Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Access verification method and terminal applied to wireless local area network WLAN

A wireless local area network and terminal technology, which is applied in the field of network communication to achieve the effect of improving security

Inactive Publication Date: 2017-08-08
POTEVIO INFORMATION TECH CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides an access authentication method and terminal applied in a wireless local area network WLAN, to solve the defect that the current WiFi access authentication mechanism can only realize one-way authentication of UE identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access verification method and terminal applied to wireless local area network WLAN
  • Access verification method and terminal applied to wireless local area network WLAN
  • Access verification method and terminal applied to wireless local area network WLAN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] see figure 2 , figure 2 It is a flowchart of the method provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the process may include the following steps:

[0032] Step 201, the terminal downloads the APP application software, and the APP application software includes the public key of the certification authority and the asymmetric encryption algorithm engine.

[0033] Specifically, the terminal can download the above-mentioned APP application software from a designated secure website in a trusted network environment.

[0034] Step 202, the terminal installs and runs the downloaded APP application software, and generates a terminal public-private key pair through the asymmetric encryption algorithm engine included in the APP application software.

[0035] Here, the terminal public-private key pair includes a terminal public key and a terminal private key.

[0036] Step 203, the terminal uses the public key of the authentication center to e...

Embodiment 2

[0064] see image 3 , image 3 It is a flow chart of the method provided by Embodiment 2 of the present invention. Such as image 3 As shown, the process may include the following steps:

[0065] Step 301, the terminal downloads APP application software, and the APP application software includes an algorithm factor, a serial number, and an encryption algorithm.

[0066] Specifically, the terminal can download the above-mentioned APP application software from a designated secure website in a trusted network environment.

[0067] Step 302, the terminal installs and runs the downloaded APP application software, and uses its own terminal ID, algorithm factor, serial number, and encryption algorithm to calculate a terminal authentication key.

[0068] Step 303, the terminal sends the terminal ID and serial number to the authentication center.

[0069] In step 304, the authentication center calculates the terminal authentication key based on the received terminal ID and serial ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access verification method and terminal applied to a wireless local area network WLAN. According to the method and the terminal, bidirectional verification between the terminal and a verification center is realized, so identity registration of the terminal is finished; the bidirectional verification between the terminal and an AP (Access Point) is also realized; a mobile operator does not need to participate in the two bidirectional verification processes; through the bidirectional verification, a pseudo AP and a pseudo terminal can be identified; the security of accessing the WLAN by the terminal is improved; and the defect resulting from the fact that only one-way verification for the identity of UE can be realized based on an existing WiFi access verification mechanism is solved.

Description

technical field [0001] The present application relates to network communication technologies, and in particular to an access authentication method and terminal applied to wireless local area networks (WLAN: Wireless Local Area Networks). Background technique [0002] At present, the WiFi access authentication mechanism in the WLAN usually uses an account number plus a password to perform access authentication for Internet users. For example, when a user uses a WLAN provided by an operator, he needs to first obtain a WLAN account and password, and then enter the obtained WLAN account and password through the Portal page / client to complete network authentication during access. The password can also be a dynamic SMS verification code, such as airports, waiting halls and other public places that provide short-term free WLAN access services. When users access the WLAN, they first visit the homepage of the website in the public place, enter their mobile phone number, and it will b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06H04W12/08
CPCH04L63/0869H04W12/06H04W12/08
Inventor 池连刚蔡杰刘道斌李晓华韦玮
Owner POTEVIO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products