Network security authentication method

An authentication method and network security technology, applied in the field of network security authentication, which can solve problems such as device loss, data integrity damage, and inappropriate data synchronization.

Inactive Publication Date: 2020-11-13
HEZE UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 4) Wireless interference: Improper data synchronization may destroy data integrity;
[0010] 6) Device loss: Mobile devices are easy to lose, thus leaking sensitive information;
When it is threatened by security, it will lead to certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security authentication method
  • Network security authentication method
  • Network security authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0038] According to an embodiment of the present invention, a network security authentication method is provided.

[0039] Such as Figure 1-7 As shown, the network security authentication method according to the embodiment of the present invention includes the following steps:

[0040] Step S1, set up the IPSec communication system, and determine the Internet key exchange protocol WIKE, which includes establishing IKE_SA for DH exchange and negotiation to protect the security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security authentication method. The method comprises the following steps: S1, establishing an IPSec communication system; S2, carrying out matrix-based key pre-distribution; and S3, establishing a secret sharing mechanism. The beneficial effects are as follows: the method is suitable for an IKEv2 initial exchange process improvement protocol in a wireless networkenvironment. The protocol has obvious performance advantages. The method can be applied to a wireless Internet network environment; in addition, a quick switching authentication method based on a neighbor graph and a pre-distribution method based on a matrix key are adopted, a rapid switching authentication scheme of the wireless Mesh network is provided, the problem of quick switching authentication failure caused by the mobility of the Mesh access point can be solved, through a self-healing group key distribution scheme, a safety channel does not need to be established between a group administrator and each group member to distribute personal secret information of the group members, and safety of storage overhead and communication overhead is achieved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security authentication method. Background technique [0002] A wireless network is a network communication system that uses wireless transmission media to interconnect multiple devices without a physical connection. It is the product of the combination of computer networks and wireless communication technologies. The combination of computer and wireless communication makes mobile become ubiquitous, and mobile terminals can access and access Internet resources anytime and anywhere through wireless networks. Future mobile terminals will be devices that integrate multiple wireless access methods, such as PDAs, handheld phones, and notebook computers that support IEEE802.11 series, 3G, and GPRS technologies. The application of wireless network expands the free space of network users, and has the advantages of convenient installation and flexible network structure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/04H04W12/06H04W12/10
CPCH04W12/06
Inventor 杨新泉
Owner HEZE UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products