RANDOM MEDIA ACCESS CONTROL ADDRESS WITH FAST RECONNECTION MECHANISM
20230043950 · 2023-02-09
Assignee
Inventors
Cpc classification
H04L63/0407
ELECTRICITY
H04L2101/622
ELECTRICITY
H04L63/0435
ELECTRICITY
G06F21/6218
PHYSICS
H04L63/0876
ELECTRICITY
H04L63/0414
ELECTRICITY
H04L63/0421
ELECTRICITY
H04W12/02
ELECTRICITY
International classification
Abstract
The present invention provides a wireless communication method of an access point. The wireless communication method comprises the steps of: establishing a cache table comprising a plurality of reference MAC and corresponding PMKs and reference PMKIDs; receiving an association request from a station; reading a MAC address of the station and a PMKID from the association request; if the MAC address of the station and the PMKID do not match items of the cache table, performing a calculation on the PMKID to obtain an original PMKID; determining if the original PMKID matches any one of the reference PMKIDs within the cache table; and if the original PMKID matches one reference PMKID within the cache table, determining that the reference MAC recorded in the cache table and the MAC address belong to the same station.
Claims
1. A wireless communication method of a station, comprising: connecting to an access point (AP) by using a first media access control (MAC) address, and performing authentication to generate a pairwise master key (PMK) and a pairwise master key identifier (PMKID); if the connection with the AP is interrupted, and the station tries to reconnect to the AP, generating an association request comprising information of a second MAC address of the station and the PMKID, wherein the association request does not comprise the first MAC address of the station; and transmitting the association request to the AP.
2. The wireless communication method of claim 1, wherein the step of generating the association request comprising information of the second MAC address of the station and the PMKID comprises: mixing the second MAC address with the PMKID to generate a mixed PMKID; and generating the association request comprising the mixed PMKID.
3. The wireless communication method of claim 2, wherein the step of mixing the second MAC address with the PMKID to generate the mixed PMKID comprises: performing a mixing operation on the second MAC address and the PMKID to generate the mixed PMKID; wherein the PMKID is obtained if the mixing operation is performed on the mixed PMKID and the second MAC address.
4. The wireless communication method of claim 1, wherein the step of generating the association request comprising information of the second MAC address of the station and the PMKID comprises: mixing the second MAC address with the PMKID to generate a mixed PMKID; using the PMK to encrypt the mixed PMKID to generate an encrypted PMKID; and generating the association request comprising the encrypted PMKID.
5. The wireless communication method of claim 4, wherein the step of mixing the second MAC address with the PMKID to generate the mixed PMKID comprises: performing a mixing operation on the second MAC address with the PMKID to generate the mixed PMKID, wherein the PMKID is obtained if the mixing operation is performed on the mixed PMKID and the second MAC address.
6. The wireless communication method of claim 1, wherein the association request further comprises information element indicating that the station supports a random MAC address with PMKSA caching mechanism.
7. A wireless communication method of an access point, comprising: establishing a cache table comprising a plurality of reference media access control (MAC) address and corresponding pairwise master keys (PMKs) and reference pairwise master key identifiers (PMKIDs); receiving an association request from a station; reading a MAC address of the station and a PMKID from the association request; if the MAC address of the station and the PMKID do not match content of the cache table, performing a calculation on the PMKID to obtain an original PMKID; determining if the original PMKID matches any one of the reference PMKIDs within the cache table; and if the original PMKID matches one reference PMKID within the cache table, determining that the reference MAC recorded in the cache table and the MAC address belong to the same station.
8. The wireless communication method of claim 7, wherein the step of performing the calculation on the PMKID to obtain the original PMKID comprises: mixing the MAC address with the PMKID to generate a mixed PMKID to serve as the original PMKID.
9. The wireless communication method of claim 8, wherein the step of mixing the MAC address with the PMKID to generate the mixed PMKID to serve as the original PMKID comprises: performing a mixing operation on the MAC address and the PMKID to generate a mixed PMKID to serve as the original PMKID, wherein the PMKID is obtained if the mixing operation is performed on the mixed PMKID and the MAC address.
10. The wireless communication method of claim 7, wherein the step of performing the calculation on the PMKID to obtain the original PMKID comprises: using at least one of the PMKs of the cache table to decrypt the PMKID to generate decrypted PMKID(s); and mixing the MAC address with the PMKID(s) to generate mixed PMKID(s) to serve as the original PMKID.
11. The wireless communication method of claim 10, wherein the step of mixing the MAC address with the PMKID(s) to generate the mixed PMKID(s) to serve as the original PMKID comprises the step of: performing a mixing operation on the MAC address with the PMKID(s) to generate the mixed PMKID(s) to serve as the original PMKID, wherein the PMKID(s) is/are obtained if the mixing operation is performed on the mixed PMKID(s) and the MAC address.
12. The wireless communication method of claim 7, further comprising: if the original PMKID matches one reference PMKID within the cache table, using the MAC address recorded in the association request to update the reference MAC recorded in the cache table.
13. The wireless communication method of claim 7, wherein the cache table further comprises if stations corresponding to the reference MAC addresses support a random MAC address with PMKSA caching mechanism.
14. The wireless communication method of claim 13, wherein the step of performing the calculation on the PMKID to obtain the original PMKID comprises: referring to the cache table to select at least one of the stations that supports the random MAC address with PMKSA caching mechanism; using the PMK(s) corresponding to the selected stations to decrypt the PMKID to generate decrypted PMKID(s); and mixing the MAC address with the PMKID(s) to generate mixed PMKID(s) to serve as the original PMKID.
15. The wireless communication method of claim 14, wherein the step of mixing the MAC address with the PMKID(s) to generate the mixed PMKID(s) to serve as the original PMKID comprises the step of: performing a mixing operation on the MAC address with the PMKID(s) to generate the mixed PMKID(s) to serve as the original PMKID, wherein the PMKID(s) is/are obtained if the mixing operation is performed on the mixed PMKID(s) and the MAC address.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0007]
[0008]
[0009]
[0010]
[0011]
[0012]
[0013]
DETAILED DESCRIPTION
[0014] Certain terms are used throughout the following description and claims to refer to particular system components. As one skilled in the art will appreciate, manufacturers may refer to a component by different names. This document does not intend to distinguish between components that differ in name but not function. In the following discussion and in the claims, the terms “including” and “comprising” are used in an open-ended fashion, and thus should be interpreted to mean “including, but not limited to . . . ”. The terms “couple” and “couples” are intended to mean either an indirect or a direct electrical connection. Thus, if a first device couples to a second device, that connection may be through a direct electrical connection, or through an indirect electrical connection via other devices and connections.
[0015]
[0016]
[0017] Then, the station STA1 and the AP 110 perform association and extensible authentication protocol over LAN (EAPOL) 4-way for the further communications between the station STA1 and the AP 110.
[0018] The step for deriving the PMKSA shown in
[0019] In this case, the station STA1 disconnects from the AP 110 for some reasons, for example, the station STA1 is taken away from the AP 110. Then, if station STA1 is taken to a place close to the AP 110, the station STA1 will automatically reconnect to the AP 110. In addition, in order to provide a better privacy, the station STA1 may use a random MAC address to connect to the AP 110, that is the MAC address used by the station STA1 in this reconnection process is different from the MAC address MAC.sub.STA1 used in the previous connection. In this embodiment, although the station STA1 uses different MAC address, the station STA1 and the AP 110 can use an open authentication and PMKSA caching, without using the 802.1X/SAE authentication, to establish the connection in a fast way. In detail, referring to
[0020] In Step 304, the station STA1 sends an association request to the AP 110, wherein a PMKID field of the association request comprises the encrypted PMKID generated in Step 302. It is noted that the association request comprises the new MAC address MAC.sub.STA1new of the station STA1, but does not comprise the previous MAC address MAC.sub.STA1 for the device privacy.
[0021] In Step 306, the AP 110 receives the association request of the station STA1, and the AP 110 determines if the PMKID within the PMKID filed (i.e., the encrypted PMKID) matches any one of the PMKIDs within the cache table shown in
[0022] Step 308, the AP 110 sequentially uses the PMKs of the stations to decrypt the PMKID to generate decrypted PMKIDs. Specifically, the AP 110 may use the PMK of the station STA1 to decrypt the PMKID to generate a first decrypted PMKID, use the PMK of the station STA2 to decrypt the PMKID to generate a second decrypted PMKID, . . . , and use the PMK of the station STAn to decrypt the PMKID to generate an n.sup.th decrypted PMKID. In this embodiment, the first decrypted PMKID generated by using the PMK of the station STA1 should be equal to the mixed PMKID generated in Step 302.
[0023] In Step 310, for every decrypted PMKID generated in Step 308, the AP 110 mixes the decrypted PMKID with the new MAC address MAC.sub.STA1new (e.g., using XOR operations) to generate an original PMKID, and the AP 110 determines if any one of the original PMKIDs matches one of the PMKID.sub.STA1_AP, PMKID.sub.STA2_AP, . . . , PMKID.sub.STAn_AP within the cache table, If yes, the flow enters Step 314; and if not, the flow enters Step 316. In this embodiment, the original PMKID generated by using the PMK of the station STA1 should be equal to the PMKID.sub.STA1_AP.
[0024] It is noted that the Steps 308 and Step 310 can be combined as one step, and once the AP 110 finds that the current processed original PMKID matches one of the PMKID.sub.STA1_AP, PMKID.sub.STA2_AP, . . . , PMKID.sub.STAn_AP within the cache table, the AP 110 can stop using the remaining PMK to decrypt the PMKID. Specifically, in this embodiment, the original PMKID generated by using the PMK of the station STA1 is equal to the PMKID.sub.STA1_AP located in a first row of the cache table, so the AP 110 does not need to use the PMK of any one of the other stations STA2-STAn to decrypt the PMKID.
[0025] In Step 314, the AP 110 sends an association response the station STA1, wherein a status code of the association response records that the reconnection succeeds. In addition, the AP 110 updates the cache table by replacing MAC.sub.STA1 by MAC.sub.STA1new.
[0026] In Step 316, the AP 110 sends an association response the station STA1, wherein the status code of the association response records that the PMKID within the association request is invalid.
[0027] In this embodiment, after the Step 314, because the station STA1 successfully connects to the AP 110 by using PMKSA caching, the station STA1 and the AP 110 can directly perform EAPOL 4-way for the further communications between the station STA1 and the AP 110, without performing the 802.1X/SAE authentication.
[0028] In light of above, in the embodiment shown in
[0029] It is noted that the encryption operation in Step 302 and the decryption operation in Step 308 are optional, that is the PMKID field of the association request sent by the station STA1 comprises the mixed PMKID generated by mixing the new MAC address MAC.sub.STA1new with PMKID.sub.STA1_AP, and the AP 110 mixes the PMKID with the new MAC address MAC.sub.STA1new to generate an original PMKID. This alternative design shall fall within the scope of the present invention.
[0030]
[0031] Then, the station STA1 and the AP 110 perform association and extensible authentication protocol over LAN (EAPOL) 4-way for the further communications between the station STA1 and the AP 110.
[0032] The step for deriving the PMKSA shown in
[0033] In this case, the station STA1 disconnects from the AP 110 for some reasons, for example, the station STA1 is taken away from the AP 110. Then, if station STA1 is taken to a place close to the AP 110, the station STA1 will automatically connect to the AP 110. In addition, in order to provide a better privacy, the station STA1 may use a random MAC address to connect to the AP 110, that is the MAC address used by the station STA1 in this reconnection process is different from the MAC address MAC.sub.STA1 used in the previous connection. In this embodiment, although the station STA1 uses different MAC address, the station STA1 and the AP 110 can use an open authentication and PMKSA caching, without using the 802.1X/SAE authentication, to establish the connection in a fast way. In detail, referring to
[0034] In Step 504, the station STA1 sends an association request to the AP 110, wherein a PMKID field of the association request comprises the encrypted PMKID generated in Step 502. It is noted that the association request comprises the new MAC address MAC.sub.STA1new of the station STA1, but does not comprise the previous MAC address MAC.sub.STA1 for the device privacy. Furthermore, the association request from the station STA1 has the vendor information element indicating that the station STA1 supports the random MAC address with PMKSA caching mechanism.
[0035] In Step 506, the AP 110 referring to the vendor information element within the association request to determine if the station STA1 supports the random MAC address with PMKSA caching mechanism, if yes, the flow enters Step 510; and if not, the flow enters Step 508.
[0036] In Step 508, the AP 110 determines if the PMKID within the PMKID filed matches any one of the PMKIDs within the cache table shown in
[0037] Step 510, the AP 110 refers to the cache table to select at least a portion of the station(s) supporting the random MAC address with PMKSA caching mechanism, and the AP 110 sequentially uses the PMKs of the selected stations to decrypt the PMKID to generate decrypted PMKIDs. Specifically, the AP 110 may use the PMK of the station STA1 to decrypt the PMKID to generate a first decrypted PMKID, and use the PMK of the station STAn to decrypt the PMKID to generate an n.sup.th decrypted PMKID. In this embodiment, the first decrypted PMKID generated by using the PMK of the station STA1 should be equal to the mixed PMKID generated in Step 502.
[0038] In Step 512, for every decrypted PMKID generated in Step 510, the AP 110 mixes the decrypted PMKID with the new MAC address MAC.sub.STA1new (e.g., using XOR operations) to generate an original PMKID, and in Step 514, the AP 110 determines if any one of the original PMKIDs matches one of the PMKID.sub.STA1_AP, PMKID.sub.STA2_AP, . . . , PMKID.sub.STAn_AP corresponding to the stations supporting random MAC address with PMKSA caching within the cache table, If yes, the flow enters Step 516; and if not, the flow enters Step 518. In this embodiment, the original PMKID generated by using the PMK of the station STA1 should be equal to the PMKID.sub.STA1_AP.
[0039] It is noted that the Steps 510 and Step 512 can be combined as one step, and once the AP 110 finds that the current processed original PMKID matches one of the PMKID.sub.STA1_AP, PMKID.sub.STA2_AP, . . . , PMKID.sub.STAn_AP within the cache table, the AP 110 can stop using the remaining PMK to decrypt the PMKID. Specifically, in this embodiment, the original PMKID generated by using the PMK of the station STA1 is equal to the PMKID.sub.STA1_AP located in a first row of the cache table, so the AP 110 does not need to use the PMK of any one of the other stations STA2-STAn to decrypt the PMKID.
[0040] In Step 516, the AP sends an association response the station STA1, wherein a status code of the association response records that the reconnection succeeds. In addition, the AP 110 updates the cache table by replacing MAC.sub.STA1 by MAC.sub.STA1new.
[0041] In Step 518, the AP sends an association response the station STA1, wherein the status code of the association response records that the PMKID within the association request is invalid.
[0042] In this embodiment, after the Step 516, because the station STA1 successfully connects to the AP 110 by using PMKSA caching, the station STA1 and the AP 110 can directly perform EAPOL 4-way for the further communications between the station STA1 and the AP 110, without performing the 802.1X/SAE authentication.
[0043] It is noted that the encryption operation in Step 502 and the decryption operation in Step 510 are optional, that is the PMKID field of the association request sent by the station STA1 comprises the mixed PMKID generated by mixing the new MAC address MAC.sub.STA1new with PMKID.sub.STA1_AP, and the AP 110 mixes the PMKID with the new MAC address MAC.sub.STA1new to generate an original PMKID. This alternative design shall fall within the scope of the present invention.
[0044] In light of above, in the embodiment shown in
[0045] Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention. Accordingly, the above disclosure should be construed as limited only by the metes and bounds of the appended claims.