Method for pre-authentication and pre-configuration, and system thereof

A pre-configured and pre-authentication technology, applied in security devices, wireless communications, electrical components, etc., can solve problems such as inability to reduce delays, and achieve the effect of improving quality

Active Publication Date: 2012-10-17
THE HONG KONG POLYTECHNIC UNIV
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide a safe and fast method for 802.11 networks in view of the defect that the delay caused by the authentication and / or configuration process cannot be reduced in the prior art when switching between subnets and domains. Toggle pre-authentication and provisioning methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for pre-authentication and pre-configuration, and system thereof
  • Method for pre-authentication and pre-configuration, and system thereof
  • Method for pre-authentication and pre-configuration, and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0053] image 3 is a flowchart of a pre-authentication method for cross-subnet handover according to an embodiment of the present invention. In this embodiment, the pre-authentication method for inter-subnet handover starts at step 110 .

[0054] In step 110, the current access point receives the pre-authentication request information from the communication terminal, and transmits the received pre-authentication request information to the second virtual terminal through the UDP channel through the first virtual terminal, wherein the first virtual terminal is located at the current access point....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for pre-authentication and pre-configuration, and a system thereof. The system for pre-authentication and pre-configuration comprises a current access point and a candidate access point located in different subnets, and also comprises a first virtual terminal located in the current access point and a second virtual terminal located in the candidate access point, the first virtual terminal and the second virtual terminal communicating through an User Datagram Protocol (UDP) channel. The system also comprises a candidate access point which belongs to a different domain with the current access point, a third virtual terminal located in the candidate access point, a first virtual server in a same domain with the current access point and a third virtual server in the same domain with the candidate access point, the first virtual terminal, the first virtual server, the third virtual terminal and the third virtual server communicate with each other through the UDP channel. Through using virtual terminals and / or virtual server to send information related to the pre-authentication and the pre-configuration in the UDP layer, the method enables switches among different subnets in the same domain, and even among different domains.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a pre-authentication and pre-configuration method and system thereof. Background technique [0002] When a communication terminal safely switches from one access point to another in the 802.11 network, it must exchange authentication information and configuration information with another access point, and then successfully connect after authentication and configuration. Among them, the authentication process based on 802.1X and the configuration process based on Dynamic Host Configuration Protocol (Dynamic Host Configuration Protocol, DHCP) are the two main factors causing the handover delay. figure 1 is a schematic diagram of an 802.11 authentication system based on 802.1X in the prior art. Such as figure 1 As shown, an EAP (EAP Over LAN, EAPOL) architecture in a local area network generally includes an authenticator (that is, an access point) and an authentication, authori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W36/08H04W12/062
Inventor 肖鑫曹建农
Owner THE HONG KONG POLYTECHNIC UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products