System and method for determining leveled security key holder
First Claim
1. A method comprising:
- detecting, by a network device in a wireless network, a roaming or connection pattern of one or more wireless clients in the wireless network based on requests received from the wireless clients;
prioritizing two or more of;
(1) a first selecting rule based on an initial association of a particular wireless client with the wireless network;
(2) a second selecting rule based on at least one of a roaming pattern and a connection pattern of the particular wireless client;
(3) a third selecting rule based on a random election among a plurality of network devices capable of servicing as the appropriate key holder for the particular wireless client;
or (4) a fourth selecting rule based on connectivity of the particular wireless client; and
selecting a key holder for storing a second level key for a particular wireless client among a plurality of network devices based on prioritized rules, wherein the second level key is derived from a first level key which is derived from a pre-configured key, and wherein the second level key is used to generate a derived security key for authenticating the particular wireless client.
4 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure discloses a network device and/or method for determination of leveled security key holders for a wireless client in a wireless network. The network device detects a roaming or connection pattern of one or more wireless clients in the wireless network based on requests received from the wireless clients. Furthermore, the network device determines one or more selecting rules for selecting an appropriate key holder for the wireless client among a plurality of network devices. Next, the network device prioritizes the one or more selecting rules, and selects the appropriate key holder based on the determined rules and their corresponding prioritization. Through selection of appropriate key holders, the disclosed method provides for better load balancing among possible leveled key holders, and shortens the latencies experienced by wireless clients during fast basic service set transition.
35 Citations
19 Claims
-
1. A method comprising:
-
detecting, by a network device in a wireless network, a roaming or connection pattern of one or more wireless clients in the wireless network based on requests received from the wireless clients; prioritizing two or more of;
(1) a first selecting rule based on an initial association of a particular wireless client with the wireless network;
(2) a second selecting rule based on at least one of a roaming pattern and a connection pattern of the particular wireless client;
(3) a third selecting rule based on a random election among a plurality of network devices capable of servicing as the appropriate key holder for the particular wireless client;
or (4) a fourth selecting rule based on connectivity of the particular wireless client; andselecting a key holder for storing a second level key for a particular wireless client among a plurality of network devices based on prioritized rules, wherein the second level key is derived from a first level key which is derived from a pre-configured key, and wherein the second level key is used to generate a derived security key for authenticating the particular wireless client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A network device comprising:
-
a processor; a memory; a detecting mechanism operating with the processor, the detecting mechanism to detect a roaming or connection pattern of one or more wireless clients in the wireless network based on requests received from the wireless clients; a prioritizing mechanism operating with the processor, the prioritizing mechanism prioritizing two or more of;
(1) a first selecting rule based on an initial association of a particular wireless client with the wireless network;
(2) a second selecting rule based on at least one of a roaming pattern and a connection pattern of the particular wireless client;
(3) a third selecting rule based on a random election among a plurality of network devices capable of servicing as the appropriate key holder for the particular wireless client;
or (4) a fourth selecting rule based on connectivity of the particular wireless client; anda selecting mechanism operating with the processor, the selecting mechanism selecting a key holder for storing a second level key for a particular wireless client among a plurality of network devices based on prioritized rules, wherein the second level key is derived from a first level key which is derived from a pre-configured key, and wherein the second level key is used to generate a derived security key for authenticating the particular wireless client. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable storage medium storing embedded instructions that are executed by one or more mechanisms implemented within a network device to perform a plurality of operations comprising:
-
detecting a roaming or connection pattern of one or more wireless clients in a wireless network based on requests received from the wireless clients; prioritizing two or more of;
(1) a first selecting rule based on an initial association of a particular wireless client with the wireless network;
(2) a second selecting rule based on at least one of a roaming pattern and a connection pattern of the particular wireless client;
(3) a third selecting rule based on a random election among a plurality of network devices capable of servicing as the appropriate key holder for the particular wireless client;
or (4) a fourth selecting rule based on connectivity of the particular wireless client; andselecting a key holder for storing a second level key for a particular wireless client among a plurality of network devices based on prioritized rules, wherein the second level key is derived from a first level key which is derived from a pre-configured key, and wherein the second level key is used to generate a derived security key for authenticating the particular wireless client.
-
Specification