Wireless local area network trusted security access method

A wireless local area network and secure access technology, which is applied in the field of wireless local area network security and can solve the problems of inability to measure terminal integrity and reliability.

Active Publication Date: 2013-04-03
BEIHANG UNIV
View PDF2 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be used to solve the defect that the integrity and credibility of the terminal cannot be measured in the traditional wireless local area network access protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless local area network trusted security access method
  • Wireless local area network trusted security access method
  • Wireless local area network trusted security access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The implementation manner of the trusted security access method will be described in detail below with reference to the accompanying drawings.

[0043] Description of the main cryptography knowledge, trusted computing technology and security assumptions used in this method:

[0044] 1. Bilinear pairing: let G 1 , G 2 They are respectively the additive cyclic group and the multiplicative cyclic group whose prime number is q in the elliptic curve, and P is the group G 1 the generator of G , and G 1 The discrete logarithm problem on is intractable. Then the bilinear map e:G between two groups 1 ×G 1 →G 2 satisfy the following properties.

[0045] (1) Bilinearity: e(aP,bQ)=e(P,Q) ab , for all P,Q∈G 1 ;a, b∈Z are all established;

[0046] (2) Non-degenerate: there is P, Q∈G 1 , making e(P,Q)≠1;

[0047] (3) Computability: For P, Q∈G 1 , there exist efficient algorithms to compute e(P,Q).

[0048] 2. PCR is the value of some registers in the TPM chip that repres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A wireless local area network trusted security access method includes five steps of an access activation stage, an access request stage, a certificate authentication request stage, a certificate authentication response stage and an access response stage. Integrality measurement of terminals is achieved by using an integrality measuring chip, identity authentication is achieved by using a digital certificate technology, and negotiation of session keys is achieved by using a certificateless public key system. According to the wireless local area network trusted security access method, integrality authentication, identity authentication and key negotiation processes are fully integrated, only five times of interactions are required for achieving access processes, and the method is high in security and simultaneously capable of saving system overhead.

Description

technical field [0001] The invention relates to a method for a wireless terminal to access the network in a wireless local area network environment. The method introduces the concept of trusted computing into the wireless local area network, and realizes the integrity measurement and trusted authentication of the terminal. It belongs to the wireless LAN security technology field. Background technique [0002] With the continuous development of wireless communication technology, WLAN (Wireless Local Area Networks, wireless local area network) has been widely used in military and civilian fields, but the security problems caused by its openness have become the bottleneck of its continued development. WLAN must take relative security measures against different security threats to ensure its security. [0003] Security protocols are the basis for solving WLAN security threats. IEEE (Institute of Electrical and Electronics Engineers, Institute of Electrical and Electronics Engi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08
Inventor 刘建伟赵朋川王世帅陈杰刘哲
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products