throbber
USOO6957067B1
`
`(12) United States Patent
`Iyer et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 6,957,067 B1
`Oct. 18, 2005
`
`(54) SYSTEM AND METHOD FOR MONITORING
`AND ENFORCING POLICY WITHINA
`WIRELESS NETWORK
`
`(75) Inventors: Pradeep J. Iyer, San Jose, CA (US);
`Partha Narasimhan, Santa Clara, CA
`(US)
`
`(73) Assignee: Aruba Networks, Sunnyvale, CA (US)
`
`( c: ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 381 days.
`(21) Appl. No.: 10/254,125
`(22) Filed:
`Sep. 24, 2002
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`6,493.698 B1
`12/2002 Bevlin ........................... 707/1
`2002.069278 A . E. Ew. - - - 702.
`2002/0099503 A1
`7/2002 Mishra et al. .............. 701/213
`2002/O159418 A1 10/2002 Rudnick et al. ......
`... 370/338
`2003/0017826 A1
`1/2003 Fishman et al. ......
`... 455/426
`2003/OO1876O A1
`1/2003 Putzou et al. ........
`... 709/223
`2003/0O23711 A1
`1/2003 Parmar et al. ....
`... 709/233
`2003/0031151 A1
`2/2003 Sharma et al. .............. 370/338
`* cited by examiner
`Primary Examiner-Stephen M. D’Agosta
`(74) Attorney, Agent, or Firm-Blakely Sokoloff Taylor &
`Zafman
`
`(57)
`
`ABSTRACT
`
`(51) Int. Cl." ................................................ H04Q 7/20
`
`(52) U.S. Cl. ............................... 455/435.1; 455/426.1;
`455/432.1; 455/435.2; 709/225; 370/338
`
`(58) Field of Search .......................... 455/422.1,426.1,
`455/435.1; 707/1; 709/223, 225; 370/338;
`435/432.1, 435.2
`
`In general, one embodiment of the invention is a air monitor
`adapted to a wireleSS network. The air monitor enforces
`policies followed by the wireless network even though it is
`not involved in the exchange of data between wireleSS
`devices of the wireleSS network Such as acceSS points and
`Wireless stations.
`12 Claims, 10 Drawing Sheets
`
`
`
`
`
`Management
`Server
`120
`
`Wireless
`Station
`(STA)
`
`WireleSS
`Station
`(STA)
`
`Wireless
`Station
`(STA)
`
`Wireless
`Station
`(STA)
`
`140-140
`
`Hewlett Packard Exhibit 1004, Page 1 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`U.S. Patent
`
`Oct. 18, 2005
`
`Sheet 1 of 10
`
`US 6,957,067 B1
`
`
`
`
`
`I ommãi.{
`
`Hewlett Packard Exhibit 1004, Page 2 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`Hewlett Packard Exhibit 1004, Page 3 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`Hewlett Packard Exhibit 1004, Page 4 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`U.S. Patent
`
`Oct. 18, 2005
`
`Sheet 4 of 10
`
`US 6,957,067 B1
`
`CIISSEI
`SS@THOIGTV
`
`VS
`
`
`
`Hewlett Packard Exhibit 1004, Page 5 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`Hewlett Packard Exhibit 1004, Page 6 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`U.S. Patent
`
`Oct. 18, 2005
`
`Sheet 6 of 10
`
`US 6,957,067 B1
`
`§ 3.1m8?I
`
`
`
`
`
`
`
`6 om mãi.{
`
`Hewlett Packard Exhibit 1004, Page 7 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`U.S. Patent
`
`Oct. 18, 2005
`
`Sheet 7 of 10
`
`US 6,957,067 B1
`
`0I 0,1m81. I
`
`
`
`
`
`006 GITI?IVL
`
`WV/AV
`
`
`
`00Z GITIGTVIL AV0 1 0 [
`
`Hewlett Packard Exhibit 1004, Page 8 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`Hewlett Packard Exhibit 1004, Page 9 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`U.S. Patent
`
`C
`
`eN?
`
`laer)
`
`dV
`
`CIETRIÍTOEISN ÍT
`
`
`
`‘=(HEIA RICHS|TEINNVHOdTW CIETRITORISNQ
`
`
`
`2JLNEVNEHOVNV JN|HO YHTEIHIJLNGHCIIQ g | I ------------------O
`
`
`
`#O
`
`US 6,957,067 B1
`
`00$ I
`
`en
`N
`Q)
`SN
`
`S s
`
`is S
`a w
`
`
`
`
`
`GIOVSSTIWN GIOIA HEISTHOTTVINGICI
`
`Hewlett Packard Exhibit 1004, Page 10 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`U.S. Patent
`
`Oct. 18, 2005
`
`Sheet 10 0f 10
`
`US 6,957,067 B1
`
`gI 3.1m81,
`
`+----
`
`JLRIVILS
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Hewlett Packard Exhibit 1004, Page 11 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`US 6,957,067 B1
`
`1
`SYSTEMAND METHOD FOR MONITORING
`AND ENFORCING POLICY WITHINA
`WIRELESS NETWORK
`
`FIELD
`
`Embodiments of the invention relate to the field of
`wireleSS communications, in particular, to a mechanism that
`monitors and enforces policy within a wireleSS network.
`
`GENERAL BACKGROUND
`
`Over the last decade or So, for most businesses, it has
`become a necessity for employees to share data over an
`enterprise network featuring one or more local area net
`WorkS. To improve efficiency, enhancements have added to
`a local area network Such as remote wireleSS access. This
`enhancement provides an important extension in forming a
`wireless local area network.
`Typically, a WLAN supports communications between
`wireless stations and Access Points (APs). In general, each
`AP operates as a relay Station by Supporting communications
`with both wireleSS Stations being part of a wireleSS network
`and resources of a wired network.
`In addition to APS and corresponding wireleSS Stations,
`conventional WLANs feature passive monitoring Systems.
`These Systems are configured to Simply Scan traffic on the
`WLAN and to conduct performance tasks based on recog
`nized behavior. For example, one performance task may
`involve measuring Signal Strength. Another performance
`task may involve determining whether an AP detected within
`a wireless coverage area is unauthorized.
`If any problems are detected, conventional monitoring
`Systems do not have any capability to correct Such problems.
`Instead, a notification is Sent by the System to an adminis
`trator. For instance, upon detection of an unauthorized AP,
`the passive monitoring System currently sends a notification
`to an administrator to prevent wireleSS Stations in the area
`from accessing the unauthorized AP. This inability of moni
`toring Systems to automatically handle problems and enforce
`policy followed by the network may cause undesirable
`latency in correcting problems and increased overall admin
`istrative costs. In addition, mere notification adversely
`effects overall Security of the network by increasing its
`exposure to hackers.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The invention may best be understood by referring to the
`following description and accompanying drawings that are
`used to illustrate embodiments of the invention.
`FIG. 1 is an exemplary embodiment of an enterprise
`network featuring a wireleSS network in accordance with the
`invention.
`FIG. 2 is an exemplary embodiment of an Access Point of
`the WLAN of FIG. 1 in communication with a wireless
`Station.
`FIG. 3 is an exemplary embodiment of the registration
`process by an Air Monitor with a Management Server.
`FIG. 4 is an exemplary embodiment of an Air Monitor of
`FIG. 1.
`FIG. 5A is an exemplary embodiment of a Beacon frame
`detected by the Air Monitor of FIG. 4.
`FIG. 5B is an exemplary embodiment of an IEEE 802.11
`data frame detected by the Air Monitor of FIG. 4.
`
`2
`FIG. 6 is an exemplary embodiment of a data structure
`(referred to as a “Station Table') continuously updated and
`stored by the Air Monitor of FIG. 4.
`FIG. 7 is an exemplary embodiment of a data structure
`(referred to as an “APTable”) maintained and stored by the
`Management Server of FIG. 1.
`FIG. 8 is an exemplary embodiment of a data structure
`(referred to as an “AM Table”) maintained and stored by the
`Management Server of FIG. 1.
`FIG. 9 is an exemplary embodiment of a data structure
`(referred to as an “AP/AM Table”) maintained and stored by
`the Management Server of FIG. 1.
`FIG. 10 is an exemplary embodiment of a communication
`protocol for AP classification between the Air Monitor and
`the Management Server of FIG. 1.
`FIG. 11 is an exemplary embodiment of a communication
`protocol for Rogue AP classification between the Air Moni
`tor and the Management Server of FIG. 1.
`FIG. 12 is an exemplary embodiment of a communication
`protocol for deactivating an Unsecured AP.
`FIG. 13 is an exemplary flowchart of operations for
`enforcement of policy within a wireless network of the
`invention.
`
`15
`
`25
`
`DETAILED DESCRIPTION
`
`Embodiments of the invention relate to a System and
`method for monitoring and enforcing policy within a wire
`leSS network without being an active participant in the
`wireleSS network. In other words, monitoring and enforce
`ment of policy is conducted by a device that is not involved
`in the establishment of connectivity and exchange of data
`between Access Points and their corresponding wireleSS
`Stations. AS one illustrative embodiment, policy enforce
`ment within the wireless network is conducted by an Air
`Monitor and a Management Server, which are described
`below.
`Herein, the invention may be applicable to a variety of
`wireleSS networkS Such as a wireleSS local area network
`(WLAN) or wireless personal area network (WPAN). The
`WLAN may be configured in accordance with any Institute
`of Electrical and Electronics Engineers (IEEE) 802.11 stan
`dard Such as an IEEE 802.11b standard entitled “Wireless
`LAN Medium Access Control (MAC) and Physical Layer
`(PHY) specifications: Higher-Speed Physical Layer Exten
`sion in the 2.4 GHz Band” (IEEE 802.11b, 1999), an IEEE
`802.11a standard entitled “Wireless LAN Medium Access
`Control (MAC) and Physical Layer (PHY) specifications:
`High-Speed Physical Layer in the 5 GHz Band” (IEEE
`802.11a, 1999) or a revised IEEE 802.11 standard “Wireless
`LAN Medium Access Control (MAC) and Physical Layer
`(PHY) specifications” (IEEE 802.11, 1999). Of course, the
`invention may be compliant with Systems configured in
`accordance with High Performance Radio Local Area Net
`works (HiperLAN) or subsequently published specifica
`tions.
`Certain details are set forth below in order to provide a
`thorough understanding of various embodiments of the
`invention, albeit the invention may be practiced through
`many embodiments other that those illustrated. Well-known
`logic and operations are not set forth in detail in order to
`avoid unnecessarily obscuring this description.
`In the following description, certain terminology is used
`to describe features of the invention. For example, a “com
`ponent” includes hardware and/or Software module(s) that
`are configured to perform one or more functions. For
`instance, a “processor' is logic that processes information.
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Hewlett Packard Exhibit 1004, Page 12 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`US 6,957,067 B1
`
`3
`Examples of a processor include a microprocessor, an appli
`cation Specific integrated circuit, a digital signal processor,
`a micro-controller, a finite State machine, or even combina
`torial logic.
`
`4
`wireless network 100. Such resources may include devices
`220 for data Storage, which are coupled to physical medium
`200.
`STA 140 includes a removable, wireless network inter
`face card (NIC) 230 that is separate from or employed within
`a wireless device 240 that processes information (e.g.,
`computer, personal digital assistant "PDA', telephone,
`alphanumeric pager, etc.). Normally, NIC 230 comprises a
`wireleSS transceiver, although it is contemplated that NIC
`230 may feature only receive (RX) or transmit (TX) func
`tionality Such that only a receiver or transmitter is imple
`mented.
`STA 140 communicates with and accesses information
`from AP 130 over the air 250 in accordance with IEEE
`802.11 communications protocol or another wireleSS net
`working protocol. Hence, AP 130 generally operates as a
`transparent bridge connecting both a wireleSS network fea
`turing STA 140 with wired network 210.
`Referring back to FIG. 1, Air Monitor (AM) 110 com
`prises a policy enforcement component implemented within
`a device that also features components enabling wireleSS
`communications (e.g., wireless NIC). The policy enforce
`ment component may be one or more Software modules
`executed by a processor within the device. For this embodi
`ment, AM 110 constantly scans different frequency channels
`and maintains information about all APS 130-130 and
`STAS 140-140 in wireless network 100. Generally, AM
`110 monitors wireless network 100 to extract information
`from wireless frames as described in FIGS. 4, 5A & 5B
`described below. Examples of wireless frames include, but
`are limited or restricted to IEEE 802.11 data frames, Beacon
`frames, HiperLAN frames or the like. This information may
`be used to influence the behavior of wireless network 100.
`Upon start-up, AM 110 registers with Management Server
`120. According to one embodiment, as shown in FIG.3, AM
`110 registers by sending an AM REGISTRATION 300 to
`Management Server 120 over interconnect 305.
`AM REGISTRATION message 300 comprises at least a
`unique address 310 (e.g., Internet Protocol “IP address,
`internal network address, etc.) and a Media Access Control
`(MAC) address 320 for AM 110. Of course, other optional
`information may include a location 330 of AM 110 and
`Status information 340 (e.g., active or inactive).
`Referring to FIG. 4, an exemplary embodiment of AM
`110 of FIG. 1 is shown. AM 110 comprises a transceiver
`component 400, a processor component 430 and a memory
`component 460. Processor 430 and memory 460 are used to
`extract information from Signals transmitted to/from APS
`130-130 of FIG. 1, to measure signal strength, and to
`maintain one or more data structures that can be used to
`influence the behavior of wireless network 100.
`As shown in this embodiment, transceiver component 400
`comprises an antenna 405, a RX interface 410, a TX
`interface 415 and a converter 420. Converter 420 may be
`implemented as a component that can perform both analog
`to-digital Signal conversion as well as digital-to-analog
`Signal conversion. Of course, it is contemplated that con
`verter 420 may include analog-to-digital converter and/or
`digital-to-analog converter. Where both converters are pro
`Vided, they are separate components.
`More specifically, as shown in FIG. 4, antenna 405
`receives an incoming data Stream 406. In one embodiment,
`data stream 406 includes one or more wireless frames Such
`as a Beacon frame 500 of FIG. 5A and an IEEE 802.11 data
`frame 550 of FIG. 5B. The information within these frames
`is encoded and carried within a frequency channel that is
`located within a carrier frequency band. For ths embodi
`
`15
`
`35
`
`40
`
`25
`
`A “Software module' is executable code Such as an
`operating System, an application, an applet or even a routine.
`Software modules may be Stored in any type of memory,
`namely Suitable Storage medium Such as a programmable
`electronic circuit, a Semiconductor memory device, a vola
`tile memory (e.g., random access memory, etc.), a non
`volatile memory (e.g., read-only memory, flash memory,
`etc.), a floppy diskette, an optical disk (e.g., compact disk or
`digital versatile disc “DVD"), a hard drive disk, tape, or any
`kind of interconnect (defined below).
`An "interconnect' is generally defined as an information
`carrying medium that establishes a communication pathway.
`Examples of the medium include a physical medium (e.g.,
`electrical wire, optical fiber, cable, bus traces, etc.) or a
`wireless medium (e.g., air in combination with wireless
`Signaling technology).
`“Information' is defined as data, address, control or any
`combination thereof. For transmission, information may be
`transmitted as a message, namely a collection of bits in a
`predetermined format. One particular type of message is a
`frame including a header and a payload, each having a
`predetermined number of bits of information.
`I. General Architecture
`Referring to FIG. 1, an exemplary embodiment of an
`enterprise network featuring a wireless network 100 in
`accordance with the invention is illustrated. Herein, wireleSS
`network 100 comprises an Air Monitor 110, a Management
`Server 120, one or more Access Points (APs) 130-130
`(N21), and one or more wireless stations (STAS)
`140-140 (M21), which are in communication with APS
`130-130. Of course, it is contemplated that more than one
`Air Monitor may be positioned within wireless network 100.
`Air Monitor (AM) 110 detects any AP within its signal
`coverage area 150, including both valid APs as well as
`unauthorized APs. A “Valid’ AP is an authorized AP coupled
`to and resident of a wired portion of the enterprise network.
`An unauthorized AP can be classified into one or a Selected
`number of classes. For this embodiment, there are three
`classes for unauthorized APS; namely, “Rogue”, “Unse
`cured', and “Interfering”.
`A “Rogue AP or “RAP is an initial class set by
`Management Server
`120 upon receipt
`of
`a
`NEW ACCESS POINT message by Air Monitor 110 as
`described in FIG. 10. An “Unsecured AP is an AP that is
`unknowingly or maliciously installed within the enterprise
`network itself. This allows clients to illegally acceSS
`resources within the enterprise network. An “Interfering AP
`is an AP that is installed on another network, but is within
`a coverage area of the enterprise network. This is a common
`55
`Scenario in multi-tenancy environments where APS from
`other networks are visible to each other.
`As shown in FIG. 2, each AP130, ..., or 130 supports
`bi-directional communications by (i) receiving data frames
`and transmitting data from these frames onto a physical
`medium 200 that forms part of a wired network 210 and (ii)
`receiving data from wired network 210 and transmitting data
`frames to one or more targeted STAS 140,..., 140. Wired
`network 210 can be of any type of wired network, including
`but not limited or restricted to Ethernet, Token Ring, Asyn
`chronous Transfer Mode (ATM) or the like. Moreover, wired
`network 210 features resources that are available for users of
`
`45
`
`50
`
`60
`
`65
`
`Hewlett Packard Exhibit 1004, Page 13 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`US 6,957,067 B1
`
`15
`
`25
`
`S
`ment, the carrier frequency band is located within typical
`radio frequency (RF) band of frequencies. For example, the
`RF band may generally fall within an approximate range of
`2.4-2.5 GHz or perhaps an approximate range of 5-5.25
`GHz. It is contemplated, though, that the invention may be
`applied to any frequency range.
`The RX interface 410 is configured to isolate the fre
`quency channel on which data is carried from all the other
`frequencies received on antenna 405. This may be accom
`plished through a tunable filter tuned to a center frequency
`of a channel of interest. The data channel undergoes a
`frequency shifting from the carrier band to baseband and a
`resulting analog radio signal 411, which is routed to con
`verter 420.
`In one embodiment, converter 420 samples baseband
`analog radio signal 411, which results in a Series of digital
`samples 425. Processor 430 performs a demodulation opera
`tion on the digitally Sampled baseband Signal 425 to recover
`information from the wireless frames. Typically, a fixed
`number of demodulation protocols may be Stored in memory
`460. For instance, AM 110 may support one of more of IEEE
`802.11, 802.11a and 802.11b demodulation protocols as well
`as other protocol types.
`The type of information recovered by AM 110 enables a
`variety of policies to be enforced. For example, Such infor
`mation may enable an AP to be effectively turned off if
`classified as an Unsecured AP. Other examples are set forth
`in the policy extension Section described below.
`For one embodiment, as shown in FIGS. 5A and 5B, the
`information may be recovered from Beacon frame 500 and
`IEEE 802.11 data frame 550. After recovery, the information
`may be stored internally within memory 460 or transmitted
`to memory within Management Server 120.
`For instance, a Service Set Identity (SSID) 510 and a
`channel number 520 may be recovered from a frame body
`530 of Beacon frame 500. Additionally, values of to DS bit
`560 and FromDS bit 565 may be recovered from a frame
`control portion 570 of data frame 550. An identifier (e.g.,
`Basic Service Set Identifier “BSSID) 580 of a detected AP
`may be recovered from an address field 585 of data frame
`40
`550. The signal strength perceived by AM 110 for data frame
`550 may be measured by AM 110 and such value stored.
`Referring back to FIG. 1, Management Server 120 is
`Software running on a central management System that
`manages each and every AM installed in the enterprise
`network. Each Air Monitor (e.g., AM 110) is configured with
`a server address and registers with Management Server 120
`at start-up as described in FIG. 3. Of course, for small scale
`deployment, functionality of Management Server 120 can be
`merged into AM 110.
`Referring to FIG. 6, an exemplary embodiment of a data
`structure 600 (referred to as a “Station Table') continuously
`updated and stored by AM 110 of FIG. 4 is shown. Station
`Table 600 maintains information associated with all APS
`being monitored by an Air Monitor (e.g., AM 110). Such
`information is recovered from wireless frames received by
`or output from any of the monitored APs.
`As shown in this embodiment, each entry 610 of Station
`Table 600 comprises a plurality of fields. A first field is
`configured to contain an identifier 620 of an AP being
`monitored by the Air Monitor (referred to as “AP identi
`fier”). AP identifier 620 may include the BSSID of the
`monitored AP A Second field is configured to contain a
`MAC address 630 corresponding to either a destination
`address or Source address contained in the wireleSS frame.
`Station Table 600 further comprises a third field that
`contains information 640 to indicate whether a Source
`
`6
`address or destination address in the wireleSS frame is a
`“wireless MAC address’ or a “wired MAC address'. More
`Specifically, the Air Monitor constantly classifies Source and
`destination addresses in the wireleSS frames. The destination
`address (DA) is deemed to be a “wireless MAC address” and
`the Source address is deemed to be a "wired MAC address'
`if the frame transfer occurs from the AP to one of its STAS.
`Similarly, DA is deemed to be a “wired MAC address” and
`the Source address is deemed to be a “wireless MAC
`address' if the frame transfer occurs from one of the STAS
`to the AP
`In general, this classification can accomplished by ana
`lyzing from DS and to DS bits within a header of the wireless
`frame. If from DS bit is set and to DS bit is not set, SA is a
`wireless MAC address and DA is a wired MAC address. If
`to DS bit is set and from DS bit is not set, SA is a wired MAC
`address and DA is a wireless MAC address.
`Referring to FIG. 7, an exemplary embodiment of a data
`structure maintained and stored by Management Server 120
`of FIG. 1 is shown. This data structure, referred to as an AP
`Table 700, maintains baseline information for all APS
`installed in the wireless network. This information can be
`manually input by an administrator or automatically popu
`lated by placing all Air Monitors of the wireless network into
`a LEARN mode. In LEARN mode, each Air Monitor
`collects information associated with the APS that are within
`its coverage range and routes Such information to update AP
`Table 700.
`As shown, each entry 710 of AP Table 700 contains
`information associated with an AP of the wireless network.
`As one embodiment, at least one entry 715 includes AP
`identifier 620, a channel number 730, an AP class type value
`740 and a Status value 750. AP identifier 720 is the unique
`value that identifies a specific, monitored AP. An example of
`AP identifier 720 is equivalent to the BSSID 620 concur
`rently stored in Station Table 600 of FIG. 6. Channel number
`730 indicates the particular channel over which the wireless
`frames associated with the particular AP AP class type value
`740 indicates the current classification of the particular AP
`Such as Valid, Rogue, Unsecured or Interfering. Status value
`750 is a Boolean value (0,1) that merely indicates whether
`the AP is active (1) or inactive (0). As an optional feature,
`entry 715 may further include a network identifier 760 (e.g.,
`SSID).
`Referring now to FIG. 8, an exemplary embodiment of a
`data structure 800 (referred to as an “AM Table”) maintained
`and stored by Management Server 120 is shown. AM Table
`800 contains all Air Monitors registered by Management
`Server 120. Each entry of AM table 800 is associated with
`a different Air Monitor. For instance, a first entry comprises
`a first field to contain unique address 810 for one of the Air
`Monitors (e.g., Internet Protocol “IP address, internal net
`work address, etc.) and a second field to contain Media
`Access Control (MAC) address 820 of that Air Monitor.
`Optionally, AM Table 800 further comprises a field to
`contain information 830 indicating a location of the Air
`Monitor and a field to contain status information 840 as to
`whether the Air Monitor is active or inactive.
`Referring to FIG. 9, an exemplary embodiment of a data
`structure 900 (referred to as “AP/AM Table”) maintained
`and stored by Management Server 120 of FIG. 1 is shown.
`This table merely maintains what AP is being monitored by
`which Air Monitor. Each entry of AP/AM Table 900 com
`prises a first field 910 to contain AM address 810 found in
`APTable 800 of FIG. 8 and a second field 920 to contain the
`AP identifier 720 found in AP Table 700 of FIG. 7, which is
`provided to the Management Server by the Air Monitor.
`
`35
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Hewlett Packard Exhibit 1004, Page 14 of 18
`Hewlett Packard Enterprise Company v. Intellectual Ventures II LLC
`IPR2021-01377
`
`

`

`US 6,957,067 B1
`
`50
`
`55
`
`25
`
`7
`II. Communication Protocols
`Referring to FIG. 10, an exemplary embodiment of a
`communication protocol for AP classification between Air
`Monitor (AM) 110 and Management Server 120 of FIG. 1 is
`shown. AM 110 is constantly monitoring the wireless net
`work to detect APS that is active. AM 110 does this by
`extracting (i) BSSID and measuring Signal strength per
`ceived from every wireleSS data frame transmitted or
`received by an AP and (ii) SSID and channel information
`from its Beacon frame. Whenever a new AP is detected, AM
`110 sends a NEW ACCESS POINT message 1000 to
`Management Server 120.
`NEW ACCESS POINT message 1000 comprises a
`plurality of parameters 1010 such as, for example, an AP
`identifier 1020, an optional network identifier 1030, a chan
`15
`nel number 1040, an AP type parameter 1050, an AP class
`parameter 1060 and a status parameter 1070.
`In one embodiment, AP identifier 1020 is a BSSID,
`namely a MAC address that uniquely identifies the new AP.
`Network identifier 1030 is an alphanumeric character string
`that identifies the network to which the new AP is commu
`nicating (e.g., SSID). Channel number 1040 indicates the
`particular channel that the detected frame from/to the new
`AP is received on.
`AP type parameter 1050 indicates a manufacturer, make
`or model of the new AP For example, AP Type parameter
`1050 may indicate that the AP is a software-based AP or may
`indicate that it is manufactured or Sold by a particular
`company Such as Cisco Systems, Inc. of San Jose, Calif.
`AP class parameter 1060 indicates a particular classifica
`tion of the AP such as Valid, Rogue, Unsecured or Interfer
`ing as described above. This information enables Manage
`ment Server 120 to detect if AM 110 has up-to-date AP
`classification. If not, Management Server 120 sends a mes
`35
`sage to AM 110 with the updated AP Classification.
`AP status parameter 1070 simply indicates whether the
`new AP is active or inactive.
`receives
`120
`Server
`When
`Management
`NEW ACCESS POINT message 1000, it compares AP
`40
`identifier 1020 with the baseline maintained in APTable 700
`of FIG. 7. If the new AP is listed in APTable 700 as a “Valid
`AP, the message is ignored. If the new AP is not located in
`AP Table 700, Management Server 120 updates AP Table
`700 with information associated with the new AP and
`45
`initially classes the new AP as a “Rogue” AP by setting AP
`class type parameter to “Rogue”. Management Server 120
`also updates AP/AM Table 900 of FIG. 9 to indicate that the
`new AP is being monitored by AM 110.
`Referring to FIG. 11, an exemplary embodiment of a
`communication protocol for Rogue AP classification
`between AM 110 and Management Server 120 of FIG. 1 is
`shown. When new AP is classified as a Rogue AP, Manage
`ment Server 120 does a query to AP/AM Table 900 of FIG.
`9 to find out all AMs monitoring the new AP Management
`Server
`120
`neXt
`Sends
`RAP CLASSIFICATION START message 1100 to AM
`110. RAP CLASSIFICATION START message 1100
`comprises at least the AP identifier 1020 of the new AP that
`has
`to
`be
`further
`classified.
`Optionally,
`RAP CLASSIFICATION START message 1100 further
`comprises channel number 1040.
`Upon receiving RAP CLASSIFICATION START mes
`sage 1100, AM 110 stops scanning all frequency channels
`Supported by the wireleSS network and tunes to the channel
`65
`that new AP is on. The channel information is known by AM
`110 based on contents of Station Table 600 of FIG. 6 stored
`
`60
`
`8
`by AM 110. Of course, channel information may be included
`in RAP CLASSIFICATION START message 1100 as
`well.
`For a specified period of time, AM 110 performs MAC
`Address Classification to update classifications for all APs
`being monitored. At the end of this time period, AM 110
`sends a RAP CLASSIFICATION RESPONSE message
`1200 to Management Server 120 that provides information
`contained within Station Table 600 of FIG. 6.
`In particular, RAP CLASSIFICATION RESPONSE
`message 1200 comprises a plurality of fields. A first field
`1210 contains the AP identifier of the new AP for which the
`RAP CLASSIFICATION START message 1100 of FIG.
`1 was constructed. A second field 1220 contains a number of
`APS detected by AM 110. In addition, a first series of fields
`1230 includes an AP identifier 1240 of a first AP of the
`detected APs. AP identifier 1240 may include a BSSID.
`Next, a number of wired nodes 1241 (e.g., an enterprise
`Server Such as a file Server, email Server, Web Server con
`nected to the wired network) associated with the particular
`BSSID and MAC addresses 1242 of each of these wired
`nodes is provided. Additional series of fields 1250 are
`provides for each of the detected APs.
`Management Server 120 collects information from the
`RAP CLASSIFICATION RESPONSE message 1200
`from AM 110 and classifies MAC Addresses associated with
`the nodes in two groupings: Valid Wired MAC Addresses
`(VWMAC) grouping and Rogue AP Wired MAC Addresses
`(RAPWMAC) grouping. VWMAC has all wired MAC
`Addresses seen for Valid APs (VWMAC are wired MAC
`addresses associated with Valid APS, So VWMAC are enter
`prise wired MAC Addresses. RAPWMAC includes all wired
`MAC Addresses for Rogue APs.
`If there are common MAC Addresses in these two buck
`ets, the Rogue AP is classified as Unsecured Access Point
`(UAP). Otherwise it is classified as Interfering Access Point
`(IAP). Management Server 120 updates AP Table 700 of
`FIG. 7 with the appropriate new AP Class type parameter.
`Referring now to FIG. 12, an exemplary embodiment of
`a communication protocol for deactivating an Unsecured AP
`is shown. Once a newly detected AP is classified as an
`Unsecured AP, Management Server 120 sends a
`DENIAL OF SERVICE message 1300 to all AMs moni
`toring the new AP. The DENIAL OF SERVICE message
`1300 comprises an identifier 1310 of the Unsecured AP (e.g.,
`BSSID
`of
`Unsecured
`AP).
`Of
`COurSe,
`DENIAL OF SERVICE message 1300 may further
`include a channel number 1320 to which the AMs are
`communicating with the Unsecured AP.
`Upon receiving DENIAL OF SERVICE message
`1300, whenever AM detects a data frame with from DS bit
`set on the Unsecured AP domain, the AM sends a DEAU
`THENTICATION message 1400 to Unsecured AP on behalf
`of a Station that was the destination of the data frame. AS
`shown in FIG. 14, differing from IEEE 802.11 data frames
`as shown in FIG. 5B, DEAUTHENTICATION message
`1400 comprises three address fields 1410, 1420, 1430 in
`which DA field 1410 contains the BSSID of the Unsecured
`AP. A reason code 1440 is loaded into a two-byte body
`portion of DEAUTHENTICATION message 1400 to indi
`cate the reason for deauthentication.
`For clarity sake, presume that AM 110 detects an IEEE
`802.11 data frame with the following attributes: (1) FromDS
`bit is set; ToDS bit is not set;

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket