摘要:
A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatibly configure the computer system for accessing the first network.
摘要:
Disclosed are methods for a client, having established one set of security keys, to establish a new set without having to communicate with an authentication server. When the client joins a group, master session security keys are derived and made known to the client and to the group's access server. From the master session security keys, the access server and client each derive transient session security keys, used for authentication and encryption. To change the transient session security keys, the access server creates “liveness” information and sends it to the client. New master session security keys are derived from the liveness information and the current set of transient session security keys. From these new master session security keys are derived new transient session security keys. This process limits the amount of data sent using one set of transient session security keys and thus limits the effectiveness of any statistical attacker.
摘要:
Network devices access a communications network and engage in secure associations with one or more network access points upon authenticating the access points and upon verifying the discovery information that is broadcast by the access point. Once a secure association is created, management frames that are subsequently transmitted between the network devices and the access points and that are used to control the secure association are verified to further enhance the security of the communications network.
摘要:
The principles of the present invention relate to systems, methods, and computer program products for more efficiently and securely authenticating computing systems. In some embodiments, a limited use credential is used to provision more permanent credentials. A client receives a limited-use (e.g., a single-use) credential and submits the limited-use credential over a secure link to a server. The server provisions an additional credential (for subsequent authentication) and sends the additional credential to the client over the secure link. In other embodiments, computing systems automatically negotiate authentication methods using an extensible protocol. A mutually deployed authentication method is selected and secure authentication is facilitated with a tunnel key that is used encrypt (and subsequently decrypt) authentication content transferred between a client and a server. The tunnel key is derived from a shared secret (e.g., a session key) and nonces.
摘要:
A wireless access point may be configured to advertise, to mobile user devices, multiple wireless networks available through the wireless access point. For example, service set identifiers (SSIDs) may be specified within an information element (IE) of a communication such as, for example, an 802.11 beacon, broadcasted to mobile user devices. Such an IE may utilize the capability provided by IEEE 802.11 itself to use additional and flexible numbers of information elements within a beacon. Accordingly, networks that would otherwise remain hidden due to limitations of known wireless access points are made visible to mobile user devices. Configuring a wireless access point to advertise multiple available wireless networks, for example, by firmware upgrades, may serve as a viable and cost-effective interim solution and/or alternative to replacing a wireless access point with a wireless access point configured to implement virtual wireless access points.
摘要:
A method and system for managing power consumption in a portable computing device having a network interface module is presented. A power management module receives inputs from other modules and determines when the network interface module is to be put in a doze state for a predetermined number of beacon intervals to conserve power consumption in the network interface module. The network interface module in a device that is associated with a network is put in the doze state after an event has occurred including when a scan has been performed, after a delayed sleep timer has expired, and after a beacon transmission has been completed and no traffic is buffered for the device. The delayed sleep time is set based on the estimated round trip time of a packet.
摘要:
A method and system for managing power consumption in a portable computing device having a network interface module is presented. A power management module receives inputs from other modules and determines when the network interface module is to be put in a doze state for a predetermined number of beacon intervals to conserve power consumption in the network interface module. The network interface module in a device that is associated with a network is put in the doze state after an event has occurred including when a scan has been performed, after a delayed sleep timer has expired, and after a beacon transmission has been completed and no traffic is buffered for the device. The delayed sleep time is set based on the estimated round trip time of a packet.
摘要:
A method and system for managing power consumption in a portable computing device having a network interface module is presented. A power management module receives inputs from other modules and determines when the network interface module is to be put in a doze state for a predetermined number of beacon intervals to conserve power consumption in the network interface module. The network interface module in a device that is associated with a network is put in the doze state after an event has occurred including when a scan has been performed, after a delayed sleep timer has expired, and after a beacon transmission has been completed and no traffic is buffered for the device. The delayed sleep time is set based on the estimated round trip time of a packet.
摘要:
A wireless access point may be configured to advertise, to mobile user devices, multiple wireless networks available through the wireless access point. For example, service set identifiers (SSIDs) may be specified within an information element (IE) of a communication such as, for example, an 802.11 beacon, broadcasted to mobile user devices. Such an IE may utilize the capability provided by IEEE 802.11 itself to use additional and flexible numbers of information elements within a beacon. Accordingly, networks that would otherwise remain hidden due to limitations of known wireless access points are made visible to mobile user devices. Configuring a wireless access point to advertise multiple available wireless networks, for example, by firmware upgrades, may serve as a viable and cost-effective interim solution and/or alternative to replacing a wireless access point with a wireless access point configured to implement virtual wireless access points.
摘要:
A method and system for managing power consumption in a portable computing device having a network interface module is presented. A power management module receives inputs from other modules and determines when the network interface module is to be put in a doze state for a predetermined number of beacon intervals to conserve power consumption in the network interface module. The network interface module in a device that is associated with a network is put in the doze state after an event has occurred including when a scan has been performed, after a delayed sleep timer has expired, and after a beacon transmission has been completed and no traffic is buffered for the device. The delayed sleep time is set based on the estimated round trip time of a packet.