 920,950, 955, and 960 in the mesh network 970 to synchronize client connection information between the gateway servers 920, 950, 955, 960 in the mesh network 970 as the mobile device 980 moves from the service area of one gateway server to another gateway server. In one exemplary embodiment, the mobile device enters the service area of the new gateway server 920 via the wireless local network 985 and the access point 1000. The authentication server (not shown in FIG. 9, but shown as the authentication server 125 in FIG. 1A) is configured to authenticate the mobile device based on the information collected from previous sessions between the mobile device 980 and different gateway servers in the mesh network 970. The mobile device 500 does not need to request a new network address to connect with the gateway server 920 nor re-register with the new gateway server 920, as long as the gateway server 920 has been connected to one or more of the remaining gateway servers 950, 955, 960 in the mesh network 970.
  • In one embodiment, the mobile device 980 moves from the coverage area of one of the gateway servers 950, 955, 960 associated with a wireless network to the gateway server 920 associated with another wireless network 985. The associated wireless network of the gateway servers 920, 950, 955, 960 can be any type of wireless or wired local area network, supporting any type of present and/or future networking protocols. The initial wireless network can the same type of network as the wireless network 985. The initial wireless network can also be substantially incompatible with the wireless network 985. In one embodiment, the mobile device 980 moves from the initial wireless network to the wireless network 985. The mobile device 980 sends data to the network address (e.g. MAC address) of the previous gateway server to forward these data to their destination. As discussed previously, the gateway servers 920, 950, 955, 960 are connected via the mesh network 970 to maintain synchronized client/mobile device information while the mobile device 980 roams across the gateway servers 920, 950, 955, 960. Accordingly, the gateway server 920 responds to the request of the mobile-device 980 by providing its network address to the mobile device 980, after verifying with an authentication server that the mobile device 980 has already been authenticated via the home gateway server 960 or any of the gateway servers in the mesh network 970. The gateway server 920 can serve the mobile device 980 on behalf of the previous gateway servers 920, 950, 955, 960 by communicating with the home gateway server 960. Because the mobile device 980 uses the same network address and maintains its connection with the protected network 910 throughout roaming, the change of the gateway servers is transparent (seamless) to the mobile device 980. The gateway server 920 identifies the home gateway server 960 for the mobile device 980 and updates the location information of the mobile device 980 with the home gateway server 960.
  • In some implementations, the gateway servers 920, 950, 955, 960 in the mesh network 970 have established tunnels that route the requests of the mobile device 980 to the home gateway server 960. Thus the data addressed to the mobile device 980 are first forwarded to the home gateway server 960. The home gateway server 960 then forwards the data to the gateway server 920 via the tunnel, which in turn forwards the data to the mobile device 980 via the wireless local area network 985.
  • In one embodiment, the gateway servers 920, 950, 955, 960, are interconnected by a network connection that can be wireless or hard-wired. The interconnection between the gateway servers 920, 950, 955, 960 can serve to support configuration replication. With regard to content/configuration replication, one of the gateway servers 920, 950, 955, and 960 can be designated as a Master gateway server, and the others as Slave gateway servers as described above with reference to FIG. 8. Another set of interconnections between two or more of the gateway servers 920, 950, 955,.960 can serve as a-fail-over port 900 to support the fail-over configuration, as described above with reference to FIG. 7. See, for example, U.S. patent application Ser. No. 10/055,028, filed Jan. 23, 2002, entitled METHODS AND SYSTEMS FOR ENABLING SEAMLESS ROAMING OF MOBILE DEVICES AMONG WIRELESS NETWORKS and U.S. patent application Ser. No. 09/911,092, filed Jul. 23, 2001, entitled METHOD AND SYSTEM FOR ENABLING SEAMLESS ROAMING IN A WIRELESS NETWORK, which claims priority to U.S. Provisional Application Ser. No. 60/220,385, filed Jul. 24, 2000, the disclosures of which are incorporated herein by reference in their entirety.
  • Variations, modifications, and other implementations-of what is described herein will occur to those of ordinary skill in the art without departing from the spirit and the scope of the invention as claimed. Accordingly, the invention is to be defined not by the preceding illustrative description but instead by the spirit and scope of the following claims.

Claims (48)

1. A method for managing access control and security with a gateway server interposed between a wireless local area network and a protected network, the method comprising the steps of:
(a) receiving, by a first gateway server from a user of a mobile device that is in communication with the gateway server via a wireless access point, a request to access the protected network;
(b) authenticating the user by the gateway server using an authentication server external to the gateway server;
(c) assigning a role to the authenticated user; and
(d) providing access to the protected network based on the assigned role.
2. The method of claim 1 further comprising providing a second gateway server interposed between the wireless network and the protected network for a fail-over configuration, and wherein step (a) further comprises receiving the request by the second gateway server if the first gateway server fails.
3. The method of claim 1, wherein the request to access the protected network received in step (a) comprises an identifier and authentication information.
4. The method of claim 3, wherein the identifier comprises at least one of a username, an email address, and an unique name.
5. The method of claim 3, wherein the authentication information comprises at least one of a PIN, password, digital certificate, encryption key, and digital code.
6. The method of claim 1, wherein the request to access the protected network received in step (a) comprises a request to access network resources.
7. The method of claim 6, wherein the authenticating step (b) comprises authenticating a previously authenticated user without requiring communication of authentication information.
8. The method of claim 1, wherein the external authentication server comprises a RADIUS server.
9. The method of claim 1, wherein the external authentication server comprises a LDAP server.
10. The method of claim 1, wherein the external authentication server comprises a NTLM server.
11. The method of claim 10, wherein the use of the external authentication server is transparent to the user.
12. The method of claim 11 further comprising the steps of:
(i) passively monitoring an authentication process, wherein the user makes a request to authenticate to a server; and
(ii) if the user successfully authenticates, assigning a role based on the server with which the user authenticated.
13. The method of claim 11, wherein the server is a Windows 2000 or NT server.
14. The method of claim 1, wherein the authenticating step (b) is performed substantially according to one of the Point-to-Point Tunneling Protocol (PPTP) or the IPSec protocol.
15. The method of claim 1 further comprising, prior to step (a), the step of defining the role for the user.
16. The method of claim 15, wherein the step of defining a role further comprises:
(i) specifying network resources available;
(ii) specifying a degree of access to the protected network; and
(iii) specifying an available connection bandwidth.
17. The method of claim 16, wherein-the defining step further comprises:
(iv) specifying a tunneling protocol.
18. The method of claim 16, wherein the defining step further comprises:
(v) specifying an inherited role.
19. The method of claim 1 further comprising replicating a plurality of second gateway servers interposed between the wireless network and the protected network from the first gateway server.
20. The method of claim 1 further comprising protecting from illicit monitoring using a secure web browser page.
21. The method of claim 1 further comprising detecting unauthorized access points by monitoring network traffic.
22. A gateway server for interposition between a wireless local area network and a protected network, the server comprising:
(a) a receiver for receiving, from a user of a mobile device via a wireless access point, a request to access the protected network;
(b) an authentication subsystem for externally authenticating the user;
(c) a role assignor in communication with the receiver and the authentication subsystem for assigning a role to the authenticated user; and
(d) an access controller in communication with the assignor for providing access to the protected network based on the assigned role.
23. The gateway server of claim 22 further comprising a second gateway server for interposition between the wireless network and the protected network to provide a fail-over configuration, and wherein the second gateway server receives the request if the first gateway server fails.
24. The gateway server of claim 22, wherein the request to access the protected network received by the receiver comprises an identifier and authentication information.
25. The gateway server of claim 24, wherein the identifier comprises at least one of a username, an email address, and an unique name.
26. The gateway server of claim 24, wherein the authentication information comprises at least one of a PIN, password, digital certificate, encryption key, and digital code.
27. The gateway server of claim 22, wherein the request to access the protected network received by the receiver comprises a request to access network resources.
28. The gateway server of claim 27, wherein the external authentication server authenticates the user as a user that previously authenticated without requiting communication of authentication information.
29. The gateway server of claim 22, wherein the external authentication server used comprises a RADIUS server.
30. The gateway server of claim 22, wherein the external authentication server used comprises a LDAP server.
31. The gateway server of claim 22, wherein the external authentication server used comprises a NTLM server.
32. The gateway server of claim 31, wherein the use of the external authentication server is transparent to the user.
33. The gateway server of claim 32, the server further comprising:
a passive monitor for monitoring an authentication process, wherein the user makes a request to authenticate to a server and
if the user authenticates successfully, assigning a role based on which server the user successfully authenticated.
34. The gateway server of claim 22, wherein user authenticates with a Windows 2000 or NT server.
35. The gateway server of claim 22, wherein the communication between the mobile device and the gateway server substantially is according to one of the Point-to-Point Protocol (PPTP) or the IPSec protocol.
36. The gateway server of claim 22 further comprising a role definer for defining the role for the user.
37. The gateway server of claim 36, wherein the role definer further comprises:
(i) specifying network resources available;
(ii) specifying a degree of access to the protected network; and
(iii) specifying an available connection bandwidth.
38. The gateway server of claim 37, wherein the role definer further comprises:
(iv) specifying a tunneling protocol.
39. The gateway server of claim 37, wherein the role definer further comprises:
(v) specifying an inherited role.
40. The gateway server of claim 22 further comprising a replicator for replicating a plurality of second gateway servers for interposition between the wireless network and the protected network from the gateway server.
41. The gateway server of claim 22 further comprising a secure web browser page.
42. The gateway server of clam 22 further comprising a detector for detecting unauthorized access points by monitoring network traffic and signals.
43. A gateway server for interposition between a wireless network and a protected network, the server comprising:
(a) means for receiving, from a user of a mobile device via a wireless access point, a request to access the protected network;
(b) means for externally authenticating the user;
(c) means for assigning a role to the authenticated user; and
(d) means for providing access to the protected network based on the assigned role.
44. A mesh network of gateway servers comprising:
a plurality of gateway servers each in communication with a wireless local area network and a protected network, each of the plurality of gateway servers in communication with each other to facilitate hand-off of a mobile device from one of the plurality of gateway servers to another of the plurality of gateway servers, and,
wherein each of the plurality of gateway servers comprises: (i) a receiver for receiving, from a user of a mobile device via a wireless access point, a request to access the protected network; (ii) an authentication subsystem for externally authenticating the user; (iii) a role assignor in communication with the receiver and the authentication subsystem for assigning a role to the authenticated user; and (iv) an access controller in communication with the assignor for providing access to the protected network based on the assigned role.
45. The network of claim 44, wherein each of the plurality of gateway servers provides a fail-over configuration and configuration replication.
46. The system of claim 44, wherein at least two of the plurality of gateway are in communication with substantially different types networks.
47. The system of claim 46, wherein at least one of the plurality of gateway servers supports a cellular network.
48. The system of claim 46, wherein at least one of the plurality of gateway servers are in communication with radio-frequency based network.
US11/370,586 2001-09-28 2006-03-08 Method and system for managing data traffic in wireless networks Abandoned US20060234678A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/370,586 US20060234678A1 (en) 2001-09-28 2006-03-08 Method and system for managing data traffic in wireless networks

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US32559201P 2001-09-28 2001-09-28
US10/259,248 US7042988B2 (en) 2001-09-28 2002-09-27 Method and system for managing data traffic in wireless networks
US11/370,586 US20060234678A1 (en) 2001-09-28 2006-03-08 Method and system for managing data traffic in wireless networks

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/259,248 Continuation US7042988B2 (en) 2001-09-28 2002-09-27 Method and system for managing data traffic in wireless networks

Publications (1)

Publication Number Publication Date
US20060234678A1 true US20060234678A1 (en) 2006-10-19

Family

ID=23268523

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/259,248 Expired - Lifetime US7042988B2 (en) 2001-09-28 2002-09-27 Method and system for managing data traffic in wireless networks
US11/370,586 Abandoned US20060234678A1 (en) 2001-09-28 2006-03-08 Method and system for managing data traffic in wireless networks

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/259,248 Expired - Lifetime US7042988B2 (en) 2001-09-28 2002-09-27 Method and system for managing data traffic in wireless networks

Country Status (3)

Country Link
US (2) US7042988B2 (en)
AU (1) AU2002343424A1 (en)
WO (1) WO2003029916A2 (en)

Cited By (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030079029A1 (en) * 2001-10-18 2003-04-24 Sandilya Garimella Single system user identity
US20040010631A1 (en) * 2002-05-02 2004-01-15 Timothy Potter Adapter deployment without recycle
US20040078440A1 (en) * 2002-05-01 2004-04-22 Tim Potter High availability event topic
US20040081144A1 (en) * 2002-09-17 2004-04-29 Richard Martin System and method for access point (AP) aggregation and resiliency in a hybrid wired/wireless local area network
US20040100973A1 (en) * 2002-11-27 2004-05-27 Prasad Anand R. Access control protocol for wireless systems
US20040167915A1 (en) * 2003-02-25 2004-08-26 Bea Systems, Inc. Systems and methods for declaratively transforming data objects between disparate representations
US20040172618A1 (en) * 2003-02-28 2004-09-02 Bea Systems, Inc. Systems and methods for a common runtime container framework
US20040187127A1 (en) * 2003-02-25 2004-09-23 Albert Gondi Systems and methods for transaction chaining
US20050073982A1 (en) * 2003-10-07 2005-04-07 Accenture Global Services Gmbh. Connector gateway
US20050147049A1 (en) * 2004-01-06 2005-07-07 Hava Corp. Telephone with automatic switching between cellular and VoIP networks
US20060002350A1 (en) * 2004-07-02 2006-01-05 Cyrus Behroozi Access point control of client roaming
US20060030953A1 (en) * 2003-10-30 2006-02-09 Stephen Cantrell Remote monitoring of a hot melt adhesive system
US20060050721A1 (en) * 2004-01-06 2006-03-09 Hava Corporation Method of determing broadband content usage within a system
US20060050663A1 (en) * 2004-01-06 2006-03-09 Hava Corporation Apparatus for controlling broadband access and distribution of content and communications through an access point
US20060050687A1 (en) * 2004-01-06 2006-03-09 Hava Corporation Access point with controller for billing and generating income for access point owner
US20060121894A1 (en) * 2004-01-06 2006-06-08 Hava Corporation Mobile telephone VOIP/cellular seamless roaming switching controller
US20060147043A1 (en) * 2002-09-23 2006-07-06 Credant Technologies, Inc. Server, computer memory, and method to support security policy maintenance and distribution
US20060190984A1 (en) * 2002-09-23 2006-08-24 Credant Technologies, Inc. Gatekeeper architecture/features to support security policy maintenance and distribution
US20060236363A1 (en) * 2002-09-23 2006-10-19 Credant Technologies, Inc. Client architecture for portable device with security policies
US20060242685A1 (en) * 2002-09-23 2006-10-26 Credant Technologies, Inc. System and method for distribution of security policies for mobile devices
US20070004386A1 (en) * 2005-06-30 2007-01-04 Singh Munindar P Methods, systems, and computer program products for role-and locale-based mobile user device feature control
US20070220305A1 (en) * 2006-03-20 2007-09-20 Nec Corporation Multiplex server system and server multiplexing method
US20070293210A1 (en) * 2006-06-20 2007-12-20 Lyle Strub Secure communication network user mobility apparatus and methods
US20080025243A1 (en) * 2003-10-07 2008-01-31 Accenture Global Services Gmbh Mobile Provisioning Tool System
US20080076393A1 (en) * 2006-09-22 2008-03-27 Amit Khetawat Method and apparatus for securing communication between an access point and a network controller
US20080101314A1 (en) * 2006-10-27 2008-05-01 Alexander Bachmutsky Network-based reliability of mobility gateways
US20080192629A1 (en) * 2007-02-14 2008-08-14 Tropos Networks, Inc. Wireless data packet classification
US20090037999A1 (en) * 2007-07-31 2009-02-05 Anderson Thomas W Packet filtering/classification and/or policy control support from both visited and home networks
US7650276B2 (en) 2003-02-26 2010-01-19 Bea Systems, Inc. System and method for dynamic data binding in distributed applications
US7650592B2 (en) 2003-03-01 2010-01-19 Bea Systems, Inc. Systems and methods for multi-view debugging environment
US7676538B2 (en) 2002-05-02 2010-03-09 Bea Systems, Inc. Systems and methods for application view transactions
US7707564B2 (en) 2003-02-26 2010-04-27 Bea Systems, Inc. Systems and methods for creating network-based software services using source code annotations
US7721193B2 (en) 2001-10-18 2010-05-18 Bea Systems, Inc. System and method for implementing a schema object model in application integration
US7774697B2 (en) 2003-02-25 2010-08-10 Bea Systems, Inc. System and method for structuring distributed applications
US7840611B2 (en) 2002-05-01 2010-11-23 Oracle International Corporation High availability for event forwarding
US7840532B2 (en) 2002-05-01 2010-11-23 Oracle International Corporation System and method for storing large messages
US7844636B2 (en) 2003-02-25 2010-11-30 Oracle International Corporation Systems and methods for client-side filtering of subscribed messages
US20100303087A1 (en) * 2007-03-06 2010-12-02 Zte Corporation Method and System for Controlling Network Access
US20110069188A1 (en) * 2004-09-24 2011-03-24 Singh Munindar P Policy-Based Controls For Wireless Cameras
US20110075675A1 (en) * 2009-09-26 2011-03-31 Rajeev Koodli Providing services at a communication network edge
US7953787B2 (en) 2002-05-02 2011-05-31 Oracle International Corporation System and method for providing highly available processing of asynchronous requests using distributed request and response queues and a service processor
US20110179267A1 (en) * 2008-09-19 2011-07-21 Chengdu Huawei Symantec Technologies Co., Ltd. Method, system and server for implementing security access control
US8015572B2 (en) 2002-02-22 2011-09-06 Oracle International Corporation Systems and methods for an extensible software proxy
US8032860B2 (en) 2003-02-26 2011-10-04 Oracle International Corporation Methods for type-independent source code editing
US20110299548A1 (en) * 2010-06-04 2011-12-08 Xuemin Chen Method and system for porting gateway functionality associated with a user from a first gateway to one or more other gateways
US8135772B2 (en) 2002-05-01 2012-03-13 Oracle International Corporation Single servlets for B2B message routing
US20120096521A1 (en) * 2010-10-13 2012-04-19 Salesforce.Com, Inc. Methods and systems for provisioning access to customer organization data in a multi-tenant system
US20120222083A1 (en) * 2011-02-28 2012-08-30 Nokia Corporation Method and apparatus for enforcing data privacy
US8345695B1 (en) * 2008-06-17 2013-01-01 United Services Automobile Association (Usaa) Systems and methods for implementing network gateway in catastrophe context or the like
US20130044694A1 (en) * 2011-08-17 2013-02-21 Verizon Patent And Licensing, Inc. Using user device feed back to dynamically allocate network resources for provisioning services
US20130086142A1 (en) * 2011-09-30 2013-04-04 K. Georg Hampel System and Method for Mobility and Multi-Homing Content Retrieval Applications
US8452965B1 (en) * 2010-06-29 2013-05-28 Emc Corporation Self-identification of tokens
US8477730B2 (en) 2011-01-04 2013-07-02 Cisco Technology, Inc. Distributed load management on network devices
US8526929B1 (en) * 2009-09-25 2013-09-03 Sprint Communications Company L.P. Mobile communication device provisioning and management
US8655787B1 (en) 2010-06-29 2014-02-18 Emc Corporation Automated detection of defined input values and transformation to tokens
US8737221B1 (en) 2011-06-14 2014-05-27 Cisco Technology, Inc. Accelerated processing of aggregate data flows in a network environment
US8743696B2 (en) 2009-08-07 2014-06-03 Cisco Technology, Inc. Mobile transport solution for offloading to an alternate network
US8743690B1 (en) 2011-06-14 2014-06-03 Cisco Technology, Inc. Selective packet sequence acceleration in a network environment
US8787303B2 (en) 2010-10-05 2014-07-22 Cisco Technology, Inc. Methods and apparatus for data traffic offloading at a router
US8792353B1 (en) 2011-06-14 2014-07-29 Cisco Technology, Inc. Preserving sequencing during selective packet acceleration in a network environment
US8792495B1 (en) 2009-12-19 2014-07-29 Cisco Technology, Inc. System and method for managing out of order packets in a network environment
US8948013B1 (en) 2011-06-14 2015-02-03 Cisco Technology, Inc. Selective packet sequence acceleration in a network environment
US9003057B2 (en) 2011-01-04 2015-04-07 Cisco Technology, Inc. System and method for exchanging information in a mobile wireless network environment
US9009293B2 (en) 2009-11-18 2015-04-14 Cisco Technology, Inc. System and method for reporting packet characteristics in a network environment
US9015318B1 (en) 2009-11-18 2015-04-21 Cisco Technology, Inc. System and method for inspecting domain name system flows in a network environment
US9148380B2 (en) 2009-11-23 2015-09-29 Cisco Technology, Inc. System and method for providing a sequence numbering mechanism in a network environment
US9215075B1 (en) 2013-03-15 2015-12-15 Poltorak Technologies Llc System and method for secure relayed communications from an implantable medical device
US9565117B2 (en) 2010-12-22 2017-02-07 Cisco Technology, Inc. Adaptive intelligent routing in a communication system
US20170076103A1 (en) * 2015-09-14 2017-03-16 Northwestern University System and method for proxy-based data access mechanism in enterprise mobility management
US10123368B2 (en) 2012-02-23 2018-11-06 Cisco Technology, Inc. Systems and methods for supporting multiple access point names for trusted wireless local area network
US10320989B2 (en) 2005-02-11 2019-06-11 Vasu Networks Corporation Access point with controller for billing and generating income for access point owner
US10419996B2 (en) 2004-01-06 2019-09-17 Vasu Networks Corporation Mobile device with automatic switching between cellular and wifi networks
US11930126B2 (en) 2023-02-15 2024-03-12 Piltorak Technologies LLC System and method for secure relayed communications from an implantable medical device

Families Citing this family (411)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7213061B1 (en) * 1999-04-29 2007-05-01 Amx Llc Internet control system and method
US8719562B2 (en) * 2002-10-25 2014-05-06 William M. Randle Secure service network and user gateway
WO2002009458A2 (en) * 2000-07-24 2002-01-31 Bluesocket, Inc. Method and system for enabling seamless roaming in a wireless network
DE10114208A1 (en) * 2001-03-23 2002-05-08 Trw Automotive Safety Sys Gmbh Gasbag module assembly process involves stowing at least one component in cover, creating negative pressure in cover and closing it, making it gastight
US6944678B2 (en) * 2001-06-18 2005-09-13 Transtech Networks Usa, Inc. Content-aware application switch and methods thereof
US7245716B2 (en) 2001-12-12 2007-07-17 International Business Machines Corporation Controlling hold queue position adjustment
US7167551B2 (en) 2001-12-12 2007-01-23 International Business Machines Corporation Intermediary device based callee identification
US9088645B2 (en) * 2001-12-12 2015-07-21 International Business Machines Corporation Intermediary device initiated caller identification
US7443970B2 (en) 2001-12-17 2008-10-28 International Business Machines Corporation Logging calls according to call context
JP4168714B2 (en) * 2001-12-17 2008-10-22 ソニー株式会社 COMMUNICATION DEVICE AND METHOD, RECORDING MEDIUM, AND PROGRAM
JP2003198557A (en) * 2001-12-26 2003-07-11 Nec Corp Network, and wireless lan authenticating method to be used therefor
EP1324560B1 (en) * 2001-12-28 2008-01-16 Motorola, Inc. Communication over a selected part of a network
US7325246B1 (en) * 2002-01-07 2008-01-29 Cisco Technology, Inc. Enhanced trust relationship in an IEEE 802.1x network
US7149196B1 (en) * 2002-01-11 2006-12-12 Broadcom Corporation Location tracking in a wireless communication system using power levels of packets received by repeaters
US7672274B2 (en) * 2002-01-11 2010-03-02 Broadcom Corporation Mobility support via routing
US7876704B1 (en) 2002-01-11 2011-01-25 Broadcom Corporation Tunneling protocols for wireless communications
US6862448B1 (en) * 2002-01-11 2005-03-01 Broadcom Corporation Token-based receiver diversity
US6788658B1 (en) * 2002-01-11 2004-09-07 Airflow Networks Wireless communication system architecture having split MAC layer
US7515557B1 (en) 2002-01-11 2009-04-07 Broadcom Corporation Reconfiguration of a communication system
US20030224788A1 (en) * 2002-03-05 2003-12-04 Cisco Technology, Inc. Mobile IP roaming between internal and external networks
US7447162B1 (en) 2002-03-05 2008-11-04 Cisco Technology, Inc. Methods and apparatus for anchoring of mobile nodes using DNS
US7461169B2 (en) * 2002-03-05 2008-12-02 Cisco Technology, Inc. DHCP based home address management of mobile IP clients
US8090828B2 (en) * 2002-03-05 2012-01-03 Cisco Technology, Inc. Method and apparatus for reusing DHCP addresses in home addresses of mobile IP clients
GB2387994B (en) * 2002-04-23 2004-06-30 Lucent Technologies Inc Selection of access point devices in a wireless communication network
KR100470303B1 (en) * 2002-04-23 2005-02-05 에스케이 텔레콤주식회사 Authentication System and Method Having Mobility for Public Wireless LAN
US7525940B2 (en) * 2002-04-26 2009-04-28 Nokia Siemens Networks Oy Relocation of content sources during IP-level handoffs
US8554915B2 (en) * 2002-05-15 2013-10-08 Telcordia Technologies Inc. Management of communication among network devices having multiple interfaces
US7532895B2 (en) * 2002-05-20 2009-05-12 Air Defense, Inc. Systems and methods for adaptive location tracking
US7113498B2 (en) * 2002-06-05 2006-09-26 Broadcom Corporation Virtual switch
JP4016255B2 (en) * 2002-06-11 2007-12-05 日本電気株式会社 Mobile communication system and multi-frequency load balancing method
US6853628B2 (en) * 2002-06-28 2005-02-08 Interdigital Technology Corporation System for facilitating personal communications with multiple wireless transmit/receive units
US20040001475A1 (en) * 2002-07-01 2004-01-01 Olli Mikkonen Routing for virtual private networks
US7327705B2 (en) * 2002-07-03 2008-02-05 Massachusetts Institute Of Technology Hybrid wireless network for data collection and distribution
US7532568B1 (en) * 2002-07-09 2009-05-12 Nortel Networks Limited Geographic redundancy for call servers in a cellular system based on a bearer-independent core network
JP3691464B2 (en) * 2002-07-30 2005-09-07 Tdk株式会社 Wireless access point
US7421266B1 (en) 2002-08-12 2008-09-02 Mcafee, Inc. Installation and configuration process for wireless network
US8619728B2 (en) 2002-09-17 2013-12-31 Broadcom Corporation Method and system for providing an intelligent switch for bandwidth management in a hybrid wired/wireless local area network
WO2004034229A2 (en) 2002-10-10 2004-04-22 Rocksteady Networks, Inc. System and method for providing access control
KR100485974B1 (en) * 2002-10-10 2005-05-03 엔에이치엔(주) Method and System for Providing Contents
EP1538779B1 (en) * 2002-10-11 2020-02-19 Panasonic Intellectual Property Corporation of America Identification information protection method in wlan interconnection
US7587512B2 (en) 2002-10-16 2009-09-08 Eric White System and method for dynamic bandwidth provisioning
AU2003286643A1 (en) * 2002-10-17 2004-05-04 Enterasys Networks, Inc. System and method for ieee 802.1x user authentication in a network entry device
US7752329B1 (en) * 2002-10-31 2010-07-06 Aol Inc. Migrating configuration information based on user identity information
US7313384B1 (en) 2002-10-31 2007-12-25 Aol Llc, A Delaware Limited Liability Company Configuring wireless devices
US7283505B1 (en) * 2002-10-31 2007-10-16 Aol Llc, A Delaware Limited Liability Company Configuring wireless access points
US20040088550A1 (en) * 2002-11-01 2004-05-06 Rolf Maste Network access management
KR100464319B1 (en) * 2002-11-06 2004-12-31 삼성전자주식회사 Network architecture for use in next mobile communication system and data communication method using the same
AU2003280251A1 (en) * 2002-11-08 2004-06-07 Research In Motion Limited System and method of connection control for wireless mobile communication devices
KR20040049667A (en) * 2002-12-06 2004-06-12 엘지전자 주식회사 Home network's system and its operating method for the same
US20040123147A1 (en) * 2002-12-19 2004-06-24 Christopher White Control of security or ease-of-use sensitivity for a wireless communication device
US7298702B1 (en) 2002-12-20 2007-11-20 Sprint Spectrum L.P. Method and system for providing remote telephone service via a wireless local area network
US7633909B1 (en) * 2002-12-20 2009-12-15 Sprint Spectrum L.P. Method and system for providing multiple connections from a common wireless access point
US20040230661A1 (en) * 2003-01-29 2004-11-18 Gus Rashid Rules based notification system
US7359716B2 (en) * 2003-01-31 2008-04-15 Douglas Rowitch Location based service (LBS) system, method and apparatus for authorization of mobile station LBS applications
CA2514620A1 (en) * 2003-01-31 2004-08-19 Qualcomm Incorporated Location based service (lbs) system, method and apparatus for triggering of mobile station lbs applications
US7016690B2 (en) * 2003-02-10 2006-03-21 Flarion Technologies, Inc. Methods and apparatus for updating mobile node location information
US7069000B1 (en) * 2003-02-10 2006-06-27 Flarion Technologies, Inc. Security methods for use in a wireless communications system
US20040157626A1 (en) * 2003-02-10 2004-08-12 Vincent Park Paging methods and apparatus
US20040156372A1 (en) * 2003-02-12 2004-08-12 Timo Hussa Access point service for mobile users
JP2004266610A (en) * 2003-03-03 2004-09-24 Nec Corp Communication system, remote access server device, resource management method and program
US20040174900A1 (en) * 2003-03-06 2004-09-09 Incucomm, Inc. A Delaware Corporation Method and system for providing broadband multimedia services
US20040243848A1 (en) * 2003-03-06 2004-12-02 Blackburn Christopher W. Authentication service in a service-oriented gaming network environment
US20060171402A1 (en) * 2003-03-06 2006-08-03 Moore John A Method and system for providing broadband multimedia services
EP1604490B1 (en) * 2003-03-10 2016-02-03 Deutsche Telekom AG Method and arrangement for externally controlling and managing at least one wlan subscriber who is assigned to a local radio network
US7490348B1 (en) 2003-03-17 2009-02-10 Harris Technology, Llc Wireless network having multiple communication allowances
JP2004302512A (en) * 2003-03-28 2004-10-28 Hitachi Ltd Cluster computing system and fail-over method for the same
US7729686B2 (en) 2003-04-02 2010-06-01 Qualcomm Incorporated Security methods for use in a wireless communications system
US8196000B2 (en) 2003-04-02 2012-06-05 Qualcomm Incorporated Methods and apparatus for interleaving in a block-coherent communication system
US20040259640A1 (en) * 2003-04-16 2004-12-23 Gentles Thomas A. Layered security methods and apparatus in a gaming system environment
US7359676B2 (en) 2003-04-21 2008-04-15 Airdefense, Inc. Systems and methods for adaptively scanning for wireless communications
US7522908B2 (en) 2003-04-21 2009-04-21 Airdefense, Inc. Systems and methods for wireless network site survey
US20040223470A1 (en) * 2003-05-08 2004-11-11 Adrian Smith Systems and methods for dynamic resource allocation
EP1634171B1 (en) * 2003-05-28 2007-11-14 Symbol Technologies, Inc. Backup cell controller
US7447176B2 (en) * 2003-06-03 2008-11-04 Microsoft Corporation Making roaming decisions based on association qualities between wireless devices and wireless access points
EP1629655A1 (en) 2003-06-05 2006-03-01 Wireless Security Corporation Methods and systems of remote authentication for computer networks
US7873716B2 (en) * 2003-06-27 2011-01-18 Oracle International Corporation Method and apparatus for supporting service enablers via service request composition
US20050015340A1 (en) * 2003-06-27 2005-01-20 Oracle International Corporation Method and apparatus for supporting service enablers via service request handholding
US7418575B2 (en) * 2003-07-29 2008-08-26 Stretch, Inc. Long instruction word processing with instruction extensions
US7624438B2 (en) 2003-08-20 2009-11-24 Eric White System and method for providing a secure connection between networked computers
US20050041808A1 (en) * 2003-08-22 2005-02-24 Nortel Networks Limited Method and apparatus for facilitating roaming between wireless domains
FI120021B (en) * 2003-08-27 2009-05-29 Nokia Corp Obtaining authority information
CN100456729C (en) * 2003-08-29 2009-01-28 诺基亚公司 Personal remote firewall
DE10341872A1 (en) * 2003-09-05 2005-05-04 Local Web Ag Method and system for access to wireless and data communication networks
US7840698B2 (en) * 2003-09-12 2010-11-23 Avaya Inc. Detection of hidden wireless routers
US7523484B2 (en) 2003-09-24 2009-04-21 Infoexpress, Inc. Systems and methods of controlling network access
JP2007521693A (en) * 2003-09-30 2007-08-02 トムソン ライセンシング Quality of service control in wireless local area networks
EP1536306A1 (en) * 2003-09-30 2005-06-01 Broadcom Corporation Proximity authentication system
US20050085259A1 (en) * 2003-10-15 2005-04-21 Conner W. S. Technique to coordinate wireless network over a power line or other wired back channel
US20050086346A1 (en) * 2003-10-17 2005-04-21 Meyer Jeffrey D. Access point coupling guests to the internet
US20050086468A1 (en) * 2003-10-17 2005-04-21 Branislav Meandzija Digital certificate related to user terminal hardware in a wireless network
US7430606B1 (en) 2003-10-17 2008-09-30 Arraycomm, Llc Reducing certificate revocation lists at access points in a wireless access network
JP4543657B2 (en) * 2003-10-31 2010-09-15 ソニー株式会社 Information processing apparatus and method, and program
JP2007512593A (en) * 2003-11-07 2007-05-17 ソニー エレクトロニクス インク File transfer protocol for mobile computers
US7673066B2 (en) * 2003-11-07 2010-03-02 Sony Corporation File transfer protocol for mobile computer
US7552321B2 (en) * 2003-11-20 2009-06-23 The Boeing Company Method and hybrid system for authenticating communications
US7529723B2 (en) * 2003-12-15 2009-05-05 Xerox Corporation Multi-tiered structure for file sharing based on social roles
US7533407B2 (en) * 2003-12-16 2009-05-12 Microsoft Corporation System and methods for providing network quarantine
US7434256B2 (en) * 2003-12-18 2008-10-07 Intel Corporation Security management for wireless clients
KR100952975B1 (en) 2003-12-19 2010-04-15 주식회사 케이티 Apparatus and method of management of wireless AP for enterprise
US7359339B2 (en) * 2003-12-23 2008-04-15 Lenovo Singapore Pte Ltd Smart access point
US20050149724A1 (en) * 2003-12-30 2005-07-07 Nokia Inc. System and method for authenticating a terminal based upon a position of the terminal within an organization
DE102004004527B4 (en) * 2004-01-22 2006-04-20 Siemens Ag Method for authorization control of data transmission in a data mobile network
US8214481B2 (en) 2004-02-10 2012-07-03 Seagate Technology Llc Firewall permitting access to network based on accessing party identity
US7536723B1 (en) * 2004-02-11 2009-05-19 Airtight Networks, Inc. Automated method and system for monitoring local area computer networks for unauthorized wireless access
US7392050B2 (en) * 2004-02-25 2008-06-24 Schwegman, Lundberg & Woessner, P.A. Systems and methods for automated network operating center system for broadband wireless network
US20050185611A1 (en) * 2004-02-25 2005-08-25 Torarp Carl-Johan Y. Broadband wireless network
US7512131B2 (en) * 2004-02-25 2009-03-31 Schwegman, Lundberg & Woessner, P.A. Systems and methods for centralized control and management of a broadband wireless network with data processing, and enforcement distributed to the network edge
US20050185622A1 (en) * 2004-02-25 2005-08-25 Svensson Lars O.H. Systems and methods for anonymous commingling of service provider's subscribers on a broadband wireless network
US7590728B2 (en) 2004-03-10 2009-09-15 Eric White System and method for detection of aberrant network behavior by clients of a network access gateway
US8543710B2 (en) 2004-03-10 2013-09-24 Rpx Corporation Method and system for controlling network access
US7610621B2 (en) * 2004-03-10 2009-10-27 Eric White System and method for behavior-based firewall modeling
US20050204022A1 (en) * 2004-03-10 2005-09-15 Keith Johnston System and method for network management XML architectural abstraction
US7665130B2 (en) * 2004-03-10 2010-02-16 Eric White System and method for double-capture/double-redirect to a different location
US20050210288A1 (en) * 2004-03-22 2005-09-22 Grosse Eric H Method and apparatus for eliminating dual authentication for enterprise access via wireless LAN services
US8146160B2 (en) 2004-03-24 2012-03-27 Arbor Networks, Inc. Method and system for authentication event security policy generation
US7937088B2 (en) * 2004-03-26 2011-05-03 Qualcomm Incorporated Routing communications in an ad hoc network
IL161216A (en) * 2004-04-01 2010-12-30 Eci Telecom Ltd Supporting mobile communications session in a combined communications network
JP2005309835A (en) * 2004-04-22 2005-11-04 Hitachi Ltd Method for determining distribution of it resources, and computer system therefor
US20050267954A1 (en) * 2004-04-27 2005-12-01 Microsoft Corporation System and methods for providing network quarantine
ATE500698T1 (en) 2004-04-30 2011-03-15 Research In Motion Ltd SYSTEM AND METHOD FOR FILTERING DATA TRANSFERS IN A MOBILE DEVICE
US20050243758A1 (en) * 2004-05-03 2005-11-03 Torarp Carl-Johan Y Systems and methods for managing and controlling broadband wireless network
JP2007538470A (en) * 2004-05-17 2007-12-27 トムソン ライセンシング Method for managing access to a virtual private network of a portable device without a VPN client
US8458703B2 (en) 2008-06-26 2013-06-04 Oracle International Corporation Application requesting management function based on metadata for managing enabler or dependency
US8321498B2 (en) * 2005-03-01 2012-11-27 Oracle International Corporation Policy interface description framework
US7860490B2 (en) * 2004-12-01 2010-12-28 Oracle International Corporation Methods and systems for exposing access network capabilities using an enabler proxy
US9038082B2 (en) 2004-05-28 2015-05-19 Oracle International Corporation Resource abstraction via enabler and metadata
US8966498B2 (en) * 2008-01-24 2015-02-24 Oracle International Corporation Integrating operational and business support systems with a service delivery platform
US9245236B2 (en) 2006-02-16 2016-01-26 Oracle International Corporation Factorization of concerns to build a SDP (service delivery platform)
US9565297B2 (en) 2004-05-28 2017-02-07 Oracle International Corporation True convergence with end to end identity management
US8073810B2 (en) * 2007-10-29 2011-12-06 Oracle International Corporation Shared view of customers across business support systems (BSS) and a service delivery platform (SDP)
US8316438B1 (en) * 2004-08-10 2012-11-20 Pure Networks Llc Network management providing network health information and lockdown security
JP2006107421A (en) * 2004-09-07 2006-04-20 Alpine Electronics Inc Information liaison service system, electronic apparatus, portable terminal, authentication device, and communication method
GB0419927D0 (en) * 2004-09-09 2004-10-13 Siemens Ag A method of determinig a network connection
US20070211691A1 (en) * 2004-09-09 2007-09-13 Barber Ronald W Method, system and computer program using standard interfaces for independent device controllers
US20060059043A1 (en) * 2004-09-14 2006-03-16 Chan Wesley T Method and system to provide wireless access at a reduced rate
US8666816B1 (en) 2004-09-14 2014-03-04 Google Inc. Method and system for access point customization
US20060058019A1 (en) * 2004-09-15 2006-03-16 Chan Wesley T Method and system for dynamically modifying the appearance of browser screens on a client device
US20060072761A1 (en) * 2004-09-30 2006-04-06 Bruce Johnson Access point that wirelessly provides an encryption key to an authenticated wireless station
WO2006039771A1 (en) * 2004-10-12 2006-04-20 Bce Inc. System and method for access control
US20060085850A1 (en) * 2004-10-14 2006-04-20 Microsoft Corporation System and methods for providing network quarantine using IPsec
US20060092950A1 (en) * 2004-10-28 2006-05-04 Cisco Technology, Inc. Architecture and method having redundancy in active/active stateful devices based on symmetric global load balancing protocol (sGLBP)
US8099060B2 (en) * 2004-10-29 2012-01-17 Research In Motion Limited Wireless/wired mobile communication device with option to automatically block wireless communication when connected for wired communication
US7483996B2 (en) * 2004-11-29 2009-01-27 Cisco Technology, Inc. Techniques for migrating a point to point protocol to a protocol for an access network
US8478849B2 (en) * 2004-12-07 2013-07-02 Pure Networks LLC. Network administration tool
WO2006063118A2 (en) * 2004-12-07 2006-06-15 Pure Networks, Inc. Network management
US20060129813A1 (en) * 2004-12-15 2006-06-15 Vidya Narayanan Methods of authenticating electronic devices in mobile networks
US20060136717A1 (en) 2004-12-20 2006-06-22 Mark Buer System and method for authentication via a proximate device
US8032920B2 (en) * 2004-12-27 2011-10-04 Oracle International Corporation Policies as workflows
US20060179472A1 (en) * 2004-12-30 2006-08-10 Ifan Chang System and method for effectuating computer network usage
US8543814B2 (en) * 2005-01-12 2013-09-24 Rpx Corporation Method and apparatus for using generic authentication architecture procedures in personal computers
US7516134B2 (en) * 2005-02-01 2009-04-07 Apple Inc. Controlling access to a database using database internal and external authorization information
KR100843072B1 (en) * 2005-02-03 2008-07-03 삼성전자주식회사 Wireless network system and communication method using wireless network system
US20060183461A1 (en) * 2005-02-11 2006-08-17 Research In Motion Limited System and method of modifying policy settings in an electronic device
US7996894B1 (en) * 2005-02-15 2011-08-09 Sonicwall, Inc. MAC address modification of otherwise locally bridged client devices to provide security
US7586888B2 (en) * 2005-02-17 2009-09-08 Mobitrum Corporation Method and system for mesh network embedded devices
US8059527B2 (en) * 2005-02-19 2011-11-15 Cisco Technology, Inc. Techniques for oversubscribing edge nodes for virtual private networks
US7769037B2 (en) * 2005-02-19 2010-08-03 Cisco Technology, Inc. Techniques for using first sign of life at edge nodes for a virtual private network
US7778199B2 (en) * 2005-02-19 2010-08-17 Cisco Technology, Inc. Techniques for customer self-provisioning of edge nodes for a virtual private network
US8255681B2 (en) * 2005-03-10 2012-08-28 Ibahn General Holdings Corporation Security for mobile devices in a wireless network
US7715409B2 (en) * 2005-03-25 2010-05-11 Cisco Technology, Inc. Method and system for data link layer address classification
US8155014B2 (en) * 2005-03-25 2012-04-10 Cisco Technology, Inc. Method and system using quality of service information for influencing a user's presence state
US8015403B2 (en) 2005-03-28 2011-09-06 Cisco Technology, Inc. Method and system indicating a level of security for VoIP calls through presence
US8036597B2 (en) * 2005-04-01 2011-10-11 Interdigital Technology Corporation Method and apparatus for determining a level of involvement of mesh points in a wireless communication system
US20070198837A1 (en) * 2005-04-29 2007-08-23 Nokia Corporation Establishment of a secure communication
US20060248337A1 (en) * 2005-04-29 2006-11-02 Nokia Corporation Establishment of a secure communication
US8079062B2 (en) * 2005-05-16 2011-12-13 Cisco Technology, Inc. Method and system using presence information to manage network access
US7920847B2 (en) * 2005-05-16 2011-04-05 Cisco Technology, Inc. Method and system to protect the privacy of presence information for network users
US7764699B2 (en) * 2005-05-16 2010-07-27 Cisco Technology, Inc. Method and system using shared configuration information to manage network access for network users
US7424000B2 (en) * 2005-05-26 2008-09-09 Symbol Technologies, Inc. Time slot reservation scheme in wireless meshed networks
US8677123B1 (en) 2005-05-26 2014-03-18 Trustwave Holdings, Inc. Method for accelerating security and management operations on data segments
JP4774823B2 (en) * 2005-06-16 2011-09-14 ソニー株式会社 Wireless communication system, wireless communication setting method, wireless communication apparatus, wireless communication setting program, and wireless communication setting program storage medium
US20060294363A1 (en) * 2005-06-16 2006-12-28 Samsung Elecontronics Co., Ltd. System and method for tunnel management over a 3G-WLAN interworking system
US7614082B2 (en) 2005-06-29 2009-11-03 Research In Motion Limited System and method for privilege management and revocation
US7912017B2 (en) * 2005-06-29 2011-03-22 Sony Corporation Wireless connection system and wireless connection method
US8056124B2 (en) * 2005-07-15 2011-11-08 Microsoft Corporation Automatically generating rules for connection security
EP1911817B1 (en) * 2005-07-25 2014-05-21 Toyo Ink Mfg. Co., Ltd. Active energy beam-curable ink for inkjet printing
US8363558B2 (en) * 2005-08-03 2013-01-29 Research In Motion Limited System and method of modifying communications policy settings in a wireless network
US7818580B2 (en) * 2005-08-09 2010-10-19 International Business Machines Corporation Control of port based authentication protocols and process to support transfer of connection information
US7613920B2 (en) 2005-08-22 2009-11-03 Alcatel Lucent Mechanism to avoid expensive double-encryption in mobile networks
US9063739B2 (en) * 2005-09-07 2015-06-23 Open Invention Network, Llc Method and computer program for device configuration
US7653037B2 (en) * 2005-09-28 2010-01-26 Qualcomm Incorporated System and method for distributing wireless network access parameters
US20070094374A1 (en) * 2005-10-03 2007-04-26 Snehal Karia Enterprise-managed wireless communication
DE102005047798A1 (en) * 2005-10-05 2007-05-10 Vodafone Holding Gmbh Method, system and apparatus for creating and / or using identities of clients in a communication system
US7630736B2 (en) * 2005-10-11 2009-12-08 Mobitrum Corporation Method and system for spatial data input, manipulation and distribution via an adaptive wireless transceiver
US7840211B2 (en) * 2005-10-28 2010-11-23 Research In Motion Limited System and method of managing communications policy settings in a wireless network
US8139521B2 (en) * 2005-10-28 2012-03-20 Interdigital Technology Corporation Wireless nodes with active authentication and associated methods
US7650140B2 (en) * 2005-10-28 2010-01-19 Research In Motion Limited System and method of maintaining communications policy settings in a wireless network
US7526677B2 (en) * 2005-10-31 2009-04-28 Microsoft Corporation Fragility handling
US20070110035A1 (en) * 2005-11-14 2007-05-17 Broadcom Corporation, A California Corporation Network nodes cooperatively routing traffic flow amongst wired and wireless networks
US8024794B1 (en) * 2005-11-30 2011-09-20 Amdocs Software Systems Limited Dynamic role based authorization system and method
US20070136072A1 (en) * 2005-12-14 2007-06-14 Symbol Technologies, Inc. Interactive voice browsing for mobile devices on wireless networks
US20070135096A1 (en) * 2005-12-14 2007-06-14 Symbol Technologies, Inc. Interactive voice browsing server for mobile devices on wireless networks
US7827545B2 (en) * 2005-12-15 2010-11-02 Microsoft Corporation Dynamic remediation of a client computer seeking access to a network with a quarantine enforcement policy
TWI287376B (en) * 2005-12-27 2007-09-21 Ind Tech Res Inst Method and apparatus for mobility management in wireless networks
US20070149171A1 (en) * 2005-12-27 2007-06-28 Hsin-Hsu Cho Wireless mobile communication system
EP1974554B1 (en) * 2006-01-11 2014-03-12 Cisco Technology, Inc. System and method for mobility management on wireless networks
US8130638B2 (en) * 2006-01-24 2012-03-06 Cisco Technology, Inc. Method and apparatus to elect ABRs dynamically and intelligently
US20070223701A1 (en) * 2006-01-30 2007-09-27 Motorola, Inc. Method and apparatus for utilizing multiple group keys for secure communications
US9130993B2 (en) * 2006-02-09 2015-09-08 Sony Corporation Wireless connection system and wireless connection method
ATE391390T1 (en) * 2006-02-10 2008-04-15 Research In Motion Ltd METHOD AND SYSTEM FOR SAVING BATTERY ENERGY IN WIRELESS DEVICES OPERATING IN A LOCAL WIRELESS NETWORK
US20070198525A1 (en) * 2006-02-13 2007-08-23 Microsoft Corporation Computer system with update-based quarantine
US11405846B2 (en) 2006-03-02 2022-08-02 Tango Networks, Inc. Call flow system and method for use in a legacy telecommunication system
US7843901B2 (en) 2006-03-02 2010-11-30 Tango Networks, Inc. Call flow system and method for use in a legacy telecommunication system
US7890096B2 (en) 2006-03-02 2011-02-15 Tango Networks, Inc. System and method for enabling call originations using SMS and hotline capabilities
US8023479B2 (en) * 2006-03-02 2011-09-20 Tango Networks, Inc. Mobile application gateway for connecting devices on a cellular network with individual enterprise and data networks
US20070209059A1 (en) * 2006-03-03 2007-09-06 Moore John A Communication system employing a control layer architecture
EP1994735B1 (en) 2006-03-10 2017-09-27 BRITISH TELECOMMUNICATIONS public limited company Call completion service in case of called party unavailability
US7747954B2 (en) * 2006-03-23 2010-06-29 Alcatel Lucent Method and system for virtual private network connectivity verification
US7787864B2 (en) * 2006-03-27 2010-08-31 Teamon Systems, Inc. Wireless email communications system providing device capability set update features and related methods
WO2007111040A1 (en) * 2006-03-29 2007-10-04 Eagle Industry Co., Ltd. Control valve for variable displacement compressor
US7793096B2 (en) * 2006-03-31 2010-09-07 Microsoft Corporation Network access protection
US8155275B1 (en) 2006-04-03 2012-04-10 Verint Americas, Inc. Systems and methods for managing alarms from recorders
DE102006036107A1 (en) 2006-04-11 2007-10-18 Siemens Ag Procedure for determining a task permit
EP1850527A1 (en) * 2006-04-28 2007-10-31 Koninklijke KPN N.V. Configuring devices and services on a residential gateway
US20090117908A1 (en) * 2006-05-23 2009-05-07 Hughes David E Mobile communications
US8483126B2 (en) * 2006-05-23 2013-07-09 British Telecommunications Plc Multi-network mobile communications systems and/or methods
US20080140767A1 (en) * 2006-06-14 2008-06-12 Prasad Rao Divitas description protocol and methods therefor
US7565159B2 (en) * 2006-06-14 2009-07-21 Divitas Networks, Inc. Methods and arrangement for implementing an active call handover by employing a switching component
US7480500B1 (en) 2006-06-14 2009-01-20 Divitas Networks, Inc. Divitas protocol proxy and methods therefor
US20090016333A1 (en) * 2006-06-14 2009-01-15 Derek Wang Content-based adaptive jitter handling
US8914493B2 (en) * 2008-03-10 2014-12-16 Oracle International Corporation Presence-based event driven architecture
WO2008000572A1 (en) * 2006-06-30 2008-01-03 Siemens Home And Office Communication Devices Gmbh & Co. Kg Internet access control system
KR101050958B1 (en) * 2006-07-04 2011-07-20 후지쯔 가부시끼가이샤 Communication device, connection destination switching method and recording medium of wireless communication device by communication device
US8411590B2 (en) 2006-07-27 2013-04-02 Mobitrum Corporation Mesh network remote control device
US8305936B2 (en) 2006-07-27 2012-11-06 Mobitrum Corporation Method and system for dynamic information exchange on a mesh network in a vehicle
USRE47894E1 (en) 2006-07-27 2020-03-03 Iii Holdings 2, Llc Method and system for dynamic information exchange on location aware mesh network devices
US8427979B1 (en) 2006-07-27 2013-04-23 Mobitrum Corporation Method and system for dynamic information exchange on location aware mesh network devices
US8305935B2 (en) * 2006-07-27 2012-11-06 Mobitrum Corporation Method and system for dynamic information exchange on location aware mesh network devices
US7801058B2 (en) * 2006-07-27 2010-09-21 Mobitrum Corporation Method and system for dynamic information exchange on mesh network devices
US8108525B2 (en) * 2006-08-03 2012-01-31 Citrix Systems, Inc. Systems and methods for managing a plurality of user sessions in a virtual private network environment
US8281392B2 (en) 2006-08-11 2012-10-02 Airdefense, Inc. Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
US8266681B2 (en) * 2006-08-29 2012-09-11 Ca, Inc. System and method for automatic network logon over a wireless network
US9860274B2 (en) * 2006-09-13 2018-01-02 Sophos Limited Policy management
US20080076353A1 (en) * 2006-09-26 2008-03-27 Broadcom Corporation, A California Corporation Cable modem with integrated RF identification and methods for use therewith
EP1912401A1 (en) * 2006-10-10 2008-04-16 British Telecommunications Public Limited Company Wireless access hub
US20080119136A1 (en) * 2006-11-21 2008-05-22 Taheer Khazi Access point with bluetooth transducer
US20080120707A1 (en) * 2006-11-22 2008-05-22 Alexander Ramia Systems and methods for authenticating a device by a centralized data server
US7852783B2 (en) * 2006-12-07 2010-12-14 Cisco Technology, Inc. Identify a secure end-to-end voice call
US20080175143A1 (en) * 2007-01-22 2008-07-24 Carol Ansley Method and system for providing protocol-based equipment redundancy
IL181427A0 (en) * 2007-02-19 2007-07-04 Deutsche Telekom Ag Novel dynamic firewall for nsp networks
US8175272B2 (en) * 2007-03-12 2012-05-08 Motorola Solutions, Inc. Method for establishing secure associations within a communication network
US8214503B2 (en) * 2007-03-23 2012-07-03 Oracle International Corporation Factoring out dialog control and call control
US8948046B2 (en) 2007-04-27 2015-02-03 Aerohive Networks, Inc. Routing method and system for a wireless network
US9319879B2 (en) * 2007-05-30 2016-04-19 Apple Inc. Method and apparatus for security configuration and verification of wireless devices in a fixed/mobile convergence environment
US9026639B2 (en) * 2007-07-13 2015-05-05 Pure Networks Llc Home network optimizing system
US8700743B2 (en) * 2007-07-13 2014-04-15 Pure Networks Llc Network configuration device
US9491077B2 (en) * 2007-07-13 2016-11-08 Cisco Technology, Inc. Network metric reporting system
US8014356B2 (en) 2007-07-13 2011-09-06 Cisco Technology, Inc. Optimal-channel selection in a wireless network
US8132247B2 (en) * 2007-08-03 2012-03-06 Citrix Systems, Inc. Systems and methods for authorizing a client in an SSL VPN session failover environment
US20090077656A1 (en) * 2007-09-14 2009-03-19 Kabushiki Kaisha Toshiba Image forming apparatus, image forming system, and control method of image forming apparatus
US9225684B2 (en) * 2007-10-29 2015-12-29 Microsoft Technology Licensing, Llc Controlling network access
US8539097B2 (en) * 2007-11-14 2013-09-17 Oracle International Corporation Intelligent message processing
US8161171B2 (en) 2007-11-20 2012-04-17 Oracle International Corporation Session initiation protocol-based internet protocol television
US8117447B2 (en) * 2008-01-10 2012-02-14 Industrial Technology Research Institute Authentication method employing elliptic curve cryptography
US9654515B2 (en) 2008-01-23 2017-05-16 Oracle International Corporation Service oriented architecture-based SCIM platform
US8589338B2 (en) * 2008-01-24 2013-11-19 Oracle International Corporation Service-oriented architecture (SOA) management of data repository
US20090189739A1 (en) * 2008-01-25 2009-07-30 Mobitrum Corporation Passive voice enabled rfid devices
US8401022B2 (en) * 2008-02-08 2013-03-19 Oracle International Corporation Pragmatic approaches to IMS
US20090215438A1 (en) * 2008-02-23 2009-08-27 Ajay Mittal Methods for performing transparent callback
US8825792B1 (en) 2008-03-11 2014-09-02 United Services Automobile Association (Usaa) Systems and methods for online brand continuity
US8582500B2 (en) * 2008-05-02 2013-11-12 Rochester Institute Of Technology Methods for providing an ad hoc mobile communication network and systems thereof
US8218502B1 (en) 2008-05-14 2012-07-10 Aerohive Networks Predictive and nomadic roaming of wireless clients across different network subnets
US8548428B2 (en) 2009-01-28 2013-10-01 Headwater Partners I Llc Device group partitions and settlement platform
US8406748B2 (en) 2009-01-28 2013-03-26 Headwater Partners I Llc Adaptive ambient services
US8275830B2 (en) 2009-01-28 2012-09-25 Headwater Partners I Llc Device assisted CDR creation, aggregation, mediation and billing
US8924469B2 (en) 2008-06-05 2014-12-30 Headwater Partners I Llc Enterprise access control and accounting allocation for access networks
US8832777B2 (en) 2009-03-02 2014-09-09 Headwater Partners I Llc Adapting network policies based on device service processor configuration
US8346225B2 (en) 2009-01-28 2013-01-01 Headwater Partners I, Llc Quality of service for device assisted services
US8589541B2 (en) 2009-01-28 2013-11-19 Headwater Partners I Llc Device-assisted services for protecting network capacity
US8626115B2 (en) 2009-01-28 2014-01-07 Headwater Partners I Llc Wireless network service interfaces
US8924543B2 (en) 2009-01-28 2014-12-30 Headwater Partners I Llc Service design center for device assisted services
US8898293B2 (en) 2009-01-28 2014-11-25 Headwater Partners I Llc Service offer set publishing to device agent with on-device service selection
US11134102B2 (en) 2009-01-28 2021-09-28 Headwater Research Llc Verifiable device assisted service usage monitoring with reporting, synchronization, and notification
US8340634B2 (en) 2009-01-28 2012-12-25 Headwater Partners I, Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US8391834B2 (en) 2009-01-28 2013-03-05 Headwater Partners I Llc Security techniques for device assisted services
US8635335B2 (en) 2009-01-28 2014-01-21 Headwater Partners I Llc System and method for wireless network offloading
US8402111B2 (en) 2009-01-28 2013-03-19 Headwater Partners I, Llc Device assisted services install
US8725123B2 (en) 2008-06-05 2014-05-13 Headwater Partners I Llc Communications device with secure data path processing agents
US8505067B2 (en) * 2008-08-21 2013-08-06 Oracle International Corporation Service level network quality of service policy enforcement
US9674892B1 (en) 2008-11-04 2017-06-06 Aerohive Networks, Inc. Exclusive preshared key authentication
JP4770921B2 (en) * 2008-12-01 2011-09-14 日本電気株式会社 Gateway server, file management system, file management method and program
US8483194B1 (en) 2009-01-21 2013-07-09 Aerohive Networks, Inc. Airtime-based scheduling
US7961674B2 (en) 2009-01-27 2011-06-14 Sony Corporation Multi-tier wireless home mesh network with a secure network discovery protocol
US8904177B2 (en) * 2009-01-27 2014-12-02 Sony Corporation Authentication for a multi-tier wireless home mesh network
US9571559B2 (en) 2009-01-28 2017-02-14 Headwater Partners I Llc Enhanced curfew and protection associated with a device group
US9557889B2 (en) 2009-01-28 2017-01-31 Headwater Partners I Llc Service plan design, user interfaces, application programming interfaces, and device management
US9755842B2 (en) 2009-01-28 2017-09-05 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US9351193B2 (en) 2009-01-28 2016-05-24 Headwater Partners I Llc Intermediate networking devices
US11218854B2 (en) 2009-01-28 2022-01-04 Headwater Research Llc Service plan design, user interfaces, application programming interfaces, and device management
US9270559B2 (en) 2009-01-28 2016-02-23 Headwater Partners I Llc Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow
US10841839B2 (en) 2009-01-28 2020-11-17 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US10492102B2 (en) 2009-01-28 2019-11-26 Headwater Research Llc Intermediate networking devices
US9954975B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Enhanced curfew and protection associated with a device group
US9980146B2 (en) 2009-01-28 2018-05-22 Headwater Research Llc Communications device with secure data path processing agents
US9565707B2 (en) 2009-01-28 2017-02-07 Headwater Partners I Llc Wireless end-user device with wireless data attribution to multiple personas
US9609510B2 (en) 2009-01-28 2017-03-28 Headwater Research Llc Automated credential porting for mobile devices
US8745191B2 (en) 2009-01-28 2014-06-03 Headwater Partners I Llc System and method for providing user notifications
US9706061B2 (en) 2009-01-28 2017-07-11 Headwater Partners I Llc Service design center for device assisted services
US9647918B2 (en) 2009-01-28 2017-05-09 Headwater Research Llc Mobile device and method attributing media services network usage to requesting application
US10779177B2 (en) 2009-01-28 2020-09-15 Headwater Research Llc Device group partitions and settlement platform
US10484858B2 (en) 2009-01-28 2019-11-19 Headwater Research Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US8793758B2 (en) 2009-01-28 2014-07-29 Headwater Partners I Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US10798252B2 (en) 2009-01-28 2020-10-06 Headwater Research Llc System and method for providing user notifications
US10248996B2 (en) 2009-01-28 2019-04-02 Headwater Research Llc Method for operating a wireless end-user device mobile payment agent
US8893009B2 (en) 2009-01-28 2014-11-18 Headwater Partners I Llc End user device that secures an association of application to service policy with an application certificate check
US9858559B2 (en) 2009-01-28 2018-01-02 Headwater Research Llc Network service plan design
US9392462B2 (en) 2009-01-28 2016-07-12 Headwater Partners I Llc Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy
US10326800B2 (en) 2009-01-28 2019-06-18 Headwater Research Llc Wireless network service interfaces
US9572019B2 (en) 2009-01-28 2017-02-14 Headwater Partners LLC Service selection set published to device agent with on-device service selection
US9578182B2 (en) 2009-01-28 2017-02-21 Headwater Partners I Llc Mobile device and service management
US10783581B2 (en) 2009-01-28 2020-09-22 Headwater Research Llc Wireless end-user device providing ambient or sponsored services
US9253663B2 (en) 2009-01-28 2016-02-02 Headwater Partners I Llc Controlling mobile device communications on a roaming network based on device state
US10237757B2 (en) 2009-01-28 2019-03-19 Headwater Research Llc System and method for wireless network offloading
US9955332B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Method for child wireless device activation to subscriber account of a master wireless device
US10057775B2 (en) 2009-01-28 2018-08-21 Headwater Research Llc Virtualized policy and charging system
US10715342B2 (en) 2009-01-28 2020-07-14 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US10200541B2 (en) 2009-01-28 2019-02-05 Headwater Research Llc Wireless end-user device with divided user space/kernel space traffic policy system
US10264138B2 (en) 2009-01-28 2019-04-16 Headwater Research Llc Mobile device and service management
US8351898B2 (en) 2009-01-28 2013-01-08 Headwater Partners I Llc Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US8606911B2 (en) 2009-03-02 2013-12-10 Headwater Partners I Llc Flow tagging for service policy implementation
US10064055B2 (en) 2009-01-28 2018-08-28 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US8964634B2 (en) 2009-02-06 2015-02-24 Sony Corporation Wireless home mesh network bridging adaptor
KR101260716B1 (en) * 2009-02-13 2013-05-07 후아웨이 테크놀러지 컴퍼니 리미티드 Method and apparatus for selecting network access provider
US20100222053A1 (en) * 2009-02-27 2010-09-02 Girisrinivasarao Athulurutirumala Arrangement and methods for establishing a telecommunication connection based on a heuristic model
US8391224B2 (en) * 2009-03-03 2013-03-05 Avaya Inc. Proactive load distribution for 802.111-based wireless LANs
US8385197B2 (en) * 2009-03-03 2013-02-26 Avaya Inc. Practical measurement-based session admission control for Wi-Fi LAN systems
US7990897B2 (en) 2009-03-11 2011-08-02 Sony Corporation Method and apparatus for a wireless home mesh network with network topology visualizer
WO2010133243A1 (en) * 2009-05-22 2010-11-25 Nec Europe Ltd. Method for supporting routing decisions in a wireless mesh network and wireless mesh network
US8879547B2 (en) * 2009-06-02 2014-11-04 Oracle International Corporation Telephony application services
US20120096519A1 (en) * 2009-06-24 2012-04-19 Nokia Corporation Methods and Apparatuses for Avoiding Denial of Service Attacks By Rogue Access Points
US9900251B1 (en) 2009-07-10 2018-02-20 Aerohive Networks, Inc. Bandwidth sentinel
US11115857B2 (en) 2009-07-10 2021-09-07 Extreme Networks, Inc. Bandwidth sentinel
US20110113474A1 (en) * 2009-11-11 2011-05-12 International Business Machines Corporation Network system security managment
US8583830B2 (en) * 2009-11-19 2013-11-12 Oracle International Corporation Inter-working with a walled garden floor-controlled system
US8533773B2 (en) * 2009-11-20 2013-09-10 Oracle International Corporation Methods and systems for implementing service level consolidated user information management
US9269060B2 (en) 2009-11-20 2016-02-23 Oracle International Corporation Methods and systems for generating metadata describing dependencies for composable elements
US9509790B2 (en) 2009-12-16 2016-11-29 Oracle International Corporation Global presence
US9503407B2 (en) 2009-12-16 2016-11-22 Oracle International Corporation Message forwarding
EP2337388A3 (en) * 2009-12-21 2011-08-31 France Telecom Method for secure access by at least one visitor terminal to a host network
GB201000659D0 (en) * 2010-01-15 2010-03-03 Hatton Wireless Ltd Communications system
US8649297B2 (en) 2010-03-26 2014-02-11 Cisco Technology, Inc. System and method for simplifying secure network setup
EP2383935B1 (en) 2010-04-29 2014-03-05 Airties Kablosuz Iletisim Sanayi Ve Dis Ticaret An Gulbahar Mahallesi Avni Dilligil Sokak Wireless network setup and configuration distribution
CN102972091B (en) * 2010-06-06 2016-05-18 Lg电子株式会社 The method of communicating by letter with miscellaneous equipment and communication equipment
US9002277B2 (en) 2010-09-07 2015-04-07 Aerohive Networks, Inc. Distributed channel selection for wireless networks
US8943570B1 (en) * 2010-12-02 2015-01-27 Cellco Partnership Techniques for providing enhanced network security
WO2012085232A1 (en) * 2010-12-23 2012-06-28 Koninklijke Kpn N.V. Method, gateway device and network system for configuring a device in a local area network
US20120209976A1 (en) * 2011-02-15 2012-08-16 Mcquade Philip A Remote management and control using common internet protocols
US9154826B2 (en) 2011-04-06 2015-10-06 Headwater Partners Ii Llc Distributing content and service launch objects to mobile devices
CN102378175A (en) * 2011-10-08 2012-03-14 华为终端有限公司 Wireless local area network (WLAN) authentication method and mobile terminal
US9161226B2 (en) 2011-10-17 2015-10-13 Blackberry Limited Associating services to perimeters
US9521145B2 (en) * 2011-10-17 2016-12-13 Mitel Mobility Inc. Methods and apparatuses to provide secure communication between an untrusted wireless access network and a trusted controlled network
US9549317B2 (en) 2011-10-17 2017-01-17 Mitel Mobility Inc. Methods and apparatuses to provide secure communication between an untrusted wireless access network and a trusted controlled network
US9497220B2 (en) 2011-10-17 2016-11-15 Blackberry Limited Dynamically generating perimeters
US10091065B1 (en) 2011-10-31 2018-10-02 Aerohive Networks, Inc. Zero configuration networking on a subnetted network
US9613219B2 (en) 2011-11-10 2017-04-04 Blackberry Limited Managing cross perimeter access
US8799227B2 (en) 2011-11-11 2014-08-05 Blackberry Limited Presenting metadata from multiple perimeters
WO2013094013A1 (en) * 2011-12-20 2013-06-27 三菱電機株式会社 Communication system and automatic meter-reading system
US9338171B2 (en) * 2011-12-30 2016-05-10 Nokia Corporation Method and apparatus for controlling access to resources
CN103220313B (en) * 2012-01-20 2016-03-02 董天群 The equipment control method that device network is shared method and is mated
US8930548B2 (en) * 2012-03-06 2015-01-06 Mobile Helix, Inc. Mobile link system, method and apparatus
CN104769864B (en) 2012-06-14 2018-05-04 艾诺威网络有限公司 It is multicasted to unicast conversion technology
US9369466B2 (en) 2012-06-21 2016-06-14 Blackberry Limited Managing use of network resources
US8656016B1 (en) 2012-10-24 2014-02-18 Blackberry Limited Managing application execution and data access on a device
US9075955B2 (en) 2012-10-24 2015-07-07 Blackberry Limited Managing permission settings applied to applications
CN104798318B (en) * 2012-11-15 2017-10-31 安华高科技通用Ip(新加坡)公司 Use the precoding and scheduling of the cellular communication system of a large amount of antenna for base station
US9253160B2 (en) * 2012-12-31 2016-02-02 Kent Lawson Methods, systems, and media for secure connection management and automatic compression over metered data connections
US10389650B2 (en) 2013-03-15 2019-08-20 Aerohive Networks, Inc. Building and maintaining a network
US9467873B2 (en) * 2013-03-15 2016-10-11 Aruba Networks, Inc. Channel width configuration based on network conditions
US9413772B2 (en) 2013-03-15 2016-08-09 Aerohive Networks, Inc. Managing rogue devices through a network backhaul
US9305298B2 (en) 2013-03-22 2016-04-05 Nok Nok Labs, Inc. System and method for location-based authentication
US10270748B2 (en) 2013-03-22 2019-04-23 Nok Nok Labs, Inc. Advanced authentication techniques and applications
US9887983B2 (en) 2013-10-29 2018-02-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
GB2516412A (en) * 2013-05-03 2015-01-28 Vodafone Ip Licensing Ltd Access control
US9961077B2 (en) 2013-05-30 2018-05-01 Nok Nok Labs, Inc. System and method for biometric authentication with device attestation
US9124673B2 (en) * 2013-09-30 2015-09-01 Intel IP Corporation Transmission control protocol (TCP) based video streaming
US9342331B2 (en) * 2013-10-21 2016-05-17 International Business Machines Corporation Secure virtualized mobile cellular device
US9226141B1 (en) * 2013-11-04 2015-12-29 Sprint Communications Company L.P. Identifying unsubscribed tethering in a wireless network
US9369342B2 (en) 2013-11-15 2016-06-14 Microsoft Technology Licensing, Llc Configuring captive portals with a cloud service
US20150139074A1 (en) * 2013-11-15 2015-05-21 Ryan H. Bane Adaptive Generation of Network Scores From Crowdsourced Data
US9554323B2 (en) 2013-11-15 2017-01-24 Microsoft Technology Licensing, Llc Generating sequenced instructions for connecting through captive portals
US10382305B2 (en) 2013-11-15 2019-08-13 Microsoft Technology Licensing, Llc Applying sequenced instructions to connect through captive portals
GB201400825D0 (en) * 2014-01-17 2014-03-05 Microsoft Corp Identity reputation
US9654469B1 (en) 2014-05-02 2017-05-16 Nok Nok Labs, Inc. Web-based user authentication techniques and applications
US9413533B1 (en) 2014-05-02 2016-08-09 Nok Nok Labs, Inc. System and method for authorizing a new authenticator
US9577999B1 (en) 2014-05-02 2017-02-21 Nok Nok Labs, Inc. Enhanced security for registration of authentication devices
US9749131B2 (en) 2014-07-31 2017-08-29 Nok Nok Labs, Inc. System and method for implementing a one-time-password using asymmetric cryptography
US10148630B2 (en) 2014-07-31 2018-12-04 Nok Nok Labs, Inc. System and method for implementing a hosted authentication service
US9875347B2 (en) 2014-07-31 2018-01-23 Nok Nok Labs, Inc. System and method for performing authentication using data analytics
US9455979B2 (en) 2014-07-31 2016-09-27 Nok Nok Labs, Inc. System and method for establishing trust using secure transmission protocols
US9736154B2 (en) * 2014-09-16 2017-08-15 Nok Nok Labs, Inc. System and method for integrating an authentication service within a network architecture
US10110702B2 (en) * 2015-04-16 2018-10-23 Hewlett Packard Enterprise Development Lp Dynamic download and enforcement of network access role based on network login context
US10277713B2 (en) * 2015-07-14 2019-04-30 Cisco Technology, Inc. Role-based access to shared resources
US10637853B2 (en) 2016-08-05 2020-04-28 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10778650B2 (en) * 2016-08-17 2020-09-15 Dell Products L.P. Systems and methods for management domain attestation service
US10154431B2 (en) * 2016-09-27 2018-12-11 Verizon Patent And Licensing Inc. Congestion mitigation based on user device and base station condition information
US10091195B2 (en) 2016-12-31 2018-10-02 Nok Nok Labs, Inc. System and method for bootstrapping a user binding
US10237070B2 (en) 2016-12-31 2019-03-19 Nok Nok Labs, Inc. System and method for sharing keys across authenticators
US10868803B2 (en) 2017-01-13 2020-12-15 Parallel Wireless, Inc. Multi-stage secure network element certificate provisioning in a distributed mobile access network
US10505925B1 (en) * 2017-09-06 2019-12-10 Amazon Technologies, Inc. Multi-layer authentication
US11017102B2 (en) 2017-09-12 2021-05-25 Sophos Limited Communicating application information to a firewall
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
US11831409B2 (en) 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
CN108174381B (en) * 2018-04-17 2018-08-03 上海连尚网络科技有限公司 Method and apparatus for connecting wireless access point
US10820285B2 (en) * 2018-11-26 2020-10-27 Hitron Technologies Inc. Method for network synchronization
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication
US11550891B2 (en) 2019-06-19 2023-01-10 Preventice Solutions, Inc. Login token management
US20210367919A1 (en) * 2020-05-23 2021-11-25 Paypal, Inc. Centralized request validation
US11490430B2 (en) 2020-08-27 2022-11-01 T-Mobile Usa, Inc. Packet gateway selection based on device capabilities
US20230129117A1 (en) * 2021-10-26 2023-04-27 Hewlett Packard Enterprise Development Lp Cloud-orchestrated role management for wlan
US20230397050A1 (en) * 2022-06-07 2023-12-07 Comcast Cable Communications, Llc Gateway management

Citations (91)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US660734A (en) * 1900-01-22 1900-10-30 Robert J Northam Reversible pipe-wrench.
US5239466A (en) * 1990-10-04 1993-08-24 Motorola, Inc. System for selectively routing and merging independent annotations to a document at remote locations
US5301356A (en) * 1991-12-10 1994-04-05 Telefonaktiebolaget L M Ericsson Prioritization between handoff and new call requests in a cellular communications system
US5423065A (en) * 1992-02-28 1995-06-06 Mitel Corporation Mobile wireless communications system
US5448570A (en) * 1993-03-17 1995-09-05 Kyocera Corporation System for mutual synchronization and monitoring between base stations
US5457680A (en) * 1993-05-18 1995-10-10 International Business Machines Corporation Data gateway for mobile data radio terminals in a data communication network
US5629981A (en) * 1994-07-29 1997-05-13 Texas Instruments Incorporated Information management and security system
US5657317A (en) * 1990-01-18 1997-08-12 Norand Corporation Hierarchical communication system using premises, peripheral and vehicular local area networking
US5668875A (en) * 1994-07-29 1997-09-16 Motorola, Inc. Method and apparatus for authentication in a communication system
US5673031A (en) * 1988-08-04 1997-09-30 Norand Corporation Redundant radio frequency network having a roaming terminal communication protocol
US5809415A (en) * 1995-12-11 1998-09-15 Unwired Planet, Inc. Method and architecture for an interactive two-way data communication network
US5889942A (en) * 1996-12-18 1999-03-30 Orenshteyn; Alexander S. Secured system for accessing application services from a remote station
US5901144A (en) * 1995-04-13 1999-05-04 Hitachi, Ltd. Mobile radio communications system
US5915008A (en) * 1995-10-04 1999-06-22 Bell Atlantic Network Services, Inc. System and method for changing advanced intelligent network services from customer premises equipment
US5940591A (en) * 1991-07-11 1999-08-17 Itt Corporation Apparatus and method for providing network security
US5949776A (en) * 1990-01-18 1999-09-07 Norand Corporation Hierarchical communication system using premises, peripheral and vehicular local area networking
US5953507A (en) * 1996-06-18 1999-09-14 International Business Machines Corporation Method and apparatus for providing a 3-way connection between a mobile computing device, a stationary computing device and a computer network
US5987062A (en) * 1995-12-15 1999-11-16 Netwave Technologies, Inc. Seamless roaming for wireless local area networks
US6014558A (en) * 1998-12-28 2000-01-11 Northern Telecom Limited Variable rate optional security measures method and apparatus for wireless communications network
US6018657A (en) * 1997-05-05 2000-01-25 Highwaymaster Communications, Inc. System and method for communicating a message using a cellular telephone network
US6026297A (en) * 1997-09-17 2000-02-15 Telefonaktiebolaget Lm Ericsson Contemporaneous connectivity to multiple piconets
US6038458A (en) * 1996-12-30 2000-03-14 Nokia Telecommunications Oy Method for selecting a signal, and a cellular radio system
US6044465A (en) * 1997-07-07 2000-03-28 International Business Machines Corporation User profile storage on and retrieval from a non-native server domain for use in a client running a native operating system
US6044401A (en) * 1996-11-20 2000-03-28 International Business Machines Corporation Network sniffer for monitoring and reporting network information that is not privileged beyond a user's privilege level
US6055236A (en) * 1998-03-05 2000-04-25 3Com Corporation Method and system for locating network services with distributed network address translation
US6073234A (en) * 1997-05-07 2000-06-06 Fuji Xerox Co., Ltd. Device for authenticating user's access rights to resources and method
US6081900A (en) * 1999-03-16 2000-06-27 Novell, Inc. Secure intranet access
US6115390A (en) * 1997-10-14 2000-09-05 Lucent Technologies, Inc. Bandwidth reservation and collision resolution method for multiple access communication networks where remote hosts send reservation requests to a base station for randomly chosen minislots
US6115615A (en) * 1996-02-26 2000-09-05 Fuji Xerox Co., Ltd. Cellular communication network and its communication method
US6134591A (en) * 1997-06-18 2000-10-17 Client/Server Technologies, Inc. Network security and integration method and system
US6137791A (en) * 1997-03-25 2000-10-24 Ericsson Telefon Ab L M Communicating packet data with a mobile station roaming within an incompatible mobile network
US6141690A (en) * 1997-07-31 2000-10-31 Hewlett-Packard Company Computer network address mapping
US6172986B1 (en) * 1997-05-13 2001-01-09 Hitachi, Ltd. Mobile node, mobile agent and network system
US6192130B1 (en) * 1998-06-19 2001-02-20 Entrust Technologies Limited Information security subscriber trust authority transfer system with private key history transfer
US6195705B1 (en) * 1998-06-30 2001-02-27 Cisco Technology, Inc. Mobile IP mobility agent standby protocol
US6223291B1 (en) * 1999-03-26 2001-04-24 Motorola, Inc. Secure wireless electronic-commerce system with digital product certificates and digital license certificates
US6233577B1 (en) * 1998-02-17 2001-05-15 Phone.Com, Inc. Centralized certificate management system for two-way interactive communication devices in data networks
US20010001268A1 (en) * 1998-12-23 2001-05-17 Opuswave Networks, Inc. Wireless local loop system supporting voice/IP
US6243581B1 (en) * 1998-12-11 2001-06-05 Nortel Networks Limited Method and system for seamless roaming between wireless communication networks with a mobile terminal
US6256300B1 (en) * 1998-11-13 2001-07-03 Lucent Technologies Inc. Mobility management for a multimedia mobile network
US6256737B1 (en) * 1999-03-09 2001-07-03 Bionetrix Systems Corporation System, method and computer program product for allowing access to enterprise resources using biometric devices
US20010012777A1 (en) * 2000-02-09 2001-08-09 Yoichiro Igarashi Mobile communications system and method thereof
US20010014917A1 (en) * 2000-02-15 2001-08-16 Kabushiki Kaisha Toshiba Position identifier management apparatus and method, mobile computer, and position identifier processing method
US20010016492A1 (en) * 2000-02-21 2001-08-23 Yoichiro Igarashi Mobile communications service providing system and mobile communications service providing method
US20010017856A1 (en) * 2000-01-20 2001-08-30 Nokia Mobile Phones Ltd. Address acquisition
US20010020241A1 (en) * 2000-03-02 2001-09-06 Sony Corporation Communication network system, gateway, data communication method and program providing medium
US6292657B1 (en) * 1998-07-13 2001-09-18 Openwave Systems Inc. Method and architecture for managing a fleet of mobile stations over wireless data networks
US20010023446A1 (en) * 2000-02-24 2001-09-20 Peter Balogh Method and equipment for accessing a telecommunication network
US20010024443A1 (en) * 1999-12-20 2001-09-27 Fredrik Alriksson Mobile IP for mobile Ad Hoc networks
US6301471B1 (en) * 1998-11-02 2001-10-09 Openwave System Inc. Online churn reduction and loyalty system
US20010031634A1 (en) * 2000-04-17 2001-10-18 Mika Mizutani Mobile communication systems, mobile stations, base station controllers and packet data service nodes
US20010036224A1 (en) * 2000-02-07 2001-11-01 Aaron Demello System and method for the delivery of targeted data over wireless networks
US20010044305A1 (en) * 2000-05-22 2001-11-22 Reddy Joseph Soma Mobility management in wireless internet protocol networks
US20010043571A1 (en) * 2000-03-24 2001-11-22 Saqib Jang Multiple subscriber videoconferencing system
US20010048686A1 (en) * 2000-05-17 2001-12-06 Yukiko Takeda Mobile communication network, terminal equipment, packet commuincation control method, and gateway
US20020010758A1 (en) * 2000-05-01 2002-01-24 Chung Chan Global data network using existing wireless infrastructures
US20020013831A1 (en) * 2000-06-30 2002-01-31 Arto Astala System having mobile terminals with wireless access to the internet and method for doing same
US20020032858A1 (en) * 2000-04-28 2002-03-14 Tomoyuki Nakano Authentication system, authentication method, authentication apparatus, and authentication method therefor
US20020032855A1 (en) * 2000-09-08 2002-03-14 Neves Richard Kent Providing secure network access for short-range wireless computing devices
US20020034298A1 (en) * 2000-09-15 2002-03-21 Roke Manor Research Limited. LAN user protocol
US20020035699A1 (en) * 2000-07-24 2002-03-21 Bluesocket, Inc. Method and system for enabling seamless roaming in a wireless network
US20020034301A1 (en) * 2000-08-15 2002-03-21 Stefan Andersson Network authentication
US20020037708A1 (en) * 2000-09-22 2002-03-28 Roke Manor Research Limited Access authentication system
US20020046179A1 (en) * 2000-10-13 2002-04-18 Nec Corporation Virtual public access service
US20020046285A1 (en) * 2000-09-25 2002-04-18 Pioneer Corporation Data communication system
US6377548B1 (en) * 1997-10-14 2002-04-23 Lucent Technologies Inc. Method for admitting new connections based on measured quantities in a multiple access system for communications networks
US20020052965A1 (en) * 2000-10-27 2002-05-02 Dowling Eric Morgan Negotiated wireless peripheral security systems
US20020066029A1 (en) * 2000-11-30 2002-05-30 Yi Kyoung Hoon Method for accessing home-network using home-gateway and home-portal server and apparatus thereof
US20020066036A1 (en) * 2000-11-13 2002-05-30 Gowri Makineni System and method for secure network mobility
US20020066032A1 (en) * 2000-07-27 2002-05-30 Tsuneaki Kurumida Method for issuing installation key and system thereof
US20020069282A1 (en) * 1994-05-31 2002-06-06 Reisman Richard R. Method and system for distributing updates
US20020069278A1 (en) * 2000-12-05 2002-06-06 Forsloew Jan Network-based mobile workgroup system
US20020073240A1 (en) * 2000-11-27 2002-06-13 Heikki Kokkinen Server
US20020075844A1 (en) * 2000-12-15 2002-06-20 Hagen W. Alexander Integrating public and private network resources for optimized broadband wireless access and method
US20020087335A1 (en) * 2001-01-02 2002-07-04 Stephan Meyers System and method for public wireless network access subsidized by dynamic display advertising
US20020085719A1 (en) * 2000-07-24 2002-07-04 Bluesocket, Inc. Method and system for enabling centralized control of wireless local area networks
US20020098840A1 (en) * 1998-10-09 2002-07-25 Hanson Aaron D. Method and apparatus for providing mobile and other intermittent connectivity in a computing environment
US6427174B1 (en) * 1998-11-12 2002-07-30 Cisco Technology, Inc. Dynamic IP addressing and quality of service assurance
US20020101848A1 (en) * 2000-12-05 2002-08-01 Ivan Lee Systems and methods for on-location, wireless access of web content
US20020114303A1 (en) * 2000-12-26 2002-08-22 Crosbie David B. Methods and systems for clock synchronization across wireless networks
US20020124109A1 (en) * 2000-12-26 2002-09-05 Appareon System, method and article of manufacture for multilingual global editing in a supply chain system
US20020136226A1 (en) * 2001-03-26 2002-09-26 Bluesocket, Inc. Methods and systems for enabling seamless roaming of mobile devices among wireless networks
US20020138620A1 (en) * 2000-12-26 2002-09-26 Appareon System method and article of manufacture for global log-in capabilities in a supply chain system
US6493749B2 (en) * 1998-08-17 2002-12-10 International Business Machines Corporation System and method for an administration server
US6594484B1 (en) * 1998-12-17 2003-07-15 Openwave Systems Inc. Automated access by mobile device to automated telephone information services
US20030154110A1 (en) * 2001-11-20 2003-08-14 Ervin Walter Method and apparatus for wireless access to a health care information system
US6633761B1 (en) * 2000-08-11 2003-10-14 Reefedge, Inc. Enabling seamless user mobility in a short-range wireless networking environment
US6769009B1 (en) * 1994-05-31 2004-07-27 Richard R. Reisman Method and system for selecting a personalized set of information channels
US6772331B1 (en) * 1999-05-21 2004-08-03 International Business Machines Corporation Method and apparatus for exclusively pairing wireless devices
US20040167984A1 (en) * 2001-07-06 2004-08-26 Zone Labs, Inc. System Providing Methodology for Access Control with Cooperative Enforcement
US20050254651A1 (en) * 2001-07-24 2005-11-17 Porozni Baryy I Wireless access system, method, signal, and computer program product

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5175867A (en) 1991-03-15 1992-12-29 Telefonaktiebolaget L M Ericsson Neighbor-assisted handoff in a cellular communications system
JPH10190562A (en) 1996-12-26 1998-07-21 Toshiba Corp Inter-base station frame synchronizing system of mobile communication system and base station device adapting the same
JP3529621B2 (en) 1997-05-12 2004-05-24 株式会社東芝 Router device, datagram transfer method, and communication system
US5930804A (en) * 1997-06-09 1999-07-27 Philips Electronics North America Corporation Web-based biometric authentication system and method
US6151628A (en) * 1997-07-03 2000-11-21 3Com Corporation Network access methods, including direct wireless to internet access
US6560210B1 (en) 1998-06-10 2003-05-06 Lucent Technologies Inc. Handing off a wireless terminal in a wireless telecommunications system
JP3111992B2 (en) 1998-07-07 2000-11-27 日本電気株式会社 Vehicle communication method and system
US6205480B1 (en) * 1998-08-19 2001-03-20 Computer Associates Think, Inc. System and method for web server user authentication
US6549951B1 (en) 1998-08-25 2003-04-15 Stmicroelectronics, Inc. Method and device for controlling communications with a serial bus
CA2287613A1 (en) 1998-12-07 2000-06-07 Kenneth Carl Budka Methods and apparatus for route optimization in a communications system
US7239618B1 (en) 1998-12-11 2007-07-03 Lucent Technologies Inc. Single phase local mobility scheme for wireless access to packet-based networks
US6600734B1 (en) 1998-12-17 2003-07-29 Symbol Technologies, Inc. Apparatus for interfacing a wireless local network and a wired voice telecommunications system
IL153877A0 (en) * 2000-08-04 2003-07-31 Computer Ass Think Inc Systems and methods for authenticating a user to a web server
US20020144144A1 (en) * 2001-03-27 2002-10-03 Jeffrey Weiss Method and system for common control of virtual private network devices
US20030035388A1 (en) * 2001-08-15 2003-02-20 Schmidt Dominik J. RF sniffer

Patent Citations (92)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US660734A (en) * 1900-01-22 1900-10-30 Robert J Northam Reversible pipe-wrench.
US5673031A (en) * 1988-08-04 1997-09-30 Norand Corporation Redundant radio frequency network having a roaming terminal communication protocol
US5657317A (en) * 1990-01-18 1997-08-12 Norand Corporation Hierarchical communication system using premises, peripheral and vehicular local area networking
US5949776A (en) * 1990-01-18 1999-09-07 Norand Corporation Hierarchical communication system using premises, peripheral and vehicular local area networking
US5239466A (en) * 1990-10-04 1993-08-24 Motorola, Inc. System for selectively routing and merging independent annotations to a document at remote locations
US5940591A (en) * 1991-07-11 1999-08-17 Itt Corporation Apparatus and method for providing network security
US5301356A (en) * 1991-12-10 1994-04-05 Telefonaktiebolaget L M Ericsson Prioritization between handoff and new call requests in a cellular communications system
US5423065A (en) * 1992-02-28 1995-06-06 Mitel Corporation Mobile wireless communications system
US5448570A (en) * 1993-03-17 1995-09-05 Kyocera Corporation System for mutual synchronization and monitoring between base stations
US5457680A (en) * 1993-05-18 1995-10-10 International Business Machines Corporation Data gateway for mobile data radio terminals in a data communication network
US20020069282A1 (en) * 1994-05-31 2002-06-06 Reisman Richard R. Method and system for distributing updates
US6769009B1 (en) * 1994-05-31 2004-07-27 Richard R. Reisman Method and system for selecting a personalized set of information channels
US20020129094A1 (en) * 1994-05-31 2002-09-12 Reisman Richard R. Software and method for automatically sending a data object that includes user demographics
US5668875A (en) * 1994-07-29 1997-09-16 Motorola, Inc. Method and apparatus for authentication in a communication system
US5629981A (en) * 1994-07-29 1997-05-13 Texas Instruments Incorporated Information management and security system
US5901144A (en) * 1995-04-13 1999-05-04 Hitachi, Ltd. Mobile radio communications system
US5915008A (en) * 1995-10-04 1999-06-22 Bell Atlantic Network Services, Inc. System and method for changing advanced intelligent network services from customer premises equipment
US5809415A (en) * 1995-12-11 1998-09-15 Unwired Planet, Inc. Method and architecture for an interactive two-way data communication network
US5987062A (en) * 1995-12-15 1999-11-16 Netwave Technologies, Inc. Seamless roaming for wireless local area networks
US6115615A (en) * 1996-02-26 2000-09-05 Fuji Xerox Co., Ltd. Cellular communication network and its communication method
US5953507A (en) * 1996-06-18 1999-09-14 International Business Machines Corporation Method and apparatus for providing a 3-way connection between a mobile computing device, a stationary computing device and a computer network
US6044401A (en) * 1996-11-20 2000-03-28 International Business Machines Corporation Network sniffer for monitoring and reporting network information that is not privileged beyond a user's privilege level
US5889942A (en) * 1996-12-18 1999-03-30 Orenshteyn; Alexander S. Secured system for accessing application services from a remote station
US6038458A (en) * 1996-12-30 2000-03-14 Nokia Telecommunications Oy Method for selecting a signal, and a cellular radio system
US6137791A (en) * 1997-03-25 2000-10-24 Ericsson Telefon Ab L M Communicating packet data with a mobile station roaming within an incompatible mobile network
US6018657A (en) * 1997-05-05 2000-01-25 Highwaymaster Communications, Inc. System and method for communicating a message using a cellular telephone network
US6073234A (en) * 1997-05-07 2000-06-06 Fuji Xerox Co., Ltd. Device for authenticating user's access rights to resources and method
US6172986B1 (en) * 1997-05-13 2001-01-09 Hitachi, Ltd. Mobile node, mobile agent and network system
US6134591A (en) * 1997-06-18 2000-10-17 Client/Server Technologies, Inc. Network security and integration method and system
US6044465A (en) * 1997-07-07 2000-03-28 International Business Machines Corporation User profile storage on and retrieval from a non-native server domain for use in a client running a native operating system
US6141690A (en) * 1997-07-31 2000-10-31 Hewlett-Packard Company Computer network address mapping
US6026297A (en) * 1997-09-17 2000-02-15 Telefonaktiebolaget Lm Ericsson Contemporaneous connectivity to multiple piconets
US6377548B1 (en) * 1997-10-14 2002-04-23 Lucent Technologies Inc. Method for admitting new connections based on measured quantities in a multiple access system for communications networks
US6115390A (en) * 1997-10-14 2000-09-05 Lucent Technologies, Inc. Bandwidth reservation and collision resolution method for multiple access communication networks where remote hosts send reservation requests to a base station for randomly chosen minislots
US6233577B1 (en) * 1998-02-17 2001-05-15 Phone.Com, Inc. Centralized certificate management system for two-way interactive communication devices in data networks
US6055236A (en) * 1998-03-05 2000-04-25 3Com Corporation Method and system for locating network services with distributed network address translation
US6192130B1 (en) * 1998-06-19 2001-02-20 Entrust Technologies Limited Information security subscriber trust authority transfer system with private key history transfer
US6195705B1 (en) * 1998-06-30 2001-02-27 Cisco Technology, Inc. Mobile IP mobility agent standby protocol
US6292657B1 (en) * 1998-07-13 2001-09-18 Openwave Systems Inc. Method and architecture for managing a fleet of mobile stations over wireless data networks
US6493749B2 (en) * 1998-08-17 2002-12-10 International Business Machines Corporation System and method for an administration server
US20020098840A1 (en) * 1998-10-09 2002-07-25 Hanson Aaron D. Method and apparatus for providing mobile and other intermittent connectivity in a computing environment
US6301471B1 (en) * 1998-11-02 2001-10-09 Openwave System Inc. Online churn reduction and loyalty system
US6427174B1 (en) * 1998-11-12 2002-07-30 Cisco Technology, Inc. Dynamic IP addressing and quality of service assurance
US6256300B1 (en) * 1998-11-13 2001-07-03 Lucent Technologies Inc. Mobility management for a multimedia mobile network
US6243581B1 (en) * 1998-12-11 2001-06-05 Nortel Networks Limited Method and system for seamless roaming between wireless communication networks with a mobile terminal
US6594484B1 (en) * 1998-12-17 2003-07-15 Openwave Systems Inc. Automated access by mobile device to automated telephone information services
US20010001268A1 (en) * 1998-12-23 2001-05-17 Opuswave Networks, Inc. Wireless local loop system supporting voice/IP
US6014558A (en) * 1998-12-28 2000-01-11 Northern Telecom Limited Variable rate optional security measures method and apparatus for wireless communications network
US6256737B1 (en) * 1999-03-09 2001-07-03 Bionetrix Systems Corporation System, method and computer program product for allowing access to enterprise resources using biometric devices
US6081900A (en) * 1999-03-16 2000-06-27 Novell, Inc. Secure intranet access
US6223291B1 (en) * 1999-03-26 2001-04-24 Motorola, Inc. Secure wireless electronic-commerce system with digital product certificates and digital license certificates
US6772331B1 (en) * 1999-05-21 2004-08-03 International Business Machines Corporation Method and apparatus for exclusively pairing wireless devices
US20010024443A1 (en) * 1999-12-20 2001-09-27 Fredrik Alriksson Mobile IP for mobile Ad Hoc networks
US20010017856A1 (en) * 2000-01-20 2001-08-30 Nokia Mobile Phones Ltd. Address acquisition
US20010036224A1 (en) * 2000-02-07 2001-11-01 Aaron Demello System and method for the delivery of targeted data over wireless networks
US20010012777A1 (en) * 2000-02-09 2001-08-09 Yoichiro Igarashi Mobile communications system and method thereof
US20010014917A1 (en) * 2000-02-15 2001-08-16 Kabushiki Kaisha Toshiba Position identifier management apparatus and method, mobile computer, and position identifier processing method
US20010016492A1 (en) * 2000-02-21 2001-08-23 Yoichiro Igarashi Mobile communications service providing system and mobile communications service providing method
US20010023446A1 (en) * 2000-02-24 2001-09-20 Peter Balogh Method and equipment for accessing a telecommunication network
US20010020241A1 (en) * 2000-03-02 2001-09-06 Sony Corporation Communication network system, gateway, data communication method and program providing medium
US20010043571A1 (en) * 2000-03-24 2001-11-22 Saqib Jang Multiple subscriber videoconferencing system
US20010031634A1 (en) * 2000-04-17 2001-10-18 Mika Mizutani Mobile communication systems, mobile stations, base station controllers and packet data service nodes
US20020032858A1 (en) * 2000-04-28 2002-03-14 Tomoyuki Nakano Authentication system, authentication method, authentication apparatus, and authentication method therefor
US20020010758A1 (en) * 2000-05-01 2002-01-24 Chung Chan Global data network using existing wireless infrastructures
US20010048686A1 (en) * 2000-05-17 2001-12-06 Yukiko Takeda Mobile communication network, terminal equipment, packet commuincation control method, and gateway
US20010044305A1 (en) * 2000-05-22 2001-11-22 Reddy Joseph Soma Mobility management in wireless internet protocol networks
US20020013831A1 (en) * 2000-06-30 2002-01-31 Arto Astala System having mobile terminals with wireless access to the internet and method for doing same
US20020035699A1 (en) * 2000-07-24 2002-03-21 Bluesocket, Inc. Method and system for enabling seamless roaming in a wireless network
US20020085719A1 (en) * 2000-07-24 2002-07-04 Bluesocket, Inc. Method and system for enabling centralized control of wireless local area networks
US20020066032A1 (en) * 2000-07-27 2002-05-30 Tsuneaki Kurumida Method for issuing installation key and system thereof
US6633761B1 (en) * 2000-08-11 2003-10-14 Reefedge, Inc. Enabling seamless user mobility in a short-range wireless networking environment
US20020034301A1 (en) * 2000-08-15 2002-03-21 Stefan Andersson Network authentication
US20020032855A1 (en) * 2000-09-08 2002-03-14 Neves Richard Kent Providing secure network access for short-range wireless computing devices
US20020034298A1 (en) * 2000-09-15 2002-03-21 Roke Manor Research Limited. LAN user protocol
US20020037708A1 (en) * 2000-09-22 2002-03-28 Roke Manor Research Limited Access authentication system
US20020046285A1 (en) * 2000-09-25 2002-04-18 Pioneer Corporation Data communication system
US20020046179A1 (en) * 2000-10-13 2002-04-18 Nec Corporation Virtual public access service
US20020052965A1 (en) * 2000-10-27 2002-05-02 Dowling Eric Morgan Negotiated wireless peripheral security systems
US20020066036A1 (en) * 2000-11-13 2002-05-30 Gowri Makineni System and method for secure network mobility
US20020073240A1 (en) * 2000-11-27 2002-06-13 Heikki Kokkinen Server
US20020066029A1 (en) * 2000-11-30 2002-05-30 Yi Kyoung Hoon Method for accessing home-network using home-gateway and home-portal server and apparatus thereof
US20020101848A1 (en) * 2000-12-05 2002-08-01 Ivan Lee Systems and methods for on-location, wireless access of web content
US20020069278A1 (en) * 2000-12-05 2002-06-06 Forsloew Jan Network-based mobile workgroup system
US20020075844A1 (en) * 2000-12-15 2002-06-20 Hagen W. Alexander Integrating public and private network resources for optimized broadband wireless access and method
US20020124109A1 (en) * 2000-12-26 2002-09-05 Appareon System, method and article of manufacture for multilingual global editing in a supply chain system
US20020138620A1 (en) * 2000-12-26 2002-09-26 Appareon System method and article of manufacture for global log-in capabilities in a supply chain system
US20020114303A1 (en) * 2000-12-26 2002-08-22 Crosbie David B. Methods and systems for clock synchronization across wireless networks
US20020087335A1 (en) * 2001-01-02 2002-07-04 Stephan Meyers System and method for public wireless network access subsidized by dynamic display advertising
US20020136226A1 (en) * 2001-03-26 2002-09-26 Bluesocket, Inc. Methods and systems for enabling seamless roaming of mobile devices among wireless networks
US20040167984A1 (en) * 2001-07-06 2004-08-26 Zone Labs, Inc. System Providing Methodology for Access Control with Cooperative Enforcement
US20050254651A1 (en) * 2001-07-24 2005-11-17 Porozni Baryy I Wireless access system, method, signal, and computer program product
US20030154110A1 (en) * 2001-11-20 2003-08-14 Ervin Walter Method and apparatus for wireless access to a health care information system

Cited By (145)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7552222B2 (en) * 2001-10-18 2009-06-23 Bea Systems, Inc. Single system user identity
US20030079029A1 (en) * 2001-10-18 2003-04-24 Sandilya Garimella Single system user identity
US7831655B2 (en) 2001-10-18 2010-11-09 Bea Systems, Inc. System and method for implementing a service adapter
US7721193B2 (en) 2001-10-18 2010-05-18 Bea Systems, Inc. System and method for implementing a schema object model in application integration
US8484664B2 (en) 2002-02-22 2013-07-09 Oracle International Corporation Systems and methods for an extensible software proxy
US8015572B2 (en) 2002-02-22 2011-09-06 Oracle International Corporation Systems and methods for an extensible software proxy
US20040078440A1 (en) * 2002-05-01 2004-04-22 Tim Potter High availability event topic
US7840611B2 (en) 2002-05-01 2010-11-23 Oracle International Corporation High availability for event forwarding
US7840532B2 (en) 2002-05-01 2010-11-23 Oracle International Corporation System and method for storing large messages
US8135772B2 (en) 2002-05-01 2012-03-13 Oracle International Corporation Single servlets for B2B message routing
US20040010631A1 (en) * 2002-05-02 2004-01-15 Timothy Potter Adapter deployment without recycle
US7953787B2 (en) 2002-05-02 2011-05-31 Oracle International Corporation System and method for providing highly available processing of asynchronous requests using distributed request and response queues and a service processor
US7676538B2 (en) 2002-05-02 2010-03-09 Bea Systems, Inc. Systems and methods for application view transactions
US20040081144A1 (en) * 2002-09-17 2004-04-29 Richard Martin System and method for access point (AP) aggregation and resiliency in a hybrid wired/wireless local area network
US20060236363A1 (en) * 2002-09-23 2006-10-19 Credant Technologies, Inc. Client architecture for portable device with security policies
US20060147043A1 (en) * 2002-09-23 2006-07-06 Credant Technologies, Inc. Server, computer memory, and method to support security policy maintenance and distribution
US20060190984A1 (en) * 2002-09-23 2006-08-24 Credant Technologies, Inc. Gatekeeper architecture/features to support security policy maintenance and distribution
US7665118B2 (en) 2002-09-23 2010-02-16 Credant Technologies, Inc. Server, computer memory, and method to support security policy maintenance and distribution
US20060242685A1 (en) * 2002-09-23 2006-10-26 Credant Technologies, Inc. System and method for distribution of security policies for mobile devices
US7665125B2 (en) * 2002-09-23 2010-02-16 Heard Robert W System and method for distribution of security policies for mobile devices
US7515569B2 (en) * 2002-11-27 2009-04-07 Agere Systems, Inc. Access control for wireless systems
US20040100973A1 (en) * 2002-11-27 2004-05-27 Prasad Anand R. Access control protocol for wireless systems
US20040187127A1 (en) * 2003-02-25 2004-09-23 Albert Gondi Systems and methods for transaction chaining
US7774697B2 (en) 2003-02-25 2010-08-10 Bea Systems, Inc. System and method for structuring distributed applications
US7844636B2 (en) 2003-02-25 2010-11-30 Oracle International Corporation Systems and methods for client-side filtering of subscribed messages
US20040167915A1 (en) * 2003-02-25 2004-08-26 Bea Systems, Inc. Systems and methods for declaratively transforming data objects between disparate representations
US7650276B2 (en) 2003-02-26 2010-01-19 Bea Systems, Inc. System and method for dynamic data binding in distributed applications
US8032860B2 (en) 2003-02-26 2011-10-04 Oracle International Corporation Methods for type-independent source code editing
US7707564B2 (en) 2003-02-26 2010-04-27 Bea Systems, Inc. Systems and methods for creating network-based software services using source code annotations
US20040172618A1 (en) * 2003-02-28 2004-09-02 Bea Systems, Inc. Systems and methods for a common runtime container framework
US7650592B2 (en) 2003-03-01 2010-01-19 Bea Systems, Inc. Systems and methods for multi-view debugging environment
US20050073982A1 (en) * 2003-10-07 2005-04-07 Accenture Global Services Gmbh. Connector gateway
US20080025243A1 (en) * 2003-10-07 2008-01-31 Accenture Global Services Gmbh Mobile Provisioning Tool System
US7324473B2 (en) * 2003-10-07 2008-01-29 Accenture Global Services Gmbh Connector gateway
US8315198B2 (en) 2003-10-07 2012-11-20 Accenture Global Services Limited Mobile provisioning tool system
US20060030953A1 (en) * 2003-10-30 2006-02-09 Stephen Cantrell Remote monitoring of a hot melt adhesive system
US8467789B2 (en) 2004-01-06 2013-06-18 Vasu Networks Corporation Telephone with automatic switching between cellular and VoIP networks
US20060050663A1 (en) * 2004-01-06 2006-03-09 Hava Corporation Apparatus for controlling broadband access and distribution of content and communications through an access point
US8886181B2 (en) 2004-01-06 2014-11-11 Vasu Networks Corporation Mobile telephone VOIP/cellular seamless roaming switching controller
US8913604B2 (en) 2004-01-06 2014-12-16 Vasu Networks Corporation Access point with controller for billing and generating income for access point owner
US8520605B2 (en) 2004-01-06 2013-08-27 Vasu Networks Corporation Apparatus for controlling broadband access and distribution of content and communications through an access point
US8514867B2 (en) 2004-01-06 2013-08-20 Hava Corporation Method of determining broadband content usage within a system
US20050147049A1 (en) * 2004-01-06 2005-07-07 Hava Corp. Telephone with automatic switching between cellular and VoIP networks
US8958434B2 (en) 2004-01-06 2015-02-17 Vasu Networks Corporation Method of determining broadband content usage within a system
US9179006B2 (en) 2004-01-06 2015-11-03 Vasu Networks Corporation Access point with controller for billing and generating income for access point owner
US9179267B2 (en) 2004-01-06 2015-11-03 Vasu Networks Corporation Apparatus for controlling broadband access and distribution of content and communications through an access point
US9306827B2 (en) 2004-01-06 2016-04-05 Vasu Networks Corporation Method of determining broadband content usage within a system
US10419996B2 (en) 2004-01-06 2019-09-17 Vasu Networks Corporation Mobile device with automatic switching between cellular and wifi networks
US10368281B2 (en) 2004-01-06 2019-07-30 Vasu Networks Corporation Telephone with automatic switching between cellular and VoIP networks
US9553996B2 (en) 2004-01-06 2017-01-24 Vasu Networks Corporation Access point with controller for billing and generating income for access point owner
US20060050721A1 (en) * 2004-01-06 2006-03-09 Hava Corporation Method of determing broadband content usage within a system
US7991399B2 (en) 2004-01-06 2011-08-02 Vasu Networks Corporation Telephone with automatic switching between cellular and VoIP networks
US20060121894A1 (en) * 2004-01-06 2006-06-08 Hava Corporation Mobile telephone VOIP/cellular seamless roaming switching controller
US20060050687A1 (en) * 2004-01-06 2006-03-09 Hava Corporation Access point with controller for billing and generating income for access point owner
US9648538B2 (en) 2004-01-06 2017-05-09 Vasu Networks Corporation Mobile device with automatic switching between cellular and WiFi networks
US10206154B2 (en) 2004-01-06 2019-02-12 Vasu Networks Corporation Mobile device WiFi/cellular seamless roaming, seamless session continuity, always connected switching controller
US8078164B2 (en) * 2004-01-06 2011-12-13 Vasu Networks Corporation Mobile telephone VOIP/cellular seamless roaming switching controller
US7450552B2 (en) * 2004-07-02 2008-11-11 Tropos Networks, Inc. Access point control of client roaming
US20060002350A1 (en) * 2004-07-02 2006-01-05 Cyrus Behroozi Access point control of client roaming
US8238879B2 (en) 2004-09-24 2012-08-07 Armstrong, Quinton Co. LLC Policy-based controls for wireless cameras
US20110069188A1 (en) * 2004-09-24 2011-03-24 Singh Munindar P Policy-Based Controls For Wireless Cameras
US8660534B2 (en) 2004-09-24 2014-02-25 Armstrong, Quinton Co. LLC Policy based controls for wireless cameras
US10320989B2 (en) 2005-02-11 2019-06-11 Vasu Networks Corporation Access point with controller for billing and generating income for access point owner
US10148824B2 (en) 2005-02-11 2018-12-04 Vasu Networks Corporation Access point with controller for billing and generating income for access point owner
US20120149337A1 (en) * 2005-06-30 2012-06-14 Armstrong, Quinton Co. LLC Methods, systems, and computer program products for role- and locale-based mobile user device feature control
US20070004386A1 (en) * 2005-06-30 2007-01-04 Singh Munindar P Methods, systems, and computer program products for role-and locale-based mobile user device feature control
US8738029B2 (en) * 2005-06-30 2014-05-27 Armstrong, Quinton Co. LLC Methods, systems, and computer program products for role- and locale-based mobile user device feature control
US8145241B2 (en) * 2005-06-30 2012-03-27 Armstrong, Quinton Co. LLC Methods, systems, and computer program products for role- and locale-based mobile user device feature control
US20070220305A1 (en) * 2006-03-20 2007-09-20 Nec Corporation Multiplex server system and server multiplexing method
US8346265B2 (en) * 2006-06-20 2013-01-01 Alcatel Lucent Secure communication network user mobility apparatus and methods
US20070293210A1 (en) * 2006-06-20 2007-12-20 Lyle Strub Secure communication network user mobility apparatus and methods
US8073428B2 (en) * 2006-09-22 2011-12-06 Kineto Wireless, Inc. Method and apparatus for securing communication between an access point and a network controller
US20080076393A1 (en) * 2006-09-22 2008-03-27 Amit Khetawat Method and apparatus for securing communication between an access point and a network controller
US20080101314A1 (en) * 2006-10-27 2008-05-01 Alexander Bachmutsky Network-based reliability of mobility gateways
US7848338B2 (en) * 2006-10-27 2010-12-07 Nokia Corporation Network-based reliability of mobility gateways
US20080192629A1 (en) * 2007-02-14 2008-08-14 Tropos Networks, Inc. Wireless data packet classification
US8305916B2 (en) 2007-02-14 2012-11-06 Tropos Networks, Inc. Wireless data packet classification of an identified flow of data packets
US20100303087A1 (en) * 2007-03-06 2010-12-02 Zte Corporation Method and System for Controlling Network Access
US20090037999A1 (en) * 2007-07-31 2009-02-05 Anderson Thomas W Packet filtering/classification and/or policy control support from both visited and home networks
US8934497B1 (en) 2008-06-17 2015-01-13 United Services Automobile Association Systems and methods for implementing network gateway in catastrophe context or the like
US8345695B1 (en) * 2008-06-17 2013-01-01 United Services Automobile Association (Usaa) Systems and methods for implementing network gateway in catastrophe context or the like
US10257235B1 (en) 2008-06-17 2019-04-09 United Services Automobile Association (Usaa) Systems and methods for implementing network gateway in catastrophe context or the like
US8407462B2 (en) * 2008-09-19 2013-03-26 Chengdu Huawei Symantec Technologies Co., Ltd. Method, system and server for implementing security access control by enforcing security policies
US20110179267A1 (en) * 2008-09-19 2011-07-21 Chengdu Huawei Symantec Technologies Co., Ltd. Method, system and server for implementing security access control
US8743696B2 (en) 2009-08-07 2014-06-03 Cisco Technology, Inc. Mobile transport solution for offloading to an alternate network
US10165487B2 (en) 2009-08-07 2018-12-25 Cisco Technology, Inc. Apparatus, systems, and methods for providing offloading to an alternate network
US8700022B1 (en) 2009-09-25 2014-04-15 Sprint Communications Company L.P. Mobile communication device provisioning and management
US8526929B1 (en) * 2009-09-25 2013-09-03 Sprint Communications Company L.P. Mobile communication device provisioning and management
US20110075557A1 (en) * 2009-09-26 2011-03-31 Kuntal Chowdhury Providing offloads in a communication network
US8693367B2 (en) * 2009-09-26 2014-04-08 Cisco Technology, Inc. Providing offloads in a communication network
US20110075675A1 (en) * 2009-09-26 2011-03-31 Rajeev Koodli Providing services at a communication network edge
US8831014B2 (en) * 2009-09-26 2014-09-09 Cisco Technology, Inc. Providing services at a communication network edge
US9009293B2 (en) 2009-11-18 2015-04-14 Cisco Technology, Inc. System and method for reporting packet characteristics in a network environment
US9825870B2 (en) 2009-11-18 2017-11-21 Cisco Technology, Inc. System and method for reporting packet characteristics in a network environment
US9015318B1 (en) 2009-11-18 2015-04-21 Cisco Technology, Inc. System and method for inspecting domain name system flows in a network environment
US9210122B2 (en) 2009-11-18 2015-12-08 Cisco Technology, Inc. System and method for inspecting domain name system flows in a network environment
US9148380B2 (en) 2009-11-23 2015-09-29 Cisco Technology, Inc. System and method for providing a sequence numbering mechanism in a network environment
US8792495B1 (en) 2009-12-19 2014-07-29 Cisco Technology, Inc. System and method for managing out of order packets in a network environment
US9246837B2 (en) 2009-12-19 2016-01-26 Cisco Technology, Inc. System and method for managing out of order packets in a network environment
US9276962B2 (en) * 2010-06-04 2016-03-01 Broadcom Corporation Method and system for porting gateway functionality associated with a user from a first gateway to one or more other gateways
US10664611B2 (en) 2010-06-04 2020-05-26 Avago Technologies International Sales Pte. Limited Method and system for porting gateway functionality associated with a user from a first gateway to one or more other gateways
US20110299548A1 (en) * 2010-06-04 2011-12-08 Xuemin Chen Method and system for porting gateway functionality associated with a user from a first gateway to one or more other gateways
US8452965B1 (en) * 2010-06-29 2013-05-28 Emc Corporation Self-identification of tokens
US8655787B1 (en) 2010-06-29 2014-02-18 Emc Corporation Automated detection of defined input values and transformation to tokens
US9049046B2 (en) 2010-07-16 2015-06-02 Cisco Technology, Inc System and method for offloading data in a communication system
US9014158B2 (en) 2010-10-05 2015-04-21 Cisco Technology, Inc. System and method for offloading data in a communication system
US9030991B2 (en) 2010-10-05 2015-05-12 Cisco Technology, Inc. System and method for offloading data in a communication system
US8787303B2 (en) 2010-10-05 2014-07-22 Cisco Technology, Inc. Methods and apparatus for data traffic offloading at a router
US9031038B2 (en) 2010-10-05 2015-05-12 Cisco Technology, Inc. System and method for offloading data in a communication system
US9973961B2 (en) 2010-10-05 2018-05-15 Cisco Technology, Inc. System and method for offloading data in a communication system
US8897183B2 (en) 2010-10-05 2014-11-25 Cisco Technology, Inc. System and method for offloading data in a communication system
US8949939B2 (en) * 2010-10-13 2015-02-03 Salesforce.Com, Inc. Methods and systems for provisioning access to customer organization data in a multi-tenant system
US20120096521A1 (en) * 2010-10-13 2012-04-19 Salesforce.Com, Inc. Methods and systems for provisioning access to customer organization data in a multi-tenant system
US9596246B2 (en) 2010-10-13 2017-03-14 Salesforce.Com, Inc. Provisioning access to customer organization data in a multi-tenant system
US9565117B2 (en) 2010-12-22 2017-02-07 Cisco Technology, Inc. Adaptive intelligent routing in a communication system
US10291529B2 (en) 2010-12-22 2019-05-14 Cisco Technology, Inc. Adaptive intelligent routing in a communication system
US10693789B2 (en) 2010-12-22 2020-06-23 Cisco Technology, Inc. Adaptive intelligent routing in a communication system
US9003057B2 (en) 2011-01-04 2015-04-07 Cisco Technology, Inc. System and method for exchanging information in a mobile wireless network environment
US10110433B2 (en) 2011-01-04 2018-10-23 Cisco Technology, Inc. System and method for exchanging information in a mobile wireless network environment
US8477730B2 (en) 2011-01-04 2013-07-02 Cisco Technology, Inc. Distributed load management on network devices
US9801094B2 (en) 2011-01-04 2017-10-24 Cisco Technology, Inc. Distributed load management on network devices
US9294981B2 (en) 2011-01-04 2016-03-22 Cisco Technology, Inc. Distributed load management on network devices
US20120222083A1 (en) * 2011-02-28 2012-08-30 Nokia Corporation Method and apparatus for enforcing data privacy
US10318759B2 (en) * 2011-02-28 2019-06-11 Nokia Technologies Oy Method and apparatus for enforcing data privacy
US20170243026A1 (en) * 2011-02-28 2017-08-24 Nokia Technologies Oy Method and apparatus for enforcing data privacy
US8948013B1 (en) 2011-06-14 2015-02-03 Cisco Technology, Inc. Selective packet sequence acceleration in a network environment
US8792353B1 (en) 2011-06-14 2014-07-29 Cisco Technology, Inc. Preserving sequencing during selective packet acceleration in a network environment
US8737221B1 (en) 2011-06-14 2014-05-27 Cisco Technology, Inc. Accelerated processing of aggregate data flows in a network environment
US9246825B2 (en) 2011-06-14 2016-01-26 Cisco Technology, Inc. Accelerated processing of aggregate data flows in a network environment
US9166921B2 (en) 2011-06-14 2015-10-20 Cisco Technology, Inc. Selective packet sequence acceleration in a network environment
US8743690B1 (en) 2011-06-14 2014-06-03 Cisco Technology, Inc. Selective packet sequence acceleration in a network environment
US9722933B2 (en) 2011-06-14 2017-08-01 Cisco Technology, Inc. Selective packet sequence acceleration in a network environment
US8948103B2 (en) * 2011-08-17 2015-02-03 Verizon Patent And Licensing Inc. Using user device feed back to dynamically allocate network resources for provisioning services
US20130044694A1 (en) * 2011-08-17 2013-02-21 Verizon Patent And Licensing, Inc. Using user device feed back to dynamically allocate network resources for provisioning services
US9215283B2 (en) * 2011-09-30 2015-12-15 Alcatel Lucent System and method for mobility and multi-homing content retrieval applications
US20130086142A1 (en) * 2011-09-30 2013-04-04 K. Georg Hampel System and Method for Mobility and Multi-Homing Content Retrieval Applications
US10123368B2 (en) 2012-02-23 2018-11-06 Cisco Technology, Inc. Systems and methods for supporting multiple access point names for trusted wireless local area network
US9215075B1 (en) 2013-03-15 2015-12-15 Poltorak Technologies Llc System and method for secure relayed communications from an implantable medical device
US10305695B1 (en) 2013-03-15 2019-05-28 Poltorak Technologies Llc System and method for secure relayed communications from an implantable medical device
US9942051B1 (en) 2013-03-15 2018-04-10 Poltorak Technologies Llc System and method for secure relayed communications from an implantable medical device
US10841104B2 (en) 2013-03-15 2020-11-17 Poltorak Technologies Llc System and method for secure relayed communications from an implantable medical device
US11588650B2 (en) 2013-03-15 2023-02-21 Poltorak Technologies Llc System and method for secure relayed communications from an implantable medical device
US20170076103A1 (en) * 2015-09-14 2017-03-16 Northwestern University System and method for proxy-based data access mechanism in enterprise mobility management
US10776520B2 (en) * 2015-09-14 2020-09-15 Northwestern University System and method for proxy-based data access mechanism in enterprise mobility management
US11930126B2 (en) 2023-02-15 2024-03-12 Piltorak Technologies LLC System and method for secure relayed communications from an implantable medical device

Also Published As

Publication number Publication date
US20030087629A1 (en) 2003-05-08
WO2003029916A2 (en) 2003-04-10
AU2002343424A1 (en) 2003-04-14
WO2003029916A3 (en) 2003-06-19
US7042988B2 (en) 2006-05-09

Similar Documents

Publication Publication Date Title
US7042988B2 (en) Method and system for managing data traffic in wireless networks
US10791506B2 (en) Adaptive ownership and cloud-based configuration and control of network devices
US7389534B1 (en) Method and apparatus for establishing virtual private network tunnels in a wireless network
US7342906B1 (en) Distributed wireless network security system
EP1872558B1 (en) Connecting vpn users in a public network
US8117639B2 (en) System and method for providing access control
US9015855B2 (en) Secure tunneling platform system and method
US8966075B1 (en) Accessing a policy server from multiple layer two networks
US7685295B2 (en) Wireless local area communication network system and method
US8132233B2 (en) Dynamic network access control method and apparatus
US20090119762A1 (en) WLAN Access Integration with Physical Access Control System
KR101013519B1 (en) Method and wireless local area network system for offering wireless network access to both guest users and local users
EP2819363B1 (en) Method, device and system for providing network traversing service
US20040255154A1 (en) Multiple tiered network security system, method and apparatus
US20130104204A1 (en) Mobile host using a virtual single account client and server system for network access and management
US20100182984A1 (en) System and method for providing wireless local area networks as a service
US20090055900A1 (en) Enterprise wireless local area network (lan) guest access
JP3697437B2 (en) Network system and network system construction method
US20130283050A1 (en) Wireless client authentication and assignment
US20090271852A1 (en) System and Method for Distributing Enduring Credentials in an Untrusted Network Environment
Nguyen et al. An SDN-based connectivity control system for Wi-Fi devices
KR20070102830A (en) Method for access control in wire and wireless network
US20030204744A1 (en) Network access control
JP4584776B2 (en) Gateway device and program
KR100429395B1 (en) Duplication method of AAA system using pre-established transport layer security association

Legal Events

Date Code Title Description
AS Assignment

Owner name: BLUESOCKET, INC., MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JUITT, DAVID;BATES, PHILIP;CRAWSHAW, GEOFFREY;AND OTHERS;REEL/FRAME:017622/0442;SIGNING DATES FROM 20021125 TO 20030107

AS Assignment

Owner name: VENTURE LENDING & LEASING IV, INC., CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNOR:BLUESOCKET, INC.;REEL/FRAME:019658/0536

Effective date: 20060929

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION