CN111314917A - Method for controlling wireless terminal access and wireless access point - Google Patents

Method for controlling wireless terminal access and wireless access point Download PDF

Info

Publication number
CN111314917A
CN111314917A CN202010109679.3A CN202010109679A CN111314917A CN 111314917 A CN111314917 A CN 111314917A CN 202010109679 A CN202010109679 A CN 202010109679A CN 111314917 A CN111314917 A CN 111314917A
Authority
CN
China
Prior art keywords
address information
information
module
wireless terminal
access point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010109679.3A
Other languages
Chinese (zh)
Other versions
CN111314917B (en
Inventor
马小文
马广鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tianhe Communication Co ltd
Original Assignee
Shenzhen Tianhe Communication Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tianhe Communication Co ltd filed Critical Shenzhen Tianhe Communication Co ltd
Priority to CN202010109679.3A priority Critical patent/CN111314917B/en
Publication of CN111314917A publication Critical patent/CN111314917A/en
Application granted granted Critical
Publication of CN111314917B publication Critical patent/CN111314917B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a method for controlling the access of a wireless terminal and a wireless access point, belonging to the technical field of wireless communication technology, comprising a control system, wherein the control system comprises a common address information module, an authentication module, a timing check module and an address comparison module; the wireless access point can regularly carry out address check on the interactive wireless terminal and interrupt the interaction with the wireless terminal with abnormal address information.

Description

Method for controlling wireless terminal access and wireless access point
Technical Field
The present invention relates to the field of wireless communication technologies, and in particular, to a method for controlling access of a wireless terminal and a wireless access point.
Background
At present, in a large-area Wireless Local Area Network (WLAN) deployment, a 2.4G frequency band wireless network is dominant, and at this time, the performance of a wireless terminal will be rapidly reduced due to contention of other users under the same wireless Access Point (AP) or co-channel interference of other APs. The dual-frequency AP may offload part of wireless terminal data supporting a 5G frequency band (referring to a frequency band between 5.1G and 5.8G, including 5.8G), and reduce bandwidth contention and traffic pressure of a 2.4G frequency band.
In the prior art, reference may be made to chinese patent invention with an authorization publication number of CN103813410B, which discloses a method for controlling access of a wireless terminal and a wireless access point, the method comprising: a wireless Access Point (AP) receives a detection request frame and a first association request frame sent by a wireless terminal; judging whether the wireless terminal supports a 5G frequency band or not according to the detection request frame; judging whether the first association request frame is from a 5G frequency band; if the wireless terminal supports a 5G frequency band and the first association request frame is from the 5G frequency band, allowing the wireless terminal to access; if the wireless terminal supports the 5G frequency band, but the first association request frame comes from the 2.4G frequency band, the second association request frame sent by the wireless terminal is continuously received, and the wireless terminal is not allowed to access until the second association frame comes from the 5G frequency band.
The above prior art solutions have the following drawbacks: at present, wireless communication technology is continuously developed, frequency bands of wireless signals are more and more, wireless terminals are more and more, one wireless terminal can be covered by a plurality of wireless signals, the wireless terminal and the wireless signals can be subjected to data communication only through scanning, authentication and association, however, if other wireless terminals hijack or decode the authentication mode in the process, the wireless signals can be stolen, and even private information can be hijacked.
Disclosure of Invention
The invention aims to provide a method for controlling the access of a wireless terminal, which can prevent other people from embezzlement of information transmitted by the wireless terminal and ensure the security of wireless signal transmission.
The technical purpose of the invention is realized by the following technical scheme:
a method for controlling access of a wireless terminal, comprising the steps of:
firstly, a wireless access point sends a wireless signal, and a wireless terminal receives the wireless signal and sends authentication information with address information to the wireless access point;
the wireless access point receives the authentication information, then performs authentication and stores the authentication information, and if the authentication is passed, sends a request permission to the wireless terminal and interacts with the wireless terminal;
thirdly, the wireless access point calls the address information of the wireless terminal at regular time and searches in a common address information base stored by the wireless access point;
if not, sending an address calling request to the wireless terminal;
fifthly, the wireless terminal sends address information to the wireless access point after receiving the calling request;
and sixthly, the wireless access point compares the address information with address information in the stored authentication information after receiving the address information, and if the address information is different from the address information, the interaction with the wireless terminal is interrupted.
By adopting the scheme, the wireless access point can regularly carry out address detection on the interactive wireless terminal so as to ensure that no other wireless terminal steals the wireless signal, effectively ensure the safety and reliability of wireless signal transmission, and mainly prevent other people from steal the information transmitted by the wireless terminal.
The invention is further configured to: the sixth step further includes:
sixthly, counting the address information once if the address information received by the wireless access point is the same as the address information in the stored authentication information;
and sixthly, when the count of the same address information reaches a preset value, adding the address information into a common address information base.
By adopting the scheme, the wireless access point can automatically add the address information which passes the inspection for many times into the common address information base, and the inspection flow is reduced.
The invention is further configured to: further comprising the steps of:
and seventhly, the wireless access point receives locally input address information and adds the input address information to a common address information base.
By adopting the scheme, the user can directly manage the common address information base at the wireless access point.
The invention is further configured to: further comprising the steps of:
and eighthly, if the wireless access point receives a plurality of same address information at the same time, sending alarm information to each address information source.
By adopting the scheme, the wireless access point can remind the user information of the wireless terminal of possible embezzlement risk, and the user is prevented from sending private information.
The invention is further configured to: the eighth step further comprises:
eigha, after the wireless access point sends alarm information, a depth information request is sent to the wireless terminal corresponding to the address information, the wireless terminal selects whether to send detailed information of the wireless terminal to the wireless access point or not after receiving the depth information request, and if the wireless access point does not receive the detailed information of the wireless terminal sent by the wireless terminal, the corresponding wireless terminal is locked.
By adopting the scheme, the wireless terminal can automatically send requests to a plurality of wireless terminals with the same address information, if the wireless terminal refuses to send detailed information, the wireless terminal can be locked, operations such as disconnection, tracking and the like are convenient, and if the wireless terminal selects to send the detailed information, a user can also check the detailed information through the wireless access point to distinguish the wireless terminal.
The invention aims to provide a wireless access point which can prevent other people from embezzlement of information transmitted by a wireless terminal and ensure the security of wireless signal transmission.
The technical purpose of the invention is realized by the following technical scheme:
a wireless access point comprises a control system, wherein the control system comprises a common address information module, an authentication module, a timing check module and an address comparison module;
the common address information module is used as a common address information base to store common address information;
the authentication module stores an authentication rule, receives authentication information input from the outside and authenticates the authentication information according to the authentication rule, if the authentication is passed, a request permission is sent to an authentication information source and the authentication information source is interacted with the authentication information source, and meanwhile, the authentication module outputs a starting signal with the authentication information;
the timing check module receives a starting signal output by the authentication module, starts timing after receiving the starting signal, calls address information in the wireless information in interaction of corresponding sources when the timing reaches a set value, retrieves the address information in the common address information module by using the called address information, and outputs a comparison signal if the address information is not retrieved;
the address comparison module receives a comparison signal output by the timing check module, sends an address calling request to the corresponding wireless terminal after receiving the comparison signal, receives address information sent by the corresponding wireless terminal and compares the address information with address information in the stored authentication information, and controls the wireless access point to stop interaction with the wireless terminal if the address information is different from the address information.
Through adopting above-mentioned scheme, wireless access point can regularly carry out address detection to interactive wireless terminal to guarantee not to have other wireless terminal to steal wireless signal, effectively guaranteed wireless signal transmission's security and reliability, mainly can prevent that other people from steal the information that wireless terminal transmitted, this product is fit for domestic or office space and uses in fact.
The invention is further configured to: the control system also comprises an address counting module which is connected with the address comparison module, if the address comparison module compares that the address information is the same as the address information in the stored authentication information, the address information is counted once, and when the count reaches a preset value, the address information is sent to the common address information module for storage.
By adopting the scheme, the wireless access point can automatically add the address information which passes the inspection for many times into the common address information base, and the inspection flow is reduced.
The invention is further configured to: the control system also comprises a manual adding module, wherein the manual adding module receives address information input from the outside and transmits the address information to the common address information module for storage.
By adopting the scheme, the user can directly manage the common address information base by manually adding the module.
The invention is further configured to: the control system also comprises an alarm module;
the address comparison module sends address information to the alarm module when receiving a plurality of same address information at the same time;
the alarm module stores preset alarm information, and sends the alarm information to the corresponding address information after receiving the address information.
By adopting the scheme, the wireless access point can remind the user information of the wireless terminal of possible embezzlement risk, and the user is prevented from sending private information.
The invention is further configured to: the alarm module receives the address information and then sends a depth information request to the corresponding address information and performs timing, if the timing reaches a preset value, the alarm module does not receive the detailed information of the wireless terminal, the corresponding wireless terminal is locked, and if the alarm module receives the detailed information of the wireless terminal, the timing is stopped and the detailed information of the wireless terminal is stored.
By adopting the scheme, the wireless terminal can automatically send requests to a plurality of wireless terminals with the same address information, if the wireless terminal refuses to send detailed information, the wireless terminal can be locked, operations such as disconnection, tracking and the like are convenient, and if the wireless terminal selects to send the detailed information, a user can also check the detailed information through the wireless access point to distinguish the wireless terminal.
In conclusion, the invention has the following beneficial effects:
1. the wireless access point can regularly carry out address detection to interactive wireless terminal to guarantee that other wireless terminals can not steal wireless signals, effectively guarantee the security and the reliability of wireless signal transmission, mainly can prevent that other people from steal the information of wireless terminal transmission.
2. The wireless terminal can automatically send requests to a plurality of wireless terminals with the same address information, if the wireless terminal refuses to send the detailed information, the wireless terminal can be locked, operations such as disconnection, tracking and the like are convenient to carry out, and if the wireless terminal selects to send the detailed information, a user can also check the detailed information through the wireless access point to distinguish the wireless terminal.
Drawings
Fig. 1 is an overall system block diagram of the second embodiment.
In the figure, 1, a common address information module; 2. an authentication module; 3. a manual addition module; 4. an address counting module; 5. a timing check module; 6. an address comparison module; 7. and an alarm module.
Detailed Description
The first embodiment is as follows: a method for controlling wireless terminal access specifically comprises the following steps:
step one, the wireless access point sends out a wireless signal, and the wireless terminal receives the wireless signal and sends authentication information with address information to the wireless access point.
And step two, the wireless access point receives the authentication information, then performs authentication and stores the authentication information, and if the authentication is passed, sends a request permission to the wireless terminal and interacts with the wireless terminal.
And step three, the wireless access point establishes a common address information base. The wireless access point calls the address information of the wireless terminal at regular time and searches in a common address information base stored in the wireless access point.
And step four, if the address is not searched, sending an address calling request to the wireless terminal.
And step five, the wireless terminal sends the address information to the wireless access point after receiving the calling request.
And step six, the wireless access point compares the address information with the address information in the stored authentication information after receiving the address information, and if the address information is different from the address information, the interaction with the wireless terminal is interrupted. If the address information received by the wireless access point is the same as the address information in the stored authentication information, counting the address information once, and adding the address information into a common address information base when the count of the same address information reaches a preset value.
And step seven, the wireless access point receives the locally input address information and adds the input address information into a common address information base.
And step eight, if the wireless access point receives a plurality of same address information at the same time, sending alarm information to each address information source. And after sending the alarm information, the wireless access point sends a depth information request to the wireless terminal corresponding to the address information. And after receiving the depth information request, the wireless terminal selects whether to send the detailed information of the wireless terminal to the wireless access point. And if the wireless access point does not receive the detailed information of the wireless terminal sent by the wireless terminal, locking the corresponding wireless terminal.
The wireless access point can regularly carry out address detection on the interactive wireless terminal so as to ensure that no other wireless terminal steals the wireless signal and effectively ensure the safety and reliability of wireless signal transmission. The wireless access point can automatically add the common address information and can also manually add the common address information. If a plurality of same address information appears, the address of the wireless terminal may be hijacked, and the wireless access point can remind the user information of the wireless terminal that the information may be stolen, so that the user is prevented from sending private information. The wireless terminal automatically sends requests to a plurality of wireless terminals with the same address information, and if the wireless terminal refuses to send detailed information, the wireless terminal can be locked, and operations such as disconnection, tracking and the like are convenient to carry out. If the wireless terminal selects to send the detailed information, the user can also distinguish the wireless terminal by checking the detailed information through the wireless access point.
The second embodiment is a wireless access point, as shown in fig. 1, including a control system, where the control system includes a common address information module 1, an authentication module 2, a timing check module 5, an address comparison module 6, a manual addition module 3, an address counting module 4, and an alarm module 7.
As shown in fig. 1, the common address information module 1 stores common address information as a common address information base. The manual adding module 3 receives externally input address information and transmits the address information to the common address information module 1 for storage. The user can directly manage the common address information base through the manual adding module 3.
As shown in fig. 1, the authentication module 2 stores an authentication rule, the authentication module 2 receives authentication information input from the outside and authenticates the authentication information according to the authentication rule, if the authentication is passed, the authentication module sends a request permission to the authentication information source and interacts with the authentication information source, and meanwhile, the authentication module 2 outputs a start signal with the authentication information. The authentication module 2 is used for the wireless access point to authenticate the wireless terminal and start to interact with the wireless terminal.
As shown in fig. 1, the timing check module 5 receives the start signal output by the authentication module 2, and starts timing when the timing check module 5 receives the start signal. When the timing reaches a set value, the address information in the wireless information in the interaction of the corresponding source is called, and the called address information is used for retrieving the address information in the common address information module 1. If not, a comparison signal is output.
As shown in fig. 1, the address comparison module 6 receives the comparison signal output by the timing check module 5, and sends an address calling request to the corresponding wireless terminal after receiving the comparison signal. The address comparison module receives the address information sent by the corresponding wireless terminal and compares the address information with the address information in the stored authentication information, and if the address information is different from the address information in the stored authentication information, the address comparison module controls the wireless access point to stop interacting with the wireless terminal. The address comparison module sends address information to the alarm module 7 when receiving a plurality of same address information at the same time. The wireless access point can regularly carry out address detection on the interactive wireless terminal so as to ensure that no other wireless terminal steals the wireless signal and effectively ensure the safety and reliability of wireless signal transmission.
As shown in fig. 1, the address counting module 4 is connected to the address comparison module 6, and if the address comparison module 6 compares the address information with the address information in the stored authentication information, it counts the address information once. When the count reaches a preset value, the address information is sent to the common address information module 1 for storage. The wireless access point can automatically add the address information of the multi-pass inspection to the common address information base, and the inspection flow is reduced.
As shown in fig. 1, the alarm module 7 stores preset alarm information, and the alarm module 7 sends the alarm information to the corresponding address information after receiving the address information. The wireless access point can remind the user information of the wireless terminal that the risk of embezzlement exists possibly, and the user is prevented from sending private information. And the alarm module 7 sends a depth information request to the corresponding address information after receiving the address information and performs timing. And if the alarm module 7 does not receive the detailed information of the wireless terminal when the timing reaches the preset value, locking the corresponding wireless terminal. And if the alarm module 7 receives the detailed information of the wireless terminal, stopping timing and storing the detailed information of the wireless terminal. The wireless terminal can automatically send requests to a plurality of wireless terminals with the same address information, if the wireless terminal refuses to send the detailed information, the wireless terminal can be locked, operations such as disconnection, tracking and the like are convenient to carry out, and if the wireless terminal selects to send the detailed information, a user can also check the detailed information through the wireless access point to distinguish the wireless terminal.
The use method comprises the following steps: the user firstly sets a common address information base on the wireless access point, and then communicates the wireless terminal with the wireless access point through the authentication module 2. The wireless access point checks the transmitted wireless signals at regular time, and extracts the address information in the wireless signals to detect whether the current network is normal. The wireless access point can automatically stop the data interaction of the abnormal address information source, and simultaneously can send an alarm to the user when the address of the wireless terminal of the user is hijacked, and search and track the abnormal wireless terminal.
The embodiments of the present invention are preferred embodiments of the present invention, and the scope of the present invention is not limited by these embodiments, so: all equivalent changes made according to the structure, shape and principle of the invention are covered by the protection scope of the invention.

Claims (10)

1. A method for controlling access of a wireless terminal, comprising the steps of:
firstly, a wireless access point sends a wireless signal, and a wireless terminal receives the wireless signal and sends authentication information with address information to the wireless access point;
the wireless access point receives the authentication information, then performs authentication and stores the authentication information, and if the authentication is passed, sends a request permission to the wireless terminal and interacts with the wireless terminal;
thirdly, the wireless access point calls the address information of the wireless terminal at regular time and searches in a common address information base stored by the wireless access point;
if not, sending an address calling request to the wireless terminal;
fifthly, the wireless terminal sends address information to the wireless access point after receiving the calling request;
and sixthly, the wireless access point compares the address information with address information in the stored authentication information after receiving the address information, and if the address information is different from the address information, the interaction with the wireless terminal is interrupted.
2. The method of claim 1, wherein the sixth step further comprises:
sixthly, counting the address information once if the address information received by the wireless access point is the same as the address information in the stored authentication information;
and sixthly, when the count of the same address information reaches a preset value, adding the address information into a common address information base.
3. The method of claim 2, further comprising the steps of:
and seventhly, the wireless access point receives locally input address information and adds the input address information to a common address information base.
4. The method of claim 3, further comprising the steps of:
and eighthly, if the wireless access point receives a plurality of same address information at the same time, sending alarm information to each address information source.
5. The method of claim 4, wherein step eight further comprises:
eigha, after the wireless access point sends alarm information, a depth information request is sent to the wireless terminal corresponding to the address information, the wireless terminal selects whether to send detailed information of the wireless terminal to the wireless access point or not after receiving the depth information request, and if the wireless access point does not receive the detailed information of the wireless terminal sent by the wireless terminal, the corresponding wireless terminal is locked.
6. A wireless access point, characterized by: the system comprises a control system, wherein the control system comprises a common address information module (1), an authentication module (2), a timing check module (5) and an address comparison module (6);
the common address information module (1) is used as a common address information base to store common address information;
the authentication module (2) stores an authentication rule, the authentication module (2) receives authentication information input from the outside and authenticates the authentication information according to the authentication rule, if the authentication is passed, a request permission is sent to an authentication information source and the authentication information source is interacted, and meanwhile, the authentication module (2) outputs a starting signal with the authentication information;
the timing check module (5) receives the starting signal output by the authentication module (2), starts timing after the timing check module (5) receives the starting signal, calls address information in the wireless information in interaction of corresponding sources when the timing reaches a set value, retrieves the address information in the common address information module (1) by using the called address information, and outputs a comparison signal if the address information is not retrieved;
the address comparison module (6) receives the comparison signal output by the timing check module (5), sends an address calling request to the corresponding wireless terminal after receiving the comparison signal, receives the address information sent by the corresponding wireless terminal and compares the address information with the address information in the stored authentication information, and controls the wireless access point to stop interacting with the wireless terminal if the address information is different from the address information.
7. A wireless access point according to claim 6, wherein: the control system further comprises an address counting module (4), the address counting module (4) is connected with the address comparison module (6), if the address comparison module (6) compares that the address information is the same as the address information in the stored authentication information, the address information is counted once, and when the count reaches a preset value, the address information is sent to the common address information module (1) for storage.
8. A wireless access point according to claim 7, wherein: the control system further comprises a manual adding module (3), wherein the manual adding module (3) receives address information input from the outside and transmits the address information to the common address information module (1) for storage.
9. A wireless access point according to claim 6, wherein: the control system also comprises an alarm module (7);
the address comparison module sends address information to the alarm module (7) when receiving a plurality of same address information at the same time;
alarm module (7) storage has predetermined alarm information, and alarm module (7) receive address message back and send alarm information to corresponding address message.
10. The method and the wireless access point of claim 9, wherein: the alarm module (7) receives the address information and then sends a depth information request to the corresponding address information and performs timing, if the timing reaches a preset value, the alarm module (7) does not receive the detailed information of the wireless terminal, the corresponding wireless terminal is locked, and if the alarm module (7) receives the detailed information of the wireless terminal, the timing is stopped and the detailed information of the wireless terminal is stored.
CN202010109679.3A 2020-02-22 2020-02-22 Method for controlling wireless terminal access and wireless access point Active CN111314917B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010109679.3A CN111314917B (en) 2020-02-22 2020-02-22 Method for controlling wireless terminal access and wireless access point

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010109679.3A CN111314917B (en) 2020-02-22 2020-02-22 Method for controlling wireless terminal access and wireless access point

Publications (2)

Publication Number Publication Date
CN111314917A true CN111314917A (en) 2020-06-19
CN111314917B CN111314917B (en) 2023-06-23

Family

ID=71162156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010109679.3A Active CN111314917B (en) 2020-02-22 2020-02-22 Method for controlling wireless terminal access and wireless access point

Country Status (1)

Country Link
CN (1) CN111314917B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060114863A1 (en) * 2004-12-01 2006-06-01 Cisco Technology, Inc. Method to secure 802.11 traffic against MAC address spoofing
CN101079741A (en) * 2007-06-29 2007-11-28 杭州华三通信技术有限公司 Access point, access controller and method for monitoring illegal access
KR20090019443A (en) * 2007-08-21 2009-02-25 엔에이치엔(주) User authentication system using ip address and method thereof
US8045569B1 (en) * 2007-09-18 2011-10-25 Marvell International Ltd. Mechanism to verify packet data network support for internet protocol mobility
CN103476143A (en) * 2012-06-07 2013-12-25 中国移动通信集团公司 Method, device and system for IP resource releasing of WLAN
CN104125568A (en) * 2014-08-11 2014-10-29 醴陵恒茂电子科技有限公司 Wireless access point safe authentication method and system
WO2014189262A1 (en) * 2013-05-24 2014-11-27 Strix Inc. User terminal authentication method of access point apparatus
CN105188059A (en) * 2015-09-30 2015-12-23 上海斐讯数据通信技术有限公司 Authentication method based on Portal server abnormity, and wireless access point
CN105246073A (en) * 2015-08-28 2016-01-13 深圳市信锐网科技术有限公司 Wireless network access authentication method and server
US20160021610A1 (en) * 2014-07-17 2016-01-21 Xiaomi Inc. Network connection method and apparatus
CN105848131A (en) * 2016-05-09 2016-08-10 厦门四信通信科技有限公司 Method for realizing STA cross-domain roaming through cloud AC
CN106603422A (en) * 2016-12-09 2017-04-26 上海斐讯数据通信技术有限公司 Network steal prevention method of wireless router, and wireless router
CN106982430A (en) * 2017-03-22 2017-07-25 上海斐讯数据通信技术有限公司 A kind of portal authentication method and system based on user's use habit

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060114863A1 (en) * 2004-12-01 2006-06-01 Cisco Technology, Inc. Method to secure 802.11 traffic against MAC address spoofing
CN101079741A (en) * 2007-06-29 2007-11-28 杭州华三通信技术有限公司 Access point, access controller and method for monitoring illegal access
KR20090019443A (en) * 2007-08-21 2009-02-25 엔에이치엔(주) User authentication system using ip address and method thereof
US8045569B1 (en) * 2007-09-18 2011-10-25 Marvell International Ltd. Mechanism to verify packet data network support for internet protocol mobility
CN103476143A (en) * 2012-06-07 2013-12-25 中国移动通信集团公司 Method, device and system for IP resource releasing of WLAN
WO2014189262A1 (en) * 2013-05-24 2014-11-27 Strix Inc. User terminal authentication method of access point apparatus
US20160021610A1 (en) * 2014-07-17 2016-01-21 Xiaomi Inc. Network connection method and apparatus
CN104125568A (en) * 2014-08-11 2014-10-29 醴陵恒茂电子科技有限公司 Wireless access point safe authentication method and system
CN105246073A (en) * 2015-08-28 2016-01-13 深圳市信锐网科技术有限公司 Wireless network access authentication method and server
CN105188059A (en) * 2015-09-30 2015-12-23 上海斐讯数据通信技术有限公司 Authentication method based on Portal server abnormity, and wireless access point
CN105848131A (en) * 2016-05-09 2016-08-10 厦门四信通信科技有限公司 Method for realizing STA cross-domain roaming through cloud AC
CN106603422A (en) * 2016-12-09 2017-04-26 上海斐讯数据通信技术有限公司 Network steal prevention method of wireless router, and wireless router
CN106982430A (en) * 2017-03-22 2017-07-25 上海斐讯数据通信技术有限公司 A kind of portal authentication method and system based on user's use habit

Also Published As

Publication number Publication date
CN111314917B (en) 2023-06-23

Similar Documents

Publication Publication Date Title
JP2815391B2 (en) Communication transmission system
USRE40791E1 (en) Method and system for verifying the authenticity of a first communication participants in a communications network
US4815031A (en) Method for granting a request to authorized data terminal users accessing from any locations
US5805992A (en) Method for validating a communication link
US5483670A (en) Trunked radio repeater system with control channel monitoring feature
JP4696176B2 (en) Mobile station operated in mobile radio network and method of operating mobile station
US6266525B1 (en) Method for detecting fraudulent use of a communications system
US20010036273A1 (en) Radio communication device and user authentication method for use therewith
US4477799A (en) Security apparatus with alarm search and verification capability
JPH0833041A (en) Method and equipment for establishing communication link
JP2005536120A (en) Wireless local or metropolitan area network with intrusion detection and related methods
WO1995015066A1 (en) Authentication for analog communication systems
US6360091B1 (en) Method and apparatus for establishing a communication link
RU2153229C2 (en) Method and device for improved message reception by stationary systemic receiver
JP2001209614A (en) Authentication system and its method
JPS60236537A (en) Identification signal nonapproved use detecting method
CN111314917B (en) Method for controlling wireless terminal access and wireless access point
US6310538B1 (en) Process of access restriction to a telecommunications network, telecommunications system and unit for such a system
JPH0746661A (en) System and equipment for mobile radio communication
WO1998000956A2 (en) System and method for preventing cellular fraud
JPS5915419B2 (en) Method to prevent unauthorized use of mobile devices
CN105743845A (en) Authentication method and device
CN1096802C (en) Radio call receiver
JPH10304446A (en) Communication system
JP4068314B2 (en) Wireless terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant