[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105162791B - The method and device of shared key is used based on CAPWAP - Google Patents

The method and device of shared key is used based on CAPWAP Download PDF

Info

Publication number
CN105162791B
CN105162791B CN201510611882.XA CN201510611882A CN105162791B CN 105162791 B CN105162791 B CN 105162791B CN 201510611882 A CN201510611882 A CN 201510611882A CN 105162791 B CN105162791 B CN 105162791B
Authority
CN
China
Prior art keywords
key
random number
master key
dtls
capwap
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510611882.XA
Other languages
Chinese (zh)
Other versions
CN105162791A (en
Inventor
马千里
方沛昱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Centec Communications Co Ltd
Original Assignee
Centec Networks Suzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Centec Networks Suzhou Co Ltd filed Critical Centec Networks Suzhou Co Ltd
Priority to CN201510611882.XA priority Critical patent/CN105162791B/en
Publication of CN105162791A publication Critical patent/CN105162791A/en
Application granted granted Critical
Publication of CN105162791B publication Critical patent/CN105162791B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

Present invention is disclosed a kind of method and devices using shared key based on CAPWAP, during CAPWAP communications being carried out applied to multiple AP and AC, by giving AC and AP to distribute random number resource pool in advance, so that AC and AP selects random number inside respective resource pool, and respective DTLS encryption and decryption key is calculated by corresponding random number, the ends AC chip is when storing the DTLS encryption and decryption keys of each AP, the same cipher key index value is distributed to the identical AP of key, the same DTLS encryption and decryption key can be shared by just realizing multiple AP in this way, so as to reduce the area of AC chips, power consumption, cost, in turn ensure internet security.

Description

The method and device of shared key is used based on CAPWAP
Technical field
The present invention relates to CAPWAP agreements, more particularly, to a kind of method and dress using shared key based on CAPWAP It sets.
Background technology
Traditional WLAN (Wireless Local Area Networks, Wireless LAN) network be all for enterprise or The access of a small amount of mobile subscriber in family and set up.Therefore, usually only need a wireless router that can solve the problems, such as .But after the scale of wireless access and density reache a certain level, traditional wireless router is in deployment and management It will go wrong.
Thin AP (access point)+AC (access controller) is another framework after fat AP, and wherein AC is responsible for wireless network The access of network controls, forwarding and statistics, the configuration monitoring of AP, roaming management, the network management agent of AP, security control, in the framework In thin AP can work independently, it is necessary to and AC is used cooperatively, and can allow them can then requiring a kind of agreement between the two It is interconnected and is linked up.Then, the AC of the AP and B producers of IETF A producers caused by order to solve tunnel protocol incompatibility problem Can not carry out intercommunication, set up in 2005 CAPWAP working groups between standardized A P and AC tunnel protocol (rfc5415, rfc5416)。
It is described according to rfc5415, the data between AP and AC are ravesdropping in order to prevent, using DTLS (data packet transport layers Security protocol) encryption and decryption processing is carried out to its data packet, for the communication that guarantees network security.Rfc5415 defines DTLS simultaneously The enciphering and deciphering algorithm TLS_RSA_WITH_AES_128_CBC_SHA that must be supported when for encrypting CAPWAP message, the algorithm Meaning is:The DTLS protocol handshake stages use the asymmetric enciphering and deciphering algorithms of RSA, data transfer phase to use the AES of CBC patterns 128 enciphering and deciphering algorithms, while using the integrality of SHA checking algorithms guarantee data.The key length of 128 algorithms of AES is The key length of 128bits, SHA algorithm is 160bits.Chip-scale supports DTLS encryption/decryption modules, needs each tunnels AP-AC Unidirectional data preserve the key data of 128+160=288bits, and two-way communication then needs to preserve the cipher key number of 576bits According to.One AC supports N number of AP, then the key data storage consumed is also required to N times, this to the area of chip interior, power consumption, at This is all no small cost.
In an existing technical solution, it is the rank of shaking hands in DTLS sessions that DTLS encryption and decryption, which needs the key used, Section, is obtained by AP and AC joint consultations, and AC chips are necessary for the key that each AP safeguards a group encryption/decryption in this scenario, have Several AP will safeguard several group keys.When AP substantial amounts, a large amount of storage region will be consumed and go to preserve key, to increase The area of large chip, cost.In another existing technical solution, the key of DTLS encryption and decryption does not pass through DTLS between AP and AC The form of handshake phase certificate carrys out dynamic negotiation, but by user manually by cipher key configuration into AP and AC, this is exactly pre- Shared keys, the data between AP and AC just carry out encryption and decryption operation by the key of user's static configuration.Pass through pre- Shared keys, user is it is also possible that multiple AP share the same key.From the angle of network security, data quilt in order to prevent Eavesdropping, CAPWAP agreements need DTLS intermittently to replace key, but pre-shared keys are user's static configurations, unless User updates manually, and otherwise this key will not change, and safety reduces.
Invention content
It is an object of the invention to overcome the deficiencies of existing technologies, a kind of side using shared key based on CAPWAP is provided Method and device when realizing that the different AP and same AC carries out CAPWAP communications, can use shared DTLS encryption and decryption close Key carries out encryption and decryption to CAPWAP data.
To achieve the above object, the following technical solutions are proposed by the present invention:A kind of side using shared key based on CAPWAP Method, during this method is applied to multiple AP and AC progress CAPWAP communications, the method includes:
AC and AP calculates master key each by the ends AC random number, the ends AP random number and pre- master key these three data, To obtain DTLS encryption and decryption keys;
When the ends AC chip stores the DTLS encryption and decryption keys of each AP, by the storage of the key currently preserved and the ends AC chip All keys preserved in region compare, if having it is identical, to current AP distribute an AP identical with its key rope Draw value.
Preferably, before DTLS hand shakings, an AC resource pool is distributed to the ends AC, an AP resource is distributed to the ends AP Pond and pre- master key resource pool.
Preferably, during DTLS hand shakings, the ends AC randomly choose the ends an AC random number in the AC resource pools The ends AP are sent to, the ends AP randomly choose the ends an AP random number in the AP resource pools and are sent to the ends AC, and the ends AP are in the pre-master Key resource pool selects a pre- master key to be sent to the ends AC.
Preferably, the mapping between the encryption and decryption key and its corresponding index value of the AP stored in the chip of the ends AC is closed System is that the encryption and decryption key dynamic that is being currently used according to AP is newer.
Preferably, the length of the ends AC random number and the ends AP random number is 32 bytes, and the length of the pre- master key is 48 bytes.
The invention also provides a kind of devices using shared key based on CAPWAP, including multiple AP and AC, often A AP includes AP master key calculation units, and the AC includes AC master key calculations unit, key comparing unit and key Allocation unit, the AP master key calculations unit and AC master key calculations unit are each by the ends AC random number, the ends AP random number With these three data of pre- master key, master key is calculated, to obtain respective DTLS encryption and decryption key;The key is more single Member is used for when the ends AC chip stores the DTLS encryption and decryption keys of each AP, by the storage of the key currently preserved and the ends AC chip All keys preserved in region compare, if having it is identical, the Key Assignment Unit to current AP distribute one and its The index value of the identical AP of key.
Preferably, before DTLS hand shakings, there are one AC resource pools for the distribution of the ends AC, and there are one AP resources for the distribution of the ends AP Pond and pre- master key resource pool.
Preferably, the ends AC further include the ends AC random number selecting unit, and the ends AP further include the random number selection of the ends AP Unit and pre-master key selection unit, during DTLS hand shakings, the ends the AC random number selecting unit is used for described AC resource pools randomly choose the ends an AC random number and are sent to the ends AP, and the ends the AP random number selecting unit is used to provide in the AP Source pond randomly chooses the ends an AP random number and is sent to the ends AC, and the pre-master key selection unit is used to provide in the pre- master key Source pond selects a pre- master key to be sent to the ends AC.
Present invention incorporates existing DTLS keys to be configured by certificate dynamic generation and static state pre-shared (pre-share) The advantages of two ways, by giving AC and AP to distribute random number resource pool in advance so that AC and AP is inside respective resource pool Select random number.It can ensure that identical random number resource is selected in multiple tunnels AP-AC by resource pool, to which phase be calculated Same key.Based on this mode, multiple AP can share the same key, and chip is saved compared to certificate dynamic generation mode Valuable memory space improves memory space utilization rate, reduces chip cost, is then improved compared to static pre-shared configurations Internet security.
Therefore, compared with prior art, the beneficial effects of the invention are as follows:The invention enables the different AP and same AC into When row CAPWAP communications, shared DTLS encryption and decryption key pair CAPWAP data can be used to carry out encryption and decryption, to need Under the premise of stringent control chip storage region area and cost, the secure communication between AP and AC still can be ensured by DTLS.
Description of the drawings
Fig. 1 is the principle schematic of existing DTLS hand shakings flow;
Fig. 2 is the flow diagram using the method for shared key the present invention is based on CAPWAP;
Fig. 3 is the mapping relations between the encryption and decryption key and index value of the AP stored in the chip of the ends AC of the embodiment of the present invention Schematic diagram.
Specific implementation mode
Below in conjunction with the attached drawing of the present invention, clear, complete description is carried out to the technical solution of the embodiment of the present invention.
As shown in Figure 1, in technology of the existing DTLS keys by certificate dynamic generation, DTLS encryption and decryption needs are used Key is the handshake phase in DTLS sessions, is obtained by AP and AC joint consultations, i.e., the negotiation of AP and AC keys is by step S101 ~S113 is determined.
Specifically, the 32 byte random numbers generated comprising the ends AC in step S102 and S104, step S101 and S103 In comprising the ends AP generate a 32 byte random numbers, step S105 is the digital certificate that the ends AC are sent out to the ends AP, is on the one hand used for AP differentiates the identity of AC, on the one hand includes the public key of AC;AP is in step S108, first in local random one 48 byte of generation Then pre- master key carries out rsa encryption with the public key that step S105 is obtained, issues AC, then AC will be pre- by the private key of oneself Master key is decrypted.At this point, AC and AP have recorded three numbers:The ends AC random number, the ends AP random number, pre- master key.Final DTLS encryption and decryption key is then calculated by these three numbers.AC and AP are respectively calculated, and are respectively stored in local.Final step S111 and step S113 is the encrypted ciphertext of key that both sides' reception generates, and then indicates that key agreement is complete after successful decryption At.
A kind of disclosed method using shared key based on CAPWAP is shaken hands not influencing standard DTLS Under the premise of agreement flow, by the create-rule for optimizing AP random numbers and AC random numbers, pre- master key so that different AP- The tunnels AC generate identical encryption and decryption key, to realize that multiple AP can share the same DTLS encryption and decryption key.
Specifically, since the encryption and decryption key of DTLS is by a 32 byte random number of the ends AC, 32 byte random number of the ends AP It is calculated with the pre- master key of 48 byte of the ends AP these three data, so the present invention before DTLS hand shakings, gives the ends AC Distribute a 32 byte random number resource pools, a 32 byte random number resource pools and the pre- master key resource of 48 bytes are distributed in the ends AP Pond.Since the handshake procedure of DTLS is safeguarded by the respective system softwares of AC and AP, so the resource pool that the present invention distributes Any hardware resource is not consumed.And the size of resource pool, it can be according to the big of the key storage region that the ends AC chip is supported Small dynamic adjustment, such as three resource pools have 10,20,30 resources respectively, then can generate 10 × 20 × 30=6000 in total A key.
In this way, in step s 102, the ends AC randomly choose 32 byte datas in the resource pool of oneself, are sent to AP End, in step S101, the ends AP randomly choose 32 byte datas in the resource pool of oneself, the ends AC are sent to, in step In S108, the ends AP select 48 byte datas in pre- master key resource pool, are sent to the ends AC.
Then AP and AC calculates master each by the ends AC random number, the ends AP random number and pre- master key these three data Key, to obtain respective DTLS encryption and decryption key.For AC, key is stored in depositing in local switch chip Storage area domain, AC chips are that each AP distributes an index value, and the key of the encryption and decryption in reading storage region is removed by the value.
In the present invention, when at the ends AC, chip stores the encryption and decryption key of each AP, need the key currently preserved and its The key of all AP of saved mistake compares in storage region, if it find that there is identical key (as just at three What is selected in resource pool is identical random number), then give this AP cipher key index values for distributing that AP identical with its key. As shown in Fig. 2, AP1, AP5 and AP7, which are shared, enjoys key 1, and AP2 and AP3 shared keys 2, AP4 and AP6 shared keys 3, AP8 uses Key 4, APm use key k.In this way, the present invention, which just realizes multiple AP, can share the same DTLS encryption and decryption key, to The areas of AC chips, power consumption, cost can be reduced, in turn ensures internet security.
Mapping relations between the encryption and decryption key of the AP stored in the chip of the ends AC and its corresponding index value are according to AP The encryption and decryption key dynamic being being currently used is newer, once AP negotiates new key with AC again from a safety viewpoint, that AC must go the cipher key index value of update AP according to newest key.
The present invention is also corresponding to propose a kind of device using shared key based on CAPWAP, including multiple AP and one AC, before DTLS hand shakings, there are one AC resource pools for the distribution of the ends AC, and there are one AP resource pools and pre-master for each ends AP distribution Key resource pool.
Each AP includes the ends AP random number selecting unit, pre-master key selection unit and AP master key calculation units, AC Including the ends AC random number selecting unit, AC master key calculations unit, key comparing unit and Key Assignment Unit, in DTLS sessions In the step S102 of handshake procedure, the ends AC random number selecting unit randomly chooses 32 byte datas in AC resource pools, hair The ends AP are given, in step S101, the ends AP random number selecting unit randomly chooses 32 byte datas in AP resource pools, hair The ends AC are given, in step S108, the ends AP random number selecting unit selects 48 byte datas, hair in pre- master key resource pool Give the ends AC.Then, AP master key calculations unit and AC master key calculations unit are each by the ends AC random number, the ends AP random number With these three data of pre- master key, master key is calculated, to obtain respective DTLS encryption and decryption key.
Key comparing unit is used for when the ends AC chip stores the DTLS encryption and decryption keys of each AP, close by what is currently preserved Key is compared with all keys preserved in the storage region of the ends AC chip, if having identical, Key Assignment Unit is to current AP distributes the index value of an AP identical with its key.
The technology contents and technical characteristic of the present invention have revealed that as above, however those skilled in the art still may base Make various replacements and modification without departing substantially from spirit of that invention, therefore, the scope of the present invention in teachings of the present invention and announcement It should be not limited to the revealed content of embodiment, and should include various replacements and modification without departing substantially from the present invention, and be this patent Shen Please claim covered.

Claims (6)

1. a kind of method using shared key based on CAPWAP, it is characterised in that:This method is applied to multiple AP and AC During carrying out CAPWAP communications, the method includes:
AC and AP calculates master key each by the ends AC random number, the ends AP random number and pre- master key these three data, to Obtain DTLS encryption and decryption keys:Before DTLS hand shakings, an AC resource pool is distributed to the ends AC, an AP is distributed to the ends AP Resource pool and pre- master key resource pool, during DTLS hand shakings, the ends AC randomly choose an AC in the AC resource pools End random number is sent to the ends AP, and the ends AP randomly choose the ends an AP random number in the AP resource pools and are sent to the ends AC, and the ends AP exist The pre- master key resource pool selects a pre- master key to be sent to the ends AC;
When the ends AC chip stores the DTLS encryption and decryption keys of each AP, by the storage region of the key currently preserved and the ends AC chip In all keys for having preserved compare, if having identical, the index value of an AP identical with its key is distributed to current AP.
2. the method according to claim 1 for using shared key based on CAPWAP, which is characterized in that the ends AC chip Mapping relations between the encryption and decryption key of the AP of middle storage and its corresponding index value are added according to what AP was being currently used Decruption key dynamic is newer.
3. the method according to claim 1 or 2 for using shared key based on CAPWAP, which is characterized in that the ends AC The length of random number and the ends AP random number is 32 bytes, and the length of the pre- master key is 48 bytes.
4. a kind of device using shared key based on CAPWAP, it is characterised in that:It is each described including multiple AP and AC AP includes AP master key calculation units, and the AC includes AC master key calculations unit, key comparing unit and encryption key distribution list Member, the AP master key calculations unit and AC master key calculations unit are each by the ends AC random number, the ends AP random number and pre-master These three data of key, calculate master key, to obtain respective DTLS encryption and decryption key:Before DTLS hand shakings, There are one AC resource pools for the distribution of the ends AC, and there are one AP resource pools and pre- master key resource pools for the distribution of the ends AP, and the ends AC further include The ends AC random number selecting unit, the ends AP further include the ends AP random number selecting unit and pre-master key selection unit, in DTLS During hand shaking, the ends the AC random number selecting unit is used to randomly choose the ends an AC random number in the AC resource pools The ends AP are sent to, the ends the AP random number selecting unit is used to randomly choose the ends an AP random number in the AP resource pools and send The ends AC, the pre-master key selection unit to be used to select a pre- master key to be sent to AC in the pre- master key resource pool End;The key comparing unit is used for when the ends AC chip stores the DTLS encryption and decryption keys of each AP, close by what is currently preserved Key is compared with all keys preserved in the storage region of the ends AC chip, if having identical, the Key Assignment Unit is given Current AP distributes the index value of an AP identical with its key.
5. the device according to claim 4 for using shared key based on CAPWAP, which is characterized in that the ends AC chip Mapping relations between the encryption and decryption key of the AP of middle storage and its corresponding index value are added according to what AP was being currently used Decruption key dynamic is newer.
6. the device according to claim 4 or 5 for using shared key based on CAPWAP, which is characterized in that the ends AC The length of random number and the ends AP random number is 32 bytes, and the length of the pre- master key is 48 bytes.
CN201510611882.XA 2015-09-23 2015-09-23 The method and device of shared key is used based on CAPWAP Active CN105162791B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510611882.XA CN105162791B (en) 2015-09-23 2015-09-23 The method and device of shared key is used based on CAPWAP

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510611882.XA CN105162791B (en) 2015-09-23 2015-09-23 The method and device of shared key is used based on CAPWAP

Publications (2)

Publication Number Publication Date
CN105162791A CN105162791A (en) 2015-12-16
CN105162791B true CN105162791B (en) 2018-07-17

Family

ID=54803545

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510611882.XA Active CN105162791B (en) 2015-09-23 2015-09-23 The method and device of shared key is used based on CAPWAP

Country Status (1)

Country Link
CN (1) CN105162791B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105611529B (en) * 2015-12-31 2019-05-03 盛科网络(苏州)有限公司 The chip implementing method of CAPWAP DTLS message encryption and decryption
CN105591752B (en) * 2015-12-31 2019-01-08 盛科网络(苏州)有限公司 A kind of method and device reducing DTLS decryption time delay
CN106454826B (en) * 2016-09-30 2020-04-07 新华三技术有限公司 Method and device for AP to access AC
CN107484227B (en) * 2017-09-01 2021-01-01 天津赞普科技股份有限公司 Wifi networking multi-hot-spot control communication method
CN108964896B (en) * 2018-06-28 2021-01-05 如般量子科技有限公司 Kerberos identity authentication system and method based on group key pool

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1534935A (en) * 2003-03-31 2004-10-06 华为技术有限公司 A key distribution method based on pre-shared key
CN1564514A (en) * 2004-03-26 2005-01-12 中兴通讯股份有限公司 Self arranged net mode shared key authentication and conversation key consulant method of radio LAN
WO2013041033A1 (en) * 2011-09-21 2013-03-28 Hangzhou H3C Technologies Co., Ltd. Access points to access an access controller in a wireless local area network
CN103532720A (en) * 2013-10-22 2014-01-22 杭州华三通信技术有限公司 Transmission method and equipment of CAPWAP message

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080072047A1 (en) * 2006-09-20 2008-03-20 Futurewei Technologies, Inc. Method and system for capwap intra-domain authentication using 802.11r

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1534935A (en) * 2003-03-31 2004-10-06 华为技术有限公司 A key distribution method based on pre-shared key
CN1564514A (en) * 2004-03-26 2005-01-12 中兴通讯股份有限公司 Self arranged net mode shared key authentication and conversation key consulant method of radio LAN
WO2013041033A1 (en) * 2011-09-21 2013-03-28 Hangzhou H3C Technologies Co., Ltd. Access points to access an access controller in a wireless local area network
CN103532720A (en) * 2013-10-22 2014-01-22 杭州华三通信技术有限公司 Transmission method and equipment of CAPWAP message

Also Published As

Publication number Publication date
CN105162791A (en) 2015-12-16

Similar Documents

Publication Publication Date Title
CN105162791B (en) The method and device of shared key is used based on CAPWAP
JP5053424B2 (en) RELAY DEVICE, WIRELESS COMMUNICATION DEVICE, NETWORK SYSTEM, PROGRAM, AND METHOD
JP5597676B2 (en) Key material exchange
TWI393414B (en) Secure session keys context
CN108510270B (en) Mobile transfer method with safe quantum
CN104641617B (en) A kind of cipher key interaction method and device
EP1106000B1 (en) Secure processing for authentication of a wireless communications device
CN103491531B (en) Power system WiMAX wireless communication networks uses the method that quantum key improves power information transmission security
WO2020260751A1 (en) Encrypted communication based on quantum key
CN110891269B (en) Data protection method, equipment and system
WO2020030153A1 (en) Dual-connection communication method and device thereof, and system
CN106134231A (en) Key generation method, equipment and system
WO2014109968A1 (en) Secure radio access with inter-enb carrier aggregation
EP2517490A2 (en) A multi-band/multi-link secure key generation and delivery protocol
CN106465101A (en) System and method for wireless network access protection and security architecture
CN104620549B (en) Key stream is aligned with the streaming of unjustified data flow
EP2648437B1 (en) Method, apparatus and system for key generation
JP2023503378A (en) Wireless network switching method and equipment
CN110943835A (en) Distribution network encryption method and system for sending wireless local area network information
US8631234B2 (en) Apparatus and method for establishing encryption information common to a plurality of communication paths coupling two apparatuses
CN104185177B (en) A kind of safety key managing method, device and system
CN101431408B (en) Encryption apparatus capable of implementing connection between communication terminal and wireless local area network
CN114285550A (en) Quantum security key service network, system and node device
US20180198605A1 (en) Key Distribution and Receiving Method, Key Management Center, First Network Element, and Second Network Element
CN101577737A (en) Wireless network card compatible with 802.11i safety standard and WAPI safety standard

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 215000 unit 13 / 16, 4th floor, building B, No.5 Xinghan street, Suzhou Industrial Park, Jiangsu Province

Patentee after: Suzhou Shengke Communication Co.,Ltd.

Address before: 215000 unit 13 / 16, 4th floor, building B, No.5 Xinghan street, Suzhou Industrial Park, Jiangsu Province

Patentee before: CENTEC NETWORKS (SU ZHOU) Co.,Ltd.