WAPI single broadcasting key negotiation method
A unicast key negotiation and discriminator entity technology, applied in key distribution, can solve problems such as storage exhaustion, prevent forgery, solve DoS attack problems, and enhance security and robustness.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0016] The present invention is applicable to the security when the WAPI frame method (TePA-AC (Access Control method based on Tri-element Peer Authentication)) is applied in specific networks such as wireless local area network and wireless metropolitan area network. protocol.
[0017] Concrete method of the present invention is as follows:
[0018] 1) The authenticator entity AE adds the message integrity code MIC to the original defined content of the unicast key negotiation request packet to form a new unicast key negotiation request packet, and sends it to the authentication requester entity ASUE; The integrity code MIC is the hash value calculated by the authenticator entity AE for all fields before the MIC field using the base key BK (Base Key) negotiated in the authentication phase;
[0019] 2) After the authentication requester entity ASUE receives the new unicast key negotiation request packet, it verifies whether the MIC in it is correct, if not, discards the packe...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com