Identity authentication method compatible 802.11i with WAPI

An identity authentication and identity technology, applied in the direction of user identity/authority verification, radio/induction link selection and arrangement, selection of devices, etc., can solve the problems of incompatibility between 802.11i and WAPI, and achieve the effect of reducing changes

Inactive Publication Date: 2007-08-08
XIDIAN UNIV
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0030] The purpose of the present invention is to overcome above-mentioned 802.11i and the defective that WAPI is incompatible with each other, propose a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method compatible 802.11i with WAPI
  • Identity authentication method compatible 802.11i with WAPI
  • Identity authentication method compatible 802.11i with WAPI

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0063] The following is a detailed description of the method of the present invention in combination with the flowchart 4 executed by the compatible solution and the protocol interaction process 5 of executing WAPI:

[0064] 1. The mobile station STA sends an EAP start message EAPOL-Start to the access point AP.

[0065] This message indicates that the mobile station STA requests EAP identity authentication, and its specific message format adopts the definition of EAPOL-Start in 802.11i.

[0066] 2. The access point AP sends a time stamp request message EAP-Req / WTS to the mobile station STA.

[0067] Through the time stamp request message EAP-Req / WTS, the access point AP requests the mobile station STA to send its identity and current access time. Since the current EAP message does not have this message type, a new message type type: WAPI-WTS needs to be added to the EAP message. The format of the message is shown in Figure 6.

[0068] The message format shown in Figure 6 is defin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses one method combined with 802.11i and WAPI identification, which comprises the following steps: mobile station STA to interface point AP extensive certificate agreement EAP initial information and the AP sending STA to time stamp information; if the STA supports WAPI to AP for answer information and sending identification and interface require time for signature; if the ASU supports WAPI then processing codes negotiating and sending AP to key transmission information; if the STA or WAPI not supporting identification then processing 802.11i; finally processing hand holding agreement by STA and AP.

Description

technical field [0001] The present invention belongs to the technical field of wireless communication, and relates to the security technology of wireless local area network, and specifically aims at the problem that the international wireless local area network security standard 802.11i is not compatible with the Chinese wireless local area network security standard WAPI, and proposes an authentication scheme compatible with both, To solve the identity authentication and key negotiation problems when foreign wireless products enter the Chinese market. Background technique [0002] With the rapid development and popularization of wireless local area network (WLAN), its security issues have aroused more and more people's attention. The IEEE802.11 working group is committed to formulating a new generation of security standards called 802.11i. This security standard enhances the data encryption and authentication performance of WLAN, and has made many improvements to the defects...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04Q7/38
Inventor 李兴华马建峰曹春杰杨力杨超沈玉龙
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products