CN105162791B - The method and device of shared key is used based on CAPWAP - Google Patents
The method and device of shared key is used based on CAPWAP Download PDFInfo
- Publication number
- CN105162791B CN105162791B CN201510611882.XA CN201510611882A CN105162791B CN 105162791 B CN105162791 B CN 105162791B CN 201510611882 A CN201510611882 A CN 201510611882A CN 105162791 B CN105162791 B CN 105162791B
- Authority
- CN
- China
- Prior art keywords
- key
- random number
- master key
- dtls
- capwap
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 17
- 238000004891 communication Methods 0.000 claims abstract description 8
- 238000004364 calculation method Methods 0.000 claims description 12
- 206010044565 Tremor Diseases 0.000 claims description 10
- 238000013507 mapping Methods 0.000 claims description 5
- 241001269238 Data Species 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Present invention is disclosed a kind of method and devices using shared key based on CAPWAP, during CAPWAP communications being carried out applied to multiple AP and AC, by giving AC and AP to distribute random number resource pool in advance, so that AC and AP selects random number inside respective resource pool, and respective DTLS encryption and decryption key is calculated by corresponding random number, the ends AC chip is when storing the DTLS encryption and decryption keys of each AP, the same cipher key index value is distributed to the identical AP of key, the same DTLS encryption and decryption key can be shared by just realizing multiple AP in this way, so as to reduce the area of AC chips, power consumption, cost, in turn ensure internet security.
Description
Technical field
The present invention relates to CAPWAP agreements, more particularly, to a kind of method and dress using shared key based on CAPWAP
It sets.
Background technology
Traditional WLAN (Wireless Local Area Networks, Wireless LAN) network be all for enterprise or
The access of a small amount of mobile subscriber in family and set up.Therefore, usually only need a wireless router that can solve the problems, such as
.But after the scale of wireless access and density reache a certain level, traditional wireless router is in deployment and management
It will go wrong.
Thin AP (access point)+AC (access controller) is another framework after fat AP, and wherein AC is responsible for wireless network
The access of network controls, forwarding and statistics, the configuration monitoring of AP, roaming management, the network management agent of AP, security control, in the framework
In thin AP can work independently, it is necessary to and AC is used cooperatively, and can allow them can then requiring a kind of agreement between the two
It is interconnected and is linked up.Then, the AC of the AP and B producers of IETF A producers caused by order to solve tunnel protocol incompatibility problem
Can not carry out intercommunication, set up in 2005 CAPWAP working groups between standardized A P and AC tunnel protocol (rfc5415,
rfc5416)。
It is described according to rfc5415, the data between AP and AC are ravesdropping in order to prevent, using DTLS (data packet transport layers
Security protocol) encryption and decryption processing is carried out to its data packet, for the communication that guarantees network security.Rfc5415 defines DTLS simultaneously
The enciphering and deciphering algorithm TLS_RSA_WITH_AES_128_CBC_SHA that must be supported when for encrypting CAPWAP message, the algorithm
Meaning is:The DTLS protocol handshake stages use the asymmetric enciphering and deciphering algorithms of RSA, data transfer phase to use the AES of CBC patterns
128 enciphering and deciphering algorithms, while using the integrality of SHA checking algorithms guarantee data.The key length of 128 algorithms of AES is
The key length of 128bits, SHA algorithm is 160bits.Chip-scale supports DTLS encryption/decryption modules, needs each tunnels AP-AC
Unidirectional data preserve the key data of 128+160=288bits, and two-way communication then needs to preserve the cipher key number of 576bits
According to.One AC supports N number of AP, then the key data storage consumed is also required to N times, this to the area of chip interior, power consumption, at
This is all no small cost.
In an existing technical solution, it is the rank of shaking hands in DTLS sessions that DTLS encryption and decryption, which needs the key used,
Section, is obtained by AP and AC joint consultations, and AC chips are necessary for the key that each AP safeguards a group encryption/decryption in this scenario, have
Several AP will safeguard several group keys.When AP substantial amounts, a large amount of storage region will be consumed and go to preserve key, to increase
The area of large chip, cost.In another existing technical solution, the key of DTLS encryption and decryption does not pass through DTLS between AP and AC
The form of handshake phase certificate carrys out dynamic negotiation, but by user manually by cipher key configuration into AP and AC, this is exactly pre-
Shared keys, the data between AP and AC just carry out encryption and decryption operation by the key of user's static configuration.Pass through pre-
Shared keys, user is it is also possible that multiple AP share the same key.From the angle of network security, data quilt in order to prevent
Eavesdropping, CAPWAP agreements need DTLS intermittently to replace key, but pre-shared keys are user's static configurations, unless
User updates manually, and otherwise this key will not change, and safety reduces.
Invention content
It is an object of the invention to overcome the deficiencies of existing technologies, a kind of side using shared key based on CAPWAP is provided
Method and device when realizing that the different AP and same AC carries out CAPWAP communications, can use shared DTLS encryption and decryption close
Key carries out encryption and decryption to CAPWAP data.
To achieve the above object, the following technical solutions are proposed by the present invention:A kind of side using shared key based on CAPWAP
Method, during this method is applied to multiple AP and AC progress CAPWAP communications, the method includes:
AC and AP calculates master key each by the ends AC random number, the ends AP random number and pre- master key these three data,
To obtain DTLS encryption and decryption keys;
When the ends AC chip stores the DTLS encryption and decryption keys of each AP, by the storage of the key currently preserved and the ends AC chip
All keys preserved in region compare, if having it is identical, to current AP distribute an AP identical with its key rope
Draw value.
Preferably, before DTLS hand shakings, an AC resource pool is distributed to the ends AC, an AP resource is distributed to the ends AP
Pond and pre- master key resource pool.
Preferably, during DTLS hand shakings, the ends AC randomly choose the ends an AC random number in the AC resource pools
The ends AP are sent to, the ends AP randomly choose the ends an AP random number in the AP resource pools and are sent to the ends AC, and the ends AP are in the pre-master
Key resource pool selects a pre- master key to be sent to the ends AC.
Preferably, the mapping between the encryption and decryption key and its corresponding index value of the AP stored in the chip of the ends AC is closed
System is that the encryption and decryption key dynamic that is being currently used according to AP is newer.
Preferably, the length of the ends AC random number and the ends AP random number is 32 bytes, and the length of the pre- master key is
48 bytes.
The invention also provides a kind of devices using shared key based on CAPWAP, including multiple AP and AC, often
A AP includes AP master key calculation units, and the AC includes AC master key calculations unit, key comparing unit and key
Allocation unit, the AP master key calculations unit and AC master key calculations unit are each by the ends AC random number, the ends AP random number
With these three data of pre- master key, master key is calculated, to obtain respective DTLS encryption and decryption key;The key is more single
Member is used for when the ends AC chip stores the DTLS encryption and decryption keys of each AP, by the storage of the key currently preserved and the ends AC chip
All keys preserved in region compare, if having it is identical, the Key Assignment Unit to current AP distribute one and its
The index value of the identical AP of key.
Preferably, before DTLS hand shakings, there are one AC resource pools for the distribution of the ends AC, and there are one AP resources for the distribution of the ends AP
Pond and pre- master key resource pool.
Preferably, the ends AC further include the ends AC random number selecting unit, and the ends AP further include the random number selection of the ends AP
Unit and pre-master key selection unit, during DTLS hand shakings, the ends the AC random number selecting unit is used for described
AC resource pools randomly choose the ends an AC random number and are sent to the ends AP, and the ends the AP random number selecting unit is used to provide in the AP
Source pond randomly chooses the ends an AP random number and is sent to the ends AC, and the pre-master key selection unit is used to provide in the pre- master key
Source pond selects a pre- master key to be sent to the ends AC.
Present invention incorporates existing DTLS keys to be configured by certificate dynamic generation and static state pre-shared (pre-share)
The advantages of two ways, by giving AC and AP to distribute random number resource pool in advance so that AC and AP is inside respective resource pool
Select random number.It can ensure that identical random number resource is selected in multiple tunnels AP-AC by resource pool, to which phase be calculated
Same key.Based on this mode, multiple AP can share the same key, and chip is saved compared to certificate dynamic generation mode
Valuable memory space improves memory space utilization rate, reduces chip cost, is then improved compared to static pre-shared configurations
Internet security.
Therefore, compared with prior art, the beneficial effects of the invention are as follows:The invention enables the different AP and same AC into
When row CAPWAP communications, shared DTLS encryption and decryption key pair CAPWAP data can be used to carry out encryption and decryption, to need
Under the premise of stringent control chip storage region area and cost, the secure communication between AP and AC still can be ensured by DTLS.
Description of the drawings
Fig. 1 is the principle schematic of existing DTLS hand shakings flow;
Fig. 2 is the flow diagram using the method for shared key the present invention is based on CAPWAP;
Fig. 3 is the mapping relations between the encryption and decryption key and index value of the AP stored in the chip of the ends AC of the embodiment of the present invention
Schematic diagram.
Specific implementation mode
Below in conjunction with the attached drawing of the present invention, clear, complete description is carried out to the technical solution of the embodiment of the present invention.
As shown in Figure 1, in technology of the existing DTLS keys by certificate dynamic generation, DTLS encryption and decryption needs are used
Key is the handshake phase in DTLS sessions, is obtained by AP and AC joint consultations, i.e., the negotiation of AP and AC keys is by step S101
~S113 is determined.
Specifically, the 32 byte random numbers generated comprising the ends AC in step S102 and S104, step S101 and S103
In comprising the ends AP generate a 32 byte random numbers, step S105 is the digital certificate that the ends AC are sent out to the ends AP, is on the one hand used for
AP differentiates the identity of AC, on the one hand includes the public key of AC;AP is in step S108, first in local random one 48 byte of generation
Then pre- master key carries out rsa encryption with the public key that step S105 is obtained, issues AC, then AC will be pre- by the private key of oneself
Master key is decrypted.At this point, AC and AP have recorded three numbers:The ends AC random number, the ends AP random number, pre- master key.Final
DTLS encryption and decryption key is then calculated by these three numbers.AC and AP are respectively calculated, and are respectively stored in local.Final step
S111 and step S113 is the encrypted ciphertext of key that both sides' reception generates, and then indicates that key agreement is complete after successful decryption
At.
A kind of disclosed method using shared key based on CAPWAP is shaken hands not influencing standard DTLS
Under the premise of agreement flow, by the create-rule for optimizing AP random numbers and AC random numbers, pre- master key so that different AP-
The tunnels AC generate identical encryption and decryption key, to realize that multiple AP can share the same DTLS encryption and decryption key.
Specifically, since the encryption and decryption key of DTLS is by a 32 byte random number of the ends AC, 32 byte random number of the ends AP
It is calculated with the pre- master key of 48 byte of the ends AP these three data, so the present invention before DTLS hand shakings, gives the ends AC
Distribute a 32 byte random number resource pools, a 32 byte random number resource pools and the pre- master key resource of 48 bytes are distributed in the ends AP
Pond.Since the handshake procedure of DTLS is safeguarded by the respective system softwares of AC and AP, so the resource pool that the present invention distributes
Any hardware resource is not consumed.And the size of resource pool, it can be according to the big of the key storage region that the ends AC chip is supported
Small dynamic adjustment, such as three resource pools have 10,20,30 resources respectively, then can generate 10 × 20 × 30=6000 in total
A key.
In this way, in step s 102, the ends AC randomly choose 32 byte datas in the resource pool of oneself, are sent to AP
End, in step S101, the ends AP randomly choose 32 byte datas in the resource pool of oneself, the ends AC are sent to, in step
In S108, the ends AP select 48 byte datas in pre- master key resource pool, are sent to the ends AC.
Then AP and AC calculates master each by the ends AC random number, the ends AP random number and pre- master key these three data
Key, to obtain respective DTLS encryption and decryption key.For AC, key is stored in depositing in local switch chip
Storage area domain, AC chips are that each AP distributes an index value, and the key of the encryption and decryption in reading storage region is removed by the value.
In the present invention, when at the ends AC, chip stores the encryption and decryption key of each AP, need the key currently preserved and its
The key of all AP of saved mistake compares in storage region, if it find that there is identical key (as just at three
What is selected in resource pool is identical random number), then give this AP cipher key index values for distributing that AP identical with its key.
As shown in Fig. 2, AP1, AP5 and AP7, which are shared, enjoys key 1, and AP2 and AP3 shared keys 2, AP4 and AP6 shared keys 3, AP8 uses
Key 4, APm use key k.In this way, the present invention, which just realizes multiple AP, can share the same DTLS encryption and decryption key, to
The areas of AC chips, power consumption, cost can be reduced, in turn ensures internet security.
Mapping relations between the encryption and decryption key of the AP stored in the chip of the ends AC and its corresponding index value are according to AP
The encryption and decryption key dynamic being being currently used is newer, once AP negotiates new key with AC again from a safety viewpoint, that
AC must go the cipher key index value of update AP according to newest key.
The present invention is also corresponding to propose a kind of device using shared key based on CAPWAP, including multiple AP and one
AC, before DTLS hand shakings, there are one AC resource pools for the distribution of the ends AC, and there are one AP resource pools and pre-master for each ends AP distribution
Key resource pool.
Each AP includes the ends AP random number selecting unit, pre-master key selection unit and AP master key calculation units, AC
Including the ends AC random number selecting unit, AC master key calculations unit, key comparing unit and Key Assignment Unit, in DTLS sessions
In the step S102 of handshake procedure, the ends AC random number selecting unit randomly chooses 32 byte datas in AC resource pools, hair
The ends AP are given, in step S101, the ends AP random number selecting unit randomly chooses 32 byte datas in AP resource pools, hair
The ends AC are given, in step S108, the ends AP random number selecting unit selects 48 byte datas, hair in pre- master key resource pool
Give the ends AC.Then, AP master key calculations unit and AC master key calculations unit are each by the ends AC random number, the ends AP random number
With these three data of pre- master key, master key is calculated, to obtain respective DTLS encryption and decryption key.
Key comparing unit is used for when the ends AC chip stores the DTLS encryption and decryption keys of each AP, close by what is currently preserved
Key is compared with all keys preserved in the storage region of the ends AC chip, if having identical, Key Assignment Unit is to current
AP distributes the index value of an AP identical with its key.
The technology contents and technical characteristic of the present invention have revealed that as above, however those skilled in the art still may base
Make various replacements and modification without departing substantially from spirit of that invention, therefore, the scope of the present invention in teachings of the present invention and announcement
It should be not limited to the revealed content of embodiment, and should include various replacements and modification without departing substantially from the present invention, and be this patent Shen
Please claim covered.
Claims (6)
1. a kind of method using shared key based on CAPWAP, it is characterised in that:This method is applied to multiple AP and AC
During carrying out CAPWAP communications, the method includes:
AC and AP calculates master key each by the ends AC random number, the ends AP random number and pre- master key these three data, to
Obtain DTLS encryption and decryption keys:Before DTLS hand shakings, an AC resource pool is distributed to the ends AC, an AP is distributed to the ends AP
Resource pool and pre- master key resource pool, during DTLS hand shakings, the ends AC randomly choose an AC in the AC resource pools
End random number is sent to the ends AP, and the ends AP randomly choose the ends an AP random number in the AP resource pools and are sent to the ends AC, and the ends AP exist
The pre- master key resource pool selects a pre- master key to be sent to the ends AC;
When the ends AC chip stores the DTLS encryption and decryption keys of each AP, by the storage region of the key currently preserved and the ends AC chip
In all keys for having preserved compare, if having identical, the index value of an AP identical with its key is distributed to current AP.
2. the method according to claim 1 for using shared key based on CAPWAP, which is characterized in that the ends AC chip
Mapping relations between the encryption and decryption key of the AP of middle storage and its corresponding index value are added according to what AP was being currently used
Decruption key dynamic is newer.
3. the method according to claim 1 or 2 for using shared key based on CAPWAP, which is characterized in that the ends AC
The length of random number and the ends AP random number is 32 bytes, and the length of the pre- master key is 48 bytes.
4. a kind of device using shared key based on CAPWAP, it is characterised in that:It is each described including multiple AP and AC
AP includes AP master key calculation units, and the AC includes AC master key calculations unit, key comparing unit and encryption key distribution list
Member, the AP master key calculations unit and AC master key calculations unit are each by the ends AC random number, the ends AP random number and pre-master
These three data of key, calculate master key, to obtain respective DTLS encryption and decryption key:Before DTLS hand shakings,
There are one AC resource pools for the distribution of the ends AC, and there are one AP resource pools and pre- master key resource pools for the distribution of the ends AP, and the ends AC further include
The ends AC random number selecting unit, the ends AP further include the ends AP random number selecting unit and pre-master key selection unit, in DTLS
During hand shaking, the ends the AC random number selecting unit is used to randomly choose the ends an AC random number in the AC resource pools
The ends AP are sent to, the ends the AP random number selecting unit is used to randomly choose the ends an AP random number in the AP resource pools and send
The ends AC, the pre-master key selection unit to be used to select a pre- master key to be sent to AC in the pre- master key resource pool
End;The key comparing unit is used for when the ends AC chip stores the DTLS encryption and decryption keys of each AP, close by what is currently preserved
Key is compared with all keys preserved in the storage region of the ends AC chip, if having identical, the Key Assignment Unit is given
Current AP distributes the index value of an AP identical with its key.
5. the device according to claim 4 for using shared key based on CAPWAP, which is characterized in that the ends AC chip
Mapping relations between the encryption and decryption key of the AP of middle storage and its corresponding index value are added according to what AP was being currently used
Decruption key dynamic is newer.
6. the device according to claim 4 or 5 for using shared key based on CAPWAP, which is characterized in that the ends AC
The length of random number and the ends AP random number is 32 bytes, and the length of the pre- master key is 48 bytes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510611882.XA CN105162791B (en) | 2015-09-23 | 2015-09-23 | The method and device of shared key is used based on CAPWAP |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510611882.XA CN105162791B (en) | 2015-09-23 | 2015-09-23 | The method and device of shared key is used based on CAPWAP |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105162791A CN105162791A (en) | 2015-12-16 |
CN105162791B true CN105162791B (en) | 2018-07-17 |
Family
ID=54803545
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510611882.XA Active CN105162791B (en) | 2015-09-23 | 2015-09-23 | The method and device of shared key is used based on CAPWAP |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105162791B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105611529B (en) * | 2015-12-31 | 2019-05-03 | 盛科网络(苏州)有限公司 | The chip implementing method of CAPWAP DTLS message encryption and decryption |
CN105591752B (en) * | 2015-12-31 | 2019-01-08 | 盛科网络(苏州)有限公司 | A kind of method and device reducing DTLS decryption time delay |
CN106454826B (en) * | 2016-09-30 | 2020-04-07 | 新华三技术有限公司 | Method and device for AP to access AC |
CN107484227B (en) * | 2017-09-01 | 2021-01-01 | 天津赞普科技股份有限公司 | Wifi networking multi-hot-spot control communication method |
CN108964896B (en) * | 2018-06-28 | 2021-01-05 | 如般量子科技有限公司 | Kerberos identity authentication system and method based on group key pool |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1534935A (en) * | 2003-03-31 | 2004-10-06 | 华为技术有限公司 | A key distribution method based on pre-shared key |
CN1564514A (en) * | 2004-03-26 | 2005-01-12 | 中兴通讯股份有限公司 | Self arranged net mode shared key authentication and conversation key consulant method of radio LAN |
WO2013041033A1 (en) * | 2011-09-21 | 2013-03-28 | Hangzhou H3C Technologies Co., Ltd. | Access points to access an access controller in a wireless local area network |
CN103532720A (en) * | 2013-10-22 | 2014-01-22 | 杭州华三通信技术有限公司 | Transmission method and equipment of CAPWAP message |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080072047A1 (en) * | 2006-09-20 | 2008-03-20 | Futurewei Technologies, Inc. | Method and system for capwap intra-domain authentication using 802.11r |
-
2015
- 2015-09-23 CN CN201510611882.XA patent/CN105162791B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1534935A (en) * | 2003-03-31 | 2004-10-06 | 华为技术有限公司 | A key distribution method based on pre-shared key |
CN1564514A (en) * | 2004-03-26 | 2005-01-12 | 中兴通讯股份有限公司 | Self arranged net mode shared key authentication and conversation key consulant method of radio LAN |
WO2013041033A1 (en) * | 2011-09-21 | 2013-03-28 | Hangzhou H3C Technologies Co., Ltd. | Access points to access an access controller in a wireless local area network |
CN103532720A (en) * | 2013-10-22 | 2014-01-22 | 杭州华三通信技术有限公司 | Transmission method and equipment of CAPWAP message |
Also Published As
Publication number | Publication date |
---|---|
CN105162791A (en) | 2015-12-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105162791B (en) | The method and device of shared key is used based on CAPWAP | |
JP5053424B2 (en) | RELAY DEVICE, WIRELESS COMMUNICATION DEVICE, NETWORK SYSTEM, PROGRAM, AND METHOD | |
JP5597676B2 (en) | Key material exchange | |
TWI393414B (en) | Secure session keys context | |
CN108510270B (en) | Mobile transfer method with safe quantum | |
CN104641617B (en) | A kind of cipher key interaction method and device | |
EP1106000B1 (en) | Secure processing for authentication of a wireless communications device | |
CN103491531B (en) | Power system WiMAX wireless communication networks uses the method that quantum key improves power information transmission security | |
WO2020260751A1 (en) | Encrypted communication based on quantum key | |
CN110891269B (en) | Data protection method, equipment and system | |
WO2020030153A1 (en) | Dual-connection communication method and device thereof, and system | |
CN106134231A (en) | Key generation method, equipment and system | |
WO2014109968A1 (en) | Secure radio access with inter-enb carrier aggregation | |
EP2517490A2 (en) | A multi-band/multi-link secure key generation and delivery protocol | |
CN106465101A (en) | System and method for wireless network access protection and security architecture | |
CN104620549B (en) | Key stream is aligned with the streaming of unjustified data flow | |
EP2648437B1 (en) | Method, apparatus and system for key generation | |
JP2023503378A (en) | Wireless network switching method and equipment | |
CN110943835A (en) | Distribution network encryption method and system for sending wireless local area network information | |
US8631234B2 (en) | Apparatus and method for establishing encryption information common to a plurality of communication paths coupling two apparatuses | |
CN104185177B (en) | A kind of safety key managing method, device and system | |
CN101431408B (en) | Encryption apparatus capable of implementing connection between communication terminal and wireless local area network | |
CN114285550A (en) | Quantum security key service network, system and node device | |
US20180198605A1 (en) | Key Distribution and Receiving Method, Key Management Center, First Network Element, and Second Network Element | |
CN101577737A (en) | Wireless network card compatible with 802.11i safety standard and WAPI safety standard |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 215000 unit 13 / 16, 4th floor, building B, No.5 Xinghan street, Suzhou Industrial Park, Jiangsu Province Patentee after: Suzhou Shengke Communication Co.,Ltd. Address before: 215000 unit 13 / 16, 4th floor, building B, No.5 Xinghan street, Suzhou Industrial Park, Jiangsu Province Patentee before: CENTEC NETWORKS (SU ZHOU) Co.,Ltd. |