CN103209411A - Method and device for preventing unauthorized wireless network access - Google Patents

Method and device for preventing unauthorized wireless network access Download PDF

Info

Publication number
CN103209411A
CN103209411A CN2012100138760A CN201210013876A CN103209411A CN 103209411 A CN103209411 A CN 103209411A CN 2012100138760 A CN2012100138760 A CN 2012100138760A CN 201210013876 A CN201210013876 A CN 201210013876A CN 103209411 A CN103209411 A CN 103209411A
Authority
CN
China
Prior art keywords
frame
authentication
personation
management frames
frames
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100138760A
Other languages
Chinese (zh)
Other versions
CN103209411B (en
Inventor
白永慧
朱余浩
黄楚恩
张喻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Gongjin Electronics Co Ltd
Original Assignee
Shenzhen Gongjin Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Gongjin Electronics Co Ltd filed Critical Shenzhen Gongjin Electronics Co Ltd
Priority to CN201210013876.0A priority Critical patent/CN103209411B/en
Publication of CN103209411A publication Critical patent/CN103209411A/en
Application granted granted Critical
Publication of CN103209411B publication Critical patent/CN103209411B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method for preventing unauthorized wireless network access. The method includes the following steps that a wireless frame sent by a wireless terminal is received; whether the wireless frame is a data frame or a management frame is judged; the data frame comprises data content, and the management frame is used for establishing wireless connection; if the wireless frame is the data frame, the validity of the data frame is judged according to communication records; if the wireless frame is the management frame, the validity of the management frame is judged according to whether content corresponding to management events and included in the management frame is valid; and when neither the data frame nor the management frame is valid, the received wireless frame is abandoned, otherwise the wireless frame is processed correspondingly. In addition, the invention further discloses a device using the method. By means of the method and device, an unauthorized terminal can be prevented from being accessed to a wireless network access point to some extent.

Description

The method and apparatus that the anti-personation of wireless network inserts
[technical field]
The present invention relates to radio communication, especially relate to the method and apparatus that the anti-personation of a kind of wireless network inserts.
[background technology]
Along with wireless traffic is used more and more maturation in product, network security is also more and more important.Authentication mode during access of radio network comprises open system authentication and shared key authentication.Wherein the process of open system authentication comprises: (Access Point AP) sends request to wireless terminal, and WAP (wireless access point) is differentiated response to this request to wanting related WAP (wireless access point).In this authentication mode, as long as there is a correct SSID (Service Set Identifier, service set) can authenticate and pass through access of radio network.
Have a kind of like this attack in wireless network, the invader obtains SSID by some illegal means, obtains the MAC Address of the subscriber computer of having authorized by eavesdropping, revises the MAC Address of oneself then, with accesses network or attack.
[summary of the invention]
Based on this, be necessary to provide a kind of method that can prevent the anti-personation access of wireless network of unwarranted terminal access of radio network access point.
In addition, also provide a kind of wireless network device that anti-personation inserts.
The method that the anti-personation of a kind of wireless network inserts comprises the steps: to receive the radio frames that wireless terminal sends; Judge that described radio frames is Frame or management frames; Described Frame comprises data content, and described management frames is used for setting up wireless connections; If described radio frames is Frame, then judge the legitimacy of described Frame according to communications records; If described radio frames is management frames, then according to the content corresponding with Admin Events that comprises in the management frames legal legitimacy of judging management frames whether; When described Frame or management frames are all illegal, then received radio frames are abandoned, otherwise described radio frames is handled accordingly.
Preferably, judge that described radio frames is that Frame or the step of management frames comprise: the data bit to the definition frame type is identified.
Preferably, the step of described legitimacy according to communications records judgment data frame specifically comprises: whether the difference of judging the sequence numbering of sequence numbering when last time communicating by letter in the described Frame surpasses judgment threshold, if, then abandon this Frame, otherwise Frame is transferred to corresponding Frame handling process.
Preferably, described according to the content corresponding with Admin Events that comprises in the management frames whether the legal step of judging the legitimacy of management frames comprise authentication frame, go authentication frame and go at least a in the disassociation frame to judge.
Preferably, the described step that authentication frame is judged comprises: judge whether the MAC Address that comprises in this authentication frame is related, if then abandon this authentication frame, otherwise this authentication frame is used for authentication and sets up related.
Preferably, described the step of going authentication frame to judge is comprised: judge whether remove the reason-code that comprises in the authentication frame illegal, if then abandon this and go authentication frame, otherwise go authentication frame to be used to authentication operation this.
Preferably, described the step of going disassociation frame to judge is comprised: judge whether remove the reason-code that comprises in the disassociation frame illegal, if then abandon this and remove disassociation frame, otherwise it is operation associated to go disassociation frame to be used to this.
Preferably, also comprise: judge apart from last time call duration time whether surpass Preset Time, if do not have, then management frames is abandoned.
The device that the anti-personation of a kind of wireless network inserts comprises: data reception module receives the radio frames that wireless terminal sends, and judges that described radio frames is Frame or management frames; The anti-personation of Frame module is judged according to communications records when described Frame is illegal, Frame is abandoned the legitimacy of described Frame, otherwise Frame is handled accordingly; The anti-personation of management frames module according to the content corresponding with Admin Events that comprises in the management frames legal legitimacy of judging management frames whether, when described management frames is illegal, abandons management frames, otherwise management frames is handled accordingly.
Preferably, the anti-personation of described Frame module specifically is used for: the anti-personation of described management frames module specifically is used for: judge whether the MAC Address that authentication frame comprises is related, if then abandon this authentication frame, otherwise this authentication frame is used for authentication and sets up association; Judge whether remove the reason-code that comprises in the authentication frame illegal, if then abandon this and go authentication frame, otherwise go authentication frame to be used to authentication operation this; Judge whether remove the reason-code that comprises in the disassociation frame illegal, if then abandon this and remove disassociation frame, otherwise it is operation associated to go disassociation frame to be used to this.
Said method and device, by Frame and management frames are distinguished, simultaneously Frame is arranged different decision conditions respectively with management frames, the radio frames that various forms palms off of passing through that illegal terminal sends is screened, can prevent unwarranted terminal access of radio network access point to a certain extent.
[description of drawings]
Fig. 1 is the method flow diagram that the anti-personation of the wireless network of an embodiment inserts;
Fig. 2 is the apparatus module figure that the anti-personation of the wireless network of an embodiment inserts.
[embodiment]
As shown in Figure 1, be the method flow diagram of the anti-personation access of wireless network of an embodiment.This method comprises the steps.
S101: receive the radio frames that wireless terminal sends.Mutual data exist with the form of frame between wireless terminal and the WAP (wireless access point), owing to be radio communication, these frames are referred to as radio frames.A radio frames comprises the binary numeral of a string definite length, and binary numeral is in the different different implications of position representative.Radio frames comprises polytype, mainly can be divided into two classes, and a class is the Frame that comprises data content, and another kind of is be used to the management frames of setting up wireless connections.Wherein management frames comprises authentication frame again, goes authentication frame, removes disassociation frame etc.
S102: judge that described radio frames is Frame or management frames.If described radio frames is Frame, execution in step S103 then.If described radio frames is management frames, execution in step S105 then.Can be in the type of the location definition radio frames of determining in radio frames, for example in the type of 2 definition frames of a string binary numeral, these 2 difference can be 00,01,10 and 11, then can define 4 types radio frames altogether.After receiving radio frames, the data bit of definition frame type is identified the type that gets final product judgment frame.In the present embodiment, owing to only need to judge two types radio frames, therefore can only distinguish with 1 binary data bit.Certainly, for management frames, also need to increase extra data bit and define more eurypalynous frame.After the type of judgment frame, can handle accordingly.
S103: whether the difference of judging the sequence numbering of sequence numbering when last time communicating by letter in the described Frame surpasses 32, if, execution in step S104 then, otherwise finish this flow process, Frame is transferred to corresponding Frame handling process.
In wireless communication procedure, chunk data all is divided into a lot of little blocks of data, add then data first-class for the additional information of determining this little blocks of data to send.Wherein additional information just comprises the sequence numbering of this little blocks of data, owing to each little blocks of data might not be received according to the order that sends out, thereby little blocks of data could be reduced to whole chunk data according to sequence numbering.
In this step, judge twice adjacent reception to the sequence numbering of Frame whether differ 32 with on the specified data frame whether legal.If not in 32, then represent to be likely the Frame of personation a little less than the association between the data.The judgment threshold 32 of this difference can according to circumstances be adjusted, to reach balance preferably abandoning the True Data frame and take precautions against between the personation Frame.
This step is a kind ofly to judge the method for the legitimacy of described Frame according to communications records, namely according to before the Frame of communication and the correlation degree of this Frame judge.
S104: abandon this Frame.The Frame that is judged as personation is abandoned.
S105: judge whether this management frames is authentication frame, if, execution in step S106 then, otherwise execution in step S107.When radio frames is management frames, judge further whether it is authentication frame, and determination methods can be with step S102.Authentication frame is that wireless terminal is set up the related management frames that is used for carrying out authentication before with WAP (wireless access point).Authentication frame comprises the MAC Address of the portable terminal that sends this authentication frame usually.
S106: judge whether the MAC Address that comprises in this authentication frame is related, if, execution in step S111 then; Otherwise finish this flow process, authentication frame is carried out respective handling.WAP (wireless access point) can be safeguarded the tabulation of a related website, comprises the MAC Address of each website in this tabulation.If do not comprise the MAC Address of the authentication frame that sends in the site list that WAP (wireless access point) is safeguarded, show that then this authentication frame is used for setting up association, then finish this flow process, be used for setting up authentication frame related.If comprise MAC Address in the authentication frame in the tabulation, illustrate that then this MAC palm off because one related website can not authenticate again and be related, so this authentication frame can be abandoned.
S107: judge this management frames whether for going authentication frame, if, execution in step S109 then, otherwise execution in step S108.Going authentication frame is to remove the management frames of the authentication relation between wireless terminal and the WAP (wireless access point).
S108: judge this management frames whether for removing disassociation frame, if, execution in step S109 then, otherwise finish this flow process, will go disassociation frame to carry out respective handling.Removing disassociation frame is to notify access point, and work station is with the management frames of deviated from network.
S109: judge whether reason-code is illegal, if, execution in step S111 then, otherwise execution in step S110.When management frames when going authentication frame or removing disassociation frame, all relate to the operation of the related and cancellation authentication of cancellation, all need to notify the recipient to cancel the reason of association or cancellation authentication.In the present embodiment, cancellation reason related or the cancellation authentication is represented with reason-code.As shown in the table, listed some common reason-codes with and corresponding implication.
Reason-code Implication
0 Keep
1 Do not specify
2 Authentication is invalid before
6 Incorrect from frame type or subtype that still unverified work station is received
7 Incorrect from frame type or subtype that not related as yet work station is received
9 Before finishing, authentication requires association or series of fortified passes connection
The implication of the reason-code of listing in the last table all can't be represented correct cancellation authentication or the related reason of cancellation, can not remove disassociation frame or go correct execution of authentication frame to go association or remove authentication operation with this, can be defined as illegal reason-code.When reason-code belongs to above-mentioned illegal reason-code, then this is gone authentication frame or go disassociation frame to abandon.Otherwise can go association accordingly or remove authentication operation according to reason-code.
Above-mentioned steps S105 to S109 is according to the content corresponding with Admin Events that comprises in the management frames legal legitimacy of judging management frames whether.Management frames comprises authentication frame, goes authentication frame and removes disassociation frame, and whether correctly Admin Events corresponds to MAC Address respectively whether in tabulation, go authentication frame and the reason-code that goes disassociation frame to comprise expression cancellation authentication and the related reason of cancellation.
And the judgement of above-mentioned three kinds of management frames can be taken to less a kind of carrying out, and judgement order also is not limited to present embodiment, and can adjust.
S110: whether judging distance communication last time surpasses 10 seconds, if then finish this flow process; Otherwise execution in step S111.For legal the removing disassociation frame or go authentication frame of reason-code, if in 10 seconds communications records are arranged, what then will receive removes disassociation frame or goes authentication frame to regard as the attack frame of personation, and it is abandoned.10 second time was Preset Time, and according to circumstances difference is adjusted.
S111: abandon this management frames.According to above-mentioned steps, be judged to be the management frames of personation frame for meeting corresponding decision condition, all make discard processing.
As shown in Figure 2, be the device of the anti-personation access of wireless network of an embodiment.This device is mainly used in WAP (wireless access point), and it comprises data reception module 100, Frame anti-personation module 200 and the anti-personation of management frames module 300.
Data reception module 100 is used for receiving the radio frames that wireless terminal sends, and judges that described radio frames is Frame or management frames.
The anti-personation of Frame module 200 is judged according to communications records and when described Frame is illegal, Frame is abandoned the legitimacy of described Frame, otherwise Frame is handled accordingly.
Whether the difference of the sequence numbering when being specially the sequence numbering judged in the described Frame and last time communicating by letter surpasses 32, if not in 32, then represents to be likely the Frame of personation a little less than the association between the data.The judgment threshold 32 of this difference can according to circumstances be adjusted, to reach balance preferably abandoning the True Data frame and take precautions against between the personation Frame.
The anti-personation of management frames module 300, abandons management frames, otherwise management frames is handled accordingly when described management frames is illegal according to the content corresponding with Admin Events that comprises in the management frames legal legitimacy of judging management frames whether.
The anti-personation of management frames module 300 is used for authentication frame, goes authentication frame and go disassociation frame to judge.
Specifically comprise:
Judge whether the MAC Address that comprises in the authentication frame is related, if then abandon this authentication frame, otherwise this authentication frame is used for authentication and sets up related;
Judge whether remove the reason-code that comprises in the authentication frame illegal, if then abandon this and go authentication frame, otherwise go authentication frame to be used to authentication operation this;
Judge whether remove the reason-code that comprises in the disassociation frame illegal, if then abandon this and remove disassociation frame, otherwise it is operation associated to go disassociation frame to be used to this.
The above embodiment has only expressed several execution mode of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to claim of the present invention.Should be pointed out that for the person of ordinary skill of the art without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.

Claims (10)

1. the method that the anti-personation of wireless network inserts comprises the steps:
Receive the radio frames that wireless terminal sends;
Judge that described radio frames is Frame or management frames; Described Frame comprises data content, and described management frames is used for setting up wireless connections;
If described radio frames is Frame, then judge the legitimacy of described Frame according to communications records;
If described radio frames is management frames, then according to the content corresponding with Admin Events that comprises in the management frames legal legitimacy of judging management frames whether;
When described Frame or management frames are all illegal, then received radio frames are abandoned, otherwise described radio frames is handled accordingly.
2. the method for the anti-personation access of wireless network as claimed in claim 1 is characterized in that judge that described radio frames is that Frame or the step of management frames comprise: the data bit to the definition frame type is identified.
3. the method that inserts of the anti-personation of wireless network as claimed in claim 1 is characterized in that, the step of described legitimacy according to communications records judgment data frame specifically comprises:
Whether the difference of judging the sequence numbering of sequence numbering when last time communicating by letter in the described Frame surpasses judgment threshold, if then abandon this Frame, otherwise Frame is transferred to corresponding Frame handling process.
4. wireless network as claimed in claim 1 is prevented the method that personation inserts, it is characterized in that, described according to the content corresponding with Admin Events that comprises in the management frames whether the legal step of judging the legitimacy of management frames comprise authentication frame, go authentication frame and go at least a in the disassociation frame to judge.
5. wireless network as claimed in claim 4 is prevented the method that personation inserts, and it is characterized in that the described step that authentication frame is judged comprises:
Judge whether the MAC Address that comprises in this authentication frame is related, if then abandon this authentication frame, otherwise this authentication frame is used for authentication and sets up related.
6. the method that inserts of the anti-personation of wireless network as claimed in claim 4 is characterized in that, described the step of going authentication frame to judge is comprised:
Judge whether remove the reason-code that comprises in the authentication frame illegal, if then abandon this and go authentication frame, otherwise go authentication frame to be used to authentication operation this.
7. the method that inserts of the anti-personation of wireless network as claimed in claim 4 is characterized in that, described the step of going disassociation frame to judge is comprised:
Judge whether remove the reason-code that comprises in the disassociation frame illegal, if then abandon this and remove disassociation frame, otherwise it is operation associated to go disassociation frame to be used to this.
8. as the method for claim 6 or the anti-personation access of 7 described wireless networks, it is characterized in that, also comprise:
Judgement apart from last time call duration time whether surpass Preset Time, if do not have, then management frames is abandoned.
9. a wireless network is prevented the device that personation inserts, and comprising:
Data reception module receives the radio frames that wireless terminal sends, and judges that described radio frames is Frame or management frames;
The anti-personation of Frame module is judged according to communications records when described Frame is illegal, Frame is abandoned the legitimacy of described Frame, otherwise Frame is handled accordingly;
The anti-personation of management frames module according to the content corresponding with Admin Events that comprises in the management frames legal legitimacy of judging management frames whether, when described management frames is illegal, abandons management frames, otherwise management frames is handled accordingly.
10. wireless network as claimed in claim 9 is prevented the device that personation inserts, and the anti-personation of described Frame module specifically is used for:
The anti-personation of described management frames module specifically is used for:
Judge whether the MAC Address that comprises in the authentication frame is related, if then abandon this authentication frame, otherwise this authentication frame is used for authentication and sets up related;
Judge whether remove the reason-code that comprises in the authentication frame illegal, if then abandon this and go authentication frame, otherwise go authentication frame to be used to authentication operation this;
Judge whether remove the reason-code that comprises in the disassociation frame illegal, if then abandon this and remove disassociation frame, otherwise it is operation associated to go disassociation frame to be used to this.
CN201210013876.0A 2012-01-17 2012-01-17 The method and apparatus that wireless network anti-counterfeiting accesses Active CN103209411B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210013876.0A CN103209411B (en) 2012-01-17 2012-01-17 The method and apparatus that wireless network anti-counterfeiting accesses

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210013876.0A CN103209411B (en) 2012-01-17 2012-01-17 The method and apparatus that wireless network anti-counterfeiting accesses

Publications (2)

Publication Number Publication Date
CN103209411A true CN103209411A (en) 2013-07-17
CN103209411B CN103209411B (en) 2016-08-24

Family

ID=48756466

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210013876.0A Active CN103209411B (en) 2012-01-17 2012-01-17 The method and apparatus that wireless network anti-counterfeiting accesses

Country Status (1)

Country Link
CN (1) CN103209411B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219699A (en) * 2014-09-17 2014-12-17 成都开能科技发展有限公司 Method for treating different data frames in AP system
CN104243490A (en) * 2014-09-30 2014-12-24 北京金山安全软件有限公司 Method and device for identifying pseudo wireless network access point and mobile terminal
CN105635185A (en) * 2016-03-25 2016-06-01 珠海网博信息科技股份有限公司 Method and device for preventing sniffing under WIFI environment
CN106165506A (en) * 2013-07-19 2016-11-23 英特尔公司 The identification of rogue access point
CN106231598A (en) * 2016-07-28 2016-12-14 北京坤腾畅联科技有限公司 Wireless network attack immunization method based on frame detection and terminal unit
CN108833384A (en) * 2018-05-31 2018-11-16 北京奇安信科技有限公司 Identify the method and system of counterfeit electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114948A (en) * 2006-07-26 2008-01-30 鸿富锦精密工业(深圳)有限公司 Client terminal and connection detecting method
CN101217805A (en) * 2008-01-21 2008-07-09 中兴通讯股份有限公司 A wireless LAN access control method
CN101645817A (en) * 2008-08-05 2010-02-10 中兴通讯股份有限公司 Wireless network access system and method thereof for preventing illegal user from malicious access
US20100299725A1 (en) * 2009-05-22 2010-11-25 Buffalo Inc. Wireless lan access point device and unauthorized management frame detection method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114948A (en) * 2006-07-26 2008-01-30 鸿富锦精密工业(深圳)有限公司 Client terminal and connection detecting method
CN101217805A (en) * 2008-01-21 2008-07-09 中兴通讯股份有限公司 A wireless LAN access control method
CN101645817A (en) * 2008-08-05 2010-02-10 中兴通讯股份有限公司 Wireless network access system and method thereof for preventing illegal user from malicious access
US20100299725A1 (en) * 2009-05-22 2010-11-25 Buffalo Inc. Wireless lan access point device and unauthorized management frame detection method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106165506A (en) * 2013-07-19 2016-11-23 英特尔公司 The identification of rogue access point
CN104219699A (en) * 2014-09-17 2014-12-17 成都开能科技发展有限公司 Method for treating different data frames in AP system
CN104243490A (en) * 2014-09-30 2014-12-24 北京金山安全软件有限公司 Method and device for identifying pseudo wireless network access point and mobile terminal
CN104243490B (en) * 2014-09-30 2017-12-22 北京金山安全软件有限公司 Method and device for identifying pseudo wireless network access point and mobile terminal
CN105635185A (en) * 2016-03-25 2016-06-01 珠海网博信息科技股份有限公司 Method and device for preventing sniffing under WIFI environment
CN106231598A (en) * 2016-07-28 2016-12-14 北京坤腾畅联科技有限公司 Wireless network attack immunization method based on frame detection and terminal unit
CN108833384A (en) * 2018-05-31 2018-11-16 北京奇安信科技有限公司 Identify the method and system of counterfeit electronic equipment
CN108833384B (en) * 2018-05-31 2021-03-12 奇安信科技集团股份有限公司 Method and system for identifying counterfeit electronic devices

Also Published As

Publication number Publication date
CN103209411B (en) 2016-08-24

Similar Documents

Publication Publication Date Title
CN103209411A (en) Method and device for preventing unauthorized wireless network access
US6236852B1 (en) Authentication failure trigger method and apparatus
AU684434B2 (en) Method and apparatus for authentication in a communication system
CN106487777A (en) Identity identifying method and things-internet gateway device and authentication gateway device
US20130040603A1 (en) Wireless access point detection
EP1860858A1 (en) Detection of cloned identifiers in communication systems
WO2006029384A3 (en) Method, apparatus and system for mutual authentication with modified message authentication code
ATE398903T1 (en) METHOD AND RADIO COMMUNICATION NETWORK FOR DETECTING THE PRESENCE OF FRAUDULENT PARTICIPANT IDENTITY MODULES
WO2012068815A1 (en) Method for preventing impostors in wireless access network, and access point
CN103686651A (en) Emergency call based authentication method, device and system
DE602004011554D1 (en) METHOD AND DEVICE FOR AUTHENTICATING IN WIRELESS COMMUNICATION
CA2063447C (en) Method for authentication and protection of subscribers in telecommunication systems
US6665530B1 (en) System and method for preventing replay attacks in wireless communication
US7761085B2 (en) Mobile station, system, network processor and method for use in mobile communications
US20090093233A1 (en) Mobile phone location and data security
CN101754210A (en) Method and system for authenticating home base station equipment
CN101505478B (en) Method, apparatus and system for filtering packets
JP4690423B2 (en) Core network method and apparatus
US9100429B2 (en) Apparatus for analyzing vulnerability of wireless local area network
JP2002529032A (en) Risk management method and system in mobile phone network
CN106411939A (en) Enterprise information intranet WI-FI access security reinforcing authentication method
CN101431754B (en) Method for preventing clone terminal access
CN117837185A (en) Sensing device, wireless intrusion prevention system including the same, and method of operating the same
US8509735B2 (en) Method and apparatus to facilitate detection of an unauthorized communication system user
CN1697386B (en) Method of charging base on infrastructure architecture of authentication and security in WLAN

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant