Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

WLAN (wireless local area network) credible transmission realization method based on 802.1x authentication protocol

A technology of authentication protocol and implementation method, applied in the direction of wireless network protocol, wireless communication, network topology, etc., to achieve transparency and ensure the effect of real connection

Inactive Publication Date: 2011-10-19
BEIJING JIAOTONG UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no research report or software on applying the remote attestation technology of trusted computing transparently to the 802.1x authentication protocol to establish a trusted channel. Transparency refers to the key exchange protocol that integrates the remote attestation technology into the secure channel technology. , there is no need to modify the specific authentication mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WLAN (wireless local area network) credible transmission realization method based on 802.1x authentication protocol
  • WLAN (wireless local area network) credible transmission realization method based on 802.1x authentication protocol
  • WLAN (wireless local area network) credible transmission realization method based on 802.1x authentication protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] A method for realizing WLAN trusted transmission based on the 802.1x authentication protocol of the present invention requires the client to be equipped with a trusted security chip TPM on hardware, and its BIOS supports the TPM; and requires the client to install a measurement module on software. The client has its own AIK public and private keys. The method provided by the present invention needs to make the following modifications to the 802.1x authentication protocol:

[0040] (1) Define a new value for the Type field in the EAP packet, denoted as TPM, which is used to indicate that the authentication server side needs to verify the platform status information of the client. When the value of the Type field is TPM, the value of the corresponding TypeData field is used to describe the type of platform information to be verified. In the present invention, an EAP-Request (Response) whose Type field value is TPM is recorded as EAP-Request (Response) / TPM.

[0041] In t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a WLAN (wireless local area network) credible transmission realization method based on a 802.1x authentication protocol; the method comprises the following steps: when a client side and an authentication server finish authentication message interactive process and respectively compute a main session secret key, the authentication server packages one EAP (extensible authentication protocol) data packet with Request type and transmits the data packet to an authenticator, wherein the value of a Type field is TPM (trusted platform module), namely, the authentication server side carries out remote attestation to the client side, wherein the value of a TypeData field is a type of verified platform state information. And then the authenticator transmits the Request packet to the client side; after receiving the packet, the client side generates client side platform authentication information according to the value of the Type field, the main session secret key of the client side and the platform information of the client side transmits the client side platform authentication information to the authenticator; and then, the authenticator forwards the information to the authentication server side. The authentication server side carries out verification to the client side platform authentication information according to the main session secret key of the authentication server side after receiving the client side platform authentication information, and after verification is qualified, the authentication server side transmits the EAP data packet with Success type to the client side.

Description

technical field [0001] The invention belongs to the field of computer information security, in particular to a method for realizing WLAN trusted transmission based on 802.1x authentication protocol. Background technique [0002] IEEE 802.11i is a security standard proposed by the IEEE 802.11 working group, which is used to solve security issues of IEEE 802.11 wireless local area network (Wireless Local Area Network, WLAN for short). The IEEE802.1x protocol is an authentication protocol in the IEEE 802.11i standard. Its architecture includes three parts: client, authenticator, and authentication server. Its main function is to authenticate WLAN access users. After the 802.1x authentication protocol runs, the client and the authentication server will negotiate a master session key PMK (Pairwise Master Key), which will be passed to the authenticator by the authentication server to calculate the pairwise session between the client and the authenticator. Wait for the temporary k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W80/00H04W84/12
Inventor 常晓林秦英韩臻刘吉强
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products