Wireless network having multiple communication allowances

ABSTRACT

Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of access to the network resources. One without the key is granted lesser access, e.g., less total bandwidth, less bandwidth speed, no access to files or the like.

CROSS-REFERENCE TO RELATED APPLICATIONS

This Application is a continuation of application Ser. No. 13/667,690filed Nov. 2, 2012, pending, which is a continuation of application Ser.No. 12/345,565 filed Dec. 29, 2008, now issued as U.S. Pat. No.8,312,286, which is a continuation of application Ser. No. 10/800,472filed Mar. 15, 2004, now issued as U.S. Pat. No. 7,490,348, and claimspriority to U.S. Provisional Application No. 60/454,694 filed Mar. 14,2003. The entire disclosures of the above-listed Applications are herebyincorporated by specific reference thereto.

FIELD OF INVENTION

Wireless networks are well-known, and may be based, for example, on the802.11 standard. Because the contents of the wireless network can bereceived by anyone with wireless access, security may be achievedthrough encryption of the stream. Anyone with an encryption code can/apinto the network. Those without the encryption code, however, simplycannot decode the wireless stream. In addition, standard networkprotocols may be used, so that not only the encryption code, but also anetwork login, is necessary.

SUMMARY

The present application describes a wireless network, defining aplurality of different classes of service, where the different classesof service include at least a first class of service that includes afirst set of permissions for access to resources, and a second class ofservice which includes a second set of permissions of access toresources.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other aspects will now be described in detail with referenceto the accompanying drawings, in which:

FIG. 1 shows a basic diagram of the networks described herein.

DETAILED DESCRIPTION

Wireless networks have been used for other things besides secure filetransfer. For example, Internet Cafes and “wireless hot spots” mayinclude the capability of communication to a user's personal laptopwhich is equipped with a wireless card. This may use a network key forthe encryption of the word “public”, or a network key which is given tousers who pay for the service or pay for a drink or food, or without anynetwork key at all. Certain areas such as hotel rooms are often wirelessenabled. However, the communication is typically or totally on, ortotally off; that is either the user is allowed to receive wirelessInternet, or the user is blocked from all communications.

The present system teaches a network with multiple levels of capability,depending on the access credentials possessed by the user.

FIG. 1 shows this being carried out using multiple network cards orNICs. However, the same effect can be obtained with a single NIC.Preferably the network cards are wireless, using one of the features ofIEEE 802.11 wireless communication protocols.

Different classes of users may be assigned. The first class of users,shown as user 1, are allowed file access to files and information fromthe server. These users may be given the encryption key, here for thefirst NIC 100 here shown as ABCDEF. These users may be allowed thehighest level of access to resources. As conventional users who have thecomplete set of credentials, they are allowed unlimited upload anddownload, and full file access (that is allowed to non-administratorusers). In addition, these users may be allowed the maximum upload anddownload speeds which is given to network users, and to receive alldifferent kinds of Internet and files from all sources.

For example, the amount of access which is provided to these users maybe assigned by the operating system which drives the NICs. For example,if Windows XP is used as the operating system, it may assign NIC 100with unlimited file access.

A second class of users shown as user 2 do not have the credentials,here the encryption key, for the network card 100, and hence use theencryption key “pubic” and thereby can only communicate with the networkcard No. 2 shown as 110. Alternatively, these same users may communicateusing no encryption key at all.

The network card 110 allows only some subset of the operations that areallowed by the network card 100. For example, the user 2 may receiveInternet only, and no file access. They may be allowed to print. Inaddition, the upload and download speeds may be limited or severelylimited; for example, the Internet may be limited to 1M download speedsand 100K of upload speed.

This system as described above may be usable in an office environment.For example, users who are actually members of the office obtain fileaccess, while visitors only receive print and Internet access.

Another contemplated use is in pay-for-Internet use. The user 1 may paya higher fee than the user 2. For example, user 2 may pay only forlimited Internet, while user 1 may pay for access to resources such asvideo over IP, and higher download speeds from the Internet.

In addition, a third class of users shown as user 3 may be defined.These users communicate only to NIC 120. Note that while this describesusers 1, 2 and 3, any subset of these users may be used, for example asystem may be configured which only communicates with user 1 and user 3.The NIC No. 3 is shown as having no encryption code whatsoever.

User 3 is limited even further. User 3 may receive only commercial partsof the Internet. In the office environment, this may limit the Internetto web pages describing the office and/or certain intranet sites. In apay for internet environment, this may describe the “free” user, who mayonly receive certain content. User 3 may also receive a severelyrestricted bandwidth and/or only a limited quantity of information. Forexample, the user 3 may be assigned a token which allows them only toreceive for example total of 1 megabytes of download and only to upload100 Kilobytes of upload. This even further limits the user 3.

As described above, the different users in their different classes havedifferent levels of file access, and resource access, resource speed andresource amount.

FIG. 1 shows this being carried out with three different network cardsover the same airspace. Alternatively, the three different networks maybe carried out as part of a single network card; shown as network card130. For example, this may include three network resources which operateon the single card.

Alternatively, the three different kinds of resources may be carried outin software, for example this may be carried out by three differentnetwork resource allowances within the software that runs the networkcard or within the server 99.

Other implementations are within the disclosed embodiment.

What is claimed is:
 1. A network transmitting system comprising: a firstdevice, transmitting a first wireless network stream with a firstnetwork name identifier, said first wireless network stream beingaccessible with a first key that provides a first level of server and/orInternet access to a first class of users using said first wirelessnetwork stream; a second device, transmitting a second wireless networkstream with a second network name identifier, said second wirelessnetwork stream being accessible with a second key that provides a secondlevel of said server and/or Internet access to a second class of usersusing said second wireless network stream; said first and secondwireless network streams having coverage areas that overlap; said firstkey being different from said second key; said first level of accessbeing different from said second level of access; and wherein the levelof access provided to at least one class of users does not allow accessto all server files.
 2. A system as in claim 1, wherein each class ofusers is given access to the Internet and the Internet access speedgiven to one class of users is different from the Internet access speedgiven to the other class of users.
 3. A system as in claim 1, whereinone level of access allows access to different intranet resources thananother level of access.
 4. A system as in claim 1, wherein eachwireless network stream is compliant with IEEE 802.11.
 5. A system as inclaim 1, wherein each class of users is given access to some serverfiles but neither class of users is given access to all server files. 6.A system as in claim 4, wherein the first network name identifier andthe second network name identifier are different.
 7. A system as inclaim 1, wherein said first networking device and said second networkingdevice are in one device and the coverage areas of the network streamssubstantially overlap.
 8. A network transmitting system, comprising: afirst device, transmitting a first wireless network stream with a firstnetwork name identifier, said first wireless network stream beingaccessible with a first key that provides a first level of server and/orInternet access to a first class of users using said first wirelessnetwork stream; a second device, transmitting a second wireless networkstream with a second network name identifier, said second wirelessnetwork stream being accessible with a second key that provides a secondlevel of said server and/or Internet access to a second class of usersusing said second wireless network stream; said first and secondwireless network streams having coverage areas that overlap; said firstkey being different from said second key; said first level of accessbeing different from said second level of access; wherein the level ofaccess provided to at least one class of users does not allow access toall server files; and wherein the Internet access speed given to oneclass of users is different from the Internet access speed given toanother class of users.
 9. A system as in claim 8, wherein the firstnetwork name identifier and the second network name identifier aredifferent, wherein one level of access allows access to differentintranet resources than another level of access, and wherein eachwireless network stream is compliant with IEEE 802.11.
 10. A system asin claim 8, wherein one level of access allows access to differentInternet resources than another level of access.
 11. A system as inclaim 8, wherein each class of users is given access to some serverfiles but neither class of users is given access to all server files.12. A system as in claim 8, wherein the first network name identifierand the second network name identifier are different, wherein eachwireless network stream is compliant with IEEE 802.11, and wherein thecoverage areas of the wireless network streams substantially overlap.13. A system as in claim 8, wherein each network is accessed by itsrespective key without requiring any further network login.
 14. Anetwork transmitting system, comprising: a first device, transmitting afirst wireless network stream, said first wireless network stream beingaccessible with a first key that provides a first level of server and/orInternet access to a first class of users using said first wirelessnetwork stream; a second device, transmitting a second wireless networkstream, said second wireless network stream being accessible with asecond key that provides a second level of said server and/or Internetaccess to a second class of users using said second wireless networkstream; said first and second wireless network streams having coverageareas that overlap; said first key being different from said second key;and said first level of access being different from said second level ofaccess.
 15. A system as in claim 14, wherein the level of accessprovided to at least one class of users does not allow access to allserver files; wherein said first level of access allows access todifferent Internet resources than said second level of access; andwherein one level of access allows access to different intranetresources than another level of access.
 16. A system as in claim 14,wherein the first network name identifier and the second network nameidentifier are different, and wherein each wireless network stream iscompliant with IEEE 802.11.
 17. A system as in claim 14, wherein eachclass of users is given access to some server files but neither class ofusers is given access to all server files.
 18. A system as in claim 14,wherein said first networking device and said second networking deviceare in one device.
 19. A system as in claim 14, wherein each class ofusers is given access to the Internet and the Internet access speedgiven to one class of users is different from the Internet access speedgiven to another class of users.
 20. A system as in claim 14, whereinthe level of access provided to at least one class of users does notallow access to all server files; wherein said first level of accessallows access to different Internet resources than said second level ofaccess; wherein one level of access allows access to different intranetresources than another level of access; wherein the first network nameidentifier and the second network name identifier are different; andwherein each wireless network stream is compliant with IEEE 802.11.