Unlock instant, AI-driven research and patent intelligence for your innovation.
Access verification method and terminal applied to wireless local area network WLAN
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A wireless local area network and terminal technology, which is applied in the field of network communication to achieve the effect of improving security
Inactive Publication Date: 2017-08-08
POTEVIO INFORMATION TECH CO LTD
View PDF4 Cites 11 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] This application provides an access authentication method and terminal applied in a wirelesslocal area network WLAN, to solve the defect that the current WiFi access authentication mechanism can only realize one-way authentication of UE identity
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0031] see figure 2 , figure 2 It is a flowchart of the method provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the process may include the following steps:
[0033] Specifically, the terminal can download the above-mentioned APP application software from a designated secure website in a trusted network environment.
[0034] Step 202, the terminal installs and runs the downloaded APP application software, and generates a terminal public-private key pair through the asymmetric encryptionalgorithm engine included in the APP application software.
[0035] Here, the terminal public-private key pair includes a terminal public key and a terminal private key.
[0036] Step 203, the terminal uses the public key of the authentication center to e...
Embodiment 2
[0064] see image 3 , image 3 It is a flow chart of the method provided by Embodiment 2 of the present invention. Such as image 3 As shown, the process may include the following steps:
[0065] Step 301, the terminal downloads APP application software, and the APP application software includes an algorithm factor, a serial number, and an encryption algorithm.
[0066] Specifically, the terminal can download the above-mentioned APP application software from a designated secure website in a trusted network environment.
[0067] Step 302, the terminal installs and runs the downloaded APP application software, and uses its own terminal ID, algorithm factor, serial number, and encryption algorithm to calculate a terminal authentication key.
[0068] Step 303, the terminal sends the terminal ID and serial number to the authentication center.
[0069] In step 304, the authentication center calculates the terminal authentication key based on the received terminal ID and serial ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides an access verification method and terminal applied to a wirelesslocal area network WLAN. According to the method and the terminal, bidirectional verification between the terminal and a verification center is realized, so identity registration of the terminal is finished; the bidirectional verification between the terminal and an AP (Access Point) is also realized; a mobile operator does not need to participate in the two bidirectional verification processes; through the bidirectional verification, a pseudo AP and a pseudo terminal can be identified; the security of accessing the WLAN by the terminal is improved; and the defect resulting from the fact that only one-way verification for the identity of UE can be realized based on an existing WiFi access verification mechanism is solved.
Description
technical field [0001] The present application relates to network communication technologies, and in particular to an access authentication method and terminal applied to wireless local area networks (WLAN: Wireless Local Area Networks). Background technique [0002] At present, the WiFi access authentication mechanism in the WLAN usually uses an account number plus a password to perform access authentication for Internet users. For example, when a user uses a WLAN provided by an operator, he needs to first obtain a WLAN account and password, and then enter the obtained WLAN account and password through the Portal page / client to complete network authentication during access. The password can also be a dynamic SMS verification code, such as airports, waiting halls and other public places that provide short-term free WLAN access services. When users access the WLAN, they first visit the homepage of the website in the public place, enter their mobile phone number, and it will b...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.