Abstract:
An apparatus and method for configuring a wireless station for use within a wireless local area network are disclosed. In at least one exemplary embodiment, a pairwise master key is generated by the wireless station and an access point within the wireless local area network. The pairwise master key may be based, at least in part, on a transient identity key pair of the wireless station. The transient identity key pair may be generated by the wireless station in response to receiving a message from the access point. In some embodiments, a public transient identity key of the transient identity key pair may be provided to additional access points to enable the wireless station to authenticate with the additional access points.
Abstract:
Aspects of the disclosure are related to a method, apparatus, and system for dynamic register virtualization, comprising: detecting a subroutine call; generating a register virtualization mapping for the subroutine call; applying the register virtualization mapping to instructions within the subroutine call; detecting a return of the subroutine call; and stopping the register virtualization mapping for the subroutine call at the return of the subroutine call.
Abstract:
A system and method for distributed storage and/or management of network credentials in a wireless network. A first device of the wireless network receives a set of network credentials from a first configurator. The network credentials may be used to authorize one or more devices to access the wireless network. The first device further receives a user authentication credential from a second device, and authenticates the second device as a second configurator for the wireless network based at least in part on the user authentication credential. Upon authenticating the second device as the second configurator, the first device may then transmit the set of network credentials to the second configurator.
Abstract:
A remote station is configured with a certificate from a local root certificate authority for securing a wireless network. To configure the certificate, the remote station forwards a station public key to the local root certificate authority. The station public key is forwarded out-of-band of the wireless network. The remote station receives a certificate and a root public key from the local root certificate authority. The certificate is generated by the local root certificate authority based on the forwarded station public key, and the certificate and the root public key are received out-of-band of the wireless network. The remote station securely communicates, using the wireless network, with another station based on the certificate and the root public key.
Abstract:
An integrated circuit may comprise a secure volatile memory configured to store first data-validity information associated with first data stored in an external nonvolatile memory; and a secure processor configured to: retrieve the first data-validity information from a secure remote server over a secure communication channel, wherein the secure processor uses mutual authentication with the secure remote server to secure the secure communication channel; store the first data-validity information in the secure volatile memory; retrieve the first data from the external nonvolatile memory; obtain second data-validity information associated with the first data; compare the first data-validity information stored in the secure volatile memory with the second data-validity information to generate a comparison value; and determine, based on the comparison value, whether the first data is valid.
Abstract:
Device provisioning (e.g., enrollment, configuration, and/or authentication) of a client device with a network device may be assisted using a configurator device. The configurator device may obtain a client public key associated with the client device and send the client public device to the network device. The network device may use the client public key in an authentication process between the network device and the client device. Following the authentication process, the client device may be configured for use with the network device to gain access to other network resources. In this manner, permission to gain access to the network device can be transparent to the user, often without the user having to enter codes or passwords.
Abstract:
A configuration device is disclosed for configuring a network device in a communication network. The configuration device initiates pairing operations with the network device via a short-range communication connection. The configuration device determines whether the network device is in a registered state or an unregistered state. If the configuration device determines that the network device is in the unregistered state, the configuration device establishes a secure short-range communication channel between the configuration device and the network device. The configuration device transmits a network key to the network device via the secure short-range communication channel for configuring the network device to communicatively connect to the communication network. If the configuration device determines that the network device is in the registered state, the configuration device determines whether to unregister the network device.
Abstract:
A system comprises an access point and a client device. The access point receives, using near field communication (NFC) technology, a public key associated with the client device and sends, using NFC technology, a public key associated with the access point. The access point further encrypts configuration data associated with a network and sends the encrypted configuration data to the client device. The client device receives, using NFC technology, a command indicating that a public key associated with the client device is to be sent to the access point and sends, using NFC technology, the public key to the access point. The client device further receives, using NFC technology, a public key associated with the access point and configures the client device to wirelessly connect to a network associated with the access point.
Abstract:
Device provisioning (e.g., enrollment, configuration, and/or authentication) of a client device with a network device may be improved. A client device may receive a first nonce and a network public key associated with the network device. The client device may generate a second nonce and provide the second nonce with an authentication request having at least a portion that is derived from a shared key. The shared key may be based on the first nonce, the second nonce, the network public key, and a client private key. A configurator device may assist in the transfer of nonces or keys. Following the authentication process, the client device may be configured for use with the network device to gain access to other network resources. In this manner, permission to gain access to the network device can be transparent to the user, often without the user having to enter codes or passwords.
Abstract:
An apparatus and method for configuring a wireless station for use within a wireless local area network are disclosed. In at least one exemplary embodiment, a pairwise master key is generated by the wireless station and an access point within the wireless local area network. The pairwise master key may be based, at least in part, on a transient identity key pair of the wireless station. The transient identity key pair may be generated by the wireless station in response to receiving a message from the access point. In some embodiments, a public transient identity key of the transient identity key pair may be provided to additional access points to enable the wireless station to authenticate with the additional access points.