CN101616412A - The method of calibration of management frames in wireless local area and equipment - Google Patents
The method of calibration of management frames in wireless local area and equipment Download PDFInfo
- Publication number
- CN101616412A CN101616412A CN200910162177A CN200910162177A CN101616412A CN 101616412 A CN101616412 A CN 101616412A CN 200910162177 A CN200910162177 A CN 200910162177A CN 200910162177 A CN200910162177 A CN 200910162177A CN 101616412 A CN101616412 A CN 101616412A
- Authority
- CN
- China
- Prior art keywords
- management frames
- mic
- information
- described management
- frames
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of method of calibration and equipment of management frames in wireless local area.This method comprises: when receiving management frames, judge whether carry information integrity verification MIC information in the described management frames; When carrying MIC information, utilize pre-configured key that the part of removing described MIC information in the described management frames is carried out the information integrity verification, obtain the MIC check value; When the MIC information of carrying in described MIC check value and the described management frames is identical, judges that described management frames is legal, otherwise judge that described management frames is illegal.Among the present invention,, make the recipient of management frames to judge, avoided spoofing attack based on management frames to the legitimacy of the management frames that receives by in management frames, adding MIC information.
Description
Technical field
The present invention relates to communication field, relate in particular to a kind of method of calibration and equipment of management frames in wireless local area.
Background technology
Existing WLAN (Wireless Local Area Network, WLAN (wireless local area network)) in, user (Client) is inserting (Access Point, access point) during AP, as shown in Figure 1, at first need to carry out active scanning, connecting by ability after authenticating two processes of (Authentication) and related (Association) and AP.
Wherein, verification process is in order to prevent that the disabled user from inserting, need between user and AP, set up authentication, when the user passes through to specify SSID (Service Set Identifier, service set) select wireless network and send authentication request (Authentication Request) to AP, authentication mechanism comprises two kinds of open system authentication and shared key authentications.Have only by just entering association phase after the authentication.In the association phase, the user sends association request frame (Association Request) to AP.AP adds user profile to database, replys associated response (Association Response) to the user.The user is at every turn only being associated with on the AP, and association is always initiated by the user.
Above-mentioned authentication request frames, authentication response frames, association request frame and association response frame all belong to the management frames among the WLAN, except above-mentioned several types, management frames also comprises removes authentication frame (Deauthentication) and disassociation (Disassociation) frame etc.
Wherein, remove authentication frame and be used to the authentication relationship of interrupting having set up.As shown in Figure 2, AP removes the user by sending the releasing authentication frame from wireless system, and the user also can initiatively send and remove authentication (Deauthentication) frame, and removing authentication frame can be broadcast frame or unicast frame.The incidence relation and the disassociation frame is used for terminating, the disassociation frame can be broadcast frame or unicast frame.Remove authentication frame and remove disassociation frame, all only comprise a fixed field Reason Code (reason code), show as Fig. 3 except outside MAC (Medium Access Control, the medium access control) head.Wherein, Frame Control position differs from one another, and is used to the different subtype of representing that dissimilar management frames has.When remove connecting and removing authentication frame and be unicast frame, equal certain user's MAC Address as destination address DA (Destination Address); During for broadcast frame: destination address (DA) equals full F.
Problems of the prior art are: exist a kind of deception (Spoofing) to attack among the existing WLAN, the potential attacker of this attack will send management frames as attack message with the name of other equipment.For example: can cause user offline by the releasing authentication frame that sends deception.With scene shown in Figure 3 is example, and the assailant removes authentication frame to the user or with user's identity to the AP transmission with the identity of AP, all can cause the connection between user and the AP to be interrupted.
Summary of the invention
The invention provides a kind of method of calibration and equipment of management frames in wireless local area, be used for improving the management frames verification scheme of WLAN (wireless local area network), prevent spoofing attack based on management frames.
The invention provides a kind of method of calibration of management frames in wireless local area, comprising:
When receiving management frames, judge whether carry information integrity verification MIC information in the described management frames;
When carrying MIC information, utilize pre-configured key that the part of removing described MIC information in the described management frames is carried out the information integrity verification, obtain the MIC check value;
When the MIC information of carrying in described MIC check value and the described management frames is identical, judges that described management frames is legal, otherwise judge that described management frames is illegal.
Wherein, also comprise: when not carrying MIC information in the described management frames, judge that described management frames is illegal.
Wherein, described MIC information is arranged in the MIC field of described management frames.
Wherein, also comprise:
When needing to send management frames, utilize pre-configured key that described management frames to be sent is carried out the information integrity verification, check results is added in the described management frames as MIC information;
Send described generation interpolation MIC management of information frame.。
Wherein, when described management frames was unicast management frames, described pre-configured key was group temporary key GTK; When described management frames was the multicast management frame, described pre-configured key was pair temporal key PTK.
The present invention also provides the equipment in a kind of WLAN (wireless local area network), comprising:
The management frames receiving element is used to receive management frames;
MIC information judging unit is used for judging whether described management frames carries information integrity verification MIC information;
The MIC verification unit is used for when the described management frames of described MIC information judgment unit judges is carried MIC information, utilizes pre-configured key that the part of removing described MIC information in the described management frames is carried out the information integrity verification, obtains the MIC check value;
The legitimacy judging unit is used for MIC information that the MIC check value that obtains when described MIC verification unit and described management frames carry when identical, judges that described management frames is legal, otherwise judges that described management frames is illegal.
Wherein, described MIC information judging unit also is used for judging that described management frames is illegal when judging that described management frames is not carried MIC information.
Wherein, described MIC information is arranged in the MIC field of described management frames.
Wherein, also comprise:
The management frames generation unit when being used for needs transmission management frames, utilizes pre-configured key that described management frames to be sent is carried out the information integrity verification, and check results is added in the described management frames as MIC information;
The management frames transmitting element, the MIC management of information frame that has been used to send interpolation that described management frames generation unit generates.
Wherein, also comprise:
Key storing unit is used for storage sets temporary key GTK and pair temporal key PTK, when described management frames is unicast management frames, described GTK is offered described MIC verification unit and management frames generation unit; When described management frames is the multicast management frame, described PTK is offered described MIC verification unit and management frames generation unit.
Compared with prior art, the present invention has the following advantages:
Among the present invention,, make the recipient of management frames to judge, avoided spoofing attack based on management frames to the legitimacy of the management frames that receives by in management frames, adding MIC information.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart that user terminal connects by authentication and related two processes and AP in the prior art;
Fig. 2 is a transmission schematic diagram of removing authentication frame in the prior art;
Fig. 3 is a disassociation frame and the structural representation of removing authentication frame in the prior art;
Fig. 4 is based on the attack schematic diagram of removing authentication frame in the prior art;
Fig. 5 is the method for calibration flow chart of the management frames in wireless local area that provides among the present invention;
Fig. 6 is the schematic diagram of the pair temporal key system used among the present invention;
Fig. 7 is the schematic diagram of the group temporary key system used among the present invention;
Fig. 8 is a disassociation frame and the structural representation of removing authentication frame among the present invention;
Fig. 9 is the method for calibration flow chart of management frames in the application scenarios of the present invention;
Figure 10 is the structural representation of the equipment in the WLAN (wireless local area network) that provides among the present invention;
Figure 11 is another structural representation of the equipment in the WLAN (wireless local area network) that provides among the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
A kind of method of calibration of management frames in wireless local area is provided among the present invention, as shown in Figure 5, has comprised:
Step s501, when receiving management frames, judge whether carry information integrity verification MIC information in the management frames.
Step s502, when carrying MIC information, utilize pre-configured key that the part of removing MIC information in the management frames is carried out the information integrity verification, obtain the MIC check value.
When the MIC information of carrying in step s503, MIC check value and the management frames is identical, judges that management frames is legal, otherwise judge that management frames is illegal.
Among the present invention, transmit leg is when sending management frames, carry out the information integrity verification by pre-configured key to sent management frames, add MIC (Message Integrity Check, the information integrity verification) information that verification obtains to management frames discipline recipient transmission.The recipient is when receiving the management frames of transmit leg transmission, part except that MIC information in the management frames is carried out the information integrity verification according to pre-configured key, the MIC information of carrying before in MIC information that verification is obtained and the management frames compares, when comparative result is consistent, judge that this management frames is legal and handle, otherwise judge that this management frames is illegal, abandon this management frames.
Among the present invention, transmit leg disposes identical key with the recipient.Below the key that disposes among transmit leg and the recipient is introduced.
Usually; the user by the authentication with related two processes after also to carry out the authentication of user class; RSN (Robust Security Network, RSN)/WPA (WiFi Protected Access, WiFi protects visit)+1X, RSN/WPA+PSK etc. for example.After the finishing of the authentication of user class, AP and user can have pair temporal key PTK and group temporary key GTK (Group TransientKey) separately.
Wherein, system as shown in Figure 6 for pair temporal key PTK (Pairwise Transient Key), pair temporal key PTK launches to obtain by the pairwise master key PMK (PairwiseMaster Key) of pseudo-random function with 256, in RSN/WPA+PSK, pairwise master key is pre-configured.Under the situation of using RSN/WPA+1X, master key is calculated and is got by RADIUS (RemoteAuthentication Dial In User Service, far-end is with dialling in the service for checking credentials) server, and the PTK of different user is differing from each other.No matter be the PTK that adopts TKIP or any cipher mode of CCMP, 128 temporary key TK (Temporal Key) can be arranged all wherein.Among the present invention, TK is used for encrypting the unicast data frames between AP and the user.
Wherein, system as shown in Figure 7 for group temporary key GTK (Group Transient Key), group temporary key GTK launches to obtain by the group master key GMK (Group Master Key) of pseudo-random function with 128, and all users that insert same BSS have identical GTK.No matter be the GTK that adopts TKIP or any cipher mode of CCMP, 128 temporary key GTK can be arranged all wherein.Among the present invention, GTK is used for encrypting the broadcast data frame between AP and the user.
The equipment that has correct PTK and GTK is considered to legal and safe, if the sender utilizes PTK and GTK respectively the management frames (as disassociation frame or releasing authentication frame) of clean culture and broadcasting to be carried out the MIC verification, and the MIC information after the verification is filled up in the management frames, the recipient just can use PTK of oneself and GTK to judge that this management frames is from legitimate device or spoofing attack person after receiving management frames so.For this reason, the MIC field that need to increase a length in management frames among the present invention be 16 bytes.The end that is added on management frames with the MIC field is an example, its structural representation as shown in Figure 8,
Below in conjunction with a concrete application scenarios, describe management frames among the present invention the embodiment of method of calibration.Wherein be that disassociation frame or releasing authentication frame are that example describes with the management frames.As shown in Figure 9, may further comprise the steps:
Step s901, sender carry out the information integrity verification according to pre-configured key to sent disassociation frame or releasing authentication frame, check results are added to the MIC field of disassociation frame or releasing authentication frame.
Concrete, the sender is if send the disassociation frame of a clean culture or remove authentication frame, then after having filled in the disassociation frame or having removed field necessary in the authentication frame, earlier the MIC field is filled out and be complete 0, use the TK among the PTK that entire frame is carried out the information integrity verification then, and check value is inserted the MIC field.
The sender is if send the disassociation frame of a broadcasting or remove authentication frame, after having filled in the disassociation frame or having removed field necessary in the authentication frame, earlier the MIC field is filled out and be complete 0, use the GTK among the GTK that entire frame is carried out the information integrity verification then, and check value is inserted the MIC field.
Step s902, sender send the disassociation frame that carries the MIC field or remove authentication frame.
Step s903, recipient carry out verification and processing according to pre-configured key to the disassociation frame or the releasing authentication frame that receive.
Concrete, the recipient at first reads the MIC field and saves as MIC at the disassociation frame that receives a clean culture or after removing authentication frame
Frame, then the MIC field is filled out to complete 0, and use the TK among the own PTK that entire frame is carried out the information integrity verification, obtain check value MIC
LocalIf MIC
LocalWith MIC
FrameEquate, then handle this frame, otherwise abandon.
The recipient at first reads the MIC field and saves as MIC at the disassociation frame that receives a broadcasting or after removing authentication frame
Frame, then the MIC field is filled out to complete 0, and use the Grouptemporalkey among the own GTK that entire frame is carried out the information integrity verification, obtain check value MIC
LocalIf MIC
LocalWith MIC
FrameEquate, then handle this frame, otherwise abandon.
Need illustrate, describe the method that the sender handles the management frames of carrying the MIC field in the above-mentioned flow process.For the management frames of not carrying the MIC field that receives, the recipient can handle accordingly according to predetermined strategy, for example when not carrying MIC information in the management frames that receives, judges that directly this management frames is illegal, and abandons.
The method that the application of the invention provides is added MIC information in management frames, make the recipient of management frames to judge the legitimacy of the management frames that receives, has avoided the spoofing attack based on management frames.
The present invention also provides the equipment in a kind of WLAN (wireless local area network), as shown in figure 10, comprising:
Management frames receiving element 10 is used to receive management frames;
MIC information judging unit 20 is used for judging whether management frames carries information integrity verification MIC information; Also be used for when judging that management frames is not carried MIC information, judge that management frames is illegal.Wherein, MIC information is arranged in the MIC field of management frames.
As shown in figure 11, in the equipment in the WLAN (wireless local area network) that provides among the present invention, can also comprise:
Management frames generation unit 50 when being used for needs transmission management frames, utilizes pre-configured key to carry out the information integrity verification to sent management frames, and check results is added in the management frames as MIC information;
Management frames transmitting element 60, the MIC management of information frame that has been used to send interpolation that the management frames generation unit generates.
The equipment that the application of the invention provides adds MIC information in management frames, make the recipient of management frames to judge the legitimacy of the management frames that receives, has avoided the spoofing attack based on management frames.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by hardware, also can realize by the mode that software adds necessary general hardware platform.Based on such understanding, technical scheme of the present invention can embody with the form of software product, it (can be CD-ROM that this software product can be stored in a non-volatile memory medium, USB flash disk, portable hard drive etc.) in, comprise some instructions with so that computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out the described method of each embodiment of the present invention.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, unit in the accompanying drawing or flow process might not be that enforcement the present invention is necessary.
It will be appreciated by those skilled in the art that the unit in the device among the embodiment can be distributed in the device of embodiment according to the embodiment description, also can carry out respective change and be arranged in the one or more devices that are different from present embodiment.A unit can be merged in the unit of the foregoing description, also can further split into a plurality of subelements.
The invention described above embodiment sequence number is not represented the quality of embodiment just to description.
Claims (10)
1, a kind of method of calibration of management frames in wireless local area is characterized in that, comprising:
When receiving management frames, judge whether carry information integrity verification MIC information in the described management frames;
When carrying MIC information, utilize pre-configured key that the part of removing described MIC information in the described management frames is carried out the information integrity verification, obtain the MIC check value;
When the MIC information of carrying in described MIC check value and the described management frames is identical, judges that described management frames is legal, otherwise judge that described management frames is illegal.
2, method of calibration as claimed in claim 1 is characterized in that, also comprises: when not carrying MIC information in the described management frames, judge that described management frames is illegal.
3, method of calibration as claimed in claim 1 or 2 is characterized in that, described MIC information is arranged in the MIC field of described management frames.
4, the method for claim 1 is characterized in that, also comprises:
When needing to send management frames, utilize pre-configured key that described management frames to be sent is carried out the information integrity verification, check results is added in the described management frames as MIC information;
Send described generation interpolation MIC management of information frame.
As claim 1 or 4 described methods of calibration, it is characterized in that 5, when described management frames was unicast management frames, described pre-configured key was group temporary key GTK; When described management frames was the multicast management frame, described pre-configured key was pair temporal key PTK.
6, the equipment in a kind of WLAN (wireless local area network) is characterized in that, comprising:
The management frames receiving element is used to receive management frames;
MIC information judging unit is used for judging whether described management frames carries information integrity verification MIC information;
The MIC verification unit is used for when the described management frames of described MIC information judgment unit judges is carried MIC information, utilizes pre-configured key that the part of removing described MIC information in the described management frames is carried out the information integrity verification, obtains the MIC check value;
The legitimacy judging unit is used for MIC information that the MIC check value that obtains when described MIC verification unit and described management frames carry when identical, judges that described management frames is legal, otherwise judges that described management frames is illegal.
7, equipment as claimed in claim 6 is characterized in that, described MIC information judging unit also is used for judging that described management frames is illegal when judging that described management frames is not carried MIC information.
As claim 6 or 7 described equipment, it is characterized in that 8, described MIC information is arranged in the MIC field of described management frames.
9, equipment as claimed in claim 6 is characterized in that, also comprises:
The management frames generation unit when being used for needs transmission management frames, utilizes pre-configured key that described management frames to be sent is carried out the information integrity verification, and check results is added in the described management frames as MIC information;
The management frames transmitting element, the MIC management of information frame that has been used to send interpolation that described management frames generation unit generates.
10, as claim 6 or 9 described equipment, it is characterized in that, also comprise:
Key storing unit is used for storage sets temporary key GTK and pair temporal key PTK, when described management frames is unicast management frames, described GTK is offered described MIC verification unit and management frames generation unit; When described management frames is the multicast management frame, described PTK is offered described MIC verification unit and management frames generation unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910162177A CN101616412A (en) | 2009-08-07 | 2009-08-07 | The method of calibration of management frames in wireless local area and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910162177A CN101616412A (en) | 2009-08-07 | 2009-08-07 | The method of calibration of management frames in wireless local area and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101616412A true CN101616412A (en) | 2009-12-30 |
Family
ID=41495742
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910162177A Pending CN101616412A (en) | 2009-08-07 | 2009-08-07 | The method of calibration of management frames in wireless local area and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101616412A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101860570A (en) * | 2010-06-10 | 2010-10-13 | 中兴通讯股份有限公司 | Method for backuping and restoring user data of mobile terminal |
CN102013976A (en) * | 2010-12-20 | 2011-04-13 | 西安西电捷通无线网络通信股份有限公司 | Key management method and system |
CN104350703A (en) * | 2012-06-04 | 2015-02-11 | 西门子公司 | Secure transmission of message |
CN104486717A (en) * | 2014-12-10 | 2015-04-01 | 宇龙计算机通信科技(深圳)有限公司 | Mobility management entity, mobile terminal, controlled parameter transmission system and controlled parameter transmission method |
CN105229966A (en) * | 2013-05-24 | 2016-01-06 | 高通股份有限公司 | For having the system and method for the broadcast WLAN message of message authentication |
CN105471879A (en) * | 2015-12-04 | 2016-04-06 | 三明学院 | Novel method for preventing DoS attack of wireless disassociation frame based on rough set |
CN105792291A (en) * | 2014-12-23 | 2016-07-20 | 华为技术有限公司 | Channel switching method and wireless access device |
CN105828330A (en) * | 2015-01-07 | 2016-08-03 | 阿里巴巴集团控股有限公司 | Access method and access device |
CN106231598A (en) * | 2016-07-28 | 2016-12-14 | 北京坤腾畅联科技有限公司 | Wireless network attack immunization method based on frame detection and terminal unit |
CN107425961A (en) * | 2011-09-12 | 2017-12-01 | 高通股份有限公司 | The system and method for performing link establishment and certification |
WO2022242761A1 (en) * | 2021-05-20 | 2022-11-24 | 华为技术有限公司 | Data transmission method, communication apparatus, computer-readable storage medium, and chip |
-
2009
- 2009-08-07 CN CN200910162177A patent/CN101616412A/en active Pending
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101860570B (en) * | 2010-06-10 | 2014-12-10 | 中兴通讯股份有限公司 | Method and system for backuping and restoring user data of mobile terminal |
CN101860570A (en) * | 2010-06-10 | 2010-10-13 | 中兴通讯股份有限公司 | Method for backuping and restoring user data of mobile terminal |
CN102013976A (en) * | 2010-12-20 | 2011-04-13 | 西安西电捷通无线网络通信股份有限公司 | Key management method and system |
CN102013976B (en) * | 2010-12-20 | 2013-07-31 | 西安西电捷通无线网络通信股份有限公司 | Key management method and system |
CN107425961A (en) * | 2011-09-12 | 2017-12-01 | 高通股份有限公司 | The system and method for performing link establishment and certification |
CN107425961B (en) * | 2011-09-12 | 2021-01-22 | 高通股份有限公司 | System and method for performing link establishment and authentication |
CN104350703B (en) * | 2012-06-04 | 2018-01-09 | 西门子公司 | The safe transmission of message |
CN104350703A (en) * | 2012-06-04 | 2015-02-11 | 西门子公司 | Secure transmission of message |
CN105229966A (en) * | 2013-05-24 | 2016-01-06 | 高通股份有限公司 | For having the system and method for the broadcast WLAN message of message authentication |
CN104486717A (en) * | 2014-12-10 | 2015-04-01 | 宇龙计算机通信科技(深圳)有限公司 | Mobility management entity, mobile terminal, controlled parameter transmission system and controlled parameter transmission method |
CN104486717B (en) * | 2014-12-10 | 2019-01-25 | 宇龙计算机通信科技(深圳)有限公司 | Mobile management device, mobile terminal, controlled parameter Transmission system and method |
CN105792291A (en) * | 2014-12-23 | 2016-07-20 | 华为技术有限公司 | Channel switching method and wireless access device |
CN105792291B (en) * | 2014-12-23 | 2019-05-28 | 华为技术有限公司 | A kind of method and radio reception device of channel switching |
CN105828330A (en) * | 2015-01-07 | 2016-08-03 | 阿里巴巴集团控股有限公司 | Access method and access device |
CN105828330B (en) * | 2015-01-07 | 2019-12-27 | 阿里巴巴集团控股有限公司 | Access method and device |
CN105471879A (en) * | 2015-12-04 | 2016-04-06 | 三明学院 | Novel method for preventing DoS attack of wireless disassociation frame based on rough set |
CN105471879B (en) * | 2015-12-04 | 2018-11-27 | 三明学院 | Novel based on rough set prevents wireless disassociation frame DoS attack method |
CN106231598A (en) * | 2016-07-28 | 2016-12-14 | 北京坤腾畅联科技有限公司 | Wireless network attack immunization method based on frame detection and terminal unit |
WO2022242761A1 (en) * | 2021-05-20 | 2022-11-24 | 华为技术有限公司 | Data transmission method, communication apparatus, computer-readable storage medium, and chip |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101616412A (en) | The method of calibration of management frames in wireless local area and equipment | |
CN106664561B (en) | System and method for securing pre-association service discovery | |
US9843579B2 (en) | Dynamically generated SSID | |
JP5597676B2 (en) | Key material exchange | |
JP3863852B2 (en) | Method of controlling access to network in wireless environment and recording medium recording the same | |
CN101926151B (en) | Method and communication network system for establishing security conjunction | |
EP3364595A1 (en) | Key configuration method and key management center, and network element | |
US10588015B2 (en) | Terminal authenticating method, apparatus, and system | |
CN103609154B (en) | A kind of WLAN access authentication method, equipment and system | |
CN101371491A (en) | Method and arrangement for the creation of a wireless mesh network | |
CN102082665B (en) | Identity authentication method, system and equipment in EAP (Extensible Authentication Protocol) authentication | |
CN102118387A (en) | System and method for secure transaction of data between wireless communication device and server | |
CN103096301A (en) | Method for verifying wireless local area network access point and station for the same | |
EP3146740B1 (en) | Cellular network authentication | |
CN1941695B (en) | Method and system for generating and distributing key during initial access network process | |
US20230076147A1 (en) | Method and apparatus for authenticating terminal, computer device and storage medium | |
CN103313242A (en) | Secret key verification method and device | |
Li et al. | Efficient authentication for fast handover in wireless mesh networks | |
WO2011124051A1 (en) | Method and system for terminal authentication | |
CN105141629A (en) | Method for improving network security of public Wi-Fi based on WPA/WPA2 PSK multiple passwords | |
US20080126455A1 (en) | Methods of protecting management frames exchanged between two wireless equipments, and of receiving and transmitting such frames, computer programs, and data media containing said computer programs | |
EP2770767B1 (en) | Method, system, and related device for gsm security | |
CN101282215A (en) | Method and apparatus for distinguishing certificate | |
CN100499453C (en) | Method of the authentication at client end | |
CN110831000B (en) | Secure access method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20091230 |