Method for implementing secret communication between communication terminal and wireless access point

A technology for wireless access points and communication terminals, applied to key distribution, can solve the problems of heavy key management tasks, and the storage capacity of wireless access points cannot meet the requirements, achieving less maintenance costs, improved data security, The effect of saving system resources

Inactive Publication Date: 2011-05-25
AIGO DIGITAL TECHNOLOGY CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First of all, in this key management mode, in order to support user roaming, each wireless access point (AP) should store all user keys, and every time a user's key is added or modified, the network manager must It is necessary to add or modify the user's key on all wireless access points (AP), which makes the key management task quite heavy, and the storage capacity of the wireless access point (AP) may not meet the requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing secret communication between communication terminal and wireless access point
  • Method for implementing secret communication between communication terminal and wireless access point
  • Method for implementing secret communication between communication terminal and wireless access point

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to further illustrate the technical means and functions adopted by the present invention to achieve the intended purpose, the detailed description is as follows in conjunction with the accompanying drawings and embodiments.

[0021] see figure 1 Shown is the structural block diagram of encryption device of the present invention, and this encryption device comprises:

[0022] Microprocessor module: responsible for data calculation, by calling the data and programs in the data storage module and program storage module, to perform encryption and decryption operations, to complete the encryption and decryption of the information transmitted in the communication, and to prepare to send it through the wireless LAN module The data is encrypted, and the data obtained through the wireless LAN module is decrypted.

[0023] Program storage module: connected to the microprocessor module, it mainly stores encryption, integrity protection algorithm and key generation algori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for secret communication between communication terminal and wireless access point comprising following steps: (1) presetting unique identification information and communication key in encryption device, storing authenticated identification information and key of encryption device at wireless access point; (2)connecting encryption device and communication terminalvia communication interface and acquiring power supply, installing and operating dedicated drive program on communication terminal; (3) the encryption device sending authentication request including identification information to wireless access point; (4) wireless access point authenticating the encryption device according to identification information included in authentication request, if authentication being successful, then fetching corresponding key and sending notice of permission for access; (5) the encryption device notifying communication terminal of the established connection with wireless access point after receiving permission for access, encrypting, deciphering the transmitted data by communication key; wireless access point encrypting and deciphering the transmitted data viakey.

Description

【Technical field】 [0001] The invention relates to a secure communication method between a communication terminal and a wireless access point in a wireless local area network, in particular to a method for realizing wireless access and communication security of a communication terminal in a wireless local area network by using an encryption device. 【Background technique】 [0002] At present, a wireless access system of a WLAN (Wireless Local Area Network, wireless local area network) is usually composed of a wireless network card, a wireless access point (AP, Access Point), a wireless access gateway (AG, Access Server) and a wireless access server ( AS, Access Server) and other parts. The more common networking method is to connect terminal devices such as computers and PDAs through wireless network cards, replacing the original wired network cards in the above devices, so as to realize wireless connections between terminal devices, terminal devices and wireless access points...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/28H04L9/08H04L29/06
Inventor 曹镇
Owner AIGO DIGITAL TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products