Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for implementing wireless network safety communication

A technology of secure communication and implementation method, which is applied in the field of computer network security, can solve problems such as network insecurity, and achieve the effects of secure transmission, information transmission security, and cost saving

Inactive Publication Date: 2008-02-06
BEIJING JIAXUN FEIHONG ELECTRIC CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the WEP standard also has inherent defects in protecting network security. For example, all users in a service area share the same key, and if a user loses or leaks the key, the entire network will be insecure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing wireless network safety communication
  • Method for implementing wireless network safety communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In view of the deficiencies in the prior art, the present invention provides a method for realizing wireless network security communication.

[0036] In Fig. 1, an encryption gateway 1 is added to the wireless bridge and an encryption gateway 2 is added to the wired LAN. The implementation of this method is based on identity authentication and the improvement of the IKEv2 protocol. In this method, the communication entity has two keys (public key and private key). Each communication entity has an undisclosed private key. The sender of the message signs with the private key, and the receiver uses the identity of the sender (that is, the public key). For verification, the communicating entity does not require a certificate authority (CA) to sign the certificate.

[0037] The core of the identity-based authentication method is: the private key is generated by the certification center (CA) according to the public key submitted by the communication entity, and the public key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the safety technical field of computer networks and discloses an achieving method of the safe communication of a wireless network. The achievement on the method bases on the identification of identity and the processed innovation of IKEV2 protocol. The invention adds an encrypted gateway between a wireless bridge and a wire local area network. The communicating physical body in the method has two encrypted keys (a common key and a private key). Each physical body has an incommon private key. The senders of the message adopt the private key to sign and the receivers carry out inspection with the identity of the senders (namely the common key). The communicating physical body does not need the signature of the identifying center (CA) to the certificates, and thus saves the computing capacity of the communicating physical bodies. The method included in the invention ensures the transmitting safety of the information for the wireless network communication solves the problems such as data encryption, identity identification, maintenance on the integrity of the data and management on the encryption, with the safe transmission of the business data.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a method for realizing wireless network security communication. Background technique [0002] With the rapid development of information technology, people's demand for network communication continues to increase. People want to be able to communicate with anyone, including data, voice and images, no matter when, where, and with anyone, and wireless communication and its networking technology have emerged as the times require. Compared with the wired network through cables, optical cables or twisted pairs, wireless electromagnetic waves, lasers, infrared rays, etc. are used to partially or even completely replace physical cables and become the main communication transmission medium between network devices, thus forming a wireless communication network. However, wireless communication is easily troubled by security risks and security issues. Since the business da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L12/46
Inventor 姜圳
Owner BEIJING JIAXUN FEIHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products