System and method for establishing a secure connection in communications systems
First Claim
Patent Images
1. A method for establishing a secure connection between a station and an access point in a wireless system, the method comprising:
- transmitting, by the access point, a beacon or probe response to the station, the beacon or probe response including a system time used by the access point for the wireless system, wherein an access point nonce is the system time of the beacon or probe response, respectively;
receiving, by the access point, a station nonce from the station;
determining, by the access point, a first security key according to the access point nonce and the station nonce; and
securing, by the access point, a connection between the station and the access point using the first security key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for establishing a secure connection between a station and an access point includes transmitting a communications system management message to the station, the communications system management message including an access point nonce. The method also includes receiving a station nonce from the station, and determining a first security key according to the access point nonce and the station nonce. The method further includes securing a connection between the station and the access point using the first security key.
-
Citations
24 Claims
-
1. A method for establishing a secure connection between a station and an access point in a wireless system, the method comprising:
-
transmitting, by the access point, a beacon or probe response to the station, the beacon or probe response including a system time used by the access point for the wireless system, wherein an access point nonce is the system time of the beacon or probe response, respectively; receiving, by the access point, a station nonce from the station; determining, by the access point, a first security key according to the access point nonce and the station nonce; and securing, by the access point, a connection between the station and the access point using the first security key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for establishing a secure connection between a station and an access point in a wireless system, the method comprising:
-
receiving, by the station, a beacon or probe response from the access point, the beacon or probe response including a system time used by the access point for the wireless system, wherein an access point nonce is the system time of the beacon or probe response, respectively; determining, by the station, a first security key according to the access point nonce and a station nonce; transmitting, by the station, the station nonce to the access point; and securing, by the station, a connection between the station and the access point using the first security key. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. An access point in a wireless system comprising:
-
a transmitter configured to transmit a beacon or probe response to a station, the beacon or probe response including a system time used by the access point for the wireless system, wherein an access point nonce is the system time of the beacon or probe response, respectively; a receiver configured to receive a station nonce from the station; and a processor operatively coupled to the transmitter and to the receiver, the processor configured to determine a first security key according to the access point nonce and the station nonce, and to secure a connection between the station and the access point using the first security key. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A station in a wireless system comprising:
-
a receiver configured to receive a beacon or probe response from an access point, the beacon or probe response including a system time used by the access point for the wireless system, wherein an access point nonce is the system time of the beacon or probe response, respectively; a transmitter configured to transmit a station nonce to the access point; and a processor operatively coupled to the receiver and to the transmitter, the processor configured to determine a first security key according to the access point nonce and the station nonce, and to secure a connection between the station and the access point using the first security key. - View Dependent Claims (22, 23, 24)
-
Specification