Authentication for a multi-tier wireless home mesh network
First Claim
1. A method comprising:
- discovering a wireless home mesh network in response to activation of a wireless node;
andauthenticating the wireless node before permitting the wireless node to join the wireless home mesh network by;
(1) transmitting a first message, the first message including (i) an encrypted pass-phrase being a pass-phrase encrypted with a public key of the wireless node of the wireless home mesh network, (ii) a checksum of the encrypted pass-phrase, (iii) the a public key of the wireless node, and (iv) a checksum of the public key of the wireless node; and
(2) receiving a second message, the second message including a code to indicate whether the wireless node has been successfully authenticated;
transmitting a third message, the third message including a first challenge text including a secret value combined with an extended service set identification (ESSID) of the wireless home mesh network; and
receiving a fourth message from a node of the wireless home mesh network, the fourth message including a second challenge text including the secret value combined with a media access control (MAC) value of the wireless node.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for a multi-tier wireless home mesh network may include authentication of a node within a wireless home networking environment after discovering a wireless home mesh network. The authentication comprises (1) transmitting a first message, the first message including (i) an encrypted pass-phrase being a pass-phrase encrypted with a public key of the node of the wireless home mesh network, (ii) a checksum of the encrypted pass-phrase, (iii) a public key of the wireless node, and (iv) a checksum of the public key of the wireless node, and (2) receiving a second message, the second message including a code to indicate whether the wireless node has been successfully authenticated along with the challenge text verification process to ensure the message was not tampered or sent by another node.
-
Citations
13 Claims
-
1. A method comprising:
-
discovering a wireless home mesh network in response to activation of a wireless node; and authenticating the wireless node before permitting the wireless node to join the wireless home mesh network by; (1) transmitting a first message, the first message including (i) an encrypted pass-phrase being a pass-phrase encrypted with a public key of the wireless node of the wireless home mesh network, (ii) a checksum of the encrypted pass-phrase, (iii) the a public key of the wireless node, and (iv) a checksum of the public key of the wireless node; and (2) receiving a second message, the second message including a code to indicate whether the wireless node has been successfully authenticated; transmitting a third message, the third message including a first challenge text including a secret value combined with an extended service set identification (ESSID) of the wireless home mesh network; and receiving a fourth message from a node of the wireless home mesh network, the fourth message including a second challenge text including the secret value combined with a media access control (MAC) value of the wireless node. - View Dependent Claims (2, 3, 4)
-
-
5. A method, comprising:
-
establishing a gateway node, communicably coupled to an external network, as a first tier of a wireless home mesh network; classifying one or more stationary electronics devices into a second tier of nodes partially forming the wireless home mesh network; classifying one or more mobile electronic devices into a third tier of nodes partially forming the wireless home mesh network; and wirelessly communicating with a node being part of the wireless home mesh network that, before permitting a wireless node to join the wireless home mesh network, authenticates the wireless node by (1) transmitting a first message that includes (i) an encrypted pass-phrase being a pass-phrase encrypted with a public key of the wireless node being part of the wireless home mesh network, (ii) a checksum of the encrypted pass-phrase, (iii) the public key of the wireless node being part of the wireless home mesh network, and (iv) a checksum of the public key of the wireless node being part of the wireless home mesh network, and (2) receiving a second message, the second message including a code to indicate whether the wireless node has been successfully authenticated, wherein before wirelessly communicating with the node, the method further comprises discovering the wireless home mesh network by transmitting a third message, the third message including a first challenge text including a secret value combined with an extended service set identification (ESSID) of the wireless home mesh network, and receiving a fourth message from the node of the wireless home mesh network, the fourth message including a second challenge text including the secret key combined with a media access control (MAC) value of the wireless node. - View Dependent Claims (6, 7, 8)
-
-
9. Adapted for communications with a node of an ad hoc network, a wireless node comprising:
-
a processor; a chipset coupled to the processor; a communications interface coupled to the chipset; and a logic unit coupled to the chipset, the logic unit including an authentication logic to authenticate the wireless node through use of a first message including an encrypted pass-phrase, a checksum of the encrypted pass-phrase, a public key of the wireless node, and a checksum of the public key of the wireless node, the processor configured for; receiving an authentication message, the authentication message including a code to indicate whether the wireless node has been successfully authenticated; transmitting a challenge message, the challenge message including a first challenge text including a secret value combined with an extended service set identification (ESSID) of the network; and receiving a MAC challenge message from a node of the network, the MAC challenge message including a second challenge text including the secret value combined with a media access control (MAC) value of the wireless node. - View Dependent Claims (10, 11, 12, 13)
-
Specification