Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless access key management method and system

A wireless access and key management technology, which is applied in wireless communication, electrical components, security devices, etc., can solve problems such as poor security, frequent information security accidents, and low key confidentiality, so as to ensure security and modify The effect of heavy workload

Active Publication Date: 2019-06-18
TRAFFIC CONTROL TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The wireless access authentication keys of the original DCS system are all artificially set and injected into the wireless communication equipment through the key injection device. Security accidents occur frequently, so new requirements are put forward for the DCS system - security requirements for wireless communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless access key management method and system
  • Wireless access key management method and system
  • Wireless access key management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0051] figure 1 A flow chart of a wireless access key management method provided by an embodiment of the present invention is shown.

[0052] refer to figure 1 A wireless access key management method, comprising the following steps:

[0053] S101. After receiving the activation command, the authentication key management server takes the time of receiving the activation command as the starting time, and judges whether an external trigger command is received within the first preset time period; if not received, execute step S102 , if received, execute step S103;

[0054] S102. If not received, generate a first wireless access authentication key, so that the wireless comm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a wireless access key management method, which includes the following steps: After receiving the start command, the authentication key management server takes the time when the start command is received as the start time, and judges that the start time is within the first preset time period Whether an external trigger instruction is received; if not received, then generate a first wireless access authentication key, so that the wireless communication devices to which the preset IP address belongs communicate according to the first wireless access authentication key; Storing the generation time of the first wireless access authentication key, and using the stored generation time of the first wireless access authentication key as the next start time, repeatedly judging whether an external trigger command is received within the first preset time period A step of. In this method, the authentication key management server automatically generates the wireless access authentication key, and the key cannot be mastered by people; and the key can be updated automatically, which is convenient for modification, and is more secure and convenient. It also relates to a wireless access key management system.

Description

technical field [0001] The invention relates to a wireless access key management method and system. Background technique [0002] Wireless network technology provides users with better mobility, flexibility and scalability, so it is widely used. [0003] The vigorous development of urban rail transit has put forward higher requirements for the efficiency, safety and reliability of train operation. Therefore, in the existing urban rail transit control systems, the vehicle-to-ground data communication system (DCS system, Data Communication System, data communication system) is used to transmit control information. [0004] Since the air interface of the DCS system is in an open space, it is easy to be attacked by malicious users. When a malicious user attacks the network, or a malicious user successfully accesses the network and pretends to be a valid user to release false information, it is very easy to cause the train to run. security incident. In order to ensure the secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/041H04W12/069
CPCH04W12/04H04W12/06
Inventor 刘波杨旭文
Owner TRAFFIC CONTROL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products