Unlock instant, AI-driven research and patent intelligence for your innovation.

Wireless device and secrete key exchange method

A wireless device and key exchange technology, applied in the direction of data exchange through path configuration, secure communication device, public key for secure communication, etc., can solve the problems of WDS connection insecurity, user troubles, etc.

Active Publication Date: 2008-09-10
NANNING FUGUI PRECISION IND CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, if the two access points only support a set of fixed WEP keys, the WDS connection will be very insecure. Therefore, in order to ensure communication security, users need to manually change the WEP keys of the two access points frequently. causing a lot of trouble for users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless device and secrete key exchange method
  • Wireless device and secrete key exchange method
  • Wireless device and secrete key exchange method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] refer to figure 1 , is an implementation environment diagram of the key exchange method of the present invention. In this embodiment, the wireless communication system includes a first access point 10 , a second access point 20 , a first mobile station 11 and a second mobile station 21 . The first mobile station 11 and the second mobile station 21 can be any devices connected to the wireless local area network, such as mobile phones, portable computers, personal digital assistants (Personal Digital Assistant, PDA) and so on. The first mobile station 11 communicates wirelessly with the first access point 10 . The second mobile station 21 communicates wirelessly with the second access point 20 .

[0019] In this embodiment, the first access point 10 transmits a request key exchange (Request-key-change) frame to the second access point 20 to request key exchange, and the second access point 20 transmits an agreed key exchange ( Agree-key-change) frame to the first acces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a wireless device which is used for automatically exchanging keys with other wireless devices. The wireless device comprises a key requesting module, a key producing module and a key delivering module. The key requesting module requests to exchange keys through transmitting an exchange frame for requesting keys. The key producing module is used for producing a new key when the exchange request for a key is succeeded. The key delivering module is used for encrypting a new key according to a public key of another wireless device and delivering the encrypted new key by a delivering transmission frame of the new key. The invention also provides a key exchange method. The wireless device can automatically and safely exchange keys with another wireless device through the key requesting module, the key producing module and the key delivering module by adopting the key exchange method provided by the invention.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to a wireless device and a key exchange method thereof. Background technique [0002] In the Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless network, the wireless distribution system (Wireless Distributed System, WDS) connection is used between the access point (Access Point, AP) and the access point data transmission. Generally, two access points establishing a WDS connection require a user to set a set of identical Wired Equivalent Privacy (WEP) keys through user interfaces (User Interface, UI) of the two access points. Thereafter, the two access points can transmit data through the set WEP key. [0003] However, if the two access points only support a set of fixed WEP keys, the WDS connection will be very insecure. Therefore, in order to ensure communication security, users need to manually change the WEP keys of the two access points frequently. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L12/28
CPCH04L9/0844H04L9/0891
Inventor 吕启明丁国治
Owner NANNING FUGUI PRECISION IND CO LTD