CN105306530B - A method of using Wi-Fi label monitoring objective objects - Google Patents
A method of using Wi-Fi label monitoring objective objects Download PDFInfo
- Publication number
- CN105306530B CN105306530B CN201510591357.6A CN201510591357A CN105306530B CN 105306530 B CN105306530 B CN 105306530B CN 201510591357 A CN201510591357 A CN 201510591357A CN 105306530 B CN105306530 B CN 105306530B
- Authority
- CN
- China
- Prior art keywords
- label
- random number
- monitoring device
- monitoring
- ssid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000012544 monitoring process Methods 0.000 title claims abstract description 29
- 238000012806 monitoring device Methods 0.000 claims abstract description 92
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 claims abstract description 33
- 230000000737 periodic effect Effects 0.000 claims abstract description 9
- 238000000605 extraction Methods 0.000 claims description 4
- 238000012790 confirmation Methods 0.000 claims description 3
- 238000003780 insertion Methods 0.000 claims description 3
- 230000037431 insertion Effects 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 10
- 230000005611 electricity Effects 0.000 description 4
- 239000000284 extract Substances 0.000 description 4
- 230000007774 longterm Effects 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0008—General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Artificial Intelligence (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Mobile Radio Communication Systems (AREA)
- Burglar Alarm Systems (AREA)
Abstract
The present invention relates to a kind of methods using Wi Fi label monitoring objective objects, include the following steps:S101:Label L broadcasts the SSID of itself in its signal cover;S102:Monitoring device M asks to log in label L by personal login mode;S103:Label L and monitoring device M carries out 4-Way Handshake, and is verified to the wildcard p of the personal login mode of monitoring device M inputs;If being proved to be successful, the ANonce and SNonce generated in handshake procedure is recorded;If authentication failed, redirects and execute step S106;S104:Label L and monitoring device M is pressed generates an identical random number sequence R and respectively in the copy R1 and R2 for locally preserving R according to ANonce, SNonce and wildcard p;S105:Random number in the random number and R2 that scan simultaneously is compared to confirm presence and the true and false of label L by the random number in label L broadcast (sites) in turn R1, the random number of monitoring device M periodic scanning labels L broadcast;S106:Terminate.
Description
Technical field
The present invention relates to wireless communication fields, more particularly, to a kind of side using Wi-Fi label monitoring objective objects
Method.
Background technology
The problems such as losing for real-life article and is stolen, the prior art mainly use bluetooth, RFID and Wi-Fi
Etc. agreements carry out monitoring objective object, the scheme of the prior art is specific as follows:
(1)A kind of personal belongings monitoring system based on Bluetooth of mobile phone, wherein monitoring device periodically with mounted on target pair
Judge target object whether in monitoring range as upper Bluetooth label progress handshake communication.
(2)A kind of article monitoring method and device based on bluetooth, wherein be mounted on target object on Bluetooth label with
Monitoring device is mutually distinguishable by predefined unique pairing code.Monitoring device periodically carries out handshake communication with Bluetooth label and comes
Judge target object whether in monitoring range.Monitoring device can monitor multiple objects simultaneously.
(3)A kind of article loss preventing device using passive RFID tags, wherein monitoring device periodic scanning is attached to target pair
Judge target object whether in monitoring range as upper passive RFID tags.
(4)It is a kind of to prevent the method and system that mobile terminal is lost using Wi-Fi module, wherein equipped with Wi-Fi module
Monitoring device respectively t1 and t2 (>T1) moment obtains the signal strength s1 and s2 of same hot spot.Assuming that hot spot [t1, t2)
Position remains unchanged in time, if s1/s2 is less than pre-set threshold value, monitoring device judgement target object is beyond monitoring range and opens
Dynamic alert program.
The defect of above scheme is:The effective communication distance of bluetooth and passive RFID tags is usually no more than 10 meters, prison
It is small to control range;Monitoring device, which needs periodically to establish point-to-point communication with Bluetooth label during long-term monitoring, to be connect to confirm label
It whether there is, electricity expense is big;The sampling accuracy of Wi-Fi Hotspot signal strength is easily affected by environment, and feasibility is low.
Invention content
To solve the above problems, the present invention proposes a kind of method using Wi-Fi tag monitoring control target objects, this method tool
There is the advantages of monitoring range is big, electricity expense is small, safe and good compatibility.
To realize the above goal of the invention, the technical solution adopted is that:
A method of using Wi-Fi label monitoring objective objects, passing through the monitoring device M prisons equipped with Wi-Fi module
The label L on target object is controlled to realize the monitoring to target object, is included the following steps:
S101:Label L broadcasts the SSID of itself in its signal cover;
S102:Monitoring device M asks to log in label L by personal login mode;
S103:Label L and monitoring device M carries out 4-Way Handshake, and to the pre- of the personal login mode of monitoring device M inputs
Shared key p is verified;If being proved to be successful, the ANonce and SNonce generated in handshake procedure is recorded;If authentication failed,
It then redirects and executes step S106;
S104:Label L and monitoring device M is identical random according to ANonce, SNonce and wildcard p generations one
Number Sequence R and the copy R1 and R2 for preserving R in local respectively;
S105:Random number in label L broadcast (sites) in turn R1, the random number of monitoring device M periodic scanning labels L broadcast simultaneously will
Random number in the random number and R2 that scan is compared to confirm presence and the true and false of label L;
S106:Terminate.
In said program, random number sequence is generated using ANonce, SNonce and wildcard, to only Wi-
Fi labels and can generate identical random number sequence with the monitoring device of its success 4-Way Handshake, safety in this way
It is higher;And it is not necessary to modify Wi-Fi agreements, and method can be deployed in existing Wi-Fi equipment by user when specifically used,
Its compatibility is preferably;And confirm since monitoring device accesses Wi-Fi labels in initial monitor stages by personal login mode
Its true and false, thereafter the random number of monitoring device periodic scanning Wi-Fi tag broadcasts carry out presence and the true and false of long-term monitoring label,
In the process, monitoring device is not necessarily to re-establish communication connection with label, therefore the electricity expense needed for it substantially reduces;Together
When since the communication distance of Wi-Fi labels is up to hundred meters, so the monitoring range of method provided by the invention and prior art phase
Than having obtained larger extension.
Preferably, in step S105, the step of random number in label L broadcast (sites) in turn R1, is specific as follows:
S201:Label L cyclically chooses subsequent r1s of the random number x in R1, and random number x, which is initially in R1, is located at right end
Random number;
S202:Label L is by random number r1 insertion SSID and broadcasts the SSID;
S203:Label L judges whether to continue to broadcast next random number;If so, x is updated to r1 and is redirected to execute step
Rapid S201;
S204:It returns.
Preferably, in step S202, label L can be embedded in random number r1 in SSID as follows:R1 is embedded in SSID
Left end, or by r1 be embedded in SSID right end.
Preferably, in step S105, the presence of monitoring device M confirmation labels L and the detailed process of the true and false are as follows:
S301:The SSID embedded with random number of monitoring device M scanning label L broadcast and therefrom extraction random number r1;
S302:Monitoring device M recycled in such a way that label L cycle chooses subsequent r1s of the random number x in R1 selection with
Machine number the y subsequent r2 in R2, random number y are initially the random number for being located at right end in R2;
S303:Monitoring device M judges whether r1 is equal to r2;If it is not, then monitoring device M starts alert program and redirects execution
Step S305;
S304:Monitoring device M judges whether to continue to scan on the random number of label L broadcast;If so, y is updated to r2 simultaneously
It redirects and executes step S301;
S305:It returns.
Preferably, in step S105, the presence of monitoring device M confirmation labels L and the detailed process of the true and false are as follows:
S401:The SSID embedded with random number r1 of monitoring device M scanning label L broadcast simultaneously extracts r1 from SSID;
S402:Monitoring device M chooses d random number by certain way from R2 and forms a subsequence W;
S403:Monitoring device M judges whether r1 is equal with some random number in W;If it is not, then monitoring device M starts report
Alert program simultaneously redirects execution step S405;
S404:Monitoring device M judges whether to continue to scan on the random number of label L broadcast;If so, redirecting execution step
S401;
S405:Terminate.
Preferably, in step S104, the detailed process for generating random number sequence R is as follows:Label L and monitoring device M will be pre-
The character code of shared key p obtains an integer m with ANonce and SNonce phases Calais, is then calculated by middle square method
M is the random number sequence R of random seed.
Compared with prior art, the beneficial effects of the invention are as follows:
(1)It is safe:Random number sequence is generated using ANonce, SNonce and wildcard, to only Wi-
Fi labels and the monitoring device for succeeding 4-Way Handshake with it can generate identical random number sequence.
(2)Good compatibility:It is not necessary to modify Wi-Fi agreements, and the method can be deployed in existing Wi-Fi equipment.
(3)Electricity expense is small:Monitoring device accesses Wi-Fi labels come really in initial monitor stages by personal login mode
Recognize its true and false, hereafter, the random numbers of monitoring device periodic scanning Wi-Fi tag broadcasts come the presence of long-term monitoring label with it is true
Puppet, in the process, monitoring device are not necessarily to re-establish communication connection with label.
(4)Range is wide:The communication distance of Wi-Fi labels is up to hundred meters.
Description of the drawings
Fig. 1 is the system construction drawing of the present invention;
Fig. 2 is the flow chart of method provided by the invention;
Fig. 3 is the 4-Way Handshake sequence diagram of WPA-PSK/WPA2-PSK people's login mode;
Fig. 4 is the flow chart that the Wi-Fi mark cycles of the present invention broadcast the specific implementation mode of random number sequence;
Fig. 5 be the present invention monitoring device periodic scanning Wi-Fi tag broadcasts random number come confirm label presence and
The flow chart of the specific implementation mode of the true and false;
Fig. 6 be the present invention monitoring device periodic scanning Wi-Fi tag broadcasts random number come confirm label presence and
The flow chart of another specific implementation mode of the true and false;
Fig. 7 is the exemplary plot that the Wi-Fi mark cycles of the present invention broadcast the specific implementation mode of random number sequence;
Fig. 8 be the present invention monitoring device periodic scanning Wi-Fi tag broadcasts random number come confirm label presence and
The exemplary plot of the specific implementation mode of the true and false.
Specific implementation mode
The attached figures are only used for illustrative purposes and cannot be understood as limitating the patent;
Below in conjunction with drawings and examples, the present invention is further elaborated.
Embodiment 1
Fig. 1 is the system construction drawing of the present invention, and wherein Wi-Fi labels are mounted on target object, and monitoring device M is one
The smart machines such as mobile phone, tablet or laptop equipped with Wi-Fi communication modules.
As shown in Fig. 2, monitoring device M is using a kind of specific implementation mode S10 of Wi-Fi label L monitoring objective objects:
S101:Label L broadcasts the SSID of itself in its signal cover;
S102:Monitoring device M submits logging request with personal login mode to label L;
S103:Label L and monitoring device M carries out 4-Way Handshake is to verify the wildcard p that monitoring device M is inputted
It is no correct(Fig. 3);If so, label L and monitoring device M are respectively in local record random number ANonce and SNonce;If it is not, then
It redirects and executes step S106;
S104:Label L and monitoring device M is using same random digit generation method according to ANonce, SNonce and pre- total
Key p is enjoyed to generate an identical random number sequence R and preserve the copy R1 and R2 of R in local respectively;
In the step, label L and monitoring device M can be by the character codes of wildcard p and ANonce and SNonce phases
Calais obtains an integer m, and the random number sequence R using m as random seed is then calculated by middle square method.
S105:Label L and monitoring device M difference implementation procedures S20 and S30(Or S40);
S106:Terminate.
Wi-Fi labels L is initially in R1 in the copy R1 for locally preserving random number sequence R, random number x positioned at right end
Random number.As shown in figure 4, the specific implementation mode S20 that label L broadcasts R1 by SSID is:
S201:Label L cyclically chooses subsequent r1s of the random number x in R1 from left to right;
S202:Label L is by random number r1 insertion SSID and broadcasts the SSID;
In the step, label L can be embedded in random number r1 in SSID as follows:1)R1 is embedded in the left end of SSID,
Or 2)R1 is embedded in the right end of SSID.
In the step, if label L can broadcast multiple SSID simultaneously, random number r1 can be also embedded in the 2nd SSID by label L
And broadcast the 2nd SSID.
S203:Label L judges whether to continue to broadcast next random number;If so, x is updated to r1 and is redirected to execute step
Rapid S201;
S204:It returns.
Monitoring device M is initially in R2 in the copy R2 for locally preserving random number sequence R, random number y positioned at right end
Random number.As shown in figure 5, the random number of monitoring device M scanning Wi-Fi labels L broadcast confirms presence and the true and false of label L
Specific implementation mode S30 is:
S301:The SSID embedded with random number of monitoring device M scanning label L broadcast and therefrom extraction random number r1;
In the step, monitoring device M extracts r1 according to the method for label L embedded random numbers in S202.
S302:Monitoring device M cyclically chooses subsequent r2s of the random number y in R2 from left to right;
S303:Monitoring device M judges whether r1 is equal to r2;If it is not, then monitoring device M starts alert program and redirects execution
Step S305;
S304:Monitoring device M judges whether to continue to scan on the random number of label L broadcast;If so, y is updated to r2 simultaneously
It redirects and executes step S301;
S305:It returns.
As shown in fig. 6, the monitoring device M random numbers broadcasted according to Wi-Fi labels L confirm presence and the true and false of label L
Another specific implementation mode S40 be:
S401:The SSID embedded with random number of monitoring device M scanning label L broadcast and therefrom extraction random number r1;
In the step, random number is embedded in the method for SSID to extract r1 by monitoring device M according to label L in S202.
S402:Monitoring device M cyclically chooses subsequent r2s of the random number y in R2 from left to right;
S403:D-1 random number being located in r2 and R2 on the right side of r2 is formed a position continuously sub- sequence by monitoring device M
Arrange W;
S404:Monitoring device M judges some random number z whether r1 is equal in W;If it is not, then monitoring device M starts alarm
Program simultaneously redirects execution step S406;
S405:Monitoring device M judges whether to continue to scan on the random number of label L broadcast;If so, y is updated to z and is jumped
Turn to execute step S401;
S406:It returns.
Monitoring device M can stop the random number of scanning Wi-Fi labels L broadcast in step S304 or S405.Thereafter, monitoring is set
Standby M can access label L to restart monitoring objective object again by personal login mode at any time.At this point, label L
Implementation procedure S10 updates random seed and random number sequence.
For ease of understanding, process S20 and S40 is exemplified below.
Known monitoring device M and label L is calculated the same random number sequence R and respectively in the copy for locally preserving R
R1 and R2, wherein R=R1=R2={ 3,6,5,2 }.
As shown in fig. 7, the system time of label L is split as continuous fixed length time slot.In the i-th time slot, label L is to periphery
The SSID of (i monitoring devices Mod n) a random number of broadcast embedded with R1, wherein n are the number of random number in R.Label L weights
Random number of the execution above process until its R1 that goes off the air again.
As shown in figure 8, random number y is initially 2, monitoring device M is scanned the SSID of label L by intervals.In T0
Moment, monitoring device M extracted from the SSID of label L r1=3 and in R2 choose since r2=3 three random numbers 3,
6,5 } W is formed.Since r1 is equal with the first random number in W, monitoring device M judgements label L is true and y is updated to 3.
Similarly, monitoring device M extracts r1=6 at the T1 moment.Since r1 is equal with the first random number in W, monitoring device M
Judgement label L is true and y is updated to 6.At the T2 moment, monitoring device M extract r1=2 and by its in W element 5,2,
3 } it is compared.Since r1 is equal with second random number in W, monitoring device M judgements label L is true and y is updated to 2.
Monitoring device M repeats the random number that the above process is broadcasted until its termination scanning label L.
Obviously, the above embodiment of the present invention be only to clearly illustrate example of the present invention, and not be pair
The restriction of embodiments of the present invention.For those of ordinary skill in the art, may be used also on the basis of the above description
To make other variations or changes in different ways.There is no necessity and possibility to exhaust all the enbodiments.It is all this
All any modification, equivalent and improvement etc., should be included in the claims in the present invention made by within the spirit and principle of invention
Protection domain within.
Claims (5)
1. a kind of method using Wi-Fi label monitoring objective objects passes through the monitoring device M monitoring equipped with Wi-Fi module
Label L on target object realizes the monitoring to target object, it is characterised in that:Include the following steps:
S101:Label L broadcasts the SSID of itself in its signal cover;
S102:Monitoring device M asks to log in label L by personal login mode;
S103:Label L and monitoring device M carries out 4-Way Handshake, and the pre-share of the personal login mode to monitoring device M inputs
Key p is verified;If being proved to be successful, the ANonce and SNonce generated in handshake procedure is recorded;If authentication failed is jumped
Turn to execute step S106;
S104:Label L and monitoring device M generates an identical random number sequence according to ANonce, SNonce and wildcard p
Arrange R and respectively in the copy R1 and R2 for locally preserving R;
S105:Random number in label L broadcast (sites) in turn R1, the random number of monitoring device M periodic scanning labels L broadcast simultaneously will scannings
To random number and R2 in random number be compared to confirm presence and the true and false of label L;
S106:Terminate.
2. the method according to claim 1 using Wi-Fi label monitoring objective objects, it is characterised in that:Step S105
In, the step of random number in label L broadcast (sites) in turn R1, is specific as follows:
S201:Label L cyclically chooses subsequent r1s of the random number x in R1, random number x be initially in R1 positioned at right end with
Machine number;
S202:Label L is by random number r1 insertion SSID and broadcasts the SSID;
S203:Label L judges whether to continue to broadcast next random number;If so, x is updated to r1 and redirects execution step
S201;
S204:It returns.
3. the method according to claim 2 using Wi-Fi label monitoring objective objects, it is characterised in that:Step S202
In, label L can be embedded in random number r1 in SSID as follows:R1 is embedded in the left end of SSID, or r1 is embedded in SSID
Right end.
4. the method according to claim 2 using Wi-Fi label monitoring objective objects, it is characterised in that:Step S105
In, the presence of monitoring device M confirmation labels L and the detailed process of the true and false are as follows:
S301:The SSID embedded with random number of monitoring device M scanning label L broadcast and therefrom extraction random number r1;
S302:Monitoring device M is recycled in such a way that label L cycles choose subsequent r1s of the random number x in R1 and is chosen random number y
Subsequent r2 in R2, random number y are initially the random number for being located at right end in R2;
S303:Monitoring device M judges whether r1 is equal to r2;If it is not, then monitoring device M starts alert program and redirects execution step
S305;
S304:Monitoring device M judges whether to continue to scan on the random number of label L broadcast;If so, y is updated to r2 and is redirected
Execute step S301;
S305:It returns.
5. the method for using Wi-Fi label monitoring objective objects according to claim 1 ~ 4 any one of them, it is characterised in that:
In step S104, the detailed process for generating random number sequence R is as follows:Label L and monitoring device M is by the character of wildcard p
Coding obtains an integer m with ANonce and SNonce phases Calais, is then calculated using m as random seed by middle square method
Random number sequence R.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510591357.6A CN105306530B (en) | 2015-09-16 | 2015-09-16 | A method of using Wi-Fi label monitoring objective objects |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510591357.6A CN105306530B (en) | 2015-09-16 | 2015-09-16 | A method of using Wi-Fi label monitoring objective objects |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105306530A CN105306530A (en) | 2016-02-03 |
CN105306530B true CN105306530B (en) | 2018-10-12 |
Family
ID=55203273
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510591357.6A Active CN105306530B (en) | 2015-09-16 | 2015-09-16 | A method of using Wi-Fi label monitoring objective objects |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105306530B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115102726B (en) * | 2022-06-07 | 2024-04-05 | 东风柳州汽车有限公司 | Dual authentication matching method, device, system and equipment for remote key |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4112188B2 (en) * | 2001-03-09 | 2008-07-02 | シャープ株式会社 | Data storage device |
US9823342B2 (en) * | 2010-02-09 | 2017-11-21 | Aeroscout, Ltd. | System and method for mobile monitoring of non-associated tags |
CN203368520U (en) * | 2013-06-25 | 2013-12-25 | 惠州Tcl家电集团有限公司 | Household electrical appliance monitoring equipment and system |
-
2015
- 2015-09-16 CN CN201510591357.6A patent/CN105306530B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN105306530A (en) | 2016-02-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8898783B2 (en) | Detecting malicious device | |
CN105101200B (en) | A kind of pseudo-base station recognition methods, device and terminal device | |
US9686676B2 (en) | Method, apparatus, and computer program product for a server controlled device wakeup | |
CN103491569A (en) | Method, apparatus, and computer program product for wireless short-range communication disconnection | |
US20160119320A1 (en) | Method and system for secure deployment and use of bluetooth low energy beacons and other network devices | |
CN107094293A (en) | A kind of device and method for obtaining WiFi terminal real MAC address | |
JP5002669B2 (en) | Communication equipment | |
KR102424142B1 (en) | Method and apparatus for certificating information related payment in a mobile communication system | |
JP4988472B2 (en) | Wireless communication method, wireless communication system, and wireless communication apparatus | |
KR101465522B1 (en) | Method and System for Executing IoT Service with Shortrange Communication Tag | |
KR20110031752A (en) | Method and apparatus for detecting sybil attack node using localization information and hash chain in ubiquitous sensor networks | |
CN105357181B (en) | A kind of method of multiple terminals monitoring Wi-Fi labels | |
JP2017168909A (en) | Radio communication program, method, and device | |
CN107027121A (en) | A kind of WiFi network safety access method and device | |
US20220408263A1 (en) | Access control system and method | |
CN109803456B (en) | Method and device for requesting to recover connection | |
CN105306530B (en) | A method of using Wi-Fi label monitoring objective objects | |
CN105657857B (en) | Wireless network connecting method and device | |
Moradi et al. | A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks | |
CN106792519A (en) | A kind of mobile terminal method for tracing and device | |
CN102843690B (en) | Wireless access point-based penetration test system and test method thereof | |
US9698983B2 (en) | Method and apparatus for disabling algorithms in a device | |
CN106982449A (en) | A kind of network collocating method of video camera | |
US10311594B2 (en) | Method for verifying positions of a plurality of monitoring devices | |
ES2780177T3 (en) | Authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |