throbber
US007039021B1
`
`(12) United States Patent
`Kokudo
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,039,021 B1
`May 2, 2006
`
`(54) AUTHENTICATION METHOD AND
`APPARATUS FOR AWIRELESS LAN
`SYSTEM
`
`O
`O
`75
`(75) Inventor: Junichi Kokudo, Tokyo (JP)
`
`(73) Assignee: NEC Corporation, Tokyo (JP)
`(*) Notice:
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 615 days.
`(21) Appl. No.: 09/680,258
`
`Oct. 5, 2000
`22) Filed:
`c. 5,
`(22) File
`Foreign Application Priority Data
`(30)
`Oct. 5, 1999
`(JP)
`................................. 11-284231
`(51) Int. Cl.
`(2006.01)
`H04B 7/00
`(52) U.S. Cl. ....................................... soloss
`(58) Field of Classification Search ................ 370/310,
`370/338,349,389, 469, 475,522; 379/91.01,
`379/93.02, 93.03, 142.05, 142.06; 713/150,
`713/151,152, 153, 155, 158, 168; 380/247,
`380/248, 249,277,278; 455/431.1, 411,
`455/410, 432: 340/825.34
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`5,586,260 A 12, 1996 Hu ............................. T13 201
`5,673,318 A
`9, 1997 Bellare et al............... 713/170
`5,796,727 A :
`8, 1998 Harrison et al. ............ 370,338
`6,052,785 A
`4/2000 Lin et al..................... T13 201
`6,148,405 A * 1 1/2000 Liao et al. .................. T13 201
`6,272,148 B1* 8/2001 Takagi et al. ............... 370/469
`6,307,837 B1 * 10/2001 Ichikawa et al. ........... 370,230
`6,332,077 B1 * 12/2001 Wu et al. ................ 455,432.1
`6,345,043 B1
`2/2002 Hsu ........................... 370,324
`
`6,400,722 B1* 6/2002 Chuah et al. ............... 370/401
`6,453,159 B1* 9/2002 Lewis ...........
`... 455,411
`6,526,506 B1* 2/2003 Lewis ...........
`... T13,153
`6,574.466 B1* 6/2003 Papini et al. .....
`... 455,410
`6,600,734 B1* 7/2003 Gernert et al. ....
`... 370,352
`6,606,663 B1* 8/2003 Liao et al. .....
`... 709,229
`6,636,894 B1 * 10/2003 Short et al. ....
`... 709,225
`6,701,361 B1* 3/2004 Meier ...............
`... 709,224
`6,801,941 B1 * 10/2004 Steph
`tal. ............ 709,225
`epnens et a
`FOREIGN PATENT DOCUMENTS
`11-2521.83
`9, 1999
`11-265.349
`9, 1999
`
`JP
`JP
`
`OTHER PUBLICATIONS
`5 GHz Band Ethernet Tipe Wireless LAN System, NTT
`R&D, vol. 48, pp. 15-21, dated Aug. 10, 1999.
`* cited by examiner
`Primary Examiner Hanh Nguyen
`Ast Exity Sata Mion, PLLC
`(74) Attorney, Agent, or Firm Sughrue Mion,
`t
`f
`(57)
`ABSTRACT
`
`An authentication method and apparatus at a wireless LAN
`(local area network) system based on the IEEE 802.11, in
`which many STAs (terminal stations) are connected to APs
`(access points), and which can keep the security in authen
`tication, is provided. At the authentication method, an
`authentication request from one of the STAS composed of a
`data terminal and a wireless LAN card is transmitted to one
`of the APs. The AP transmits a MAC (media access control)
`address of the STA to an authentication server by converting
`the authentication request to a protocol adaptable to the
`authentication server. The authentication server checks the
`MAC address and transmits a challenge message to the AP
`2. The AP2 executes encryption authentication with the STA
`based on a WEP (wired equivalent privacy) algorithm stipu
`lated in the IEEE 802.11
`aC 1
`.
`.
`.
`.
`.
`
`10 Claims, 6 Drawing Sheets
`
`WIRED
`NETWORK
`6
`4
`MAINTENANCE
`
`SERVER
`
`AUTHENTICATION
`SERVER
`
`
`
`STA 1
`
`WIRELESS
`30
`10
`DATA WRESS NEMORK
`TERMINAL CR - - -
`
`
`
`-
`
`
`
`STA 1
`
`STA 1
`
`20 /
`:
`10
`DATA WIRELESS
`LAN
`TERMINAL
`
`
`
`2O
`DATA WIREESS
`LAN
`TERMINAL
`R.
`
`1
`
`Comcast, Ex. 1231
`
`

`

`U.S. Patent
`U.S. Patent
`
`May 2, 2006
`May 2, 2006
`
`Sheet 1 of 6
`Sheet 1 of 6
`
`US 7,039,021 B1
`US 7,039,021 B1
`
`
`
`moz<2522:
`
`mm>mmm
`
`
`
`$2mos:_.0HI._
`
`2
`
`
`

`

`U.S. Patent
`
`May 2, 2006
`
`Sheet 2 of 6
`
`US 7,039,021 B1
`
`F I. G. 2
`PRIOR ART
`
`STA
`
`AP
`
`AUTHENTICATION
`REQUEST TO AP
`
`
`
`
`
`WEP(GENERATE TEXT)
`
`
`
`(S3) WEP(ENCRYPT)
`
`
`
`
`
`
`
`SUCCESSFUL CODE
`(S6)
`
`ASSOCIATION
`
`3
`
`

`

`mm
`
`Sheet 3 of 6
`
`US 7,039,021 B1
`
`POmmoHL
`
`tSE;
`xmoamz85mm;82
`
`
`
`
`8”..de<20mxmoghmz 2,87225222_w25:2sz:5Mm,
`
`
`zoP<onwIH3<
`
`mm>mmw
`
`AHV@8de<25
`
`._<z=2mmfi
`_Sm
`
`om
`
`2
`
`mmmdmg<20
`$30223%:
`
`ONor
`
`F{Fm
`
`4
`
`
`
`
`

`

`U.S. Patent
`
`May 2
`
`9
`
`2006
`
`Sheet 4 of 6
`
`US 7,039,021 B1
`
`9C (JEANES
`
`0 | ídC][] 0
`
`NOLLWOLLNEH10\/
`
`
`
`
`
`
`
`
`
`7 '0 I -
`
`SS3:00' 07" (ÎNio), ss500
`
`
`
`
`NWT SSETENJIM Z d\/
`
`|dWOL/CHI
`
`dWNS | §§
`|NETTO
`
`LENÈJEH13
`
`ETEWO
`
`
`
`(TWNIWYJEI NWT SSETEHIM) | W/1S
`
`N. Y.
`
`Ya
`
`Ya
`
`dWNS
`
`CHWOL/CHI
`
`Yn N N
`
`NOLLWOLLNEHITY/
`
`5
`
`

`

`U.S. Patent
`
`May 2, 2006
`
`Sheet S of 6
`
`US 7,039,021 B1
`
`F I. G. 5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`AUTHENTICATION
`AP 2
`SERVER 3
`(RADIUS CLIENT) (RADIUS SERVER)
`STA 1
`AUTENTICATION SET AP KEY
`REQUEST TO AP
`(S1)
`
`else (S9)
`
`MAC
`ADDRESS(S8)
`
`AjEcon
`WEP ALGORITHM
`
`MAC ADDRESS
`(S10)
`CHALLENGE
`MESSAGE
`
`
`
`WEP(GENERATE TEXT
`(S2
`CHALLENGE
`TEXT
`WEP(ENCRYPT)
`(S4)
`IV--ENCRYPTED
`CHALLENGE EXT
`
`
`
`RADIUS
`CHAP
`
`WEP(DECRYPT&COMPARE
`(S5)
`HALLENG ASF (S11)
`
`
`
`(S6)
`SUCCESSFUL
`CODE
`
`(S7)
`ASSOCIATION
`
`
`
`THENTICATION
`AU
`OMPLETED
`
`RENEW MAC
`
`ARRSESS
`(S13)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`6
`
`

`

`U.S. Patent
`
`May 2, 2006
`
`Sheet 6 of 6
`
`US 7,039,021 B1
`
`F I. G. 6
`
`SIA
`
`
`
`Ap
`
`AUTHENTICATION
`SERyER
`
`OPEN SYSTEM
`AUTHENTICATION
`REQUEST(S14)
`
`CHECK MAC ADDRESS
`
`(S17)
`RESPONSE: HASHED
`CHALLENGE TEXT
`
`2X
`
`- - - - - - - - - - - - - as as as as m me with
`
`Y
`
`-
`
`a
`
`(S19)
`SUCCESS CODE
`
`(S20)
`
`ASSOCATION
`
`COMMUNICATION
`(WITH TIME LIMIT)
`DEASSOCIATION
`(S21)
`
`7
`
`

`

`US 7,039,021 B1
`
`1.
`AUTHENTCATION METHOD AND
`APPARATUS FOR AWIRELESS LAN
`SYSTEM
`
`BACKGROUND OF THE INVENTION
`
`The present invention relates to an authentication method
`and apparatus at a wireless LAN (local area network)
`system, in particular, based on the IEEE (Institute of Elec
`trical and Electronics Engineers) 802.11.
`
`10
`
`DESCRIPTION OF THE RELATED ART
`
`2
`STA 1 encrypts the received challenge text by using the own
`shared key and an IV (initialization vector) based on the
`WEP algorithm (S3).
`And the STA 1 transmits the encrypted challenge text and
`the IV to the AP 2 (S4). The AP 2 decrypts the received
`encrypted challenge text by using the received encrypted
`challenge text, the IV, and the own shared key. And the AP
`2 compares the challenge text transmitted at the S2 with the
`decrypted challenge text obtained at the S4, and judges
`whether the two challenge texts are the same or not (S5).
`When the judged result is the same, the AP 2 transmits a
`Successful code as an authentication completed notice to the
`STA1, because the authentication has completed (S6). The
`STA 1 received the authentication completed notice transfers
`to association operation with the AP2CS7).
`At the open system authentication method, when the STA
`1 transmits an authentication request to the AP2, any special
`judging procedure is not executed, and an authentication
`result is transmitted from the AP 2 to the STA 1. This is a
`simple procedure.
`However, at the conventional wireless LAN system based
`on the IEEE 802.11, the authentication method and appara
`tus have the following problems.
`First, at the conventional wireless LAN system mentioned
`above, the AP 2 authenticates the MAC address. However,
`generally the main task of the AP2 is an interface function
`between the wireless network and the wired network, there
`fore there is a limit in hardware and software to execute the
`authentication function of the MAC address. Especially, it is
`difficult for the generally used AP 2 to provide a MAC
`address table of many STAs 1, for example, more than
`10000 STAs 1. Consequently, authenticating the MAC
`addresses for the many STAs 1 becomes difficult.
`Second, a card such as a PC card, in which hardware and
`firmware for controlling radio signals and an ID (identifier)
`are memorized, has been recently used in each terminal
`station in the wireless LAN system. In order to apply the
`shared key authentication method stipulated in the IEEE
`802.11 to this kind wireless LAN system, the shared key is
`also memorized in the card. In this case, the card is Small and
`easy to carry, and forgetting to leave the key or stolen the key
`will happen, therefore the probability that the key is used
`illegally becomes large, and a method to keep the security is
`required.
`Thirdly, after the authentication procedure is completed at
`the open system authentication method, the communication
`period after the association has no limitation, consequently,
`there is a possibility to be connected illegally, and the
`security becomes low.
`
`SUMMARY OF THE INVENTION
`
`It is therefore an object of the present invention to provide
`an authentication method and apparatus at a wireless LAN
`system, which can keep the security.
`According to the present invention, for achieving the
`object mentioned above, there is provided an authentication
`method at a wireless LAN (local area network) system. The
`authentication method provides the steps of transmitting an
`authentication request from a STA (terminal station) to an
`AP (access point), with which the STA desires to make
`association, requesting authentication of the authentication
`request from the AP to an authentication server, by convert
`ing the authentication request to a protocol adaptable to the
`authentication server, cheking the authentication request at
`the authentication server based on a MAC (media access
`control) address of the STA, executing encryption authen
`
`15
`
`A wireless LAN system based on the IEEE 802.11 has
`been developed. In the system, frequency bands Such as 2.4
`GHz or 5 GHZ can be used without license, therefore, it is
`important to keep security at the wireless network.
`At the chapter 8, Authentication and Privacy, in the IEEE
`802.11, Open system authentication method and Shared key
`authentication method used WEP (wired equivalent privacy)
`algorithm are stipulated, and either one of the Authentication
`methods is fixed and used in a wireless LAN system.
`FIG. 1 is a block diagram showing a conventional struc
`ture of a wireless LAN system based on the IEEE 802.11. In
`FIG. 1, a STA 1 is a terminal station and the plural STAs 1
`are provided in the wireless LAN system, and each STA 1 is
`a data terminal having transmitting and receiving functions
`for radio signals, such as a notebook size PC (personal
`computer).
`And an AP (access point) 2 has an interface function
`between a wireless network and a wired network, and also
`has transmitting and receiving functions for radio signals,
`and further provides firmware for controlling the radio
`signals and a MAC (medium access control) address authen
`tication function. And plural APs 2 are also provided in the
`wireless LAN system. A maintenance server 4 sets and
`controls the plural APs 2 by a SNMP (simple network
`management protocol).
`The connection between the STAs 1 and the APs 2 is a
`wireless network 5, and the connection between the APs 2
`and the maintenance server 4 is a wired network Such as
`Ethernet.
`First, referring to a drawing, the shared key authentication
`method is explained. FIG. 2 is a sequence diagram showing
`a conventional procedure of encryption authentication used
`the WEP algorithm stipulated in the IEEE 802.11. In FIG. 2,
`the encryption authentication used the WEP algorithm is
`executed in a MAC (media access control) being a sub-layer
`of a data link layer that is the second layer of an OSI (open
`system interconnection).
`The MAC controls access rights when data transmission
`requests from plural terminal stations compete with one
`another on a common transmission line, and distinguishes
`physical connecting points between the terminal stations and
`the transmission line, and forms frames, and executes error
`control on the transmission line, together with a physical
`layer being the first layer of the OSI.
`First, an authentication request is transmitted from a STA
`60
`1 to an AP2 by a radio signal (S1). At this time, bits showing
`the authentication request based on the shared key authen
`tication method are provided in a PDU (packet data unit)
`format. And a MAC address of the STA 1 is included in a
`MAC frame as a source address.
`Next, a challenge text is transmitted from the AP2, which
`is received the authentication request, to the STA 1 (S2). The
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`65
`
`8
`
`

`

`US 7,039,021 B1
`
`5
`
`10
`
`15
`
`3
`tication at the AP with the STA based on a designated
`encryption algorithm, and notifying an authentication
`completion from the authentication server to the AP, after the
`authentication server received a response of a completion of
`the encryption authentication from the AP
`According to the present invention, after the encryption
`authentication is normally completed, a table of the MAC
`address in the AP is renewed by an instruction from the
`authentication server.
`According to the present invention, in case that a trouble
`occurs at the authentication server, the AP itself executes
`authentication of the MAC address.
`According to the present invention, the encryption algo
`rithm uses a shared key having a predetermined usable
`period.
`According to the present invention, in case that the
`predetermined usable period of the shared key expired, the
`MAC address is authenticated by an open system authenti
`cation method, and at the open system authentication
`method, after association, a period of communication is
`limited to a designated short time, and a key is transported
`in the limited time by using such an Internet Key EXchange
`method of Public Key Infrastructure, and the authentication
`request is executed again by using the shared key.
`According to the present invention, the authentication
`algorithm is a WEP (wired equivalent privacy) algorithm
`stipulated in the IEEE 802.11.
`
`25
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The objects and features of the present invention will
`become more apparent from the consideration of the fol
`lowing detailed description taken in conjunction with the
`accompanying drawings in which:
`FIG. 1 is a block diagram showing a conventional struc
`ture of a wireless LAN system based on the IEEE 802.11;
`FIG. 2 is a sequence diagram showing a conventional
`procedure of encryption authentication used the WEP algo
`rithm stipulated in the IEEE 802.11;
`FIG. 3 is block diagram showing a system structure of an
`embodiment of an authentication apparatus of a wireless
`LAN system of the present invention;
`FIG. 4 is a diagram showing a protocol stack at each node
`of a control plane of the embodiment of the authentication
`apparatus of the wireless LAN system of the present inven
`tion;
`FIG. 5 is a sequence diagram showing an authentication
`procedure of a first embodiment of an authentication method
`of the wireless LAN system of the present invention;
`FIG. 6 is a sequence diagram showing an authentication
`procedure of a third embodiment of the authentication
`method of the wireless LAN system of the present invention.
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`
`Referring now to the drawings, embodiments of the
`present invention are explained in detail. FIG. 3 is block
`diagram showing a system structure of an embodiment of an
`authentication apparatus of a wireless LAN system of the
`present invention. In FIG. 3, a STA 1 is a terminal station
`and the plural STAs 1 are provided in the authentication
`apparatus of the wireless LAN system of the present inven
`tion. Each STA 1 consists of a data terminal 10 such as a
`notebook size PC, and a wireless LAN card 20 in which
`hardware and firmware for transmitting and receiving radio
`signals and for controlling the radio signals are provided.
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`And an AP2 has an interface function between a wireless
`network and a wired network, and also provides hardware
`and firmware for transmitting and receiving radio signals
`and for controlling the radio signals. And the AP 2 also
`provides a function for converting protocols so that the
`authentication protocol of the IEEE 802.11 and the protocol
`to authenticate the STA 1 are made to be adaptable to the
`authentication protocol of an authentication server. The
`plural APS 2 are also provided in the authentication appa
`ratus of the wireless LAN system of the present invention.
`An authentication server 3 is a server having an authen
`tication function, and usable MAC addresses of the STAs 1
`are registered in the authentication server 3 beforehand. At
`the embodiment of the present invention, a RADIUS (re
`mote authentication dial in user service) server having
`functions such as access for dialing up, authentication, and
`charging is used. However, the authentication server 3 is not
`limited to the RADIUS server. And the authentication server
`3 also has a function for executing the MAC address
`authentication by connecting to the APs 2.
`A maintenance server 4 is a server to set and control the
`APs 2 by the SNMP
`At the embodiment of the present invention, the authen
`tication server 3 and the maintenance server 4 are separated
`and independent, however, both functions can be installed in
`Ole SWC.
`The connection between the STAs 1 and the APs 2 is a
`wireless network 5, and the connection between the APs 2
`and the authentication server 3, and between the APs 2 and
`the maintenance server 4 is a wired network 6 Such as
`Ethernet.
`FIG. 4 is a diagram showing a protocol stack at each node
`of a control plane of the embodiment of the authentication
`apparatus of the wireless LAN system of the present inven
`tion.
`In FIG. 4, at the IEEE 802.11, the association and the
`authentication are handled as entities in the MAC being the
`sub layer of the data link layer. In the wireless network 5,
`encryption authentication is executed based on the IEEE
`802.11. When the AP 2 receives an authentication request
`from the wireless network 5, the AP 2 transfers the authen
`tication request to the authentication server 3. The authen
`tication server 3 executes authentication operation by using
`the RADIUS protocol.
`FIG. 5 is a sequence diagram showing an authentication
`procedure of a first embodiment of an authentication method
`of the wireless LAN system of the present invention. At the
`embodiment of the present invention, in addition to the
`encryption authentication used the shared key authentication
`method utilized the WEP algorithm stipulated in the IEEE
`802.11, an authentication used the MAC address is executed.
`Keys of the STAs 1 and the APs 2 are set beforehand, and
`usable MAC addresses of the STAs 1 are registered in the
`authentication server 3 beforehand.
`As explained in FIG. 3, at the embodiment of the authen
`tication apparatus of the wireless LAN system of the present
`invention, the wireless LAN card 20 is provided in the STA
`1, consequently, there is a possibility that the wireless LAN
`card is forgotten to leave, or the card is stolen by an illegal
`user and used. Therefore, in order to keep the security in a
`high level, the authentication used the MAC address is
`combined with the shared key authentication method to
`determine which cards are stolen. In FIG. 5, a procedure that
`is the same procedure in FIG. 2 has the same reference
`number.
`Referring to FIG. 5, operation of the embodiment of the
`authentication apparatus of the wireless LAN system of the
`
`9
`
`

`

`5
`present invention is explained. First, an authentication
`request is transmitted from a STA 1 to an AP 2 by a radio
`signal (S1). At this time, bits showing the authentication
`request based on the shared key authentication method are
`provided in the PDU format. And a MAC address of the STA
`1 is included in a MAC frame as a source address.
`At the conventional WEP algorithm shown in FIG. 2, the
`AP 2 received the authentication request provides a chal
`lenge text and transmits the challenge text to the STA 1.
`However, at the first embodiment of the present invention,
`the AP2 requests a check to the authentication server 3 by
`using the MAC address as the ID (identifier) (S8).
`In this, the authentication server 3 is a RADIUS server,
`and operates based on the RADIUS protocol defined by the
`RFC (request for comments) 2138 of the IETF (Internet
`engineering task force).
`And the MAC address is defined as a user name or a
`calling-station ID on the authentication protocol (RADIUS
`protocol).
`The authentication server (RADIUS server) 3 checks the
`MAC address received from the AP 2 (S9).
`In case that the MAC address is checked and confirmed,
`a challenge message is transmitted to the AP 2, base on a
`procedure being equivalent to the CHAP (PPP challenge
`handshake authentication protocol) defined at the RFC 1994
`of the IETF (S10). In this, the PPP signifies a point-to-point
`protocol.
`At the CHAP, a message digest 5 (MD 5) is defined as a
`hashing method being one way. However, instead of the MD
`5, one of the other hashing methods can be used.
`30
`The AP 2 received the challenge message from the
`authentication server 3 transmits a challenge text to the STA
`1 based on the normal WEP algorithm (S2). As the challenge
`text, the challenge message transmitted from the authenti
`cation server 3 can be used as it is, instead of the challenge
`text based on the WEP algorithm.
`The STA 1 encrypts the challenge text received from the
`AP 2 by using the own shared key and an IV based on the
`WEP algorithm (S3).
`And the STA 1 transmits the encrypted challenge text and
`the IV to the AP 2 (S4). The AP 2 decrypts the received
`encrypted challenge text by using the received encrypted
`challenge text, the IV, and the own shared key. And the AP
`2 compares the challenge text transmitted at the S2 with the
`decrypted challenge text obtained at the S4, and judges
`whether the two challenge texts are the same or not, and
`when the judged result is the same, the authentication at the
`wireless network is success (S5).
`The AP2 returns a CHAP response (challenge response)
`to the authentication server 3 by hashing of the CHAP (S11).
`When the authentication server 3 acknowledges that a
`normal response is received by using the CHAP, the authen
`tication server 3 notifies the completion of the authentication
`(successful code) to the AP 2 by judging that the total
`authentication is completed (S12).
`The AP 2, received the authentication completion notifi
`cation (Successful code), notifies the authentication comple
`tion to the STA 1, and the STA 1 also recognizes that the
`authentication is successful (S6).
`The authentication server 3 instructs that the usable MAC
`60
`address table stored in the AP2 is made to renew (S13). As
`a result, a newly authenticated MAC address is registered at
`any time, and the MAC address table in the AP 2 can be
`automatically renewed. After this operation, the STA 1 and
`the AP 2 go to association operation (S7).
`As a result of the first embodiment, the following effect
`can be also realized. At the first embodiment of the present
`
`50
`
`35
`
`40
`
`45
`
`55
`
`65
`
`US 7,039,021 B1
`
`5
`
`10
`
`15
`
`25
`
`6
`invention, as shown in FIG. 5, the AP 2 executes the
`authentication request to the authentication server 3 by using
`the MAC address as the ID (S8). However, when a trouble
`occurs at the hardware or the software in the authentication
`server 3 and the authentication server 3 can not receive the
`authentication request from the AP2, at that time, the AP2
`itself can execute the authentication by using the MAC
`address.
`As mentioned at the S 13 in FIG. 5, the MAC address
`table in the AP 2 is automatically renewed, therefore the
`authenticated result is taken in the MAC address table in the
`AP2 immediately. The AP2 stores the MAC addresses until
`that the trouble occurs at the authentication server 3, there
`fore the AP 2 can authenticate the MAC addresses by itself.
`Consequently, even when some troubles occur at the authen
`tication server 3, the authentication procedure can be con
`tinued.
`At a second embodiment of the present invention, the
`usable time of the shared key is limited to a designated
`period beforehand at a key control server (not shown),
`therefore the security is made to be high. As shown in FIG.
`5, at the S3 of the first embodiment, the STA 1 can always
`encrypt the challenge text received from the AP2 by using
`the own shared key and the IV based on the WEP algorithm.
`At the second embodiment, in order that the illegal authen
`tication is not executed even when the shared key is leaked,
`a security can be kept by limiting the usable time of the
`shared key.
`Next, a third embodiment of the present invention is
`explained. At the second embodiment of the present inven
`tion, the usable time of the shared key for the WEP is
`limited, with this, the security against the illegal usage can
`be kept. However, when a legal user did not use the STA 1
`within the usable limit time, the key must be transported in
`case that the legal user uses after the usable time limit.
`At the third embodiment, an authentication method, at the
`time when the shared key becomes invalid due to the usable
`time limit, is explained.
`FIG. 6 is a sequence diagram showing an authentication
`procedure of the third embodiment of the authentication
`method of the wireless LAN system of the present invention.
`In FIG. 6, when the shared key from the STA 1 becomes
`invalid (unsuccessful), the STA 1 requests again the authen
`tication for the AP 2 by the open system authentication
`method (S14).
`The AP 2 recognizes that the request is executed by the
`open system authentication method, and requests the authen
`tication for the authentication server 3 by using the MAC
`address as the authentication ID (S15).
`In this, the authentication server 3, for example, operates
`based on the RADIUS protocol defined at the RFC 2138 of
`the IETF.
`And the MAC address is defined as a user name or a
`calling station ID on the authentication protocol (RADIUS)
`The authentication server 3 (RADIUS) authenticates the
`MAC address, and after this, transmits a challenge text by
`using a procedure equivalent to the CHAP defined at the
`RFC 1994 in the IETF (S16).
`At the CHAP, a message digest MD 5 is defined as a
`hashing method being one way. However, instead of the MD
`5, one of the other hashing methods can be used.
`The AP 2, received the challenge text from the authenti
`cation server 3, returns the CHAP response (hashed chal
`lenge text) to the authentication server 3 by hashing by the
`CHAP (S17).
`When the authentication server 3 recognizes that a normal
`response is received by the CHAP, the authentication server
`
`10
`
`

`

`US 7,039,021 B1
`
`50
`
`60
`
`7
`3 notifies the AP 2 to the authentication completion as the
`total authentication is completed (S18).
`The AP 2 received the information of the authentication
`completion notifies the authentication completion to the STA
`1, and the STA 1 recognizes that the authentication is 5
`successful (S19).
`After this, the STA 1 and the AP 2 go to the operation of
`association (S20).
`When the authentication between the AP2 and the authen
`tication server 3 was successful, as mentioned at the first 10
`embodiment, the newly authenticated MAC address can be
`registered in the usable MAC address table stored in the AP
`2. However, at the third embodiment, the open system
`authentication method is used and the security is low,
`therefore it is recommended that the newly authenticated 15
`MAC address is not newly registered.
`After the association procedure is completed, the STA 1
`executes communication by a normal IP (Internet protocol)
`packet through the AP 2.
`Next a fourth embodiment of the present invention is 20
`explained. In case of the open system authentication method
`at the third embodiment, the communication period does not
`have a limit after the association, consequently, the possi
`bility that an illegal connection is executed is high.
`At the fourth embodiment of the present invention, an 25
`effective period of communication after the association is
`decided to a designated short period that is sufficient for that
`the shared key of the WEP algorithm is transported from a
`key control server (not shown) by using such an Internet Key
`Exchange method of Public Key Infrastructure. For 30
`example, this effective period of communication is recom
`mended to be 10 seconds to one minute.
`In FIG. 6, after the key is transported for the original
`shared key authentication method, de-association is
`executed (S21), and the connection is executed again by the 35
`shared key authentication method. As a result, even an
`illegal access used a false MAC address is executed, the
`security can be kept in high.
`As mentioned above, at the present invention, the MAC
`address authentication, in which the shared key authentica- 40
`tion method stipulated in the IEEE 802.11 is expanded, is
`executed. With this, at the wireless LAN system in which an
`illegal usage is liable to occur because of the usage of a
`wireless LAN card, the security can be kept in high. And the
`authentication for many wireless LAN cards can be executed 45
`from any of access points.
`Moreover, at the present invention, a usable time limit of
`the shared key of the WEP is decided, and the period of the
`association at the open system authentication method is
`limited, consequently, the security can be kept in high.
`Further, the MAC address table in the AP is automatically
`renewed by the instruction from the authentication server.
`Therefore, even the authentication server has some troubles,
`by utilizing the MAC address information until right before
`the troubles, the APitself can authenticate the MAC address. 55
`While the present invention has been described with
`reference to the particular illustrative embodiments, it is not
`to be restricted by those embodiments but only by the
`appended claims. It is to be appreciated that those skilled in
`the art can change or modify the embodiments without
`departing from the scope and spirit of the present invention.
`What is claimed is:
`1. An authentication method for a wireless LAN (local
`area network) system, comprising:
`transmitting an authentication request from a STA (ter
`minal station) to an AP (access point), wherein said
`
`65
`
`8
`authentication request comprises a request from said
`STA to connect with said LAN:
`requesting authentication of said authentication request
`from said AP to an authentication server, by converting
`said authentication request to a protocol adaptable to
`said authentication server,
`if no problem occurs at hardware or software of said
`authentication server, checking said authentication
`request at said authentication server based on a MAC
`(media access control) address of said STA;
`executing encryption authentication at said AP with said
`STA based on a designated encryption algorithm; and
`if no problem occurs at hardware or software of said
`authentication server, notifying an authentication
`completion from said authentication server to said AP,
`after said authentication server received a response of
`a completion of said encryption authentication from
`said AP,
`wherein said AP stores said MAC address said STA, and
`wherein, when a problem occurs in hardware or software
`of said authentication server said AP itself executes
`authentication of said STA based on said MAC address
`of said STA.
`2. An authentication apparatus for a wireless LAN system
`comprising
`plural STAs: plural APs which connect to an authentica
`tion server and said plural STAs, and one of said plural
`APs receives an authentication request from one of said
`plural STAS and converts said authentication request
`from one of said plural STAs to a protocol adaptable to
`said authentication server, and authenticates said
`authentication request from one of said plural STAs
`based on a designated encryption algorithm; and
`said authentication server which, if no problem occurs at
`hardware or software of said authentication server,
`checks said authentication request from one of said
`STAs based on a MAC address of one of said plural
`STAS receiving said converted authentication request,
`and
`notifies an authentication completion to said AP, after said
`authentication server received a response of a comple
`tion of encryption authentication from said AP:
`wherein said authentication request comprises a request
`from one of said plural STAs to connect with said LAN,
`wherein said AP stores a MAC address of said one of said
`STAS, and
`wherein in case that a problem occurs at hardware or

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket