Consumer demand for wireless local area network (WLAN) products (e.g. smart phones) grew rapidly in the recent past as the cost of WLAN chipsets and software fell while efficiencies rose. Along with the popularity, however, came inevitable and necessary security concerns.
The Institute of Electrical and Electronics Engineers (IEEE) initially attempted to address wireless security issues through the Wired Equivalent Privacy (WEP) standard. Unfortunately, the WEP standard quickly proved inadequate at providing the privacy it advertised and the IEEE developed the 802.11i specification in response. 802.11i provides a framework in which only trusted users are allowed to access WLAN network resources. RFC 2284, setting out an in-depth discussion of Point-to-Point Protocol Extensible Authentication Protocol (PPP EAP) by Merit Network, Inc (available at http://rfc.net/rfc2284.html as of Mar. 9, 2006), is one example of the 802.11i network authentication process and is incorporated by reference.
A typical wireless network based on the 802.11i specification comprises a supplicant common known as a client (e.g. a laptop computer), a number of wireless access points (AP), and an authentication server. In some implementations, the APs also act as authenticators that keep the WLAN closed to all unauthenticated traffic. To access the WLAN securely, an encryption key known as the Pairwise Master Key (PMK) must first be established between the client and an AP. The client and the AP then exchange a sequence of four messages known as the “four-way handshake.” The four-way handshake produces encryption keys unique to the client that are subsequently used to perform bulk data protection (e.g. message source authentication, message integrity assurance, message confidentiality, etc.).
A handoff occurs when the client roams from one AP to another. Prior to 802.11i, it was necessary for the client to re-authenticate itself each time it associates with an AP. This renegotiation results in significant latencies and may prove fatal for real-time exchanges such as voice data transfer.
Embodiments of the present invention are illustrated in the figures. However, the embodiments and figures are illustrative rather than limiting; they provide examples of the present invention.
The foregoing examples of the related art and limitations related therewith are intended to be illustrative and not exclusive. Other limitations of the related art will become apparent to those of skill in the art upon a reading of the specification and a study of the drawings.
In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without one or more of these specific details or in combination with other components or process steps. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.
In the example of
In the example of
In the example of
In the example of
In the example of
In the example of
In the example of
In the example of
In the example of
In the example of
In the example of
Upon receipt of the message from the server 202, the authenticator 204-N decrypts the random key k using the shared key askey and uses k to decrypt the encryption key SEK. Having obtained the encryption key SEK, the authenticator 204-N may then proceed with a four-way handshake, which is represented in
Advantageously, the authentication system illustrated in
The scope and boundary of the authentication domains 304 may be determined according to parameters such as geographic locations, load balancing requirements, etc. For illustrative purposes, the client 308 is depicted as roaming from the authentication domain 304-1 to the authentication domain 304-N. This may be accomplished by any known or convenient means, such as that described with reference to
In the example of
In the example of
The flowchart continues at module 417, where once the new authenticator receives the cryptographic message, the new authenticator sends a message to the server. If at decision point 419 the authenticator is not verified, the flowchart ends. Otherwise, the server sends a message to the authenticator at module 421. The flowchart continues at module 423 where the authenticator obtains an encryption key, at module 424 where the client and the authenticator enter a four-way handshake, and at module 427 where data traffic commences.
At module 601, a client generates a first key. In one embodiment, the first key is randomly generated. In an alternative embodiment, the first key is generated according to a preset value such as by requesting a value (e.g. password) from a user. In yet another alternative embodiment, the first key is a constant value such as a combination of the current date, time, etc.
At module 603, the client obtains a second key. In one implementation, the generation of the second key relies on an existing protocol (e.g. 802.1X). In an alternative implementation, the second key is pre-configured (e.g. user password). In yet another alternative implementation, the second key is a combination of a pre-configured value and a randomly generated value.
At module 605, the client constructs a first message using the first key and the second key. In one embodiment, the message is a data packet comprising cryptographic data using the first and the second key. Furthermore, in one embodiment, the first message comprises the second key encrypted with the first key.
At module 607, the client sends the first message to an authenticator. In one embodiment, the authenticator is a second authenticator from which the client transitions from a first authenticator.
At module 609, the authenticator constructs a second message using data from the first message. In one implementation, the authenticator constructs the second message comprising the client's identity, and an encrypted portion having identity of the authenticator and the first key.
At module 611, the authenticator sends the second message to a server with which the authenticator is coupled. At module 613, the server decrypts an encrypted portion of the second message. In one implementation, the encrypted portion of the second message comprises the identity of the authenticator and the first key.
Subsequently at module 615, the server verifies the authenticator with the decrypted identity information extracted from the second message. If the server cannot verify the authenticator according to the identification information, as shown at decision point 617, the client cannot communicate through the authenticator. If, on the other hand, the server verifies the authenticator, the server constructs a third message with the first key that it extracted from the second message at module 619. In one implementation, the third message comprises the first key encrypted with a third key that the server shares with the authenticator. The server then sends the third message to the authenticator at module 621.
After receiving the third message, the authenticator extracts the first key from the message at module 623. In one implementation, the authenticator extracts the first key using a third key it shares with the server. With the first key, the authenticator then decrypts the cryptographic data in the first message and extracts the second key at module 625. Having obtained the second key, the authenticator establishes secure data traffic/communication with the client using the second key. In one embodiment, the authenticator is a second authenticator to which the client transitions from a first authenticator coupled to the server, and the client communicates securely with both the first and the second authenticator using the second key.
As used herein, the term “embodiment” means an embodiment that serves to illustrate by way of example but not limitation. It may be noted that, in an embodiment, timestamps can be observed to measure roaming time.
It will be appreciated to those skilled in the art that the preceding examples and embodiments are exemplary and not limiting to the scope of the present invention. It is intended that all permutations, enhancements, equivalents, and improvements thereto that are apparent to those skilled in the art upon a reading of the specification and a study of the drawings are included within the true spirit and scope of the present invention. It is therefore intended that the following appended claims include all such modifications, permutations and equivalents as fall within the true spirit and scope of the present invention.
This application claims the benefit of U.S. Patent Application No. 60/661,831, filed Mar. 15, 2005, which is incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
3641433 | Mifflin et al. | Feb 1972 | A |
4168400 | De Couasnon et al. | Sep 1979 | A |
4176316 | DeRoas et al. | Nov 1979 | A |
4247908 | Lockhart et al. | Jan 1981 | A |
4291401 | Bachmann | Sep 1981 | A |
4291409 | Weinberg et al. | Sep 1981 | A |
4409470 | Shepard et al. | Oct 1983 | A |
4460120 | Shepard et al. | Jul 1984 | A |
4475208 | Ricketts | Oct 1984 | A |
4494238 | Groth, Jr. | Jan 1985 | A |
4500987 | Hasegawa | Feb 1985 | A |
4503533 | Tobagi et al. | Mar 1985 | A |
4550414 | Guinon et al. | Oct 1985 | A |
4562415 | McBiles | Dec 1985 | A |
4630264 | Wah | Dec 1986 | A |
4635221 | Kerr | Jan 1987 | A |
4639914 | Winters | Jan 1987 | A |
4644523 | Horwitz | Feb 1987 | A |
4672658 | Kavehrad | Jun 1987 | A |
4673805 | Shepard et al. | Jun 1987 | A |
4707839 | Andren et al. | Nov 1987 | A |
4730340 | Frazier | Mar 1988 | A |
4736095 | Shepard et al. | Apr 1988 | A |
4740792 | Sagey et al. | Apr 1988 | A |
4758717 | Shepard et al. | Jul 1988 | A |
4760586 | Takeda | Jul 1988 | A |
4789983 | Acampora et al. | Dec 1988 | A |
4829540 | Waggener et al. | May 1989 | A |
4850009 | Zook et al. | Jul 1989 | A |
4872182 | McRae et al. | Oct 1989 | A |
4894842 | Brockhoven et al. | Jan 1990 | A |
4901307 | Gilhousen et al. | Feb 1990 | A |
4933952 | Albrieux et al. | Jun 1990 | A |
4933953 | Yagi | Jun 1990 | A |
4995053 | Simpson et al. | Feb 1991 | A |
5008899 | Yamamoto | Apr 1991 | A |
5029183 | Tymes | Jul 1991 | A |
5103459 | Gilhousen et al. | Apr 1992 | A |
5103461 | Tymes | Apr 1992 | A |
5109390 | Gilhousen et al. | Apr 1992 | A |
5142550 | Tymes | Aug 1992 | A |
5151919 | Dent | Sep 1992 | A |
5157687 | Tymes | Oct 1992 | A |
5187575 | Dent et al. | Feb 1993 | A |
5231633 | Hluchyj et al. | Jul 1993 | A |
5280498 | Tymes et al. | Jan 1994 | A |
5285494 | Sprecher et al. | Feb 1994 | A |
5329531 | Diepstraten | Jul 1994 | A |
5418812 | Reyes et al. | May 1995 | A |
5448569 | Huang et al. | Sep 1995 | A |
5450615 | Fortune et al. | Sep 1995 | A |
5465401 | Thompson | Nov 1995 | A |
5479441 | Tymes et al. | Dec 1995 | A |
5483676 | Mahany et al. | Jan 1996 | A |
5491644 | Pickering et al. | Feb 1996 | A |
5517495 | Lund | May 1996 | A |
5519762 | Bartlett | May 1996 | A |
5528621 | Heiman et al. | Jun 1996 | A |
5561841 | Markus | Oct 1996 | A |
5568513 | Croft et al. | Oct 1996 | A |
5584048 | Wieczorek | Dec 1996 | A |
5598532 | Liron | Jan 1997 | A |
5630207 | Gitlin et al. | May 1997 | A |
5640414 | Blakeney et al. | Jun 1997 | A |
5649289 | Wang et al. | Jul 1997 | A |
5668803 | Tymes et al. | Sep 1997 | A |
5793303 | Koga | Aug 1998 | A |
5794128 | Brockel et al. | Aug 1998 | A |
5812589 | Sealander et al. | Sep 1998 | A |
5815811 | Pinard et al. | Sep 1998 | A |
5828960 | Tang et al. | Oct 1998 | A |
5838907 | Hansen | Nov 1998 | A |
5844900 | Hong et al. | Dec 1998 | A |
5872968 | Knox et al. | Feb 1999 | A |
5875179 | Tikalsky | Feb 1999 | A |
5896561 | Schrader et al. | Apr 1999 | A |
5915214 | Reece et al. | Jun 1999 | A |
5920821 | Seazholtz et al. | Jul 1999 | A |
5933607 | Tate et al. | Aug 1999 | A |
5949988 | Feisullin et al. | Sep 1999 | A |
5953669 | Stratis et al. | Sep 1999 | A |
5960335 | Umemoto et al. | Sep 1999 | A |
5982779 | Krishnakumar et al. | Nov 1999 | A |
5987062 | Engwer et al. | Nov 1999 | A |
5987328 | Ephremides et al. | Nov 1999 | A |
6005853 | Wang et al. | Dec 1999 | A |
6011784 | Brown | Jan 2000 | A |
6078568 | Wright | Jun 2000 | A |
6088591 | Trompower | Jul 2000 | A |
6119009 | Baranger et al. | Sep 2000 | A |
6160804 | Ahmed et al. | Dec 2000 | A |
6188649 | Fine et al. | Feb 2001 | B1 |
6199032 | Anderson | Mar 2001 | B1 |
6208629 | Jaszewski et al. | Mar 2001 | B1 |
6208841 | Wallace et al. | Mar 2001 | B1 |
6218930 | Katzenberg et al. | Apr 2001 | B1 |
6240078 | Kuhnel et al. | May 2001 | B1 |
6240083 | Wright | May 2001 | B1 |
6256300 | Ahmed et al. | Jul 2001 | B1 |
6256334 | Adachi | Jul 2001 | B1 |
6285662 | Watanabe | Sep 2001 | B1 |
6317599 | Rappaport et al. | Nov 2001 | B1 |
6336035 | Somoza et al. | Jan 2002 | B1 |
6336152 | Richman et al. | Jan 2002 | B1 |
6347091 | Wallentin et al. | Feb 2002 | B1 |
6356758 | Almeida et al. | Mar 2002 | B1 |
6393290 | Ulfongene | May 2002 | B1 |
6404772 | Beach et al. | Jun 2002 | B1 |
6473449 | Cafarella et al. | Oct 2002 | B1 |
6493679 | Rappaport et al. | Dec 2002 | B1 |
6496290 | Lee | Dec 2002 | B1 |
6512916 | Forbes, Jr. | Jan 2003 | B1 |
6580700 | Pinard et al. | Jun 2003 | B1 |
6587680 | Ala-Laurila et al. | Jul 2003 | B1 |
6614787 | Jain et al. | Sep 2003 | B1 |
6625454 | Rappaport et al. | Sep 2003 | B1 |
6631267 | Clarkson et al. | Oct 2003 | B1 |
6659947 | Carter et al. | Dec 2003 | B1 |
6687498 | McKenna et al. | Feb 2004 | B2 |
6725260 | Philyaw | Apr 2004 | B1 |
6747961 | Ahmed et al. | Jun 2004 | B1 |
6839338 | Amara et al. | Jan 2005 | B1 |
6879812 | Agrawal et al. | Apr 2005 | B2 |
6973622 | Rappaport et al. | Dec 2005 | B1 |
6978301 | Tindal | Dec 2005 | B2 |
7020773 | Otway et al. | Mar 2006 | B1 |
7110756 | Diener | Sep 2006 | B2 |
20020052205 | Belostotsky et al. | May 2002 | A1 |
20020068278 | Forslow | Jun 2002 | A1 |
20020095486 | Bahl | Jul 2002 | A1 |
20020101868 | Clear et al. | Aug 2002 | A1 |
20020191572 | Weinstein et al. | Dec 2002 | A1 |
20030014646 | Buddhikot et al. | Jan 2003 | A1 |
20030018889 | Burnett et al. | Jan 2003 | A1 |
20030107590 | Levillain et al. | Jun 2003 | A1 |
20030174706 | Shankar et al. | Sep 2003 | A1 |
20040025044 | Day | Feb 2004 | A1 |
20040047320 | Eglin | Mar 2004 | A1 |
20040064560 | Zhang et al. | Apr 2004 | A1 |
20040095914 | Katsube et al. | May 2004 | A1 |
20040095932 | Astarabadi et al. | May 2004 | A1 |
20040143428 | Rappaport et al. | Jul 2004 | A1 |
20040120370 | Tzamaloukas | Nov 2004 | A1 |
20040230370 | Tzamaloukas | Nov 2004 | A1 |
20040259555 | Rappaport et al. | Dec 2004 | A1 |
20050030929 | Swier et al. | Feb 2005 | A1 |
20050058132 | Okano et al. | Mar 2005 | A1 |
20050059405 | Thomson et al. | Mar 2005 | A1 |
20050059406 | Thomson et al. | Mar 2005 | A1 |
20050064873 | Karaoguz et al. | Mar 2005 | A1 |
20050068925 | Palm et al. | Mar 2005 | A1 |
20050073980 | Thomson et al. | Apr 2005 | A1 |
20050128989 | Bhagwat et al. | Jun 2005 | A1 |
20050157730 | Grant et al. | Jul 2005 | A1 |
20050180358 | Kolar et al. | Aug 2005 | A1 |
20050181805 | Gallagher | Aug 2005 | A1 |
20050193103 | Drabik | Sep 2005 | A1 |
20050223111 | Bhandaru et al. | Oct 2005 | A1 |
20050240665 | Gu et al. | Oct 2005 | A1 |
20050259597 | Benedetotto et al. | Nov 2005 | A1 |
20050273442 | Bennett | Dec 2005 | A1 |
20050276218 | Ooghe et al. | Dec 2005 | A1 |
20060045050 | Floros et al. | Mar 2006 | A1 |
20060200862 | Olson et al. | Sep 2006 | A1 |
Number | Date | Country |
---|---|---|
WO9403986 | Feb 1994 | WO |
WO9911003 | Mar 1999 | WO |
WO 03085544 | Oct 2003 | WO |
WO 2004095192 | Nov 2004 | WO |
WO 2004095800 | Nov 2004 | WO |
Number | Date | Country | |
---|---|---|---|
20060248331 A1 | Nov 2006 | US |
Number | Date | Country | |
---|---|---|---|
60661831 | Mar 2005 | US |