CN111314917A - Method for controlling wireless terminal access and wireless access point - Google Patents
Method for controlling wireless terminal access and wireless access point Download PDFInfo
- Publication number
- CN111314917A CN111314917A CN202010109679.3A CN202010109679A CN111314917A CN 111314917 A CN111314917 A CN 111314917A CN 202010109679 A CN202010109679 A CN 202010109679A CN 111314917 A CN111314917 A CN 111314917A
- Authority
- CN
- China
- Prior art keywords
- address information
- information
- module
- wireless terminal
- access point
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention discloses a method for controlling the access of a wireless terminal and a wireless access point, belonging to the technical field of wireless communication technology, comprising a control system, wherein the control system comprises a common address information module, an authentication module, a timing check module and an address comparison module; the wireless access point can regularly carry out address check on the interactive wireless terminal and interrupt the interaction with the wireless terminal with abnormal address information.
Description
Technical Field
The present invention relates to the field of wireless communication technologies, and in particular, to a method for controlling access of a wireless terminal and a wireless access point.
Background
At present, in a large-area Wireless Local Area Network (WLAN) deployment, a 2.4G frequency band wireless network is dominant, and at this time, the performance of a wireless terminal will be rapidly reduced due to contention of other users under the same wireless Access Point (AP) or co-channel interference of other APs. The dual-frequency AP may offload part of wireless terminal data supporting a 5G frequency band (referring to a frequency band between 5.1G and 5.8G, including 5.8G), and reduce bandwidth contention and traffic pressure of a 2.4G frequency band.
In the prior art, reference may be made to chinese patent invention with an authorization publication number of CN103813410B, which discloses a method for controlling access of a wireless terminal and a wireless access point, the method comprising: a wireless Access Point (AP) receives a detection request frame and a first association request frame sent by a wireless terminal; judging whether the wireless terminal supports a 5G frequency band or not according to the detection request frame; judging whether the first association request frame is from a 5G frequency band; if the wireless terminal supports a 5G frequency band and the first association request frame is from the 5G frequency band, allowing the wireless terminal to access; if the wireless terminal supports the 5G frequency band, but the first association request frame comes from the 2.4G frequency band, the second association request frame sent by the wireless terminal is continuously received, and the wireless terminal is not allowed to access until the second association frame comes from the 5G frequency band.
The above prior art solutions have the following drawbacks: at present, wireless communication technology is continuously developed, frequency bands of wireless signals are more and more, wireless terminals are more and more, one wireless terminal can be covered by a plurality of wireless signals, the wireless terminal and the wireless signals can be subjected to data communication only through scanning, authentication and association, however, if other wireless terminals hijack or decode the authentication mode in the process, the wireless signals can be stolen, and even private information can be hijacked.
Disclosure of Invention
The invention aims to provide a method for controlling the access of a wireless terminal, which can prevent other people from embezzlement of information transmitted by the wireless terminal and ensure the security of wireless signal transmission.
The technical purpose of the invention is realized by the following technical scheme:
a method for controlling access of a wireless terminal, comprising the steps of:
firstly, a wireless access point sends a wireless signal, and a wireless terminal receives the wireless signal and sends authentication information with address information to the wireless access point;
the wireless access point receives the authentication information, then performs authentication and stores the authentication information, and if the authentication is passed, sends a request permission to the wireless terminal and interacts with the wireless terminal;
thirdly, the wireless access point calls the address information of the wireless terminal at regular time and searches in a common address information base stored by the wireless access point;
if not, sending an address calling request to the wireless terminal;
fifthly, the wireless terminal sends address information to the wireless access point after receiving the calling request;
and sixthly, the wireless access point compares the address information with address information in the stored authentication information after receiving the address information, and if the address information is different from the address information, the interaction with the wireless terminal is interrupted.
By adopting the scheme, the wireless access point can regularly carry out address detection on the interactive wireless terminal so as to ensure that no other wireless terminal steals the wireless signal, effectively ensure the safety and reliability of wireless signal transmission, and mainly prevent other people from steal the information transmitted by the wireless terminal.
The invention is further configured to: the sixth step further includes:
sixthly, counting the address information once if the address information received by the wireless access point is the same as the address information in the stored authentication information;
and sixthly, when the count of the same address information reaches a preset value, adding the address information into a common address information base.
By adopting the scheme, the wireless access point can automatically add the address information which passes the inspection for many times into the common address information base, and the inspection flow is reduced.
The invention is further configured to: further comprising the steps of:
and seventhly, the wireless access point receives locally input address information and adds the input address information to a common address information base.
By adopting the scheme, the user can directly manage the common address information base at the wireless access point.
The invention is further configured to: further comprising the steps of:
and eighthly, if the wireless access point receives a plurality of same address information at the same time, sending alarm information to each address information source.
By adopting the scheme, the wireless access point can remind the user information of the wireless terminal of possible embezzlement risk, and the user is prevented from sending private information.
The invention is further configured to: the eighth step further comprises:
eigha, after the wireless access point sends alarm information, a depth information request is sent to the wireless terminal corresponding to the address information, the wireless terminal selects whether to send detailed information of the wireless terminal to the wireless access point or not after receiving the depth information request, and if the wireless access point does not receive the detailed information of the wireless terminal sent by the wireless terminal, the corresponding wireless terminal is locked.
By adopting the scheme, the wireless terminal can automatically send requests to a plurality of wireless terminals with the same address information, if the wireless terminal refuses to send detailed information, the wireless terminal can be locked, operations such as disconnection, tracking and the like are convenient, and if the wireless terminal selects to send the detailed information, a user can also check the detailed information through the wireless access point to distinguish the wireless terminal.
The invention aims to provide a wireless access point which can prevent other people from embezzlement of information transmitted by a wireless terminal and ensure the security of wireless signal transmission.
The technical purpose of the invention is realized by the following technical scheme:
a wireless access point comprises a control system, wherein the control system comprises a common address information module, an authentication module, a timing check module and an address comparison module;
the common address information module is used as a common address information base to store common address information;
the authentication module stores an authentication rule, receives authentication information input from the outside and authenticates the authentication information according to the authentication rule, if the authentication is passed, a request permission is sent to an authentication information source and the authentication information source is interacted with the authentication information source, and meanwhile, the authentication module outputs a starting signal with the authentication information;
the timing check module receives a starting signal output by the authentication module, starts timing after receiving the starting signal, calls address information in the wireless information in interaction of corresponding sources when the timing reaches a set value, retrieves the address information in the common address information module by using the called address information, and outputs a comparison signal if the address information is not retrieved;
the address comparison module receives a comparison signal output by the timing check module, sends an address calling request to the corresponding wireless terminal after receiving the comparison signal, receives address information sent by the corresponding wireless terminal and compares the address information with address information in the stored authentication information, and controls the wireless access point to stop interaction with the wireless terminal if the address information is different from the address information.
Through adopting above-mentioned scheme, wireless access point can regularly carry out address detection to interactive wireless terminal to guarantee not to have other wireless terminal to steal wireless signal, effectively guaranteed wireless signal transmission's security and reliability, mainly can prevent that other people from steal the information that wireless terminal transmitted, this product is fit for domestic or office space and uses in fact.
The invention is further configured to: the control system also comprises an address counting module which is connected with the address comparison module, if the address comparison module compares that the address information is the same as the address information in the stored authentication information, the address information is counted once, and when the count reaches a preset value, the address information is sent to the common address information module for storage.
By adopting the scheme, the wireless access point can automatically add the address information which passes the inspection for many times into the common address information base, and the inspection flow is reduced.
The invention is further configured to: the control system also comprises a manual adding module, wherein the manual adding module receives address information input from the outside and transmits the address information to the common address information module for storage.
By adopting the scheme, the user can directly manage the common address information base by manually adding the module.
The invention is further configured to: the control system also comprises an alarm module;
the address comparison module sends address information to the alarm module when receiving a plurality of same address information at the same time;
the alarm module stores preset alarm information, and sends the alarm information to the corresponding address information after receiving the address information.
By adopting the scheme, the wireless access point can remind the user information of the wireless terminal of possible embezzlement risk, and the user is prevented from sending private information.
The invention is further configured to: the alarm module receives the address information and then sends a depth information request to the corresponding address information and performs timing, if the timing reaches a preset value, the alarm module does not receive the detailed information of the wireless terminal, the corresponding wireless terminal is locked, and if the alarm module receives the detailed information of the wireless terminal, the timing is stopped and the detailed information of the wireless terminal is stored.
By adopting the scheme, the wireless terminal can automatically send requests to a plurality of wireless terminals with the same address information, if the wireless terminal refuses to send detailed information, the wireless terminal can be locked, operations such as disconnection, tracking and the like are convenient, and if the wireless terminal selects to send the detailed information, a user can also check the detailed information through the wireless access point to distinguish the wireless terminal.
In conclusion, the invention has the following beneficial effects:
1. the wireless access point can regularly carry out address detection to interactive wireless terminal to guarantee that other wireless terminals can not steal wireless signals, effectively guarantee the security and the reliability of wireless signal transmission, mainly can prevent that other people from steal the information of wireless terminal transmission.
2. The wireless terminal can automatically send requests to a plurality of wireless terminals with the same address information, if the wireless terminal refuses to send the detailed information, the wireless terminal can be locked, operations such as disconnection, tracking and the like are convenient to carry out, and if the wireless terminal selects to send the detailed information, a user can also check the detailed information through the wireless access point to distinguish the wireless terminal.
Drawings
Fig. 1 is an overall system block diagram of the second embodiment.
In the figure, 1, a common address information module; 2. an authentication module; 3. a manual addition module; 4. an address counting module; 5. a timing check module; 6. an address comparison module; 7. and an alarm module.
Detailed Description
The first embodiment is as follows: a method for controlling wireless terminal access specifically comprises the following steps:
step one, the wireless access point sends out a wireless signal, and the wireless terminal receives the wireless signal and sends authentication information with address information to the wireless access point.
And step two, the wireless access point receives the authentication information, then performs authentication and stores the authentication information, and if the authentication is passed, sends a request permission to the wireless terminal and interacts with the wireless terminal.
And step three, the wireless access point establishes a common address information base. The wireless access point calls the address information of the wireless terminal at regular time and searches in a common address information base stored in the wireless access point.
And step four, if the address is not searched, sending an address calling request to the wireless terminal.
And step five, the wireless terminal sends the address information to the wireless access point after receiving the calling request.
And step six, the wireless access point compares the address information with the address information in the stored authentication information after receiving the address information, and if the address information is different from the address information, the interaction with the wireless terminal is interrupted. If the address information received by the wireless access point is the same as the address information in the stored authentication information, counting the address information once, and adding the address information into a common address information base when the count of the same address information reaches a preset value.
And step seven, the wireless access point receives the locally input address information and adds the input address information into a common address information base.
And step eight, if the wireless access point receives a plurality of same address information at the same time, sending alarm information to each address information source. And after sending the alarm information, the wireless access point sends a depth information request to the wireless terminal corresponding to the address information. And after receiving the depth information request, the wireless terminal selects whether to send the detailed information of the wireless terminal to the wireless access point. And if the wireless access point does not receive the detailed information of the wireless terminal sent by the wireless terminal, locking the corresponding wireless terminal.
The wireless access point can regularly carry out address detection on the interactive wireless terminal so as to ensure that no other wireless terminal steals the wireless signal and effectively ensure the safety and reliability of wireless signal transmission. The wireless access point can automatically add the common address information and can also manually add the common address information. If a plurality of same address information appears, the address of the wireless terminal may be hijacked, and the wireless access point can remind the user information of the wireless terminal that the information may be stolen, so that the user is prevented from sending private information. The wireless terminal automatically sends requests to a plurality of wireless terminals with the same address information, and if the wireless terminal refuses to send detailed information, the wireless terminal can be locked, and operations such as disconnection, tracking and the like are convenient to carry out. If the wireless terminal selects to send the detailed information, the user can also distinguish the wireless terminal by checking the detailed information through the wireless access point.
The second embodiment is a wireless access point, as shown in fig. 1, including a control system, where the control system includes a common address information module 1, an authentication module 2, a timing check module 5, an address comparison module 6, a manual addition module 3, an address counting module 4, and an alarm module 7.
As shown in fig. 1, the common address information module 1 stores common address information as a common address information base. The manual adding module 3 receives externally input address information and transmits the address information to the common address information module 1 for storage. The user can directly manage the common address information base through the manual adding module 3.
As shown in fig. 1, the authentication module 2 stores an authentication rule, the authentication module 2 receives authentication information input from the outside and authenticates the authentication information according to the authentication rule, if the authentication is passed, the authentication module sends a request permission to the authentication information source and interacts with the authentication information source, and meanwhile, the authentication module 2 outputs a start signal with the authentication information. The authentication module 2 is used for the wireless access point to authenticate the wireless terminal and start to interact with the wireless terminal.
As shown in fig. 1, the timing check module 5 receives the start signal output by the authentication module 2, and starts timing when the timing check module 5 receives the start signal. When the timing reaches a set value, the address information in the wireless information in the interaction of the corresponding source is called, and the called address information is used for retrieving the address information in the common address information module 1. If not, a comparison signal is output.
As shown in fig. 1, the address comparison module 6 receives the comparison signal output by the timing check module 5, and sends an address calling request to the corresponding wireless terminal after receiving the comparison signal. The address comparison module receives the address information sent by the corresponding wireless terminal and compares the address information with the address information in the stored authentication information, and if the address information is different from the address information in the stored authentication information, the address comparison module controls the wireless access point to stop interacting with the wireless terminal. The address comparison module sends address information to the alarm module 7 when receiving a plurality of same address information at the same time. The wireless access point can regularly carry out address detection on the interactive wireless terminal so as to ensure that no other wireless terminal steals the wireless signal and effectively ensure the safety and reliability of wireless signal transmission.
As shown in fig. 1, the address counting module 4 is connected to the address comparison module 6, and if the address comparison module 6 compares the address information with the address information in the stored authentication information, it counts the address information once. When the count reaches a preset value, the address information is sent to the common address information module 1 for storage. The wireless access point can automatically add the address information of the multi-pass inspection to the common address information base, and the inspection flow is reduced.
As shown in fig. 1, the alarm module 7 stores preset alarm information, and the alarm module 7 sends the alarm information to the corresponding address information after receiving the address information. The wireless access point can remind the user information of the wireless terminal that the risk of embezzlement exists possibly, and the user is prevented from sending private information. And the alarm module 7 sends a depth information request to the corresponding address information after receiving the address information and performs timing. And if the alarm module 7 does not receive the detailed information of the wireless terminal when the timing reaches the preset value, locking the corresponding wireless terminal. And if the alarm module 7 receives the detailed information of the wireless terminal, stopping timing and storing the detailed information of the wireless terminal. The wireless terminal can automatically send requests to a plurality of wireless terminals with the same address information, if the wireless terminal refuses to send the detailed information, the wireless terminal can be locked, operations such as disconnection, tracking and the like are convenient to carry out, and if the wireless terminal selects to send the detailed information, a user can also check the detailed information through the wireless access point to distinguish the wireless terminal.
The use method comprises the following steps: the user firstly sets a common address information base on the wireless access point, and then communicates the wireless terminal with the wireless access point through the authentication module 2. The wireless access point checks the transmitted wireless signals at regular time, and extracts the address information in the wireless signals to detect whether the current network is normal. The wireless access point can automatically stop the data interaction of the abnormal address information source, and simultaneously can send an alarm to the user when the address of the wireless terminal of the user is hijacked, and search and track the abnormal wireless terminal.
The embodiments of the present invention are preferred embodiments of the present invention, and the scope of the present invention is not limited by these embodiments, so: all equivalent changes made according to the structure, shape and principle of the invention are covered by the protection scope of the invention.
Claims (10)
1. A method for controlling access of a wireless terminal, comprising the steps of:
firstly, a wireless access point sends a wireless signal, and a wireless terminal receives the wireless signal and sends authentication information with address information to the wireless access point;
the wireless access point receives the authentication information, then performs authentication and stores the authentication information, and if the authentication is passed, sends a request permission to the wireless terminal and interacts with the wireless terminal;
thirdly, the wireless access point calls the address information of the wireless terminal at regular time and searches in a common address information base stored by the wireless access point;
if not, sending an address calling request to the wireless terminal;
fifthly, the wireless terminal sends address information to the wireless access point after receiving the calling request;
and sixthly, the wireless access point compares the address information with address information in the stored authentication information after receiving the address information, and if the address information is different from the address information, the interaction with the wireless terminal is interrupted.
2. The method of claim 1, wherein the sixth step further comprises:
sixthly, counting the address information once if the address information received by the wireless access point is the same as the address information in the stored authentication information;
and sixthly, when the count of the same address information reaches a preset value, adding the address information into a common address information base.
3. The method of claim 2, further comprising the steps of:
and seventhly, the wireless access point receives locally input address information and adds the input address information to a common address information base.
4. The method of claim 3, further comprising the steps of:
and eighthly, if the wireless access point receives a plurality of same address information at the same time, sending alarm information to each address information source.
5. The method of claim 4, wherein step eight further comprises:
eigha, after the wireless access point sends alarm information, a depth information request is sent to the wireless terminal corresponding to the address information, the wireless terminal selects whether to send detailed information of the wireless terminal to the wireless access point or not after receiving the depth information request, and if the wireless access point does not receive the detailed information of the wireless terminal sent by the wireless terminal, the corresponding wireless terminal is locked.
6. A wireless access point, characterized by: the system comprises a control system, wherein the control system comprises a common address information module (1), an authentication module (2), a timing check module (5) and an address comparison module (6);
the common address information module (1) is used as a common address information base to store common address information;
the authentication module (2) stores an authentication rule, the authentication module (2) receives authentication information input from the outside and authenticates the authentication information according to the authentication rule, if the authentication is passed, a request permission is sent to an authentication information source and the authentication information source is interacted, and meanwhile, the authentication module (2) outputs a starting signal with the authentication information;
the timing check module (5) receives the starting signal output by the authentication module (2), starts timing after the timing check module (5) receives the starting signal, calls address information in the wireless information in interaction of corresponding sources when the timing reaches a set value, retrieves the address information in the common address information module (1) by using the called address information, and outputs a comparison signal if the address information is not retrieved;
the address comparison module (6) receives the comparison signal output by the timing check module (5), sends an address calling request to the corresponding wireless terminal after receiving the comparison signal, receives the address information sent by the corresponding wireless terminal and compares the address information with the address information in the stored authentication information, and controls the wireless access point to stop interacting with the wireless terminal if the address information is different from the address information.
7. A wireless access point according to claim 6, wherein: the control system further comprises an address counting module (4), the address counting module (4) is connected with the address comparison module (6), if the address comparison module (6) compares that the address information is the same as the address information in the stored authentication information, the address information is counted once, and when the count reaches a preset value, the address information is sent to the common address information module (1) for storage.
8. A wireless access point according to claim 7, wherein: the control system further comprises a manual adding module (3), wherein the manual adding module (3) receives address information input from the outside and transmits the address information to the common address information module (1) for storage.
9. A wireless access point according to claim 6, wherein: the control system also comprises an alarm module (7);
the address comparison module sends address information to the alarm module (7) when receiving a plurality of same address information at the same time;
alarm module (7) storage has predetermined alarm information, and alarm module (7) receive address message back and send alarm information to corresponding address message.
10. The method and the wireless access point of claim 9, wherein: the alarm module (7) receives the address information and then sends a depth information request to the corresponding address information and performs timing, if the timing reaches a preset value, the alarm module (7) does not receive the detailed information of the wireless terminal, the corresponding wireless terminal is locked, and if the alarm module (7) receives the detailed information of the wireless terminal, the timing is stopped and the detailed information of the wireless terminal is stored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010109679.3A CN111314917B (en) | 2020-02-22 | 2020-02-22 | Method for controlling wireless terminal access and wireless access point |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010109679.3A CN111314917B (en) | 2020-02-22 | 2020-02-22 | Method for controlling wireless terminal access and wireless access point |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111314917A true CN111314917A (en) | 2020-06-19 |
CN111314917B CN111314917B (en) | 2023-06-23 |
Family
ID=71162156
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010109679.3A Active CN111314917B (en) | 2020-02-22 | 2020-02-22 | Method for controlling wireless terminal access and wireless access point |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111314917B (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060114863A1 (en) * | 2004-12-01 | 2006-06-01 | Cisco Technology, Inc. | Method to secure 802.11 traffic against MAC address spoofing |
CN101079741A (en) * | 2007-06-29 | 2007-11-28 | 杭州华三通信技术有限公司 | Access point, access controller and method for monitoring illegal access |
KR20090019443A (en) * | 2007-08-21 | 2009-02-25 | 엔에이치엔(주) | User authentication system using ip address and method thereof |
US8045569B1 (en) * | 2007-09-18 | 2011-10-25 | Marvell International Ltd. | Mechanism to verify packet data network support for internet protocol mobility |
CN103476143A (en) * | 2012-06-07 | 2013-12-25 | 中国移动通信集团公司 | Method, device and system for IP resource releasing of WLAN |
CN104125568A (en) * | 2014-08-11 | 2014-10-29 | 醴陵恒茂电子科技有限公司 | Wireless access point safe authentication method and system |
WO2014189262A1 (en) * | 2013-05-24 | 2014-11-27 | Strix Inc. | User terminal authentication method of access point apparatus |
CN105188059A (en) * | 2015-09-30 | 2015-12-23 | 上海斐讯数据通信技术有限公司 | Authentication method based on Portal server abnormity, and wireless access point |
CN105246073A (en) * | 2015-08-28 | 2016-01-13 | 深圳市信锐网科技术有限公司 | Wireless network access authentication method and server |
US20160021610A1 (en) * | 2014-07-17 | 2016-01-21 | Xiaomi Inc. | Network connection method and apparatus |
CN105848131A (en) * | 2016-05-09 | 2016-08-10 | 厦门四信通信科技有限公司 | Method for realizing STA cross-domain roaming through cloud AC |
CN106603422A (en) * | 2016-12-09 | 2017-04-26 | 上海斐讯数据通信技术有限公司 | Network steal prevention method of wireless router, and wireless router |
CN106982430A (en) * | 2017-03-22 | 2017-07-25 | 上海斐讯数据通信技术有限公司 | A kind of portal authentication method and system based on user's use habit |
-
2020
- 2020-02-22 CN CN202010109679.3A patent/CN111314917B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060114863A1 (en) * | 2004-12-01 | 2006-06-01 | Cisco Technology, Inc. | Method to secure 802.11 traffic against MAC address spoofing |
CN101079741A (en) * | 2007-06-29 | 2007-11-28 | 杭州华三通信技术有限公司 | Access point, access controller and method for monitoring illegal access |
KR20090019443A (en) * | 2007-08-21 | 2009-02-25 | 엔에이치엔(주) | User authentication system using ip address and method thereof |
US8045569B1 (en) * | 2007-09-18 | 2011-10-25 | Marvell International Ltd. | Mechanism to verify packet data network support for internet protocol mobility |
CN103476143A (en) * | 2012-06-07 | 2013-12-25 | 中国移动通信集团公司 | Method, device and system for IP resource releasing of WLAN |
WO2014189262A1 (en) * | 2013-05-24 | 2014-11-27 | Strix Inc. | User terminal authentication method of access point apparatus |
US20160021610A1 (en) * | 2014-07-17 | 2016-01-21 | Xiaomi Inc. | Network connection method and apparatus |
CN104125568A (en) * | 2014-08-11 | 2014-10-29 | 醴陵恒茂电子科技有限公司 | Wireless access point safe authentication method and system |
CN105246073A (en) * | 2015-08-28 | 2016-01-13 | 深圳市信锐网科技术有限公司 | Wireless network access authentication method and server |
CN105188059A (en) * | 2015-09-30 | 2015-12-23 | 上海斐讯数据通信技术有限公司 | Authentication method based on Portal server abnormity, and wireless access point |
CN105848131A (en) * | 2016-05-09 | 2016-08-10 | 厦门四信通信科技有限公司 | Method for realizing STA cross-domain roaming through cloud AC |
CN106603422A (en) * | 2016-12-09 | 2017-04-26 | 上海斐讯数据通信技术有限公司 | Network steal prevention method of wireless router, and wireless router |
CN106982430A (en) * | 2017-03-22 | 2017-07-25 | 上海斐讯数据通信技术有限公司 | A kind of portal authentication method and system based on user's use habit |
Also Published As
Publication number | Publication date |
---|---|
CN111314917B (en) | 2023-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2815391B2 (en) | Communication transmission system | |
USRE40791E1 (en) | Method and system for verifying the authenticity of a first communication participants in a communications network | |
US4815031A (en) | Method for granting a request to authorized data terminal users accessing from any locations | |
US5805992A (en) | Method for validating a communication link | |
US5483670A (en) | Trunked radio repeater system with control channel monitoring feature | |
JP4696176B2 (en) | Mobile station operated in mobile radio network and method of operating mobile station | |
US6266525B1 (en) | Method for detecting fraudulent use of a communications system | |
US20010036273A1 (en) | Radio communication device and user authentication method for use therewith | |
US4477799A (en) | Security apparatus with alarm search and verification capability | |
JPH0833041A (en) | Method and equipment for establishing communication link | |
JP2005536120A (en) | Wireless local or metropolitan area network with intrusion detection and related methods | |
WO1995015066A1 (en) | Authentication for analog communication systems | |
US6360091B1 (en) | Method and apparatus for establishing a communication link | |
RU2153229C2 (en) | Method and device for improved message reception by stationary systemic receiver | |
JP2001209614A (en) | Authentication system and its method | |
JPS60236537A (en) | Identification signal nonapproved use detecting method | |
CN111314917B (en) | Method for controlling wireless terminal access and wireless access point | |
US6310538B1 (en) | Process of access restriction to a telecommunications network, telecommunications system and unit for such a system | |
JPH0746661A (en) | System and equipment for mobile radio communication | |
WO1998000956A2 (en) | System and method for preventing cellular fraud | |
JPS5915419B2 (en) | Method to prevent unauthorized use of mobile devices | |
CN105743845A (en) | Authentication method and device | |
CN1096802C (en) | Radio call receiver | |
JPH10304446A (en) | Communication system | |
JP4068314B2 (en) | Wireless terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |