Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for achieving wireless authentication encryption of mobile terminal

A mobile terminal, authentication and encryption technology, applied in the direction of wireless communication, transmission system, electrical components, etc., can solve the problems that cannot be obtained, does not belong to the TCP/IP protocol cluster, and cannot be seen by ordinary users, so as to improve the user experience and widely apply range effect

Inactive Publication Date: 2015-03-25
SHANGHAI GONGJIN COMM TECH
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is invisible to ordinary users and needs to be obtained from the device through some special methods or instructions. Compared with the MAC address in wireless devices, it does not belong to the TCP / IP protocol cluster and cannot be obtained through network sniffing.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for achieving wireless authentication encryption of mobile terminal
  • System and method for achieving wireless authentication encryption of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.

[0036] The invention mainly relates to the wireless local area network (WLAN) communication field of IEEE802.11 standard, especially the authentication and encryption technology of the mobile terminal. The invention discloses a method and system for wireless authentication and encryption of a mobile terminal. The method is that after the wireless connection password in the AP is modified, if the mobile terminal device has been connected to the AP and the mobile device is still reserved in the AP According to relevant information, the mobile device can use IMEI for authentication, and based on the IMEI, the encryption key can be regenerated, which is convenient for mobile terminal users to connect to the network, and provides reliable information security. The system includes two parts, which are the mobile ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a system and method for achieving wireless authentication encryption of a mobile terminal. The system comprises the mobile terminal and a network access point. The mobile terminal is used for sending the IMEI of the mobile terminal to the network access point when communication is established between the mobile terminal and the network access point for the first time and sending an authentication request message of the IMEI of the mobile terminal to the network access point when an original wireless connecting password is failure in authentication. The network access point is used for storing the IMEI and the MAC address corresponding to the mobile terminal and carrying out authentication on the mobile terminal when the original wireless connecting password is failure in authentication. The system and method for achieving wireless authentication encryption of the mobile terminal are achieved through the structure, when the wireless connecting password in the AP is modified, if the mobile terminal is connected with the AP, the mobile terminal can carry out authentication through the IMEI, an encrypted secret key is generated again on the basis of the IMEI, a user of the mobile terminal can connect the network conveniently, the user experience is improved, and the wider application range is achieved.

Description

technical field [0001] The present invention relates to the technical field of wireless networks, in particular to the technical field of mobile terminal wireless network authentication, and specifically refers to a system and method for realizing wireless authentication and encryption of mobile terminals. Background technique [0002] Authentication encryption is a commonly used security method in WLAN (Wireless Local Area Network, wireless local area network). At present, commonly used authentication methods include pre-shared keys or 802.1X methods, and commonly used encryption methods include TKIP (Temporal Key Integrity Protocol, temporary key integration Protocol), CCMP (Counter CBC-MAC Protocol), etc., no matter which method is used, when the password used for authentication and encryption in the AP (Access Point, access point) is modified for some reason, the user needs to obtain the password again. And re-authentication to connect to the AP, which will make the user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/02H04W12/06
CPCH04W12/02H04W12/06
Inventor 欧阳棣
Owner SHANGHAI GONGJIN COMM TECH