Network access point for providing multiple levels of security
First Claim
1. A method comprising:
- receiving a request from a first wireless station for access to a first resource, wherein said first wireless station offers to authenticate itself as authorized to access said first resource;
authenticating said first wireless station through a first port; and
, providing access for said first wireless station to said first resource through a second port after said first wireless station has been authenticated as authorized to access said first resource.
5 Assignments
0 Petitions
Accused Products
Abstract
A technique is disclosed to provide a single wireless local area network in which authorized wireless stations and non-authorized wireless stations can associate with different security levels and privileges. In the first illustrative embodiment of the present invention, there are multiple physical or logical ports connecting a wireless station to public and private resources. The purpose of using multiple ports to access the external resources is to segregate the traffic associated with each level of security to a different port, and to ensure that each external resource only accepts traffic from those ports that are associated with the level of security needed for that resource. In the second illustrative embodiment of the present invention, segregation of traffic associated with each level of security is achieved by putting resources of different levels of security or privilege on different virtual local area networks.
32 Citations
28 Claims
-
1. A method comprising:
-
receiving a request from a first wireless station for access to a first resource, wherein said first wireless station offers to authenticate itself as authorized to access said first resource;
authenticating said first wireless station through a first port; and
,providing access for said first wireless station to said first resource through a second port after said first wireless station has been authenticated as authorized to access said first resource. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving a request from a first wireless station for access to a first resource, wherein said first wireless station offers to authenticate itself as authorized to access said first resource;
authenticating said first wireless station through a first network; and
,providing access for said first wireless station to said first resource through a second network after said first wireless station has been authenticated as authorized to access said first resource. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. An apparatus comprising:
-
a first port;
a second port;
a receiver for receiving a request from a first wireless station for access to a first resource, wherein said first wireless station offers to authenticate itself as authorized to access said first resource; and
a transmitter for authenticating said first wireless station through said first port, and for providing access for said first wireless station to said first resource through said second port after said first wireless station has been authenticated as authorized to access said first resource. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. An apparatus comprising:
-
a first network;
a second network;
a receiver for receiving a request from a first wireless station for access to a first resource, wherein said first wireless station offers to authenticate itself as authorized to access said first resource; and
a transmitter for authenticating said first wireless station through said first network, and for providing access for said first wireless station to said first resource through said second network after said first wireless station has been authenticated as authorized to access said first resource. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
Specification