Network system and method for obtaining the public key certificate for WAPI

A public key certificate and network system technology, applied in the security field of wireless local area network, can solve the problems of inability to complete user identity, authentication, and inability to issue ASU public key certificates to users, and achieve good promotion and application prospects

Inactive Publication Date: 2007-08-15
北京安拓思科技有限责任公司
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Acquisition and management of electronic certificates: WAPI wireless network uses an asymmetric encryption algorithm with two keys, that is, there are public key-public key and private key-private key; in the process of information exchange, A Party generates a pair of keys and transmits the public key to Party B. After obtaining the public key, Party B encrypts the information with the key and sends it to Party A; Party A decrypts the encrypted information with its own private key.
[0006] (2) User roa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network system and method for obtaining the public key certificate for WAPI
  • Network system and method for obtaining the public key certificate for WAPI
  • Network system and method for obtaining the public key certificate for WAPI

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0050] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0051] Refer to Figure 1 to specifically introduce the structure of the WAPI-based Internet access authentication network system of the present invention, including: the Internet, the telecommunication network WAN, the AAA server located in the telecommunication network WAN, the HASU authentication server at the user's home, and the Multiple ASU authentication servers of each local network (identity authentication is performed between ASU and STA through certificates so that the user terminal can access the local network), and the directory certificate server DCS, as well as the AAA server, each authentication server ASU and all networks directly Connected access controller AC, wireless access point AP and terminal STA equipped with WAPI wireless network card (in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The network system obtaining public key certificate for WAPI only adds a DCS to store public key certificates of all ASUs and IP address and port number in whole network. The method for obtaining the public key certificate is also simple. This invention makes it easy to build trustiness between STS and ASU, solves the certification difficulty for roaming user, and has wide application future.

Description

Technical field [0001] The present invention relates to a security technology of a wireless local area network, specifically, to a network system and method for obtaining a public key certificate for WAPI, and belongs to the field of wireless communication technology. Background technique [0002] With the rapid development of wireless local area networks, its security issues have attracted increasing attention. The international standard ISO IEC 8802-11 defines the open system and shared key two link authentication mechanisms and the wired enhanced equivalent privacy WEP (Wired Equivalency Privacy) security protocol to solve the security problem; however, security vulnerabilities still exist. In order to make up for the loopholes in the security protocol of ISO IEC 8802-11, China issued a series of national standards for wireless local area network GB 15629.11 / 1102 and GB 15629.11-2003 / XG1-2006 / 1101 / 1103 / 1104 in 2003 and 2006 respectively. . GB 15629.11 has overcome the shortcom...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/28H04L9/30H04L9/08H04L29/06H04L29/08
Inventor 胡鹤飞袁东明刘元安唐碧华
Owner 北京安拓思科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products