System and methods for a secure and segregated computer network
First Claim
1. A method for managing a secure local area network wherein the local area network includes a plurality of private networks logically linked to a wireless network having a plurality of wireless access points for isolating data traffic, the method comprising:
- authenticating a plurality of wireless user devices to be coupled to the wireless network;
segregating the plurality of authenticated wireless user devices into a first logical wireless virtual local area network of the wireless network and a second logical wireless virtual local area network of the wireless network;
assigning at least one wireless access point of the plurality of wireless access points to at least one authenticated wireless user device of the authenticated plurality of wireless user devices based upon the proximity of the plurality of wireless access points to the plurality of wireless user devices;
coupling the authenticated plurality of wireless user devices to the wireless network through the assigned at least one wireless access point of the plurality of wireless access points;
dynamically reassigning at least a second wireless access point of the plurality of wireless access points to the at least one authenticated wireless user device based upon the proximity of the plurality of wireless access points to the plurality of wireless user devices, wherein the dynamically reassigning of at least a second wireless access point is performed as the at least one authenticated wireless user device is repositioned;
dynamically coupling the authenticated plurality of wireless user devices to the wireless network through at least the second wireless access point wherein the dynamically coupling of the authenticated plurality of wireless user devices is performed as the plurality of authenticated wireless user devices are repositioned, thereby permitting the plurality of authenticated user devices to roam seamlessly throughout the wireless network;
segregating the plurality of private networks into a corresponding plurality of logical private virtual local area networks of the local area network; and
linking the first and second logical wireless virtual local area network to at least one of the plurality of logical private virtual local area networks, thereby enabling the plurality of authenticated wireless user devices to couple to at least one of the plurality of private networks, wherein traffic between the first logical wireless virtual local area network and the at least one linked private virtual local area network is isolated from traffic between the second logical wireless virtual local area network and the at least one linked private virtual local area network.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is a method and system for managing a secure local area network wherein the local area network includes a plurality of private networks logically linked to a wireless network having a plurality of wireless access points for isolating data traffic. The system provides authentication of the user devices, segregation of the user device into logical wireless virtual local area networks (WVLANs), and places the private networks into virtual local area networks (VLANs). By linking WVLANs with the appropriate VLANs, the management system provides segregation of user device traffic, as well as private network traffic, despite a shared physical network. By consolidating wireless networks in a multi-tenant environment, the work area of each individual tenant is expanded to a building wide roaming area, and radio frequency interference is reduced. In addition, by coupling together numerous wireless networks a greater roaming capability is created across all managed wireless networks.
116 Citations
20 Claims
-
1. A method for managing a secure local area network wherein the local area network includes a plurality of private networks logically linked to a wireless network having a plurality of wireless access points for isolating data traffic, the method comprising:
-
authenticating a plurality of wireless user devices to be coupled to the wireless network; segregating the plurality of authenticated wireless user devices into a first logical wireless virtual local area network of the wireless network and a second logical wireless virtual local area network of the wireless network; assigning at least one wireless access point of the plurality of wireless access points to at least one authenticated wireless user device of the authenticated plurality of wireless user devices based upon the proximity of the plurality of wireless access points to the plurality of wireless user devices; coupling the authenticated plurality of wireless user devices to the wireless network through the assigned at least one wireless access point of the plurality of wireless access points; dynamically reassigning at least a second wireless access point of the plurality of wireless access points to the at least one authenticated wireless user device based upon the proximity of the plurality of wireless access points to the plurality of wireless user devices, wherein the dynamically reassigning of at least a second wireless access point is performed as the at least one authenticated wireless user device is repositioned; dynamically coupling the authenticated plurality of wireless user devices to the wireless network through at least the second wireless access point wherein the dynamically coupling of the authenticated plurality of wireless user devices is performed as the plurality of authenticated wireless user devices are repositioned, thereby permitting the plurality of authenticated user devices to roam seamlessly throughout the wireless network; segregating the plurality of private networks into a corresponding plurality of logical private virtual local area networks of the local area network; and linking the first and second logical wireless virtual local area network to at least one of the plurality of logical private virtual local area networks, thereby enabling the plurality of authenticated wireless user devices to couple to at least one of the plurality of private networks, wherein traffic between the first logical wireless virtual local area network and the at least one linked private virtual local area network is isolated from traffic between the second logical wireless virtual local area network and the at least one linked private virtual local area network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for managing the secure local area network wherein the local area network includes a plurality of private networks logically linked to a wireless network having a plurality of wireless access points for isolating data traffic, the method comprising:
-
authenticating the plurality of wireless user devices to be coupled to the wireless network; segregating the plurality of authenticated wireless user devices into a first logical wireless virtual local area network of the wireless network and a second logical wireless virtual local area network of the wireless network; coupling the authenticated plurality of wireless user devices to the wireless network, wherein the coupling is performed through at least one wireless access point of the plurality of wireless access points and wherein the at least one wireless access point is dynamically designated by the user device location; coupling the plurality of private networks to the local area network through a plurality of access ports, wherein each access port couples to one private network; segregating the plurality of private networks into a corresponding plurality of logical private virtual local area networks of the local area network; and linking the first and second logical wireless virtual local area network to at least one of the plurality of logical private virtual local area networks, thereby enabling the plurality of authenticated wireless user devices to couple to at least one of the plurality of private networks, wherein traffic between the first logical wireless virtual local area network and at least one linked private virtual local area network is isolated from traffic between the second logical wireless virtual local area network and the at least one linked private virtual local area network. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A secure and segregated local area network useful in association with a multi user group environment, the local area network comprising:
-
a wireless local area network switch configured to a plurality of wireless user devices, segregating the plurality of authenticated wireless user devices into a first logical wireless virtual local area network of a wireless network and a second logical wireless virtual local area network of the wireless network, segregating a plurality of private networks into a corresponding plurality of logical private virtual local area networks of the local area network, and linking the first and second logical wireless virtual local area network to at least one of the plurality of logical private virtual local area networks; a plurality of access points configured to couple the authenticated plurality of wireless user devices to the wireless network, wherein the coupling is performed through at least one wireless access point of the plurality of wireless access points and wherein the at least one wireless access point is dynamically designated by the user device location; and a plurality of access ports configured to couple the plurality of private networks to the local area network through the plurality of access ports, wherein each access port couples to one private network. - View Dependent Claims (17, 18, 19, 20)
-
Specification