Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Updating network encrypted pins method

A key code, encrypted technology, applied in the field of updating the wireless network encryption key code, can solve the problems of key code leakage, spending a lot of time, inefficiency, etc.

Inactive Publication Date: 2003-11-19
INVENTEC APPLIANCES CORP
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is conceivable that this method is very time-consuming and inefficient; especially when the number of legal terminals is large, it will take a lot of time to manually input changes one by one
And if the key code is updated by the staff, there will also be doubts about the key code leaking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Updating network encrypted pins method
  • Updating network encrypted pins method
  • Updating network encrypted pins method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] The main spirit of the present invention is to use the wireless network itself to update the key code used in Wired Equivalent Privacy (WEP), which can be widely used in figure 1 A typical wireless network; the terminal can be a portable computer such as a personal computer or a notebook computer. The following will be figure 2 The following flow chart is used to illustrate the steps performed by the present invention when updating the key code of a terminal. Please refer to figure 2 . figure 2 It is a schematic flow chart of the present invention; the three columns from left to right respectively represent the steps performed by the server, the control station and the terminal. The following assumes that the object to update the key code is figure 1 The terminal STA1 in the terminal (so its corresponding control station is AP1); assuming that the first key code is already stored in the terminal STA1, it needs to be updated to the second key code to update the wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The network system includes a server, a control station connected to the server, a terminal. The control station sends data of the server end in wireless mode or receives data in wireless mode and transfers the data to the server. The terminal receives the data sent by the control station in wireless mode and transfers data to the control station in wireless mode. The terminal contains the first key code. Based on the first key code, the control station authenticates the terminal. With the authentication passed, the terminal transfers an identification data to the control station in wireless mode. Then, the control station transfers the identification data to the server. If the identification data in matched to the registered data stored in the server, then the second key is transferred to the terminal in order to update the first key code to the second key code.

Description

technical field [0001] The invention provides a method for updating a wireless network encryption key code, especially a method for securely transmitting and updating a key code through the wireless network itself. Background technique [0002] The network can connect terminals of different users in different locations, so that digital data can be circulated and transmitted quickly and efficiently, and various messages, materials, and knowledge can also be shared by many users on the network. Especially in recent years, the development of wireless network (wireless network) can release the shackles of the network transmission line to the terminal, so that the wireless Internet terminal has the characteristics of portable (portable) and mobile (mobile), which can serve users anytime and anywhere. Provides the ability to access network resources. [0003] Please refer to figure 1 . figure 1 It is a schematic structural diagram of a typical wireless network system 10 (for ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/22
Inventor 陈坤辉张汝南李文标
Owner INVENTEC APPLIANCES CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products