CN1980120A - Accessing method having secret-keeping function and linking to wireless local network and system - Google Patents

Accessing method having secret-keeping function and linking to wireless local network and system Download PDF

Info

Publication number
CN1980120A
CN1980120A CN 200510128964 CN200510128964A CN1980120A CN 1980120 A CN1980120 A CN 1980120A CN 200510128964 CN200510128964 CN 200510128964 CN 200510128964 A CN200510128964 A CN 200510128964A CN 1980120 A CN1980120 A CN 1980120A
Authority
CN
China
Prior art keywords
wireless terminal
pki
ciphertext
wireless
area network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510128964
Other languages
Chinese (zh)
Inventor
赖怡吉
尤焙麟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Acer Inc
Original Assignee
Acer Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Acer Inc filed Critical Acer Inc
Priority to CN 200510128964 priority Critical patent/CN1980120A/en
Publication of CN1980120A publication Critical patent/CN1980120A/en
Pending legal-status Critical Current

Links

Images

Abstract

In the invention, first wireless terminal already logs in wireless local area network (WLAN), and obtains setting value; second wireless terminal possessing public key and private key accorded with asymmetric public key technique as a new device is going to log in WLAN. The method combines first wireless terminal with second wireless terminal. Logging in method includes steps: (1) second wireless terminal transfers public key to first wireless terminal; (2) using the obtained public key, first wireless terminal encrypts the setting value to cryptograph, and transfers the cryptograph to second wireless terminal; (3) after receiving the cryptograph, second wireless terminal decrypts the cryptograph by using private key in order to obtain original setting value, based on which second wireless terminal is able to log in WLAN. Thus, the logging in data can be encrypted in whole course without worrying the logging in data stolen by others in transmission procedure.

Description

Accessing method and system thereof with function of keeping secret and linking to wireless local network
Technical field
The present invention relates to a kind of WLAN (wireless local area network) (Wireless LAN) and login the method and the system thereof of newly-increased device, particularly relate to a kind of accessing method and system thereof of in WLAN (wireless local area network), increasing device newly that can login the omnidistance encryption of data.
Background technology
Current wireless local area network technology such as for example WiFi, 802.11a/b/g etc. is in order to reach Information Security and the demand of maintaining secrecy; all can require the user when connecting WLAN (wireless local area network); must possess certain safe key (Security Key) to protect its Content of Communication; as: 802.11a/b/g possesses WEP (Wired-Equivalent Privacy; Wired Equivalent Privacy) with WPA key protection mechanisms such as (Wi-FiProtected Access, Wi-Fi protects visit).
With the wep encryption key protection mechanism is example; mainly be the wep encryption key (WEP Key) of utilizing many bits (40bits) and the random number of many bits (24 or 128bits) produces digital signature; thereby each packet data content-encrypt that the device that connects WLAN (wireless local area network) is transmitted each other; by this key protection mechanism; even there is the third party to obtain packet data; owing to there is not wep encryption key to decipher, also just can't understand the packet data content after the encryption.
Logining a radio local network environment with a wireless device now is example, and the accessing method of setting up key protection mechanism at present is described:
Login mode for first kind: manually import setting by the user.The user just can login radio local network environment must import correct WLAN (wireless local area network) identification code (SSID) and correct wep encryption key in wireless device after.
Login mode for second kind: utilize portable storage device to duplicate to have the set point of WLAN (wireless local area network) identification code and correct wep encryption key to set to wireless device.Present known Microsoft (Microsoft) once proposed respectively to utilize USB Flash Drive or similar portable storage device to transport (transport) set point with Intel (Intel) company, in other words set point was copied to wireless device by this way.
The third logins mode: press " connection " button on two wireless devices of wanting to interconnect simultaneously, make two contiguous equipment interconnected automatically.The at present known Broadcom of having company once proposed this notion.
Which kind of logins mode all a common problem, exactly between two wireless devices of wanting to interconnect, the present not effective security certification mechanism of a cover set point can be copied to safely want the wireless device of newly-increased line and can not be stolen in transmission course.
Summary of the invention
Therefore, purpose of the present invention, just being to provide a kind of can need not worry to login in the transmission course accessing method with function of keeping secret and linking to wireless local network and the system thereof that data can be stolen with logining the omnidistance encryption of data.
So of the present invention have the accessing method of function of keeping secret and linking to wireless local network and first preferred embodiment of system thereof, system comprises first wireless terminal, second wireless terminal and builds on transmission channel between first, second wireless terminal.
First wireless terminal has been logined WLAN (wireless local area network) and has been obtained the set point of WLAN (wireless local area network); Second wireless terminal is to want at the newly-increased device of WLAN (wireless local area network), and it has PKI and the private key that meets the asymmetric public key technology; And transmission channel, transmit data each other for first wireless terminal and second wireless terminal.
Accessing method has following step: second wireless terminal transmits PKI and gives first wireless terminal; First wireless terminal is encrypted as ciphertext with the PKI of obtaining with set point, and sends ciphertext to second wireless terminal; Second wireless terminal receives ciphertext, and with private key ciphertext is decrypted to obtain original set point as the foundation of logining WLAN (wireless local area network).
Of the present invention have the accessing method of function of keeping secret and linking to wireless local network and second preferred embodiment of system thereof, and system comprises first wireless terminal, second wireless terminal and builds on transmission channel between first, second wireless terminal.
First wireless terminal has first PKI and is used for first PKI is protected first private key of contents decryption, and first wireless terminal has been obtained the set point that is used to login WLAN (wireless local area network); Second wireless terminal has second PKI and is used for second PKI is protected second private key of contents decryption; Transmission channel is transmitted data each other for first wireless terminal and second wireless terminal; The flow process that first wireless terminal, second wireless terminal are carried out respectively is:
First wireless terminal is carried out following step: obtain the set point that is used to login WLAN (wireless local area network); Give second wireless terminal with first PKI; First ciphertext that second PKI that reception itself is had second wireless terminal with first PKI by second wireless terminal is encrypted; Utilize first private key to first decrypt ciphertext reducing second PKI, and be second ciphertext with second public key encryption with set point; Transmitting second ciphertext utilizes second private key that second ciphertext is reduced to set point for second wireless terminal for second wireless terminal.
Second wireless terminal is carried out following step: obtain first PKI of first wireless terminal, and be first ciphertext with second public key encryption that first PKI has itself; Transmit first ciphertext and give first wireless terminal; Obtain by first wireless terminal second ciphertext of set point with second public key encryption, and utilize second private key to second decrypt ciphertext with the reduction set point as the foundation of logining WLAN (wireless local area network).
In view of existing WLAN (wireless local area network) is logined the not effective security certification mechanism of a cover of mode, the present invention uses the asymmetric public key technology secrecy for the set point of logining WLAN (wireless local area network), therefore set point can be copied to safely the wireless device of wanting newly-increased line and can not be stolen in transmission course.
Description of drawings
The present invention is described in detail below in conjunction with drawings and Examples:
Fig. 1 is a schematic diagram, and the wireless local area network (WLAN) system that the accessing method with function of keeping secret and linking to wireless local network of the present invention uses is described;
Fig. 2 is a flow chart, and first preferred embodiment of the present invention's accessing method of newly-increased Wiring device in WLAN (wireless local area network) is described;
Fig. 3 is a flow chart, and second preferred embodiment of the present invention's accessing method of newly-increased Wiring device in WLAN (wireless local area network) is described.
Embodiment
About aforementioned and other technologies content, characteristics and effect of the present invention, in two DETAILED DESCRIPTION OF THE PREFERRED, can clearly present below in conjunction with accompanying drawing.Before the present invention is described in detail, be noted that in the following description content, similar elements is represented with identical numbering.
Shown in Figure 1 is the wireless local area network (WLAN) system that the accessing method with function of keeping secret and linking to wireless local network of the present invention uses, and mainly contains first wireless terminal 11, second wireless terminal 12 and radio transmission apparatus 13.
In first preferred embodiment of the accessing method with function of keeping secret and linking to wireless local network of the present invention, radio transmission apparatus 13 is access point (Access Point), be used for linking to each other, and provide the wireless terminal with radio transmission apparatus 13 lines in the scope of WLAN (wireless local area network) 100, to transmit data each other wirelessly with wired network 14.
Wherein, first wireless terminal 11 is that the wireless network card 110, second wireless terminal 12 that have by it are that the wireless network card 120 that has by it carries out radio communication with radio transmission apparatus 13, and first wireless terminal 11 and second wireless terminal 12 can carry out point-to-point (Point-to-point, transfer function Ad-hoc) each other.
In addition, first wireless terminal 11 is Wiring devices of having logined WLAN (wireless local area network) 100, and has obtained the set point (not shown) that is used to login WLAN (wireless local area network) 100, and set point comprises local area network (LAN) identification code (SSID) and package Crypted password.Wherein, the local area network (LAN) identification code is used for WLAN (wireless local area network) 100 and other WLAN (wireless local area network) are distinguished to avoid interference each other, the package Crypted password can be the higher WPA key of wep encryption key or fail safe, and its effect is that each is connected each packet data content-encrypt that the device of WLAN (wireless local area network) 100 transmits each other.
Mandatory declaration be, because described local area network (LAN) identification code and package Crypted password all are generally to set up the required significant data of linking to wireless local network, if do not taken precautions against then and may be stolen, usurp by the third party of malice, therefore first preferred embodiment with accessing method of function of keeping secret and linking to wireless local network of the present invention be key at one group of asymmetric of the Wiring device of wanting to increase newly (second wireless terminal 12) employing to taking precautions against, actual practice is described as follows:
Second wireless terminal 12 is to want at the newly-increased Wiring device of WLAN (wireless local area network) 100; it is right that its storage inside meets the key of one group of PKI PK ' (Public key) of asymmetric public key system (Asymmetric Public-key System) and private key SK ' (Secret key); wherein PKI PK ' announces and gives known to the masses, and private key SK ' is used for the content of PKI PK ' protection is decrypted.
This preferred embodiment adopts RSA public key algorithm in the known asymmetric public key technology (because of the initial of the name of its founder Ronald L.Rivest, Adi Shamir and Leonard M.Adleman is gained the name), because this asymmetric public key technology has been a known technology, so do not introduce its principle in detail, only explained orally at its application at this.
As shown in Figure 1, 2, illustrate how the user allows second wireless terminal 12 and radio transmission apparatus 13 obtain the flow process and the step of line:
At first, first wireless terminal 11 is obtained the set point (step 201) that is used to login WLAN (wireless local area network) 100, the employed set point of this preferred embodiment is local area network (LAN) identification code and package Crypted password, its acquisition mode can be that existing wired, wireless transmission or the mode of transporting (transport) are written into, and radio transmission apparatus 13 can be obtained line and transmission data (step 202) with set point with first wireless terminal 11.
Mandatory declaration be, before beginning to set up the line of second wireless terminal 12 and radio transmission apparatus 13, first, second wireless terminal 11,12 must be by a kind of setting line means, for example: enable aforementioned first, second wireless terminal 11,12 point-to-point transmission function to each other, make and set up transmission channel each other.
After having set up transmission channel, the PKI PK ' of second wireless terminal, 12 transmission itself gives first wireless terminal 11 (step 203), after first wireless terminal 11 receives PKI PK ', with the PKI PK ' that obtains set point is encrypted as ciphertext E PK '(S) (step 204), and with ciphertext E PK '(S) send second wireless terminal 12 to.
Second wireless terminal 12 receives ciphertext E PK '(S) after, the private key SK ' that has with self is to ciphertext E PK '(S) be decrypted, take out original set point (step 205); At last, second wireless terminal 12 just can be with set point as the foundation (step 206) of logining WLAN (wireless local area network) 100, and the radio transmission apparatus 13 and second wireless terminal 12 are obtained line and begun to transmit data (step 207).
The present invention has first preferred embodiment of the accessing method of function of keeping secret and linking to wireless local network; be to adopt the key of one group of asymmetric to taking precautions against at the Wiring device of wanting to increase newly (second wireless terminal 12); consider the demand that in some environment, has the bidirectional identification checking; second preferred embodiment of the present invention then be make device on line (first wireless terminal 11) and the Wiring device (second wireless terminal 12) wanting to increase newly all to possess the key of one group of asymmetric right; allow the PKI that utilizes the other side each other come the data content of wanting to transmit is protected, make that its secret effect is better.
As shown in Figure 1, as aforesaid first preferred embodiment, second preferred embodiment has first wireless terminal 11, second wireless terminal 12 and radio transmission apparatus 13, and radio transmission apparatus 13 can make the wireless terminal with its line transmit data each other wirelessly in the scope of WLAN (wireless local area network) 100.
But the place that second preferred embodiment is different from first preferred embodiment is: it is right that second wireless terminal 12 that first wireless terminal 11 and wanting increases newly all possesses the key of one group of asymmetric, and it is respectively: first wireless terminal 11 has the first PKI PK 1And be used for the first PKI PK 1The first private key SK of protection contents decryption 1Second wireless terminal 12 has the second PKI PK 2And be used for the second PKI PK 2The second private key SK of protection contents decryption 2
It shown in Fig. 1,3 second preferred embodiment of the present invention's accessing method of newly-increased Wiring device in WLAN (wireless local area network) 100, how setting up etc. about content, the transmission channel of set point can be with reference to explanation before, and the actual practice of second preferred embodiment is described as follows:
At first, first wireless terminal 11 is obtained the set point (step 301) that is used to login WLAN (wireless local area network) 100; According to set point, first wireless terminal 11 can begin to transmit data (step 302) from obtaining line with radio transmission apparatus 13.(for example: the point-to-point transmission mode), first, second wireless terminal 11,12 each other can Data transmission and by setting up transmission channel.
So second wireless terminal 12 is obtained the first PKI PK of first wireless terminal 11 1, and with the first PKI PK 1The second PKI PK that itself is had 2Encrypt as the first ciphertext E PK1(S) (step 303).
Then, first wireless terminal 11 is obtained the first ciphertext E PK1And the first private key SK of utilization itself (S), 1To the first ciphertext E PK1(S) contents decryption is to reduce the second PKI PK 2(step 304); First wireless terminal 11 is also used the second PKI PK that obtains 2Set point is encrypted as the second ciphertext E PK2(S) (step 305).
Then, second wireless terminal 12 is obtained the second private key SK 2, to the second ciphertext E PK2(S) be decrypted taking-up set point (step 306); And second wireless terminal 12 is with the foundation (step 307) of set point as WLAN (wireless local area network), and last, the radio transmission apparatus 13 and second wireless terminal 12 are obtained line and begun to transmit data (step 308).
If with first wireless terminal 11, second wireless terminal 12 respectively independently, then the flow process carried out respectively of first wireless terminal 11, second wireless terminal 12 is:
First wireless terminal 11 is carried out following step: obtain the set point (step 301) that is used to login WLAN (wireless local area network) 100; With the first PKI PK 1Give second wireless terminal 12; Reception is by second wireless terminal, 12 usefulness, the first PKI PK 1The second PKI PK that second wireless terminal 12 itself is had 2The first ciphertext E that encrypts PK1(S) (step 304); Utilize the first private key SK 1To the first ciphertext E PK1(S) deciphering is to reduce the second PKI PK 2, and with set point with the second PKI PK 2Be encrypted as the second ciphertext E PK2(S) (step 305); Transmit the second ciphertext E PK2(S) give second wireless terminal 12 so that second wireless terminal 12 utilizes the second private key SK 2With the second ciphertext E PK2(S) be reduced to set point.
Second wireless terminal 12 is carried out following step: the first PKI PK that obtains first wireless terminal 11 1, and with the first PKI PK 1The second PKI PK that itself is had 2Encrypt as the first ciphertext E PK1(S) (step 303); Transmit the first ciphertext E PK1(S) give first wireless terminal 11; Obtain by first wireless terminal 11 set point with the second PKI PK 2The second ciphertext E that encrypts PK2And utilize the second private key SK2 (S), to the second ciphertext E PK2(S) deciphering is with reduction set point (step 306); According to set point and WLAN (wireless local area network) 100 lines and transmission data (step 307); And utilize set point and radio transmission apparatus 13 lines (step 308).
Additional disclosure be that in order to confirm that the line demand from second wireless terminal 12 is that legal manager starts really, first wireless terminal 11 also has the password PW that sets up on their own for the user 1, obtain the first PKI PK that first wireless terminal 11 has by transmission channel at second wireless terminal 12 1When (step 303), second wireless terminal 12 is also obtained password PW simultaneously 1, and second wireless terminal, 12 usefulness, the first PKI PK 1The second PKI PK that itself is had 2And password PW 1Encrypt as the first ciphertext E PK1(S).
On the other hand, first wireless terminal 11 utilizes the first private key SK 1To the first ciphertext E PK1When (S) deciphering (step 304), just restore the second PKI PK simultaneously 2And password PW 1, and to password PW 1Verify that whether examination is the password PW of first wireless terminal 11 self 1, if the password PW of self 1, then carry out follow-up action, if not the password PW of self 1, then do not carry out follow-up action.
Increase for the user and set up password PW on their own 1Benefit be: first wireless terminal 11 receives that the back is with self the first private key SK 1Deciphering is if receive correct password PW 1, just can confirm that the line demand from second wireless terminal 12 is what legal manager started really.
In sum, has the effective security certification mechanism of a cover between two wireless devices of wanting to interconnect in order to make, set point can be copied to safely want newly-increased line wireless device and can in transmission course, not be stolen, accessing method with function of keeping secret and linking to wireless local network of the present invention, mainly be in wanting the wireless device of line, to adopt at least one group of key that meets the asymmetric public key system set point of wanting line to be encrypted, make that the function of wireless transmission is safer coming.

Claims (11)

1, a kind of accessing method with function of keeping secret and linking to wireless local network, in conjunction with first wireless terminal and second wireless terminal, first wireless terminal has been logined WLAN (wireless local area network) and has been obtained set point, and second wireless terminal is to want to it is characterized in that at the newly-increased device of WLAN (wireless local area network):
Second wireless terminal has PKI and the private key that meets the asymmetric public key technology, and accessing method has following step:
(A) second wireless terminal transmits PKI and gives first wireless terminal;
(B) first wireless terminal is encrypted as ciphertext with the PKI of obtaining with set point, and sends ciphertext to second wireless terminal;
(C) second wireless terminal receives ciphertext, and with private key ciphertext is decrypted to obtain original set point as the foundation of logining WLAN (wireless local area network).
2, the accessing method with function of keeping secret and linking to wireless local network as claimed in claim 1 is characterized in that:
Described set point is local area network (LAN) identification code or package Crypted password.
3, a kind of wireless terminal is logined the accessing method of WLAN (wireless local area network), in conjunction with first wireless terminal and second wireless terminal, it is characterized in that:
First wireless terminal has first PKI and is used for first PKI is protected first private key of contents decryption; Second wireless terminal is a device of wanting to login WLAN (wireless local area network), and second wireless terminal has second PKI and be used for second private key to second PKI protection contents decryption, and first wireless terminal is carried out following step:
(A) obtain the set point that is used to login WLAN (wireless local area network);
(B) give second wireless terminal with first PKI;
(C) receive first ciphertext that second PKI itself that with first PKI second wireless terminal is had by second wireless terminal is encrypted;
(D) utilize first private key to first decrypt ciphertext reducing second PKI, and be second ciphertext with second public key encryption with set point;
(E) transmitting second ciphertext utilizes second private key that second ciphertext is reduced to set point for second wireless terminal for second wireless terminal.
4, a kind of wireless terminal is logined the accessing method of WLAN (wireless local area network), in conjunction with first wireless terminal and second wireless terminal, it is characterized in that:
First wireless terminal has been obtained the set point that is used to login WLAN (wireless local area network), and first wireless terminal has first PKI and is used for first private key to first PKI protection contents decryption; Second wireless terminal is a device of wanting to login WLAN (wireless local area network), and second wireless terminal has second PKI and be used for second private key to second PKI protection contents decryption, and second wireless terminal is carried out following step:
(A) obtain first PKI of first wireless terminal, and encrypt as first ciphertext with second PKI that first PKI has itself;
(B) transmit first ciphertext and give first wireless terminal;
(C) obtain by first wireless terminal second ciphertext of set point with second public key encryption, and utilize second private key to second decrypt ciphertext with the reduction set point;
(D) according to set point and linking to wireless local network.
5, a kind of accessing method with function of keeping secret and linking to wireless local network is characterized in that:
Accessing method comprises following step:
(A) provide first wireless terminal, and first wireless terminal has first PKI and is used for first private key to first PKI protection contents decryption;
(B) provide second wireless terminal, and second wireless terminal has second PKI and is used for second private key to second PKI protection contents decryption;
(C) first wireless terminal is obtained the set point that is used to login WLAN (wireless local area network);
(D) second wireless terminal is obtained first PKI that first wireless terminal has, and encrypts as first ciphertext with second PKI that first PKI has itself;
(E) first wireless terminal is obtained first ciphertext, and utilize first private key to first decrypt ciphertext to reduce second PKI, first wireless terminal is second ciphertext with set point with second public key encryption;
(F) second wireless terminal is obtained second ciphertext, and use second private key to second decrypt ciphertext with the reduction set point; And
(G) second wireless terminal is according to set point and linking to wireless local network.
6, a kind of wireless local area network (WLAN) system, described wireless local area network (WLAN) system comprises: first wireless terminal, login WLAN (wireless local area network) and obtained the set point of WLAN (wireless local area network); Second wireless terminal is to want at the newly-increased device of WLAN (wireless local area network), and it has PKI and the private key that meets the asymmetric public key technology; Transmission channel is transmitted data each other for first wireless terminal and second wireless terminal; It is characterized in that:
Second wireless terminal transmits PKI by transmission channel and gives first wireless terminal, first wireless terminal is encrypted as ciphertext with the PKI of obtaining with set point, and send ciphertext to second wireless terminal by transmission channel, after second wireless terminal receives ciphertext, with private key ciphertext is decrypted obtaining original set point, and second wireless terminal is according to set point and linking to wireless local network.
7, wireless local area network (WLAN) system as claimed in claim 6 is characterized in that:
Set point is local area network (LAN) identification code or package Crypted password.
8, a kind of wireless local area network (WLAN) system is characterized in that: described wireless local area network (WLAN) system comprises:
First wireless terminal has first PKI and is used for first private key to first PKI protection contents decryption, and first wireless terminal has been obtained the set point that is used to login WLAN (wireless local area network);
Second wireless terminal has second PKI and is used for second private key to second PKI protection contents decryption; And
Transmission channel is transmitted data each other for first wireless terminal and second wireless terminal;
Thereby second wireless terminal is obtained first PKI that first wireless terminal has by transmission channel, and encrypts as first ciphertext with second PKI that first PKI has itself; First wireless terminal is obtained first ciphertext by transmission channel, and utilize first private key to first decrypt ciphertext to reduce second PKI, first wireless terminal is second ciphertext with set point with second public key encryption; Second wireless terminal is obtained second ciphertext by transmission channel, and utilize second private key to second decrypt ciphertext with the reduction set point, and second wireless terminal is according to set point and linking to wireless local network.
9, wireless local area network (WLAN) system as claimed in claim 8 is characterized in that:
First wireless terminal also has the password that sets up on their own for the user, when second wireless terminal is obtained first PKI that first wireless terminal has by transmission channel, also obtains this password simultaneously.
10, wireless local area network (WLAN) system as claimed in claim 9 is characterized in that:
Second wireless terminal is encrypted as first ciphertext with second PKI and password that first PKI has itself.
11, wireless local area network (WLAN) system as claimed in claim 10 is characterized in that:
First wireless terminal utilize first private key to first decrypt ciphertext to reduce second PKI and password, and password verified, whether examination is the password of first wireless terminal self, if the password of self, then carry out follow-up action, if not the password of self, then do not carry out follow-up action.
CN 200510128964 2005-12-02 2005-12-02 Accessing method having secret-keeping function and linking to wireless local network and system Pending CN1980120A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510128964 CN1980120A (en) 2005-12-02 2005-12-02 Accessing method having secret-keeping function and linking to wireless local network and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510128964 CN1980120A (en) 2005-12-02 2005-12-02 Accessing method having secret-keeping function and linking to wireless local network and system

Publications (1)

Publication Number Publication Date
CN1980120A true CN1980120A (en) 2007-06-13

Family

ID=38131145

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510128964 Pending CN1980120A (en) 2005-12-02 2005-12-02 Accessing method having secret-keeping function and linking to wireless local network and system

Country Status (1)

Country Link
CN (1) CN1980120A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431408B (en) * 2007-11-09 2012-10-17 北京华旗资讯数码科技有限公司 Encryption apparatus capable of implementing connection between communication terminal and wireless local area network
CN102833253A (en) * 2012-08-29 2012-12-19 五八同城信息技术有限公司 Method and server for establishing safe connection between client and server
WO2015100676A1 (en) * 2013-12-31 2015-07-09 华为终端有限公司 Secure connection method for network device, and related device and system
CN108306793A (en) * 2016-10-09 2018-07-20 杭州萤石网络有限公司 Smart machine, intelligent domestic gateway, the method and system for establishing connection
TWI638577B (en) * 2017-02-17 2018-10-11 四零四科技股份有限公司 Wireless network environment configuration system and method thereof
CN113419441A (en) * 2021-08-24 2021-09-21 航天科工通信技术研究院有限责任公司 Intelligent home system for confidential places

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431408B (en) * 2007-11-09 2012-10-17 北京华旗资讯数码科技有限公司 Encryption apparatus capable of implementing connection between communication terminal and wireless local area network
CN102833253A (en) * 2012-08-29 2012-12-19 五八同城信息技术有限公司 Method and server for establishing safe connection between client and server
WO2015100676A1 (en) * 2013-12-31 2015-07-09 华为终端有限公司 Secure connection method for network device, and related device and system
CN105850168A (en) * 2013-12-31 2016-08-10 华为终端有限公司 Secure connection method for network device, and related device and system
US10305684B2 (en) * 2013-12-31 2019-05-28 Huawei Device Co., Ltd. Secure connection method for network device, related apparatus, and system
CN108306793A (en) * 2016-10-09 2018-07-20 杭州萤石网络有限公司 Smart machine, intelligent domestic gateway, the method and system for establishing connection
CN108306793B (en) * 2016-10-09 2021-01-22 杭州萤石网络有限公司 Intelligent device, intelligent home gateway, and method and system for establishing connection
TWI638577B (en) * 2017-02-17 2018-10-11 四零四科技股份有限公司 Wireless network environment configuration system and method thereof
CN113419441A (en) * 2021-08-24 2021-09-21 航天科工通信技术研究院有限责任公司 Intelligent home system for confidential places
CN113419441B (en) * 2021-08-24 2021-11-16 航天科工通信技术研究院有限责任公司 Intelligent home system for confidential places

Similar Documents

Publication Publication Date Title
US7689211B2 (en) Secure login method for establishing a wireless local area network connection, and wireless local area network system
US7912224B2 (en) Wireless network system and communication method for external device to temporarily access wireless network
US8331567B2 (en) Methods and apparatuses for generating dynamic pairwise master keys using an image
US8001584B2 (en) Method for secure device discovery and introduction
US9392453B2 (en) Authentication
Frankel et al. Establishing wireless robust security networks: a guide to IEEE 802.11 i
JP4735809B2 (en) User-specific information distribution method, apparatus and system
CN101164315A (en) System and method for utilizing a wireless communication protocol in a communications network
CN103621127A (en) Wireless authentication using beacon messages
CN103001940A (en) Techniques for setting up secure local password by means of WTRU (Wireless Transmit Receive Unit)
JP2006109449A (en) Access point that wirelessly provides encryption key to authenticated wireless station
CN104244237A (en) Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set
WO2015121988A1 (en) Communication apparatus, communication method and program
CN1980120A (en) Accessing method having secret-keeping function and linking to wireless local network and system
EP2063601A2 (en) Methods to enhance WLAN security
KR100679016B1 (en) Device, system and method for setting of security information in wireless network
US10574441B2 (en) Management of cryptographic keys
US20070113082A1 (en) Login method for a wireless network with security settings, and wireless network system with security settings
US20160065537A1 (en) Method and apparatus enabling interoperability between devices operating at different security levels and trust chains
US20080045180A1 (en) Data transmitting method and apparatus applying wireless protected access to a wireless distribution system
CN101159540A (en) Method and process device of transmitting-receiving data flow
JP2005223838A (en) Communications system and relay device
US20230297708A1 (en) System and method for managing data-file transmission and access right to data files
JP2023102900A (en) Wireless communication system and terminal authentication method
CN1322727C (en) Method for filtering packets in wireless network system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20070613