WAPI-based authentication method of wireless mesh network
A technology of wireless mesh network and authentication method, which is applied in the field of authentication in wireless mesh network, can solve problems such as transplantation application, security problems restricting the large-scale implementation of wireless mesh network, and affecting network communication security, so as to achieve security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Example Embodiment
[0029] Example one:
[0030] See figure 2 Shown is a schematic flow chart of the first embodiment of the WAPI-based wireless mesh network authentication method of the present invention.
[0031] In this embodiment, the default authentication server AS has already issued corresponding certificates for each MPP, MP, MAP node, and these MPP, MP, MAP have also been installed with the certificates issued to them by the authentication server AS. , And the authentication authentication server is located in a location that can be routed to in the wired network for description.
[0032] Such as figure 2 As shown, the method in this embodiment includes the steps:
[0033] Step S101: request the node to complete the association with the node that has been connected to the network, and proceed to step S102;
[0034] Step S102: The node that has connected to the network sends authentication activation information to the requesting node, where the authentication activation information may specif
Example Embodiment
[0055] Embodiment two:
[0056] See image 3 What is shown is a schematic flow chart of the second embodiment of the authentication method for a wireless mesh network based on WAPI of the present invention. In this embodiment, it is mainly for the description of the authentication process when the station accesses the network.
[0057] Such as image 3 As shown, it specifically includes the steps:
[0058] Step S201: The station completes the association with any MAP node that has been connected to the network, and proceeds to step S202;
[0059] Step S202: The MAP node that has connected to the network sends authentication activation information to the station, where the authentication activation information may specifically include the authentication activation information identifier, the identity information of the authentication authentication server, and the certificate of the MAP node that has connected to the network. Since the WAPI authentication process adopts the elliptic c
Example Embodiment
[0116] Embodiment three:
[0117] See Figure 5 What is shown is a schematic flowchart of Embodiment 3 of the authentication method for a wireless mesh network based on WAPI of the present invention. In this embodiment, the description is mainly for a new node that newly joins the network.
[0118] Such as Figure 5 As shown, it specifically includes the steps:
[0119] Step S301: The new node completes the association with each node that has been connected to the network, and the process of completing the association between the new node and each node that has been connected to the network may be in any order, and step S302 is entered;
[0120] Step S302: Each node that has been connected to the network sends authentication activation information to the new node, where the authentication activation information may specifically include the authentication activation information identifier, the identity information of the authentication authentication server, and the node that has conn
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap