Secure Node Admission in a Communication Network
First Claim
1. A method for key determination in a communication network having a Network Coordinator (NC) and a plurality of associated network nodes, the method comprising:
- a) a new node (NN) sending to the NC a request for a SALT;
b) the NN receiving the SALT from the NC;
c) the NN combining the SALT with its network password to calculate a static key to gain access to the network
9 Assignments
0 Petitions
Accused Products
Abstract
A system and method for node admission in a communication network having a NC and a plurality of associated network nodes. According to various embodiments of the disclosed method and apparatus, key determination in a communication network includes an NN sending to the NC a request for a SALT; the NN receiving the SALT from the NC, combining the SALT with its network password to calculate a static key, and submitting an admission request to the network coordinator to request a dynamic key. The SALT can be a random number generated by the NC, and the admission request can be encrypted by the NN using the static key.
92 Citations
34 Claims
-
1. A method for key determination in a communication network having a Network Coordinator (NC) and a plurality of associated network nodes, the method comprising:
-
a) a new node (NN) sending to the NC a request for a SALT; b) the NN receiving the SALT from the NC; c) the NN combining the SALT with its network password to calculate a static key to gain access to the network - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A network node, comprising:
-
a) a processor; and b) a computer readable medium having a computer executable program code embodied thereon, the executable program code configured to cause the network node to perform the operations of; i) sending to a Network Coordinator (NC) a request for a SALT; ii) receiving the SALT from the NC, wherein the SALT is a random number generated by the NC; iii) combining the SALT with its network password to calculate a static key; and iv) submitting a key request to the network coordinator requesting a dynamic key, wherein the key request is encrypted by the NN using the static key. - View Dependent Claims (17)
-
-
18. A network node, comprising:
-
a) a processor; and b) computer executable program code embodied on a computer readable medium, the computer executable program code configured to cause the network node to perform the operations of; i) sending to an NC a request for a SALT; ii) receiving the SALT from the NC; iii) combining the SALT with a network password to calculate a static key; iv) submitting an admission request to the NC, wherein the admission request is encrypted using the static key; v) requesting a dynamic key, wherein the request for the dynamic key is encrypted using the static key. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method for generating security keys for a network comprising:
-
a) handing off the functions of the network coordinator to a node capable of generating a SALT; and b) distributing the SALT to nodes within the network that are capable of using the SALT to generate a security key.
-
Specification