×

Authentication access method and authentication access system for wireless multi-hop network

  • US 8,656,153 B2
  • Filed: 12/26/2008
  • Issued: 02/18/2014
  • Est. Priority Date: 12/29/2007
  • Status: Active Grant
First Claim
Patent Images

1. An authentication access method applicable to a wireless multi-hop network, comprising:

  • defining an uncontrolled port and a controlled port of a terminal device and a coordinator, wherein the uncontrolled port pass an authentication protocol data packet and management information and the controlled port pass an application data packet;

    broadcasting, by the coordinator, a beacon frame comprising authentication and key management suites supported by the coordinator;

    selecting, by the terminal device upon reception of the beacon frame of the coordinator, one of the authentication and key management suites, and then transmitting to the coordinator a connection request command comprising the authentication and key management suites selected by the terminal device;

    performing, by the coordinator upon reception of the connection request command of the terminal device, an authentication process with the terminal device according to the authentication and key management suites selected by the terminal device; and

    upon successful authentication, opening the controlled port to allow an access of the terminal device to the wireless multi-hop network while transmitting a connection response command to the terminal device; and

    opening, by the terminal device upon reception of the connection response command of the coordinator, the controlled port to thereby access the wireless multi-hop network;

    wherein the authentication and key management suites comprise an authentication and key management suite based upon a pre-shared key and an ID-based authentication and key management suit, andwherein the authentication process comprises;

    A. when the coordinator knows from the connection request command transmitted from the terminal device that the authentication and key management suite selected by the terminal device is an ID-based authentication and key management suite, generating an authentication inquiry of the coordinator, and transmitting an authentication activation consisting of the authentication inquiry of the coordinator and a public key of the coordinator to the terminal device;

    B. when validity verification of the public key of the coordinator is passed, generating, by the terminal device upon reception of the authentication activation, an authentication inquiry of the terminal device, an identifier of a public key revocation query and a temporary public key of the terminal device, and transmitting an authentication request consisting of the authentication inquiry of the terminal device, the authentication inquiry of the coordinator, a public key of the terminal device, the identifier of the public key revocation query, the temporary public key of the terminal device and a signature of the terminal device on the above five items of information to the coordinator;

    C. verifying, by the coordinator upon reception of the authentication request, the signature of the authentication request for legality, the authentication inquiry of the coordinator for consistency and the temporary public key of the terminal device for validity;

    when verification is passed, determining according to the identifier of the public key revocation query whether to perform the public key revocation query;

    if the public key revocation query is not to be performed, generating a temporary public key of the coordinator and an access result, then transmitting, by the coordinator, an authentication response consisting of the identifier of the public key revocation query, the authentication inquiry of the terminal device, the temporary public key of the coordinator, the access result and a signature of the coordinator on the above four items of information to the terminal device, and then performing step G;

    or if the public key revocation query is to be performed, transmitting a public key revocation query request;

    D. verifying, by a trusted center upon reception of the public key revocation query request, the information of the public key revocation query request, and then transmitting a public key revocation query response to the coordinator;

    E. verifying, by the coordinator upon reception of the public key revocation query response, the information of the public key revocation query response, and then transmitting the authentication response to the terminal device; and

    also generating a base key between the terminal device and the coordinator according to the temporary public key of the terminal device and a temporary private key of the coordinator;

    F. verifying, by the terminal device upon reception of the authentication response, the information of the authentication response, wherein if verification fails, the authentication fails;

    otherwise, the terminal device generates the base key between the terminal device and the coordinator according to the temporary public key of the terminal device and the temporary private key of the coordinator and the authentication is successful; and

    G. verifying, by the terminal device upon reception of the authentication response transmitted in the step C from the coordinator, the signature of the authentication response for validity, the authentication inquiry of the terminal device for consistency and the access result, wherein if verification fails, the authentication fails;

    otherwise, the terminal device generates the base key between the terminal device and the coordinator according to the temporary public key of the terminal device and the temporary private key of the coordinator and the authentication is successful.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×