Seamless roaming for clients between access points with WPA-2 encryption
First Claim
1. A method, comprising:
- storing, at a first access point of a plurality of access points, an encryption key for encrypted communication with a client device;
using the encryption key to perform encrypted communication between the first access point and the client device;
generating, at each particular access point of the plurality of access points, a particular connection score of a plurality of connection scores wherein each particular connection score is generated by the particular access point based on connection criteria and wherein the connection criteria is data that describes performance of the particular access point or communication between the particular access point and the client device;
receiving, at the first access point, the plurality of connection scores from the plurality of access points,determining, at the first access point, that a connection score associated with a second access point of the plurality of access points exceeds the connection score associated with the first access point; and
in response to determining that the connection score associated with the second access point of the plurality of access points exceeds the connection score associated with the first access point;
halting encrypted communication between the first access point and the client device;
sending the encryption key from the first access point to the second access point; and
using the encryption key to perform encrypted communication between the second access point and the client device, wherein the method is performed using one or more processors.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless network system that provides for seamless roaming of client devices is described. The wireless network system includes a plurality of access points. One access point is designated as the primary access point that is responsible for handling encrypted communication with the client device. The primary access point has access to the necessary encryption key(s) for encrypted communication. The primary access point receives broadcast updates from the other access points that includes connection scores. When a connection score for a second access point exceeds the connection score of the current primary access point, the current primary access point designates the second access point as the new primary access point and sends the new primary access point the encryption key(s) for encrypted communication. The handoff is seamless and does not require a new handshake between the new primary access point and the client device.
-
Citations
20 Claims
-
1. A method, comprising:
-
storing, at a first access point of a plurality of access points, an encryption key for encrypted communication with a client device; using the encryption key to perform encrypted communication between the first access point and the client device; generating, at each particular access point of the plurality of access points, a particular connection score of a plurality of connection scores wherein each particular connection score is generated by the particular access point based on connection criteria and wherein the connection criteria is data that describes performance of the particular access point or communication between the particular access point and the client device; receiving, at the first access point, the plurality of connection scores from the plurality of access points, determining, at the first access point, that a connection score associated with a second access point of the plurality of access points exceeds the connection score associated with the first access point; and in response to determining that the connection score associated with the second access point of the plurality of access points exceeds the connection score associated with the first access point; halting encrypted communication between the first access point and the client device; sending the encryption key from the first access point to the second access point; and using the encryption key to perform encrypted communication between the second access point and the client device, wherein the method is performed using one or more processors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. One or more non-transitory computer-readable media storing instructions, wherein the instructions include instructions which, when executed by one or more processors, cause:
-
storing, at a first access point of a plurality of access points, an encryption key for encrypted communication with a client device; using the encryption key to perform encrypted communication between the first access point and the client device; generating, at each particular access point of the plurality of access points, a particular connection score of a plurality of connection scores wherein each particular connection score is generated by the particular access point based on connection criteria and wherein the connection criteria is data that describes performance of the particular access point or communication between the particular access point and the client device; receiving, at the first access point, the plurality of connection scores from the plurality of access points, determining, at the first access point, that a connection score associated with a second access point of the plurality of access points exceeds the connection score associated with the first access point; and in response to determining that the connection score associated with the second access point of the plurality of access points exceeds the connection score associated with the first access point; halting encrypted communication between the first access point and the client device; sending the encryption key from the first access point to the second access point; and using the encryption key to perform encrypted communication between the second access point and the client device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification