Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety access method of wireless metropolitan area network

A wireless metropolitan area network and secure access technology, applied in radio/induction link selection and arrangement, user identity/authority verification, selection of devices, etc., can solve the problem of reducing the system security level and increasing the possibility of certificate keys being cracked and other problems to achieve the effect of improving the security level, reducing the possibility of being cracked, and improving security

Inactive Publication Date: 2008-09-24
GCI SCI & TECH
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that in addition to signature verification, the certificate of the user station SS also undertakes the work of encrypting and decrypting the authorization key. Frequent use of the key of the same certificate will increase the possibility of the certificate key being cracked and reduce the security of the system. grade

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety access method of wireless metropolitan area network
  • Safety access method of wireless metropolitan area network
  • Safety access method of wireless metropolitan area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The current typical wireless metropolitan area network technology is the IEEE802.16 standard. Therefore, the present invention will be described below by taking IEEE802.16 as an example. However, the present invention is not limited to being based on the IEEE802.16 standard, and the present invention is applicable to wireless metropolitan area network technologies including the IEEE802.16 standard.

[0025] According to the IEEE802.16 standard, the communication process between the subscriber station SS and the base station BS in the wireless metropolitan area network includes steps such as synchronization, initial ranging, capability negotiation, authorization authentication, key negotiation, and registration. The present invention relates to the steps of authorization authentication and key negotiation, that is, the security access processing flow provided by the present invention is located after the capability negotiation of IEEE802.16 and before the registration ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for safe accessing of a wireless metropolitan area network, which comprises an authenticating step and a session key negotiating step. The authenticating step comprises that: a subscriber station SS sends a request message for access authentication to a base station BS; the BS sends a request message for certificate authentication to an authentication server AS; the AS verifies the request message for certificate authentication and sends a response message for certificate authentication to the BS; the BS verifies the validity of the identity of the SS according to the response message for certificate authentication; if the SS is valid, the BS sends the response message for access authentication to the SS; the SS verifies the validity of the BS according to the response message for access authentication; if the BS is valid, the SS uses the encryption certificate key of the SS to decrypt the material of authentication key. The SS signing certificate in the proposal is used for stating the identity and the SS encrypting certificate is used for encrypting and decrypting the material of authentication key so as to reduce the risk that the key is decrypted; through verifying the certificates of the BS and the SS by the AS, authentication for the subscriber station SS and the base station BS is realized and security level is improved.

Description

technical field [0001] The present invention relates to wireless networks and information security, and more particularly, to a secure access method for wireless metropolitan area networks. Background technique [0002] In the field of wireless metropolitan area network, the current mainstream technologies and standards are mainly the IEEE802.16 series of standards organized by the IEEE. In the existing wireless metropolitan area network, when a subscriber station (Subscriber Station, SS for short) accesses a base station (Base Station, BS for short), steps such as authentication and key negotiation need to be performed. In the authentication and authentication process, the base station BS authenticates and authenticates the user station SS through the digital certificate of the authentication user station SS, so as to prevent the illegal user station SS from accessing the wireless metropolitan area network. The specific authentication process includes: [0003] 1) The sub...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04L9/32
Inventor 林凡张永强
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products