Multiband/Multilink Secure Key Generation and Delivery Protocol

A multi-link, link technology, applied in the field of security and encryption, which can solve problems such as key reuse attacks

Inactive Publication Date: 2011-12-07
INTEL CORP
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Alternatively, if encryption and security are performed for one band of operation, and the generated keys from this configuration are used in other bands of operation, then one is subject to a key reuse attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiband/Multilink Secure Key Generation and Delivery Protocol
  • Multiband/Multilink Secure Key Generation and Delivery Protocol
  • Multiband/Multilink Secure Key Generation and Delivery Protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] overview

[0021] In a wireless communication device in which a device may operate as either or both a verifier or a supplicant, a secure key generation and delivery protocol is implemented for operation in multiple bands / multiple links. In one implementation, the IEEE 802.11 key management and delivery protocol can be extended to work in a multi-band environment, where a different cipher suite can be used in each of the different frequency bands. For example, the techniques and mechanisms can be implemented to be compatible with existing IEEE 802.11 key generation and delivery protocols used in the 2.4 / 5GHz bands of operation. Additionally, provision is made for concurrent operation or dynamic switching between 2.4GHz / 5GHz and 60GHz multi-link operation. Specifically, a single 4-way handshake between devices is used to allow interfaces of different frequency bands (eg 2.4 / 5GHz and 60GHz) to obtain keys.

[0022] network implementation

[0023] figure 1 An exemp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method is described for negotiating the use of multi-link ciphering and for the generation of unique keys for each of the links using a single 4-way handshake protocol exchange.

Description

technical field [0001] This application relates to security and encryption techniques, and more particularly, to multi-band / multi-link secure key generation and delivery protocols. Background technique [0002] The wireless communication protocols used by computing device(s) can operate or transmit using different carrier frequencies. For example, transmissions can be made using a carrier frequency at or around 2.4 GHz, at or around 5 GHz, or in the higher 60 GHz band. The IEEE802.11 standard defines protocols for operation in these frequency bands. In some cases, devices can communicate with each other in a lower frequency band (eg, 2.4GHz or 5GHz), while in some cases, communication can occur in a higher frequency band (eg, 60GHz). Communications in lower frequency ranges can be used when devices are farther apart from each other, while higher frequency bands can be used to allow greater data transfer between devices when they are closer together. In exemplary operation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/04
CPCH04L9/08H04L63/061H04L2209/80H04L9/06H04L63/0478H04W12/02H04W12/04H04L2463/061H04L9/0637H04L9/0844H04W12/50
Inventor E·H·齐J·沃克R·斯塔西
Owner INTEL CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products