Accountable and privacy-preserving wireless access network authentication method and authentication system

A wireless access network and authentication method technology, which is applied in the field of wireless access network authentication methods and authentication systems, can solve the problems such as the inability of the wireless access network to be accountable and ensure privacy, and avoid the problem of single point failure, Effectiveness to ensure efficiency and avoid escrow issues

Active Publication Date: 2016-08-10
SOUTH CHINA UNIV OF TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, existing wireless access networks cannot provide accountability while maintaining privacy
There are currently no privacyaware cryptographic primitives available that can be directly deployed to achieve the above goals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Accountable and privacy-preserving wireless access network authentication method and authentication system
  • Accountable and privacy-preserving wireless access network authentication method and authentication system
  • Accountable and privacy-preserving wireless access network authentication method and authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] The existing wireless access authentication system involves three parties: a wireless roaming user U, an access point AP and a network operator NO. A certain number of APs are deployed at different locations in the service area to cover the entire area and provide network services to network users. Users can access the network from anywhere with their mobile devices.

[0046] figure 2 For the wireless access network authentication system of the present invention, the key management model in the authentication system of the present invention involves four typical network entities: network operator, access point, user group manager and users in the group. In the present invention, the user does not directly register with the network operator, but the user group manager subscribes to the network operator for services on behalf of all users in the group. The network operator generates the group private key and part of the group public key, but keeps the group private key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an accountable and privacy-protected wireless access network authentication method, which comprises the following steps: step 1, the user group manager registers with the network operator; step 2, the user contacts the user group manager for Authentication, so that the user becomes a user in the group; Step 3, if the user is found to be compromised, the network operator cancels the compromised user; Step 4, the user successfully accesses the wireless network; Step 5, when there are two or two When the above signatures need to be authenticated, the access point performs batch signature verification on these signatures; step 6, the legal authority determines the user responsible for the specific communication session. The invention also discloses an authentication system for realizing an accountable and privacy-protected wireless access network authentication method, including: a network operator, an access point, a user group manager, users in the group and legal authority. It has the ability to limit the trust degree of each entity item, effectively avoiding the problem of custody and single point of failure.

Description

technical field [0001] The invention relates to a wireless communication technology, in particular to an accountable and privacy-protected wireless access network authentication method and an authentication system thereof. Background technique [0002] The popularity of wireless access networks has greatly improved the quality of life and work efficiency, allowing users to access the network almost anytime and anywhere. With the growing demand for wireless access networks, wireless access networks begin to play an irreplaceable role in life. But what is worrying is that risks are ubiquitous in wireless access networks. These risks include sensitive information disclosure by inexperienced or unsuspecting users, easy implementation of wireless signal interception, and rapid maturity of monitoring equipment. Therefore, if such a wireless access network needs to be deployed on a large scale, security, privacy, accountability and efficiency are the most important issues to be co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/08H04W12/0431
Inventor 何道敬唐韶华贺品嘉
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products