Access authenitcation method of radio local neet mobile terminal

A wireless local area network and mobile terminal technology, applied in the field of access authentication mechanism

Inactive Publication Date: 2005-01-12
ZTE CORP
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the deficiencies in the WAI authentication process, the present invention proposes an access authentication method for wireless LAN mobile terminals, which solves the STA access authentication problem in a simple and effective way

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authenitcation method of radio local neet mobile terminal
  • Access authenitcation method of radio local neet mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In the WAPI standard, ASU has both the functions of a certificate authentication center and a WAPI authentication server. It can be considered to divide the ASU into two different entities, CA and AS. The CA is responsible for certificate management, and the AS is responsible for authenticating the identities of STAs and APs. Such as figure 1 As shown, the certificate management in WAPI can adopt the architecture in the current PKI (Public Key Infrastructure), and the CA is divided into multi-level CAs such as root CA, first-level CA, and second-level CA, which correspond to the actual application environment. Each level of management organization, each level of CA is responsible for managing the lower level of CA certificates and the user (AS, AP and STA) certificates of the organization, each level of organization users in addition to holding the local CA issued to their own WAPI certificate, also holds a The certificate chain from the user certificate to the root CA...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method includes following processing procedures: activating authentication, switching in authentication request, certificate authentication request. With certificate authentication request being received from AP, AS carries out responding for certificate authentication. In switching in authentication response, AP obtains authentication result of STA certificate chain from authentication response returned from AS. Based on the said result, switch in control is carried out. In WAI procedure on the invention, since mobile terminal, AP and ASU transfer certificate chain, not only certificate in authentication message. As long as root CA certificate is installed on STA and AS in advance, authentication can be carried out for certificate chain. Thus, user can roam within same system, also in different systems.

Description

technical field [0001] The invention belongs to WLAN (wireless local area network) technology, and relates to an access authentication mechanism of a mobile terminal in the WLAN. Background technique [0002] With the rapid development of Internet applications and the increasing use of mobile intelligent terminals such as portable computers and PDAs (Personal Data Assistant), wireless local area networks are also developing rapidly and become a new generation of high-speed wireless access networks. Currently, WLANs are widely used in hospitals, schools, financial services, manufacturing, service industries, corporate applications, and public visits. However, due to the openness of the transmission medium of wireless local area network, unauthorized users can easily access wireless local area network to intercept, tamper and forge data, which seriously hinders its promotion and application. [0003] The security issues in WLAN involve two aspects: secure access of mobile ter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/32H04L12/24H04L12/28
Inventor 田峰彭志威
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products