Managed access point protocol
First Claim
Patent Images
1. A method comprising:
- in a wireless local area network including at least one central control element and a plurality of access elements, when a new central control element has been installed for the wireless local area network to replace a failed central control element, configuring the new central control element with a central control element identifier that is the same as a central control element identifier of the failed central control element;
the new central control element receiving from an access element a discovery request message at the new central control element;
the new central control element sending a discovery response to the access element, the discovery response including the central control element identifier of the failed central control element;
the new central control element receiving a join request from the access element, the join request including an access element identifier, a digital certificate and a session identifier; and
the new central control element authenticating the digital certificate contained in the join request, and if authenticated, generating secret shared cryptographic keys used to encrypt and authenticate messages exchanged between the new central control element and the access element.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatuses and systems facilitating deployment and configuration of managed access points in hierarchical wireless network systems. An embodiment of the invention facilitates deployment and configuration of conventional, substantially autonomous access points operating in connection with a central management node, such as a server or appliance. In another embodiment, the present invention facilitates deployment and configuration of light-weight access points in a hierarchical wireless network system. In one embodiment, the present invention also provides a streamlined encryption key exchange protocol adapted to hierarchical wireless network system architectures.
27 Citations
20 Claims
-
1. A method comprising:
-
in a wireless local area network including at least one central control element and a plurality of access elements, when a new central control element has been installed for the wireless local area network to replace a failed central control element, configuring the new central control element with a central control element identifier that is the same as a central control element identifier of the failed central control element; the new central control element receiving from an access element a discovery request message at the new central control element; the new central control element sending a discovery response to the access element, the discovery response including the central control element identifier of the failed central control element; the new central control element receiving a join request from the access element, the join request including an access element identifier, a digital certificate and a session identifier; and the new central control element authenticating the digital certificate contained in the join request, and if authenticated, generating secret shared cryptographic keys used to encrypt and authenticate messages exchanged between the new central control element and the access element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
at least one central control element and a plurality of access elements in a wireless local area network; a new central control element being installed for the wireless local area network to replace a failed central control element, wherein the new central control element is configured with a central control element identifier that is the same as a central control element identifier of the failed central control element; wherein the new central control element is configured to; receive from a particular access element of the plurality of access elements a discovery request message; send a discovery response to the particular access element, the discovery response including the central control element identifier of the failed central control element; receive a join request from the particular access element, the join request including an access element identifier, a digital certificate and a session identifier; and authenticate the digital certificate contained in the join request, and if authenticated, generate secret shared cryptographic keys used to encrypt and authenticate messages exchanged between the new central control element and the particular access element. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification