System for setting security in wireless network system using cluster function and method of controlling the same
First Claim
1. A system for setting security in a wireless network system, the system comprising:
- an access point storing a list of candidate terminals of one or more neighboring access points, determining, upon receipt of an access request from a neighboring terminal, whether or not the neighboring terminal is authenticated using the stored list of candidate terminals, and transmitting an authentication success message to the neighboring terminal if the neighboring terminal is authenticated,wherein the neighboring terminal performs hand-over to the access point without performing authentication upon receiving the authentication success message from the access point, andwherein the access point and the neighboring terminal use an encryption key generated and stored in advance without generating a separate encryption key when the authentication is completed by transmitting and receiving the authentication success message.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for setting security in a wireless network system using a cluster function. An access point stores a list of candidate terminals of each neighboring access point. When an arbitrary terminal sends an access request, the access point determines whether or not the terminal is authenticated using the stored list of candidate terminals, and transmits an authentication success message to the requesting terminal if the requesting terminal is authenticated. The terminal performs hand-over to the access point without performing authentication upon receiving the authentication success message from the access point in response to the access request. Thus, the hand-over time of a Wi-Fi phone is reduced in an environment based on Wi-Fi Protected Access (WPA) that is one of the strongest wireless LAN security policies, so that the safety and mobility of wireless LAN services can be improved at the same time.
-
Citations
13 Claims
-
1. A system for setting security in a wireless network system, the system comprising:
-
an access point storing a list of candidate terminals of one or more neighboring access points, determining, upon receipt of an access request from a neighboring terminal, whether or not the neighboring terminal is authenticated using the stored list of candidate terminals, and transmitting an authentication success message to the neighboring terminal if the neighboring terminal is authenticated, wherein the neighboring terminal performs hand-over to the access point without performing authentication upon receiving the authentication success message from the access point, and wherein the access point and the neighboring terminal use an encryption key generated and stored in advance without generating a separate encryption key when the authentication is completed by transmitting and receiving the authentication success message. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of controlling a system for setting security in a wireless network system, the method comprising:
-
storing, by an access point having a cluster function, a list of candidate terminals of one or more neighboring access points, upon receiving an access request from a neighboring terminal, determining whether or not the neighboring terminal is authenticated using the stored list of candidate terminals; transmitting, by the access point, an authentication success message to the neighboring terminal if the neighboring terminal is authenticated using the stored list of candidate terminals; and using, by the access point, an encryption key generated and stored in advance without generating a separate encryption key when the authentication is completed by transmitting and receiving the authentication success message. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method of controlling a system for setting security in a wireless network system, the method comprising:
-
sending, by a terminal, an access request to a neighboring access point in order to perform hand-over; determining, by the terminal, whether or not an authentication success message is received from the neighboring access point; handing-over, by the terminal, to the neighboring access point if an authentication success message is received from the neighboring access point, wherein the terminal is authenticated using a stored list of candidate terminals; and using, by the terminal, an encryption key generated and stored in advance without generating a separate encryption key when the authentication is completed by transmitting and receiving the authentication success message. - View Dependent Claims (13)
-
Specification