Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Share secret key management method

A technology for sharing keys and management methods, applied in the field of wireless communication, can solve the problems of easy access, poor confidentiality, trouble, etc., and achieve the effect of enhancing security and protecting interests

Inactive Publication Date: 2010-05-12
ZTE CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (1) As a password, Secret must have a certain degree of randomness, the so-called "strong password", and cannot be a number that is easy to guess. For example, EAP-MD5 requires Secret to be a 16-byte pseudo-random number. It is very troublesome for the user to input a string of random numbers through the dial-up software, and it is not easy to remember;
[0010] (2) Secret is stored in AAA at the same time when entering the network, so it cannot be changed at will;
[0011] (3) Secret is directly stored in the PCMCIA card, which has poor confidentiality and is easy to be obtained;
[0012] (4) It is inconvenient for multiple people to share the same PCMCIA card to access the Internet. The so-called multi-person sharing means that a legal user can temporarily lend the PCMCIA card to other people (temporary users) for use, and then take it back. After the withdrawal, the temporary user can no longer use the PCMCIA card. The legitimate user's account goes online

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Share secret key management method
  • Share secret key management method
  • Share secret key management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0033] Figure 4 It is a schematic diagram of assigning and saving shared passwords when users log in to the network according to an embodiment of the present invention. Figure 5 It is a schematic diagram of storing and using terminal shared passwords according to an embodiment of the present invention. Image 6 is a flowchart of the shared key management method according to the present invention.

[0034] The following will combine Figure 4 and Figure 5 Details such as Image 6 The shared key management method of the present invention is shown. According to an embodiment of the present invention, the business acceptance terminal of the operator is composed ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a managing method of a shared key, which is used for realizing preservation and use of the shared key in a terminal of a communication system, which comprises the following steps: step 602, distributing the shared key when a user adds a network, adopting a public cryptography of an initial user to encrypt the shared key, and writing the encrypted shared key into a nonvolatile memory of a PC card through an interface of the PC card; step 604, inputting a username and a public password of the initial user in a dialing software interface when the user starts the terminal for the first time to log on the network; and step 606, decrypting the encrypted shared key which is read by the interface with the dialing software to obtain the shared key, and utilizing the structureof the shared key to extend a judge right protocol message so as to pass the judge right. Therefore, the invention facilitates net-surfing convenience of the user, ensures the use safety of the shared key and at the same time allows a plurality of users to go online with one same PC card.

Description

technical field [0001] The invention relates to the field of wireless communication, more specifically, to a method for realizing shared key management on a specific terminal type composed of a PCMCIA card and a computer. Background technique [0002] In recent years, Wireless MAN (Wireless MAN) technology has gradually become mature and has been applied in practice. In order to promote the further development of Wireless MAN technology, IEEE established the 802.16 working group to study the technical specifications of broadband wireless access. To establish a global unified broadband wireless access standard, two standards have been formed: IEEE802.16-2004, namely IEEE802.16d, which supports fixed broadband wireless access and has mature products on the market; the other is IEEE802 .16e, in order to support mobile broadband wireless access standards, related products will be introduced to the market soon. At the same time, world-renowned operators and communication manufac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/12H04L9/08H04L29/06
Inventor 陈宏刘云中周强
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products