WO2006006321A1 - 通信システム、鍵配信制御装置および無線lan基地局装置 - Google Patents
通信システム、鍵配信制御装置および無線lan基地局装置 Download PDFInfo
- Publication number
- WO2006006321A1 WO2006006321A1 PCT/JP2005/010261 JP2005010261W WO2006006321A1 WO 2006006321 A1 WO2006006321 A1 WO 2006006321A1 JP 2005010261 W JP2005010261 W JP 2005010261W WO 2006006321 A1 WO2006006321 A1 WO 2006006321A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- base station
- lan base
- wireless lan
- key information
- communication terminal
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2854—Wide area networks, e.g. public data networks
- H04L12/2856—Access arrangements, e.g. Internet access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates to a communication system, a key distribution control device, and a wireless LAN base station device, and more particularly to a communication system related to a wireless LAN, a key distribution control device constituting the same, and a wireless LAN base station device.
- the bridge processing between the wireless LAN frame (802.11 standard) and the Ethernet (registered trademark) frame is not performed by the wireless LAN base station device, but is performed to the upper AP control device, or authentication is performed.
- An architecture has also been considered in which port switching points are also transferred from the wireless LAN base station device to the AP controller.
- the light weight access protocol (LWAPP) is proposed in the IETF's C APWAP working group as one of the protocols for managing the AP.
- the AP control device performs automatic setting of setting information, fault management, statistical information collection, setting of encryption key information, etc. to the wireless LAN base station device.
- the AP control apparatus notifies the communication terminal apparatus of the encryption key by the EAPoL-Key frame at the time of key setting. At this time, the Add Mobile Request frame is sent to the access point at the same timing.
- the AP control device is a communication terminal device and a wireless LAN base.
- An encryption key necessary for communication with the station apparatus is distributed to the communication terminal apparatus and the wireless LAN base station apparatus.
- the encryption key sent from the AP control device and sent to the communication terminal device is delivered via the wireless LAN base station device.
- the AP control device as the key distribution control device is configured for the wireless LAN base station device and the communication terminal device when the authentication of the communication terminal device is successful.
- the keys are set in different frames. Therefore, when congestion or the like of the network system between the AP control device and the wireless LAN base station device occurs, the frame sent out by the AP control device is delivered to the wireless LAN base station device and the communication terminal device. A large difference in timing may occur, and this difference may cause a difference in encryption key setting time between the communication terminal apparatus and the wireless LAN base station apparatus.
- a state occurs in which the encryption key is set only in either the communication terminal apparatus or the wireless LAN base station apparatus.
- the communication terminal apparatus Communication can not be performed with the wireless LAN base station device. For example, when only the wireless LAN base station apparatus sets the encryption key first and the encryption key setting to the communication terminal apparatus is delayed, the wireless LAN base station apparatus to the communication terminal apparatus sets the encryption key to the communication terminal apparatus.
- the frame to be sent is encrypted, the communication terminal that receives the frame can not decrypt the encrypted frame.
- An object of the present invention is to synchronize a key setting time of a wireless LAN base station apparatus and a communication terminal apparatus by using keys, and to establish a communication disconnection period between the wireless LAN base station apparatus and the communication terminal apparatus.
- a communication system, a key distribution control device, and a wireless LAN base station device to be shortened.
- a communication terminal apparatus in a communication system, a communication terminal apparatus, a wireless LAN base station apparatus to which the communication terminal apparatus accesses, the communication terminal apparatus, and the wireless LAN base And a key distribution control device for distributing encryption key information to be used in communication with a ground station device, wherein the key distribution control device comprises: first encryption key information used by the communication terminal device;
- the wireless LAN base station apparatus comprises generation means for connecting the second encryption key information used by the wireless LAN base station apparatus to generate one key information frame, and the wireless LAN base station apparatus determines the key information frame as the first key information frame.
- a transmission unit for transmitting the first encryption key information to the communication terminal apparatus.
- the key distribution control device distributes encryption key information used in communication between a communication terminal device and a wireless LAN base station device accessed by the communication terminal device.
- Generation means for concatenating the first encryption key information used by the communication terminal apparatus and the second encryption key information used by the wireless LAN base station apparatus to generate one key information frame;
- transmitting means for transmitting the key information frame to the wireless LAN base station device.
- the key information frame is received from the key distribution control device, and the key information frame is received as the first encryption key information and the first encryption key information.
- a transmitting unit configured to transmit the first encryption key information to the communication terminal apparatus.
- the key setting time of the wireless LAN base station apparatus and the communication terminal apparatus is synchronized by the use of a key, and the period of communication interruption occurring between the wireless LAN base station apparatus and the communication terminal apparatus can be further enhanced. It is possible to provide a communication system, key distribution control device, and wireless LAN base station device to be shortened.
- FIG. 1 is a block diagram showing a configuration of a communication system according to an embodiment of the present invention.
- FIG. 2 A block diagram showing the configuration of the AP control device of FIG.
- FIG. 3 A diagram showing an example of the configuration of a key management table
- FIG. 5 A block diagram showing the configuration of the wireless LAN base station device of FIG.
- FIG. 6 A sequence diagram showing the flow of the operation of the communication system according to the embodiment Best mode for carrying out the invention
- Communication system 10 is, as shown in FIG. 1, communication terminal apparatus 300, wireless LAN base station apparatus 200 accessed by communication terminal apparatus 300, communication terminal apparatus 300, and wireless LAN base station.
- An AP control device 100 as a key distribution control device for distributing encryption key information used for communication with the station device 200, and a network system 600 are provided.
- the AP control device 100 is connected to the authentication server device 20 and the core network system 30.
- the AP control device 100 links the first key information used by the communication terminal device 300 and the second key information used by the wireless LAN base station device 200 to form one AP. It generates a frame and transmits this frame to the wireless LAN base station device 200.
- the wireless LAN base station apparatus 200 separates the frame delivered from the AP control apparatus 100 into first key information and second key information. Then, the wireless LAN base station apparatus 200 transmits the first key information to the communication terminal apparatus 300, and the second key information is used by the apparatus itself for communication with the communication terminal apparatus 300.
- the AP control device 100 includes an authentication control unit 101, a terminal side transmission / reception unit 102, a network side transmission / reception unit 103, and first key information and a wireless LAN used by the communication terminal device 300.
- a key capsule unit 104 as a generation unit that generates one frame by linking the second key information used by the base station apparatus 200, and a key management table 105 are provided.
- authentication control unit 101 When authentication control unit 101 receives an authentication request from communication terminal apparatus 300 via terminal side transmission / reception unit 102, authentication control unit 101 sends this authentication request to authentication server apparatus 20 via network side transmission / reception unit 103. Do.
- the authentication control unit 101 receives, from the authentication server device 20, Access—Accept as a result of successful authentication according to the authentication request via the network side transmission / reception unit 103, and this Access—Accept is EAP—Success As the communication terminal apparatus 300, the communication terminal apparatus 300 transmits it to the communication terminal apparatus 300 via the terminal transmission / reception unit 102. Further, the authentication control unit 101 sends an EAPoL-Key frame, which is first key information to be notified to the communication terminal apparatus 300, to the key capsule unit 104.
- the key capsule unit 104 performs the following operation only when an EAPoL-Key frame is received from the authentication control unit 101. Specifically, the key capsule unit 104 extracts from the key management table 105 the terminal MAC address corresponding to the communication terminal device 300 for which the authentication is successful and the second key information used by the wireless LAN base station device 200. , Create a key element. In the key management table 105, as shown in FIG. 3, the terminal MAC address corresponding to each communication terminal 300 is associated with the second key information used in the wireless LAN base station 200. Is stored.
- the key capsule unit 104 also creates an EAPoL element from the received EAPoL-Key frame. Then, the key capsule unit 104 also creates a key setting request frame for the created key element, EAPoL element, and force.
- this key setting request frame has a basic configuration including an Ether header section 410, an AP management protocol header section 420, a key element 430, and an EAPoL element 440.
- Ether header section 410 an Ether header section 410
- AP management protocol header section 420 a key element 430
- EAPoL element 440 an EAPoL element 440.
- the key setting request frame there is an Ether header portion 410 on the outermost side, and an AP management protocol header portion 420 is placed inside thereof.
- the AP management protocol requires various messages such as AP configuration and statistical information collection, but in the present invention, only the key setting request is defined.
- the AP management protocol header 420 indicates that it is a key setting request frame.
- the Ether header section 410 includes a destination MAC address (here, the MAC address of the wireless LAN base station 200), a transmission source MAC address (here, the MAC address of the AP control apparatus 100), and an Ether A type, that is, a type that represents an AP control protocol, is included.
- a destination MAC address here, the MAC address of the wireless LAN base station 200
- a transmission source MAC address here, the MAC address of the AP control apparatus 100
- Ether A type that is, a type that represents an AP control protocol
- the key setting request frame has two elements of a key element 430 and an EAPoL element 440.
- the terminal MAC address 411 corresponding to the communication terminal 300 and the type 412 of the key (unique cast key or broadcast key) And the second key information body 413 used in the wireless LAN base station apparatus 200.
- the EAPoL element 440 includes an EAPoL-Key frame, that is, the first key information itself used by the communication terminal apparatus 300.
- This EAPoL-Key frame is adapted to the form of the frame exchanged between the communication terminal 300 and the wireless LAN base station 200 in advance so that the frame conversion by the wireless LAN base station 200 is not necessary. is there.
- a frame format used in wireless LAN for example, a frame format used in data link layer (signal format) EAPoL—A key frame is stored in a key setting request frame.
- the key capsule unit 104 includes the EAPoL-Key frame as the first key information used by the communication terminal apparatus 300 and the second key information used by the wireless LAN base station apparatus 200. Concatenate (encapsulate) to generate one frame (key setting request frame).
- the key capsule unit 104 sends the generated key setting request frame to the wireless LAN base station apparatus 200 via the terminal side transmission / reception unit 102.
- the wireless LAN base station apparatus 200 includes a frame distribution unit 201, a network side transmission / reception unit 203, and a key setting request frame from the AP control device 100 as the first key information and the second key information.
- the key decapsulation unit 204 as separation means for separating into key information, the terminal side transmission / reception unit 202 for transmitting the separated first key information to the communication terminal apparatus 300, and the key management tape nore 205 .
- the frame distribution unit 201 When the frame distribution unit 201 receives an authentication request from the communication terminal apparatus 300 via the terminal side transmission / reception unit 202, it transmits this authentication request to the AP control apparatus 100 via the network side transmission / reception unit 203. .
- the frame distribution unit 201 also performs EAP as a result of successful authentication in response to the authentication request.
- the communication terminal apparatus 300 When Success is received from the AP control apparatus 100 via the network side transmission / reception unit 203, the communication terminal apparatus 300 sends it to the communication terminal apparatus 300 via the terminal side transmission / reception unit 202.
- the frame distribution unit 201 sends it to the key decapsulation unit 204.
- the key decapsulation unit 204 receives the key setting request frame from the frame distribution unit 201, the key decapsulation unit 204 separates the key setting request frame into a key element and an EAPoL element. Then, the key decapsulation unit 204 extracts the terminal MAC address and key information from the key element, and extracts the EAPoL-Key frame from the EAPoL element.
- the key decapsulation unit 204 sets the terminal MAC address and the key information in the key management table 205, and sends an EAPoL-Key frame to the communication terminal apparatus 300 via the terminal side transmission / reception unit 202.
- the key management table 205 adopts the same configuration as the key management table 105 shown in FIG.
- the key decapsulation unit 204 is used by the EAPoL-Key frame as the first key information used by the communication terminal device 300 encapsulated by the AP control device 100 and the wireless LAN base station device 200.
- the second key information to be transmitted is separated, and the EAPoL-Key frame as the first key information is sent out via the terminal side transmission / reception unit 202.
- the wireless LAN base station apparatus 200 communicates the EAPoL-Key frame as the first key information, which does not require particularly time-consuming processing other than separating the key setting request frame in the key decapsulation section 204. It can be sent to the terminal device 300.
- step ST501 communication terminal apparatus 300 performs authentication with authentication server apparatus 20 using the 802.1 xZEAP protocol.
- EAP types such as EAP-TLS, EAP-TTLS, and EAP-PEAP depending on the type of authentication, but the present invention does not depend on the type of authentication.
- a source of a key called a master key is generated in the communication terminal device 300 and the authentication server device 20.
- step ST 502 Acces s-Accept as a result of successful authentication is transmitted from the authentication server device 20 to the AP control device 100.
- step ST 503 the AP control device 100 notifies the communication terminal device 300 as Access-Accept ⁇ EAP-Success.
- step ST 504 a key setting request frame generated by AP control apparatus 100 is transmitted to wireless LAN base station apparatus 200.
- step ST 505 the key setting request frame is separated and extracted by the wireless LAN base station apparatus 200, and is sent to the extracted EAPoL-Key frame power communication terminal apparatus 300. If necessary, the wireless LAN base station apparatus 200 may transmit a confirmation response of the key setting request frame to the AP control apparatus 100.
- AP control apparatus 100 and wireless LAN base station apparatus 200 are connected by Ethernet (registered trademark), and frames are exchanged at the data link layer. Powers Described
- the present invention may communicate at the UDP / IP network layer, but is not limited to this. In that case, instead of the Ether header section 410 of the key setting request frame shown in FIG. 4, the UDPZlP header is to be encapsulated.
- the EAPoL-Key frame as the first key information used by the communication terminal device 300, and the wireless LAN base station device 200.
- the second key information to be used can be concatenated (encapsulated) to generate one frame (key setting request frame), and this frame can be sent to the wireless LAN base station 200.
- the received frame is separated into an EAPoL-Key frame as first key information and a second key information used by the wireless LAN base station 200, and this EAPoL-Key is used.
- a frame is sent to the communication terminal 300.
- the communication terminal 300 and the wireless LAN base station 200 are networks. Because communication can be performed without a connection, the time it takes for the EAPoL-Key frame to be delivered from the wireless LAN base station 200 to the communication terminal 300 is short, so the wireless LAN base station 200 and the communication terminal As a result of being able to substantially synchronize the key setting time of the device 300, it is possible to shorten the period of communication interruption due to the asynchronousness of the key setting time that occurs between the wireless LAN base station device 200 and the communication terminal device 300. it can.
- the signal form of the EAPoL-Key frame as the first key information is different between the wireless LAN base station apparatus 200 and the communication terminal apparatus 300.
- the EAPoL-Key frame and the second key information used by the wireless LAN base station 200 are linked (encapsulated) according to the frame format (signal format) used between the two frames (key setting (key setting). Generate a request frame).
- the received frame is separated into an EAP oL-Key frame as first key information and a second key information used by the wireless LAN base station apparatus 200, and this EAPoL- The Key frame is transmitted to the communication terminal 300.
- the EAPoL-Key frame when it is encapsulated in AP control apparatus 100, it conforms to the form of the frame exchanged between communication terminal apparatus 300 and wireless LAN base station apparatus 200 in advance.
- the wireless LAN base station apparatus 200 may transmit the EAPoL-Key frame as the first key information to the communication terminal apparatus 300, which does not require particularly time-consuming processing other than separating the key setting request frame. it can.
- the processing time required for the wireless LAN base station 200 is shortened, it is possible to substantially synchronize the key setting times of the wireless LAN base station 200 and the communication terminal 300, resulting in the wireless LAN base. It is possible to further shorten the period of communication interruption due to the non-synchronization of the key setting time which occurs between the station apparatus 200 and the communication terminal apparatus 300.
- the communication system, key distribution control device and wireless LAN base station device synchronize the key setting time of the wireless LAN base station device and the communication terminal device more and wirelessly. This has the effect of shortening the period of communication interruption occurring between the communication terminals, and is effective for the wireless LAN communication system, the access point control apparatus constructing the same, and the access point.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/592,531 US20070206796A1 (en) | 2004-07-08 | 2005-06-03 | Communication System, Key Distribution Control Device, and Radio Lan Base Station Device |
EP05750804A EP1764953A1 (en) | 2004-07-08 | 2005-06-03 | Communication system, key distribution control device, and radio lan base station device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004201944A JP2006025225A (ja) | 2004-07-08 | 2004-07-08 | 通信システム、鍵配信制御装置および無線lan基地局装置 |
JP2004-201944 | 2004-07-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006006321A1 true WO2006006321A1 (ja) | 2006-01-19 |
Family
ID=35783677
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/010261 WO2006006321A1 (ja) | 2004-07-08 | 2005-06-03 | 通信システム、鍵配信制御装置および無線lan基地局装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20070206796A1 (ja) |
EP (1) | EP1764953A1 (ja) |
JP (1) | JP2006025225A (ja) |
WO (1) | WO2006006321A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008017463A (ja) * | 2006-06-07 | 2008-01-24 | Hitachi Ltd | 無線制御セキュリティシステム |
CN101047502B (zh) * | 2006-03-29 | 2010-08-18 | 中兴通讯股份有限公司 | 一种网络认证方法 |
US20200244669A1 (en) * | 2006-04-13 | 2020-07-30 | Certicom Corp. | Method and Apparatus for Providing an Adaptable Security Level in an Electronic Communication |
US11870787B2 (en) | 2003-07-07 | 2024-01-09 | Blackberry Limited | Method and apparatus for providing an adaptable security level in an electronic communication |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7668315B2 (en) * | 2001-01-05 | 2010-02-23 | Qualcomm Incorporated | Local authentication of mobile subscribers outside their home systems |
WO2007004586A1 (ja) * | 2005-06-30 | 2007-01-11 | Matsushita Electric Industrial Co., Ltd. | 移動通信制御方法、データ通信装置、移動基地局装置並びに移動端末 |
US7734050B2 (en) * | 2006-03-27 | 2010-06-08 | Nissan Technical Center North America, Inc. | Digital certificate pool |
US7742603B2 (en) * | 2006-03-27 | 2010-06-22 | Nissan Technical Center North America, Inc. | Security for anonymous vehicular broadcast messages |
US8320567B2 (en) * | 2007-01-05 | 2012-11-27 | Cisco Technology, Inc. | Efficient data path encapsulation between access point and access switch |
US20090136043A1 (en) * | 2007-11-26 | 2009-05-28 | Motorola, Inc. | Method and apparatus for performing key management and key distribution in wireless networks |
US20090285133A1 (en) * | 2008-05-16 | 2009-11-19 | Rao Sudarshan A | Method for over-the-air base station management via access terminal relay |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001111543A (ja) * | 1999-10-07 | 2001-04-20 | Nec Corp | 無線lanの暗号鍵更新システム及びその更新方法 |
JP2003259417A (ja) * | 2002-03-06 | 2003-09-12 | Nec Corp | 無線lanシステム及びそれに用いるアクセス制御方法 |
JP2003318922A (ja) * | 2002-04-25 | 2003-11-07 | Nippon Telegraph & Telephone East Corp | 無線ネットワーク接続システム、端末装置、無線アクセスポイント、リモートアクセスサーバ及び認証サーバ |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6983326B1 (en) * | 2001-04-06 | 2006-01-03 | Networks Associates Technology, Inc. | System and method for distributed function discovery in a peer-to-peer network environment |
US20020147820A1 (en) * | 2001-04-06 | 2002-10-10 | Docomo Communications Laboratories Usa, Inc. | Method for implementing IP security in mobile IP networks |
EP1361771A1 (de) * | 2002-05-06 | 2003-11-12 | Siemens Aktiengesellschaft | Verfahren und Funkkommunikationssystem zur Übertragung von Nutzinformationen als Dienst an mehrere Teilnehmerstationen |
-
2004
- 2004-07-08 JP JP2004201944A patent/JP2006025225A/ja active Pending
-
2005
- 2005-06-03 US US10/592,531 patent/US20070206796A1/en not_active Abandoned
- 2005-06-03 WO PCT/JP2005/010261 patent/WO2006006321A1/ja not_active Application Discontinuation
- 2005-06-03 EP EP05750804A patent/EP1764953A1/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001111543A (ja) * | 1999-10-07 | 2001-04-20 | Nec Corp | 無線lanの暗号鍵更新システム及びその更新方法 |
JP2003259417A (ja) * | 2002-03-06 | 2003-09-12 | Nec Corp | 無線lanシステム及びそれに用いるアクセス制御方法 |
JP2003318922A (ja) * | 2002-04-25 | 2003-11-07 | Nippon Telegraph & Telephone East Corp | 無線ネットワーク接続システム、端末装置、無線アクセスポイント、リモートアクセスサーバ及び認証サーバ |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11870787B2 (en) | 2003-07-07 | 2024-01-09 | Blackberry Limited | Method and apparatus for providing an adaptable security level in an electronic communication |
CN101047502B (zh) * | 2006-03-29 | 2010-08-18 | 中兴通讯股份有限公司 | 一种网络认证方法 |
US20200244669A1 (en) * | 2006-04-13 | 2020-07-30 | Certicom Corp. | Method and Apparatus for Providing an Adaptable Security Level in an Electronic Communication |
JP2008017463A (ja) * | 2006-06-07 | 2008-01-24 | Hitachi Ltd | 無線制御セキュリティシステム |
Also Published As
Publication number | Publication date |
---|---|
JP2006025225A (ja) | 2006-01-26 |
EP1764953A1 (en) | 2007-03-21 |
US20070206796A1 (en) | 2007-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4804454B2 (ja) | 鍵配信制御装置、無線基地局装置および通信システム | |
KR100989769B1 (ko) | 멀티-홉 무선 네트워크에서의 무선 라우터 보조 보안핸드오프(wrash) | |
US9226142B2 (en) | Mobile communication system, communication control method, and radio base station | |
US11121862B2 (en) | System and method for wireless network access protection and security architecture | |
WO2020251312A1 (en) | Method of dynamically provisioning a key for authentication in relay device | |
CN101641935B (zh) | 配电系统安全接入通信系统和方法 | |
JP2006140806A (ja) | 通信システム、無線lan基地局制御装置および無線lan基地局装置 | |
US11388590B2 (en) | Cryptographic security in multi-access point networks | |
WO2006006321A1 (ja) | 通信システム、鍵配信制御装置および無線lan基地局装置 | |
US20110002272A1 (en) | Communication apparatus and communication method | |
US9049693B2 (en) | Gateway, communication system, method of controlling gateway, and computer readable medium therefor | |
CN110650476B (zh) | 管理帧加密和解密 | |
WO2015193968A1 (ja) | 通信装置、無線マルチホップネットワークシステムおよびフレームカウンタ設定方法 | |
CN116132983A (zh) | 接入认证方法、装置、终端及核心网 | |
KR102550048B1 (ko) | 5g 시스템의 tsn 네트워크 브리지 기능을 이용한 보안채널 생성 방법 및 그 장치 | |
EP4250641A1 (en) | Method, devices and system for performing key management | |
WO2011143944A1 (zh) | 一种端到端通信密钥的建立方法、系统及装置 | |
JP3816850B2 (ja) | Macブリッジ装置及び端末装置 | |
CN108322941B (zh) | 信息通信方法及装置 | |
JP2011030077A (ja) | 無線基地局 | |
Park et al. | Multi-protocol authentication for SIP/SS7 mobile network | |
JP2018133737A (ja) | ネットワーク構築システム、方法及び無線ノード |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 10592531 Country of ref document: US Ref document number: 2007206796 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005750804 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2005750804 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10592531 Country of ref document: US |