×

Exclusive preshared key authentication

  • US 9,674,892 B1
  • Filed: 06/16/2009
  • Issued: 06/06/2017
  • Est. Priority Date: 11/04/2008
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable medium including instructions adapted to direct a computer to perform an operation, the operation comprising:

  • receiving at an access point (AP) a parameter including a secret shared by the AP and a server, and derived by the server from user credentials;

    generating at the AP a set of cryptographic keys such that at least one cryptographic key in the set is generated as a function of the secret, the set of cryptographic keys comprises preshared keys including a preshared key provided to a client device, the preshared key uniquely associated with a specific plurality of client devices including the client device by being uniquely associated with client device identifiers of the specific plurality of client devices to prevent the preshared key from being used with arbitrary client devices;

    initiating at the AP a secure network connection with the client device, wherein the client device includes a network configuration based on a client cryptographic key;

    receiving at the AP a first message from the client device, wherein the first message includes a client cryptographic checksum based on at least the client cryptographic key and data included in the first message;

    selecting at the AP a candidate cryptographic key from the set of cryptographic keys;

    determining a validation cryptographic checksum based on at least the candidate cryptographic key and data included in the first message received from the client device;

    determining if the candidate cryptographic key matches the client cryptographic key by comparing the validation cryptographic checksum with the client cryptographic checksum and indicating that the candidate cryptographic key matches the client cryptographic key if the validation cryptographic checksum matches the client cryptographic checksum;

    in response to the determination that the candidate cryptographic key matches the client cryptographic key, establishing the secure network connection with the client device using the selected candidate cryptographic key; and

    in response to the determination that the candidate cryptographic key matches the client cryptographic key, associating a client device identifier with the candidate cryptographic key in a roaming cache that is accessible to the AP and at least one other access point not connected with the client device.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×