Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for assessing wireless local area network

A wireless local area network and access point technology, which is applied in the field of wireless local area network access methods and systems, can solve the problems of denial of service attacks, potential safety hazards, hidden dangers, etc., and solve the security problems of mutual identity authentication and communication link encryption Effect

Inactive Publication Date: 2009-09-02
ZTE CORP
View PDF1 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Wireless local area network is defined by a series of international standard specifications, and the security part defines the Wired Equivalent Protocol (WEP), Wi-Fi (Wireless Fidelity, Wireless Fidelity) Protected Access , referred to as WPA) and other security mechanisms, WEP itself has security risks, WPA has made improvements to the shortcomings of WEP, but the core part of WPA Temporal Key Integrity Protocol (Temporal Key Integrity Protocol, referred to as TKIP) has introduced a compensation Vulnerabilities with relatively low security level, that is, when the message integrity checks to an error frame, it is considered an active attack and the wireless LAN is closed, which introduces the possibility of denial of service attacks
IEEE802.11i newly introduces the data encryption mechanism TKIP and counter mode and Cipher Block Chain Message Authentication Code Protocol (Counter Mode with Cipher Block Chaining Message, referred to as CCMP). This type of security mechanism is backward compatible or partially includes WEP, so There are also hidden dangers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for assessing wireless local area network
  • Method and system for assessing wireless local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The invention provides a method for using public key encryption technology in a wireless local area network to enable an authentication server to perform identity authentication on a mobile station in a certificate authentication mode. Only when the authentication is successful, the mobile station can associate with the access point.

[0044] The access authentication process in the embodiment of the present invention includes an authentication process based on certificate authentication and a session key negotiation process in the certificate authentication process; wherein:

[0045] The authentication server distributes digital certificates to users of each mobile site, and generates asymmetric key pairs for users. Asymmetric key pairs include public keys (referred to as public keys) and private keys (referred to as private keys). The public key is stored in the digital certificate, and the private key is distributed to the mobile site through other safe means. In add...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for assessing a wireless local area network, comprising the following steps: a mobile station generates a temporary public key (px) and a temporary private key (sx), and the px and a digital certificate of the mobile station are sent to network side equipment; the network side equipment identifies and recognizes the mobile station and then generates a temporary public key (py) and a temporary private key (sy), and then the network side equipment uses the py and the sy for elliptic curve diffie-hellman (ECDH) calculation so as to generate a key seed and then sends the py to the mobile station; and the mobile station uses the sx and the py for ECDH calculation so as to generate a key seed which is the same as the key seed generated by the network side equipment and then negotiates with the network side equipment by using the key seeds so as to generate a conversation key. The invention also provides a system for assessing the wireless local area network, comprising the mobile station and the network side equipment. The invention combines the advantages of the public key encryption technology and the symmetric key encryption technology and can solve the problems of the identification and the reorganization of both the mobile station and the network side equipment and safety of the encryption of the communication link.

Description

technical field [0001] The invention relates to the field of wireless local area networks, in particular to a method and system for accessing a wireless local area network. Background technique [0002] Wireless local area network is defined by a series of international standard specifications, and the security part defines the Wired Equivalent Protocol (WEP), Wi-Fi (Wireless Fidelity, Wireless Fidelity) Protected Access , referred to as WPA) and other security mechanisms, WEP itself has security risks, WPA has made improvements to the shortcomings of WEP, but the core part of WPA Temporal Key Integrity Protocol (Temporal Key Integrity Protocol, referred to as TKIP) has introduced a compensation Vulnerabilities with relatively low security level, that is, when an error frame is found in the message integrity check, it is considered an active attack and the wireless LAN is closed, which introduces the possibility of a denial of service attack. IEEE802.11i newly introduces th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04W28/18H04W84/12H04L9/30H04L9/32H04W12/041H04W12/069
Inventor 刘建
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products