Methods and apparatus for maintaining secure connections in a wireless communication network
First Claim
1. A method in a mobile communication device operating in a wireless communication network, the method, comprising:
- performing, via an access point of the wireless network, a first authentication procedure with an authentication server for obtaining a first session key;
establishing a secure connection with the access point using the session key;
setting a timer with an initial value that is less than or equal to a first key lifetime value associated with the first session key, and running the timer;
communicating in a media session including a voice call over the secure connection with the access point;
performing the following actions in response to an expiration of the timer during the voice call;
initiating and performing, during and without interrupting the media session that is currently executing, a second authentication procedure with the authentication server to derive a second master session key (MSK) for obtaining a second session key associated with a second key lifetime value which overlaps with the first key lifetime value;
updating, during the voice call, the mobile communication device with the second session key; and
after updating,continuing the voice call over a second secure connection with the access point using the second session key;
wherein the performing of the actions are done without disconnecting from and without reassociating with the access point, so that the voice call is continuously maintained without disruption.
4 Assignments
0 Petitions
Accused Products
Abstract
In one illustrative example, a method in a mobile communication device operating in a wireless local area network (WLAN) involves performing, via a wireless AP of the WLAN, a first authentication procedure with an authentication server for obtaining a first session key and a key lifetime value associated with the first session key; establishing a first secure connection with the wireless AP based on the first session key; setting a timer with an initial value that is less than or equal to the key lifetime value, and running the timer; communicating in a media session over the first secure connection with the wireless AP; and in response to an expiration of the timer during the media session: performing, during the media session, a second authentication procedure with the authentication server for obtaining a second session key; and establishing, during the media session, a second secure connection with the wireless AP using the second session key; and communicating in the media session over the second secure connection with the wireless AP. In another illustrative example, the method involves performing the second authentication procedure with the authentication server in response to identifying a request for establishing the media session, just prior to establishing the media session.
-
Citations
9 Claims
-
1. A method in a mobile communication device operating in a wireless communication network, the method, comprising:
-
performing, via an access point of the wireless network, a first authentication procedure with an authentication server for obtaining a first session key; establishing a secure connection with the access point using the session key; setting a timer with an initial value that is less than or equal to a first key lifetime value associated with the first session key, and running the timer; communicating in a media session including a voice call over the secure connection with the access point; performing the following actions in response to an expiration of the timer during the voice call; initiating and performing, during and without interrupting the media session that is currently executing, a second authentication procedure with the authentication server to derive a second master session key (MSK) for obtaining a second session key associated with a second key lifetime value which overlaps with the first key lifetime value; updating, during the voice call, the mobile communication device with the second session key; and
after updating,continuing the voice call over a second secure connection with the access point using the second session key; wherein the performing of the actions are done without disconnecting from and without reassociating with the access point, so that the voice call is continuously maintained without disruption. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A mobile communication device configured to operate in a wireless communication network, the mobile communication device comprising:
-
one or more processor devices; a wireless transceiver coupled to the one or more processor devices and operative to communicate with an access point of the wireless network;
the one or more processor devices being operative to;perform, via the wireless transceiver, a first authentication procedure with an authentication server for obtaining a first session key; establish, via the wireless transceiver, a secure connection with the access point using the first session key; set a timer with an initial value that is less than or equal to a first key lifetime value associated with the first session key, and run the timer; communicate, via the wireless transceiver, in a media session including a voice call over the secure connection with the access point; perform the following actions in response to an expiration of the timer during the voice call; initiate and perform, via the wireless transceiver during and without interrupting the voice call that is currently executing, a second authentication procedure with the authentication server to derive a second master session key (MSK) for obtaining a second session key associated with a second key lifetime value which overlaps with the first key lifetime value; update, during the voice call, the mobile communication device with the second session key; and
after updating,continue the voice call over a second secure connection with the access point using the second session key; wherein the performing of the actions are done without disconnecting from and without reassociating with the access point, so that the voice call is continuously maintained without disruption. - View Dependent Claims (8, 9)
-
Specification