Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encrypted communication method, system and related equipment

A technology of encrypted communication and encryption algorithm, which is applied in the field of communication, can solve problems such as the security of air interface signals, and achieve the effect of making up for security defects and improving security

Active Publication Date: 2018-04-27
HUAWEI TECH CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the embodiments of the present invention is to provide an encrypted communication method, system and related equipment, which are used to solve the security problem of the air interface signal when the Portal authentication method is adopted in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted communication method, system and related equipment
  • Encrypted communication method, system and related equipment
  • Encrypted communication method, system and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] The invention provides an encrypted communication method, such as figure 2 As shown, the network architecture involved in the method includes a terminal (client), AP (Access Point, access point) and AC (Access Controller, access controller), and the method includes:

[0075] 201. The terminal receives the encryption algorithm and authentication method of the terminal sent by the access point AP.

[0076] The encryption algorithm may include: AES (Advanced Encryption Standard, Advanced Encryption Standard) algorithm or TKIP (Temporal Key Integrity Protocol, Temporal Key Integrity Protocol) algorithm, of course, may also include other suitable algorithms, which are not specifically limited here .

[0077] Wherein, the authentication method may include: WPA (Wi-Fi Protected Access, Wi-Fi network security access) or WPA2 or Portal authentication method, of course, may also include other authentication methods, which are not specifically limited here.

[0078] 202. The te...

Embodiment 2

[0110] The present invention also provides an encrypted communication method, such as Figure 4 As shown, the method includes:

[0111] 401. The AC obtains the encryption algorithm and the authentication method of the terminal during the association process between the AP and the terminal; the terminal obtains the encryption algorithm and the authentication method from the AP.

[0112] For the specific process of associating between the AP and the terminal, reference may be made to the description in Embodiment 1, which will not be repeated here.

[0113] 402. If the above-mentioned method is a Portal authentication method, the above-mentioned AC provides Portal authentication for the above-mentioned terminal, and saves the account number and password used by the above-mentioned terminal in the above-mentioned Portal authentication process;

[0114] The specific content of the Portal authentication method may be the prior art, and will not be repeated here.

[0115] 403. The...

Embodiment 3

[0123] The present invention also provides an encrypted communication method, such as Figure 5 As shown, the above methods include:

[0124] 501. The AP sends the encryption algorithm and authentication method of the terminal to the above-mentioned terminal.

[0125] Specifically, the AP sends the encryption algorithm and the authentication method to the terminal by carrying the encryption algorithm and the above-mentioned authentication method in the beacon frame or the Probe Response message sent to the terminal. For details, please refer to the describe.

[0126] 502. The above-mentioned AP associates with the terminal, so that the access controller AC acquires the above-mentioned encryption algorithm and the above-mentioned authentication method during the above-mentioned association process;

[0127] For the specific process of associating between the AP and the terminal, reference may be made to the description in Embodiment 1, which will not be repeated here.

[012...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An encryption communication method and system, and a related device. The method comprises: a terminal receiving an encryption algorithm and an authentication method which are sent by an AP; associating the terminal with the AP, so as to enable the AC to acquire the encryption algorithm and the authentication method in the association process; if the authentication method is a Portal authentication method, the terminal initiating Portal authentication, so as to enable the AC to save an account number and a password which are used by the terminal in the Portal authentication process; the terminal performing unicast key negotiation with the AC, so as to acquire a unicast key; the terminal receiving a multicast key sent by the AP; and the terminal using the encryption algorithm, the unicast key and the multicast key to perform encryption communication with the AP.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an encrypted communication method, system and related equipment. Background technique [0002] Portal (portal) authentication, also known as Web (World Wide Web) authentication, is an authentication method based on the World Wide Web. The Portal authentication method has the following advantages: no need to install the authentication client, reduce the maintenance workload of the client, and facilitate operation. It has the advantages of business expansion and mature technology, so it is widely used in the networks of operators and schools. [0003] In the prior art, after passing Portal authentication, the client can access the network, but for wireless communication, the existing Portal authentication method does not provide security protection for air interface packets, and all user data is transmitted in clear text in air interface signals , there is a great security r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04W12/068
Inventor 席辉吴日海
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products