×

Enhancement to authentication protocol that uses a key lease

  • US 7,480,939 B1
  • Filed: 07/06/2001
  • Issued: 01/20/2009
  • Est. Priority Date: 04/28/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of re-authenticating and protecting wireless communication security comprising the steps of:

  • a) performing a secondary authentication protocol between a wireless client electronic system (client) and a wireless network access point electronic system (AP) using a key lease generated by performance of a primary authentication protocol, wherein said key lease includes a key lease period for indicating a length of time in which said key lease is valid for using said secondary authentication protocol instead of said primary authentication protocol, and wherein the secondary authentication protocol includes the steps of;

    a(i) transmitting said key lease from said client to said AP;

    a(ii) generating a first random number associated with said client and a second random number associated with said AP, wherein said key lease includes an encryption key for use in said secondary authentication protocol; and

    a(iii) transmitting said first random number to said AP and said second random number to said client; and

    b) if said secondary authentication protocol is successful, generating a session encryption key for encrypting communication traffic between said client and said AP, wherein the generating comprises;

    b(i) applying a hash function and said encryption key to said first random number and said second random number to determine said session encryption key.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×