Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing radio local area network authentication

A wireless local area network and authentication technology, applied in wireless communication, network topology, communication between multiple stations, etc., can solve the problems of low data transmission security, inconvenient operation and maintenance, low security, etc., to achieve High security, cost-saving network construction, and convenient operation

Inactive Publication Date: 2009-09-09
SNAPTRACK
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] 1) Only AAA authenticates STA, which has low security;
[0021] 2) The initial key is statically configured, and the security of data transmission is not high;
[0022] 3) Operation and maintenance are inconvenient and costly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing radio local area network authentication
  • Method for realizing radio local area network authentication
  • Method for realizing radio local area network authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The core content of the present invention is: use the user information in the STA's own user identification module as the user identification, and the authentication, authorization and accounting server (U-AAA) based on the user identification module obtains the information from the CDMA IS95 / CDMA 20001x according to the user identification. The authentication set is obtained in the HLR of the network, and then the mutual authentication between the user terminal and the U-AAA is realized by using the random number generated by the STA and the authentication set in the HLR.

[0061] see image 3 As shown, the authentication networking structure of the present invention includes STA, AC, U-AAA and HLR. Here, since the HLR and the AC are generally physically located in the same entity, they are collectively referred to as the HLR hereinafter. The subscriber identification module used in the present invention has WLAN service function, and has opened an account in HLR, sai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a method for performing authentication in a wireless LAN, applying to a wireless roaming mobile network which consists of a wireless LAN and a home location register (HLR) at least, subscriber terminal (STA) physical connects with an access point (AP), the core idea of the method of: in a multi-mode network, setting up a server (U-AAA) for authenticating, granting and charging the user identification module, subscriber information in the user identification module of STA is used as the subscriber identifier, according to the subscriber identifier, U-AAA extracts the authentication aggregation from the HLR of the mobile network which supports wireless roam, then through the random number generated by the STA and the authentication number corresponding to the authentication aggregation in the HLR of the mobile network which supports wireless roam, performing the mutual authentication between the subscriber terminal and U-AAA. This method is simple, convenient for application, cost-effective, safe and highly reliable.

Description

technical field [0001] The invention relates to network authentication technology, in particular to a method for authentication when a WLAN user accesses the network in a wireless roaming mobile network including at least a WLAN network and a home location register (HLR). Background technique [0002] WLAN uses radio frequency (RF) technology to form a local area network, which is a convenient data transmission system. In June 1997, the first wireless local area network standard IEEE802.11 was officially announced, which provided a unified standard for the physical layer and media access control (MAC) layer of wireless local area network, and strongly promoted the rapid development and application of wireless local area network. [0003] The identification and authentication of WLAN users generally depend on the unique account number and its corresponding password in the network. Through the authentication center, such as the remote access dial-up user service protocol serve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/28H04L9/32H04L29/06H04B7/26H04W12/06H04W84/04H04W84/12
CPCH04L63/0869H04W12/06H04W84/04H04W84/12H04W12/062
Inventor 高江海邵洋陈殿福李卓郭士奎
Owner SNAPTRACK