Abstract:
PROBLEM TO BE SOLVED: To solve the problem wherein beacon collisions among two or more mesh access points and a packet transfer when power saving (PS) mesh points exist, are generated between a small number of area which needs to be transmitted. SOLUTION: A method is utilized by the mesh points and is equipped for forming either beacon or one synchronization performance field in a probe response. A synchronous performance field comprises an instruction for whether supporting the mesh point synchronization, an instruction for whether the mesh points require synchronization from peer mesh points, and an instruction for whether the mesh point is already synchronized with one or more peers. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
A method and apparatus for establishing security associations between nodes of an ad hoc wireless network includes two authentication steps: an initial first contact step (authentication, authorization, and accounting (AAA)-based authentication), and a "light-weight" step that reuses key material generated during first contact. A mesh authenticator within the network provides two roles. The first role is to implement an 802.1X port access entity (PAE), derive transient keys used for encryption with a supplicant mesh point via a four-way handshake and take care of back end communications with a key distributor. The second role is as a key distributor that implements a AAA-client and derives keys used to authenticate a mesh point during first contact or fast security association. The key distributor and the on-line authentication server can communicate to one another without these messages being transported over mesh links.
Abstract:
Un método para control de admisión basado en prioridad en una red, el método que comprende: recibir (401) una petición de admisión para transmitir un flujo de información a una red a través de un canal decomunicación que tiene una gama de tasas de datos de canal;obtener (402) una prioridad del flujo de información, en donde la prioridad del flujo de informació n es una de unapluralidad de prioridades de flujo de información; dividir la gama de tasas de datos del canal en una pluralidad de regiones no solapadas; determinar (407) una región admisible dentro de una gama de tasas de datos de canal del canal decomunicación en respuesta a la prioridad del flujo de información, en donde la región admisible es una de unapluralidad de regiones admisibles dentro de la gama de tasas de datos de canal que corresponde a unasdiferentes de la pluralidad de prioridades de flujo de información, respectivamente, y cada una de la pluralidad deregiones admisibles es utilizable para transmitir el flujo de información con una respectiva de la pluralidad deprioridades; determinar (409) una tasa de datos de canal disponible del canal de comunicación para recibir el flujo deinformación por la red; y conceder (410) la petición de admisión para transmitir el flujo de información después de determinar que la tasade datos de canal disponible del canal de comunicación está dentro de la región admisible de la gama de tasasde datos de canal, en donde determinar una región admisible dentro de la gama de tasas de datos de canalcomprende seleccionar un grupo de regiones no solapadas como la región admisible.
Abstract:
Un método y aparato para establecer asociaciones de seguridad entre nodos de una red inalámbrica ad hoc incluye dos pasos de autenticación: un primer paso de contacto inicial (autenticación, autorización y autenticación basada en estadística (AJA - authentication, authorization, and accounting-based authentication)), y un paso "de peso ligero" que reutilizar el material de claves generado durante el primer contacto. Un autenticador de malla dentro de la red proporciona dos roles. El primer rol es implementar una entidad de acceso de puerto 802.lX (PAE - port access entity), derivar las claves transitorias utilizadas para la encriptación con un punto de malla solicitante mediante una sincronización inicial de cuatro vías y se encarga de las comunicaciones posteriores con un distribuidor de claves. El segundo rol es un distribuidor de claves que implementa un cliente A?IA y deriva las claves utilizadas para autenticar un punto de mella durante el primer contacto o asociación de seguridad rápida. El distribuidor de claves y el servidor de autenticacián en línea pueden comunicarse uno con otro sin que estos mensajes sean transportados por los enlaces de malla.
Abstract:
The disclosure relates to techniques and technologies for establishing a secure link between a mesh authenticator and a mesh key distributor for tran sporting security association messages. The secure link can allow the mesh k ey distributor to communicate results of an authentication process to the me sh authenticator.
Abstract:
A mobile station (106) establishes a real time communication link via an access point (102) for carrying voice or other time-sensitive data. A WLAN subsystem (204) of the mobile station is normally kept in a low power state. Upon initiating a communication link the mobile station signals to the acces s point that uplink poll-based power save delivery mode will be used (614), an d the access point reserves resources to assure the necessary quality of service. The mobile station initiates a frame transaction by first powering up the WLAN subsystem (712), acquiring the WLAN channel (407), and transmitting a polling frame. Upon successful receipt of the polling frame the access point prepares to reply with a response frame at an unspecified time within servic e window, during which time the mobile station maintains the WLAN subsystem power up and ready to receive the response frame. Upon successful receipt of the response frame, the mobile station places the WLAN subsystem back into a low power state.
Abstract:
A mesh station applying for access to a network includes a list of peer stations in messages of an authenticated key establishment protocol. A mesh key distributor derives a key delivery key and generates a top level key, and then delivers the top level key to the mesh station. Following the key establishment protocol, the mesh key distributor also creates pairwise keys for use between the mesh station and the peer stations listed in its peer list. The list of peers permits the identifier for the peer to be bound into the derived key, which helps ensure that the key used between each pair of peers is unique. Once the mesh key distributor finishes creating a key for one of the stations on the peer list, the mesh key distributor sends a message to the peer to initiate a key push.
Abstract:
A method and apparatus for providing a key for secure communications is provided herein. During operation a node wishing to join a network, will authenticate with an authentication server and then derive a pairwise key (e.g., a Pair-wise Transient Key (PTK)) used for encryption of unicast traffic. The node will also create its own group transient key (GTK) for use in encrypting multicast or broadcast traffic. Once the GTK is generated, it will be provided to an authenticator as part of an association request message.
Abstract:
The disclosure relates to techniques and technologies for establishing a secure link between a mesh authenticator and a mesh key distributor for transporting security association messages. The secure link can allow the mesh key distributor to communicate results of an authentication process to the mesh authenticator.