Secret key processing method and device

A technology for processing devices and keys, applied in security devices, electrical components, wireless communications, etc., can solve the problems of consuming AC or fat AP performance and network resources, and achieve cost-effective results

Active Publication Date: 2014-12-24
NEW H3C TECH CO LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method will consume more AC or fat AP performance and network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key processing method and device
  • Secret key processing method and device
  • Secret key processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In the traditional WPA-PSK (Wi-Fi Protected Access Pre Shared Key) technology, users in a wireless local area network (WLAN) share a preset key to negotiate the encryption key used in the subsequent data transmission process, If a user's shared key is leaked, the security of the entire network will deteriorate as a whole. The integration of WPA-PSK and Portal authentication solves this problem. The key is no longer shared, but each user obtains it dynamically when the user approves it. This makes it possible for different users to have different keys. However, the Portal authentication process requires each wireless terminal (Station, STA) to be assigned an IP address first. In this way, even if the user Portal authentication fails, the IP address will be consumed as a relatively scarce network resource. In addition, because the Portal authentication process is to intercept the user's TCP request and implement it through HTTP redirection, these tasks are usually complet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secret key processing method and a corresponding device. The secret key processing method and device are applied to an intermediate device between a wireless terminal STA and an authentication server. The secret key processing method is characterized by comprising the following steps that firstly, after the STA is correlated to a wireless access point (AP), the terminal identification of the STA is obtained, and a terminal identification authentication request message is sent to the authentication server to request the authentication server to authenticate the terminal identification; secondly, after the intermediate device receives an authentication passing message from the authentication server, an independent secret key corresponding to the terminal identification of the STA is obtained from the position appointed by the authentication passing message; thirdly, the independent secret key is used for consulting with the STA to serve as an encryption key for encrypting data messages. The secret key processing method and device can overcome the defects of WPA-PSK and WPA, and good balance between performance and achievement cost is obtained.

Description

technical field [0001] The invention relates to wireless network technology, in particular to a key processing method and device in the wireless network. Background technique [0002] With the rapid development of wireless local area network technology WLAN, its application scope is gradually expanding, and its application covers the construction of small home networks to the provision of wireless network access services for employees by large enterprises. WLAN security issues have always been the focus of attention of practitioners, and at present, various security issues of WLAN emerge in an endless stream. [0003] The propagation carrier used by the wireless network is electromagnetic waves, and the transmission method is very different from that of the wired network. Therefore, the security architecture in the original wired network cannot fully meet the security requirements of the wireless network. No matter how effective it is, this requires wireless networks to use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/08H04L29/12H04W12/04
Inventor 徐勇刚
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products