Self arranged net mode shared key authentication and conversation key consulant method of radio LAN

A wireless local area network and shared key technology, which is applied in the field of authentication and session key negotiation between wireless terminals through pre-shared keys, can solve problems such as no authentication method, achieve high security, small amount of calculation, achieve high efficiency

Active Publication Date: 2005-01-12
ZTE CORP
View PDF0 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

"But the standard does not give

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self arranged net mode shared key authentication and conversation key consulant method of radio LAN
  • Self arranged net mode shared key authentication and conversation key consulant method of radio LAN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] When the STAs of the WLAN system work in the ad hoc network mode, the shared key can be configured in each STA in advance. The configuration of the shared key can take the practice of entering a password and then mapping the password to the key. Because for ordinary users, passwords are easier to remember and process.

[0017] refer to figure 2 As shown, assuming that two wireless terminals STA1 and STA2 in the ad hoc network already have the same shared key SK, the process of shared key authentication and session key negotiation between them is,

[0018] 1. STA1 generates a secure random number N 1 .

[0019] 2. STA1 sends the random number N 1 It forms a shared key authentication request message with the cipher suite list supported by STA1 and sends it to STA2 in plain text.

[0020] 3. After receiving the shared key authentication request message from STA1, STA2 checks whether there is an algorithm supported by STA2 among the security algorithms supported by ST...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method includes processing steps: request of shared cryptographic key authentication; response of shared cryptographic key authentication; acknowledgement of shared cryptographic key authentication. Through configured shared cryptographic key in advance, intercheck authentication and negotiation of session key is able to carry out between wireless terminals in self built network, thus, complicated public key certificate application and installation procedure is not needed any more. Features are: high security, small amount of calculation, and high efficiency.

Description

technical field [0001] The present invention relates to a wireless local area network (WLAN), specifically, to a wireless local area network system ad hoc network mode (or called Ad hoc mode) between wireless terminals (STA) through pre-shared keys for authentication and session encryption method of key negotiation. Background technique [0002] In May 2003, the National Broadband Wireless IP Working Group released the WLAN national standard GB15629.11. In the eighth chapter of GB15629.11, a WLAN security mechanism—Wireless Local Area Network Authentication and Privacy Infrastructure (WAPI) is proposed. [0003] WAPI mainly includes two parts: WLAN Authentication Infrastructure (WAI) and WLAN Privacy Infrastructure (WPI). Among them, the WAI mechanism realizes the two-way authentication and session key agreement between the wireless terminal STA and the wireless network in the basic (Infrastructure) mode through the elliptic curve cryptographic certificate. [0004] In ad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/12H04L9/30
CPCH04W84/18H04W12/04H04W12/50
Inventor 赵志飞刘小刚田峰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products