Patent application number | Description | Published |
20150127949 | SYSTEM AND METHOD FOR INTEGRATED MESH AUTHENTICATION AND ASSOCIATION - Systems and methods for more efficient mesh associations are disclosed. In some aspects, a non-member device may join a mesh network via a four way message exchange with any member device of the mesh network. The four way message exchange between the mesh member device and the non-member device provides for authentication and association between the two devices. As a result of the four way message exchange, a common group key is provided to the non-member device. The common group key is utilized by all mesh member devices to encrypt and decrypt group addressed mesh messages exchanged between any of the mesh member devices. Association identifiers for each of the two devices are also provided during the exchange. PHY/MAC capabilities may also be exchanged. In some aspects, IP address assignment for the two devices may also be accomplished during the four way message handshake. | 05-07-2015 |
20150245202 | SECURE DISTRIBUTION OF A COMMON NETWORK KEY IN A WIRELESS NETWORK - Methods, devices, and systems are described to enable generating and securely distributing a common network key in a wireless network. For example, instead of each station of the wireless network generating a station-specific group network key, a particular station may generate and securely transmit a common network key to be used by multiple stations in the wireless network to decrypt group messages from multiple stations in the wireless network. | 08-27-2015 |
20150257096 | FAIRNESS-BASED MESSAGE TRANSMISSION IN A WIRELESS NETWORK - Methods, devices, and systems are described to enable fair message transmission and to reduce maximum power consumption of stations in a wireless network. For example, a first station of the wireless network may transmit a message including a first neighbor list to a second station of the wireless network. The first neighbor list may identify one or more stations within a particular range of the first station. The second station may selectively transmit, based on a comparison between the first neighbor list and a second neighbor list and a random countdown, a copy of the message including the second neighbor list to another station of the wireless network. The second neighbor list may identify one or more stations within a particular range of the second station. | 09-10-2015 |
20150281952 | SECURE AND SIMPLIFIED PROCEDURE FOR JOINING A SOCIAL WI-FI MESH NETWORK - Methods, systems, and devices are described for communications via a mesh network. To join an existing mesh network, a wireless communication device may identify a member device from a plurality of member devices of an existing mesh network. The wireless communication device may communicate with the identified member device to participate in a single authentication procedure. Upon successfully completing the single authentication procedure, the wireless communication device may join the existing mesh network without needing any additional authentication procedures with another member device of the plurality of member devices to join the existing mesh network. This approach may be used for any mesh network, such as a social Wi-Fi mesh network. | 10-01-2015 |
20150334629 | REDUCING BROADCAST DUPLICATION IN HYBRID WIRELESS MESH PROTOCOL ROUTING - Methods, systems, and devices related to wireless communication via a mesh network are described. In particular, the disclosure is directed to selecting a path between two nodes in a wireless mesh network based on consideration of type of data requested and a determination whether an intermediate node, within a predetermined range of the requesting node, is actively broadcasting the requested data. Such opportunistic consideration in selecting a path between two nodes may avoid unnecessary activation of additional broadcasting nodes and reduce the risk of triggering interference between multiple nodes broadcasting duplicate data. | 11-19-2015 |
20150334631 | ESTABLISHING RELIABLE ROUTES WITHOUT EXPENSIVE MESH PEERING - A device may join an existing mesh network by authenticating with only one of a plurality of member devices of the existing mesh network. Once the device has successfully authenticated with the only one member device, the device may receive a common group key. The device may send a route request message encrypted with the common key to one or more of the plurality of member devices of the existing mesh network. In response, the device may receive one or more route reply messages encrypted with the common key from one or more of the plurality of member devices of the existing mesh network. The device may determine an optimal route to one or more provider member devices of the existing mesh network based on the received route reply messages. | 11-19-2015 |
20150350906 | SYSTEMS AND METHODS FOR SELECTIVE ASSOCIATION - A particular method includes sending, from a first device to a second device of a data link group, a path request encrypted using a group key of the data link group. The method further includes receiving, at the first device from the second device, a path reply that is responsive to the path request. The method includes selecting the second device for association based on the path reply and associating, by the first device, with the second device. | 12-03-2015 |
20160094542 | ON-DEMAND SERVING NETWORK AUTHENTICATION - A method, an apparatus, and a computer program product for wireless communication are provided. A method includes transmitting a request to a serving network with a nonce and a signature request directed to a network function of the serving network, receiving a response to the request from the serving network, and authenticating the serving network based on the signature of the network function. The nonce may provide replay protection. The response may include a signature of the network function. The request sent to the serving network may include a radio resource control (RRC) message or a tracking area update (TAU) request. The serving network may be authenticated using a trusted third party to verify a certificate associated with the serving network. | 03-31-2016 |
20160094988 | SERVING NETWORK AUTHENTICATION - A method, an apparatus, and a computer program product for wireless communication are provided. The method may include establishing a connection with a serving network, transmitting an encrypted authentication credential that includes a randomly selected key encryption key (KEK) and a serving network identifier to the serving network, receiving authentication information and a signature from the serving network, and authenticating the serving network by verifying the signature based on the KEK. The encrypted authentication credential may be operative to identify the serving network. The signature may be generated using the KEK. | 03-31-2016 |
20160112869 | METHODS AND SYSTEMS FOR AUTHENTICATION INTEROPERABILITY - Systems, methods, and computer readable mediums for authenticating a device perform a method of receiving, at a second device, a first authentication protocol reauthentication response for the device, the authentication response including a reauthentication master session key (rMSK), transmitting, at the second device, a second first authentication protocol reauthentication response to a first access point based on the reauthentication master session key, generating, at the second device, a first pairwise master key (PMK) based on the reauthentication master session key, generating, at the second device, a key message to include the first pairwise master key, and transmitting, at the second device, the key message to the second access point. | 04-21-2016 |