Terminal WIFI login authentication method and system based on IPK

An authentication method and terminal technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as obstacles to the promotion of WARI, achieve effective protection, guarantee the core interests of enterprises, and achieve the effect of resource sharing

Pending Publication Date: 2020-11-20
牛毅
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Furthermore, my country has introduced WAPI to achieve strong WIFI authentication, but because hardware devices have already formed a dependence on IEEE 802.11 series protocols, WARI has encountered great obstacles in the promotion process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal WIFI login authentication method and system based on IPK
  • Terminal WIFI login authentication method and system based on IPK
  • Terminal WIFI login authentication method and system based on IPK

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0138] The IPK identification public key algorithm is a key system in which a public-private key pair is generated from the identification.

[0139] The session key skey is calculated and generated by an elliptic curve algorithm.

[0140] It is obtained by taking the x-coordinate of the elliptic curve point R and modulo the elliptic curve parameter n, and its calculation formula is as follows:

[0141] skey = R.x mod n,

[0142] R=r·G=(x,y),

[0143] Among them: G is a base point of the elliptic curve, and its order is a prime number; r is an encrypted random number; n is the order of the base point G; (x, y) is the coordinate of the curve point R.

[0144] A specific embodiment in which the present invention obtains ciphertext data:

[0145] Use the session key skey to encrypt the random number r to obtain the ciphertext data C,

[0146] Its calculation formula is:

[0147] C=E skey (r),

[0148] Where: E is a symmetric encryption algorithm.

[0149] A specific embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal WIFI login authentication method and system based on IPK, and belongs to the technical field of WIFI authentication. An existing mode of firstly connecting and thenauthenticating has security holes. According to the authentication method provided by the invention, the terminal to access the network can be permitted to be connected with the wireless internet access module for data transmission only after passing the authentication, so that the authentication method is safer and more reliable that the existing mode of passing the authentication first and thenauthenticating. According to the terminal WIFI login authentication method based on the IPK, the compliance requirement of national security can be met; the network security autonomous controllabilityof the key core area can be realized; a novel lightweight data security system based on the terminal Internet of Things is convenient to establish, a comprehensive refined security strategy is formed, safe and reliable resource sharing is effectively realized, the network security protection level of a public key or an office core area is effectively improved, and effective protection of securitycore data is realized, so that the core benefit of an enterprise can be better guaranteed.

Description

technical field [0001] The invention relates to an IPK-based terminal WIFI login authentication method and system, belonging to the technical field of WIFI authentication. Background technique [0002] With the development of WIFI technology, WIFI is widely used in various industries. In the key core areas of industrial production or office, WIFI security defense is becoming the core of network security. Its security protection is different from traditional IT thinking and Internet thinking. Similarly, it is necessary to carry out targeted security protection based on the characteristics of network applications in key core areas. [0003] The traditional WIFI authentication method is based on the IEEE 802.11 series protocol: the network access terminal and the wireless Internet access module are connected first; then the network access authentication is performed; the authentication is passed for data transmission, and there are loopholes in data security. When the network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/04H04W12/02H04L9/32H04L9/08H04L29/06
CPCH04W12/06H04W12/02H04L9/3247H04L63/0876H04L9/3297H04L9/0866H04L63/0435Y02D30/70
Inventor 牛毅卢学强韩雁文牛涛
Owner 牛毅
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products