Method and system for analyzing wireless local area network authentication and privacy infrastructure protocol

A wireless local area network and protocol analysis technology, applied in the field of communication, can solve the problems of inability to test WAPI protocol consistency, no WAPI protocol analysis method and system, etc., and achieve the effects of flexible upgrade, convenient use, and accurate test accuracy

Inactive Publication Date: 2012-04-25
THE RES INST OF TELECOMM TRANSMISSION MIIT
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Therefore, there is no WAPI protocol analysis method and system in wireless transmission in the prior art, and it is impossible to separately realize the WAPI protocol consistency test of the wireless LAN equipment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for analyzing wireless local area network authentication and privacy infrastructure protocol
  • Method and system for analyzing wireless local area network authentication and privacy infrastructure protocol
  • Method and system for analyzing wireless local area network authentication and privacy infrastructure protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] Figure 7 It is a flow chart of the first embodiment of the WAPI protocol analysis method of the present invention. As shown in the figure, the first embodiment of the WAPI protocol analysis method of the present invention specifically includes the following steps:

[0071] Step 101, acquiring a wireless signal, and extracting a WAPI protocol message from the acquired wireless signal;

[0072] Step 102, analyzing the WAPI protocol message to obtain the grouping information of the WAPI protocol message;

[0073] Step 103, according to the grouping information of WAPI protocol message, obtain the value of each field in the WAPI protocol message of WAI grouping;

[0074] Step 104, judge whether the WAPI protocol flow in the WAPI protocol message of the WAI packet is consistent with the preset WAPI protocol flow according to the value of each field in the WAPI protocol message of the WAI packet.

[0075] Figure 8 It is an overall framework diagram based on the WAPI prot...

Embodiment 2

[0082] Figure 10 It is the flowchart of the second embodiment of the WAPI protocol analysis method of the present invention. As shown in the figure, the second embodiment of the WAPI protocol analysis method of the present invention specifically includes the following steps:

[0083] Step 201, initialization process;

[0084] The USB wireless network card driver first registers itself with the USB subsystem, and then judges whether the hardware device has been inserted into the bus through the vendor id and device id. When the wireless network card is inserted into the USB bus, the USB core will call the Probe method to detect the information passed in to determine whether the wireless network card device matches the driver, and at the same time fill in the struct net_device to complete the initialization of the network device. When the wireless network card is pulled out, the USB core will call the Disconnect method to complete the cleaning work. The driver calls module_in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and a system for analyzing wireless local area network authentication and a privacy infrastructure (WAPI) protocol. The method comprises the following steps: extracting a WAPI protocol message from an acquired radio signal; analyzing the WAPI protocol message to obtain packet information of the WAPI protocol message; acquiring the value of each field in the WAPI protocol message of a WAI packet according to the packet information of the WAPI protocol message; and judging whether a WAPI protocol process in the WAPI protocol message of the WAPI packet is accordant with a preset WAPI protocol process according to the value of each field in the WAPI protocol message of the WAI packet. By using the method and the system for analyzing the WAPI protocol of the invention, an air data packet of the received radio signal can be fetched and a WAPI protocol analysis can be performed independently so as to judge the consistency of the WAPI protocol. The system has the characteristics of convenient use, flexible upgrade and high test accuracy.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a WAPI protocol analysis method and system. Background technique [0002] Wireless LAN Authentication and Privacy Infrastructure (WAPI) is a security protocol, like infrared, Bluetooth, GPRS, CDMAlX and other protocols, it is a kind of wireless transmission protocol, the difference is that it is a wireless LAN (Wireless Local Area Network, WLAN) is a transmission protocol that is similar to the 802.11B transmission protocol. At present, the WAPI mechanism has been approved by the IEEE Registration Authority authorized by ISO / IEC, and the Ethernet type number (IEEE EtherTypeField) Ox88b4 used for the mechanism has been assigned. [0003] With the development of WAPI technology, in addition to typical products such as wireless access points and wireless network cards, more and more mobile terminals support WAPI functions, and the demand for protocol conformance testing of co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L1/24H04L29/06
Inventor 郑忠斌赵强何桂立马鑫张翔贺鹏李莉莉温蕾张秩惟
Owner THE RES INST OF TELECOMM TRANSMISSION MIIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products