Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A trusted and secure access method for wireless local area network

A wireless local area network and secure access technology, which is applied in the field of wireless local area network security and can solve the problems of inability to measure terminal integrity and reliability.

Active Publication Date: 2016-05-25
BEIHANG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be used to solve the defect that the integrity and credibility of the terminal cannot be measured in the traditional wireless local area network access protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trusted and secure access method for wireless local area network
  • A trusted and secure access method for wireless local area network
  • A trusted and secure access method for wireless local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The implementation manner of the trusted security access method will be described in detail below with reference to the accompanying drawings.

[0043] Description of the main cryptography knowledge, trusted computing technology and security assumptions used in this method:

[0044] 1. Bilinear pairing: let G 1 , G 2 They are respectively the additive cyclic group and the multiplicative cyclic group whose prime number is q in the elliptic curve, and P is the group G 1 the generator of G , and G 1 The discrete logarithm problem on is intractable. Then the bilinear map e:G between two groups 1 ×G 1 →G 2 satisfy the following properties.

[0045] (1) Bilinearity: e(aP,bQ)=e(P,Q) ab , for all P,Q∈G 1 ;a, b∈Z are all established;

[0046] (2) Non-degenerate: there is P, Q∈G 1 , making e(P,Q)≠1;

[0047] (3) Computability: For P, Q∈G 1 , there exist efficient algorithms to compute e(P,Q).

[0048] 2. PCR is the value of some registers in the TPM chip that repres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A trusted security access method for a wireless local area network, the method has five major steps: Step 1: access activation stage: Step 2: access request stage: Step 3: certificate authentication request stage: step 4: certificate authentication response stage: step Five: access response stage. The invention uses the integrity measurement chip to realize the integrity measurement of the terminal, uses the digital certificate technology to realize the identity authentication, and uses the non-certificate public key encryption system to realize the negotiation of the session key. The invention fully integrates integrity authentication, identity authentication and key agreement process, only needs 5 rounds of interaction to realize the access process, has high security and saves system overhead at the same time.

Description

technical field [0001] The invention relates to a method for a wireless terminal to access the network in a wireless local area network environment. The method introduces the concept of trusted computing into the wireless local area network, and realizes the integrity measurement and trusted authentication of the terminal. It belongs to the wireless LAN security technology field. Background technique [0002] With the continuous development of wireless communication technology, WLAN ((WirelessLocalAreaNetworks, wireless local area network) has been widely used in military and civilian fields, but the security problem caused by its openness has become a bottleneck for its continued development. WLAN must target Different security threats take relative security measures to keep them safe. [0003] Security protocols are the basis for solving WLAN security threats. IEEE (Institute of Electrical and Electronics Engineers, American Institute of Electrical and Electronics Engine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/08
Inventor 刘建伟赵朋川王世帅陈杰刘哲
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products