CN104902473A - Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication - Google Patents

Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication Download PDF

Info

Publication number
CN104902473A
CN104902473A CN201410159313.1A CN201410159313A CN104902473A CN 104902473 A CN104902473 A CN 104902473A CN 201410159313 A CN201410159313 A CN 201410159313A CN 104902473 A CN104902473 A CN 104902473A
Authority
CN
China
Prior art keywords
cpk
wireless
user equipment
authentication
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410159313.1A
Other languages
Chinese (zh)
Inventor
孟俊
陈谦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Teng Yi Marketing Data Services Ltd
Original Assignee
孟俊
陈谦
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 孟俊, 陈谦 filed Critical 孟俊
Priority to CN201410159313.1A priority Critical patent/CN104902473A/en
Publication of CN104902473A publication Critical patent/CN104902473A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention provides a wireless network access authenticating method and device based on CPK (Combined Public Key Cryptosystem) identity authentication, and relates to the fields of wireless communication and CPK identity authentication. A whole system consists of a wireless controller end and a wireless user equipment end. The method comprises the following steps: integrating a CPK Key by the wireless user equipment end, wherein access authentication request information transmitted to the wireless controller end every time comprises CPK signature data; after the wireless controller end receives the access authentication request information transmitted by the wireless user equipment, judging whether or not the request information comprises the CPK signature data, and forbidding the wireless user equipment to access a network if the request information does not comprise the CPK signature data; and if the request information comprises the CPK signature data, judging whether or not a feature code in the CPK signature data is an authorized feature code of the wireless controller end, forbidding the wireless user equipment to access the network if the feature code is not the authorized feature code, and permitting access if the feature code is the authorized feature code. The embodiment of the invention is applied to safe and credible wireless network access authentication supporting management of access users.

Description

A kind of method of the wireless network access authentication based on CPK identification authentication and device
Technical field
The embodiment of the present invention relates to wireless communication technology access authentication field, particularly relates to a kind of method and device of the wireless network access authentication based on CPK identification authentication.
Background technology
Along with the development of radio communication, Wireless Fidelity (wireless fidelity is called for short WiFi) technology is more and more general, and WiFi access point access key safety also becomes the research topic of technical staff.There is obvious safety problem in current WiFi wireless system, WEP (Wired Equivalent Privacy) and WPA (WiFi Protected Access) system very weak to the Cipher Strength of key; And in WPA2 (the another kind of standard of WPA) and WAPI (a kind of agreement of Chinese wireless LAN safety mandatory standard) system, PSK (Pre-shared Key is used for vast individual and SME users, wildcard), also there is the problem that access process leak is cracked with access key.
Simultaneously, when existing employing WEP, WPA PSK and WPA2 PSK mode carries out wireless network access authentication, all users adopt the same password, enjoy the same access rights, the identity of each user cannot be distinguished, and once password is revealed, bring infringement also can to the interests of network provider or validated user, these unfavorable prisoner's elements all constrain the application of WiFi network in a lot of non-public occasion.
Summary of the invention
The embodiment of the present invention provides a kind of method and device of the wireless network access authentication based on CPK identification authentication, in order to solve problems of the prior art.
Embodiments provide a kind of method of wireless network access authentication, comprising:
Wireless user equipment end is integrated with CPK Key, and it sends in the access authentication solicited message of wireless controller end by being integrated into the CPK signed data of wireless user equipment unique characteristics code;
The access authentication request of wireless controller end to the wireless user equipment end received verifies, and first judges whether this access authentication solicited message comprises CPK signed data, if do not comprised, refuses access; If comprised, then judge whether the condition code in this CPK signed data is the authorized condition code of wireless controller end, if not authorized condition code, then refuses this wireless user equipment access network, if it is allow access;
Wireless controller end provides the change interface of convenient, flexible " authorisation features code table ", comprise by PC supersystem webmastering software increase authorize condition code or delete the condition code of having authorized.
The embodiment of the present invention additionally provides a kind of wireless user equipment end, comprising:
CPK Key integrated unit, completes the data interchange with CPK Key, realizes using the private key of CPK Key to the data signature of wireless user equipment condition code;
CPK identification authentication access request unit, enters into the Data Integration after completing by CPK private key signature the network access authentication flow process sending to wireless controller end.
The embodiment of the present invention additionally provides a kind of wireless controller end, comprising:
CPK identifies receiving element, receives the network access authentication solicited message that each wireless user equipment end sends, and judges whether comprise CPK signed data in access authentication solicited message;
CPK identity verification unit, verifies the legal CPK Key whether the CPK signed data received authorizes from keeper;
CPK identity management unit, being supplied to supersystem keeper increases or deletes the interface of authorizing CPK mark.
The method of the wireless network access authentication that the embodiment of the present invention provides and device, wireless controller end is made only to accept to have the access request of the wireless user equipment end that legal CPK authorizes, so, user just can unique foundation using CPK Key as access network, avoid the potential safety hazard that all users use unified password access network to bring, and for providing the foundation with the identify label of the CPK mark person that is used as internet behavior in the future.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The workflow schematic diagram of the wireless user equipment end of the wireless network access authentication based on CPK identification authentication that Fig. 1 provides for the embodiment of the present invention;
Fig. 2 be standard WiFi under WPA-PSK authenticated encryption pattern, the identifying procedure schematic diagram of wireless user equipment end and wireless controller end;
One of workflow schematic diagram of the wireless controller end of the wireless network access authentication based on CPK identification authentication that Fig. 3 provides for the embodiment of the present invention;
The workflow schematic diagram two of the wireless controller end of the wireless network access authentication based on CPK identification authentication that Fig. 4 provides for the embodiment of the present invention;
The workflow schematic diagram three of the wireless controller end of the wireless network access authentication based on CPK identification authentication that Fig. 5 provides for the embodiment of the present invention;
Fig. 6 be WiFi after adding CPK identification authentication under WPA-PSK authenticated encryption pattern, the identifying procedure schematic diagram of wireless user equipment end and wireless controller end;
The structural representation of the wireless user equipment end that Fig. 7 provides for one embodiment of the invention;
The structural representation of the wireless controller end that Fig. 8 provides for one embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The wireless user equipment end method flow diagram of the wireless network access authentication based on CPK identification authentication that Fig. 1 provides for one embodiment of the invention, as shown in Figure 1, the method comprises:
At wireless user equipment end integrated CPK Key equipment, this CPK Key equipment built-in encryption intelligent chip, has certain memory space, can store the private key of user, and owing to encrypting the special process of intelligent chip, any method all cannot read out the private key for user information of chip internal.
This CPK Key can realize data interchange with the several frequently seen hardware interfaces such as USB interface, SD card interface or SIM card interface and existing wireless user equipment.
CPK key management algorithm utilizes elliptic curve cipher theoretical, constructs public affairs, private key matrix, generates a large amount of public, private key pair with a small amount of factor; With mapping algorithm, public affairs, private key variable and user ID are bound, solve the key management difficult problem based on mark.
CPK key cryptosystem has following feature:
Feature one, key management adopt centralized production distribution, dispersion use keeping pattern, achieve dispersion application with central controlled organic unity, have can control, manageable advantage, being convenient to build top-down trust systems, laying a good foundation for implementing macro-management;
Feature two, use public key encryption data, carry out data decryption with private key;
Feature three, use encrypted private key data (digital signature), carry out certifying digital signature with PKI.
After the integrated CPK Key of wireless user equipment end, carry out digital signature with its private key to the condition code of wireless user equipment, these condition codes include but not limited to the identification number of physical MAC address, organization unique identifier (OUI), CPK Key or the equipment Serial Number SN that dispatches from the factory; Then the data after signature are sent to wireless controller end with its access authentication solicited message.
Fig. 2 is the WPA-PSK identifying procedure of current standard WiFi, and it is divided into three steps at wireless user equipment end, is the request of inquiring after, link verification request, association request respectively; As long as this three steps success, the subscriber equipment of standard WiFi just can connect wireless controller, realizes function of surfing the Net.
The wireless controller end method flow diagram of the wireless network access authentication based on CPK identification authentication that Fig. 3 provides for one embodiment of the invention, as shown in Figure 3, the method comprises:
Step 301, the access authentication request of wireless controller end to the wireless user equipment end received verifies, and judges whether comprise CPK signed data in this authentication request information, if do not comprised, then refuses its access network; If comprised, then deciphering obtains wireless user equipment condition code.
Concrete, step 301 as shown in Figure 4, according to the feature of CPK system " private key signature; public key verifications ", wireless controller end utilizes CPK public key algorithm to be decrypted checking to the CPK signed data in access authentication request, if can go out wireless user equipment condition code by successful decryption, illustrate that this access authentication solicited message comprises CPK signed data, if can not decipher, then illustrate that this access authentication solicited message does not comprise CPK signed data, then refuse access network.
Step 302, wireless controller end inquires about in its " authorisation features code table " whether comprise existing reception and the wireless user equipment condition code decrypted, if do not comprised, then refuses its access network; If comprised, then allow its access network.
Concrete, step 302 as shown in Figure 5, after wireless controller end successful decryption goes out wireless user equipment condition code, go again to inquire about in its " authorisation features code table " whether comprise existing reception and the wireless user equipment condition code decrypted, if comprised, then illustrate that this wireless user equipment end is legal, allow its access network, if existing reception cannot be inquired and the wireless user equipment condition code decrypted in " authorisation features code table ", then illustrate that this wireless user equipment end is illegal or undelegated temporarily, then refuse its access network.
" the authorisation features code table " of wireless controller end only allows the authorized administrator with super authority to access line pipe reason of going forward side by side, and general authorized user only has the authority of access network, there is no the authority of amendment " authorisation features code table ".
The wireless network access authentication method that the embodiment of the present invention provides is just similar in the WPA-PSK identifying procedure of standard WiFi, embedded in CPK digital signature identification flow process, its access authentication process optimization is made to be four steps, the request of inquiring after, link verification request, CPK identification authentication request, association request respectively, as shown in Figure 6; Wireless user after optimization holds equipment to only have and successfully completes above-mentioned four step flow processs, ability access network, and the access authentication flow process secure and trusted more after therefore optimizing, also carries out place mat for later access user ALARA Principle can be reviewed.
The wireless network access authentication method that this inventive embodiments provides is not limited to the optimization of the WPA-PSK identifying procedure to standard WiFi, and the identifying procedure of other wireless networks (as bluetooth, ZigBee etc.) also can carry out CPK identification authentication strengthening according to this principle.
The wireless user equipment end that the embodiment of the present invention provides, as shown in Figure 7, comprising:
CPK Key integrated unit 701, by the data interchange of common USB interface, SD card interface or SIM card Interface realization and CPK Key.
Realize the data signature to wireless user equipment condition code with the private key of CPK Key, these condition codes include but not limited to the identification number of physical MAC address, organization unique identifier (OUI), CPK Key or the equipment Serial Number SN that dispatches from the factory.
CPK identification authentication access request unit 702, enters into the Data Integration after completing by CPK private key signature the network access authentication flow process sending to wireless controller end.
Exemplary, when CPK Key integrated unit 701 is integrated with the CPK Key that an identification number is EA, so CPK identification authentication access request unit 702 will carry out data signature with CPK private key to identification number EA, and the Data Integration after signature is entered into the network access authentication flow process sending to wireless controller end.
The wireless controller end that the embodiment of the present invention provides, as shown in Figure 8, comprising:
CPK identifies receiving element 801, receives the network access authentication solicited message that each wireless user equipment end sends, and judges whether comprise CPK signed data in access authentication solicited message.According to the feature of CPK system " private key signature; public key verifications ", CPK identifies receiving element 801 and utilizes CPK PKI to be decrypted checking to this signed data, if can go out wireless user equipment condition code by successful decryption, illustrates that this access authentication solicited message comprises CPK signed data; If can not decipher, then illustrate that this access authentication solicited message does not comprise CPK signed data, then refuse access network.
CPK identity verification unit 802, verifies the legal CPK Key whether the CPK signed data received authorizes from keeper.After CPK mark receiving element 801 successful decryption goes out wireless user equipment condition code, CPK identity verification unit 802 goes whether comprise existing reception and the wireless user equipment condition code decrypted in " the authorisation features code table " of inquiry wireless controller end again, if any comprising, then illustrate that this wireless user equipment end is legal, allow its access network; If existing reception cannot be inquired and the wireless user equipment condition code decrypted in " authorisation features code table ", then illustrate that this wireless user equipment end is illegal or undelegated temporarily, then refuse its access network.
Exemplary, if CPK identifies the network access authentication solicited message that receiving element 801 receives a wireless user equipment end transmission, and the identification number decrypted wherein containing EA, during so next CPK identity verification unit 802 will judge whether identification number EA is present in " authorisation features code table ".If " authorisation features code table " containing EA, does not then refuse the network insertion request of this wireless user equipment end; If contained, then allow its access network.
CPK identity management unit 803, being supplied to supersystem keeper increases or deletes the Man Machine Interface of authorizing CPK mark.
Exemplary, when due to job change, holding identification number is that the employee of the CPK Key of EA no longer needs to continue accesses network, the Man Machine Interface easily that so supersystem keeper just can be provided by CPK identity management unit 803 deletes the identification number of EA from " authorisation features code table ", holding identification number is accordingly that the employee of the CPK Key of EA also just cannot again by this wireless controller end accesses network.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Because protection scope of the present invention should be as the criterion with the protection range of described claim.

Claims (10)

1., based on the method for the wireless network access authentication of CPK identification authentication, comprise wireless user equipment end and wireless controller end, its characterization step comprises:
A. wireless user equipment end is integrated with CPK Key, when it requires access of radio network, can send in the access authentication solicited message of wireless controller end by being integrated into the CPK signed data of wireless user equipment unique characteristics code;
B. wireless controller end has CPK identification authentication function, can verify CPK signed data, it, after the access authentication solicited message receiving the transmission of wireless device end, first judges whether this access authentication solicited message comprises CPK signed data, if do not comprised, refuses access; If comprised, then judge whether the condition code in this CPK signed data is the authorized condition code of wireless controller end, if not authorized condition code, then refuses this wireless user equipment access network, if it is allow access.
2. as claimed in claim 1 based on the method for the wireless network access authentication of CPK identification authentication, it is characterized by: the CPK in above-mentioned, be exactly combined public-key scheme (Combined Public Key Cryptosystem, be called for short CPK), on elliptic curve cipher (ECC), by combinatorial matrix and Split Key Sequence composition, it is the ID authentication system of a kind of advanced person.
3., as claimed in claim 1 based on the method for the wireless network access authentication of CPK identification authentication, it is characterized by: comprise wireless user equipment end and wireless controller end, without the need to introducing other special authentication service equipment, simplifying the network configuration of Verification System.
4. as claimed in claim 1 based on the method for the wireless network access authentication of CPK identification authentication, it is characterized by: the wireless user equipment end described in step a refers to and can identify CPK Key, and the signed data that CPK Key produces can be incorporated into the wireless user equipment of the access authentication solicited message that it sends.
5., as claimed in claim 1 based on the method for the wireless network access authentication of CPK identification authentication, it is characterized by: the wireless user equipment unique characteristics code described in step a includes but not limited to the identification number of physical MAC address, organization unique identifier (OUI), CPK Key or the equipment Serial Number SN that dispatches from the factory.
6. as claimed in claim 1 based on the method for the wireless network access authentication of CPK identification authentication, it is characterized by: the CPK signed data described in step a is carry out the data after digital signature according to the private key in CPK Key to wireless user equipment end condition code, because the private key in CPK Key under any circumstance all cannot be cracked or obtain in theory, so the data after digital signature have high fail safe and non repudiation.
7. this wireless user equipment, is characterized in that, comprising:
CPK Key integrated unit, completes the data interchange with CPK Key, realizes using the private key of CPK Key to the data signature of wireless user equipment condition code;
CPK identification authentication request unit, enters into the Data Integration after completing by CPK private key signature the network access authentication flow process sending to wireless controller end.
8. as claimed in claim 1 based on the method for the wireless network access authentication of CPK identification authentication, to it is characterized by: the wireless controller end described in step b refers to and is integrated with CPK algorithm, and can decipher the wireless access control apparatus of CPK signed data; The increase and decrease of its authorisation features code can be adjusted easily by supersystem administration interface.
9. this wireless controller, is characterized in that, comprising:
CPK identifies receiving element, receives the network access authentication solicited message that each wireless user equipment end sends, and judges whether comprise CPK signed data in access authentication solicited message;
CPK identity verification unit, verifies the signed data that the legal CPK Key whether the CPK signed data that receives authorizes from keeper produces;
CPK identity management unit, being supplied to supersystem keeper increases or deletes the interface of authorizing CPK mark.
10. this inventive embodiments is applicable to carry out CPK identification authentication optimization to the access authentication flow process of prior wireless network, and its scope of application is including, but not limited to the access authentication flow process of the wireless devices such as existing WiFi equipment, bluetooth equipment and Zigbee equipment.
CN201410159313.1A 2014-04-21 2014-04-21 Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication Pending CN104902473A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410159313.1A CN104902473A (en) 2014-04-21 2014-04-21 Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410159313.1A CN104902473A (en) 2014-04-21 2014-04-21 Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication

Publications (1)

Publication Number Publication Date
CN104902473A true CN104902473A (en) 2015-09-09

Family

ID=54034813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410159313.1A Pending CN104902473A (en) 2014-04-21 2014-04-21 Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication

Country Status (1)

Country Link
CN (1) CN104902473A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610866A (en) * 2016-02-18 2016-05-25 四川长虹电器股份有限公司 System and method for automatically accessing intelligent equipment to home wireless local area network
CN107770770A (en) * 2016-08-16 2018-03-06 电信科学技术研究院 A kind of access authentication method, UE and access device
CN110062337A (en) * 2019-05-21 2019-07-26 出门问问信息科技有限公司 Cut-in method, device, electronic equipment and the storage medium of Wi-Fi Hotspot
CN110198296A (en) * 2018-04-27 2019-09-03 腾讯科技(深圳)有限公司 Method for authenticating and device, storage medium and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1832403A (en) * 2006-04-24 2006-09-13 北京易恒信认证科技有限公司 CPK credibility authorization system
CN101217805A (en) * 2008-01-21 2008-07-09 中兴通讯股份有限公司 A wireless LAN access control method
WO2009123074A1 (en) * 2008-04-01 2009-10-08 Canon Kabushiki Kaisha User authentication method, wireless communication apparatus, base station, and account management apparatus
CN102722921A (en) * 2012-05-25 2012-10-10 北京时代凌宇科技有限公司 Access control system
GB2464552B (en) * 2008-10-22 2012-11-21 Skype Authentication system and method for authenticating a user terminal with an access node providing restricted access to a communication network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1832403A (en) * 2006-04-24 2006-09-13 北京易恒信认证科技有限公司 CPK credibility authorization system
CN101217805A (en) * 2008-01-21 2008-07-09 中兴通讯股份有限公司 A wireless LAN access control method
WO2009123074A1 (en) * 2008-04-01 2009-10-08 Canon Kabushiki Kaisha User authentication method, wireless communication apparatus, base station, and account management apparatus
GB2464552B (en) * 2008-10-22 2012-11-21 Skype Authentication system and method for authenticating a user terminal with an access node providing restricted access to a communication network
CN102722921A (en) * 2012-05-25 2012-10-10 北京时代凌宇科技有限公司 Access control system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李洁,吴振强,于璐,孙鹏: "增强的无线TNC证实模型及协议设计", 《计算机工程与应用》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610866A (en) * 2016-02-18 2016-05-25 四川长虹电器股份有限公司 System and method for automatically accessing intelligent equipment to home wireless local area network
CN107770770A (en) * 2016-08-16 2018-03-06 电信科学技术研究院 A kind of access authentication method, UE and access device
CN110198296A (en) * 2018-04-27 2019-09-03 腾讯科技(深圳)有限公司 Method for authenticating and device, storage medium and electronic device
CN110198296B (en) * 2018-04-27 2021-08-20 腾讯科技(深圳)有限公司 Authentication method and device, storage medium and electronic device
CN110062337A (en) * 2019-05-21 2019-07-26 出门问问信息科技有限公司 Cut-in method, device, electronic equipment and the storage medium of Wi-Fi Hotspot

Similar Documents

Publication Publication Date Title
CN110474875B (en) Discovery method and device based on service architecture
US10003965B2 (en) Subscriber profile transfer method, subscriber profile transfer system, and user equipment
EP3057351B1 (en) Access method, system, and device of terminal, and computer storage medium
KR101315670B1 (en) Method for smart phone registration when accessing security authentication device and method for access authentication of registered smart phone
US20120284517A1 (en) Wireless authentication using beacon messages
EP2879421B1 (en) Terminal identity verification and service authentication method, system, and terminal
CN108881304A (en) A kind of pair of internet of things equipment carries out the method and system of safety management
CN102934470A (en) Method and apparatus for binding subscriber authentication and device authentication in communication systems
CN105554747A (en) Wireless network connecting method, device and system
CN101772024B (en) User identification method, device and system
KR20180095873A (en) Wireless network access method and apparatus, and storage medium
CN105792194B (en) Authentication method, authentication device, the network equipment, the Verification System of base station legitimacy
CN104010297B (en) Wireless terminal configuration method and device and wireless terminal
CN103139768A (en) Authentication method and authentication device in integrated wireless network
CN110192381A (en) The transmission method and equipment of key
CN103533539A (en) Virtual SIM (subscriber identity module) card parameter management method and device
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN111182546B (en) Method, equipment and system for accessing wireless network
CN102111766A (en) Network accessing method, device and system
CN101895882A (en) Data transmission method, system and device in WiMAX system
CN103974248A (en) Terminal security protection method, device and system in ability open system
CN104902473A (en) Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication
CN103152326A (en) Distributed authentication method and authentication system
KR101980986B1 (en) Method for device having wlan function to access network and device for implementing method
CN106304400A (en) The IP address distribution method of wireless network and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160621

Address after: 610041 Sichuan city of Chengdu province Gaopeng Road No. 12 Building 1 No. 207

Applicant after: Chengdu Teng Yi Marketing Data Services Ltd

Address before: High tech Zone Gaopeng road in Chengdu city of Sichuan province 610000 No. 12 A block 207

Applicant before: Meng Jun

Applicant before: Chen Qian

DD01 Delivery of document by public notice
DD01 Delivery of document by public notice

Addressee: Chengdu Teng Yi Marketing Data Services Ltd

Document name: the First Notification of an Office Action

DD01 Delivery of document by public notice
DD01 Delivery of document by public notice

Addressee: Chengdu Teng Yi Marketing Data Services Ltd

Document name: Notification that Application Deemed to be Withdrawn

WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150909