Method and device for terminal authentication in wireless local area network

A wireless local area network and wireless terminal technology, which is applied to user identity/authority verification and key distribution, can solve the problems of complex deployment and increased terminal operation complexity, and achieve the effect of simple deployment and low cost

Inactive Publication Date: 2017-07-11
BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this authentication method solves the defects of traditional PSK authentication, it is too complicated to deploy and requires a Radius (Remote Authentication Dial In User Service, remote user dial-in authentication system) server; even terminal access to the network requires two authentications, which increases the number of terminals. operational complexity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for terminal authentication in wireless local area network
  • Method and device for terminal authentication in wireless local area network
  • Method and device for terminal authentication in wireless local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0061] The first embodiment of the present invention provides a method for terminal authentication in a wireless local area network, which is applied to wireless access devices, such as figure 1 shown, including:

[0062] S101. Generate a first key corresponding to the user's identity and a first paired master key PMK corresponding to the first key;

[0063] S103. Receive an interface sent by the wireless terminal that includes the first message integrity check co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method for terminal authentication in a wireless local area network, and the method is used in wireless access equipment. The method comprises the steps: generating a first secret key corresponding to an identity label of a user, and a first paired main secret key PMK corresponding to the first secret key; receiving an access message which is transmitted by a wireless terminal and comprises a first message integrity verification code MIC generated by the wireless terminal according to the first secret key inputted by the user and the first paired main secret key PMK corresponding to the first secret key; searching a second secret key and a second PMK corresponding to the second secret key in a secret key database; generating a second MIC according to the second PMK corresponding to the second secret key; and determining that the access of the wireless terminal is successful when the first MIC is the same as the second MIC. The embodiment of the invention also provides a device for terminal authentication in the wireless local area network. According to the embodiment of the invention, the method speeds up the access of the terminal to the network, and is simple in deployment.

Description

technical field [0001] The invention relates to the field of data communication, in particular to a method and device for terminal authentication in a wireless local area network. Background technique [0002] With the popularization of wireless network use, wireless network security has attracted more and more attention. The early WEP (Wired Equivalent Privacy) authentication method has been abandoned because it is easy to be cracked. At present, 802.11i is widely used in the industry. The PSK (Pre-sharedKey, pre-shared key) and 802.1x authentication methods specified in the standard, the difference between the two is the way to obtain PMK (PairwiseMasterKey, paired master key), PSK is based on the key configured on the device side Obtain the PMK, and 802.1x obtains the PMK after successful authentication. [0003] PSK authentication uses a pre-shared key for authentication. The device side configures a key, and then tells the user the key, and the terminal uses the key to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06G06F21/60
Inventor 陈林锋
Owner BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products