会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link securely
    • 用于通过无线链路可靠地接入移动终端到WLAN和进行数据通信的方法
    • US08726022B2
    • 2014-05-13
    • US10534067
    • 2003-08-05
    • Manxia TieHoujian TangBianling ZhangNing ZhangXumao Ye
    • Manxia TieHoujian TangBianling ZhangNing ZhangXumao Ye
    • H04L29/06
    • H04W12/06H04L63/0442H04L63/0823H04L63/0869H04L63/10H04W8/00H04W12/04H04W80/04H04W84/12
    • The present invention relates to a method for the secure access of mobile terminal to the Wireless Local Area Network (WLAN) and for secure data communication via wireless link, which, combining the common key encryption technology and the symmetry encryption technology, has resolved the failure in WLAN to provide effective control on secure MT access, and overcome the limitation on the confidentiality of the data communication via wireless link. When MT logs on AP, both parts must perform the certificate authentication through AS. Only the MT holding the legitimate certificate can access to AP holing the legitimate certificate; MT and AP perform the negotiation of common key for conversation, complete the dynamic revision of the secret key in each authentication, each secret key and in the process of conversation to achieve confidential data communication. Anyway, the method has not only achieved control on the access of MT, but also ensured the security of MT access and high confidentiality of communication.
    • 本发明涉及移动终端安全接入无线局域网(WLAN)和通过无线链路进行安全数据通信的方法,其结合了公共密钥加密技术和对称加密技术,解决了故障 在WLAN中提供对安全MT接入的有效控制,并克服了通过无线链路对数据通信的机密性的限制。 当MT登录AP时,两个部分必须通过AS执行证书认证。 只有持有合法证书的MT才能访问AP合法证书; MT和AP执行会话通用密钥的协商,在每个认证,每个密钥和对话过程中完成密钥的动态修改,实现机密数据通信。 无论如何,该方法不仅可以实现对MT的访问控制,而且可以保证MT接入的安全性和高度的通信机密性。
    • 2. 发明申请
    • PEER-TO-PEER ACCESS CONTROL METHOD OF TRIPLE UNIT STRUCTURE
    • 三重单元结构的对等接入控制方法
    • US20100037302A1
    • 2010-02-11
    • US12519955
    • 2007-06-25
    • Xiaolong LaiJun CaoManxia TieBianling Zhang
    • Xiaolong LaiJun CaoManxia TieBianling Zhang
    • H04L29/06
    • H04L63/0869
    • This invention relates to a peer-to-peer access control method of a triple-unit structure for safely implementing bidirectional authentication between the terminal and the network. According to the method, on the basis of the access control method of the existing double-unit triple-entity structure, the authenticator function is implemented in the access controller, and the authentication protocol function is implemented in the terminal and the access controller, so that the terminal, the access controller and the server all participate in the authentication, and the trust relationship is established between the terminal and the access controller directly, which renders security very reliable. The invention not only solves the technical problems of the access control method of the existing double-unit double-entity structure that the access flexibility is limited and the extension of the number of the access controllers is inconvenient, but also solves the technical problems of the existing access control method of the double-unit triple-entity structure that the process for establishing the trust relationship is complicated and the security of the network may be influenced, thus achieving advantages of high security performance, no requirement of changing existing network structures and relative independency of the authentication protocol.
    • 本发明涉及用于在终端和网络之间安全地实现双向认证的三单元结构的对等接入控制方法。 根据该方法,在现有的双单元三实体结构的访问控制方法的基础上,在接入控制器中实现认证方的功能,在终端和接入控制器中实现认证协议功能, 终端,接入控制器和服务器都参与认证,直接在终端和接入控制器之间建立信任关系,使安全性非常可靠。 本发明不仅解决了现有的双单元双实体结构的访问控制方法的技术问题,即访问灵活性有限,访问控制器数量的扩展不方便,而且解决了 建立信任关系的过程复杂,网络安全性可能受影响的双单元三实体结构的现有访问控制方法,从而实现高安全性能的优势,无需改变现有网络结构和相对性 认证协议的独立性。
    • 6. 发明授权
    • Peer-to-peer access control method based on ports
    • 基于端口的对等访问控制方法
    • US08176325B2
    • 2012-05-08
    • US11816715
    • 2006-02-21
    • Xiaolong LaiJun CaoBianling ZhangZhenhai HuangHong Guo
    • Xiaolong LaiJun CaoBianling ZhangZhenhai HuangHong Guo
    • H04L29/06
    • H04L63/0869H04L9/0894H04L9/321H04L2209/80
    • A port based peer access control method, comprises the steps of: 1) enabling the authentication control entity; 2) two authentication control entities authenticating each other; 3) setting the status of the controlled port. The method may further comprise the steps of enabling the authentication server entity, two authentication subsystems negotiating the key. By modifying the asymmetry of background technique, the invention has advantages of peer control, distinguishable authentication control entity, good scalability, good security, simple key negotiation process, relatively complete system, high flexibility, thus the invention can satisfy the requirements of central management as well as resolve the technical issues of the prior network access control method, including complex process, poor security, poor scalability, so it provides essential guarantee for secure network access.
    • 一种基于端口的对等接入控制方法,包括步骤:1)启用认证控制实体; 2)两个认证控制实体相互认证; 3)设置受控端口的状态。 该方法还可以包括以下步骤:启用认证服务器实体,两个认证子系统协商该密钥。 通过修改背景技术的不对称性,本发明具有对等控制,可区分认证控制实体,良好的可扩展性,良好的安全性,简单的密钥协商过程,系统相对完整,灵活性高等优点,因此本发明可以满足中央管理的要求 解决现有网络访问控制方法的技术问题,包括复杂过程,安全性差,可扩展性差,为安全网络访问提供了必要的保证。
    • 8. 发明授权
    • Method for protecting the first message of security protocol
    • 保护安全协议第一条消息的方法
    • US08572378B2
    • 2013-10-29
    • US13140632
    • 2009-12-07
    • Xiaolong LaiJun CaoYuelei XiaoManxia TieZhenhai HuangBianling ZhangYanan Hu
    • Xiaolong LaiJun CaoYuelei XiaoManxia TieZhenhai HuangBianling ZhangYanan Hu
    • H04L29/06
    • H04W12/10H04L9/0838H04L9/3242H04L9/3273H04L63/123H04L2209/80
    • The present invention provides a method for protecting the first message of a security protocol and the method includes the following steps: 1) initialization step; 2) the initiating side sends the first message; 3) the responding side receives the first message. The method for protecting the first message of the security protocol provided by the present invention can implement that: 1) Pre-Shared Master Key (PSMK), which is shared by the initiating side and responding side, and the security parameter in the first message are bound by using computation function of Message Integrality Code (MIC) or Message Authentication Code (MAC), and thus the fabrication attack of the first message in the security protocol is avoided effectively; 2) during computing the MIC or MAC of the first message, only PSMK and the security parameter of the first message are selected to be computed, and thus the computation load of the initiating side and the responding side is effectively reduced and the computation resource is saved.
    • 本发明提供一种保护安全协议的第一消息的方法,该方法包括以下步骤:1)初始化步骤; 2)发起方发送第一个消息; 3)响应端接收第一条消息。 用于保护本发明提供的安全协议的第一消息的方法可以实现:1)由起始侧和响应侧共享的预共享主密钥(PSMK)和第一消息中的安全参数 通过使用消息完整性代码(MIC)或消息认证码(MAC)的计算功能来限制,从而有效地避免了安全协议中的第一消息的制造攻击; 2)在计算第一个消息的MIC或MAC期间,仅选择PSMK和第一个消息的安全参数进行计算,从而有效减少发起方和响应方的计算负载,计算资源为 保存
    • 9. 发明授权
    • Roaming authentication method based on WAPI
    • 基于WAPI的漫游认证方法
    • US08417951B2
    • 2013-04-09
    • US12990580
    • 2009-05-11
    • Bianling ZhangJun CaoXiaolong Lai
    • Bianling ZhangJun CaoXiaolong Lai
    • H04W12/06
    • H04W12/06H04L63/0823H04W84/12
    • A roaming authentication method based on WAPI. The present invention includes the steps of adopting a terminal and a wireless access point to initiate a WAPI security mechanism, relating the terminal to the wireless access point, and initiating a WAPI authentication process and so on. And a highly safe and convenient roaming authentication method based on WAPI is provided, so as to solve the technical problem that how the specific method of certificate roaming authentication is realized, the certificate of external network authentication server can not be obtained to establish a trustful relationship, and the terminal perhaps can not realize roaming authentication.
    • 基于WAPI的漫游认证方法。 本发明包括以下步骤:采用终端和无线接入点来发起WAPI安全机制,将终端与无线接入点相关联,并启动WAPI认证过程等。 并提供了一种基于WAPI的高度安全,便捷的漫游认证方法,解决了如何实现证书漫游认证的具体方法的技术问题,无法获得外部网络认证服务器的证书建立可信赖的关系 终端可能无法实现漫游认证。