Security authentication method for wireless network

A security authentication and wireless network technology, applied in the field of wireless network security authentication, can solve the problems of troublesome key input, key cracking, weak encryption strength, etc., to avoid brute force cracking and key leakage, enhance security, and ensure security sexual effect

Active Publication Date: 2014-11-26
成都飞鱼星科技股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the current WiFi wireless system has obvious security problems
In the WiFi wireless system, WEP (Wired Equivalent Privacy, wired equivalent privacy) and WPA (WiFi Protected Access, WiFi network security access) systems have very weak encryption strength for keys, while in WPA2 (another WPA PSK (Pre-shared Key, pre-shared key) is used in the system and WAPI (a protocol of China's wireless LAN security mandatory standard), so if a weaker key is used, there will be problems of being cracked
And if you use an overly complicated key, it will be very troublesome for users to enter the key when using WiFi
Therefore, in the current WiFi wireless system, there are big problems in the privacy protection and data security protection of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method for wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Such as figure 1 The shown wireless network security authentication method of the present invention has a WiFi server and a client, and the steps include:

[0026] a. Deploy the authentication service program on the client, the client scans the wireless network, and automatically accesses the public open system of the WiFi server to obtain the corresponding IP address;

[0027] b. The client obtains the IP address of the security authentication system of the WiFi server according to the IP address of the public open system, and the IP address may be the gateway address of the public open system IP address. The client accesses the address through the SSH authentication port of the security authentication system, and tries to connect;

[0028] c. The security authentication system of the WiFi server requires certificate authentication for the accessed client. The client authenticates with the security authentication system by reading the local certificate or the USBkey ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security authentication method for a wireless network. A wireless fidelity (WiFi) server and a client are involved, and the security authentication method comprises the following steps that: a, an authentication service program is deployed in the client, and the client is connected to a public open system of the WiFi server to acquire a corresponding internet protocol (IP) address; b, according to the IP address, the client acquires and accesses an IP address of a security authentication system of the WiFi server; c, the WiFi server authenticates a client certificate; d, the client which passes the authentication establishes first security connection with the WiFi server and acquires encryption parameters; e, the client establishes a second security connection with the security authentication system of the WiFi server according to the encryption parameters; and f, the client and the WiFi server communicate and are updated through the second security connection. By the security authentication method, the client and the WiFi server can be connected easily and quickly by using a complex key and a complex encryption way; and meanwhile, the security during connecting can be guaranteed by using a method of updating the key regularly to ensure that brute force-based cracking and possibility of key leakage are avoided.

Description

technical field [0001] The invention relates to a method for security authentication, specifically a method for wireless network security authentication. Background technique [0002] WiFi (Wireless Fidelity) technology is currently a commonly used wireless network access method in homes, businesses, and many more public places. It can gradually replace Ethernet wired connections and has a good development prospect. But there are obvious security problems in the current WiFi wireless system. In the WiFi wireless system, WEP (Wired Equivalent Privacy, wired equivalent privacy) and WPA (WiFi Protected Access, WiFi network security access) systems have very weak encryption strength for keys, while in WPA2 (another WPA PSK (Pre-shared Key, pre-shared key) is used in the system and WAPI (a protocol of China's wireless LAN security mandatory standard), so if a weaker key is used, there will be cracking problems . However, if an overly complex key is used, it will be very troubl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W76/02H04W12/0431H04W12/069
Inventor 范海鹏周龙
Owner 成都飞鱼星科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products