Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of detecting incorrect ieee 802.11 wep key information entered in a wireless station

A wireless network, client technology, used in wireless communication, key distribution, and can solve problems such as relying on transmission of data

Inactive Publication Date: 2007-05-16
MEDIATEK INC
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this known technology has at least two disadvantages: first, this method relies on the transmission data provided by other devices; second, because the sender can choose any key ID for each data transmission, and although IEEE802.11 The allowed key ID can range from 0 to 3, but most access points only use the default key ID in implementation, so the configured device will only check the key information corresponding to a key ID Is it the same as the default key ID of the access point

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of detecting incorrect ieee 802.11 wep key information entered in a wireless station
  • Method of detecting incorrect ieee 802.11 wep key information entered in a wireless station
  • Method of detecting incorrect ieee 802.11 wep key information entered in a wireless station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to quickly verify whether the key information of a wireless network client matches the key information of an access point, a test data frame can be sent from a wireless network client to an access point, and then sent from the access point Return to the wireless platform. Please refer to FIG. 3 . FIG. 3 shows a frame of transmitting encrypted test data to verify whether the key information of a wireless network client 14 matches the key information of an access point 12 . The wireless network client 14 has a key table 34, wherein the key table 34 includes four key IDs ID0-ID3 and their corresponding keys KEY0-KEY3; similarly, the access point 12 also has a key table 32, wherein the key table 32 includes four key IDs ID0-ID3 and their corresponding keys KEY0'-KEY3'.

[0024] When the wireless network client 14 is configured to connect to the access point 12 , the wireless network client 14 will immediately generate a test data frame 42 for sending to the access...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for verifying WEP key information for a wireless station in a wireless network containing an access point includes generating a first test data frame with the wireless station in which a destination address of the first test data frame is an address of the wireless station; encrypting the first test data frame with a first encryption key corresponding to a first encryption key ID; the access point decrypting the first test data frame, reading the destination address, re-encrypting the first test data frame, and forwarding the first test data frame back to the wireless station; the wireless station receiving the first test data frame from the access point; and determining that the first encryption key information and the first encryption key ID of the wireless station match that of the access point in response to the wireless station receiving the first test data frame from the access point.

Description

technical field [0001] The present invention relates to a wireless network (WLAN), especially a method for verifying key information input to a wireless network client by using a wired-equivalent privacy (WEP) encryption mechanism. Background technique [0002] In IEEE802.11 wireless network communication, Wired Equivalent Protocol (WEP) is a tool used to encrypt data before it is transmitted into the wireless network client. A transmitting device can encrypt each data frame using a key, and then transmit the encrypted data frame to a target device, so that in order for a receiving device to decode the encrypted data frame , the receiving device must use the same key used by the transmitting device for encryption according to the key ID defined in the encrypted data frame for decryption. [0003] Please refer to FIG. 1 . FIG. 1 is a schematic diagram of a known wireless area base network 5 . An access point (access point, AP) 12 is electrically connected to a local area ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04W12/04H04L9/08H04L63/06H04W84/12H04W12/50
Inventor 叶志豪
Owner MEDIATEK INC