Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Enhanced EAP identity verification method of power wireless private network

An authentication method and wireless private network technology, applied in the field of enhanced EAP authentication of electric power wireless private network, can solve the problems of large authentication delay, not supporting cipher suite negotiation and authentication protocol version negotiation, etc., to achieve authentication delay The effect of reducing, achieving high efficiency, and improving access efficiency

Pending Publication Date: 2022-05-13
STATE GRID ELECTRIC POWER RES INST +3
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the EAP-AKA protocol has the following loopholes and deficiencies: the authentication process requires multiple requests and corresponding interactions, which causes a large delay in authentication. When UE (user equipment) is continuously switched between different wireless LANs, These delays will become a bottleneck; cipher suite negotiation and authentication protocol version negotiation are not supported; encryption keys and encryption and decryption algorithms are fixed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enhanced EAP identity verification method of power wireless private network
  • Enhanced EAP identity verification method of power wireless private network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0030] The idea of ​​WEAP not only keeps the access authentication protocol WAPI mechanism in the WAPI security protocol unchanged, but also ensures that the UE can safely access the 4G network through the WAPI AN. WAI certificate authentication uses two-way authentication. When the authentication requester UE (for equipment) requests authentication from the authentication server MME through the WLAN hotspot AP (access point), the AP decides to access the netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an enhanced EAP identity verification method for a power wireless private network, and the method comprises the steps: sending an authentication activation request from an AP to UE until the AP and the UE receive a certificate authentication result of an MME and determine whether to open a controlled port, and enabling the UE and the AP to complete unicast key negotiation and generate a negotiated session key. According to the invention, not only is the access authentication protocol WAPI mechanism in the WAPI security protocol kept unchanged, but also the UE can be ensured to safely access the 4G network through the WAPI AN.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and in particular relates to an enhanced EAP authentication method for electric power wireless private network. Background technique [0002] At present, the State Grid Corporation of China is vigorously promoting the construction of the electric power wireless private network test network. In the construction process of electric power wireless private network, TD-LTE (Time Division Long Term Evolution) communication technology with high speed, large capacity and high spectrum efficiency has become a research hotspot in the construction of electric power wireless private network. LTE is the latest mobile communication standard proposed by the Third Generation Partnership Project (3GPP) under the background of 4G. The power wireless private network has high requirements on network performance and service quality, so in some cases it is not enough to use only LTE. LTE's network arc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/0431H04W12/06H04W12/069H04W12/106
CPCH04W12/06H04W12/069H04W12/0431H04W12/106H04W12/03
Inventor 刘锐赵高峰黄进巢玉坚缪巍巍李洋张立武龚亮亮严宇航张明轩
Owner STATE GRID ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products