The example embodiments relate generally to communication systems, and specifically to managing wireless device access within wireless networks.
A wireless local area network (WLAN) may be formed by one or more access points (APs) that provide a shared wireless communication medium for use by a number of client devices. Each AP, which may correspond to a Basic Service Set (BSS), periodically broadcasts beacon frames to enable any client devices within wireless range of the AP to establish and/or maintain a communication link (e.g., a communication channel) with the WLAN.
In some WLANs, a client device may be configured for use with one or more APs in the WLAN using a public key encryption algorithm. Public key encryption (sometimes referred to as public/private key encryption) is a method of securely transferring data using a known (public) key and a secret (private) key. The public and private keys typically have a mathematical relationship with each other. In addition to transferring data, the public and private keys may verify messages and certificates, and may generate digital signatures. For example, the client device may share a public key (e.g., a public encryption key of the client device) with APs within the WLAN. The APs may use the client device's public key to authenticate and configure the client device. The authenticated client device may access (e.g., connect to) the APs within the WLAN. However, controlling access of the client device to the WLAN may be difficult after distribution of the client device's public key.
Accordingly, it is desirable to improve access control of the client device to the WLAN.
This Summary is provided to introduce in a simplified form a selection of concepts that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to limit the scope of the claimed subject matter.
In some aspects, a method of configuring a client device for use in a wireless network is disclosed. In accordance with example embodiments, a certification authority may authenticate the client device based, at least in part, on a public root identity key of the client device. The certification authority may receive a public transient identity key and a connection attribute of the client device. The public transient identity key and the connection attribute may be certified with a private certification authority key. The certified public transient identity key and the certified connection attribute may be transmitted to the client device.
In another aspect, a wireless device is disclosed that may include a transceiver, a processor and a memory to store instructions that, when executed by the processor, causes the wireless device to: authenticate, at a certification authority, a client device based, at least in part, on a public root identity key of the client device. The instructions further cause the wireless device to receive a public transient identity key and a connection attribute of the client device. The public transient identity key and the connection attribute may be certified with a private certification authority key and the certified public transient identity key and the certified connection attribute may be transmitted to the client device.
In another example embodiment, a method of establishing a communication link with a first wireless device is disclosed. A certificate identifier associated with a second wireless device may be transmitted to a certification status responder and a status associated with a certificate corresponding to the certificate identifier may be received from the certification status responder. The communication link may be established based, at least in part, on the received status of the certificate.
The example embodiments are illustrated by way of example and are not intended to be limited by the figures of the accompanying drawings.
Like reference numerals refer to corresponding parts throughout the drawing figures.
The example embodiments are described below in the context of WLAN systems for simplicity only. It is to be understood that the example embodiments are equally applicable to other wireless networks (e.g., cellular networks, pico networks, femto networks, satellite networks), as well as for systems using signals of one or more wired standards or protocols (e.g., Ethernet and/or HomePlug/PLC standards). As used herein, the terms “WLAN” and “Wi-Fi®” may include communications governed by the IEEE 802.11 family of standards, Bluetooth, HiperLAN (a set of wireless standards, comparable to the IEEE 802.11 standards, used primarily in Europe), and other technologies having relatively short radio propagation range. Thus, the terms “WLAN” and “Wi-Fi” may be used interchangeably herein. In addition, although described below in terms of an infrastructure WLAN system including one or more APs and a number of client devices, the example embodiments are equally applicable to other WLAN systems including, for example, multiple WLANs, peer-to-peer (or Independent Basic Service Set, “IBSS”) systems, Wi-Fi Direct systems, and/or Hotspots.
In the following description, numerous specific details are set forth such as examples of specific components, circuits, and processes to provide a thorough understanding of the present disclosure. The term “coupled” as used herein means connected directly to or connected through one or more intervening components or circuits.
In addition, in the following description and for purposes of explanation, specific nomenclature is set forth to provide a thorough understanding of the example embodiments. However, it will be apparent to one skilled in the art that these specific details may not be required to practice the example embodiments. In other instances, well-known circuits and devices are shown in block diagram form to avoid obscuring the present disclosure. The example embodiments are not to be construed as limited to specific examples described herein but rather to include within their scopes all embodiments defined by the appended claims.
Each of the client device 130 and the smartphone 140 may be any suitable Wi-Fi enabled wireless device including, for example, a cell phone, personal digital assistant (PDA), tablet device, laptop computer, or the like. The client device 130 and/or the smartphone 140 may also be referred to as a user equipment (UE), a subscriber station, a mobile unit, a subscriber unit, a wireless unit, a remote unit, a mobile device, a wireless communications device, a remote device, a mobile subscriber station, an access terminal, a mobile terminal, a wireless terminal, a remote terminal, a handset, a user agent, a mobile client, a client, or some other suitable terminology. For some embodiments, the client device 130 and/or the smartphone 140 may include one or more transceivers, one or more processing resources (e.g., processors and/or ASICs), one or more memory resources, and a power source (e.g., a battery). The memory resources may include a non-transitory computer-readable medium (e.g., one or more nonvolatile memory elements, such as EPROM, EEPROM, Flash memory, a hard drive, etc.) that stores instructions for performing operations described below with respect to
The AP 110 may be any suitable device that allows one or more wireless devices to connect to a network (e.g., a local area network (LAN), wide area network (WAN), metropolitan area network (MAN), and/or the Internet) via the AP 110 using Wi-Fi, Bluetooth, or any other suitable wireless communication standards. For at least one embodiment, the AP 110 may include one or more transceivers, one or more processing resources (e.g., processors and/or ASICs), one or more memory resources, and a power source. In some embodiments, the AP 110 may also be any suitable Wi-Fi and network enabled device including, for example, a cell phone, PDA, tablet device, laptop computer, or the like. The memory resources may include a non-transitory computer-readable medium (e.g., one or more nonvolatile memory elements, such as EPROM, EEPROM, Flash memory, a hard drive, etc.) that stores instructions for performing operations described below with respect to
For the AP 110, the client device 130, and the smartphone 140, the one or more transceivers may include Wi-Fi transceivers, Bluetooth transceivers, cellular transceivers, and/or other suitable radio frequency (RF) transceivers (not shown for simplicity) to transmit and receive wireless communication signals. Each transceiver may communicate with other wireless devices in distinct operating frequency bands and/or using distinct communication protocols. For example, the Wi-Fi transceiver may communicate within a 2.4 GHz frequency band and/or within a 5 GHz frequency band in accordance with the IEEE 802.11 specification. The cellular transceiver may communicate within various RF frequency bands in accordance with a 4G Long Term Evolution (LTE) protocol described by the 3rd Generation Partnership Project (3GPP) (e.g., between approximately 700 MHz and approximately 3.9 GHz) and/or in accordance with other cellular protocols (e.g., a Global System for Mobile (GSM) communications protocol). In other embodiments, the transceivers included within the client device may be any technically feasible transceiver such as a ZigBee transceiver described by a specification from the ZigBee specification, a WiGig transceiver, and/or a HomePlug transceiver described a specification from the HomePlug Alliance.
The client device 130 is authenticated and configured before it can access any services and/or networks. In some embodiments, the smartphone 140 may aid and/or initiate the authentication and/or the configuration of the client device 130. Authentication and configuration of the client device 130 may establish a trusted and/or encrypted connection between the client device 130 and the AP 110. Authentication of the client device 130 may involve public/private key encryption. Those skilled in the art will appreciate that public/private key encryption techniques may encrypt and decrypt messages between wireless devices such as client device 130 and the AP 110. In some embodiments, other security mechanisms may be used in addition to, or alternately from the public/private key encryption described herein.
The authentication and/or configuration of the client device 130 may be based, at least in part, on public keys and/or connection attributes obtained by a registration authority 141 and/or signed certificates provided by a certification authority 111. For example, the registration authority 141 may determine a public Root Identity Key and/or the connection attributes of the client device 130. The public Root Identity Key may be a part of a Root Identity Key pair (sometimes referred to as an identity key pair) associated with the client device 130. The Root Identity Key pair may be assigned to (e.g., programmed into) the client device 130 during manufacture. As shown in
The registration authority 141 may determine the public Root Identity Key of the client device 130 in an out-of-band manner. For example, the smartphone 140 may include an optical device (e.g., camera) to scan labels and/or images. The client device 130 may include a label imprinted with a quick response (QR) code that may display the public Root Identity Key or may direct a scanning device to retrieve the public Root Identity Key from a remote device or service. Thus, the QR code may directly or indirectly provide the public Root Identity Key of the client device 130 to the registration authority 141.
In other embodiments, other out-of-band methods may determine the public Root Identity Key. For example, a near field communication (NFC) link or a Bluetooth Low Energy (BLE) link may convey the public Root Identity Key from the client device 130 to the smartphone 140. Although only NFC links and BLE communication links are described herein, any other technically feasible communication link may be used.
In another embodiment, a user may provide the public Root Identity Key to the smartphone 140. For example, a human readable display of the client device 130 may display the public Root Identity Key which may then be entered by the user through a user interface (e.g., keyboard or touch screen) of the smartphone 140.
The connection attributes of the client device 130 may include one or more connection aspects of the client device 130 that may be determined, at least in part, by a user or a network administrator. For example, a first connection attribute may be a connection profile that describes a permitted connection time when the client device 130 (which may be referred to by a device name) may access the WLAN 120. The access may be limited, for example, by a time of day, or by a range of calendar dates. A second connection attribute may be a data throughput limit. For example, the client device 130 may be limited to a maximum data rate or a maximum number of transferred bytes. A third connection attribute may be an availability attribute where the client device 130 may be “publically” available (e.g., accessible by any wireless device within the WLAN 120) or “privately” available (e.g., accessible to a limited number of wireless devices within the WLAN 120). A fourth connection attribute may be a client device user attribute that determines whether the user is a “registered user” (e.g., whether the user has been previously registered with the registration authority 141) or is a “guest user”. A fifth connection attribute may be a peer-to-peer attribute that indicates whether the client device 130 is capable of peer-to-peer communication (e.g., communicate through a peer-to-peer link).
In some embodiments, the smartphone 140 may provide a user interface for the user and/or network administrator to enter the connection attribute information. In other embodiments, the connection attribute information may be transmitted to or retrieved by the registration authority 141. Although only five attributes are described herein for simplicity, any number of attributes may be associated with the client device 130.
Next, the registration authority 141 (via the smartphone 140) may provide the public Root Identity Key and the connection attributes to the certification authority 111. The smartphone 140 may communicate with the AP 110 through a previously established trusted connection. For example, a secure communication link between the smartphone 140 and the AP 110 may have been established before the public Root Identity Key and/or the connection attributes were determined by the registration authority 141. Thus, the public Root Identity Key and the connection attributes may be securely transmitted to the certification authority 111 and the AP 110. As shown in
The AP 110 may authenticate and configure the client device 130 using the public Root Identity Key. For example, the AP 110 may transmit a message to the client device 130 using the public Root Identity Key. The client device 130 may determine a Transient Identity Key pair (sometimes referred to as a Network Provisioning Key pair) that includes public and private Transient Identity Keys. In some embodiments, the client device 130 and the AP 110 may determine a shared Pairwise Master Key (PMK) to establish a secure communication link. The PMK may be based, at least in part, on the Transient Identity Key pair.
The client device 130 may transmit the public Transient Identity Key to the certification authority 111. The certification authority 111 may include Certification Authority (CA) keys 112 (e.g., a private and a public CA key pair). The certification authority 111 may certify the public Transient Identity Key by signing the public Transient Identity Key with the private CA key. The certification authority 111 may also generate a certificate 131. The certificate 131 may include the public Transient Identity Key and the connection attributes of the client device 130. The certificate 131 may also be signed (e.g., certified) by the private CA key. The certification authority 111 may also generate an associated certificate identifier 132. The certificate identifier 132 may refer to (e.g., identify) the certificate 131. Thus, the certificate identifier 132 may provide an additional means for identifying the client device 130 and/or identifying the connection attributes associated with the client device 130. The certification authority 111 may provide the certified public Transient Identity Key, the certified certificate 131, and/or the certificate identifier 132 to the client device 130. The client device 130 may present the certified public Transient Identity Key, the signed certificate 131, and/or the certificate identifier 132 to other APs or wireless devices to identify and/or prove that the client device 130 has permission to connect to the other APs or wireless devices. The signed certificate 131 and/or the certificate identifier 132 may also be provided to, and stored within, the registration authority 141 or a memory associated with the smartphone 140. Operations associated with the registration authority 141 and the certification authority 111 are described in more detail below in conjunction with
Next, the registration authority 141 determines the connection attributes of the client device 130 (204). In some embodiments, the user and/or network administrator may provide the connection attributes of the client device 130 through a user interface provided by the smartphone 140. In other embodiments, the connection attributes may be transmitted to, or retrieved by, the registration authority 141.
Next, the certification authority 111 receives the public Root Identity Key and the connection attributes of the client device 130 (206). In the example of
Next, the AP 110 authenticates the client device 130 based, at least in part, on the public Root Identity Key and the connection attributes (208a and 208b). For example, the AP 110 may provide a public key of the AP 110 encrypted by the public Root Identity Key to the client device 130. In addition, the AP 110 may examine the connection attributes of the client device 130 to determine that authentication is permitted based on any restrictions and/or conditions indicated by the connection attributes.
Next, the client device 130 generates the Transient Identity Key pair (210). The Transient Identity Key pair may include a public key and a private key. In some embodiments, the public Transient Identity Key pair may be transmitted to the AP 110 to configure the client device 130 for use with the AP 110.
Next, the certification authority 111 receives the public Transient Identity Key (212), certifies the public Transient Identity Key, and generates the certificate 131 and the certificate identifier 132 of the client device 130 (214). For example, the certification authority 111 may sign the public Transient Identity Key with the private CA key to certify the public Transient Identity Key. The certification authority 111 may generate the certificate 131 based, at least in part, on the public Transient Identity Key and/or the connection attributes of the client device 130. The certificate 131 may also be signed with the private CA key. The certification authority 111 may generate the certificate identifier 132 to identify the certificate 131. The certificate identifier 132 may also be certified with the private CA key. In place of, or in addition to generating the certificate 131 and/or the certificate identifier 132, the certification authority 111 may sign (e.g., certify) the connection attributes with the private CA key.
Next, the client device 130 may receive and store the certified public Transient Identity key, the public CA key, the certified certificate 131, the certificate identifier 132, and/or the certified connection attributes from the certification authority 111 (216). For example, the AP 110 may transmit the certified public Transient Identity Key, the public CA key, the certified certificate 131, the certificate identifier 132, and/or the certified connection attributes to the client device 130. As described above, the client device 130 may use the certified public Transient Identity Key, the certified certificate 131, the certificate identifier 132, and/or the certified connection attributes to connect to other wireless devices within the WLAN 120. The client device 130 may verify other certificates, certificate identifiers, public Transient Identity Keys, and or connection attributes provided by other wireless devices with the public CA key.
Next, the registration authority 141 may receive and store the certificate identifier 132 (218). In some embodiments, the registration authority 141 may also receive and store the certificate 131. In this manner, the registration authority 141 may compile a list of devices authorized (via the certification authority 111) to operate within the WLAN 120.
Next, the client device 130 and the AP 110 establish a communication link with each other (220a and 220b). For example, the client device 130 and the AP 110 may exchange one or more messages using the certified public Transient Identity Key. In some embodiments, the AP 110 and the client device 130 may determine a shared Pairwise Master Key to establish a secure communication link.
Although operations of flow chart 200 describe authenticating and configuring a single client device 130, the operations of flow chart 200 may be repeated any number of times to authenticate and configure any number of client devices. In addition, although described above as implemented within separate (e.g., distinct) devices, the registration authority 141 and the certification authority 111 may also be implemented within a common (e.g., single) device. For example, the smartphone 140 may execute software to function as both the registration authority 141 and the certification authority 111. Such a configuration may beneficially provide the client device 130 a certified Public Transient Identity and/or a certified certificate 131 in the absence of the AP 110.
Next, the registration authority 141 determines the connection attributes of the client device 130 (204). For example, the user and/or network administrator may enter the connection attributes of the client device 130 through a user interface provided by the smartphone 140. In other embodiments, the connection attribute information may be transmitted to, or retrieved by, the registration authority 141. Next, the certification authority 111 receives the public Root Identity Key and the connection attributes of the client device 130 (206). Because the certification authority 111 and the registration authority 141 are both implemented within the smartphone 140, the public Root Identity Key and the connection attributes may be received through a message or a data structure, and not transmitted through a wireless communication medium.
Next, the smartphone 140 authenticates the client device 130 based, at least in part, on the Public Root Identity Key and the connection attributes (208a and 208b). For example, the smartphone 140 may provide the public key of the smartphone 140, as encrypted by the Public Root Identity Key, to the client device 130. In addition, the smartphone 140 may examine the connection attributes of the client device 130 to determine that authentication is permitted based on any restrictions and/or conditions indicated by the connection attributes.
Next the client device 130 generates the Transient Identity Key pair (210). The Transient Identity Key pair may configure the client device 130 for future use with the AP 110 (not shown for simplicity) or any other feasible device. Next, the certification authority 111 receives the public Transient Identity Key of the client device 130 (212), certifies the public Transient Identity Key, and generates the certificate 131 and the certificate identifier 132 of the client device 130 (214). For example, the certification authority 111 may sign the public Transient Identity Key with the private CA key to certify the public Transient Identity Key. The certification authority 111 may generate the certificate 131 based, at least in part, on the public Transient Identity Key and the connection attributes of the client device 130. The certificate 131 may also be signed with the private CA key. The certification authority 111 may generate the certificate identifier 132 to identify the certificate 131. The certificate identifier 132 may also be certified with the private CA key.
Next, the client device 130 may receive and store the certified Public Transient Identity key, the public CA key, the certified certificate 131, and/or the certificate identifier 132 from the certification authority 111 (216). The client device 130 may use the certified public Transient Identity Key, the certified certificate 131, and/or the certificate identifier 132 to verify the authorization of, and to connect to, other wireless devices within the WLAN 120. The client device 130 may use the public CA key to verify other certificates, certificate identifiers, and/or the public Transient Identity keys provided by other wireless devices.
Next, the registration authority 141 may receive and store the certificate identifier 132 of client device 130 (218). In some embodiments, the registration authority 141 may also receive and store the certificate 131. Although the client device 130 may not be presently connected to the AP 110, the registration authority 141 may still compile a list of client devices authorized to operate within the WLAN 120.
Next, the registration authority 141 transmits the certificate identifier 132 of the client devices to be de-authorized to the certification authority 111 (604). In some embodiments, the certificate identifiers 132 of the client devices may be stored within the registration authority 141 (see operation 218 of
Next, the CRL 133 is transmitted to the client device 130 (608). For simplicity,
Next, the second client device 702 receives the first certificate identifier (706), and the second client device 702 verifies the first certificate identifier (708). In some embodiments, the second client device 702 may use the public CA key (stored therein) to ensure that the first certificate identifier is valid. If the first certificate identifier is not valid, then the operation ends. On the other hand, if the first certificate identifier is valid, then the second client device 702 determines if the first certificate identifier is listed on the CRL 133 (710).
If the first certificate identifier is listed on the CRL 133, then the second client device 702 may refuse the connection request and the operation ends. On the other hand, if the first certificate identifier is not listed on the CRL 133, then the second client device 702 may establish a communication link with the first client device 701 (712a and 712b). For example, the first client device 701 may communicate with the second client device 702 through a Wi-Fi direct or a peer-to-peer protocol. In other embodiments, the first client device 701 and the second client device 702 may use any other technically feasible communication protocol.
Although described above with respect to the first client device 701 initiating the connection request, in other embodiments, the second client device 702 may initiate the connection request. For example, the second client device 702 may initiate the connection request and transmit a second certificate identifier to the first client device 701. In still other embodiments, the first client device 701 and the second client device 702 may initiate connection requests in parallel.
The OCSP responder 830 may have access to, or a copy of, a current version of the CRL 133. For example, the AP 110 may also include the certification authority 111 and/or the registration authority 141 (not shown for simplicity) and, therefore, may have access to the CRL 133. Thus, the OCSP responder 830 may receive the first certificate identifier 811 and determine a status based, at least in part, on the CRL 133 (908). For example, the OCSP responder 830 may determine whether the first certificate identifier 811 is listed on the CRL 133. Next, the OCSP responder 830 may return a status of the first certificate identifier 811 to the second client device 802 (910). The status may indicate whether the first certificate identifier 811 is valid or invalid.
Next, the status of the first certificate identifier 811 is determined by the second client device 820 (912). If the status of the first certificate identifier 811 is not valid, then the operation ends. On the other hand, if the status of the first certificate identifier 811 is valid, then the second client device 820 may establish a communication link with the first client device 810 (914a and 914b). For example, the first client device 810 may communicate with the second client device 820 through a Wi-Fi direct or peer-to-peer protocol. In other embodiments, the first client device 810 and the second client device 820 may use any other technically feasible communication protocol.
Although described with respect to the first client device 810 initiating the connection request, in other embodiments, the second client device 820 may initiate the connection request. For example, the second client device 820 may initiate the connection request and transmit the second certificate identifier 821 to the first client device 810. In still other embodiments, the first client device 810 and the second client device 820 may initiate connection requests in parallel.
The transceiver 1010 may include a baseband processor 1012. The baseband processor 1012 may process signals received from the processor 1030 and/or the memory 1040 and may transmit the processed signals via one or more of antennas 1060(1)-1060(n). Additionally, the baseband processor 1012 may process signals received from one or more of antennas 1060(1)-1060(n) and may forward the processed signals to the processor 1030 and/or the memory 1040.
The network interface 1050 may access other networks and/or services. In some embodiments, the network interface 1050 may include a wired interface. The network interface 1050 may also communicate with a WLAN server (not shown for simplicity) either directly or via one or more intervening networks.
The processor 1030, which is coupled to the transceiver 1010, the OCSP responder 1020, the registration authority 1022, the certification authority 1024, the network interface 1050, and the memory 1040, may be any suitable one or more processors capable of executing scripts or instructions of one or more software programs stored in the wireless device 1000 (e.g., within the memory 1040). For actual embodiments, the transceiver 1010, the processor 1030, the memory 1040, and/or the network interface 1050 may be connected together using one or more buses (not shown for simplicity).
The memory 1040 may include a certificate memory 1042 to store certificates (e.g., certificate 131) and/or certificate identifiers (e.g., certificate identifier 132). In some embodiments, the certificates and/or the certificate identifiers may be generated by the certification authority 1024 and/or a certification authority software module 1048 (described below).
The memory 1040 may include a key memory 1043 to store public, private, and/or shared keys. In some embodiments, the wireless device 1000 may generate the public, private, and/or shared keys. In other embodiments, the public, private, and/or shared keys may be received through the transceiver 1010. For example, the transceiver 1010 may receive the CA keys 112 which may be stored in the key memory 1043. In some embodiments, increased protection may be provided to the key memory 1043 to safeguard sensitive keys, such as the private CA key.
The memory 1040 may include a CRL memory 1044. The CRL memory may store the CRL 133 (not shown for simplicity). The CRL 133 may be certified by the private CA key. In some embodiments, the CRL 133 may be verified with the public CA key stored in the key memory 1043.
The memory 1040 may also include a non-transitory computer-readable medium (e.g., one or more nonvolatile memory elements, such as EPROM, EEPROM, Flash memory, a hard drive, and so on) that may store at least the following software (SW) modules:
As mentioned above, the processor 1030 may be any suitable one or more processors capable of executing scripts or instructions of one or more software programs stored in the wireless device 1000 (e.g., within the memory 1040). For example, the processor 1030 may execute the transceiver controller software module 1045 to facilitate the transmission and/or reception of data between the wireless device 1000 and other wireless devices (not shown for simplicity).
The processor 1030 may execute the OCSP software module 1046 to determine the status of certificate identifiers. For example, the OCSP software module 1046 may determine the status of the certificate identifier 132 by examining the CRL 133 stored in the CRL memory 1044.
The processor 1030 may execute the registration authority software module 1047 to determine public keys and connection attributes of the wireless device 1000. For example, the registration authority software module 1047 may determine the public Root Identity Key of the client device 130 in an out-of-band manner and provide the public Root Identity Key to the certification authority 1024. The registration authority software module 1047 may also determine the connection attributes of the wireless device 1000 and provide them to the certification authority 1024.
The processor 1030 may execute the certification authority software module 1048 to receive keys and the connection attributes of the wireless device 1000 and generate the certificate 131 and the certificate identifier 132 associated with the wireless device 1000. The certificate 131 and the certificate identifier 132 may be stored in the certificate memory 1042. In some embodiments, the certification authority software module 1048 may certify the certificate 131 and/or the certificate identifier 132 via the private CA key.
The processor 1030 may execute the CRL software module 1049 to generate and/or certify the CRL 133. For example, the processor 1030 may execute the CRL software module 1049 to generate the CRL 133 based, at least in part, on the certificate identifiers stored within the certificate memory 1042. The CRL 133 may be stored in the CRL memory 1044.
Those skilled in the art will appreciate that information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
Further, those of skill in the art will appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the aspects disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosure.
The methods, sequences, or algorithms described in connection with the aspects disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor.
In the foregoing specification, the example embodiments have been described with reference to specific example embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader scope of the disclosure as set forth in the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative sense rather than a restrictive sense.
This application claims priority to U.S. Provisional Patent Application No. 62/180,020 entitled “ADDING A DEVICE TO A NETWORK, REMOVING A DEVICE FROM A NETWORK, AND CONNECTING TWO NETWORK DEVICES” filed Jun. 15, 2015, the entirety of which is incorporated by reference herein.
Number | Date | Country | |
---|---|---|---|
62180020 | Jun 2015 | US |