CN101820629A - Identity authentication method, device and system in wireless local area network (WLAN) - Google Patents

Identity authentication method, device and system in wireless local area network (WLAN) Download PDF

Info

Publication number
CN101820629A
CN101820629A CN201010147292.3A CN201010147292A CN101820629A CN 101820629 A CN101820629 A CN 101820629A CN 201010147292 A CN201010147292 A CN 201010147292A CN 101820629 A CN101820629 A CN 101820629A
Authority
CN
China
Prior art keywords
authentication information
sta
inequality
access point
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010147292.3A
Other languages
Chinese (zh)
Inventor
沈凌光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Device Co Ltd
Original Assignee
Huawei Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Device Co Ltd filed Critical Huawei Device Co Ltd
Priority to CN201010147292.3A priority Critical patent/CN101820629A/en
Publication of CN101820629A publication Critical patent/CN101820629A/en
Pending legal-status Critical Current

Links

Images

Abstract

The embodiment of the invention provides an identity authentication method, an identity authentication device and an identity authentication system in a wireless local area network (WLAN), relates to the field of communications, and can timely disconnect wrong user connection, release resources and guarantee accurate user access. The identity authentication method in the wireless local area network (WLAN) is applied to between a wireless access terminal STA and an access point AP in an OPEN+WEP authentication mode and comprises the following steps of: receiving second authentication information transmitted by the STA; when determining that the second authentication information is different from first authentication information saved per se, disconnecting the connection with the STA, wherein the second authentication information is acquired by decrypting the encrypted first authentication information received by the STA.

Description

The method of authentication, Apparatus and system in a kind of WLAN (wireless local area network)
Technical field
The present invention relates to the communications field, relate in particular to method, the Apparatus and system of authentication in a kind of WLAN (wireless local area network).
Background technology
Along with popularizing of 3G network, the speed of uploading data download by wireless network is more and more higher, the carrying of wireless network is again limited, so WLAN (Wireless Local AreaNetworks, WLAN) technology is widely adopted as the sub-district focus, can reduce user's rate on the one hand, also can alleviate the burden of network on the other hand greatly, for the user provides network service more efficiently.
The extensive employing of wlan network also is accompanied by network security problem, thus also defined some authenticated encryption authentication modes in the WLAN agreement, as OPEN, SHARE, WPA, WPA2 or the like.OPEN+WEP is wherein a kind of the simplest authenticated encryption commonly used combination.
Concrete, OPEN is exactly open, and anyone need not authentication and can connect; And WEP (Wired Equivalent Privacy, Wired Equivalent Privacy) is the mode of encrypting in two interstation wireless transmission data, eavesdrops or invade wireless network in order to prevent the disabled user.WEP encrypts and adopts static privacy key, and each WLAN terminal is used identical cipher key access wireless network.WEP also provides authentication function, when the encryption mechanism function on, client will attempt connecting AP (Access Point, access point) time, AP can send an invitation packet (Challenge Packet) and give client, client is utilized to share again and is sent access point back to authenticate comparison after key is encrypted this value, if correct, just can get permission the access network resource.
The authentication process of WLAN is authentication and two processes of authentication separately.And the authenticated encryption mode of OPEN+WEP is: in authentication phase is that message identifying is not encrypted, and in transmit stage the transmission data is encrypted.
Thus, the inventor finds that there are the following problems at least in the prior art:
Because OPEN+WEP adopts open authentication, the identity legitimacy of STA (wireless access terminal) is not verified; So STA goes into the network process message, comprise that authentication request, Authentication Response, related request, associated response, ACK message all think correct.But afterwards if STA can not transmit data, the user resources that taking AP also do not discharge, and cause follow-up other STA still can not insert wlan network with correct password.
Summary of the invention
Embodiments of the invention provide method, the Apparatus and system of authentication in a kind of WLAN (wireless local area network), can in time disconnect wrong user and connect, and discharge resource, guarantee correct user's access.
For achieving the above object, embodiments of the invention adopt following technical scheme:
The method of authentication among a kind of WLAN (wireless local area network) WLAN is applicable between the wireless access terminal STA and access point AP under the OPEN+WEP authentication mode, comprising:
Second authentication information that reception sends from STA;
When determining that described second authentication information and first authentication information of self preserving are inequality, disconnection is connected with described STA's;
Wherein, to be described STA be decrypted the back gained to described first authentication information of the encryption that receives to described second authentication information.
A kind of access point comprises:
Receiving element is used to receive second authentication information that sends from wireless access terminal STA;
Disconnect judging unit, be used for when determining that described second authentication information and first authentication information of self preserving are inequality, disconnection is connected with described STA's; Wherein, to be described STA be decrypted the back gained to described first authentication information of the encryption that receives to described second authentication information.
A kind of wireless local area network (WLAN) system comprises:
Access point is used to receive second authentication information that sends from the wireless access terminal; When determining that described second authentication information and first authentication information of self preserving are inequality, disconnection is connected with described wireless access terminal; Wherein, to be described wireless access terminal be decrypted the back gained to described first authentication information of the encryption that receives to described second authentication information;
The wireless access terminal with described access point wireless connections, is used to receive first authentication information from the encryption of described access point; First authentication information of described encryption is decrypted obtains second authentication information; Described second authentication information is sent to described access point.
The method of authentication, Apparatus and system in the WLAN (wireless local area network) that the embodiment of the invention provides, AP receives second authentication information that comes from STA, and when determining that this second authentication information and first authentication information of self preserving are inequality, disconnection is connected with STA's.Wherein, to be STA be decrypted the back gained to first authentication information of the encryption that receives to second authentication information.Like this, under OPEN+WEP authenticated encryption mode, after the password access of STA with mistake, AP can judge that the back disconnects the connection of this STA by the method that the invention process provides, thereby has discharged resource, has guaranteed follow-up correct user's access.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
The FB(flow block) of the method for authentication in the WLAN (wireless local area network) that Fig. 1 provides for the embodiment of the invention;
The FB(flow block) of the method for authentication in the WLAN (wireless local area network) that Fig. 2 provides for another embodiment of the present invention;
Fig. 3 is the WEP encryption flow schematic diagram of AP side in the prior art;
Fig. 4 is the WEP deciphering schematic flow sheet of STA side in the prior art;
Fig. 5 provides the structured flowchart one of access point for the embodiment of the invention;
Fig. 6 provides the structured flowchart two of access point for the embodiment of the invention;
Fig. 7 provides the structured flowchart three of access point for the embodiment of the invention;
The structural representation of the wireless local area network (WLAN) system that Fig. 8 provides for the embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
The method of authentication among the WLAN (wireless local area network) WLAN that the embodiment of the invention provides is applicable to that as shown in Figure 1, its step comprises between the wireless access terminal STA and access point AP under the OPEN+WEP authentication mode:
Second authentication information that S101, reception send from STA.
S102, when determining that this second authentication information and first authentication information of self preserving are inequality, disconnection is connected with this STA's.Wherein, second authentication information is decrypted the back gained for this STA to first authentication information of the encryption that receives.
Concrete, this step S102 can for: when determining that once second authentication information and first authentication information of self preserving are inequality, disconnection is connected with STA's; Also can for: when determining that once second authentication information and first authentication information of self preservation are inequality, receive second authentication information that STA sends once more, and judge once more whether second authentication information is identical with first authentication information of self preserving, receive so, judge that the circulation preset times is inferior, if both are still inequality, then disconnect and being connected of STA.
Repeatedly cycle criterion can prevent that transient error from causing connection failure, has certain fault-tolerance, and what can guarantee to connect smoothly carries out.
The method of authentication in the WLAN (wireless local area network) that the embodiment of the invention provides, AP receives second authentication information that comes from STA, and when determining that this second authentication information and first authentication information of self preserving are inequality, disconnection is connected with STA's.Wherein, to be STA be decrypted the back gained to first authentication information of the encryption that receives to second authentication information.Like this, under OPEN+WEP authenticated encryption mode, after the password access of STA with mistake, AP can judge that the back disconnects the connection of this STA by the method that the invention process provides, thereby has discharged resource, has guaranteed follow-up correct user's access.
The method of authentication among the WLAN (wireless local area network) WLAN that another embodiment of the present invention provides is applicable to that its step comprises as shown in Figure 2 between the wireless access terminal STA and access point AP under the OPEN+WEP authentication mode:
S201, AP side are carried out the WEP encryption flow, obtain first authentication information.This first authentication information both can be first ICV in the present embodiment, also can be first plaintext.
Concrete, as shown in Figure 3, comprising:
1, key (secret key) that AP and STA bilateral agreement is good through PRNG (Pseudo-random number generator, pseudorandom number generator) after, the synthetic key stream (key stream) that obtains.Produce the IV (InitializationVector, initial vector) of one 24 bit digital at random; With IV and key (secret key) in conjunction with (have 2 24 powers 16777216 kinds), in conjunction with after content obtain being used for encrypted secret key through PRNG and flow (KeyStream).
2, expressly (PlainText) (first expressly) obtains integrity check value (Integrity Check Value, ICV) (ICV) via finishing type algorithm (IntegrityAlgorithm)
3, use at last key stream (KeyStream), expressly (PlainText), ICV XOR are encrypted and are generated ciphertext (CipherText).
S202, the AP information after STA sends encryption is comprising first authentication information of encrypting.
Concrete, above-mentioned enciphered message is sent to STA to the Authen Response (Authentication Response) that STA responds by AP, wherein comprised:
1, initial vector IV, length can be 3 bytes.
2, KeyID, length can be 1 byte, is used to refer to STA and need uses which Key among four WEPKey to decipher.
3, ciphertext (CipherText), length can be the 0-2304 byte.
4, ICV, length can be 4 bytes.
S203, STA carry out the WEP deciphering to the enciphered message that receives, and obtain simultaneously second authentication information after the deciphering of first authentication information.In the present embodiment, corresponding first authentication information of second authentication information both can be the 2nd ICV, also can be second plaintext.
Concrete, as shown in Figure 4, comprising:
1, AP has transmitted KeyID to STA in above-mentioned information, and STA self is finding corresponding WEPKey according to the KeyID of this reception.
2, according to the initial vector IV that receives, by calculating key stream (KeyStream).
3, utilize key stream (KeyStream) that the ciphertext (CipherText) that receives is carried out XOR once more, obtain expressly (PlainText) (second plaintext).
4, to this expressly via integral algorithm, obtain ICV ' (the 2nd ICV).Further, ICV ' is contrasted with the ICV that receives, if the identical content that shows is not distorted.
So far, in the prior art, when the password access of STA with mistake, the message identifying between AP and the STA is considered to entirely true, but both can not transmit data.But AP does not initiatively play the connection except that STA, so STA still can take the subscriber channel of an AP.
S204, AP receive the ICV ' (the 2nd ICV) that sends from STA;
S205, AP judge whether this ICV ' (the 2nd ICV) is identical with the ICV (ICV) that self preserves, if it is different, then receive the ICV ' (the 2nd ICV) of STA once more, and judge whether this ICV ' (the 2nd ICV) is identical with the ICV (ICV) that self preserves, so circulation receives, judges preset times time (for example 10 times), if still inequality, then AP sends to STA and goes association to remove message identifying, and disconnection simultaneously is connected with this STA's.
At this, repeatedly circulation receives and judges and can have certain fault-tolerance, and what can guarantee to connect smoothly carries out.3 times the time, find that ICV ' is identical with ICV if circulate, then illustrate between AP and the STA transient error to have occurred, do not influence the normal access of STA.
Step S204 and step S205 are authentication information with ICV, also can be with expressly as authentication information, as dotted portion among the figure:
S204 ', AP receive the plaintext (second plaintext) that sends from STA;
S205 ', AP judge whether this plaintext (second plaintext) is identical with the plaintext of self preserving (first expressly), if it is different, then receive the plaintext (second plaintext) of STA once more, and judge whether this plaintext (second plaintext) that receives is identical with the plaintext of self preserving (first expressly), so circulation receives, judges preset times time (for example 10 times), if still inequality, then AP sends to STA and goes association to remove message identifying, and disconnection simultaneously is connected with this STA's.
Equally, repeatedly circulation receive to judge to have certain fault-tolerance, and what can guarantee to connect smoothly carries out.
The method of authentication in the WLAN (wireless local area network) that the embodiment of the invention provides, AP receives second authentication information that comes from STA, and when determining that this second authentication information and first authentication information of self preserving are inequality, disconnection is connected with STA's.Wherein, to be STA be decrypted the back gained to first authentication information of the encryption that receives to second authentication information.Like this, under OPEN+WEP authenticated encryption mode, after the password access of STA with mistake, AP can judge that the back disconnects the connection of this STA by the method that the invention process provides, thereby has discharged resource, has guaranteed follow-up correct user's access.
The access point 50 that the embodiment of the invention provides, as shown in Figure 5, this access point 50 comprises:
Receiving element 501 is used to receive second authentication information that sends from wireless access terminal STA.
Disconnect judging unit 502, be used for when determining that this second authentication information and first authentication information of self preserving are inequality, disconnection is connected with this STA's; Wherein, second authentication information is decrypted the back gained for this STA to first authentication information of the encryption that receives.
The access point that the embodiment of the invention provides receives second authentication information that comes from STA, and when determining that this second authentication information and first authentication information of self preserving are inequality, disconnection is connected with STA's.Wherein, to be STA be decrypted the back gained to first authentication information of the encryption that receives to second authentication information.Like this, under OPEN+WEP authenticated encryption mode, after the password access of STA with mistake, AP can judge that the back disconnects the connection of this STA, thereby has discharged resource, has guaranteed follow-up correct user's access.
Further, this disconnection judging unit 502 comprises: once disconnect judgment sub-unit 5021 and/or circulation disconnection judgment sub-unit 5022.
Figure 6 shows that disconnecting judging unit 502 comprises the situation that once disconnects judgment sub-unit 5021 and circulation disconnection judgment sub-unit 5022 simultaneously.
Once disconnect judgment sub-unit 5021, be used for when determining that once second authentication information and first authentication information of self preserving are inequality, disconnection is connected with STA's.
Circulation disconnects judgment sub-unit 5022, be used for when determining that once second authentication information and first authentication information of self preserving are inequality, whether second authentication information of judging receiving element 501 receptions once more is identical with first authentication information of self preserving, so the cycle criterion preset times is inferior, if both are still inequality, then disconnect and being connected of STA.
Like this, disconnect the repeatedly cycle criterion of judgment sub-unit 5022 by circulation, can prevent that transient error from causing connection failure, have certain fault-tolerance, what can guarantee to connect smoothly carries out.If when cycle-index does not arrive preset times, find that second authentication information is identical with first authentication information, then illustrate between AP and the STA transient error to have occurred, do not influence the normal access of STA.
As shown in Figure 7, access point 50 also comprises:
Memory cell 503 is used to preserve described first authentication information;
Ciphering unit 504 is used for described first authentication information is encrypted;
Transmitting element 505 is used for first authentication information of described encryption is sent to STA.
The wireless local area network (WLAN) system that the embodiment of the invention provides as shown in Figure 8, comprising:
Access point 801 is used to receive second authentication information that sends from wireless access terminal 802; When determining that this second authentication information and first authentication information of self preserving are inequality, disconnection is connected with this wireless access terminal 802; Wherein, second authentication information is that first authentication information of the 802 pairs of encryptions that receive in wireless access terminal is decrypted the back gained.
Concrete, the structure of this access point 801 is same as the previously described embodiments, does not repeat them here.
Wireless access terminal 802 with access point 801 wireless connections, is used to receive first authentication information from the encryption of access point 801; First authentication information of this encryption is decrypted obtains second authentication information; Second authentication information is sent to access point 801.
The wireless local area network (WLAN) system that the embodiment of the invention provides, AP receives second authentication information that comes from STA, and when determining that this second authentication information and first authentication information of self preserving are inequality, disconnection is connected with STA's.Wherein, to be STA be decrypted the back gained to first authentication information of the encryption that receives to second authentication information.Like this, under OPEN+WEP authenticated encryption mode, after the password access of STA with mistake, AP can judge that the back disconnects the connection of this STA, thereby has discharged resource, has guaranteed follow-up correct user's access.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of program command, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
The above; only be the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; can expect easily changing or replacing, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion by described protection range with claim.

Claims (10)

1. the method for authentication among the WLAN (wireless local area network) WLAN is applicable between the wireless access terminal STA and access point AP under the OPEN+WEP authentication mode, it is characterized in that, comprising:
Second authentication information that reception sends from STA;
When determining that described second authentication information and first authentication information of self preserving are inequality, disconnection is connected with described STA's;
Wherein, to be described STA be decrypted the back gained to described first authentication information of the encryption that receives to described second authentication information.
2. method according to claim 1 is characterized in that, described when determining that described second authentication information and first authentication information of self preserving are inequality, disconnection is connected with described STA's, comprising:
When determining that once described second authentication information and first authentication information of self preserving are inequality, disconnection is connected with described STA's.
3. method according to claim 1 is characterized in that, described when determining that described second authentication information and first authentication information of self preserving are inequality, disconnection is connected with described STA's, comprising:
When determining that once described second authentication information and first authentication information of self preserving are inequality, receive second authentication information that described STA sends once more, and judge once more whether described second authentication information is identical with first authentication information of self preserving, receive so, judge that the circulation preset times is inferior, if both are still inequality, then disconnect and being connected of described STA.
4. method according to claim 1 is characterized in that, before second authentication information that described reception sends from STA, this method also comprises:
Carry out WEP and encrypt, obtain described first authentication information;
To send to described STA behind described first encrypted authentication information, so that described STA obtains described second authentication information after described first authentication information is deciphered.
5. according to the arbitrary described method of claim 1-4, it is characterized in that,
Described first authentication information is the first integrity check value ICV, and described second authentication information is the second integrity check value ICV;
Perhaps,
Described first authentication information is first plaintext, and described second authentication information is a second plaintext.
6. an access point is characterized in that, comprising:
Receiving element is used to receive second authentication information that sends from wireless access terminal STA;
Disconnect judging unit, be used for when determining that described second authentication information and first authentication information of self preserving are inequality, disconnection is connected with described STA's; Wherein, to be described STA be decrypted the back gained to described first authentication information of the encryption that receives to described second authentication information.
7. access point according to claim 6 is characterized in that, described disconnection judging unit comprises:
Once disconnect judgment sub-unit, be used for when determining that once described second authentication information and first authentication information of self preserving are inequality, disconnection is connected with described STA's.
8. access point according to claim 6 is characterized in that, described disconnection judging unit comprises:
Circulation disconnects judgment sub-unit, be used for when determining that once described second authentication information and first authentication information of self preserving are inequality, whether second authentication information of judging described receiving element reception once more is identical with first authentication information of self preserving, so the cycle criterion preset times is inferior, if both are still inequality, then disconnect and being connected of described STA.
9. according to any described access point in the claim 6 to 8, it is characterized in that described access point also comprises:
Memory cell is used to preserve described first authentication information;
Ciphering unit is used for described first authentication information is encrypted;
Transmitting element is used for first authentication information of described encryption is sent to STA.
10. a wireless local area network (WLAN) system is characterized in that, comprising:
Access point is used to receive second authentication information that sends from the wireless access terminal; When determining that described second authentication information and first authentication information of self preserving are inequality, disconnection is connected with described wireless access terminal; Wherein, to be described wireless access terminal be decrypted the back gained to described first authentication information of the encryption that receives to described second authentication information;
The wireless access terminal with described access point wireless connections, is used to receive first authentication information from the encryption of described access point; First authentication information of described encryption is decrypted obtains second authentication information; Described second authentication information is sent to described access point.
CN201010147292.3A 2010-04-15 2010-04-15 Identity authentication method, device and system in wireless local area network (WLAN) Pending CN101820629A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010147292.3A CN101820629A (en) 2010-04-15 2010-04-15 Identity authentication method, device and system in wireless local area network (WLAN)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010147292.3A CN101820629A (en) 2010-04-15 2010-04-15 Identity authentication method, device and system in wireless local area network (WLAN)

Publications (1)

Publication Number Publication Date
CN101820629A true CN101820629A (en) 2010-09-01

Family

ID=42655520

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010147292.3A Pending CN101820629A (en) 2010-04-15 2010-04-15 Identity authentication method, device and system in wireless local area network (WLAN)

Country Status (1)

Country Link
CN (1) CN101820629A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223633A (en) * 2011-07-06 2011-10-19 华为技术有限公司 Method, device and system for authenticating wireless local area network (WLAN)
CN102271187A (en) * 2011-07-27 2011-12-07 苏州巴米特信息科技有限公司 Net-surfing method with mobile phone as hot spot
WO2013152632A1 (en) * 2012-04-11 2013-10-17 华为技术有限公司 Secure identity discovery and communication method
CN105577365A (en) * 2014-11-11 2016-05-11 中国移动通信集团公司 Key consultation method and device for user' access to WLAN
CN105636037A (en) * 2015-06-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Authentication method and apparatus and electronic device
CN105657869A (en) * 2016-02-03 2016-06-08 成都福华信科技有限责任公司 Multi-channel high-performance wireless access base station device
CN105828328A (en) * 2015-01-09 2016-08-03 北京囡宝科技有限公司 Network connection method, client network access method and device
CN106332085A (en) * 2016-09-08 2017-01-11 珠海全志科技股份有限公司 Internet of things WIFI network configuration method, Internet of things terminal and routing terminal
CN106341815A (en) * 2015-07-17 2017-01-18 中兴通讯股份有限公司 Wireless connection method, terminal and AP
WO2017036114A1 (en) * 2015-09-04 2017-03-09 Huawei Technologies Co., Ltd. Method and apparatus for authentication of wireless devices
CN106535191A (en) * 2016-11-24 2017-03-22 北京小米移动软件有限公司 Network connection establishing method and device
CN104602229B (en) * 2015-02-04 2018-02-06 重庆邮电大学 A kind of efficient initial access authentication method for WLAN and 5G combination network application scenarios
CN111669753A (en) * 2020-05-19 2020-09-15 武汉领芯智能科技有限公司 WLAN network connection method and electronic equipment
CN116744287A (en) * 2023-07-10 2023-09-12 上海众网数聚信息科技股份有限公司 Wireless local area network blocking method, device and equipment for WiFi6 and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004017617A1 (en) * 2002-08-14 2004-02-26 Thomson Licensing S.A. Session key management for public wireless lan supporitng multiple virtual operators
CN1522001A (en) * 2003-01-28 2004-08-18 华为技术有限公司 An implement method for controlling user terminal switching between different networks
CN1725685A (en) * 2004-07-22 2006-01-25 中兴通讯股份有限公司 Security identification method for mobiole terminal of radio cocal network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004017617A1 (en) * 2002-08-14 2004-02-26 Thomson Licensing S.A. Session key management for public wireless lan supporitng multiple virtual operators
CN1522001A (en) * 2003-01-28 2004-08-18 华为技术有限公司 An implement method for controlling user terminal switching between different networks
CN1725685A (en) * 2004-07-22 2006-01-25 中兴通讯股份有限公司 Security identification method for mobiole terminal of radio cocal network

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223633B (en) * 2011-07-06 2013-12-04 华为技术有限公司 Method, device and system for authenticating wireless local area network (WLAN)
CN102223633A (en) * 2011-07-06 2011-10-19 华为技术有限公司 Method, device and system for authenticating wireless local area network (WLAN)
CN102271187A (en) * 2011-07-27 2011-12-07 苏州巴米特信息科技有限公司 Net-surfing method with mobile phone as hot spot
US9357389B2 (en) 2012-04-11 2016-05-31 Huawei Technologies Co., Ltd. Security identity discovery and communication method
WO2013152632A1 (en) * 2012-04-11 2013-10-17 华为技术有限公司 Secure identity discovery and communication method
CN105577365B (en) * 2014-11-11 2019-04-26 中国移动通信集团公司 A kind of user accesses the cryptographic key negotiation method and device of WLAN
CN105577365A (en) * 2014-11-11 2016-05-11 中国移动通信集团公司 Key consultation method and device for user' access to WLAN
CN105828328A (en) * 2015-01-09 2016-08-03 北京囡宝科技有限公司 Network connection method, client network access method and device
CN104602229B (en) * 2015-02-04 2018-02-06 重庆邮电大学 A kind of efficient initial access authentication method for WLAN and 5G combination network application scenarios
CN105636037B (en) * 2015-06-29 2019-11-12 宇龙计算机通信科技(深圳)有限公司 Authentication method, device and electronic equipment
CN105636037A (en) * 2015-06-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Authentication method and apparatus and electronic device
CN106341815B (en) * 2015-07-17 2020-11-27 中兴通讯股份有限公司 Wireless connection method, terminal and AP
CN106341815A (en) * 2015-07-17 2017-01-18 中兴通讯股份有限公司 Wireless connection method, terminal and AP
US10555170B2 (en) 2015-09-04 2020-02-04 Huawei Technologies Co., Ltd. Method and apparatus for authentication of wireless devices
WO2017036114A1 (en) * 2015-09-04 2017-03-09 Huawei Technologies Co., Ltd. Method and apparatus for authentication of wireless devices
CN105657869B (en) * 2016-02-03 2019-03-05 成都福华信科技有限责任公司 A kind of multichannel high-performance wireless access base station equipment
CN105657869A (en) * 2016-02-03 2016-06-08 成都福华信科技有限责任公司 Multi-channel high-performance wireless access base station device
CN106332085A (en) * 2016-09-08 2017-01-11 珠海全志科技股份有限公司 Internet of things WIFI network configuration method, Internet of things terminal and routing terminal
CN106535191A (en) * 2016-11-24 2017-03-22 北京小米移动软件有限公司 Network connection establishing method and device
CN111669753A (en) * 2020-05-19 2020-09-15 武汉领芯智能科技有限公司 WLAN network connection method and electronic equipment
CN116744287A (en) * 2023-07-10 2023-09-12 上海众网数聚信息科技股份有限公司 Wireless local area network blocking method, device and equipment for WiFi6 and storage medium
CN116744287B (en) * 2023-07-10 2024-04-12 上海众网数聚信息科技股份有限公司 Wireless local area network blocking method, device and equipment for WiFi6 and storage medium

Similar Documents

Publication Publication Date Title
CN101820629A (en) Identity authentication method, device and system in wireless local area network (WLAN)
JP6492115B2 (en) Encryption key generation
KR101097709B1 (en) Authenticating access to a wireless local area network based on security value(s) associated with a cellular system
US8245039B2 (en) Extensible authentication protocol authentication and key agreement (EAP-AKA) optimization
CA2690755C (en) System and method of per-packet keying
US8045715B2 (en) Method of handling security key change and related communication device
CN101406021B (en) SIM based authentication
CN102131188B (en) Method and system for transmitting user identity information as well as user equipment and network side equipment
US8302183B2 (en) Apparatus and method of security identity checker
CN105553951A (en) Data transmission method and data transmission device
CN111865603A (en) Authentication method, authentication device and authentication system
JP7174156B2 (en) Ensuring Secure Attachment in Size-Limited Authentication Protocols
CN101895877A (en) Method, device and system for key agreement
CN101895882A (en) Data transmission method, system and device in WiMAX system
CN101237444A (en) Secret key processing method, system and device
CN103166757A (en) Method and system capable of dynamically protecting user private data
CN105007163A (en) Pre-shared key (PSK) transmitting and acquiring methods and transmitting and acquiring devices
KR102219086B1 (en) HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
Juang et al. Efficient 3GPP authentication and key agreement with robust user privacy protection
CN101420687B (en) Identity verification method based on mobile terminal payment
CN107508814A (en) Data ciphering method, decryption method, apparatus and system
US7933597B2 (en) Method of registering a network, and mobile station and communication system using the same
CN105721144A (en) Password storage method of wireless network access point and terminal
CN102547686A (en) M2M (Machine-to-Machine) terminal security access method and terminal and management platform
EP1973291B1 (en) Method for transmitting a message having a non-encoded and an encoded portion in a wireless system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100901