Efficient key establishment for wireless networks
First Claim
Patent Images
1. A method comprising:
- receiving, at a first network station, a data packet containing intrinsic information corresponding to a second network station joining a wireless network;
deriving an encryption key using the intrinsic information corresponding to the second network station without a four-way handshake between the first and second network stations, the encryption key usable to encrypt data to be communicated between the first and second network stations through secure communication;
encrypting data using the encryption key; and
communicating, through the secure connection, the encrypted data to the second network station.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for deriving an encryption key for use between two stations in a wireless network using information intrinsic to one of the stations, without exchanging pairwise transient keys.
215 Citations
20 Claims
-
1. A method comprising:
-
receiving, at a first network station, a data packet containing intrinsic information corresponding to a second network station joining a wireless network; deriving an encryption key using the intrinsic information corresponding to the second network station without a four-way handshake between the first and second network stations, the encryption key usable to encrypt data to be communicated between the first and second network stations through secure communication; encrypting data using the encryption key; and communicating, through the secure connection, the encrypted data to the second network station. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A first network station in a wireless network,
the first network station configured to receive a beacon signal when a second network station joins the wireless network, the first network station comprising: -
at least a memory and a processor to implement a network adaptor, the network adapter configured to; extract information intrinsic to the second network station from the beacon signal; derive an encryption key using the information intrinsic to the second network station without a four-way handshake between the first and second network stations, the encryption key usable to encrypt data to be communicated between the first and second network stations through secure communication; and encrypt data for communication to the second network station using the encryption key. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
establishing, at a first network station, a first unique key with a second network station; receiving information corresponding to a third network station from the second network station; deriving a second unique key using the information corresponding to the third network station without a four-way handshake, the second unique key usable to encrypt data to be communicated between the first and third network stations through secure communication; encrypting data using the second unique key; and communicating, through the secure communication, the encrypted data to the third network station. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification