Title of Invention

APPARATUS AND METHOD FOR MANAGING STATIONS ASSOCIATED WITH WPA-PASK WIRELESS NETWORK

Abstract Provided are a method and apparatus for managing a station by providing an encrypted key to the station in a wireless network under a Wi-Fi Protected Pre-Shared Key (WPA-PSK) environment. In the method, a registrar determines whether a new station is a guest station, based on user input. If the new station is a guest station, the registrar includes a session key (and not a shared key) into an Mg message according to a Wi-Fi Alliance (WFA) Simple Config protocol and transmits the Mg message to the station. Accordingly, it is possible to permit a guest station to temporarily access the network without a user's management of information regarding the guest station.
Full Text FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
The Patents Rules, 2003
COMPLETE SPECIFICATION
(See section 10, rule 13)
"APPARATUS AND METHOD FOR MANAGING
STATIONS ASSOCIATED WITH WPA-PASK
WIRELESS NETWORK"
SAMSUNG ELECTRONICS CO., LTD., a Korean Corporation, of 416, Maetan-dong, Yeongtong-gu, Suwon-si, Gyeonggi-do, Republic of Korea.
The following specification particularly describes the invention and the manner in which it is to be performed.

APPARATUS AND METHOD FOR MANAGING STATIONS ASSOCIATED WITH WPA-PSK WIRELESS NETWORK
CROSS-REFERENCE TO RELATED PATENT APPLICATION
[01] This application claims priority from Korean Patent
Application No. 10-2006-0075304, filed on August 9, 2006, in the Korean Intellectual Property Office, the disclosure of which is incorporated herein in its entirety by reference.
BACKGROUND OF THE INVENTION
1. Field of the Invention
[02] The present invention relates to a wireless network under a Wi-
Fi Protected Access Pre-Shared Key (WPA-PSK) environment, and more particularly, to a method and apparatus for managing a station by providing an encrypted key to the station in a wireless network under a WPA-PSK environment.
2. Description of the Related Art
[03] A security level for communications in a wireless network is
lower than in a wired network, since a route of data transmission in the wireless network is not physically fixed unlike in the wired network. Thus, most of radio communication protocols support encryption of data packets to be transmitted in order to securely establish a wireless communication. In particular, a WPA-PSK scheme used in a radio local area network (LAN)
2

allows only stations that share the same encryption key with an access point to
access a network and establish a communication with the access point.
[04] FIG. 1 is a timing diagram illustrating a process of producing a
session key in a WPA-PSK network. In the WPA-PSK network, an access point and stations share a Pre-Shared Key (PSK). The PSK is used to generate a session key for encrypting and decrypting messages that are exchanged between the access point and each of the stations.
[05] In operation 110, the access point and a station go through a
predetermined authentication process and a predetermined association process. For this authentication and association, an open authentication method defined in the IEEE 802.11 standard may be used.
[06] In operation 120, the access point that went through the
authentication process and the association process, produces a first random number. In operation 125, the station that went through the authentication process and the association process, produces a second random number. In operations 130 and 140, the access point and the station exchange the first and the second random numbers. In this case, a message that contains the first random number and a message that contains the second random number respectively contain a medium access control (MAC) address of the access point and a MAC address of the station. Accordingly, the access point and the station can share the first and the second random numbers, the MAC address of the access point, and the MAC address of the station.
3


[07] In operations 150 and 155, each of the access point and the
station produces a session key according to the same algorithm. For generation of the session key, a PSK is further required, in addition to the first and the second random numbers, the MAC address of the access point, and the MAC address of the station, which are already shared by the access point and the station. That is, the station must have the same PSK as that of the access point in order to produce the same session key as that of the access point, that is, in order to establish a communication with the access point. Thus, a user must manage in order for the station and the access point to store the same PSK.
[08] In order to improve such an inconvenience, the Wi-Fi Alliance
(WFA) has proposed a Simple Config protocol, whereby a registrar allows a station to go through an authentication process so as to achieve the same PSK as that of an access point without a user's intervention. The Simple Config protocol is specified in the Windows Connect Now (WCN)-NET Specifications.
[09] FIG. 2 is a timing diagram illustrating a process of allowing a
station to access the WPA-PSK network. In operation 201, the station transmits a probe request message to an access point, and the access point transmits a probe response message to the station in response to the probe request message. If the access point supports the Simple Config protocol, the access point includes information indicating that it supports the Simple Config protocol into the probe response message. The station that supports the
4

Simple Config protocol determines as to whether the Simple Config protocol
is to be continued, based on the probe response message.
[10] If the station detects the access point, which is to be accessed,
through exchange of the probe request message and the probe response message, in operations 202 and 203, the station performs an authentication process and an association process that are defined in the IEEE 802.11 standard, respectively, so as to be associated with the access point. Although being associated with the access point by performing operation 203, the station cannot produce a Pairwise Transient Key (PTK), which is a session key, without a PSK, and thus cannot normally exchange data in the WPA-PSK network. A process of producing a session key by using a shared key, which is described above with reference to FIG. 1, is referred to as 4-way handshaking.
[11] In operation 204, the station and the access point exchange
messages according to the WFA Simple Config protocol so as to share the same PSK. In this case, a registrar is used to exchange messages with the station in the WFA Simple Config protocol. The registrar, which is an entity that provides the station with access information for allowing the station to access a wireless network, may be included in the access point or be embodied as a device separately from the access point. In FIG. 2, it is assumed that the registrar is included in the access point.
[12] In operation 205, the station and the access point that obtain the
same PSK in operation 204 perform 4-way handshaking in order to produce
5

the same PTK. In operation 206, the station and the access point establish a
data communication by using the produced PTK.
[13] FIG. 3 illustrates a process in which a station and an access
point establish a communication according to a WFA Simple Config protocol.
That is, FIG. 3 illustrates operation 204 of the process, illustrated in FIG. 2, in
greater detail.
[14] Referring to FIG. 3, the station exchanges 8 messages with a
registrar by using the Simple Config protocol and without a PSK. The station
(an enrollee illustrated in FIG. 3) and the registrar produce an encryption key,
which is to be used in messages exchanged between the station and the access
point, according to a Diffie-Hellman key exchange method. The registrar
encrypts wireless network access information including the PSK by using the
encryption key, and transmits the encrypted result to the station.
[15] More specifically, referring to FIG. 3, the Diffie-Hellman key
exchange method allows generation of a key for producing an AuthKey and a
KeywrapKey. For this end, the station and the registrar exchange a PKE and a
PKR, which are their Diffie-Hellman public keys, by using Mi and M2
messages, and produce a Key Derivation Key (KDK, which is named since it
is used to derive the AuthKey and the KeywrapKey), which is the result of
performing the Diffie-Hellman key exchange method, by using the PKE and
PKR.
[16] That is, the registrar that has already possessed the PKR obtains
the PKE by receiving the Mi message, and thus, can produce the KDK by
6


using the PKR and the PKE, and the AuthKey and the KeywrapKey by using
the KDK. Also, the registrar produces an HMAC (message authentication
code) by using the AuthKey, adds the M2 message into the produced HMAC,
and transmits the HMAC to the station.
[17] The station receives the M?. message, produces the AuthKey
and the KeywrapKey, and verifies a HMAC part of the Mi message by using
the AuthKey. HMAC parts of the M2 through Mg messages indicate addition
of code for verifying whether a message is altered by a third party. As a result,
the station and the registrar obtain the same AuthKey and the KeywapKey by
exchanging the Mi and M2 messages.
[18] Then, the station and the registrar are capable of determining
whether they have the same password by exchanging E-Hashl, E-Hash2,
R-Hashl, and R-Hash2 (which are generated based on a password, random
numbers, i.e., E-Sl, E-S2, R-Sl, and R-S2, the PKE, and the PKR) by using
the M3 and M4 messages, and exchanging R-Sl, E-Sl, R-S2, and E-S2, which
are encrypted using the KeywrapKey, by using the M3 through M7 messages.
That is, the station is authenticated using the M3 through M7 messages.
[19] Here, the password is a unique value that the station supporting
SimpleConfig has. A user inputs a secret number via a user interface of the
registrar, and the registrar authenticates the station using the password.
[20] If the station is authenticated, the registrar encrypts Config data,
which is wireless network access information, and transmits the encrypted
7

result to the station by using the Ms message. In this case, Config data
contains the PSK, and may further contain Service Set Identifier (SSID), etc.
[21] As described above, when a user desires to allow a station to
temporarily access a wireless network that distributes a PSK by using the
WFA Simple Config protocol, the registrar must distribute different PSKs to
stations that desire to access the wireless network. Also, when the station that
is allowed to temporarily access the wireless network discontinues the access,
the user must delete a PSK allocated to this station from a list of PSKs of an
access point so that the station cannot further access the network.
[22] However, in this case, the user must find out the allocated PSK.
If information that identifies the station is made in a format that the user cannot understand, the user may have difficulties in finding out the allocated PSK. Also, if the user does not delete a PSK, which is to be deleted, by mistake, the station can access the network semipermanently.
SUMMARY OF THE INVENTION
[23] The present invention provides an apparatus and method for
allowing a guest station, which is specified according to a user input, to
temporarily access a wireless network under a WPA-PSK environment.
[24] According to an aspect of the present invention, there is
provided a method of managing a station in a wireless network under a WPA-PSK environment, the method comprising determining whether the station is a
8

guest station, and selectively transmitting a session key to the station,
depending on the determination result.
[25] The selectively transmitting the session key may comprise
transmitting the session key if it is determined that the station is a guest station,
and transmitting a shared key if it is determined that the station is not a guest
station. The selectively transmitting the session key may comprise
transmitting a message containing the session key instead of a shared key if it
is determined that the station is a guest station, where the message is defined
for distribution of the shared key in the wireless network.
[26] The message may contain information representing that the
station is a guest station.
[27] According to another aspect of the present invention, there is
provided a computer readable recording medium storing a computer program
for performing the method of managing a station.
[28] According to another aspect of the present invention, there is
provided an apparatus for managing a station in a wireless network under a
WPA-PSK environment, the apparatus comprising a station determination unit
which determines whether the station is a guest station; and a transmitting unit
which selectively transmits a session key to the station, depending on the
determination result.
[29] The message may be an Ms message defined in a WCN-NET
standard.
9

[30] The apparatus may further include a session management unit
which stores the session key and an identifier, which identifies the station from among stations accessing the wireless network, in a memory so that they are mapped to each other, and deletes the session key in response to user input; and a user interface which displays that the identifier and the session key are stored.
[31] According to another aspect of the present invention, there is
provided a method of allowing a station to obtain a session key in a wireless network under a WPA-PSK environment, the method comprising receiving a message, which is defined for distribution of a shared key in the wireless network, from a registrar; determining whether the message contains information representing that the station is a guest station; and selectively performing 4-way handshaking together with the registrar, based on the determination result.
[32] The selectively performing of the 4-way handshaking may
comprise performing the 4-way handshaking together with the registrar so as to obtain the session key if it is determined that the information is not contained in the message, and extracting the session key from the message without performing the 4-way handshaking if it is determined that the information is contained in the message.
[33] According to another aspect of the present invention, there is
provided a computer readable recording medium storing a computer program for performing the method of allowing a station to obtain a session key.

10

[34] According to another aspect of the present invention, there is
provided a station apparatus which operates in a wireless network under a WPA-PSK environment, the apparatus comprising a receiving unit which receives a message, which is defined for distribution of a shared key in the wireless network, from a registrar; a message analyzing unit which determines whether the message contains information representing that the station is a guest station; and a session key generation unit which selectively performs 4-way handshaking together with the registrar, based on the determination result.
BRIEF DESCRIPTION OF THE DRAWINGS
[35] The above and other aspects of the present invention will
become more apparent by describing in detail exemplary embodiments thereof
with reference to the attached drawings in which:
[36] FIG. 1 is a timing diagram illustrating a process of producing a
session key in a WPA-PSK network;
[37] FIG. 2 is a timing diagram illustrating a process of allowing a
station to access the WPA-PSK network;
[38] FIG. 3 illustrates a process of establishing a communication
between a station and an access point according to a WFA Simple Config
protocol;
[39] FIG. 4 illustrates a method of allowing a guest station to
acquire a session key, according to an exemplary embodiment of the present
invention;


11



[40] FIG. 5 is a flowchart illustrating a method of managing a
station in the WPA-PSK network according to an exemplary embodiment of
the present invention;
[41] FIG. 6 is a flowchart illustrating a process in which a station in
the WPA-PSK network acquires a session key, according to an exemplary
embodiment of the present invention;
[42] FIG. 7 is a block diagram of a registrar apparatus according to
an exemplary embodiment of the present invention; and
[43] FIG. 8 is a block diagram of a station apparatus according to an
exemplary embodiment of the present invention.
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS OF
THE INVENTION
[44] Hereinafter, exemplary embodiments of the present invention
will be described in detail with reference to the accompanying drawings.
[45] FIG. 4 illustrates a method of allowing a guest station to
acquire a session key, according to an exemplary embodiment of the present
invention. In this disclosure, the guest station denotes a station that receives
from a user a permission to temporarily access a network.
[46] A user inputs a password of a station via a user interface of a
registrar. In an exemplary embodiment of the present invention, the user interface of the registrar displays a dialog box on its input screen, whereby a user can determine whether a station is to be set as a guest station. That is, the user can permit the station, which desires to access a network, to temporarily


12
access the network, by checking the dialog box for determining the guest station.
[47] The processes illustrated in FIG. 4 are almost the same as the
process of exchanging messages by using a WFA Simple Config protocol, which has been described above with reference to FIG. 3. Specifically, the station and the registrar share a KeywrapKey, which is used to encrypt and decrypt an AuthKey and a PSK for authenticating other messages, by exchanging Mi and M2 messages. A station is authenticated, that is, whether a new station is a station corresponding to the password that the user inputs is determined, by exchanging M3 through M7 messages.
[48] However, when the user sets a new station as a guest station, if
the new station is authenticated, the content of an Mg message is slightly changed as illustrated in FIG. 4. That is, in the case of the related art, the Mg message that contains the PSK which is a shared key is transmitted to the station, but the M8 message that contains a PTK which is a session key is transmitted to the station, according to an exemplary embodiment of the present invention. The type or the name of the session key may be variously determined. That is, the session key is not limited to the PTK. FIG. 4 illustrates only the PTK but network access information, such as SSID, is actually further transmitted to the station.
[49] As described above, the PTK is actually a session key produced
through 4-way handshaking by a station and an access point that share a PSK. However, according to an exemplary embodiment of the present invention, the

13

PTK (and not the PSK) is transmitted to a guest station so as to give the guest station a right to temporarily access the network.
[50] Since the access point does not delete the PSK unless instructed
otherwise from the user, the station holding the same PSK can produce the
PSK and access the network again at any time by performing the 4-way
handshaking. However, when a station using the PTK is disconnected from
the network, the PTK is deleted. Accordingly, when a guest station given the
PTK (and not the PSK) is disconnected from the network and then tries to
access the network, the previously given PTK is no more available. Also, the
guest station does not have the PSK for generating a new PTK. Therefore, the
guest station cannot further establish a communication with the access point.
[51] In an exemplary embodiment of the present invention, the Mg
message contains information indicating whether it is related to a guest station. Guest Flag is illustrated as such information in FIG. 4. Thus, a station receiving the Mg message determines whether the Mg message contains Guest Flag, and recognizes a key extracted from the Mg message as the PSK or the PTK, based on the determination result.
[52] FIG. 5 is a flowchart illustrating a method of managing a
station in a WPA-PSK network according to an exemplary embodiment of the present invention. In this exemplary embodiment, an access point includes a registrar.
[53] In operation 510, a new station performs an authentication
process and an association process that are defined in the IEEE 802.11
14

standard. As described above, even it the station satisfactorily completes tne
authentication process and the association process, it has yet to enter a state in
which a communication can be established with the access point.
[54] In operation 520, the access point determines whether the
station supports a WFA Simple Config protocol. It is possible to determine
whether the station supports the WFA Simple Config protocol by exchanging
a probe request message and a probe response message in operation 510.
[55] If it is determined, in operation 520a that the station does not
support the WFA Simple Config protocol, in operation 530, the access point
produces a PTK, which is a session key, by performing 4-way handshaking
together with the station, since a user has set a PSK in the station.
[56] If the station supports the WFA Simple Config protocol, in
operation 540, the access point authenticates the station by using a password
of the station that the user inputs.
[57] If the authentication is successful (operation 550), in operation
560, it is determined whether the station is a guest station. As described above,
whether a new station is to be set as a guest station is determined based on
user input received via a user interface of the access point. If it is determined
that the new station is not a guest station, a general WFA Simple Config
process is performed. That is, in operation 565, the PSK is transmitted to the
station, and in operation 530, 4-way handshaking is performed to produce a
PTK.
15

[58] If it is determined that the new station is a guest station, a PTK
for the guest station is produced in operation 570, and transmitted to the
station by using an Mg message in operation 580. In this case, the Mg message
contains Guest Flag.
[59] FIG. 6 is a flowchart illustrating a process in which a station in
a WPA-PSK network acquires a session key, according to an exemplary
embodiment of the present invention. A description of a process in which the
station exchanges Mi through M7 messages by performing a process by using
a WFA Simple Config protocol, will be omitted. The station receives an Mg
message in operation 610, and analyzes it so as to determine whether this
message contains Guest Flag in operation 620.
[60] If the Mg message does not contain Guest Flag, in operation
640, the station produces a PTK by performing 4-way handshaking together
with an access point since the Mg message contains a PSK.
[61] If the Mg message contains Guest Flag, in operation 630, the
station recognizes that a key contained in the Mg message is a PTK and not a
PSK, and extracts the PTK from the Mg message so as to use the PTK in a
communication to be established with the access point.
[62] FIG. 7 is a block diagram of a registrar apparatus according to
an exemplary embodiment of the present invention. Referring to FIG. 7, the
registrar apparatus includes a station determination unit 710, a session key
generation unit 720, a transmitting unit 730, a user interface unit 740, and a
session key management unit 750.
16

[63] The station determination unit 710 determines whether a new
station is a guest station based on a value that a user input via the user
interface unit 740.
[64] When the station determination unit 710 determines that the
new station is a guest station, the session key generation unit 720 generates a
session key for the guest station.
[65] The transmitting unit 730 transmits the generated session key to
the new station when the new station is a guest station, and transmits a shared
key to the new station when the new station is not a guest station. The session
key or the shared key is transmitted to the station via an Ms message. In this
case, the session key or the shared key is encrypted using a predetermined
encryption key, such as a KeywrapKey.
[66] The session key management unit 750 stores the generated
session key in a memory (not shown) of an access point so that it is mapped to
an identifier of a corresponding station, and deletes the session key when a
station using the stored session key discontinues access to a network.
[67] The user interface unit 740 displays the identifier of the station
stored in the memory of the access point, together with the session key
associated with the station so that the user can manually manage the session
key, and input a password of a new station and set the new station as a guest
station, as described above.
[68] FIG. 8 is a block diagram of a station apparatus according to an
exemplary embodiment of the present invention. Referring to FIG. 8, the


17


station apparatus includes a receiving unit 810, a message analyzing unit 820, and a session key generation unit 830.
[69] The receiving unit 810 receives a message according to a WFA
Simple Config protocol from a registrar (not shown), and the message
analyzing unit 820 analyzes an Ms message that the receiving unit 810
receives in order to determine whether the Mg message contains Guest Flag.
[70] The session key generation unit 830 selectively performs 4-way
handshaking, depending on the analyzing result of the message analyzing unit
820. That is, when the received Mg message contains Guest Flag, the session
key generation unit 830 recognizes that a key contained in the Mg message is a
session key and not a shared key, and does not perform the 4-way handshaking.
In this case, the station extracts the session key from the Mg message and uses
it in a communication to be established with an access point. When the
received Mg message does not contain Guest Flag, the session key generation
unit 830 recognizes that a key contained in the Mg message is a shared key,
and performs the 4-way handshaking in order to produce a session key.
[71] The above exemplary embodiments may be embodied as a
computer program, and performed in a general digital computer, which can
operate the computer program, via a computer readable recording medium.
[72] Examples of the computer readable recording medium include
a magnetic recording medium (a ROM, a floppy disc, a hard disc, etc.), an optical recording medium (a CD ROM, a DVD, etc.), or even carrier waves (such as in transmission over the Internet).
18

[73] As described above, according to an exemplary embodiment of
the present invention, a registrar apparatus that uses a WFA Simple Config protocol in a WPA-PSK environment can permit a station to temporarily access a network without allocating different PSKs to stations. Also, even if a user does not manually delete information related to a guest station from an access point, the registrar apparatus can allow the guest station to temporarily access the network.
[74] While this invention has been particularly shown and described
with reference to exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
19

WHAT IS CLAIMED IS:
1. A method of managing a station in a wireless network under a
Wi-Fi Protected Pre-Shared Key (WPA-PSK) environment, the method
comprising:
determining whether the station is a guest station; and selectively transmitting a session key to the station, depending on the determination result.
2. The method of claim 1, wherein the selectively transmitting the session key comprises transmitting the session key if it is determined that the station is a guest station, and transmitting a shared key if it is determined that the station is not a guest station.
3. The method of claim 2, wherein the selectively transmitting the session key comprises transmitting a message containing the session key instead of a shared key if it is determined that the station is a guest station, the message being defined for distribution of the shared key in the wireless network.
4. The method of claim 3, wherein the message contains information representing that the station is a guest station.
20

5. The method of claim 3, wherein the message is an Mg message defined in a Windows Connect Now (WCN)-NET standard.
6. The method of claim 1, further comprising:
storing the session key and an identifier, which identifies the station from among stations accessing the wireless network, in a memory so that they are mapped to each other;
displaying that the identifier and the session key are stored, via a user interface; and
deleting the session key from the memory in response to user input.
7. The method of claim 1, further comprising providing means for allowing a user to set the station as a guest station, wherein the determining whether the station is a guest station comprises determining whether the station is a guest station, based on a value received from the user via the user interface.
8. A computer readable recording medium storing a computer program for performing a method of managing a station in a wireless network under a Wi-Fi Protected Pre-Shared Key (WPA-PSK) environment, the method comprising:
determining whether the station is a guest station; and




21
selectively transmitting a session key to the station, depending on the determination result.
9. An apparatus for managing a station in a wireless network
under a Wi-Fi Protected Pre-Shared Key (WPA-PSK) environment, the
apparatus comprising:
a station determination unit which determines whether the station is a guest station; and
a transmitting unit which selectively transmits a session key to the station, depending on the determination result.
10. The apparatus of claim 9, wherein the transmitting unit transmits the session key if it is determined that the station is a guest station, and transmits a shared key if it is determined that the station is not a guest station.
11. The apparatus of claim 10, wherein the transmitting unit transmits a message containing the session key instead of a shared key if it is determined that the station is a guest station, the message being defined for distribution of the shared key in the wireless network.
12. The apparatus of claim 11, wherein the message contains information representing that the station is a guest station.

22
13. The apparatus of claim 11, wherein the message is an Mg message defined in a Windows Connect Now (WCN)-NET standard.
14. The apparatus of claim 9, further comprising:
a session management unit which stores the session key and an identifier, which identifies the station from among stations accessing the wireless network, in a memory so that they are mapped to each other, and deletes the session key in response to user input; and
a user interface which displays that the identifier and the session key are stored.
15. The apparatus of claim 9, further comprising a user interface which provides a user with means for allowing the user to set the station as a guest station, wherein the station determination unit determines whether the station is a guest station, based on a value received from the user via the user interface.
16. A method of allowing a station to obtain a session key in a wireless network under a Wi-Fi Protected Pre-Shared Key (WPA-PSK) environment, the method comprising:
receiving a message, which is defined for distribution of a shared key in the wireless network, from a registrar;



23
determining whether the message contains information representing that the station is a guest station; and
selectively performing 4-way handshaking together with the registrar, based on the determination result.
17. The method of claim 16, wherein the selectively performing the 4-way handshaking comprises performing the 4-way handshaking together with the registrar so as to obtain the session key if it is determined that the information is not contained in the message, and extracting the session key from the message without performing the 4-way handshaking if it is determined that the information is contained in the message.
18. The method of claim 16, wherein the message is an Mg message defined in a Windows Connect Now (WCN)-NET standard.
19. A computer readable recording medium storing a computer program for performing a method of allowing a station to obtain a session key in a wireless network under a Wi-Fi Protected Pre-Shared Key (WPA-PSK) environment, the method comprising:
receiving a message, which is defined for distribution of a shared key in the wireless network, from a registrar;
determining whether the message contains information representing that the station is a guest station; and
24

selectively performing 4-way handshaking together with the registrar, based on the determination result.
20. A station apparatus which operates in a wireless network under
a Wi-Fi Protected Pre-Shared Key (WPA-PSK) environment, the apparatus
comprising:
a receiving unit which receives a message, which is defined for distribution of a shared key in the wireless network, from a registrar;
a message analyzing unit which determines whether the message contains information representing that the station is a guest station; and
a session key generation unit which selectively performs 4-way handshaking together with the registrar, based on the determination result.
21. The station apparatus of claim 20, wherein the session key generation unit performs the 4-way handshaking together with the registrar so as to obtain the session key if it is determined that the information is not contained in the message, and extracting the session key from the message if it is determined that the information is contained in the message.
22. The station apparatus of claim 20, wherein the message is an Mg message defined in a Windows Connect Now (WCN)-NET standard.
Dated this the 26th day of April, 2007


25

ABSTRACT OF THE DISCLOSURE
Provided are a method and apparatus for managing a station by providing an encrypted key to the station in a wireless network under a Wi-Fi Protected Pre-Shared Key (WPA-PSK) environment. In the method, a registrar determines whether a new station is a guest station, based on user input. If the new station is a guest station, the registrar includes a session key (and not a shared key) into an Mg message according to a Wi-Fi Alliance (WFA) Simple Config protocol and transmits the Mg message to the station. Accordingly, it is possible to permit a guest station to temporarily access the network without a user's management of information regarding the guest station.
26

Documents:

808-MUM-2007-ABSTRACT(28-5-2010).pdf

808-mum-2007-abstract.doc

808-mum-2007-abstract.pdf

808-mum-2007-cancelled pages(28-5-2010).pdf

808-MUM-2007-CLAIMS(AMENDED)-(22-12-2010).pdf

808-MUM-2007-CLAIMS(AMENDED)-(28-5-2010).pdf

808-mum-2007-claims.doc

808-mum-2007-claims.pdf

808-mum-2007-correspondence(14-9-2007).pdf

808-mum-2007-correspondence(ipo)-(28-6-2010).pdf

808-mum-2007-correspondence-received.pdf

808-mum-2007-description (complete).pdf

808-MUM-2007-DRAWING(28-5-2010).pdf

808-mum-2007-drawings.pdf

808-mum-2007-form 1(6-7-2007).pdf

808-mum-2007-form 18(27-4-2007).pdf

808-mum-2007-form 3(14-9-2007).pdf

808-MUM-2007-FORM 3(28-5-2010).pdf

808-mum-2007-form 3(6-7-2007).pdf

808-mum-2007-form-1.pdf

808-mum-2007-form-18.pdf

808-mum-2007-form-2.doc

808-mum-2007-form-2.pdf

808-mum-2007-form-26.pdf

808-mum-2007-form-3.pdf

808-mum-2007-form-5.pdf

808-mum-2007-general power of attorney(27-4-2007).pdf

808-mum-2007-general power of attorney(6-7-2007).pdf

808-MUM-2007-OTHER DOCUMENT(22-12-2010).pdf

808-MUM-2007-OTHER DOCUMENT(28-5-2010).pdf

808-MUM-2007-REPLY TO EXAMINATION REPORT(22-12-2010).pdf

808-MUM-2007-REPLY TO EXAMINATION REPORT(28-5-2010).pdf

abstract1.jpg


Patent Number 245025
Indian Patent Application Number 808/MUM/2007
PG Journal Number 53/2010
Publication Date 31-Dec-2010
Grant Date 29-Dec-2010
Date of Filing 27-Apr-2007
Name of Patentee SAMSUNG ELECTRONICS CO., LTD.
Applicant Address 416, Maetan-dong, Yeongtong-gu, Suwon-si, Gyeonggi-do,
Inventors:
# Inventor's Name Inventor's Address
1 SEUNG-JAE OH 109-2104 Yeoksam Prugio Apt., 754-1 Yeoksam 2-dong, Gangnam-gu, Seoul
2 SE-HEE HAN 507-502 Samsung Raemian 2-Cha Apt., Gireum 2-dong, Seongbuk-gu, Seoul
3 JOO-YEOL LEE (412) Seocho Daewoo Diovill, 1355-17 Seocho 2-dong, Seocho-gu, Seoul
4 DONG-SHIN JUNG 106-805 Seongji Apt., Gwonseon-dong, Gwonseon-gu, Suwon-si, Gyeonggi-do
5 WON-SEOK KWON 1006-1503 Bangjuk Maeul Yeongtong Tranchae Apt., Mangpo-dong, Yeongtong, Suwon-si, Gykeonggi-do
PCT International Classification Number H04L12/28
PCT International Application Number N/A
PCT International Filing date
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 10-2006-0075304 2006-08-09 Republic of Korea