Unlock instant, AI-driven research and patent intelligence for your innovation.

Key verification method and device

A verification method and key technology, which is applied in the field of key verification methods and devices, and can solve problems such as extended network access time and complicated security verification process

Active Publication Date: 2018-06-12
ZTE CORP
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] Aiming at the problem in the related art that in the process of re-establishing the link between STA and AP, the security verification process is complicated, resulting in a long network access delay, the present invention provides a key verification method and device to at least solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key verification method and device
  • Key verification method and device
  • Key verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] According to a preferred embodiment of the present invention, before the STA sends the first request message to the AP, it generates a random number SNonce, and obtains the PMKID when the STA was associated with the AP last time, and carries the generated SNonce and the obtained PMKID in the first request message. message to the AP. After receiving the first request message, the AP judges whether the retrieved PMK is valid according to the PMK corresponding to the PMKID. If the retrieved PMK is valid, the AP directly performs key verification with the STA.

[0075] In a preferred implementation of the embodiment of the present invention, the key verification process performed by the AP directly with the STA may include: the AP generates a random number ANonce, derives the PTK according to the retrieved PMK, the received SNonce and the generated ANonce, and according to the derivation The output PTK generates KCK. The AP uses the generated KCK to calculate the MIC of t...

Embodiment 2

[0095] According to a preferred embodiment of the present invention, before the STA sends the first request message to the AP, it generates a random number SNonce, and obtains the PMKID when the STA was associated with the AP last time, and carries the generated SNonce and the obtained PMKID in the first request message. message to the AP. After receiving the first request message, the AP judges whether the retrieved PMK is valid according to the PMK corresponding to the PMKID. If the retrieved PMK is valid, the AP directly performs key verification with the STA.

[0096] In a preferred implementation manner of the embodiment of the present invention, the key verification process performed by the AP directly with the STA may include: the AP generates a random number ANonce, and sends a first response message carrying a first request message of the generated ANonce to the STA. The AP receives the second request message returned by the STA, where the second request message carr...

Embodiment 3

[0111]According to a preferred embodiment of the present invention, before sending the first request message to the AP, the STA obtains the PMKID when the STA associated with the AP last time, and carries the obtained PMKID in the first request message and sends it to the AP. After receiving the first request message, the AP judges whether the retrieved PMK is valid according to the PMK corresponding to the PMKID. If the retrieved PMK is valid, the AP directly performs key verification with the STA. Specifically, the AP can judge whether the PMK is still within the valid life cycle, and if so, the PMK is valid; otherwise, the PMK is invalid. And / or the AP can also judge whether the authentication and key management (Authentication and Key Management, AKM for short) in the PMK is consistent with the AKM in the first request message. If they are consistent, the PMK is valid; otherwise, the PMK is invalid.

[0112] In a preferred implementation of the embodiment of the present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key verification method and device. Wherein, the method includes: the AP receives the first request message sent when the STA re-associates or re-associates with the AP, wherein the above-mentioned first request message carries the security context identifier corresponding to the STA's last association or re-association with the AP ; The AP retrieves the locally saved security context of the above-mentioned STA according to the above-mentioned security context identifier, and judges whether the retrieved security context is valid; if it is valid, the AP directly performs key verification processing with the STA. The present invention simplifies the safety verification process for link re-establishment between STA and AP, and avoids the problem of long network access delay due to complicated process.

Description

technical field [0001] The present invention relates to the communication field, in particular to a key verification method and device. Background technique [0002] The Institute for Electrical and Electronic Engineers (Institute for Electrical and Electronic Engineers, referred to as IEEE) 802.11 is one of the first generation wireless local area network (Wireless Local Area Networks, referred to as WLAN) standards. Such as figure 1 As shown, an IEEE 802.11 network includes: a workstation (Station, STA for short), and a wireless access point (Access Point, AP for short). Wherein, the STA can be any device with IEEE 802.11 media access control (Media Access Control, referred to as MAC) layer and physical layer (Physical Layer, referred to as PHY) interface, usually by a personal computer (Personal Computer, referred to as It is composed of a PC) or a notebook computer plus a wireless network card. In addition, the STA can also be an embedded device (for example, an 802.1...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W76/19H04W12/041H04W12/069
Inventor 冯成燕朱李
Owner ZTE CORP