SECURE WIRELESS COMMUNICATIONS
First Claim
1. An automated method, comprising:
- dividing a transmission control protocol/internet protocol (TCP/IP) data stream into sets of packets;
encrypting a first set of packets using one encryption protocol;
encrypting a second set of packets using another encryption protocol;
transmitting, using one channel over a wireless network, the first set of packets; and
transmitting, using another channel over the wireless network, the second set of packets.
2 Assignments
0 Petitions
Accused Products
Abstract
A system includes a sending access point and a receiving access point. The sending access point divides a data stream into sets of packets, encrypts a first set of packets using a first encryption protocol, encrypts a second set of packets using a second encryption protocol, where the second encryption protocol is different from the first encryption protocol, transmits, using a first channel over a wireless network, the first set of packets, and transmits, using a second channel over the wireless network, the second set of packets. The receiving access point receives the first set of packets and the second set of packets, decrypts the first set of packets using the first encryption protocol, and decrypts the second set of packets using the second encryption protocol.
85 Citations
24 Claims
-
1. An automated method, comprising:
-
dividing a transmission control protocol/internet protocol (TCP/IP) data stream into sets of packets; encrypting a first set of packets using one encryption protocol; encrypting a second set of packets using another encryption protocol; transmitting, using one channel over a wireless network, the first set of packets; and transmitting, using another channel over the wireless network, the second set of packets. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a sending access point to; divide a data stream into sets of packets, encrypt a first set of packets using a first encryption protocol, encrypt a second set of packets using a second encryption protocol, where the second encryption protocol is different from the first encryption protocol, transmit, using a first channel over a wireless network, the first set of packets, and transmit, using a second channel over the wireless network, the second set of packets; and a receiving access point to; receive the first set of packets and the second set of packets, decrypt the first set of packets using the first encryption protocol, and decrypt the second set of packets using the second encryption protocol. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A device, comprising:
-
means for dividing a data stream into sets of packets; means for encrypting a first group of the sets of packets using one encryption protocol; means for encrypting a second group of the sets of packets using a different encryption protocol; means for transmitting, using a first channel over a wireless network, the first group of the sets of packets; and means for transmitting, using another channel over the wireless network, the second group of the sets of packets. - View Dependent Claims (21)
-
-
22. A method, comprising:
-
receiving, over a first channel in a wireless network, a first set of packets from a sending device, the first set of packets being encrypted with a first encryption protocol; receiving, over a second channel in the wireless network, a second set of packets from the sending device, the second set of packets being encrypted with a second encryption protocol different than the first encryption protocol; decrypting the first set of packets and the second set of packets; and assembling the first set of packets and the second set of packets into a data stream. - View Dependent Claims (23, 24)
-
Specification