AUTHENTICATION FOR RELAY DEPLOYMENT
First Claim
1. An apparatus for communication, wherein the apparatus is configured to be associated with a second apparatus and the apparatus is configured to be authenticated to a server, the apparatus comprising:
- a first communication device configured to receive a cryptographic master key from the server; and
a second communication device configured to send the cryptographic master key to the second apparatus.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for proving enterprise mode security for relays are disclosed. For example, enterprise mode security based on IEEE 802.1x is provided for relays or other similar devices to extend the coverage of access point hotspots or other similar access point use cases. According to one aspect, a relay incorporates an authentication client associated with an authentication server. According to another aspect, a four address format is employed for tunneling messages via a relay between a station and an access point. According to another aspect, a cryptographic master key associated with an access point and a station is provided to a relay to enable the relay to be an authenticator for the station.
19 Citations
30 Claims
-
1. An apparatus for communication, wherein the apparatus is configured to be associated with a second apparatus and the apparatus is configured to be authenticated to a server, the apparatus comprising:
-
a first communication device configured to receive a cryptographic master key from the server; and a second communication device configured to send the cryptographic master key to the second apparatus. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of communication, wherein a first apparatus is associated with a second apparatus and the first apparatus is authenticated to a server, the method comprising:
-
receiving, by the first apparatus, a cryptographic master key from the server; and sending the cryptographic master key to the second apparatus. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus for communication, wherein a second apparatus is configured to be associated with the apparatus, and the apparatus is configured to be associated with a third apparatus, the apparatus comprising:
-
a communication device configured to receive a cryptographic master key from the second apparatus, wherein the cryptographic master key is from a server associated with the second apparatus; and a processing system configured to use the cryptographic master key to establish secure communication with the third apparatus over a wireless channel. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method of communication, wherein a first apparatus is associated with a second apparatus, and the second apparatus is associated with a third apparatus, the method comprising:
-
receiving, by the second apparatus, a cryptographic master key from the first apparatus, wherein the cryptographic master key is from a server associated with the first apparatus; and using the cryptographic master key to establish secure communication with the third apparatus over a wireless channel. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
Specification