Unlock instant, AI-driven research and patent intelligence for your innovation.

Secret communication method for implementing wireless local area network by using multi-algorithm

A wireless local area network and secure communication technology, applied in the field of secure communication, can solve the problems of insufficient storage capacity of wireless access points, heavy key management tasks, etc., and achieve data security improvement, security assurance, and system resource saving Effect

Inactive Publication Date: 2010-09-15
AIGO DIGITAL TECHNOLOGY CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First of all, in this key management mode, in order to support user roaming, each wireless access point (AP) should store all user keys, and every time a user's key is added or modified, the network manager must It is necessary to add or modify the user's key on all wireless access points (AP), which makes the key management task quite heavy, and the storage capacity of the wireless access point (AP) may not meet the requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret communication method for implementing wireless local area network by using multi-algorithm
  • Secret communication method for implementing wireless local area network by using multi-algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to further illustrate the technical means and functions adopted by the present invention to achieve the intended purpose, the detailed description is as follows in conjunction with the accompanying drawings and embodiments.

[0021] see figure 1 Shown is the structural block diagram of encryption device of the present invention, and this encryption device comprises:

[0022] Microprocessor module: responsible for data calculation, by calling the data and programs in the data storage module and program storage module, to perform encryption and decryption operations, to complete the encryption and decryption of the information transmitted in the communication, and to prepare to send it through the wireless LAN module The data is encrypted, and the data obtained through the wireless LAN module is decrypted.

[0023] Program storage module: connected with the microprocessor module, it mainly stores two or more encryption algorithms and integrity protection algorit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method using multi-algorithm to realize secret communication of wireless local area network, comprising: (1) presetting mark information in an encryption device, storing a first encryption algorithm, feature information and a special second encryption algorithm for the secret communication; (2) storing all mark information and multiple communication keys in a verifying device: (3) storing the second encryption algorithm in a wireless access point; (4) installing and running the special driving program; (5) the encryption device sending a verifying request to the verifying device; (6) the verifying device verifying according to the mark information in the verifying request, and distributing the communication key if the verification is successful, and encrypting by using the first encryption algorithm as the feature information, sending the un-encrypted communication key to the wireless access point, sending the encrypted communication key to the encryption device; (7) the encryption device decrypting the encrypted data and using it as the encryption key; (8) the wireless access point and the encryption device encrypting and decrypting with the second encryption algorithm adopted by the communication key.

Description

【Technical field】 [0001] The invention relates to a secret communication method between a communication terminal and a wireless access point in a wireless local area network, in particular to a secret communication method using an encryption device to adopt different encryption algorithms in the process of obtaining a communication key and in safe communication in a wireless local area network. 【Background technique】 [0002] At present, a wireless access system of a WLAN (Wireless Local Area Network, wireless local area network) is usually composed of a wireless network card, a wireless access point (AP, Access Point), a wireless access gateway (AG, Access Server) and a wireless access server ( AS, Access Server) and other parts. The more common networking method is to connect terminal devices such as computers and PDAs through wireless network cards, replacing the original wired network cards in the above devices, so as to realize wireless connections between terminal devi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L12/28H04W12/02
Inventor 曹镇
Owner AIGO DIGITAL TECHNOLOGY CO LTD