Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless access secret key management method and system

A wireless access and key management technology, which is applied in wireless communication, electrical components, security devices, etc., can solve problems such as poor security, frequent information security accidents, and low key confidentiality, so as to ensure security and modify The effect of heavy workload

Active Publication Date: 2016-02-10
TRAFFIC CONTROL TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The wireless access authentication keys of the original DCS system are all artificially set and injected into the wireless communication equipment through the key injection device. Security accidents occur frequently, so new requirements are put forward for the DCS system - security requirements for wireless communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless access secret key management method and system
  • Wireless access secret key management method and system
  • Wireless access secret key management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0051] figure 1 A flow chart of a wireless access key management method provided by an embodiment of the present invention is shown.

[0052] refer to figure 1 A wireless access key management method, comprising the following steps:

[0053] S101. After receiving the activation command, the authentication key management server takes the time of receiving the activation command as the starting time, and judges whether an external trigger command is received within the first preset time period; if not received, execute step S102 , if received, execute step S103;

[0054] S102. If not received, generate a first wireless access authentication key, so that the wireless comm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a wireless access secret key management method. The method comprises following steps of after an authentication secret key management server receives an enabled instruction, using the time point at when the enabled instruction is received as a start time point, and determining whether an external trigger instruction is received in a first preset time period; if not, generating a first wireless access authentication secret key, so as to enable wireless communication devices, to which a preset IP address belongs, to communication with each other through the first wireless access authentication secret key; and storing the time point at when the first wireless access authentication secret key is generated, using the stored time point at when the first wireless access authentication secret key is generated as a next start time point, and redetermining whether the external trigger instruction is received in the first preset time period. The authentication secret key management server generates the wireless access authentication secret key automatically, namely, the secret key is not controlled by men; and the secret key can be updated automatically, is convenient to modify and is safer and more convenient. The invention also relates to a wireless access secret key management system.

Description

technical field [0001] The invention relates to a wireless access key management method and system. Background technique [0002] Wireless network technology provides users with better mobility, flexibility and scalability, so it is widely used. [0003] The vigorous development of urban rail transit has put forward higher requirements for the efficiency, safety and reliability of train operation. Therefore, in the existing urban rail transit control systems, the vehicle-ground data communication system (DCS system, Data Communication System, data communication system) is used to transmit control information. [0004] Since the air interface of the DCS system is in an open space, it is easy to be attacked by malicious users. When a malicious user attacks the network, or a malicious user successfully accesses the network and pretends to be a valid user to release false information, it is very easy to cause the train to run. security incident. In order to ensure the securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/041H04W12/069
CPCH04W12/04H04W12/06
Inventor 刘波杨旭文
Owner TRAFFIC CONTROL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products