System and method to provide enhanced security in a wireless local area network system
First Claim
1. A method for enhancing the security of a wireless local area network including one or more wireless access points associated with one or more clients having a wireless interface card, and a network server, the method comprising the steps of:
- a. initiating a network session between one or more of the clients and the network;
b. having the network server authenticate the one or more clients for access to the network via one or more of the access points;
c. generating a pair of encryption keys;
d. transmitting the encryption key pair to the one or more authenticated clients; and
e. periodically replacing the transmitted encryption key pair with a newly generated pair.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for enhancing Wireless Local Area Network (WLAN) security. The system and method include the generation of a pair of WEP-based encryption keys by a network access point. The key pair is transmitted to one or more clients associated with the access point after the client has been authenticated for access to the network. Each key is preferably randomly generated and the pair is further changed periodically. The timing of the changing of the keys is dependent upon the existing crypto analysis attack capabilities. Individual clients may have unique key pairs or a plurality of clients associated with an access point may share the key pair.
104 Citations
11 Claims
-
1. A method for enhancing the security of a wireless local area network including one or more wireless access points associated with one or more clients having a wireless interface card, and a network server, the method comprising the steps of:
-
a. initiating a network session between one or more of the clients and the network;
b. having the network server authenticate the one or more clients for access to the network via one or more of the access points;
c. generating a pair of encryption keys;
d. transmitting the encryption key pair to the one or more authenticated clients; and
e. periodically replacing the transmitted encryption key pair with a newly generated pair. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification