CN105025472B - A kind of WIFI access points enciphering hiding and the method and its system of discovery - Google Patents

A kind of WIFI access points enciphering hiding and the method and its system of discovery Download PDF

Info

Publication number
CN105025472B
CN105025472B CN201410170279.8A CN201410170279A CN105025472B CN 105025472 B CN105025472 B CN 105025472B CN 201410170279 A CN201410170279 A CN 201410170279A CN 105025472 B CN105025472 B CN 105025472B
Authority
CN
China
Prior art keywords
frame
public key
access points
wifi
wifi access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410170279.8A
Other languages
Chinese (zh)
Other versions
CN105025472A (en
Inventor
曾永莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL Corp
Original Assignee
TCL Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Corp filed Critical TCL Corp
Priority to CN201410170279.8A priority Critical patent/CN105025472B/en
Publication of CN105025472A publication Critical patent/CN105025472A/en
Application granted granted Critical
Publication of CN105025472B publication Critical patent/CN105025472B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention discloses the method and its system of a kind of WIFI access points enciphering hiding and discovery, and this method is:A, it generates the first public key and the first private key, the first public key setting is set to STA in AP, by the first private key;B, the second public key and the second private key are generated, the second public key is added in management frame, using the first public key encryption frame, and is sent to STA;C, STA decrypts the encryption to find AP using the first private key, preserves the second public key;D, STA is sent follow-up management frame using the second public key and is decrypted to AP, AP to follow-up management frame using the second private key;The first public keys of AP are sent follow-up management frame and are decrypted to STA, STA to the follow-up management frame of reception using the first private key.The present invention encrypts STA and AP management frames using rivest, shamir, adelman.Only STA possesses correct key pair management frame decryption, could find that the AP exists, and to hide disabled user to AP visibilities, reduces AP and is stolen risk.

Description

A kind of WIFI access points enciphering hiding and the method and its system of discovery
Technical field
The present invention relates to a kind of method of communication field more particularly to WIFI access points enciphering hiding and discovery and its it is System.
Background technology
With the development of network technology, WIFI(Wireless network)Technology has been widely used for various electronic equipments, and WIFI terminal(STA)Dependent on WIFI access points(AP)Network could be accessed.The AP used now is not usually by sending beacon Frame(beacon frame)And it is not responding to the probe request of broadcast mode(probe request frame)It is hiding to reach The purpose of AP.But in the case, if there is disabled user passes through the network analysis sniffer based on passive listening principle (sniffer)The management frame of interaction, can still obtain AP relevant informations, and can further pass through hair between crawl STA and AP Go out non-broadcasting formula probe request frame, AP is made to be exposed in disabled user manipulation, to make AP passwords be cracked robber With eventually affecting using effect and data safety of the AP owner itself to network.
Therefore, the existing technology needs to be improved and developed.
Invention content
In view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide a kind of WIFI access points enciphering hiding and hairs Existing method and its system, it is intended to solve the problems, such as that current WIFI access points are easily cracked by disabled user and usurp.
Technical scheme is as follows:
A kind of WIFI access points enciphering hiding and the method for discovery, wherein the described method comprises the following steps:
A, the first public key and the first private key of rivest, shamir, adelman is generated in advance, by first public key setting in WIFI In access point, first private key is arranged in WIFI terminal;
B, WIFI access points generate the second public key and the second private key of rivest, shamir, adelman, and second public key is added Into the frame of management frame, the frame that the second public key is added is encrypted using first public key, forms encryption handling frame And it is sent to WIFI terminal;
C, it after WIFI terminal receives the encryption handling frame, is solved using the encryption frame of the first private key pair encryption management frame It is close, WIFI access-in point informations are obtained to find WIFI access points, while preserving second public key received;
D, WIFI terminal sends subsequent request frame using second public key and arrives WIFI access points, and WIFI access points use the Two private keys decrypt the subsequent request frame received;WIFI access points send subsequent response frame to WIFI ends using the first public key End, WIFI terminal decrypt the subsequent response frame received using the first private key.
The method of the WIFI access points enciphering hiding and discovery, wherein the management frame includes beacon frame or detection Frame;The subsequent request frame includes the authentication request frames and association request frame defined in 802.11 agreements;The subsequent response frame Including the authentication response frames and association response frame defined in 802.11 agreements.
The method of the WIFI access points enciphering hiding and discovery, wherein described when the management frame is beacon frame Step B is specially:WIFI access points generate the second public key and the second private key of rivest, shamir, adelman, and second public key is added Enter into the frame of beacon frame, the beacon frame frame that the second public key is added is encrypted using first public key, is formed and is added Close beacon frame is simultaneously sent to WIFI terminal.
The method of the WIFI access points enciphering hiding and discovery, wherein the step C is specially:WIFI terminal connects It after receiving the encryption beacon frame, is decrypted using the encryption frame of the first private key pair encryption beacon frame, obtains WIFI access points Information finds WIFI access points, while preserving second public key received.
The method of the WIFI access points enciphering hiding and discovery, wherein described when the management frame is detection frame Further include between step A and B:WIFI terminal sends plaintext probe request, after WIFI access points receive the probe request, Execute the step B.
The method of the WIFI access points enciphering hiding and discovery, wherein the step B is specially:WIFI access points The second public key and the second private key for generating rivest, shamir, adelman, the detection that second public key is added to probing response frame are rung It answers in frame, the probe response frame that the second public key is added is encrypted using first public key, development examination is formed and rings It answers frame and is sent to WIFI terminal.
The method of the WIFI access points enciphering hiding and discovery, wherein the step C is specially:WIFI terminal connects After receiving the development examination response frame, solved using the development examination response frame of the first private key pair encryption probing response frame It is close, WIFI access-in point informations are obtained to find WIFI access points, while preserving second public key received.
A kind of WIFI access points enciphering hiding and the system of discovery, wherein the system comprises WIFI access points and WIFI Terminal, wherein the WIFI access points include:
Rivest, shamir, adelman key production module, the first public key and first for generating rivest, shamir, adelman are private Key and corresponding second public key and the second private key;
Encryption and decryption modules, in WIFI access points, and being used for first public key setting by described the Two public keys are added in the frame of management frame, are encrypted, are formed to the frame that the second public key is added using first public key Encryption handling frame, and the encryption frame received is decrypted using the first private key and the second private key;
First delivery and reception module, for sending encryption handling frame to WIFI terminal and the first public key being used to send subsequently Response frame is to WIFI terminal, and the subsequent request frame for receiving WIFI terminal using the transmission of the second public key;
The WIFI terminal includes:
Management frame receives and deciphering module, for first private key to be set in the WIFI terminal, and is used for WIFI terminal is decrypted using the encryption frame and subsequent response frame of the first private key pair encryption management frame, obtains WIFI access points Information finds WIFI access points, while preserving second public key received;
Second delivery and reception module receives the encryption pipe that WIFI access points utilize the first private key to send for WIFI terminal Frame and subsequent response frame are managed, and subsequent request frame is sent to WIFI access points using second public key for WIFI terminal.
Advantageous effect:The present invention provides the method and its system of a kind of WIFI access points enciphering hiding and discovery, and utilization is non- The management frame of symmetric encipherment algorithm interaction between WIFI terminal and WIFI access points(management frame)It is encrypted.Only There is WIFI terminal to possess correct private key management frame is decrypted, could find the presence of the WIFI access points, carries out It is normal to connect and use data transmission.To hide visibility of the disabled user to WIFI access points, WIFI access points are reduced Stolen risk.
Description of the drawings
Fig. 1 is the method flow diagram of enciphering hiding WIFI access points in the specific embodiment of the invention.
Fig. 2 is the frame structure schematic diagram of beacon frame in the specific embodiment of the invention.
Fig. 3 is to form new beacon frame to the second public key is added in beacon frame shown in Fig. 2 in the specific embodiment of the invention Frame structure schematic diagram.
Fig. 4 is that the new management frame to be formed is encrypted to beacon frame shown in Fig. 3 in the specific embodiment of the invention Frame structure schematic diagram.
Fig. 5 is the frame structure schematic diagram of probing response frame in the specific embodiment of the invention.
Fig. 6 is to show the frame structure of probing response frame shown in fig. 5 the second public key of addition in the specific embodiment of the invention It is intended to.
Fig. 7 is probing response frame shown in fig. 6 to be encrypted the new management frame to be formed in the specific embodiment of the invention Frame structure schematic diagram.
Fig. 8 is the principle frame of WIFI access points in the system of enciphering hiding WIFI access points in the specific embodiment of the invention Figure.
Fig. 9 is the functional block diagram of WIFI terminal in the system of enciphering hiding WIFI access points in the specific embodiment of the invention.
Specific implementation mode
The present invention provides the method and its system of a kind of WIFI access points enciphering hiding and discovery, to make the mesh of the present invention , technical solution and effect it is clearer, clear, the present invention is described in more detail below.It should be appreciated that described herein Specific embodiment be only used to explain the present invention, be not intended to limit the present invention.
A kind of WIFI access points enciphering hiding as described in Figure 1 and the method for discovery, wherein the method includes following steps Suddenly:
S100, the first public key and the first private key that rivest, shamir, adelman is generated in advance, by first public key setting in In WIFI access points, and first private key is arranged in the WIFI terminal.
It is preferred that can be in AP(That is WIFI access points)The setting page add " public-key cryptographic keys setting " edit box, it is logical The setting of the first public key and the first private key can easily be realized by crossing the edit box, in addition may also set up by AP automatically using asymmetric Encryption Algorithm generates the first public key and the first private key, later provides key to STA(That is WIFI terminal)Use, the One private key direct copying can be transmitted and be set in WIFI terminal from the equipment of setting AP, can also pass through equipment and WIFI terminal Between the modes such as Bluetooth communication, NFC near-field communications the first private key is transmitted and is arranged into WIFI terminal.
S200, WIFI access point generate the second public key and the second private key of rivest, shamir, adelman, by second public key It is added in the frame of management frame, the frame that the second public key is added is encrypted using first public key, forms encryption pipe Reason frame is simultaneously sent to WIFI terminal.
After S300, WIFI terminal receive the encryption handling frame, using the first private key pair encryption management frame encryption frame into Row decryption obtains WIFI access-in point informations to find WIFI access points, while preserving second public key received.
S400, WIFI terminal send subsequent request frame to WIFI access points using second public key, and WIFI access points make The subsequent request frame received is decrypted with the second private key;WIFI access points send subsequent response frame to WIFI using the first public key Terminal, WIFI terminal decrypt the subsequent response frame received using the first private key.
In the present embodiment, validated user(Possess the WIFI terminal of above-mentioned first private key)Through the above steps in S400 after Just the WIFI access points can be accessed, carry out normally connecting and using data transmission;And for disabled user(I.e. no above-mentioned The WIFI terminal of one private key)For, due to that can not be decrypted, the WIFI access points be hide it is i.e. sightless, in this way Just WIFI access points are reduced and are stolen risk.
Above-mentioned management frame meets 802.11 agreement of wireless standard and is defined to the structure of management frame, wherein described follow-up Claim frame and subsequent response frame are to be different from the title of above-mentioned beacon frame, probe request and probing response frame these management frames Meaning, the subsequent request frame defined in 802.11 agreements in refer specifically to authentication request frames(Authentication Request frame)And association request frame(Association Request frame).The subsequent response frame is fixed in 802.11 agreements Authentication response frames are referred specifically in justice(Authentication Reponse frame)And association response frame(Association Reponse frame)
The effect of above-mentioned subsequent request frame and subsequent response frame is that disabled user is not allowed to get the letter inside frame Breath.
According to the description above, after WIFI terminal finds WIFI access points in step S300, can be closed according to normal Connection foundation step, which is established between STA and AP, to be associated with, and needs that request/response frames are encrypted in these steps certainly, i.e., described Step S400 can be specifically expressed as:
1, authentication request frames are sent to AP by STA using second public key, and AP is using the second private key to the certification request Frame, which is decrypted and is sent to STA, confirms character(ACK);
2, authentication response frames are sent to STA by AP using first public key, and STA is using the first private key to the authentication response Frame, which is decrypted and is sent to AP, confirms character(ACK);
3, association request frame is sent to AP by STA using second public key, and AP is using the second private key to the association request Frame, which is decrypted and is sent to STA, confirms character(ACK);
4, association response frame is sent to STA by AP using first public key, and STA is using the first private key to the associated response Frame, which is decrypted and is sent to AP, confirms character(ACK);
5, STA and AP starts to be in communication with each other.
Management frame described in step S200 includes beacon frame and detection frame, since WIFI terminal finds a WIFI access point There are two kinds of approach:First, receiving the beacon frame that WIFI access points are sent out(Beacon frame);Second is that WIFI terminal is to WIFI Access point sends out probe request(Probe Request frame), probing response frame is returned to by WIFI access points(Probe Response frame)Confirm and exists.
When WIFI terminal finds WIFI access points by beacon frame approach, above-mentioned steps S200 is specially:WIFI is accessed Point generates the second public key and the second private key of rivest, shamir, adelman, and second public key is added in the frame of beacon frame, The beacon frame frame that the second public key is added is encrypted using first public key, encryption beacon frame is formed and is sent to WIFI Terminal.
And step S300 is specially:After WIFI terminal receives the encryption beacon frame, the first private key pair encryption beacon is used The encryption frame of frame is decrypted, and obtains WIFI access-in point informations to find WIFI access points, at the same preserve receive it is described Second public key.
In specific embodiment, realize that WIFI terminal finds that WIFI access points are implemented by beacon frame using the method for the present invention Flow is:
1, a group key, i.e. the first public key are generated using rivest, shamir, adelman(publickey1)With the first private key (privatekey1).And the first public key(publickey1)It is set to WIFI access points, while by the first private key (privatekey1)It is transmitted and is set in WIFI terminal by direct copying, Bluetooth communication or near-field communication modes.
2, WIFI access points generate another group key, i.e. the second public key using rivest, shamir, adelman(publickey2)With Second private key(privatekey2).
3, WIFI access points are the second public key(publickey2)Beacon frame as shown in Figure 2 is added(beacon frame) Beacon frame A(beacon frame body)Part generates new beacon frame B as shown in Figure 3,(Beacon can be used Frame body* are indicated).
4, WIFI access points use the first public key(publickey1)To new beacon frame B(beacon frame body*)It is encrypted, and generates new management frame as shown in Figure 4, that is, encrypt beacon frame(Beacon frame* tables can be used Show), encrypt beacon frame(beacon frame*)Beacon frame(beacon frame body*)Due to being encrypted form encryption Beacon frame(It can be indicated with beacon frame body**).
5, WIFI access points according to setting the beacon frame interval time(beacon intervals)Timing sends out encryption letter Mark frame(Beacon frame* management frames).
6, WIFI terminal receives encryption beacon frame(Beacon frame* management frames), use the first private key (privatekey1)To encrypting beacon frame(frame body*)It is decrypted, obtains WIFI access point relevant informations, to It was found that the presence of WIFI access points.WIFI terminal preserves the second public key received simultaneously(publickey2).
7, WIFI terminal uses the second public key(publickey2)Subsequent request frame is sent to WIFI access points, WIFI accesses Point uses the second private key(privatekey2)Claim frame decryption to receiving.
8, WIFI access points use the first public key(publickey1)Response frame frame is sent to WIFI terminal, WIFI terminal makes With the first private key(privatekey1)Subsequent response frame decryption to receiving.
When WIFI terminal when finding WIFI access points, further includes between the step S100 and S200 by detecting frame: WIFI terminal sends plaintext probe request(probe request frame), WIFI access points receive the probe request Afterwards, the step S200 is executed.
In addition, when WIFI terminal is using by detecting frame come when finding WIFI access points, the step S200 is specific Process should be then:WIFI access points generate the second public key and the second private key of rivest, shamir, adelman, and second public key is added Enter into the probe response frame of probing response frame, using first public key to be added the second public key probe response frame into Row encryption forms development examination response frame and is sent to WIFI terminal.
And the specific implementation process of step S300 is:After WIFI terminal receives the development examination response frame, first is used The development examination response frame of private key pair encryption probing response frame is decrypted, and obtains WIFI access-in point informations to find that WIFI connects Access point, while preserving second public key received.
In specific embodiment, realize that WIFI terminal finds WIFI access points by probe request using the method for the present invention Implementing procedure is:
1, a group key, the first public key are generated using rivest, shamir, adelman(publickey1)With the first private key (privatekey1).And the first public key(publickey1)It is set to WIFI access points.
2, WIFI terminal sends plaintext probe request(Probe request frame management frames).The management frame does not wrap Containing any and AP relevant informations, belong to forms of broadcasting management frame.
3, WIFI access points receive the probe request from WIFI terminal(Probe request frame management frames) Afterwards, a group key, the second public key are generated using rivest, shamir, adelman(publickey2)With the second private key (privatekey2).
4, WIFI access points are the second public key(publickey2)Probing response frame as shown in Figure 5 is added(Probe Response frame management frames)Probe response frame A(Probe Response frame body)Part generates such as Fig. 6 Shown in new probe response frame B(It can be indicated with Probe Response frame body#).
5, WIFI access points use the first public key(publickey1)To new probe response frame B(Probe Response frame body#)It is encrypted, forms development examination and respond frame(Probe Response frame can be used Body## is indicated), generate new management frame as shown in Figure 7, i.e. development examination response frame(Probe Response can be used Frame# is indicated).
6, WIFI access points send development examination response frame(Probe Response frame#)To WIFI terminal.
7, WIFI terminal receives development examination response frame(Probe Response frame#), use the first private key (privatekey1)To development examination response frame(Probe Response frame #)It is decrypted, obtains WIFI access points Relevant information, to find the presence of WIFI access points.WIFI terminal preserves the second public key received simultaneously (publickey2).
8, WIFI terminal uses the second public key(publickey2)Subsequent request frame is sent to WIFI access points, WIFI accesses Point uses the second private key(privatekey2)Subsequent request frame decryption to receiving.
9, WIFI access points use the first public key(publickey1)Subsequent response frame is sent to WIFI terminal, WIFI terminal Use the first private key(privatekey1)Response frame decryption to receiving.
The system of a kind of enciphering hiding WIFI access points as shown in Figure 8 and Figure 9, wherein the system comprises such as Fig. 8 institutes The WIFI access points 100 shown and WIFI terminal 200 as shown in Figure 9, wherein the WIFI access points 100 include:
Rivest, shamir, adelman key production module 110, the first public key and first for generating rivest, shamir, adelman Private key and corresponding second public key and the second private key;
Encryption and decryption modules 120 are used for by first public key setting in WIFI access points, and being used for will be described Second public key is added in the frame of management frame, the frame that the second public key is added is encrypted using first public key, shape The encryption frame received is decrypted at encryption handling frame, and using the first private key and the second private key;
First delivery and reception module 130, for sending encryption handling frame to WIFI terminal and using the transmission of the first public key Subsequent response frame is to WIFI terminal, and the subsequent request frame for receiving WIFI terminal using the transmission of the second public key.
The WIFI terminal 200 includes:
Management frame receives and deciphering module 210, for first private key to be set in the WIFI terminal, Yi Jiyong It is decrypted using the encryption frame and subsequent response frame of the first private key pair encryption management frame in WIFI terminal, obtains WIFI accesses Information is put to find WIFI access points, while preserving second public key received;
Second delivery and reception module 220 is received WIFI access points for WIFI terminal and is added using what the first private key was sent Close management frame and subsequent response frame, and send subsequent request frame using second public key for WIFI terminal and accessed to WIFI Point.
The present invention provides a kind of method and system of enciphering hiding WIFI access points, using rivest, shamir, adelman to WIFI The management frame of interaction is encrypted between terminal and WIFI access points.Only WIFI terminal possesses correct private key to management frame It is decrypted, could find the presence of the WIFI access points, carry out normally connecting and using data transmission.It is illegal to hide User reduces WIFI access points and is stolen risk to the visibility of WIFI access points.
It should be understood that the application of the present invention is not limited to the above for those of ordinary skills can With improvement or transformation based on the above description, all these modifications and variations should all belong to the guarantor of appended claims of the present invention Protect range.

Claims (8)

1. a kind of WIFI access points enciphering hiding and the method for discovery, which is characterized in that the described method comprises the following steps:
A, the first public key and the first private key of rivest, shamir, adelman is generated in advance, first public key setting is accessed in WIFI In point, first private key is arranged in WIFI terminal;
B, WIFI access points generate the second public key and the second private key of rivest, shamir, adelman, and second public key is added to pipe In the frame for managing frame, the frame that the second public key is added is encrypted using first public key, it is concurrent to form encryption handling frame It send to WIFI terminal;
C, it after WIFI terminal receives the encryption handling frame, is decrypted using the encryption frame of the first private key pair encryption management frame, WIFI access-in point informations are obtained to find WIFI access points, while preserving second public key received;
D, WIFI terminal sends subsequent request frame to WIFI access points using second public key, and WIFI access points are private using second Key decrypts the subsequent request frame received;WIFI access points send subsequent response frame to WIFI terminal using the first public key, WIFI terminal decrypts the subsequent response frame received using the first private key.
2. WIFI access points enciphering hiding according to claim 1 and the method for discovery, which is characterized in that the management frame Including beacon frame or detection frame;The subsequent request frame includes the authentication request frames and association request defined in 802.11 agreements Frame;The subsequent response frame includes the authentication response frames and association response frame defined in 802.11 agreements.
3. WIFI access points enciphering hiding according to claim 2 and the method for discovery, which is characterized in that when the management When frame is beacon frame, the step B is specially:WIFI access points generate the second public key and the second private of rivest, shamir, adelman Second public key is added in the frame of beacon frame by key, using first public key to the beacon frame of the second public key of addition Frame is encrypted, and forms encryption beacon frame and is sent to WIFI terminal.
4. WIFI access points enciphering hiding according to claim 3 and the method for discovery, which is characterized in that the step C Specially:After WIFI terminal receives the encryption beacon frame, solved using the encryption frame of the first private key pair encryption beacon frame It is close, WIFI access-in point informations are obtained to find WIFI access points, while preserving second public key received.
5. WIFI access points enciphering hiding according to claim 2 and the method for discovery, which is characterized in that when the management When frame is detection frame, further include between the step A and B:WIFI terminal sends plaintext probe request, and WIFI access points receive To after the probe request, the step B is executed.
6. WIFI access points enciphering hiding according to claim 5 and the method for discovery, which is characterized in that the step B Specially:WIFI access points generate the second public key and the second private key of rivest, shamir, adelman, and second public key is added to In the frame for detecting frame, the frame that the detection frame of the second public key is added is encrypted using first public key, forms encryption Detection frame is simultaneously sent to WIFI terminal.
7. WIFI access points enciphering hiding according to claim 6 and the method for discovery, which is characterized in that the step C Specially:After WIFI terminal receives the development examination frame, the encryption frame that frame is detected using the first private key pair encryption is solved It is close, WIFI access-in point informations are obtained to find WIFI access points, while preserving second public key received.
8. a kind of system to WIFI access points enciphering hiding and discovery, which is characterized in that the system comprises WIFI access points And WIFI terminal, wherein the WIFI access points include:
Rivest, shamir, adelman key production module, the first public key and the first private key for generating rivest, shamir, adelman, with And corresponding second public key and the second private key;
Encryption and decryption modules are used for by first public key setting in WIFI access points, and for public by described second Key is added in the frame of management frame, is encrypted to the frame that the second public key is added using first public key, is formed encryption Management frame, and the encryption frame received is decrypted using the first private key and the second private key;
First delivery and reception module, for sending encryption handling frame to WIFI terminal and using the first public key transmission subsequent response Frame is to WIFI terminal, and the subsequent request frame for receiving WIFI terminal using the transmission of the second public key;
The WIFI terminal includes:
Management frame receives and deciphering module, for first private key to be set in the WIFI terminal, and is used for WIFI Terminal is decrypted using the encryption frame and subsequent response frame of the first private key pair encryption management frame, obtains WIFI access-in point informations To find WIFI access points, while second public key that preservation receives;
Second delivery and reception module receives the encryption handling frame that WIFI access points utilize the first private key to send for WIFI terminal With subsequent response frame, and for WIFI terminal subsequent request frame is sent to WIFI access points using second public key.
CN201410170279.8A 2014-04-25 2014-04-25 A kind of WIFI access points enciphering hiding and the method and its system of discovery Active CN105025472B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410170279.8A CN105025472B (en) 2014-04-25 2014-04-25 A kind of WIFI access points enciphering hiding and the method and its system of discovery

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410170279.8A CN105025472B (en) 2014-04-25 2014-04-25 A kind of WIFI access points enciphering hiding and the method and its system of discovery

Publications (2)

Publication Number Publication Date
CN105025472A CN105025472A (en) 2015-11-04
CN105025472B true CN105025472B (en) 2018-09-18

Family

ID=54415096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410170279.8A Active CN105025472B (en) 2014-04-25 2014-04-25 A kind of WIFI access points enciphering hiding and the method and its system of discovery

Country Status (1)

Country Link
CN (1) CN105025472B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231673A (en) * 2016-03-23 2017-10-03 北京京东尚科信息技术有限公司 Electronic equipment and its communication means
CN105979512A (en) * 2016-05-04 2016-09-28 深圳市蜂联科技有限公司 Method of quick STA and AP connection in uncorrelated WIFI environment
CN106657122A (en) * 2016-12-30 2017-05-10 广东欧珀移动通信有限公司 Data processing method and device as well as terminal device
CN107182053B (en) * 2017-06-08 2019-06-07 上海掌门科技有限公司 It is a kind of for connecting the method and apparatus of hiding wireless access point
US10271215B1 (en) * 2018-06-27 2019-04-23 Hewlett Packard Enterprise Development Lp Management frame encryption and decryption
CN110381505B (en) * 2019-07-22 2023-06-16 浙江大华技术股份有限公司 Method and device for accessing network hard disk video recorder
CN111010693B (en) * 2019-11-25 2023-10-03 华为技术有限公司 Method for providing wireless fidelity network access service and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765110A (en) * 2009-12-21 2010-06-30 苏州汉明科技有限公司 Dedicated encryption protection method between user and wireless access point
CN101848463A (en) * 2010-03-16 2010-09-29 苏州汉明科技有限公司 Method for protecting access of legal user based on wireless access point
CN102014342A (en) * 2010-12-31 2011-04-13 西安西电捷通无线网络通信股份有限公司 Network system and method for hybrid networking
CN102946605A (en) * 2012-11-02 2013-02-27 清华大学 Wireless local area network (WLAN) access method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765110A (en) * 2009-12-21 2010-06-30 苏州汉明科技有限公司 Dedicated encryption protection method between user and wireless access point
CN101848463A (en) * 2010-03-16 2010-09-29 苏州汉明科技有限公司 Method for protecting access of legal user based on wireless access point
CN102014342A (en) * 2010-12-31 2011-04-13 西安西电捷通无线网络通信股份有限公司 Network system and method for hybrid networking
CN102946605A (en) * 2012-11-02 2013-02-27 清华大学 Wireless local area network (WLAN) access method and system

Also Published As

Publication number Publication date
CN105025472A (en) 2015-11-04

Similar Documents

Publication Publication Date Title
CN105025472B (en) A kind of WIFI access points enciphering hiding and the method and its system of discovery
EP3051744B1 (en) Key configuration method and apparatus
US20190199532A1 (en) Authentication method, authentication apparatus, and authentication system
US7986940B2 (en) Automatic wireless network linking method with security configuration and device thereof
US7689211B2 (en) Secure login method for establishing a wireless local area network connection, and wireless local area network system
US10588015B2 (en) Terminal authenticating method, apparatus, and system
CN105553951A (en) Data transmission method and data transmission device
US9571475B2 (en) Call encryption systems and methods
JP6807153B2 (en) Devices and related methods for secure hearing device communication
CN101822082A (en) The technology that is used for safe laneization between UICC and the terminal
KR20160058491A (en) Method and apparatus for providing services based on identifier of user device
CN104955038A (en) Method for distributing addressing identification, and access point, site and communication system
CN106162537B (en) A kind of method, wireless telecom equipment and the terminal of safety certification connection
WO2022111187A1 (en) Terminal authentication method and apparatus, computer device, and storage medium
CN101895882A (en) Data transmission method, system and device in WiMAX system
US11962692B2 (en) Encrypting data in a pre-associated state
US20070081672A1 (en) Methods to enhance wlan security
Noh et al. Secure authentication and four-way handshake scheme for protected individual communication in public wi-fi networks
CN105407109A (en) Data secure transmission method between Bluetooth devices
KR101358375B1 (en) Prevention security system and method for smishing
US10574441B2 (en) Management of cryptographic keys
WO2014194818A1 (en) Method for discovering user of equipment, and user equipment
Diallo et al. A secure authentication scheme for bluetooth connection
CN106209384A (en) Use the client terminal of security mechanism and the communication authentication method of charging device
Doh et al. Key establishment and management for secure cellular machine-to-machine communication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant