Method and device for processing cipher key list items

A processing method and key table technology, applied in the field of communications, can solve the problems of allocation failure, unsatisfactory distribution of key table entries, and users not being able to go online.

Inactive Publication Date: 2011-02-16
NEW H3C TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when there are many users and BSSs created, and users frequently go online and offline, and BSSs are frequently created and deleted, some "holes" will appear in the key table entries of the WMAC chip.
If a TKIP user wants to go online or create a TKIP-encrypted BSS at this time, although the number of free key table entries exceeds 4 or 2, the distribution of key table entries does not meet the TKIP unicast or multicast key requirements. The allocation fails due to the requirements, which in turn causes TKIP-type users to be unable to go online or TKIP-type BSS creation failures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing cipher key list items
  • Method and device for processing cipher key list items
  • Method and device for processing cipher key list items

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] When multiple encrypted access methods are configured on the wireless service, and there are many online users and created BSSs, users frequently go online and offline, and BSSs are frequently created and deleted, some idle data will be generated in the hardware key table entries of the WMAC chip. The key is "empty", so that although the total number of idle key entries is sufficient, the distribution of idle key entries does not meet the requirements for the use of TKIP unicast or TKIP multicast keys and cannot be used by TKIP unicast and TKIP multicast keys. Multicast key to use.

[0087] In view of the above problems, the present invention provides a method and device for processing key table items, so that according to the distribution characteristics of TKIP unicast or multicast keys, the idle key table items are arranged to meet the requirements of TKIP by moving the key table items. Unicast or TKIP multicast key distribution requirements, so that more TKIP users ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for processing cipher key list items. The method comprises the following steps of: judging whether the current cipher key list can store cipher keys according to a cipher key allocation strategy; and if so, transferring cipher key values stored in the current cipher key list according to the cipher key allocation strategy, and storing the cipher keys in corresponding cipher key list items before transferring the cipher key values. In the invention, the method and the device can ensure more TKIP users to be online, and provide wireless access services for the TKIP users.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a method and device for processing key table items. Background technique [0002] In the WLAN (Wireless Local Area Networks, wireless local area network) access service, after each user goes online, the AP (Access Point, wireless access point) needs to generate a unicast key for it, and the AP will use the unicast key to The key is used to encrypt and decrypt the unicast packets sent and received by the user. For each BSS (Basic Service Set, Basic Service Set) with encrypted user access, the AP needs to generate a multicast key for it, which is used to send multicast to all users accessing the encrypted BSS message. On a WMAC (Wireless Media Access Control, wireless media access control) chip, there are several hardware key entries (key entries), which are used to store unicast and multicast keys. When the WMAC chip sends and receives wireless messages, by query...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04
Inventor 高志强
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products