Method and device for realizing the extended authentication protocol in the wireless network

An extended authentication protocol, wireless network technology, applied in the field of wireless communication, can solve problems such as limited parameter information, inability to ensure network security performance, and inability to complete the EAP authentication process well, to improve security and maintain benefits Effect

Inactive Publication Date: 2007-08-01
HUAWEI TECH CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0046] 1. The parameter information required in the EAP authentication process passed between entities is limited, and EAP authentication cannot be completed well, for example, only authorization policy support information is carried in steps 23 and 24;
[0047] 2. Regarding the two EAP authentication processes currently proposed, the above process cannot distinguish the current EAP authentication method (single EAP authentication or two EAP authentications), and cannot complete the entire EAP authentication process well.
[0048] Therefore, the corresponding EAP authentication cannot be reliably implemented in the existing wireless communication network, and the security performance of the network cannot be well guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing the extended authentication protocol in the wireless network
  • Method and device for realizing the extended authentication protocol in the wireless network
  • Method and device for realizing the extended authentication protocol in the wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] In the method for implementing Extended Authentication Protocol authentication in a wireless network provided by the present invention, in order to enable the BS to know when the first EAP process is completed, an AUTHRELAY EIK-Transfer message is defined, so that the BS knows the first EAP process through this message. The process is completed, and the PKMv2 PKM-RSP / EAP-Complete message is sent on the air interface, indicating that the MSS has completed the first EAP process.

[0101] Specifically, an EIK-Transfer message is defined between the BS and the authenticator, and the message has two functions: the first aspect is used to transmit the EIK to the BS, and the second aspect is used to instruct the BS to perform the first EAP authentication process After successful completion, the BS is stimulated to initiate the second EAP authentication process.

[0102] In the specific implementation process of the present invention, in order to meet the needs of the EAP authe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The related method for realizing EAP certification in wireless network comprises: on authentication device, generating corresponding EIK according to obtained MSK in EAP process; then, sending EIK message to BS to generate complete EIK text. This invention improves security for wireless communication network business, both on preventing illegal attack to provider, and providing reliable business for user.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, and in particular, to an authentication technology in a wireless communication network. Background technique [0002] In the wireless communication network, according to the 802.16 protocol, the mobile terminal must establish the same AK (authorization key) context to communicate with the base station. The AK context includes: AK, AKID (authorization key identifier), AK Sequence Number (Authorization Key Sequence Number), AK Lifetime (Authorization Key Lifetime), PMK Sequence Number (Dual Master Key Sequence Number), HMAC / CMAC_KEY_U (Uplink Message Integrity Protection Key), HMAC / CMAC_PN_U (Uplink Message Integrity Protection Key) link message anti-replay attack packet sequence number, referred to as PN_U), HMAC / CMAC_KEY_D (downlink message integrity protection key), HMAC / CMAC_PN_D (downlink message anti-replay attack packet sequence number, referred to as PM_D), KEK (Key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04L29/06H04W12/041H04W12/06H04W92/14
Inventor 单长虹
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products