Supercharge Your Innovation With Domain-Expert AI Agents!

Discovery and negotiation method for authentication associated kit

A suite and two-way technology, applied in the field of discovery and negotiation of authentication association suites, can solve problems such as the inability to complete the authentication association process, and achieve the effect of meeting application requirements

Inactive Publication Date: 2009-05-13
CHINA IWNCOMM
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] It can be seen from the authentication association process of the above two situations: the authentication association process of the ECMA368 standard is based on only one pairwise temporary key PTK establishment scheme (four-step handshake protocol) and only one group temporary key GTK distribution scheme (group temporary key GTK key GTK distribution protocol), if there are multiple pairwise temporary key PTK establishment or group temporary key GTK distribution schemes, the authentication association process of the ECMA368 standard cannot be completed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Concrete implementation method of the present invention is as follows:

[0050] 1) Two new information element IEs are added to the information element IE list of the initiator and the responder: the pairwise temporary key PTK establishment IE and the group temporary key GTK distribution IE, and set the corresponding element identification ID, for example, 24 and 25:

[0051] 1.1) Pairwise temporary key PTK establishment IE: When both the initiator and the responder need to discover and negotiate the pairwise temporary key PTK establishment mechanism, the probe frame probe frame (including probe request frame proberequest frame and probe response frame probe response frame) should contain the complete field of the pairwise temporary key PTK establishment IE, the format of the pairwise temporary key PTK establishment IE is as follows:

[0052] information element

ID

length

PTK Builder

system number PTK build

Mechanism 1

... ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a finding and negotiation method for authentication related set adapting to ultra wide band. The method comprises: adding pair temporary key establishment IE and group temporary key dispensing IE in IE list of initiator and responser, setting corresponding element ID; 2) finding and negotiation identification of pair temporary key establishment mechanism is supported or not, finding and negotiation identification of group temporary key dispensing mechanism is supported or not; 3) identification of finding and negotiation course of authentication associated set is supported or not; 4) authentication associated course based on finding and negotiation method of authentication associated set. The invention provides a finding and negotiation method adapting to ultra wide band network authentication associated set; the multiple pair temporary key establishment scheme or multiple group temporary key dispensing scheme can provide finding and negotiation function of safe scheme for network, and satisfy all kinds of application demand.

Description

technical field [0001] The invention relates to a method for discovering and negotiating an authentication association suite, in particular to a method for discovering and negotiating an authentication association suite suitable for an ultra-broadband network. Background technique [0002] ECMA (European Computer Manufacturers Association, ECMA) launched the ECMA368 standard in 2005 to define ultra-wideband UWB (Ultra Wideband) physical layer and MAC layer specifications. Ultra-wideband UWB is a carrier-free communication technology that uses nanosecond to microsecond sine wave narrow pulses to transmit data. In the authentication association process of the ECMA368 standard, only a four-way handshake protocol (4-way handshake) and a A group temporary key GTK distribution protocol (Group Temporal Keyexchange) for establishing or updating the group temporary key GTK between ultra-wideband UWB devices. The authentication association process is divided into the following two s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W12/06H04W12/041H04W12/0431
CPCH04W12/04H04W12/06H04W84/12H04W12/041H04W12/0433H04W12/069H04W28/18H04W12/0471
Inventor 胡亚楠曹军肖跃雷铁满霞黄振海赖晓龙
Owner CHINA IWNCOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More