Wireless device and secrete key exchange method
A wireless device and key exchange technology, applied in the direction of data exchange through path configuration, secure communication device, public key for secure communication, etc., can solve the problems of WDS connection insecurity, user troubles, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] refer to figure 1 , is an implementation environment diagram of the key exchange method of the present invention. In this embodiment, the wireless communication system includes a first access point 10 , a second access point 20 , a first mobile station 11 and a second mobile station 21 . The first mobile station 11 and the second mobile station 21 can be any devices connected to the wireless local area network, such as mobile phones, portable computers, personal digital assistants (Personal Digital Assistant, PDA) and so on. The first mobile station 11 communicates wirelessly with the first access point 10 . The second mobile station 21 communicates wirelessly with the second access point 20 .
[0019] In this embodiment, the first access point 10 transmits a request key exchange (Request-key-change) frame to the second access point 20 to request key exchange, and the second access point 20 transmits an agreed key exchange ( Agree-key-change) frame to the first acces...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 