Check patentability & draft patents in minutes with Patsnap Eureka AI!

WPA-based key configuration method and device

A configuration method and key technology, which are applied to security devices, secure communication devices, and key distribution, can solve problems such as packet loss, low key configuration efficiency, and easy occurrence of data, so as to reduce the probability of packet loss, improve user experience, The effect of shortened time

Active Publication Date: 2019-03-08
RUIJIE NETWORKS CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The embodiment of the present invention provides a WPA-based key configuration method and device to solve the problems of low key configuration efficiency and easy data packet loss in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WPA-based key configuration method and device
  • WPA-based key configuration method and device
  • WPA-based key configuration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In view of the low efficiency of key configuration in WPA in the prior art and the problem that data packet loss is more likely to occur, the WPA-based key configuration method provided by the embodiment of the present invention can be applied to thin APs composed of ACs and APs. In the WLAN architecture, AC sends packets to STAs via APs, and STAs sends packets to ACs via APs. The flow process of the inventive method is as figure 1 As shown, this method is applied to the AC side, and the execution steps are as follows:

[0054] Step 101, sending the first message in the four-way handshake to the wireless access point AP, so that the AP sends the first message to the wireless terminal STA;

[0055] Step 102, when receiving the second message in the four-way handshake replied by the STA forwarded by the AP, generate an AP-side unicast key, and send the generated AP-side unicast key to the AP , so that when the AP receives the fourth packet in the four-way handshake repl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a WPA-based key configuration method and device, the method comprises: transmitting a first packet in a four-way handshake to a wireless access point AP, so that the APsends the first packet to a wireless terminal STA; when a second packet of the four-way handshake replied by the STA forwarded by the AP is received, generating an AP-side unicast key, and sending the generated AP-side unicast key to the AP. The embodiment of the invention can solve the problem that key configuration efficiency is low and data packet loss is relatively easy to occur in the priorart.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, in particular to a key configuration method and device based on wireless network security access (Wi-Fi Protected Access, WPA). Background technique [0002] WPA is a standards-based, interoperable WLAN security enhancement solution that can greatly enhance the data protection and access control levels of existing and future wireless LAN systems. WPA is derived from the IEEE802.11i standard under development and will remain forward compatible with it. Properly deployed, WPA ensures that WLAN user data is protected and only authorized network users can access the WLAN network. [0003] The four-way handshake protocol is used to negotiate unicast keys, and its main purpose is to ensure that the keys obtained by the applicant and the authenticator are the same and up-to-date; WPA also uses the four-way handshake to generate the required pairs Temporary key (Pairwise Temporal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04L9/08H04L29/08
CPCH04L9/0819H04L9/0863H04W12/02H04L67/568
Inventor 黄岁世
Owner RUIJIE NETWORKS CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More