Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for implementing secret communication of wireless local area network

A technology of wireless local area network and secure communication, applied in the field of secure communication, can solve the problems such as the storage capacity of wireless access points cannot meet the requirements, and the key management tasks are heavy, and achieve a simplified structure, improved data security, and saved system resources. Effect

Inactive Publication Date: 2009-05-13
AIGO DIGITAL TECHNOLOGY CO LTD
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First of all, in this key management mode, in order to support user roaming, each wireless access point (AP) should store all user keys, and every time a user's key is added or modified, the network manager must It is necessary to add or modify the user's key on all wireless access points (AP), which makes the key management task quite heavy, and the storage capacity of the wireless access point (AP) may not meet the requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing secret communication of wireless local area network
  • Method for implementing secret communication of wireless local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to further illustrate the technical means and functions adopted by the present invention to achieve the intended purpose, the detailed description is as follows in conjunction with the accompanying drawings and embodiments.

[0022] see figure 1 Shown is the structural block diagram of encryption device of the present invention, and this encryption device comprises:

[0023] Microprocessor module: responsible for data calculation, by calling the data and programs in the data storage module and program storage module, to perform encryption and decryption operations, to complete the encryption and decryption of the information transmitted in the communication, and to prepare to send it through the wireless LAN module The data is encrypted, and the data obtained through the wireless LAN module is decrypted. In addition, the microprocessor module can generate a key from the characteristic information using a key generation algorithm.

[0024] Program storage modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for implementing encrypted communication for wireless LAN comprising (1) presetting identification information in encryption device, storing identification information in authentication device, establishing information table of corresponding relation of identification information and characteristic information in authentication device, connecting the access point and authentication device; (2) installing and operating dedicated drive program; (3) encryption device sending authentication request to authentication device; (4) the authentication device authenticating according to identification information, if the authentication being successful, then fetching corresponding characteristic information, transmitting the first key created from the characteristic information by the authentication device according to the algorithm to wireless access point, and transmitting to encryption device; (5) the encryption device acquiring characteristic information via wireless access point, and creating a key from the characteristic information according to same key creation algorithm; (6) wireless access point and encryption device encrypting and deciphering the transmitted data via the first key in wireless channel.

Description

【Technical field】 [0001] The invention relates to a secure communication method between a communication terminal and a wireless access point in a wireless local area network, in particular to a method for realizing wireless access and communication security of a communication terminal in a wireless local area network by using an encryption device. 【Background technique】 [0002] At present, a wireless access system of a WLAN (Wireless Local Area Network, wireless local area network) is usually composed of a wireless network card, a wireless access point (AP, Access Point), a wireless access gateway (AG, Access Server) and a wireless access server ( AS, Access Server) and other parts. The more common networking method is to connect terminal devices such as computers and PDAs through wireless network cards, replacing the original wired network cards in the above devices, so as to realize wireless connections between terminal devices, terminal devices and wireless access points...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/28H04L9/30H04L9/32
Inventor 曹镇
Owner AIGO DIGITAL TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products