Method and system for testing safety switch-in protocol conformity of network terminal

A security access and network terminal technology, applied in the field of network security access protocol testing, can solve the problems of the accuracy of the benchmark equipment affecting the accuracy of the test results, the inability to give wrong positioning information, and the deviation of the test results. The results are accurate, precise positioning, and the test data is complete.

Active Publication Date: 2006-08-02
CHINA IWNCOMM
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The test equipment is incomplete through the typical application environment, that is, the interoperability of high-level protocols, and the test results may have deviations
[0006] 2. The correctness of the benchmark equipment will seriously affect the accuracy of the test results
[0007] 3. Cannot give error location information when the test fails

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for testing safety switch-in protocol conformity of network terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] WAPI agreement or IEEE802.11i agreement all can be applicable to the method of the present invention, and its steps are as follows:

[0051] 1) Activate the secure access protocol authentication process;

[0052] 2) Capture the secure access protocol data packets generated during the authentication process;

[0053] 3) Analyze and detect the packet encapsulation format and protocol flow of the secure access protocol.

[0054] The following is a specific embodiment when the security access protocol is the WAPI protocol, and the whole specific testing process of its method is as follows:

[0055] 1) Activate the WAPI authentication process;

[0056] 2) Capture the WAPI protocol data packets that are produced in the authentication process; if the WAPI protocol data capture is incomplete, the network terminal to be tested has not passed the WAPI test, continue to process the captured data in step 3, and display the results;

[0057] The WAPI protocol packet includes: WAI...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for testing safety switching in protocol conformity of network terminal includes activating safety switching in certification procedure, seizing safety switching in protocol data packet generated in certification procedure, detecting and analyzing package format and protocol flow process of safety switching in protocol data packet.

Description

1. Technical field [0001] The invention relates to the field of network security access protocol testing, in particular to a method and system for network terminal security access protocol compliance testing. 2. Background technology [0002] The types of services carried by IP networks are increasingly diverse, and have been involved in all levels of the national economy and society. Wireless IP networks transmit data through radio waves, making the physical openness of the network reach a new stage. As a result, secure access has become a wired and wireless network. Key issues of network security operation. [0003] The security access system of IP network mainly involves three network entities: network terminal, access point (also known as base station) and authentication server. The network terminal requests to access the network and enjoy various resources provided by the network; the access point is the edge device of the IP Internet network, and is the entity that pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L69/03
Inventor 张变玲曹军涂学峰
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products