WLAN (wireless local area network) identity verification method

An identity verification method and wireless local area network technology, applied in wireless communication, electrical components, security devices, etc., can solve problems such as illegal access attacks, hidden safety hazards, replay attacks, etc., to prevent replay attacks, enhance security, Effect of Preventing Unauthorized Access Attacks

Inactive Publication Date: 2015-07-15
TIANJIN UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology helps verify if an individual's true name matches their own ID for accessing wireless networks like WiFi or Bluetooth instead of just sending them personal data through email servers. It also ensures they have no chance of being hacked into during communication with other people who can see this person's identifier (ID). Additionally, it uses asymmetric keys called quantum dots made up from specific materials to create unique identification codes used within each module. These technical improvements make sure users only get registered when connected wirelessly at home without having any confidential details about themselves.

Problems solved by technology

This patented technical problem addressed in this patents relates to improving secure wired LAN connections through encryption techniques such as PIN or CHAP signatures. These techniques require users to remember complicated keys with easy input mechanisms like buttons or fingerprint scans. Additionally, there has been an increase risk of hacking attempts where unauthorized individuals could impersonate legitimate users when accessing WiFi networks over Bluetooth® signals without their knowledge.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WLAN (wireless local area network) identity verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0013] The invention proposes a near-field communication (NFC)-based wireless local area network (WLAN) authentication method. This access method uses two NFC modules: the user NFC module used by the user equipment and the NFC module of the WLAN; the two NFC modules work in a point-to-point mode. When the user requests to access the WLAN, the user's NFC module establishes NFC communication with the WLAN's NFC module, uses the Diffie-Hellman algorithm to exchange random information and calculates the symmetric key KEY; uses the public key cryptography certificate system authentication method, Verify user identity for symmetric key KEY signature and verification. The public key cryptographic certificate system used can use various algorithms, such as digital signature algorithm DSA, elliptic curve digital signature algorithm ECDSA and so on.

[0014] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a WLAN (wireless local area network) identity verification method. According to the method, two NFC (near field communication) modules, namely, a user NFC module adopted by user equipment and an NFC module of the WLAN, are used and work in a point-to-point mode; when a user requests access to the WLAN, the user NFC module and the NFC module of the WLAN establish NFC, exchange random information with a Diffie-Hellman algorithm and calculate symmetric keys; user identity verification is performed on symmetric key signatures and verification with an ECDSA (elliptic curve digital signature algorithm) identity verification method. With the adoption of the method, man-in-the-middle attacks and replay attacks are prevented for NFC, illegal access attacks are prevented to a certain extent for the WLAN, user identities are ensured to be real and effective, and the safety of access to the WLAN with NFC is enhanced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products