Association, authentication, and security in a network
First Claim
Patent Images
1. A method of establishing a secure channel between a first device and a second device in a network, the method comprising the steps of:
- providing a first key associated with the first device;
scheduling within one or more time slots the transmission of a second key associated with the second device;
encrypting the second key using the first key; and
sending the encrypted second key at the scheduled one or more time slots.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, devices, and systems are provided facilitating security within a network managed by a central coordinator. In some embodiments, the exchange of security keys is performed within one or more time slots that are defined by the central coordinator and known to stations exchanging these security keys. Furthermore, security, e.g., association may be initiated by one user action.
-
Citations
24 Claims
-
1. A method of establishing a secure channel between a first device and a second device in a network, the method comprising the steps of:
-
providing a first key associated with the first device;
scheduling within one or more time slots the transmission of a second key associated with the second device;
encrypting the second key using the first key; and
sending the encrypted second key at the scheduled one or more time slots. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of secure communication between a first device and a second device within a network, the method comprising the steps of:
-
requesting network association by the first device;
establishing a secure channel between the first device and the second device by exchanging a first key and a second key, wherein the first key is associated with the first device and the second key is associated with the second device, wherein the second key is encrypted using the first key, and wherein the encrypted second key is sent at a scheduled one or more time slots; and
authenticating the first device within the network, wherein the authenticating step comprises providing a set of network credentials comprising a network encryption key and a network authentication key via the established secure channel. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A device adapted to be operably coupled to a network, the device comprising:
-
a key module adapted to determine one or more keys;
an encryption/decryption module adapted to encrypt and decrypt messages in the network; and
a communication module adapted to;
establish a secure channel with at least one station, wherein the secure channel is established by exchanging a first key and a second key, wherein the first key, the second key, or both the first key and the second key are determined by the key module, wherein the second key is encrypted by the encryption/decryption module using the first key, and wherein the encrypted second key is exchanged within one or more scheduled time slots. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A system comprising:
-
a first device adapted to;
send a first key associated with the first device; and
request a second key associated with a second device;
a second device adapted to;
encrypt the second public key using the first public key; and
send the second key within a scheduled one or more time slots allocated for the second device to send the second public key;
a network operably coupled to the first device and the second device. - View Dependent Claims (22, 23, 24)
-
Specification