System for setting security in wireless network system using cluster function and method of controlling the same
First Claim
1. A system for setting security in a wireless network system, the system comprising:
- an access point storing a list of candidate terminals of one or more neighboring access points, determining, upon receipt of an access request from a neighboring terminal, whether or not the neighboring terminal is authenticated using the stored list of candidate terminals, and transmitting an authentication success message to the neighboring terminal if the neighboring terminal is authenticated,wherein the neighboring terminal performs hand-over to the access point without performing authentication upon receiving the authentication success message from the access point.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for setting security in a wireless network system using a cluster function. An access point stores a list of candidate terminals of each neighboring access point. When an arbitrary terminal sends an access request, the access point determines whether or not the terminal is authenticated using the stored list of candidate terminals, and transmits an authentication success message to the requesting terminal if the requesting terminal is authenticated. The terminal performs hand-over to the access point without performing authentication upon receiving the authentication success message from the access point in response to the access request. Thus, the hand-over time of a Wi-Fi phone is reduced in an environment based on Wi-Fi Protected Access (WPA) that is one of the strongest wireless LAN security policies, so that the safety and mobility of wireless LAN services can be improved at the same time.
-
Citations
15 Claims
-
1. A system for setting security in a wireless network system, the system comprising:
-
an access point storing a list of candidate terminals of one or more neighboring access points, determining, upon receipt of an access request from a neighboring terminal, whether or not the neighboring terminal is authenticated using the stored list of candidate terminals, and transmitting an authentication success message to the neighboring terminal if the neighboring terminal is authenticated, wherein the neighboring terminal performs hand-over to the access point without performing authentication upon receiving the authentication success message from the access point. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of controlling a system for setting security in a wireless network system, the method comprising:
-
storing, by an access point having a cluster function, a list of candidate terminals of one or more neighboring access points, and upon receiving an access request from a neighboring terminal, determining whether or not the neighboring terminal is authenticated using the stored list of candidate terminals; and transmitting, by the access point, an authentication success message to the neighboring terminal if the neighboring terminal is authenticated using the stored list of candidate terminals. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method of controlling a system for setting security in a wireless network system, the method comprising:
-
sending, by a terminal, an access request to a neighboring access point in order to perform hand-over; determining, by the terminal, whether or not an authentication success message is received from the neighboring access point; and handing-over, by the terminal, to the neighboring access point if an authentication success message is received from the neighboring access point. - View Dependent Claims (14, 15)
-
Specification