Key verification method and device
A verification method and key technology, which is applied in the field of key verification methods and devices, and can solve problems such as extended network access time and complicated security verification process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0074] According to a preferred embodiment of the present invention, before the STA sends the first request message to the AP, it generates a random number SNonce, and obtains the PMKID when the STA was associated with the AP last time, and carries the generated SNonce and the obtained PMKID in the first request message. message to the AP. After receiving the first request message, the AP judges whether the retrieved PMK is valid according to the PMK corresponding to the PMKID. If the retrieved PMK is valid, the AP directly performs key verification with the STA.
[0075] In a preferred implementation of the embodiment of the present invention, the key verification process performed by the AP directly with the STA may include: the AP generates a random number ANonce, derives the PTK according to the retrieved PMK, the received SNonce and the generated ANonce, and according to the derivation The output PTK generates KCK. The AP uses the generated KCK to calculate the MIC of t...
Embodiment 2
[0095] According to a preferred embodiment of the present invention, before the STA sends the first request message to the AP, it generates a random number SNonce, and obtains the PMKID when the STA was associated with the AP last time, and carries the generated SNonce and the obtained PMKID in the first request message. message to the AP. After receiving the first request message, the AP judges whether the retrieved PMK is valid according to the PMK corresponding to the PMKID. If the retrieved PMK is valid, the AP directly performs key verification with the STA.
[0096] In a preferred implementation manner of the embodiment of the present invention, the key verification process performed by the AP directly with the STA may include: the AP generates a random number ANonce, and sends a first response message carrying a first request message of the generated ANonce to the STA. The AP receives the second request message returned by the STA, where the second request message carr...
Embodiment 3
[0111]According to a preferred embodiment of the present invention, before sending the first request message to the AP, the STA obtains the PMKID when the STA associated with the AP last time, and carries the obtained PMKID in the first request message and sends it to the AP. After receiving the first request message, the AP judges whether the retrieved PMK is valid according to the PMK corresponding to the PMKID. If the retrieved PMK is valid, the AP directly performs key verification with the STA. Specifically, the AP can judge whether the PMK is still within the valid life cycle, and if so, the PMK is valid; otherwise, the PMK is invalid. And / or the AP can also judge whether the authentication and key management (Authentication and Key Management, AKM for short) in the PMK is consistent with the AKM in the first request message. If they are consistent, the PMK is valid; otherwise, the PMK is invalid.
[0112] In a preferred implementation of the embodiment of the present i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


