Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless local area network two-way access authentication system and method based on identity certificates

A wireless local area network and identity certificate technology, applied in the field of wireless local area network two-way access authentication system, can solve the problem of reducing access authentication efficiency, key escrow and key transmission, WLAN security mechanism authentication message interaction delay, digital certificate maintenance cost and application issues such as sexual defects

Active Publication Date: 2014-01-01
NORTHEASTERN UNIV
View PDF4 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the private key of the entity is distributed by the Private Key Generator (PKG), which leads to a series of security issues such as key escrow and key transmission, making such schemes limited to applications in a small-scale trusted network
[0005] It can be seen that the above-mentioned WLAN security mechanism has defects in authentication message exchange delay, digital certificate maintenance cost and applicability, and more importantly, when a mobile user switches between different access routers accessing the network, the complete access authentication process requires Re-execution further reduces the efficiency of access authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless local area network two-way access authentication system and method based on identity certificates
  • Wireless local area network two-way access authentication system and method based on identity certificates
  • Wireless local area network two-way access authentication system and method based on identity certificates

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0085] In this embodiment, the system and method for two-way access authentication of a wireless local area network based on an identity credential are applied to an access authentication link of a wireless local area network. The mature 802.11i authentication framework is used in the implementation process. For the bearer of authentication messages, the EAP protocol is used between the mobile user and the access router, and the RADIUS protocol is used between the access router and the authentication server.

[0086] Such as figure 1 As shown, the two-way access authentication system for WLAN based on identity credentials includes several access routers (including AR1 and AR2), set in an autonomous security domain, and also includes an identity credential management server (ICM) and an authentication server (AS );

[0087] The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless local area network two-way access authentication system and method based on identity certificates. The wireless local area network two-way access authentication system comprises access routers arranged in a safety area and further comprises an identity certificate management server and an authentication server. The identity certificate management server is used for managing the identity certificates of entities in the safety area, namely, issuing the identity certificates and maintaining the identity certificates. The authentication server is used for authenticating access certification application of mobile subscribers and completing shared key negotiation with the mobile subscribers. The access routers are used for controlling whether the mobile subscribers have access to the wireless local area network or not according to the authentication result fed back from the authentication server and receiving and forwarding authentication information between the mobile subscribers and the authentication server. According to the wireless local area network two-way access authentication system and method, in an autonomous security domain, two-way access authentication and secret key negotiation between the mobile subscribers and the accessed network can be achieved, efficient access authentication conducted when the mobile subscribers switch between the different access routers is supported, and the access authentication efficiency is improved.

Description

technical field [0001] The invention belongs to the field of wireless network security, and in particular relates to a two-way access authentication system and method for a wireless local area network based on identity certificates. Background technique [0002] With the rapid development of computer networks and mobile communication technologies, a large number of mobile devices have emerged, and people's demand for ubiquitous network access is becoming more and more urgent. As the extension and extension of the Internet, IEEE802.11 Wireless Local Area Network (WLAN) has become the best solution for the "last mile" access field due to its advantages of flexible deployment, heterogeneous compatibility, low cost, and rich bandwidth. . [0003] However, with the widespread deployment of WLAN, its security issues began to emerge. The next-generation wireless communication system requires WLAN to provide users with efficient and secure access services in an open environment, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/08H04W12/069
Inventor 高天寒
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products