Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication method for wireless network

A security authentication, wireless network technology, applied in the field of wireless network security authentication, can solve the problems of weak encryption strength, key cracking, trouble entering the key, etc., to enhance security, ensure security, avoid brute force cracking and key The effect of leakage

Active Publication Date: 2012-07-04
成都飞鱼星科技股份有限公司
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the current WiFi wireless system has obvious security problems
In the WiFi wireless system, WEP (Wired Equivalent Privacy, wired equivalent privacy) and WPA (WiFi Protected Access, WiFi network security access) systems have very weak encryption strength for keys, while in WPA2 (another WPA PSK (Pre-shared Key, pre-shared key) is used in the system and WAPI (a protocol of China's wireless LAN security mandatory standard), so if a weaker key is used, there will be problems of being cracked
And if you use an overly complicated key, it will be very troublesome for users to enter the key when using WiFi
Therefore, in the current WiFi wireless system, there are big problems in the privacy protection and data security protection of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method for wireless network
  • Security authentication method for wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Such as figure 1 The method for wireless network security authentication of the present invention has a WiFi server and a client. The steps include:

[0026] a. Deploy the authentication service program on the client, the client scans the wireless network, and automatically accesses the public open system of the WiFi server to obtain the corresponding IP address;

[0027] b. The client obtains the IP address of the security authentication system of the WiFi server according to the IP address of the public open system. The IP address may be the gateway address of the public open system IP address. The client accesses the address through the SSH authentication port of the security authentication system to try to connect;

[0028] c. The security authentication system of the WiFi server requires certificate authentication for visiting clients. The client authenticates with the security authentication system by reading a local certificate or a USBkey certificate, wherein the USB...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security authentication method for a wireless network. A wireless fidelity (WiFi) server and a client are involved, and the security authentication method comprises the following steps that: a, an authentication service program is deployed in the client, and the client is connected to a public open system of the WiFi server to acquire a corresponding internet protocol (IP) address; b, according to the IP address, the client acquires and accesses an IP address of a security authentication system of the WiFi server; c, the WiFi server authenticates a client certificate; d, the client which passes the authentication establishes first security connection with the WiFi server and acquires encryption parameters; e, the client establishes a second security connection with the security authentication system of the WiFi server according to the encryption parameters; and f, the client and the WiFi server communicate and are updated through the second security connection. By the security authentication method, the client and the WiFi server can be connected easily and quickly by using a complex key and a complex encryption way; and meanwhile, the security during connecting can be guaranteed by using a method of updating the key regularly to ensure that brute force-based cracking and possibility of key leakage are avoided.

Description

Technical field [0001] The present invention relates to a method for safety authentication, specifically, a method for wireless network safety authentication. Background technique [0002] WiFi (Wireless Fidelity) technology is currently a wireless network access method commonly used in homes, businesses, and many more common places. It can gradually replace Ethernet wired connections and has a good development prospect. However, the current WiFi wireless system has obvious security problems. In the WiFi wireless system, WEP (Wired Equivalent Privacy) and WPA (WiFi Protected Access, WiFi network security access) systems have very weak encryption strength for the key, while in WPA2 (another WPA) PSK (Pre-shared Key) is used in the system and WAPI (a protocol of China's wireless LAN security mandatory standards), so if a weaker key is used, there will be a problem of cracking . If an overly complex key is used, it will be very troublesome for the user to enter the key when using...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W76/02H04W12/0431H04W12/069
Inventor 范海鹏周龙
Owner 成都飞鱼星科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products