Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method of wireless access points

A wireless access point and authentication method technology, applied in the field of wireless access point authentication, can solve the problems of inability to AP authentication, inability to determine the number of wireless receivers, the maximum number of BSSs, the software version number, and inability to interact.

Active Publication Date: 2014-01-29
BEIJING HAN NETWORKS TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] After receiving the original manufacturer's model number 2110 reported by the AP, the AC finds two corresponding brand manufacturers' models from the AP product model comparison table, WP1110 and LN310. Attribute information such as the number of wireless receivers, the maximum number of BSSs, and the software version number of the model AP, the interaction cannot be performed
The AC cannot authenticate the AP according to the existing manufacturer's model authentication method.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method of wireless access points
  • Authentication method of wireless access points
  • Authentication method of wireless access points

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Hereinafter, embodiments of the present invention will be described in detail with reference to the drawings.

[0031] can be passed as figure 1 The discovery request message and the discovery response message of the shown message flow are used to realize the AP authentication method according to the present invention. Specifically, in the present invention, in the discovery request message sent by the AP, in addition to inserting other necessary data, it also inserts the brand The manufacturer's model data; and after receiving the discovery request message, the AC uses the original manufacturer's model and brand manufacturer's model data to authenticate the product. However, the present invention is not limited to the CAPWAP control message, but authentication can be performed by corresponding messages in other protocols.

[0032] figure 2 Shows the WTP board data of the vendor data part in the control message of the CAPWAP protocol, which includes a 32-bit vendor i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication method of access points in a wireless communication network, which comprises the following steps: receiving product identification information comprising an original manufacturer of wireless access points, product identification information of a brand manufacturer and discovery request messages of an MAC address; analyzing the received discovery request messages, and extracting the product identification information of the original manufacturer of the wireless access points, the product identification information of the brand manufacturer and the MAC address; and according to the extracted information, authenticating the access points by using a prestored access point type look-up table and an access point MAC address look-up table, wherein the access point type look-up table comprises at least one record comprising the product identification information of an original manufacturer of the access points, the product identification information of a brand manufacturer and access point attribute information, and the access point MAC address look-up table comprises at least one record comprising the product identification information of the brand manufacturer of the access points and the access point MAC addresses.

Description

technical field [0001] The invention relates to a method for authenticating a wireless access point, in particular to a method for authenticating a wireless access point by simultaneously using identification information of an original manufacturer (OEM manufacturer) and a brand manufacturer. Background technique [0002] Thin AP, that is, "thin Access Point", is relative to fat AP (fat AP). A fat AP is a wireless router, which implements network management and services for wireless users. Thin AP simplifies the functions of AP and needs to be used in conjunction with AC (wireless access controller). The access and management of wireless users are controlled by AC. [0003] The CAPWAP protocol is a WLAN centralized control architecture framework protocol proposed by the IETF, enabling the AC to centrally control the AP (called "WTP" in the CAPWAP protocol), and to unify the channel / power / roaming / security policies of the AP. control management. Such an architecture is char...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W48/16H04W80/02H04W88/08H04W12/71
Inventor 裴文辉韦安营范成龙
Owner BEIJING HAN NETWORKS TECH CO LTD