Unlock instant, AI-driven research and patent intelligence for your innovation.

Secret key verification method and device

A verification method and key technology, which is applied in the field of key verification methods and devices, and can solve problems such as extended network access time and complicated security verification process

Active Publication Date: 2013-09-18
ZTE CORP
View PDF6 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] Aiming at the problem in the related art that in the process of re-establishing the link between STA and AP, the security verification process is complicated, resulting in a long network access delay, the present invention provides a key verification method and device to at least solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key verification method and device
  • Secret key verification method and device
  • Secret key verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] According to a preferred embodiment of the present invention, before the STA sends the first request message to the AP, it generates a random number SNonce, and obtains the PMKID when the STA was associated with the AP last time, and carries the generated SNonce and the obtained PMKID in the first request message. message to the AP. After receiving the first request message, the AP judges whether the retrieved PMK is valid according to the PMK corresponding to the PMKID. If the retrieved PMK is valid, the AP directly performs key verification with the STA.

[0075] In a preferred implementation of the embodiment of the present invention, the key verification process performed by the AP directly with the STA may include: the AP generates a random number ANonce, derives the PTK according to the retrieved PMK, the received SNonce and the generated ANonce, and according to the derivation The output PTK generates KCK. The AP uses the generated KCK to calculate the MIC of t...

Embodiment 2

[0095] According to a preferred embodiment of the present invention, before the STA sends the first request message to the AP, it generates a random number SNonce, and obtains the PMKID when the STA was associated with the AP last time, and carries the generated SNonce and the obtained PMKID in the first request message. message to the AP. After receiving the first request message, the AP judges whether the retrieved PMK is valid according to the PMK corresponding to the PMKID. If the retrieved PMK is valid, the AP directly performs key verification with the STA.

[0096] In a preferred implementation manner of the embodiment of the present invention, the key verification process performed by the AP directly with the STA may include: the AP generates a random number ANonce, and sends a first response message carrying a first request message of the generated ANonce to the STA. The AP receives the second request message returned by the STA, where the second request message carr...

Embodiment 3

[0111]According to a preferred embodiment of the present invention, before sending the first request message to the AP, the STA obtains the PMKID when the STA associated with the AP last time, and carries the obtained PMKID in the first request message and sends it to the AP. After receiving the first request message, the AP judges whether the retrieved PMK is valid according to the PMK corresponding to the PMKID. If the retrieved PMK is valid, the AP directly performs key verification with the STA. Specifically, the AP can determine whether the PMK is still within the valid life cycle, and if so, the PMK is valid; otherwise, the PMK is invalid. And / or the AP can also judge whether the authentication and key management (Authentication and Key Management, AKM for short) in the PMK is consistent with the AKM in the first request message. If they are consistent, the PMK is valid; otherwise, the PMK is invalid.

[0112] In a preferred implementation of the embodiment of the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret key verification method and a device, wherein the method comprises the following steps that an AP (access point) receives a first request message sent when an STA (station) is associated for a second time or re-associated to the AP, wherein the first request message carries a corresponding safety context mark when the STA is associated to the AP in the last time or when the STA is re-associated to the AP; the AP retrieves the locally stored safety context of the STA according to the safety context mark, and in addition, whether the retrieved safety context is effective or not is judged; if so, the AP is directly subjected to secret key verification processing with the STA. Through the method and the device provided by the invention, the safety verification flow process for rebuilding links between the STA and the AP is simplified, and the problem of long network access time caused by flow process complexity is avoided.

Description

technical field [0001] The present invention relates to the communication field, in particular to a key verification method and device. Background technique [0002] Institute of Electrical and Electronic Engineers (Institute for Electrical and Electronic Engineers, referred to as IEEE) 802.11 is one of the first generation of wireless local area network (Wireless Local Area Networks, referred to as WLAN) standards. Such as figure 1 As shown, an IEEE 802.11 network includes: a workstation (Station, STA for short), and a wireless access point (Access Point, AP for short). Wherein, the STA can be any device with IEEE 802.11 media access control (MediaAccess Control, referred to as MAC) layer and physical layer (Physical Layer, referred to as PHY) interface, usually by a personal computer (Personal Computer, referred to as PC) or notebook computer plus wireless network card. In addition, the STA can also be an embedded device (for example, an 802.11 mobile phone) on a non-co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04W76/02H04W12/041H04W12/069
Inventor 冯成燕朱李
Owner ZTE CORP