Authentication and encryption method for wireless network

A technology of wireless network and security method, which is applied in the field of identification and security of wireless network to achieve the effect of ensuring security, increasing the difficulty of cracking, and improving security

Active Publication Date: 2009-08-05
CHINA IWNCOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] The main purpose of the present invention is to provide an authentication and security method for wireless networks, which solves the problem of no effective security access control for wireless terminals in the prior art, and overcomes the limitations of wireless link data communication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and encryption method for wireless network
  • Authentication and encryption method for wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0052] Such as figure 1 As shown, using the public key cryptography technology, when the wireless terminal WT is physically associated with the wireless access point AP, the authentication server AS is used for two-way certificate authentication, and only the wireless terminal WT with a valid certificate can access the wireless access point with a valid certificate AP, otherwise the wireless access point AP and the wireless terminal WT are physically disassociated. Among them, the content of the certificate mainly includes the serial number of the certificate, the name of the certificate issuer, the validity period of the certificate, the name of the certificate holder, the public key information of the certificate holder, the type of the certificate, the signature algorithm adopted by the certificate issuer, and the The signature of the certif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An authentication and security method for a wireless network. When a wireless terminal communicates with a wireless access point, a two-way certificate authentication is performed by an authentication server; after the two-way certificate authentication is successful, a unicast key negotiation is performed to realize secure communication of unicast data ; After the unicast key negotiation is successful, the wireless access point notifies the wireless terminal of the multicast / broadcast key to realize the secure communication of the multicast / broadcast data; the present invention solves the problem of security access control in the wireless network and overcomes the wireless Due to the limitation of confidentiality of data communication on the link, using public key cryptography technology, the two-way certificate authentication between the wireless terminal and the wireless access point is realized through the authentication server, which improves the security of access control; through dynamic unicast key negotiation The multicast / broadcast key notification completes the identification of each unicast key by each wireless terminal and the dynamic update of the unicast key and the multicast / broadcast key during the communication process, which realizes the confidential communication of data and increases the The difficulty of cracking.

Description

technical field [0001] The present invention relates to an authentication and security method for a wireless network, and specifically refers to a method that combines wireless communication technology and encryption technology to solve the problem of wireless terminals (Wireless Terminal, WT for short) and wireless access points (WT) in wireless networks. It is a method for identity authentication and communication data confidentiality between Access Points (AP for short). It belongs to wireless communication, computer network and encryption technology. Background technique [0002] The goal of personal communication is to enable people to communicate with anyone at any time and any place, and enjoy various services provided by the network freely. Wireless network is the most important way to achieve personal communication goals. It provides convenient and fast network communication services and Internet access services for mobile hosts or wireless terminals to meet people...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14
Inventor 陈屹戎
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products