Mixed mode security for mesh networks
First Claim
1. A method for providing mixed mode security for a mesh network comprising (i) a plurality of open mesh points that are configured to send and receive unencrypted traffic, and (ii) a plurality of secure mesh points that are configured to send and receive encrypted traffic, the method comprising:
- configuring a first secure mesh point in the plurality of secure mesh points to operate in a mixed mode in which the first secure mesh point is configured to (i) exchange encrypted traffic with other secure mesh points and (ii) exchange unencrypted traffic with open mesh points; and
while the first secure mesh point is operating in the mixed mode;
receiving, at the first secure mesh point, traffic from either one of the open mesh points or a second secure mesh point with which the first secure mesh point has already exchanged encrypted traffic,if the traffic is unencrypted traffic, one of(i) forwarding, with the first secure mesh point, the unencrypted traffic to an open mesh point in the plurality of open mesh points, or(ii) if the unencrypted traffic is destined for the first secure mesh point, accepting and processing the unencrypted traffic at the first secure mesh point, andif the traffic is encrypted traffic, processing the encrypted traffic.
8 Assignments
0 Petitions
Accused Products
Abstract
Mixed mode security is provided for a mesh network comprising a plurality of open mesh points and at least one secure mesh point that is capable of sending and receiving encrypted traffic. Aspects of the exemplary embodiment include configuring the secure mesh point to forward unencrypted traffic received from one of the plurality of open mesh points; and configuring the secure mesh point to be a source of unencrypted source traffic, and to receive unencrypted traffic that is destined for the secure mesh point to enable routes in the mesh network to terminate at the secure mesh point.
23 Citations
18 Claims
-
1. A method for providing mixed mode security for a mesh network comprising (i) a plurality of open mesh points that are configured to send and receive unencrypted traffic, and (ii) a plurality of secure mesh points that are configured to send and receive encrypted traffic, the method comprising:
-
configuring a first secure mesh point in the plurality of secure mesh points to operate in a mixed mode in which the first secure mesh point is configured to (i) exchange encrypted traffic with other secure mesh points and (ii) exchange unencrypted traffic with open mesh points; and while the first secure mesh point is operating in the mixed mode; receiving, at the first secure mesh point, traffic from either one of the open mesh points or a second secure mesh point with which the first secure mesh point has already exchanged encrypted traffic, if the traffic is unencrypted traffic, one of (i) forwarding, with the first secure mesh point, the unencrypted traffic to an open mesh point in the plurality of open mesh points, or (ii) if the unencrypted traffic is destined for the first secure mesh point, accepting and processing the unencrypted traffic at the first secure mesh point, and if the traffic is encrypted traffic, processing the encrypted traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A wireless device for use in a mesh network, the mesh network including (i) a plurality of open mesh points that are configured to send and receive unencrypted traffic, and (ii) a plurality of secure mesh points that are configured to send and receive encrypted traffic, the wireless device comprising:
a processor configured to configure the wireless device to operate in a mixed mode in which the wireless device is configured to (i) exchange encrypted traffic with secure mesh points and (ii) exchange unencrypted traffic with open mesh points; and while the wireless device is operating in the mixed mode; determine whether traffic received at the wireless device from either 9i) one of the open mesh points or (ii) a secure mesh point with which the wireless device has already exchanged encrypted traffic is unencrypted traffic or encrypted traffic, if the traffic is unencrypted traffic, one of (i) cause the wireless device to forward the unencrypted traffic to an open mesh point in the plurality of open mesh points, or (ii) if the unencrypted traffic is destined for the wireless device, cause the wireless device to accept and process the unencrypted traffic, and if the traffic is encrypted traffic, cause the wireless device to process the encrypted traffic. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
Specification