Bidirectional identification method and system
A two-way authentication and authenticator technology, which is applied in the field of certificateless two-way authentication methods and systems based on bilinear pairing, and can solve the problems of public key authentication management difficulties and inability to protect user identities.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0110] In order to describe the solution in more detail, below we give a specific example that can be used in 802.11i. This example can be used as a new EAP authentication method. The specific description is as follows:
[0111] 1. The applicant sends a "Supplicant Hello (request session)" message to initiate a session connection. The message contains the protocol version number and the random number N S , session ID, and cipher suite. Cipher suites are some cipher options supported by the applicant. Among them, the key exchange method consists of DH and public key encryption exchange. In the proposed technical solution, it is recommended to use DH exchange as the preferred key exchange method, because of the security of this scheme. better.
[0112] 2. The authentication server responds with an "Authentication Server Hello (request received)" message, makes a choice from the cipher suites supported by the applicant and informs the applicant. After the Hello message, the ser...
Embodiment 2
[0118] Referring to Fig. 4, based on the technical solution provided by the present invention and the concrete example in 802.11i, a mobile equipment preparing to access current WLAN or WMN will carry out the establishment process of following RSNA:
[0119] Phase 1: Network Discovery Phase
[0120] At this stage, the applicant has two ways to discover the network access device (Authenticator, authenticator) and its security capabilities. One is passive scanning: the authenticator periodically broadcasts beacon frames (Beacon frames); the other is active scanning: the applicant sends a probe (Probe Request) to each channel, and the other party uses a probe response frame (Probe Response) to perform answer.
[0121] Phase 2: 802.11 Open Systems Authentication and Association Phase
[0122] At this stage, 802.11 open system authentication (802.11 Authentication Request, 802.11 Authentication Response) is performed between the applicant and the authenticator, and the cipher opt...
Embodiment 3
[0144] In order to describe the present invention in more detail, a specific example that can be used in 802.11i is also given, and this example can be used as a new EAP authentication method.
[0145] The specific description is as follows:
[0146] 1. The applicant sends a "session request" message to initiate a session connection, and the message includes the protocol version number, random number, session ID and cipher suite.
[0147] 2. The server replies with a "request received" message, chooses from the cipher suites supported by the applicant and informs the applicant. After the Hello message, the server sends its own identity ID AS . Finally the server sends "session complete" to indicate the end of the Hello message exchange.
[0148] 3. The applicant first selects the shared key MSK between the two parties, and uses it to encrypt his own identity to achieve identity protection. At the same time, use the public key of AS to encrypt ENC=MKh 2 (e(Y AS , P pub ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com