Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

CAPWAP-based shared key using method and device

A technology for sharing keys and keys, applied in secure communication devices and key distribution, can solve problems such as security reduction, and achieve the effects of reducing chip costs, saving storage space, and ensuring secure communication

Active Publication Date: 2015-12-16
SUZHOU CENTEC COMM CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From the perspective of network security, in order to prevent data from being eavesdropped, the CAPWAP protocol requires DTLS to change the key intermittently, but the pre-shared key is statically configured by the user. Unless the user manually updates the key, the key will not change and the security will be reduced. up

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CAPWAP-based shared key using method and device
  • CAPWAP-based shared key using method and device
  • CAPWAP-based shared key using method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings of the present invention.

[0023] Such as figure 1 As shown, in the existing technology of dynamically generating DTLS keys through certificates, the keys needed for DTLS encryption and decryption are negotiated by the AP and the AC during the handshake phase of the DTLS session, that is, the key of the AP and the AC Negotiation is decided by steps S101 to S113.

[0024] Specifically, steps S102 and S104 include a 32-byte random number generated by the AC end, steps S101 and S103 include a 32-byte random number generated by the AP end, and step S105 is a digital certificate sent by the AC end to the AP end, On the one hand, it is used for the AP to identify the identity of the AC, and on the other hand, it contains the public key of the AC; in step S108, the AP first randomly generates a 48-byte pre-master key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a CAPWAP-based shared key using method and device. The method is applied to a CAPWAP communication process between a plurality of APs and an AC; random number resource pools are pre-distributed to the AC and the APs so that the AC and the APs are capable of choosing random numbers from own resource pools and calculating own DTLS encryption / decryption keys using the corresponding random numbers; when the DTLS encryption / decryption key of each AP is stored in an AC terminal chip, the same key index value is distributed to the APs having the same key, thereby realizing that the same DTLS encryption / decryption key can be shared by a plurality of APs; as a result, the area, power consumption and cost of the AC chip can be reduced and the network security is also guaranteed.

Description

technical field [0001] The present invention relates to the CAPWAP protocol, in particular to a method and device for using a shared key based on CAPWAP. Background technique [0002] Traditional WLAN (Wireless Local Area Networks, wireless local area network) networks are established for the access of a small number of mobile users in enterprises or families. Therefore, usually only a wireless router is needed to solve the problem. However, when the scale and density of wireless access reach a certain level, traditional wireless routers will have problems in deployment and management. [0003] Thin AP (access point) + AC (access controller) is another architecture after fat AP, in which AC is responsible for wireless network access control, forwarding and statistics, AP configuration monitoring, roaming management, AP Network management agent, security control, thin AP can work alone in this architecture, and must be used in conjunction with AC, so there needs to be a pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0838H04L63/061
Inventor 马千里方沛昱
Owner SUZHOU CENTEC COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products