Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method of improving wireless local area authentication mechanism

A wireless local area network and mechanism technology, applied in the field of communication, can solve the problems of deceiving users, attacks, verification, etc., and achieve the effect of avoiding "communication hijacking" attacks

Active Publication Date: 2016-08-03
湖州帷幄知识产权运营有限公司
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although EAP-TLS authentication is based on two-way authentication between STA and RADIUS server, and the key on the pre-issued digital certificate is used in the authentication process, it does not fully verify the selected AP, and the AP is considered reliable by default. Therefore, there will be malicious users posing as APs, deceiving users by sending unprotected EAP-Success and other information, making users connect to illegal APs, thereby obtaining all network communications of users, and even sending disassociation frames to use Legitimate user disconnects
The AP does not know that the legitimate user has disconnected and continues to communicate. At this time, the illegal user can access the network through the port of the legitimate user, thereby carrying out "communication hijacking" attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of improving wireless local area authentication mechanism
  • Method of improving wireless local area authentication mechanism
  • Method of improving wireless local area authentication mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The method for improving the authentication mechanism of the wireless local area network of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0040] An improved method of wireless local area network authentication mechanism, which is applied to the two-way authentication based on digital certificates between the client through the wireless access point and the authentication server, wherein, such as figure 1 As shown, after the wireless access point sends an authentication success message to the client in clear text during the two-way authentication process, the following steps are also included:

[0041] Step S1, the client encrypts a first encryption parameter using a preset encryption algorithm, encrypts the first encryption algorithm to form a first message, and sends it to the wireless access point;

[0042] Step S2, after receiving the first message, the wireless access point decrypts ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method of improving a wireless local area authentication mechanism. After a wireless access point sends a message that the authentication is successful in a plain text to a client in a bidirectional authentication process, the method comprises the steps of providing a first encryption parameter, if the first encryption parameter remains unchanged after being encrypted by the client, decrypted by the wireless access point, encrypted by the wireless access point and decrypted by the client, judging that the wireless access point is legal; providing a second encryption parameter, if the second encryption parameter remains unchanged after being encrypted by the wireless access point, decrypted by the client, re-encrypted by the client and re-decrypted by the wireless access point, judging that the entire authentication process is completed. The method of improving the wireless local area authentication mechanism provided by the invention can effectively prevent the "man-in-the-middle attack", i.e., the illegal user is unable to access the network through the port of the legal user, so as to avoid the "communication hijack" attack.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an improved method of a wireless local area network authentication mechanism. Background technique [0002] With the development of wireless networks, more and more people are using wireless methods to access networks. Due to the openness of wireless channels, intruders can easily intercept wireless data or access wireless networks by means of scanning or monitoring, so the security of wireless networks has attracted more and more attention. In order to protect the security of the wireless network, people use terminal authentication. At present, people usually use the IEEE802.1X protocol or EAP-TLS (two-way authentication based on digital certificates) to realize the access authentication of the device. [0003] The main purpose of the IEEE802.1X protocol is to solve the problem of access verification of wireless LAN users. EAP-TLS authentication provides a two-way authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/08H04L9/08H04L9/14H04L9/32H04L29/06H04W12/03H04W12/06H04W12/122
CPCH04L9/0869H04L9/14H04L9/3226H04L9/3268H04L63/0823H04L63/083H04W12/08H04L9/32
Inventor 刘军华
Owner 湖州帷幄知识产权运营有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products