Abstract:
PROBLEM TO BE SOLVED: To achieve end-to-end security with traffic visibility. SOLUTION: A combined encryption-authentication unit includes a cipher unit and an authentication unit coupled in parallel to the cipher unit, and generates an authentication tag by using an authentication key, in parallel with the generation of the cipher text using an encryption key, where the authentication key and the encryption key have different key values. In various embodiments, the cipher unit operates in AES counter mode, and the authentication unit operates in parallel, in an AES-GMAC mode. Using a two key, single-pass combined mode algorithm preserves network performance by using a limited number of HW gates, while allowing an intermediate device to access to the encryption key for deciphering the data, without having to provide to that device the ability to compromise data integrity, which is preserved between the end to end devices. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To construct a system for achieving both end-to-end security and traffic visibility. SOLUTION: Both end-to-end security and traffic visibility can be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes derivation key to information technology monitoring devices and a server to provide traffic visibility. Furthermore, a client key and a client identifier can also be used so that end-to-end security can be achieved. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
A system and method for negotiating a pairwise master key ('PMK') in wireless mesh networks. The system includes a plurality of mesh points that are configured to perform an abbreviated handshake protocol in negotiating a PMK and establishing a secure connection. The method for establishing a negotiated PMK is based on selecting a PMK before transmitting any data, and arranging available PMKs in a predetermined list so that a PMK can be negotiated in a limited number of exchanges.
Abstract:
In a processor based system comprising a plurality of logical machines, selecting a logical machine of the system to serve as a host; the host communicating with a policy decision point (PDP) of a network to provision a data channel interconnecting the processor based system and the network and to provision a logical data channel interconnecting each logical machine of the system to the network.
Abstract:
In one embodiment, methods and apparatus to protect management frames are generally described herein. Other embodiments may be described and claimed.
Abstract:
Systems and methods provide a mechanism for wireless stations and access points to negotiate security parameters for protecting management frames. The access point and station determine which management frames they are capable of and desire to protect. Data indicating protected frames are then exchanged between the station and access point to select which management frames are to be protected and a protection mechanism to be used for protecting the management frames.
Abstract:
The present invention provides a method of pre- allocating and communicating IP address information during wireless communication by an access point, comprising pre-caching by said AP a predetermined number of IP addresses from a backend Dynamic Host Configuration Protocol (DHCP) server. An embodiment may further comprise providing by said AP an IP subnet roaming information element that provides the IP Address that a wireless station (STA) will be obtaining if a wireless station (STA) roams to a particular AP and providing by said AP an IP subnet roaming information element that provides an IP subnet mask that determines the network address and host address portion of the IP addresses and providing by said AP provides an IP subnet roaming information element that provides that provides a Default gateway router address.
Abstract:
Embodiments provide techniques for device power management in wireless networks. For instance, an apparatus may include a power management module, and a transceiver module. The power management module determines a beacon interval and a wakeup interval. The transceiver module to send a transmission to one or more remote devices that includes the beacon interval and the wakeup interval. The beacon interval indicates a time interval between consecutive beacon transmissions of the apparatus, and the wakeup interval indicates a time interval between when the apparatus receives two consecutive beacons from a peer device.
Abstract:
Embodiments of a mobile station and method for fast roaming in a wireless network using a fast-roaming protocol are generally described herein. Other embodiments may be described and claimed. In some embodiments, the fast-roaming protocol has a predetermined structure including an integrity check which remains independent of the route taken by messages.
Abstract:
In an embodiment, a method includes registering applications and network services for notification of an out-of-band introduction, and using the out-of-band introduction to bootstrap secure in-band provisioning of credentials and policies that are used to control subsequent access and resource sharing on an in-band channel. In another embodiment, an apparatus implements the method.