SYSTEM AND METHOD FOR DETERMINING LEVELED SECURITY KEY HOLDER
First Claim
1. A method comprising:
- detecting, by a network device in a wireless network, a roaming or connection pattern of one or more wireless clients in the wireless network based on requests received from the wireless clients;
determining, by the network device, one or more selecting rules for selecting a key holder for the wireless client among a plurality of network devices;
prioritizing, by the network device, the one or more selecting rules; and
selecting, by the network device, the key holder based on the determined rules and their corresponding priorities.
4 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure discloses a network device and/or method for determination of leveled security key holders for a wireless client in a wireless network. The network device detects a roaming or connection pattern of one or more wireless clients in the wireless network based on requests received from the wireless clients. Furthermore, the network device determines one or more selecting rules for selecting an appropriate key holder for the wireless client among a plurality of network devices. Next, the network device prioritizes the one or more selecting rules, and selects the appropriate key holder based on the determined rules and their corresponding prioritization. Through selection of appropriate key holders, the disclosed method provides for better load balancing among possible leveled key holders, and shortens the latencies experienced by wireless clients during fast basic service set transition.
41 Citations
21 Claims
-
1. A method comprising:
-
detecting, by a network device in a wireless network, a roaming or connection pattern of one or more wireless clients in the wireless network based on requests received from the wireless clients; determining, by the network device, one or more selecting rules for selecting a key holder for the wireless client among a plurality of network devices; prioritizing, by the network device, the one or more selecting rules; and selecting, by the network device, the key holder based on the determined rules and their corresponding priorities. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A network device comprising:
-
a processor; a memory; a detecting mechanism operating with the processor, the detecting mechanism to detect a roaming or connection pattern of one or more wireless clients in the wireless network based on requests received from the wireless clients; a determining mechanism operating with the processor, the determining mechanism to determine one or more rules for selecting a key holder for the wireless client among a plurality of network devices; a prioritizing mechanism operating with the processor, the prioritizing mechanism to prioritize the one or more selecting rules; and a selecting mechanism operating with the processor, the selecting mechanism to select the key holder based on the determined rules and their corresponding priorities. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer-readable storage medium storing embedded instructions that are executed by one or more mechanisms implemented within a network device to perform a plurality of operations comprising:
-
detecting at least one of a roaming pattern and a connection pattern of one or more wireless clients in the wireless network based on requests received from the wireless clients; determining one or more mechanisms for selecting a key holder for the wireless client among a plurality of network devices; prioritizing the one or more selecting rules; and selecting the key holder based on the determined rules and their corresponding prioritization.
-
Specification