Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

173 results about "Wireless network security" patented technology

Wireless local area network two-way access authentication system and method based on identity certificates

ActiveCN103491540AEfficient access authenticationImprove access authentication efficiencySecurity arrangementAccess networkDigest access authentication
The invention discloses a wireless local area network two-way access authentication system and method based on identity certificates. The wireless local area network two-way access authentication system comprises access routers arranged in a safety area and further comprises an identity certificate management server and an authentication server. The identity certificate management server is used for managing the identity certificates of entities in the safety area, namely, issuing the identity certificates and maintaining the identity certificates. The authentication server is used for authenticating access certification application of mobile subscribers and completing shared key negotiation with the mobile subscribers. The access routers are used for controlling whether the mobile subscribers have access to the wireless local area network or not according to the authentication result fed back from the authentication server and receiving and forwarding authentication information between the mobile subscribers and the authentication server. According to the wireless local area network two-way access authentication system and method, in an autonomous security domain, two-way access authentication and secret key negotiation between the mobile subscribers and the accessed network can be achieved, efficient access authentication conducted when the mobile subscribers switch between the different access routers is supported, and the access authentication efficiency is improved.
Owner:NORTHEASTERN UNIV

Security authentication method for wireless network

The invention relates to a security authentication method for a wireless network. A wireless fidelity (WiFi) server and a client are involved, and the security authentication method comprises the following steps that: a, an authentication service program is deployed in the client, and the client is connected to a public open system of the WiFi server to acquire a corresponding internet protocol (IP) address; b, according to the IP address, the client acquires and accesses an IP address of a security authentication system of the WiFi server; c, the WiFi server authenticates a client certificate; d, the client which passes the authentication establishes first security connection with the WiFi server and acquires encryption parameters; e, the client establishes a second security connection with the security authentication system of the WiFi server according to the encryption parameters; and f, the client and the WiFi server communicate and are updated through the second security connection. By the security authentication method, the client and the WiFi server can be connected easily and quickly by using a complex key and a complex encryption way; and meanwhile, the security during connecting can be guaranteed by using a method of updating the key regularly to ensure that brute force-based cracking and possibility of key leakage are avoided.
Owner:成都飞鱼星科技股份有限公司

Initial point detection algorithm of transient signal in radio frequency fingerprint identification technology

The invention discloses an initial point detection algorithm of a transient part of a radio frequency signal in a radio frequency fingerprint identification technology. The detection algorithm includes the steps of signal acquisition, interception of transient process waveform of each waveform, signal normalization, envelope extraction, envelope filtering, envelope partitioning, Fourier transform of each block of normalized envelope signal, calculation of frequency domain flatness of frequency domain amplitude, time domain flatness and time frequency flatness of each normalized envelop signal, and detection of minimal values of the time and frequency domain flatness as an initial pint of a transient signal. Based on time frequency and frequency domain characteristics, the transient initial point of a radio frequency signal of a transmitter is detected, thereby effectively extracting fingerprint features, and then a classifier is utilized to classify wireless devices, thereby enabling the radio frequency fingerprint identification technology to be better applied to the field of wireless network security. The initial point detection algorithm of the transient part of the radio frequency signal in the radio frequency fingerprint identification technology has a relatively high identification accuracy rate and relatively short classification time.
Owner:SHANGHAI UNIV

Multi-user reinforcement learning-based cognitive wireless network anti-hostile interference method

The invention relates to wireless network security, particularly to a multi-user reinforcement learning-based cognitive wireless network anti-hostile interference method. Cognitive source nodes adopt a multi-user reinforcement learning strategy to automatically select transmitted power by observation of status information of a master user working condition, self-adaptive jammer transmitted power and the like. Learning of multiple cognitive source nodes is performed at the same time, and each time transmission of a data packet is finished, according to obtained immediate returned report and a state of the next moment, an update state, a behavior and a mapping relation, and according to feedback information, the learning rate of the multi-user reinforcement learning algorithm is replaced, thereby improving the signal to interference ratio of a receiving end, and finally obtaining the optimal transmitted power. Each cognitive source node can assist forwarding of the data packet or transmit data by itself. The method utilizes a multi-user reinforcement learning mechanism, and through a method of attempting and comparison, improves communication efficiency of a cognitive wireless network in a scene of an intelligent hostile jammer.
Owner:XIAMEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products