Unlock instant, AI-driven research and patent intelligence for your innovation.

Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication

A wireless network access and identification authentication technology, applied in the field of wireless network access authentication, can solve problems such as access process loopholes, access key cracking, and inability to distinguish user identities, and achieve the effect of avoiding potential safety hazards

Inactive Publication Date: 2015-09-09
成都腾甲数据服务有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are obvious security problems in the current WiFi wireless system, WEP (Wired Equivalent Privacy) and WPA (WiFi Protected Access) systems have very weak encryption strength for keys; and in WPA2 (another standard of WPA) and WAPI (China Wireless In the system, PSK (Pre-shared Key, pre-shared key) is used for the majority of individuals and small and medium-sized enterprise users, and there are also loopholes in the access process and the access key is cracked. The problem
[0003] At the same time, in the case of WEP, WPA PSK and WPA2 PSK methods for wireless network access authentication, all users use the same password and enjoy the same access rights, and it is impossible to distinguish the identity of each user, and once the password is leaked, It will also cause damage to the interests of network providers or legitimate users. These unfavorable factors have restricted the application of WiFi networks in many non-public places.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication
  • Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication
  • Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] figure 1 A flow chart of a wireless user equipment terminal method for wireless network access authentication based on CPK identity authentication provided by an embodiment of the present invention, as shown in figure 1 As shown, the method includes:

[0028] The CPK Key device is integrated on the wireless user device side. This CPK Key device has a built-in encryption smart chip, which has a certain storage space and can store the user's private key....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a wireless network access authenticating method and device based on CPK (Combined Public Key Cryptosystem) identity authentication, and relates to the fields of wireless communication and CPK identity authentication. A whole system consists of a wireless controller end and a wireless user equipment end. The method comprises the following steps: integrating a CPK Key by the wireless user equipment end, wherein access authentication request information transmitted to the wireless controller end every time comprises CPK signature data; after the wireless controller end receives the access authentication request information transmitted by the wireless user equipment, judging whether or not the request information comprises the CPK signature data, and forbidding the wireless user equipment to access a network if the request information does not comprise the CPK signature data; and if the request information comprises the CPK signature data, judging whether or not a feature code in the CPK signature data is an authorized feature code of the wireless controller end, forbidding the wireless user equipment to access the network if the feature code is not the authorized feature code, and permitting access if the feature code is the authorized feature code. The embodiment of the invention is applied to safe and credible wireless network access authentication supporting management of access users.

Description

technical field [0001] The embodiments of the present invention relate to the field of wireless communication technology access authentication, in particular to a method and device for wireless network access authentication based on CPK identification authentication. Background technique [0002] With the development of wireless communication, wireless fidelity (WiFi for short) technology is becoming more and more common, and the security of the access key of the WiFi access point has also become a research topic for technicians. There are obvious security problems in the current WiFi wireless system, WEP (Wired Equivalent Privacy) and WPA (WiFi Protected Access) systems have very weak encryption strength for keys; while in WPA2 (another standard of WPA) and WAPI (China Wireless In the system, PSK (Pre-shared Key, pre-shared key) is used for the majority of individuals and small and medium-sized enterprise users, and there are also loopholes in the access process and the acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06
CPCH04W12/06
Inventor 孟俊陈谦
Owner 成都腾甲数据服务有限公司