CN105025472B - A kind of WIFI access points enciphering hiding and the method and its system of discovery - Google Patents
A kind of WIFI access points enciphering hiding and the method and its system of discovery Download PDFInfo
- Publication number
- CN105025472B CN105025472B CN201410170279.8A CN201410170279A CN105025472B CN 105025472 B CN105025472 B CN 105025472B CN 201410170279 A CN201410170279 A CN 201410170279A CN 105025472 B CN105025472 B CN 105025472B
- Authority
- CN
- China
- Prior art keywords
- frame
- public key
- access points
- wifi
- wifi access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention discloses the method and its system of a kind of WIFI access points enciphering hiding and discovery, and this method is:A, it generates the first public key and the first private key, the first public key setting is set to STA in AP, by the first private key;B, the second public key and the second private key are generated, the second public key is added in management frame, using the first public key encryption frame, and is sent to STA;C, STA decrypts the encryption to find AP using the first private key, preserves the second public key;D, STA is sent follow-up management frame using the second public key and is decrypted to AP, AP to follow-up management frame using the second private key;The first public keys of AP are sent follow-up management frame and are decrypted to STA, STA to the follow-up management frame of reception using the first private key.The present invention encrypts STA and AP management frames using rivest, shamir, adelman.Only STA possesses correct key pair management frame decryption, could find that the AP exists, and to hide disabled user to AP visibilities, reduces AP and is stolen risk.
Description
Technical field
The present invention relates to a kind of method of communication field more particularly to WIFI access points enciphering hiding and discovery and its it is
System.
Background technology
With the development of network technology, WIFI(Wireless network)Technology has been widely used for various electronic equipments, and
WIFI terminal(STA)Dependent on WIFI access points(AP)Network could be accessed.The AP used now is not usually by sending beacon
Frame(beacon frame)And it is not responding to the probe request of broadcast mode(probe request frame)It is hiding to reach
The purpose of AP.But in the case, if there is disabled user passes through the network analysis sniffer based on passive listening principle
(sniffer)The management frame of interaction, can still obtain AP relevant informations, and can further pass through hair between crawl STA and AP
Go out non-broadcasting formula probe request frame, AP is made to be exposed in disabled user manipulation, to make AP passwords be cracked robber
With eventually affecting using effect and data safety of the AP owner itself to network.
Therefore, the existing technology needs to be improved and developed.
Invention content
In view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide a kind of WIFI access points enciphering hiding and hairs
Existing method and its system, it is intended to solve the problems, such as that current WIFI access points are easily cracked by disabled user and usurp.
Technical scheme is as follows:
A kind of WIFI access points enciphering hiding and the method for discovery, wherein the described method comprises the following steps:
A, the first public key and the first private key of rivest, shamir, adelman is generated in advance, by first public key setting in WIFI
In access point, first private key is arranged in WIFI terminal;
B, WIFI access points generate the second public key and the second private key of rivest, shamir, adelman, and second public key is added
Into the frame of management frame, the frame that the second public key is added is encrypted using first public key, forms encryption handling frame
And it is sent to WIFI terminal;
C, it after WIFI terminal receives the encryption handling frame, is solved using the encryption frame of the first private key pair encryption management frame
It is close, WIFI access-in point informations are obtained to find WIFI access points, while preserving second public key received;
D, WIFI terminal sends subsequent request frame using second public key and arrives WIFI access points, and WIFI access points use the
Two private keys decrypt the subsequent request frame received;WIFI access points send subsequent response frame to WIFI ends using the first public key
End, WIFI terminal decrypt the subsequent response frame received using the first private key.
The method of the WIFI access points enciphering hiding and discovery, wherein the management frame includes beacon frame or detection
Frame;The subsequent request frame includes the authentication request frames and association request frame defined in 802.11 agreements;The subsequent response frame
Including the authentication response frames and association response frame defined in 802.11 agreements.
The method of the WIFI access points enciphering hiding and discovery, wherein described when the management frame is beacon frame
Step B is specially:WIFI access points generate the second public key and the second private key of rivest, shamir, adelman, and second public key is added
Enter into the frame of beacon frame, the beacon frame frame that the second public key is added is encrypted using first public key, is formed and is added
Close beacon frame is simultaneously sent to WIFI terminal.
The method of the WIFI access points enciphering hiding and discovery, wherein the step C is specially:WIFI terminal connects
It after receiving the encryption beacon frame, is decrypted using the encryption frame of the first private key pair encryption beacon frame, obtains WIFI access points
Information finds WIFI access points, while preserving second public key received.
The method of the WIFI access points enciphering hiding and discovery, wherein described when the management frame is detection frame
Further include between step A and B:WIFI terminal sends plaintext probe request, after WIFI access points receive the probe request,
Execute the step B.
The method of the WIFI access points enciphering hiding and discovery, wherein the step B is specially:WIFI access points
The second public key and the second private key for generating rivest, shamir, adelman, the detection that second public key is added to probing response frame are rung
It answers in frame, the probe response frame that the second public key is added is encrypted using first public key, development examination is formed and rings
It answers frame and is sent to WIFI terminal.
The method of the WIFI access points enciphering hiding and discovery, wherein the step C is specially:WIFI terminal connects
After receiving the development examination response frame, solved using the development examination response frame of the first private key pair encryption probing response frame
It is close, WIFI access-in point informations are obtained to find WIFI access points, while preserving second public key received.
A kind of WIFI access points enciphering hiding and the system of discovery, wherein the system comprises WIFI access points and WIFI
Terminal, wherein the WIFI access points include:
Rivest, shamir, adelman key production module, the first public key and first for generating rivest, shamir, adelman are private
Key and corresponding second public key and the second private key;
Encryption and decryption modules, in WIFI access points, and being used for first public key setting by described the
Two public keys are added in the frame of management frame, are encrypted, are formed to the frame that the second public key is added using first public key
Encryption handling frame, and the encryption frame received is decrypted using the first private key and the second private key;
First delivery and reception module, for sending encryption handling frame to WIFI terminal and the first public key being used to send subsequently
Response frame is to WIFI terminal, and the subsequent request frame for receiving WIFI terminal using the transmission of the second public key;
The WIFI terminal includes:
Management frame receives and deciphering module, for first private key to be set in the WIFI terminal, and is used for
WIFI terminal is decrypted using the encryption frame and subsequent response frame of the first private key pair encryption management frame, obtains WIFI access points
Information finds WIFI access points, while preserving second public key received;
Second delivery and reception module receives the encryption pipe that WIFI access points utilize the first private key to send for WIFI terminal
Frame and subsequent response frame are managed, and subsequent request frame is sent to WIFI access points using second public key for WIFI terminal.
Advantageous effect:The present invention provides the method and its system of a kind of WIFI access points enciphering hiding and discovery, and utilization is non-
The management frame of symmetric encipherment algorithm interaction between WIFI terminal and WIFI access points(management frame)It is encrypted.Only
There is WIFI terminal to possess correct private key management frame is decrypted, could find the presence of the WIFI access points, carries out
It is normal to connect and use data transmission.To hide visibility of the disabled user to WIFI access points, WIFI access points are reduced
Stolen risk.
Description of the drawings
Fig. 1 is the method flow diagram of enciphering hiding WIFI access points in the specific embodiment of the invention.
Fig. 2 is the frame structure schematic diagram of beacon frame in the specific embodiment of the invention.
Fig. 3 is to form new beacon frame to the second public key is added in beacon frame shown in Fig. 2 in the specific embodiment of the invention
Frame structure schematic diagram.
Fig. 4 is that the new management frame to be formed is encrypted to beacon frame shown in Fig. 3 in the specific embodiment of the invention
Frame structure schematic diagram.
Fig. 5 is the frame structure schematic diagram of probing response frame in the specific embodiment of the invention.
Fig. 6 is to show the frame structure of probing response frame shown in fig. 5 the second public key of addition in the specific embodiment of the invention
It is intended to.
Fig. 7 is probing response frame shown in fig. 6 to be encrypted the new management frame to be formed in the specific embodiment of the invention
Frame structure schematic diagram.
Fig. 8 is the principle frame of WIFI access points in the system of enciphering hiding WIFI access points in the specific embodiment of the invention
Figure.
Fig. 9 is the functional block diagram of WIFI terminal in the system of enciphering hiding WIFI access points in the specific embodiment of the invention.
Specific implementation mode
The present invention provides the method and its system of a kind of WIFI access points enciphering hiding and discovery, to make the mesh of the present invention
, technical solution and effect it is clearer, clear, the present invention is described in more detail below.It should be appreciated that described herein
Specific embodiment be only used to explain the present invention, be not intended to limit the present invention.
A kind of WIFI access points enciphering hiding as described in Figure 1 and the method for discovery, wherein the method includes following steps
Suddenly:
S100, the first public key and the first private key that rivest, shamir, adelman is generated in advance, by first public key setting in
In WIFI access points, and first private key is arranged in the WIFI terminal.
It is preferred that can be in AP(That is WIFI access points)The setting page add " public-key cryptographic keys setting " edit box, it is logical
The setting of the first public key and the first private key can easily be realized by crossing the edit box, in addition may also set up by AP automatically using asymmetric
Encryption Algorithm generates the first public key and the first private key, later provides key to STA(That is WIFI terminal)Use, the
One private key direct copying can be transmitted and be set in WIFI terminal from the equipment of setting AP, can also pass through equipment and WIFI terminal
Between the modes such as Bluetooth communication, NFC near-field communications the first private key is transmitted and is arranged into WIFI terminal.
S200, WIFI access point generate the second public key and the second private key of rivest, shamir, adelman, by second public key
It is added in the frame of management frame, the frame that the second public key is added is encrypted using first public key, forms encryption pipe
Reason frame is simultaneously sent to WIFI terminal.
After S300, WIFI terminal receive the encryption handling frame, using the first private key pair encryption management frame encryption frame into
Row decryption obtains WIFI access-in point informations to find WIFI access points, while preserving second public key received.
S400, WIFI terminal send subsequent request frame to WIFI access points using second public key, and WIFI access points make
The subsequent request frame received is decrypted with the second private key;WIFI access points send subsequent response frame to WIFI using the first public key
Terminal, WIFI terminal decrypt the subsequent response frame received using the first private key.
In the present embodiment, validated user(Possess the WIFI terminal of above-mentioned first private key)Through the above steps in S400 after
Just the WIFI access points can be accessed, carry out normally connecting and using data transmission;And for disabled user(I.e. no above-mentioned
The WIFI terminal of one private key)For, due to that can not be decrypted, the WIFI access points be hide it is i.e. sightless, in this way
Just WIFI access points are reduced and are stolen risk.
Above-mentioned management frame meets 802.11 agreement of wireless standard and is defined to the structure of management frame, wherein described follow-up
Claim frame and subsequent response frame are to be different from the title of above-mentioned beacon frame, probe request and probing response frame these management frames
Meaning, the subsequent request frame defined in 802.11 agreements in refer specifically to authentication request frames(Authentication Request
frame)And association request frame(Association Request frame).The subsequent response frame is fixed in 802.11 agreements
Authentication response frames are referred specifically in justice(Authentication Reponse frame)And association response frame(Association
Reponse frame)
The effect of above-mentioned subsequent request frame and subsequent response frame is that disabled user is not allowed to get the letter inside frame
Breath.
According to the description above, after WIFI terminal finds WIFI access points in step S300, can be closed according to normal
Connection foundation step, which is established between STA and AP, to be associated with, and needs that request/response frames are encrypted in these steps certainly, i.e., described
Step S400 can be specifically expressed as:
1, authentication request frames are sent to AP by STA using second public key, and AP is using the second private key to the certification request
Frame, which is decrypted and is sent to STA, confirms character(ACK);
2, authentication response frames are sent to STA by AP using first public key, and STA is using the first private key to the authentication response
Frame, which is decrypted and is sent to AP, confirms character(ACK);
3, association request frame is sent to AP by STA using second public key, and AP is using the second private key to the association request
Frame, which is decrypted and is sent to STA, confirms character(ACK);
4, association response frame is sent to STA by AP using first public key, and STA is using the first private key to the associated response
Frame, which is decrypted and is sent to AP, confirms character(ACK);
5, STA and AP starts to be in communication with each other.
Management frame described in step S200 includes beacon frame and detection frame, since WIFI terminal finds a WIFI access point
There are two kinds of approach:First, receiving the beacon frame that WIFI access points are sent out(Beacon frame);Second is that WIFI terminal is to WIFI
Access point sends out probe request(Probe Request frame), probing response frame is returned to by WIFI access points(Probe
Response frame)Confirm and exists.
When WIFI terminal finds WIFI access points by beacon frame approach, above-mentioned steps S200 is specially:WIFI is accessed
Point generates the second public key and the second private key of rivest, shamir, adelman, and second public key is added in the frame of beacon frame,
The beacon frame frame that the second public key is added is encrypted using first public key, encryption beacon frame is formed and is sent to WIFI
Terminal.
And step S300 is specially:After WIFI terminal receives the encryption beacon frame, the first private key pair encryption beacon is used
The encryption frame of frame is decrypted, and obtains WIFI access-in point informations to find WIFI access points, at the same preserve receive it is described
Second public key.
In specific embodiment, realize that WIFI terminal finds that WIFI access points are implemented by beacon frame using the method for the present invention
Flow is:
1, a group key, i.e. the first public key are generated using rivest, shamir, adelman(publickey1)With the first private key
(privatekey1).And the first public key(publickey1)It is set to WIFI access points, while by the first private key
(privatekey1)It is transmitted and is set in WIFI terminal by direct copying, Bluetooth communication or near-field communication modes.
2, WIFI access points generate another group key, i.e. the second public key using rivest, shamir, adelman(publickey2)With
Second private key(privatekey2).
3, WIFI access points are the second public key(publickey2)Beacon frame as shown in Figure 2 is added(beacon frame)
Beacon frame A(beacon frame body)Part generates new beacon frame B as shown in Figure 3,(Beacon can be used
Frame body* are indicated).
4, WIFI access points use the first public key(publickey1)To new beacon frame B(beacon frame
body*)It is encrypted, and generates new management frame as shown in Figure 4, that is, encrypt beacon frame(Beacon frame* tables can be used
Show), encrypt beacon frame(beacon frame*)Beacon frame(beacon frame body*)Due to being encrypted form encryption
Beacon frame(It can be indicated with beacon frame body**).
5, WIFI access points according to setting the beacon frame interval time(beacon intervals)Timing sends out encryption letter
Mark frame(Beacon frame* management frames).
6, WIFI terminal receives encryption beacon frame(Beacon frame* management frames), use the first private key
(privatekey1)To encrypting beacon frame(frame body*)It is decrypted, obtains WIFI access point relevant informations, to
It was found that the presence of WIFI access points.WIFI terminal preserves the second public key received simultaneously(publickey2).
7, WIFI terminal uses the second public key(publickey2)Subsequent request frame is sent to WIFI access points, WIFI accesses
Point uses the second private key(privatekey2)Claim frame decryption to receiving.
8, WIFI access points use the first public key(publickey1)Response frame frame is sent to WIFI terminal, WIFI terminal makes
With the first private key(privatekey1)Subsequent response frame decryption to receiving.
When WIFI terminal when finding WIFI access points, further includes between the step S100 and S200 by detecting frame:
WIFI terminal sends plaintext probe request(probe request frame), WIFI access points receive the probe request
Afterwards, the step S200 is executed.
In addition, when WIFI terminal is using by detecting frame come when finding WIFI access points, the step S200 is specific
Process should be then:WIFI access points generate the second public key and the second private key of rivest, shamir, adelman, and second public key is added
Enter into the probe response frame of probing response frame, using first public key to be added the second public key probe response frame into
Row encryption forms development examination response frame and is sent to WIFI terminal.
And the specific implementation process of step S300 is:After WIFI terminal receives the development examination response frame, first is used
The development examination response frame of private key pair encryption probing response frame is decrypted, and obtains WIFI access-in point informations to find that WIFI connects
Access point, while preserving second public key received.
In specific embodiment, realize that WIFI terminal finds WIFI access points by probe request using the method for the present invention
Implementing procedure is:
1, a group key, the first public key are generated using rivest, shamir, adelman(publickey1)With the first private key
(privatekey1).And the first public key(publickey1)It is set to WIFI access points.
2, WIFI terminal sends plaintext probe request(Probe request frame management frames).The management frame does not wrap
Containing any and AP relevant informations, belong to forms of broadcasting management frame.
3, WIFI access points receive the probe request from WIFI terminal(Probe request frame management frames)
Afterwards, a group key, the second public key are generated using rivest, shamir, adelman(publickey2)With the second private key
(privatekey2).
4, WIFI access points are the second public key(publickey2)Probing response frame as shown in Figure 5 is added(Probe
Response frame management frames)Probe response frame A(Probe Response frame body)Part generates such as Fig. 6
Shown in new probe response frame B(It can be indicated with Probe Response frame body#).
5, WIFI access points use the first public key(publickey1)To new probe response frame B(Probe
Response frame body#)It is encrypted, forms development examination and respond frame(Probe Response frame can be used
Body## is indicated), generate new management frame as shown in Figure 7, i.e. development examination response frame(Probe Response can be used
Frame# is indicated).
6, WIFI access points send development examination response frame(Probe Response frame#)To WIFI terminal.
7, WIFI terminal receives development examination response frame(Probe Response frame#), use the first private key
(privatekey1)To development examination response frame(Probe Response frame #)It is decrypted, obtains WIFI access points
Relevant information, to find the presence of WIFI access points.WIFI terminal preserves the second public key received simultaneously
(publickey2).
8, WIFI terminal uses the second public key(publickey2)Subsequent request frame is sent to WIFI access points, WIFI accesses
Point uses the second private key(privatekey2)Subsequent request frame decryption to receiving.
9, WIFI access points use the first public key(publickey1)Subsequent response frame is sent to WIFI terminal, WIFI terminal
Use the first private key(privatekey1)Response frame decryption to receiving.
The system of a kind of enciphering hiding WIFI access points as shown in Figure 8 and Figure 9, wherein the system comprises such as Fig. 8 institutes
The WIFI access points 100 shown and WIFI terminal 200 as shown in Figure 9, wherein the WIFI access points 100 include:
Rivest, shamir, adelman key production module 110, the first public key and first for generating rivest, shamir, adelman
Private key and corresponding second public key and the second private key;
Encryption and decryption modules 120 are used for by first public key setting in WIFI access points, and being used for will be described
Second public key is added in the frame of management frame, the frame that the second public key is added is encrypted using first public key, shape
The encryption frame received is decrypted at encryption handling frame, and using the first private key and the second private key;
First delivery and reception module 130, for sending encryption handling frame to WIFI terminal and using the transmission of the first public key
Subsequent response frame is to WIFI terminal, and the subsequent request frame for receiving WIFI terminal using the transmission of the second public key.
The WIFI terminal 200 includes:
Management frame receives and deciphering module 210, for first private key to be set in the WIFI terminal, Yi Jiyong
It is decrypted using the encryption frame and subsequent response frame of the first private key pair encryption management frame in WIFI terminal, obtains WIFI accesses
Information is put to find WIFI access points, while preserving second public key received;
Second delivery and reception module 220 is received WIFI access points for WIFI terminal and is added using what the first private key was sent
Close management frame and subsequent response frame, and send subsequent request frame using second public key for WIFI terminal and accessed to WIFI
Point.
The present invention provides a kind of method and system of enciphering hiding WIFI access points, using rivest, shamir, adelman to WIFI
The management frame of interaction is encrypted between terminal and WIFI access points.Only WIFI terminal possesses correct private key to management frame
It is decrypted, could find the presence of the WIFI access points, carry out normally connecting and using data transmission.It is illegal to hide
User reduces WIFI access points and is stolen risk to the visibility of WIFI access points.
It should be understood that the application of the present invention is not limited to the above for those of ordinary skills can
With improvement or transformation based on the above description, all these modifications and variations should all belong to the guarantor of appended claims of the present invention
Protect range.
Claims (8)
1. a kind of WIFI access points enciphering hiding and the method for discovery, which is characterized in that the described method comprises the following steps:
A, the first public key and the first private key of rivest, shamir, adelman is generated in advance, first public key setting is accessed in WIFI
In point, first private key is arranged in WIFI terminal;
B, WIFI access points generate the second public key and the second private key of rivest, shamir, adelman, and second public key is added to pipe
In the frame for managing frame, the frame that the second public key is added is encrypted using first public key, it is concurrent to form encryption handling frame
It send to WIFI terminal;
C, it after WIFI terminal receives the encryption handling frame, is decrypted using the encryption frame of the first private key pair encryption management frame,
WIFI access-in point informations are obtained to find WIFI access points, while preserving second public key received;
D, WIFI terminal sends subsequent request frame to WIFI access points using second public key, and WIFI access points are private using second
Key decrypts the subsequent request frame received;WIFI access points send subsequent response frame to WIFI terminal using the first public key,
WIFI terminal decrypts the subsequent response frame received using the first private key.
2. WIFI access points enciphering hiding according to claim 1 and the method for discovery, which is characterized in that the management frame
Including beacon frame or detection frame;The subsequent request frame includes the authentication request frames and association request defined in 802.11 agreements
Frame;The subsequent response frame includes the authentication response frames and association response frame defined in 802.11 agreements.
3. WIFI access points enciphering hiding according to claim 2 and the method for discovery, which is characterized in that when the management
When frame is beacon frame, the step B is specially:WIFI access points generate the second public key and the second private of rivest, shamir, adelman
Second public key is added in the frame of beacon frame by key, using first public key to the beacon frame of the second public key of addition
Frame is encrypted, and forms encryption beacon frame and is sent to WIFI terminal.
4. WIFI access points enciphering hiding according to claim 3 and the method for discovery, which is characterized in that the step C
Specially:After WIFI terminal receives the encryption beacon frame, solved using the encryption frame of the first private key pair encryption beacon frame
It is close, WIFI access-in point informations are obtained to find WIFI access points, while preserving second public key received.
5. WIFI access points enciphering hiding according to claim 2 and the method for discovery, which is characterized in that when the management
When frame is detection frame, further include between the step A and B:WIFI terminal sends plaintext probe request, and WIFI access points receive
To after the probe request, the step B is executed.
6. WIFI access points enciphering hiding according to claim 5 and the method for discovery, which is characterized in that the step B
Specially:WIFI access points generate the second public key and the second private key of rivest, shamir, adelman, and second public key is added to
In the frame for detecting frame, the frame that the detection frame of the second public key is added is encrypted using first public key, forms encryption
Detection frame is simultaneously sent to WIFI terminal.
7. WIFI access points enciphering hiding according to claim 6 and the method for discovery, which is characterized in that the step C
Specially:After WIFI terminal receives the development examination frame, the encryption frame that frame is detected using the first private key pair encryption is solved
It is close, WIFI access-in point informations are obtained to find WIFI access points, while preserving second public key received.
8. a kind of system to WIFI access points enciphering hiding and discovery, which is characterized in that the system comprises WIFI access points
And WIFI terminal, wherein the WIFI access points include:
Rivest, shamir, adelman key production module, the first public key and the first private key for generating rivest, shamir, adelman, with
And corresponding second public key and the second private key;
Encryption and decryption modules are used for by first public key setting in WIFI access points, and for public by described second
Key is added in the frame of management frame, is encrypted to the frame that the second public key is added using first public key, is formed encryption
Management frame, and the encryption frame received is decrypted using the first private key and the second private key;
First delivery and reception module, for sending encryption handling frame to WIFI terminal and using the first public key transmission subsequent response
Frame is to WIFI terminal, and the subsequent request frame for receiving WIFI terminal using the transmission of the second public key;
The WIFI terminal includes:
Management frame receives and deciphering module, for first private key to be set in the WIFI terminal, and is used for WIFI
Terminal is decrypted using the encryption frame and subsequent response frame of the first private key pair encryption management frame, obtains WIFI access-in point informations
To find WIFI access points, while second public key that preservation receives;
Second delivery and reception module receives the encryption handling frame that WIFI access points utilize the first private key to send for WIFI terminal
With subsequent response frame, and for WIFI terminal subsequent request frame is sent to WIFI access points using second public key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410170279.8A CN105025472B (en) | 2014-04-25 | 2014-04-25 | A kind of WIFI access points enciphering hiding and the method and its system of discovery |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410170279.8A CN105025472B (en) | 2014-04-25 | 2014-04-25 | A kind of WIFI access points enciphering hiding and the method and its system of discovery |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105025472A CN105025472A (en) | 2015-11-04 |
CN105025472B true CN105025472B (en) | 2018-09-18 |
Family
ID=54415096
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410170279.8A Active CN105025472B (en) | 2014-04-25 | 2014-04-25 | A kind of WIFI access points enciphering hiding and the method and its system of discovery |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105025472B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107231673A (en) * | 2016-03-23 | 2017-10-03 | 北京京东尚科信息技术有限公司 | Electronic equipment and its communication means |
CN105979512A (en) * | 2016-05-04 | 2016-09-28 | 深圳市蜂联科技有限公司 | Method of quick STA and AP connection in uncorrelated WIFI environment |
CN106657122A (en) * | 2016-12-30 | 2017-05-10 | 广东欧珀移动通信有限公司 | Data processing method and device as well as terminal device |
CN107182053B (en) * | 2017-06-08 | 2019-06-07 | 上海掌门科技有限公司 | It is a kind of for connecting the method and apparatus of hiding wireless access point |
US10271215B1 (en) * | 2018-06-27 | 2019-04-23 | Hewlett Packard Enterprise Development Lp | Management frame encryption and decryption |
CN110381505B (en) * | 2019-07-22 | 2023-06-16 | 浙江大华技术股份有限公司 | Method and device for accessing network hard disk video recorder |
CN111010693B (en) * | 2019-11-25 | 2023-10-03 | 华为技术有限公司 | Method for providing wireless fidelity network access service and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101765110A (en) * | 2009-12-21 | 2010-06-30 | 苏州汉明科技有限公司 | Dedicated encryption protection method between user and wireless access point |
CN101848463A (en) * | 2010-03-16 | 2010-09-29 | 苏州汉明科技有限公司 | Method for protecting access of legal user based on wireless access point |
CN102014342A (en) * | 2010-12-31 | 2011-04-13 | 西安西电捷通无线网络通信股份有限公司 | Network system and method for hybrid networking |
CN102946605A (en) * | 2012-11-02 | 2013-02-27 | 清华大学 | Wireless local area network (WLAN) access method and system |
-
2014
- 2014-04-25 CN CN201410170279.8A patent/CN105025472B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101765110A (en) * | 2009-12-21 | 2010-06-30 | 苏州汉明科技有限公司 | Dedicated encryption protection method between user and wireless access point |
CN101848463A (en) * | 2010-03-16 | 2010-09-29 | 苏州汉明科技有限公司 | Method for protecting access of legal user based on wireless access point |
CN102014342A (en) * | 2010-12-31 | 2011-04-13 | 西安西电捷通无线网络通信股份有限公司 | Network system and method for hybrid networking |
CN102946605A (en) * | 2012-11-02 | 2013-02-27 | 清华大学 | Wireless local area network (WLAN) access method and system |
Also Published As
Publication number | Publication date |
---|---|
CN105025472A (en) | 2015-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105025472B (en) | A kind of WIFI access points enciphering hiding and the method and its system of discovery | |
EP3051744B1 (en) | Key configuration method and apparatus | |
US20190199532A1 (en) | Authentication method, authentication apparatus, and authentication system | |
US7986940B2 (en) | Automatic wireless network linking method with security configuration and device thereof | |
US7689211B2 (en) | Secure login method for establishing a wireless local area network connection, and wireless local area network system | |
US10588015B2 (en) | Terminal authenticating method, apparatus, and system | |
CN105553951A (en) | Data transmission method and data transmission device | |
US9571475B2 (en) | Call encryption systems and methods | |
JP6807153B2 (en) | Devices and related methods for secure hearing device communication | |
CN101822082A (en) | The technology that is used for safe laneization between UICC and the terminal | |
KR20160058491A (en) | Method and apparatus for providing services based on identifier of user device | |
CN104955038A (en) | Method for distributing addressing identification, and access point, site and communication system | |
CN106162537B (en) | A kind of method, wireless telecom equipment and the terminal of safety certification connection | |
WO2022111187A1 (en) | Terminal authentication method and apparatus, computer device, and storage medium | |
CN101895882A (en) | Data transmission method, system and device in WiMAX system | |
US11962692B2 (en) | Encrypting data in a pre-associated state | |
US20070081672A1 (en) | Methods to enhance wlan security | |
Noh et al. | Secure authentication and four-way handshake scheme for protected individual communication in public wi-fi networks | |
CN105407109A (en) | Data secure transmission method between Bluetooth devices | |
KR101358375B1 (en) | Prevention security system and method for smishing | |
US10574441B2 (en) | Management of cryptographic keys | |
WO2014194818A1 (en) | Method for discovering user of equipment, and user equipment | |
Diallo et al. | A secure authentication scheme for bluetooth connection | |
CN106209384A (en) | Use the client terminal of security mechanism and the communication authentication method of charging device | |
Doh et al. | Key establishment and management for secure cellular machine-to-machine communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |