System and method for distributing keys in a wireless network
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/00
H04L-009/08
H04L-009/32
출원번호
UP-0377859
(2006-03-15)
등록번호
US-7529925
(2009-07-01)
발명자
/ 주소
Harkins, Dan
출원인 / 주소
Trapeze Networks, Inc.
대리인 / 주소
Perkins Coie LLP
인용정보
피인용 횟수 :
39인용 특허 :
126
초록▼
A technique for improving authentication speed when a client roams from a first authentication domain to a second authentication domain involves coupling authenticators associated with the first and second authentication domains to an authentication server. A system according to the technique may in
A technique for improving authentication speed when a client roams from a first authentication domain to a second authentication domain involves coupling authenticators associated with the first and second authentication domains to an authentication server. A system according to the technique may include, for example, a first authenticator using an encryption key to ensure secure network communication, a second authenticator using the same encryption key to ensure secure network communication, and a server coupled to the first authenticator and the second authenticator wherein the server distributes, to the first authenticator and the second authenticator, information to extract the encryption key from messages that a client sends to the first authenticator and the second authenticator.
대표청구항▼
What is claimed is: 1. A system comprising: a first authenticator using an encryption key to ensure secure network communication; a second authenticator using the encryption key to ensure secure network communication; and a server coupled to the first authenticator and the second authenticator wher
What is claimed is: 1. A system comprising: a first authenticator using an encryption key to ensure secure network communication; a second authenticator using the encryption key to ensure secure network communication; and a server coupled to the first authenticator and the second authenticator wherein the server distributes, to the first authenticator and the second authenticator, information to extract the encryption key from messages that a client sends to the first authenticator and the second authenticator; a client-generated first key that the client uses to encrypt the encryption key when the client sends a first message to the first authenticator, wherein the first message is sent before the messages sent by the client; and a second key that the server and the client share, wherein the server uses the second key to decrypt and extract the portion of the first message comprising the first key and the identity of the first authenticator, wherein the portion of the first message comprising the first key and the identity of the first authenticator is encrypted with both the first key and the second key. 2. The system of claim 1, wherein the client maintains the encryption key that allows the client to communicate securely with authenticators coupled to the server. 3. The system of claim 1, wherein the first authenticator is implemented in a network switch or an access point. 4. The system of claim 1, wherein the second authenticator is implemented in a network switch or an access point. 5. A system comprising: a first authentication domain using an encryption key to ensure secure network communication; a second authentication domain using the encryption key to ensure secure network communication; and a server coupled to the first authentication domain and the second authentication domain wherein the server acts as a trusted third party for a client that transitions from the first authentication domain to the second authentication domain; a client-generated first key that the client uses to encrypt the encryption key when the client sends a first message to the first authenticator, wherein the first authenticator forwards the first message to the server; second key that the server and the client share, wherein the server uses the second key to extract the portion of the first message comprising the first key and the identity of the first authenticator; a third key that the server and the first authenticator share, wherein the server uses the third key to encrypt the first key and sends the first key encrypted with the third key to the first authenticator, and wherein the first authenticator uses the third key to extract the first key which the first authenticator uses to extract the encryption key in order to establish secure communication with the client; a client-generated fourth key that the client uses to encrypt the encryption key when the client sends a second message to the second authenticator, wherein the second authenticator forwards the second message to the server; a fifth key that the server and the client share, wherein the server uses the fifth key to extract the portion of the second message comprising the fourth key and the identity of the second authenticator; a sixth key that the server and the second authenticator share, wherein the server uses the sixth key to encrypt the fourth key and sends the fourth key encrypted with the sixth key to the second authenticator, and wherein the second authenticator uses the sixth key to extract the fourth key which the second authenticator uses to extract the encryption key in order to establish secure communication with the client. 6. The system of claim 5, wherein the first authentication domain comprises a first authenticator coupled to the server and the second authentication domain comprises a second authenticator coupled to the server. 7. The system of claim 5, wherein the first authentication domain comprises a first authenticator coupled to the server and the second authentication domain comprises a second authenticator coupled to the server, and the client maintains an encryption key that allows the client to communicate securely in authentication domains having authenticators coupled to the server. 8. A system comprising: a first authenticator using an encryption key to ensure secure network communication; a second authenticator using the encryption key to ensure secure network communication; and a server coupled to the first authenticator and the second authenticator wherein the server distributes, to the first authenticator and the second authenticator, information to extract the encryption key from messages that a client sends to the first authenticator and the second authenticator; a client-generated first key that the client uses to encrypt the encryption key when the client sends a first message to the first authenticator, wherein the first authenticator forwards the first message to the server; a second key that the server and the client share, wherein the server uses the second key to extract the portion of the first message comprising the first key and the identity of the first authenticator; a third key that the server and the first authenticator share, wherein the server uses the third key to encrypt the first key and sends the first key encrypted with the third key to the first authenticator, and wherein the first authenticator uses the third key to extract the first key which the first authenticator uses to extract the encryption key in order to establish secure communication with the client; a client-generated fourth key that the client uses to encrypt the encryption key when the client sends a second message to the second authenticator, wherein the second authenticator forwards the second message to the server; a fifth key that the server and the client share, wherein the server uses the fifth key to extract the portion of the second message comprising the fourth key and the identity of the second authenticator; and a sixth key that the server and the second authenticator share, wherein the server uses the sixth key to encrypt the fourth key and sends the fourth key encrypted with the sixth key to the second authenticator, and wherein the second authenticator uses the sixth key to extract the fourth key which the second authenticator uses to extract the encryption key in order to establish secure communication with the client. 9. The system of claim 8, wherein the client maintains the encryption key that allows the client to communicate securely with authenticators coupled to the server. 10. The system of claim 8, wherein the first authenticator is implemented in a network switch or an access point. 11. The system of claim 8, wherein the second authenticator is implemented in a network switch or an access point.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (126)
Kuhnel Thomas,CHX ; Varlese Christopher,CHX, ATM switching architecture for a wireless telecommunications network.
Brockel Kenneth H. ; Procopio ; Jr. Victor J. ; Major Paul A. ; Vigants Arvids ; Pasirstein Joseph ; Wood Richard W., Apparatus and processes for realistic simulation of wireless information transport systems.
Watanabe Fujio,FIX ; Buot Theodore,FIX ; Kuntze Roland,FIX ; Jokela Jari,FIX, Apparatus, and associated method for selecting a size of a contention window for a packet of data system.
Adachi Hideo,JPX, Base station apparatus for radiocommunication network, method of controlling communication across radiocommunication network, radiocommunication network system, and radio terminal apparatus.
Pickering Leslie W. (Atlanta GA) Barnhart Eric N. (Lawrenceville GA) Harvey Bruce A. (Norcross GA) Witten Michael L. (Decatur GA), Cell engineering tool and methods.
Tate Duncan Hartley,AUX ; Palmer Robert,AUX ; Heinze Garry Colin,AUX ; Shahbaz Mourad Christopher Manoug,AUX ; Mikelaitis Peter Ian,AUX ; Gorog Peter Alexander Ernest,AUX, Digital communication system for simultaneous transmission of data from constant and variable rate sources.
Gilhousen Klein S. (San Diego CA) Padovani Roberto (San Diego CA) Wheatly ; III Charles E. (Del Mar CA), Diversity receiver in a CDMA cellular telephone system.
Wah Benjamin W. (1109 Cumberland Ave. West Lafayette IN 47906) Juang Jie-Yong (32-7 Hilltop Dr. West Lafayette IN 47906), Efficient contention-resolution protocol for local multiaccess networks.
Lund Carsten (New Providence NJ) Phillips Steven (New York NY) Reingold Nicholas F. (Madison NJ), Fair prioritized scheduling in an input-buffered switch.
Wang Zhonghe (Lake Worth FL) Schwendeman Robert John (Pompano Beach FL), Flexible mobility management in a two-way messaging system and method therefor.
Huang Chia-Chi (Hsinchu NY TWX) Bantz David F. (Chappaqua NY) Bauchot Frederic (Saint Jeannet NY FRX) Natarajan Kadathur S. (Millwood NY) Narasimhan Anand (New York NY) Wetterwald Michele M. (Cagnes , Handoff monitoring in cellular communication networks using slow frequency hopping.
Tobagi Fouad A. (Los Altos CA) Fratta Luigi (Segrate ITX) Borgonovo Flaminio (Cant ITX), Local area communication network utilizing a round robin access scheme with improved channel utilization.
Bo S. P. Wallentin SE; Leif P. Lindskog SE; Thomas Rimhagen SE; Per O. G. Bark SE; Ulf A. Hansson SE; Harri Vilander FI, Method and apparatus for dynamically adapting a connection state in a mobile communications system.
Stratis Glafkos ; Mendoza Julian ; Mendoza Javier ; Anantha Veeraraghavan A., Method and apparatus for predicting signal characteristics in a wireless communication system.
Rappaport, Theodore; Skidmore, Roger; Reifsneider, Eric, Method and system for designing or deploying a communications network which considers frequency dependent effects.
Darryl Steven Richman ; Moshe Lichtman ; Mark R. Enstrom ; Thomas E. Lennon ; Ralph A. Lipe ; Pierre-Yves Santerre ; Robert T. Short ; David W. Voth, Method for automatically configuring devices including a network adapter without manual intervention and without prior configuration information.
Hluchyj Michael G. (Wellesley MA) Bhargave Amit (Somerville MA) Yin Nanying (Cambridge MA), Method for prioritizing, selectively discarding, and multiplexing differing traffic type fast packets.
Gitlin Richard D. (Little Silver NJ) Sabnani Krishan K. (Westfield NJ) Woo Thomas Y. C. (Red Bank NJ), Methods and apparatus for bandwidth reduction in a two-way paging system.
Blakeney ; II Robert D. (San Diego CA) Karmi Gadi (San Diego CA) Tiedemann ; Jr. Edward G. (San Diego CA) Weaver ; Jr. Lindsay A. (San Diego CA), Mobile station assisted soft handoff in a CDMA cellular communications system.
Wright Andrew S.,CAX ; Lai Cuong Hon,CAX ; Shin Soon S.,CAX ; Newton Helen R.,CAX, Multiple access communication network with combined contention and reservation mode access.
Shepard Howard M (Great River NY) Barkan Edward D. (South Setauket NY) Swartz Jerome (Stonybrook NY), Narrow bodied, single- and twin-windowed portable laser scanning head for reading bar code symbols.
Shepard Howard M. (Great River NY) Barkan Edward D. (South Setauket NY) Swartz Jerome (Stonybrook NY), Narrow-bodied, single- and twin-windowed portable laser scanning head for reading bar code symbols.
Shepard Howard M. (Great River NY) Barkan Edward D. (South Setauket NY) Swartz Jerome (Stonybrook NY), Narrow-bodied, single- and twin-windowed portable scanning head for reading bar code symbols.
Shepard Howard M. (Great River NY) Barkan Edward D. (South Setauket NY) Swartz Jerome (Stonybrook NY), Narrow-bodied, single-and twin-windowed portable laser scanning head for reading bar code symbols.
Shepard Howard M. (Great River NY) Barkan Edward D. (South Setauket NY) Swartz Jerome (Stonybrook NY), Narrow-bodied, single-and twin-windowed portable laser scanning head for reading bar code symbols.
Sprecher Jerry W. (Danville CA) Winters ; Jr. Donald J. (Danville CA) Rajwany Amirali S. (Walnut Creek CA) Dodson Michael W. (Walnut Creek CA) Penning Gene R. (Antioch CA) Harrington Darryl F. (Pitts, Network management system.
Zook Ronald E. (Boulder CO) Gombrich Peter P. (Boulder CO), Portable handheld terminal including optical bar code reader and electromagnetic transceiver means for interactive wirel.
Broekhoven Paul V. (Needham MA) Fitzmartin Daniel (Newton MA) Blasche Paul (Arlington MA) Cox ; Jr. Duncan B. (Manchester MA) Upadhyay Triveni (Burlington MA), Precorrelation digital spread spectrum receiver.
Fortune Steven J. (Summit NJ) Gay David M. (New Providence NJ) Kernighan Brian W. (Berkeley Heights NJ) Landron Orlando (Shrewsbury Township ; Monmouth County NJ) Valenzuela Reinaldo A. (Holmdel NJ) , Prediction of indoor electromagnetic wave propagation for wireless indoor systems.
Lockhart ; Jr. Robert K. (Lauderhill FL) Macko William J. (Tamarac FL) Bass Robert H. (Sunrise FL) Wallace Craig S. (Coral Springs FL) Moore Morris A. (Sunrise FL), Re-linked portable data terminal controller system.
Simpson Raymond W. (Hamilton Square NJ) Chandler Donald G. (Pennington NJ) Bowers John (Monmouth Junction NJ), Remote control system, components and methods.
Clarkson, Kenneth L.; Hampel, Karl Georg; Hobby, John D.; Polakos, Paul Anthony, Road-based evaluation and interpolation of wireless network parameters.
Weinberg Aaron (Potomac MD) Ebert Paul M. (Potomac MD) Fee Joseph J. (Wheaton MD) Kaminsky Yaroslav (Herndon VA) Keblawi Feisal S. (Vienna VA) Scales Walter C. (McLean VA), Spread spectrum communications method and apparatus.
Gilhousen Klein S. (San Diego CA) Jacobs Irwin M. (La Jolla CA) Weaver ; Jr. Lindsay A. (San Diego CA), Spread spectrum multiple access communication system using satellite or terrestrial repeaters.
Croft Thomas M. (Cary NC) Dent Paul W. (Stehag SEX) Harte Lawrence J. (Cary NC) Solve Torbjorn (Lund SEX), Standby power savings with cumulative parity check in mobile phones.
Rappaport, Theodore; Skidmore, Roger; Henty, Benjamin, System and method for design, tracking, measurement, prediction and optimization of data communication networks.
Gilhousen Klein S. (San Diego CA) Jacobs Irwin M. (La Jolla CA) Padovani Roberto (San Diego CA) Weaver ; Jr. Lindsay A. (San Diego CA) Wheatley ; III Charles E. (Del Mar CA) Viterbi Andrew J. (La Jol, System and method for generating signal waveforms in a CDMA cellular telephone system.
Seazholtz John W. ; Farris Robert D., Use of cellular digital packet data (CDPD) communications to convey system identification list data to roaming cellular.
Carter, Scott J.; Flanders, Edward L.; Hannah, Stephen E., Wireless LAN architecture for integrated time-critical and non-time-critical services within medical facilities.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.