Access authentication method of wireless local area network, server and authentication system

A wireless local area and access authentication technology, applied in wireless communication, transmission system, electrical components, etc., can solve problems such as dictionary attacks

Active Publication Date: 2017-05-24
HONOR DEVICE CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a wireless local area network access authentication method, server and authentication system. In the WIFI access authentication process, a challenge code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method of wireless local area network, server and authentication system
  • Access authentication method of wireless local area network, server and authentication system
  • Access authentication method of wireless local area network, server and authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0099] In this part, some basic concepts involved in each embodiment are described.

[0100] Extensible Authentication Protocol (full name: Extensible Authentication Protocol, referred to as: EAP) is an authentication framework that provides some public functions and allows the negotiation of desired authentication mechanisms. These mechanisms are called EAP methods, including EAP-MD5, EAP-TLS, EAP -TTLS, EAP-PEAP, etc. The present invention intro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access authentication method of a wireless local area network. The method comprises the steps that: a server receives access information sent by first user equipment, and the access information carries the identity information of the first user equipment; the server sends an access request to the second user equipment according to the access information; if the server receives a confirmation instruction sent by the second user equipment for the access request, the server generates a challenge code and generates a first access password according to the challenge code; the server sends the challenge code to the first user equipment such that the first user equipment generates a second access password according to the challenge code; and the server completes EAP certification through the first access password and the first user equipment. Correspondingly, the invention discloses the server and an authentication system. By using the access authentication method, the server and the authentication system, a problem of dictionary attack can be solved.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a wireless local area network access authentication method, server and authentication system. Background technique [0002] WIFI technology is a technology that can connect terminals such as personal computers and handheld devices to each other in a wireless manner. With the rapid development of network technology, WIFI technology has penetrated into every aspect of life. On the other hand, with the rapid increase and popularization of portable communication devices, more and more user devices will perform WIFI access. All of these put forward higher requirements for the security of wireless communication. [0003] At present, when a portable device (including a device with a card and a device without a card) performs WIFI access, it usually uses a user name and a password as input information to perform identity authentication. Although this method is easy to u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/06H04W12/069
CPCH04W12/08
Inventor 仲伟伟仲镜学李娜陈璟
Owner HONOR DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products