Seamless roaming for clients between access points with WPA-2 encryption
First Claim
1. A computer-implemented method comprising:
- detecting, by a plurality of access points, a client device that is in a pre-determined range of the plurality of access points;
generating, by each access point of the plurality of access points, a connection score for communication with the client device, the connection score indicating a corresponding access point'"'"'s suitability for handling communication with the client device;
broadcasting, by the each access point of the plurality of access points, a corresponding connection score to other access points in a wireless network;
determining that a first access point has a highest connection score from among a plurality of connection scores generated by the each access point;
designating the first access point as a primary access point for communication with the client device;
in response to the designation, performing, by the first access point, encrypted communication with the client device.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless network system that provides for seamless roaming of client devices is described. The wireless network system includes a plurality of access points. One access point is designated as the primary access point that is responsible for handling encrypted communication with the client device. The primary access point has access to the necessary encryption key(s) for encrypted communication. The primary access point receives broadcast updates from the other access points that includes connection scores. When a connection score for a second access point exceeds the connection score of the current primary access point, the current primary access point designates the second access point as the new primary access point and sends the new primary access point the encryption key(s) for encrypted communication. The handoff is seamless and does not require a new handshake between the new primary access point and the client device.
6 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
detecting, by a plurality of access points, a client device that is in a pre-determined range of the plurality of access points; generating, by each access point of the plurality of access points, a connection score for communication with the client device, the connection score indicating a corresponding access point'"'"'s suitability for handling communication with the client device; broadcasting, by the each access point of the plurality of access points, a corresponding connection score to other access points in a wireless network; determining that a first access point has a highest connection score from among a plurality of connection scores generated by the each access point; designating the first access point as a primary access point for communication with the client device; in response to the designation, performing, by the first access point, encrypted communication with the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer system comprising:
-
a plurality of access points communicatively coupled to a client device and configured to detect the client device that is in a pre-determined range of the plurality of access points; each access point of the plurality of access points configured to; generate a connection score of a plurality of connection scores for communication with the client device, wherein the connection score indicates a corresponding access point'"'"'s suitability for handling communication with the client device; broadcast a corresponding connection score to other access points in a wireless network; determine that a first access point has a highest connection score from among the plurality of connection scores generated by the each access point; designate the first access point as a primary access point for communication with the client device; in response to the designation, the first access point of the plurality of access points configured to perform encrypted communication with the client device.
-
-
14. A computer-implemented method comprising:
-
designating a first access point as a primary access point based on a first connection score generated at the first access point and a second connection score generated at a second access point, wherein the first connection score exceeds the second connection score; performing encrypted communication between the first access point and a client device using an encryption key; generating, at the first access point, an updated first connection score; receiving, at the first access point, an updated second connection score generated at the second access point, determining, at the first access point, that the updated second connection score exceeds the updated first connection score; in response to determining that the updated second connection score exceeds the updated first connection score; halting the encrypted communication between the first access point and the client device; sending the encryption key from the first access point to the second access point; performing encrypted communication between the second access point and the client device using the encryption key. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification