Not Applicable
Not Applicable
The present invention is directed to wireless networks authentication infrastructures. More particularly, the invention provides methods for performing intra-domain inter-access controller authentication based on IEEE 802.11r in Control And Provisioning of Wireless Access Points (CAPWAP) architecture. Merely by way of example, the invention has been applied to the first-time 802.11r association as well as the network re-association of the mobile station adopted to CAPWAP environment and optimization on the authentication using a key hierarchy. But it would be recognized that the invention has a much broader range of applicability.
802.11r is an in-progress IEEE standard that sets to specify fast BSS (Basic Service Set) transitions. Conventionally, mobile station handoffs were supported by some earlier implementations of 802.11, which was mainly designed for data communication. The handoff delay is too long to support applications like voice and video. The primary application envisioned for the 802.11r standard is VOIP (“Voice over IP”, or Internet-based telephony) via mobile phones designed to work with wireless Internet networks, such as that shown in
On the one hand, these 802.11r enabled wireless mobile stations need to be rapidly dissociated from one access point and connect to another. For example, the delay should not exceed about 50 msec to not be detected by the human ear. However, current roaming delay in 802.11 networks average in the hundreds of milliseconds. On the other hand, these handoffs should not be performed at the expense of connection security. Today's wireless networks employ Authentication, Authorization and Accounting (AAA) infrastructure for authentication. The cross-domain roaming (or inter-domain roaming) is typically handled by inter-domain authentication via the “home” AAA server or Extensible Authentication Protocol (EAP) server. Any authentication must pass through the home server of the mobile station, which increases latency.
Hence, it is highly desirable to improve techniques for fast and secure handoffs and inter-domain authentication.
The present invention is directed to wireless networks authentication infrastructures. More particularly, the invention provides methods for performing intra-domain inter-access controller authentication based on IEEE 802.11r in Control And Provisioning of Wireless Access Points (CAPWAP) architecture. Merely by way of example, the invention has been applied to the first-time 802.11r association as well as the network re-association of the mobile station adopted to CAPWAP environment and optimization on the authentication using a key hierarchy. But it would be recognized that the invention has a much broader range of applicability.
In one aspect, the invention provides a solution to the inter-Access Controller authentication and 802.11r based authentication in CAPWAP architecture. In another aspect, the inter-AP authentication and CAPWAP domain roaming based on optimizations on the authentication using a key hierarchy.
In an specific embodiment, the invention provides a method for performing authentication of first-time network association of a mobile station compatible with an 802.11r protocol. The method includes forming an association between a mobile station and an access point. The access point is connected to an access controller associated with a home server. The method further includes exchanging a request/response message between the mobile station and the access controller through the access point based on the association. The request/response message includes at least information associated with a mobility domain identifier of the access controller. The mobility domain identifier includes at least a first parameter and a second parameter. Additionally, the method includes generating a first key between the mobile station and the home server based on an 802.1X protocol and sending information associated with the first key to the access controller. The method further includes generating a second key by the access controller based on at least information associated with the first key and the mobility domain identifier of the access controller. The second key is stored at the access controller. Moreover, the method includes generating a third key by performing an 802.11r four-way handshake between the access controller and the mobile station based on at least the second key. Furthermore, the method includes sending the third key in a config-request message from the access controller to the access point. The config-request message includes information associated with adding the mobile station to the access point based on the third key.
In a specific embodiment, the first key is a master session key used as an input to generate all shared authentication keys in a key hierarchy defined in 802.11r protocol. In one embodiment, a top-level shared key of the key hierarchy is root key or called pairwise master key stored at the access controller which is set to be an authenticator. The second key is a second-level shared key in the key hierarchy. In one embodiment, the second key may be associated with access point that is connected to the access controller. In another embodiment, the second key may also be kept at the access controller. The third key is a lowest-level shared key for binding the second key to the access point and for encrypting transient data between the mobile station and the access point.
Alternatively in one embodiment, after generating the first key by the home server the method includes generating a top-level key by the home server based on information at least associated with the first key and one or more parameters shared with a plurality of access controllers. Each of the plurality of access controller is associated with the home server. Additionally, the method includes broadcasting information associated with the mobile station to the plurality of the access controllers. The method in one embodiment further includes sending an access-request message using a RADIUS protocol from one of the plurality of access controllers to the home server if the mobile station hands over to said one of the plurality of access controllers. The access-request message includes at least said one or more parameters and information associated with the mobile station. Moreover, the method includes sending the top-level key to said one of the plurality of access controllers in an access-accept message by the home server. In another embodiment the RADIUS protocol can be replaced by a Diameter protocol involving an AA-request message and an AA-answer message between the access controller and the home server.
In an alternative specific embodiment, the invention provides a method for performing authentication of network re-association of a mobile station in compliance with 802.11r protocol. The method includes performing handover of a mobile station to an access point connected to an access controller. The mobile station received at least a first parameter associated with the access controller stored a first key for authentication. The method further includes exchanging an authentication request/response message between the mobile station and the access controller through the access point. The authentication request/response message includes at least information associated with the first parameter and a second parameter for identifying the access point. Additionally, the method includes generating a second key by the mobile station and the access controller using at least the first key and the second parameter. The method further includes generating a third key by the mobile station and the access controller using at least the second key. Moreover, the method includes sending the third key in a config-request message from the access controller to the access point. The config-request message includes information associated with adding the mobile station to the access point based on the third key.
In a specific embodiment, the third key can be generated by concatenating at least the second key, a first ANonce value, a first SNonce value, a MAC address for the access point, and a MAC address of the mobile station. In an alternative embodiment, the method further includes storing the second key at the access controller. The method also includes performing a handover to move the mobile station to the second access point. The second access point is one of a plurality of access points connected to the access controller. The handover corresponds to a second ANonce value for the second access point and a second SNonce value for the mobile station. Additionally, the method includes generating a fourth key by the mobile station and the access controller based on at least the second key, the second ANonce value, and the second SNonce value. The method further includes sending the fourth key in a config-request message from the access controller to the second access point. The config-request message includes information associated with adding the mobile station to the second access point based on the fourth key which is different from the third key.
In yet another specific embodiment, the invention provides a method for performing an intra-domain inter-access controller authentication using 802.11r. The method includes detecting an access point associated with a second access controller for a mobile station to hand over from a first access controller. The first access controller is associated with a home server and configured to store a first key for authentication. The second access controller is also associated with the home server. The method further includes sending an authentication request from the mobile station to the second access controller through the access point. The authentication request includes at least a first parameter associated with the first access controller. Additionally, the method includes sending an access request from the second access controller to the home server. The access request comprises a plurality of parameters including at least the first parameter and a second parameter. The second parameter is associated with the second access controller. The method further includes generating a second key by the home server using the plurality of parameters and replying an access-accept message to the second access controller. The access-accept message includes at least the second key which is stored at the second access controller identified by the second parameter. Moreover, the method includes receiving an authentication response by the mobile station from the second access controller through the access point. The authentication response includes at least the second key, the second parameter, and a third parameter. The method further includes generating a third key by the second access controller based on the second key using at least the third parameter and generating a fourth key by the mobile station and the second access controller using at least the third key. Furthermore, the method includes sending the fourth key in a config-request message from the second access controller to the access point. The config-request message includes information associated with adding the mobile station to the access point based on the fourth key.
In still an alternative embodiment, the method further includes storing the third key at the second access controller. Additionally, the method includes detecting a second access point of a plurality of access points by the mobile station. Each of the plurality of access points is connected to the second access controller. The method further includes performing a handover to move the mobile station to the second access point. The handover corresponds to a second ANonce value associated with the second access point and a second SNonce value associated with the mobile station. Moreover, the method includes generating a fifth key by the mobile station and the second access controller based on at least the third key, the second ANonce value, and the second SNonce value. Furthermore, the method includes sending the fifth key in a config-request message from the second controller to the access point. The config-request message includes information associated with adding the mobile station to the access point based on the fifth key which is different from the fourth key.
Many benefits are achieved by way of the present invention over conventional techniques. For example, certain embodiments of the present invention can provide smooth handover access to mobile stations when it enters the range of another access point (or Wireless Termination Point WTP) within the same network domain. The handover is supported by Fast BSS Transition defined in IEEE 802.11r for both local and split MAC WTPs where the access controller (AC) manages the authentication and handoff for a collection of WTPs. For local MAC WTPs, AC is implemented to computes and holds authentication key for lower level elements i.e., all the neighboring WTPs, of a key hierarchy defined by IEEE 802.11r. For split MAC WTPs, in addition to authentication key generation, the AC also is implemented to transport the session key to WTP at an end of 4-way handshake in case of a first-time association or after the authentication/association request/response exchange in case of re-association. Some embodiments also provide optimization on the intra-domain inter-access controller authentication using 802.11r within CAPWAP architecture where the access controller is set as an authenticator for the network peers under an 802.11r key hierarchy. Certain embodiments simplifies the key distribution through the key hierarchy using a single pairwise master key for all access points connected to the same access controller, while a unique pairwise session key can be still obtained by using an updated random ANonce and SNonce values as inputs for particular handover re-association session. Alternatively, the access controller before handoff can act as an anchor authenticator for trigger other access controllers within the network domain to obtain a top-level authentication key from the home server.
Certain embodiments of the present invention provide a use of the encapsulation and transport mechanism included in CAPWAP protocol. For example, certain message can be tunneled between the AC and WTPs in a context transfer data format using User Datagram Protocol (UDP). Some embodiments of the present invention enable built-in security features to provide improved protection for the WTPs and AC. Other embodiments of the present invention ensure that the mobile station has an association with a single WTP, and ensure that forwarding tables of the switches are updated when the station does a handover to another WTP.
Various additional objects, features and advantages of the present invention can be more fully appreciated with reference to the detailed description and the accompanying drawings that follow.
The present invention is directed to wireless networks authentication infrastructures. More particularly, the invention provides methods for performing intra-domain inter-access controller authentication based on IEEE 802.11r in Control And Provisioning of Wireless Access Points (CAPWAP) architecture. Merely by way of example, the invention has been applied to the first-time 802.11r association as well as the network re-association of the mobile station adopted to CAPWAP environment and optimization on the authentication using a key hierarchy. But it would be recognized that the invention has a much broader range of applicability.
In a specific embodiment, the invention provides a method for new network discovery with 802.11r based authentication. A method 200 as illustrated by
1. Process 205: Providing a mobile station associated with a first access controller in a first network;
2. Process 210: Detecting beacon information from a second network;
3. Process 215: Processing the beacon information to derive a MAC address of a second access controller;
4. Process 220: Determining an IP address of the second access controller in the second network;
5. Process 225: Generating a link-switch command for handover;
6. Process 230: Performing data-link layer 802.11r authentication/association;
7. Process 235: Establishing association between mobile station and second access controller;
8. Process 240: Releasing association between mobile station and first access controller.
These sequences of processes provide a way of performing a method according to an embodiment of the present invention. As can be seen, the method provides a technique for new network discovery according to a specific embodiment of the invention. Of course, there can be variations, modifications, and alternatives. For example, this method of network discovery not only can be applied for mobile stations but also support stationary uses. As an example, the network discovery triggers the intra-domain inter-access point handover under one access controller or the inter-access controller handover during which the 802.11r based authentication instead of full home server authentication according to certain embodiments of the present invention can be applied.
For the authentication between network elements and network domain, using authentication keys is a feasible approach. IEEE 802.11r has defined a hierarchy of authentication keys or a key management framework, as shown in
In a preferred embodiment, K-R0 key holder is an access controller (AC) which assumes the role of the mobility domain controller which sets the mobility domain identifier in the network domain. After the domain network is discovered, AC sends all APs an IEEE 802.11 WLAN configuration-request message including the mobility domain information element (MDIE) defined in 802.11r protocol. In one embodiment, the MDIE includes a data field for Mobility Domain Identifier (MDID) which is a 48-bit value that is used for uniquely identifying this particular domain. In addition, there is another data bit of Fast BSS transition capability within a data field of Fast BSS transition capability and resource policy. AC sets value of this data bit to 1. In another embodiment, MDID is used in calculating K-R0 key based on the input of MSK. The K-R0 key is a shared secret key called Pairwise Master Key (PMK). The PMK is designed to last the entire connection session for one of access points (APs) associated with the AC and should be exposed as little as possible. Both Split MAC APs and Local MAC APs will advertise MDID in their beacons which can be detected by mobile stations (MS) in the neighbourhood. Of course, there can be variations, modifications, and alternatives.
The second-level in the key hierarchy is R1. Accordingly, second-level key K-R1 is stored at a network element named as the R1 key holders (R1KH). There are three R1KHs shown in
In an alternative embodiment, MS also needs the identifiers of R0 and R1 key holders (i.e., R0KH-ID and R1KH-ID). These information can be shared through an IEEE 802.11 WLAN configuration-request message sent by AC through the access point associated with the mobile station. The IEEE 802.11 WLAN configuration-request message defined in CAPWAP architecture includes the Fast BSS Transition Information (FTIE) defined in 802.11r protocol. In one embodiment, FTIE includes AC's identifier in both the required R0KH-ID parameter and optional R1KH-ID parameter. R0KH-ID is used in calculating K-R0 key. R1 KH-ID is used in calculating K-R1 key. In another embodiment, both Split MAC and Local MAC access points advertise FTIE containing R0KH-ID and R1 KH-ID in probe responses.
According to certain embodiments of the present invention, in CAPWAP architecture the AC is set to the authenticator and also holds K-R1 keys. For example, AC is in charge of doing the SAP exchanges with MS and deriving the session key. In one embodiment, AC then has to transport the session key to the access point (AP). The authentication procedure can be optimized using the key hierarchy within 802.11r protocol mention above. In one embodiment, the key hierarchy defined in 802.11r protocol is used for optimizing the inter-access-point authentication procedures. Further details of this improved authentication method can be found throughout the specification and particularly below.
In an specific embodiment, the invention provides a method for inter-access-point authentication for MS first time association using an 802.11r protocol in CAPWAP architecture as illustrated by
1. Process 405: Forming an association between a mobile station and an access point (associated with an access controller and a home server);
2. Process 410: Exchanging a request/response message between the mobile station and the access point;
3. Process 415: Generating a first key based on 802.1X protocol;
4. Process 420: Sending information associated with the first key to the access controller with EAP;
5. Process 425: Generating a second key based on at least information associated with the first key, the second key being stored at the access controller;
6. Process 430: Generating a third key by the mobile station and the access controller using at least the second key;
7. Process 435: Sending the third key in a configuration-request message from the access controller to the access point.
These sequences of processes provide a way of performing a method according to an embodiment of the present invention. Of course, there can be variations, modifications, and alternatives. Some processes may be removed or replaced by other processes. For example, after the first key is generated at the home server in the process 415, the home server can generate a top-level key (or a K-R0 key) based on at least the first key instead of sending the first key to the access controller. Other processes can be added into above sequences or repeated multiple times. As an example, the process 425 may be performed by the access controller to generate a second key for each of a plurality of APs within the network domain. The second key is a pairwise shared key that may be used not only for first time association between one AP and the MS, but also for the MS re-association with a new AP within the network domain. Further details of the present method can be found throughout the present specification and more particularly below.
As an example of the method 400,
In an embodiment of the present invention, the MS 510 sends an association request message 505 to the AP 520. In part of the process 510, the association request frame is sent to the AC 530 as a user datagram protocol (UDP) message with payload as the frame contents. For example, the UDP message is sent from the AP520 to the AC 530 in a tunneling mode defined in Control And Provisioning of Wireless Access Points (CAPWAP) architecture. AC 530 processes the UDP message and replies an UDP response frame that is tunneled in UDP payload back to AP 520 in another part of the process 410. AP 520 then sends an association response message 507 back to MS 510. The association response message 507 includes at least information associated with a mobility domain identifier of the access controller AC 530. For example, the mobility domain identifier can be represented by a 48-bit value that uniquely identifies this network domain. In one embodiment, the mobility domain identifier includes a first parameter for identifying an entity for storing a top-level key for authentication and a second parameter for identifying an entity for storing a second-level key. For example, the top-level key is called K-R0 key. The network element for storing the top-level key is called the root key (R0 key) holder. The first parameter of the mobility domain identifier can be correspondingly denoted R0KH-ID. The second-level key is for next level authentication under the root key. The network element for storing the second-level key is called R1 key holder. Thus, the second parameter of the mobility domain identifier can be correspondingly denoted as R1KH-ID. In one embodiment, the network element for storing the top-level key may be the same or different from the network element for storing the second-level key. In another embodiment, the access controller AC 530 is set for holding both the K-R0 key and the K-R1 key. In other words, the access controller, as a domain authenticator, is configured to store both the top-level key and the second-level key according to a specific embodiment of the present invention.
In an alternative embodiment, an 802.1X protocol is used for authenticate the association between the MS 510 with the home server through AP 520 and AC 530. An 802.1X Extensile Authentication Protocol (EAP) is used for transporting authentication messages from the MS 510 to the AC 530 which is a network access server (NAS) client. As shown in
In one embodiment, the MSK received by the AC 530 is used as an input to a key management/distribution system defined in 802.11r protocol. As an example, the key management/distribution system is the key hierarchy described in
In one embodiment, the subsequent authentication process is performed following the process 425 to generate a second-level shared key. For example, with the key hierarchy as shown in
Referring to
In one embodiment, the PTK may be used for encrypting transient data including group transient key distribution during the authenticated association between the mobile station and the access point. Thus, the PTK needs to be sent to the access point to be associated with the mobile station. In the process 435 according to one embodiment of the present invention, AC 530 sends the PTK and associated context to AP 520 in a CAPWAP configuration-request message 517, as shown in
In an alternative embodiment, the invention provides a method for inter-access-point authentication for a network re-association of a mobile station using an 802.11r protocol in CAPWAP architecture according to another embodiment of the present invention as illustrated by
1. Process 605: Performing handover of a mobile station to an access point connected to an access controller (the mobile station holding at least a first parameter for identifying the access controller with a first key);
2. Process 610: Exchanging an authentication request/response message between the mobile station and the access controller through the access point for distributing at least a second parameter;
3. Process 615: Generating a second key by the mobile station and the access controller using at least the first key and the second parameter;
4. Process 620: Calculating a third key by the mobile station and the access controller using at least the second key; and
5. Process 625: Sending the third key in a configuration-request message from the access controller to the access point.
These sequences of processes provide a way of performing a method according to an embodiment of the present invention. As can be seen, the method provides a technique for MS re-association with a new access point under 802.11r according to a specific embodiment of the invention. Of course, there can be variations, modifications, and alternatives. Further details of the present method can be found throughout the present specification and more particularly below.
As an example of the method 600,
As shown in
According to an embodiment of the present invention, based on at least the root key K-R0 and the second parameter for identifying a R1 key holder, a second-level key, K-R1, in the key hierarchy can be generated by the R1 key holder. For example, the AC 730 is a R1 key holder so that the K-R1 key can be generated at the AC 730 in the process 615 as shown in
Referring to
In another embodiment, the PTK can be used for encrypting transient data during the authenticated association between the mobile station and the access point. Thus, the PTK needs to be sent to the access point to be associated with the mobile station. For example, AC 830 sends the PTK and associated context to AP 720 in a CAPWAP configuration-request message 705 in the process 625. The CAPWAP configuration-request message 705 is a context transfer data containing various message elements, including an Add Mobile element, an Mobile Session Key element, etc. In one embodiment, in the Mobile Session Key message element of the CAPWAP configuration-request message, A-bit is set to zero and the PTK is included in a Key field. In another embodiment, the PTK is also used to prove the possession of the second-level key for shared authentication and to bind the second-level key to the access point in the new session of re-association. In other words, the AP 720 and MS 710 establish an authenticated re-association using the PTK as a session key. In a specific embodiment, the PTK can be used for protections of the re-association request/response transactions. As shown in
During handover, if the current AC changes, one scenario is the new AC is still in the same domain as the current AC associated with a same home server. This is called intra-domain handover. In this case, the current AC can acts as an anchor authenticator for providing a top-level root key for authentication. While the new AC may obtain a new root key using a key distribution mechanism based on the original root key. In a specific embodiment, the invention provides a method for performing intra-domain inter-access controller authentication using 802.11r protocol in CAPWAP architecture as illustrated by
1. Process 805: Performing a handover to move a mobile station from a first access controller to a second access controller through an access point;
2. Process 810: Sending an authentication request from the mobile station to the second access controller through the access point;
3. Process 815: Sending an access request including a plurality of parameters from the second access controller to the home server;
4. Process 820: Generating a second key by the home server using the plurality of parameters;
5. Process 825: Replying an access-accept message including at least the second key to the second access controller;
6. Process 830: Receiving an authentication response by the mobile station from the second access controller through the access point;
7. Process 835: Generating a third key by the second access controller based on the second key;
8. Process 840: Generating a fourth key by the mobile station and the second access controller;
9. Process 845: Sending the fourth key in a config-request message from the second access controller to the access point.
These sequences of processes provide a way of performing a method according to an embodiment of the present invention. As can be seen, the method provides a technique for inter-domain handover initiated by the network discovery and selection procedure according to a specific embodiment of the invention. Of course, there can be variations, modifications, and alternatives. For example, because the authenticator is located at the access controller, the method 800 can be applied for both the Split MAC access points and Local MAC access points. Further details of the present method can be found throughout the present specification and more particularly below.
As an example, the method 800 can be specifically illustrated in
In a specific embodiment, the intra-domain inter-access controller authentication starts with a handover of a mobile station from a first access controller to a second access controller. The handover is initiated by detecting an access point for the mobile station to attach in the process 805 of the method 800. As shown in
In one embodiment, as the MS 910 hands over to the new AP 920, it can send an authentication request message 901 to the AP 920 as shown in
In a specific embodiment, after receiving the UDP encapsulated message from AP 920, AC 930 determines that the first parameter R0KH-ID may be different from what is set in its own mobility domain identifier. AC 930 needs to get its own top-level root key for the current association session after the handover. In one embodiment, AC 930 sends an access-request message 907 to the home server AAA 940 as shown in
In another specific embodiment, the home server can generate a new root key using at least the plurality of parameters. For example, a new K-R0 key is generated by home server AAA 940 using the plurality of parameters related to MS 910 and AC 930 in the process 820 of method 800. The new root key can be used as a top-level key for pairwise authentication and needs to be sent to corresponding authenticator which is in fact the new access controller after the handover. For example, the generated K-R0 key is sent by AAA 940 to AC 930 in an access-accept message 909, as shown in
In one embodiment, the AC 930 can send information associated with the K-R0 key in another UDP message in tunnel mode to the AP 920. The UDP message back to AP 920 may include another random value, ANonce, generated for the AP 920, as well as a third parameter. The AP 920 further can return these information back to the MS 910 in an authentication response message 903, as shown in
According to certain embodiments of present invention, the AC 930 acting as an authenticator for MS 910 after the handover can generate a second-level shared key for subsequent authentication process based on a key hierarchy defined in an 802.11r protocol. For example, AC 930 uses the K-R0 key and the third parameter to generate a K-R1 key for the AP 920 in the process 835 of the method 800. In one embodiment, since the K-R1 key and the third parameter have been distributed to MS 910 in the authentication response message 903, MS 910 is capable of generating a same K-R1 key using the known K-R0 key and the third parameter. In another embodiment, the MAC address of the AP 920 may be set as the third parameter which has been designed for identifying where a second-level key is stored. Thus the generated K-R1 key can be stored at the AP 920 and becomes a second-level shared authentication key between MS 910 and AP 920. In yet another embodiment, the third parameter is set within the mobility domain identifier of AC 930 so that the K-R1 key is also kept in AC 930. In this scenario, no need for R1 key distribution. Of course, there can be variations, modifications, and alternatives.
In another embodiment, a next-level transient key can be further generated between the mobile station and the new access controller at the end of the authentication response. The next-level transient key is a lowest-level pairwise transient key (PTK) within the key hierarchy for uniquely binding the K-R1 key to the access point. For example, the PTK can be generated between MS 910 and AC 930 using at least the K-R1 key in the process 840 of the method 800. In a specific embodiment, the process 840 comprises performing an 802.11r four-way handshake operation between MS 910 and AC 930, wherein some UDP encapsulated messages using format defined in CAPWAP architecture will be exchanged between the AC 930 and AP 920. In another embodiment, the PTK may be generated by concatenating at least the following attributes: the third key, an ANonce value, an SNonce value, a MAC address of the mobile station, and a MAC address of the access point. Of course, there can be variations, modifications, and alternatives. In certain embodiments, the PTK may be generated using 802.11i four-way handshake between MS 910 and AP 920 if the K-R1 key is held by the AP 920 and the access point is designed as an authenticator.
In another specific embodiment, since AC is the authenticator, the generated fourth key will be sent to the access point that is associated with the mobile station after the intra-domain handover. For example, this is performed in the process 845 of the method 800. As shown in
In an alternative specific embodiment, a new access controller is configured to store the generated a second-level shared key, i.e., K-R1 key. Since the access controller is designed as the authenticator at the top-level of key hierarchy defined in
It is also understood that the examples and embodiments described herein are for illustrative purposes only and that various modifications or changes in light thereof will be suggested to persons skilled in the art and are to be included within the spirit and purview of this specification and scope of the appended claims.
This application claims priority to U.S. Provisional Patent Application No. 60/846,182, filed on Sep. 20, 2006, commonly assigned, incorporated by reference herein for all purposes.
Number | Date | Country | |
---|---|---|---|
60846182 | Sep 2006 | US |